3Com Switch DUA1750 2BAA01 User Manual

3Com Switch 8800  
Configuration Guide  
www.3com.com  
Part No. DUA1750-2BAA01  
Published: December 2005  
Download from Www.Somanuals.com. All Manuals Search And Download.  
About This Manual  
Release Notes  
This manual applies to 3Com Switch 8800.  
Related Manuals  
The related manuals are listed in the following table.  
Manual  
Content  
3Com Switch 8800 Installation  
Guide  
It provides information for the system installation,  
booting, hardware/software maintenance &  
monitoring.  
3Com Switch 8800 Command  
Reference Guide  
It introduces all commands available in the  
Switch 8800, as well as a command index.  
Organization  
3Com Switch 8800 Configuration Guide consists of the following parts:  
z
z
z
MPLS  
This module introduces the configuration on MPLS and BGP/MPLS VPN features.  
STP  
This module introduces the configuration on STP feature.  
Security  
This module presents the configuration on 802.1x, AAA and RADIUS protocols, and  
TACACS+ protocol.  
z
z
Reliability  
This module focuses on VRRP and HA configurations.  
System Management  
This module details the configuration involved in system management and  
maintenance, including file management, system maintenance, SNMP, RMON,  
NTP protocol, SSH terminal services, and network management.  
3
Download from Www.Somanuals.com. All Manuals Search And Download.  
Switch 8800 Configuration Guide  
About This Manual  
z
z
z
PoE  
This module focuses on power over Ethernet (PoE) configuration.  
NAT & VPLS  
This module presents the configurations on NAT and VPLS.  
Appendix  
This appendix offers the acronyms in this manual.  
Intended Audience  
The manual is intended for the following readers:  
z
z
z
Network engineers  
Network administrators  
Customers who are familiar with network fundamentals  
Conventions  
The manual uses the following conventions:  
I. General conventions  
Convention  
Description  
Normal paragraphs are in Arial.  
Headings are in Boldface.  
Terminal Display is in Courier New.  
Arial  
Boldface  
Courier New  
II. Command conventions  
Convention  
Boldface  
italic  
Description  
The keywords of a command line are in Boldface.  
Command arguments are in italic.  
Items (keywords or arguments) in square brackets [ ] are  
optional.  
[ ]  
Alternative items are grouped in braces and separated by  
vertical bars. One is selected.  
{ x | y | ... }  
Optional alternative items are grouped in square brackets  
and separated by vertical bars. One or none is selected.  
[ x | y | ... ]  
Alternative items are grouped in braces and separated by  
vertical bars. A minimum of one or a maximum of all can be  
{ x | y | ... } *  
4
Download from Www.Somanuals.com. All Manuals Search And Download.  
Switch 8800 Configuration Guide  
About This Manual  
Convention  
Description  
selected.  
Optional alternative items are grouped in square brackets  
and separated by vertical bars. Many or none can be  
selected.  
[ x | y | ... ] *  
#
A line starting with the # sign is comments.  
III. GUI conventions  
Convention  
< >  
Description  
Button names are inside angle brackets. For example, click  
the <OK> button.  
Window names, menu items, data table and field names  
are inside square brackets. For example, pop up the [New  
User] window.  
[ ]  
/
Multi-level menus are separated by forward slashes. For  
example, [File/Create/Folder].  
IV. Keyboard operation  
Format  
Description  
Press the key with the key name inside angle brackets. For  
example, <Enter>, <Tab>, <Backspace>, or <A>.  
<Key>  
Press the keys concurrently. For example, <Ctrl+Alt+A>  
means the three keys should be pressed concurrently.  
<Key1+Key2>  
<Key1, Key2>  
Press the keys in turn. For example, <Alt, A> means the  
two keys should be pressed in turn.  
5
Download from Www.Somanuals.com. All Manuals Search And Download.  
Switch 8800 Configuration Guide  
About This Manual  
V. Mouse operation  
Action  
Description  
Press and hold the primary mouse button (left mouse  
button by default).  
Select  
Select and release the primary mouse button without  
moving the pointer.  
Click  
Press the primary mouse button twice continuously and  
quickly without moving the pointer.  
Double-Click  
Drag  
Press and hold the primary mouse button and move the  
pointer to a certain position.  
VI. Symbols  
Eye-catching symbols are also used in the manual to highlight the points worthy of  
special attention during the operation. They are defined as follows:  
Caution: Means reader be extremely careful during the operation.  
Note: Means a complementary description.  
6
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
Table of Contents  
Chapter 1 Product Overview ........................................................................................................ 1-1  
1.1 Product Overview............................................................................................................... 1-1  
1.2 Function Features.............................................................................................................. 1-1  
Chapter 2 Logging into Switch .................................................................................................... 2-1  
2.1 Setting Up Configuration Environment Through the Console Port.................................... 2-1  
2.2 Setting Up Configuration Environment Through Telnet..................................................... 2-3  
2.2.1 Connecting a PC to the Switch Through Telnet...................................................... 2-3  
2.2.2 Telneting a Switch Through Another Switch........................................................... 2-4  
2.3 Setting Up Configuration Environment Through a Dial-up the Modem ............................. 2-5  
Chapter 3 Command Line Interface............................................................................................. 3-1  
3.1 Command Line Interface ................................................................................................... 3-1  
3.2 Command Line View.......................................................................................................... 3-1  
3.3 Features and Functions of Command Line ....................................................................... 3-7  
3.3.1 Online Help of Command Line................................................................................ 3-7  
3.3.2 Displaying Characteristics of Command Line ......................................................... 3-9  
3.3.3 History Command of Command Line...................................................................... 3-9  
3.3.4 Common Command Line Error Messages............................................................ 3-10  
3.3.5 Editing Characteristics of Command Line............................................................. 3-10  
Chapter 4 User Interface Configuration ...................................................................................... 4-1  
4.1 User Interface Overview .................................................................................................... 4-1  
4.2 User Interface Configuration.............................................................................................. 4-2  
4.2.1 Entering User Interface View .................................................................................. 4-2  
4.2.2 Define the Login Header ......................................................................................... 4-2  
4.2.3 Configuring Asynchronous Port Attributes.............................................................. 4-3  
4.2.4 Configuring Terminal Attributes............................................................................... 4-4  
4.2.5 Managing Users ...................................................................................................... 4-6  
4.2.6 Configuring Modem Attributes............................................................................... 4-10  
4.2.7 Configuring Redirection......................................................................................... 4-10  
4.3 Displaying and Debugging User Interface....................................................................... 4-11  
Chapter 5 Management Interface Configuration........................................................................ 5-1  
5.1 Management Interface Overview....................................................................................... 5-1  
5.2 Management Interface Configuration ................................................................................ 5-1  
Chapter 6 Ethernet Port Configuration ....................................................................................... 6-1  
6.1 Ethernet Port Overview...................................................................................................... 6-1  
6.2 Ethernet Port Configuration ............................................................................................... 6-1  
6.2.1 Entering Ethernet Port View.................................................................................... 6-2  
6.2.2 Enabling/Disabling an Ethernet Port....................................................................... 6-2  
6.2.3 Setting Ethernet Port Description............................................................................ 6-2  
TOC-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
6.2.4 Setting the Duplex Attribute of the Ethernet Port.................................................... 6-2  
6.2.5 Setting Speed on the Ethernet Port ........................................................................ 6-2  
6.2.6 Setting the Cable Type for the Ethernet Port.......................................................... 6-3  
6.2.7 Enabling/Disabling Flow Control for the Ethernet Port............................................ 6-3  
6.2.8 Permitting/Forbidding Jumbo Frame to Pass the Ethernet Port ............................. 6-3  
6.2.9 Setting the Ethernet Port Broadcast Suppression Ratio......................................... 6-4  
6.2.10 Setting the Ethernet Port Mode............................................................................. 6-4  
6.2.11 Setting the Link Type for the Ethernet Port........................................................... 6-4  
6.2.12 Adding the Ethernet Port to Specified VLANs....................................................... 6-5  
6.2.13 Setting the Default VLAN ID for the Ethernet Port................................................ 6-5  
6.2.14 Setting the VLAN VPN Feature............................................................................. 6-6  
6.2.15 Copying Port Configuration to Other Ports ........................................................... 6-6  
6.2.16 Setting Port Hold Time.......................................................................................... 6-7  
6.2.17 Setting the Ethernet Port in Loopback Mode ........................................................ 6-7  
6.3 Displaying and Debugging Ethernet Port .......................................................................... 6-8  
6.4 Ethernet Port Configuration Example................................................................................ 6-8  
6.5 Ethernet Port Troubleshooting........................................................................................... 6-9  
Chapter 7 Link Aggregation Configuration ................................................................................ 7-1  
7.1 Overview............................................................................................................................ 7-1  
7.1.1 Introduction to Link Aggregation ............................................................................. 7-1  
7.1.2 Introduction to LACP............................................................................................... 7-1  
7.1.3 Aggregation Types.................................................................................................. 7-1  
7.1.4 Load Sharing........................................................................................................... 7-2  
7.2 Link Aggregation Configuration ......................................................................................... 7-3  
7.2.1 Enabling/Disabling LACP at Port ............................................................................ 7-4  
7.2.2 Creating/Deleting an Aggregation Group................................................................ 7-4  
7.2.3 Adding/Deleting an Ethernet Port into/from an Aggregation Group........................ 7-4  
7.2.4 Setting/Deleting Aggregation Group Description .................................................... 7-5  
7.2.5 Configuring System Priority..................................................................................... 7-5  
7.2.6 Configuring Port Priority.......................................................................................... 7-6  
7.3 Displaying and Debugging Link Aggregation..................................................................... 7-6  
7.4 Link Aggregation Configuration Example .......................................................................... 7-7  
Chapter 8 VLAN Configuration .................................................................................................... 8-1  
8.1 VLAN Overview.................................................................................................................. 8-1  
8.2 Configuring VLAN.............................................................................................................. 8-2  
8.2.1 Creating/Deleting a VLAN....................................................................................... 8-2  
8.2.2 Specifying a Description Character String for a VLAN or VLAN interface.............. 8-2  
8.2.3 Creating/Removing a VLAN Interface..................................................................... 8-3  
8.2.4 Shutting down/Bringing up a VLAN Interface.......................................................... 8-3  
8.3 Configuring Port-Based VLAN........................................................................................... 8-4  
8.3.1 Adding Ethernet Ports to a VLAN............................................................................ 8-4  
8.4 Configuring Protocol-Based VLAN .................................................................................... 8-4  
TOC-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
8.4.1 Creating/Deleting a VLAN Protocol Type................................................................ 8-4  
8.4.2 Associating/Dissociating a Port with/from a Protocol-Based VLAN........................ 8-5  
8.5 Displaying VLAN................................................................................................................ 8-5  
8.6 VLAN Configuration Example............................................................................................ 8-6  
Chapter 9 GARP/GVRP Configuration......................................................................................... 9-1  
9.1 Configuring GARP ............................................................................................................. 9-1  
9.1.1 GARP Overview...................................................................................................... 9-1  
9.1.2 Setting the GARP Timer.......................................................................................... 9-2  
9.1.3 Displaying and Debugging GARP........................................................................... 9-3  
9.2 Configuring GVRP ............................................................................................................. 9-3  
9.2.1 GVRP Overview...................................................................................................... 9-3  
9.2.2 Enabling/Disabling Global GVRP............................................................................ 9-4  
9.2.3 Enabling/Disabling Port GVRP................................................................................ 9-5  
9.2.4 Setting the GVRP Registration Type ...................................................................... 9-5  
9.2.5 Displaying and Debugging GVRP........................................................................... 9-6  
9.2.6 GVRP Configuration Example................................................................................. 9-6  
Chapter 10 Super VLAN Configuration ..................................................................................... 10-1  
10.1 Super VLAN Overview................................................................................................... 10-1  
10.2 Configuring a Super VLAN ............................................................................................ 10-1  
10.2.1 Configuring a Super VLAN.................................................................................. 10-1  
10.2.2 Super VLAN Configuration Example................................................................... 10-3  
Chapter 11 IP Address Configuration ....................................................................................... 11-2  
11.1 Introduction to IP Address ............................................................................................. 11-2  
11.1.1 IP Address Classification and Representation.................................................... 11-2  
11.1.2 Subnet and Mask ................................................................................................ 11-5  
11.2 Configuring IP Address.................................................................................................. 11-6  
11.2.1 Configuring the Hostname and Host IP Address ................................................ 11-6  
11.2.2 Configuring the IP Address of the VLAN Interface.............................................. 11-7  
11.3 Displaying and debugging IP Address........................................................................... 11-7  
11.4 IP Address Configuration Example................................................................................ 11-7  
11.5 Troubleshooting IP Address Configuration.................................................................... 11-8  
Chapter 12 ARP Configuration................................................................................................... 12-1  
12.1 Introduction to ARP........................................................................................................ 12-1  
12.2 Configuring ARP............................................................................................................ 12-2  
12.2.1 Manually Adding/Deleting Static ARP Mapping Entries...................................... 12-2  
12.2.2 Configuring the Dynamic ARP Aging Timer........................................................ 12-3  
12.2.3 Enabling/Disabling the Checking Function of ARP Entry ................................... 12-3  
12.3 Displaying and Debugging ARP .................................................................................... 12-3  
12.4 Enabling/Disabling the Scheme of Preventing Attack from Packets ............................. 12-4  
12.4.1 Introduction to the Scheme of Preventing Attack from Packets.......................... 12-4  
TOC-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
Chapter 13 DHCP Configuration................................................................................................ 13-1  
13.1 Introduction to DHCP..................................................................................................... 13-1  
13.1.1 How DHCP Works............................................................................................... 13-1  
13.2 Configuring General DHCP ........................................................................................... 13-3  
13.2.1 Enabling/Disabling DHCP Service ...................................................................... 13-4  
13.2.2 Configuring Processing Method of DHCP Packets............................................. 13-4  
13.2.3 Enabling/Disabling Fake DHCP Server Detection .............................................. 13-5  
13.3 Configuring DHCP Server.............................................................................................. 13-6  
13.3.1 Creating a Global DHCP IP Address Pool.......................................................... 13-6  
13.3.2 Configuring IP Address Assignment Mode ......................................................... 13-7  
13.3.3 Forbidding Specified IP Addresses to Be Automatically Assigned..................... 13-9  
13.3.4 Configuring Lease Time For DHCP Address Pool............................................ 13-10  
13.3.5 Configuring DHCP Client Domain Names ........................................................ 13-11  
13.3.6 Configuring DNS Server Address for DHCP Clients......................................... 13-12  
13.3.7 Configuring NetBIOS Server Address for DHCP Clients.................................. 13-13  
13.3.8 Configuring NetBIOS Node Type for DHCP Clients ......................................... 13-15  
13.3.9 Configuring Custom DHCP Options.................................................................. 13-16  
13.3.10 Configuring Outbound Gateway Address for DHCP Clients........................... 13-17  
13.3.11 Configuring Parameters for DHCP Server to Send Ping Packets .................. 13-17  
13.3.12 Displaying and Debugging the DHCP Server ................................................. 13-18  
13.3.13 Clearing the Configuration Information of the DHCP Server .......................... 13-19  
13.3.14 DHCP Server Configuration Example............................................................. 13-19  
13.4 Configuring DHCP Relay............................................................................................. 13-21  
13.4.1 Introduction to DHCP Relay.............................................................................. 13-21  
13.4.2 Configuring DHCP Relay .................................................................................. 13-22  
13.4.3 Displaying and Debugging DHCP Relay........................................................... 13-23  
13.4.4 DHCP Relay Configuration Example ................................................................ 13-24  
Chapter 14 DNS Configuration................................................................................................... 14-1  
14.1 Introduction to DNS ....................................................................................................... 14-1  
14.1.1 Static Domain Name Resolution ......................................................................... 14-1  
14.1.2 Dynamic Domain Name Resolution.................................................................... 14-1  
14.2 Configuring Static Domain Name Resolution ................................................................ 14-2  
14.3 Configuring Dynamic Domain Name Resolution ........................................................... 14-2  
14.3.1 Enable/Disable Static Domain Name Resolution................................................ 14-2  
14.3.2 Configure the IP Address of Domain Name Server ............................................ 14-3  
14.3.3 Configure Domain Name Suffix........................................................................... 14-3  
14.4 Displaying and Debugging Domain Name Resolution................................................... 14-4  
14.5 DNS Configuration Example.......................................................................................... 14-4  
14.6 Troubleshooting Domain Name Resolution Configuration ............................................ 14-5  
Chapter 15 IP Performance Configuration................................................................................ 15-1  
15.1 Configuring IP Performance .......................................................................................... 15-1  
15.1.1 Configuring TCP Attributes ................................................................................. 15-1  
TOC-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
15.2 Displaying and Debugging IP Performance................................................................... 15-2  
15.3 Troubleshooting IP Performance................................................................................... 15-3  
Chapter 16 IP Routing Protocol Overview ................................................................................ 16-5  
16.1 Introduction to IP Route and Routing Table .................................................................. 16-5  
16.1.1 IP Route and Route Segment ............................................................................. 16-5  
16.1.2 Route Selection through the Routing Table........................................................ 16-6  
16.2 Routing Management Policy.......................................................................................... 16-8  
16.2.1 Routing Protocols and the Preferences of the Corresponding Routes............... 16-8  
16.2.2 Supporting Load Sharing and Route Backup...................................................... 16-9  
16.2.3 Routes Shared Between Routing Protocols...................................................... 16-10  
Chapter 17 Static Route Configuration ..................................................................................... 17-1  
17.1 Introduction to Static Route ........................................................................................... 17-1  
17.1.1 Static Route......................................................................................................... 17-1  
17.1.2 Default Route ...................................................................................................... 17-1  
17.2 Configuring Static Route................................................................................................ 17-2  
17.2.1 Configuring a Static Route .................................................................................. 17-2  
17.2.2 Configuring a Default Route................................................................................ 17-3  
17.2.3 Deleting All the Static Routes.............................................................................. 17-3  
17.3 Displaying and Debugging Static Route........................................................................ 17-4  
17.4 Typical Static Route Configuration Example ................................................................. 17-4  
17.5 Troubleshooting Static Route Faults ............................................................................. 17-5  
Chapter 18 RIP Configuration .................................................................................................... 18-1  
18.1 Introduction to RIP......................................................................................................... 18-1  
18.1.1 RIP Operation Mechanism.................................................................................. 18-1  
18.1.2 RIP Enabling and Running.................................................................................. 18-2  
18.2 Configuring RIP.............................................................................................................. 18-2  
18.2.1 Enabling RIP and Entering RIP View.................................................................. 18-3  
18.2.2 Enabling RIP on the Specified Network Segment............................................... 18-3  
18.2.3 Configuring Unicast of the Packets..................................................................... 18-4  
18.2.4 Configuring Split Horizon .................................................................................... 18-4  
18.2.5 Setting Additional Routing Metric........................................................................ 18-5  
18.2.6 Configuring RIP to Import Routes of Other Protocols......................................... 18-5  
18.2.7 Configuring Route Filtering ................................................................................. 18-6  
18.2.8 Disabling RIP to Receive Host Route ................................................................. 18-7  
18.2.9 Enabling RIP-2 Route Aggregation Function...................................................... 18-8  
18.2.10 Setting the RIP Preference ............................................................................... 18-8  
18.2.11 Specifying RIP Version of the Interface ............................................................ 18-8  
18.2.12 Configuring RIP Timers..................................................................................... 18-9  
18.2.13 Configuring RIP-1 Zero Field Check of the Interface Packet.......................... 18-10  
18.2.14 Specifying the Operating State of the Interface .............................................. 18-10  
18.2.15 Setting RIP-2 Packet Authentication............................................................... 18-11  
18.3 Displaying and Debugging RIP.................................................................................... 18-12  
TOC-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
18.4 Typical RIP Configuration Example............................................................................. 18-12  
18.5 Troubleshooting RIP Faults ......................................................................................... 18-14  
Chapter 19 OSPF Configuration ................................................................................................ 19-1  
19.1 OSPF Overview............................................................................................................. 19-1  
19.1.1 Introduction to OSPF........................................................................................... 19-1  
19.1.2 Process of OSPF Route Calculation................................................................... 19-1  
19.1.3 OSPF Packets..................................................................................................... 19-2  
19.1.4 LSA Type............................................................................................................. 19-3  
19.1.5 Basic Concepts Related to OSPF....................................................................... 19-3  
19.1.6 OSPF Features Supported by the Switch 8800.................................................. 19-5  
19.2 Configuring OSPF.......................................................................................................... 19-6  
19.2.1 Configuring Router ID ......................................................................................... 19-7  
19.2.2 Enabling OSPF.................................................................................................... 19-7  
19.2.3 Entering OSPF Area View................................................................................... 19-8  
19.2.4 Specifying an Interface to Run OSPF................................................................. 19-8  
19.2.5 Configuring OSPF to Import Routes of Other Protocols..................................... 19-9  
19.2.6 Configuring OSPF to Import Default Routes..................................................... 19-11  
19.2.7 Configuring OSPF Route Filtering..................................................................... 19-12  
19.2.8 Configuring the Route Summary of OSPF........................................................ 19-13  
19.2.9 Setting OSPF Route Preference....................................................................... 19-15  
19.2.10 Configuring OSPF Timers............................................................................... 19-15  
19.2.11 Configuring the Network Type on the OSPF Interface.................................... 19-17  
19.2.12 Configuring NBMA Neighbors for OSPF......................................................... 19-18  
19.2.13 Setting the Interface Priority for DR Election .................................................. 19-18  
19.2.14 Configuring an Interval Required for Sending LSU Packets........................... 19-20  
19.2.15 Configuring the Cost for Sending Packets on an Interface............................. 19-20  
19.2.16 Configuring to Fill the MTU Field When an Interface Transmits DD Packets. 19-20  
19.2.17 Setting a Shortest Path First (SPF) Calculation Interval for OSPF................. 19-21  
19.2.18 Disabling the Interface to Send OSPF Packets .............................................. 19-21  
19.2.19 Configuring OSPF Authentication................................................................... 19-22  
19.2.20 Configuring OSPF Virtual Link ........................................................................ 19-23  
19.2.21 Configuring Stub Area of OSPF...................................................................... 19-24  
19.2.22 Configuring NSSA Area of OSPF ................................................................... 19-24  
19.2.23 Configuring OSPF and Network Management System (NMS)....................... 19-26  
19.2.24 Resetting the OSPF Process .......................................................................... 19-27  
19.3 Displaying and Debugging OSPF................................................................................ 19-27  
19.4 Typical OSPF Configuration Example......................................................................... 19-29  
19.4.1 Configuring DR Election Based on OSPF Priority ............................................ 19-29  
19.4.2 Configuring OSPF Virtual Link .......................................................................... 19-31  
19.5 Troubleshooting OSPF Faults ..................................................................................... 19-32  
Chapter 20 Integrated IS-IS Configuration................................................................................ 20-1  
20.1 Introduction to Integrated IS-IS...................................................................................... 20-1  
TOC-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
20.1.1 Terms of IS-IS Routing Protocol ......................................................................... 20-1  
20.1.2 Two-level Structure of IS-IS Routing Protocol .................................................... 20-2  
20.1.3 NSAP Structure of IS-IS Routing Protocol.......................................................... 20-4  
20.1.4 IS-IS Routing Protocol Packets........................................................................... 20-5  
20.2 Configuring Integrated IS-IS .......................................................................................... 20-6  
20.2.1 Enabling IS-IS and Entering the IS-IS View........................................................ 20-7  
20.2.2 Setting Network Entity Title................................................................................. 20-7  
20.2.3 Enabling IS-IS on the Specified Interface ........................................................... 20-7  
20.2.4 Setting Priority for DIS Election........................................................................... 20-8  
20.2.5 Setting Router Type ............................................................................................ 20-8  
20.2.6 Setting Interface Circuit Level ............................................................................. 20-9  
20.2.7 Configuring IS-IS to Import Routes of Other Protocols....................................... 20-9  
20.2.8 Configuring IS-IS Route Filtering ...................................................................... 20-10  
20.2.9 Configuring IS-IS Routing Leak......................................................................... 20-11  
20.2.10 Setting IS-IS Route Summary......................................................................... 20-11  
20.2.11 Setting to Generate Default Route.................................................................. 20-12  
20.2.12 Setting the Preference of IS-IS Protocol......................................................... 20-12  
20.2.13 Configuring IS-IS Route Metric Type .............................................................. 20-13  
20.2.14 Setting IS-IS Link State Routing Cost............................................................. 20-13  
20.2.15 Configuring IS-IS Timers................................................................................. 20-13  
20.2.16 Setting IS-IS Authentication ............................................................................ 20-16  
20.2.17 Setting the Mesh Group of the Interface......................................................... 20-17  
20.2.18 Setting Overload Flag Bit ................................................................................ 20-18  
20.2.19 Setting to Discard the LSPs with Checksum Errors........................................ 20-18  
20.2.20 Setting to Log the Peer Changes.................................................................... 20-19  
20.2.21 Setting LSP Refreshment Interval................................................................... 20-19  
20.2.22 Setting Lifetime of LSP.................................................................................... 20-19  
20.2.23 Setting Parameters Related to SPF................................................................ 20-20  
20.2.24 Enabling/Disabling the Interface to Send Packets.......................................... 20-21  
20.2.25 Resetting All the IS-IS Data Structure............................................................. 20-22  
20.2.26 Resetting the Specified IS-IS Peer ................................................................. 20-22  
20.3 Displaying and Debugging Integrated IS-IS ................................................................ 20-22  
20.4 Typical Integrated IS-IS Configuration Example.......................................................... 20-23  
Chapter 21 BGP Configuration .................................................................................................. 21-1  
21.1 BGP/MBGP Overview.................................................................................................... 21-1  
21.1.1 Introduction to BGP............................................................................................. 21-1  
21.1.2 BGP Message Types .......................................................................................... 21-2  
21.1.3 BGP Routing Mechanism.................................................................................... 21-2  
21.1.4 MBGP.................................................................................................................. 21-3  
21.1.5 BGP Peer and Peer Group ................................................................................. 21-4  
21.2 Configuring BGP............................................................................................................ 21-4  
21.2.1 Enabling BGP...................................................................................................... 21-5  
TOC-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
21.2.2 Configuring Basic Features for BGP Peer .......................................................... 21-5  
21.2.3 Configuring application features of a BGP peer (group)..................................... 21-8  
21.2.4 Configuring Route Filtering of a Peer (group)................................................... 21-12  
21.2.5 Configuring Network Routes for BGP Distribution ............................................ 21-14  
21.2.6 Configuring the Interaction Between BGP and IGP.......................................... 21-14  
21.2.7 Configuring BGP Route Summarization ........................................................... 21-15  
21.2.8 Configuring BGP Route Filtering....................................................................... 21-16  
21.2.9 Configuring BGP Route Dampening................................................................. 21-17  
21.2.10 Configuring BGP Preference........................................................................... 21-18  
21.2.11 Configuring BGP Timer................................................................................... 21-19  
21.2.12 Configuring the Local Preference ................................................................... 21-19  
21.2.13 Configuring MED for AS.................................................................................. 21-20  
21.2.14 Comparing the MED Routing Metrics from the Peers in Different ASs........... 21-20  
21.2.15 Configuring BGP Route Reflector................................................................... 21-21  
21.2.16 Configuring BGP AS Confederation Attribute ................................................. 21-22  
21.2.17 Clearing BGP Connection............................................................................... 21-24  
21.2.18 Refreshing BGP Routes.................................................................................. 21-24  
21.3 Displaying and Debugging BGP .................................................................................. 21-24  
21.4 Typical BGP Configuration Example ........................................................................... 21-26  
21.4.1 Configuring BGP AS Confederation Attribute ................................................... 21-26  
21.4.2 Configuring BGP Route Reflector ..................................................................... 21-28  
21.4.3 Configuring BGP Routing.................................................................................. 21-30  
21.5 Troubleshooting BGP .................................................................................................. 21-33  
Chapter 22 IP Routing Policy Configuration ............................................................................ 22-1  
22.1 Introduction to IP Routing Policy.................................................................................... 22-1  
22.1.1 Filter .................................................................................................................... 22-1  
22.1.2 Routing Policy Application................................................................................... 22-2  
22.2 Configuring IP Routing Policy........................................................................................ 22-2  
22.2.1 Configuring a Route-policy.................................................................................. 22-3  
22.2.2 Configuring ip-prefix............................................................................................ 22-6  
22.2.3 Configuring the AS Path List............................................................................... 22-7  
22.2.4 Configuring a Community Attribute List .............................................................. 22-8  
22.2.5 Importing Routing Information Discovered by Other Routing Protocols............. 22-8  
22.2.6 Configuring Route Filtering ................................................................................. 22-9  
22.3 Displaying and Debugging the Routing Policy............................................................. 22-10  
22.4 Typical IP Routing Policy Configuration Example ....................................................... 22-11  
22.4.1 Configuring to Filter the Received Routing Information.................................... 22-11  
22.5 Troubleshooting Routing Policy................................................................................... 22-12  
Chapter 23 IP Multicast Overview.............................................................................................. 23-4  
23.1 IP Multicast Overview .................................................................................................... 23-4  
23.1.1 Problems with Unicast/Broadcast ....................................................................... 23-4  
23.1.2 Advantages of Multicast...................................................................................... 23-6  
TOC-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
23.1.3 Application of Multicast ....................................................................................... 23-7  
23.2 Implementation of IP Multicast....................................................................................... 23-7  
23.2.1 IP Multicast Addresses........................................................................................ 23-7  
23.2.2 IP Multicast Protocols.......................................................................................... 23-9  
23.3 RPF Mechanism for IP Multicast Packets ................................................................... 23-10  
Chapter 24 IGMP Snooping Configuration ............................................................................... 24-1  
24.1 IGMP Snooping Overview ............................................................................................. 24-1  
24.1.1 IGMP Snooping Principle.................................................................................... 24-1  
24.1.2 Implement IGMP Snooping................................................................................. 24-2  
24.2 IGMP Snooping Configuration....................................................................................... 24-4  
24.2.1 Enabling/Disabling IGMP Snooping.................................................................... 24-4  
24.2.2 Configuring Router Port Aging Time................................................................... 24-5  
24.2.3 Configuring Maximum Response Time............................................................... 24-5  
24.2.4 Configuring Aging Time of Multicast Group Member Ports ................................ 24-6  
24.2.5 Configuring Unknown Multicast Packets not Broadcasted within a VLAN ......... 24-6  
24.3 Displaying and debugging IGMP Snooping................................................................... 24-7  
24.4 IGMP Snooping Configuration Example........................................................................ 24-7  
24.4.1 Enable IGMP Snooping....................................................................................... 24-7  
24.5 Troubleshoot IGMP Snooping ....................................................................................... 24-8  
Chapter 25 Multicast VLAN Configuration................................................................................ 25-1  
25.1 Multicast VLAN Overview .............................................................................................. 25-1  
25.2 Multicast VLAN Configuration........................................................................................ 25-1  
25.3 Multicast VLAN Configuration Example......................................................................... 25-2  
Chapter 26 Common Multicast Configuration.......................................................................... 26-1  
26.1 Introduction to Common Multicast Configuration........................................................... 26-1  
26.2 Common Multicast Configuration................................................................................... 26-1  
26.2.1 Enabling Multicast............................................................................................... 26-1  
26.2.2 Configuring multicast route number limit............................................................. 26-2  
26.2.3 Clearing MFC Forwarding Entries or Its Statistic Information............................. 26-2  
26.2.4 Clearing Route Entries from the Kernel Multicast Routing Table ....................... 26-2  
26.3 Controlled Multicast Configuration................................................................................. 26-3  
26.3.1 Controlled Multicast Overview............................................................................. 26-3  
26.3.2 Configuring Controlled Multicast ......................................................................... 26-3  
26.3.3 Controlled Multicast Configuration Example....................................................... 26-4  
26.4 Displaying and Debugging Common Multicast Configuration ....................................... 26-5  
Chapter 27 IGMP Configuration................................................................................................. 27-1  
27.1 IGMP Overview.............................................................................................................. 27-1  
27.1.1 Introduction to IGMP ........................................................................................... 27-1  
27.2 IGMP Configuration ....................................................................................................... 27-2  
27.2.1 Enabling Multicast............................................................................................... 27-3  
27.2.2 Enabling IGMP on an Interface........................................................................... 27-3  
TOC-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
27.2.3 Configuring the IGMP Version ............................................................................ 27-3  
27.2.4 Configuring the Interval to Send IGMP Query Message..................................... 27-4  
27.2.5 Configuring the Interval and the Number of Querying IGMP Packets ................ 27-4  
27.2.6 Configuring the Present Time of IGMP Querier.................................................. 27-5  
27.2.7 Configuring Maximum Response Time for IGMP Query Message..................... 27-5  
27.2.8 Configuring the limit of IGMP groups on an interface......................................... 27-6  
27.2.9 Configuring a Router to Join Specified Multicast Group..................................... 27-6  
27.2.10 Limiting Multicast Groups that an Interface Can Access .................................. 27-7  
27.2.11 Deleting IGMP Groups Joined on an Interface ................................................. 27-8  
27.3 Displaying and Debugging IGMP................................................................................... 27-9  
Chapter 28 PIM-DM Configuration............................................................................................. 28-1  
28.1 PIM-DM Overview.......................................................................................................... 28-1  
28.1.1 Introduction to PIM-DM ....................................................................................... 28-1  
28.1.2 PIM-DM Working Principle.................................................................................. 28-1  
28.2 PIM-DM Configuration ................................................................................................... 28-3  
28.2.1 Enabling Multicast............................................................................................... 28-3  
28.2.2 Enabling PIM-DM................................................................................................ 28-3  
28.2.3 Configuring the Time Intervals for Ports to Send Hello Packets......................... 28-4  
28.2.4 Entering the PIM View......................................................................................... 28-4  
28.2.5 Configuring the Filtering of Multicast Source/Group........................................... 28-5  
28.2.6 Configuring the Filtering of PIM Neighbor........................................................... 28-5  
28.2.7 Configuring the Maximum Number of PIM Neighbor on an Interface................. 28-5  
28.2.8 Clearing multicast route entries from PIM routing table...................................... 28-6  
28.2.9 Clearing PIM Neighbors...................................................................................... 28-6  
28.3 Displaying and Debugging PIM-DM............................................................................... 28-6  
28.4 PIM-DM Configuration Example .................................................................................... 28-7  
Chapter 29 PIM-SM Configuration ............................................................................................. 29-1  
29.1 PIM-SM Overview.......................................................................................................... 29-1  
29.1.1 Introduction to PIM-SM ....................................................................................... 29-1  
29.1.2 PIM-SM Working Principle .................................................................................. 29-1  
29.1.3 Preparations before Configuring PIM-SM........................................................... 29-2  
29.2 PIM-SM Configuration ................................................................................................... 29-3  
29.2.1 Enabling Multicast............................................................................................... 29-4  
29.2.2 Enabling PIM-SM ................................................................................................ 29-4  
29.2.3 Entering the PIM View......................................................................................... 29-4  
29.2.4 Configuring the Time Intervals for Ports to Send Hello Packets......................... 29-4  
29.2.5 Configuring Candidate-BSRs.............................................................................. 29-4  
29.2.6 Configuring Candidate-RPs ................................................................................ 29-5  
29.2.7 Configuring Static RP.......................................................................................... 29-6  
29.2.8 Configuring the PIM-SM Domain Border ............................................................ 29-6  
29.2.9 Configuring the filtering of multicast source/group.............................................. 29-7  
29.2.10 Configuring the filtering of PIM neighbor........................................................... 29-7  
TOC-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
29.2.11 Configuring RP to Filter the Register Messages Sent by DR ........................... 29-7  
29.2.12 Limiting the range of legal BSR......................................................................... 29-7  
29.2.13 Limiting the range of legal C-RP....................................................................... 29-8  
29.2.14 Clearing multicast route entries from PIM routing table.................................... 29-8  
29.2.15 Clearing PIM Neighbors.................................................................................... 29-8  
29.3 Displaying and Debugging PIM-SM............................................................................... 29-8  
29.4 PIM-SM Configuration Example .................................................................................... 29-9  
Chapter 30 MSDP Configuration................................................................................................ 30-1  
30.1 MSDP Overview............................................................................................................. 30-1  
30.1.1 Introduction.......................................................................................................... 30-1  
30.1.2 Working Principle ................................................................................................ 30-2  
30.2 MSDP Configuration...................................................................................................... 30-4  
30.2.1 Enabling MSDP................................................................................................... 30-4  
30.2.2 Configuring MSDP Peers.................................................................................... 30-5  
30.2.3 Configuring Static RPF Peers ............................................................................. 30-5  
30.2.4 Configuring Originating RP ................................................................................. 30-6  
30.2.5 Configuring SA Caching State ............................................................................ 30-6  
30.2.6 Configuring the Maximum Number of SA caching.............................................. 30-7  
30.2.7 Requesting Source Information of MSDP Peers................................................. 30-7  
30.2.8 Controlling the Source Information Created........................................................ 30-7  
30.2.9 Controlling the Source Information Forwarded ................................................... 30-8  
30.2.10 Controlling the Received Source Information ................................................... 30-9  
30.2.11 Configuring MSDP Mesh Group...................................................................... 30-10  
30.2.12 Configuring the MSDP Connection Retry Period............................................ 30-10  
30.2.13 Shutting MSDP Peers Down........................................................................... 30-11  
30.2.14 Clearing MSDP Connections, Statistics and SA Caching Configuration ........ 30-11  
30.3 Displaying and Debugging MSDP ............................................................................... 30-12  
30.4 MSDP Configuration Examples ................................................................................... 30-13  
30.4.1 Configuring Static RPF Peers ........................................................................... 30-13  
30.4.2 Configuring Anycast RP.................................................................................... 30-14  
30.4.3 MSDP Integrated Networking............................................................................ 30-18  
Chapter 31 MBGP Multicast Extension Configuration ............................................................ 31-1  
31.1 MBGP Multicast Extension Overview............................................................................ 31-1  
31.1.1 Introduction.......................................................................................................... 31-1  
31.1.2 MBGP Extension Attributes for Multicast............................................................ 31-1  
31.1.3 MBGP Operating Mode and Message Type....................................................... 31-2  
31.2 MBGP Multicast Extension Configuration...................................................................... 31-3  
31.2.1 Enabling MBGP Multicast Extension Protocol .................................................... 31-3  
31.2.2 Specifying Network Routes Notified by MBGP Multicast Extension................... 31-4  
31.2.3 Configuring the MED Value for an AS ................................................................ 31-4  
31.2.4 Comparing MED Values from Different AS Neighbor Paths............................... 31-4  
31.2.5 Configuring Local Preference.............................................................................. 31-5  
TOC-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
31.2.6 Configuring MBGP Timer.................................................................................... 31-5  
31.2.7 Configuring MBGP Peer (Group) ........................................................................ 31-5  
31.2.8 Configuring MBGP Route Aggregation............................................................... 31-9  
31.2.9 Configuring an MBGP Route Reflector............................................................... 31-9  
31.2.10 Configure MBGP Community Attributes ......................................................... 31-10  
31.2.11 Importing IGP Routing Information into MBGP............................................... 31-10  
31.2.12 Defining AS Path List and Routing Policy....................................................... 31-10  
31.2.13 Configuring MBGP Route Filtering.................................................................. 31-11  
31.2.14 Resetting BGP Connections ........................................................................... 31-11  
31.3 Displaying and Debugging MBGP Configuration......................................................... 31-11  
31.4 MBGP Multicast Extension Configuration Example..................................................... 31-12  
Chapter 35 MPLS Architecture................................................................................................... 35-2  
35.1 MPLS Overview............................................................................................................. 35-2  
35.2 MPLS Basic Concepts................................................................................................... 35-3  
35.2.1 FEC ..................................................................................................................... 35-3  
35.2.2 Label.................................................................................................................... 35-3  
35.2.3 LDP ..................................................................................................................... 35-6  
35.3 MPLS Architecture......................................................................................................... 35-6  
35.3.1 MPLS Network Structure..................................................................................... 35-6  
35.3.2 Forwarding Labeled Packets............................................................................... 35-7  
35.3.3 Establishing LSP................................................................................................. 35-7  
35.3.4 LSP Tunnel and Hierarchy.................................................................................. 35-9  
35.4 MPLS and other Protocols........................................................................................... 35-10  
35.4.1 MPLS and Routing Protocols............................................................................ 35-10  
35.5 MPLS Application ........................................................................................................ 35-10  
35.5.1 MPLS VPN ........................................................................................................ 35-10  
Chapter 36 MPLS Basic Capability Configuration ................................................................... 36-1  
36.1 MPLS Basic Capability Overview .................................................................................. 36-1  
36.2 MPLS Configuration....................................................................................................... 36-1  
36.2.1 Defining MPLS LSR ID........................................................................................ 36-1  
36.2.2 Enabling MPLS and Entering MPLS View .......................................................... 36-2  
36.2.3 Configuring the Topology-Driven LSP Setup Policy ........................................... 36-2  
36.2.4 Configuring Static LSP........................................................................................ 36-2  
36.3 LDP Configuration ......................................................................................................... 36-3  
36.3.1 Enabling LDP protocol ........................................................................................ 36-3  
36.3.2 Enabling LDP on VLAN interface........................................................................ 36-4  
36.3.3 Configuring Remote-Peer for Extended Discovery Mode................................... 36-4  
36.3.4 Configuring session parameters ......................................................................... 36-5  
36.3.5 Configuring LDP Loop Detection Control............................................................ 36-7  
36.3.6 Configuring LDP Authentication Mode Between Every Two Routers................. 36-8  
36.4 Displaying and Debugging MPLS.................................................................................. 36-8  
36.4.1 Displaying and Debugging MPLS ....................................................................... 36-8  
TOC-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
36.4.2 Displaying and Debugging LDP........................................................................ 36-10  
36.5 Typical MPLS Configuration Example......................................................................... 36-11  
36.6 Troubleshooting MPLS Configuration.......................................................................... 36-15  
Chapter 37 BGP/MPLS VPN Configuration............................................................................... 37-1  
37.1 BGP/MPLS VPN Overview............................................................................................ 37-1  
37.1.1 BGP/MPLS VPN Model....................................................................................... 37-2  
37.1.2 BGP/MPLS VPN Implementation........................................................................ 37-5  
37.1.3 Nested BGP/MPLS VPN Implementation ........................................................... 37-7  
37.1.4 Hierarchical BGP/MPLS VPN Implementation.................................................... 37-7  
37.1.5 Introduction to OSPF Multi-instance ................................................................... 37-8  
37.1.6 Introduction to Multi-Role Host............................................................................ 37-9  
37.2 BGP/MPLS VPN Configuration.................................................................................... 37-10  
37.2.1 Configuring CE Router...................................................................................... 37-10  
37.2.2 Configuring PE Router ...................................................................................... 37-12  
37.2.3 Configuring P Router......................................................................................... 37-25  
37.3 Displaying and Debugging BGP/MPLS VPN............................................................... 37-25  
37.4 Typical BGP/MPLS VPN Configuration Example........................................................ 37-27  
37.4.1 Integrated BGP/MPLS VPN Configuration Example......................................... 37-27  
37.4.2 Hybrid BGP/MPLS VPN Configuration Example .............................................. 37-33  
37.4.3 Extranet Configuration Example ....................................................................... 37-40  
37.4.4 Hub&Spoke Configuration Example.................................................................. 37-44  
37.4.5 CE Dual-home Configuration Example............................................................. 37-50  
37.4.6 Cross-domain BGP/MPLS VPN Configuration Example .................................. 37-56  
37.4.7 Cross-Domain BGP/MPLS VPN Configuration Example — Option C.............. 37-61  
37.4.8 Hierarchical BGP/MPLS VPN Configuration Example...................................... 37-68  
37.4.9 OSPF Multi-instance sham link Configuration Example ................................... 37-72  
37.4.10 Nested BGP/MPLS VPN Configuration Example ........................................... 37-77  
37.4.11 OSPF Multi-instance CE Configuration Example............................................ 37-83  
37.4.12 Multi-Role Host Configuration Example.......................................................... 37-85  
37.5 Troubleshooting........................................................................................................... 37-90  
Chapter 38 MSTP Region-configuration ................................................................................... 38-1  
38.1 Introduction to MSTP..................................................................................................... 38-1  
38.1.1 MSTP Concepts.................................................................................................. 38-2  
38.1.2 MSTP Principles.................................................................................................. 38-7  
38.1.3 MSTP Implementation on the Switch................................................................ 38-12  
38.2 Configuring MSTP ....................................................................................................... 38-12  
38.2.1 Configuring the MST Region for a Switch......................................................... 38-13  
38.2.2 Specifying the Switch as a Primary or a Secondary Root bridge ..................... 38-15  
38.2.3 Configuring the MSTP Running Mode .............................................................. 38-16  
38.2.4 Configuring the Bridge Priority for a Switch ...................................................... 38-17  
38.2.5 Configuring the Max Hops in an MST Region................................................... 38-18  
38.2.6 Configuring the Switching Network Diameter ................................................... 38-18  
TOC-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
38.2.7 Configuring the Time Parameters of a Switch .................................................. 38-19  
38.2.8 Setting the Timeout Factor of a Specific Bridge................................................ 38-21  
38.2.9 Configuring the Max Transmission Speed on a Port ........................................ 38-21  
38.2.10 Configuring a Port as an Edge Port or Non-edge Port ................................... 38-22  
38.2.11 Configuring the Path Cost of a Port ................................................................ 38-23  
38.2.12 STP Path Cost Calculation Standards on STP port........................................ 38-24  
38.2.13 Configuring the Priority of a Port..................................................................... 38-26  
38.2.14 Configuring the Port (Not) to Connect with the Point-to-Point Link................. 38-27  
38.2.15 Configuring the mCheck Variable of a Port..................................................... 38-28  
38.2.16 Configuring the Switch Protection Function.................................................... 38-30  
38.2.17 Enabling/Disabling MSTP on the Device ........................................................ 38-32  
38.2.18 Enable/Disable Address Table Reset on Specified Port................................. 38-33  
38.2.19 Enabling/Disabling ARP Address Update....................................................... 38-33  
38.2.20 Enabling/Disabling MSTP on a Port................................................................ 38-34  
38.3 Displaying and Debugging MSTP................................................................................ 38-34  
38.4 Typical MSTP Configuration Example......................................................................... 38-35  
Chapter 39 802.1x Configuration ............................................................................................... 39-2  
39.1 802.1x Overview............................................................................................................ 39-2  
39.1.1 802.1x Standard Overview.................................................................................. 39-2  
39.1.2 802.1x System Architecture ................................................................................ 39-3  
39.1.3 802.1x Authentication Process............................................................................ 39-4  
39.1.4 Implementing 802.1x on Ethernet Switches........................................................ 39-4  
39.2 802.1x Configuration...................................................................................................... 39-5  
39.2.1 Enabling/Disabling 802.1x................................................................................... 39-5  
39.2.2 Setting the Port Access Control Mode................................................................ 39-6  
39.2.3 Setting Port Access Control Method................................................................... 39-7  
39.2.4 Checking the Users that Log on the Switch via Proxy ........................................ 39-7  
39.2.5 Setting Supplicant Number on a Port.................................................................. 39-8  
39.2.6 Setting the Authentication in DHCP Environment............................................... 39-8  
39.2.7 Configuring Authentication Method for 802.1x User ........................................... 39-8  
39.2.8 Enabling/Disabling Guest VLAN ......................................................................... 39-9  
39.2.9 Setting the Maximum times of authentication request message retransmission39-10  
39.2.10 Configuring 802.1x Timers.............................................................................. 39-10  
39.2.11 Enabling/Disabling quiet-period Timer............................................................ 39-11  
39.3 Displaying and Debugging 802.1x............................................................................... 39-12  
39.4 802.1x Configuration Example..................................................................................... 39-12  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Configuration .......................................... 40-1  
40.1 AAA and RADIUS/TACACS+ Protocol Overview.......................................................... 40-1  
40.1.1 AAA Overview..................................................................................................... 40-1  
40.1.2 RADIUS Protocol Overview ................................................................................ 40-1  
40.1.3 TACACS+ Protocol Overview ............................................................................. 40-2  
40.1.4 Implementing AAA/RADIUS on a Switch............................................................ 40-5  
TOC-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
40.2 AAA Configuration ......................................................................................................... 40-6  
40.2.1 Creating/Deleting an ISP Domain ....................................................................... 40-6  
40.2.2 Configuring Relevant Attributes of an ISP Domain............................................. 40-7  
40.2.3 Configuring Self-Service Server URL ................................................................. 40-8  
40.2.4 Creating/Deleting a Local User ........................................................................... 40-9  
40.2.5 Setting the Attributes of a Local User ............................................................... 40-10  
40.2.6 Disconnecting a User by Force......................................................................... 40-11  
40.2.7 Configuring Dynamic VLAN Delivering ............................................................. 40-11  
40.3 Configuring RADIUS Protocol...................................................................................... 40-12  
40.3.1 Creating/Deleting a RADIUS scheme............................................................... 40-13  
40.3.2 Setting IP Address and Port Number of a RADIUS Server .............................. 40-13  
40.3.3 Setting the RADIUS Packet Encryption Key..................................................... 40-15  
40.3.4 Setting the Response Timeout Timer of a RADIUS Server.............................. 40-16  
40.3.5 Setting the Retransmission Times of RADIUS Request Packets ..................... 40-16  
40.3.6 Enabling the Selection Of Radius Accounting Option....................................... 40-17  
40.3.7 Setting a Real-time Accounting Interval............................................................ 40-17  
40.3.8 Setting the Maximum Times of Real-time Accounting Request Failing to be  
Responded................................................................................................................... 40-18  
40.3.9 Enabling/Disabling Stopping Accounting Request Buffer................................. 40-19  
40.3.10 Setting the Maximum Retransmitting Times of Stopping Accounting Request40-19  
40.3.11 Setting the Supported Type of RADIUS Server.............................................. 40-20  
40.3.12 Setting RADIUS Server State ......................................................................... 40-20  
40.3.13 Setting the Username Format Transmitted to RADIUS Server ...................... 40-21  
40.3.14 Setting the Unit of Data Flow that Transmitted to RADIUS Server................. 40-21  
40.3.15 Creating/Deleting a Local RADIUS authentication Server.............................. 40-22  
40.4 Configuring TACACS+ Protocol .................................................................................. 40-22  
40.4.1 Creating a HWTACAS Scheme ........................................................................ 40-23  
40.4.2 Configuring TACACS+ Authentication Servers................................................. 40-23  
40.4.3 Configuring TACACS+ Authorization Servers .................................................. 40-24  
40.4.4 Configuring TACACS+ Accounting Servers and the Related Attributes........... 40-25  
40.4.5 Configuring the Source Address for TACACS+ Packets Sent by NAS ............ 40-26  
40.4.6 Setting a Key for Securing the Communication with TACACS Server ............. 40-26  
40.4.7 Setting the Username Format Acceptable to the TACACS Server................... 40-26  
40.4.8 Setting the Unit of Data Flows Destined for the TACACS Server..................... 40-27  
40.4.9 Setting Timers Regarding TACACS Server...................................................... 40-27  
40.5 Displaying and Debugging AAA and RADIUS Protocol .............................................. 40-29  
40.6 AAA and RADIUS/TACACS+ Protocol Configuration Examples................................. 40-30  
40.6.1 Configuring Authentication at Remote RADIUS Server.................................... 40-30  
40.6.2 Configuring Authentication at Local RADIUS Authentication Server................ 40-32  
40.6.3 Configuring Authentication at Remote TACACS Server................................... 40-32  
40.7 Troubleshooting AAA and RADIUS/TACACS+ ........................................................... 40-34  
TOC-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
Chapter 41 VRRP Configuration ................................................................................................ 41-1  
41.1 Introduction to VRRP..................................................................................................... 41-1  
41.2 Configuring VRRP ......................................................................................................... 41-3  
41.2.1 Enabling/Disabling the Function to Ping the Virtual IP Address ......................... 41-3  
41.2.2 Enabling/Disabling the Check of TTL Value of VRRP Packet ............................ 41-4  
41.2.3 Setting Correspondence Between Virtual IP Address and MAC Address.......... 41-4  
41.2.4 Adding/Deleting a Virtual IP Address.................................................................. 41-5  
41.2.5 Configuring the Priority of Switches in the Virtual Router................................... 41-5  
41.2.6 Configuring Preemption and Delay for a Switch Within a Virtual Router............ 41-6  
41.2.7 Configuring Authentication Type and Authentication Key................................... 41-7  
41.2.8 Configuring Virtual Router Timer......................................................................... 41-8  
41.2.9 Configuring Switch to Track a Specified Interface .............................................. 41-8  
41.3 Displaying and debugging VRRP .................................................................................. 41-9  
41.4 VRRP Configuration Example ..................................................................................... 41-10  
41.4.1 VRRP Single Virtual Router Example............................................................... 41-10  
41.4.2 VRRP Tracking Interface Example ................................................................... 41-11  
41.4.3 Multiple Virtual Routers Example...................................................................... 41-13  
41.5 Troubleshooting VRRP................................................................................................ 41-14  
Chapter 42 HA Configuration..................................................................................................... 42-1  
42.1 Introduction to HA.......................................................................................................... 42-1  
42.2 Configuring HA............................................................................................................... 42-1  
42.2.1 Restarting the Slave System Manually ............................................................... 42-2  
42.2.2 Starting the Master-Slave Switchover Manually ................................................. 42-2  
42.2.3 Enabling/Disabling Automatic Synchronization................................................... 42-2  
42.2.4 Synchronizing the Configuration File Manually................................................... 42-3  
42.2.5 Configuring the Load Mode of the Fabric and Slave Board................................ 42-3  
42.3 Displaying and Debugging HA Configuration ................................................................ 42-4  
Chapter 43 File System Management........................................................................................ 43-4  
43.1 File System Configuration.............................................................................................. 43-4  
43.1.1 File System Overview ......................................................................................... 43-4  
43.1.2 Directory Operation............................................................................................. 43-5  
43.1.3 File Operation...................................................................................................... 43-5  
43.1.4 Storage Device Operation................................................................................... 43-6  
43.1.5 Setting the Prompt Mode of the File System ...................................................... 43-7  
43.2 Configuration File Management..................................................................................... 43-7  
43.2.1 Configuration File Management Overview.......................................................... 43-7  
43.2.2 Displaying the Current-Configuration and Saved-Configuration of Ethernet Switch43-8  
43.2.3 Modifying and Saving the Current-Configuration................................................ 43-9  
43.2.4 Erasing Configuration Files from Flash Memory................................................. 43-9  
43.2.5 Configuring the Name of the Configuration File Used for the Next Startup........ 43-9  
43.3 FTP Configuration........................................................................................................ 43-10  
43.3.1 FTP Overview.................................................................................................... 43-10  
TOC-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
43.3.2 Enabling/Disabling FTP Server......................................................................... 43-12  
43.3.3 Configuring the FTP Server Authentication and Authorization ......................... 43-12  
43.3.4 Configuring the Running Parameters of FTP Server ........................................ 43-13  
43.3.5 Displaying and Debugging FTP Server............................................................. 43-13  
43.3.6 Disconnecting an FTP User .............................................................................. 43-13  
43.3.7 Introduction to FTP Client ................................................................................. 43-14  
43.3.8 FTP Client Configuration Example.................................................................... 43-14  
43.3.9 FTP Server Configuration Example .................................................................. 43-15  
43.4 TFTP Configuration ..................................................................................................... 43-17  
43.4.1 TFTP Overview ................................................................................................. 43-17  
43.4.2 Downloading Files by Means of TFTP.............................................................. 43-18  
43.4.3 Uploading Files by Means of TFTP................................................................... 43-18  
43.4.4 TFTP Client Configuration Example ................................................................. 43-19  
Chapter 44 MAC Address Table Management.......................................................................... 44-1  
44.1 MAC Address Table Management Overview ................................................................ 44-1  
44.2 MAC Address Table Management Configuration.......................................................... 44-2  
44.2.1 Setting MAC Address Table Entries ................................................................... 44-2  
44.2.2 Setting MAC Address Aging Time....................................................................... 44-2  
44.3 Maximum MAC Address Number Learned by Ethernet Port and Forwarding Option  
Configuration.......................................................................................................................... 44-3  
44.3.1 Maximum MAC Address Number Learned by a Port and Forwarding Option  
Configuration Tasks ....................................................................................................... 44-4  
44.3.2 Configuring Maximum MAC Address Number Learned by Ethernet Port and  
Forwarding Option Example........................................................................................... 44-5  
44.4 Displaying and Debugging MAC Address Tables.......................................................... 44-5  
44.5 Resetting MAC Addresses............................................................................................. 44-6  
44.6 MAC Address Table Management Configuration Example........................................... 44-6  
Chapter 45 Device management................................................................................................ 45-1  
45.1 Device Management Overview...................................................................................... 45-1  
45.2 Device Management Configuration ............................................................................... 45-1  
45.2.1 Rebooting the Ethernet Switch............................................................................ 45-1  
45.2.2 Enabling the Timing Reboot Function................................................................. 45-1  
45.2.3 Designating the APP Adopted on Next Booting.................................................. 45-2  
45.2.4 Upgrading BootROM........................................................................................... 45-3  
45.2.5 Setting Slot Temperature Limit............................................................................ 45-3  
45.2.6 Updating Service Processing Boards.................................................................. 45-3  
45.3 Displaying and Debugging Device Management........................................................... 45-4  
45.4 Device Management Configuration Example ................................................................ 45-5  
45.4.1 Using the Switch as an FTP Client to Implement the Remote Upgrade............. 45-5  
45.4.2 Use the Switch as an FTP Server to Implement the Remote Upgrade .............. 45-7  
Chapter 46 System Maintenance and Debugging.................................................................... 46-1  
46.1 Basic System Configuration........................................................................................... 46-1  
TOC-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
46.1.1 Setting a Name for a Switch................................................................................ 46-1  
46.1.2 Setting the System Clock.................................................................................... 46-1  
46.1.3 Setting the Time Zone......................................................................................... 46-1  
46.1.4 Setting the Summer Time ................................................................................... 46-2  
46.2 Displaying the State and Information of the System...................................................... 46-2  
46.3 System Debugging ........................................................................................................ 46-3  
46.3.1 Enabling/Disabling the Terminal Debugging....................................................... 46-3  
46.3.2 Displaying Diagnostic Information....................................................................... 46-4  
46.4 Testing Tools for Network Connection .......................................................................... 46-5  
46.4.1 ping...................................................................................................................... 46-5  
46.4.2 ping-distribute enable.......................................................................................... 46-5  
46.4.3 tracert .................................................................................................................. 46-6  
46.5 Logging Function ........................................................................................................... 46-6  
46.5.1 Introduction to Info-center ................................................................................... 46-6  
46.5.2 Info-center Configuration................................................................................... 46-10  
46.5.3 Sending the Configuration Information to the Loghost ..................................... 46-14  
46.5.4 Sending the Configuration Information to Console terminal ............................. 46-16  
46.5.5 Sending the Configuration Information to Telnet Terminal or Dumb Terminal . 46-19  
46.5.6 Sending the Configuration Information to the Log Buffer.................................. 46-21  
46.5.7 Sending the Configuration Information to the Trap Buffer ................................ 46-23  
46.5.8 Sending the Configuration Information to SNMP Network Management.......... 46-25  
46.5.9 Displaying and Debugging Info-center.............................................................. 46-27  
46.5.10 Configuration Examples of Sending Log to the Unix Loghost ........................ 46-28  
46.5.11 Configuration examples of sending log to Linux loghost ................................ 46-30  
46.5.12 Configuration Examples of Sending Log to the Console Terminal ................. 46-32  
Chapter 47 SNMP Configuration................................................................................................ 47-1  
47.1 SNMP Overview............................................................................................................. 47-1  
47.2 SNMP Versions and Supported MIB ............................................................................. 47-1  
47.3 Configuring SNMP......................................................................................................... 47-3  
47.3.1 Setting Community Names ................................................................................. 47-3  
47.3.2 Setting the System Information........................................................................... 47-4  
47.3.3 Enabling/Disabling SNMP Agent to Send Trap................................................... 47-4  
47.3.4 Setting the Destination Address of Trap ............................................................. 47-5  
47.3.5 Setting Lifetime of Trap Message ....................................................................... 47-5  
47.3.6 Setting the Engine ID of a Local or Remote Device............................................ 47-6  
47.3.7 Setting/Deleting an SNMP Group ....................................................................... 47-6  
47.3.8 Setting the Source Address of Trap.................................................................... 47-7  
47.3.9 Adding/Deleting a User to/from an SNMP Group ............................................... 47-7  
47.3.10 Creating/Updating View Information or Deleting a View................................... 47-8  
47.3.11 Setting the Size of the SNMP Packet Sent/Received by an Agent................... 47-8  
47.3.12 Disabling SNMP Agent...................................................................................... 47-8  
47.4 Displaying and Debugging SNMP ................................................................................. 47-9  
TOC-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
47.5 SNMP Configuration Example....................................................................................... 47-9  
Chapter 48 RMON Configuration ............................................................................................... 48-1  
48.1 RMON Overview............................................................................................................ 48-1  
48.2 Configuring RMON ........................................................................................................ 48-1  
48.2.1 Adding/Deleting an Entry to/from the Event Table.............................................. 48-2  
48.2.2 Adding/Deleting an Entry to/from the Alarm Table.............................................. 48-2  
48.2.3 Adding/Deleting an Entry to/from the Extended RMON Alarm Table ................. 48-3  
48.2.4 Adding/Deleting an Entry to/from the History Control Table............................... 48-4  
48.2.5 Adding/Deleting an Entry to/from the Statistics Table......................................... 48-5  
48.3 Displaying and Debugging RMON................................................................................. 48-5  
48.4 RMON Configuration Example ...................................................................................... 48-6  
Chapter 49 NTP Configuration................................................................................................... 49-1  
49.1 Brief Introduction to NTP ............................................................................................... 49-1  
49.1.1 NTP Functions..................................................................................................... 49-1  
49.1.2 Basic Operating Principle of NTP........................................................................ 49-1  
49.2 NTP Configuration ......................................................................................................... 49-2  
49.2.1 Configuring NTP Operating Mode....................................................................... 49-2  
49.2.2 Configuring NTP ID Authentication ..................................................................... 49-6  
49.2.3 Setting NTP Authentication Key.......................................................................... 49-6  
49.2.4 Setting Specified Key as Reliable....................................................................... 49-7  
49.2.5 Designating an Interface to Transmit NTP Messages ........................................ 49-7  
49.2.6 Setting NTP Master Clock................................................................................... 49-8  
49.2.7 Setting Authority to Access a Local Ethernet Switch.......................................... 49-8  
49.2.8 Setting Maximum Local Sessions ....................................................................... 49-9  
49.3 Displaying and Debugging NTP..................................................................................... 49-9  
49.4 NTP Configuration Example ........................................................................................ 49-10  
49.4.1 Configuring a NTP Server................................................................................. 49-10  
49.4.2 NTP Peer Configuration Example..................................................................... 49-11  
49.4.3 Configure NTP Broadcast Mode ....................................................................... 49-13  
49.4.4 Configure NTP Multicast Mode ......................................................................... 49-14  
49.4.5 Configure Authentication-Enabled NTP Server Mode ...................................... 49-16  
Chapter 50 SSH Terminal Service.............................................................................................. 50-1  
50.1 SSH Terminal Service ................................................................................................... 50-1  
50.1.1 SSH Overview..................................................................................................... 50-1  
50.1.2 SSH Server Configuration................................................................................... 50-3  
50.1.3 SSH Client Configuration .................................................................................. 50-12  
50.1.4 Displaying and Debugging SSH........................................................................ 50-13  
50.1.5 SSH Server Configuration Example.................................................................. 50-13  
50.1.6 SSH Client Configuration Example................................................................... 50-16  
50.2 SFTP Service............................................................................................................... 50-17  
50.2.1 SFTP Overview................................................................................................. 50-17  
50.2.2 SFTP Server Configuration............................................................................... 50-17  
TOC-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Table of Contents  
50.2.3 SFTP Client Configuration ................................................................................ 50-18  
50.2.4 SFTP Configuration Example............................................................................ 50-22  
Chapter 51 PoE Configuration ................................................................................................... 51-1  
51.1 PoE Overview ................................................................................................................ 51-1  
51.1.1 PoE on the Switch............................................................................................... 51-1  
51.1.2 External PSE4500-A Power System................................................................... 51-2  
51.2 PoE Configuration.......................................................................................................... 51-2  
51.2.1 PoE Configuration Tasks .................................................................................... 51-3  
51.3 Comprehensive Configuration Example........................................................................ 51-5  
Chapter 52 PoE PSU Supervision Configuration..................................................................... 52-1  
52.1 Introduction to PoE PSU Supervision............................................................................ 52-1  
52.2 AC Input Alarm Thresholds Configuration..................................................................... 52-1  
52.2.1 AC Input Alarm Thresholds Configuration Tasks................................................ 52-1  
52.2.2 AC Input Alarm Thresholds Configuration Example ........................................... 52-2  
52.3 DC Output Alarm Thresholds Configuration.................................................................. 52-2  
52.3.1 DC Output Alarm Thresholds Configuration Tasks............................................. 52-3  
52.3.2 DC Output Alarm Thresholds Configuration Example ........................................ 52-3  
52.4 Displaying PoE Supervision Information ....................................................................... 52-4  
52.5 PoE PSU Supervision Configuration Example .............................................................. 52-4  
TOC-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 1 Product Overview  
Chapter 1 Product Overview  
1.1 Product Overview  
The Switch 8800 is a large-capacity, modularized L2/L3 switch. It is mainly designed for  
broadband MAN, backbone, switching core and convergence center of large-sized  
enterprise network and campus network. It provides diverse services and can be used  
in constructing a stable and high-performance IP network.  
The Switch 8800 supports the following services:  
z
z
z
Internet broadband access  
MAN, enterprise/campus networking  
Providing multicast service and multicast routing and supporting multicast audio  
and video services.  
1.2 Function Features  
Table 1-1 Function features  
Features  
Implementation  
Supports VLAN compliant with IEEE 802.1Q Standard  
Supports port-based and MAC-based VLAN  
VLAN  
Supports GARP VLAN Registration Protocol (GVRP)  
Supports Spanning Tree Protocol (STP) / Multiple Spanning Tree  
Protocol (MSTP), compliant with IEEE 802.1D/IEEE 802.1s  
Standard  
STP protocol  
Flow control  
Supports IEEE 802.3x flow control (full-duplex)  
Supports back-pressure based flow control (half-duplex)  
Broadcast  
Suppression  
Supports Broadcast Suppression  
Supports Internet Group Management Protocol Snooping (IGMP  
Snooping)  
Supports Internet Group Management Protocol (IGMP)  
Supports Protocol-Independent Multicast-Dense Mode (PIM-DM)  
Multicast  
Supports  
(PIM-SM)  
Protocol-Independent  
Multicast-Sparse  
Mode  
Supports Multicast Source Discovery Protocol (MSDP)  
Supports Multiprotocol BGP (MBGP)  
1-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 1 Product Overview  
Features  
Implementation  
Supports static routing  
Supports Routing Information Protocol (RIP) v1/v2  
Supports Open Shortest Path First (OSPF)  
Supports Border Gateway Protocol (BGP)  
IP routing  
Supports  
Intermediate  
System-to-Intermediate  
System  
intra-domain routing information exchange protocol (IS-IS)  
Supports IP routing policy  
DHCP Relay  
Supports Dynamic Host Configuration Protocol (DHCP) Relay  
Supports link aggregation, including two kinds of link aggregation  
LACPs (link aggregation control protocols): static aggregation  
and dynamic aggregation.  
Link  
aggregation  
Supports the port-based mirror  
Mirror  
Supports flow mirroring of copying messages to CPU  
Supports traffic classification  
Supports bandwidth control  
Supports congestion control  
Quality  
Service (QoS)  
of  
Supports traffic shaping and traffic supervision  
Supports queues of different priority on the port  
Queue scheduling: supports Strict Priority Queuing (SP),  
Weighted Round Robin (WRR), and SP+WRR  
Supports Multi-level user management and password protect  
Supports 802.1X authentication  
Security  
features  
Supports Packet filtering  
Supports Multiprotocol Label Switching (MPLS) basic function  
Supports MPLS L3 VPN  
MPLS  
Supports Command Line Interface configuration  
Supports local configuration via Console port and AUX port  
Supports Local and remote configuration through Telnet on  
Ethernet port  
Supports Remote configuration through dialing with modem via  
the AUX port.  
Management  
and  
Maintenance  
Supports SNMP management (Supports Quidview NMS and  
RMON MIB Group 1, 2, 3 and 9)  
Supports system log  
Supports level alarms  
Supports output of the debugging information  
Supports PING and Tracert  
Supports the remote maintenance via Telnet and Modem  
Supports to load and upgrade software via XModem protocol  
Loading  
updating  
and  
Supports to load and upgrade software via File Transfer Protocol  
(FTP) and Trivial File Transfer Protocol (TFTP)  
1-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 2 Logging into Switch  
Chapter 2 Logging into Switch  
2.1 Setting Up Configuration Environment Through the  
Console Port  
Step 1: As shown in the figure below, to set up the local configuration environment,  
connect the serial port of a PC (or a terminal) to the Console port of the switch with the  
Console cable.  
RS-232 Serial port  
Console port  
Console cable  
Figure 2-1 Set up the local configuration environment through the Console port  
Step 2: Run terminal emulator (such as Terminal on Windows 3X or the Hyper Terminal  
on Windows 9X) on the Computer. Set the terminal communication parameters as  
follows: Set the baud rate to 9600, databit to 8, parity check to none, stopbit to 1, flow  
control to none and select the terminal type as VT100.  
Figure 2-2 Set up new connection  
2-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 2 Logging into Switch  
Figure 2-3 Configure the port for connection  
Figure 2-4 Set communication parameters  
Step 3: The switch is powered on. Display self-test information of the switch and prompt  
you to press Enter to show the command line prompt such as <SW8800>.  
Step 4: Input a command to configure the switch or view the operation state. Input a “?”  
for an immediate help. For details of specific commands, refer to the following chapters.  
2-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 2 Logging into Switch  
2.2 Setting Up Configuration Environment Through Telnet  
2.2.1 Connecting a PC to the Switch Through Telnet  
After you have correctly configured IP address of a VLAN interface for a switch via  
Console port (using ip address command in VLAN interface view), and added the port  
(that connects to a terminal) to this VLAN (using port command in VLAN view), you can  
telnet this switch and configure it.  
Step 1: Before logging into the switch through telnet, you need to configure the Telnet  
user name and password on the switch through the console port.  
Note:  
By default, the password is required for authenticating the Telnet user to log in the  
switch. If a user logs in via the Telnet without password, he will see the prompt “Login  
password has not been set !”.  
<SW8800> system-view  
Enter system view , return user view with Ctrl+Z.  
[SW8800] user-interface vty 0  
[SW8800-ui-vty0] set authentication password simple xxxx (xxxx is the preset login  
password of Telnet user)  
Step 2: To set up the configuration environment, connect the Ethernet port of the PC to  
that of the switch via the LAN, as shown in Figure 2-5.  
Workstation  
Ethernet port  
Ethernet  
Server  
Workstation  
PC ( for configuring the switch  
via Telnet )  
Figure 2-5 Set up configuration environment through telnet  
Step 3: Run Telnet on the PC and input the IP address of the VLAN connected to the PC  
port, as shown in Figure 2-6.  
2-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 2 Logging into Switch  
Figure 2-6 Run Telnet  
Step 4: The terminal displays “Login authentication!” and prompts the user to input the  
logon password. After you input the correct password, it displays the command line  
prompt (such as <SW8800>). If the prompt “All user interfaces are used, please try  
later! The connection was closed by the remote host!” appears, it indicates that the  
maximum number of Telnet users that can be accessed to the switch is reached at this  
moment. In this case, please reconnect later. At most 5 Telnet users are allowed to log  
on to the Switch 8800 simultaneously.  
Step 5: Use the corresponding commands to configure the switch or to monitor the  
running state. Enter “?” to get the immediate help. For details of specific commands,  
refer to the following chapters.  
Note:  
z
z
When configuring the switch via Telnet, do not modify the IP address of it unless  
necessary, for the modification might cut the Telnet connection.  
By default, when a Telnet user passes the password authentication to log on to the  
switch, he can access the commands at Level 0.  
2.2.2 Telneting a Switch Through Another Switch  
After a user has logged into a switch, he or she can configure another switch through  
the switch via Telnet. The local switch serves as Telnet client and the peer switch  
serves as Telnet server. If the ports connecting these two switches are in a same local  
network, their IP addresses must be configured in the same network segment.  
Otherwise, the two switches must establish a route that can reach each other.  
As shown in the figure below, after you telnet to a switch, you can run telnet command  
to log in and configure another switch.  
2-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 2 Logging into Switch  
Telnet Server  
Figure 2-7 Provide Telnet Client service  
PC  
Telnet Client  
Step 1: Configure the Telnet user name and password on the Telnet Server through the  
console port.  
Note:  
By default, the password is required for authenticating the Telnet user to log in the  
switch. If a user logs in via the Telnet without password, he will see the prompt “Login  
password has not been set !.”.  
<SW8800> system-view  
System View: return to User View with Ctrl+Z  
[SW8800] user-interface vty 0  
[SW8800-ui-vty0] set authentication password simple xxxx (xxxx is the preset login  
password of Telnet user)  
Step 2: The user logs in the Telnet Client (switch). For the login process, refer to the  
section describing “Connecting a PC to the Switch through Telnet”.  
Step 3: Perform the following operations on the Telnet Client:  
<SW8800> telnet xxxx (xxxx can be the hostname or IP address of the Telnet Server. If it is the  
hostname, you need to use the ip host command to specify.)  
Step 4: Enter the preset login password and you will see the prompt such <SW8800>. If  
the prompt “All user interfaces are used, please try later! The connection was closed by  
the remote host!” appears, it indicates that the maximum number of Telnet users that  
can be accessed to the switch is reached at this moment. In this case, please connect  
later.  
Step 5: Use the corresponding commands to configure the switch or view it running  
state. Enter “?” to get the immediate help. For details of specific commands, refer to the  
following chapters.  
2.3 Setting Up Configuration Environment Through a Dial-up  
the Modem  
Step 1: Authenticate the Modem user via the Console port of the switch before he logs  
in the switch through a dial-up Modem.  
2-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 2 Logging into Switch  
Note:  
By default, the password is required for authenticating the Modem user to log in the  
switch. If a user logs in via the Modem without password, he will see the prompt “Login  
password has not been set !.”.  
<SW8800> system-view  
System View: return to User View with Ctrl+Z..  
[SW8800] user-interface aux 0  
[SW8800-ui-aux0] set authentication password simple xxxx (xxxx is the preset login  
password of the Modem user.)  
Step 2: As shown in the figure below, to set up the remote configuration environment,  
connect the Modems to a PC (or a terminal) serial port and the switch AUX port  
respectively.  
Modem serial port line  
Modem  
Telephone line  
PSTN  
Modem  
AUX port  
Remote tel:  
82882285  
Figure 2-8 Set up remote configuration environment  
Step 3: Dial for connection to the switch, using the terminal emulator and Modem on the  
remote end. The number dialed shall be the telephone number of the Modem  
connected to the switch. See the two figures below.  
2-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 2 Logging into Switch  
Figure 2-9 Set the dialed number  
Figure 2-10 Dial on the remote PC  
Step 4: Enter the preset login password on the remote terminal emulator and wait for  
the prompt such as <SW8800>. Then you can configure and manage the switch. Enter  
“?” to get the immediate help. For details of specific commands, refer to the following  
chapters.  
Note:  
By default, when a Modem user logs in, he can access the commands at Level 0.  
2-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
Chapter 3 Command Line Interface  
3.1 Command Line Interface  
The Switch 8800 provides a series of configuration commands and command line  
interfaces for configuring and managing the switch. The command line interface has  
the following characteristics:  
z
z
z
z
z
z
Local configuration via the Console port and AUX port.  
Local or remote configuration via Telnet.  
Remote configuration through dialing with modem via the AUX port.  
Hierarchy command protection to avoid the unauthorized users accessing switch.  
Enter a “?” to get immediate online help.  
Provide network testing commands, such as Tracert and Ping, to fast troubleshoot  
the network.  
z
Provide various detailed debugging information to help with network  
troubleshooting.  
z
z
z
z
Log in and manage other switch directly, using the Telnet command.  
Provide FTP service for the users to upload and download files.  
Provide the function similar to Doskey to execute a history command.  
The command line interpreter searches for target not fully matching the keywords.  
It is ok for you to key in the whole keyword or part of it, as long as it is unique and  
not ambiguous.  
3.2 Command Line View  
The Switch 8800 provides hierarchy protection for the command lines to avoid  
unauthorized user accessing illegally.  
Commands are classified into four levels, namely visit level, monitoring level,  
configuration level and management level. They are introduced as follows:  
z
z
z
Visit level: Commands of this level involve command of network diagnosis tool  
(such as ping and tracert), command of switch between different language  
environments of user interface (language-mode) and telnet command etc. The  
operation of saving configuration file is not allowed on this level of commands.  
Monitoring level: Commands of this level, including the display command and the  
debugging command, are used to system maintenance, service fault diagnosis,  
etc. The operation of saving configuration file is not allowed on this level of  
commands.  
Configuration level: Service configuration commands, including routing command  
and commands on each network layer, are used to provide direct network service  
to the user.  
3-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
z
Management level: They are commands that influence basis operation of the  
system and system support module, which plays a support role on service.  
Commands of this level involve file system commands, FTP commands, TFTP  
commands, XModem downloading commands, user management commands,  
and level setting commands.  
At the same time, login users are classified into four levels that correspond to the four  
command levels respectively. After users of different levels log in, they can only use  
commands at the levels that are equal to or lower than its own level.  
In order to prevent unauthorized users from illegal intrusion, user will be identified when  
switching from a lower level to a higher level with super [ level ] command. User ID  
authentication is performed when users at lower level switch to users at higher level. In  
other words, user password of the higher level is needed (Suppose the user has set the  
super password [ level level ] { simple | cipher } password.) For the sake of  
confidentiality, on the screen the user cannot see the password that he entered. Only  
when correct password is input for three times, can the user switch to the higher level.  
Otherwise, the original user level will remain unchanged.  
Different command views are implemented according to different requirements. They  
are related to one another. For example, after logging in the switch, you will enter user  
view, in which you can only use some basic functions such as displaying the running  
state and statistics information. In user view, key in system-view to enter system view,  
in which you can key in different configuration commands and enter the corresponding  
views.  
The command line provides the following views:  
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
User view  
System view  
Port view  
VLAN view  
VLAN interface view  
Local-user view  
User interface view  
FTP Client view  
SFTP Client view  
MST region view  
PIM view  
MSDP view  
IPv4 multicast sub-address family view  
RIP view  
OSPF view  
OSPF area view  
BGP view  
IS-IS view  
3-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
Route policy view  
Basic ACL view  
Advanced ACL view  
Layer-2 ACL view  
Conform-level view  
WRED index view  
RADIUS server group view  
ISP domain view  
MPLS view  
VPNv4 sub-address family view  
VPN-instance sub-address family view  
Remote-peer view  
VSI-LDP view  
VSI view  
TACACS+ view  
Port group view  
Lanswitch view  
The following table describes the function features of different views and the ways to  
enter or quit.  
Table 3-1 Function feature of command view  
Command  
view  
Command to  
enter  
Command to  
exit  
Function  
Prompt  
Show the basic  
information  
about operation  
and statistics  
Enter right after quit  
<SW8800  
>
User view  
connecting  
switch  
the disconnects  
to the switch  
Configure  
system  
parameters  
Key  
in quit or return  
System  
view  
[SW8800] system-view  
in returns  
user view  
to  
user view  
3-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
Command  
Command to  
enter  
Command to  
exit  
Function  
Prompt  
view  
100M Ethernet port  
view  
[SW8800-  
Ethernet2/  
1/1]  
Key in interface  
ethernet 2/1/1 in  
system view  
GigabitEthernet  
port view  
Ethernet  
view:  
port  
port  
[SW8800-  
GigabitEth  
ernet2/1/1  
]
quit returns to  
system view  
Key in interface  
gigabitethernet  
2/1/1 in system  
view  
Port view  
Configure  
Ethernet  
parameters  
return returns  
to user view  
10G Ethernet port  
view  
[SW8800-  
10-Gigabit  
Ethernet2/  
1/1]  
Key in interface  
10-gigabitetherne  
t 2/1/1 in system  
view  
quit returns to  
system view  
Configure VLAN [SW8800- Key in vlan 1 in  
VLAN view  
parameters  
Vlan1]  
system view  
return returns  
to user view  
Configure  
interface  
IP  
quit returns to  
system view  
VLAN  
interface  
view  
[SW8800- Key in interface  
parameters for a Vlan-interf vlan-interface 1 in  
VLAN or a VLAN ace1]  
aggregation  
return returns  
to user view  
system view  
quit returns to  
system view  
[SW8800-l Key in local-user  
Local-user  
view  
Configure local  
user parameters  
user-user  
1]  
user1 in system  
view  
return returns  
to user view  
quit returns to  
system view  
User  
interface  
view  
Configure user  
interface  
parameters  
Key  
in  
[SW8800-  
ui0]  
user-interface 0 in  
system view  
return returns  
to user view  
Configure FTP  
Client  
parameters  
FTP Client  
view  
Key in ftp in user quit returns to  
[ftp]  
view  
system view  
quit returns to  
system view  
Configure SFTP  
Client  
parameters  
Key  
ip-address  
system view  
in  
sftp  
SFTP  
Client view  
sftp-client  
>
in  
return returns  
to user view  
quit returns to  
system view  
Configure MST [SW8800- Key  
in  
stp  
MST  
region view  
region  
mst-region region-configurati  
] on in system view  
return returns  
to user view  
parameters  
3-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
Command  
Command to  
enter  
Command to  
exit  
Function  
Prompt  
view  
quit returns to  
system view  
Configure PIM [SW8800- Key in pim in  
parameters PIM] system view  
PIM view  
return returns  
to user view  
quit returns to  
system view  
Configure MSDP [SW8800- Key in msdp in  
MSDP view  
parameters  
msdp]  
system view  
return returns  
to user view  
Enter the IPv4  
multicast  
sub-address  
family view to  
configure MBGP  
multicast  
IPv4  
multicast  
sub-addres  
s
view  
quit returns to  
BGP view  
[SW8800- Key in ipv4-family  
bgp-af-mu multicast in BGP  
return returns  
to user view  
family  
l]  
view  
extension  
parameters  
quit returns to  
system view  
Configure RIP [SW8800- Key in rip in  
parameters rip] system view  
RIP view  
return returns  
to user view  
quit returns to  
system view  
Configure OSPF [SW8800- Key in ospf in  
OSPF view  
parameters  
ospf]  
system view  
return returns  
to user view  
quit returns to  
OSPF view  
[SW8800-  
ospf-0.0.0.  
1]  
OSPF area Configure OSPF  
Key in area 1 in  
OSPF view  
view  
area parameters  
return returns  
to user view  
quit returns to  
system view  
Configure BGP [SW8800- Key in bgp 100 in  
parameters bgp] system view  
BGP view  
return returns  
to user view  
quit returns to  
system view  
Configure IS-IS [SW8800-i Key in isis in  
IS-IS view  
parameters  
sis]  
system view  
return returns  
to user view  
Key  
in  
permit  
quit returns to  
system view  
Configure route [SW8800- route-policy  
Route  
policy view  
policy  
parameters  
route-polic policy1  
return returns  
to user view  
y]  
node 10 in system  
view  
quit returns to  
system view  
[SW8800-  
Basic ACL Define the rule of acl-  
Key in acl number  
2000 in system  
view  
view  
basic ACL  
basic-200  
0]  
return returns  
to user view  
3-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
Command  
Command to  
enter  
Command to  
exit  
Function  
Prompt  
view  
quit returns to  
system view  
[SW8800- Key in acl number  
acl-adv-30 3000 in system  
Advanced  
ACL view  
Define the rule of  
advanced ACL  
return returns  
to user view  
00]  
view  
quit returns to  
system view  
[SW8800- Key in acl number  
acl-link-40 4000 in system  
Layer-2  
ACL view  
Define the rule of  
layer-2 ACL  
return returns  
to user view  
00]  
view  
Configure  
"DSCP  
the  
+
Conform-level  
Service group"  
mapping table  
and”EXP  
Conform-level-  
>service  
parameters”map vel-0]  
ping table and  
+
quit returns to  
system view  
[SW8800- Key  
conform-le conform-level 0 in  
in  
qos  
Conform-le  
vel view  
return returns  
to user view  
system view  
"Local-preceden  
ce  
+
Conform-level  
802.1p priority"  
mapping table  
quit returns to  
system view  
Configure  
WRED  
parameters  
WRED  
index view  
[SW8800- Key in wred 0 in  
wred-0]  
system view  
return returns  
to user view  
quit returns to  
system view  
RADIUS  
server  
group view  
Key  
scheme  
system view  
in  
radius  
1 in  
Configure radius [SW8800-  
parameters radius-1]  
return returns  
to user view  
quit returns to  
system view  
ISP  
domain  
view  
Configure ISP [SW8800-i Key in domain  
domain  
sp-3Com1 3Com163.net  
63.net] system view  
in  
return returns  
to user view  
parameters  
quit returns to  
system view  
Configure MPLS [SW8800- Key in mpls in  
MPLS view  
parameters  
mpls]  
system view  
return returns  
to user view  
quit returns to  
system view  
VPNv4  
subaddres  
Configure  
VPNv4 address  
[SW8800-  
bgp-af-vp  
n]  
Key in ipv4-family  
vpnv4 in BGP view  
s
family family  
return returns  
to user view  
view  
parameters  
3-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
Command  
Command to  
enter  
Command to  
exit  
Function  
Prompt  
view  
VPN-instan Configure VPN  
quit returns to  
system view  
[SW8800-  
bgp-af-vp  
n-instance  
]
ce  
instance  
Key in ipv4-family  
vpn-instance vpna  
in BGP/RIP view  
subaddres  
subaddress  
return returns  
to user view  
s
family family  
view  
parameters  
quit returns to  
system view  
Configure MPLS [SW8800-  
Remote-pe  
er view  
Key  
remote1  
in  
mpls  
peer  
group mpls-remo  
te1]  
return returns  
to user view  
parameters  
Key in vsi 3Com in quit returns to  
system view vsi view  
[SW8800-  
vsi-3Com-  
ldp]  
VSI-LDP  
view  
Configure some  
VPLS features  
Key in pwsignal return returns  
ldp in vsi view  
to user view  
quit returns to  
system view  
Specify  
mode  
VPLS [SW8800- Key in vsi 3Com in  
VSI view  
vsi-3Com] system view  
return returns  
to user view  
quit returns to  
system view  
Configure  
TACACS+  
protocol  
[SW8800-t Key in tacacs+  
TACACS+  
view  
acacs+-3  
Com]  
scheme 3Com in  
system view  
return returns  
to user view  
parameters  
Combine  
the  
ports with the  
same  
Port group configuration,  
quit returns to  
system view  
[SW8800-  
port-group  
X]  
Key in port-group  
X in system view  
view  
omitting  
repeated  
configuration  
procedure  
return returns  
to user view  
Enter lanswitch  
view.  
quit returns to  
HGMP view  
After  
the  
lanswitch view,  
you can use the  
specified  
entering  
specified  
[SW8800-l Key in lanswitch  
answitchX X/X/X-/ in HGMP  
Lanswitch  
view  
return returns  
to user view  
/X/X-/]  
view  
Ethernet switch.  
3.3 Features and Functions of Command Line  
3.3.1 Online Help of Command Line  
The command line interface provides the following online help modes.  
z
Full help  
3-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
z
Partial help  
You can get the help information through these online help commands, which are  
described as follows.  
1) Input “?” in any view to get all the commands in it and corresponding descriptions.  
<SW8800> ?  
User view commands:  
language-mode  
ping  
Specify the language environment  
Ping function  
quit  
Exit from current command view  
Privilege current user a specified priority level  
Establish one TELNET connection  
Trace route function  
super  
telnet  
tracert  
2) Input a command with a “?” separated by a space. If this position is for keywords,  
all the keywords and the corresponding brief descriptions will be listed.  
<SW8800> language-mode ?  
chinese Chinese environment  
english English environment  
3) Input a command with a “?” separated by a space. If this position is for parameters,  
all the parameters and their brief descriptions will be listed.  
[SW8800] garp timer leaveall ?  
INTEGER<65-32765> Value of timer in centiseconds  
(LeaveAllTime > (LeaveTime [On all ports]))  
Time must be multiple of 5 centiseconds  
[SW8800] garp timer leaveall 300 ?  
<cr>  
<cr> indicates no parameter in this position. The next command line repeats the  
command, you can press <Enter> to execute it directly.  
4) Input a character string with a “?”, then all the commands with this character string  
as their initials will be listed.  
<SW8800> p?  
ping  
pwd  
5) Input a command with a character string and “?”, then all the key words with this  
character string as their initials in the command will be listed.  
<SW8800> display ver?  
version  
6) Input the first letters of a keyword of a command and press <Tab> key. If no other  
keywords are headed by this letters, then this unique keyword will be displayed  
automatically.  
7) To switch to the Chinese display for the above information, perform the  
language-mode command.  
3-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
3.3.2 Displaying Characteristics of Command Line  
Command line interface provides the following display characteristics:  
z
z
For users’ convenience, the instruction and help information can be displayed in  
both English and Chinese.  
For the information to be displayed exceeding one screen, pausing function is  
provided. In this case, users can have three choices, as shown in the table below.  
Table 3-2 Functions of displaying  
Key or Command  
Function  
displaying and  
Press <Ctrl+C> when the display Stop  
executing  
pauses  
command.  
Continue to display the next screen of  
information.  
Enter a space when the display pauses  
Continue to display the next line of  
information.  
Press <Enter> when the display pauses  
3.3.3 History Command of Command Line  
Command line interface provides the function similar to that of DosKey. The commands  
entered by users can be automatically saved by the command line interface and you  
can invoke and execute them at any time later. History command buffer is defaulted as  
10. The operations are shown in the table below.  
Table 3-3 Retrieve history command  
Operation  
Display history display  
Key  
Result  
Display history command by user  
inputting  
command  
history-command  
Retrieve  
previous  
command  
the  
history  
Up cursor key <> or Retrieve the previous history  
<Ctrl+P> command, if there is any.  
Retrieve the next Down cursor key <> Retrieve  
the  
next  
history  
history command  
or <Ctrl+N>  
command, if there is any.  
Note:  
Cursor keys can be used to retrieve the history commands in Windows 3.X Terminal  
and Telnet. However, in Windows 9X HyperTerminal, the cursor keys and do not  
work, because Windows 9X HyperTerminal defines the two keys differently. In this  
case, use the combination keys <Ctrl+P> and <Ctrl+N> instead for the same purpose.  
3-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
3.3.4 Common Command Line Error Messages  
All the input commands by users can be correctly executed, if they have passed the  
grammar check. Otherwise, error messages will be reported to users. The common  
error messages are listed in the following table.  
Table 3-4 Common command line error messages  
Error messages  
Causes  
Cannot find the command.  
Cannot find the keyword.  
Unrecognized command  
Wrong parameter type.  
The value of the parameter exceeds the range.  
The input command is incomplete.  
Enter too many parameters.  
Incomplete command  
Too many parameters  
Ambiguous command  
The parameters entered are not specific.  
3.3.5 Editing Characteristics of Command Line  
Command line interface provides the basic command editing function and supports to  
edit multiple lines. A command cannot longer than 256 characters. See the table below.  
Table 3-5 Editing functions  
Key  
Function  
Insert from the cursor position and the cursor moves to the  
right, if the edition buffer still has free space.  
Common keys  
Delete the character preceding the cursor and the cursor  
moves backward.  
Backspace  
Leftwards cursor key  
<> or <Ctrl+B>  
Move the cursor a character backward  
Move the cursor a character forward  
Rightwards cursor key  
<> or <Ctrl+F>  
Up cursor key <> or  
<Ctrl+P>  
Retrieve the history command.  
Down cursor key <>  
or <Ctrl+N>  
3-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 3 Command Line Interface  
Press <Tab> after typing the incomplete key word and the  
system will execute the partial help: If the key word  
matching the typed one is unique, the system will replace  
the typed one with the complete key word and display it in  
a new line; if there is not a matched key word or the  
matched key word is not unique, the system will do no  
modification but display the originally typed word in a new  
line.  
<Tab>  
3-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
Chapter 4 User Interface Configuration  
4.1 User Interface Overview  
User interface configuration is another way provided by the switch to configure and  
manage the port data.  
The Switch 8800 supports the following configuration methods:  
z
z
z
Local configuration via the Console port and AUX port  
Local and remote configuration through Telnet on Ethernet port  
Remote configuration through dialing with modem via the AUX port.  
According to the above-mentioned configuration methods, there are three types of user  
interfaces:  
z
Console user interface  
Console user interface is used to log in the switch via the Console port. A switch can  
only have one Console user interface.  
z
AUX user interface  
AUX user interface is used to log in the switch locally or remotely with a modem via the  
AUX port. A switch can only have one AUX user interface. The local configuration for it  
is similar to that for the Console user interface.  
z
VTY user interface  
VTY user interface is used to telnet the switch. A switch can have up to five VTY user  
interface.  
User interface is numbered in the following two ways: absolute number and relative  
number.  
I. Absolute number  
The user interfaces for IP PBX fall into three types and they are sequenced as follows:  
console interface (CON), auxiliary interface (AUX) and virtual interface (VTY). A switch  
has one CON, one AUX and multiple VTYs. The first absolute number is designated as  
0; the second one is designated as 1; and so on. This method can specify a unique user  
interface or a group of interfaces.  
It follows the rules below.  
z
z
Console user interface is numbered as the first interface designated as user  
interface 0.  
AUX user interface is numbered as the second interface designated as user  
interface 1.  
4-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
z
VTY is numbered after AUX user interface. The absolute number of the first VTY is  
incremented by 1 than the AUX user interface number.  
II. Relative number  
The relative number is in the format of “user interface type” + “number”. The “number”  
refers to the internal number for each user interface type. This method can only specify  
one interface or one group of interfaces for a user interface type instead of different  
user interface types.  
It follows the rules below:  
z
z
z
Number of Console user interface: console 0.  
Number of AUX user interface: AUX 0.  
Number of VTY: The first VTY interface is designated as VTY 0; the second one is  
designated as VTY 1, and so on.  
4.2 User Interface Configuration  
The following sections describe the user interface configuration tasks.  
z
z
z
z
z
z
z
4.2.1 Entering User Interface View  
The following command is used for entering a user interface view. You can enter a  
single user interface view or multi user interface view to configure one or more user  
interfaces respectively.  
Perform the following configuration in system view.  
Table 4-1 Enter user interface view  
Operation  
Command  
Enter a single user interface view or user-interface [ type ] first-number  
multi user interface views  
[ last-number ]  
4.2.2 Define the Login Header  
The following command is used for configuring the displayed header when user login.  
4-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
When the users log in the switch, if a connection is activated, the login header will be  
displayed. After the user successfully logs in the switch, the shell header will be  
displayed.  
Perform the following configuration in system view.  
Table 4-2 Configure the login header.  
Operation  
Command  
Configure the login header  
header [ shell | incoming | login ] text  
Remove the login header configured undo header [ shell | incoming | login ]  
Note that if you press <Enter> after typing any of the three keywords shell, login and  
incoming in the command, then what you type after the word header is the contents of  
the login information, instead of identifying header type.  
4.2.3 Configuring Asynchronous Port Attributes  
The following commands can be used for configuring the attributes of the  
asynchronous port in asynchronous interactive mode, including speed, flow control,  
parity, stop bit and data bit.  
Perform the following configurations in user interface (Console and AUX user interface  
only) view.  
I. Configuring the transmission speed  
Table 4-3 Configure the transmission speed  
Operation  
Command  
speed speed-value  
Configure the transmission speed  
Restore the default transmission speed undo speed  
By default, the transmission speed on an asynchronous port is 9600bps.  
II. Configuring flow control  
Table 4-4 Configure flow control  
Operation  
Command  
flow-control { hardware | none |  
software }  
Configure the flow control  
Restore the default flow control mode  
undo flow-control  
4-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
By default, the flow control on an asynchronous port is none, that is, no flow control will  
be performed.  
III. Configuring parity  
Table 4-5 Configure parity  
Operation  
Command  
parity { even | mark | none | odd | space }  
undo parity  
Configure parity mode  
Restore the default parity mode  
By default, the parity on an asynchronous port is none, that is, no parity bit.  
IV. Configuring the stop bit  
Table 4-6 Configure the stop bit  
Operation  
Configure the stop bit  
Restore the default stop bit  
Command  
stopbits { 1 | 1.5 | 2 }  
undo stopbits  
By default, an asynchronous port supports 1 stop bit.  
Note that setting 1.5 stop bits is not available on the Switch 8800.  
V. Configuring the data bit  
Table 4-7 Configure the data bit  
Operation  
Configure the data bit  
Restore the default data bit  
Command  
databits { 7 | 8 }  
undo databits  
By default, an asynchronous port supports 8 data bits.  
4.2.4 Configuring Terminal Attributes  
The following commands can be used for configuring the terminal attributes, including  
enabling/disabling terminal service, disconnection upon timeout, lockable user  
interface, configuring terminal screen length and history command buffer size.  
Perform the following configuration in user interface view. Perform lock command in  
user view.  
I. Enabling/disabling terminal service  
4-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
After the terminal service is disabled on a user interface, you cannot log in to the switch  
through the user interface. However, the user logged in through the user interface  
before disabling the terminal service can continue his operation. After such user logs  
out, he cannot log in again. In this case, a user can log in to the switch through the user  
interface only when the terminal service is enabled again.  
Table 4-8 Enable/disable terminal service  
Operation  
Enable terminal service  
Disable terminal service  
Command  
shell  
undo shell  
By default, terminal service is enabled on all the user interfaces.  
Note the following points:  
z
For the sake of security, the undo shell command can only be used on the user  
interfaces other than Console user interface.  
z
z
You cannot use this command on the user interface via which you log in.  
You will be asked to confirm before using undo shell on any legal user interface.  
II. Configuring idle-timeout  
Table 4-9 Configure idle-timeout  
Operation  
Configure idle-timeout  
Command  
idle-timeout minutes [ seconds ]  
undo idle-timeout  
Restore the default idle-timeout  
By default, idle-timeout is enabled and set to 10 minutes on all the user interfaces. That  
is, the user interface will be disconnected automatically after 10 minutes without any  
operation.  
idle-timeout 0 means disabling idle-timeout.  
III. Locking user interface  
This configuration is to lock the current user interface and prompt the user to enter the  
password. This makes it impossible for others to operate in the interface after the user  
leaves.  
Table 4-10 Lock user interface  
Operation  
Lock user interface  
Command  
lock  
4-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
IV. Setting the screen length  
If a command displays more than one screen of information, you can use the following  
command to set how many lines to be displayed in a screen, so that the information can  
be separated in different screens and you can view it more conveniently.  
Table 4-11 Set the screen length  
Operation  
Set the screen length  
Restore the default screen length  
Command  
screen-length screen-length  
undo screen-length  
By default, the terminal screen length is 24 lines.  
screen-length 0 indicates to disable screen display separation function.  
V. Setting the history command buffer size  
Table 4-12 Set the history command buffer size  
Operation  
Command  
Set the history command buffer size  
history-command max-size value  
Restore the default history command  
buffer size  
undo history-command max-size  
By default, the size of the history command buffer is 10, that is, 10 history commands  
can be saved.  
4.2.5 Managing Users  
The management of users includes the setting of user logon authentication method,  
level of command which a user can use after logging on, level of command which a  
user can use after logging on from the specifically user interface, and command level.  
I. Configuring the authentication method  
The following command is used for configuring the user login authentication method to  
deny the access of an unauthorized user.  
Perform the following configuration in user interface view.  
Table 4-13 Configure the authentication method  
Operation  
Command  
authentication-mode { password |  
scheme | none }  
Configure the authentication method  
4-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
By default, terminal authentication is not required for local users log in via the Console  
port. However, password authentication is required for local users and remote Modem  
users log in via the AUX port, and Telnet users log in through Ethernet port.  
1) Perform local password authentication to the user interface  
Using authentication-mode password command, you can perform local password  
authentication. That is, you need use the command below to configure a login  
password in order to login successfully.  
Perform the following configuration in user interface view.  
Table 4-14 Configure the local authentication password  
Operation  
Command  
Configure the local authentication set authentication password { cipher |  
password  
simple }password  
Remove the local authentication  
password  
undo set authentication password  
Configure for password authentication when a user logs in through a VTY 0 user  
interface and set the password to 3Com.  
[SW8800] user-interface vty 0  
[SW8800-ui-vty0] authentication-mode password  
[SW8800-ui-vty0] set authentication password simple 3Com  
2) Perform local or remote authentication of username and password to the user  
interface  
Using authentication-mode scheme command, you can perform local or remote  
authentication of username and password. The type of the authentication depends on  
your configuration. For detailed information, see “Security” section.  
In the following example, local username and password authentication are configured.  
Perform username and password authentication when a user logs in through VTY 0  
user interface and set the username and password to zbr and 3Com respectively.  
[SW8800-ui-vty0] authentication-mode scheme  
[SW8800-ui-vty0] quit  
[SW8800] local-user zbr  
[SW8800-luser-zbr] password simple 3Com  
[SW8800-luser-zbr] service-type telnet  
3) No authentication  
[SW8800-ui-vty0] authentication-mode none  
4-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
Note:  
By default, password is required to be set for authenticating local users and remote  
Modem users log in via the AUX port, and Telnet users log in through Ethernet port. If  
no password has been set, the following prompt will be displayed “Login password has  
not been set !.”  
If the authentication-mode none command is used, the local and Modem users via  
the AUX port and Telnet users will not be required to input password.  
II. Setting the command level used after a user logging in  
The following command is used for setting the command level used after a user logging  
in.  
Perform the following configuration in local-user view.  
Table 4-15 Set the command level used after a user logging in  
Operation  
Command  
Set command level used after a user  
logging in  
service-type telnet [ level level ]  
Restore the default command level used  
after a user logging in  
undo service-type telnet [ level ]  
By default, the specified logon user can access the commands at Level 0.  
III. Setting the command level used after a user logs in from a user interface  
You can use the following command to set the command level after a user logs in from  
a specific user interface, so that a user is able to execute the commands at such  
command level.  
Perform the following configuration in user interface view.  
Table 4-16 Set the command level used after a user logging in from a user interface  
Operation  
Command  
Set command level used after a user  
logging in from a user interface  
user privilege level level  
Restore the default command level used  
after a user logging in from a user undo user privilege level  
interface  
By default, you can access the commands at Level 3 after logging in through the  
Console user interface, and the commands at Level 0 after logging in through the AUX  
or VTY user interface.  
4-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
Note:  
When a user logs in the switch, the command level that it can access depends on two  
points. One is the command level that the user itself can access, the other is the set  
command level of this user interface. If the two levels are different, the former will be  
taken. For example, the command level of VTY 0 user interface is 1, however, you have  
the right to access commands of level 3; if you log in from VTY 0 user interface, you can  
access commands of level 3 and lower.  
IV. Setting the command priority  
The following command is used for setting the priority of a specified command in a  
certain view. The command levels include visit, monitoring, configuration, and  
management, which are identified with 0 through 3 respectively. An administrator  
assigns authorities as per user requirements.  
Perform the following configuration in system view.  
Table 4-17 Set the command priority  
Operation  
Command  
Set the command priority in a specified command-privilege level level view  
view.  
view command  
Restore the default command level in a Undo command-privilege view view  
specified view.  
command  
V. Setting input protocol for a user terminal  
You can use the following command to set input protocol for a user terminal. The input  
protocol type can be TELNET, SSH or all.  
Perform the following configuration in user interface view.  
Table 4-18 Set input protocol for a user terminal  
Operation  
Command  
Set input protocol for a user terminal  
protocol inbound { all | telnet | ssh }  
By default, the input protocol type for a user terminal is all.  
4-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
4.2.6 Configuring Modem Attributes  
When logging in the switch via the Modem, you can use the following commands to  
configure these parameters.  
Perform the following configuration in AUX user interface view.  
Table 4-19 Configure Modem attributes  
Operation  
Command  
Set the interval since the system receives  
the RING until CD_UP  
modem timer answer seconds  
Restore the default interval since the  
system receives the RING until CD_UP  
undo modem timer answer  
Configure auto answer  
modem auto-answer  
undo modem auto-answer  
modem call-in  
Configure manual answer  
Configure to allow call-in  
Configure to bar call-in  
undo modem call-in  
modem both  
Configure to permit call-in and call-out.  
Configure to disable call-in and call-out  
undo modem both  
4.2.7 Configuring Redirection  
I. Send command  
The following command can be used for sending messages between user interfaces.  
Perform the following configuration in user view.  
Table 4-20 Configure to send messages between different user interfaces.  
Operation  
Command  
Configure to send messages between  
different user interfaces.  
send { all | number | type number }  
II. Auto-execute command  
The following command is used to automatically run a command after you log in. After a  
command is configured to be run automatically, it will be automatically executed when  
you log in again.  
This command is usually used to automatically execute telnet command on the  
terminal, which will connect the user to a designated device automatically.  
Perform the following configuration in user interface view.  
4-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 4 User Interface Configuration  
Table 4-21 Configure to automatically run the command  
Operation  
Command  
Configure to automatically run the command auto-execute command text  
Configure not to automatically run the  
undo auto-execute command  
command  
Note the following points:  
z
After executing this command, the user interface can no longer be used to carry  
out the routine configurations for the local system. Use this command with caution.  
Make sure that you will be able to log in the system in some other way and cancel  
the configuration, before you use the auto-execute command command and  
save the configuration.  
z
Telnet 10.110.100.1 after the user logs in through VTY0 automatically.  
[SW8800-ui-vty0] auto-execute command telnet 10.110.100.1  
When a user logs on via VTY 0, the system will run telnet 10.110.100.1 automatically.  
4.3 Displaying and Debugging User Interface  
After the above configuration, execute display command in any view to display the  
running of the user interface configuration, and to verify the effect of the configuration.  
Execute free command in user view to clear a specified user interface.  
Table 4-22 Display and debug user interface  
Operation  
Command  
Clear a specified user interface  
free user-interface [ type ] number  
Display the user application information  
of the user interface  
display users [ all ]  
Display the physical attributes and some display user-interface [ type number |  
configurations of the user interface number ] [ summary ]  
4-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 5 Management Interface Configuration  
Chapter 5 Management Interface Configuration  
5.1 Management Interface Overview  
The Switch 8800 provides a 10/100Base-TX management interface on the Fabric. The  
management interface can connect a background PC for software loading and system  
debugging, or a remote network management station for remote system management.  
5.2 Management Interface Configuration  
The following sections describe management interface configuration tasks.  
z
z
z
z
z
Configuring interface IP address  
Enabling/disabling the interface  
Setting interface description  
Displaying current system information  
Test network connectivity (ping, tracert)  
See the Port and System Management parts of this manual for details.  
Caution:  
Only the management interface configured with an IP address can run normally.  
5-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
Chapter 6 Ethernet Port Configuration  
6.1 Ethernet Port Overview  
The Switch 8800 provides conventional Ethernet ports, fast Ethernet ports, 1000 Mbps  
Ethernet ports and 10 Gbps Ethernet ports. The configurations of these Ethernet ports  
are basically the same, which will be described in the following sections.  
6.2 Ethernet Port Configuration  
The following sections describe Ethernet port configuration tasks:  
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
6.2.1 Entering Ethernet Port View  
Before configuring the Ethernet port, enter Ethernet port view first.  
Perform the following configuration in system view.  
Table 6-1 Enter Ethernet port view  
Operation  
Command  
interface { interface_type interface_num |  
interface_name }  
Enter Ethernet port view  
6-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
6.2.2 Enabling/Disabling an Ethernet Port  
After configuring the related parameters and protocol of the port, you can use undo  
shutdown command to enable the port. If you do not want a port to forward data any  
more, use shutdown command to disable it.  
Perform the following configuration in Ethernet port view.  
Table 6-2 Enable/disable an Ethernet port  
Operation  
Disable an Ethernet port  
Enable an Ethernet port  
Command  
shutdown  
undo shutdown  
By default, the port is enabled.  
6.2.3 Setting Ethernet Port Description  
To distinguish the Ethernet ports, you can use the following command to make some  
necessary descriptions.  
Perform the following configuration in Ethernet port group view.  
Table 6-3 Set Ethernet port description  
Operation  
Command  
description text  
undo description  
Set an Ethernet port description  
Delete the Ethernet port description  
By default, an Ethernet port has no description.  
6.2.4 Setting the Duplex Attribute of the Ethernet Port  
To configure a port to send and receive data packets at the same time, set it to  
full-duplex. To configure a port to either send or receive data packets at a time, set it to  
half-duplex. If the port has been set to auto-negotiation mode, the local and peer ports  
will automatically negotiate about the duplex mode.  
Perform the following configuration in Ethernet port view.  
Table 6-4 Set the duplex attribute for the Ethernet port  
Operation  
Command  
duplex { auto | full | half }  
undo duplex  
Set duplex attribute for Ethernet port  
Restore the default duplex attribute of Ethernet port  
6-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
Note that, 10/100 Mbps electrical Ethernet port can operate in full-duplex, half-duplex  
or auto-negotiation mode. The10/100/1000 Mbps electrical Ethernet port can operate  
in full duplex, half duplex or auto-negotiation mode. When the port operates at 1000  
Mbps or in auto mode, the duplex mode can be set to full (full duplex) or auto  
(auto-negotiation). The optical 100/1000 Mbps and 10 Gbps Ethernet ports work in full  
duplex mode without user intervention.  
The port defaults the auto (auto-negotiation) mode.  
6.2.5 Setting Speed on the Ethernet Port  
You can use the following command to set the speed on the Ethernet port. If the speed  
is set to auto-negotiation mode, the local and peer ports will automatically negotiate  
about the port speed.  
Perform the following configuration in Ethernet port view.  
Table 6-5 Set speed on the Ethernet port  
Operation  
Command  
Set Ethernet port speed  
speed { 10 | 100 | 1000 | 10000 | auto }  
Restore the default speed on Ethernet  
port  
undo speed  
Note that, the 10/100 Mbps electrical Ethernet port can operate at 10 Mbps, 100 Mbps  
and in auto mode. You can set it accordingly. The 10/100/1000Mbps electrical Ethernet  
port can operate at 10 Mbps, 100 Mbps, or 1000 Mbps as per different requirements.  
However in half duplex mode, the port cannot operate at 1000 Mbps or in auto mode.  
The 100 Mbps optical Ethernet port supports 100 Mbps; the 1000 Mbps optical  
Ethernet port supports 1000 Mbps; the 10 Gbps optical Ethernet port supports 10 Gbps  
without user intervention.  
By default, the speed of the port is in auto mode.  
6.2.6 Setting the Cable Type for the Ethernet Port  
The Ethernet port supports the straight-through and cross-over network cables. The  
following command can be used for configuring the cable type.  
Perform the following configuration in Ethernet port view.  
Table 6-6 Set the type of the cable connected to the Ethernet port  
Operation  
Command  
Set the type of the cable connected to  
the Ethernet port  
mdi { across | auto | normal }  
6-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
Operation  
Command  
Restore the default type of the cable  
connected to the Ethernet port  
undo mdi  
Note that, the settings only take effect on 10/100 Mbps and 10/100/1000 Mbps  
electrical ports.  
By default, the cable type is auto (auto-recognized). That is, the system can  
automatically recognize the type of cable connecting to the port.  
6.2.7 Enabling/Disabling Flow Control for the Ethernet Port  
After enabling flow control in both the local and the peer switch, if congestion occurs in  
the local switch, the switch will inform its peer to pause packet sending. Once the peer  
switch receives this message, it will pause packet sending, and vice versa. In this way,  
packet loss is reduced effectively. The flow control function of the Ethernet port can be  
enabled or disabled through the following command.  
Perform the following configuration in Ethernet port view.  
Table 6-7 Enable/disable flow control for the Ethernet port  
Operation  
Command  
Enable Ethernet port flow control  
Disable Ethernet port flow control  
flow-control  
undo flow-control  
By default, Ethernet port flow control is disabled.  
6.2.8 Permitting/Forbidding Jumbo Frame to Pass the Ethernet Port  
The Ethernet port may encounter the jumbo frame exceeding the standard frame  
length, when switching large throughput data like transmitting files. This command can  
forbid or permit the jumbo frame to pass the Ethernet port.  
Perform the following configuration in Ethernet port view.  
Table 6-8 Permit/forbid jumbo frame to pass the Ethernet port  
Operation  
Command  
jumboframe  
enable  
Permit jumbo frame to pass the Ethernet port  
[ jumboframe-value ]  
Forbid jumbo frame to pass the Ethernet port undo jumboframe enable  
By default, the jumbo frame is permitted to pass the Ethernet port.  
6-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
Note that, the values can be consecutive, but the effective values are discrete. The  
effective frame length for the FE port is 1552. The effective frame length for the GE port  
and 10 GE port is 1552, 9022, 9192 and 10240. You can execute the display interface  
command to view the configured effective value for the port.  
6.2.9 Setting the Ethernet Port Broadcast Suppression Ratio  
You can use the following commands to restrict the broadcast traffic. Once the  
broadcast traffic exceeds the value set by the user, the system will maintain an  
appropriate broadcast packet ratio by discarding the overflow traffic, so as to suppress  
broadcast storm, avoid suggestion and ensure the normal service. The parameter is  
taken the maximum wire speed ratio of the broadcast traffic allowed on the port. The  
smaller the ratio is, the smaller the broadcast traffic is allowed. If the ratio is 100%, it  
means not to perform broadcast storm suppression on the port.  
Perform the following configuration in Ethernet port view.  
Table 6-9 Set the Ethernet port broadcast suppression ratio  
Operation  
Command  
Set Ethernet port broadcast suppression ratio broadcast-suppression pct  
Restore the default Ethernet port broadcast  
undo broadcast-suppression  
suppression ratio  
By default, 50% broadcast traffic is allowed to pass,  
6.2.10 Setting the Ethernet Port Mode  
Most ports adopt the LAN mode for general data exchange. The port must work in WAN  
mode, however, if it needs special frame format for data transfer (such as in fiber  
transmission). You can configure network mode available on the port using the  
port-mode command.  
Perform the following configuration in Ethernet port view.  
Table 6-10 Set the Ethernet port mode  
Operation  
Command  
port-mode { wan | lan }  
undo port-mode  
Set the Ethernet port mode  
Restore the default Ethernet port mode  
By default, the Ethernet port works in LAN mode.  
Note that only GE or 10GE port supports this command.  
6-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
6.2.11 Setting the Link Type for the Ethernet Port  
Ethernet port can operate in three different link types, access, hybrid, and trunk types.  
The access port carries one VLAN only, used for connecting to the user’s computer.  
The trunk port can belong to more than one VLAN and receive/send the packets on  
multiple VLANs, used for connection between the switches. The hybrid port can also  
carry more than one VLAN and receive/send the packets on multiple VLANs, used for  
connecting both the switches and user’s computers. The difference between the hybrid  
port and the trunk port is that the hybrid port allows the packets from multiple VLANs to  
be sent without tags, but the trunk port only allows the packets from the default VLAN to  
be sent without tags.  
Perform the following configuration in Ethernet port view.  
Table 6-11 Set the link type for the Ethernet port  
Operation  
Command  
port link-type access  
Configure the port as access port  
Configure the port as hybrid port  
Configure the port as trunk port  
port link-type hybrid  
port link-type trunk  
Restore the default link type, that is, the  
access port  
undo port link-type  
You can configure three types of ports concurrently on the same switch, but you cannot  
switch between trunk port and hybrid port. You must turn it first into access port and  
then set it as other type. For example, you cannot configure a trunk port directly as  
hybrid port, but first set it as access port and then as hybrid port.  
By default, the port is access port.  
6.2.12 Adding the Ethernet Port to Specified VLANs  
The following commands are used for adding an Ethernet port to a specified VLAN. The  
access port can only be added to one VLAN, while the hybrid and trunk ports can be  
added to multiple VLANs.  
Perform the following configuration in Ethernet port view.  
Table 6-12 Add the Ethernet port to specified VLANs  
Operation  
Command  
Add the current access port to a  
specified VLAN  
port access vlan vlan_id  
Add the current hybrid port to specified port hybrid vlan vlan_id_list { tagged |  
VLANs untagged }  
6-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
Operation  
Command  
Add the current trunk port to specified port trunk permit vlan { vlan_id_list |  
VLANs  
all }  
Remove the current access port from to  
a specified VLAN  
undo port access vlan  
Remove the current hybrid port from to  
specified VLANs  
undo port hybrid vlan vlan_id_list  
Remove the current trunk port from undo port trunk permit vlan  
specified VLANs { vlan_id_list | all }  
Note that the access port shall be added to an existing VLAN other than VLAN 1. The  
VLAN to which Hybrid port is added must have been existed.  
After adding the Ethernet port to specified VLANs, the local port can forward packets of  
these VLANs. The hybrid and trunk ports can be added to multiple VLANs, thereby  
implementing the VLAN intercommunication between peers. For the hybrid port, you  
can configure to tag some VLAN packets, based on which the packets can be  
processed differently.  
6.2.13 Setting the Default VLAN ID for the Ethernet Port  
Since the access port can only be included in one VLAN only, its default VLAN is the  
one to which it belongs. The hybrid port and the trunk port can be included in several  
VLANs, it is necessary to configure the default VLAN ID. If the default VLAN ID has  
been configured, the packets without VLAN Tag will be forwarded to the port that  
belongs to the default VLAN. When sending the packets with VLAN Tag, if the VLAN ID  
of the packet is identical to the default VLAN ID of the port, the system will remove  
VLAN Tag before sending this packet.  
Perform the following configuration in Ethernet port view.  
Table 6-13 Set the default VLAN ID for the Ethernet port  
Operation  
Command  
Set the default VLAN ID for the hybrid port  
Set the default VLAN ID for the trunk port  
port hybrid pvid vlan vlan_id  
port trunk pvid vlan vlan_id  
Restore the default VLAN ID of the hybrid  
port to the default value  
undo port hybrid pvid  
undo port trunk pvid  
Restore the default VLAN ID of the trunk port  
to the default value  
Note that: to guarantee the proper packet transmission, the default VLAN ID of local  
hybrid port or Trunk port should be identical with that of the hybrid port or Trunk port on  
the peer switch.  
6-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
By default, the VLAN of hybrid port and trunk port is VLAN 1 and that of the access port  
is the VLAN to which it belongs  
6.2.14 Setting the VLAN VPN Feature  
VLAN Tag consists of 12 bits (defined by IEEE802.1Q), so Ethernet Switches can  
support up to 4k VLANs. In networking, especially in MAN (metropolitan area network),  
a large numbers of VLANs are required to segment users. In this case, 4k VLANs are  
not enough.  
VLAN VPN feature can provide duplex VLAN Tags to a packet, i.e. mark the packet with  
another VLAN Tag besides the original one, thus to provide 4k x 4k VLANs to meet  
user’s demands. At the same time, VLAN VPN feature provides the following functions:  
using the original VLAN Tag to differentiate users and services, and using the new  
VLAN Tag to load service and VPN users. These make VLAN configuration simple and  
practicable. Thus, Ethernet Switches can meet the requirement of MAN.  
If VLAN VPN is enabled on a port, all the packets (no matter whether it carries a VLAN  
Tag or not) will be given a new Tag that specifies the default VLAN of this port.  
Therefore, the packets that have had a VLAN Tag get two Tags, and the packets that  
have not had a VLAN Tag get one.  
Perform the following configuration in Ethernet port view.  
Table 6-14 Set the VLAN VPN feature  
Operation  
Command  
vlan-vpn enable  
undo vlan-vpn  
Enable the VLAN VPN feature  
Disable the VLAN VPN feature  
Note that if anyone of GVRP, STP, and 802.1x has been enabled on a port, VLAN VPN  
cannot be enabled on it.  
By default, the port VLAN VPN is disabled.  
6.2.15 Copying Port Configuration to Other Ports  
To keep the configuration of other ports consistent with a specified port, you can use  
copy configuration command to copy the configuration of that specified port to other  
ports. Such configurations may involve: STP setting, QoS setting, LACP setting, and  
port setting. The detailed table is as follows:  
Table 6-15 Configurations that can be copied  
Attribute  
STP setting  
Detailed Setting  
Enable/disable STP  
Port priority  
6-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
Path cost  
Link attributes(point-to-point or not)  
Port mCheck  
Max transmission speed  
Enable/disable root protection  
Enable/disable loop protection  
Edge or non-edge port  
Reset ARP or not  
Define/apply flow template  
Traffic reshaping  
Traffic redirection  
Packet filtering  
QoS setting  
Priority re-assignment  
Traffic statistics  
Traffic mirroring  
Rate limiting  
Permitted VLAN ID  
Default VLAN ID  
Add ports to VLAN  
Port setting  
Default 802.1p priority  
Port speed, duplex mode  
Port link type  
LACP  
Enable/disable LACP on the port  
Note:  
z
z
Using copy configuration command will clear protocol VLAN attributes of the  
destination port, but it can not copy protocol VLAN attributes of source port to the  
destination port.  
Using the copy configuration command, you can only copy the configurations of  
Ethernet ports, GigabitEthernet ports and aggregation groups.  
Perform the following configuration in system VLAN  
6-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
Table 6-16 Copy port configuration to other ports  
Operation Command  
Copy port  
copy configuration source { interface-type interface-number |  
interface-name | aggregation-group agg-id } destination  
configuration to  
other ports  
{
interface_list  
[
aggregation-group  
agg-id  
]
|
aggregation-group agg-id }  
Note that if the copy source is an aggregation group, take the port with minimum Active  
as the source; if the copy destination is an aggregation group, make the configurations  
of all group member ports identical with that of the source. You cannot specify a  
dynamic aggregation group as the copy destination.  
6.2.16 Setting Port Hold Time  
When you use the shutdown/undo shutdown command on ports too frequently, the  
switch may fail. Therefore, you can configure port hold time to prohibit frequent change  
of the port status.  
Perform the following configuration in system view.  
Table 6-17 Set the port hold time  
Operation  
Set the port hold time  
Restore the default value  
Command  
link-status hold hold-time  
undo link-status hold  
By default, the port hold time is set to 3 seconds.  
6.2.17 Setting the Ethernet Port in Loopback Mode  
Perform the following configuration in Ethernet port view.  
Table 6-18 Set the Ethernet port in loopback mode  
Operation  
Command  
Set the Ethernet port in loopback mode  
Remove loopback configuration on the port  
loopback { external | internal }  
undo loopback  
By default, the Ethernet port is set in loopback mode. At present, the Switch 8800 does  
not support external loopback mode.  
6-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
6.3 Displaying and Debugging Ethernet Port  
After the above configuration, execute display command in any view to display the  
running of the Ethernet port configuration, and to verify the effect of the configuration.  
Execute reset command in user view to clear the statistics information of the port.  
Table 6-19 Display and debug Ethernet port  
Operation  
Command  
display interface interface_type  
{
|
Display all the information of the port interface_type interface_num [ packets ] |  
interface_name }  
Display hybrid port or trunk port  
display port { hybrid | trunk }  
Display the information of VLAN VPN display port vlan-vpn  
Display the statistics information of display counters [ rate ] { inbound |  
the port  
outbound } interface [ interface-type ]  
reset counters interface [ interface_type |  
Clear the statistics information of the  
port  
interface_type  
interface_num  
|
interface_name ]  
Note:  
z
z
z
The Switch 8800 does not support external loopback mode.  
When 802.1x is enabled on the port, its statistics information can not be cleared.  
By default, the display counters command displays the statistic information of all  
the ports.  
6.4 Ethernet Port Configuration Example  
I. Network requirements  
Switch A is connected to Switch B through Trunk port GigabitEthernet2/1/1. Configure  
the Trunk port with default VLAN ID, so that: when receiving the packets without VLAN  
Tag, the port can forward them to the member ports belonging to the default VLAN;  
when it sending the packets with VLAN Tag and the packet VLAN ID is the default  
VLAN ID, the Trunk port remove the packet VLAN Tag and forward the packet.  
6-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 6 Ethernet Port Configuration  
II. Network diagram  
Switch A  
Switch B  
Figure 6-1 Network diagram for Ethernet port configuration  
III. Configuration procedure  
The following configurations are used for Switch A. Please configure Switch B in the  
similar way.  
Enter the Ethernet port view of GigabitEthernet2/1/1.  
[SW8800] interface gigabitethernet2/1/1  
Set the GigabitEthernet2/1/1 as a trunk port and allows VLANs 2, 6 through 50, and  
100 to pass.  
[SW8800-GigabitEthernet2/1/1] port link-type trunk  
[SW8800-GigabitEthernet2/1/1] port trunk permit vlan 2 6 to 50 100  
Create the VLAN 100.  
[SW8800] vlan 100  
Configure the default VLAN ID of GigabitEthernet2/1/1 as 100.  
[SW8800-GigabitEthernet2/1/1] port trunk pvid vlan 100  
6.5 Ethernet Port Troubleshooting  
Symptom 1: Default VLAN ID configuration fails.  
Solution: Take the following steps:  
z
Execute the display interface or display port command to check if the port is a  
trunk port or a hybrid port. If it is neither of them, configure it as a trunk or hybrid  
port.  
z
Then configure the default VLAN ID.  
Symptom 2: The port is in down status.  
Solution: Please check  
z
If the cable connection is correct and if the optical fiver cable is inversely  
connected.  
z
z
If the shutdown command is used on the port.  
If the right optical module is inserted.  
6-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
Chapter 7 Link Aggregation Configuration  
7.1 Overview  
7.1.1 Introduction to Link Aggregation  
Link aggregation means aggregating several ports together to implement the  
outgoing/incoming payload balance among the member ports and enhance the  
connection reliability. Link aggregation may be manual aggregation, dynamic LACP  
aggregation or static LACP aggregation. For the member ports in an aggregation group,  
their basic configurations must be the same. That is, if one is a trunk port, others must  
also be; when it turns into access port, then others must change to access port.  
Basic configuration includes STP setting, QoS setting, VLAN setting, and port setting.  
The STP setting includes STP enabling/disabling, link attribute (point-to-point or not),  
STP priority, path cost, max transmission speed, loop protection, root protection, edge  
port or not. The QoS setting includes traffic limiting, priority marking, default 802.1p  
priority, bandwidth assurance, congestion avoidance, traffic redirection, traffic statistics.  
The VLAN setting includes permitted VLAN types, default VLAN ID. The port setting  
includes port link type.  
One Switch 8800 can support up to 728 aggregation groups (seven load sharing  
aggregation groups at most), with each group containing a maximum of eight ports.  
Note:  
The Switch 8800 also supports trans-board aggregation. The trans-board aggregation  
is the same as the intra-board aggregation.  
7.1.2 Introduction to LACP  
Link aggregation control protocol (LACP) based on the IEEE802.3ad standard can be  
used in dynamic link aggregation. An LACP-enabled port sends link aggregation  
control protocol data units (LACPDUs) to tell the peer about its system priority, system  
MAC address, port priority, port number and operation key. After receiving the  
information from the sender, the receiver compares it with the locally saved information  
about other ports, chooses member ports for the aggregation group and reaches  
agreement about if a port can join or leave a dynamic aggregation group.  
During port aggregation, LACP generates a configuration mix according to the port  
configuration (rate, duplex, basic configuration, management key), which is called an  
7-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
operation key. The management key of an LACP-enabled dynamic aggregation port is  
0 by default. The management key of an LACP-enabled static aggregation port is the  
same as the aggregation group ID. In a dynamic aggregation group, the member ports  
must have the same operation key. In manual and static aggregation groups, the active  
ports have the same operation key.  
7.1.3 Aggregation Types  
Port aggregation can be divided into manual aggregation, dynamic LACP aggregation  
and static LACP aggregation.  
I. Manual aggregation and static LACP aggregation  
Both manual aggregation and static LACP aggregation are configured manually, and  
cannot be added or removed automatically by the system. A manual or static LACP  
aggregation group must contain a member port at least. In the case of one port in an  
aggregation group, the unique method for you to remove the port from the aggregation  
group is to delete the aggregation group. By default, the system disables the LACP for  
the manual aggregation port. You are prohibited to enable the LACP for the manual  
aggregation port. By default, the system enables the LACP for the static aggregation  
port. When a static aggregation group is removed, the member ports will form one or  
more dynamic LACP aggregation groups with LACP enabled. You are prohibited to  
disable the LACP for the static aggregation port.  
In the manual and static aggregation groups, a port maybe in active or inactive state.  
The port in active state can tranceive user service packets, but the port in inactive state  
cannot. The active port with the minimum port number serves as the master port, while  
others as slave ports.  
In a manual aggregation group, the system sets the ports to active or inactive state  
based on these rules:  
z
Based on the descending order of priority levels from full duplex/high speed, to full  
duplex/low-speed, to half duplex/high speed and till half duplex/low speed, the  
system sets the port with the highest priority to active state, and others to inactive  
state.  
z
z
The system sets to inactive state the ports which cannot aggregate with the  
master port, due to hardware limit (such as trans-board aggregation is forbidden).  
The system sets to inactive state the ports with basic configurations different from  
the active port.  
In a static aggregation group, the system sets the ports to active or inactive state based  
on these rules:  
z
Based on the descending order of priority levels from full duplex/high speed, to full  
duplex/low-speed, to half duplex/high speed and till half duplex/low speed, the  
system sets the port with the highest priority to active state, and others to inactive  
state.  
7-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
z
The system sets to inactive state the active port connecting to the different peer  
devices, or the port connecting to the same peer device but locating in the different  
aggregation group.  
z
z
The system sets to inactive state the ports which cannot be aggregated with the  
port, due to hardware limit (for example, trans-board aggregation is forbidden).  
The system sets to inactive state the ports with basic configurations different from  
the active port.  
Since only a defined number of ports can be added in an aggregation group, then if the  
active ports in an aggregation group exceed the maximum threshold for that group, the  
system shall set some ports with smaller port numbers (in ascending order) as active  
ports and others as inactive ports. Both active and inactive ports can transceive LACP  
protocol, but the inactive ports cannot forward user service packets.  
II. Dynamic LACP aggregation  
The system can create/delete automatically dynamic LACP aggregations, and you  
cannot add/delete member ports into/from dynamic LACP aggregation. The system  
can also aggregate one port, which is called single port aggregation. The dynamic  
LACP aggregation LACP is in enabled state. The system can only aggregate the ports  
with the same speed, duplex attribute, device connection, basic configuration.  
Since only a defined number of ports can be added in an aggregation group, then if the  
current member ports in an aggregation group exceed the maximum threshold for that  
group, the system shall set some ports with smaller device ID (system priority + system  
MAC address) and smaller port ID (port priority + port number) as active ports, and  
others as inactive ports. If the maximum threshold is not exceeded, all member ports  
are active ports. Both active and inactive ports can transceive LACP protocol, but the  
inactive ports cannot forward user service packets. In an aggregation group, the active  
port with the minimum port number serves as the master port, while others as slave  
ports. When comparing device ID, the system compare system priority first, and then  
system MAC address in the case of the same system priority. The smaller device ID is  
regarded as higher priority. When comparing port ID, the system compares port priority  
first, and then port number in the case of the same port priority. The smaller port ID is  
regarded as higher priority. If the device ID changes to higher priority, the active and  
inactive state of the member ports in an aggregation group depends on the device port  
ID. You can also set system and port priority to define active and inactive ports.  
7.1.4 Load Sharing  
I. Types of Load sharing  
In terms of load balancing, link aggregation may be load balancing aggregation and  
non-load balancing aggregation The Switch 8800 allocates IP packet load sharing  
according to destination and source IP addresses. The switches allocate non-IP packet  
load sharing according to source and destination MAC addresses. You can check  
7-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
protocol types in determining if to use IP or MAC addresses. The packet with 0800  
ETYPE Ethernet field is IP packet. In general, the system only provides limited  
resources. The system will always allocate hardware aggregation resources to the load  
balancing aggregation groups with higher priority levels. When the load sharing  
aggregation resources are used up for existing aggregation groups, newly-created  
aggregation groups will be non-load sharing ones. The priority levels (in descending  
order) for allocating load sharing aggregation resources are as follows:  
z
z
z
z
Aggregation groups of special ports with hardware aggregation resources  
included  
Aggregation groups including special ports which require hardware aggregation  
resources  
Aggregation groups that probably reach the maximum rate after the resources are  
allocated to them  
Aggregation groups with the minimum master port numbers if they reach the equal  
rate with other groups after the resources are allocated to them  
When aggregation groups of higher priority levels appear, the aggregation groups of  
lower priority levels release their hardware resources. For single-port aggregation  
groups, if they can transceive packets normally without occupying hardware resources,  
they shall not occupy the resources.  
II. Port state  
In a aggregation group, its ports may be in active or inactive state and only the active  
ports can transceive user service packets, but not inactive ports. The active port with  
the minimum port number serves as the master port, while others as slave ports.  
In a aggregation group, the system sets the ports to active or inactive state based on  
these rules:  
z
Based on the descending order of priority levels from full duplex/high speed, to full  
duplex/low-speed, to half duplex/high speed and till half duplex/low speed, the  
system sets the port with the highest priority to active state, and others to inactive  
state.  
z
z
The system sets to inactive state the ports which cannot aggregate with the  
master port, due to hardware limit.  
The system sets to inactive state the ports with basic configurations different from  
the master port.  
Since only a defined number of ports can be supported in an aggregation group, then if  
the active ports in an aggregation group exceed the port quantity threshold for that  
group, the system shall set some ports with smaller port numbers (in ascending order)  
as active ports and others as inactive ports. The active ports can transceive user  
service packets, but not inactive ports.  
A load sharing aggregation group may contain several active ports, but a non-load  
sharing aggregation group can only have one active port, while others as inactive ports.  
7-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
7.2 Link Aggregation Configuration  
The following sections describe link aggregation tasks:  
z
z
z
z
z
z
Note:  
z
z
z
When configuring an aggregation group, the status of GVRP feature configured on  
the master port is reserved, but that on the slave port is disabled.  
When adding a port to an existing aggregation group, the GVRP feature on the port  
is disabled.  
When the master port leaves an aggregation group, the status of GVRP feature on  
both the group and port is reserved; when a slave port leaves an aggregation group,  
the GVRP feature on the port is disabled.  
z
z
When configuring GVRP feature on any port in an aggregation group, the  
configuration is mapped to the master port of the group.  
When querying the GVRP feature configured on any port in an aggregation group,  
the returned result is about the master port of the group.  
For details, refer to the “VLAN” part of this manual  
7.2.1 Enabling/Disabling LACP at Port  
You should first enable LACP at the ports before performing dynamic aggregation, so  
that both parties can agree on adding/deleting the ports into/from a dynamic LACP  
aggregation group.  
Perform the following configuration in Ethernet port view.  
Table 7-1 Enable/disable LACP at port  
Operation  
Enable LACP at the port  
Disable LACP at the port  
Command  
lacp enable  
undo lacp enable  
By default, LACP is not enabled at the port.  
Note that:  
7-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
z
You cannot enable LACP at the mirroring port, the port with static MAC address  
configured, and the port with static ARP configured, port with 802.1x enabled.  
You are inhibited to enable LACP at the port in a manual aggregation group.  
You can add a port with LACP enabled into a manual aggregation group, but then  
the LACP will be disabled on it automatically. Or you can add a port with LACP  
disabled into a static LACP aggregation group, and then the LACP will be enabled  
automatically.  
z
z
7.2.2 Creating/Deleting an Aggregation Group  
You can use the following command to create/delete a aggregation group. When you  
delete a aggregation group, all its member ports are disaggregated.  
Perform the following configuration in system view.  
Table 7-2 Create/delete an aggregation group  
Operation  
Create an aggregation group  
Delete an aggregation group  
Command  
link-aggregation group agg-id mode  
{ manual | static }  
undo link-aggregation group agg-id  
During creating an aggregation group, if it already exists in the system but contains no  
member port, it changes to the new type; if it already exists in the system and contains  
member ports, then you can only change a dynamic or static LACP aggregation group  
to a manual one, or a dynamic LACP aggregation group to a static one. In the former  
case, LACP shall be disabled at the member ports automatically, while in the latter case,  
LACP shall remain enabled.  
Note:  
There are three types of link aggregation: manual aggregation, static aggregation and  
dynamic aggregation.  
7.2.3 Adding/Deleting an Ethernet Port into/from an Aggregation Group  
You can add/delete ports into/from an aggregation group.  
Perform the following configuration in corresponding view.  
7-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
Table 7-3 Add/delete an Ethernet port into/from an aggregation group  
Operation  
Command  
Add an Ethernet port into the  
aggregation group (Ethernet port view)  
port link-aggregation group agg-id  
Delete an Ethernet port from the  
aggregation port (Ethernet port view)  
undo port link-aggregation group  
link-aggregation interface_name1 to  
interface_name2 [ both ]  
Aggregate Ethernet ports (system view)  
Note that:  
z
You cannot add the mirrored port, port with static MAC address configured, port  
with static ARP configured, port with 802.1x enabled, and VPN port into an  
aggregation group.  
z
z
You must delete the aggregation group, instead of the port, if the aggregation  
group contains only one port.  
When master port enables VLAN VPN, aggregation is permitted in the system.  
Because the link type of slave port will always keep same as that of master port.  
When master port and slave port disable VLAN VPN, aggregation is permitted in  
the system, it is average aggregation .After the port enabling VLAN VPN,  
aggregation is not permitted in the system, at the same time, the system will tell  
users that the slave port in the aggregation group conflict with the master port on  
VLAN VPN.  
7.2.4 Setting/Deleting Aggregation Group Description  
Perform the following configuration in system view.  
Table 7-4 Set/delete aggregation group description  
Operation  
Command  
link-aggregation group  
agg-id  
Set an aggregation group description  
description alname  
Delete  
the  
aggregation  
group undo link-aggregation group agg-id  
description  
description  
By default, an aggregation group has no description.  
7-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
Note:  
If you save the current configuration using the save command, the static and dynamic  
LACP aggregation groups and their description strings remains on the system after  
rebooting, but not the dynamic LACP aggregation groups, or their description strings.  
7.2.5 Configuring System Priority  
The LACP refers to system IDs to determine if the member ports are active or inactive  
for a dynamic LACP aggregation group. The system ID consists of two-byte system  
priority and six-byte system MAC (system ID = system priority + system MAC). In  
comparing system IDs, the system first compares system priority values; if they are  
equal, then it compares system MAC addresses. The smaller system ID is considered  
prior. Changing system priority may affect the priority levels of member ports, and  
further their active or inactive state.  
Perform the following configuration in system view.  
Table 7-5 Configure system priority  
Operation  
Command  
Configure system priority  
lacp system-priority system-priority-value  
Restore the default system priority undo lacp system-priority  
By default, system priority is 32,768.  
7.2.6 Configuring Port Priority  
The LACP compares system IDs first and then port IDs (if system IDs are the same) to  
determine if the member ports are active or inactive for a dynamic LACP aggregation  
group. If the ports in an aggregation group exceed the port quantity threshold for that  
group, the system sets some ports with smaller port IDs as active ports and others as  
inactive ports. The port ID consists of two-byte port priority and two-byte port number,  
that is, port ID = port priority + port number. The system first compares port priority  
values and then port numbers and the small port ID is considered prior.  
Perform the following configuration in Ethernet port view.  
Table 7-6 Configure port priority  
Operation  
Configure port priority  
Command  
lacp port-priority port-priority-value  
undo lacp port-priority  
Restore the default port priority  
By default, port priority is 32,768.  
7-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
7.3 Displaying and Debugging Link Aggregation  
After the above configuration, execute the display command in any view to display the  
running of the link aggregation configuration, and to verify the effect of the  
configuration.  
In user view, execute the reset command to clear statistics on the LACP-enabled port,  
and the debugging command to enable LACP debugging.  
Table 7-7 Display and debug link aggregation  
Operation  
Command  
Display summary information of all  
aggregation groups  
display link-aggregation summary  
Display detailed information of a specific display link-aggregation verbose  
aggregation group  
agg-id  
Display the local device ID  
display lacp system-id  
display link-aggregation interface  
Display detailed link aggregation  
information at the port  
{
interface-type interface-number  
|
interface-name } [ to { interface-type  
interface-num | interface-name } ]  
reset lacp statistics  
[
interface  
{
interface-type interface-number  
|
Clear LACP statistics on the port  
interface-name } [ to { interface-type  
interface-num | interface-name } ] ]  
[
[
undo  
]
debugging lacp state  
interface-type  
interface  
{
interface-number | interface-name } [ to  
interface-type interface-num  
Disable/enable LACP state debugging  
{
|
interface-name } ] ] { { actor-churn |  
mux | partner-churn | ptx | rx }* | all }  
[ undo ] debugging lacp packet  
[
interface  
Disable/enable LACP packet debugging interface-number | interface-name } [ to  
interface-type interface-num  
interface-name } ] ]  
{
interface-type  
{
|
Disable/enable link aggregation error [ undo ] debugging link-aggregation  
debugging  
error  
Disable/enable link aggregation event [ undo ] debugging link-aggregation  
debugging  
event  
7-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
7.4 Link Aggregation Configuration Example  
I. Network requirements  
Switch A connects switch B with three aggregation ports, numbered as Ethernet2/1/1 to  
Ethernet2/1/3, so that incoming/outgoing load can be balanced among the member  
ports.  
II. Network diagram  
Switch A  
Link aggregation  
Switch B  
Figure 7-1 Network diagram for link aggregation configuration  
III. Configuration procedure  
The following only lists the configuration for switch A, and that on switch B is similar.  
1) In manual aggregation mode  
Create aggregation group 1.  
[SW8800] link-aggregation group 1 mode manual  
Add Ethernet ports Ethernet2/1/1 to Ethernet2/1/3 into aggregation group 1.  
[SW8800] interface ethernet2/1/1  
[SW8800-Ethernet2/1/1] port link-aggregation group 1  
[SW8800-Ethernet2/1/1] interface ethernet2/1/2  
[SW8800-Ethernet2/1/2] port link-aggregation group 1  
[SW8800-Ethernet2/1/2] interface ethernet2/1/3  
[SW8800-Ethernet2/1/3] port link-aggregation group 1  
2) In static LACP aggregation mode  
Create aggregation group 1.  
[SW8800] link-aggregation group 1 mode static  
Add Ethernet ports Ethernet2/1/1 to Ethernet2/1/3 into aggregation group 1.  
[SW8800] interface ethernet2/1/1  
[SW8800-Ethernet2/1/1] port link-aggregation group 1  
[SW8800-Ethernet2/1/1] interface ethernet2/1/2  
[SW8800-Ethernet2/1/2] port link-aggregation group 1  
[SW8800-Ethernet2/1/2] interface ethernet2/1/3  
[SW8800-Ethernet2/1/3] port link-aggregation group 1  
3) In dynamic LACP aggregation mode  
7-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 7 Link Aggregation Configuration  
Enable LACP on Ethernet ports Ethernet2/1/1 to Ethernet2/1/3.  
[SW8800] interface ethernet2/1/1  
[SW8800-Ethernet2/1/1] lacp enable  
[SW8800-Ethernet1/1/1] interface ethernet2/1/2  
[SW8800-Ethernet2/1/2] lacp enable  
[SW8800-Ethernet2/1/2] interface ethernet2/1/3  
[SW8800-Ethernet2/1/3] lacp enable  
You must set basic configuration, rate and duplex attribute consistent at both ends to  
aggregate successfully the LACP-enabled ports into a dynamic aggregation group and  
achieve load sharing.  
7-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 8 VLAN Configuration  
Chapter 8 VLAN Configuration  
8.1 VLAN Overview  
Virtual local area network (VLAN) groups the devices in a LAN logically, not physically,  
into segments to form virtual workgroups. IEEE issued the IEEE 802.1Q in 1999 to  
standardize the VLAN implementations.  
The VLAN technology allows network administrators to logically divide a physical LAN  
into different broadcast domains or the so-called virtual LANs. Every VLAN contains a  
group of workstations with the same demands. The workstations, physically separated,  
are not necessarily on the same physical LAN segment.  
You can establish VLANs of the following types on switches:  
z
z
z
z
Port-based  
MAC address-based  
IP multicast-based (A multicast group can be a VLAN.)  
Network layer-based (A VLAN can be established by the network layer addresses  
or protocols of the hosts.)  
With the VLAN technology, the broadcast and unicast traffic within a VLAN will not be  
forwarded to other VLANs. This is helpful to control network traffic, save device  
investment, simplify network management and enhance security.  
8.2 Configuring VLAN  
The following sections describe VLAN configuration tasks:  
z
z
z
z
8.2.1 Creating/Deleting a VLAN  
You can use the following commands to create/delete a VLAN. If the VLAN to be  
created exists, the system enters the VLAN view directly. Otherwise, the system  
creates the VLAN first, and then enters the VLAN view.  
Perform the following configuration in system view.  
8-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 8 VLAN Configuration  
Table 8-1 Create/Delete a VLAN  
Operation  
Command  
Create a VLAN and enter the VLAN view  
Delete a specified VLAN  
vlan vlan_id  
undo vlan { vlan_id [ to vlan_id ] | all }  
Note that the default VLAN, namely VLAN 1, cannot be deleted.  
8.2.2 Specifying a Description Character String for a VLAN or VLAN interface  
You can use the following commands to specify a description character string for a  
VLAN or VLAN interface.  
Perform the following configuration in VLAN view or VLAN interface view.  
Table 8-2 Specify a description character string for a VLAN or VLAN interface  
Operation  
Command  
description string  
Specify a description character string for a  
VLAN or VLAN interface  
Restore the default description of the  
current VLAN or VLAN interface  
undo description  
By default, the description character string of a VLAN is the VLAN ID of the VLAN, such  
as VLAN 0001. The description character string of a VLAN interface is the VLAN  
interface name, such as Vlan-interface1 Interface.  
8.2.3 Creating/Removing a VLAN Interface  
You can use the following commands to create/remove a VLAN interface. To implement  
the network layer function on a VLAN interface, IP address and mask should be set to  
the VLAN interface. For corresponding configuration, refer to “Network protocol” part in  
this manual.  
Perform the following configuration in system view.  
Table 8-3 Create/remove a VLAN interface  
Operation  
Command  
Create a new VLAN interface and enter  
the VLAN interface view  
interface vlan-interface vlan_id  
undo interface vlan-interface vlan_id  
Remove a specified VLAN interface  
Create a VLAN before creating a VLAN interface corresponding to the VLAN.  
8-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 8 VLAN Configuration  
8.2.4 Shutting down/Bringing up a VLAN Interface  
You can use the following commands to shut down/bring up a VLAN interface.  
Perform the following configuration in VLAN interface view.  
Table 8-4 Shut down/bring up a VLAN interface  
Operation  
Shut down a VLAN interface  
Bring up a VLAN interface  
Command  
shutdown  
undo shutdown  
Shutting down or bringing up a VLAN interface has no effect on the UP/DOWN status of  
the Ethernet ports in this VLAN.  
By default, when all the Ethernet ports in a VLAN are in the DOWN state, this VLAN  
interface is also DOWN. When there are one or more Ethernet ports in the UP state,  
this VLAN interface is also UP.  
8.3 Configuring Port-Based VLAN  
8.3.1 Adding Ethernet Ports to a VLAN  
You can use the following commands to add the Ethernet ports to a VLAN.  
Perform the following configuration in VLAN view.  
Table 8-5 Add Ethernet ports to a VLAN  
Operation  
Command  
port interface_list  
undo port interface_list  
Add Ethernet ports to a VLAN  
Remove Ethernet ports from a VLAN  
By default, the system adds all the ports to a default VLAN whose ID is 1.  
Note that you can add/remove the trunk and Hybrid ports to/from a VLAN by the  
port/undo port commands in Ethernet port view, but not in VLAN view.  
8-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 8 VLAN Configuration  
8.4 Configuring Protocol-Based VLAN  
The following sections describe the protocol-based VLAN configuration tasks:  
z
z
8.4.1 Creating/Deleting a VLAN Protocol Type  
You can use the following commands to create/delete a VLAN protocol type.  
Perform the following configuration in VLAN view.  
Table 8-6 Create/Delete a VLAN protocol type  
Operation  
Command  
protocol-vlan protocol { ip ip_address  
[ net_mask ] | mode { ethernetii etype  
etype_id | llc dsap dsap_id ssap  
ssap_id | snap etype etype_id } }  
Create a VLAN protocol type  
undo  
protocol-vlan  
protocol  
Delete an existing VLAN protocol type  
{ protocol_index [ to protocol_end ] | all }  
8.4.2 Associating/Dissociating a Port with/from a Protocol-Based VLAN  
Perform the following configuration in Ethernet port view.  
Table 8-7 Associate/Dissociate a port with/from a protocol-based VLAN  
Operation  
Command  
Associate a port with a protocol-based port hybrid protocol-vlan vlan vlan-id  
VLAN { vlan-protocol_list | all }  
Remove a port from a protocol-based undo port hybrid protocol-vlan vlan  
VLAN vlan-id { vlan-protocol_list | all }  
8-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 8 VLAN Configuration  
Note:  
z
z
z
The port to be associated with a protocol-based VLAN must be of Hybrid type and in  
this VLAN.  
The same protocol can be configured in the different VLANs, but cannot be  
configured repeatedly in the same VLAN.  
A port cannot be associated with different VLANs with the same protocols  
configured.  
z
z
You cannot delete a protocol-based VLAN that has ports associated with.  
You cannot delete a protocol-based VLAN on a port while the port is associated with  
the VLAN.  
8.5 Displaying VLAN  
After the above configuration, execute the display command in any view to display the  
running of the VLAN configuration, and to verify the configuration.  
Table 8-8 Display VLAN  
Operation  
Command  
interface vlan-interface  
Display the related information about the display  
VLAN interface  
[ vlan_id ]  
Display the related information about the display vlan[ vlan_id to vlan_id | all |  
VLAN  
static | dynamic ]  
Display the protocol information and  
protocol index configured on the  
specified VLAN  
display vlan-protocol vlan { vlan_list |  
all }  
Display the protocol information and  
protocol index configured on the  
specified port  
display  
{ interface_list | all }  
vlan-protocol  
interface  
8-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 8 VLAN Configuration  
8.6 VLAN Configuration Example  
I. Network requirements  
z
z
z
Create VLAN2 and VLAN3.  
Add Ethernet3/1/1 and Ethernet4/1/1 to VLAN2.  
Add Ethernet3/1/2 and Ethernet4/1/2 to VLAN3.  
II. Network diagram  
Switch  
E3/1/1 E4/1/1  
E3/1/2 E4/1/2  
VLAN 3  
VLAN 2  
Figure 8-1 Network diagram for VLAN configuration  
III. Configuration procedure  
Create VLAN 2 and enter its view.  
[SW8800] vlan 2  
Add Ethernet3/1/1 and Ethernet4/1/1 to VLAN2.  
[SW8800-vlan2] port ethernet3/1/1 ethernet4/1/1  
Create VLAN 3 and enters its view.  
[SW8800-vlan2] vlan 3  
Add Ethernet3/1/2 and Ethernet4/1/2 to VLAN3.  
[SW8800-vlan3] port ethernet3/1/2 ethernet4/1/2  
8-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 9 GARP/GVRP Configuration  
Chapter 9 GARP/GVRP Configuration  
9.1 Configuring GARP  
9.1.1 GARP Overview  
Generic attribute registration protocol (GARP) offers a mechanism that is used by the  
members in the same switching network to distribute, propagate and register such  
information as VLAN and multicast addresses.  
GARP dose not exist in a switch as an entity. A GARP participant is called GARP  
application. The main GARP applications at present are GVRP (GARP VLAN  
registration protocol) and GMRP. For details, refer to section 9.2 “Configuring GVRP”  
and section ”Configuring Multicast”. When a GARP participant is on a port of the switch,  
this port corresponds to a GARP participant.  
The GARP mechanism enables the configuration information on one GARP member to  
be propagated rapidly across the whole switching network. A GARP member can be a  
terminal workstation or a bridge. The GARP member can notify other members to  
register or remove its attribute information by sending declarations or withdrawing  
declarations. It can also register or remove the attribute information of other GARP  
members according to the received declarations/withdrawn declarations.  
GARP members exchange information by sending messages. There are mainly three  
types of GARP messages, Join, Leave, and LeaveAll. When a GARP participant wants  
to register its attribute information with other switches, it sends the Join message  
outward. When it wants to remove some attribute information from other switches, it  
sends the Leave message. The LeaveAll timer is started simultaneously when each  
GARP participant is enabled and the LeaveAll message is sent upon expiration. The  
Join and Leave messages cooperate to ensure the logout and the re-registration of a  
message. The message exchange enables all the to-be-registered attribute information  
to be propagated to all the switches across the same switching network.  
The destination MAC addresses of the packets of the GARP participants are specific  
multicast MAC addresses. A GARP-supporting switch classifies the packets received  
from the GARP participants and processes them with corresponding GARP  
applications (GVRP or GMRP).  
GARP and GMRP are described in details in the IEEE 802.1P standard (which has  
been added to the IEEE802.1D standard). Quidway series switches fully support the  
GARP compliant with the IEEE standards.  
The following section describes the GARP configuration task:  
z
9-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 9 GARP/GVRP Configuration  
Note:  
z
z
The value of GARP timer will be used in all the GARP applications, including GVRP  
and GMRP, running in one switched network.  
In one switched network, the GARP timers on all the switching devices should be  
set to the same value. Otherwise, GARP application cannot work normally.  
9.1.2 Setting the GARP Timer  
GARP timers include Hold timer, Join timer, Leave timer and LeaveAll timer.  
The GARP participant sends the Join Message regularly when Join timer times out so  
that other GARP participants can register its attribute values.  
When the GARP participant wants to remove some attribute values, it sends the Leave  
Message. The GARP participant that receives the message starts the Leave timer. If  
the Join Message is not received again before the Leave timer expires, the GARP  
attribute values are removed  
LeaveAll timer is started as soon as the GARP participant is enabled. The LeaveAll  
message is sent upon timeout so that other GARP participants remove all the attribute  
values of this participant. Then, LeaveAll timer is restarted and a new cycle begins.  
When the switch receives some GARP registration information, it does not send the  
Join Message immediately. Instead, it enables a Hold timer and sends the Join  
Message upon timeout of the Hold timer. In this way, all the VLAN registration  
information received within the time specified by the Hold timer can be sent in one  
frame so as to save the bandwidth resources.  
Configure Hold timer, Join timer and Leave timer in Ethernet port view. Configure  
LeaveAll timer in system view.  
Table 9-1 Set the GARP timer  
Operation  
Command  
Set GARP Hold timer, Join timer and garp timer { hold | join | leave }  
Leave timer  
timer_value  
Set GARP LeaveAll timer  
garp timer leaveall timer_value  
Restore the default settings of GARP  
Hold timer, Join timer and Leave timer  
undo garp timer { hold | join | leave }  
Restore the default settings of GARP  
LeaveAll timer  
undo garp timer leaveall  
By default, Hold timer is 10 centiseconds, Join timer is 20 centiseconds, Leave timer is  
60 centiseconds, and LeaveAll timer is 1000 centiseconds.  
9-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 9 GARP/GVRP Configuration  
Note that, the value of Join timer should be no less than the doubled value of Hold timer,  
and the value of Leave timer should be greater than the doubled value of Join timer and  
smaller than the Leaveall timer value. Besides, you must set the value of the Join timer  
in terms of 5 centiseconds. Otherwise, the system will prompt message of error.  
The value range of a timer varies with the values of other timers. So if the value of a  
timer you want to set is not within the available value range, you can change the value  
range by changing the values of other related timers.  
z
z
z
z
The lower limit of Hold timer is 10 centiseconds. You can change its upper limit by  
changing the value of Join timer.  
You can change the lower limit and upper limit of Join timer by changing the value  
of Hold timer and Leave timer respectively.  
You can change the lower limit and upper limit of Leave timer by changing the  
value of Join timer and LeaveAll timer respectively.  
The upper limit of LeaveAll timer is 32765 centiseconds. You can change its lower  
limit by changing the value of Leave timer.  
9.1.3 Displaying and Debugging GARP  
After the above configuration, execute the display command in any view to display the  
running of GARP configuration, and to verify the configuration.  
Execute the reset command in user view to reset the configuration of GARP. Execute  
the debugging command in user view to debug the configuration of GARP.  
Table 9-2 Display and debug GARP  
Operation  
Command  
display garp statistics [ interface  
interface-list ]  
Display GARP statistics information  
display garp timer  
interface-list ]  
[
interface  
Display GARP timer  
reset garp statistics  
interface-list ]  
[
interface  
Clear GARP statistics information  
Enable GARP event debugging  
Disable GARP event debugging  
debugging garp event  
undo debugging garp event  
9.2 Configuring GVRP  
9.2.1 GVRP Overview  
GARP VLAN Registration Protocol (GVRP) is a GARP application. Based on GARP  
operating mechanism, GVRP provides maintenance of the dynamic VLAN registration  
information in the switch and propagates the information to other switches. All the  
9-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 9 GARP/GVRP Configuration  
GVRP-supporting switches can receive VLAN registration information from other  
switches and dynamically update the local VLAN registration information including the  
active members and through which port those members can be reached. All the  
GVRP-supporting switches can propagate their local VLAN registration information to  
other switches so that the VLAN information can be consistent on all GVRP-supporting  
devices in one switching network. The VLAN registration information propagated by  
GVRP includes both the local static registration information configured manually and  
the dynamic registration information from other switches.  
GVRP is described in details in the IEEE 802.1Q standard. Quidway series switches  
fully support the GARP compliant with the IEEE standards.  
Main GVRP configuration includes:  
z
z
z
In the above-mentioned configuration tasks, GVRP should be enabled globally before it  
is enabled on the port. Configuration of GVRP registration type can only take effect  
after the port GVRP is enabled. Besides, GVRP must be configured on the Trunk port.  
Note:  
z
z
z
When you configure an aggregation group, the GVRP feature configured on the  
master port is unchanged, but that on the slave port is disabled.  
When you add a port to an existing aggregation group, the GVRP feature on the port  
is disabled.  
When the master port leaves an aggregation group, the GVRP feature on both the  
group and port is unchanged; when a slave port leaves an aggregation group, the  
GVRP feature on the port is disabled.  
z
z
When you configure GVRP feature on any port in an aggregation group, the  
configuration is mapped to the master port of the group.  
When you query the GVRP feature configured on any port in an aggregation group,  
the returned result is about the master port of the group.  
9.2.2 Enabling/Disabling Global GVRP  
You can use the following command to enable/disable global GVRP.  
Perform the following configurations in system view.  
9-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 9 GARP/GVRP Configuration  
Table 9-3 Enable/disable global GVRP  
Operation  
Enable global GVRP  
Command  
gvrp  
undo gvrp  
Disable global GVRP  
By default, global GVRP is disabled.  
9.2.3 Enabling/Disabling Port GVRP  
You can use the following command to enable/disable the GVRP on a port.  
Perform the following configurations in Ethernet port view.  
Table 9-4 Enable/disable port GVRP  
Operation  
Enable port GVRP  
Disable port GVRP  
Command  
gvrp  
undo gvrp  
GVRP should be enabled globally before it is enabled on the port. The GVRP can only  
be enabled/disabled on Trunk ports.  
By default, port GVRP is disabled.  
9.2.4 Setting the GVRP Registration Type  
The GVRP registration types include normal, fixed and forbidden (refer to IEEE  
802.1Q).  
z
z
When an Ethernet port is set to be in normal registration mode, the dynamic and  
manual creation, registration and deregistration of VLAN are allowed on this port.  
When a Trunk port is set as fixed, the port is not allowed to dynamically  
register/deregister a VLAN, it only propagates information about static VLANs that  
are manually configured instead of that of dynamic VLANs. That is, a Trunk port  
that is of fixed type only permits manually configured VLANs even you configure it  
to permit all VLANs.  
z
When an Ethernet port is set to be in forbidden registration mode, all the VLANs  
except VLAN1 will be deregistered and no other VLANs can be created and  
registered on this port.  
Perform the following configuration in Ethernet port view.  
9-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 9 GARP/GVRP Configuration  
Table 9-5 Set the GVRP registration type  
Operation  
Command  
gvrp registration { normal | fixed |  
forbidden }  
Set GVRP registration type  
Restore the default GVRP registration  
type  
undo gvrp registration  
By default, GVRP registration type is normal.  
9.2.5 Displaying and Debugging GVRP  
After the above configuration, execute the display command in any view to display the  
running of GVRP configuration, and to verify the configuration.  
Execute the debugging command in user view to debug the configuration of GVRP.  
Table 9-6 Display and debug GVRP  
Operation  
Command  
display gvrp statistics [ interface  
interface-list ]  
Display GVRP statistics information  
Display GVRP global status information display gvrp status  
Enable GVRP packet or event  
debugging  
debugging gvrp { packet | event}  
Disable GVRP packet or event undo debugging gvrp { packet |  
debugging  
event }  
9.2.6 GVRP Configuration Example  
I. Network requirements  
To dynamically register and update VLAN information among switches, GVRP needs to  
be enabled on the switches.  
II. Network diagram  
E3/1/1  
E4/1/1  
Switch A  
Switch B  
Figure 9-1 GVRP configuration example  
9-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 9 GARP/GVRP Configuration  
III. Configuration procedure  
Configure Switch A:  
Enable GVRP globally.  
[SW8800] gvrp  
Set Ethernet3/1/1 as a Trunk port and allows all the VLANs to pass through.  
[SW8800] interface ethernet3/1/1  
[SW8800-Ethernet3/1/1] port link-type trunk  
[SW8800-Ethernet3/1/1] port trunk permit vlan all  
Enable GVRP on the Trunk port.  
[SW8800-Ethernet3/1/1] gvrp  
Configure Switch B:  
Enable GVRP globally.  
[SW8800] gvrp  
Set Ethernet4/1/1 as a Trunk port and allows all the VLANs to pass through.  
[SW8800] interface ethernet4/1/1  
[SW8800-Ethernet4/1/1] port link-type trunk  
[SW8800-Ethernet4/1/1] port trunk permit vlan all  
Enable GVRP on the Trunk port.  
[SW8800-Ethernet4/1/1] gvrp  
9-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 10 Super VLAN Configuration  
Chapter 10 Super VLAN Configuration  
10.1 Super VLAN Overview  
Super VLAN is also called VLAN aggregation: A super VLAN contains multiple sub  
VLANs. A super VLAN can be configured with an IP address of the virtual port, while a  
sub VLAN cannot be configured with the IP address of the virtual port. Each sub VLAN  
is a broadcast domain. Different sub VLANs are isolated at Layer 2. When users in a  
sub VLAN need to communicate with each other, they use the IP address of the virtual  
interface of the super VLAN as the IP address of the gateway. The IP address is shared  
by multiple VLANs. Therefore IP addresses are saved. If different sub VLANs want to  
communicate with each other at Layer 3, or a sub VLAN communicates with other  
networks, you must enable ARP proxy (by default it is disabled). The address resolution  
protocol (ARP) proxy can forward and process ARP request and response packets so  
that the isolated sub VLANs can communicate with each other at Layer 3.  
10.2 Configuring a Super VLAN  
Super VLAN configuration includes:  
z
10.2.1 Configuring a Super VLAN  
Note:  
z
z
You can configure multiple super VLANs for a switch. The configured VLAN port  
and IP address configurations are the same as common VLAN configurations.  
A sub VLAN configuration is the same as a common VLAN configuration. The  
following table describes the specific commands to configure a sub VLAN. For  
detailed information, refer to Chapter 8 “VLAN Configuration”.  
z
By default, ARP proxy is enabled for super VLANs and disabled on the sub VLANs.  
You can configure a super VLAN as follows:  
Table 10-1 Configure a super VLAN  
Number  
Item  
system  
Command  
Description  
Enter  
view  
1
<SW8800> system-view  
––  
10-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 10 Super VLAN Configuration  
Number  
Item  
Command  
Description  
Required  
2
Enter VLAN view [SW8800] vlan vlan_id  
Required.  
VLAN_ID  
configured VLAN ID in  
the range 1 to 4,094.  
The  
the  
Set the VLAN  
[SW8800-vlan4093]  
type to super  
supervlan  
is  
3
VLAN  
Create  
a
sub  
4
5
VLAN and enter [SW8800] vlan vlan_id  
sub VLAN view  
Required  
Optional  
Add  
Ethernet  
[SW8800]  
interface_list  
port  
ports to sub  
VLANs  
Configure  
the  
mapping relation  
between super  
VLANs and sub  
VLANs  
Required. The view is  
the VLAN view of a  
super VLAN.  
[SW8800-vlan4093]  
subvlan sub-vlan-list  
6
7
Optional. You can  
<SW8800> display super execute the display  
Display  
configuration  
information  
vlan [ supervlan_id ]  
super vlan command  
in any view.  
To cancel the configurations, use the corresponding undo commands.  
Caution:  
z
z
Super VLANs cannot contain ports.  
After you set the VLAN type to super VLAN, the ARP proxy is automatically enabled  
on the VLAN port, and you do not need to configure the proxy.  
When a super VLAN exists, the ARP proxy should be enabled on the corresponding  
VLAN port.  
z
z
z
z
z
The default VLAN cannot be set to a super VLAN.  
You can add multiple ports (non-uplink port) to each sub VLAN.  
You cannot configure a virtual port for a sub VLAN.  
If the undo subvlan command is not followed by vlan_id, the mapping relationship  
between all sub VLANs and specified super VLANs is removed; if the undo  
subvlan command is followed by vlan_id, the mapping relationship between the  
specified sub VLANs and specified super VLANs is removed.  
10-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 10 Super VLAN Configuration  
10.2.2 Super VLAN Configuration Example  
I. Network requirements  
Super VLAN 10 and sub VLANs including VLAN 2, VLAN 3 and VLAN 5 need  
configuring. VLAN2 contains port 1 and 2; VLAN3 contains port 3 and 4; VLAN5  
contains port 5 and 6. These sub VLANs are isolated at Layer 2. It is required that these  
sub VLANs communicate with each other at Layer 3.  
II. Network diagram  
Omitted  
III. Configuration procedure  
[SW8800] vlan 10  
[SW8800-vlan10] supervlan  
[SW8800-vlan10] vlan 2  
[SW8800-vlan2] port ethernet3/1/1ethernet3/1/2  
[SW8800-vlan2] vlan 3  
[SW8800-vlan3] port Ethernet3/1/3 ethernet3/1/4  
[SW8800-vlan3] vlan 5  
[SW8800-vlan5] port ethernet3/1/5 ethernet3/1/6  
[SW8800-vlan5] vlan 10  
[SW8800-vlan10] subvlan 2 3 5  
[SW8800-vlan10] interface vlan 10  
[SW8800-Vlan-interface10] ip address 10.110.1.1 255.255.255.0  
Note:  
By default ARP proxy on super VLANs is enabled, and disabled on sub VLANs.  
10-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 11 IP Address Configuration  
Chapter 11 IP Address Configuration  
11.1 Introduction to IP Address  
11.1.1 IP Address Classification and Representation  
An IP address is a 32-bit address allocated to a device that accesses the Internet. It  
consists of two fields: net-id field and host-id field. IP addresses are allocated by  
Network Information Center (NIC) of American Defense Data Network (DDN). To  
manage IP addresses conveniently, IP addresses are classified into five types. See the  
following figure.  
0
1
2
3
4
5
6
7
8
9
10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31  
Class A  
Class B  
Class C  
Class D  
Class E  
host-id  
net-id  
0
net-id  
1 0  
host-id  
net-id  
host-id  
1 1 0  
Multicast address  
Reserv ed  
1 1 1 0  
1 1 1 1 0  
net-id: network ID  
host-id: Host ID  
Figure 11-1 Five classes of IP address  
Here, Class A, Class B and Class C addresses are unicast addresses, while Class D  
addresses are multicast ones and class E addresses are reserved for special  
applications in future. The first three types are commonly used.  
The IP address is in dotted decimal format. Each IP address contains four integers in  
dotted decimal notation. Each integer corresponds to one byte, for example,  
10.110.50.101.  
When using IP addresses, note that some of them are reserved for special uses, and  
are seldom used. The IP addresses you can use are listed in the following table.  
11-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 11 IP Address Configuration  
Table 11-1 IP address classes and ranges  
IP network  
range  
available  
Network  
class  
Address  
range  
Note  
Host ID with all the digits being 0  
indicates that the IP address is the  
network address, and is used for  
network routing.  
Host ID with all the digits being 1  
indicates the broadcast address, that  
is, broadcast to all hosts on the  
network.  
IP address 0.0.0.0 is used for the host  
to that is not put into use after starting up.  
0.0.0.0 to  
127.255.2  
55.255  
1.0.0.0  
126.0.0.0  
A
The IP address with network ID being  
0 indicates the current network and its  
network can be cited by the router  
without knowing its network number.  
The IP addresses with the format of  
127.X.Y.Z are reserved for self-loop  
test and the packets sent to these  
addresses are not output to the line.  
The packets are processed internally  
and regarded as input packets.  
Host ID with all the digits being 0  
indicates that the IP address is the  
network address, and is used for  
128.0.0.0  
to  
network routing.  
128.0.0.0  
to  
B
191.255.2 191.254.0.0  
55.255  
Host ID with all the digits being 1  
indicates the broadcast address, that  
is, broadcast to all hosts on the  
network.  
Host ID with all the digits being 0  
indicates that the IP address is the  
network address, and is used for  
network routing.  
192.0.0.0  
to  
223.255.2 223.255.254.0  
55.255  
192.0.0.0  
to  
C
Host ID with all the digits being 1  
indicates the broadcast address, that  
is, broadcast to all hosts on the  
network.  
11-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 11 IP Address Configuration  
IP network  
range  
available  
Network  
class  
Address  
range  
Note  
Addresses of class D are multicast  
addresses, among which:  
z
IP address 224.0.0.0 is reserved  
and will not be allocated. Those  
from 224.0.0.1 to 224.0.0.255 are  
reserved for routing protocols and  
other protocols that are used to  
discover and maintain routes.  
224.0.0.0  
to  
239.255.2  
55.255  
D
None  
z
z
Those  
from  
239.0.0.0  
to  
239.255.255.255 are used for local  
multicast management.  
Those  
from  
224.0.0.255  
to  
238.255.255.255 are for users.  
240.0.0.0  
to  
255.255.2  
55.254  
The addresses are reserved for future  
use.  
E
None  
255.255.255.255 is used as a Local  
Area Network (LAN) broadcast  
address.  
Other  
addresses 55.255  
255.255.2 255.255.255.2  
55  
11.1.2 Subnet and Mask  
Nowadays, with rapid development of the Internet, IP addresses are depleting very fast.  
The traditional IP address allocation method wastes IP addresses greatly. In order to  
make full use of the available IP addresses, the concept of mask and subnet is  
proposed.  
A mask is a 32-bit number corresponding to an IP address. The number consists of 1s  
and 0s. Principally, these 1s and 0s can be combined randomly. However, the first  
consecutive bits are set to 1s when you design a mask. The mask divides the IP  
address into two parts: subnet address and host address. The part of IP address that  
corresponds to the bits 1s in the mask indicates the subnet address and the other part  
of IP address indicate the host address. If there is no subnet division, then its subnet  
mask is the default value and the length of "1" indicates the net-id length. Therefore, for  
IP addresses of classes A, B and C, the default values of corresponding subnet mask  
are 255.0.0.0, 255.255.0.0 and 255.255.255.0 respectively.  
The mask can be used to divide a Class A network containing more than 16,000,000  
hosts or a Class B network containing more than 60,000 hosts into multiple small  
networks. Each small network is called a subnet. For example, for the Class B network  
address 138.38.0.0, the mask 255.255.224.0 can be used to divide the network into  
eight subnets: 138.38.0.0, 138.38.32.0, 138.38.64.0, 138.38.96.0, 138.38.128.0,  
11-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 11 IP Address Configuration  
138.38.160.0, 138.38.192.0 and 138.38.224.0 (Refer to the following figure). Each  
subnet can contain more than 8000 hosts.  
ClassB  
138.38.0.0  
10001010, 00100110, 000 00000, 00000000  
Standard  
mask  
11111111, 11111111, 000 00000, 00000000  
255.255.0.0  
Subnet mask  
255.255.224.0  
11111111, 11111111, 111 00000, 00000000  
Subnet  
Host  
number  
number  
Subnet address:  
000  
001  
010  
011  
100  
101  
110  
111  
Subnet address: 138.38. 0.  
Subnet address: 138.38. 32.  
Subnet address: 138.38. 64.  
Subnet address: 138.38. 96.  
Subnet address: 138.38.128.  
Subnet address: 138.38.160.  
Subnet address: 138.38.192.  
Subnet address: 138.38.224.  
0
0
0
0
0
0
0
0
Figure 11-2 Subnet division of an IP address  
11.2 Configuring IP Address  
The following sections describe IP address configuration tasks:  
z
z
11.2.1 Configuring the Hostname and Host IP Address  
Using this command, you can associate a host name with an IP address. After that,  
when using an application like telnet, you can use the host name instead of the IP  
address that is hard to memorize, and the system automatically translates the host  
name to the IP address.  
Perform the following configuration in system view.  
Table 11-2 Configure the host name and the corresponding IP address  
Operation  
Command  
Configure the host name and the  
corresponding IP address  
ip host hostname ip-address  
Cancel the host name and the  
corresponding IP address  
undo ip host hostname [ ip-address ]  
By default, there is no host name associated to any host IP address.  
11-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 11 IP Address Configuration  
11.2.2 Configuring the IP Address of the VLAN Interface  
You can configure an IP address for every VLAN interface of the switch. Generally, it is  
enough to configure one IP address for an interface. You can also configure ten IP  
addresses for an interface at most, so that it can be connected to several subnets.  
Among these IP addresses, one is the primary IP address and all others are secondary.  
Perform the following configuration in VLAN interface view.  
Table 11-3 Configure an IP address for a VLAN interface  
Operation  
Command  
Configure an IP address for a VLAN ip address ip-address  
{
mask  
|
interface mask-length } [ sub ]  
Delete an IP address of a VLAN undo ip address ip-address { mask |  
interface mask-length } [ sub ]  
By default, the IP address of a VLAN interface is null.  
11.3 Displaying and debugging IP Address  
After the above configuration, execute the display command in any view to display the  
IP addresses configured on interfaces of the network device, and to verify the effect of  
the configuration.  
Table 11-4 Display and debug IP address  
Operation  
Command  
display ip host  
Display all hosts on the network and the  
corresponding IP addresses  
Display the configurations of a VLAN display ip interface vlan-interface  
interface vlan-id  
11.4 IP Address Configuration Example  
I. Network requirements  
Configure the IP address as 129.2.2.1 and subnet mask as 255.255.255.0 for the  
VLAN interface 1 of the switch.  
11-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 11 IP Address Configuration  
II. Network diagram  
Switch  
Console cable  
PC  
Figure 11-3 Network diagram for IP address configuration  
III. Configuration procedure  
Enter VLAN interface 1.  
[SW8800] interface vlan-interface 1  
Configure the IP address for VLAN interface 1.  
[SW8800-Vlan-interface1] ip address 129.2.2.1 255.255.255.0  
11.5 Troubleshooting IP Address Configuration  
Fault 1: The switch cannot ping through a certain host in the LAN.  
Troubleshooting can be performed as follows:  
1) Check the configuration of the switch. Use the display arp command to view the  
ARP entry table that the switch maintains.  
2) Check which VLAN includes the port of the switch used to connect to the host.  
Check whether the VLAN has been configured with a VLAN interface. Then check  
whether the IP address of the VLAN interface and that of the host are on the same  
network segment.  
3) If the configuration is correct, enable the ARP debugging on the switch, and check  
whether the switch can correctly send and receive ARP packets. If it can only send  
ARP packets but cannot receive them, errors may occur on the Ethernet physical  
layer.  
11-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 12 ARP Configuration  
Chapter 12 ARP Configuration  
12.1 Introduction to ARP  
Address Resolution Protocol (ARP) is used to resolve an IP address into a MAC  
address.  
I. Necessity of ARP  
An IP address cannot be directly used for communication between network devices  
because network devices can only identify MAC addresses. An IP address is only an  
address of a host in the network layer. To send the data packets transmitted through the  
network layer to the destination host, MAC address of the host is required. So the IP  
address must be resolved into a MAC address.  
II. ARP implementation procedure  
When two hosts on the Ethernet need to communicate with each other, they must know  
the MAC addresses of each other. Every host maintains the IP-MAC address  
translation table, which is known as the ARP mapping table. A series of maps between  
IP addresses and MAC addresses of other hosts which recently communicate with the  
local host are stored in the ARP mapping table. When a dynamic ARP mapping entry is  
not in use for a specified period of time, the host removes it from the ARP mapping  
table so as to save the memory space and shorten the interval for the switch to search  
ARP mapping table.  
Suppose there are two hosts on the same network segment: Host A and Host B. The IP  
address of Host A is IP_A and the IP address of Host B is IP_B. Host A will transmit  
messages to Host B. Host A checks its own ARP mapping table first to know whether  
there are corresponding ARP entries of IP_B in the table. If the corresponding MAC  
address is found, Host A uses the MAC address in the ARP mapping table to  
encapsulate the IP packet in frame and sends it to Host B. If the corresponding MAC  
address is not found, Host A stores the IP packet in the queue waiting for transmission,  
create an ARP request packet and broadcast it throughout the Ethernet. The ARP  
request packet contains the IP address of Host B and IP address and MAC address of  
Host A. Since the ARP request packet is broadcasted, all hosts on the network  
segment can receive the request. However, only the requested host (namely, Host B)  
needs to process the request. Host B first stores the IP address and the MAC address  
of the request sender (Host A) in the ARP request packet in its own ARP mapping table.  
Then, Host B generates an ARP reply packet by adding its own MAC address into the  
packet, and then send it to Host A. The reply packet is directly sent to Host A in stead of  
being broadcasted. Receiving the reply packet, Host A extracts the IP address and the  
12-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 12 ARP Configuration  
corresponding MAC address of Host B and adds them to its own ARP mapping table.  
Then Host A sends Host B all the packets standing in the queue.  
Normally, dynamic ARP takes effect and automatically searches for the resolution from  
the IP address to the Ethernet MAC address without the help of an administrator.  
12.2 Configuring ARP  
The ARP mapping table can be maintained dynamically or manually. Usually, the  
manually configured mapping from the IP addresses to the MAC addresses is known  
as static ARP. The user can display, add or delete the entries in the ARP mapping table  
through relevant manual maintenance commands.  
The following sections describe static ARP configuration tasks:  
z
z
z
12.2.1 Manually Adding/Deleting Static ARP Mapping Entries  
Perform the following configuration in system view.  
Table 12-1 Manually add/delete static ARP mapping entries  
Operation  
Command  
arp static ip-address mac-address  
[ vlan-id { interface_type interface_num |  
interface_name } | vpn-instance-name ]  
Manually add a static ARP mapping  
entry  
Manually delete a static ARP mapping  
entry  
undo arp ip-address  
By default, the ARP mapping table is empty and the address mapping is obtained  
through dynamic ARP.  
Note that:  
z
As long as a switch operates, its static ARP mapping entries remain valid unless  
you perform operations that make ARP invalid, such as change or remove VLAN  
virtual interfaces, remove a VLAN, or remove an interface from a VLAN. These  
operations cause the corresponding ARP mapping entries to be automatically  
removed.  
z
z
z
The vlan-id argument must be the ID of a VLAN that has been created by the user,  
and the Ethernet port specified behind this parameter must belong to the VLAN.  
As for the vpn-instance-name argument, you must provide the VPN-instance  
name of an existing MPLS VPN for it.  
ARP map entries with port parameters cannot be configured for aggregated ports.  
12-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 12 ARP Configuration  
12.2.2 Configuring the Dynamic ARP Aging Timer  
For purpose of flexible configuration, the system provides the following commands to  
assign dynamic ARP aging period. When the system learns a dynamic ARP entry, its  
aging period is based on the current value configured.  
Perform the following configuration in system view.  
Table 12-2 Configure the dynamic ARP aging timer  
Operation  
Command  
Configure the dynamic ARP aging timer arp timer aging aging-time  
Restore the default dynamic ARP aging  
time  
undo arp timer aging  
By default, the aging time of dynamic ARP aging timer is 20 minutes.  
12.2.3 Enabling/Disabling the Checking Function of ARP Entry  
You can use the following command to control the device whether to learn the ARP  
entry where the MAC address is a multicast MAC address.  
Perform the following configuration in system view.  
Table 12-3 Enable/Disable the checking function of ARP entry  
Operation  
Command  
Enable the checking of ARP entry, that is, the  
device does not learn the ARP entry where the arp check enable  
MAC address is a multicast MAC address  
Disable the checking of ARP entry, that is, the  
device learns the ARP entry where the MAC undo arp check enable  
address is a multicast MAC address  
By default, the checking of ARP entry is enabled, that is, the device does not learn the  
ARP entry where the MAC address is a multicast MAC address.  
12-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 12 ARP Configuration  
12.3 Displaying and Debugging ARP  
After the above configuration, execute the display command in any view to display the  
running of the ARP configuration, and to verify the effect of the configuration.  
Execute the reset command in user view to clear ARP mapping table. Execute the  
debugging command in user view to debug ARP configuration.  
Table 12-4 Display and debug ARP  
Operation  
Command  
display arp [ ip-address | [ dynamic | static ]  
[ | { begin | include | exclude } text ] ]  
Display ARP mapping table  
Display the current setting of the  
dynamic ARP aging timer  
display arp timer aging  
reset arp [ dynamic | static | interface  
Reset ARP mapping table  
{
interface_type  
interface_num  
|
interface_name } | all ]  
Enable ARP information debugging debugging arp { error | info | packet }  
Disable  
debugging  
ARP  
information  
undo debugging arp { error | info | packet }  
12.4 Enabling/Disabling the Scheme of Preventing Attack  
from Packets  
12.4.1 Introduction to the Scheme of Preventing Attack from Packets  
A scheme of preventing attack from packets is designed against some typical attack  
modes on the 8800 series switches. The scheme can prevent attacks from IP, ARP,  
802.1x and unknown multicast packets.  
z
IP packet attack: Means that a Switch 8800 receives too many IP packets whose  
destination addresses and VLAN port address are in the same segment. The  
switch has no corresponding forwarding entries for the packets, therefore they are  
sent to the CPU, occupying lots of CPU resource and even affecting normal data  
forwarding.  
z
z
ARP packet attack: Means that a Switch 8800 receives lots of ARP request  
packets with the same or similar source media access control (MAC) addresses,  
affecting normal ARP learning.  
802.1x packet attack: Means that a Switch 8800 receives lots of 802.1x  
authentication packets with the same or similar source MAC addresses,  
consequently occupying the CPU resources.  
Perform the following configuration in system view.  
12-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 12 ARP Configuration  
Table 12-5 Enable/Disable the scheme of preventing attack from packets  
Operation  
Enable/Disable the  
Command  
scheme  
preventing attack from packets  
of anti-attack { arp | dot1x | ip }{ disable |  
enable }  
By default, the scheme of preventing attack from IP packets is enabled; the scheme of  
preventing attack from ARP packets and dot1x packets is disabled.  
12-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Chapter 13 DHCP Configuration  
13.1 Introduction to DHCP  
13.1.1 How DHCP Works  
This is a world where networks are ever-growing in both size and complexity, and the  
network configuration is getting more and more complex. As is often the case, the  
number of hosts in a network exceeds that of the available IP addresses, and position  
changes of hosts (when users carry their laptops from here to there, or move to a  
wireless network) require reassigned new IP addresses. Dynamic host configuration  
protocol (DHCP) is designed to accommodate this context. DHCP adopts client/server  
model, where DHCP clients send requests to the DHCP server dynamically and the  
DHCP server in turn returns corresponding configuration information (such as IP  
addresses) according to the policies configured for it.  
A typical DHCP implementation comprises a DHCP server and multiple DHCP clients  
(PCs or laptops). Figure 13-1 illustrates a network that employs DHCP.  
DHCP Client DHCP Client  
DHCP Server  
LAN  
DHCP Client  
DHCP Client  
Figure 13-1 Network diagram for DHCP  
I. IP address assignment  
1) IP address assignment policy  
Different types of clients have different requirements for IP addresses. Servers usually  
require long-term fixed IP addresses, some hosts may require automatically assigned  
long-term fixed IP addresses , and some hosts may only require dynamically assigned  
temporary IP addresses.  
A DHCP server provides three policies to meet these requirements.  
z
Manual IP address assignment. The administrator assigns fixed IP addresses to  
DHCP clients that are of special uses, such as a WWW server.  
13-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
z
Automatic IP address assignment. The DHCP server automatically assigns fixed  
IP addresses to DHCP clients when they connect to the network for the first time.  
After that, the IP addresses are always occupied by the DHCP clients.  
Dynamic IP address assignment. The DHCP server leases IP addresses to DHCP  
clients for predetermined period of time and reclaims them at the expiration of the  
period. In this case, a DHCP client must reapply for an IP address regularly. This is  
the common case for normal users.  
z
IP address assignment orderThe DHCP server assigns IP addresses except the  
forbidden ones to clients in the following orders.  
z
z
IP addresses in the address pool of the DHCP server that are statically bound to  
the MAC addresses of the DHCP clients.  
IP addresses that are reclaimed by the DHCP server. That is, those in the  
Requested IP Addr Option fields of DHCP Discover packets sent by DHCP clients.  
The first available IP address in the address pool the DHCP server finds.  
The first expired or once conflicted IP address it finds. A DHCP server returns an  
error if it cannot find any available IP address from all these types of IP addresses  
when assigning an IP address.  
z
z
2) Types of address pools of DHCP server  
z
Global address pool, valid for the entire switch. An address pool of this type is  
created using the dhcp server ip-pool command in system view.  
VLAN interface address pool, valid for a specific VLAN interface. An address pool  
of this type is created by the system when the VLAN interface is configured with a  
legal unicast IP address and you specify to assign IP addresses in VLAN interface  
address pool using the dhcp select interface command in VLAN interface view.  
The address range of the available addresses is that of the network segment the  
VLAN interface resides.  
z
II. Communications between DHCP clients and DHCP server  
To obtain valid dynamic IP addresses, the DHCP clients exchange different information  
with the DHCP server in different phases. Usually, three modes are involved:  
1) First round registration  
A DHCP client goes through the following four steps when it accesses a network for the  
first time:  
z
z
Discovery. The DHCP client tries to find a DHCP server by broadcasting a  
DHCP_Discover packet in the network. (Only DHCP servers respond to this type  
of packet.)  
Provision. Each DHCP server that receives the DHCP_Discover packet selects an  
available IP address from an address pool and sends a DHCP_Offer packet that  
carries the selected IP address and other configuration information to the DHCP  
client.  
13-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
z
Selection. The DHCP client only receives the first arriving DHCP_Offer packet if  
there are DHCP_Offer packets from several DHCP servers. Then, it retrieves the  
IP address carried in the packet, and broadcasts a DHCP_Request packet to each  
DHCP server. The packet contains the IP address carried by the DHCP_Offer  
packet.  
z
z
Acknowledgement. Upon receiving the DHCP_Request packet, the DHCP server  
that owns the IP address the DHCP_Request packet carries sends a DHCP_ACK  
packet to the DHCP client. And then the DHCP client binds TCP/IP protocol  
components to its network adapter.  
IP addresses offered by other DHCP servers (if any) through DHCP_Offer packets  
but not selected by the DHCP client are still available for other clients.  
2) Second round registration  
A second round registration goes through the following steps:  
z
After going through the first round registration successfully and logging out, when  
the DHCP client logs on to the network again, it directly broadcasts a  
DHCP_Request packet that contains the IP address assigned to it in the first  
round registration instead of a DHCP_Discover packet. .  
z
z
Upon receiving the DHCP_Request packet, if the IP address carried in the packet  
is still available, the DHCP server owning the IP address answers with a  
DHCP_ACK packet to enable the DHCP client to use the IP address again.  
If the IP address is not available (for example, it is occupied by other DHCP client),  
the DHCP server answers with a DHCP_NAK packet, which enables the DHCP  
client to go through steps in the first round registration.  
3) Prolonging the lease time of IP address  
An IP address assigned dynamically is valid for a specified lease time and will be  
reclaimed by the DHCP server when the time expires. So the DHCP client must update  
the lease to prolong the lease time if it is to use the IP address for a longer time.  
By default, a DHCP client updates its IP address lease automatically by sending a  
DHCP_Request packet to the DHCP server when half of the lease time elapses. The  
DHCP server, in turn, answers with a DHCP_ACK packet to notify the DHCP client of  
the new lease.  
13.2 Configuring General DHCP  
General DHCP configuration refers to those that are applicable to both DHCP server  
and DHCP relay.  
The following sections describe the general DHCP configuration tasks:  
z
z
z
13-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
13.2.1 Enabling/Disabling DHCP Service  
For both DHCP server and DHCP relay, you must enable the DHCP service first before  
performing other DHCP configurations. The other related DHCP configurations take  
effect only after the DHCP service is enabled.  
Perform the following configuration in system view.  
Table 13-1 Enable/Disable DHCP service  
Operation  
Enable DHCP service  
Command  
dhcp enable  
undo dhcp enable  
Disable DHCP service  
DHCP service is disabled by default.  
13.2.2 Configuring Processing Method of DHCP Packets  
You can perform the configurations listed in the following tables on your switch. After  
that, the switch processes the DHCP packets it received from DHCP clients in the  
methods you have configured.  
Perform the following configuration in VLAN interface view to configure the processing  
method of DHCP packets for current VLAN interface.  
Table 13-2 Configure the processing method for current VLN interface  
Operation  
Command  
Specify to forward DHCP packets to  
local DHCP server and let the local  
server assign IP addresses in global  
address pools to DHCP clients  
dhcp select global  
Specify to forward DHCP packets to  
local DHCP server and let the local  
server assign IP addresses in VLAN  
interface address pool to DHCP clients  
dhcp select interface  
Specify to forward DHCP packets to  
remote DHCP servers. In this case, the  
current switch operates as a DHCP dhcp select relay  
relay, and IP addresses are assigned by  
DHCP servers located in other networks  
Revert to the default processing mode  
undo dhcp select  
Perform the following configuration in system view to configure the processing method  
of DHCP packets for multiple VLAN interfaces.  
13-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Table 13-3 Configure the processing method for multiple VLAN interfaces  
Operation  
Command  
Specify to forward DHCP packets to  
local DHCP server and let the local  
server assign IP addresses in global  
address pools to DHCP clients  
dhcp select global  
{
interface  
to  
vlan-interface  
vlan_id  
[
vlan-interface vlan_id ] | all }  
Specify to forward DHCP packets to  
local DHCP server and let the local  
server assign IP addresses in VLAN  
interface address pool to DHCP clients  
dhcp select interface { interface  
vlan-interface vlan_id to  
vlan-interface vlan_id ] | all }  
[
Specify to forward DHCP packets to  
remote DHCP servers. In this case, the dhcp select relay  
current switch operates as a DHCP vlan-interface vlan_id  
{
interface  
to  
[
relay, and IP addresses are assigned by vlan-interface vlan_id ] | all }  
DHCP servers located in other networks  
undo dhcp select  
vlan-interface vlan_id  
vlan-interface vlan_id ] | all }  
{
interface  
to  
Revert to the default processing mode  
[
By default, DHCP packets are processed in global method. That is, DHCP packets are  
forwarded to local DHCP server and IP addresses in global address pools are  
assigned.  
13.2.3 Enabling/Disabling Fake DHCP Server Detection  
If an unauthorized DHCP server exists in a network, it also answers when users in the  
network request IP addresses, and then interacts with the DHCP clients. This causes  
that the users cannot obtain correct IP addresses to access network. This kind of  
DHCP servers are known as fake DHCP servers.  
With fake DHCP server detection enabled, the switch can record information (such as  
the IP addresses) about the DHCP servers. This helps administrators to detect fake  
DHCP servers in time and take proper measures.  
Perform the following configuration in system view.  
Table 13-4 Enable/Disable fake DHCP server detection  
Operation  
Command  
dhcp server detect  
undo dhcp server detect  
Enable fake DHCP server detection  
Disable fake DHCP server detection  
Fake DHCP server detection is disabled by default.  
13-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
13.3 Configuring DHCP Server  
The following sections describe the DHCP server configuration tasks:  
z
z
z
z
z
z
z
z
z
z
z
Note:  
Some of the above DHCP configurations can be performed for global IP address pools,  
IP address pool of current VLAN interface, or IP address pools of multiple specified  
VLAN interface respectively. They are:  
z
z
z
z
z
z
Configuring lease time for DHCP address pool  
Configuring DHCP client domain names  
Configuring DNS server address for DHCP clients  
Configuring NetBIOS server address for DHCP clients  
Configuring NetBIOS node type for DHCP clients  
Configuring DHCP custom options  
13.3.1 Creating a Global DHCP IP Address Pool  
An IP address pool contains IP addresses that can be assigned to DHCP clients. In  
response to DHCP request sent by a DHCP client, the DHCP server selects an  
appropriate IP address pool based on your configuration, choose an available IP  
address from the pool, and sends the IP address and other parameters (such as the  
lease time of the IP address) to the DHCP client. At present, you can configure up to  
128 global DHCP address pools for a DHCP server.  
The address pools of a DHCP server are hierarchically grouped like a tree. The root  
holds the IP address of the network segment, the branches hold the subnet IP  
addresses, and finally, the leaves hold the IP addresses of DHCP clients, which are  
manually bound to the corresponding network adapters. Such a structure enables  
configurations to be inherited. That is, configurations of the network segment can be  
inherited by its subnets, whose configurations in turn can be inherited by their clients.  
13-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
So, you can configure the parameters (such as domain name) that are common to all  
levels in the address pool structure or some subnets only for the network segment or  
for corresponding subnets.  
The display dhcp server tree command displays the tree-like structure of address  
pool, where address pools on the same level are sorted by the time they are created.  
The dhcp server ip-pool command can be used to create a global DHCP address  
pool and enter the corresponding address pool view. If the address pool already exists,  
this command brings you to the address pool view directly.  
Perform the following configuration in system view.  
Table 13-5 Create a global DHCP address pool  
Operation  
Command  
Create a DHCP address pool and enter  
the corresponding DHCP address pool dhcp server ip-pool pool-name  
view  
Remove a DHCP address pool  
undo dhcp server ip-pool pool-name  
By default, no global DHCP address pool is created.  
Note that a VLAN interface address pool is created by the system after a legal unicast  
IP address is assigned to the VLAN interface and you specify to assign IP addresses in  
VLAN interface address pool by using the dhcp select interface command in VLAN  
interface view.  
13.3.2 Configuring IP Address Assignment Mode  
IP address can be assigned in two modes: static binding and dynamic assignment. You  
can statically bind an IP address in an address pool to the MAC address of a client or  
configure a address range to allow the DHCP server dynamic allocate the addresses in  
the range to DHCP clients. The two modes cannot coexist in a global DHCP address  
pool, but they can coexist in a VLAN interface address pool (but those that are  
dynamically assigned have the same network segment as that of the IP address of the  
VLAN interface).  
For the dynamic assignment mode, you must specify the range of the addresses to be  
dynamically assigned. A global DHCP address pool whose IP addresses are statically  
bound to DHCP clients is actually a special kind of DHCP address pool.  
I. Configuring static address binding for a global DHCP address pool  
fixed IP address to the MAC address of a DHCP client who needs fixed IP address.  
After that, when the client requests for an IP address, the DHCP server finds (according  
to the MAC address) and assigns the fixed IP address to the client. At present, only  
one-to-one MAC-IP binding is supported for global DHCP address pool.  
13-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Perform the following configuration in DHCP address pool view.  
Table 13-6 Configure static address binding for a global DHCP address pool  
Operation  
Command  
Configure an IP address to be statically static-bind ip-address ip-address  
bound  
[ mask netmask ]  
Free a statically bound IP address  
undo static-bind ip-address  
Configure  
statically bound  
a
MAC address to be  
static-bind mac-address mac-address  
Free a statically bound MAC address  
undo static-bind mac-address  
IP addresses in a global DHCP address pool are not statically bound by default.  
Note:  
The static-bind ip-address command and the static-bind mac-address command  
must be used together as a pair when you configure static binding entries. When you  
re-execute the command pair with the same IP address/MAC address, the newly  
configured IP address/MAC address overwrites the existing one.  
II. Configuring static address binding for a VLAN interface address pool  
At present, a VLAN interface DHCP address pool supports one-to-multiple MAC-IP  
address binding.  
Perform the following configuration in VALN interface view.  
Table 13-7 Configure static address binding for a VLAN interface address pool  
Operation  
Command  
Configure static address binding for the dhcp server static-bind ip-address  
current VLAN interface address pool  
ip-address mac-address mac-address  
undo dhcp server static-bind  
{ ip-address ip-address | mac-address  
mac-address }  
Remove a statically bound IP address  
entry  
IP addresses in the address pool of a VLAN interface are not statically bound by  
default.  
13-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Caution:  
A binding in a VLAN interface address pool cannot be overwritten directly. If an  
IP-to-MAC address binding entry is configured and you want to modify it, you must  
remove it and redefine a new one.  
III. Configuring dynamic IP address assignment  
If you specify to assign IP addresses dynamically, that is, IP addresses are leased  
permanently or temporarily, you need to configure an available address range.  
Perform the following configuration in DHCP address pool view.  
Table 13-8 Configure an address range for dynamic IP address assignment  
Operation  
Command  
Configure an address range for dynamic  
IP address assignment  
network ip-address [ mask netmask ]  
Remove an dynamic assignment  
address range  
undo network  
By default, no IP address range is configured for dynamic IP address assignment.  
Each DHCP address pool can be configured with only one address range. If you  
execute the network command multiple times, then only the last configured address  
range works.  
13.3.3 Forbidding Specified IP Addresses to Be Automatically Assigned  
You can use the command here to prevent a DHCP server from assigning IP addresses  
that are already occupied by such network devices as gateways and file transfer  
protocol (FTP) servers to other DHCP clients to avoid IP address conflicts.  
Perform the following configuration in system view.  
Table 13-9 Forbid specified IP addresses to be automatically assigned  
Operation  
Command  
server  
Forbid specified IP addresses to be dhcp  
forbidden-ip  
automatically assigned  
low-ip-address [ high-ip-address ]  
undo dhcp server forbidden-ip  
low-ip-address [ high-ip-address ]  
Cancel the forbiddance  
All IP addresses in a DHCP address pool can be automatically assigned by default.  
13-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
You can set multiple IP address ranges that are not assigned automatically by  
executing the dhcp server forbidden-ip command multiple times.  
13.3.4 Configuring Lease Time For DHCP Address Pool  
You can configure different lease times for different DHCP address pools. But you can  
configure only one lease time for one DHCP address pool and all the address in the  
same pool will have the same lease time.  
I. Configuring a lease time for a global DHCP address pool  
Perform the following configuration in DHCP address pool view.  
Table 13-10 Configure a lease time for a global DHCP address pool  
Operation  
Command  
Configure a lease time for a global expired { day day [ hour hour [ minute  
DHCP address pool  
minute ] ] | unlimited }  
Restore the lease time of a global DHCP  
address pool to the default value  
undo expired  
II. Configuring a lease time for current VLAN interface  
Perform the following configuration in VLAN interface view.  
Table 13-11 Configure a lease time for current VLAN interface  
Operation  
Command  
Configure a lease time for DHCP dhcp server expired { day day [ hour  
address pool of current VLAN interface  
hour [ minute minute ] ] | unlimited }  
Restore the lease time of DHCP address  
pool of current VLAN interface to the undo dhcp server expired  
default value  
III. Configuring a lease time for multiple VLAN interfaces  
Perform the following configuration in system view.  
Table 13-12 Configure a lease time for multiple VLAN interfaces  
Operation  
Command  
dhcp server expired { day day [ hour  
hour [ minute minute ] ] | unlimited }  
{ interface vlan-interface vlan_id [ to  
vlan-interface vlan_id ] | all }  
Configure a lease time for DHCP  
address pools of multiple VLAN  
interfaces  
13-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Operation  
Command  
Restore the lease time of DHCP address undo dhcp server expired { interface  
pools of multiple VLAN interfaces to the vlan-interface vlan_id to  
default value vlan-interface vlan_id ] | all }  
[
The default lease times for global address pools and VLAN interface address pools are  
all one day.  
13.3.5 Configuring DHCP Client Domain Names  
You can configure a domain name used by DHCP clients for each address pool on a  
DHCP server.  
I. Configuring a DHCP client domain name for a global DHCP address pool  
Perform the following configuration in DHCP address pool view.  
Table 13-13 Configure a DHCP client domain name for a global DHCP address pool  
Operation  
Command  
Configure a DHCP client domain name for a  
global DHCP address pool  
domain-name domain-name  
Remove the DHCP client domain name  
configured for a global DHCP address pool  
undo domain-name  
II. Configuring a DHCP client domain name for current VLAN interface  
Perform the following configuration in VLAN interface view.  
Table 13-14 Configure a DHCP client domain name for current VLAN interface  
Operation  
Command  
server  
domain-name  
domain-name  
dhcp  
Configure a DHCP client domain name for the DHCP  
address pool of the current VLAN interface  
Remove the DHCP client domain name configured for undo dhcp server  
the DHCP address pool of the current VLAN interface  
domain-name  
III. Configuring a DHCP client domain name for multiple VLAN interfaces  
Perform the following configuration in system view.  
13-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Table 13-15 Configure a DHCP client domain name for multiple VLAN interfaces  
Operation  
Command  
server  
dhcp  
domain-name  
interface  
Configure a DHCP client domain name  
for DHCP address pools of multiple  
VLAN interfaces  
domain-name  
vlan-interface  
{
vlan_id  
[
to  
vlan-interface vlan_id ] | all }  
undo dhcp server domain-name  
Remove the DHCP client domain name  
configured for DHCP address pools of  
multiple VLAN interfaces  
domain-name  
vlan-interface  
{
interface  
to  
vlan_id  
[
vlan-interface vlan_id ] | all }  
By default, global address pools and VLAN interface address pools are not configured  
with any DHCP client domain name.  
If you execute the dhcp server domain-name command multiple times, the newly  
configured DHCP client domain name overwrites the existing one.  
13.3.6 Configuring DNS Server Address for DHCP Clients  
When a host uses a domain name to access the Internet, the domain name must be  
translated into an IP address. Domain name system (DNS) is responsible for the  
translation. Therefore, when a DHCP server assigns an IP address to a DHCP client, it  
must also send a DNS server address to the client. At present, you can configure up to  
eight DNS server addresses for one DHCP address pool.  
I. Configuring DNS server address for a global DHCP address pool  
Perform the following configuration in DHCP address pool view.  
Table 13-16 Configure DNS server address for a global DHCP address pool  
Operation  
Command  
Configure one or more DNS server  
addresses for a global DHCP address pool  
dns-list ip-address [ ip-address ]  
Remove one or all DNS server addresses  
configured for a global DHCP address pool  
undo dns-list { ip-address | all }  
II. Configuring DNS server address for current VLAN interface  
Perform the following configuration in VLAN interface view.  
13-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Table 13-17 Configure DNS server address for current VLAN interface  
Operation  
Command  
Configure one or more DNS server  
addresses for the DHCP address pool of the  
current VLAN interface  
dhcp server dns-list ip-address  
[ ip-address ]  
Remove one or all DNS server addresses  
configured for the DHCP address pool of the  
current VLAN interface  
undo dhcp server dns-list  
{ ip-address | all }  
III. Configuring DNS server address for multiple VLAN interfaces  
Perform the following configuration in system view.  
Table 13-18 Configure DNS server address for multiple VLAN interfaces  
Operation  
Command  
dhcp server dns-list ip-address  
[ ip-address ] { interface vlan-interface  
vlan_id [ to vlan-interface vlan_id ] |  
all }  
Configure one or more DNS server  
addresses for the DHCP address pools  
of multiple VLAN interfaces  
Remove one or all DNS server  
addresses configured for the DHCP  
address pools of multiple VLAN  
interfaces  
undo dhcp server dns-list { ip-address  
| all } { interface vlan-interface vlan_id  
[ to vlan-interface vlan_id ] | all }  
By default, no DNS server address is configured for global and VLAN interface address  
pools.  
If you execute the dhcp server dns-list command multiple times, the newly configured  
IP addresses overwrite the existing ones.  
13.3.7 Configuring NetBIOS Server Address for DHCP Clients  
For clients running a Windows operating system and communicating through the  
NetBIOS protocol, translations between host name and IP address are carried out by  
Windows Internet Naming Service (WINS) servers. So you need to perform  
configurations concerning WINS for these clients. At present, you can configure up to  
eight NetBIOS server addresses for a DHCP address pool.  
I. Configuring NetBIOS server address for a global DHCP address pool  
Perform the following configuration in DHCP address pool view.  
13-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Table 13-19 Configure NetBIOS server address for a global DHCP address pool  
Operation  
Command  
Configure one or more NetBIOS server  
addresses for a global DHCP address pool  
nbns-list ip-address [ ip-address ]  
Remove one or all NetBIOS server addresses  
configured for a global DHCP address pool  
undo nbns-list { ip-address | all }  
II. Configuring NetBIOS server address for current VLAN interface  
Perform the following configuration in VLAN interface view.  
Table 13-20 Configure NetBIOS server address for current VLAN interface  
Operation  
Command  
Configure one or more NetBIOS server  
addresses for the DHCP address pool of  
current VLAN interface  
dhcp server nbns-list ip-address  
[ ip-address ]  
Remove one or all NetBIOS server  
addresses configured for the DHCP address  
pool of the current VLAN interface  
undo dhcp server nbns-list  
{ ip-address | all }  
III. Configuring NetBIOS server address for multiple VLAN interfaces  
Perform the following configuration in system view.  
Table 13-21 Configure NetBIOS server address for multiple VLAN interfaces  
Operation  
Command  
dhcp server nbns-list ip-address  
[ ip-address ] { interface vlan-interface  
vlan_id [ to vlan-interface vlan_id ] |  
all }  
Configure one or more NetBIOS server  
addresses for the DHCP address pools  
of multiple VLAN interfaces  
Remove one or all NetBIOS server undo  
addresses configured for the DHCP ip-address  
address pools of multiple VLAN vlan-interface  
interfaces vlan-interface vlan_id ] | all }  
dhcp  
server  
all  
vlan_id  
nbns-list  
interface  
{
|
}
{
[
to  
By default, no NetBIOS server address is configured for global and VLAN interface  
address pools.  
If you execute the dhcp server nbns-list command multiple times, the newly  
configured IP addresses overwrite the existing ones.  
13-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
13.3.8 Configuring NetBIOS Node Type for DHCP Clients  
For DHCP clients communicating in wide area network (WAN) by NetBIOS protocol,  
the mapping between their host names and IP addresses must be established.  
According to the ways they establish their mappings, NetBIOS nodes fall into the  
following four types:  
z
z
z
z
b-node: Nodes of this type establish their mappings by broadcasting. (b stands for  
broadcast.)  
p-node: Nodes of this type establish their mappings by communicating with  
NetBIOS server. (p stands for peer-to-peer.)  
m-node: Nodes of this type are p nodes which take some broadcast features. (m  
stands for mixed.)  
h-node: Nodes of this type are b nodes which take peer-to-peer mechanism. (h  
stands for hybrid.)  
I. Configuring NetBIOS node type for a global DHCP address pool  
Perform the following configuration in DHCP address pool view.  
Table 13-22 Configure a NetBIOS node type for a global DHCP address pool  
Operation  
Command  
Configure the NetBIOS node type for a netbios-type { b-node | h-node |  
global DHCP address pool  
m-node | p-node }  
Cancel the NetBIOS node type configuration  
for a global DHCP address pool  
undo netbios-type  
II. Configuring NetBIOS node type for current VLAN interface  
Perform the following configuration in VLAN interface view.  
Table 13-23 Configure a NetBIOS node type for current VLAN interface  
Operation  
Command  
Configure the NetBIOS node type for  
DHCP clients of the current VLAN  
interface DHCP address pool  
dhcp server netbios-type { b-node |  
h-node | m-node | p-node }  
Remove NetBIOS node type configured  
for DHCP clients of the current VLAN undo dhcp server netbios-type  
interface DHCP address pool  
III. Configuring NetBIOS node type for multiple VLAN interfaces  
Perform the following configuration in system view.  
13-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Table 13-24 Configure a NetBIOS node type for multiple VLAN interfaces  
Operation  
Command  
dhcp server netbios-type { b-node |  
h-node | m-node | p-node } { interface  
Configure NetBIOS node types for  
DHCP clients of multiple VLAN interface  
DHCP address pools  
vlan-interface  
vlan_id  
[
to  
vlan-interface vlan_id ] | all }  
Remove  
configurations  
interface DHCP address pools  
NetBIOS  
of  
node  
multiple  
type undo dhcp server netbios-type  
VLAN { interface vlan-interface vlan_id [ to  
vlan-interface vlan_id ] | all }  
By default, the DHCP clients of global and VLAN interface address pools are all of  
h-node type.  
13.3.9 Configuring Custom DHCP Options  
With the evolvement of DHCP, new options come forth continuously. To utilize these  
options, you can manually add them to the property list of a DHCP server.  
I. Configuring custom DHCP options for a global DHCP address pool  
Perform the following configuration in DHCP address pool view.  
Table 13-25 Configure a custom DHCP options for a global DHCP address pool  
Operation  
Command  
option code { ascii ascii-string | hex  
hex-string | ip-address ip-address  
[ ip-address ] }  
Configure a custom DHCP option for a  
global DHCP address pool  
Remove a custom DHCP option configured  
for a global DHCP address pool  
undo option code  
II. Configuring custom DHCP options for current VLAN interface  
Perform the following configuration in VLAN interface view.  
Table 13-26 Configure custom DHCP options for current VLAN interface  
Operation  
Command  
Configure a custom DHCP option for dhcp server option code { ascii  
DHCP address pool of the current VLAN ascii-string | hex hex-string | ip-address  
interface  
ip-address [ ip-address ] }  
Remove  
a
custom DHCP option  
configured for the DHCP address pool of undo dhcp server option code  
the current VLAN interface  
13-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
III. Configuring custom DHCP options for multiple VLAN interfaces  
Perform the following configuration in system view.  
Table 13-27 Configure custom DHCP options for multiple VLAN interfaces  
Operation  
Command  
dhcp server option code { ascii  
Configure a custom DHCP option for ascii-string | hex hex-string | ip-address  
DHCP address pools of multiple VLAN ip-address [ ip-address ] } { interface  
interfaces  
vlan-interface  
vlan_id  
[
to  
vlan-interface vlan_id ] | all }  
Remove  
a
custom DHCP option undo dhcp server option code  
configured for DHCP address pools of { interface vlan-interface vlan_id [ to  
multiple VLAN interfaces vlan-interface vlan_id ] | all }  
If you execute the dhcp server option command multiple times, the newly configured  
option overwrites the existing one.  
13.3.10 Configuring Outbound Gateway Address for DHCP Clients  
An outbound gateway enables DHCP clients to access external network devices.  
Packets destined for external networks are forwarded by outbound gateways. At  
present, you can configure up to eight IP addresses for outbound gateways.  
Perform the following configuration in DHCP address pool view.  
Table 13-28 Configure outbound gateway address for DHCP clients  
Operation  
Command  
Configure one or more outbound  
gateway addresses for DHCP clients  
gateway-list ip-address [ ip-address ]  
Remove one or all outbound gateway  
addresses configured for DHCP clients  
undo gateway-list { ip-address | all }  
By default, no outbound gateway address is configured for DHCP clients.  
If you execute the gateway-list command multiple times, the newly configured IP  
addresses overwrite the existing ones.  
13.3.11 Configuring Parameters for DHCP Server to Send Ping Packets  
To avoid address conflict caused by reassigning an in-use IP address, before assigning  
an IP address to a DHCP client, the DHCP server detects the network using the ping  
instructions to ensure the IP address is not occupied. The DHCP server determines  
whether an IP address is reachable by sending specified number of ping packets. It  
waits for response packet for a specified period after sending each of these packets. If  
13-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
the DHCP server receives no response after sending all these packets, it considers the  
IP address is not used by other devices in this network and assigns the IP address to  
this DHCP client. Otherwise, it does not assign the IP address.  
Perform the following configuration in system view.  
Table 13-29 Configure parameters for DHCP server to send ping packets  
Operation  
Command  
Set the maximum number of ping  
packets the DHCP is allowed to send  
dhcp server ping packets number  
undo dhcp server ping packets  
Revert to the default maximum number  
Set the maximum duration for the DHCP  
server to wait for response to a ping dhcp server ping timeout milliseconds  
packet  
Revert to the default maximum duration undo dhcp server ping timeout  
By default, the DHCP server sends up to 2 ping packets to test an IP address and waits  
for a response for up to 500 milliseconds before it sends another ping packet.  
Note that the DHCP server detects address conflict by ping packets, whereas a DHCP  
client does this by ARP packets.  
13.3.12 Displaying and Debugging the DHCP Server  
After the above configuration, yYou can execute the display command in any view to  
display operating information about the DHCP server to verify your configuration, and  
execute the debugging command to enable debugging for the DHCP server  
Execute the following command in any view.  
Table 13-30 Display the configuration information about the DHCP server  
Operation  
Command  
Display the statistics about DHCP display dhcp server conflict { all | ip  
address conflicts  
ip-address }  
Display information about lease-expired  
addresses in DHCP address pool(s).  
The lease-expired IP addresses in an display dhcp server expired { ip  
address pool are assigned to other ip-address | pool [ pool-name ] |  
DHCP clients as needed if the address interface [ vlan-interface vlan_id ] | all }  
pool runs out of its available IP  
addresses  
Display the ranges of available  
(unassigned) IP addresses in DHCP display dhcp server free-ip  
address pools  
13-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Operation  
Command  
display dhcp server ip-in-use { ip  
ip-address | pool [ pool-name ] |  
interface [ vlan-interface vlan_id ] | all }  
Display the information about IP address  
binding in DHCP address pool(s)  
Display the statistics about the DHCP  
server  
display dhcp server statistics  
Display the information about the display dhcp server tree { pool  
tree-like structure of DHCP address  
pool(s)  
[
pool-name  
]
|
interface  
[ vlan-interface vlan_id ] | all }  
Perform the following configuration in user view.  
Table 13-31 Enable/Disable debugging for the DHCP server  
Operation  
Command  
undo debugging dhcp server { all |  
error | event | packet }  
Disable debugging for the DHCP server  
debugging dhcp server { all | error |  
event | packet }  
Enable debugging for the DHCP server  
13.3.13 Clearing the Configuration Information of the DHCP Server  
You can clear the configuration information of the DHCP server by executing the reset  
command in user view.  
Perform the following configuration in user view.  
Table 13-32 Clear the configuration information of the DHCP server  
Operation  
Command  
Clear the statistics about DHCP address reset dhcp server conflict  
{
ip  
conflicts  
ip-address | all }  
reset dhcp server ip-in-use{ all |  
interface [ vlan-interface vlan_id ] | ip  
ip-address | pool [ pool-name ] }  
Clear the information about dynamically  
bound DHCP addresses  
Clear the statistics about the DHCP  
server  
reset dhcp server statistics  
13.3.14 DHCP Server Configuration Example  
I. Network requirements  
As shown in Figure 13-2, two DHCP clients at the same network segment (10.110.0.0)  
are connected to the following switch through a port in VLAN2. The switch, acting as a  
13-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
DHCP server, is supposed to assign IP addresses to the two DHCP clients without the  
help of any DHCP Relay.  
II. Network diagram  
client  
DHCP client  
DHCP  
10.110.0.0  
Ethernet  
10.110.1.1  
Sw itc h ( DHCP Server)  
Figure 13-2 Network diagram for DHCP server  
III. Configuration procedure  
Enter system view.  
<SW8800>system-view  
Create VLAN2.  
[SW8800]vlan 2  
Enter VLAN interface view and create Vlan-interface 2.  
[SW8800]interface Vlan-interface 2  
Assign an IP address to Vlan-interface 2.  
[SW8800-Vlan-interface2]ip address 10.110.1.1 255.255.0.0  
Specify to assign IP addresses in the interface address pool to DHCP clients.  
[SW8800-Vlan-interface2]dhcp select interface  
Specify to assign IP addresses in global address pool to DHCP clients (it is also the  
default configuration).  
[SW8800-Vlan-interface2]dhcp select global  
Or execute the following command to revert to the default.  
[SW8800-Vlan-interface2]undo dhcp select  
Configure a global address pool.  
[8505Tlhy]dhcp server ip-pool 1  
[8505Tlhy-dhcp-1]network 10.110.0.0 mask 255.255.0.0  
[8505Tlhy-dhcp-1]gateway-list 10.110.1.1  
13-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
13.4 Configuring DHCP Relay  
13.4.1 Introduction to DHCP Relay  
This is a world where networks are ever-growing in both size and complexity, and the  
network configuration is getting more and more complex. As is often the case, the  
number of hosts in a network exceeds that of the available IP addresses, and position  
changes of hosts (when users carry their laptops from here to there, or move to a  
wireless network) require reassigned new IP addresses. Dynamic host configuration  
protocol (DHCP) is designed to accommodate this context. DHCP adopts client/server  
model, where DHCP clients send requests to the DHCP server dynamically and the  
DHCP server in turn returns corresponding configuration information according to the  
policies configured for it.  
Early implementations of DHCP only work when DHCP clients and DHCP servers are  
in the same subnet. That is, they cannot work across networks. So, to implement  
dynamic host configuration, you must deploy at least one DHCP server in each subnet,  
and this is obviously uneconomical. DHCP Relay is designed to resolve this problem.  
Through a DHCP relay, DHCP clients in a LAN can communicate with DHCP servers in  
other subnets to acquire IP addresses. This enables DHCP clients of multiple networks  
to share a common DHCP server and thus enables you to save your cost and perform  
centralized administration. Figure 13-3 illustrates a typical DHCP Relay application.  
DHCP client  
DHCP client  
Ethernet  
Internet  
Sw itch ( DHCP Relay)  
DHCP client  
DHCP client  
DHCP Server  
Figure 13-3 Network diagram for DHCP Relay  
The dynamic host configuration procedure with DHCP relay is as follows:  
z
z
z
A DHCP client broadcasts configuration request packet in the local network when  
it starts up and initializes the configuration.  
If a DHCP server exists in the network, it processes the configuration request  
packet directly without the help of a DHCP Relay.  
If no DHCP server exists in the network, the network device serving as a DHCP  
Relay in the network appropriately processes the configuration request packet  
and forwards it to a specified DHCP server located in another network.  
13-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
z
After receiving the packet, the DHCP server generates configuration information  
accordingly and sends it to the DHCP client through the DHCP Relay to complete  
the dynamic configuration of the DHCP client.  
Note that the entire configuration procedure may goes through multiples times of such  
interactions.  
13.4.2 Configuring DHCP Relay  
DHCP Relay configuration includes the following: The following text describes the  
DHCP Relay configuration tasks:  
z
z
z
z
Enabling/Disabling fake DHCP server detecting  
I. Configuring a DHCP server for a VLAN interface  
You can execute the ip relay address command to configure the DHCP packet  
processing mode on VLAN interface as relay and a corresponding DHCP server for a  
VLAN interface.  
Perform the following configuration in VLAN interface view.  
Table 13-33 Configure a corresponding DHCP server for a VLAN interface  
Operation  
Command  
Configure a corresponding DHCP server  
for current VLAN interface  
ip relay address ip_address  
Remove the DHCP server configured for undo ip relay address { ip_address |  
current VLAN interface all }  
No DHCP server is configured for a VLAN interface by default.  
Note that when configuring a new DHCP server for a VLAN that already has a DHCP  
server configured for it, the newly configured one does not overwrite the existing ones.  
Both the new and the old ones are valid. You can configure up to 20 DHCP server  
addresses for a VLAN interface.  
II. Configure user address entries for a DHCP Server  
In a VLAN that has DHCP Relay configured, to enable a DHCP client using a legal fixed  
IP address to pass the address checking of the DHCP security feature, you must add a  
static address entry for the DHCP client. A static address entry indicates the relation  
between a fixed IP address and a MAC address.  
Perform the following configuration in system view.  
13-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Table 13-34 Configure user address entries for DHCP server  
Operation  
Command  
Add a user address entry for DHCP dhcp relay security ip_address  
server  
mac_address static  
Remove a user address entry for DHCP  
server  
undo dhcp relay security ip_address  
III. Enable/Disable DHCP security on a VLAN interface  
If you enable the DHCP security feature on a VLAN interface, the switch performs user  
address checking on the VLAN interface to prevent unauthorized binding request. If  
you disable the DHCP security feature on a VLAN interface, the switch does not  
perform user address checking on the VLAN interface.  
Perform the following configuration in VLAN interface view.  
Table 13-35 Enable/disable DHCP security on a VLAN interface  
Operation  
Command  
Enable DHCP security on a VLAN dhcp relay security address-check  
interface  
enable  
Disable DHCP security on a VLAN dhcp relay security address-check  
interface  
disable  
DHCP security is disabled on a VLAN interface by default.  
13.4.3 Displaying and Debugging DHCP Relay  
After the above configuration, you can execute the display command in any view to  
display running information about DHCP Relay to verify your configuration.  
Execute the debugging command in user view to debug DHCP Relay.  
Table 13-36 Display and debug DHCP Relay  
Operation  
Command  
Display information about the  
DHCP servers configured for  
VLAN interface  
display dhcp relay address  
vlan-interface vlan-id | all }  
{
interface  
Display information about  
legal user address entries for display dhcprelay-security [ ip_address ]  
DHCP server  
Enable debugging for DHCP debugging dhcp relay { all| packet | error |  
Relay  
event }  
13-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
Operation  
Command  
Disable debugging for DHCP undo debugging dhcp relay { all| packet | error |  
Relay event }  
13.4.4 DHCP Relay Configuration Example  
I. Network requirements  
As shown in Figure 13-4, two DHCP clients located at the same network segment  
(10.110.0.0) are connected to a switch through a port in VLAN 2. The switch, acting as  
a DHCP relay, is supposed to forward DHCP packets between the two DHCP clients  
and the DHCP server with the IP address of 202.38.1.2.  
II. Network diagram  
DHCP client  
DHCP client  
DHCP Server  
202.38.1.2  
10.110.0.0  
Ethernet  
10.110.1.1  
202.38.1.1  
Internet  
Ethernet  
202.38.0.0  
Sw itc h ( DHCP Relay )  
Figure 13-4 Network diagram for DHCP Relay  
III. Configuration procedure  
Enter system view.  
<SW8800>system-view  
Create VLAN 2.  
[SW8800]vlan 2  
Create Vlan-interface 2 and enter VLAN interface view.  
[SW8800]interface Vlan-interface 2  
Assign an IP address to Vlan-interface 2.  
[SW8800-Vlan-interface2]ip address 10.110.1.1 255.255.0.0  
Specify to forward DHCP packets to a remote DHCP server.  
[SW8800-Vlan-interface2]dhcp select relay  
Configure the IP address of the DHCP server to which VLAN 2 sends DHCP packets.  
13-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 13 DHCP Configuration  
[SW8800-Vlan-interface2]ip relay address 202.38.1.2  
Note:  
Besides the above configurations for DHCP Relay, you need to configure address pool  
on the DHCP server and make sure the DHCP server and the switch interface  
connecting the two DHCP clients is routing reachable with each other.  
13-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 14 DNS Configuration  
Chapter 14 DNS Configuration  
14.1 Introduction to DNS  
Used in the TCP/IP application, Domain Name System (DNS) is a distributed database  
which provides the translation between domain name and the IP address. In this way,  
the user can use domain names that are easy to memorize and meaningful, and never  
needs to keep obscure IP addresses in mind.  
There are two kinds of domain name resolutions: static domain name resolution and  
dynamic domain name resolution, which supplement each other in real application. On  
resolving a domain name, use the static resolution first. If it fails, use the dynamic  
resolution method. You can put some common domain names into the static domain  
name resolution table to raise the domain name resolution efficiency greatly.  
14.1.1 Static Domain Name Resolution  
Static domain resolution is to establish maps between domain name and the IP address  
manually. When you perform some applications using domain names, the system can  
obtain the IP address of the specified domain name by searching the static domain  
name resolution table.  
14.1.2 Dynamic Domain Name Resolution  
Dynamic domain name resolution is implemented by inquiring the domain name server.  
As a DNS client, the switch sends an inquiry request to the domain name server, and  
the domain name server searches the related IP address of the domain name in its own  
database and sends it back to the switch. If the domain name server judges that the  
domain name does not belong to the local domain, it forwards the request to the upper  
level domain name resolution server till the resolution is finished.  
Dynamic domain name resolution supports the buffer function. It stores each  
successful domain name/IP address mapping that is resolved dynamically in the  
dynamic domain name buffer. When the same domain name is searched next time, it  
can be read directly from the buffer, without requesting the domain name server. The  
aged mapping in the buffer is deleted after a certain period of time to ensure the  
updated contents can be got from the domain name server timely. The aging time is set  
by the domain name server and obtained by the switch from the protocol packet.  
Dynamic domain name resolution supports the domain name suffix list function. You  
can set some domain name suffixes beforehand and input part of the domain name  
field during the domain name resolution, then the system adds different suffixes to the  
input domain name automatically for resolution. For example, if a user wants to search  
the domain name “3Com.com”, he can configure the “com” in the suffix list and input  
14-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 14 DNS Configuration  
“3Com”. Then the system connects the input domain name with the suffix into  
“3Com.com” automatically to search. When the domain name suffix is used, if the input  
domain name does not include “.”, like “3Com”, the system regards it as a host name  
and add a domain name suffix to search. After all the domain names are failed to be  
searched out in this way, the system finally searches with the primarily input domain  
name. If the input domain name does include “.”, like “www.3Com”, the system  
searches with it directly. The system adds each suffix to search one by one only after  
the search fails. If the input domain name contains a “.” in the final position, like  
“3Com.com.”, it indicates that the domain name suffix needs not to be added. The  
system removes the last “.” from the input domain name and search with the remaining  
part. Succeeded or not, the system returns to the originally input domain name. Put it  
more specifically, if the last character of the input domain name is “.”, the system only  
searches according to characters before the “.” rather than matches the domain name.  
In this sense, the last “.” is also called “search terminator”.  
14.2 Configuring Static Domain Name Resolution  
You can use this command to map the host name to the host IP address. When you use  
applications like Telnet, you can use the host name directly, and the system translates it  
into the IP address, rather than the obscure IP address.  
Perform the following configuration in system view.  
Table 14-1 Configure host name and the corresponding IP address  
Operation  
Command  
Configure host name and the  
corresponding IP address  
ip host hostname ip-address  
Cancel  
corresponding IP address  
host  
name  
and  
the  
undo ip host hostname [ ip-address ]  
Each host can have only one IP address. If you configure a host name more than once,  
then the IP address configured at last is effective.  
14.3 Configuring Dynamic Domain Name Resolution  
Dynamic domain name resolution configuration includes:  
z
z
z
14.3.1 Enable/Disable Static Domain Name Resolution  
You can use the following command to enable dynamic domain name resolution.  
However, since dynamic domain name resolution may take some time, you can disable  
14-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 14 DNS Configuration  
this function when you do not want to perform dynamic domain name resolution  
sometimes.  
Perform the following configuration in system view.  
Table 14-2 Enable/disable dynamic domain name resolution  
Operation  
Command  
dns resolve  
undo dns resolve  
Enable dynamic domain name resolution  
Disable dynamic domain name resolution  
By default, dynamic domain name resolution is disabled.  
14.3.2 Configure the IP Address of Domain Name Server  
You are required to configure the domain name sever if you need to use the function of  
the dynamic domain name resolution. In this way, you can send the inquiry request  
packets to the appropriate sever. The system supports up to six domain name severs.  
Perform the following configuration in system view.  
Table 14-3 Configure the IP address of the domain name sever  
Operation  
Command  
dns server ip-address  
Configure the IP address of the domain  
name sever  
Delete the IP address of the domain  
name sever  
undo dns server [ ip-address ]  
14.3.3 Configure Domain Name Suffix  
You can use the following command to configure domain name suffix list. By  
configuring this, you can just input part of the domain name and the system  
automatically adds the preconfigured suffix to perform the resolution. The system  
supports up to 10 domain name suffixes.  
Perform the following configuration in system view.  
Table 14-4 Configure domain name suffix  
Operation  
Configure domain name suffix  
Delete domain name suffix  
Command  
dns domain domain-name  
undo dns domain [ domain-name ]  
14-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 14 DNS Configuration  
14.4 Displaying and Debugging Domain Name Resolution  
After the above configuration, you can execute the display command in any view to  
view the running states of the domain name resolution, and verify the configuration  
results through the displayed information.  
Execute the reset command in user view to clear the dynamic domain name buffer.  
Execute the debugging command to debug the domain name resolution.  
Table 14-5 Display and debug the domain name resolution  
Operation  
Command  
display ip host  
Display the static domain name  
resolution table  
Display the information on domain name  
sever  
display dns server [ dynamic ]  
display dns domain [ dynamic ]  
Display the information on domain name  
suffix list  
Display the information on the dynamic  
domain name buffer  
display dns dynamic-host  
reset dns dynamic-host  
debugging dns  
Clear dynamic domain name buffer  
Enable the debugging for the domain  
name resolution  
Disable the debugging for the domain  
name resolution  
undo debugging dns  
14.5 DNS Configuration Example  
I. Network requirements  
As the client, the switch uses dynamic domain name resolution. The IP address of the  
domain name server is 172.16.1.1. The configured suffix of the domain name is “com”.  
There is a route between the switch and the server.  
II. Network diagram  
172.16.1.1  
Internet  
DNS Server  
Switch  
Figure 14-1 Network diagram for DNS client  
14-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 14 DNS Configuration  
III. Configuraiton procedure  
Enable dynamic domain name resolution  
[SW8800] dns resolve  
Configure the IP address of the domain name server to 172.16.1.1.  
[SW8800] dns server 172.16.1.1  
Configure the domain name suffix as com.  
[SW8800] dns domain com  
Ping a host with the specified domain name.  
[SW8800] ping ftp  
Trying DNS server (172.16.1.1)  
PING ftp.com (200.200.200.200): 56 data bytes, press CTRL_C to break  
Reply from 200.200.200.200: bytes=56 Sequence=1 ttl=128 time=2 ms  
Reply from 200.200.200.200: bytes=56 Sequence=2 ttl=128 time=2 ms  
Reply from 200.200.200.200: bytes=56 Sequence=3 ttl=128 time=2 ms  
Reply from 200.200.200.200: bytes=56 Sequence=4 ttl=128 time=2 ms  
Reply from 200.200.200.200: bytes=56 Sequence=5 ttl=128 time=2 ms  
--- ftp.com ping statistics ---  
5 packet(s) transmitted  
5 packet(s) received  
0.00% packet loss  
round-trip min/avg/max = 2/2/2 ms  
The routing configuration between the switch and the domain name sever is omitted  
here, and refer to the related chapter for the configuration.  
14.6 Troubleshooting Domain Name Resolution  
Configuration  
Fault: Domain name resolution fails.  
Troubleshoot: Perform the following procedures:  
z
z
z
Check whether the domain name resolution function is enabled.  
Check whether the IP address of the domain name sever is correctly configured.  
Check whether there is a correct route between the domain name sever and the  
switch.  
z
Check whether there is network connection failure, such as network cable break,  
loose connection, and so on.  
14-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 15 IP Performance Configuration  
Chapter 15 IP Performance Configuration  
15.1 Configuring IP Performance  
IP performance configuration includes:  
z
15.1.1 Configuring TCP Attributes  
TCP attributes that can be configured include:  
z
z
z
synwait timer: When sending the syn packets, TCP starts the synwait timer. If  
response packets are not received before synwait timeout, the TCP connection is  
terminated. The timeout of synwait timer ranges from 2 to 600 seconds and it is 75  
seconds by default.  
finwait timer: When the TCP connection state turns from FIN_WAIT_1 to  
FIN_WAIT_2, finwait timer is started. If FIN packets are not received before finwait  
timer timeout, the TCP connection is terminated. The timeout of finwait timer  
ranges from 76 to 3600 seconds and it is 675 seconds by default.  
The receiving/sending buffer size of the connection-oriented socket is in the range  
from 1 to 32 KB and is 8 KB by default.  
Perform the following configuration in System view.  
Table 15-1 Configure TCP attributes  
Operation  
Command  
Configure timeout time for the synwait  
timer in TCP  
tcp timer syn-timeout time-value  
undo tcp timer syn-timeout  
tcp timer fin-timeout time-value  
undo tcp timer fin-timeout  
tcp window window-size  
Restore the default timeout time of the  
synwait timer  
Configure timeout time for the  
FIN_WAIT_2 timer in TCP  
Restore the default timeout time of the  
FIN_WAIT_2 timer  
Configure the socket receiving/sending  
buffer size of TCP  
Restore the socket receiving/sending  
buffer size of TCP to default value  
undo tcp window  
15-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 15 IP Performance Configuration  
15.2 Displaying and Debugging IP Performance  
After the above configuration, execute the display command in any view to display the  
running of the IP performance configuration, and to verify the effect of the configuration.  
Execute the reset command in user view to clear IP, TCP and UDP statistics  
information.  
Execute the debugging command to debug IP performance.  
Table 15-2 Display and debug IP performance  
Operation  
Command  
display tcp status  
Display TCP connection state  
Display TCP connection statistics data  
Display UDP statistics information  
Display IP statistics information  
Display ICMP statistics information  
display tcp statistics  
display udp statistics  
display ip statistics  
display icmp statistics  
Display the current socket information of display ip socket  
[
socktype  
the system  
sock-type ] [ task-id socket-id ]  
Display the summary of the Forwarding  
Information Base (FIB)  
display fib  
display fib ip_address1 [ { mask1 |  
mask-length1 } [ ip_address2 { mask2 |  
mask-length2 } | longer ] | longer ]  
Display the FIB entries matching the  
destination IP address (range)  
Display the FIB entries matching a  
specific ACL  
display fib acl { number | name }  
Display the FIB entries which are output  
from the buffer according to regular display fib | { { begin | include |  
expression and related to the specific exclude } text }  
character string  
Display the FIB entries matching the  
display fib ip-prefix listname  
specific prefix list  
Display the total number of FIB entries  
Reset IP statistics information  
display fib statistics  
reset ip statistics  
Reset TCP statistics information  
Reset UDP statistics information  
Enable the debugging of IP packets  
Disable the debugging of IP packets  
reset tcp statistics  
reset udp statistics  
debugging ip packet [ acl acl-number ]  
undo debugging ip packet  
Enable the debugging of ICMP packets debugging ip icmp  
Disable the debugging of ICMP packets undo debugging ip icmp  
15-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 15 IP Performance Configuration  
Operation  
Command  
Enable the debugging of UDP debugging udp packet  
connections socket-id ]  
[
task-id  
Disable the debugging of UDP undo debugging udp packet [ task-id  
connections socket-id ]  
Enable the debugging of TCP debugging tcp packet  
connections socket-id ]  
[
task-id  
Disable the debugging of TCP undo debugging tcp packet [ task-id  
connections  
socket-id ]  
debugging tcp event  
socket-id ]  
[
task-id  
Enable the debugging of TCP events  
undo debugging tcp event [ task-id  
socket-id ]  
Disable the debugging of TCP events  
Enable the debugging of the MD5  
authentication  
debugging tcp md5  
Disable the debugging of the MD5  
authentication  
undo debugging md5  
15.3 Troubleshooting IP Performance  
Fault: IP layer protocol works normally but TCP and UDP cannot work normally.  
Troubleshoot: In the event of such a fault, you can enable the corresponding debugging  
information output to view the debugging information.  
z
z
z
Use the display command to view the running information of IP performance and  
make sure that the PCs used by the user is running normally.  
Use the terminal debugging command to output the debugging information to  
the console.  
Use the debugging udp packet command to enable the UDP debugging to trace  
the UDP packet.  
The following are the UDP packet formats:  
UDP output packet:  
Source IP address:202.38.160.1  
Source port:1024  
Destination IP Address 202.38.160.1  
Destination port: 4296  
task = ROUT(15)  
socketid = 6,  
src = 192.168.1.1:520,  
dst = 255.255.255.255:520,  
datalen = 24  
15-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 15 IP Performance Configuration  
z
Use the debugging tcp packet command to enable the TCP debugging to trace  
the TCP packets.  
Operations include:  
<SW8800> terminal debugging  
<SW8800> debugging tcp packet  
Then the TCP packets received or sent can be checked in real time. Specific packet  
formats include:  
TCP output packet:  
Source IP address:202.38.160.1  
Source port:1024  
Destination IP Address 202.38.160.1  
Destination port: 4296  
Sequence number :4185089  
Ack number: 0  
Flag :SYN  
Packet length :60  
Data offset: 10  
task = ROUT(15)  
socketid = 5  
state = Established  
src = 172.16.1.2  
Source port:1025  
dst = 172.16.1.1  
Destination port: 4296  
seq = 1921836502  
ack = 4192768493  
flag = ACK  
window = 16079  
15-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 16 IP Routing Protocol Overview  
Chapter 16 IP Routing Protocol Overview  
Note:  
A router that is referred to in the following or its icon represents a generalized router or  
a Switch 8800 running routing protocols. To improve readability, this will not be  
described in the other parts of the manual.  
For the configuration of VPN instance, refer to the MPLS chapter in this book.  
16.1 Introduction to IP Route and Routing Table  
16.1.1 IP Route and Route Segment  
Routers are implemented for route selection in the Internet. A router works in the  
following way: The router selects an appropriate path (through a network) according to  
the destination address of the packet it receives and forwards the packet to the next  
router. The last router in the path is responsible for submitting the packet to the  
destination host.  
In Figure 16-1, R stands for a router. A packet sent from Host A to Host C should go  
through two routers and the packet is transmitted through two hops. Therefore, when a  
node (router) is connected to another node through a network, they are in the same  
route segment and are deemed as adjacent in the Internet. That is, the adjacent routers  
refer to two routers connected to the same network. The number of route segments  
between a router and hosts in the same network counted as zero. In Figure 16-1, the  
bold arrows represent these route segments. Which physical links comprise which  
route segment is not a concern of a router however.  
16-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 16 IP Routing Protocol Overview  
A
R
R
A
Route  
segment  
R
R
R
C
B
Figure 16-1 The concept of route segment  
As the networks may have different sizes, the segment lengths connected between two  
different pairs of routers are also different. The number of route segments multiplies a  
weighted coefficient can serve as a weighted measurement for the actual length of the  
signal transmission path.  
If a router in a network is regarded as a node and a route segment in the Internet is  
regarded as a link, message routing in the Internet works in a similar way as the  
message routing in a conventional network. Message routed through the shortest route  
may not always be the optimal route. For example, routing through three high-speed  
LAN route segments may be much faster than that through two low-speed WAN route  
segments.  
16.1.2 Route Selection through the Routing Table  
The key for a router to forward packets is the routing table. Each router saves a routing  
table in its memory, and each entry of this table specifies the physical port of the router  
through which the packet is sent to a subnet or a host. Therefore, it can reach the next  
router via a particular path or reach a destination host via a directly connected network.  
A routing table has the following key entries:  
z
z
Destination address: It is used to identify the destination IP address or the  
destination network of an IP packet.  
Network mask: Combined with the destination address, it is used to identify the  
network address of the destination host or router. If the destination address is  
ANDed with the network mask, you will get the address of the network segment  
where the destination host or router is located. For example, if the destination  
address is 129.102.8.10, the address of the network where the host or the router  
16-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 16 IP Routing Protocol Overview  
with the mask 255.255.0.0 is located will be 129.102.0.0. It is made up of several  
consecutive "1"s, which can also be expressed in the dotted decimal format.  
Output interface: It indicates an interface through which an IP packet should be  
forwarded.  
z
z
z
Next hop address: It indicates the next router that an IP packet will pass through.  
Priority added to the IP routing table for a route: There may be different next hops  
to the same destination. These routes may be discovered by different routing  
protocols, or they can just be the static routes configured manually. The one with  
the highest priority (the smallest numerical value) will be selected as the current  
optimal route.  
z
Path cost: Cost to forward data by the route.  
According to different destinations, the routes can be divided into:  
z
z
Subnet route: The destination is a subnet.  
Host route: The destination is a host  
In addition, according to whether the network of the destination host is directly  
connected to the router, there are the following types of routes:  
z
Direct route: The router is directly connected to the network where the destination  
resides.  
z
Indirect route: The router is not directly connected to the network where the  
destination resides.  
In order to limit the size of the routing table, an option is available to set a default route.  
All the packets that fail to find the suitable entry will be forwarded through this default  
route.  
In a complicated Internet as shown in Figure 16-2, the number in each network is the  
network address, and R stands for a router. The router R8 is connected with three  
networks, so it has three IP addresses and three physical ports, and its routing table is  
shown in the diagram below:  
16.0.0.3  
R7  
16.0.0.2  
16.0.0.0  
R5  
The routing table of router R8  
Destination Forwarding Port  
15.0.0.2  
10.0.0.2  
R6  
host  
passed  
16.0.0.2  
router  
location  
15.0.0.0  
10.0.0.0  
2
1
10.0.0.0  
11.0.0.0  
12.0.0.0  
13.0.0.0  
Directly  
13.0.0.3  
13.0.0.4  
13.0.0.2  
2
Directly  
11.0.0.2  
Directly  
10.0.0.1  
11.0.0.1  
15.0.0.1  
3
8
R
13.0.0.0  
1
3
R2  
1
14.0.0.2  
11.0.0.0  
13.0.0.1  
14.0.0.0  
15.0.0.0  
16.0.0.0  
13.0.0.2  
10.0.0.2  
10.0.0.2  
3
2
2
14.0.0.0  
14.0.0.1  
R3  
12.0.0.2  
12.0.0.0  
R1  
11.0.0.2  
R4  
12.0.0.3  
12.0.0.1  
Figure 16-2 The routing table  
16-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 16 IP Routing Protocol Overview  
The Switch 8800 supports the configuration of a series of dynamic routing protocols  
such as RIP, OSPF, IS-IS and BGP, as well as the static routes. In addition, the running  
switch will automatically obtain some direct routes according to the port state and user  
configuration.  
16.2 Routing Management Policy  
For the Switch 8800, you can configure manually the static route to a specific  
destination, and configure dynamic routing protocol to interact with other routers on the  
network. The routing algorithm can also be used to discover routes. For the configured  
static routes and dynamic routes discovered by the routing protocol, the Switch 8800  
implements unified management. That is, the static routes configured by the user are  
managed together with the dynamic routes discovered by the routing protocol. The  
static routes and the routes learned or configured by different routing protocols can also  
be shared with each other.  
16.2.1 Routing Protocols and the Preferences of the Corresponding Routes  
Different routing protocols (as well as the static configuration) may generate different  
routes to the same destination, but not all these routes are optimal. In fact, at a certain  
moment, only one routing protocol can determine a current route to a specific  
destination. Thus, each of these routing protocols (including the static configuration) is  
set with a preference, and when there are multiple routing information sources, the  
route discovered by the routing protocol with the highest preference will become the  
current route. Routing protocols and the default preferences (the smaller the value is,  
the higher the preference is) of the routes learned by them are shown in Table 16-1.  
In the table, 0 indicates a direct route. 255 indicates any route from unreliable sources.  
Table 16-1 Routing protocols and the default preferences for the routes learned by  
them  
The preference of the corresponding  
Routing protocol or route type  
route  
DIRECT  
OSPF  
0
10  
IS-IS  
15  
STATIC  
RIP  
60  
100  
150  
150  
256  
256  
OSPF ASE  
OSPF NSSA  
IBGP  
EBGP  
16-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 16 IP Routing Protocol Overview  
The preference of the corresponding  
route  
Routing protocol or route type  
UNKNOWN  
255  
Apart from direct routing, IBGP and EBGP, the preferences of various dynamic routing  
protocols can be manually configured to meet the user requirements. In addition, the  
preferences for individual static routes can be different.  
16.2.2 Supporting Load Sharing and Route Backup  
I. Load sharing  
The Switch 8800 supports static equivalent route, permitting to configure multiple  
routes that reach the same destination and use the same precedence. After you  
configured static equivalent routes, a packet can reach the same destination through  
multiple different paths, whose precedence levels are equal. When there is no route  
that can reach the same destination with a higher precedence, the multiple routes will  
be adopted. Thus, the router will forward the packets to the destination through these  
paths according to a certain algorithm so as to implement load sharing.  
For the same destination, a specified routing protocol may find multiple different routes  
with the same precedence and different next hops. If the routing protocol has the  
highest precedence among all active routing protocols, these multiple routes will be  
regarded as currently valid routes. Thus, load sharing of IP traffic is ensured in terms of  
routing protocols.  
The Switch 8800 supports eight routes to implement load sharing.  
II. Route backup  
The Switch 8800 supports route backup. When the main route fails, the system will  
automatically switch to a backup route to improve the network reliability.  
In order to achieve static route backup, the user can configure multiple routes to the  
same destination according to actual situations. One of the routes has the highest  
precedence and is called as main route. The other routes have descending precedence  
levels and are called as backup routes. Normally, the router sends data via main route.  
When the line fails, the main route will hide itself and the router will choose one from the  
left routes as a backup route whose precedence is higher than others’ to send data. In  
this way, the switchover from the main route to the backup route is implemented. When  
the main route recovers, the router will restore it and re-select route. As the main route  
has the highest precedence, the router still chooses the main route to send data. This  
process is the automatic switchover from the backup route to the main route.  
16-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 16 IP Routing Protocol Overview  
16.2.3 Routes Shared Between Routing Protocols  
As the algorithms of various routing protocols are different, different protocols may  
generate different routes, thus bringing about the problem of how to resolve the  
differences when different routes are generated by different routing protocols. The  
Switch 8800 can import the information of another routing protocol. Each protocol has  
its own route importing mechanism. For details, refer to the description about  
"Importing an External Route" in the operation manual of the corresponding routing  
protocol.  
16-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 17 Static Route Configuration  
Chapter 17 Static Route Configuration  
17.1 Introduction to Static Route  
17.1.1 Static Route  
A static route is a special route configured manually by an administrator. You can set up  
an interconnecting network with the static route configuration. The problem for such  
configuration is when a fault occurs to the network, the static route cannot change  
automatically to steer away from the node causing the fault, if without the help of an  
administrator.  
In a relatively simple network, you only need to configure the static routes to make the  
router work normally. The proper configuration and usage of the static route can  
improve the network performance and ensure the bandwidth of the important  
applications.  
All the following routes are static routes:  
z
z
z
Reachable route: A normal route is of this type. That is, the IP packet is sent to the  
next hop via the route marked by the destination. It is a common type of static  
routes.  
Unreachable route: When a static route to a destination has the "reject" attribute,  
all the IP packets to this destination will be discarded, and the source host will be  
informed that the destination is unreachable.  
Blackhole route: If a static route to a destination has the “blackhole” attribute, the  
outgoing interface of this route is the Null 0 interface regardless of the next hop  
address, and any IP packets addressed to this destination are dropped without  
notifying the source host.  
The attributes "reject" and "blackhole" are usually used to control the range of  
reachable destinations of this router, and help troubleshooting the network.  
17.1.2 Default Route  
A default route is a special route. You can configure a default route using a static route.  
Some dynamic routing protocols can also generate default routes, such as OSPF and  
IS-IS.  
In brief, a default route is used only when no suitable routing table entry is matched.  
That is, when no proper route is found, the default route is used. In a routing table, the  
default route is in the form of the route to the network 0.0.0.0 (with the mask 0.0.0.0).  
You can see whether the default route has been set by executing the display ip  
routing-table command. If the destination address of a packet fails in matching any  
entry of the routing table, the router will select the default route to forward this packet. If  
17-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 17 Static Route Configuration  
there is no default route and the destination address of the packet fails in matching any  
entry in the routing table, this packet will be discarded, and an internet control message  
protocol (ICMP) packet will be sent to the originating host to inform that the destination  
host or network is unreachable.  
17.2 Configuring Static Route  
Static Route Configuration includes:  
z
z
z
17.2.1 Configuring a Static Route  
Perform the following configurations in system view.  
Table 17-1 Configure a static route  
Operation  
Command  
ip route-static [ vpn-instance vpn-instance-name ]*  
ip-address { mask | mask-length } { interface-type  
interface-number | [ vpn-instance vpn-instance-name ]  
gateway-address } [ preference preference-value ] [ reject  
| blackhole ]  
Add a static route  
undo ip route-static [ vpn-instance vpn-instance-name ]*  
ip-address { mask | mask-length } { interface-type  
interface-number | [ vpn-instance vpn-instance-name ]  
gateway-address } [ preference preference-value ] [ reject  
| blackhole ]  
Delete a static route  
The parameters are explained as follows:  
IP address and mask  
z
The IP address and mask are in a dotted decimal format. As "1"s in the 32-bit mask is  
required to be consecutive, the dotted decimal mask can also be replaced by the  
mask-length (which refers to the digits of the consecutive "1"s in the mask).  
z
Next hop address and NULL interface  
When configuring a static route, you can specify the gateway-address to decide the  
next hop address, depending on the actual conditions.  
In fact, for all the routing entries, the next hop address must be specified. When IP layer  
transmits an IP packet, it will first search the matching route in the routing table  
according to the destination address of the packet. Only when the next hop address of  
the route is specified can the link layer find the corresponding link layer address, and  
then forward the packet according to this address.  
17-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 17 Static Route Configuration  
The packets sent to NULL interface, a kind of virtual interface, will be discarded at once.  
This can decrease the system load.  
z
Preference  
Depending on the configuration of preference, you can achieve different route  
management policies. For example, to implement load sharing, you can specify the  
same preference for multiple routes to the same destination network. To implement  
route backup, you can specify different preferences for them.  
z
Other parameters  
The attributes reject and blackhole respectively indicate the unreachable route and  
the blackhole route.  
17.2.2 Configuring a Default Route  
Perform the following configurations in system view.  
Table 17-2 Configure a default route  
Operation  
Command  
ip route-static 0.0.0.0 { 0.0.0.0 | 0 } { interface-type  
Configure a default route interface-number | gateway-address } [ preference  
value ] [ reject | blackhole ]  
undo ip route-static 0.0.0.0  
{
0.0.0.0  
|
0
}
Delete a default route  
[ interface-type interface-number | gateway-address ]  
[ preference value ]  
The meanings of parameters in the command are the same as those of the static route.  
17.2.3 Deleting All the Static Routes  
You can use the undo ip route-static command to delete one static route. The Switch  
8800 also provides a special command for you to delete all static routes at one time,  
including the default routes.  
Perform the following configuration in system view.  
Table 17-3 Delete all static routes  
Operation  
Command  
delete static-routes all  
Delete all static routes  
Delete all static routes delete vpn-instance vpn-instance-name static-routes  
of the VPN  
all  
17-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 17 Static Route Configuration  
17.3 Displaying and Debugging Static Route  
After the above configuration, execute the display command in any view to display the  
running of the static route configuration, and to verify the effect of the configuration.  
Table 17-4 Display and debug the routing table  
Operation  
Display routing table summary  
Display routing table details  
Command  
display ip routing-table  
display ip routing-table verbose  
Display the detailed information of a display ip routing-table ip_address  
specific route [ mask ] [ longer-match ] [ verbose ]  
Display the route information in the display ip routing-table ip_address1  
specified address range mask1 ip_address2 mask2 [ verbose ]  
Display the route filtered through the display  
ip routing-table acl  
specified basic access control list (ACL) { acl-number | acl-name } [ verbose ]  
Display the route information that is display ip routing-table ip-prefix  
filtered through the specified ip prefix list ip-prefix-number [ verbose ]  
Display  
the  
routing  
information display ip routing-table protocol  
discovered by the specified protocol  
protocol [ inactive | verbose ]  
Display the tree routing table  
display ip routing-table radix  
Display the statistics of the routing table display ip routing-table statistics  
Display the routing information about the display ip routing-table vpn-instance  
VPN instance  
vpn-instance-name  
17.4 Typical Static Route Configuration Example  
I. Network requirements  
As shown in Figure 17-1, the masks of all the IP addresses are 255.255.255.0. It is  
required that all the hosts or the Switch 8800 can be interconnected in pairs by static  
route configuration.  
17-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 17 Static Route Configuration  
II. Network diagram  
Host 1.1.5.1  
C
1.1.5.2/24  
1.1.3.1/24  
1.1.2.2/24  
1.1.2.1/24  
Switch C  
1.1.3.2/24  
1.1.1.2/24  
Switch A  
1.1.4.1/24  
Switch B  
B
A
Host 1.1.4.2  
Host 1.1.1.1  
Figure 17-1 Network diagram for the static route configuration example  
III. Configuration procedure  
Configure the static route for Switch A  
[Switch A] ip route-static 1.1.3.0 255.255.255.0 1.1.2.2  
[Switch A] ip route-static 1.1.4.0 255.255.255.0 1.1.2.2  
[Switch A] ip route-static 1.1.5.0 255.255.255.0 1.1.2.2  
Configure the static route for Switch B  
[Switch B] ip route-static 1.1.2.0 255.255.255.0 1.1.3.1  
[Switch B] ip route-static 1.1.5.0 255.255.255.0 1.1.3.1  
[Switch B] ip route-static 1.1.1.0 255.255.255.0 1.1.3.1  
Configure the static route for Switch C  
[Switch C] ip route-static 1.1.1.0 255.255.255.0 1.1.2.1  
[Switch C] ip route-static 1.1.4.0 255.255.255.0 1.1.3.2  
Configure the default gateway of the Host A to be 1.1.1.2  
Configure the default gateway of the Host B to be 1.1.4.1  
Configure the default gateway of the Host C to be 1.1.5.2  
Then, all the hosts or switches in the figure can be interconnected in pairs.  
17-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 17 Static Route Configuration  
17.5 Troubleshooting Static Route Faults  
Symptom:  
The switch is not configured with the dynamic routing protocol and both the physical  
status and the link layer protocol status of the interface is UP, but the IP packets cannot  
be forwarded normally.  
Solution:  
z
Use the display ip routing-table protocol static command to view whether the  
configured static route is correct and in effect.  
17-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
Chapter 18 RIP Configuration  
18.1 Introduction to RIP  
Routing Information Protocol (RIP) is a relatively simple interior gateway protocol (IGP),  
which is mainly applied to small scale networks.  
It is easy to implement RIP. You can configure and maintain RIP more easily than OSPF  
and IS-IS, so RIP still has a wide application in actual networking.  
18.1.1 RIP Operation Mechanism  
I. RIP basic concepts  
RIP is a kind of Distance-Vector (D-V) algorithm-based protocol and exchanges routing  
information via UDP packets.  
It employs Hop Count to measure the distance to the destination host, which is called  
Routing Cost. In RIP, the hop count from a router to its directly connected network is 0,  
and that to a network which can be reached through another router is 1, and so on. To  
restrict the time to converge, RIP prescribes that the cost value is an integer ranging  
from 0 to 15. The hop count equal to or exceeding 16 is defined as infinite, that is, the  
destination network or the host is unreachable.  
To improve the performance and avoid route loop, RIP supports Split Horizon and  
allows importing the routes discovered by other routing protocols.  
II. RIP route database  
Each router running RIP manages a route database, which contains routing entries to  
all the reachable destinations in the network. These routing entries contain the  
following information:  
z
z
Destination address: IP address of a host or a network.  
Next hop address: The interface address of the next router that an IP packet will  
pass through for reaching the destination.  
z
z
Output interface: The interface through which the IP packet should be forwarded.  
Cost: The cost for the router to reach the destination, which should be an integer in  
the range of 0 to 16.  
z
Timer: Duration from the last time that the routing entry is modified till now. The  
timer is reset to 0 whenever a routing entry is modified.  
III. RIP timer  
In RFC1058, RIP is controlled by the following timers: Period update, Timeout and  
Garbage-Collection.  
18-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
z
z
Period update is triggered periodically to send all RIP routes to all neighbors.  
If the RIP route is not updated (a router receives the update packets from the  
neighbor) when the Timeout timer expires, this route is regarded as unreachable.  
The cost is set to 16.  
z
z
If the Garbage-Collection timer expires, and the unreachable route receives no  
update packet from the same neighbor, the route will be completely deleted from  
the routing table.  
By default, the values of Period Update and Timeout timers are 30 seconds and  
180 seconds respectively. The value of Garbage-collection timer is four times that  
of Period Update timer: 120 seconds.  
18.1.2 RIP Enabling and Running  
The following section describes the procedure:  
z
If RIP is enabled on a router for the first time, the router will broadcast or multicast  
the request packet to the adjacent routers. Upon receiving the request packet, the  
RIP on each adjacent router responds with a packet conveying its local routing  
table.  
z
After receiving the response packets, the router, which has sent the request, will  
modify its own routing table. At the same time, the router sends trigger  
modification packets to its adjacent routers running RIP and broadcasts  
modification information, following split horizon mechanism. After receiving trigger  
modification packets, the adjacent routers send trigger modification packets to  
their respective adjacent routers. As a result, each router can obtain and maintain  
the latest routing information.  
z
RIP broadcasts its routing table to the adjacent routers every 30 seconds. The  
adjacent routers will maintain their own routing table after receiving the packets  
and will select an optimal route, and then advertise the modification information to  
their respective adjacent network so as to make the updated route globally known.  
Furthermore, RIP uses the timeout mechanism to handle the out-timed routes so  
as to ensure the real-timeliness and validity of the routes.  
RIP has become one of the actual standards of transmitting router and host routes by  
far. It can be used in most of the campus networks and the regional networks that are  
simple yet extensive. For larger and more complicated networks, RIP is not  
recommended.  
18.2 Configuring RIP  
1) RIP basic configuration  
RIP basic configuration includes:  
z
z
Enabling RIP  
Enabling RIP on specified network  
18-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
If the link, which does not support broadcast or multicast packets, runs RIP, you need to  
configure RIP to send any packet to the specified destination, establishing RIP  
neighbors correctly.  
In NBMA link networking through a Frame Relay sub-interface and others, to ensure  
the routing information can be correctly transmitted, you possibly need to disable split  
horizon.  
2) RIP route management  
You can make the following configurations for RIP to advertise and receive routing  
information:  
z
z
z
z
z
Setting additional routing metric  
Configuring RIP to import routers of other protocols  
Configuring RIP route filtering  
Disabling host route  
Disabling RIP route aggregation  
3) RIP configuration  
z
z
z
z
Configuring the RIP precedence  
Configuring RIP timers  
Configuring RIP-1 zero field check of the interface packet  
Specifying RIP version of the interface  
4) Configuration related to security  
You can select the following configurations to improve RIP security during exchanging  
routing information, or control the area to transmit RIP packets.  
z
z
Setting RIP-2 packet authentication  
Specifying the operating state of the interface  
18.2.1 Enabling RIP and Entering RIP View  
Perform the following configurations in system view.  
Table 18-1 Enable RIP and enter RIP view  
Operation  
Command  
Enable RIP and enter the RIP view  
Disable RIP  
rip  
undo rip  
By default, RIP is not enabled.  
18.2.2 Enabling RIP on the Specified Network Segment  
To flexibly control RIP operation, you can enable RIP on the specified network segment  
so that the corresponding ports can receive and send RIP packets.  
Perform the following configurations in RIP view.  
18-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
Table 18-2 Enable RIP Interface  
Operation  
Command  
Enable RIP on the specified network  
Disable RIP on the specified network  
network network-address  
undo network network-address  
Note that after the RIP task is enabled, you should also specify its operating network  
segment, for RIP only operates on the interface on the specified network segment. For  
an interface that is not on the specified network segment, RIP does not receive or send  
routes on it, nor forwards its interface route, as if this interface does not exist at all.  
network-address is the address of the enabled or disabled network, and it can also be  
configured as the IP network address of respective interfaces.  
When a command network is used for an address, you can enable the network  
address of the port, which also includes the subnet addresses. For example, for  
network 129.102.1.1, you can see network 129.102.0.0 either using display  
current-configuration or using display rip command.  
By default, RIP is disabled on all the interfaces after it is started up.  
18.2.3 Configuring Unicast of the Packets  
Usually, RIP sends packets using broadcast or multicast addresses. It exchanges  
routing information with non-broadcasting networks in unicast mode.  
Perform the following configuration in RIP view.  
Table 18-3 Configure unicast of the packets  
Operation  
Command  
peer ip-address  
undo peer ip-address  
Configure unicast of the packets  
Cancel unicast of the packets  
By default, RIP does not send any packets to any unicast addresses.  
It should be noted that peer should also be restricted by rip work, rip output, rip input  
and network.  
18.2.4 Configuring Split Horizon  
Split horizon means that the route received via an interface will not be sent via this  
interface again. To some extent, the split horizon is necessary for reducing routing loop.  
But in some special cases, split horizon must be disabled so as to ensure the correct  
advertisement of the routes at the cost of efficiency. For example, split horizon is  
disabled on a NBMA network if it runs RIP.  
Perform the following configuration in interface view.  
18-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
Table 18-4 Configure Split Horizon  
Operation  
Enable split horizon  
Disable split horizon  
Command  
rip split-horizon  
undo rip split-horizon  
By default, split horizon of the interface is enabled.  
18.2.5 Setting Additional Routing Metric  
Additional routing metric is the input or output routing metric added to an RIP route. It  
does not change the metric value of the route in the routing table, but adds a specified  
metric value when the interface receives or sends a route.  
Perform the following configuration in interface view.  
Table 18-5 Set additional routing metric  
Operation  
Command  
Set the additional routing metric of the route when the  
interface receives an RIP packet  
rip metricin value  
Disable the additional routing metric of the route when  
the interface receives an RIP packet  
undo rip metricin  
rip metricout value  
undo rip metricout  
Set the additional routing metric of the route when the  
interface sends an RIP packet  
Disable the additional routing metric of the route when  
the interface sends an RIP packet  
By default, the additional routing metric added to the route when RIP sends a packet is  
1. The additional routing metric when RIP receives the packet is 0 by default.  
Note:  
The metricout configuration takes effect only on the RIP routes learnt by the router and  
RIP routes generated by the router itself. That is, it has no effect on the routes imported  
to RIP by other routing protocols.  
18.2.6 Configuring RIP to Import Routes of Other Protocols  
RIP allows users to import the route information of other protocols into the RIP routing  
table.  
RIP can import the routes of Direct, Static, OSPF, IS-IS and BGP, etc.  
18-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
Perform the following configuration in RIP view.  
Table 18-6 Configure RIP to import routes of other protocols  
Operation  
Command  
Configure RIP to import routes of other import-route protocol [ cost value |  
protocols  
route-policy route-policy-name ]*  
Cancel the imported routing information  
of other protocols  
undo import-route protocol  
Set the default routing metric  
default cost value  
Restore the default routing metric  
undo default cost  
By default, RIP does not import the route information of other protocols.  
If you do not specify the routing metric when importing a route, the default routing  
metric 1 is used.  
18.2.7 Configuring Route Filtering  
The router provides the route filtering function. You can configure the filter policy rules  
through specifying the ACL and ip-prefix for route import and advertisement. Besides,  
to import a route, the RIP packet of a specific router can also be received by  
designating a neighbor router.  
Perform the following configuration in RIP view.  
I. Configuring RIP to filter the received routes  
Table 18-7 Configure RIP to filter the received routes  
Operation  
Command  
Configure RIP to filter the received routing filter-policy  
gateway  
information advertised by the specified address ip-prefix-name import  
Cancel filtering the received routing information undo  
filter-policy gateway  
advertised by the specified address ip-prefix-name import  
Configure RIP to filter the received global filter-policy  
{
acl-number  
|
routing information ip-prefix ip-prefix-name } import  
Cancel filtering the received global routing undo filter-policy { acl-number |  
information ip-prefix ip-prefix-name } import  
18-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
II. Configuring RIP to filter the routes advertised by RIP  
Table 18-8 Configure RIP to filter the advertised routes  
Operation  
Command  
acl-number  
Configure RIP to filter the filter-policy  
{
|
ip-prefix  
advertised routing information  
ip-prefix-name } export [ routing-protocol ]  
Cancel filtering the advertised undo filter-policy { acl-number | ip-prefix  
routing information ip-prefix-name } export [ routing-protocol ]  
By default, RIP does not filter the received and advertised routing information.  
Note:  
z
z
z
The filter-policy import command filters the RIP routes received from its neighbors,  
and the routes that cannot pass the filter will not be added to the routing table, and  
will not be advertised to the neighbors.  
The filter-policy export command filters all the advertised routes, including routes  
imported by the import-route command, and RIP routes learned from the  
neighbors.  
If the filter-policy export command does not specify which route to be filtered, then  
all the routes imported by the import-route command and the advertised RIP  
routes will be filtered.  
18.2.8 Disabling RIP to Receive Host Route  
In some special cases, the router can receive a lot of host routes, and these routes are  
of little help in route addressing but consume a lot of network resources. Routers can  
be configured to reject host routes by using the undo host-route command.  
Perform the following configuration in RIP view.  
Table 18-9 Disable RIP to receive host route  
Operation  
Enable receiving host route  
Disable receiving host route  
Command  
host-route  
undo host-route  
By default, the router receives the host route.  
18-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
18.2.9 Enabling RIP-2 Route Aggregation Function  
The so-called route aggregation means that different subnet routes in the same natural  
network can be aggregated into one natural mask route for transmission when they are  
sent to the outside (i.e. other network). Route aggregation can be performed to reduce  
the routing traffic on the network as well as to reduce the size of the routing table.  
RIP-1 only sends the route with natural mask, that is, it always sends routes in the route  
aggregation form. RIP-2 supports subnet mask and classless interdomain routing. To  
advertise all the subnet routes, the route aggregation function of RIP-2 can be disabled.  
Perform the following configuration in RIP view.  
Table 18-10 Enable RIP-2 route aggregation function  
Operation  
Command  
summary  
undo summary  
Enable the route aggregation function of RIP-2  
Disable the route aggregation function of RIP-2  
By default, RIP-2 route summarization is enabled.  
18.2.10 Setting the RIP Preference  
Each kind of routing protocol has its own preference, by which the routing policy will  
select the optimal one from the routes of different protocols. The greater the preference  
value is, the lower the preference becomes. The preference of RIP can be set  
manually.  
Perform the following configuration in RIP view.  
Table 18-11 Set the RIP Preference  
Operation  
Set the RIP Preference  
Command  
preference value  
undo preference  
Restore the default value of RIP preference  
By default, the preference of RIP is 100.  
18.2.11 Specifying RIP Version of the Interface  
RIP has two versions, RIP-1 and RIP-2. You can specify the version of the RIP packets  
processed by the interface.  
RIP-1 broadcasts the packets. RIP-2 can transmit packets by both broadcast and  
multicast. By default, multicast is adopted for transmitting packets. In RIP-2, the  
multicast address is 224.0.0.9. The advantage of transmitting packets in the multicast  
mode is that the hosts not operating RIP in the same network can avoid receiving RIP  
18-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
broadcast packets. In addition, this mode can also make the hosts running RIP-1 avoid  
incorrectly receiving and processing the routes with subnet mask in RIP-2. When an  
interface is running in RIP-2 broadcast mode, the RIP-1 packets can also be received.  
Perform the following configuration in interface view:  
Table 18-12 Specify RIP version of the interface  
Operation  
Command  
Specify the RIP version as RIP-1 for the interface rip version 1  
rip version 2 [ broadcast |  
multicast ]  
Specify the RIP version as RIP-2 for the interface  
Restore the default RIP version running on the  
interface  
undo rip version  
By default, the interface receives and sends the RIP-1 packets. It will transmit packets  
in multicast mode when the interface RIP version is set to RIP-2.  
18.2.12 Configuring RIP Timers  
As mentioned previously, RIP has three timers: Period update, Timeout and  
Garbage-collection. Modification of these timers affects RIP convergence speed.  
Perform the following configuration in RIP view.  
Table 18-13 Configure RIP timers  
Operation  
Command  
timers { update update-timer-length | timeout  
timeout-timer-length } *  
Configure RIP timers  
Restore the default settings of  
RIP timers  
undo timers { update | timeout } *  
The modification of RIP timers is validated immediately.  
By default, the values of Period Update and Timeout timers are 30 seconds and 180  
seconds respectively. The value of Garbage-collection timer is four times that of Period  
Update timer: 120 seconds.  
In fact, you may find that the timeout time of Garbage-collection timer is not fixed. If  
Period Update timer is set to 30 seconds, Garbage-collection timer might range from 90  
to 120 seconds.  
Before RIP completely deletes an unreachable route from the routing table, it  
advertises the route by sending four Period Update packets with route metric of 16, so  
as to acknowledge all the neighbors that the route is unreachable. As routes cannot  
18-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
always become unreachable at the point when a new period starts, the actual value of  
Garbage-collection timer is three to four times that of Period Update timer.  
Note:  
You must consider network performance when adjusting RIP timers, and configure all  
the routers that are running RIP, so as to avoid unnecessary traffic or network jitter.  
18.2.13 Configuring RIP-1 Zero Field Check of the Interface Packet  
According to the RFC1058, some fields in the RIP-1 packet must be 0, and they are  
called zero fields. Therefore, when an interface version is set as RIP-1, the zero field  
check should be performed on the packet. But if the value in the zero filed is not zero,  
processing will be refused. As there is no zero field in the RIP-2 packet, this  
configuration is invalid for RIP-2.  
Perform the following configuration in RIP view.  
Table 18-14 Configure zero field check of the interface packet  
Operation  
Command  
checkzero  
undo checkzero  
Configure zero field check on the RIP-1 packet  
Disable zero field check on the RIP-1 packet  
By default, RIP-1 performs zero field check on the packet.  
18.2.14 Specifying the Operating State of the Interface  
In interface view, you can specify the operating state of RIP on the interface. For  
example, whether RIP operates on the interface, namely, whether RIP update packets  
are sent and received on the interface. In addition, whether an interface sends or  
receives RIP update packets can be specified separately.  
Perform the following configuration in interface view.  
Table 18-15 Specify the operating state of the interface  
Operation  
Command  
rip work  
Enable the interface to run RIP  
Disable the interface to run RIP  
undo rip work  
rip input  
Enable the interface to receive RIP update packet  
Disable the interface to receive RIP update packet  
undo rip input  
18-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
Operation  
Command  
rip output  
Enable the interface to send RIP update packet  
Disable the interface to send RIP update packet  
undo rip output  
The undo rip work command and the undo network command have similar but not all  
the same functions. Neither of the two commands configures an interface to receive or  
send RIP route. The difference also exists. RIP still advertises the routes of the  
interface applying the undo rip work command. However, other interfaces will not  
forward the routes of the interface applying the undo network command. It seems that  
the interface is removed.  
In addition, rip work is functionally equivalent to both rip input and rip output  
commands.  
By default, all interfaces except loopback interfaces both receive and transmit RIP  
update packets.  
18.2.15 Setting RIP-2 Packet Authentication  
RIP-1 does not support packet authentication. But when the interface operates RIP-2,  
the packet authentication can be configured.  
RIP-2 supports two authentication modes: Simple authentication and MD5  
authentication. MD5 authentication uses two packet formats: One follows RFC1723  
and the other follows the RFC2082.  
The simple authentication does not ensure security. The authentication key not  
encrypted is sent together with the packet, so the simple authentication cannot be  
applied to the case with high security requirements.  
Perform the following configuration in Interface view:  
Table 18-16 Set RIP-2 packet authentication  
Operation  
Command  
Configure RIP-2 simple authentication rip  
authentication-mode  
simple  
key  
password-string  
Perform usual MD5 authentication on rip authentication-mode md5 usual  
RIP-2 packets key-string  
Perform nonstandard-compatible MD5 rip  
authentication-mode  
md5  
authentication on RIP-2 packets  
nonstandard key-string key-id  
Disable RIP-2 packet authentication  
undo rip authentication-mode  
Before configuring MD5 authentication, you must configure MD5 type. The usual  
packet format follows RFC1723 and the nonstandard follows RFC2082.  
18-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
18.3 Displaying and Debugging RIP  
After the above configuration, execute the display command in any view to display the  
running of the RIP configuration, and to verify the effect of the configuration. Execute  
the debugging command in user view to debug the RIP module. Execute the reset  
command in RIP view to reset the system configuration parameters of RIP.  
Table 18-17 Display and debug RIP  
Operation  
Command  
display rip  
Display the current RIP running state and  
configuration information.  
Enable the RIP packet debugging information  
Disable the RIP packet debugging information  
Enable the debugging of RIP receiving packets  
Disable the debugging of RIP receiving packets  
Enable the debugging of RIP sending packet  
Disable the debugging of RIP sending packet  
debugging rip packet  
undo debugging rip packet  
debugging rip receive  
undo debugging rip receive  
debugging rip send  
undo debugging rip send  
Reset the system configuration parameters of RIP reset  
18.4 Typical RIP Configuration Example  
I. Network requirements  
As shown in Figure 18-1, switch C connects to the subnet 117.102.0.0 through the  
Ethernet port. The Ethernet ports of switches A and Switch B are respectively  
connected to the network 155.10.1.0 and 196.38.165.0. Switch C, Switch A and Switch  
B are connected via Ethernet 110.11.2.0. Correctly configure RIP to ensure that Switch  
C, Switch A and Switch B can interconnect with each other.  
18-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
II. Network diagram  
Network address:  
155.10.1.0/24  
Interface address:  
155.10.1.1/24  
SwitchA  
Interface address:  
110.11.2.1/24  
Ethernet  
Interface address:  
110.11.2.3/24  
Interface address:  
110.11.2.2/24  
SwitchC  
SwitchB  
Interface address:  
117.102.0.1/16  
Interface address:  
196.38.165.1/24  
Network address:  
196.38.165.0/24  
Network address:  
117.102.0.0/16  
Figure 18-1 Network diagram for RIP configuration  
III. Configuration procedure  
Note:  
The following configuration only shows the operations related to RIP. Before  
performing the following configuration, make sure the Ethernet link layer can work  
normally.  
1) Configure Switch A  
Configure RIP  
[Switch A] rip  
[Switch A-rip] network 110.11.2.0  
[Switch A-rip] network 155.10.1.0  
2) Configure Switch B  
Configure RIP  
[Switch B] rip  
[Switch B-rip] network 196.38.165.0  
[Switch B-rip] network 110.11.2.0  
3) Configure Switch C  
Configure RIP  
[Switch C] rip  
[Switch C-rip] network 117.102.0.0  
18-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 18 RIP Configuration  
[Switch C-rip] network 110.11.2.0  
18.5 Troubleshooting RIP Faults  
Symptom: The Switch 8800 cannot receive the update packets when the physical  
connection to the peer routing device is normal.  
Solution: RIP does not operate on the corresponding interface (for example, the undo  
rip work command is executed) or this interface is not enabled through the network  
command. The peer routing device is configured to be in the multicast mode (for  
example, the rip version 2 multicast command is executed) but the multicast mode  
has not been configured on the corresponding interface of the local switch.  
18-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Chapter 19 OSPF Configuration  
19.1 OSPF Overview  
19.1.1 Introduction to OSPF  
Open Shortest Path First (OSPF) is an Interior Gateway Protocol based on the link  
state developed by IETF. At present, OSPF version 2 (RFC2328) is used, which is  
available with the following features:  
z
z
z
Applicable scope: It can support networks in various sizes and can support several  
hundreds of routers at maximum.  
Fast convergence: It can transmit the update packets instantly after the network  
topology changes so that the change is synchronized in the AS.  
Loop-free: Since the OSPF calculates routes with the shortest path tree algorithm  
according to the collected link states, it is guaranteed that no loop routes will be  
generated from the algorithm itself.  
z
Area partition: It allows the network of AS to be divided into different areas for the  
convenience of management so that the routing information transmitted between  
the areas is abstracted further, hence to reduce the network bandwidth  
consumption.  
z
z
Equal-cost multi-route: Support multiple equal-cost routes to a destination.  
Routing hierarchy: OSPF has a four-level routing hierarchy. It prioritizes the routes  
to be intra-area, inter-area, external type-1, and external type-2 routes.  
Authentication: It supports the interface-based packet authentication so as to  
guarantee the security of the route calculation.  
z
z
Multicast transmission: Support multicast address to receive and send packets.  
19.1.2 Process of OSPF Route Calculation  
The routing calculation process of the OSPF protocol is as follows:  
z
Each OSPF-capable router maintains a Link State Database (LSDB), which  
describes the topology of the whole AS. According to the network topology around  
itself, each router generates a Link State Advertisement (LSA). The routers on the  
network transmit the LSAs among them by transmitting the protocol packets to  
each others. Thus, each router receives the LSAs of other routers and all these  
LSAs compose its LSDB.  
z
LSA describes the network topology around a router, so the LSDB describes the  
network topology of the whole network. Routers can easily transform the LSDB to  
a weighted directed graph, which actually reflects the topology architecture of the  
whole network. Obviously, all the routers get a graph exactly the same.  
19-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
z
A router uses the SPF algorithm to calculate the shortest path tree with itself as the  
root, which shows the routes to the nodes in the autonomous system. The external  
routing information is the leave node. A router, which advertises the routes, also  
tags them and records the additional information of the autonomous system.  
Obviously, the routing tables obtained by different routers are different.  
Furthermore, to enable individual routers to broadcast their local state information to  
the entire AS, any two routers in the environment should establish adjacency between  
them. In this case, however, the changes that any router takes will result in multiple  
transmissions, which are not only unnecessary but also waste the precious bandwidth  
resources. To solve this problem, “Designated Router” (DR) is defined in the OSPF.  
Thus, all the routers only send information to the DR for broadcasting the network link  
states in the network. Thereby, the number of router adjacent relations on the  
multi-access network is reduced.  
OSPF supports interface-based packet authentication to guarantee the security of  
route calculation. Also, it transmits and receives packets by IP multicast (224.0.0.5 and  
224.0.0.6).  
19.1.3 OSPF Packets  
OSPF uses five types of packets:  
Hello Packet:  
z
It is the commonest packet, which is periodically sent by a router to its neighbor. It  
contains the values of some timers, DR, BDR and the known neighbor.  
z
Database Description (DD) Packet:  
When two routers synchronize their databases, they use the DD packets to describe  
their own LSDBs, including the digest of each LSA. The digest refers to the HEAD of  
LSA, which uniquely identifies the LSA. This reduces the traffic size transmitted  
between the routers, since the HEAD of a LSA only occupies a small portion of the  
overall LSAtraffic. With the HEAD, the peer router can judge whether it already has had  
the LSA.  
z
Link State Request (LSR) Packet:  
After exchanging the DD packets, the two routers know which LSAs of the peer routers  
are lacked in the local LSDBs. In this case, they will send LSR packets requesting for  
the needed LSAs to the peers. The packets contain the digests of the needed LSAs.  
z
Link State Update (LSU) Packet:  
The packet is used to transmit the needed LSAs to the peer router. It contains a  
collection of multiple LSAs (complete contents).  
z
Link State Acknowledgment (LSAck) Packet  
The packet is used for acknowledging the received LSU packets. It contains the  
HEAD(s) of LSA(s) requiring acknowledgement.  
19-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
19.1.4 LSA Type  
I. Five basic LSA types  
As mentioned previously, OSPF calculates and maintains routing information from  
LSAs. RFC2328 defines five LSA types as follows:  
z
z
z
Router-LSAs: Type-1. Each router generates Router-LSAs, which describe the  
link state and cost of the local router. Router-LSAs are broadcast within the area  
where the router is located.  
Network-LSAs: Type-2. DRs on the broadcast network and NBMA network  
generate Network-LSAs, which describe the link state of the local network.  
Network-LSAs are broadcast within the area where a DR is located.  
Summary-LSAs: Include Type-3 and Type-4. Area border routers (ABRs)  
generate Summary-LSAs. Summary-LSAs are broadcast within the area related  
to the LSA. Each Summary-LSA describes a route (inter-area route) to a certain  
destination in other areas of this AS. Type-3 Summary-LSAs describe the routes  
to networks (the destination is network). Type-4 Summary-LSAs describe the  
routes to autonomous system border routers (ASBRs).  
z
AS-external-LSAs: or ASE LSA, the Type-5. ASBRs generate AS-external-LSAs,  
which describe the routes to other ASs. AS-external-LSA packets are transmitted  
to the whole AS (except Stub areas). AS-external-LSAs can also describe the  
default route of an AS.  
II. Type-7 LSA  
RFC1587 (OSPF NSSA Option) adds a new LSA type: Type-7 LSAs.  
According to RFC1587, Type-7 LSAs differ from Type-5 LSAs as follows:  
z
Type-7 LSAs are generated and released within a Not-So-Stubby Area (NSSA).  
Type-5 LSAs cannot be generated or released within a NSSA.  
z
Type-7 LSAs can only be released within an NSSA. When Type-7 LSAs reach an  
ABR, the ABR can convert part routing information of Type-7 LSAs into Type-5  
LSAs and releases the information. Type-7 LSAs cannot be directly released to  
other areas or backbone areas.  
19.1.5 Basic Concepts Related to OSPF  
I. Router ID  
To run OSPF, a router must have a router ID. If no ID is configured, the system will  
automatically pick an IP address from the IP addresses of the current interfaces as the  
Router ID. The following introduces how to choose a router ID. If loopback interface  
addresses exist, the system chooses the Loopback address with the greatest IP  
address value as the router ID. If no Loopback interface configured, then the address of  
the physical interface with the greatest IP address value will be the router ID.  
19-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
II. DR and BDR  
z
Designated Router (DR)  
In multi-access networks, if any two routers establish adjacencies, the same LSAwill be  
transmitted repeatedly, wasting bandwidth resources. To solve this problem, the OSPF  
protocol regulates that a DR must be elected in a multi-access network and only the DR  
(and the BDR) can establish adjacencies with other routers in this network. Two  
non-DR routers or non-BDR routers cannot establish adjacencies and exchange  
routing information.  
You cannot specify the DR in the segment. Instead, DR is elected by all the routers in  
the segment.  
z
Backup Designated Router (BDR)  
If the DR fails for some faults, a new DR must be elected and synchronized with other  
routers on the segment. This process will take a relatively long time, during which, the  
route calculation is incorrect. To shorten the process, BDR is brought forth in OSPF. In  
fact, BDR is a backup for DR. DR and BDR are elected in the meantime. The  
adjacencies are also established between the BDR and all the routers on the segment,  
and routing information is also exchanged between them. After the existing DR fails,  
the BDR will become a DR immediately.  
III. Area  
The network size grows increasingly larger. If all the routers on a huge network are  
running OSPF, the large number of routers will result in an enormous LSDB, which will  
consume an enormous storage space, complicate the SPF algorithm, and add the CPU  
load as well. Furthermore, as a network grows larger, the topology becomes more likely  
to take changes. Hence, the network will always be in “turbulence”, and a great deal of  
OSPF packets will be generated and transmitted in the network. This will lower the  
network bandwidth utility. In addition, each change will cause all the routes on the  
network to recompute the route.  
OSPF solves the above problem by partition an AS into different areas. Areas are  
logical groups of routers. The borders of areas are formed by routers. Thus, some  
routers may belong to different areas. A router connects the backbone area and a  
non-backbone area is called Area Border Router (ABR). An ABR can connect to the  
backbone area physically or logically.  
IV. Backbone area and virtual link  
z
Backbone Area  
After the area partition of OSPF, not all the areas are equal. In which, an area is  
different from all the other areas. Its area-id is 0 and it is usually called the backbone  
area.  
z
Virtual link  
19-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Since all the areas should be connected to the backbone area, virtual link is adopted so  
that the physically separated areas can still maintain the logic connectivity to the  
backbone area.  
V. Route summary  
An AS is divided into different areas that are interconnected via OSPF ABRs. The  
routing information between areas can be reduced through route summary. Thus, the  
size of routing table can be reduced and the calculation speed of the router can be  
improved. After calculating an intra-area route of an area, the ABR summarizes  
multiple OSPF routes into an LSA and sends it outside the area according to the  
configuration of summary.  
For example, as shown in Figure 19-1, the Area 19 has three area intra-area routes:  
19.1.1.0/24, 19.1.2.0/24 and 19.1.3.0/24. The three routes are summarized into one  
route 19.1.0.0/16 after you configured route summary. The RTAonly generates an LSA,  
describing the summarized route.  
19.1.1.0/24  
Area 12  
Area 19  
Virtual Link  
Area 0  
19.1.3.0/24  
RTA  
19.1.2.0/24  
Area 8  
Figure 19-1 Area and route aggregation  
19.1.6 OSPF Features Supported by the Switch 8800  
The Switch 8800 supports the following OSPF features:  
z
z
Support stub areas: OSPF defines stub areas to decrease the overhead when the  
routers within the area receive ASE routes.  
Support NSSA: OSPF defines NSSA areas, surmounting the restriction of stub  
areas on topology. NSSA is the abbreviation of Not-So-Stubby Area.  
Support OSPF Multi-Process: A router runs multiple OSPF processes.  
Share the discovered routing information with other dynamic routing protocols:  
OSPF currently can import static routes and routes of other dynamic routing  
protocols such as RIP into the autonomous system of the router, or advertise the  
routing information discovered by OSPF to other routing protocols.  
z
z
19-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
z
Authenticator: OSPF provides clear text authenticator and MD5 encryption  
authenticator to authenticate packets transmitted between neighboring routers in  
the same area.  
z
Flexible configuration for the router port parameter: On the router port, you can  
configure the following OSPF parameters: output cost, Hello packet interval,  
retransmission interval, port transmission delay, route precedence, invalid time for  
adjacent routers, packet authentication mode, packet authenticator, and others.  
Virtual connection: Creates and configures virtual connections.  
z
z
Abundant debugging information: OSPF provides abundant debugging  
information, consequently helping users to diagnose failure.  
19.2 Configuring OSPF  
OSPF configuration needs cooperation among routers: intra-area, area boundary, and  
AS boundary. If none of OSPF parameters is configured, their default settings apply. In  
this case, sent and received packets are not authenticated, and an individual interface  
does not belong to the area of any AS. When reconfiguring a default parameter on one  
router, make sure that the same change is made on all other involved routers.  
In various configurations, you must first enable OSPF, specify the interface and area ID  
before configuring other functions. But the configuration of the functions related to the  
interface is not restricted by whether the OSPF is enabled or not. It should be noted that  
after OSPF is disabled, the OSPF-related interface parameters also become invalid.  
OSPF configuration includes:  
1) OSPF basic configuration  
z
z
z
z
Configuring Router ID  
Enabling OSPF  
Entering the OSPF area view  
Enabling OSPF on the specified network  
2) Configuration related to OSPF route  
z
z
z
z
Configuring OSPF to import routes of other protocols  
Configuring OSPF to import default routes  
Configuring OSPF route filtering  
Configuring OSPF route convergence  
3) Some OSPF configurations  
z
z
z
z
z
z
z
z
Configuring OSPF precedence  
Setting the interface priority for DR election  
Configuring OSPF timers  
Configuring the time for the interface to send LSUs  
Configuring the cost for sending packets on an interface  
Configuring cost value for next hop  
Configuring the network type on the OSPF interface  
Configuring NBMA neighbors for OSPF  
19-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
z
z
Configuring to fill the MTU field when an interface transmits DD packets  
Setting an SPF calculation interval for OSPF  
4) Configurations related to OSPF networking  
z
z
z
z
z
Configuring OSPF authentication  
Prohibit OSPF packet receiving/sending  
Configuring OSPF virtual link  
Configuring Stub area of OSPF  
Configuring NSSA of OSPF  
5) Configuration related to specific applications  
Configuring OSPF and network management system  
6) Others  
z
z
Resetting the OSPF process  
19.2.1 Configuring Router ID  
Router ID is a 32-bit unsigned integer in IP address format that uniquely identifies a  
router within an AS. Router ID can be configured manually. If router ID is not configured,  
the system will select the IP address of an interface automatically. When you do that  
manually, you must guarantee that the IDs of any two routers in the AS are unique. A  
common undertaking is to set the router ID to be the IP address of an interface on the  
router.  
Perform the following configuration in system view.  
Table 19-1 Configure router ID  
Operation  
Configure router ID  
Remove the router ID  
Command  
router id router-id  
undo router id  
To ensure stability of OSPF, the user should determine the division of router IDs and  
manually configure them when planning the network.  
19.2.2 Enabling OSPF  
Perform the following configuration in system view.  
Table 19-2 Enable/Disable OSPF  
Operation  
Command  
Enable OSPF and enter OSPF ospf [ process-id [ router-id router-id |  
view  
vpn-instance vpn-instance-name]]  
Disable one or all OSPF  
processes  
undo ospf [ process-id ]  
19-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
By default, OSPF is disabled.  
Chapter 19 OSPF Configuration  
When enabling OSPF, pay attention to the following points:  
z
z
The default OSPF process ID is 1. If no process ID is specified in the command,  
the default one is adopted.  
If a router is running multiple OSPF processes, you are recommended to use  
router-id in the command to specify different router IDs for different processes.  
19.2.3 Entering OSPF Area View  
OSPF divides an AS into different areas or logical groups of routers.  
Perform the following configuration in OSPF view.  
Table 19-3 Enter OSPF area view  
Operation  
Command  
Enter OSPF area view  
Delete an OSPF area  
area area-id  
undo area area-id  
The area-id parameter identifies an area. It can be a decimal integer in the range of 0 to  
4,294,967,295, or in the format of IP address. Regardless of how it is specified, it is  
displayed in the format of IP address.  
Note that when you configure OSPF routers in the same area, you should apply most  
configuration data to the whole area. Otherwise, the neighboring routers cannot  
exchange information. This may even block routing information or create routing loops.  
19.2.4 Specifying an Interface to Run OSPF  
After using the ospf command to enable OSPF in system view, you must specify the  
network to run OSPF. An ABR router can be in different areas, while a network segment  
can only belong to an area. That is, you must specify a specific area for each port  
running OSPF.  
Perform the following configuration in OSPF area view.  
Table 19-4 Specifying an interface to run OSPF  
Operation  
Command  
Specify an interface to run OSPF  
Disable OSPF on the interface  
network ip-address ip-mask  
undo network ip-address ip-mask  
The ip-mask argument is IP address wildcard shielded text (similar to the complement  
of the IP address mask).  
19-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
19.2.5 Configuring OSPF to Import Routes of Other Protocols  
The dynamic routing protocols on the router can share the routing information. As far as  
OSPF is concerned, the routes discovered by other routing protocols are always  
processed as the external routes of AS. In the import-route commands, you can  
specify the route cost type, cost value and tag to overwrite the default route receipt  
The OSPF uses the following four types of routes (ordered by priority):  
z
z
z
z
Intra-area route  
Inter-area route  
External route type 1  
External route type 2  
Intra-area and inter-area routes describe the internal AS topology whereas the external  
routes describe how to select the route to the destinations beyond the AS.  
The external routes type-1 refers to the imported IGP routes (such as static route and  
RIP). Since these routes are more reliable, the calculated cost of the external routes is  
the same as the cost of routes within the AS. Also, such route cost and the route cost of  
the OSPF itself are comparable. That is, cost to reach the external route type 1 = cost to  
reach the corresponding ASBR from the local router + cost to reach the destination  
address of the route from the ASBR.  
The external routes type-2 refers to the imported EGP routes. Since these routes have  
lower credibility, OSPF assumes that the cost spent from the ASBR to reach the  
destinations beyond the AS is greatly higher than that spent from within the AS to the  
ASBR. So in route cost calculation, the former is mainly considered, that is, the cost  
spent to reach the external route type 2 = cost spent to the destination address of the  
route from the ASBR. If the two values are equal, then the cost of the router to the  
corresponding ASBR will be considered.  
I. Configuring OSPF to import external routes  
Perform the following configuration in OSPF view.  
Table 19-5 Configure OSPF to import external routes  
Operation  
Command  
Configure OSPF to import import-route protocol [ cost value | type value |  
routes of other protocols  
Cancel importing  
tag value | route-policy route-policy-name ]*  
undo import-route protocol  
routing  
information of other protocols  
By default, OSPF will not import the routing information of other protocols. For a  
imported route, type is 2, cost is 1, and tag is 1 by default.  
19-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
The routes that can be imported include Direct, Static, RIP, IS-IS, or BGP and in  
addition, the routes of other OSPF processes.  
Note:  
z
z
It is recommended to configure the imported route type, cost and tag for the  
import-route command simultaneously. Otherwise, the later configuration will  
overwrite the former configuration.  
After you configured the import-route command on the OSPF router to import  
external routing information, this OSPF router becomes an ASBR.  
II. Configuring parameters for OSPF to import external routes  
When the OSPF imports the routing information discovered by other routing protocols  
in the autonomous system, some additional parameters need configuring, such as  
default route cost and default tag of route distribution. Route tag can be used to identify  
the protocol-related information. For example, OSPF can use it to identify the AS  
number when receiving BGP.  
Perform the following configuration in OSPF view.  
Table 19-6 Configure parameters for OSPF to import external routes  
Operation  
Command  
default cost value  
Configure the default cost for the OSPF to  
import external routes  
Restore the default cost for the OSPF to import  
external routes  
undo default cost  
default tag tag  
Configure the default tag for the OSPF to  
import external routes  
Restore the default tag for the OSPF to import  
external routes  
undo default tag  
default type { 1 | 2 }  
undo default type  
Configure the default type of external routes  
that OSPF will import  
Restore the default type of the external routes  
imported by OSPF  
By default, the type of imported route is type-2, the cost is 1 and the tag is 1 for a  
imported route.  
19-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
III. Configuring the default interval and number for OSPF to import external  
routes  
OSPF can import the external routing information and broadcast it to the entire  
autonomous system. Importing routes too often and importing too many external routes  
at one time will greatly affect the performance of the device. Therefore it is necessary to  
specify the default interval and number for the protocol to import external routes.  
Perform the following configuration in OSPF view.  
Table 19-7 Configure the default interval and number for OSPF to import external  
routes  
Operation  
Command  
Configure the default interval for OSPF to  
import external routes  
default interval seconds  
Restore the default interval for OSPF to import  
external routes  
undo default interval  
default limit routes  
undo default limit  
Configure the upper limit to the routes that  
OSPF imports at a time  
Restore the default upper limit to the external  
routes that can be imported at a time  
By default, the interval for importing external routes is 1 second. The upper limit to the  
external routes imported is 1000 at a time.  
19.2.6 Configuring OSPF to Import Default Routes  
By default, there are no default routes in a common OSPF area (either a backbone  
area or a non-backbone area). Besides, the import-route command cannot be used to  
import the default route.  
Use the default-route-advertise command to generate and advertise a default route in  
an OSPF route area. Note the following when you use this command:  
z
z
If you use the default-route-advertise command on an ASBR or ABR of a  
common OSPF area, the system generates a Type-5 LSA, advertising the default  
route in the OSPF route area.  
If you use the default-route-advertise command on an ASBR or ABR of an NSSA,  
the system generates a Type-7 LSA, advertising the default route in the NSSA.  
This command is invalid for a stub area or a totally stub area.  
z
z
For an ASBR, the system generates the corresponding Type-5 LSA or Type-7  
LSA by default when a default route existed in the routing table.  
For an ABR, the system will generate a Type-5 LSA or Type-7 LSA no matter  
whether there is a default route in the routing table.  
z
19-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
z
The broadcasting scope of Type-5 LSA or Type-7 LSA advertising the default  
route is the same as that of the common Type-5 LSA or Type-7 LSA.  
Perform the following configuration in OSPF view.  
Table 19-8 Configure OSPF to import the default route  
Operation  
Command  
Import the default route to default-route-advertise [ always | cost value | type  
OSPF  
type-value | route-policy route-policy-name ]*  
Remove  
default route  
the  
imported undo default-route-advertise [ always | cost | type  
| route-policy ]*  
By default, OSPF does not import the default route.  
If you use the always keyword of this command, the system will generate a Type-5 or  
Type-7 LSA no matter whether there is default route in the routing table. Be cautious  
that the always keyword is only valid for an ASBR.  
Because OSPF does not calculate the LSAs it generated during SPF calculation, there  
is no default route in the OSPF route on this router. To ensure the correct routing  
information, you should configure to import the default route on the router only  
connected to the external network.  
Note:  
z
z
After the default-route-advertise command is configured on the OSPF router, this  
router becomes an ASBR. For the OSPF router, the default-route-advertise and  
import-route commands have the similar effect.  
For the ABR or ASBR in the NSSA area, the default-route-advertise and nssa  
default-route-advertise commands have the same effect.  
19.2.7 Configuring OSPF Route Filtering  
Perform the following configuration in OSPF view.  
I. Configuring OSPF to filter the received routes  
Table 19-9 Enable OSPF to filter the received routes  
Operation  
Command  
Disable filtering the received filter-policy  
global routing information  
{
acl-number  
|
ip-prefix  
ip-prefix-name | gateway ip-prefix-name } import  
Cancel filtering the received undo filter-policy { acl-number | ip-prefix  
global routing information  
ip-prefix-name | gateway ip-prefix-name } import  
19-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
By default, OSPF will not filter the received routing information.  
II. Configuring filtering the routes imported to OSPF  
Use the filter-policy export command to configure the ASBR router to filter the  
external routes imported to OSPF. This command is only valid for the ASBR router.  
Table 19-10 Enable OSPF to filter the imported routes of other routing protocols  
Operation  
Command  
Enable OSPF to filter the routes filter-policy { acl-number | ip-prefix  
advertised by other routing protocols ip-prefix-name } export [ routing- process ]  
Disable OSPF to filter the advertised undo filter-policy { acl-number | ip-prefix  
routes by other routing protocols  
ip-prefix-name } export [ routing-process ]  
By default, OSPF does not receive the routes advertised by other routing protocols.  
Note:  
z
z
The filter-policy import command only filters the OSPF routes of this process  
received from the neighbors, and routes that cannot pass the filter will not be added  
to the routing table. This command only takes effect on ABR.  
The filter-policy export command only takes effect on the routes imported by the  
import-route command. If you configure the switch with only the filter-policy  
export command, but without configuring the import-route command to import  
other external routes (including OSPF routes of different process), then the  
filter-policy export command does not take effect.  
z
If the filter-policy export command does not specify which type of route is to be  
filtered, it takes effect on all routes imported by the local device using the  
import-route command.  
19.2.8 Configuring the Route Summary of OSPF  
I. Configuring the route summary of OSPF area  
Route summary means that ABR can aggregate information of the routes of the same  
prefix and advertise only one route to other areas. An area can be configured with  
multiple aggregate segments, thereby OSPF can summarize them. When the ABR  
transmits routing information to other areas, it will generate Sum_net_Lsa (type-3 LSA)  
per network. If some continuous networks exist in this area, you can use the  
abr-summary command to summarize these segments into one segment. Thus, the  
ABR only needs to send an aggregated LSA, and all the LSAs in the range of the  
19-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
aggregate segment specified by the command will not be transmitted separately. This  
can reduce the LSDB size in other areas.  
Once the aggregated segment of a certain network is added to the area, all the internal  
routes of the IP addresses in the range of the aggregated segment will no longer be  
separately advertised to other areas. Only the route summary of the whole aggregated  
network will be advertised. But if the range of the segment is restricted by the keyword  
not-advertise, the route summary of this segment will not be advertised. This segment  
is represented by IP address and mask.  
Route summary can take effect only when it is configured on ABRs.  
Perform the following configuration in OSPF area view.  
Table 19-11 Configure the route summary of OSPF area  
Operation  
Command  
ip-address  
Configure route summary of OSPF abr-summary  
mask  
area  
[ advertise | not-advertise ]  
Cancel route summary of OSPF area undo abr-summary ip-address mask  
By default, route summary is disabled on ABRs.  
II. Configuring summarization of imported routes by OSPF  
OSPF of the Switch 8800 supports route summarization of imported routes.  
Perform the following configurations in OSPF view.  
Table 19-12 Configure summarization of imported routes by OSPF  
Operation  
Command  
ip-address  
Configure summarization of imported asbr-summary  
mask  
routes by OSPF  
[ not-advertise | tag value ]  
Remove summarization of routes  
imported into OSPF  
undo asbr-summary ip-address mask  
By default, summarization of imported routes is disabled.  
After the summarization of imported routes is configured, if the local router is an  
autonomous system border router (ASBR), this command summarizes the imported  
Type-5 LSAs in the summary address range. When NSSA is configured, this command  
will also summarize the imported Type-7 LSA in the summary address range.  
If the local router works as an area border router (ABR) and a router in the NSSA, this  
command summarizes Type-5 LSAs transformed from Type-7 LSAs. If the router is not  
the router in the NSSA, the summarization is disabled.  
19-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
19.2.9 Setting OSPF Route Preference  
Since maybe multiple dynamic routing protocols are running on one router concurrently,  
the problem of route sharing and selection between various routing protocols occurs.  
The system sets a preference for each routing protocol, which will be used in  
tie-breaking in case different protocols discover the same route.  
Perform the following configuration in OSPF view.  
Table 19-13 Set OSPF route preference  
Operation  
Command  
Configure  
a
preference for OSPF for  
preference [ ase ] preference  
undo preference [ ase ]  
comparing with the other routing protocols  
Restore the default protocol preference  
By default, the OSPF preference is 10, and that of the imported external routing  
protocol is 150.  
19.2.10 Configuring OSPF Timers  
I. Setting the interval for Hello packet transmission  
Hello packets are a kind of most frequently used packets, which are periodically sent to  
the adjacent router for discovering and maintaining the adjacency, and for electing DR  
and BDR. The user can set the hello timer.  
According to RFC2328, the consistency of hello intervals between network neighbors  
should be kept. The hello interval value is in inverse proportion to the route  
convergence rate and network load.  
Perform the following configuration in interface view.  
Table 19-14 Set the interval for Hello packet transmission  
Operation  
Command  
Set the hello interval of the interface  
ospf timer hello seconds  
Restore the default hello interval of the interface undo ospf timer hello  
Set the poll interval on the NBMA interface  
Restore the default poll interval  
ospf timer poll seconds  
undo ospf timer poll  
By default, p2p and broadcast interfaces send Hello packets every 10 seconds, and  
p2mp and nbma interfaces send packets every 30 seconds.  
19-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
II. Setting a dead timer for the neighboring routers  
The dead timer of neighboring routers refers to the interval in which a router will regard  
the neighboring router as dead if no Hello packet is received from it. The user can set a  
dead timer for the neighboring routers.  
Perform the following configuration in interface view.  
Table 19-15 Set a dead timer for the neighboring routers  
Operation  
Command  
Configure a dead timer for the neighboring routers ospf timer dead seconds  
Restore the default dead interval of the  
undo ospf timer dead  
neighboring routers  
By default, the dead interval for the neighboring routers of p2p or broadcast interfaces  
is 40 seconds and that for the neighboring routers of p2mp or nbma interfaces is 120  
seconds.  
Note that both hello and dead timer will restore to the default values after the user  
modify the network type.  
III. Setting an interval for LSA retransmission between neighboring routers  
If a router transmits a Link State Advertisements (LSA) to the peer, it requires the  
acknowledgement packet from the peer. If it does not receive the acknowledgement  
packet within the retransmit time, it will retransmit this LSA to the neighbor. The value of  
retransmit is user-configurable.  
Perform the following configuration in interface view.  
Table 19-16 Set an interval for LSA retransmission between neighboring routers  
Operation  
Command  
Configure the interval of LSA retransmission  
for the neighboring routers  
ospf timer retransmit interval  
Restore the default LSA retransmission  
interval for the neighboring routers  
undo ospf timer retransmit  
By default, the interval for neighboring routers to retransmit LSAs is 5 seconds.  
The value of interval should be bigger than the roundtrip value of a packet.  
Note that you should not set the LSA retransmission interval too small. Otherwise,  
unnecessary retransmission will be caused.  
19-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
19.2.11 Configuring the Network Type on the OSPF Interface  
The route calculation of OSPF is based upon the topology of the adjacent network of  
the local router. Each router describes the topology of its adjacent network and  
transmits it to all the other routers.  
OSPF divides networks into four types by link layer protocol:  
z
z
z
Broadcast: If Ethernet or FDDI is adopted, OSPF defaults the network type to  
broadcast.  
Non-Broadcast Multi-access (nbma): If Frame Relay, ATM, HDLC or X.25 is  
adopted, OSPF defaults the network type to NBMA.  
Point-to-Multipoint (p2mp): OSPF will not default the network type of any link layer  
protocol to p2mp. A p2mp network is always changed from another type of  
network. The general undertaking is to change a partially connected NBMA  
network to p2mp network if the NBMA network is not fully connected.  
Point-to-point (p2p): If PPP or LAPB is adopted, OSPF defaults the network type  
to p2p.  
z
NBMA means that a network is non-broadcast and multi-accessible. ATM is a typical  
example for it. The user can configure the polling interval to specify the interval for  
sending polling hello packets before the adjacency of the neighboring routers is formed.  
Set the network type to NBMA if routers not supporting multicast addresses exist in a  
broadcast network.  
Set the interface type to p2mp if not all the routers are directly accessible on an NBMA  
network.  
Change the interface type to p2p if the router has only one peer on the NBMA network.  
The differences between NBMA and p2mp are listed below:  
z
With OSPF, NBMA refers to the networks that are fully connected, non-broadcast  
and multi-accessible. However, a p2mp network is not necessarily fully  
connected.  
z
z
DR and BDR are required on a NBMA network but not on p2mp network.  
NBMA is the default network type. For example, if ATM is adopted as the link layer  
protocol, OSPF defaults the network type on the interface to NBMA, regardless of  
whether the network is fully connected. p2mp is not the default network type. No  
link layer protocols are regarded as p2mp. You must change the network type to  
p2mp by force. The commonest undertaking is to change a partially connected  
NBMA network to a p2mp network.  
z
NBMA forwards packets by unicast and requires configuring neighbors manually.  
p2mp forwards packets by multicast.  
Perform the following configuration in interface view.  
19-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Table 19-17 Configure a network type for an OSPF interface  
Operation  
Command  
ospf network-type { broadcast |  
nbma | p2mp | p2p }  
Configure the network type on the interface  
Restore the default network type of the  
OSPF interface  
undo ospf network-type  
By default, OSPF determines the network type based on the link layer type. After the  
interface has been configured with a new network type, the original network type of the  
interface is removed automatically.  
19.2.12 Configuring NBMA Neighbors for OSPF  
For an NBMA network, some special configurations are required. Since an NBMA  
interface on the network cannot discover the adjacent router through broadcasting  
Hello packets, you must manually specify an IP address for the adjacent router for the  
interface, and specify whether the adjacent router is eligible for election.  
Perform the following configuration in OSPF view.  
Table 19-18 Configure the NBMA neighbors for OSPF  
Operation  
Command  
peer ip-address  
[
dr-priority  
Configure the NBMA neighbors for OSPF  
Remove the configured NBMA neighbors  
dr-priority-number ]  
undo peer ip-address  
By default, the preference for NBMA neighbor is 1.  
19.2.13 Setting the Interface Priority for DR Election  
On a broadcast or NBMA network, a designated router (DR) and a backup designated  
router (BDR) must be elected.  
The priority of a router interface determines the qualification of the interface in DR  
election. The router with the priority of 0 cannot be elected as the DR or BDR.  
DR is not designated manually. Instead, it is elected by all the routers on the segment.  
Routers with the priorities larger than 0 in the network are eligible “candidates”. Votes  
are hello packets. Each router writes the expected DR in the packet and sends it to all  
the other routers on the segment. If two routers attached to the same segment  
concurrently declare themselves to be the DR, choose the one with higher priority. If the  
priorities are the same, choose the one with greater router ID. If the priority of a router is  
0, it will not be elected as DR or BDR.  
19-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
If DR fails due to some faults, the routers on the network must elect a new DR and  
synchronize with the new DR. The process will take a relatively long time, during which,  
the route calculation is incorrect. In order to speed up this process, OSPF puts forward  
the concept of BDR. In fact, BDR is a backup for DR. DR and BDR are elected in the  
meantime. The adjacencies are also established between the BDR and all the routers  
on the segment, and routing information is also exchanged between them. When the  
DR fails, the BDR will become the DR instantly. Since no re-election is needed and the  
adjacencies have already been established, the process is very short. But in this case,  
a new BDR should be elected. Although it will also take a quite long period of time, it will  
not exert any influence upon the route calculation.  
Note the following:  
z
The DR on the network is not necessarily the router with the highest priority.  
Likewise, the BDR is not necessarily the router with the second highest priority. If a  
new router is added after DR and BDR election, it is impossible for the router to  
become the DR even if it has the highest priority.  
z
z
DR is based on the router interface in a certain segment. Maybe a router is a DR  
on one interface, but can be a BDR or DROther on another interface.  
DR election is only required for the broadcast or NBMA interfaces. For the p2p or  
p2mp interfaces, DR election is not required.  
Perform the following configuration in interface view.  
Table 19-19 Set the interface priority for DR election  
Operation  
Command  
Configure the interface with a priority for  
DR election  
ospf dr-priority priority_num  
Restore the default interface priority  
undo ospf dr-priority  
By default, the priority of the interface is 1 in the DR election.  
Use the ospf dr-priority and peer commands to set priorities with different usages:  
z
z
Use the ospf dr-priority command to set priority for DR selection.  
The priority you use the peer command to set indicates whether the adjacent  
router is eligible for election. If you specify the priority as 0 during neighbor  
configuration, the local router considers that this neighbor is not eligible for  
election, thus sending no Hello packets to this neighbor. This configuration can  
reduce the Hello packets on the network during DR and BDR selection. However,  
if the local router is DR or BDR, this router can also send Hello packets to the  
neighbor with priority 0 to establish adjacency relations.  
19-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
19.2.14 Configuring an Interval Required for Sending LSU Packets  
Trans-delay seconds should be added to the aging time of the LSA in an LSU packet.  
Setting the parameter like this mainly considers the time duration that the interface  
requires for transmitting a packet.  
The user can configure the interval of sending LSU message. Obviously, more attention  
should be paid to this item over low speed networks.  
Perform the following configuration in interface view.  
Table 19-20 Configure an interval required for sending LSU packets  
Operation  
Command  
Configure an interval for sending LSU packets  
ospf trans-delay seconds  
Restore the default interval for sending LSU  
packets  
undo ospf trans-delay  
By default, the LSU packets are transmitted per second.  
19.2.15 Configuring the Cost for Sending Packets on an Interface  
The user can control the network traffic by configuring different packet sending costs for  
different interfaces.  
Perform the following configuration in interface view.  
Table 19-21 Configure the cost for sending packets on an interface  
Operation  
Command  
Configure the cost for sending packets on an interface  
ospf cost value  
Restore the default cost for packet transmission on the  
interface  
undo ospf cost  
For the Switch 8800, the default cost for running OSPF on the VLAN interface is 10.  
19.2.16 Configuring to Fill the MTU Field When an Interface Transmits DD  
Packets  
OSPF-running routers use Database Description (DD) packets to describe their own  
LSDBs during LSDB synchronization.  
You can manually specify an interface to fill in the MTU field in a DD packet when it  
transmits the packet. The MTU should be set to the real MTU on the interface.  
Perform the following configuration in interface view.  
19-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Table 19-22 Configure whether the MTU field will be filled in when an interface  
transmits DD packets  
Operation  
Command  
ospf mtu-enable  
Enable an interface to fill in the MTU  
field when transmitting DD packets  
Disable the interface to fill the MTU field  
when transmitting DD packets  
undo ospf mtu-enable  
By default, the interface does not fill in the MTU field when transmitting DD packets. In  
other words, MTU in the DD packets is 0.  
19.2.17 Setting a Shortest Path First (SPF) Calculation Interval for OSPF  
Whenever the LSDB of OSPF takes changes, the shortest path requires recalculation.  
Calculating the shortest path upon change will consume enormous resources as well  
as affect the operation efficiency of the router. Adjusting the SPF calculation interval,  
however, can restrain the resource consumption due to frequent network changes.  
Perform the following configuration in OSPF view.  
Table 19-23 Set the SPF calculation interval  
Operation  
Command  
Set the SPF calculation interval  
Restore the SPF calculation interval  
spf-schedule-interval seconds  
undo spf-schedule-interval seconds  
By default, the interval of SPF recalculation is five seconds.  
19.2.18 Disabling the Interface to Send OSPF Packets  
To prevent OSPF routing information from being acquired by the routers on a certain  
network, use the silent-interface command to disable the interface to transmit OSPF  
packets.  
Perform the following configuration in OSPF view.  
Table 19-24 Enable/Disable the interface to send OSPF packets  
Operation  
Command  
silent-interface-type  
Disable the interface to send OSPF silent-interface  
packets  
silent-interface-number  
Enable the interface to send OSPF undo silent-interface silent-interface-type  
packets silent-interface-number  
19-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
By default, all interfaces are allowed to transmit and receive OSPF packets.  
After an OSPF interface is set to be in silent status, the interface can still advertise its  
direct route. However, the OSPF hello packets of the interface will be blocked, and no  
neighboring relationship can be established on the interface. Thereby, the capability for  
OSPF to adapt to the networking can be enhanced, which will hence reduce the  
consumption of system resources. On a switch, this command can disable/enable the  
specified VLAN interface to send OSPF packets.  
19.2.19 Configuring OSPF Authentication  
I. Configuring the OSPF Area to Support Packet Authentication  
All the routers in one area must use the same authentication mode (no authentication,  
simple text authentication or MD5 cipher text authentication). If the mode of supporting  
authentication is configured, all routers on the same segment must use the same  
authentication key. To configure a simple text authentication key, use the  
authentication-mode simple command. Use the authentication-mode md5  
command to configure the MD5 cipher text authentication key if the area is configured  
to support MD5 cipher text authentication mode.  
Perform the following configuration in OSPF area view.  
Table 19-25 Configure the OSPF area to support packet authentication  
Operation  
Command  
Configure the area to support authentication authentication-mode { simple |  
type  
md5 }  
Cancel the configured authentication mode  
undo authentication-mode  
By default, the area does not support packet authentication.  
II. Configuring OSPF packet authentication  
OSPF supports simple authentication or MD5 authentication between neighboring  
routers.  
Perform the following configuration in interface view.  
Table 19-26 Configure OSPF packet authentication  
Operation  
Command  
Specify a password for OSPF simple text ospf authentication-mode simple  
authentication on the interface  
password  
Cancel simple authentication on the undo ospf authentication-mode  
interface  
simple  
Specify the interface to use MD5 ospf authentication-mode md5  
authentication  
key_id key  
19-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Operation  
Command  
Disable the interface to use MD5 undo ospf authentication-mode  
authentication  
md5  
By default, the interface is not configured with either simple authentication or MD5  
authentication.  
19.2.20 Configuring OSPF Virtual Link  
According to RFC2328, after the area partition of OSPF, not all the areas are equal. In  
which, an area is different from all the other areas. Its area-id is 0.0.0.0 and it is usually  
called the backbone Area. The OSPF routes between non-backbone areas are  
updated with the help of the backbone area. OSPF stipulates that all the non-backbone  
areas should maintain the connectivity with the backbone area. That is, at least one  
interface on the ABR should fall into the area 0.0.0.0. If an area does not have a direct  
physical link with the backbone area 0.0.0.0, a virtual link must be created.  
If the physical connectivity cannot be ensured due to the network topology restriction, a  
virtual link can satisfy this requirement. The virtual link refers to a logic channel set up  
through the area of a non-backbone internal route between two ABRs. Both ends of the  
logic channel should be ABRs and the connection can take effect only when both ends  
are configured. The virtual link is identified by the ID of the remote router. The area,  
which provides the ends of the virtual link with a non-backbone area internal route, is  
called the transit area. The ID of the transit area should be specified during  
configuration.  
The virtual link is activated after the route passing through the transit area is calculated,  
which is equivalent to a p2p connection between two ends. Therefore, similar to the  
physical interfaces, you can also configure various interface parameters on this link,  
such as hello timer.  
The "logic channel" means that the routers running OSPF between two ABRs only take  
the role of packet forwarding (the destination addresses of the protocol packets are not  
these routers, so these packets are transparent to them and the routers forward them  
as common IP packets). The routing information is directly transmitted between the two  
ABRs. The routing information herein refers to the type-3 LSAs generated by the ABRs,  
for which the synchronization mode of the routers in the area will not be changed.  
Perform the following configuration in OSPF area view.  
19-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Table 19-27 Configure an OSPF virtual link  
Operation  
Command  
vlink-peer router-id [ hello seconds | retransmit  
seconds | trans-delay seconds | dead seconds |  
simple password | md5 keyid key ]*  
Create and configure a virtual  
link  
Remove the created virtual link undo vlink-peer router-id  
area-id and router-id have no default value. By default, hello timer is 10 seconds,  
retransmit 5 seconds, trans-delay 1 second, and the dead 40 seconds.  
19.2.21 Configuring Stub Area of OSPF  
Stub areas are some special areas, in which the ABRs do not propagate the learned  
external routes of the AS.  
The stub area is an optional configuration attribute, but not every area conforms to the  
configuration condition. Generally, stub areas, located at the AS boundaries, are those  
non-backbone areas with only one ABR. Even if this area has multiple ABRs, no virtual  
links are established between these ABRs.  
To ensure that the routes to the destinations outside the AS are still reachable, the ABR  
in this area will generate a default route (0.0.0.0) and advertise it to the non-ABR  
routers in the area.  
Pay attention to the following items when configuring a stub area:  
z
z
z
The backbone area cannot be configured to be the stub area and the virtual link  
cannot pass through the stub area.  
If you want to configure an area to be the stub area, then all the routers in this area  
should be configured with this attribute.  
No ASBR can exist in a stub area. In other words, the external routes of the AS  
cannot be propagated in the stub area.  
Perform the following configuration in OSPF area view.  
19-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Table 19-28 Configure stub area of OSPF  
Operation  
Configure an area to be the stub area  
Remove the configured stub area  
Command  
stub [ no-summary ]  
undo stub  
Configure the cost of the default route transmitted by  
OSPF to the stub area  
default-cost value  
Remove the cost of the default route to the stub area undo default-cost  
By default, the stub area is not configured, and the cost of the default route to the stub  
area is 1.  
19.2.22 Configuring NSSA Area of OSPF  
RFC1587 introduced a new type of area called NSSA area, and a new type of LSA  
called NSSA LSA (or Type-7 LSA).  
NSSA areas are virtually variations of Stub areas. They are similar in many ways.  
Neither of them generates or imports AS-External-LSA (namely Type-5 LSA), and both  
of them can generate and import Type-7 LSA. Type-7 LSA is generated by ASBR of  
NSSA area, which can only be advertised in NSSA area. When Type-7 LSA reaches  
ABR of NSSA, ABR will select whether to transform Type-7 LSA into AS-External-LSA  
so as to advertise to other areas.  
For example, in the network below, the AS running OSPF comprises three areas: Area  
1, Area 2 and Area 0. Among them, Area 0 is the backbone area. Also, there are other  
two ASs respectively running RIP. Area 1 is defined as an NSSA area. After RIP routes  
of the Area 1 are propagated to the NSSAASBR, the NSSAASBR will generate type-7  
LSAs which will be propagated in Area 1. When the type-7 LSAs reach the NSSA ABR,  
the NSSAABR will transform it into type-5 LSA, which will be propagated to Area 0 and  
Area 2. On the other hand, RIP routes of the AS running RIP will be transformed into  
type-5 LSAs that will be propagated in the OSPF AS. However, the type-5 LSAs will not  
reach Area 1 because Area 1 is an NSSA. NSSAs and stub areas have the same  
approach in this aspect.  
Similar to a stub area, the NSSA cannot be configured with virtual links.  
RIP  
NSSA  
ABR  
area 1  
NSSA  
NSSA  
ASBR  
area 0  
area 2  
RIP  
Figure 19-2 NSSA area  
19-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Perform the following configuration in OSPF area view.  
Table 19-29 Configure NSSA of OSPF  
Operation  
Command  
nssa  
[
default-route-advertise  
|
Configure an area to be the NSSA area  
Cancel the configured NSSA  
no-import-route | no-summary ]*  
undo nssa  
Configure the default cost value of the  
route to the NSSA  
default-cost cost  
Restore the default cost value of the  
route to the NSSA area  
undo default-cost  
All the routers connected to the NSSA should use the nssa command to configure the  
area with the NSSA attribute.  
The keyword default-route-advertise is used to generate default type-7 LSAs. When  
default-route-advertise is configured, a default type-7 LSA route will be generated on  
the ABR, even though no default route 0.0.0.0 is in the routing table. On an ASBR,  
however, a default type-7 LSA route can be generated only if the default route 0.0.0.0 is  
in the routing table.  
Executing the keyword no-import-route on the ASBR will prevent the external routes  
that OSPF imported through the import-route command from being advertised to the  
NSSA. Generally, if an NSSA router is both ASBR and ABR, this keyword will be used.  
The keyword default-cost is used on the ABR attached to the NSSA. Using this  
command, you can configure the default route cost on the ABR to NSSA.  
By default, the NSSA is not configured, and the cost of the default route to the NSSA is  
1.  
19.2.23 Configuring OSPF and Network Management System (NMS)  
I. Configuring OSPF MIB binding  
After multiple OSPF processes are enabled, you can configure to which OSPF process  
MIB is bound.  
Perform the following configuration in system view.  
Table 19-30 Configure OSPF MIB binding  
Operation  
Command  
ospf mib-binding process-id  
undo ospf mib-binding  
Configure OSPF MIB binding  
Restore the default OSPF MIB binding  
19-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
By default, MIB is bound to the first enabled OSPF process.  
II. Configuring OSPF TRAP  
You can configure the switch to send multiple types of SNMP TRAP packets in case of  
OSPF anomalies. In addition, you can configure the switch to send SNMP TRAP  
packets when a specific process is abnormal by specifying the process ID.  
Perform the following configuration in system view.  
Table 19-31 Enable/Disable OSPF TRAP function  
Operation  
Command  
snmp-agent trap enable ospf [ process-id ] [ ifstatechange |  
virifstatechange | nbrstatechange | virnbrstatechange |  
ifcfgerror | virifcfgerror | ifauthfail | virifauthfail | ifrxbadpkt |  
virifrxbadpkt | txretransmit | viriftxretransmit | originatelsa |  
maxagelsa | lsdboverflow | lsdbapproachoverflow ]  
Enable OSPF  
TRAP function  
undo snmp-agent trap enable ospf  
[ ifstatechange | virifstatechange | nbrstatechange |  
Disable OSPF virnbrstatechange | ifcfgerror | virifcfgerror | ifauthfail |  
[
process-id  
]
TRAP function  
virifauthfail | ifrxbadpkt | virifrxbadpkt | txretransmit |  
viriftxretransmit | originatelsa | maxagelsa | lsdboverflow |  
lsdbapproachoverflow ]  
By default, OSPF TRAP function is disabled. That is, the switch does not send TRAP  
packets when any OSPF process is abnormal. The configuration is valid to all OSPF  
processes if you do not specify a process ID.  
For detailed configuration of SNMP TRAP, refer to the module “System Management"  
in this manual.  
19.2.24 Resetting the OSPF Process  
If the undo ospf command is executed on a router and then the ospf command is used  
to restart the OSPF process, the previous OSPF configuration will lose. With the reset  
ospf command, you can restart the OSPF process without losing the previous OSPF  
configuration.  
Perform the following configuration in user view.  
Table 19-32 Reset OSPF processes  
Operation  
Command  
Reset one or all OSPF  
processes  
reset ospf [ statistics ] { all | process-id }  
Resetting the OSPF process can immediately clear invalid LSAs, and make the  
modified router ID effective or the DR and BDR are re-elected.  
19-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
19.3 Displaying and Debugging OSPF  
After the above configuration, execute the display command in any view to display the  
running of the OSPF configuration, and to verify the effect of the configuration. Execute  
the debugging command in user view to debug the OSPF module.  
Table 19-33 Display and debug OSPF  
Operation  
Command  
Display the brief information of  
the OSPF routing process  
display ospf [ process-id ] brief  
Display OSPF statistics  
display ospf [ process-id ] cumulative  
display ospf [ process-id ] [ area-id ] lsdb [ brief  
Display LSDB information of | [ asbr | ase | network | nssa | router |  
OSPF  
summary ] [ ip-address ] [ originate-router  
ip-address | self-originate ] ]  
Display OSPF peer information display ospf [ process-id ] peer [ brief ]  
Display  
information  
OSPF  
next  
hop  
display ospf [ process-id ] nexthop  
Display OSPF routing table  
Display OSPF virtual links  
Display OSPF request list  
display ospf [ process-id ] routing  
display ospf [ process-id ] vlink  
display ospf [ process-id ] request-queue  
Display OSPF retransmission  
list  
display ospf [ process-id ] retrans-queue  
display ospf [ process-id ] abr-asbr  
Display the information of OSPF  
ABR and ASBR  
Display  
the  
summary  
display ospf [ process-id ] asbr-summary  
[ ip-address mask ]  
information of OSPF imported  
routes  
Display  
information  
OSPF  
interface  
display ospf [ process-id ] interface  
display ospf [ process-id ] error  
Display OSPF errors  
Display the state of the global  
OSPF debugging switches and  
the state of the debugging  
switches for each process  
display debugging ospf  
debugging ospf packet [ ack | dd | hello |  
Enable OSPF packet debugging interface interface-type interface-number  
request I update ]  
|
undo debugging ospf packet [ ack | dd | hello  
| interface interface-type interface-number |  
request I update ]  
Disable  
debugging  
OSPF  
packet  
Enable OSPF event debugging debugging ospf event  
19-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Operation  
Command  
Disable OSPF event debugging undo debugging ospf event  
Enable OSPF LSA packet  
debugging  
debugging ospf lsa-originate  
undo debugging ospf lsa-originate  
debugging ospf spf  
Disable OSPF LSA packet  
debugging  
Enable SPF debugging of  
OSPF  
Disable SPF debugging of  
OSPF  
undo debugging ospf spf  
19.4 Typical OSPF Configuration Example  
19.4.1 Configuring DR Election Based on OSPF Priority  
I. Network requirements  
Four Switch 8800s, Switch A, Switch B, Switch C and Switch D, which can perform the  
router functions and run OSPF, are located on the same segment, as shown in the  
following figure.  
Configure Switch A and Switch C as DR and BDR respectively. The priority of Switch A  
is 100, which is the highest on the network, so it is elected as the DR. Switch C has the  
second highest priority, that is, 2, so it is elected as the BDR. The priority of Switch B is  
0, which means that it cannot be elected as the DR. Switch D does not have a priority,  
which takes 1 by default.  
II. Network diagram  
1.1.1.1  
Switch A  
DR  
Switch D  
4.4.4.4  
196.1.1.4/24  
196.1.1.1/24  
196.1.1.3/24  
196.1.1.2/24  
BDR  
3.3.3.3  
Switch C  
Switch B  
2.2.2.2  
Figure 19-3 Network diagram for configuring DR election based on OSPF priority  
19-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
III. Configuration procedure  
Configure Switch A  
[Switch A] interface Vlan-interface 1  
[Switch A-Vlan-interface1] ip address 196.1.1.1 255.255.255.0  
[Switch A-Vlan-interface1] ospf dr-priority 100  
[Switch A] router id 1.1.1.1  
[Switch A] ospf  
[Switch A-ospf-1] area 0  
[Switch A-ospf-1-area-0.0.0.0] network 196.1.1.0 0.0.0.255  
Configure Switch B.  
[Switch B] interface Vlan-interface 1  
[Switch B-Vlan-interface1] ip address 196.1.1.2 255.255.255.0  
[Switch B-Vlan-interface1] ospf dr-priority 0  
[Switch B] router id 2.2.2.2  
[Switch B] ospf  
[Switch B-ospf-1] area 0  
[Switch B-ospf-1-area-0.0.0.0] network 196.1.1.0 0.0.0.255  
Configure Switch C.  
[Switch C] interface Vlan-interface 1  
[Switch C-Vlan-interface1] ip address 196.1.1.3 255.255.255.0  
[Switch C-Vlan-interface1] ospf dr-priority 2  
[Switch C] router id 3.3.3.3  
[Switch C] ospf  
[Switch C-ospf-1] area 0  
[Switch C-ospf-1-area-0.0.0.0] network 196.1.1.0 0.0.0.255  
Configure Switch D.  
[Switch D] interface Vlan-interface 1  
[Switch D-Vlan-interface1] ip address 196.1.1.4 255.255.255.0  
[Switch D] router id 4.4.4.4  
[Switch D] ospf  
[Switch D-ospf-1] area 0  
[Switch D-ospf-1-area-0.0.0.0] network 196.1.1.0 0.0.0.255  
On Switch A, execute the display ospf peer command to display the OSPF peers.  
Note that Switch A has three peers.  
The state of each peer is full, which means that adjacency is set up between Switch A  
and each peer. (Switch Aand Switch C should set up adjacencies with all the routers on  
the network for them to be DR and BDR on the network respectively.) Switch A is DR,  
while Switch C is BDR on the network. And all the other neighbors are DR others  
(which means that they are neither DRs nor BDRs).  
19-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
Change the priority of Switch B to 200  
[Switch B-Vlan-interface2000] ospf dr-priority 200  
On Switch A, execute the display ospf peer command to show its OSPF neighbors.  
Note the priority of Switch B has changed to 200, but it is still not the DR.  
Only when the current DR is offline, will the DR be changed. Shut down Switch A, and  
execute the display ospf peer command on Switch D to display its neighbors. Note  
that the original BDR (Switch C) becomes the DR, and Switch B is BDR now.  
If all Switches on the network are removed and added back again, Switch B will be  
elected as the DR (with the priority of 200), and Switch A becomes the BDR (with a  
priority of 100). To switch off and restart all of the switches will bring about a new round  
of DR/BDR selection.  
19.4.2 Configuring OSPF Virtual Link  
I. Network requirements  
In Figure 19-4, Area 2 and Area 0 are not directly connected. Area 1 is required to be  
taken as a transit area for connecting Area 2 and Area 0. Configure a virtual link  
between Switch B and Switch C in Area 1.  
II. Network diagram  
Switch A  
1.1.1.1  
Area 0  
196.1.1.1/24  
196.1.1.2/24  
Switch B  
197.1.1.2/24  
2.2.2.2  
Virtual  
Link  
Area 1  
197.1.1.1/24  
152.1.1.1/24  
Area 2  
Switch C  
3.3.3.3  
Figure 19-4 Network diagram for OSPF virtual link configuration  
19-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
III. Configuration procedure  
Configure Switch A  
[Switch A] interface Vlan-interface 1  
[Switch A-Vlan-interface1] ip address 196.1.1.1 255.255.255.0  
[Switch A] router id 1.1.1.1  
[Switch A] ospf  
[Switch A-ospf-1] area 0  
[Switch A-ospf-1-area-0.0.0.0] network 196.1.1.0 0.0.0.255  
Configure Switch B  
[Switch B] interface vlan-interface 7  
[Switch B-Vlan-interface7] ip address 196.1.1.2 255.255.255.0  
[Switch B] interface vlan-interface 8  
[Switch B-Vlan-interface8] ip address 197.1.1.2 255.255.255.0  
[Switch B] router id 2.2.2.2  
[Switch B] ospf  
[Switch B-ospf-1] area 0  
[Switch B-ospf-1-area-0.0.0.0] network 196.1.1.0 0.0.0.255  
[Switch B-ospf-1-area-0.0.0.0] quit  
[Switch B-ospf-1] area 1  
[Switch B-ospf-1-area-0.0.0.1] network 197.1.1.0 0.0.0.255  
[Switch B-ospf-1-area-0.0.0.1] vlink-peer 3.3.3.3  
Configure Switch C  
[Switch C] interface Vlan-interface 1  
[Switch C-Vlan-interface1] ip address 152.1.1.1 255.255.255.0  
[Switch C] interface Vlan-interface 2  
[Switch C-Vlan-interface2] ip address 197.1.1.1 255.255.255.0  
[Switch C] router id 3.3.3.3  
[Switch C] ospf  
[Switch C-ospf-1] area 1  
[Switch C-ospf-1-area-0.0.0.1] network 197.1.1.0 0.0.0.255  
[Switch C-ospf-1-area-0.0.0.1] vlink-peer 2.2.2.2  
[Switch C-ospf-1-area-0.0.0.1] quit  
[Switch C-ospf-1] area 2  
[Switch C-ospf-1-area-0.0.0.2] network 152.1.1.0 0.0.0.255  
19-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
19.5 Troubleshooting OSPF Faults  
Symptom 1: OSPF has been configured in accordance with the earlier-mentioned  
steps, but OSPF on the router cannot run normally.  
Solution: Check according to the following procedure.  
Local troubleshooting: Check whether the protocol between two directly connected  
routers is in normal operation. The normal sign is the peer state machine between the  
two routers reaches the FULL state. (Note: On a broadcast or NBMA network, if the  
interfaces for two routers are in DROther state, the peer state machines for the two  
routers are in 2-way state, instead of FULL state. The peer state machine between  
DR/BDR and all the other routers is in FULL state.  
z
z
Execute the display ospf peer command to view peers.  
Execute the display ospf interface command to view OSPF information on the  
interface.  
z
z
Check whether the physical connections and the lower layer protocol operate  
normally. You can execute the ping command to test. If the local router cannot  
ping the peer router, it indicates that faults have occurred to the physical link and  
the lower layer protocol.  
If the physical link and the lower layer protocol are normal, check the OSPF  
parameters configured on the interface. The parameters should be the same  
parameters configured on the router adjacent to the interface. The same area ID  
should be used, and the networks and the masks should also be consistent. (The  
p2p or virtually linked segment can have different segments and masks.)  
Ensure that the dead timer on the same interface is at least four times the value of  
the hello timer.  
z
z
z
z
If the network type is NBMA, the peer must be manually specified, using the peer  
ip-address command.  
If the network type is broadcast or NBMA, there must be at least one interface with  
a priority greater than zero.  
If an area is set as the stub area, to which the routers are connected. The area on  
these routers must be also set as the stub area.  
z
z
The same interface type should be adopted for the neighboring routers.  
If more than two areas are configured, at least one area should be configured as  
the backbone area (that is to say, the area ID is 0).  
z
z
Ensure that the backbone area is connected to all other areas.  
The virtual links do not pass through the stub area.  
Global troubleshooting: If OSPF cannot discover the remote routes yet in the case that  
the above steps are correctly performed, proceed to check the following configurations.  
z
If more than two areas are configured on a router, at least one area should be  
configured as the backbone area.  
19-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 19 OSPF Configuration  
As shown in Figure 19-5: RTA and RTD are configured to belong to only one area,  
whereas RTB (area0 and area1) and RTC (area1 and area 2) are configured to belong  
to two areas. In which, RTB also belongs to area0, which is compliant with the  
requirement. However, none of the areas to which RTC belongs is area0. Therefore, a  
virtual link should be set up between RTC and RTB. Ensure that area2 and area0  
(backbone area) is connected.  
area0  
area1  
area2  
RTA  
RTB  
RTC  
RTD  
Figure 19-5 OSPF areas  
z
The backbone area (area 0) cannot be configured as the stub area and the virtual  
link cannot pass through the stub area. That is, if a virtual link has been set up  
between RTB and RTC, neither area1 nor area0 can be configured as a stub area.  
In the above figure, only area 2 can be configured as the stub area.  
Routers in the stub area cannot receive external routes.  
z
z
The backbone area must guarantee the connectivity of all nodes.  
19-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Chapter 20 Integrated IS-IS Configuration  
20.1 Introduction to Integrated IS-IS  
Intermediate System-to-Intermediate System (IS-IS) intra-domain routing information  
exchange protocol is designed by the international organization for standardization  
(ISO) for connection-less network protocol (CLNP). This protocol is a dynamic routing  
protocol. To let this protocol support IP routing, IETF expands and modifies IS-IS in  
RFC1195, applying the protocol to TCP/IP and OSI. The modified IS-IS is called  
Integrated IS-IS or Dual IS-IS.  
IS-IS is a link state protocol, which uses shortest path first (SPF) algorithm. IS-IS and  
the OSPF protocol are similar in many aspects. As an interior gateway protocol (IGP),  
IS-IS is applied inside an AS.  
20.1.1 Terms of IS-IS Routing Protocol  
I. Terms of IS-IS routing protocol  
z
Intermediate System (IS). IS equals a router of TCP/IP. It is the basic unit in IS-IS  
protocol used for propagating routing information and generating routes. In the  
following text, the IS shares the same meaning with the router.  
End System (ES). It equals the host system of TCP/IP. ES does not process the  
IS-IS routing protocol, and therefore it can be ignored in the IS-IS protocol.  
Routing Domain (RD). A group of ISs exchange routing information with the same  
routing protocol in a routing domain.  
z
z
z
z
Area. Area is the division unit in the routing domain.  
Link State DataBase (LSDB). All the link states in the network form the LSDB. In  
an IS, at least one LSDB is available. The IS uses the SPF algorithm and the  
LSDB to generate its own routes.  
z
z
Link State Protocol Data Unit (LSPDU). In the IS-IS, each IS will generate an LSP  
which contains all the link state information of the IS. Each IS collects all the LSPs  
in the local area to generate its own LSDB.  
Network Protocol Data Unit (NPDU). It is the network layer packets of OSI and  
equals the IP packet of TCP/IP.  
z
z
Designated IS (DIS). It is the elected router on the broadcast network.  
Network Service Access Point (NSAP) is the network layer address of OSI. It  
identifies an abstract network service access point and describes the very network  
address structure for the OSI model.  
20-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
II. Link types IS-IS routing protocol is applied to  
IS-IS routing protocol can run on point to point Links, such as PPP, HDLC and others.  
IS-IS routing protocol can also run on broadcast links, such as Ethernet, Token-Ring  
and others. For a Non-Broadcast Multi-Access (NBMA) network such as ATM, you  
need to configure sub-interfaces and configure sub-interface type as P2P or broadcast  
network. IS-IS routing protocol cannot run on point to MultiPoint links.  
20.1.2 Two-level Structure of IS-IS Routing Protocol  
I. Two-level structure of IS-IS routing protocol  
Two-level structure of IS-IS routing protocol is adopted in a route area to support large  
scale route network. A large route area can be divided into one or multiple areas. A  
Level-1 router manages the intra-area routes. A Level-2 router manages the inter-area  
routes.  
II. Level-1 and Level-2  
z
Level-1 router  
The Level-1 router is responsible for intra-area route. The Level-1 router and the  
Level-1 router or Level-1-2 router in the same area are neighbors. The Level-1 router  
maintains a Level-1 LSDB. This LSDB contains intra-area routing information. The  
packets sent to other areas are forwarded to the closest Level-2 router.  
z
Level-2 router  
The Level-2 router is responsible for inter-area route. The Level-2 router and Level-2  
routers or Level-1-2 routers in other areas are neighbors. The Level-2 router maintains  
a Level-2 LSDB. This LSDB contains inter-area routing information. The backbone  
(which is made up of all Level-2 routers) of a route area is responsible for inter-area  
communications. The Level-2 routers in the route area must be continuous to ensure  
the backbone continuity.  
z
Level-1-2 router  
A Level-1-2 router is both a Level-1 router and a Level-2 router. At least one Level-1-2  
router in each area connects the area to the backbone network. A Level-1-2 router  
maintains two LSDBs: the Level-1 LSDB for intra- area route and Level-2 LSDB for  
inter-area route.  
Figure 20-1 illustrates a network running IS-IS routing protocol and composed of  
Routing Domain 1 and Routing Domain 2. Routing Domain 1 includes two areas, Area  
1 and Area 2, and Routing Domain 2 only has Area 3. In Routing Domain 1, the three  
ISs connected by bold lines compose the area backbone. They are all Level-2 routers.  
The other 4 ISs not connected by bold line are Level-1 routers.  
20-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
IS  
IS  
ES  
IS  
ES  
IS  
ES  
IS  
ES  
IS  
IS  
ES  
Area 1  
Area 2  
Routing Domain 1  
Routing Domain 2  
Routing Domain Boundary  
IS-IS Area  
Area 3  
IS  
IS  
ES  
IS  
End system  
Intermediate system  
ES  
ES  
ES  
Subnetwork Path  
Interdomain Routing  
Level 1 IS-IS Routing  
Level 2 IS-IS Routing  
Figure 20-1 IS-IS topology  
20-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
20.1.3 NSAP Structure of IS-IS Routing Protocol  
I. Address structure  
IDP  
DSP  
SEL  
(1 octet)  
AFI  
IDI  
High Order DSP  
SyStem ID  
Area Address  
Figure 20-2 NSAP structure  
OSI adopts the address structure as shown in Figure 20-2. NSAP includes initial  
domain part (IDP) and domain specific part (DSP). The IDP is defined by ISO; it  
consists of authority responsible for assigning the rest of the address and address  
format. The DSP is allocated by the authority specified in IDP. IDP and DSP are  
length-variable with a total length of 20 bytes.  
z
Area Address  
IDP includes authority and format identifier (AFI) and initial domain identifier (IDI). AFI  
defines the format of IDI. DSP has several bytes. The combination of IDP and HO-DSP  
can identify a route area and an area of the route area, so the combination is called an  
area address.  
In general, you only need to configure an area address for a router. The area addresses  
of all nodes are the same in an area. To support the seamless combination,  
segmentation and conversion, the Switch 8800 supports up to three area addresses.  
z
System ID  
System ID uniquely identifies terminal system or router in a route area. You can select  
length for it. The System ID length is 48 bits (6 bytes). In general, you can obtain  
System ID according to Router_ID.  
If the IP address 168.10.1.1 of the interface LoopBack0 serves as a router_ID for the  
router, you can use the following method to obtain the System ID:  
Turn each part of the IP address 168.10.1.1 into three digits. Add 0 to the front of the  
part less than three digits.  
Divide the expanded address 168.010.001.001 into three parts. Each part contains four  
digits.  
You get the System ID 1680.1000.1001.  
You can specify a System ID using different methods. However, you should ensure a  
System ID can uniquely identify a terminal system or a router.  
20-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
z
SEL  
NSAP selector (SEL or N-SEL) functions as the protocol identifier of an IP address.  
Different transmission protocols correspond to different identifiers. All the SELs of IP  
are 00.  
Because the address structure defines clearly an area, a Level-1 router can easily  
identify the packets not sent to the area where it is located. The Level-1 router forwards  
the packets to a Level-2 router.  
The Level-1 router performs routing within areas by System IDs. If it detects the  
destination address of a packet does not belong to the area where it is located, it  
forwards the packet to its closest Level-2 router.  
The Level-2 router performs intra-area routing according to the area address (IDP +  
HO-DSP).  
II. NET  
Network Entity Title (NET) indicates the network layer information, which contains no  
transfer layer information (SEL=0). You can regard it as a special NSAP.  
In general, you can configure a NET for a router. If you will redivide an area (combine  
multiple areas or divide an area into multiple areas), you can configure multiple NETs to  
ensure correct routes in the case of reconfiguration. Because you can configure up to  
three area addresses, you can only configure up to three NETs.  
For example, there is a NET 47.0001.aaaa.bbbb.cccc.00, in which,  
Area=47.0001, System ID=aaaa.bbbb.cccc, SEL=00.  
For example, there is a NET 01.1111.2222.4444.00, in which,  
Area=01, System ID=1111.2222.4444, and SEL=00.  
20.1.4 IS-IS Routing Protocol Packets  
IS-IS packets are directly encapsulated in the data link frames and mainly divided into 3  
kinds, Hello, LSP and SNP.  
I. Hello packets  
Hello packets, which is also called IIH (IS-to-IS Hello PDUs), can establish and  
maintain neighbor relations. The Level-1 router in a broadcast LAN forwards Level-1  
LAN IIH; the Level-2 router in a broadcast LAN forwards Level-2 LAN IIH;  
non-broadcast network forwards Point-to-Point IIH.  
II. LSP  
Link state packet (LSP) can switch link state information. LSP can be divided into  
Level-1 LSP and Level-2 LSP. Level-2 routers transmit Level-2 LSPs; Level-1 routers  
transmit Level-1 LSPs; Level-1-2 routers transmit both Level-2 LSPs and Level-1  
LSPs.  
20-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
III. SNP  
Sequence Number Packet (SNP) can confirm the LSPs last received from neighbors.  
SNPs function as acknowledge packets, but SNPs function more validly. SNP includes  
complete SNP (CSNP) and partial SNP (PSNP). SNP can be further divided into  
Level-1 CSNP, Level-2 CSNP, Level-1 PSNP and Level-2 PSNP.  
PSNP only lists one or more last received LSP sequence numbers, and confirms  
multiple LSPs. When detecting asynchronous LSDBs, the system asks neighbors to  
send new LSPs by PSNPs.  
CSNP contains all LSP digest information in a LSDB, synchronizing LSDBs for  
neighbor routers. On a broadcast network, a DIS sends CSNPs periodically (the default  
sending period is 10 seconds). On the point-to-point line, a DIS sends CSNPs only  
when the neighbors are established for the first time.  
20.2 Configuring Integrated IS-IS  
Among the following configurations, the configuration of enabling integrated IS-IS is  
required, while other configurations are optional.  
IS-IS configuration includes:  
1) IS-IS basic configuration  
z
z
z
20-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Enabling IS-IS on the Specified Interface  
z
z
z
2) Configuration related to IS-IS route  
z
z
z
z
z
3) Default route generation  
z
z
20-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Configuring IS-IS Route Metric Type  
z
z
z
z
z
z
4) Configuration related to IS-IS networking  
z
z
z
z
z
5) Some operation commands  
z
z
20.2.1 Enabling IS-IS and Entering the IS-IS View  
After creating an IS-IS routing process, you should also activate this routing process at  
an interface that may correlate with another router. After that, the IS-IS protocol can be  
started and run.  
Perform the following configuration in system view.  
Table 20-1 Enable IS-IS and enter the IS-IS view  
Operation  
Command  
isis [ tag ]  
Enable the IS-IS and enter the IS-IS view  
The tag argument identifies the IS-IS process. In the present version, just one IS-IS  
process is allowed.  
By default, the IS-IS routing process is disabled.  
20.2.2 Setting Network Entity Title  
Network Entity Titles (hereafter referred to as NETs) defines the current IS-IS area  
address and the system ID of the router.  
Perform the following configurations in IS-IS view.  
Table 20-2 Set NET  
Operation  
Set a NET  
Command  
network-entity network-entity-title  
20-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Delete a NET  
Chapter 20 Integrated IS-IS Configuration  
undo network-entity network-entity-title  
The format of the network-entity-title argument is X…X.XXXXXXXXXXXX.XX, among  
which the first “X…X” is the area address, the twelve Xs in the middle is the System ID  
of the router. The last XX should be 00.  
20-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
20.2.3 Enabling IS-IS on the Specified Interface  
After enabling IS-IS, you need to specify on which Interfaces the IS-IS will be run.  
Perform the following configuration in interface view.  
Table 20-3 Enable IS-IS on the specified interface  
Operation  
Command  
isis enable [ tag ]  
undo isis enable [ tag ]  
Enable IS-IS on the specified Interface  
Cancel this designation  
20.2.4 Setting Priority for DIS Election  
In the broadcast network, the IS-IS needs to elect a DIS from all the routers.  
When you need to select a DIS from the IS-IS neighbors on the broadcast network, you  
should select level-1 DIS and level-2 DIS respectively. The higher the priority is, the  
more possible it is selected. If there are two or more routers with the highest priority in  
the broadcast network, the one with the greatest MAC address will be selected. If all the  
adjacent routers' priorities are 0, the one with the greatest MAC address will be  
selected.  
The DISs of Level-1 and Level-2 are elected separately. You can set different priorities  
for DIS election at different levels.  
Perform the following configuration in interface view.  
Table 20-4 Set priority for DIS election  
Operation  
Command  
Set the priorities for DIS election on the isis dis-priority value [ level-1 |  
interface level-2 ]  
Restore the default priorities for DIS undo isis dis-priority [ level-1 |  
election on the interface level-2 ]  
By default, the interface priority is 64. If the level is not specified, it defaults to setting  
the priority of Level-1.  
20.2.5 Setting Router Type  
Based upon the position of the router, the levels can be divided into Level-1  
(intra-domain router), Level-2 (inter-domain router) and Level-1-2 (that is, intra-domain  
router as well as inter-domain router).  
Perform the following configuration in IS-IS view.  
20-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Table 20-5 Set the router type  
Operation  
Set the router type  
Command  
is-level { level-1 | level-1-2 | level-2 }  
undo is-level  
Restore the default router type  
By default, the router type is level-1-2.  
20.2.6 Setting Interface Circuit Level  
Perform the following configuration in Interface view.  
Table 20-6 Set the interface circuit level  
Operation  
Command  
isis circuit-level [ level-1 | level-1-2 |  
level-2 ]  
Set the interface circuit level  
Restore the default interface circuit level undo isis circuit-level  
Note:  
Only when the router to which the interface belongs is of Level-1-2 type, is the  
modification to the interface circuit level meaningful. Otherwise, the type of the router  
determines the level of adjacency relation.  
You can set the circuit level to limit what adjacency can be established for the interface.  
For example, Level-1 interface can only have Level-1 adjacency. Level-2 interface can  
only have Level-2 adjacency. For the Level-1-2 router, you can configure some  
interfaces to Level-2 to prevent transmitting Level-1 Hello packets to Level-2 backbone  
so as to save the bandwidth. However, Level-1 and Level-2 use the same kind of Hello  
packet over the p2p link, and therefore such setting is unnecessary in this case.  
By default, the circuit-level on the interface is level-1-2.  
20.2.7 Configuring IS-IS to Import Routes of Other Protocols  
For IS-IS, the routes discovered by other routing protocols are processed as the routes  
outside the routing domain. When importing the routes of other protocols, you can  
specify the default cost for them.  
When IS-IS imports routes, you can also specify to import the routes to Level-1, Level-2  
or Level-1-2.  
Perform the following configuration in IS-IS view.  
20-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Table 20-7 Import routes of other protocols  
Operation  
Command  
import-route protocol [ cost value | type { external |  
internal } | [ level-1 | level-1-2 | level-2 ] | route-policy  
route-policy-name ]*  
Import routes of other  
protocols  
undo import-route protocol [ cost value | type  
{ external | internal } | [ level-1 | level-1-2 | level-2 ] |  
route-policy route-policy-name ]*  
Cancel importing routes  
from other protocols  
If the level is not specified in the command for importing the route, it defaults to  
importing the routes into level-2.  
protocol specifies the routing protocol sources that can be imported, which can be  
direct, static, rip, bgp, and ospf, etc.  
By default, IS-IS does not import routing information from any other protocols.  
For more about importing routing information, refer to the "Configuring IP Routing  
Policy" part.  
20.2.8 Configuring IS-IS Route Filtering  
IS-IS protocol can filter the received and advertised routes according to the access  
control list specified by acl-number.  
Perform the following configuration in IS-IS view.  
I. Configuring to filter the routes received by IS-IS  
Table 20-8 Configure to filter the received routes  
Operation  
Command  
Configure to filter the received routes  
Cancel filtering the received routes  
filter-policy acl-number import  
undo filter-policy acl-number import  
II. Configuring to filter the advertised routes  
Table 20-9 Configure to filter the advertised routes  
Operation  
Command  
Configure to filter the routes advertised filter-policy  
acl-number  
export  
by IS-IS  
[ protocol ]  
Configure not to filter the routes undo filter-policy acl-number export  
advertised by IS-IS [ protocol ]  
By default, IS-IS does not filter the route advertised by other routing protocols.  
20-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
protocol specifies the routing protocol sources for advertising routes, which can be  
direct, static, rip, bgp, ospf, ospf-ase, and so on.  
Note:  
z
z
The filter-policy import command only filters the ISIS routes received from the  
neighbors, and routes that cannot pass the filter will not be added to the routing  
table. This command takes effect on Level-1-2 routers.  
The filter-policy export command only takes effect to the routes imported by the  
import-route command. If you configure the switch with only the filter-policy  
export command, but without configuring the import-route command to import  
other external routes, then the filter-policy export command does not take effect.  
If the filter-policy export command does not specify which route to be filtered, then  
the all the routes imported by the import-route command will be filtered.  
z
20.2.9 Configuring IS-IS Routing Leak  
By virtual of IS-IS routing leak function, a Level-2 router can advertise the routing  
information of Level-1 areas and the Level-2 area it knows to a Level-1 router.  
Perform the following configuration in IS-IS view.  
Table 20-10 Configure IS-IS routing leak  
Operation  
Command  
import-route isis level-2 into level-1  
acl-number ]  
[
acl  
Enable IS-IS routing leak  
undo import-route isis level-2 into level-1 [ acl  
acl-number ]  
Disable IS-IS routing leak  
By default, a Level-2 router does not advertise its routing information to a Level-1 area.  
20.2.10 Setting IS-IS Route Summary  
Users can set the routes with the same next hops as one route in the routing table.  
Perform the following configurations in IS-IS view.  
Table 20-11 Set a summary route  
Operation  
Command  
summary ip-address ip-mask [ level-1 | level-1-2 |  
level-2 ]  
Set a summary route  
undo summary ip-address ip-mask [ level-1 |  
level-1-2 | level-2 ]  
Delete the summary route  
20-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
By default, the system disables route summarization.  
20.2.11 Setting to Generate Default Route  
In the IS-IS route domain, the Level-1 router only has the LSDB of the local area, so it  
can only generate the routes in the local areas. But the Level-2 router has the  
backbone LSDB in the IS-IS route domains and generates the backbone network  
routes only. If a Level-1 router in one area wants to forward the packets to other areas,  
it needs to first forward the packets to the closest Level-1-2 router in the local area  
along its default route. You do not need to configure the default Level-1 route, but need  
to manually configure the default Level-2 route.  
Perform the following configurations in IS-IS view.  
Table 20-12 Set to generate default route  
Operation  
Command  
default-route-advertise  
[
route-policy  
Set to generate default route  
route-policy-name ]  
undo  
default-route-advertise  
Set not to generate default route  
[ route-policy route-policy-name ]  
The default route generated by this command will only be imported to the router at the  
same level.  
20.2.12 Setting the Preference of IS-IS Protocol  
In a router on which several routing protocols are concurrently operating, there is an  
issue of sharing and selecting the routing information among all the routing protocols.  
The system sets a preference for each routing protocol. When various routing protocols  
find the route to the same destination, the protocol with the higher preference will take  
effect.  
Perform the following configuration in IS-IS view.  
Table 20-13 Configure the preference of IS-IS protocol  
Operation  
Command  
preference value  
undo preference  
Configure the preference of IS-IS protocol  
Restore the default preference of IS-IS protocol  
By default, the preference of IS-IS route is 15.  
20-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
20.2.13 Configuring IS-IS Route Metric Type  
IS-IS routing protocol has two styles of route metric:  
z
z
Narrow: The value of route metric ranges from 1 to 63.  
Wide: The value of route metric ranges from 1 to 16,777,215.  
A router can choose either or both of the styles.  
Perform the following configuration in IS-IS view.  
Table 20-14 Configure the style for route metric values of IS-IS packets  
Operation  
Command  
cost-style { narrow | wide | wide-compatible |  
Configure the style for route  
metric values of IS-IS packets  
{
compatible  
|
narrow-compatible  
}
[ relax-spf-limit ] }  
Restore the default settings  
undo cost-style  
By default, IS-IS only receives and sends the packets whose route metric is in narrow  
style.  
20.2.14 Setting IS-IS Link State Routing Cost  
Users can configure the interface cost, namely, the default routing cost.  
Perform the following configuration in interface view.  
Table 20-15 Set IS-IS link state routing cost  
Operation  
Command  
Set the routing cost of the interface  
isis cost value [ level-1 | level-2 ]  
Restore the default routing cost of the  
interface  
undo isis cost [ level-1 | level-2 ]  
If the level is not specified, the default setting is Level-1 routing cost.  
The value argument is configured according to the link state of the interface.  
By default, the routing cost of IS-IS on an interface is 10.  
20.2.15 Configuring IS-IS Timers  
I. Setting the Hello packet broadcast interval  
The IS-IS periodically sends the Hello packets from the interface and the routers  
maintain the adjacency through the transmitting/receiving of the Hello packets The  
Hello packet interval can be modified.  
20-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Perform the following configuration in interface view.  
Table 20-16 Set the Hello packet broadcast interval  
Operation  
Command  
Set Hello packet interval, measured in isis timer hello seconds [ level-1 |  
seconds. level-2 ]  
Restore the default Hello packet interval undo isis timer hello [ level-1 |  
on the interface level-2 ]  
Usually, on the broadcast links, there exist level-1 and level-2 hello packets. For  
different packets, different broadcast intervals should be set. However, there are two  
exceptions. One is when there is no level separation in the link, parameters of level-1  
and level-2 need not be specified in the command (adopt the default values). So the  
system will set the broadcast intervals of all packets as that of the level-1 hello packet.  
The other is if hello packets are not separated according to level-1 and level-2 on the  
p2p links, the attribute of the packets need not be set either.  
By default, Hello packets are transmitted on an interface every 10 seconds.  
II. Setting the CSNP packet broadcast interval  
The CSNP packet is transmitted by the DIS over the broadcast network to synchronize  
the link state database (LSDB). The CSNP packet is regularly broadcast over the  
broadcast network at an interval, which can be set by users.  
Perform the following configuration in interface view.  
Table 20-17 Set the CSNP packet broadcast interval  
Operation  
Command  
Set the CSNP packet broadcast interval, isis timer csnp seconds [ level-1 |  
measured in seconds level-2 ]  
Restore the default CSNP packet undo isis timer csnp [ level-1 |  
broadcast interval on the interface level-2 ]  
If the level is not specified, it defaults to setting CSNP packet broadcast interval for  
Level-1.  
By default, the CSNP packet is transmitted via interface every 10 seconds.  
III. Setting the LSP packet transmission interval  
LSP carries the link state records for propagation throughout the area.  
Perform the following configuration in interface view.  
20-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Table 20-18 Set the LSP packet transmission interval  
Operation  
Command  
Set LSP packet interval on the interface, measured in  
milliseconds.  
isis timer lsp time  
Restore the default LSP packet interval on the interface undo isis timer lsp  
By default, the LSP packet is transmitted via the interface every 33 milliseconds.  
IV. Setting LSP packet retransmission interval  
Over a p2p link, if the local end does not receive the response within a period of time  
after it sends an LSP packet, it considers that the originally transmitted LSP packet has  
been lost or dropped. In order to guarantee the transmission reliability, the local router  
will retransmit the original LSP packet.  
Perform the following configuration in interface view.  
Table 20-19 Set LSP packet retransmission interval  
Operation  
Command  
Set the retransmission interval of the  
LSP packet over p2p links  
isis timer retransmit seconds  
Restore the default retransmission  
interval of the LSP packet over p2p links  
undo isis timer retransmit  
By default, the LSP packet is transmitted every five seconds over the p2p link.  
V. Configuringnumber of invalid Hello packets for the interface  
The router maintains the adjacency by sending/receiving Hello packets. When  
receiving no Hello packets from the peer within a time interval, the local router regards  
the neighbors are invalid. The time interval is called Holddown time for the IS-IS.  
Setting invalid number of Hello packets can adjust the Holddown time in the IS-IS. That  
is to say, after continuously receiving no specified number of Hello packets, the router  
regards the neighbors are invalid.  
Table 20-20 Set number of invalid Hello packets for the interface  
Operation  
Command  
Set the number of invalid isis timer holding-multiplier value [ level-1 |  
Hello packets  
level-2 ]  
undo isis timer holding-multiplier [ level-1 |  
level-2 ]  
Restore the default setting  
20-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
By default, the number of the invalid Hello packets is set to 3.  
If this command does not specify Level-1 or Level-2, the system regard the invalid Hello  
packets are set for both Level-1 and Level-2 routers.  
20.2.16 Setting IS-IS Authentication  
I. Setting interface authentication  
The authentication password set on the interface is mainly used in the Hello packet so  
as to confirm the validity and correctness of its peers. The authentication passwords at  
the same level of all the interfaces of a network should be identical.  
Perform the following configuration in interface view.  
Table 20-21 Set interface authentication password  
Operation  
Command  
isis authentication-mode { simple | md5 }  
password [ { level-1 | level-2 } [ ip | osi ] ]  
Set authentication password  
Delete authentication-mode undo isis authentication-mode { simple | md5 }  
password password [ { level-1 | level-2 } [ ip | osi ] ]  
By default, the interface is not configured with any authentication password nor  
performs authentication. If the level is not specified, it defaults to setting the  
authentication password of Level-1.  
II. Setting IS-IS area or IS-IS routing domain authentication password  
Users can configure the IS-IS area or the IS-IS routing domain with authentication  
password.  
If area authentication is needed, the area authentication password will be encapsulated  
into the level-1 LSP, CSNP and PSNP packets, in the specified mode. If other routers in  
the same area also have started the area authentication, their authentication modes  
and passwords must be identical to those of their neighbors, so that they can work  
normally. Similarly, for domain authentication, the password will also be encapsulated  
into the level-2 LSP, CSNP and PSNP packets in the specified mode. If the routers in  
the backbone layer (level-2) also need domain authentication, their authentication  
mode and password must be identical to those of their neighbors.  
Note that the passwords for authentication of the routers on the same network segment  
must be identical.  
Perform the following configurations in IS-IS view.  
20-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Table 20-22 Set IS-IS authentication password  
Operation  
Command  
area-authentication-mode { simple |  
md5 } password [ ip | osi ]  
Set authentication-mode password  
undo  
area-authentication-mode  
Delete authentication-mode password  
{ simple | md5 } [ ip | osi ]  
Set routing domain authentication domain-authentication-mode { simple  
password | md5 } password [ ip | osi ]  
Delete routing domain authentication undo  
domain-authentication-mode  
password { simple | md5 } [ ip | osi ]  
By default, the system does not require password or perform authentication.  
III. Setting the IS-IS to use the MD5 algorithm compatible with that of the other  
vendors  
You must configure this command when the switch needs to authenticate the devices of  
other vendors using MD5 algorithm in IS-IS.  
Perform the following configuration in IS-IS view.  
Table 20-23 Set the IS-IS to use the MD5 algorithm compatible with that of the other  
vendors  
Operation  
Command  
md5-compatible  
Set the IS-IS to use the MD5 algorithm compatible  
with that of the other vendors  
Set the IS-IS to use the default MD5 algorithm  
undo md5-compatible  
By default, the system uses the MD5 algorithm in IS-IS which is compatible with that of  
3Com.  
20.2.17 Setting the Mesh Group of the Interface  
On a NBMA network, the interface of a router will flood the received LSP to other  
interfaces. However, this processing method applied to a network with higher  
connectivity and several p2p links will cause repeated LSP flooding and waste  
bandwidth.  
To avoid such problem, you can configure several interfaces into a mesh group. The  
interface will flood it outside the group only.  
Perform the following configuration in interface view.  
20-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Table 20-24 Set the mesh group of the interface  
Operation  
Command  
isis mesh-group { mesh-group-number |  
mesh-blocked }  
Add an interface to a mesh group  
Remove the interface from the mesh  
group  
undo isis mesh-group  
By default, the LSP is flooded normally from the interface. When configured with the  
mesh-blocked keyword, it will not flood the LSP to other interfaces.  
Thus the IS-IS configuration tasks on the interface are finished. The following sections  
discuss how to configure other parameters of IS-IS.  
20.2.18 Setting Overload Flag Bit  
Sometimes, the router in the IS-IS domain may encounter some problems in operation  
thus errors may occur in the whole routing area. In order to avoid this problem, you can  
set the overload flag bit for this router.  
When the overload threshold is set, other routers should not send this router the  
packets which should be forwarded by it.  
Perform the following configurations in IS-IS view.  
Table 20-25 Set overload flag bit  
Operation  
Set overload flag bit  
Command  
set-overload  
undo set-overload  
Remove the overload flag bit  
By default, no over load bit is set.  
20.2.19 Setting to Discard the LSPs with Checksum Errors  
After receiving an LSP packet, the local IS-IS will calculate its checksum and compares  
the result with the checksum in the LSP packet. This process is the checksum  
authentication over the received LSP. By default, even when the checksum in the  
packet is not consistent with the calculated result, the LSP packet is not discarded.  
However, when not ignoring LSP checksum error is set with the  
ignore-lsp-checksum-error command, the LSP packet will be discarded if the  
checksum error is found.  
Perform the following configuration in IS-IS view.  
20-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Table 20-26 Set to discard the LSPs with checksum errors  
Operation  
Command  
Set to discard the LSP with checksum error  
Set to ignore the LSP checksum error  
ignore-lsp-checksum-error  
undo ignore-lsp-checksum-error  
By default, the LSP checksum error is ignored.  
20.2.20 Setting to Log the Peer Changes  
After peer changes log is enabled, the IS-IS peer changes will be output on the  
configuration terminal until the log is disabled.  
Perform the following configuration in IS-IS view.  
Table 20-27 Set to log the peer changes  
Operation  
Enable peer changes log  
Disable peer changes log  
Command  
log-peer-change  
undo log-peer-change  
By default, the peer changes log is disabled.  
20.2.21 Setting LSP Refreshment Interval  
In order to ensure that the LSPs in the whole area can maintain the synchronization, all  
the current LSPs will be transmitted periodically.  
Perform the following configuration in IS-IS view.  
Table 20-28 Set LSP refreshment interval  
Operation  
Command  
timer lsp-refresh seconds  
undo timer lsp-refresh  
Set LSP refreshment interval  
Restore the default LSP refreshment interval  
By default, LSP is refreshed every 900 seconds (15 minutes).  
20.2.22 Setting Lifetime of LSP  
When a router generates the LSP of the system, it will fill in the maximum lifetime of this  
LSP. When other routers receive this LSP, its life time will be reduced continuously as  
the time goes. If updated LSP has not been received before the old one times out, this  
LSP will be deleted from the LSDB.  
20-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Perform the following configuration in IS-IS view.  
Table 20-29 Set Lifetime of LSP  
Operation  
Set lifetime of LSP  
Command  
timer lsp-max-age seconds  
undo timer lsp-max-age  
Restore the default LSP lifetime  
By default, LSP can live for 1200 seconds (20 minutes).  
20.2.23 Setting Parameters Related to SPF  
I. Setting SPF calculation interval  
When IS-IS LSDB changes, the router will compute the shortest path again. However,  
the immediate calculation upon every change will occupy too many resources and  
affect the efficiency of the router. In the case that SPF computing interval is set, when  
LSDB changes, SPF algorithm will be run after the SPF interval times out.  
Perform the following configuration in IS-IS view.  
Table 20-30 Set SPF calculation interval  
Operation  
Command  
Set SPF calculation interval  
timer spf second [ level-1 | level-2 ]  
Restore default SPF calculation interval undo timer spf [ level-1 | level-2 ]  
If the level is not specified, it defaults to setting the SPF calculation interval of Level-1.  
By default, SPF calculation runs every 10 seconds.  
II. Setting SPF calculation in slice  
When there is a large number of routes in the routing table (over 150,000), SPF  
calculation of IS-IS may occupy the system resources for a long time. To prevent such a  
case, SPF calculation can be set to perform in slice.  
Perform the following configuration in IS-IS view.  
Table 20-31 Set SPF calculation in slice  
Operation  
Command  
spf-slice-size seconds  
undo spf-slice-size  
Set the duration of one cycle in second  
of SPF calculation  
Restore the default configuration  
20-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
By default, SPF calculation is not divided into slices but runs to the end once, which can  
also be implemented by setting the seconds argument to 0.  
After slice calculation is set, the routes that are not processed once will be calculated in  
one second.  
Normally, the user is not recommended to modify the default configuration. When the  
number of routes is between 150,000 and 200,000, it is recommended to set the  
seconds argument to 1, that is, the duration time for SPF calculation each time is 1  
second.  
III. Setting SPF to release CPU actively  
To prevent SPF calculation from occupying the system resources for a long time, which  
affects the response speed of the console, SPF can be set to automatically release the  
system CPU resources after processing a certain number of routes and the  
unprocessed routes will be calculated in one second.  
Perform the following configuration in IS-IS view.  
Table 20-32 Set SPF to release CPU actively  
Operation  
Command  
spf-delay-interval number  
undo spf-delay-interval  
Specify the number of routes to process  
before releasing CPU  
Restore the default configuration  
By default, CPU is released once when every 5000 routes are processed by the SPF of  
IS-IS.  
20.2.24 Enabling/Disabling the Interface to Send Packets  
To prevent the IS-IS routing information from being obtained by some router in a certain  
network, the silent-interface command can be used to prohibit sending IS-IS packets  
via the interface connecting with the router.  
Perform the following configuration in IS-IS view.  
Table 20-33 Enable/Disable the interface to send IS-IS packets  
Operation  
Command  
silent-interface-type  
Disable the interface to send IS-IS silent-interface  
packets  
silent-interface-number  
Enable the interface to send IS-IS undo silent-interface silent-interface-type  
packets silent-interface-number  
By default, the interface is allowed to receive and send IS-IS packets.  
20-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
The silent-interface command is only used to restrain the IS-IS packets not to be sent  
on the interface, but the interface routes can still be sent from other interfaces. On a  
switch, this command can disable/enable the specified VLAN interface to send IS-IS  
packets.  
20.2.25 Resetting All the IS-IS Data Structure  
When it is necessary to refresh some LSPs immediately, perform the following  
configuration in user view.  
Table 20-34 Reset all the IS-IS data structures  
Operation  
Command  
Reset the IS-IS data structure  
reset isis all  
By default, the IS-IS data structure is not cleared.  
20.2.26 Resetting the Specified IS-IS Peer  
When it is necessary to connect a specified peer again, perform the following  
configuration in user view.  
Table 20-35 Reset the specified IS-IS peer  
Operation  
Command  
Reset the specified IS-IS peer  
reset isis peer system-id  
By default, the IS-IS peer is not cleared.  
20.3 Displaying and Debugging Integrated IS-IS  
After completing the above configuration, execute the display command in any view to  
display the running state of the IS-IS configuration, and to verify the effect of the  
configuration. Execute the debugging command in user view to debug the IS-IS  
module.  
Through the following configuration operations, you can view the LSDB of the IS-IS, the  
transmitting/receiving of various packets of the IS-IS and the SPF calculation so as to  
determine the IS-IS route maintenance conditions.  
Table 20-36 Display and debug IS-IS  
Operation  
Display IS-IS LSDB  
Command  
display isis lsdb [ [ l1 | l2 | level-1 | level-2 ] |  
[ [ LSPID | local ] | verbose ]* ]*  
20-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Display IS-IS SPF calculation log  
Display IS-IS routing information  
Display IS-IS neighbor information display isis peer [ verbose ]  
display isis spf-log  
display isis route  
Display mesh group information  
display isis mesh-group  
debugging isis adjacency  
{
|
all  
|
authentication-error | checksum-error |  
circuit-information | configuration-error |  
datalink-receiving-packet  
|
datalink-sending-packet | general-error |  
interface-information | memory-allocating |  
Enable IS-IS debugging  
receiving-packet-content  
self-originate-update  
sending-packet-content  
|
|
|
|
snp-packet  
spf-event | spf-summary | spf-timer |  
task-error | timer | update-packet }  
undo debugging isis { adjacency | all |  
authentication-error | checksum-error |  
circuit-information | configuration-error |  
datalink-receiving-packet  
|
datalink-sending-packet | general-error |  
interface-information | memory-allocating |  
Disable IS-IS debugging  
receiving-packet-content  
self-originate-update  
sending-packet-content  
|
|
|
|
snp-packet  
spf-event | spf-summary | spf-timer |  
task-error | timer | update-packet }  
20.4 Typical Integrated IS-IS Configuration Example  
I. Network requirements  
As is shown in Figure 20-3, Switches A, B, C and D belong to the same autonomous  
system. The IS-IS routing protocol is running in these four switches so as to implement  
route interconnection. In the network design, switches A, B, C and D belong to the  
same area.  
20-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
II. Network diagram  
Vlan-interface 101  
100.0.0.1/24  
Vlan-interface 102  
200.0.0.1/24  
Switch B  
Switch A  
Vlan-interface 100  
100.10.0.1/24  
Vlan-interface 100  
100.10.0.2/24  
Vlan-interface 102  
100.20.0.1/24  
Vlan-interface 101  
200.10.0.1/24  
Vlan-interface 102  
100.20.0.2/24  
Vlan-interface 101  
200.10.0.2/24  
Switch C  
Switch D  
Vlan-interface 100  
100.30.0.1/24  
Vlan-interface 100  
200.20.0.1/24  
Figure 20-3 IS-IS configuration example  
III. Configuration procedure  
Configure Switch A  
[Switch A] isis  
[Switch A-isis] network-entity 86.0001.0000.0000.0005.00  
[Switch A] interface vlan-interface 100  
[Switch A-Vlan-interface100] ip address 100.10.0.1 255.255.255.0  
[Switch A-Vlan-interface100] isis enable  
[Switch A] interface vlan-interface 101  
[Switch A-Vlan-interface101] ip address 100.0.0.1 255.255.255.0  
[Switch A-Vlan-interface101] isis enable  
[Switch A] interface vlan-interface 102  
[Switch A-Vlan-interface102] ip address 100.20.0.1 255.255.255.0  
[Switch A-Vlan-interface102] isis enable  
Configure Switch B  
[Switch B] isis  
[Switch B-isis] network-entity 86.0001.0000.0000.0006.00  
[Switch B] interface vlan-interface 101  
[Switch B-Vlan-interface101] ip address 200.10.0.1 255.255.255.0  
[Switch B-Vlan-interface101] isis enable  
[Switch B] interface vlan-interface 102  
[Switch B-Vlan-interface102] ip address 200.0.0.1 255.255.255.0  
[Switch B-Vlan-interface102] isis enable  
[Switch B] interface vlan-interface 100  
[Switch B-Vlan-interface100] ip address 100.10.0.2 255.255.255.0  
[Switch B-Vlan-interface100] isis enable  
20-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 20 Integrated IS-IS Configuration  
Configure Switch C  
[Switch C] isis  
[Switch C-isis] network-entity 86.0001.0000.0000.0007.00  
[Switch C] interface vlan-interface 101  
[Switch C-Vlan-interface101] ip address 200.10.0.2 255.255.255.0  
[Switch C-Vlan-interface101] isis enable  
[Switch C] interface vlan-interface 100  
[Switch C-Vlan-interface100] ip address 200.20.0.1 255.255.255.0  
[Switch C-Vlan-interface100] isis enable  
Configure Switch D  
[Switch D] isis  
[Switch D-isis] network-entity 86.0001.0000.0000.0008.00  
[Switch D] interface vlan-interface 102  
[Switch D-Vlan-interface102] ip address 100.20.0.2 255.255.255.0  
[Switch D-Vlan-interface102] isis enable  
[Switch D] interface vlan-interface 100  
[Switch D-Vlan-interface100] ip address 100.30.0.1 255.255.255.0  
[Switch D-Vlan-interface100] isis enable  
20-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Chapter 21 BGP Configuration  
21.1 BGP/MBGP Overview  
21.1.1 Introduction to BGP  
Border gateway protocol (BGP) is an inter-autonomous system (inter-AS) dynamic  
route discovery protocol. Three early versions of BGP are BGP-1 (RFC1105), BGP-2  
(RFC1163) and BGP-3 (RFC1267). The current version is BGP-4 (RFC1771) that is  
applied to advertised structures and supports classless inter-domain routing (CIDR).  
Actually, BGP-4 is becoming the external routing protocol standard of the Internet,  
which is frequently used between ISPs.  
The characteristics of BGP are as follows:  
z
BGP is an external gateway protocol (EGP). Different from such internal routing  
protocols as OSPF and RIP, it focuses on route propagation control and selection  
of best routes other than discovery and calculation of routes.  
z
z
z
It eliminates routing loop by adding AS path information to BGP routes.  
It enhances its own reliability by using TCP as the transport layer protocol.  
When routes are updated, BGP only transmits updated routes, which greatly  
reduces bandwidth occupation by route propagation and can be applied to  
propagation of a great amount of routing information on the Internet.  
BGP-4 supports CIDR, which is an important improvement to BGP-3.  
In consideration of management and security, users desire to perform control over  
outgoing and incoming routing information of each AS. BGP-4 provides abundant  
route policies to implement flexible filtering and selecting of routes.  
z
z
z
BGP-4 can be extended easily to support new developments of the network.  
Note:  
z
CIDR handles IP addresses in an entirely new way, that is, it does not distinguish  
networks of Class A, Class B and Class C. For example, an invalid Class C network  
address 192.213.0.0 (255.255.0.0) can be expressed as 192.213.0.0/16 in CIDR  
mode, which is a valid super network. Here /16 means that the subnet mask is  
composed of the first 16 bits from the left.  
z
The introduction of CIDR simplifies route aggregation. Actually, route aggregation is  
the process of aggregating several different routes, which turns advertisement  
processes of several routes to the advertisement of single route so as to simplify the  
routing table.  
21-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
BGP runs on a router in any of the following modes:  
Internal BGP (IBGP)  
External BGP (EBGP)  
z
z
The BGP is called IBGP when it runs in an AS and EBGP when it runs among different  
ASs.  
21.1.2 BGP Message Types  
BGP is driven by messages, which include the following types:  
z
z
Type 1, OPEN: The first message sent after the creation of a connection to create  
association between BGP peers.  
Type 2, UPDATE: The most important information in BGP system used to  
exchange routing information between peers. It is composed of up to three parts,  
that is, unreachable route, path attributes and network layer reachable information  
(NLRI).  
z
z
z
Type 3, NOTIFICATION: Used to notify errors.  
Type 4, KEEPALIVE: Used to check connectivity.  
Type 5, ROUTE-REFRESH: Used to advertise its own route refreshing capability.  
The first four types are defined in RFC1771, while the last one is in RFC2918 (Route  
Refresh Capability for BGP-4).  
21.1.3 BGP Routing Mechanism  
On the first startup of the BGP system, the BGP router exchanges routing information  
with its peers by transmitting the complete BGP routing table, after that only update  
messages are exchanged. In the operating of the system, keepalive messages are  
received and transmitted to check the connections between various neighbors.  
The router transmitting BGP messages is called a BGP speaker, which receives and  
generates new routing information continuously and advertises the information to the  
other BGP speakers. When a BGP speaker receives a new route advertisement from  
another AS, it will advertise the route, if the route is better than the current route that  
has been learned or is a new route, to all the other BGP speakers in the AS.  
A BGP speaker calls peers other BGP speakers which exchange information with it and  
multiple related peers compose a peer group.  
I. Route advertisement policy  
In the Switch 8800, these policies are used by BGP when advertising routes:  
z
If there are multiple routes available, a BGP speaker only selects the optimum  
one.  
z
z
A BGP only advertises its own route to its peers.  
A BPG advertises the routes obtained from EBGP to all its BGP peers (including  
EBGP and IBGP peers).  
21-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
z
z
z
A BGP speaker does not advertise the routes obtained from IBGP to its IBGP  
peers.  
A BGP speaker advertises the routes obtained from IBGP to its IBGP peers (In the  
Switch 8800, BGP and IGP are asynchronous.)  
Once the connection is set up, a BGP speaker will advertise all its BGP routes to  
its peers.  
II. Route selection policy  
In the Switch 8800, these policies are adopted for BGP to select routes:  
z
z
z
z
z
z
z
z
First discard the routes unreachable to the next hop.  
First select the routes with the highest local preference.  
First select the routes rooted from the router itself.  
First select the routes with the least AS-paths.  
First select the routes with the lowest origin.  
First select the routes with the lowest MED value.  
First select the routes learned from EBGP.  
First select the routes advertised by the router with the lowest ID.  
21.1.4 MBGP  
I. MBGP overview  
As described at the beginning of this chapter, BGP, as the practical exterior gateway  
protocol, is widely used in interconnection between autonomous systems. The  
traditional BGP-4 can only manage the routing information of IPv4 and has limitation in  
inter-AS routing when used in the application of other network layer protocols (such as  
IPv6 etc).  
In order to support multiple network layer protocols, IETF extended BGP-4 and formed  
MBGP (Multiprotocol Extensions for BGP-4, multiple protocols extension of BGP-4).  
The present MBGP standard is RFC2858.  
MBGP is backward compatible, that is, a router supporting BGP extension can be  
interconnected with a router that does not support it.  
II. MBGP extension attributes  
In the packets BGP-4 uses, three pieces of information related to IPv4 are carried in the  
update packet. They are Network Layer Reachability Information (NLRI), Next_Hop  
(The next hop address) in path attribute and Aggregator in path attribute (This attribute  
includes the BGP speaker address which forms the summary route).  
When multiple network layer protocols are supported, it is necessary for BGP-4 to  
reflect the information of the specified network layer protocol to NLRI and the Next_Hop.  
Two new routing attributes are introduced in MBGP:  
21-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
z
z
MP_REACH_NLRI: Multiprotocol Reachable NLRI, used to advertise reachable  
routes and the next hop information.  
MP_UNREACH_NLRI: Multiprotocol Unreachable NLRI, used to delete  
unreachable routes.  
These two attributes are optional non-transitive. Therefore, the BGP speaker that does  
not provide multiple protocols ability will ignore the information of them nor transfer  
them to other peers.  
III. Address family  
The network layer protocols are differentiated by address families in BGP. See  
RFC1700 (assigned numbers) for the possible values of these address families. The  
Switch 8800 provides various MBGP extended applications, including extension of  
multicast, VPN, and so on. Different extended applications should be configured in their  
own address family views.  
For more information about the commands executed in MBGP address family view, see  
“Multicast Protocol” and “MPLS Configuration” of this manual.  
21.1.5 BGP Peer and Peer Group  
I. Definition of peer and peer group  
A BGP speaker calls peers other BGP speakers which exchange information with it and  
multiple related peers compose a peer group.  
II. Relationship between peer configuration and peer group configuration  
In the Switch 8800, a BGP peer must belong to a peer group. If you want to configure a  
BGP peer, you need first to create a peer group and then add a peer into the group.  
BGP peer group feature can simplify user configuration and improve route  
advertisement efficiency. When added into a peer group, a peer inherits all the  
configuration of the group.  
If the configuration of a peer group changes, the configuration of its member peers also  
alters. Some attributes can be configured to a particular member peer by specifying its  
IP address. The attributes configured in this way is with higher priority than those by  
configuring for peer group. It should be noted that all member peers must use the same  
update policy as its group, but may use different ingress policy.  
21.2 Configuring BGP  
These categories are involved in BGP configuration:  
1) Basic BGP configuration  
z
z
2) BGP peer configuration  
21-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
z
z
3) BGP route configuration  
z
z
z
z
z
4) BGP protocol configuration  
z
z
z
z
5) BGP application configuration  
6) BGP networking configuration  
z
z
z
7) Others  
z
z
21.2.1 Enabling BGP  
To enable BGP, local AS number should be specified. After the enabling of BGP, local  
router listens to BGP connection requests sent by adjacent routers. To make the local  
router send BGP connection requests to adjacent routers, refer to the configuration of  
the peer command. When BGP is disabled, all established BGP connections will be  
disconnected.  
Perform the following configuration in system view.  
Table 21-1 Enable/Disable BGP  
Operation  
Enable BGP and enter the BGP view  
Disable BGP  
Command  
bgp as-number  
undo bgp [ as-number ]  
By default, BGP is not enabled.  
21.2.2 Configuring Basic Features for BGP Peer  
When configuring a MBGP peer (group), you should first configure AS ID for it and then  
enter the corresponding address family view to activate the association.  
21-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Perform the following configurations in BGP view.  
I. Creating a peer group  
A BGP peer must belong to a peer group. Before configuring a BGP peer, a peer group  
to which the peer belongs must be created first.  
Table 21-2 Create a peer group  
Operation  
Command  
Create a peer group  
group group-name [ internal | external ]  
Delete the specified peer group undo group group-name  
There are two types of BGP peer group, IBGP and EBGP. Using the internal keyword  
to create a IBGP peer group. You can use the external keyword to create an EBGP  
peer group and sub-AS peer groups inside a confederation. group-name is locally  
significant.  
The default type of BGP peer group is IBGP.  
II. Configuring AS number of an EBGP peer group  
You can specify AS number for an EBGP peer group, but IBGP needs no AS number.  
When a peer group is specified with an AS number, all its member peers inherit the AS  
number.  
Table 21-3 Configure AS number of a EBGP peer group  
Operation  
Command  
Configure the AS number of the EBGP peer  
group-name  
as-number  
peer group  
as-number  
Delete the AS number of the EBGP peer undo peer group-name as-number  
group as-number  
If a peer group has peers, you cannot specify an AS number for the peer group. In  
addition, deleting the AS number of a peer group will delete all peers in it.  
III. Adding a member to a peer group  
A BGP peer must belong to a peer group. If you want to configure a BGP peer, you  
need first to create a peer group and then add a peer into the group.  
Table 21-4 Create a peer group and add a member  
Operation  
Command  
peer peer-address group group-name  
[ as-number as-number ]  
Add a peer to the peer group  
21-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Delete a peer  
Chapter 21 BGP Configuration  
undo peer peer-address  
If you want to add a peer to an IBGP peer group, this command cannot specify AS  
numbers.  
When a peer is added to an EBGP peer group and the peer group is defined with an AS  
number, all its member peers inherits the configuration of the group. If the AS number of  
the peer group is not specified, each peer added to it should be specified with its own  
AS number. AS numbers of peers in a same peer group can be different.  
IV. Configuring the state of a peer/peer group  
BGP peer/peer group has two types of state: enabled and disabled. The BGP speakers  
do not exchange routing information with the disabled peer or peer group.  
Table 21-5 Configure the state of a peer/peer group  
Operation  
Command  
Enable a peer/peer group  
Disable a peer/peer group  
peer { group-name | peer-address } enable  
undo peer { group-name | peer-address } enable  
By default, only BGP peer groups of IPv4 unicast address family are enabled. Other  
peer types or peer group types are disabled, consequently exchanging no routing  
information.  
When exchanging routing information between BGP speakers, the peer group must be  
enabled first and then the peer should be added to the enabled peer group.  
V. Configuring description of a peer (group)  
Description of a peer (group) can be configured to facilitate network maintenance.  
Table 21-6 Configure description of a peer (group)  
Operation  
Command  
peer { peer-address | group-name }  
description description-line  
Configure description of a peer (group)  
undo  
peer  
{
peer-address  
|
Delete description of a peer (group)  
group-name } description  
By default, no BGP peer (group) description is set.  
VI. Configuring timer of a peer (group)  
The peer timer command is used to configure timers of a BGP peer (group), including  
the keep-alive message interval and the hold timer. The preference of this command is  
21-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
higher than the timer command that is used to configure timers for the whole BGP  
peers.  
Perform the following configuration in BGP view.  
Table 21-7 Configure timer of a peer (group)  
Operation  
Command  
peer { group-name | peer-address }  
timer keep-alive keepalive-interval  
hold holdtime-interval}  
Configure keep-alive message interval  
and hold timer of a peer (group)  
Restore the default value of keep-alive  
message interval and hold timer of a  
peer (group)  
undo  
peer-address } timer  
peer  
{
group-name  
|
By default, the keep-alive message is sent every 60 seconds and the value of the hold  
timer is 180 seconds.  
VII. Configuring the interval at which route update messages are sent by a  
peer group  
Table 21-8 Configure the interval at which route update messages are sent by a peer  
group  
Operation  
Command  
Configure the route update message peer  
group-name  
interval of a peer group  
route-update-interval seconds  
Restore the default route update undo  
peer group-name  
message interval of a peer group  
route-update-interval  
By default, the intervals at which route update messages are sent by an IBGP and  
EBGP peer group are 5 seconds and 30 seconds respectively  
21.2.3 Configuring application features of a BGP peer (group)  
I. Configuring to permit connections with EBGP peer groups on indirectly  
connected networks  
Generally, EBGP peers must be connected physically. Otherwise the command below  
can be used to perform the configuration to make them communicate with each other  
normally.  
Perform the following configuration in BGP view.  
21-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Table 21-9 Configure to permit connections with EBGP peer groups on indirectly  
connected networks  
Operation  
Command  
group-name  
Configure to permit connections with EBGP peer  
peer groups on indirectly connected networks  
ebgp-max-hop [ ttl ]  
Configure to permit connections with EBGP undo  
peer group-name  
peer groups on directly connected network only ebgp-max-hop  
By default, only the connections with EBGP peer groups on directly connected  
networks are permitted. ttl refers to time-to-live in the range of 1 to 255 with the default  
value as 64.  
II. Configuring an IBGP peer group to be a client of a route reflector  
Perform the following configuration in BGP view.  
Table 21-10 Configure an IGMP peer group to be a client of a route reflector  
Operation  
Command  
Configure a peer group to be a client of a route  
reflector  
peer group-name reflect-client  
Cancel the configuration of making the peer undo  
peer  
group-name  
group as the client of the BGP route reflector  
reflect-client  
This configuration can be applied to IBGP peer groups only.  
By default, all IBGP peers in the autonomous system must be fully connected.  
Moreover, neighbors do not notify the learned IBGP routes.  
III. Configuring to send default route to a peer group  
If you only need to notify a default route between a pair of BGP peer instead of  
transmitting the default route within the whole network, you can use the peer  
default-route-advertise command.  
Perform the following configuration in BGP view.  
Table 21-11 Configure to send default route to a peer group  
Operation  
Command  
Configure to send default route to a peer  
group-name  
group-name  
peer group  
default-route-advertise  
Configure not to send default route to a undo  
peer  
peer group  
default-route-advertise  
By default, a BGP speaker does not send default route to any peer group.  
21-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
After you use the peer default-route-advertise command, the local router will send a  
default route with the next hop as itself to the peer unconditionally, even if there is no  
default route in BGP routing table.  
IV. Configuring itself as the next hop when advertising routes  
In general, when sending routes to the EBGP peer, the BGP speaker will set the next  
hop address of the routing information as the local address. When sending routes to  
the IBGP peer, the BGP speaker will not modify the next hop address.  
In some networking conditions, when the routes are sent to the IBGP peer, you can  
configure the local address of the sender as the next hop, consequently ensuring the  
IBGP neighbors can find the correct next hop.  
Perform the following configuration in BGP view.  
Table 21-12 Configure itself as the next hop when advertising routes  
Operation  
Command  
Configure itself as the next hop when  
advertising routes  
peer group-name next-hop-local  
Disable the specification of itself as the  
next hop when advertising routes  
undo peer group-name next-hop-local  
V. Removing private AS numbers while transmitting BGP update messages  
Generally, the AS numbers (public AS numbers or private AS numbers) are included in  
the AS paths while transmitting BGP update messages. This command is used to  
configure certain outbound routers to ignore the private AS numbers while transmitting  
update messages.  
Perform the following configuration in BGP view.  
Table 21-13 Remove private AS numbers while transmitting BGP update messages  
Operation  
Command  
Remove private AS numbers while  
transmitting BGP update messages  
peer group-name public-as-only  
Include private AS numbers while  
transmitting BGP update messages  
undo peer group-name public-as-only  
By default, the private AS numbers are included during BGP update messages  
transmission.  
The configuration can only be applied to the peer group.  
VI. Configuring to send the community attributes to a peer group  
Perform the following configuration in BGP view.  
21-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Table 21-14 Configure to send the community attributes to a peer group  
Operation  
Configure to send the community peer  
Command  
group-name  
group-name  
attributes to a peer group  
advertise-community  
Configure not to send the community undo  
peer  
attributes to a peer group  
advertise-community  
By default, the BGP speaker does not send the community attributes to a peer group.  
VII. Configuring the repeating time of local AS  
BGP records the passed AS numbers in the routing information, and checks route loop  
depending on whether the AS number are repeated. In some special applications, it is  
allowed to receive the routing information with the repeated AS number.  
Perform the following configuration in BGP view.  
Table 21-15 Configure the repeating time of local AS  
Operation  
Command  
peer { group-name | peer-address }  
allow-as-loop [ number ]  
Configure the repeating time of local AS  
undo  
peer  
{
group-name  
|
Remove the repeating time of local AS  
peer-address } allow-as-loop  
By default, the allowed repeating time of local AS is set to 1.  
VIII. Specifying the source interface of a route update packet  
Generally, the system specified the source interface of a route update packet. When  
the interface fails to work, in order to keep the TCP connection valid, the interior BGP  
session can be configured to specify the source interface. This command is usually  
used on the Loopback interface.  
Table 21-16 Specify the source interface of a route update packet  
Operation  
Command  
peer-address  
Specify the source interface of peer  
{
|
group-name  
}
a route update packet  
connect-interface interface-type interface-name  
undo peer { peer-address | group-name }  
connect-interface interface-type interface-name  
Use the best source interface  
By default, BGP uses the interface to establish BGP links for the source interface of a  
route update packet.  
21-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
IX. Configuring BGP MD5 authentification password  
BGP uses TCP as its transport layer. For the sake of high security, you can configure  
MD5 authentication password when setting up a TCP connection. In other words, BGP  
MD5 authentication just sets password for TCP connection, but not for authenticating  
BGP packets. The authentication is implemented by TCP.  
Perform the following configuration in BGP view.  
Table 21-17 Configure BGP MD5 authentication  
Operation  
Command  
Configure MD5 authentication peer { group-name | peer-address } password  
password  
{ cipher | simple } password  
undo peer { group-name | peer-address }  
password  
Cancel MD5 authentication  
In BGP, no MD5 authentication is performed in setting up TCP connections by default.  
Note:  
The multicast extension configured in BGP view is also available in MBGP, since they  
use the same TCP link.  
21.2.4 Configuring Route Filtering of a Peer (group)  
The Switch 8800 supports filtering imported and advertised routes for peers (groups)  
through Route-policy, AS path list, ACL and ip prefix list.  
The route filtering policy of advertised routes configured for each member of a peer  
group must be same with that of the peer group but their route filtering policies of  
ingress routes may be different.  
Perform the following configuration in BGP view.  
I. Configuring route policy for a peer (group)  
Table 21-18 Configure route policy for a peer (group)  
Operation  
Command  
Configure the ingress route policy for a peer { peer-address | group-name }  
peer (group) route-policy route-policy-name import  
Remove the ingress route policy of a undo peer { peer-address | group-name }  
peer (group) route-policy policy-name import  
21-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Operation  
Configure the egress route policy for a peer  
Command  
group-name  
route-policy  
peer group route-policy-name export  
Remove the egress route policy of a undo peer group-name route-policy  
peer group route-policy-name export  
II. Configuring route filtering policy based on IP ACL for a peer (group)  
Table 21-19 Configure route filtering policy based on IP ACL for a peer (group)  
Operation  
Command  
Configure the ingress route filtering policy peer { peer-address | group-name }  
based on IP ACL for a peer (group)  
filter-policy acl-number import  
undo peer peer-address  
group-name } filter-policy acl-number  
import  
{
|
Remove the ingress route filtering policy  
based on IP ACL of a peer (group)  
Configure the egress route filtering policy peer  
group-name  
filter-policy  
based on IP ACL for a peer (group) acl-number export  
Remove the egress route filtering policy undo peer group-name filter-policy  
based on IP ACL for a peer (group) acl-number export  
III. Configuring route filtering policy based on AS path list for a peer (group)  
Table 21-20 Configure route filtering policy based on AS path list for a peer (group)  
Operation  
Command  
Configure the ingress route filtering policy peer { peer-address | group-name }  
based on AS path list for a peer (group)  
as-path-acl acl-number import  
undo peer peer-address  
group-name } as-path-acl acl-number  
import  
{
|
Remove the ingress route filtering policy  
based on AS path list of a peer (group)  
Configure the egress route filtering policy peer  
group-name  
as-path-acl  
based on IP ACL for a peer group acl-number export  
Remove the egress route filtering policy undo peer group-name as-path-acl  
based on IP ACL for a peer group acl-number export  
The acl-number argument indicates AS path list number, which you can use the acl  
command instead of the ip as-path-acl command to configure. For the detailed  
configuration, refer to Chapter 22 “IP Routing Policy Configuration”.  
21-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
IV. Configuring route filtering policy based on address prefix list for a peer  
(group)  
Table 21-21 Configure route filtering policy based on address prefix list for a peer  
(group)  
Operation  
Command  
peer-address  
peer  
{
|
Configure the ingress route filtering policy  
based on address prefix list for a peer (group)  
group-name } ip-prefix prefixname  
import  
undo peer  
group-name } ip-prefix prefixname  
import  
{
peer-address  
|
Remove the ingress route filtering policy  
based on address prefix list of a peer (group)  
Configure the egress route filtering policy peer  
group-name  
ip-prefix  
based on address prefix list for a peer group  
prefixname export  
Remove the egress route filtering policy undo peer group-name ip-prefix  
based on address prefix list for a peer group  
prefixname export  
By default, route filtering based on address prefix list for a peer (group) is disabled.  
21.2.5 Configuring Network Routes for BGP Distribution  
Perform the following configuration in BGP view.  
Table 21-22 Configure network routes for BGP distribution  
Operation  
Command  
Configure the local network route network  
ip-address  
address-mask  
for BGP distribution  
[ route-policy route-policy-name ]  
Remove the local network route undo network ip-address address-mask  
for BGP distribution [ route-policy route-policy-name ]  
By default, no network route is configured for BGP distribution.  
21.2.6 Configuring the Interaction Between BGP and IGP  
I. Importing IGP routes  
BGP can transmit the internal network information of local AS to other AS. To reach  
such objective, the network information about the internal system learned by the local  
router via IGP routing protocol can be transmitted.  
Perform the following configuration in BGP view.  
21-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Table 21-23 Import IGP routing information  
Operation  
Command  
Configure BGP to import routes of import-route protocol [ process-id ] [ med  
IGP protocol  
med ] [ route-policy route-policy-name ]  
Configure BGP not to import  
routes of IGP protocol  
undo import-route protocol  
The protocol argument specifies the imported source route protocols. The specified  
and imported source route protocols can be direct, static, rip, isis, ospf, ospf-ase, and  
ospf-nssa.  
By default, BGP does not import the route information of other protocols.  
After you configure the import-route command in a BGP view, you cannot import the  
default route of the imported source route protocols to BGP by default.  
II. Configuring not to syncronize with IGP  
If the local BGP is not set synchronous with the IGP and the next hop of the learned  
BGP route is reachable, the local BGP will add this BGP route into its routing table  
immediately after it learns the route, rather than waiting till the IGP also learns the  
route.  
Perform the following configuration in BGP view.  
Table 21-24 Configure not to synchronize with IGP  
Operation  
Command  
Cancel the synchronization of BGP and IGP  
undo synchronization  
By default, BGP does not synchronize with IGP. The Switch 8800 does not support  
synchronization of BGP and IGP.  
21.2.7 Configuring BGP Route Summarization  
There are two modes of BGP route summarization:  
z
z
summary: The summary of the BGP subnet routes. After the configuration of the  
summary, the BGP will not be able to receive subnets imported by the IGP;  
aggregate: The aggregation of the BGP local routes. In general, the preference of  
the aggregation is higher than that of the summarization.  
Perform the following configuration in BGP view.  
21-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Table 21-25 Configure BGP route summarization  
Operation  
Command  
Configure  
the  
summary  
automatic function of the subnet summary  
routes  
Cancel the summary automatic  
function of the subnet routes  
undo summary  
aggregate address mask  
[
as-set  
|
|
attribute-policy  
route-policy-name  
Configure  
aggregation function  
local  
route  
detail-suppressed  
route-policy-name  
route-policy-name ]*  
|
origin-policy  
suppress-policy  
|
undo aggregate address mask [ as-set |  
attribute-policy  
route-policy-name  
|
Cancel local route aggregation  
function  
detail-suppressed  
route-policy-name  
route-policy-name ]*  
|
origin-policy  
|
suppress-policy  
By default, the BGP will not perform local route aggregation.  
21.2.8 Configuring BGP Route Filtering  
I. Configuring BGP to filter the received route information  
The routes received by the BGP can be filtered, and only those routes that meet the  
certain conditions will be received by the BGP.  
Perform the following configuration in BGP view.  
Table 21-26 Configure imported route filtering  
Operation  
Command  
filter-policy  
{
acl-number  
|
ip-prefix  
Configure received route filtering ip-prefix-name [ gateway ip-prefix-name ] }  
import  
undo filter-policy { acl-number | ip-prefix  
ip-prefix-name [ gateway ip-prefix-name ] }  
import  
Cancel the received route  
filtering  
Filter the received global routing filter-policy  
{
acl-number  
|
ip-prefix  
information ip-prefix-name } import  
Cancel the received global route undo filter-policy { acl-number | ip-prefix  
filtering ip-prefix-name } import  
By default, the BGP will not filter the received routes.  
21-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
II. Configuring to filter the routes advertised by the BGP  
Perform the following configuration in the BGP view.  
Table 21-27 Configure to filter the routes advertised by the BGP  
Operation  
Command  
Configure to filter the routes filter-policy  
{
acl-number  
|
ip-prefix  
advertised by the BGP  
ip-prefix-name } export [ routing-process ]  
undo filter-policy  
Cancel the filtering of the  
routes advertised by the BGP  
acl-number | ip-prefix ip-prefix-name } export  
[ routing-process ]  
By default, BGP does not receive the routing information advertised by other routing  
protocols.  
Note:  
z
z
z
The filter-policy import command filters BGP route received from the neighbors.  
The routes that cannot pass the filter will not be added to the routing table, and will  
not be advertised to the neighbors.  
The filter-policy export command filters all the advertised routes, including routes  
imported by using the import-route command, and BGP routes learned from the  
neighbors.  
If the filter-policy export command does not specify which route to be filtered, then  
the all the routes imported by the import-route command and the advertised BGP  
routes will be filtered.  
21.2.9 Configuring BGP Route Dampening  
I. Configure BGP route dampening  
The main possible reason for unstable route is the intermittent disappearance and  
re-emergence of the route that formerly existed in the routing table, and this situation is  
called the flapping. When the flapping occurs, update packet will be propagated on the  
network repeatedly, which will occupy much bandwidth and much processing time of  
the router. You have to find measures to avoid it. The technology controlling unstable  
route is called route dampening.  
The dampening divides the route into the stable route and unstable route, the latter of  
which shall be suppressed (not to be advertised). The history performance of the route  
is the basis to evaluate the future stability. When the route flapping occurs, penalty will  
be given, and when the penalty reaches a specific threshold, the route will be  
21-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
suppressed. With time going, the penalty value will decrease according to power  
function, and when it decreases to certain specific threshold, the route suppression will  
be eliminated and the route will be re-advertised.  
Perform the following configuration in BGP view.  
Table 21-28 Configure BGP route dampening  
Operation  
Command  
half-life-reachable  
dampening  
[
half-life-unreachable reuse suppress  
ceiling route-policy  
route-policy-name ]  
Configure BGP route dampening  
]
[
Clear route attenuation information and reset dampening [ network-address  
eliminating the suppression of the route [ mask ] ]  
Cancel BGP route dampening  
undo dampening  
By default, route dampening is disabled.  
II. Clear route attenuation information  
Perform the following configuration in user view to clear route attenuation information.  
Table 21-29 Clear route attenuation information  
Operation  
Command  
bgp  
reset  
dampening  
Clear route attenuation information  
[ network-address [ mask ] ]  
After you use the reset bgp dampening command, the command will release the  
suppression of a suppressed route.  
21.2.10 Configuring BGP Preference  
Three types of routes may be involved in BGP: routes learned from external peers,  
routes learned from internal peers and local-originated routes. You can set preference  
values for the three types of route.  
Perform the following configuration in BGP view.  
Table 21-30 Configure BGP preference  
Operation  
Command  
preference ebgp-value ibgp-value local-value  
undo preference  
Configure BGP preference  
Restore the default preference  
21-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
The ebgp-value, ibgp-value and local-value arguments are in the range of 1 to 256. By  
default, the first two is 256 and the last one is 130.  
21.2.11 Configuring BGP Timer  
After you established BGP connections between routers, a router sends Keepalive  
packets to the peer periodically. Otherwise, the routers regard the BGP connections are  
interrupted. If the router receives no Keepalive packets or any other types of packets  
within the set connection holdtime, the router regards the BGP connection has been  
interrupted and quits the BGP connection.  
When a router establishes a BGP connection with the peer, the router will compare their  
holdtime and regard the smaller time as the negotiated holdtime. If the negotiation  
result is 0, the router does not send Keepalive packets and detect whether the holdtime  
exceeds.  
Perform the following configuration in BGP view.  
Table 21-31 Configure BGP timers  
Operation  
Command  
keep-alive keepalive-interval  
timer  
holdtime-interval  
hold  
Configure BGP timers  
Restore the default timer value undo timer  
By default, the interval of sending keepalive packet is 60 seconds. The interval of  
sending holdtime packet is 180 seconds.  
The reasonable maximum interval of sending Keepalive packets is one third of the  
interval of sending holdtime packet. The interval of sending Keepalive packets cannot  
be less than 1 second. As a result, if the holdtime is not 0 second, the minimum  
holdtime is 3 seconds.  
21.2.12 Configuring the Local Preference  
When BGP select routes, it will select the route of the highest local preference.  
Perform the following configuration in BGP view.  
Table 21-32 Configure the local preference  
Operation  
Command  
Configure the local preference  
Restore the default local preference  
default local-preference value  
undo default local-preference  
The local preference is transmitted only when the IBGP peers exchange the update  
packets and it will not be transmitted beyond the local AS.  
21-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
By default, the local preference is 100.  
21.2.13 Configuring MED for AS  
Multi-Exit Discriminators (MED) attribute is the external metric for a route. AS uses the  
local preference to select the route to the outside, and uses the MED to determine the  
optimum route for entering the AS. When a router running BGP gets routes with the  
same destination address but different next hops through different external peers, it will  
select the route of the smallest MED as the optimum route, provided that all the other  
conditions are the same.  
Perform the following configuration in BGP view.  
Table 21-33 Configure an MED metric for the system  
Operation  
Command  
default med med-value  
undo default med  
Configure an MED metric for the system  
Restore the default MED metric of the system  
By default, MED metric is 0.  
The router configured above only compares the route MED metrics of different EBGP  
peers in the same AS. Using the compare-different-as-med command, you can  
compare the route MED metrics of the peers in different ASs.  
21.2.14 Comparing the MED Routing Metrics from the Peers in Different ASs  
It is used to select the best route. The route with smaller MED value will be selected.  
Perform the following configuration in BGP view.  
Table 21-34 Compare the MED routing metrics from the peers in different ASs  
Operation  
Command  
Compare the MED routing metrics from the  
peers in different ASs  
compare-different-as-med  
Configure not to compare the MED routing  
metrics from the peers in different ASs  
undo compare-different-as-med  
By default, MED comparison is not allowed among the routes from the neighbors in  
different ASs.  
It is not recommended to use this configuration unless you can make sure that the ASs  
adopt the same IGP and routing method.  
21-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
21.2.15 Configuring BGP Route Reflector  
To ensure the interconnection between IBGP peers, it is necessary to establish a fully  
connected network. If there are many IBGP peers, large overhead is needed to  
establish a fully connected network.  
Route reflecting can solve the problem. Route reflector is the centralized point of other  
routers, and other routers are called the clients. The client is the peer of the route  
reflector and switching the routing information with it. The route reflector will reflect the  
information in order among the clients.  
Router C  
Route reflector  
Route reflected  
Router  
Route updated  
EBGP  
Router B  
EBGP  
Router A  
Figure 21-1 The route reflector diagram  
In Figure 21-1, Router C is a route reflector with two peer clients: Router Aand Router B.  
Router A sends to Router C the update packet from an external peer. Router C sends  
the update packet to Router B. After using reflecting technology, you do not need to  
establish a connection between Router A and Router B. You only need to connect  
Router C to Router A and Router B respectively.  
If a BGP router is not either a reflector or client, we call the BGP router non-client. You  
still need connect non-clients to reflectors and non-clients.  
You only need to configure route reflecting for the route reflector. When configuring the  
route reflector, you must specify the routers to serve as clients.  
I. Configuring the route reflection between clients  
Perform the following configuration in BGP view.  
Table 21-35 Configure the route reflection between clients  
Operation  
Command  
Enable route reflection between clients  
reflect between-clients  
Disable route reflection between clients undo reflect between-clients  
21-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
By default, the route reflection between clients is allowed. If the clients are fully  
connected, for the purpose of overhead reduction, it is recommended to use the undo  
reflect between-clients command to disable the route reflection between clients.  
II. Configuring the cluster ID  
Generally, there is only one route reflector in a cluster which is identified by the router  
ID of the route reflector.  
Perform the following configuration in BGP view.  
Table 21-36 Configure the Cluster_ID of the route reflector  
Operation  
Command  
reflector cluster-id { cluster-id |  
address }  
Configure the Cluster_ID of the route reflector  
Cancel the Cluster_ID of the route reflector  
undo reflector cluster-id  
The autonomous system possibly generates routing loop due to the route reflector in a  
cluster. After leaving a cluster, a routing update packet possibly tries to go back to the  
cluster. Because the routing update packet has not left an AS, the traditional AS path  
method cannot detect the loop inside the AS. When configuring route reflectors, you  
can use the following two methods to avoid loop inside the AS. One is to use the cluster  
ID; the other is to use Originator_ID of a route reflector.  
If you configure Originator_ID improperly, the originator will discard the update packet  
when the update packet goes back to the originator. You do not need to configure  
Originator_ID. Originator_ID automatically takes effect when BGP is enabled.  
21.2.16 Configuring BGP AS Confederation Attribute  
Confederation provides the method to handle the booming IBGP network connections  
inside AS. It divides the AS into multiple sub-AS, in each of which all IBGP peers are  
fully connected, and are connected with other sub-AS of the confederation.  
The shortcomings of confederation are that it is required that the route be re-configured  
upon switching from non-confederation to confederation solution, and that the logic  
topology be basically changed. Furthermore, the path selected via confederation may  
not be the best path if there is no manually-set BGP policy.  
I. Configuring confederation_ID  
In the eye of the BGP speakers that are not included in the confederation, multiple  
sub-ASs that belong to the same confederation are a whole. The external network does  
not need to know the status of internal sub-ASs, and the confederation ID is the AS  
number identifying the confederation as a whole.  
Perform the following configuration in BGP view.  
21-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Table 21-37 Configure confederation_ID  
Operation  
Configure confederation_ID  
Cancel confederation_ID  
Command  
confederation id as-number  
undo confederation id  
By default, the confederation_ID is not configured.  
The configured confederation_ID and the existing AS number of a peer or peer group  
cannot be the same.  
II. Configuring sub-AS belonging to the confederation  
Configure confederation_ID first, and then configure the sub-AS belonging to the  
confederation. One confederation includes up to 32 sub-AS.  
Perform the following configuration in BGP view.  
Table 21-38 Configure sub-AS belonging to the confederation  
Operation  
Command  
Configure a confederation consisting of confederation peer-as as-number-1 [ ...  
which sub-ASs as-number-n ]  
Cancel the specified sub-AS in the undo  
confederation  
peer-as  
confederation [ as-number-1 ] [ ...as-number-n ]  
By default, no autonomous system is configured as a member of the confederation.  
The configured sub-AS number is valid only inside the confederation. In addition, the  
number cannot be the same as the AS number of a peer in the peer group for which you  
have not configured an AS number.  
III. Configuring AS confederation attribute compatible with nonstandard  
If it is necessary to perform the interconnection with the devices whose implementation  
mechanism is different from that of RFC1965, you must configure all the routers in the  
confederation.  
Perform the following configuration in BGP view.  
Table 21-39 Configure AS confederation attribute compatible with nonstandard  
Operation  
Command  
Configure AS confederation attribute  
compatible with nonstandard router  
confederation nonstandard  
Cancel AS confederation attribute  
compatible with nonstandard router  
undo confederation nonstandard  
21-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
By default, the configured confederation is consistent with RFC1965.  
21.2.17 Clearing BGP Connection  
After the user changes BGP policy or protocol configuration, they must cut off the  
current connection so as to enable the new configuration.  
Perform the following configuration in user view.  
Table 21-40 Clear BGP connection  
Operation  
Command  
reset bgp peer-address [ flap-info ]  
reset bgp all  
Clear the connection between BGP  
and the specified peers  
Clear all connections of BGP  
Clear the connections between the  
BGP and all the members of a group  
reset bgp group group-name  
21.2.18 Refreshing BGP Routes  
It is required to re-compute associated route information when BGP routing policy  
changes.  
Perform the following configuration in user view.  
Table 21-41 Refresh BGP routes  
Operation  
Command  
refresh bgp { all | peer-address | group  
group-name } { import | export }  
Refresh general BGP routes  
The import keyword means to refresh the routes learned from the peers and the  
export keyword means to refresh routes advertised to the peers.  
21.3 Displaying and Debugging BGP  
After the above configuration, execute the display command in any view to display the  
running of the BGP configuration, and to verify the effect of the configuration. Execute  
the reset command in user view to clear the statistics of the configuration. Execute the  
debugging command in user view to debug the configuration. Execute the reset  
command in user view to reset the statistic information of BGP.  
21-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Table 21-42 Display and debug BGP  
Operation  
Command  
Display the routing information in BGP display bgp routing-table [ ip-address  
routing table  
[ mask ] ]  
Display filtered AS path information in  
the BGP  
display ip as-path-acl acl-number  
Display CIDR routes  
display bgp routing-table cidr  
display bgp routing-table community  
Display the routing information of the  
specified BGP community  
[
aa:nn  
|
no-export-subconfed  
no-export  
|
]*  
no-advertise  
|
[ whole-match ]  
display  
bgp  
routing-table  
Display the routing information allowed  
by the specified BGP community list  
community-list community-list-number  
[ whole-match ]  
Display BGP dampened paths  
display bgp routing-table dampened  
Display the routing information the display bgp routing-table peer  
specified BGP peer advertised or peer-address { advertised | received }  
received  
[ network-address [ mask ] | statistic ]  
Display the routes matching with the display bgp routing-table as-path-acl  
specified access-list  
acl-number  
display bgp routing-table flap-info  
[
{
regular-expression  
Display  
information  
route  
flapping  
statistics  
as-regular-expression } | { as-path-acl  
acl-number } | { network-address [ mask  
[ longer-match ] ] } ]  
display  
different-origin-as  
bgp  
routing-table  
Display routes with different source ASs  
Display peers information  
display bgp peer peer-address  
verbose  
display bgp peer [ verbose ]  
Display  
information  
the  
configured  
routing  
display bgp network  
display  
as-regular-expression  
bgp  
paths  
Display AS path information  
Display peer group information  
display bgp group [ group-name ]  
bgp routing-table  
Display the information on BGP routes display  
which is mapped to a certain regular regular-expression  
expression  
as-regular-expression  
Display  
information  
configured  
route-policy  
display route-policy [ policy-name ]  
Enable/Disable information debugging  
of all BGP packets  
[ undo ] debugging bgp all  
Enable/Disable BGP event debugging  
[ undo ] debugging bgp event  
21-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Operation  
BGP  
Command  
Enable/Disable  
debugging  
Keepalive [ undo ] debugging bgp keepalive  
[ receive | send ] [ verbose ]  
[ undo ] debugging bgp open [ receive  
| send ] [ verbose ]  
Enable/Disable BGP Open debugging  
Enable /Disable BGP packet debugging  
[ undo ] debugging bgp packet  
[ receive | send ] [ verbose ]  
Enable/Disable BGP Update packet [ undo ] debugging bgp route-refresh  
debugging  
[ receive | send ] [ verbose ]  
Enable/Disable information debugging  
of BGP normal functions.  
[ undo ] debugging bgp normal  
Enable/Disable BGP Update packet [ undo ] debugging bgp update  
debugging  
[ receive | send ] [ verbose ]  
reset  
[
bgp  
regular-expression  
as-path-acl  
acl-number | network-address [ mask ] ]  
flap-info  
Reset BGP flap information  
as-regular-expression  
|
21.4 Typical BGP Configuration Example  
21.4.1 Configuring BGP AS Confederation Attribute  
I. Network requirements  
Divide the following AS 100 into three sub-AS: 1001, 1002, and 1003, and configure  
EBGP, confederation EBGP, and IBGP.  
21-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
II. Network diagram  
AS100  
Switch B  
AS1002  
AS1001 Switch A  
172.68.10.1  
172.68.10.2  
Ethernet  
172.68.10.3  
172.68.1.1  
172.68.1.2  
AS1003  
156.10.1.1  
Switch C  
Switch D  
156.10.1.2  
Switch E  
AS200  
Figure 21-2 Network diagram for AS confederation configuration  
III. Configuration procedure  
Configure Switch A:  
[Switch A] bgp 1001  
[Switch A-bgp] confederation id 100  
[Switch A-bgp] confederation peer-as 1002 1003  
[Switch A-bgp] group confed1002 external  
[Switch A-bgp] peer confed1002 as-number 1002  
[Switch A-bgp] group confed1003 external  
[Switch A-bgp] peer confed1003 as-number 1003  
[Switch A-bgp] peer 172.68.10.2 group confed1002  
[Switch A-bgp] peer 172.68.10.3 group confed1003  
Configure Switch B:  
[Switch B] bgp 1002  
[Switch B-bgp] confederation id 100  
[Switch B-bgp] confederation peer-as 1001 1003  
[Switch B-bgp] group confed1001 external  
[Switch B-bgp] peer confed1001 as-number 1001  
[Switch B-bgp] group confed1003 external  
[Switch B-bgp] peer confed1003 as-number 1003  
[Switch B-bgp] peer 172.68.10.1 group confed1001  
[Switch B-bgp] peer 172.68.10.3 group confed1003  
21-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Configure Switch C:  
[Switch C] bgp 1003  
[Switch C-bgp] confederation id 100  
[Switch C-bgp] confederation peer-as 1001 1002  
[Switch C-bgp] group confed1001 external  
[Switch C-bgp] peer confed1001 as-number 1001  
[Switch C-bgp] group confed1002 external  
[Switch C-bgp] peer confed1002 as-number 1002  
[Switch C-bgp] peer 172.68.10.1 group confed1001  
[Switch C-bgp] peer 172.68.10.2 group confed1002  
[Switch C-bgp] group ebgp200 external  
[Switch C-bgp] peer 156.10.1.2 group ebgp200 as-number 200  
[Switch C-bgp] group ibgp1003 internal  
[Switch C-bgp] peer 172.68.1.2 group ibgp1003  
21.4.2 Configuring BGP Route Reflector  
I. Network requirements  
Switch B receives an update packet passing EBGP and transmits it to Switch C. Switch  
C is a reflector with two clients: Switch B and Switch D. When Switch C receives a route  
update from Switch B, it will transmit such information to Switch D. It is required to  
establish an IBGP connection between Switch B and Switch D, because Switch C  
reflects information to Switch D.  
II. Network diagram  
Route reflector  
VLAN 3  
193.1.1.1/24  
VLAN 4  
194.1.1.1/24  
Network  
1.0.0.0  
Switch C  
AS200  
IBGP  
VLAN 3  
193.1.1.2/24  
Switch B  
IBGP  
VLAN 100  
1.1.1.1/8  
VLAN 4  
194.1.1.2/24  
EBGP  
VLAN 2  
192.1.1.1/24  
VLAN 2  
192.1.1.2/24  
Switch D  
Switch A  
AS100  
Client  
Client  
Figure 21-3 Network diagram for BGP route reflector configuration  
III. Configuration procedure  
1) Configure Switch A:  
[Switch A] interface vlan-interface 2  
[Switch A-Vlan-interface2] ip address 192.1.1.1 255.255.255.0  
[Switch A-Vlan-interface2] interface Vlan-interface 100  
[Switch A-Vlan-interface100] ip address 1.1.1.1 255.0.0.0  
21-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
[Switch A-Vlan-interface100] quit  
[Switch A] bgp 100  
[Switch A-bgp] network 1.0.0.0 255.0.0.0  
[Switch A-bgp] group ex external  
[Switch A-bgp] peer 192.1.1.2 group ex as-number 200  
2) Configure Switch B:  
Configure VLAN 2:  
[Switch B] interface Vlan-interface 2  
[Switch B-Vlan-interface2] ip address 192.1.1.2 255.255.255.0  
Configure VLAN 3:  
[Switch B] interface Vlan-interface 3  
[Switch B-Vlan-interface3] ip address 193.1.1.2 255.255.255.0  
Configure BGP peers.  
[Switch B] bgp 200  
[Switch B-bgp] group ex external  
[Switch B-bgp] peer 192.1.1.1 group ex as-number 100  
[Switch B-bgp] group in internal  
[Switch B-bgp] peer 193.1.1.1 group in  
3) Configure Switch C:  
Configure VLAN 3:  
[Switch C] interface Vlan-interface 3  
[Switch C-Vlan-interface3] ip address 193.1.1.1 255.255.255.0  
Configure VLAN 4:  
[Switch C] interface vlan-Interface 4  
[Switch C-Vlan-interface4] ip address 194.1.1.1 255.255.255.0  
Configure BGP peers and route reflector.  
[Switch C] bgp 200  
[Switch C-bgp] group rr internal  
[Switch C-bgp] peer rr reflect-client  
[Switch C-bgp] peer 193.1.1.2 group rr  
[Switch C-bgp] peer 194.1.1.2 group rr  
4) Configure Switch D:  
Configure VLAN 4:  
[Switch D] interface vlan-interface 4  
[Switch D-Vlan-interface4] ip address 194.1.1.2 255.255.255.0  
Configure BGP peers  
[Switch D] bgp 200  
group in internal  
[Switch D-bgp] peer 194.1.1.1 group in  
21-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
Using the display bgp routing-table command, you can view BGP routing table on  
Switch B. Note: Switch B has known the existence of network 1.0.0.0.  
Using the display bgp routing-table command ,you can view the BGP routing table on  
Switch D. Note: Switch D also knows the existence of network 1.0.0.0.  
21.4.3 Configuring BGP Routing  
I. Network requirements  
This example illustrates how the administrators manage the routing via BGP attributes.  
All switches are configured with BGP, and IGP in AS 200 utilizes OSPF. Switch A is in  
AS 100, and Switch B, Switch C and Switch D are in AS 200.Switch A, Switch B, and  
Switch C operate EBGP. Switch B, Switch C and Switch D operate IBGP.  
II. Network diagram  
To network  
2.0.0.0  
2.2.2.2  
AS200  
VLAN 2  
192.1.1.2/24  
VLAN 4  
194.1.1.2/24  
Switch B  
VLAN 2  
192.1.1.1/24  
Switch A  
VLAN 4  
194.1.1.1/24  
IBGP  
IBGP  
EBGP  
EBGP  
1.1.1.1  
Switch D  
4.4.4.4  
To network  
1.0.0.0  
VLAN 5  
195.1.1.1/24  
VLAN 3  
193.1.1.1/24  
Switch C  
VLAN 5  
195.1.1.2/24  
VLAN 3  
193.1.1.2/24  
AS100  
3.3.3.3  
To network  
4.0.0.0  
To network  
3.0.0.0  
Figure 21-4 Networking diagram for BGP routing configuration  
III. Configuration procedure  
1) Configure Switch A:  
[Switch A] interface Vlan-interface 2  
[Switch A-Vlan-interface2] ip address 192.1.1.1 255.255.255.0  
[Switch A] interface Vlan-interface 3  
[Switch A-Vlan-interface3] ip address 193.1.1.1 255.255.255.0  
Enable BGP  
[Switch A] bgp 100  
Specify the network that BGP sends to  
[Switch A-bgp] network 1.0.0.0  
Configure the peers  
[Switch A-bgp] group ex192 external  
[Switch A-bgp] peer 192.1.1.2 group ex192 as-number 200  
21-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
[Switch A-bgp] group ex193 external  
[Switch A-bgp] peer 193.1.1.2 group ex193 as-number 200  
[Switch A-bgp] quit  
Configure the MED attribute of Switch A  
z
Add ACL on Switch A, enable network 1.0.0.0.  
[Switch A] acl number 2000  
[Switch A-acl-basic-2000] rule permit source 1.0.0.0 0.255.255.255  
[Switch A-acl-basic-2000] rule deny source any  
z
Define two route policies, one is called apply_med_50 and the other is called  
apply_med_100. The first MED attribute with the route policy as network 1.0.0.0 is  
set as 50, while the MED attribute of the second is 100.  
[Switch A] route-policy apply_med_50 permit node 10  
[Switch A-route-policy] if-match acl 2000  
[Switch A-route-policy] apply cost 50  
[Switch A-route-policy] quit  
[Switch A] route-policy apply_med_100 permit node 10  
[Switch A-route-policy] if-match acl 2000  
[Switch A-route-policy] apply cost 100  
[Switch A-route-policy] quit  
z
Apply route policy set_med_50 to egress route update of Switch C (193.1.1.2),  
and apply route policy set_med_100 on the egress route of Switch B (192.1.1.2)  
[Switch A] bgp 100  
[Switch A-bgp] peer ex193 route-policy apply_med_50 export  
[Switch A-bgp] peer ex192 route-policy apply_med_100 export  
2) Configure Switch B:  
[Switch B] interface vlan-interface 2  
[Switch B-Vlan-interface2] ip address 192.1.1.2 255.255.255.0  
[Switch B] interface vlan-interface 4  
[Switch B-Vlan-interface4] ip address 194.1.1.2 255.255.255.0  
[Switch B] ospf  
[Switch B-ospf-1] area 0  
[Switch B-ospf-1-area-0.0.0.0] network 194.1.1.0 0.0.0.255  
[Switch B-ospf-1-area-0.0.0.0] network 192.1.1.0 0.0.0.255  
[Switch B] bgp 200  
[Switch B-bgp] undo synchronization  
[Switch B-bgp] group ex external  
[Switch B-bgp] peer 192.1.1.1 group ex as-number 100  
[Switch B-bgp] group in internal  
[Switch B-bgp] peer 194.1.1.1 group in  
[Switch B-bgp] peer 195.1.1.2 group in  
3) Configure Switch C:  
[Switch C] interface Vlan-interface 3  
21-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
[Switch C-Vlan-interface3] ip address 193.1.1.2 255.255.255.0  
[Switch C] interface vlan-interface 5  
[Switch C-Vlan-interface5] ip address 195.1.1.2 255.255.255.0  
[Switch C] ospf  
[Switch C-ospf-1] area 0  
[Switch C-ospf-1-area-0.0.0.0] network 193.1.1.0 0.0.0.255  
[Switch C-ospf-1-area-0.0.0.0] network 195.1.1.0 0.0.0.255  
[Switch C] bgp 200  
[Switch C-bgp] group ex external  
[Switch C-bgp] peer 193.1.1.1 group ex as-number 100  
[Switch C-bgp] group in internal  
[Switch C-bgp] peer 195.1.1.1 group in  
[Switch C-bgp] peer 194.1.1.2 group in  
4) Configure Switch D:  
[Switch D] interface vlan-interface 4  
[Switch D-Vlan-interface4] ip address 194.1.1.1 255.255.255.0  
[Switch D] interface vlan-interface 5  
[Switch D-Vlan-interface5] ip address 195.1.1.1 255.255.255.0  
[Switch D] ospf  
[Switch D-ospf-1] area 0  
[Switch D-ospf-1-area-0.0.0.0] network 194.1.1.0 0.0.0.255  
[Switch D-ospf-1-area-0.0.0.0] network 195.1.1.0 0.0.0.255  
[Switch D-ospf-1-area-0.0.0.0] network 4.0.0.0 0.255.255.255  
[Switch D] bgp 200  
[Switch D-bgp] group ex external  
[Switch D-bgp] peer ex as-number 200  
[Switch D-bgp] peer 195.1.1.2 group ex  
[Switch D-bgp] peer 194.1.1.2 group ex  
To enable the configuration, all BGP neighbors will be reset using the reset bgp all  
command.  
After above configuration, due to the fact that the MED attribute of route 1.0.0.0  
discovered by Switch C is less than that of Switch B, Switch D will first select the route  
1.0.0.0 from Switch C.  
If the MED attribute of Switch A is not configured, the local preference on Switch C is  
configured as follows:  
Configure the local preference attribute of Switch C  
z
Add ACL 2000 on Switch C and permit network 1.0.0.0  
[Switch C] acl number 2000  
[Switch C-acl-basic-2000] rule permit source 1.0.0.0 0.255.255.255  
[Switch C-acl-basic-2000] rule deny source any  
21-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
z
Define the route policy with the name of localpref, of those, the local preference  
matching ACL 2000 is set as 200, and that of not matching is set as 100.  
[Switch C] route-policy localpref permit node 10  
[Switch C-route-policy] if-match acl 2000  
[Switch C-route-policy] apply local-preference 200  
[Switch C-route-policy] route-policy localpref permit node 20  
[Switch C-route-policy] apply local-preference 100  
[Switch C-route-policy] quit  
z
Apply such route policy to the BGP neighbor 193.1.1.1 (Switch A)  
[Switch C] bgp 200  
[Switch C-bgp] peer 193.1.1.1 route-policy localpref import  
By then, due to the fact that the Local preference attribute value (200) of the route  
1.0.0.0 learned by Switch C is more than that of Switch B (Switch B is not configured  
with local Preference attribute, 100 by default), Switch D will also first select the route  
1.0.0.0 from Switch C.  
21.5 Troubleshooting BGP  
Symptom 1: The neighborhood cannot be established (The Established state cannot  
be entered).  
Solution: The establishment of BGP neighborhood needs the router able to establish  
TCP connection through port 179 and exchange Open packets correctly. Perform the  
check according to the following steps:  
z
z
z
Check whether the configuration of the neighbor's AS number is correct.  
Check whether the neighbor's IP address is correct.  
If using the Loopback interface, check whether the connect-source loopback  
command has been configured. By default, the router uses the optimal local  
interface to establish the TCP connection, not using the loopback interface.  
If it is the EBGP neighbor not directly connected, check whether the peer  
ebgp-max-hop command has been configured.  
z
z
Use the ping command to check whether the TCP connection is normal. Since  
one router may have several interfaces able to reach the peer, the extended ping  
-a ip-address command should be used to specify the source IP address sending  
ping packet.  
z
z
If the Ping operation fails, use the display ip routing-table command to check if  
there is available route in the routing table to the neighbor.  
If the Ping operation succeeds, check if there is an ACL denying TCP port 179.If  
the ACL is configured, cancel the denying of port 179.  
Symptom 2: BGP route cannot be advertised correctly after route of IGP is imported  
with the network command.  
Solution: Route imported by the network command should be same as a route in the  
current routing table, which should include destination segment and mask. Route  
21-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 21 BGP Configuration  
covering large network segment cannot be imported. For example, route 10.1.1.0/24  
can be imported, while 10.0.0.0/8 may cause error.  
21-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
Chapter 22 IP Routing Policy Configuration  
22.1 Introduction to IP Routing Policy  
When a router advertises or receives routing information, it possibly needs to  
implement some policies to filter the routing information, so as to receive or advertise  
the routing information which can meet the specified condition only. A routing protocol,  
e.g. RIP, may need import the routing information discovered by other protocols to  
enrich its routing knowledge. While importing the routing information, it possibly only  
needs import the information meeting the conditions and set some special attributes to  
make them meet its requirement.  
For implementing the routing policy, you need define a set of matching rules by  
specifying the characteristics of the routing information to be filtered. You can set the  
rules based on such attributes like destination address and source address of the  
information. The matching rules can be set in advance and then used in the routing  
policy to advertise, receive and import the route information.  
22.1.1 Filter  
In the Switch 8800, five kinds of filters, Route-policy, acl, as-path, community-list, and  
ip-prefix, are provided to be called by the routing protocols. The following sections  
introduce these filters respectively.  
I. acl  
The access control list (ACL) used by routing policy can be divided into the following  
types:  
z
z
z
z
z
z
z
z
Number-based basic ACLs  
Name-based basic ACLs  
Number-based advanced ACLs  
Name-based advanced ACLs  
Number-based L2 ACLs  
Name-based L2 ACLs  
Number-based user ACLs  
Name-based user ACLs  
For routing information filtering, the basic ACL is generally used. When users define the  
ACL, they will define the range of an IP address or subnet to the destination network  
segment address or the next-hop address of the routing information. If an advanced  
ACL is used, perform the matching operation by the specified source address range.  
22-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
II. ip-prefix  
The function of the ip-prefix is similar to that of the acl, but it is more flexible and easy  
for the users to understand. When the ip-prefix is applied to the routing information  
filtering, its matching objects are the destination address information domain of the  
routing information.  
An ip-prefix is identified by the ip-prefix name. Each ip-prefix can include multiple list  
items, and each list item can independently specify the match range of the network  
prefix forms and is identified with an index-number. The index-number designates the  
matching check sequence in the ip-prefix.  
During the matching, the router checks list items identified by the sequence-number in  
the ascending order. Once a single list item meets the condition, it means that it has  
passed the ip-prefix filtering and will not enter the testing of the next list item.  
III. as-path  
The as-path list is only used in the BGP. The routing information packet of the BGP  
includes an autonomous system path domain (During the process of routing  
information exchanging of the BGP, the autonomous system paths the routing  
information has passed through will be recorded in this domain). Targeting at the AS  
path domain, the as-path specifies the match condition.  
IV. community-list  
The community-list is only used in the BGP. The routing information packet of the BGP  
includes a community attribute domain to identify a community. Targeting at the  
community attribute, the community-list specifies the match condition.  
22.1.2 Routing Policy Application  
Two routing policy applications are as follows:  
z
When advertising/receiving routing information, the router filters the information  
according to the route policy, and receives or advertises the routing information  
which can meet the specified condition only.  
z
When importing other routes detected by other routing protocol, the router only  
imports the routing information, which can meet the specified condition only,  
according to the route policy.  
22.2 Configuring IP Routing Policy  
The routing policy configuration includes:  
1) Filter configuration includes:  
z
z
z
Configuring Access Control List (ACL)  
22-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Configuring ip-prefix  
Chapter 22 IP Routing Policy Configuration  
z
z
Note:  
For the configuration of ACL, refer to the QoS/ACL operation part of this manual.  
2) Applications of routing policies include:  
z
z
22.2.1 Configuring a Route-policy  
A route-policy can comprise multiple nodes. Each node is a unit for matching operation.  
The nodes will be tested against by node-number.  
Each node consists of a group of if-match clauses and apply clauses.  
z
z
The if-match clauses define the matching rules. The different if-match clauses  
for a node have the relationship of “AND”. That is, the route must satisfy all the  
if-match clauses for the node to match the node before passing this node.  
The apply clauses define the executed action after the routing information passes  
the matching test. That is, the clause sets the routing information attribute.  
I. Defining a route-policy  
Perform the following configuration in system view.  
Table 22-1 Define a route-policy  
Operation  
Command  
route-policy-name  
route-policy  
Enter Route policy view  
{ permit | deny } node node-number  
undo route-policy route-policy-name  
[ permit | deny | node node-number ]  
Remove the specified route-policy  
The permit keyword specifies the matching mode for a defined node in the route-policy  
to be in permit mode. If a route satisfies all the if-match clauses of the node, it will pass  
the filtering of the node, and the apply clauses for the node will be executed without  
taking the test of the next node. If not, however, the route should take the test of the  
next node.  
The deny keyword specifies the matching mode for a defined node in the route-policy  
to be in deny mode. In this mode, the apply clauses will not be executed. If a route  
22-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
satisfies all the if-match clauses of the node, it will be denied by the node and will not  
take the test of the next node. If not, however, the route will take the test of the next  
node.  
The nodes have the “OR” relationship. In other words, the router will test the route  
against the nodes in the route-policy in sequence. Once a node is matched, the  
route-policy filtering will be passed.  
By default, the route-policy is not defined.  
Note: If multiple nodes are defined in a route-policy, at least one of them should be in  
permit mode. Apply the route-policy to filter routing information. If the routing  
information does not match any node, the routing information will be denied by the  
route-policy. If all the nodes in the route-policy are in deny mode, all routing information  
will be denied by the route-policy.  
II. Defining if-match clauses for a route-policy  
The if-match clauses define the matching rules. That is, the filtering conditions that the  
routing information should satisfy for passing the route-policy. The matching objects are  
some attributes of routing information.  
Perform the following configuration in route policy view.  
Table 22-2 Define if-match conditions  
Operation  
Command  
Match the AS path domain of the BGP  
routing information  
if-match as-path acl-number  
Cancel the matched AS path domain of the  
BGP routing information  
undo if-match as-path  
if-match  
{
[
community  
basic-community-number  
whole-match  
Match the community attribute of the BGP  
routing information  
]
|
adv-community-number }  
Cancel the matched community attribute of  
the BGP routing information  
undo if-match community  
Match the destination address of the if-match { acl acl-number | ip-prefix  
routing information  
ip-prefix-name }  
Cancel the matched destination address of  
the routing information  
undo if-match { acl | ip-prefix }  
Match the next-hop interface of the routing if-match interface { interface-type  
information  
interface-number }  
Cancel the matched next-hop interface of  
the routing information  
undo if-match interface  
if-match ip next-hop  
{
acl  
Match the next-hop of the routing  
information  
acl-number  
|
ip-prefix  
ip-prefix-name }  
22-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
Operation  
Command  
Cancel the matched next-hop of the routing  
information set by ACL  
undo if-match ip next-hop  
Cancel the matched next-hop of the routing  
information set by address prefix list  
undo if-match ip next-hop ip-prefix  
if-match cost value  
Match the routing cost of the routing  
information  
Cancel the matched routing cost of the  
routing information  
undo if-match cost  
Match the tag domain of the OSPF routing  
information  
if-match tag value  
Cancel the tag domain of the matched  
OSPF routing information  
undo if-match tag  
By default, no matching will be performed.  
Note the following:  
z
The if-match clauses for a node in the route-policy have the relationship of “AND”  
for matching. That is, the route must satisfy all the clauses to match the node  
before the actions specified by the apply clauses can be executed.  
If no if-match clauses are specified, all the routes will pass the filtering on the  
node.  
z
III. Defining apply clauses for a route-policy  
The apply clauses specify actions, which are the configuration commands executed  
after a route satisfies the filtering conditions specified by the if-match clauses. Thereby,  
some attributes of the route can be modified.  
Perform the following configuration in route policy view.  
Table 22-3 Define apply clauses  
Operation  
Command  
as-path  
Add the specified AS number before the  
as-path series of the BGP routing  
information  
apply  
as-number-1  
[ as-number-2 [ as-number-3 ... ] ]  
Cancel the specified AS number added  
before the as-path series of the BGP undo apply as-path  
routing information  
apply community  
[
[
aa:nn  
|
Set the community attribute in the BGP no-export-subconfed | no-export |  
routing information  
no-advertise ] * [ additive ] | additive |  
none ]  
Cancel the set community attribute in the  
BGP routing information  
undo apply community  
22-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
Operation  
Command  
Set the next-hop address of the routing  
information  
apply ip next-hop ip-address  
Cancel the next-hop address of the  
routing information  
undo apply ip next-hop  
Import the route to IS-IS level-1, level-2 or apply isis [ level-1 | level-2  
|
level-1-2  
level-1-2 ]  
Remove the function of importing the  
route to IS-IS  
undo apply isis  
Set the local preference of the BGP apply  
local-preference  
routing information  
local-preference  
Cancel the local preference of the BGP  
routing information  
undo apply local-preference  
Set the routing cost of the routing  
information  
apply cost value  
Cancel the routing cost of the routing  
information  
undo apply cost  
Set the cost type of the routing  
information  
apply cost-type [ internal | external ]  
Remove the setting of the cost type  
undo apply cost-type  
Set the route origin of the BGP routing apply origin { igp | egp as-number |  
information  
incomplete }  
Cancel the route origin of the BGP routing  
information  
undo apply origin  
Set the tag domain of the OSPF routing  
information  
apply tag value  
Cancel the tag domain of the OSPF  
routing information  
undo apply tag  
By default, perform no settings.  
Note that if the routing information meets the match conditions specified in the  
route-policy and also notifies the MED value configured with the apply cost-type  
internal when notifying the IGP route to the EBGP peers, then this value will be  
regarded as the MED value of the IGP route. The preference configured with the apply  
cost-type internal command is lower than that configured with the apply cost  
command, but higher than that configured with the default med command.  
22-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
22.2.2 Configuring ip-prefix  
z
A prefix-list is identified by an ip-prefix-name. Each IP prefix-list may include  
multiple entries each specifying an IP prefix matching range. IP prefix entries are  
identified by index-numbers. The order in which IP prefix entries are matched  
against depends on the order of their index numbers.  
Perform the following configuration in system view.  
Table 22-4 Define prefix-list  
Operation  
Command  
ip ip-prefix ip-prefix-name [ index index-number ] { permit |  
deny } network len [ greater-equal greater-equal ]  
[ less-equal less-equal ]  
Define prefix-list  
undo ip ip-prefix ip-prefix-name [ index index-number |  
permit | deny ]  
Remove prefix-list  
During the matching, the router checks list items identified by the index-number in the  
ascending order. If only one list item meets the condition, it means that it has passed  
the ip-prefix filtering (will not enter the testing of the next list item).  
Note that if more than one ip-prefix item are defined, then the match mode of at least  
one list item should be the permit mode. The list items of the deny mode can be firstly  
defined to rapidly filter the routing information not satisfying the requirement, but if all  
the items are in the deny mode, no route will pass the ip-prefix filtering. You can define  
an item of permit 0.0.0.0/0 greater-equal 0 less-equal 32 after the multiple list items in  
the deny mode so as to let all the other routes pass.  
22.2.3 Configuring the AS Path List  
The routing information packet of the BGP includes an autonomous system path  
domain. The as path-list can be used to match with the autonomous system path  
domain of the BGP routing information so as to filter the routing information, which does  
not conform to the requirements.  
Perform the following configuration in the system view:  
Table 22-5 Define the AS path list  
Operation  
Define the AS path list  
Command  
ip as-path-acl acl-number { permit |  
deny } as-regular-expression  
Delete the specified AS path list  
undo ip as-path-acl acl-number  
By default, no AS path list is defined.  
22-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
22.2.4 Configuring a Community Attribute List  
In BGP, community attribute is optional and transitive. Some community attributes  
known globally are called standard community attributes. Some community attributes  
are for special purpose. You can also define expanded community attribute.  
A route can have one more community attributes. The speakers of multiple community  
attributes of a route can act according to one, several or all attributes. A router can  
select community attribute modification before transmitting routes to other peers.  
Community lists, which identify community information, can be divided into  
basic-community-lists and advanced-community-lists. Basic-community-lists range  
from 1 to 99, while advanced-community-lists range from 100 to 199.  
Perform the following configuration in system view.  
Table 22-6 Configure a community attribute list  
Operation  
Command  
ip community-list basic-comm-list-number  
{ permit | deny } [ aa:nn | internet |  
no-export-subconfed | no-advertise |  
no-export ]*  
Configure a basic community-list  
Configure  
community-list  
an  
advanced ip community-list adv-comm-list-number  
{ permit | deny } comm-regular-expression  
undo  
ip  
community-list  
Cancel a community-list  
{
basic-comm-list-number  
|
adv-comm-list-number }  
By default, a BGP community attribute list is not configured.  
22.2.5 Importing Routing Information Discovered by Other Routing  
Protocols  
A routing protocol can import the routes discovered by other routing protocols to enrich  
its route information. The route-policy can be used for route information filtering to  
implement the purposeful redistribution. If the destination routing protocol importing the  
routes cannot directly reference the route costs of the source routing protocol, you  
should satisfy the requirement of the protocol by specifying a route cost for the  
imported route.  
Perform the following configuration in routing protocol view.  
Table 22-7 Configure to import the routes of other protocols  
Operation  
Command  
import-route protocol [ med med | cost  
Set to import routes of other protocols cost ] [ tag value ] [ type 1 | 2 ]  
[ route-policy route-policy-name ]  
22-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
Operation  
Command  
Cancel the setting for importing  
routes of other protocols  
undo import-route protocol  
By default, the routes discovered by other protocols will not be advertised.  
Note:  
In different routing protocol views, the parameter options are different. For details,  
respectively refer to the import-route command in different protocols.  
22.2.6 Configuring Route Filtering  
I. Configuring to filter the received routes  
Perform the following configuration in routing protocol view.  
Define a policy to filter the routing information not satisfying the conditions while  
receiving routes with the help of an ACL or address prefix-list. gateway specifies that  
only the update packets from a particular neighboring router will be received.  
Table 22-8 Configure to filter the received routes  
Operation  
Command  
Configure to filter the received routing  
information advertised by the specified  
address  
filter-policy gateway ip-prefix-name  
import  
Cancel the filtering of the received  
routing information advertised by the  
specified address  
undo  
ip-prefix-name import  
filter-policy  
gateway  
Configure to filter the received global filter-policy { acl-number | ip-prefix  
routing information  
ip-prefix-name } [ gateway ] import  
undo filter-policy acl-number  
ip-prefix ip-prefix-name } [ gateway ]  
import  
{
|
Cancel the filtering of the received global  
routing information  
II. Configuring to filter the advertised routes  
You may define a route advertisement policy to filter advertised routing information.  
This can be done by referencing an ACL or IP prefix-list to filter routing information that  
does not meet the conditions, or by specifying a protocol to filter routing information of  
the protocol only.  
Perform the following configuration in routing protocol view.  
22-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
Table 22-9 Configure to filter the advertised routes  
Operation  
Configure to filter the routes filter-policy  
Command  
{
acl-number  
|
ip-prefix  
advertised by the protocol ip-prefix-name } export [ protocol ]  
Cancel the filtering of the routes undo filter-policy { acl-number | ip-prefix  
advertised by the protocol ip-prefix-name } export [ protocol ]  
By far, the route policy supports importing the routes discovered by the following  
protocols into the routing table:  
direct: The hop (or host) to which the local interface is directly connected.  
static: Route configured statically  
rip: Route discovered by RIP  
ospf: Route discovered by OSPF  
ospf-ase: External route discovered by OSPF  
ospf-nssa: NSSA route discovered by OSPF  
isis: Route discovered by IS-IS  
bgp: Route acquired by BGP  
By default, the filtering of the received and advertised routes will not be performed.  
22.3 Displaying and Debugging the Routing Policy  
After the above configuration, execute the display command in any view to display the  
running of the routing policy configuration, and to verify the effect of the configuration.  
Table 22-10 Display and debug the route policy  
Operation  
Command  
display  
[ route-policy-name ]  
route-policy  
Display the routing policy  
Display the path information of the AS  
filter in BGP  
display ip as-path-acl [ acl-number ]  
display ip ip-prefix [ ip-prefix-name ]  
Display the address prefix list  
information  
22-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 22 IP Routing Policy Configuration  
22.4 Typical IP Routing Policy Configuration Example  
22.4.1 Configuring to Filter the Received Routing Information  
I. Network requirements  
z
Switch A communicates with Switch B, running OSPF protocol. The router ID of  
Switch A is 1.1.1.1, and that of Switch B is 2.2.2.2.  
z
z
Import three static routes through enabling the OSPF protocol on the Switch A.  
The route filtering rules can be configured on Switch B to make the received three  
static routes partially visible and partially shielded. It means that routes in the  
network segments 20.0.0.0 and 40.0.0.0 are visible while those in the network  
segment 30.0.0.0 are shielded.  
II. Network diagram  
static 20.0.0.0/8  
30.0.0.0/8  
area 0  
Router ID:2.2.2.2  
Router ID:1.1.1.1  
Vlan-interface100  
40.0.0.0/8  
Vlan-interface200  
12.0.0.1/8  
10.0.0.1/8  
Vlan-interface100  
10.0.0.2/8  
Switch A  
Switch B  
Figure 22-1 Network diagram for filtering the received routing information  
III. Configuration procedure  
1) Configure Switch A:  
Configure the IP address of VLAN interface.  
[Switch A] interface vlan-interface 100  
[Switch A-Vlan-interface100] ip address 10.0.0.1 255.0.0.0  
[Switch A] interface vlan-interface 200  
[Switch A-Vlan-interface200] ip address 12.0.0.1 255.0.0.0  
Configure three static routes.  
[Switch A] ip route-static 20.0.0.1 255.0.0.0 12.0.0.2  
[Switch A] ip route-static 30.0.0.1 255.0.0.0 12.0.0.2  
[Switch A] ip route-static 40.0.0.1 255.0.0.0 12.0.0.2  
Enable the OSPF protocol and specifies the number of the area to which the interface  
belongs.  
[Switch A] router id 1.1.1.1  
[Switch A] ospf  
[Switch A-ospf-1] area 0  
[Switch A-ospf-1-area-0.0.0.0] network 10.0.0.0 0.255.255.255  
Import the static routes  
[Switch A-ospf-1] import-route static  
22-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
2) Configure Switch B:  
Chapter 22 IP Routing Policy Configuration  
Configure the IP address of VLAN interface.  
[Switch B] interface vlan-interface 100  
[Switch B-Vlan-interface100] ip address 10.0.0.2 255.0.0.0  
Configure the access control list.  
[Switch B] acl number 2000  
[Switch B-acl-basic-2000] rule deny source 30.0.0.0 0.255.255.255  
[Switch B-acl-basic-2000] rule permit source any  
Enable OSPF protocol and specifies the number of the area to which the interface  
belongs.  
[Switch B] router id 2.2.2.2  
[Switch B] ospf  
[Switch B-ospf-1] area 0  
[Switch B-ospf-1-area-0.0.0.0] network 10.0.0.0 0.255.255.255  
Configure OSPF to filter the external routes received.  
[Switch B-ospf-1] filter-policy 2000 import  
22.5 Troubleshooting Routing Policy  
Symptom 1: Routing information filtering cannot be implemented in normal operation  
of the routing protocol  
Solution: Check for the following faults:  
z
The if-match mode of at least one node of the Route-policy should be the permit  
mode. When a Route-policy is used for the routing information filtering, if a piece of  
routing information does not pass the filtering of any node, then it means that the  
route information does not pass the filtering of the Route-policy. When all the  
nodes of the Route-policy are in the deny mode, then all the routing information  
cannot pass the filtering of the Route-policy.  
z
The if-match mode of at least one list item of the ip-prefix should be the permit  
mode. The list items of the deny mode can be firstly defined to rapidly filter the  
routing information not satisfying the requirement, but if all the items are in the  
deny mode, any routes will not pass the ip-prefix filtering. You can define an item  
of permit 0.0.0.0/0 less-equal 32 after the multiple list items in the deny mode so  
as to let all the other routes pass the filtering (If less-equal 32 is not specified, only  
the default route will be matched).  
22-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 23 IP Multicast Overview  
Chapter 23 IP Multicast Overview  
Note:  
An Ethernet switch functions as a router when it runs IP multicast protocol. A router that  
is referred to in the following represents a generalized router or a layer 3 Ethernet  
switch running IP multicast protocol.  
23.1 IP Multicast Overview  
23.1.1 Problems with Unicast/Broadcast  
The constant development of the Internet and increasing interaction of versatile data,  
voice and vedio information over the network, has promoted the emergence of new  
services like e-commerce, network conference, online auction, vedio on demand (VoD),  
and tele-education. These services require higher information security and greater  
rewards.  
I. Data transmission in unicast mode  
In unicast mode, every user that needs the inforamtion receives a copy through the  
channels the system separately establishes for them. See Figure 23-1.  
User A  
User B  
Unicast  
User C  
User D  
Server  
User E  
Figure 23-1 Data transmission in unicast mode  
Suppose that Users B, D, and E need the information, the information source Server  
establishes transmision channels with every of them. Since the traffic in transmission  
increases with the number of users, excessive copies of the information would spread  
23-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 23 IP Multicast Overview  
over the network if there is a large number of users in need of this infomration. As the  
bandwidth would turn short, the unicast mode is incapable of massive transmission.  
II. Data transmission in broadcast mode  
In broadcast mode, every user on the network receives the information regardless of  
User A  
User B  
Broadcast  
User C  
User D  
Server  
User E  
Figure 23-2 Data transmission in broadcast mode  
Suppose the Users B, D, and E need the information, the information source Server  
broadcasts the information through the router; User A and User C can also receive the  
information. In that case, information security and rewards to services are not  
guaranteed. Moreover, bandwidth is terribly wasted when only a few part of users are in  
need of the information.  
In short, the unicast mode is useful in networks with scattered users, and the multicast  
mode is suitable for networks with dense users. When the number of users is uncertain,  
the adoption of unicast or multicast mode results in low efficiency.  
23.1.2 Advantages of Multicast  
I. Multicast  
IP multicast technology solves those problems. When some users in the network need  
specific information, it allows the multicast source to send the information only once.  
With the tree route established by the multicast routing protocol, the information will not  
be duplicated or distributed until it reaches the bifurcation point as far as possible. See  
23-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 23 IP Multicast Overview  
User A  
User B  
Multicast  
User C  
User D  
Server  
User E  
Figure 23-3 Data transmission in multicast mode  
Suppose the Users B, D, and E need the information, they need to be organized into a  
receiver group to ensure that the information can reach them smoothly. The routers on  
the network duplicate and forward the information according to the distribution of these  
users in the group. Finally, the information is transmitted to the intended receivers B,D  
and E properly and correctly.  
In multicast mode, the information sender is called the "multicast source", the receiver  
is called the "multicast group", and the routers for multicast information transmission  
are called "multicast routers". Members of a multicast group can scatter around the  
network; the multicast group therefore has no geographical limitation. It should be  
noted that a multicast source does not necessarily belong to a multicast group. It sends  
data to multicast groups but is not necessarily a receiver. Multiple sources can send  
packets to a multicast group simultaneously.  
II. Advantages  
The main advantages of multicast are:  
z
Enhanced efficiency: It reduces network traffic and relieves server and CPU of  
loads.  
z
z
Optimized performance: It eliminates traffic redundancy.  
Distributed application: It enables multipoint application.  
23.1.3 Application of Multicast  
IP multicast technology effectively implements point to multi-point forwarding with high  
speed, as saves network bandwidth a lot and can relieve network loads. It facilitates  
also the development of new value-added services in the Internet information service  
area that include online live show, Web TV, tele-education, telemedicine, network radio  
station and real-time audio/video conferencing. It takes a positive role in:  
z
Multimedia and streaming media application  
23-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 23 IP Multicast Overview  
z
z
z
Occasional communication for training and cooperation  
Data storage and finance (stock) operation  
Point-to-multipoint data distribution  
With the increasing popularity of multimedia services over IP network, multicast is  
gaining its marketplace. In addition, the multicast service becomes popular and  
prevalent gradually.  
23.2 Implementation of IP Multicast  
23.2.1 IP Multicast Addresses  
In multicast mode, there are questions about where to send the information, how to  
locate the destination or know the receiver. All these questions can be narrowed down  
to multicast addressing. To guarantee the communication between a multicast source  
and a multicast group (that is, a group of receivers), the network layer multicast  
address (namely the IP multicast address) is required, along with the technique to  
correlate it with the link layer MAC multicast address. Following is the introduction to  
these two kinds of addresses.  
I. IP Multicast Addresses  
According to the definition in Internet Assigned Number Authority (IANA), IP addresses  
fall into four types: Class A, Class B, Class C and Class D. Unicast packets use IP  
addresses of Class A, Class B or Class C, depending on specific packet scales.  
Multicast packets use IP addresses of Class D as their destination addresses, but  
Class D IP addresses cannot be contained in the source IP field of IP packets.  
During unicast data transmission, a packet is transmitted "hop-by-hop" from the source  
address to the destination address. However, in IP multicast environment, a packet has  
more than one destination address, or a group of addresses. All the information  
receivers are added to a group. Once a receiver joins the group, the data for this group  
address starts flowing to this receiver. All members in the group can receive the  
packets. This group is a multicast group.  
Membership here is dynamic, and a host can join or leave the group at any time. A  
multicast group can be permanent or temporary. Some multicast group addresses are  
allocated by IANA, and the multicast group is called permanent multicast group. The IP  
addresses of a permanent multicast group are unchangeable, but its membership is  
changeable, and the number of members is arbitrary. It is quite possible for a  
permanent group to not a single member. Those not reserved for permanent multicast  
groups can be used by temporary multicast groups. Class D multicast addresses range  
from 224.0.0.0 to 239.255.255.255. More information is listed in Table 23-1 Ranges  
23-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 23 IP Multicast Overview  
Table 23-1 Ranges and meanings of Class D addresses  
Class D address range  
Description  
Reserved  
multicast  
addresses  
(addresses of permanent groups). All  
but 224.0.0.0 can be allocated by routing  
protocols.  
224.0.0.0224.0.0.255  
Multicast addresses available for users  
(addresses of temporary groups). They  
are valid in the entire network.  
224.0.1.0238.255.255.255  
239.0.0.0239.255.255.255  
Multicast  
addresses  
for  
local  
management. They are valid only in the  
specified local range.  
Reserved multicast addresses that are commonly used are described in the following  
table.  
Table 23-2 Reserved multicast address list  
Class D address range  
224.0.0.0  
Description  
Base Address (Reserved)  
Addresses of all hosts  
Addresses of all multicast routers  
Not for allocation  
DVMRP routers  
OSPF routers  
224.0.0.1  
224.0.0.2  
224.0.0.3  
224.0.0.4  
224.0.0.5  
224.0.0.6  
224.0.0.7  
224.0.0.8  
224.0.0.9  
224.0.0.10  
224.0.0.11  
224.0.0.12  
224.0.0.13  
224.0.0.14  
224.0.0.15  
224.0.0.16  
224.0.0.17  
224.0.0.18  
OSPF DR  
ST routers  
ST hosts  
RIP-2 routers  
IGRP routers  
Active agents  
DHCP server/Relay agent  
All PIM routers  
RSVP encapsulation  
All CBT routers  
Specified SBM  
All SBMS  
VRRP  
23-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 23 IP Multicast Overview  
Class D address range  
Description  
……  
……  
II. Ethernet Multicast MAC Addresses  
When a unicast IP packet is transmitted on the Ethernet, the destination MAC address  
is the MAC address of the receiver. However, for a multicast packet, the destination is  
no longer a specific receiver but a group with unspecific members. Therefore, the  
multicast MAC address should be used.  
As Internet Assigned Number Authority (IANA) provisions, the high 24 bits of a  
multicast MAC address are 0x01005e and the low 23 bits of a MAC address are the low  
23 bits of a multicast IP address. The high twenty-fifth bit is 0, a fixed value.  
32-bit IP  
address  
1110XXXX XXXXXXXX XXXXXXXX XXXXXXXX  
23 bitsmapped  
5 bits  
unmapped  
48-bit MAC  
address  
XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX  
Figure 23-4 Mapping between a multicast IP address and an Ethernet MAC address  
The first four bits of the multicast address are 1110, representing the multicast identifier.  
Among the rest 28 bits, only 23 bits are mapped to the MAC address, and the other five  
bits are lost. This may results in that 32 IP addresses are mapped to the same MAC  
address.  
23.2.2 IP Multicast Protocols  
IP multicast protocols mainly involves multicast group management protocols and  
multicast routing protocols. Their application positions are shown in Figure 23-5  
23-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 23 IP Multicast Overview  
User A  
AS1  
IGMP  
PIM  
User B  
User C  
MBGP/MSDP  
PIM  
IGMP  
IGMP  
Multicast  
User D  
Server  
AS2  
User E  
Figure 23-5 Application positions of multicast-related protocols  
I. Multicast group management protocol  
Multicast groups use Internet group management protocol (IGMP) as the management  
protocols. IGMP runs between the host and multicast router and defines the  
membership establishment and maintenance mechanism between them.  
II. Multicast routing protocols  
A multicast routing protocol runs between multicast routers to create and maintain  
multicast routes for correct and efficient forwarding of multicast packet. The multicast  
routing creates a loop-free data transmission path from one source to multiple receivers.  
The task of multicast routing protocols is to build up the distribution tree architecture. A  
multicast router can use multiple methods to build up a path for data transmission, that  
is, a distribution tree.  
As in unicast routing, the multicast routing can also be intra-domain or inter-domain.  
Intra-domain multicast routing is rather mature and protocol independent multicast  
(PIM) is the most wildly used intra-domain protocol, which can work in collaboration  
with unicast routing protocols. The inter-domain routing first needs to solve how to  
transfer routing information between ASs. Since the ASs may belong to different  
telecom carriers, the inter-domain routing information must contain carriers’ policies, in  
addition to distance information. Currently, inter-domain routing protocols include  
multicast source discovery protocol (MSDP) and MBGP multicast extension.  
23.3 RPF Mechanism for IP Multicast Packets  
To ensure that multicast packets reach a router along the shortest path, the multicast  
router must check the receiving interface of multicast packets depending on the unicast  
routing table or a unicast routing table independently provided for multicast. This check  
mechanism is the basis for most multicast routing protocols to perform multicast  
forwarding, and is known as Reverse Path Forwarding (RPF) check. A multicast router  
23-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 23 IP Multicast Overview  
uses the source address of a received multicast packet to query the unicast routing  
table or the independent multicast routing table to determine that the receiving interface  
is on the shortest path from the receiving station to the source. If a source tree is used,  
the source address is the address of the source host sending the multicast packet. If a  
shared tree is used, the source address is the RP address of the shared tree. A  
multicast packet arriving at the router will be forwarded according to the multicast  
forwarding entry if it passes the RPF check, or else, it will be discarded.  
23-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
Chapter 24 IGMP Snooping Configuration  
24.1 IGMP Snooping Overview  
24.1.1 IGMP Snooping Principle  
IGMP Snooping (Internet Group Management Protocol Snooping) is a multicast control  
mechanism running on the Layer 2 Ethernet switch and it is used for multicast group  
management and control.  
IGMP Snooping runs on the link layer. When receiving the IGMP messages transmitted  
between the host and router, the Layer 2 Ethernet switch uses IGMP Snooping to  
analyze the information carried in the IGMP messages. If the switch hears IGMP host  
report message from an IGMP host, it will add the host to the corresponding multicast  
table. If the switch hears IGMP leave message from an IGMP host, it will remove the  
host from the corresponding multicast table. The switch continuously listens to the  
IGMP messages to create and maintain MAC multicast address table on Layer 2. And  
then it can forward the multicast packets transmitted from the upstream router  
according to the MAC multicast address table.  
When IGMP Snooping is disabled, the packets are broadcasted on Layer 2. See the  
following figure:  
Video stream  
Internet / Intranet  
Multicast router  
Video stream  
VOD Server  
Layer 2 Ethernet Switch  
Video stream  
Video stream  
Video stream  
Multicast group member  
Non-multicast  
group member  
Non-multicast  
group member  
Figure 24-1 Multicast packet transmission without IGMP Snooping  
When IGMP Snooping runs, the packets are multicast rather than broadcasted on  
Layer 2. See the following figure:  
24-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
Video stream  
Internet / Intranet  
Multicast router  
Layer 2 Ethernet Switch  
Video stream  
Video stream  
VOD Server  
Video stream  
Video stream  
Multicast group member  
Non-multicast  
group member  
Non-multicast  
group member  
Figure 24-2 Multicast packet transmission when IGMP Snooping runs  
24.1.2 Implement IGMP Snooping  
I. Related concepts of IGMP Snooping  
To facilitate the description, this section first introduces some related switch concepts of  
IGMP Snooping:  
z
z
Router Port: The port of the switch, directly connected to the multicast router.  
Multicast member port: The port connected to the multicast member. The  
multicast member refers to a host joined a multicast group.  
z
z
MAC multicast group: The multicast group is identified with MAC multicast  
address and maintained by the Ethernet switch.  
Router port aging time: Time set on the router port aging timer. If the switch has  
not received any IGMP general query message before the timer times out, it  
considers the port no longer as a router port.  
z
Multicast group member port aging time: When a port joins an IP multicast group,  
the aging timer of the port will begin timing. The multicast group member port  
aging time is set on this aging timer. If the switch has not received any IGMP  
report message before the timer times out, it transmits IGMP specific query  
message to the port.  
z
Maximum response time: When the switch transmits IGMP specific query  
message to the multicast member port, the Ethernet switch starts a response timer,  
which times before the response to the query. If the switch has not received any  
IGMP report message before the timer times out, it will remove the port from the  
multicast member ports  
24-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
II. Implement Layer 2 multicast with IGMP Snooping  
The Ethernet switch runs IGMP Snooping to listen to the IGMP messages and map the  
host and its ports to the corresponding multicast group address. To implement IGMP  
Snooping, the Layer 2 Ethernet switch processes different IGMP messages in the way  
illustrated in the figure below:  
Internet  
router  
A
running IGMP  
IGMP packets  
IGMP packets  
A Ethernet switch  
runningIGMPSnooping
Figure 24-3 Implement IGMP Snooping  
z
IGMP general query message: Transmitted by the multicast router to the multicast  
group members to query which multicast group contains member. When an IGMP  
general query message arrives at a router port, the Ethernet switch will reset the  
aging timer of the port. When a port other than a router port receives the IGMP  
general query message, the Ethernet switch will notify the multicast router that a  
port is ready to join a multicast group and starts the aging timer for the port.  
IGMP specific query message: Transmitted from the multicast router to the  
multicast members and used for querying if a specific group contains any member.  
When received IGMP specific query message, the switch only transmits the  
specific query message to the IP multicast group which is queried.  
z
z
IGMP report message: Transmitted from the host to the multicast router and used  
for applying for joining a multicast group or responding to the IGMP query  
message. When received the IGMP report message, the switch checks if the MAC  
multicast group, corresponding to the IP multicast group the packet is ready to join  
exists.  
If the corresponding MAC multicast group does not exist, the switch only notifies the  
router that a member is ready to join a multicast group, creates a new MAC multicast  
group, adds the port received the message to the group, starts the port aging timer, and  
then adds all the router ports in the native VLAN of the port into the MAC multicast  
24-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
forwarding table, and meanwhile creates an IP multicast group and adds the port  
received the report message to it.  
If the corresponding MAC multicast group exists but does not contains the port received  
the report message, the switch adds the port into the multicast group and starts the port  
aging timer. And then the switch checks if the corresponding IP multicast group exists.  
If it does not exist, the switch creates a new IP multicast group and adds the port  
received the report message to it. If it exists, the switch adds the port to it.  
If the MAC multicast group corresponding to the message exists and contains the port  
received the message, the switch will only reset the aging timer of the port.  
z
IGMP leave message: Transmitted from the multicast group member to the  
multicast router to notify that a host left the multicast group. When received a leave  
message of an IP multicast group, the Ethernet switch transmits the specific query  
message concerning that group to the port received the message, in order to  
check if the host still has some other member of this group and meanwhile starts a  
maximum response timer. If the switch has not receive any report message from  
the multicast group after the timer expires, the port will be removed from the  
corresponding MAC multicast group. If the MAC multicast group does not have  
any member, the switch will notify the multicast router to remove the branch from  
the multicast tree.  
24.2 IGMP Snooping Configuration  
The main IGMP Snooping configuration includes:  
z
z
z
z
z
Enabling/disabling IGMP Snooping  
Configuring the aging time of router port  
Configuring maximum response time  
Configuring the aging time of multicast group member port  
Configuring Unknown Multicast Packets not Broadcasted within a VLAN  
Among the above configuration tasks, enabling IGMP Snooping is required, while  
others are optional for your requirements.  
24.2.1 Enabling/Disabling IGMP Snooping  
You can use the following commands to enable/disable IGMP Snooping to control  
whether MAC multicast forwarding table is created and maintained on Layer 2. First  
enable IGMP Snooping globally in system view, and then enable IGMP Snooping of the  
corresponding VLAN in VLAN view. The second step must be based on the first one.  
Perform the following configuration in system view and VLAN view.  
24-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
Table 24-1 Enabling/Disabling IGMP Snooping  
Operation  
Command  
Enable/disable IGMP Snooping  
igmp-snooping { enable | disable }  
By default, IGMP Snooping is disabled.  
Caution:  
z
z
Although layer 2 and layer 3 multicast protocols can be configured in pair, they  
cannot run on the same VLAN or its corresponding VLAN interface at the same time.  
For example, if PIM or IGMP is enabled on a VLAN, then IGMP Snooping cannot  
operate on this VLAN.  
IGMP Snooping functions only when it is enabled both in system view and in VLAN  
view. Otherwise, IGMP Snooping does not take effect.  
24.2.2 Configuring Router Port Aging Time  
This task is to manually configure the router port aging time. If the switch has not  
received any general query message from the router before the router port is aged, it  
will remove the port from all MAC multicast groups.  
Perform the following configuration in system view.  
Table 24-2 Configuring router port aging time  
Operation  
Command  
Configure router port aging time  
Restore the default aging time  
igmp-snooping router-aging-time seconds  
undo igmp-snooping router-aging-time  
By default, the port aging time is 105s.  
24.2.3 Configuring Maximum Response Time  
This task is to manually configure the maximum response time. If the Ethernet switch  
receives no report message from a port in the maximum response time, it will remove  
the port from the multicast group.  
Perform the following configuration in system view.  
24-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
Table 24-3 Configuring the maximum response time  
Operation  
Configure the maximum response igmp-snooping  
Command  
max-response-time  
time  
seconds  
Restore the default setting  
undo IGMP-snooping max-response-time  
By default, the maximum response time is 1 seconds.  
24.2.4 Configuring Aging Time of Multicast Group Member Ports  
This task is to manually set the aging time of the multicast group member port. If the  
switch receives no multicast group report message during the member port aging time,  
it will transmit the specific query message to that port and starts a maximum response  
timer.  
Perform the following configuration in system view.  
Table 24-4 Configuring aging time of the multicast member ports  
Operation  
Command  
Configure aging time of the  
multicast member  
igmp-snooping host-aging-time seconds  
undo igmp-snooping host-aging-time  
Restore the default setting  
By default, the aging time of the multicast member is 260 seconds.  
24.2.5 Configuring Unknown Multicast Packets not Broadcasted within a  
VLAN  
This configuration task is to enable/disable the function of not broadcasting unknown  
multicast packets within a VLAN. If this function is not enabled but IGMP snooping  
enabled on VLAN, multicast packets are broadcasted on within the VLAN when the  
destination broadcast group has no member ports. When this function is enabled,  
however, multicast packets are only forwarded to the router port, but not broadcasted  
within the VLAN if no member port exists. Since the router port is that connected to the  
router with IGMP/PIM enabled and the router sends regularly IGMP Query and PIM  
Hello packets, the switch can identify the router port. If there is no router port, multicast  
packets shall be dropped, instead of being forwarded.  
24-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
Caution:  
If IGMP snooping is not enabled on the VLAN (nor Layer 3 multicast), unknown  
multicast packets are broadcasted within the VLAN no matter whether this function is  
enabled or not. That is, to make unknown multicast packets not be broadcasted with a  
VLAN, you must enable igmp-snooping in this VLAN and enable igmp-snooping  
nonflooding-enable globally.  
Perform the following configuration in system view.  
Table 24-5 Globally enable/disable multicast packets not broadcasted within a VLAN  
Operation  
Command  
Enable multicast packets not to be  
broadcasted within a VLAN  
igmp-snooping nonflooding-enable  
Disable multicast packets not to be undo  
broadcasted within a VLAN  
nonflooding-enable  
igmp-snooping  
By default, unknown multicast packets are broadcasted within the VLAN.  
24.3 Displaying and debugging IGMP Snooping  
After the above configuration, execute display command in any view to display the  
running of the IGMP Snooping configuration, and to verify the effect of the  
configuration.  
Table 24-6 Displaying and debugging IGMP Snooping  
Operation  
Command  
igmp-snooping  
Display the information about current IGMP display  
Snooping configuration  
configuration  
Display IGMP Snooping statistics of  
received and sent messages  
display igmp-snooping statistics  
Display IP/MAC multicast group information display igmp-snooping group  
in the VLAN [ vlan vlanid ]  
24.4 IGMP Snooping Configuration Example  
24.4.1 Enable IGMP Snooping  
I. Networking requirements  
24-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
To implement IGMP Snooping on the switch, you need to enable IGMP Snooping on  
the switch first. The switch is connected with the router via the router port, and  
connected with user PC through the non-router ports.  
II. Networking diagram  
Internet  
Router  
Multicast  
Switch  
Figure 24-4 IGMP Snooping configuration networking  
III. Configuration procedure  
Suppose you need to enable IGMP Snooping on VLAN1. The procedures are as  
follows:  
Display the current state of IGMP Snooping.  
<SW8800> display igmp-snooping configuration  
If IGMP Snooping is not enabled, enable it in system view.  
[SW8800] igmp-snooping enable  
Display the status of the VLAN1 interface, to check if PIM or IGMP is enabled on it.  
[SW8800] display current-configuration interface Vlan-interface 1  
If PIM or IGMP is not running on VLAN1, you can enable IGMP Snooping in VLAN view.  
[SW8800-vlan1] igmp-snooping enable  
24.5 Troubleshoot IGMP Snooping  
Fault: Multicast function cannot be implemented on the switch.  
Troubleshooting:  
1) IGMP Snooping is disabled.  
z
Input the display current-configuration command to display the status of IGMP  
Snooping.  
24-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 24 IGMP Snooping Configuration  
z
If IGMP Snooping is not enabled, input the igmp-snooping enable command in  
system view to enable IGMP Snooping. Then, use the same command in VLAN  
view to enable IGMP Snooping in the corresponding VLAN.  
2) Multicast forwarding table set up by IGMP Snooping is wrong.  
z
z
z
Input the display igmp-snooping group command to display if the multicast  
group is the expected one.  
If the multicast group created by IGMP Snooping is not correct, turn to  
professional maintenance personnel for help.  
Continue with diagnosis 3 if the second step is completed.  
3) Multicast forwarding table set up on the bottom layer is wrong.  
z
In any view, execute the display mac-address vlan command to check whether  
the MAC multicast forwarding table established in the VLAN identified by vlanid is  
consistent with that established by IGMP Snooping.  
z
If they are not consistent, please contact the maintenance personnel for help.  
24-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 25 Multicast VLAN Configuration  
Chapter 25 Multicast VLAN Configuration  
25.1 Multicast VLAN Overview  
Based on the current multicast on demand, when users in different VLANs request the  
service, multicast flow is duplicated in each VLAN and a great deal of bandwidth is  
wasted. To solve this problem, we provide the multicast VLAN feature. With this feature,  
you can add switch ports to a multicast VLAN and enable IGMP Snooping to allow  
users in different VLANs to share the same multicast VLAN. In this way, multicast flow  
is transmitted in one multicast VLAN instead of multiple user VLANs and bandwidth is  
greatly saved. Multicast VLAN is isolated from user VLANs, this guarantees both  
security and enough bandwidth. After you configure the multicast VLAN, multicast  
information flow can be transmitted to users continuously.  
25.2 Multicast VLAN Configuration  
Multicast VLAN is based on layer 2 multicast. The following table describes the  
multicast VLAN configuration tasks:  
Table 25-1 Configure multicast VLAN for a layer 2 switch  
Item  
Command  
system-view  
Description  
Enter system view  
Enable  
IGMP  
Snooping in system igmp-snooping enable  
Required  
view  
Enter VLAN view  
vlan x  
x: Vlan ID.  
IGMP Snooping is  
enabled on the VLAN  
igmp-snooping enable  
Required  
Required  
Enable  
Snooping in VLAN  
view  
IGMP  
Enable  
VLAN  
multicast  
service-type multicast  
quit  
Quit VLAN view  
Enter the view of the  
interface_type  
interface_num: port type  
and number.  
Ethernet  
port interface  
interface_type  
connected to the interface_num  
user  
Define the port type  
to hybrid  
port link-type hybrid  
Required  
25-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 25 Multicast VLAN Configuration  
Item  
Command  
Description  
Add  
corresponding  
VLANs  
ports  
to  
port hybrid vlan vlan_id_list  
untagged  
Required  
To cancel the configurations, use the corresponding undo commands.  
Note:  
z
z
A port can only belong to one multicast VLAN.  
The type of the ports connected to user terminals must be hybrid untagged.  
25.3 Multicast VLAN Configuration Example  
I. Network requirements  
The following table describes the devices required in this example:  
Table 25-2 Device number and description  
Device  
Description  
Requirement  
The IP address of VLAN 2 interface is 168.10.1.1.  
The port E1/1/1 belongs to VLAN 2 and is connected  
to the Workstation.  
The IP address of VLAN 10 interface is 168.20.1.1.  
The port E1/1/10 belongs to VLAN 10 and is  
connected to Switch B.  
Switch A  
Layer 3 switch  
Configure layer 3 multicast PIM DM and IGMP on  
VLAN 10  
VLAN 2 contains the port E1/1/1 and VLAN 3  
contains the port E1/1/2. The ports E1/1/1 and  
E1/1/2 are connected to PC1 and PC2 respectively.  
Switch B  
Layer 2 switch  
The port E1/1/10 is connected to Switch A.  
PC1 is connected to the port E1/1/1 of Switch B.  
PC2 is connected to the port E1/1/2 of Switch B.  
PC 1  
PC 2  
User 1  
User 2  
Configure multicast VLAN to make users in VLAN 2 and VLAN 3 receive multicast flow  
through VLAN10.  
25-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 25 Multicast VLAN Configuration  
II. Network diagram  
Sw itc h A  
Workstation  
Sw itc h B  
PC 1  
PC 2  
Figure 25-1 Network diagram for multicast VLAN configuration  
III. Configuration procedure  
Before performing the following configurations, you should configure the IP addresses  
and connect the devices correctly.  
1) Configure Switch A  
Configure the IP address of the VLAN 2 interface to 168.10.1.1. Enable the PIM DM  
protocol.  
<Switch A> system-view  
[Switch A] multicast routing-enable  
[Switch A] vlan 2  
[Switch A-vlan2] interface vlan-interface 2  
[Switch A-Vlan-interface2] ip address 168.10.1.1 255.255.255.0  
[Switch A-Vlan-interface2] pim dm  
[Switch A-Vlan-interface2] quit  
Configure the IP address of the VLAN 10 interface to 168.20.1.1. Enable the PIM DM  
and IGMP protocols.  
[Switch A] vlan 10  
[Switch A-vlan10] interface vlan-interface 10  
[Switch A-Vlan-interface10] ip address 168.20.1.1 255.255.255.0  
[Switch A-Vlan-interface10] pim dm  
[Switch A-Vlan-interface10]igmp enable  
[Switch A-Vlan-interface10] quit  
[Switch A]interface e1/1/10  
[Switch A-Ethernet1/1/10]port link-type trunk  
[Switch A-Ethernet1/1/10]port trunk permit vlan 10  
25-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 25 Multicast VLAN Configuration  
2) Configure Switch B  
Enable IGMP Snooping.  
<Switch B> system-view  
[Switch B] igmp-snooping enable  
Enable IGMP-Snooping on VLAN 2 and VLAN 3.  
[Switch B] vlan 2  
[Switch B-vlan 2] igmp-snooping enable  
[Switch B-vlan 2]quit  
[Switch B] vlan 3  
[Switch B-vlan 3] igmp-snooping enable  
Configure VLAN 10 as multicast VLAN. Enable IGMP Snooping.  
[Switch B] vlan 10  
[Switch B-vlan10] igmp-snooping enable  
[Switch B-vlan10] service-type multicast  
[Switch B-vlan10] quit  
Define Ethernet 1/1/10 as trunk port. Add the port to VLAN 10.  
[Switch B] interface Ethernet 1/1/10  
[Switch B-Ethernet 1/1/10] port link-type trunk  
[Switch B-Ethernet 1/1/10] port trunk vlan 10  
[Switch B-Ethernet 1/1/10] quit  
Define Ethernet 1/1/1 as hybrid port. Add the port to VLAN 2 and VLAN 10. Make the  
port carry no VLAN label when it transmits packets of VLAN 2 and VLAN 10. Set the  
default VLAN ID of the port to VLAN 2.  
[Switch B] interface Ethernet 1/1/1  
[Switch B-Ethernet 1/1/1] port link-type hybrid  
[Switch B-Ethernet 1/1/1] port hybrid vlan 2 10 untagged  
[Switch B-Ethernet 1/1/1] port hybrid pvid vlan 2  
[Switch B-Ethernet 1/1/1] quit  
Define Ethernet 1/1/2 as hybrid port. Add the port to VLAN 3 and VLAN 10. Make the  
port carry no VLAN label when it transmits packets of VLAN 3 and VLAN 10. Set the  
default VLAN ID of the port to VLAN 3.  
[Switch B] interface Ethernet 1/1/1  
[Switch B-Ethernet 1/1/2] port link-type hybrid  
[Switch B-Ethernet 1/1/2] port hybrid vlan 3 10 untagged  
[Switch B-Ethernet 1/1/2] port hybrid pvid vlan 3  
[Switch B-Ethernet 1/1/2] quit  
25-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 26 Common Multicast Configuration  
Chapter 26 Common Multicast Configuration  
26.1 Introduction to Common Multicast Configuration  
The multicast common configuration is for both the multicast group management  
protocol and the multicast routing protocol. The configuration includes enabling  
multicast, displaying multicast routing table and multicast forwarding table, etc.  
26.2 Common Multicast Configuration  
Common multicast configuration includes:  
z
z
z
Enabling multicast  
Configuring multicast route limit  
Clearing MFC (Multicast Forwarding Cache) forwarding entries or its statistic  
information  
z
z
Configuring controlled multicast  
Clearing route entries from the kernel multicast routing table  
26.2.1 Enabling Multicast  
Enable multicast first before enabling multicast routing protocol.  
Perform the following configuration in system view.  
Table 26-1 Enabling multicast  
Operation  
Command  
Enable multicast  
Disable multicast  
multicast routing-enable  
undo multicast routing-enable  
By default, multicast is disabled.  
Caution:  
Only when multicast is enabled can other multicast configuration become effective.  
26-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 26 Common Multicast Configuration  
26.2.2 Configuring multicast route number limit  
Because too many multicast routes may exhaust the router memory, you need to limit  
the number of multicast routes.  
Perform the following configuration in system view.  
Table 26-2 Configuring multicast route limit  
Operation  
Command  
Configure multicast route limit  
multicast route-limit limit  
Restore multicast route limit to the  
default value  
undo multicast route-limit  
By default, the maximum multicast routes allowed by the system is 512.  
26.2.3 Clearing MFC Forwarding Entries or Its Statistic Information  
You can clear MFC forward entries or statistic information of FMC forward entries via  
the following command.  
Perform the following configuration in user view.  
Table 26-3 Clearing MFC forwarding entries or its statistic information  
Operation  
Command  
reset multicast forwarding-table [ statistics ] { all |  
{
group-address  
group-mask-length } ] | source-address [ mask  
source-mask source-mask-length |  
[
mask  
{
group-mask  
|
Clear MFC forwarding  
entries or its statistic  
information  
{
|
}
]
incoming-interface { null NULL-interface-number |  
interface-type interface-number } } * }  
26.2.4 Clearing Route Entries from the Kernel Multicast Routing Table  
You can clear route entries from the kernel multicast routing table, as well as MFC  
forwarding entries via the following command.  
Perform the following configuration in user view.  
Table 26-4 Clearing routing entries of multicast routing table  
Operation  
Command  
reset multicast routing-table { all | { group-address [ mask  
{ group-mask | group-mask-length } ] | source-address  
Clear routing  
entries of multicast  
routing table  
[ mask { source-mask |  
source-mask-length } ] |  
{ incoming-interface vlan-interface interface-number } } * }  
26-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 26 Common Multicast Configuration  
26.3 Controlled Multicast Configuration  
26.3.1 Controlled Multicast Overview  
The controlled multicast feature controls user’s authority to join multicast groups. This  
feature is based on ports: users must first pass the 802.1x authentication set for their  
ports. Then they are allowed to join the multicast groups specifically configured for  
them but are prohibited from joining the unauthorized multicast groups. This gives you  
a way to control users' access to specific multicast groups.  
After the distributed multicast is improved, some of the multicast modules operating  
previously in centralized mode are migrated to interface boards now. That is, the  
interface boards perform part of the multicast operations to reduce the burden of the  
main control board and the operation results are synchronized to the main control  
board. To control users' access to specific multicast groups in distributed mode, some  
of the controlled multicast modules operating previously in centralized mode are  
migrated to run in the distributed environment to make the controlled multicast operate  
in distributed mode.  
If no user interfaces is added, the CLI commands under controlled multicast in  
distributed mode are consistent with that in centralized mode.  
Prerequisites of multicast authentication:  
1) DOT1X is enabled both globally and on ports. Otherwise, when you enable  
controlled multicast, all IGMP report messages are legal. Then the system allows  
users to join any group and cannot control the access to multicast groups.  
2) The controlled multicast is based on port. The DOT1X mode on port must be port  
authentication. Otherwise, the system discards all IGMP report messages without  
any processing.  
26.3.2 Configuring Controlled Multicast  
Controlled multicast configuration tasks include:  
z
z
z
z
Enabling controlled multicast globally  
Configuring multicast address for specific user access  
Displaying the status of online controlled multicast members  
Displaying the debug information about controlled multicast  
Perform the following configuration in local user view.  
Table 26-5 Configure the controlled multicast  
Operation  
Command  
Configure the controlled multicast  
Remove the configuration  
multicast ip-address  
undo multicast { ip-address | all }  
26-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 26 Common Multicast Configuration  
Caution:  
In local user view, before executing this command, you must configure user service  
type to LAN-ACCESS, which is the only one supported by controlled multicast at  
present.  
26.3.3 Controlled Multicast Configuration Example  
I. Network reuirements  
As shown in Figure 26-1, HostA and HostB join the multicast group. Layer 3 multicast is  
enabled on LSA, LSB, LSC and LSD. Controlled multicast is enabled on LSA and LSC.  
Because controlled multicast combines multicast with 802.1x, 802.1x should be  
enabled on LSA and LSC.  
II. Network diagram  
Host A  
Host
VL AN11 VL AN12  
LSA  
VL AN12 VL AN10  
LSC  
VL AN10  
VL AN10  
VL AN11  
VL AN11  
LSB  
VL AN12  
LSD  
Figure 26-1 Network diagram for controlled multicast  
III. Configuration procedure  
Controlled multicast is combined with 802.1x, so you need to perform the following  
configuration beside multicast configuration:  
Enable controlled multicast globally.  
[SW8800] ip managed-multicast  
Enable 802.1x globally.  
[SW8800] dot1x  
Enable 802.1x on the controlled ports (the access ports for LSA and LSC).  
26-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 26 Common Multicast Configuration  
[SW8800-GigabitEthernet2/1/1] dot1x  
[SW8800-GigabitEthernet2/1/2] dot1x  
Configure the authentication mode on the controlled ports to port-based mode.  
[SW8800-GigabitEthernet2/1/1] dot1x –method portbased  
[SW8800-GigabitEthernet2/1/2] dot1x –method portbased  
Create a local-user in system view. Then set the password and service type for the  
user.  
[SW8800] local-user liu  
[SW8800-luser-liu] password simple aaa  
[SW8800-luser-liu] service-type lan-access  
In user view, configure the allowed multicast group for the user to join.  
[SW8800-luser-liu] multicast 227.1.1.1  
26.4 Displaying and Debugging Common Multicast  
Configuration  
After the above configuration, execute display command in any view to display the  
running of the multicast configuration, and to verify the effect of the configuration.  
Execute debugging command in user view for the debugging of multicast.  
Table 26-6 Displaying and Debugging Common Multicast Configuration  
Operation  
Command  
multicast  
display  
routing-table  
mask |  
[
group-address  
[
mask  
{
mask-length } ] | source-address [ mask  
{ mask | mask-length } ] | incoming-interface  
Display the multicast routing table  
{
vlan-interface vlan-interface-number  
|
register } ]*  
display  
multicast  
forwarding-table  
[
group-address  
[
mask  
{
mask  
|
Display the multicast forwarding mask-length } ] | source-address [ mask  
table  
{ mask | mask-length } ] | incoming-interface  
{ interface-type interface-number | null  
NULL-interface- number | register } ]*  
Enable multicast packet forwarding  
debugging  
debugging multicast forwarding  
Disable multicast packet forwarding  
debugging  
undo debugging multicast forwarding  
debugging multicast status-forwarding  
Enable multicast forwarding status  
debugging  
Disable multicast forwarding status undo  
debugging  
multicast  
debugging  
status-forwarding  
26-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 26 Common Multicast Configuration  
Operation  
Command  
Enable multicast kernel routing  
debugging  
debugging multicast kernel-routing  
Disable multicast kernel routing  
debugging  
undo debugging multicast kernel-routing  
The multicast routing tables can be layered as follows:  
z
z
Each multicast routing protocol has a multicast routing table of itself.  
All the multicast routing tables can be summarized into the multicast kernel routing  
tables.  
z
The multicast kernel routing tables should keep consistent with the multicast  
forwarding tables which actually control the forwarding of the multicast data  
packets.  
The multicast forwarding tables are mainly used for debugging. Usually, users can view  
the multicast kernel routing tables to get the required information.  
26-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
Chapter 27 IGMP Configuration  
27.1 IGMP Overview  
27.1.1 Introduction to IGMP  
Internet Group Management Protocol (IGMP) is a protocol in the TCP/IP suite  
responsible for management of IP multicast members. It is used to establish and  
maintain multicast membership among IP hosts and their directly connected  
neighboring routers. IGMP excludes transmitting and maintenance of membership  
information among multicast routers, which are completed by multicast routing  
protocols. All hosts participating in multicast must implement IGMP.  
Hosts participating in IP multicast can join and leave a multicast group at any time. The  
number of members of a multicast group can be any integer and the location of them  
can be anywhere. Amulticast router does not need and cannot keep the membership of  
all hosts. It only uses IGMP to learn whether receivers (i.e., group members) of a  
multicast group are present on the subnet connected to each interface. A host only  
needs to keep which multicast groups it has joined.  
IGMP is not symmetric on hosts and routers. Hosts need to respond to IGMP query  
messages from the multicast router, i.e., report the group membership to the router.  
The router needs to send membership query messages periodically to discover  
whether hosts join the specified group on its subnets according to the received  
response messages. When the router receives the report that hosts leave the group,  
the router will send a group-specific query packet (IGMP Version 2) to discover whether  
no member exists in the group.  
Up to now, IGMP has three versions, namely, IGMP Version 1 (defined by RFC1112),  
IGMP Version 2 (defined by RFC2236) and IGMP Version 3. At present, IGMP Version  
2 is the most widely used version.  
IGMP Version 2 boasts the following improvements over IGMP Version 1:  
I. Election mechanism of multicast routers on the shared network segment  
Ashared network segment means that there are multiple multicast routers on a network  
segment. In this case, all routers running IGMP on the network segment can receive  
the membership report from hosts. Therefore, only one router is necessary to send  
membership query messages. In this case, the router election mechanism is required  
to specify a router as the querier.  
In IGMP Version 1, selection of the querier is determined by the multicast routing  
protocol. While IGMP Version 2 specifies that the multicast router with the lowest IP  
27-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
address is elected as the querier when there are multiple multicast routers on the same  
network segment.  
II. Leaving group mechanism  
In IGMP Version 1, hosts leave the multicast group quietly without informing the  
multicast router. In this case, the multicast router can only depend on the timeout of the  
response time of the multicast group to confirm that hosts leave the group. In Version 2,  
when a host is intended to leave, it will send a leave group message if it is the host who  
responds to the latest membership query message.  
III. Specific group query  
In IGMP Version 1, a query of a multicast router is targeted at all the multicast groups  
on the network segment, which is known as General Query.  
In IGMP Version 2, Group-Specific Query is added besides general query. The  
destination IP address of the query packet is the IP address of the multicast group. The  
group address domain in the packet is also the IP address of the multicast group. This  
prevents the hosts of members of other multicast groups from sending response  
messages.  
IV. Max response time  
The Max Response Time is added in IGMP Version 2. It is used to dynamically adjust  
the allowed maximum time for a host to respond to the group query message.  
27.2 IGMP Configuration  
After the multicast function is enabled, you must enable IGMP on the interface first and  
then perform other IGMP configurations.  
1) IGMP basic configuration includes:  
z
Enabling multicast  
z
Enabling IGMP on an interface  
2) IGMP advanced configuration includes:  
z
z
z
z
z
z
z
z
z
z
Configuring a router to join specified multicast group  
Controlling the access to IP multicast groups  
Configuring the IGMP query message interval  
Configuring the IGMP version  
Configuring the IGMP querier present timer  
Configuring the maximum query response time  
Configuring the times of sending IGMP Group-Specific Query packet  
Configuring the interval of sending IGMP Group-Specific Query packet  
Configuring the limit of IGMP groups on an interface  
Deleting IGMP Groups Joined on an Interface  
27-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
27.2.1 Enabling Multicast  
Only if the multicast function is enabled can the multicast-related configurations take  
effect.  
27.2.2 Enabling IGMP on an Interface  
This configuration task is to enable IGMP on the interface which needs to maintain the  
multicast membership. After this, you can initiate IGMP feature configuration.  
Perform the following configuration in VLAN interface view.  
Table 27-1 Enabling/Disabling IGMP on an interface  
Operation  
Command  
Enable IGMP on an interface  
Disable IGMP on an interface  
igmp enable  
undo igmp enable  
By default, IGMP is not enabled.  
27.2.3 Configuring the IGMP Version  
Perform the following configuration in VLAN interface view.  
Table 27-2 Configuring the IGMP version  
Operation  
Command  
Select the IGMP version that the router uses  
Restore the default setting  
igmp version { 2 | 1 }  
undo igmp version  
By default, IGMP Version 2 is used.  
Caution:  
All routers on a subnet must support the same version of IGMP. After detecting the  
presence of IGMP Version 1 system, a router cannot automatically switch to Version 1.  
27-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
27.2.4 Configuring the Interval to Send IGMP Query Message  
Multicast routers send IGMP query messages to discover which multicast groups are  
present on attached networks. Multicast routers send query messages periodically to  
refresh their knowledge of members present on their networks.  
Perform the following configuration in VLAN interface view.  
Table 27-3 Configuring the interval to send IGMP query message  
Operation  
Command  
Configure the interval to send IGMP query  
message  
igmp timer query seconds  
undo igmp timer query  
Restore the default value  
When there are multiple multicast routers on a network segment, the querier is  
responsible for sending IGMP query messages to all hosts on the LAN.  
By default, the interval is 60 seconds.  
27.2.5 Configuring the Interval and the Number of Querying IGMP Packets  
On the shared network, it is the query router (querier) that maintains IGMP membership  
on the interface. The following commands are used to configure the interval and times  
of sending IGMP group-specific query packets for the querier when it receives an IGMP  
leave message from a host.  
z
z
The host sends the IGMP Leave message.  
Upon receiving the message, IGMP querier sends the group-specific IGMP query  
message for specified times (defined by the robust-value in igmp robust-count,  
with the default value as 2) and at a time interval (defined by the seconds in igmp  
lastmember-queryinterval, with the default value as 1 second).  
When other hosts reciver the message from the IGMP querier and are interested  
in this group, they return the IGMP Memberhsip Report message within the  
defined maximum response time.  
z
z
z
If IGMP querier receives the report messges from other hosts within the period  
equal to robust-value × seconds, it continues memberhship maintenance for this  
group.  
If it receives no report message from any other host within this peroid, it reckens  
this as timeout and ends mebership maintenance for this group.  
This command can be used only when the querier runs IGMP version 2, since a host  
running IGMP Version 1 does not send IGMP Leave Group message when it leaves a  
group.  
Please perform the following configurations in VLAN interface view.  
27-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
I. Configuring interval for querying IGMP packets  
Table 27-4 Configuring interval for querying IGMP packets  
Operation  
Command  
Configure interval for querying  
IGMP packets  
igmp lastmember-queryinterval seconds  
Restore te default query interval  
undo igmp lastmember-queryinterval  
By default, the interval is 1 second.  
II. Configuring the number of last member querying  
Table 27-5 Configuring the number of last member querying  
Operation  
Command  
Configure number of last member querying  
Restore the default number of querying  
igmp robust-count robust-value  
undo igmp robust-count  
By default, an IGMP group-specific query message is sent for twice.  
27.2.6 Configuring the Present Time of IGMP Querier  
The IGMP querier present timer defines the period of time before the router takes over  
as the querier sending query messages, after the previous querier has stopped doing  
so.  
Perform the following configuration in VLAN interface view.  
Table 27-6 Configuring the present time of IGMP querier  
Operation  
Command  
timer other-querier-present  
Change the present time of IGMP igmp  
querier  
seconds  
Restore the default value  
undo igmp timer other-querier-present  
By default, the value is 120 seconds. If the router has received no query message  
within twice the interval specified by the igmp timer query command, it will regard the  
previous querier invalid.  
27.2.7 Configuring Maximum Response Time for IGMP Query Message  
When a router receives a query message, the host will set a timer for each multicast  
group it belongs to. The value of the timer is randomly selected between 0 and the  
27-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
maximum response time. When any timer becomes 0, the host will send the  
membership report message of the multicast group.  
Setting the maximum response time reasonably can enable the host to respond to  
query messages quickly. In this case, the router can fast master the existing status of  
the members of the multicast group.  
Perform the following configuration in VLAN interface view.  
Table 27-7 Configuring the maximum response time for IGMP query message  
Operation  
Command  
Configure the maximum response time for IGMP igmp  
max-response-time  
query message  
seconds  
Restore the maximum query response time to the undo  
igmp  
default value  
max-response-time  
The smaller the maximum query response time value, the faster the router prunes  
groups. The actual response time is a random value in the range from 1 to 25 seconds.  
By default, the maximum query response time is 10 seconds.  
27.2.8 Configuring the limit of IGMP groups on an interface  
If there is no limit to the number of IGMP groups added on a router interface or a router,  
the router memory may be exhausted, which may cause router failure.  
You can set number limit for the IGMP groups added on the interface, but not the  
number limit for the IGMP groups added in the router, which is defined by the system.  
Perform the following configuration in VLAN interface view.  
Table 27-8 Configuring the limit of IGMP groups on an interface  
Operation  
Command  
Configure the limit of IGMP groups on an interface  
igmp group-limit limit  
Restore the limit of IGMP groups on an interface to  
the default value  
undo igmp group-limit  
By default, the maximum number of IGMP groups on an interface is 512.  
If the number of IGMP groups on an interface has exceeded the specified value during  
configuration, the existing IGMP groups will not be deleted.  
27.2.9 Configuring a Router to Join Specified Multicast Group  
Usually, the host operating IGMP will respond to IGMP query packet of the multicast  
router. In case of response failure, the multicast router will consider that there is no  
multicast member on this network segment and will cancel the corresponding path.  
27-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
Configuring one interface of the router as multicast member can avoid such problem.  
When the interface receives IGMP query packet, the router will respond, thus ensuring  
that the network segment where the interface located can normally receive multicast  
packets.  
For an Ethernet switch, you can configure a port in a VLAN interface to join a multicast  
group.  
Perform the following configuration in the corresponding view.  
Table 27-9 Configuring a router to join specified multicast group  
Operation  
Command  
Configure the router to join igmp host-join group-address port { interface_type  
a specified multicast group interface_ num interface_name to  
|
}
[
(in VLAN interface view)  
{ interface_type interface_ num | interface_name } ]  
undo igmp host-join group-address port  
Cancel the configuration (in { interface_type interface_ num | interface_name }  
VLAN interface view)  
[
to  
{
interface_type interface_ num  
|
interface_name } ]  
Configure the router to join  
a specified multicast group igmp host-join group-address vlan vlanid  
(in Ethernet port view)  
Cancel the configuration (in  
undo igmp host-join group-address vlan vlanid  
Ethernet port view)  
Note:  
The above two configuration methods have the same result (both takes effect on port).  
You can select any one of them.  
By default, a router joins no multicast group. Note that the specified port must belong to  
this VLAN interface on which IGMP is enabled. Otherwise, the configuration does not  
take effect.  
27.2.10 Limiting Multicast Groups that an Interface Can Access  
A multicast router learns whether there are members of a multicast group on the  
network via the received IGMP membership message. A filter can be set on an  
interface so as to limit the range of allowed multicast groups.  
Perform the following configuration in the corresponding view.  
27-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
Table 27-10 Limiting multicast groups an interface can access  
Operation Command  
Limit the range of allowed igmp group-policy acl-number [ 1 | 2 | port  
multicast groups on current { interface_type interface_ num | interface_name }  
interface (in VLAN interface  
view)  
[
to  
{
interface_type interface_ num  
|
interface_name } ] ]  
undo igmp group-policy [ port { interface_type  
Remove the filter set on the  
interface (in VLAN interface  
view)  
interface_ num  
interface_type  
interface_name } ] ]  
|
interface_name  
interface_  
}
[
to  
|
{
num  
Limit the multicast groups that  
the interface serves (in  
Ethernet port view)  
igmp group-policy acl-number vlan  
vlanid  
Cancel the filter configured on  
the interface (in Ethernet port undo igmp group-policy vlan vlanid  
view)  
Note:  
Using the above two configuration methods to configure ports, you can obtain the same  
result. You can select any one.  
By default, no filter is configured, that is, all multicast groups are allowed on the  
interface.  
The port keyword only takes effect on VLAN interfaces. The port specified by the port  
keyword must belong to this VLAN interface. For the configuration in Ethernet port view,  
the port must belong to the VLAN interface specified by the command. Besides, IGMP  
is enabled on this VLAN interface. Otherwise, this command does not take effect.  
27.2.11 Deleting IGMP Groups Joined on an Interface  
This configuration task is to delete all IGMP groups joined on all interfaces or specific  
interfaces of the router, or to delete the IGMP groups at the specific address or in the  
specific network segment on the specific interfaces of the router.  
Perform the following configuration in user view.  
Table 27-11 Deleting IGMP groups joined on an interface  
Operation  
Command  
Delete IGMP groups reset igmp group { all | interface vlan-interface  
joined on an interface interface-number { all | group-address [ group-mask ] } }  
After a group is deleted, it can be joined on an interface again.  
27-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 27 IGMP Configuration  
27.3 Displaying and Debugging IGMP  
After the above configuration, execute display command in any view to display the  
running of IGMP configuration, and to verify the effect of the configuration.  
Execute debugging command in corresponding views for the debugging of IGMP.  
Table 27-12 Displaying and debugging IGMP  
Operation  
Command  
Display the information about  
members of IGMP multicast groups  
(any views)  
display igmp group [ group-address |  
interface vlan-interface interface-number ]  
Display the IGMP configuration and  
running information about the  
interface (any views)  
display igmp interface [ vlan-interface  
interface-number ]  
Enable the IGMP information debugging igmp { all | event | host | packet  
debugging (user view) | timer }  
Disable the IGMP information undo debugging igmp { all | event | host |  
debugging (user view) packet | timer }  
27-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 28 PIM-DM Configuration  
Chapter 28 PIM-DM Configuration  
28.1 PIM-DM Overview  
28.1.1 Introduction to PIM-DM  
PIM-DM (Protocol Independent Multicast, Dense Mode) belongs to dense mode  
multicast routing protocols. PIM-DM is suitable for small networks. Members of  
multicast groups are relatively dense in such network environments.  
28.1.2 PIM-DM Working Principle  
The working procedures of PIM-DM include neighbor discovery, flood & prune and  
graft.  
I. Neighbor discovery  
The PIM-DM router needs to use Hello messages to perform neighbor discovery when  
it is started. All network nodes running PIM-DM keep in touch with one another with  
Hello messages, which are sent periodically.  
II. Flood&Prune  
PIM-DM assumes that all hosts on the network are ready to receive multicast data.  
When a multicast source "S" begins to send data to a multicast group "G", after the  
router receives the multicast packets, the router will perform RPF check according to  
the unicast routing table first. If the RPF check is passed, the router will create an (S, G)  
entry and then flood the data to all downstream PIM-DM nodes. If the RPF check is not  
passed, that is, multicast packets enter from an error interface, the packets will be  
discarded. After this process, an (S, G) entry will be created in the PIM-DM multicast  
domain.  
If the downstream node has no multicast group members, it will send a Prune message  
to the upstream nodes to inform the upstream node not to forward data to the  
downstream node. Receiving the prune message, the upstream node will remove the  
corresponding interface from the outgoing interface list corresponding to the multicast  
forwarding entry (S, G). In this way, a SPT (Shortest Path Tree) rooted at Source S is  
built. The pruning process is initiated by leaf routers first.  
This process is called “flood & prune” process. In addition, nodes that are pruned  
provide timeout mechanism. Each router re-starts the “flood & prune” process upon  
pruning timeout. The consistent “flood & prune” process of PIM-DM is performed  
periodically.  
28-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 28 PIM-DM Configuration  
During this process, PIM-DM uses the RPF check and the existing unicast routing table  
to build a multicast forwarding tree rooted at the data source. When a packet arrives,  
the router will first judge the correctness of the path. If the interface that the packet  
arrives is the one indicated by the unicast routing to the multicast source, the packet is  
regarded to be from the correct path. Otherwise, the packet will be discarded as a  
redundancy packet without the multicast forwarding. The unicast routing information as  
path judgment can come from any unicast routing protocol independent of any  
specified unicast routing protocol such as the routing information learned by RIP and  
OSPF  
III. Assert mechanism  
As shown in the following figure, both routers A and B on the LAN have their own  
receiving paths to multicast source S. In this case, when they receive a multicast packet  
sent from multicast source S, they will both forward the packet to the LAN. Multicast  
Router C at the downstream node will receive two copies of the same multicast packet.  
Multicast packets forwarded by the  
upstream node  
Router A  
Router B  
Receiver  
Router C  
Figure 28-1 Assert mechanism diagram  
When they detect such a case, routers need to select a unique sender by using the  
assert mechanism. Routers will send Assert packets to select the best path. If two or  
more than two paths have the same priority and metric, the path with a higher IP  
address will be the upstream neighbor of the (S, G) entry, which is responsible for  
forwarding the (S, G) multicast packet.  
Note:  
Currently assert mechanism is not available on the Switch 8800.  
28-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 28 PIM-DM Configuration  
IV. Graft  
When the pruned downstream node needs to be restored to the forwarding state, the  
node will send a graft packet to inform the upstream node.  
28.2 PIM-DM Configuration  
1) PIM-DM basic configuration includes:  
z
Enabling multicast  
Enabling PIM-DM  
z
2) PIM-DM advanced configuration includes:  
z
z
z
z
z
z
Configuring the time interval for ports to send Hello packets  
Entering the PIM view  
Configuring filtering of multicast source/group  
Configuring filtering of PIM neighbor  
Configuring the maximum number of PIM neighbor on an interface  
Clearing PIM neighbors  
28.2.1 Enabling Multicast  
28.2.2 Enabling PIM-DM  
PIM-DM needs to be enabled in configuration of all interfaces.  
After PIM-DM is enabled on an interface, it will send PIM Hello messages periodically  
and process protocol packets sent by PIM neighbors.  
Perform the following configuration in VLAN interface view.  
Table 28-1 Enabling PIM-DM  
Operation  
Command  
Enable PIM-DM on an interface  
Disable PIM-DM on an interface  
pim dm  
undo pim dm  
It’s recommended to configure PIM-DM on all interfaces in non-special cases. This  
configuration is effective only after the multicast routing is enabled in system view.  
Once enabled PIM-DM on an interface, PIM-SM cannot be enabled on the same  
interface and vice versa.  
28-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 28 PIM-DM Configuration  
28.2.3 Configuring the Time Intervals for Ports to Send Hello Packets  
When protocol independent multicast (PIM) protocol is enabled for a port, the port  
sends Hello packets periodically. The time intervals to send Hello packets vary with the  
bandwidth and type of the connected networks.  
Perform the following configuration in VLAN interface view.  
Table 28-2 Configure the time intervals for ports to send Hello packets  
Operation  
Command  
pim timer hello seconds  
undo pim timer hello  
Configure the time intervals for ports to send  
Hello packets  
Restore the default values of the time intervals  
You can configure different time intervals according to the actual networks. By default,  
the time interval for sending Hello packets is 30 seconds. In general, you need not  
modify the parameter seconds.  
Note:  
When you configure the time interval for a port to send Hello packets, the pim neighbor  
hold-time value automatically turns into 3.5 times the time interval value. Therefore you  
need not configure a value for pim neighbor hold-time.  
The time interval can be configured only after the PIM protocol such as protocol  
independent multicast-dense mode (PIM-DM) protocol or protocol independent  
multicast-sparse mode (PIM-SM) protocol is enabled in VLAN interface view.  
28.2.4 Entering the PIM View  
Global parameters of PIM should be configured in PIM view.  
Perform the following configuration in system view.  
Table 28-3 Entering PIM view  
Operation  
Enter PIM view  
Back to system view  
Command  
pim  
undo pim  
Using undo pim command, you can clear the configuration in PIM view, and back to  
system view.  
28-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 28 PIM-DM Configuration  
28.2.5 Configuring the Filtering of Multicast Source/Group  
You can set to filter the source (and group) address of multicast data packets via this  
command. When this feature is configured, the router filters not only multicast data, but  
the multicast data encapsulated in the registration packets.  
Perform the following configuration in the PIM view.  
Table 28-4 Configuring the filtering of multicast source/group  
Operation  
Command  
source-policy acl-number  
undo source-policy  
Configure the filtering of multicast source/group  
Remove the configuration of filtering  
If resource address filtering is configured, as well as basic ACLs, then the router filters  
the resource addresses of all multicast data packets received. Those not matched will  
be discarded.  
If resource address filtering is configured, as well as advanced ACLs, then the router  
filters the resource and group addresses of all multicast data packets received. Those  
not matched will be discarded.  
28.2.6 Configuring the Filtering of PIM Neighbor  
You can configure basic ACLs to filter the routers which can be PIM neighbors of the  
current interface.  
Perform the following configuration in the VLAN interface view.  
Table 28-5 Configuring the filtering of PIM neighbor  
Operation  
Command  
Configure filtering of PIM neighbor  
Remove the configuration of filtering  
pim neighbor-policy acl-number  
undo pim neighbor-policy  
28.2.7 Configuring the Maximum Number of PIM Neighbor on an Interface  
The maximum number of PIM neighbors of a router interface can be configured to  
avoid exhausting the memory of the router or router faults. The maximum number of  
PIM neighbors of a router is defined by the system, and is not open for modification.  
Perform the following configuration in the VLAN interface view.  
28-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 28 PIM-DM Configuration  
Table 28-6 Configuring the maximum number of PIM neighbor on an interface  
Operation  
Command  
Configure the maximum number of PIM neighbor on an pim  
neighbor-limit  
interface  
limit  
Restore the limit of PIN neighbor to the default value  
pim neighbor-limit  
By default, the PIM neighbors on the interface are limited to 128.  
If the number of PIM neighbors of an interface has exceeded the configured value by  
the time of configuration, the existing PIM neighbors will not be deleted.  
28.2.8 Clearing multicast route entries from PIM routing table  
Perform the following configuration in user view.  
Table 28-7 Clearing multicast route entries from PIM routing table  
Operation  
Command  
reset pim routing-table { all | { group-address [ mask  
{ group-mask | group-mask-length } ] | source-address [ mask  
{ source-mask | source-mask-length } ] | { incoming-interface  
{ interface-type interface-number | null } } } * }  
Clear multicast  
route entries from  
PIM routing table  
28.2.9 Clearing PIM Neighbors  
Perform the following configuration in user view.  
Table 28-8 Resetting PIM neighbor  
Operation  
Command  
Clear  
neighbors  
PIM reset pim neighbor { all | { neighbor-address | interface  
interface-type interface-number } * }  
28.3 Displaying and Debugging PIM-DM  
After the above configuration, execute display command in any view to display the  
running of PIM-DM configuration, and to verify the effect of the configuration.  
Execute debugging command in user view for the debugging of PIM-DM.  
28-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 28 PIM-DM Configuration  
Table 28-9 Displaying and debugging PIM-DM  
Operation  
Command  
display pim routing-table [ { { *g  
[ group-address [ mask { mask-length |  
mask } ] ] | **rp [ rp-address [ mask  
{
mask-length | mask }  
]
]
} |  
{ group-address [ mask { mask-length |  
mask } ] | source-address [ mask  
{ mask-length | mask } ] } * } |  
incoming-interface { Vlan-interface  
Display the PIM multicast routing table  
Vlan-interface-number  
|
null  
}
|
{ dense-mode | sparse-mode } ] *  
display pim interface [ Vlan-interface  
Vlan-interface-number ]  
Display the PIM interface information  
Display the information about PIM display pim neighbor [ interface  
neighboring routers  
Vlan-interface Vlan-interface-number ]  
Display BSR information  
Display RP information  
display pim bsr-info  
display pim rp-info [ group-address ]  
debugging pim common { all | event |  
packet | timer }  
Enable the PIM debugging  
Disable the PIM debugging  
undo debugging pim common { all |  
event | packet | timer }  
debugging pim dm { alert | all | mbr |  
mrt | timer | warning | { recv | send }  
{ all | assert | graft | graft-ack | join |  
prune } }  
Enable the PIM-DM debugging  
Disable the PIM-DM debugging  
undo debugging pim dm { alert | all |  
mbr | mrt | timer | warning | { recv |  
send } { all | assert | graft | graft-ack |  
join | prune } }  
28.4 PIM-DM Configuration Example  
I. Networking requirements  
Lanswitch1 is connected to the multicast source through VLAN-interface 10, connected  
to Lanswitch2 through VLAN-interface 11 and connected to Lanswitch3 through  
VLAN-interface 12. Through running PIM-DM, you can implement multicast among  
RECEIVER 1, RECEIVER 12 and Multicast Source.  
II. Networking diagram  
28-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 28 PIM-DM Configuration  
VL AN20  
VL AN10  
VL AN11  
VL AN12  
RECEIVER  
1
Lanswitch2  
VL AN30  
Multicast  
Lanswitch1  
Source  
Lanswitch3  
RECEIVER  
2
Figure 28-2 PIM-DM configuration networking  
III. Configuration procedure  
This section only introduces Lanswitch1 configuration procedure, while Lanswitch2 and  
Lanswitch3 configuration procedures are similar.  
Enable the multicast routing protocol.  
[SW8800] multicast routing-enable  
Enable IGMP and PIM-DM on the interface.  
[SW8800] vlan 10  
[SW8800-vlan10] port ethernet 2/1/2  
[SW8800-vlan10] quit  
[SW8800] vlan 11  
[SW8800-vlan11] port ethernet 2/1/4  
[SW8800-vlan11] quit  
[SW8800] vlan 12  
[SW8800-vlan12] port ethernet 2/1/6  
[SW8800-vlan12] quit  
[SW8800] interface vlan-interface 10  
[SW8800-vlan-interface10] ip address 1.1.1.1 255.255.0.0  
[SW8800-vlan-interface10] igmp enable  
[SW8800-vlan-interface10] pim dm  
[SW8800-vlan-interface10] quit  
[SW8800] interface vlan-interface 11  
[SW8800-vlan-interface11] ip address 2.2.2.2 255.255.0.0  
[SW8800-vlan-interface11] igmp enable  
[SW8800-vlan-interface11] pim dm  
[SW8800-vlan-interface11] quit  
[SW8800] interface vlan-interface 12  
[SW8800-vlan-interface12] ip address 3.3.3.3 255.255.0.0  
[SW8800-vlan-interface11] igmp enable  
[SW8800-vlan-interface12] pim dm  
28-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
Chapter 29 PIM-SM Configuration  
29.1 PIM-SM Overview  
29.1.1 Introduction to PIM-SM  
PIM-SM (Protocol Independent Multicast, Sparse Mode) belongs to sparse mode  
multicast routing protocols. PIM-SM is mainly applicable to large-scale networks with  
broad scope in which group members are relatively sparse.  
Different from the flood & prune principle of the dense mode, PIM-SM assumes that all  
hosts do not need to receive multicast packets, unless there is an explicit request for  
the packets.  
PIM-SM uses the RP (Rendezvous Point) and the BSR (Bootstrap Router) to advertise  
multicast information to all PIM-SM routers and uses the join/prune information of the  
router to build the RP-rooted shared tree (RPT), thereby reducing the bandwidth  
occupied by data packets and control packets and reducing the process overhead of  
the router. Multicast data flows along the shared tree to the network segments the  
multicast group members are on. When the data traffic is sufficient, the multicast data  
flow can switch over to the SPT (Shortest Path Tree) rooted on the source to reduce  
network delay. PIM-SM does not depend on the specified unicast routing protocol but  
uses the present unicast routing table to perform the RPF check.  
Note that, the creation and interaction of the RPs and BSRs are implemented through  
periodical RP advertisements and BSR Bootstrap packets respectively. You can view  
the packets in the following debugging information:  
<SW8800> debugging pim sm send ?  
assert  
PIM-SM assertion packet sending debugging functions  
bootstrap PIM-SM bootstrap packet sending debugging functions  
crpadv  
jp  
PIM-SM RP candidate advertisement sending debugging functions  
PIM-SM join/prune packet sending debugging functions  
PIM-SM registration packet sending debugging functions  
PIM-SM registration-stop packet sending debugging functions  
reg  
regstop  
To make PIM-SM operate, you must configure candidate RPs and BSRs. BSRs collect  
and broadcast the information from candidate RPs.  
29.1.2 PIM-SM Working Principle  
The PIM-SM working process is as follows: neighbor discovery, building the RP-rooted  
shared tree (RPT), multicast source registration and SPT switchover etc. The neighbor  
discovery mechanism is the same as that of PIM-DM, which will not be described any  
more.  
29-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
I. Build the RP shared tree (RPT)  
When hosts join a multicast group G, the leaf routers that directly connect with the hosts  
send IGMP messages to learn the receivers of multicast group G. In this way, the leaf  
routers calculate the corresponding rendezvous point (RP) for multicast group G and  
then send join messages to the node of the next level toward the rendezvous point (RP).  
Each router along the path between the leaf routers and the RP will generate (*, G)  
entries in the forwarding table, indicating that all packets sent to multicast group G are  
applicable to the entries no matter from which source they are sent. When the RP  
receives the packets sent to multicast group G, the packets will be sent to leaf routers  
along the path built and then reach the hosts. In this way, an RP-rooted tree (RPT) is  
built as shown in the following figure.  
RP  
Multicast Source S  
RPT  
Receiver  
join  
Multicast source registration  
Figure 29-1 RPT schematic diagram  
II. Multicast source registration  
When multicast source S sends a multicast packet to the multicast group G, the  
PIM-SM multicast router directly connected to S will encapsulate the received packet  
into a registration packet and send it to the corresponding RP in unicast form. If there  
are multiple PIM-SM multicast routers on a network segment, the Designated Router  
(DR) will be responsible for sending the multicast packet.  
29.1.3 Preparations before Configuring PIM-SM  
I. Configuring candidate RPs  
In a PIM-SM network, multiple RPs (candidate-RPs) can be configured. Each  
Candidate-RP (C-RP) is responsible for forwarding multicast packets with the  
destination addresses in a certain range. Configuring multiple C-RPs is to implement  
load balancing of the RP. These C-RPs are equal. All multicast routers calculate the  
RPs corresponding to multicast groups according to the same algorithm after receiving  
the C-RP messages that the BSR advertises.  
29-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
It should be noted that one RP can serve multiple multicast groups or all multicast  
groups. Each multicast group can only be uniquely correspondent to one RP at a time  
rather than multiple RPs.  
II. Configuring BSRs  
The BSR is the management core in a PIM-SM network. Candidate-RPs send  
announcement to the BSR, which is responsible for collecting and advertising the  
information about all candidate-RPs.  
It should be noted that there can be only one BSR in a network but you can configure  
multiple candidate-BSRs. In this case, once a BSR fails, you can switch over to another  
BSR. A BSR is elected among the C-BSRs automatically. The C-BSR with the highest  
priority is elected as the BSR. If the priority is the same, the C-BSR with the largest IP  
address is elected as the BSR.  
III. Configuring static RP  
The router that serves as the RP is the core router of multicast routes. If the dynamic  
RP elected by BSR mechanism is invalid for some reason, the static RP can be  
configured to specify RP. As the backup of dynamic RP, static RP improves network  
robusticity and enhances the operation and management capability of multicast  
network.  
29.2 PIM-SM Configuration  
1) PIM-SM basic configuration includes:  
z
z
z
z
z
z
Enabling Multicast  
Enabling PIM-SM  
Entering the PIM view  
Configuring candidate-BSRs  
Configuring candidate-RPs  
Configuring static RP  
2) PIM-SM advanced configuration includes:  
z
z
z
z
z
z
z
z
z
z
Configuring the PIM-SM domain boundary  
Configuring the sending interval for the Hello packets of the interface  
Configuring the filtering of multicast source/group  
Configuring the filtering of PIM neighbor  
Configuring the maximum number of PIM neighbor on an interface  
Configuring RP to filter the register messages  
Limiting the range of legal BSR  
Limiting the range of legal C-RP  
Clearing multicast route entries from PIM routing table  
Clearing PIM neighbor  
29-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
It should be noted that at least one router in an entire PIM-SM domain should be  
configured with Candidate-RPs and Candidate-BSRs.  
29.2.1 Enabling Multicast  
29.2.2 Enabling PIM-SM  
This configuration can be effective only after multicast is enabled.  
Perform the following configuration in VLAN interface view.  
Table 29-1 Enabling PIM-SM  
Operation  
Command  
Enable PIM-SM on an interface  
Disable PIM-SM on an interface  
pim sm  
undo pim sm  
Repeat this configuration to enable PIM-SM on other interfaces. Only one multicast  
routing protocol can be enabled on an interface at a time.  
Once enabled PIM-SM on an interface, PIM-DM cannot be enabled on the same  
interface and vice versa.  
29.2.3 Entering the PIM View  
29.2.4 Configuring the Time Intervals for Ports to Send Hello Packets  
In general, PIM-SM broadcasts Hello packets on the PIM-SM-enabled port periodically  
to detect PIM neighbors and determine the designated router (DR).  
29.2.5 Configuring Candidate-BSRs  
In a PIM domain, one or more candidate BSRs should be configured. A BSR (Bootstrap  
Router) is elected among candidate BSRs. The BSR takes charge of collecting and  
advertising RP information.  
The automatic election among candidate BSRs is described as follows:  
One interface which has started PIM-SM must be specified when configuring the router  
as the candidate BSR.  
29-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
At first, each candidate BSR considers itself as the BSR of the PIM-SM domain, and  
sends Bootstrap message by taking the IP address of the interface as the BSR  
address.  
When receiving Bootstrap messages from other routers, the candidate BSR will  
compare the BSR address of the newly received Bootstrap message with that of itself.  
Comparison standards include priority and IP address. The bigger IP address is  
considered better when the priority is the same. If the priority of the former is higher,  
the candidate BSR will replace its BSR address and stop regarding itself as the BSR.  
Otherwise, the candidate BSR will keep its BSR address and continue to regard itself  
as the BSR.  
Perform the following configuration in PIM view.  
Table 29-2 Configuring candidate-BSRs  
Operation  
Command  
Vlan-interface Vlan-interface-number  
c-bsr  
Configure a candidate-BSR  
hash-mask-len [ priority ]  
Remove the candidate-BSR  
configured  
undo c-bsr  
Candidate-BSRs should be configured on the routers in the network backbone. By  
default, no BSR is set. The default priority is 0.  
Caution:  
One router can only be configured with one candidate-BSR. When a candidate-BSR is  
configured on another interface, it will replace the previous configuration.  
29.2.6 Configuring Candidate-RPs  
In PIM-SM, the shared tree built by multicast routing data is rooted at the RP. There is a  
mapping from a multicast group to an RP. A multicast group can be mapped to only one  
RP. Different multicast groups can be mapped to the same RP or different RPs.  
Perform the following configuration in PIM view.  
Table 29-3 Configuring candidate-RPs  
Operation  
Command  
c-rp interface-type interface-number [ group-policy  
acl-number | priority priority-value ]*  
Configure a candidate-RP  
29-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
Operation  
Command  
undo c-rp { interface-type interface-number | all }  
Remove  
candidate-RP configured  
the  
When configuring RP, if the range of the served multicast group is not specified, the RP  
will serve all multicast groups. Otherwise, the range of the served multicast group is the  
multicast group in the specified range. It is suggested to configure Candidate RP on the  
backbone router.  
29.2.7 Configuring Static RP  
Static RP serves as the backup of dynamic RP, so as to improve network robusticity.  
Perform the following configuration in PIM view.  
Table 29-4 Configuring static RP  
Operation  
Configure static RP  
Remove the configured static RP  
Command  
static-rp rp-address [ acl-number ]  
undo static-rp  
Basic ACL can control the range of multicast group served by static RP.  
If static RP is in use, all routers in the PIM domain must adopt the same configuration. If  
the configured static RP address is the interface address of the local router whose state  
is UP, the router will function as the static RP. It is unnecessary to enable PIM on the  
interface that functions as static RP.  
When the RP elected from BSR mechanism is valid, static RP does not work.  
29.2.8 Configuring the PIM-SM Domain Border  
After the PIM-SM domain border is configured, bootstrap messages can not cross the  
border in any direction. In this way, the PIM-SM domain can be split.  
Perform the following configuration in VLAN interface view.  
Table 29-5 Configuring the PIM-SM domain border  
Operation  
Command  
pim bsr-boundary  
Set the PIM-SM domain border  
Remove the PIM-SM domain border configured  
undo pim bsr-boundary  
29-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
By default, no domain border is set. After this configuration is performed, a bootstrap  
message can not cross the border but other PIM packets can. This configuration can  
effectively divide a network into domains using different BSRs.  
29.2.9 Configuring the filtering of multicast source/group  
29.2.10 Configuring the filtering of PIM neighbor  
29.2.11 Configuring RP to Filter the Register Messages Sent by DR  
In the PIM-SM network, the register message filtering mechanism can control which  
sources to send messages to which groups on the RP, i.e., RP can filter the register  
messages sent by DR to accept specified messages only.  
Perform the following configuration in PIM view.  
Table 29-6 Configuring RP to filter the register messages sent by DR  
Operation  
Command  
register-policy acl-number  
undo register-policy  
Configure RP to filter the register messages  
sent by DR  
Cancel the configured filter of messages  
If an entry of a source group is denied by the ACL, or the ACL does not define operation  
to it, or there is no ACL defined, the RP will send RegisterStop messages to the DR to  
prevent the register process of the multicast data stream.  
Caution:  
Only the register messages matching the ACL permit clause can be accepted by the  
RP. Specifying an undefined ACL will make the RP deny all register messages.  
29.2.12 Limiting the range of legal BSR  
To prevent the legal BSR from being replaced maliciously in the network, you can limit  
the range of legal BSR. Other BSR messages beyond the range are not received by the  
router and thus ensure the BSR security.  
29-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
Perform the following configuration in PIM view.  
Table 29-7 Limiting the range of legal BSR  
Operation  
Set the limit legal BSR range  
Restore to the default setting  
Command  
bsr-policy acl-number  
undo bsr-policy  
For detailed information of bsr-policy, please refer to the command manual.  
29.2.13 Limiting the range of legal C-RP  
To avoid C-RP spoofing, you can limit the range of legal C-RP and limit the groups that  
each C-RP servers.  
Perform the following configuration in PIM view.  
Table 29-8 Limiting the range of legal C-RP  
Operation  
Command  
crp-policy acl-number  
undo crp-policy  
Set the limit legal C-RP range  
Restore to the default setting  
For detailed information of crp-policy, please refer to the command manual.  
29.2.14 Clearing multicast route entries from PIM routing table  
29.2.15 Clearing PIM Neighbors  
29.3 Displaying and Debugging PIM-SM  
After the above configuration, execute display command in any view to display the  
running of PIM-SM configuration, and to verify the effect of the configuration.  
Execute debugging command in user view for the debugging of PIM-SM.  
29-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
Table 29-9 Displaying and debugging PIM-SM  
Operation  
Command  
Display  
information  
the  
BSR  
display pim bsr-info  
Display  
information  
the  
RP  
display pim rp-info [ group-address ]  
debugging pim sm { all | mrt | msdp | verbose |  
Enable the PIM-SM warning | mbr { alert | fresh } | { recv | send } { assert |  
debugging  
bootstrap | crpadv | jp | reg | regstop } | timer { assert |  
bsr | crpadv | jp | jpdelay | mrt | probe | spt }  
undo debugging pim sm { all | mrt | msdp | verbose |  
Disable the PIM-SM warning | mbr { alert | fresh } | { recv | send } { assert |  
debugging  
bootstrap | crpadv | jp | reg | regstop } | timer { assert |  
bsr | crpadv | jp | jpdelay | mrt | probe | spt }  
29.4 PIM-SM Configuration Example  
I. Networking requirements  
In actual network, we assume that the switches can intercommunicate and the IP  
address of each VLAN interface has been configured.  
z
z
z
LS_A is connected to LS_B through VLAN-interface10, connected to HostA  
through VLAN-interface11 and connected to LS_C through VLAN-interface12.  
LS_B is connected to LS_A through VLAN-interface10, connected to LS_C  
through VLAN-interface11 and connected to LS_D through VLAN-interface12.  
LS_C is connected to HostB through VLAN-interface10, connected to LS_B  
through VLAN-interface11 and connected to LS_A through VLAN-interface12.  
Suppose that Host A is the receiver of the multicast group at 225.1.1.1. Host B begins  
transmitting data destined to 225.1.1.1. LS_A receives the multicast data from Host B  
via LS_B.  
29-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
II. Networking diagram  
Host A  
Host B  
VLAN12  
VLAN11  
VLAN12  
VLAN10  
LS_C  
LS_A  
VLAN10  
VLAN11  
VLAN11  
LS_B  
VLAN10  
VLAN12  
LSD  
Figure 29-2 PIM-SM configuration networking  
III. Configuration procedure  
1) Configure LS_A  
Enable PIM-SM.  
[SW8800] multicast routing-enable  
[SW8800] vlan 10  
[SW8800-vlan10] port ethernet 2/1/2 to ethernet 2/1/3  
[SW8800-vlan10] quit  
[SW8800] interface vlan-interface 10  
[SW8800-vlan-interface10] igmp enable  
[SW8800-vlan-interface10] pim sm  
[SW8800-vlan-interface10] quit  
[SW8800] vlan 11  
[SW8800-vlan11] port ethernet 2/1/4 to ethernet 2/1/5  
[SW8800-vlan11] quit  
[SW8800] interface vlan-interface 11  
[SW8800-vlan-interface11] igmp enable  
[SW8800-vlan-interface11] pim sm  
[SW8800-vlan-interface11] quit  
[SW8800] vlan 12  
[SW8800-vlan12] port ethernet 2/1/6 to ethernet 2/1/7  
[SW8800-vlan12] quit  
[SW8800] interface vlan-interface 12  
[SW8800-vlan-interface12] igmp enable  
[SW8800-vlan-interface12] pim sm  
29-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 29 PIM-SM Configuration  
[SW8800-vlan-interface12] quit  
2) Configure LS_B  
Enable PIM-SM.  
[SW8800] multicast routing-enable  
[SW8800] vlan 10  
[SW8800-vlan10] port ethernet 2/1/2 to ethernet 2/1/3  
[SW8800-vlan10] quit  
[SW8800] interface vlan-interface 10  
[SW8800-vlan-interface10] igmp enable  
[SW8800-vlan-interface10] pim sm  
[SW8800-vlan-interface10] quit  
[SW8800] vlan 11  
[SW8800-vlan11] port ethernet 2/1/4 to ethernet 2/1/5  
[SW8800-vlan11] quit  
[SW8800] interface vlan-interface 11  
[SW8800-vlan-interface11] igmp enable  
[SW8800-vlan-interface11] pim sm  
[SW8800-vlan-interface11] quit  
[SW8800] vlan 12  
[SW8800-vlan12] port ethernet 2/1/6 to ethernet 2/1/7  
[SW8800-vlan12] quit  
[SW8800] interface vlan-interface 12  
[SW8800-vlan-interface12] igmp enable  
[SW8800-vlan-interface12] pim sm  
[SW8800-vlan-interface12] quit  
Configure the C-BSR.  
[SW8800] pim  
[SW8800-pim] c-bsr vlan-interface 10 30 2  
Configure the C-RP.  
[SW8800] acl number 2000  
[SW8800-acl-basic-2000] rule permit source 225.0.0.0 0.255.255.255  
[SW8800] pim  
[SW8800-pim] c-rp vlan-interface 10 group-policy 2000  
Configure PIM domain border.  
[SW8800] interface vlan-interface 12  
[SW8800-vlan-interface12] pim bsr-boundary  
After VLAN-interface 12 is configured as domain border, the LS_D will be excluded  
from the local PIM domain and cannot receive the BSR information transmitted from  
LS_B any more.  
3) Configure LS_C.  
29-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Enable PIM-SM.  
Chapter 29 PIM-SM Configuration  
[SW8800] multicast routing-enable  
[SW8800] vlan 10  
[SW8800-vlan10] port ethernet 2/1/2 to ethernet 2/1/3  
[SW8800-vlan10] quit  
[SW8800] interface vlan-interface 10  
[SW8800-vlan-interface10] igmp enable  
[SW8800-vlan-interface10] pim sm  
[SW8800-vlan-interface10] quit  
[SW8800] vlan 11  
[SW8800-vlan11] port ethernet 2/1/4 to ethernet 2/1/5  
[SW8800-vlan11] quit  
[SW8800] interface vlan-interface 11  
[SW8800-vlan-interface11] igmp enable  
[SW8800-vlan-interface11] pim sm  
[SW8800-vlan-interface11] quit  
[SW8800] vlan 12  
[SW8800-vlan12] port ethernet 2/1/6 to ethernet 2/1/7  
[SW8800-vlan12] quit  
[SW8800] interface vlan-interface 12  
[SW8800-vlan-interface12] igmp enable  
[SW8800-vlan-interface12] pim sm  
[SW8800-vlan-interface12] quit  
29-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
Chapter 30 MSDP Configuration  
30.1 MSDP Overview  
30.1.1 Introduction  
Multicast source discovery protocol (MSDP) is used to discover multicast source  
information in other PIM-SM domains. No ISP would like to forward multicast traffic  
depending on the RP of competitors, though it has to obtain information from the source  
and distribute it among its members, regardless of the location of the source RP. MSDP  
is proposed to solve this problem. MSDP describes interconnection mechanism of  
multiple PIM-SM domains. MSDP allows the RPs of different domains to share the  
multicast source informatin, but all these domains must use PIM-SM as their  
intro-domain multicast routing procotocol.  
A RP configured with MSDP peer notifies all of its MSDP peers of the active multicast  
source message in its domain via SA (Source Active) message. In this way, multicast  
source information in a PIM-SM domain is transmitted to another PIM-SM domain.  
MSDP peer relationship can be established between RPs in different domains or in a  
same domain, between a RP and a common router, or between common routers. The  
connection between MSDP peers is TCP connection.  
MSDP makes a PIM-SM domain independent of the RP in another PIM-SM domain.  
After getting multicast source information in that domain, the receiver here can join  
directly to the SPT of the multicast source in that domain.  
Another application of MSDP is Anycast RP. In a domain, configure a certain interface  
(usually Loopback interface) on different routers with a same IP address; designate  
these interfaces as C-RPs; and create MSDP peer relationship among them. After the  
unicast route convergence, the multicast source can select the nearest RP for  
registration, and the receiver can also select the nearest RP to add into its RPT. The  
RPs exchange individual registration source information via MSDP peers. Therefore,  
every RP knows all multicast sources of the entire domain; and every receiver on each  
RP can receive multicast data from all the multicast sources in the entire domain.  
By initiating registration and RPT joining to the nearest RP, MSDP implements RP load  
sharing. Once an RP turns invalid, its original registered source and receivers will  
select another nearest RP, implementing redundant RP backup.  
In addition, MSDP only accepts the SA messages from the correct paths and excludes  
redundant SA messages through RPF check mechanism, and prevents the flooding of  
SA messages among MSDP peers by configuring Mesh Group.  
30-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
30.1.2 Working Principle  
I. Indentifying multicast source and receiving multicast data  
As shown in Figure 30-1, the RPs of PIM-SM domains 1, 2 and 3 establish peer  
relationship between them. Domain 3 contains a group member.  
PIM-SM 1  
DR  
1
2
Register  
Group  
Member  
3
Source  
5
RP&MSDP Peer  
4
4
4
RP&MSDP Peer  
PIM-SM 2  
RP&MSDP Peer  
5
Group  
Member  
PIM-SM 3  
Figure 30-1 MSDP working principles (I)  
When the multicast source in domain 1 sends data to the multicast group, the working  
process of the member in domain 3, from discovering the multicast source to receiving  
data from the source, includes the following:  
1) The multicast source in PIM-SM domain 1 begins to send datagram.  
2) The DR connected to the multicast source encapsulates the datagram into a  
Register packet and forward to the RP in domain 1.  
3) The RP in domain 1 decapsulates the packet and forwards it along the RPT to all  
the members within the domain. The domain members can choose to take the  
path along SPT.  
4) The RP in domain 1 generates an SA (Source Active) message for the MSDP  
peers (the RPs in PIM-SM domain 2 and domain 3). The SA message contains  
multicast source IP address, multicast group address and the address of the RP  
that generates the message. Besides, the RP in domain 1 encapsulates the first  
received multicast data into this SA message.  
5) If there is any group member in the domain of an MSDP peer (in the figure, it is  
PIM-SM domain 3), the RP in this domain sends the multicast data encapsulated  
in the SA message to group members along the RPT and the join message to  
multicast source.  
6) After the reverse forwarding path is created, the multicast source data is sent  
directly to the RP in domain 3, which then RP forwards the data along the RPT. In  
30-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
this case, the last hop router connected with the group member in domain 3 can  
choose whether to switch to SPT.  
II. Message forwarding and RPF check between MSDP peers  
As shown in Figure 30-2 MSDP working principles (II), Switch A, Switch B, Switch C,  
Switch D, Switch E and Switch F belong to domain 1, domain 2 and domain 3  
respectively. MSDP peer relationship is established between them, indicated with  
bi-directional arrows in the figure. Among them, Mesh Group is created among Switch  
B, Switch C and Switch D.  
SwitchA  
SwitchB  
Source  
AS 1  
SwitchD  
mesh group  
AS 2  
Static peer  
SwitchC  
AS 3  
SwitchF  
SwitchE  
Figure 30-2 MSDP working principles (II)  
The SA message forwarding and RPF check among these MSDP peers are illustrated  
as follows:  
1) If the SA message is from a MSDP peer that is the RP of the multicast source as  
from Switch A to Switch B, it is received and forwarded to other peers.  
2) If the SA message is from a MSDP peer that has only one peer as from Switch B to  
Switch A, it is received.  
3) If the SA message is from a static RPF peer as from Switch D to Switch E, it is  
received and forwarded to other peers.  
4) If the SA message is from a MSDP peer in Mesh Group as from Switch B to Switch  
D, it is received and forwarded to the peers outside the Mesh Group.  
5) If the SA message is sent from a MSDP peer in a same domain, and the peer is  
the next hop along the optimal path to the RP in the domain of source, as in the  
30-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
case when the message is from Switch E to Switch F, it is received and forwarded  
to other peers.  
6) If the SA message is sent from a MSDP peer in a different domain which is the  
next autonomous domain along the optimal path to the RP in the domain of source,  
as from Switch D to Switch F, it is received and forwarded to other peers.  
7) For other SA messages, they are neither received nor forwarded.  
III. Precautions for configuration  
The router operating MSDP must also run BGP or MBGP. It is recommended to use the  
same IP address of the MSDP peer with that of the BGP peer or MBGP peer. If neither  
BGP nor MBGP is in operation, a static RPF peer should be configured.  
30.2 MSDP Configuration  
1) Basic configuration tasks of MSDP include:  
z
Enable MSDP  
z
Configure MSDP peers  
2) Advanced configuration tasks of MSDP include:  
z
z
z
z
z
z
z
z
z
z
z
z
Configure static RPF peers  
Configure Originating RP  
Configure SA caching state  
Configure the maximum number of SA caching  
Request the source information of MSDP peers  
Control the source information created  
Control the source information forwarded  
Control the received source information  
Configure MSDP full connection group  
Configure the MSDP connection retry period  
Disable MSDP peers  
Clear MSDP connection, statistics and SA cache  
30.2.1 Enabling MSDP  
To configure MSDP, you must enable MSDP first.  
Please perform the following configurations in system view.  
Table 30-1 Enabling MSDP  
Operation  
Command  
Enable MSDP and enter MSDP view  
Clear all MSDP configurations  
msdp  
undo msdp  
30-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
30.2.2 Configuring MSDP Peers  
To run MSDP, you need to configure MSDP peers locally.  
Please perform the following configurations in MSDP view.  
Table 30-2 Configuring MSDP peers  
Operation  
Command  
peer-address connect-interface  
peer  
interface-type interface-number  
Configure MSDP peers  
Remove MSDP peer configuration undo peer peer-address  
Add description to a MSDP peer  
Remove the description  
peer peer-address description text  
undo peer peer-address description text  
The command to add description is optional.  
If the local router is also in BGP Peer relation with a MSDP peer, the MSDP peer and  
the BGP peer should use the same IP address.  
Not any two routers between which MSDP peer relationship has been established must  
run BGP or MBGP, so long as they have a BGP or MBGP route between them. If no  
BGP of MBGP route exists between them, then you must configure static RPF peers.  
30.2.3 Configuring Static RPF Peers  
Please perform the following configurations in MSDP view.  
Table 30-3 Configuring static RPF peers  
Operation  
Command  
Configure static RPF peers  
static-rpf-peer peer-address [ rp-policy list ]  
undo static-rpf-peer peer-address  
Remove static RPF peer  
configuration  
By default, no static RPF peer is configured.  
The peer command must be configured before the configuration of static-rpf-peer  
command.  
If only one MSDP peer is configured via the peer command, the MSDP peer will be  
regarded as the static RPF peer.  
To configure multiple static RPF peers at the same time, take any of the two methods:  
z
Using rp-policy parameters universally: Multiple static RPF peers take effect at  
the same time and SA messages are filtered by the RP addresses contained  
according to the configured prefix list. If multiple static RPF peers using the same  
30-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
rp-policy parameter are configured, any peer that receives an SA message will  
forward it to the other peers.  
z
Not using the rp-policy parameter universally: According to the configuration  
sequence, only the first static RPF peer whose connection state is UP is activated.  
All SA messages from the peer will be received and those from other static RPF  
peers will be discarded. Once the activated static RPF peer turns invalid (possibly  
out of configuration removed or connection interrupted), the following first static  
RPF peer with UP connection state according to the configuration sequence will  
assume its role.  
30.2.4 Configuring Originating RP  
During the creation of SA message, an MSDP peer can be configured to use the IP  
address of a specified interface as the RP address in its SA message.  
Please perform the following configurations in MSDP view.  
Table 30-4 Configuring Originating RP  
Operation  
Command  
Configure an MSDP peer to use the IP address of  
a specified interface as the RP address of its SA  
message  
originating-rp interface-type  
interface-number  
Remove the above operation  
undo originating-rp  
By default, the RP address in SA message is the one configured by PIM.  
30.2.5 Configuring SA Caching State  
When SA messages are cached on a router, the new join-in groups can directly access  
all the active sources and join to the corresponding source tree, instead of waiting for  
the arrival of the next SA message.  
Please perform the following configurations in MSDP view.  
Table 30-5 Configuring SA caching state  
Operation  
Configure SA caching state  
Disable SA caching state  
Command  
cache-sa-enable  
undo cache-sa-enable  
By default, the router caches the SA state, or rather the (S, G) entry when receiving an  
SA message.  
Some memory is consumed as the join delay of groups is shortened by this  
configuration.  
30-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
30.2.6 Configuring the Maximum Number of SA caching  
To prevent DoS (Deny of Service) attacks, you can set the maximum number of SAs  
cached on the router.  
Perform the following configuration in MSDP view.  
Table 30-6 Configuring the maximum number of SA caching  
Operation  
Command  
Configuring the maximum number of SA peer peer-address sa-cache-maximum  
caching  
sa-limit  
undo  
sa-cache-maximum  
peer  
peer-address  
Restore the default configuration  
By default, the maximum number of SA caching is 2048.  
30.2.7 Requesting Source Information of MSDP Peers  
When a new group joins, the router will send a SA request message to the specified  
MSDP peer, and the MSDP peer will respond with the SA messages it caches. If the  
MSDP peer does not enable the SA caching, the configuration is invalid.  
Please perform the following configurations in MSDP view.  
Table 30-7 Requesting source information of MSDP peers  
Operation  
Command  
peer-address  
Configure the router to send SA request message to  
the specified MSDP peer when receiving the join  
message of a group  
peer  
request-sa-enable  
undo peer peer-address  
request-sa-enable  
Restore the default configuration  
The SA request message sent by a local RP will get the immediate response about all  
active sources.  
By default, the router does not send SA request message to its MSDP peer when  
receiving the join message of a group. Instead, it waits for the arrival of SA message of  
the next period.  
30.2.8 Controlling the Source Information Created  
I. Filtering the multicast routing entries imported  
RP filters the registered sources to control the information of the active sources  
advertised in SA message. MSDP peers can be configured to only advertise the  
30-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
qualified (S, G) entries in the multicast routing table when creating SAmessages, that is,  
to control the (S,G) entries imported from the multicast routing table to the domain.  
Please perform the following configurations in MSDP view.  
Table 30-8 Filtering the multicast routing entries imported  
Operation  
Command  
Advertise only the (S, G) entries permitted by  
the ACL  
import-source [ acl acl-number ]  
undo import-source  
Remove the above configuration  
By default, only intra-domain sources are advertised in SA messages.  
If the import-source command without acl parameter is executed, no source is  
advertised in SA messages.  
II. Filtering SA request messages  
Please perform the following configurations in MSDP view.  
Table 30-9 Filtering SA request messages  
Operation  
Command  
Filter all the SA request messages from a  
specified MSDP peer  
peer peer-address sa-request-policy  
Filter the SA request messages of the  
peer peer-address sa-request-policy  
acl acl-number  
groups of  
a
specified MSDP peer  
permitted by the basic ACL from  
Remove the configuration of filtering SA undo  
peer  
peer-address  
request messages  
sa-request-policy  
By default, only the routers which caches SA messages can repond to SA request  
messages. Routers receive all SA request messsages from its MSDP peers.  
Multicast group addresses are described in ACL. If no ACL is specified, all SA request  
messages sent by the corresponding MSDP peer will be ignored. If an ACL is specified,  
only SA request messages of the groups permitted by the ACL will be processed.  
30.2.9 Controlling the Source Information Forwarded  
Controlling of source information also includes that of forwarding and receiving source  
information besides that of creating source information. The outbound filter or time to  
live (TTL) threshold of SAmessages can be used to control the SAmessage forwarding.  
By default, all SA messages are forwarded to other MSDP peers.  
30-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
I. Using MSDP outbound filter  
MSDP outbound filter of are functional in:  
z
z
Filtering off all the (S, G) entries  
Forwarding only the SA messages permitted by the advanced ACL  
Please perform the following configurations in MSDP view.  
Table 30-10 Using MSDP outbound filter to control the source information forwarded  
Operation  
Command  
Filter off all the SA messages to a specified peer peer-address sa-policy  
MSDP peer  
export  
Forward the SA messages permitted by the peer peer-address sa-policy  
advanced ACL to a specified MSDP peer export [ acl acl-number ]  
Remove the filtering over the source undo  
peer peer-address  
information forwarded  
sa-policy export  
II. Using TTL to filter SA messages with encapsulated data  
An SA message with encapsulated data can reach the specified MSDP peer only when  
the TTL in its IP header is no less than the threshold. Therefore, the forwarding of SA  
messages with encapsulated data can be controlled by configuring the TTL threshold.  
For example, you can set the TTL theshold for intra-domain multicast traffic as 10 if you  
wish to restrict SA messages with TTL less than or equal to 10 carrying encapsulated  
data from being propagated. If you set the TTL threshold greater than 10, then they can  
be propagated to outside.  
Please perform the following configurations in MSDP view.  
Table 30-11 Using TTL to filter SA messages with encapsulated data  
Operation  
Command  
Filter off the multicast data encapsulated in  
the first SA message aiming at a specified peer peer-address minimum-ttl ttl  
MSDP peer  
undo  
minimum-ttl  
peer  
peer-address  
Remove the TTL threshold configuration  
The default value of TTL threshold is 0.  
30.2.10 Controlling the Received Source Information  
Please perform the following configurations in MSDP view.  
30-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
Table 30-12 Controlling the received source information  
Operation  
Command  
Filter off the SA messages from a specified peer  
peer-address  
sa-policy  
sa-policy  
MSDP peer  
import  
Receive the SA messages permitted by the peer  
peer-address  
advanced ACL from a specified MSDP peer  
import [ acl acl-number ]  
Remove the filtering rule over received undo  
peer  
peer-address  
source information  
sa-policy import  
Similar to MSDP outbound filter in function, MSDP inbound filter controls the received  
SA messages. By default, the SA messages from all peers are accepted.  
30.2.11 Configuring MSDP Mesh Group  
Mesh Group is useful when full connection among MSDP peers is required but SA  
message flooding shall be prevented.  
In a Mesh group, the SA messages from outside the group are forwarded to other  
members in the group, but the SA messages from peers inside the group will not be  
performed with Peer-RPF check or forwarded in the group. In this case, the overflow of  
SA messages is avoided and Peer-RPF is simplified, as BGP or MBGP is not required  
between MSDP peers.  
Please perform the following configurations in MSDP view.  
Table 30-13 Configuring MSDP full connection group  
Operation  
Command  
Configure an MSDP peer to be a  
member of an MSDP Mesh Group  
peer peer-address mesh-group name  
undo peer peer-address mesh-group  
name  
Delete that member from the Group  
If an MSDP peer is configured into different mesh groups, only the last configuration is  
valid.  
30.2.12 Configuring the MSDP Connection Retry Period  
Perform the following configurations in MSDP view.  
30-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
Table 30-14 Configuring the MSDP connection retry period  
Operation  
Configuring the MSDP connection retry period  
Command  
timer retry seconds  
Restore the default value of MSDP connection retry interval undo timer retry  
By default, MSDP connection is retried at the interval of 30 seconds.  
30.2.13 Shutting MSDP Peers Down  
The session between MSDP peers can be cut off and re-activated as needed.  
If a session between MSDP peers is cut off, the TCP connection will terminate with no  
retry effort, but the configuration information will be reserved.  
Please perform the following configurations in MSDP view.  
Table 30-15 Shutting MSDP peers down  
Operation  
Command  
shutdown peer-address  
undo shutdown peer-address  
Shut a specified MSDP peer down  
Turn the MSDP peer up  
By default, MSDP peer is enabled.  
30.2.14 Clearing MSDP Connections, Statistics and SA Caching  
Configuration  
Perform the following configurations in user view.  
Table 30-16 Clearing MSDP connections, statistics and SA caching configuration  
Operation  
Command  
Clear a specified TCP connection and  
reset the counters of all MSDP reset msdp peer peer-address  
information  
Clear MSDP peer statistics  
reset msdp statistics [ peer-address ]  
reset msdp sa-cache [ group-address ]  
Clear cached SA entries of MSDP  
30-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
30.3 Displaying and Debugging MSDP  
I. Displaying and Debugging MSDP  
After the above configuration, execute display commands in any view to display the  
running information of MSDP and to verify the effect of the configuration.  
Execute the debugging command in user view for the debugging of MSDP.  
Table 30-17 Displaying and debugging MSDP configuration  
Operation  
Command  
Display the numbers of sources and  
groups of SA messages from a display msdp sa-count [ as-number ]  
specified autonomous domain  
display  
[ peer-address ]  
msdp  
peer-status  
Display the details of a MSDP peer  
display msdp sa-cache [ group-address |  
source-address  
[ autonomous-system-number ]  
Display the (S,G) state learnt from  
MSDP peer  
[
]
]
Display MSDP peer state  
Enable MSDP debugging  
display msdp brief  
debugging msdp { all | connect | event |  
packet | source-active }  
Note that only after the cache-sa-enable command is executed, will the display msdp  
sa-count command have output.  
II. Tracing the Transmission Path of SA Messages on the Network  
The mtracert command can be used in any view to trace the network path of multicast  
data from multicast source to destination receiver and locate faults.  
Table 30-18 Tracing the transmission path of SA messages on the network  
Operation  
Command  
Trace the transmission msdp-tracert { source-address } { group-address }  
path of SA messages on { rp-address } [ max-hops max-hops ] [ next-hop-info ]  
the network  
[ sa-info ] [ peer-info ] [ skip-hops skip-hops ]  
Locating information loss and reducing configuration faults can be realized by tracing  
the network path of the specified (S, G, RP) entries. After the transmission path of SA  
messages is determined, the overflow of SA messages can be avoided by the correct  
configuration.  
30-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
30.4 MSDP Configuration Examples  
30.4.1 Configuring Static RPF Peers  
I. Networking requirements  
In the following networking environment, four Switch 8800s all are in the PIM-SM  
domains with no BGP or MBGP running among them (Note that MBGP is not supported  
in the basic code; the extended option is required).  
To enable Switch D to receive the specified source information from PIM-SM domains 1,  
2 and 3, you can configure static RPF peers with the parameter rp-policy.  
After the configuration is complete, Switch D will only receive SA messages permitted  
by the corresponding filtering policy from its static RPF peers.  
II. Networking diagram  
PIM-SM  
Domain 1  
10.10.1.1  
SwitchA  
Static RPF peer  
SA  
PIM-SM  
Domain 4  
Static RPF peer Vlan-interface10  
Vlan-interface30  
Vlan-interface20  
SwitchD  
SA  
PIM-SM  
Domain 3  
SA  
10.21.1.1  
SwitchB  
10.25.1.1  
SwitchC  
Static RPF peer  
Static RPF peer  
PIM-SM  
Domain 2  
Figure 30-3 Configuring static RPF peers  
III. Configuration procedure  
Configure Switch A to be a static RPF peer of Switch D.  
[SwitchD] ip ip-prefix list-a permit 10.10.0.0 16  
[SwitchD] msdp  
[SwitchD-msdp] peer 10.10.1.1 connect-interface Vlan-interface 10  
30-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
[SwitchD-msdp] static-rpf-peer 10.10.1.1 rp-policy list-a  
Configure Switch B to be a static RPF peer of Switch D.  
[SwitchD] ip ip-prefix list-b permit 10.21.0.0 16  
[SwitchD] msdp  
[SwitchD-msdp] peer 10.21.1.1 connect-interface Vlan-interface 20  
[SwitchD-msdp] static-rpf-peer 10.21.1.1 rp-policy list-b  
Configure Switch C to be a static RPF peer of Switch D.  
[SwitchD] ip ip-prefix list-c permit 10.25.0.0 16  
[SwitchD] msdp  
[SwitchD-msdp] peer 10.25.1.1 connect-interface Vlan-interface30  
[SwitchD-msdp] static-rpf-peer 10.25.1.1 rp-policy list-c  
30.4.2 Configuring Anycast RP  
I. Networking requirements  
To configure Anycast RP in the PIM-SM domain, establish MSDP peer relationship  
between Switch A and Switch B; use the address of loopback0 on Switch A and Switch  
B to send SAmessages outside; set Loopback10 interface on Switch Aand Switch B as  
BSR/RP and configure the Anycast RP address. In this way, when a unicast group  
member joins, the switch directly connected to the host can originate a join message to  
the nearest RP in the topology.  
This example focuses on the configuration of Switch A and Switch B. Configuration  
performed on Switch E, Switch D and Switch C is omitted as it mainly concerns  
enabling multicast and enabling PIM-SM on the interfaces.  
30-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
II. Networking diagram  
SRC A  
SwitchE  
PIM-SM domain  
Vlan-interface10  
10.10.2.1/24  
Loopback10: Anycast RP address  
10.1.1.1  
SwitchB  
Loopback0  
10.10.1.1  
E1/1/2  
Loopback10  
10.1.1.1  
SwitchD  
E1/1/3  
Vlan-interface20  
Vlan-interface10  
10.21.3.1/24  
E1/1/2  
10.10.3.1/24  
Loopback0  
10.21.1.1  
Loopback10  
10.1.1.1  
E1/1/3  
Loopback0 MSDP peer address  
:
SwitchA  
Vlan-interface20  
10.21.2.1/24  
& Originating-RP  
SRC B  
SwitchC  
Figure 30-4 Networking diagram for Anycast RP configuration  
III. Configuration procedure  
1) Configure SwitchB:  
Configure VLAN  
<SwitchB> system-view  
[SwitchB] vlan 10  
[SwitchB-vlan10] port ethernet1/1/2  
[SwitchB-vlan10] quit  
[SwitchB] vlan 20  
[SwitchB-vlan20] port ethernet1/1/3  
[SwitchB-vlan20] quit  
Enable multicast.  
[SwitchB] multicast routing-enable  
Configure the IP address of interface loopback0.  
[SwitchB] interface loopback0  
[SwitchB-LoopBack0] ip address 10.10.1.1 255.255.255.255  
[SwitchB-LoopBack0] quit  
Configure the IP address of interface loopback10 and enable IGMP and PIM-SM.  
[SwitchB] interface loopback10  
[SwitchB-LoopBack10] ip address 10.1.1.1 255.255.255.255  
30-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
[SwitchB-LoopBack10] igmp enable  
[SwitchB-LoopBack10] pim sm  
[SwitchB-LoopBack10] quit  
Configure the IP address of Vlan-interface10 and enable IGMP and PIM-SM.  
[SwitchB] interface Vlan-interface10  
[SwitchB-Vlan-interface10] ip address 10.10.2.1 255.255.255.0  
[SwitchB-Vlan-interface10] igmp enable  
[SwitchB-Vlan-interface10] pim sm  
[SwitchB-Vlan-interface10] undo shutdown  
[SwitchB-Vlan-interface10] quit  
Configure the IP address of Vlan-interface20 and enable IGMP and PIM-SM.  
[SwitchB] interface Vlan-interface20  
[SwitchB-Vlan-interface20] ip address 10.10.3.1 255.255.255.0  
[SwitchB-Vlan-interface20] igmp enable  
[SwitchB-Vlan-interface20] pim sm  
[SwitchB-Vlan-interface20] undo shutdown  
[SwitchB-Vlan-interface20] quit  
Configure OSPF  
[SwitchB] ospf  
[SwitchB-ospf-1] area 0  
[SwitchB-ospf-1-area-0.0.0.0] network 10.10.2.0 0.255.255.255  
[SwitchB-ospf-1-area-0.0.0.0] network 10.10.3.0 0.255.255.255  
[SwitchB-ospf-1-area-0.0.0.0] network 10.1.1.1 0.0.0.0  
[SwitchB-ospf-1-area-0.0.0.0] network 10.10.1.1 0.0.0.0  
[SwitchB-ospf-1-area-0.0.0.0] quit  
[SwitchB-ospf-1] quit  
Configure Switch A as its MSDP peer.  
[SwitchB] msdp  
[SwitchB-msdp] peer 10.21.1.1 connect-interface loopback 0  
Configure Originating RP.  
[SwitchB-msdp] originating-rp loopback0  
[SwitchB-msdp] quit  
Configure C-RP and BSR.  
[SwitchB] pim  
[SwitchB-pim] c-rp loopback 10  
[SwitchB-pim] c-bsr loopback 10 30  
2) Configure Switch A:  
Configure VLAN  
<SwitchA> system-view  
30-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
[SwitchA] vlan 10  
[SwitchA-vlan10] port ethernet1/1/2  
[SwitchA-vlan10] quit  
[SwitchA] vlan 20  
[SwitchA-vlan20] port ethernet1/1/3  
[SwitchA-vlan20] quit  
Enable multicast.  
[SwitchA] multicast routing-enable  
Configure the IP address of interface loopback0.  
[SwitchA] interface loopback0  
[SwitchA-LoopBack0] ip address 10.21.1.1 255.255.255.255  
[SwitchA-LoopBack0] quit  
Configure the IP address of interface loopback10 and enable IGMP and PIM-SM.  
[SwitchA] interface loopback10  
[SwitchA-LoopBack10] ip address 10.1.1.1 255.255.255.255  
[SwitchA-LoopBack10] igmp enable  
[SwitchA-LoopBack10] pim sm  
[SwitchA-LoopBack10] quit  
Configure the IP address of interface Vlan-interface20 and enable IGMP and PIM-SM.  
[SwitchA] interface Vlan-interface20  
[SwitchA-Vlan-interface20] ip address 10.21.2.1 255.255.255.0  
[SwitchA-Vlan-interface20] igmp enable  
[SwitchA-Vlan-interface20] pim sm  
[SwitchA-Vlan-interface20] undo shutdown  
[SwitchA-Vlan-interface20] quit  
Configure the IP address of Vlan-interface10 and enable IGMP and PIM-SM.  
[SwitchA] interface Vlan-interface10  
[SwitchA-Vlan-interface10] ip address 10.21.3.1 255.255.255.0  
[SwitchA-Vlan-interface10] igmp enable  
[SwitchA-Vlan-interface10] pim sm  
[SwitchA-Vlan-interface10] undo shutdown  
[SwitchA-Vlan-interface10] quit  
Configure OSPF route.  
[SwitchA] ospf  
[SwitchA-ospf-1] area 0  
[SwitchA-ospf-1-area-0.0.0.0] network 10.21.2.0 0.255.255.255  
[SwitchA-ospf-1-area-0.0.0.0] network 10.21.3.0 0.255.255.255  
[SwitchA-ospf-1-area-0.0.0.0] network 10.1.1.1 0.0.0.0  
[SwitchA-ospf-1-area-0.0.0.0] network 10.21.1.1 0.0.0.0  
[SwitchA-ospf-1-area-0.0.0.0] quit  
30-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
[SwitchA-ospf-1] quit  
Configure Switch B as its MSDP peer.  
[SwitchA] msdp  
[SwitchA-msdp] peer 10.10.1.1 connect-interface loopback 0  
Configure Originating RP.  
[SwitchA-msdp] originating-rp loopback0  
[SwitchA-msdp] quit  
Configure C-RP and BSR.  
[SwitchA] pim  
[SwitchA-pim] c-rp loopback 10  
[SwitchA-pim] c-bsr loopback 10 30  
30.4.3 MSDP Integrated Networking  
I. Networking requirement  
In the following network, enable MSDP and configure an Anycast RP in PIM-SM  
domain 1; establish MSDP peer relationship among RPs across PIM-SM domains; and  
use MBGP between domains. For the related commands, refer to “Multicast Protocol  
Configuration”.  
30-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
II. Networking diagram  
PIM-SM domain 2  
Loopback0  
10.28.1.1  
SwitchG  
PIM-SM domain 1  
SRC A  
Vlan-interface10  
E1/1/2  
SwitchA  
Loopback0  
10.25.1.1  
Loopback10  
10.1.1.1  
Vlan-interface30  
E1/1/3  
Vlan-interface30  
E1/1/4  
Ethernet: 10.25.2.0  
SwitchB  
Loopback0  
10.25.1.2  
Vlan-interface20  
SRC C  
Vlan-interface10  
SRC B  
SwitchD  
SwitchC  
Loopback0  
10.26.1.1  
Loopback0  
10.27.1.1  
Ethernet: 10.26.2.0  
Vlan-interface10  
Ethernet: 10.27.2.0  
SwitchF  
E1/1/2  
Loopback0  
10.26.1.2  
Loopback10  
SwitchE  
Loopback10  
10.1.1.1  
Loopback0  
10.27.1.2  
E1/1/3  
Vlan-interface20  
10.1.1.1  
SwitchH  
Loopback0  
10.29.1.1  
PIM-SM domain 3  
Loopback0  
10.30.1.1  
SwitchI  
PIM-SM domain 4  
Figure 30-5 MSDP integrated networking  
III. Configuration procedure  
Note:  
The follow procedure details multicast configuration, but briefs router configuration.  
1) Configure Switch A:  
Configuring VLAN  
<SwitchA> system-view  
[SwitchA] vlan 10  
[SwitchA-vlan10] port ethernet1/1/2  
[SwitchA-vlan10] quit  
[SwitchA] vlan 30  
[SwitchA-vlan30] port ethernet1/1/3  
[SwitchA-vlan30] quit  
30-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Enable multicast.  
Chapter 30 MSDP Configuration  
[SwitchA] multicast routing-enable  
Configure the IP address of interface loopback0 and enable PIM-SM.  
[SwitchA] interface loopback0  
[SwitchA-LoopBack0] ip address 10.25.1.1 255.255.255.255  
[SwitchA-LoopBack0] pim sm  
[SwitchA-LoopBack0] quit  
Configure the IP address of interface loopback10 and enable PIM-SM.  
[SwitchA] interface loopback10  
[SwitchA-LoopBack10] ip address 10.1.1.1 255.255.255.255  
[SwitchA-LoopBack10] pim sm  
[SwitchA-LoopBack10] quit  
Configure the IP address of Vlan-interface30 and enable IGMP and PIM-SM.  
[SwitchA] interface Vlan-interface30  
[SwitchA-Vlan-interface30] ip address 10.25.2.3 255.255.255.0  
[SwitchA-Vlan-interface30] igmp enable  
[SwitchA-Vlan-interface30] pim sm  
[SwitchA-Vlan-interface30] undo shutdown  
[SwitchA-Vlan-interface30] quit  
Configure the IP address of Vlan-interface10 and enable IGMP and PIM-SM.  
[SwitchA] interface Vlan-interface10  
[SwitchA-Vlan-interface10] ip address 10.25.3.1 255.255.255.0  
[SwitchA-Vlan-interface10] igmp enable  
[SwitchA-Vlan-interface10] pim sm  
[SwitchA-Vlan-interface10] undo shutdown  
[SwitchA-Vlan-interface10] quit  
Configure OSPF  
[SwitchA] ospf  
[SwitchA-ospf-1] area 0  
[SwitchA-ospf-1-area-0.0.0.0] network 10.25.2.0 0.255.255.255  
[SwitchA-ospf-1-area-0.0.0.0] network 10.1.1.1 0.0.0.0  
[SwitchA-ospf-1-area-0.0.0.0] network 10.25.1.1 0.0.0.0  
[SwitchA-ospf-1-area-0.0.0.0] quit  
[SwitchA-ospf-1] quit  
Configure BGP.  
[SwitchA] bgp 100  
[SwitchA-bgp] undo synchronization  
[SwitchA-bgp] group in internal  
[SwitchA-bgp] peer 10.26.1.2 group in  
30-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
[SwitchA-bgp] peer 10.27.1.2 group in  
[SwitchA-bgp] peer in connect-interface loopback0  
[SwitchA-bgp] ipv4-family multicast  
[SwitchA-bgp-af-mul] peer in enable  
[SwitchA-bgp-af-mul] peer 10.26.1.2 group in  
[SwitchA-bgp-af-mul] peer 10.27.1.2 group in  
[SwitchA-bgp-af-mul] peer in next-hop-local  
[SwitchA-bgp-af-mul] quit  
[SwitchA-bgp] group ex external  
[SwitchA-bgp] peer 10.28.1.1 group ex as-number 200  
[SwitchA-bgp] peer ex next-hop-local  
[SwitchA-bgp] peer ex default-route-advertise  
[SwitchA-bgp] ipv4-family multicast  
[SwitchA-bgp-af-mul] peer ex enable  
[SwitchA-bgp-af-mul] peer 10.28.1.1 group ex  
[SwitchA-bgp-af-mul] peer ex next-hop-local  
[SwitchA-bgp-af-mul] quit  
[SwitchA-bgp] quit  
Configure MSDP peer, Mess Group and Originating RP.  
[SwitchA] msdp  
[SwitchA-msdp] peer 10.28.1.1 connect-interface loopback 0  
[SwitchA-msdp] peer 10.26.1.2 connect-interface loopback 0  
[SwitchA-msdp] peer 10.27.1.2 connect-interface loopback 0  
[SwitchA-msdp] peer 10.26.1.2 mesh-group net  
[SwitchA-msdp] peer 10.27.1.2 mesh-group net  
[SwitchA-msdp] originating-rp loopback0  
[SwitchA-msdp] quit  
Configuring C-RP and BSR.  
[SwitchA] pim  
[SwitchA-pim] c-rp loopback 10  
[SwitchA-pim] c-bsr loopback 0 30  
2) Configure Switch E:  
Configuring VLAN  
<SwitchE> system-view  
[SwitchE] vlan 10  
[SwitchE-vlan10] port ethernet1/1/2  
[SwitchE-vlan10] quit  
[SwitchE] vlan 20  
[SwitchE-vlan20] port ethernet1/1/3  
[SwitchE-vlan20] quit  
Enable multicast.  
30-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
[SwitchE] multicast routing-enable  
Configure the IP address of interface loopback0 and enable PIM-SM.  
[SwitchE] interface loopback0  
[SwitchE-LoopBack0] ip address 10.26.1.2 255.255.255.255  
[SwitchE-LoopBack0] pim sm  
[SwitchE-LoopBack0] quit  
Configure the IP address of interface lookback10 and enable PIM-SM.  
[SwitchE] interface loopback10  
[SwitchE-LoopBack10] ip address 10.1.1.1 255.255.255.255  
[SwitchE-LoopBack10] pim sm  
[SwitchE-LoopBack10] quit  
Configure the IP address of Vlan-interface10 and enable IGMP and PIM-SM.  
[SwitchE] interface Vlan-interface10  
[SwitchE-Vlan-interface10] ip address 10.26.2.3 255.255.255.0  
[SwitchE-Vlan-interface10] igmp enable  
[SwitchE-Vlan-interface10] pim sm  
[SwitchE-Vlan-interface10] undo shutdown  
[SwitchE-Vlan-interface10] quit  
Configure the IP address of Vlan-interface20 and enable IGMP and PIM-SM.  
[SwitchE] interface Vlan-interface20  
[SwitchE-Vlan-interface20] ip address 10.26.3.1 255.255.255.0  
[SwitchE-Vlan-interface20] igmp enable  
[SwitchE-Vlan-interface20] pim sm  
[SwitchE-Vlan-interface20] undo shutdown  
[SwitchE-Vlan-interface20] quit  
Configuring OSPF  
[SwitchE] ospf  
[SwitchE-ospf-1] area 0  
[SwitchE-ospf-1-area-0.0.0.0] network 10.26.2.0 0.255.255.255  
[SwitchE-ospf-1-area-0.0.0.0] network 10.1.1.1 0.0.0.0  
[SwitchE-ospf-1-area-0.0.0.0] network 10.26.1.2 0.0.0.0  
[SwitchE-ospf-1-area-0.0.0.0] quit  
[SwitchE-ospf-1] quit  
Configure BGP.  
[SwitchE] bgp 100  
[SwitchE-bgp] undo synchronization  
[SwitchE-bgp] group in internal  
[SwitchE-bgp] peer 10.25.1.1 group in  
[SwitchE-bgp] peer 10.27.1.2 group in  
[SwitchE-bgp] peer in connect-interface loopback0  
30-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 30 MSDP Configuration  
[SwitchE-bgp] ipv4-family multicast  
[SwitchE-bgp-af-mul] peer in enable  
[SwitchE-bgp-af-mul] peer 10.25.1.1 group in  
[SwitchE-bgp-af-mul] peer 10.27.1.2 group in  
[SwitchE-bgp-af-mul] peer in next-hop-local  
[SwitchE-bgp-af-mul] quit  
[SwitchE-bgp] group ex external  
[SwitchE-bgp] peer 10.29.1.1 group ex as-number 300  
[SwitchE-bgp] peer ex default-route-advertise  
[SwitchE-bgp] peer ex ebgp-max-hop 255  
[SwitchE-bgp] ipv4-family multicast  
[SwitchE-bgp-af-mul] peer ex enable  
[SwitchE-bgp-af-mul] peer 10.29.1.1 group ex  
[SwitchE-bgp-af-mul] peer ex next-hop-local  
[SwitchE-bgp-af-mul] quit  
[SwitchE-bgp] quit  
Configure MSDP peer, Mess Group and Originating RP.  
[SwitchE] msdp  
[SwitchE-msdp] peer 10.29.1.1 connect-interface loopback 0  
[SwitchE-msdp] static-rpf-peer 10.29.1.1  
[SwitchE-msdp] peer 10.25.1.1 connect-interface loopback 0  
[SwitchE-msdp] peer 10.27.1.2 connect-interface loopback 0  
[SwitchE-msdp] peer 10.25.1.1 mesh-group net  
[SwitchE-msdp] peer 10.27.1.2 mesh-group net  
[SwitchE-msdp] originating-rp loopback0  
[SwitchE-msdp] quit  
[SwitchE] ip route-static 10.29.1.1 255.255.255.0 Vlan-interface20  
Configure C-RP and BSR.  
[SwitchE] pim  
[SwitchE-pim] c-rp loopback 10  
[SwitchE-pim] c-bsr loopback 0 30  
Note:  
The configuration on the switches other than SwitchA and SwitchE is omitted here.  
Note:  
MBGP is not supported in the basic code. The extended option is required for MBGP.  
30-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
Chapter 31 MBGP Multicast Extension  
Configuration  
31.1 MBGP Multicast Extension Overview  
31.1.1 Introduction  
At present, the most widely used inter-domain unicast routing protocol is BGP-4.  
Because the multicast topology may be different from the unicast topology, BGP-4 must  
be modified in order to implement the transmission of inter-domain multicast routing  
information. Some routers in the network may only support unicast rather than  
multicast and may not forward multicast packets since the particular policy requires that.  
To construct inter-domain multicast routing trees, you need to know the unicast routing  
information as well as the information of multicast-supporting parts of the network,  
namely, the multicast network topology.  
BGP-4 has been proved to be an effective and stable inter-domain unicast routing  
protocol. Therefore, it is more rational to enhance and extend the BGP-4 protocol than  
to construct a new protocol. RFC2858 provisions the multi-protocol extension method  
for BGP. The extended BGP (MBGP, also written as BGP-4+) can not only carry IPv4  
unicast routing information but also the routing information of other network layer  
protocols (such as multicast, IPv6). Carrying multicast routing information is only one of  
the extended functions. This chapter describes mainly MBGP extension for multicast.  
MBGP enables unicast and multicast routing information to be exchanged through the  
same process but stored in different routing tables. As MBGP is an enhanced version of  
BGP-4, all the common policies and configuration methods that BGP-4 supports can be  
applied to multicast.  
31.1.2 MBGP Extension Attributes for Multicast  
To make MBGP support multicast, RFC2858 defines two new route atttributes in the  
UPDATE message: MP_REACH_NLRI (multiprotocol reachable NLRI) and  
MP_UNREACH_NLRI (multiprotocol unreachable NLRI). They are all optional  
non-transitive attributes, that is, routers that do not support MBGP can ignore the  
information in the attributes and not forward the attributes.  
Among the information carried by MP_REACH_NLRI and MP_UNREACH_NLRI, AFI  
(Address Family Identifier) and SAFI (Subsequent Address Family Identifier) can  
identify for which address family the information is. SAFI is a complement to NLRI  
(Network Layer Reachability Information), with value 1 for the unicast mode of NLRI,  
and value 2 for the multicast mode of NLRI.  
31-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
I. MP_REACH_NLRI attribute  
MP_REACH_NLRI is an optional non-transitive attribute, and can be used to:  
z
z
Send the routing information of a new reachable protocol.  
Send the next hop information about the new protocol with the same coding mode  
as that of NLRI.  
z
Enable the router to report part or all of the SNPAs (Sub-network Points of  
Attachment) saved in the local system.  
II. MP_UNREACH_NLRI attribute  
The MP_UNREACH_NLRI is an optional non-transitive attribute that can be used for  
the purpose of withdrawing one or multiple unfeasible routes from service. It includes  
the following fields:  
z
z
AFI and SAFI.  
Withdrawn Routes: Contains one or multiple NLRIs, in which are the unreachable  
destination addresses.  
An UPDATE packet that contains the MP_UNREACH_NLRI is not required to carry any  
other path attributes.  
These two attributes enables MBGP to carry multi-protocol information. MSGP  
therefore supports both unicast and multicast by constructing different topology maps  
to implement appropriate policies. Besides, MBGP may construct different inter-domain  
routes for unicast and multicast under a same policy.  
31.1.3 MBGP Operating Mode and Message Type  
MBGP runs on a router in the following two modes:  
z
z
IBGP (Internal BGP)  
EBGP (External BGP)  
MBGP running in an autonomous system is called IBGP; MBGP running across  
autonomous systems is called EBGP.  
MBGP offers four types of messages:  
z
z
z
z
Open Message  
Update Message  
Notification Message  
Keepalive Message  
Open Message is the first message sent after the TCP connection is established. It is  
used to establish MBGP peer relationship. Notification Message is used to notify errors.  
Keepalive message is used to check the validity of a connection. Update Message is  
the most important information in the MBGP system, used to exchange routing  
information among peers. It consists of three parts at the most: MP_UNREACH_NLRI,  
Path Attributes and MP_REACH_NLRI.  
31-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
31.2 MBGP Multicast Extension Configuration  
Basic configuration tasks of MBGP multicast extension include:  
z
z
Enable MBGP multicast extension protocol  
Specify the network routes notified by the MBGP multicast extension  
Advanced configuration tasks of MBGP multicast extension include:  
z
z
z
z
z
z
z
z
z
z
z
z
Configure the MED value for an AS  
Compare MED values from different AS neighbor paths  
Configure local preference  
Configure MBGP timer  
Configure MBGP Peer (group)  
Configure MBGP route aggregation  
Configure an MBGP route reflector  
Configure the MBGP community attributes  
Configure the interaction between MBGP and IGP  
Define AS path list and routing policy  
Configure MBGP route filtering  
Reset BGP connections  
Note:  
Only configuration tasks in IPv4 multicast sub-address family view are detailed below.  
Other tasks configured in BGP or system view are only briefed. For the detailed  
configuration, refer to the BGP Configuration and IP Routing policy sections in Routing  
Protocol of this manual.  
31.2.1 Enabling MBGP Multicast Extension Protocol  
To enable the MBGP multicast extension protocol, enter the IPv4 multicast sub-address  
family view.  
A router does not start receiving MBFP connection requests instantly after the MBGP  
multicast extension protocol is enabled. To activate a router to originate MBGP  
connection requests to neighboring routers, refer to the neighbor configuration.  
Perform the following configuration in BGP view.  
31-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
Table 31-1 Enabling MBGP multicast extension protocol  
Operation  
Command  
ipv4-family multicast  
Enter the MBGP multicast address  
family view  
Remove the MBGP multicast address  
family view  
undo ipv4-family multicast  
By default, the system does not run the MBGP multicast extension protocol.  
31.2.2 Specifying Network Routes Notified by MBGP Multicast Extension  
The network command is used to specify the network routes to be advertised to MBGP  
peers, as well as the mask and route policy of this network route.  
Perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-2 Specifying network routes notified by MBGP multicast extension  
Operation  
Command  
Configure the network routes to be network ip-address [ address-mask ]  
advertised by the local MBGP  
[ route-policy route-policy-name ]  
undo  
network  
ip-address  
route-policy  
Remove the network routes to be  
advertised by the local MBGP  
[
address-mask  
]
[
route-policy-name ]  
By default, no route is advertised by the local MBGP.  
The network command advertises only the precisely matched route, the one with  
prefix and mask completely conforming to the configuration. If no mask is specified,  
match goes by the natural network segment.  
31.2.3 Configuring the MED Value for an AS  
The MED configured in BGP view is valid for both unicast and multicast.  
For the details of this configuration, refer to “BGP Configuration” of the Routing Protocol  
part of this manual.  
31.2.4 Comparing MED Values from Different AS Neighbor Paths  
Do not use this configuration unless you are sure that different ASs adopt the same IGP  
and route selection method. The configuration in BGP view works both in unicast and  
multicast.  
For the details of this configuration, refer to “BGP Configuration” of the Routing Protocol  
part of this manual.  
31-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
31.2.5 Configuring Local Preference  
Different local preference can be configured as a reference of the MBGP route  
selection. When an MBGP router gets routes with the same destination but different  
next hops through different neighbors, it will choose the route with the highest local  
preference.  
The configuration works both in unicast and multicast.  
For the details of this configuration, refer to “BGP Configuration” of the Routing Protocol  
part of this manual.  
31.2.6 Configuring MBGP Timer  
After a router establishes MBGP connection with a peer, it sends Keepalive messages  
to the peer periodically to check for the smooth connection. If the router does not  
receive a single Keepalive message or any other kind of message from the peer within  
the defined connection Holdtime, it will think the MBGP connection broken and exit, and  
will process the routing information received through this connection as appropriate.  
Therefore, the Keepalive message sending interval and MBGP connection Holdtime  
are two parameters of great importance in MBGP mechanism.  
The configuration works both in unicast and multicast.  
For the details of this configuration, refer to “BGP Configuration” of the Routing Protocol  
part of this manual.  
31.2.7 Configuring MBGP Peer (Group)  
The use of MBGP peer groups is to simplify configuration. When configuring MBGP  
peers, you can create and configure a peer group in BGP view, and then add the peers  
into the group, since all peers in a group have the same configuration with the group.  
Then, enable this peer group in IPv4 multicast sub-address family view and add peers  
to this peer group to create MBGP peers and an MBGP peer group. In conclusion, to  
create MBGP peers/peer groups, you must configure them successfully in BGP view  
first.  
Caution:  
Configure the peer group under the guide of technical support engineers.  
I. Creating a peer group with members  
To configure a MBGP peer (group), configure a peer group in BGP view and add peers  
to this peer group. For details, refer to “BGP Configuration” in the Routing Protocol part.  
31-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
II. Enabling a peer (group)  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-3 Enabling a peer (group)  
Operation  
Command  
Enable the specified peer (group)  
Disable the specified peer (group)  
peer group-name enable  
undo peer group-name enable  
III. Adding an MBGP peer to the group  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-4 Adding an MBGP peer to the group  
Operation  
Command  
peer peer-address group group-name  
undo peer peer-address  
Add an MBGP peer to the group  
Delete the MBGP peer  
IV. Advertising MBGP community attributes to a peer (group)  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-5 Configuring to advertise the community attributes to a peer (group)  
Operation  
Command  
Advertise the community attributes to a  
peer (group)  
peer group-name advertise-community  
Configure not to advertise the community undo  
peer  
group-name  
attributes to a peer (group) advertise-community  
By default, no community attribute is advertised to any peer (group).  
V. Configuring a peer (group) as an MBGP route reflector client  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-6 Configuring a peer (group) as an MBGP route reflector client  
Operation  
Command  
Configure a peer (group) as an MBGP  
route reflector client  
peer group-name reflect-client  
undo peer group-name reflect-client  
Remove the above configuration  
31-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
By default, there is no route reflector in an AS.  
It is generally unnecessary to configure this command for a peer group. This command  
is reserved for the occasional compatibility with the network equipments of other  
vendors.  
VI. Configuring the local address as the next hop when advertising routes  
This involves removing the next hop configuration in the routing information advertised  
to a peer (group) and configuring the local address as the next hop address. It is valid  
only for IBGP peers/peer groups.  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-7 Configuring the local address as the next hop when advertising routes  
Operation  
Command  
Configure the local address as the next  
hop  
when  
advertising  
routing peer group-name next-hop-local  
information  
Remove the above configuration  
undo peer group-name next-hop-local  
VII. Specifying the routing policy for a peer (group)  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-8 Specifying the routing policy for a peer (group)  
Operation  
Command  
Configure routing policy for peer { group-name | peer-address } route-policy  
incoming packets  
policy-name import  
Remove  
cnfiguration  
incoming  
policy undo peer { group-name | peer-address }  
route-policy policy-name import  
Configure routing policy for peer group-name route-policy policy-name  
outgoing packets  
export  
Remove  
outgoing  
policy undo  
peer  
group-name  
route-policy  
cnfiguration  
policy-name export  
By default, no routing policy is specified for any peer (group).  
VIII. Configuring IP-ACL-based route filtering policy for a peer (group)  
Please perform the following configurations in IPV4 multicast sub-address family view.  
31-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
Table 31-9 Configuring IP-ACL-based route filtering policy for a peer (group)  
Operation  
Command  
group-name  
Configure filteriing policy for peer  
{
|
peer-address  
}
incoming packets  
filter-policy acl-number import  
Remove  
cnfiguration  
incoming  
policy undo peer { group-name | peer-address }  
filter-policy acl-number import  
Configure routing policy for peer group-name filter-policy acl-number  
outgoing packets  
export  
Remove  
outgoing  
policy undo  
peer  
group-name  
filter-policy  
cnfiguration  
acl-number export  
By default, a peer (group) does not perform route filtering based on the IP ACL.  
IX. Configuring AS-path-list-based route filtering policy for a peer (group)  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-10 Configuring the AS-path-list-based route filtering policy for a peer (group)  
Operation  
Command  
Configure filteriing policy peer { group-name | peer-address } as-path-acl  
for incoming packets  
acl-number import  
Remove incoming policy undo peer { group-name | peer-address } as-path-acl  
cnfiguration  
acl-number import  
Configure routing policy  
for outgoing packets  
peer group-name as-path-acl acl-number export  
Remove outgoing policy undo peer group-name as-path-acl acl-number  
cnfiguration  
export  
By default, a peer (group) does not perform route filtering based on the AS path list.  
X. Configuring prefix-list-based route filtering policy for a peer (group)  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-11 Configuring prefix-list-based route filtering policy for a peer (group)  
Operation  
Command  
Configure filteriing policy for peer { group-name | peer-address } ip-prefix  
incoming packets  
prefixname import  
Remove incoming policy undo peer { group-name | peer-address } ip-prefix  
cnfiguration  
prefixname import  
Configure routing policy for  
outgoing packets  
peer group-name ip-prefix prefixname export  
31-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
Operation  
Command  
Remove outgoing policy undo peer group-name ip-prefix prefixname  
cnfiguration  
export  
By default, a peer (group) does not perform route filtering based on the prefix list.  
31.2.8 Configuring MBGP Route Aggregation  
MBGP supports the manual aggregation of routes. Manual aggregation aggregates the  
local MBGP routes. A series of parameters can be configured during manual route  
aggregation.  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-12 Configuring MBGP route aggregation  
Operation  
Command  
aggregate address mask [ as-set | attribute-policy  
route-policy-name | detail-suppressed | origin-policy  
Configure  
aggregation of local  
routes  
the  
route-policy-name  
|
suppress-policy  
route-policy-name ]*  
undo aggregate address mask  
attribute-policy route-policy-name | detail-suppressed |  
[
as-set  
|
Remove  
aggregation of local  
routes  
the  
origin-policy route-policy-name  
route-policy-name ]*  
|
suppress-policy  
By default, MBGP does not aggregate local routes.  
31.2.9 Configuring an MBGP Route Reflector  
To ensure the interconnectivity among MBGP peers, it is necessary to establish  
fully-closed network among IBGP multicast peers. However, some internal MBGP  
multicast networks are very large, and it costs a good sum to establish a fully-closed  
network. Route reflector solves this problem. The core is to specify a router as the  
focus of the internal sessions. Multiple MBGP multicast routers can be peers of one  
central point, namely a multiple route reflector, which in turn creates peer relationship  
with other reflectors. The route reflector is the focus of other routers. The routers other  
than those reflectors are called clients. The clients are in peer with route reflects and  
exchange routing information with them. The route reflectors transfer (reflect)  
information between the clients in turn.  
For the details of the principles and configurations, refer to “BGP Configuration” of the  
Routing Protocol part.  
31-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
31.2.10 Configure MBGP Community Attributes  
Within the MBGP, a community is a set of destinations with some characteriestics in  
common. A community is not limited to a network or an AS has no physical boundary.  
For details, refer to “BGP Configuration” in the Routing Protocol part.  
31.2.11 Importing IGP Routing Information into MBGP  
MBGP can advertise intra-area netwrok informaiton to other ASs. To this end, you can  
use MBGP to advertise the intra-area network information that local router gets through  
IGP routing protocol.  
Please perform the following configurations in IPV4 multicast sub-address family view.  
Table 31-13 Importing IGP routing information  
Operation  
Command  
Import IGP Routing Information into import-route protocol  
[
route-policy  
MBGP  
policy-name ] [ med med-value ]  
Delete the imported IGP routing  
information  
undo import-route protocol  
By default, MBGP does not import any route of other protocols.  
Parameter Protocol specifies the source routing protocols of import, which can be  
direct, static, rip, isis, ospf, ospf-ase or ospf-nssa at present.  
31.2.12 Defining AS Path List and Routing Policy  
To configure AS path list and routing polity you need to:  
z
Configure the regular expression of autonomous systems (in system view);  
The UPDATE information of MBGP contains an AS_PATH domain. The autonomous  
system paths for MBGP routing information exchange is recorded in this domain.  
z
z
z
Define the routing policy (in system view);  
Define matching rules (in routing policy view);  
Define value assigning rules (in routing policy view)  
For the detailed configuration of regular expression of AS, refer to “BGP Configuration”  
(section 6.2.4) of the Routing Protocol part of this manual. For the other configuration,  
refer to the “IP Routing Policy Configuration” of the Routing Protocol part of this  
manual.  
31.2.13 Configuring MBGP Route Filtering  
The route filtering configuration of MBGP is the same as that of unicast BGP.  
For details, refer to “BGP Configuration” of the Routing Protocol part of this manual.  
31-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
31.2.14 Resetting BGP Connections  
After changing the MBGP policy or protocol configuration, users must disconnect the  
present BGP connection to make the new configuration effective.  
For details, refer to “BGP Configuration” of the Routing Protocol part of this manual.  
31.3 Displaying and Debugging MBGP Configuration  
After the above configuration, execute display commands in any view to display the  
running information of MBGP, and to verify the effect of the configuration.  
Execute the debugging command in user view for the debugging of MBGP.  
Table 31-14 Displaying and debugging MBGP configuration  
Operation  
Command  
display bgp multicast routing-table  
[ ip-address [ mask ] ]  
Display an MBGP routing table  
Display CIDR (classless inter-domain  
routing)  
display bgp multicast routing-table cidr  
display bgp multicast routing-table  
Display the routing information about community  
[
aa:nn  
|
the specified MBGP community  
no-export-subconfed | no-advertise |  
no-export ]* [ whole-match ]  
display bgp multicast routing-table  
Display the routes permitted by the  
specified MBGP community list  
community-list  
community-list-number  
[ whole-match ]  
Display the routes with inconsistent display bgp multicast routing-table  
source autonomous systems  
different-origin-as  
Display the routing information to or display  
bgp  
multicast  
peer  
from a specified multicast neighbor  
[ peer-address ] [ verbose ]  
Display the routing information  
advertised by MBGP  
display bgp multicast network  
display  
[ group-name ]  
bgp  
multicast  
group  
Display the peer group information  
Display the AS path information display bgp multicast routing-table  
matching the AS regular expression  
regular-expression as-regular-expression  
Disable/enable debugging MBGP [ undo ] debugging bgp mp-update  
UPDATE packets [ receive | send ] [ verbose ]  
31-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
31.4 MBGP Multicast Extension Configuration Example  
I. Networking requirement  
This example describes how the administrator uses the MBGP attributes to manage  
route selection. All switches are configured with MBGP. The IGP in AS200 uses OSPF.  
Switch A is AS100 and serves as the MBGP neighbor of Switch B and Switch C in  
AS200. Switch B and Switch C run IBGP for Switch D in AS200. Switch D is also in  
AS200.  
II. Networking diagram  
Figure 31-1 Networking diagram for MBGP path selection configuration  
III. Configuration procedure  
1) Configure Switch A:  
[SwitchA] vlan 20  
[SwitchA-vlan20] port ethernet1/1/2  
[SwitchA-vlan20] quit  
[SwitchA] interface vlan-interface 20  
[SwitchA-Vlan-interface20] ip address 192.1.1.1 255.255.255.0  
[SwitchA-Vlan-interface20] quit  
[SwitchA] vlan 30  
[SwitchA-vlan30] port ethernet1/1/3  
[SwitchA-vlan30] quit  
[SwitchA] interface vlan-interface 30  
[SwitchA-Vlan-interface30] ip address 193.1.1.1 255.255.255.0  
[SwitchA-Vlan-interface30] quit  
Enable MBGP.  
[SwitchA] bgp 100  
[SwitchA-bgp] ipv4-family multicast  
Specify target network for MBGP.  
31-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
[SwitchA-bgp-af-mul] network 1.0.0.0  
[SwitchA-bgp-af-mul] network 2.0.0.0  
[SwitchA-bgp-af-mul] quit  
Configure peers relationship.  
[SwitchA-bgp] bgp 100  
[SwitchA-bgp] group a1 external  
[SwitchA-bgp] peer 192.1.1.2 group a1 as-number 200  
[SwitchA-bgp] group a2 external  
[SwitchA-bgp] peer 193.1.1.2 group a2 as-number 200  
[SwitchA-bgp] ipv4-family multicast  
[SwitchA-bgp-af-mul] peer a1 enable  
[SwitchA-bgp-af-mul] peer a2 enable  
Configure the MED attribute of Switch A.  
z
Add an ACL on Switch A to permit network 1.0.0.0.  
[SwitchA] acl number 2000  
[SwitchA-acl-basic-2000] rule permit source 1.0.0.0 0.255.255.255  
[SwitchA-acl-basic-2000] rule deny source any  
z
Define two routing policies: set_med_50 and set_med_100, providing two MED  
values for network 1.0.0.0 (50 and 100 respectively).  
[SwitchA] route-policy set_med_50 permit node 10  
[SwitchA-route-policy] if-match acl 2000  
[SwitchA-route-policy] apply cost 50  
[SwitchA-route-policy] quit  
[SwitchA] route-policy set_med_100 permit node 10  
[SwitchA-route-policy] if-match acl 2000  
[SwitchA-route-policy] apply cost 100  
z
Apply the routing policy set_med_50 to the exported route updates of Switch C  
(193.1.1.2). Apply the routing policy set_med_100 to the exported route updates  
of Switch B (192.1.1.2).  
[SwitchA] bgp 100  
[SwitchA-bgp] ipv4-family multicast  
[SwitchA-bgp-af-mul] peer a2 route-policy set_med_50 export  
[SwitchA-bgp-af-mul] peer a1 route-policy set_med_100 export  
2) Configure Switch B:  
[SwitchB] vlan 20  
[SwitchB-vlan20] port ethernet2/1/2  
[SwitchB-vlan20] quit  
[SwitchB] interface vlan-interface 20  
[SwitchB-Vlan-interface20] ip address 192.1.1.2 255.255.255.0  
[SwitchB-Vlan-interface20] quit  
[SwitchB] vlan 40  
[SwitchB-vlan40] port ethernet2/1/4  
31-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
[SwitchB-vlan40] quit  
[SwitchB] interface vlan-interface 40  
[SwitchB-Vlan-interface40] ip address 194.1.1.2 255.255.255.0  
[SwitchB-Vlan-interface40] quit  
[SwitchB] ospf  
[SwitchB-ospf-1] area 0  
[SwitchB-ospf-1-area-0.0.0.0] network 194.1.1.0 0.0.0.255  
[SwitchB-ospf-1-area-0.0.0.0] network 192.1.1.0 0.0.0.255  
[SwitchB-ospf-1-area-0.0.0.0] quit  
[SwitchB-ospf-1] quit  
[SwitchB] bgp 200  
[SwitchB-bgp] undo synchronization  
[SwitchB-bgp] group b1 external  
[SwitchB-bgp] peer 192.1.1.1.1 group b1 as-number 100  
[SwitchB-bgp] group b2 internal  
[SwitchB-bgp] peer 194.1.1.1.1 group b2  
[SwitchB-bgp] peer 195.1.1.1.2 group b2  
[SwitchB-bgp] ipv4-family multicast  
[SwitchB-bgp-af-mul] peer b1 enable  
[SwitchB-bgp-af-mul] peer b2 enable  
3) Configure Switch C:  
[SwitchC] vlan 30  
[SwitchC-vlan30] port ethernet3/1/3  
[SwitchC-vlan30] quit  
[SwitchC] interface vlan-interface 30  
[SwitchC-Vlan-interface30] ip address 193.1.1.2 255.255.255.0  
[SwitchC-Vlan-interface30] quit  
[SwitchC] vlan 50  
[SwitchC-vlan50] port ethernet3/1/5  
[SwitchC-vlan50] quit  
[SwitchC] interface vlan-interface 50  
[SwitchC-Vlan-interface50] ip address 195.1.1.2 255.255.255.0  
[SwitchC-Vlan-interface50] quit  
[SwitchC] ospf  
[SwitchC-ospf-1] area 0  
[SwitchC-ospf-1-area-0.0.0.0] network 193.1.1.0 0.0.0.255  
[SwitchC-ospf-1-area-0.0.0.0] network 195.1.1.0 0.0.0.255  
[SwitchC-ospf-1-area-0.0.0.0] quit  
[SwitchC-ospf-1] quit  
[SwitchC] bgp 200  
[SwitchC-bgp] undo synchronization  
[SwitchC-bgp] group c1 external  
[SwitchC-bgp] peer 193.1.1.1 group c1 as-number 100  
31-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
[SwitchC-bgp] group c2 internal  
[SwitchC-bgp] peer 194.1.1.2 group c2  
[SwitchC-bgp] peer 195.1.1.1 group c2  
[SwitchC-bgp] ipv4-family multicast  
[SwitchC-bgp-af-mul] peer c1 enable  
[SwitchC-bgp-af-mul] peer c2 enable  
Configure the local preference attribute of Switch C.  
z
Add ACL 2000 on Switch C to permit network 1.0.0.0.  
[SwitchC] acl number 2000  
[SwitchC-acl-basic-2000] rule permit source 1.0.0.0 0.255.255.255  
[SwitchC-acl-basic-2000] quit  
z
Define the routing policy named "localpref". Set the local preference for the routes  
matching ACL 2000 to 200, and otherwise, to 100.  
[SwitchC] route-policy localpref permit node 10  
[SwitchC-route-policy] if-match acl 2000  
[SwitchC-route-policy] apply local-preference 200  
[SwitchC-route-policy] quit  
[SwitchC] route-policy localpref permit node 20  
[SwitchC-route-policy] apply local-preference 100  
z
Apply this routing policy to the inbound traffic from BGP neighbor 193.1.1.1  
(Switch A).  
[SwitchC] bgp 200  
[SwitchC-bgp] ipv4-family multicast  
[SwitchC-bgp-af-mul] peer 193.1.1.1 route-policy localpref import  
4) Configure Switch D:  
[SwitchD] vlan 40  
[SwitchD-vlan40] port ethernet4/1/4  
[SwitchD-vlan40] quit  
[SwitchD] interface vlan-interface 40  
[SwitchD-Vlan-interface40] ip address 194.1.1.1 255.255.255.0  
[SwitchD-Vlan-interface40] quit  
[SwitchD] vlan 50  
[SwitchD-vlan50] port ethernet4/1/5  
[SwitchD-vlan50] quit  
[SwitchD] interface vlan-interface 50  
[SwitchD-Vlan-interface50] ip address 195.1.1.1 255.255.255.0  
[SwitchD-Vlan-interface50] quit  
[SwitchD] ospf  
[SwitchD-ospf-1] area 0  
[SwitchD-ospf-1-area-0.0.0.0] network 194.1.1.0 0.0.0.255  
[SwitchD-ospf-1-area-0.0.0.0] network 195.1.1.0 0.0.0.255  
[SwitchD-ospf-1-area-0.0.0.0] network 4.0.0.0 0.0.0.255  
31-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 31 MBGP Multicast Extension Configuration  
[SwitchD-ospf-1-area-0.0.0.0] quit  
[SwitchD-ospf-1] quit  
[SwitchD] bgp 200  
[SwitchD-bgp] undo synchronization  
[SwitchD-bgp] group d1 internal  
[SwitchD-bgp] peer 194.1.1.2 group d1  
[SwitchD-bgp] peer 195.1.1.2 group d1  
[SwitchD-bgp] ipv4-family multicast  
[SwitchD-bgp-af-mul] peer d1 enable  
To make the configuration effective, you need to use the reset bgp all command on all  
MBGP neighbors.  
31-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
Chapter 32 ACL Configuration  
32.1 ACL Overview  
32.1.1 Introduction to ACL  
A series match rules must be configured to recognize the packets before they are  
filtered. Only when packets are identified, can the network take corresponding actions,  
allowing or prohibiting them to pass, according to the preset policies. Access control list  
(ACL) is targeted to achieve these functions.  
ACLs classify packets using a series of matching rules, which can be source addresses,  
destination addresses and port IDs. ACLs can be used globally on the switch or just at  
a port, through which the switch determines whether to forward or drop the packets.  
The matching rules defined in ACLs can also be imported to differentiate traffic in other  
situations, for example, defining traffic classification rules in QoS.  
An ACL rule can include many sub-rules, which may be defined for packets within  
different address ranges. Matching order is involved in matching an ACL.  
I. ACLs being activated directly on hardware  
ACLs can be delivered to hardware for traffic filtering and classification.  
The cases when ACLs are sent directly to hardware include: referencing ACLs to  
provide for QoS functions, filtering and forwarding packets with ACLs.  
II. ACLs being referenced by upper-level modules  
ACLs may also be used to filter and classify packets processed by software. Then you  
can define matching order for the sub-rules in an ACL. Two matching modes are  
available in this case: config (user-defined order) and auto (depth first by the system).  
You cannot modify the matching order once you define it for an ACL rule, unless you  
delete the rule and redefine the matching order.  
The cases when ACLs are referenced by upper-level modules include referencing  
ACLs to achieve routing policies, and using ACLs to control register users and so on.  
32-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
Note:  
Depth first principle means putting the statement with smaller packet range in the front.  
You can know the packet range by comparing IP address wildcards: The smaller the  
wildcard is, the smaller host range is. For example, the address 129.102.1.1 0.0.0.0  
specifies the host 129.102.1.1 and address 129.102.1.1 0.0.255.255 specifies the  
segment 129.102.1.1 to 129.102.255.255. Then 129.102.1.1 is surely put in the front.  
Specifically, for the statements of basic ACL rules, directly compare the wildcards of  
source addresses and follow config order if the wildcards are equal; for the ACL rules  
used in port packet filtering, the rules configured with any are put to the end and other  
rules follow config order; for advanced ACL rules, first compare the wildcards of source  
addresses, then the wildcards of destination addresses if those of source addresses  
are equal, then the port IDs if the wildcards of destination addresses are still equal.  
Follow config order if port IDs are also equal.  
Note:  
The user-defined ACL matching order takes effect only when multiple rules of one ACL  
are applied at the same time. For example, an ACL has two rules. If the two rules are  
not applied simultaneously, even if you configure the matching order to be depth first,  
the switch still matches them according to their application order.  
If one rule is a subset of another rule in an ACL, it is recommended to apply the rules  
according to the range of the specified packets. The rule with the smallest range of the  
specified data packets is applied first, and then other rules are applied based on this  
principle.  
32.1.2 ACLs Supported  
The switch supports these types of ACLs:  
z
z
z
z
z
z
z
z
Number-based basic ACLs  
Name-based basic ACLs  
Number-based advanced ACLs  
Name-based advanced ACLs  
Number-based L2 ACLs  
Name-based L2 ACLs  
Number-based user ACLs  
Name-based user ACLs  
The requirements for the various ACLs available on the switch are listed in the following  
table.  
32-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
Table 32-1 Requirements for defining ACLs  
Item  
Number range  
2000 to 2999  
Maximum number  
Number-based basic ACL  
Number-based advanced ACL  
Number-based L2 ACL  
Number-based user ACL  
Name-based basic ACL  
Name-based advanced ACL  
Name-based L2 ACL  
1000  
1000  
1000  
1000  
--  
3000 to 3999  
4000 to 4999  
5000 to 5999  
--  
--  
--  
--  
--  
Name-based user ACL  
Maximum sub-rules for an ACL  
--  
--  
0 to 127  
128  
12288  
Maximum sub-rules for the system --  
Table 32-2 Max ACL rules that can be activated on cards  
Card  
Max ACL rules per card/port  
1-port  
10GBASE-X  
(XENPAK)  
Advanced  
2-port 10GBASE-X (XFP) Advanced  
24-port 1000BASE-X (SFP) Advanced  
1012  
24-port 10/100/1000BASE-T (RJ45)  
Advanced  
48-port 10/100/1000BASE-T (RJ45)  
Access  
1024 or 2048  
1-port 10GBASE-X (XENPAK)  
2-port 10GBASE-X (XFP)  
ACL rules are based on the number of  
Packet Processors (PP) per blade. The  
24-port blades and 4-port 10G blades  
both use 2 PPs, therefore the max ACL  
rules is 2k (2048). The rest of the blades  
have a single PP and 1024 max ACL  
rules. The system can define up to 128  
rules per ACL for a maximum of  
Sum((number of ACLx) × (number of  
rules per ACLx)).  
4-port 10GBASE-X (XFP)  
12-port 1000BASE-X (SFP)  
24-port 1000BASE-X (SFP)  
24-port 10/100/1000BASE-T (RJ45)  
48-port 10/100/1000BASE-T (RJ45)  
32.2 ACL Configuration  
The following table describes the ACL configuration tasks for interface cards.  
32-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
Table 32-3 ACL configuration tasks  
No. Item  
Command  
Description  
Enter the system  
view  
1
2
3
<SW8800> system-view  
Configure  
time range  
the  
[SW8800] time-range  
Optional  
Define  
a
flow [SW8800]  
flow-template  
user-defined slot slotid template-info  
Optional  
template  
Enter the ACL  
view  
4
5
[SW8800] acl  
Required  
Required  
Define sub-rules  
[SW8800-acl-adv-3000] rule  
Exit ACL view  
[SW8800-acl-adv-3000] quit  
6
Enter  
Ethernet  
[SW8800] interface Ethernet 5/1/1  
port view  
Optional. You  
can  
this operation  
only when  
flow template  
perform  
Apply a defined  
flow template in [SW8800-Ethernet5/1/1]  
the Ethernet port flow-template user-defined  
view  
a
7
8
has  
been  
previously  
defined.  
[SW8800-Ethernet5/1/1]  
Activate the ACL  
Required  
packet-filter inbound  
32.2.1 Configuring Time Range  
You may set such items in time range configuration: The defined time range includes  
absolute time range and period time range. The absolute time range is in the form of  
hh:mm YYYY/MM/DD; the period time range is in the format of hh:mm, day.  
Perform the following configurations in system view.  
Table 32-4 Configure time range  
Operation  
Command  
time-range time-name  
{
start-time to end-time  
days-of-the-week [ from start-time start-date ] [ to end-time  
end-date ] | from start-time start-date [ to end-time  
end-date ] | to end-time end-date }  
Create time range  
undo time-range time-name [ start-time to end-time  
days-of-the-week [ from start-time start-date ] [ to end-time  
end-date ] | from start-time start-date [ to end-time  
end-date ] | to end-time end-date ]  
Delete time range  
32-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
start-time and end-time days-of-the-week define period time range together. start-time  
start-date and end-time end-date define absolute time range together.  
If a time range only defines the period time range, the time range is only active within  
the period time range.  
If a time range only defines the absolute time range, the time range is only active within  
the absolute time range.  
If a time range defines the period time range and the absolute time range, the time  
range is only active when the period time range and the absolute time range are both  
matched. For example, a time range defines a period time range which is from 12:00 to  
14:00 every Wednesday, and defines an absolute time range which is from 00:00  
2004/1/1 to 23:59 2004/12/31. This time range is only active from 12:00 to 14:00 every  
Wednesday in 2004.  
If neither starting time nor end time is specified, the time range is 24 hours (0:00 to  
24:00).  
If no end date is specified, the time range is from the date of configuration till the largest  
date available in the system.  
Currently the largest time range is 1970/01/01 to 2100/12/31 in the system.  
32.2.2 Defining and Applying Flow Template  
I. Defining Flow Template  
Flow template defines useful information used in flow classification. For example, a  
template defines a quadruple: source and destination IP, source and destination TCP  
ports, and then only those traffic rules including all these elements can be sent to target  
hardware and referenced for such QoS functions as packet filtering, traffic policing,  
priority re-labeling. Otherwise, the rules cannot be activated on the hardware and  
referenced.  
Perform the following configurations in system view.  
Table 32-5 Define flow template  
Operation  
Command  
Define flow template  
Delete flow template  
flow-template user-defined slot slotid template-info  
undo flow-template user-defined slot slotid  
Note that the sum of all elements should not be more than 16 bytes in length. The  
following table lists the length of the elements involved.  
32-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
Table 32-6 Length of template elements  
Name  
Description  
802.1p priority  
Length in template  
cos  
dip  
1 byte  
Destination IP field in IP packet header  
4 bytes  
6 bytes  
2 bytes  
Destination MAC field in Ethernet packet  
header  
dmac  
dport  
dscp  
Destination port field  
DSCP field in IP packet header  
IP precedence field in IP packet header  
ToS field in IP packet header  
EXP field in MPLS packet  
ip-precedence  
1 byte  
tos  
exp  
ethernet-protocol Protocol field in Ethernet packet header 4 bytes  
Flag field of fragment in IP packed  
fragment-flags  
No bytes  
header  
icmp-code  
icmp-type  
ip-protocol  
sip  
ICMP code field  
1 byte  
1 byte  
1 byte  
4 bytes  
6 bytes  
2 bytes  
1 byte  
2 bytes  
ICMP type field  
Protocol field in IP packet header  
Source IP field in IP packet header  
MAC field in Ethernet packet header  
Source port field  
smac  
sport  
tcp-flag  
vlanid  
Flag field in TCP packet header  
Vlan ID of the packet  
802.1p priority in the Internal 802.1Q tag  
(internal tag of QinQ tag-in-tag  
application)  
c-tag-cos  
2 bytes  
2 bytes  
Vlan ID in the internal 802.1Q tag  
(internal tag of QinQ tag-in-tag  
application)  
c-tag-vlanid  
bt-flag  
Flag for Bit Torrent peer-to-peer service 2 bytes  
Note:  
The numbers listed in the table are not the actual length of these elements in IP packets,  
but their length in flow template. DSCP field is one byte in flow template, but six bits in  
IP packets. You can judge the total length of template elements using these numbers.  
The dscp, exp, ip-precedence and tos fields jointly occupy one byte. One byte is  
occupied no matter you define one, two or three of these fields.  
32-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
The fragment-flags field is 0 in length in flow template, so it can be ignored in  
calculating the total length of template elements.  
You can either use the default template or define a flow template based on your needs.  
Note:  
Default flow template:  
ip-protocol tcp-flag sport dport icmp-type icmp-code sip 0.0.0.0 dip 0.0.0.0  
You cannot modify or delete the default flow template.  
II. Applying Flow Template  
Perform the following configurations in Ethernet port view or port group view to apply  
the user-defined flow template to current port or current port group.  
Table 32-7 Apply flow template  
Operation  
Command  
Apply the user-defined flow template  
Cancel the applied flow template  
flow-template user-defined  
undo flow-template user-defined  
32.2.3 Defining ACL  
The switch supports several types of ACLs, which are described in this section.  
Follow these steps to define an ACL  
1) Enter the corresponding ACL view  
2) Define ACL rules  
32-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
Note:  
z
If the time-range keyword is not selected, the ACL will be effective at any time after  
being activated.  
z
z
You can define multiple rules for the ACL by using the rule command several times.  
If the ACL is sent directly to hardware for packet filtering and traffic classification, the  
auto matching order is available and the user-defined (config) matching order  
becomes ineffective. If the ACL is used in filtering or classifying the packets  
processed by software, the config matching order is available. You cannot modify  
the matching order once you define that for an ACL rule.  
z
By default, ACL rules are matched in config order.  
I. Defining basic ACL  
Basic ACLs only make rules and process packets according to the source IP  
addresses.  
Perform the following configurations in the specified views.  
Table 32-8 Define basic ACL  
Operation  
Command  
Enter basic ACL view acl { number acl-number | name acl-name basic }  
(system view)  
[ match-order { config | auto } ]  
rule [ rule-id ] { permit | deny } [ source { source-addr  
wildcard | any } | fragment | time-range name |  
vpn-instance instance-name ]*  
Define an ACL rule  
(basic ACL view)  
Delete an ACL rule undo rule rule-id [ source | fragment | time-range |  
(basic ACL view)  
vpn-instance instance-name ]*  
Delete an ACL or all  
ACLs (system view)  
undo acl { number acl-number | name acl-name | all }  
II. Defining advanced ACL  
Advanced ACLs define classification rules and process packets according to the  
attributes of the packets such as source and destination IP addresses, TCP/UDP ports  
used, and packet priority. ACLs support three types of priority schemes: ToS (type of  
service) priority, IP priority and DSCP priority.  
Perform the following configurations in the specified view.  
32-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
Table 32-9 Define advanced ACL  
Operation  
Command  
Enter advanced ACL acl { number acl-number | name acl-name advanced }  
view (system view)  
[ match-order { config | auto } ]  
rule [ rule-id ] { permit | deny } protocol [ source  
{ source-addr wildcard | any } ] [ destination { dest-addr  
wildcard | any } ] [ source-port operator port1 [ port2 ] ]  
[ destination-port operator port1 [ port2 ] ] [ icmp-type  
type code ] [ established ] [ [ precedence precedence |  
tos tos ]* | dscp dscp ] [ fragment ] [ time-range name ]  
[ vpn-instance instance-name ]  
Define an ACL rule  
(advanced ACL view)  
undo rule rule-id [ source | destination | source-port |  
destination-port | icmp-type | precedence | tos | dscp |  
fragment | time-range | vpn-instance ]*  
Delete an ACL rule  
(advanced ACL view)  
Delete an ACL or all  
ACLs (system view)  
undo acl { number acl-number | name acl-name | all }  
Note that the port1 and port2 parameters in the command should be TCP/UDP ports for  
advanced applications. For some common ports, you can use mnemonic symbols to  
replace numbers. For example, you can use “bgp” to represent TCP port 179, which is  
for BGP protocol.  
III. Defining L2 ACLs  
L2 ACLs define the Layer 2 information such as source and destination MAC  
addresses, source VLAN ID, and L2 protocol type in their rules and process packets  
according to these attributes.  
Perform the following configurations in the specified view.  
Table 32-10 Define L2 ACLs  
Operation  
Command  
Enter L2 ACL view (system acl { number acl-number | name acl-name link }  
view)  
[ match-order { config | auto } ]  
rule [ rule-id ] { permit | deny } [ cos cos-value |  
{ arp | ip | mpls [ l2lable-range ] [ exp exp-value ] |  
nbx | pppoe-control | pppoe-data | rarp } | ingress  
Define an ACL rule (L2 ACL  
view)  
{
{
source-vlan-id  
source-mac-wildcard }*  
dest-mac-addr dest-mac-wildcard | any } |  
|
source-mac-addr  
|
any egress  
}
|
{
time-range name ]*  
Delete an ACL rule (L2 ACL  
view)  
undo rule rule-id  
Delete an ACL or all ACLs undo acl { number acl-number | name acl-name |  
(system view) all }  
32-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
32.2.4 Activating ACL  
After defining an ACL, you must activate it. This configuration activates those ACLs to  
filter or classify the packets forwarded by hardware.  
For interface cards, perform the following configurations in Ethernet port view or port  
group view.  
Table 32-11 Activate ACL  
Operation  
Command  
packet-filter inbound ip-group  
acl-name } [ rule rule [ system-index index ] ]  
{
acl-number  
|
Activate IP group ACL  
undo packet-filter inbound ip-group { acl-number |  
acl-name } [ rule rule ]  
Deactivate IP group ACL  
packet-filter inbound ip-group  
{
acl-number  
|
Activate IP group ACL  
and link group ACL at  
same time  
acl-name } { rule rule link-group { acl-number |  
acl-name } [ rule rule [ system-index index ] ] |  
link-group { acl-number | acl-name } rule rule }  
undo packet-filter inbound ip-group { acl-number |  
acl-name } { rule rule link-group { acl-number |  
acl-name } [ rule rule ] | link-group { acl-number |  
acl-name } rule rule }  
Deactivate IP group ACL  
and link group ACL at  
same time  
packet-filter inbound link-group { acl-number |  
acl-name } [ rule rule [ system-index index ] ]  
Activate link group ACL  
Deactivate link group undo packet-filter inbound link-group { acl-number |  
ACL acl-name } [ rule rule ]  
system-index index here is the system index for an ACL rule. When delivering a rule,  
the system assigns an index to it, for convenience of later retrieval. You can also assign  
a system index for it when activating an ACL rule with this command. However, you are  
not recommended to assign a system index if not urgently necessary.  
32.3 Displaying and Debugging ACL Configurations  
After these configurations are completed, you can use the display command in any  
view to view ACL running to check configuration result. You can clear ACL statistics  
using the display command in user view.  
Table 32-12 Display and debug ACL configurations  
Operation  
Command  
Display time range configuration  
display time-range { all | name }  
32-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Display ACL configuration  
Chapter 32 ACL Configuration  
display acl config { all | acl-number |  
acl-name }  
display acl running-packet-filter { all |  
interface { interface-name | interface-type  
interface-num } | vlan vlan-id }  
Display  
information  
ACL  
application  
display flow-template [ default | interface  
interface-type interface-num | slot slotid |  
user-defined]  
Display configuration information  
of flow template  
reset acl counter { all | acl-number |  
acl-name }  
Clear ACL statistics  
The display acl config command only displays the ACL matching information  
processed by the CPU. You can use the display qos-interface traffic-statistic  
commands to view the ACL matching information during data forwarding.  
See the corresponding Command Manual for description of parameters.  
32.4 ACL Configuration Example  
32.4.1 Advanced ACL Configuration Example  
I. Network requirements  
The departments in the intranet are connected through 100 Mbps ports of the switches.  
The research and development (R&D) department is connected through the port  
Ethernet2/1/1. The wage server of the financial department is at 129.110.1.2. The  
requirement is to configure ACLs correctly to limit that the R&D department can only  
access the wage server at working time from 8:00 to 18:00.  
II. Network diagram  
President's office  
129.111.1.2  
Wage server  
129.110.1.2  
Switch  
#4  
#3  
#2  
#1  
Administrative Dept  
Financial Dept  
To router  
Figure 32-1 Network diagram for advanced ACL configuration  
32-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
III. Configuration procedure  
Note:  
Only the commands concerning ACL configuration are listed here.  
1) Define the time range.  
Define the time range from 8:00 to 18:00.  
[SW8800] time-range 3Com 8:00 to 18:00 working-day  
2) Define inbound traffic to the wage server.  
Create a name-based advanced ACL “traffic-of-payserver” and enter it.  
[SW8800] acl name traffic-of-payserver advanced  
Define ACL rule for the wage server.  
[SW8800-acl-adv-traffic-of-payserver] rule 1 deny ip source any destination  
129.110.1.2 0.0.0.0 time-range 3Com  
3)  
Activate the ACL.  
Activate the ACL “traffic-of-payserver”.  
[SW8800-Ethernet2/1/1] packet-filter inbound ip-group traffic-of-payserver  
32.4.2 Basic ACL Configuration Example  
I. Network requirements  
With proper basic ACL configuration, during the time range from 8:00 to 18:00 everyday  
the switch filters the packets from the host with source IP 10.1.1.1 (the host is  
connected through the port Ethernet2/1/1 to the switch.)  
II. Network diagram  
To router  
#1  
Switch  
Figure 32-2 Network diagram for basic ACL configuration  
III. Configuration procedure  
32-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 32 ACL Configuration  
Note:  
Only the commands concerning ACL configuration are listed here.  
1) Define the time range.  
Define the time range from 8:00 to 18:00.  
[SW8800] time-range 3Com 8:00 to 18:00 daily  
2) Define the traffic with source IP 10.1.1.1.  
Create a name-based basic ACL “traffic-of-host” and enter it.  
[SW8800] acl name traffic-of-host basic  
Define ACL rule for source IP 10.1.1.1.  
[SW8800-acl-basic-traffic-of-host] rule 1 deny source 10.1.1.1 0 time-range  
3Com  
3) Activate the ACL.  
Activate the ACL “traffic-of-host”.  
[SW8800-Ethernet2/1/1] packet-filter inbound ip-group traffic-of-host  
32.4.3 L2 ACL Configuration Example  
I. Network requirements  
With proper L2 ACL configuration, during the time range from 8:00 to 18:00 everyday  
the switch filters the packets with source MAC 00e0-fc01-0101 and destination MAC  
00e0-fc01-0303 (configuring at the port Ethernet2/1/1 to the switch.)  
II. Network diagram  
To router  
#1  
Switch  
Figure 32-3 Network diagram for L2 ACL configuration  
III. Configuration procedure  
Note:  
Only the commands concerning ACL configuration are listed here.  
32-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
1) Define the time range.  
Chapter 32 ACL Configuration  
Define the time range from 8:00 to 18:00.  
[SW8800] time-range 3Com 8:00 to 18:00 daily  
2) Define a user-defined flow template  
[SW8800] flow-template user-defined slot 3 ethernet-protocol smac 0-0-0 dmac  
0-0-0  
3) Define the traffic with source MAC 00e0-fc01-0101 and destination MAC  
00e0-fc01-0303.  
Create a name-based L2 ACL “traffic-of-link” and enter it.  
[SW8800] acl name traffic-of-link link  
Define ACL rule for the traffic with source MAC 00e0-fc01-0101 and destination MAC  
00e0-fc01-0303.  
[SW8800-acl-link-traffic-of-link] rule 1 deny ingress 00e0-fc01-0101 0-0-0  
egress 00e0-fc01-0303 0-0-0 time-range 3Com  
[SW8800-acl-link-traffic-of-link] quit  
4) Apply the user-defined flow template to the port and activate the ACL.  
Apply the user-defined flow template to Ethernet2/1/1.  
[SW8800] interface Ethernet2/1/1  
[SW8800-Ethernet2/1/1] flow-template user-defined  
Activate the ACL “traffic-of-link”.  
[SW8800-Ethernet2/1/1] packet-filter inbound link-group traffic-of-link  
32-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Chapter 33 QoS Configuration  
33.1 QoS Overview  
Conventional packet network treats all packets equally. Each switch/router processes  
all packets in First-in-First-out (FIFO) mode and then transfers them to the destination  
in the best effort, but it provides no commitment and guarantee to such transmission  
performance as delay and jitter.  
With fast growth of computer networks, more and more data like voice and video that  
are sensitive to bandwidth, delay and jitter are transmitted over the network. This  
makes growing demands on quality of service (QoS) of networks.  
Ethernet technology is a widely-used network technology dominant for independent  
LANs and many LANs based on Ethernet are organic parts of the Internet. In addition,  
Ethernet access is becoming one of the major access modes for Internet users.  
Therefore it is inevitable to consider Ethernet QoS if we want to achieve point-to-point  
global QoS solution. Ethernet switching devices then naturally need to provide different  
QoS guarantee for different types of services, especially for those which are sensitive  
to delay and jitter.  
The following terms are involved in QoS.  
I. Flow  
It refers to all packets passing thought the switch.  
II. Traffic classification  
Traffic classification is the technology that identifies the packets with a specified  
attribute according to a specific rule. Classification rule refers to a packet filtering rule  
configured by an administrator. A classification rule can be very simple. For example,  
the switch can identify the packets of different priority levels according to the ToS (type  
of service) field in the packet headers. It can also be very complex. For example, it may  
contain information of the link layer (layer 2), network layer (layer 3) and transport layer  
(layer 4) and the switch classifies packets according to such information as MAC  
address, IP protocol, source address, destination address and port ID. Classification  
rule often is limited to the information encapsulated at the packet header, rarely using  
packet contents.  
III. Packet filtering  
Packet filtering refers to filtering operation applied to traffic flow. For example, the deny  
operation drops the traffic flow which matches the classification rule and allows other  
traffic to pass. Ethernet switches use complex classification rules, so that traffic flow  
can be filtered purposefully to enhance network security.  
33-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
There are two key steps in packet filtering:  
Step 1: Classify the traffic at the port according to a specific rule.  
Step 2: Run filtering operation (deny or permit) to the identified traffic. By default, deny  
operation is selected.  
IV. Traffic policing  
QoS can police traffic at the ingress port, to provide better services with the limited  
network resources.  
V. Redirection  
You can re-specify forwarding port for packets, based on QoS policy.  
VI. Traffic priority  
Ethernet switches can provide priority tags, including ToS, DSCP, 802.1p, and so on,  
for specific packets. These priority tags are applicable to different QoS models.  
The following describes IP priority, ToS priority, DCSP priority, Exp priority and 802.1p  
priority.  
1) IP priority, ToS priority, DSCP priority and Exp priority  
Figure 33-1 DS field and ToS byte  
As shown in Figure 33-1, the ToS field in the IP header contains 8 bits. The first three  
bits represent IP priority, in the range of 0 to 7; bits 3-6 stand for ToS priority, in the  
range of 0 to 15. RFC2474 redefines the ToS field in IP packets as DS (differentiated  
services) field. The first six bits denote DSCP (differentiated services codepoint) priority,  
in the range of 0 to 63, the latter two bits are reserved. The first three bits (bit 0~2) of  
DSCP priority represent Exp priority, in the range of 0 to 7.  
2) 802.1p priority  
802.1p priority is stored in the header of L2 packets and is suitable for the case where  
only L2 QoS guarantee, not L3 header analysis, is required.  
33-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Figure 33-2 Ethernet frame with 802.1Q tag header  
In the above figure, each host supporting 802.1Q protocol adds a 4-byte 802.1Q tag  
header after the source address in Ethernet header.  
The 802.1Q tag header contains a 2-byte TPID (Tag protocol Identifier, with the value  
8100) and a 2-byte TCI (tag control information). TPID is newly defined by IEEE to  
represent a packet with 802.1Q tag added. The contents of 802.1Q tag header are  
shown in Figure 33-3.  
Figure 33-3 802.1Q tag header  
In the figure, the priority field in TCI stands for 802.1p priority, which consists of three  
bits. There are eight priority levels, numbered as 0 to 7, for determining to send which  
packets first when switch congestion takes place.  
Since their applications are defined in detail in the 802.1p Recommendation, they are  
named as 802.1p priority levels.  
VII. Queue scheduling  
Queue scheduling is used to resolve problems of resource contention by many packets.  
These algorithms are often used in queue scheduling: strict priority (SP) algorithm and  
weighted round Robin (WRR) algorithm.  
1) SP algorithm  
33-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
high priority  
queue 7  
queue 6  
queue 5  
Packets sent via this  
interface  
Packets sent  
queue 4  
Dequeue Sending queue  
Classify  
queue 3  
queue 2  
queue 1  
queue 0  
Low priority  
Figure 33-4 Priority queues  
SP algorithm is designed for key services. One of the characteristics of key services is  
these services should be processed first to minimize response delay during switch  
congestion. For example, there are eight outbound queues at the port, numbered  
respectively as 7 to 0, with priority levels in descending order.  
In SP mode, the system first sends those packets of higher priority in strict accordance  
with priority order. Only when packets in high priority queue are all sent can those in  
lower priority queue be sent. This manner of putting key-service packets into high  
priority queue and non-key service packets into low priority queue does ensure that  
key-service packets are sent first, while non-key service packets are sent during the  
interval when no key-service packets needs to be processed.  
SP algorithm also has its disadvantages: If high priority queues always have packets for  
a long period, then the packets in low queues may die of hunger for being processed.  
2) WRR algorithm  
Each port supports eight outbound queues except that port of XP4 board only supports  
four queues. In WRR mode, the system processes the queues by turn, so every queue  
can have a service period.  
See the case where the port supports eight outbound queues. Every queue is assigned  
with a weight value (respectively numbered as w7, w6, w5, w4, w3, w2, w1 and w0),  
which indicates the weight in obtaining resources. For a 100 Mbps port, the weight  
values are set as 50, 30, 10, 10, 50, 30, 10 and 10 (corresponding respectively to w7,  
w6, w5, w4, w3, w2, w1 and w0). The even the queue with the lowest priority can be  
allocated with a 5 Mbps bandwidth.  
33-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Another merit for WRR algorithm: Though the queues are scheduled by turn, they are  
not configured with fixed time quantum. If a queue has no packets, the system  
immediately schedules the next queue. Then bandwidth resources can be fully utilized.  
VIII. Traffic mirroring  
Traffic mirroring duplicates specified packets to CPU for network test and  
troubleshooting.  
IX. Port mirroring  
Port mirroring duplicates all packets at a specified port to the monitoring port for  
network test and troubleshooting.  
X. Flow-based traffic statistics  
The system can make traffic statistics based on flow for further analysis.  
33.2 Introduction to Port Group-Based QoS Configuration  
To configure QACL for a port group on the Switch 8800, you only need to create a port  
group and configure QACL for the group. Then the configuration becomes valid for all  
members in the group. This group-based QACL configuration saves you from  
configuring QACL for individual ports. After this configuration, the QACL configuration  
of each member port remains consistent forever.  
33.2.1 Group-Based QoS Configuration Task  
The following table describes the group-based QoS configuration tasks. (Suppose the  
flow template and ACL are defined already.)  
Table 33-1 Group-based QoS Configuration tasks  
Item  
Command  
Description  
Enter system view system-view  
Required.  
Enter port group  
port-group index  
view  
index: group number. For a  
common interface board, it  
ranges from 1 to 128.  
Required.  
interface_list  
{ interface_type interface_num  
interface_name to  
=
Add ports to the  
port interface_list  
port group  
|
}
[
{ interface_type interface_num  
| interface_name } ] &<1-n>.  
33-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Item  
Command  
Description  
Optional.  
Apply  
template  
flow  
Refer to section 32.2.2  
Template”.  
flow-template user-defined  
Optional.  
Activate ACL  
packet-filter inbound  
Refer to section 32.2.4  
Optional.  
Configure  
precedence  
port  
local  
Refer to section 33.3.1  
for priority priority-level  
Optional.  
Configure traffic  
policing  
traffic-limit inbound  
Refer to section 33.3.2  
Optional.  
traffic-shape  
queue-id  
burst-size  
[
queue  
max-rate  
Configure traffic  
shaping  
]
Refer to section 33.3.3  
Optional.  
Configure traffic  
priority  
traffic-priority inbound  
Refer to section 33.3.4  
Optional.  
Configure traffic  
redirection  
Refer to section 33.3.5  
traffic-redirect inbound  
queue-scheduler  
wrr  
queue-id  
queue-weight } &<1-8>  
group2 queue-id  
queue-weight } &<1-8> }*  
Optional.  
Configure queue  
scheduling  
algorithm  
{
group1  
{
Refer to section 33.3.6  
|
{
Optional.  
Configure  
algorithm  
drop drop-mode  
{
tail-drop  
|
Refer to section 33.3.7  
wred } [ wred-index ]  
mirrored-to inbound  
traffic-statistic inbound  
Parameters”.  
Optional.  
Configure traffic  
mirroring  
Refer to section 33.3.8  
Optional.  
Configure traffic  
statistics  
Refer to section 33.3.10  
33-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Item  
Command  
Description  
You can execute the display  
command in any view to check  
the QoS configuration.  
Display  
configuration  
QoS  
display  
Refer to section 33.3.11  
For the common interface boards except XP4, note that:  
z
The port group members must be on the same board and each port can only be  
added to one port group.  
z
The aggregated port cannot be added to the port group. If a port group member is  
to be aggregated, it exits from the port group automatically and the configuration of  
the primary port in an aggregated group overrides that of this port.  
When a single port is added to a port group, its configuration is overridden by that  
of the port group and the ACL rule cannot be applied to the port any longer.  
If there is no port in the port group, you cannot configure the QACL. If all the ports  
exist from the port group, the QACL configuration of the group still exists. And this  
configuration is applied again when new ports are added.  
z
z
For the XP4 board, the system creates two port groups by default. One group contains  
ports 0 and 1, and the other contains ports 2 and 3. Their group numbers are 300 + 2 x  
slot-no and 300 + 2 x slot-no + 1 (slot-no is the slot where the XP4 board locates)  
respectively, which are automatically assigned by the system. For example, when the  
XP4 board locates in slot 1, the group numbers are 302 and 303.  
When configuring port groups for the XP4 board, pay attention to the following  
limitation:  
z
configure new port groups, and not allowed to join/remove any port into/from port  
group.  
z
The QACL commands are only allowed to be executed on port groups instead of  
individual ports.  
z
z
Traffic shaping is not supported.  
Port mirroring across groups are not supported. You can configure one incoming  
and one outgoing monitoring ports for each group (other kinds of interface boards  
have each of the monitoring ports per board).  
z
Four output queues are supported for queue scheduling.  
33.2.2 Configuration Example for port group  
I. Network requirements  
Forward the packets sent from PC1 (IP 1.0.0.1), PC2(IP 2.0.0.1) during the time range  
from 8:00 to 18:00 every day to the address 3.0.0.1.  
33-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
II. Network diagram  
3.0.0.1/8  
PC3  
GE7/1/8  
GE7/1/2  
GE7/1/1  
VLAN2,  
1.0.0.1/8  
VLAN3,  
2.0.0.1/8  
PC2  
PC1  
Figure 33-5 Network diagram for traffic redirection configuration  
III. Configuration procedure  
1) Define the time range.  
Define the time range from 8:00 to 18:00.  
[SW8800] time-range 3Com 8:00 to 18:00 daily  
2) Define the traffic from PC1.  
Create a number-based basic ACL 2000 and enter it.  
[SW8800] acl number 2000  
Define ACL rule for the traffic from PC1.  
[SW8800-acl-basic-2000] rule 0 permit source 1.0.0.1 0 time-range 3Com  
[SW8800-acl-basic-2000] quit  
3) Create a port group.  
Create port group 1 and enter the port group view.  
[SW8800] port-group 1  
Add the ports GE7/1/1and GE7/1/2 to port group 1.  
[SW8800-port-group1] port GigabitEthernet 7/1/1 GigabitEthernet 7/1/2  
4) Modify the next hop for the packets from PC1.  
Define the next hop for the packets from port group 1 as 3.0.0.1.  
[SW8800-port-group1] traffic-redirect inbound ip-group 2000 rule 0 next-hop  
3.0.0.1  
33.3 QoS Configuration  
The following sections describe QoS configuration tasks.  
z
z
33-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
z
z
z
z
z
z
z
Before initiating any of these QoS configuration tasks, you should first define the  
corresponding ACL. Then you can achieve packet filtering just by activating the right  
ACL.  
To configure packet filtering, you need only to activate corresponding ACL. For more  
details, refer to the section 32.2.4 .  
Some of QoS terms are listed in the following table.  
Table 33-2 QoS terms  
Term  
Description  
It has the same meaning as 802.1p priority. Both refer to the  
priority at packet header, with the value ranging from 0 to 7.  
CoS  
Switch allocates a set of parameters, which are used in  
achieving QoS functions, upon receiving a packet. Four items  
are included: 802.1p priority, DSCP priority, local precedence  
and drop precedence.  
Service  
parameters  
One of service parameters, ranging from 0 to 2. Drop  
precedence is allocated when the switch receives the packet  
and may be when the packet is processed. Allocating drop  
precedence to the packet is also called coloring the packet: the  
packet with drop precedence 2 as red, that with drop  
precedence 1 as yellow and that with drop precedence 0 as  
green. Drop precedence is referred to when switch needs to  
drop packets in its congestion.  
Drop-precedence  
The result calculated from the user-defined CIR, CBS, EBS,  
PIR and actual traffic when the switch runs traffic policing, in the  
range of 0 to 2. It is used as a parameter in the traffic-limit  
command (here the value depends on the calculated result). It  
is also involved in the DSCP + Conform level > Service  
parameter mapping table which is used in re-allocating service  
parameters to a packet with the traffic-priority command.  
Then Conform-Level must be 0.  
Conform-Level  
33.3.1 Configuring Service Parameter Allocation Rule  
QoS is based on service parameters, a set of parameters for a packet, including 802.1p  
priority (CoS priority), DSCP priority, EXP priority, local precedence and drop  
precedence.  
33-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
After receiving a packet, the switch allocates a set of service parameters to it according  
to a specific rule. The switch first gets its local precedence and drop precedence  
according to the packet 802.1p priority value, by searching in the CoS >  
Local-precedence mapping table and the CoS > Drop-precedence mapping table.  
Default values are available for the two mapping tables, but you can also configure the  
mapping tables according to your needs. If the switch fails in allocating local  
precedence for the packet, it configures the local precedence of the packet to be the  
precedence of the port that receives this packet. After obtaining the packet CoS value  
by inverse-searching the CoS > Local-precedence mapping table, the switch then  
gets its drop precedence from the CoS > Drop-precedence mapping table.  
I. Configuring mapping table  
Perform the following configurations in system view.  
Table 33-3 Configure mapping tables  
Operation  
Command  
qos  
cos-drop-precedence-map  
cos0-map-drop-prec  
cos1-map-drop-prec  
cos2-map-drop-prec  
cos3-map-drop-prec  
cos4-map-drop-prec  
cos5-map-drop-prec  
cos6-map-drop-prec  
cos7-map-drop-prec  
Configure  
Drop-precedence mapping table  
the  
CoS  
>
Restore the default values of CoS >  
Drop-precedence mapping table  
undo qos cos-drop-precedence-map  
qos  
cos-local-precedence-map  
cos0-map-local-prec  
cos1-map-local-prec  
cos2-map-local-prec  
cos3-map-local-prec  
cos4-map-local-prec  
cos5-map-local-prec  
cos6-map-local-prec  
cos7-map-local-prec  
Configure  
Local-precedence mapping table  
the  
CoS  
>
Restore the default values of CoS >  
Local-precedence mapping table  
undo qos cos-local-precedence-map  
By default, the switch obtains local precedence and drop precedence according to the  
default mapping values.  
II. Configuring default local precedence for port  
Perform the following configurations in Ethernet port view or port group view.  
33-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Table 33-4 Configure default local precedence for port  
Operation  
Command  
Configure default local precedence for a port  
priority priority-level  
Restore the default local precedence for a port undo priority  
33.3.2 Configuring Traffic Policing  
Traffic policing refers to rate limit based on traffic. If the traffic threshold is exceeded,  
corresponding measures will be taken, for example, dropping the excessive packets or  
re-defining their priority levels.  
In the traffic supervision action, the switch uses the service parameters allocated  
according to the DSCP + Conform-Level > Service parameter mapping table and the  
EXP + Conform-Level > Service parameter mapping table and the 802.1p priority  
values allocated according to the Local-precedence + Conform-Level > 802.1p  
priority mapping table. So you should configure these three mapping tables or use their  
default values.  
I. Configuring mapping tables  
Perform the following configurations in the specified views.  
Table 33-5 Configure mapping table  
Operation  
Enter conform level view (System view) qos conform-level conform-level-value  
Configure the DSCP + Conform-Level  
Command  
dscp dscp-list : dscp-value exp-value  
> Service parameters mapping table cos-value  
local-precedence-value  
drop-precedence  
(conform level view)  
Restore the default values of the DSCP  
+
Conform-Level —  
>
Service  
undo dscp dscp-list  
parameters mapping table (conform  
level view)  
Configure the EXP + Conform-Level > exp exp-list : dscp-value exp-value  
cos-value  
drop-precedence  
local-precedence-value  
Service parameters mapping table  
(conform level view)  
Restore the default values of the EXP +  
Conform-Level > Service parameters undo exp exp-list  
mapping table (conform level view)  
local-precedence  
cos-value0  
cos-value3  
cos-value6  
Configure the Local-precedence  
Conform-Level > mapping table  
(conform level view)  
+
cos-value1  
cos-value4  
cos-value7  
cos-value2  
cos-value5  
33-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Restore the default values of the  
Local-precedence + Conform-Level > undo local-precedence  
mapping table (conform level view)  
The system provides default mapping tables.  
II. Configuring traffic policing  
The purpose of this configuration task is to implement traffic policing on ACL-matched  
data streams, and then take normal actions on data streams within the traffic limit and  
take other actions (discarding packets, for example) on those exceeding the limit.  
For interface cards, perform the following configurations in Ethernet port view or port  
group view.  
Table 33-6 Configure traffic policing  
Operation  
Command  
traffic-limit inbound ip-group { acl-number | acl-name }  
Configure traffic policing [ rule rule [ system-index index ] ] [ tc-index index ] cir  
which only applies IP cbs ebs [ pir ] [ conform { { remark-cos |  
group ACL  
remark-drop-priority }* | remark-policed-service } ]  
[ exceed { forward | drop } ]  
Remove traffic policing  
undo traffic-limit inbound ip-group { acl-number |  
acl-name } [ rule rule ]  
setting  
which  
only  
applies IP group ACL  
traffic-limit inbound ip-group { acl-number | acl-name }  
Configure traffic policing { rule rule link-group { acl-number | acl-name } [ rule  
which applies IP group rule [ system-index index ] ] | link-group { acl-number |  
ACL and link group ACL acl-name } rule rule } [ tc-index index ] cir cbs ebs [ pir ]  
at same time  
[ conform { { remark-cos | remark-drop-priority }* |  
remark-policed-service } ] [ exceed { forward | drop } ]  
Remove traffic policing undo traffic-limit inbound ip-group { acl-number |  
setting which applies IP acl-name } { rule rule link-group { acl-number |  
group ACL and link acl-name } [ rule rule ] | link-group { acl-number |  
group ACL at same time acl-name } rule rule }  
traffic-limit inbound link-group  
{
acl-number  
|
Configure traffic policing acl-name } [ rule rule [ system-index index ] ] [ tc-index  
which only applies link index ] cir cbs ebs [ pir ] [ conform { { remark-cos |  
group ACL  
remark-drop-priority }* | remark-policed-service } ]  
[ exceed { forward | drop } ]  
Remove traffic policing  
undo traffic-limit inbound link-group { acl-number |  
acl-name } [ rule rule ]  
setting  
which  
only  
applies link group ACL  
33-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Note:  
z
z
The parameters of traffic policy must be the same if you configure the same tc-index  
for different traffic; otherwise the system prompts you for the wrong configuration.  
For traffic policing configuration over the port group, all ports in the group shares the  
same bandwidth, that is, the traffic parameters you define take effect on all ports in  
the group.  
Caution:  
z
Before configuring traffic policing, you must first define corresponding ACLs and  
configure the DSCP+ Conform-Level —> Service parameters mapping table and  
the Local-precedence + Conform-Level —> 802.1p priority mapping table.  
You must first define the corresponding ACL and configure the DSCP + Conform-Level  
> Service parameters mapping table and Local-precedence + Conform-Level >  
mapping table before starting this configuration.  
This configuration achieves traffic policing for the packets that match the ACL. If the  
traffic rate threshold is exceeded, corresponding measures will be taken, for example,  
dropping excessive packets.  
system-index index here is the system index for an ACL rule. When delivering a rule,  
the system assigns an index to it, for convenience of later retrieval. You can also assign  
a system index for it when delivering an ACL rule with this command. However, you are  
not recommended to assign a system index if not urgently necessary.  
tc-index index here is traffic policing index, in the range of 0 to 12288. If you configure  
the same index for different ACL rules during setting traffic policing, then the sum of  
traffic shall be limited by the traffic policing-related parameters predefined. For example,  
if CIR (committed information rate) of the traffic that matches ACL1 is set to 10 kbps  
and that for ACL2 to 10 kbps, and their traffic policing indexes are the same, then the  
average rate of the traffic that matches ACL1 and ACL2 shall be limited to 10kbps.  
See the corresponding Command Manual for details of the commands.  
33.3.3 Configuring Traffic Shaping  
Traffic shaping controls the rate of outbound packets, to ensure they are sent at  
relatively average rates. Traffic shaping measure tries to match packet transmission  
rate with the capacity of downstream devices. Its major difference from traffic policing is:  
Traffic shaping buffers packets at over-threshold rates to make them sent at average  
33-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
rates, while traffic policing drops excessive packets. Therefore, traffic shaping may  
increase transmission delay, but not for traffic policing.  
Perform the following configurations in Ethernet port view or port group view.  
Table 33-7 Configure traffic shaping  
Operation  
Command  
traffic-shape [ queue queue-id ] max-rate  
burst-size  
Configure traffic shaping  
Remove traffic shaping setting  
undo traffic-shape [ queue queue-id ]  
The switch supports traffic shaping based on port, that is, all traffic on the port is shaped.  
It also supports traffic shaping for a specific queue. You can choose to achieve one of  
them by selecting different parameters in the command.  
See the corresponding Command Manual for details of the commands.  
33.3.4 Configuring Traffic Priority  
This configuration re-labels priority value for the packets that match the ACL in these  
ways: using the service parameters allocated by the switch, re-allocating service  
parameters by searching the mapping table based on the packet DSCP value,  
re-allocating service parameters by searching the mapping table based on the  
specified DSCP value and EXP value, customizing service parameters for the packets.  
For interface cards, perform the following configurations in Ethernet port view or port  
group view.  
Table 33-8 Configure traffic priority  
Operation  
Command  
traffic-priority inbound ip-group { acl-number |  
acl-name } [ rule rule [ system-index index ] ] { auto  
| remark-policed-service { trust-dscp | dscp  
dscp-value | untrusted dscp dscp-value cos  
cos-value local-precedence local-precedence  
drop-priority drop-level } }  
Configure traffic priority  
which only applies IP group  
ACL  
Remove  
setting which only applies IP  
group ACL  
traffic  
priority  
undo  
traffic-priority  
inbound  
ip-group  
{ acl-number | acl-name } [ rule rule ]  
traffic-priority inbound ip-group { acl-number |  
acl-name } { rule rule link-group { acl-number |  
Configure traffic priority acl-name } [ rule rule [ system-index index ] ] |  
which applies IP group ACL link-group { acl-number | acl-name } rule rule }  
and link group ACL at same { auto | remark-policed-service { trust-dscp |  
time  
dscp dscp-value | untrusted dscp dscp-value cos  
cos-value local-precedence local-precedence  
drop-priority drop-level } }  
33-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Remove  
traffic  
priority undo  
traffic-priority  
inbound  
ip-group  
setting which applies IP { acl-number | acl-name } { rule rule link-group  
group ACL and link group { acl-number | acl-name } [ rule rule ] | link-group  
ACL at same time  
{ acl-number | acl-name } rule rule }  
traffic-priority inbound link-group { acl-number |  
acl-name } [ rule rule [ system-index index ] ] { auto  
| remark-policed-service { trust-dscp | dscp  
dscp-value | untrusted dscp dscp-value cos  
cos-value local-precedence local-precedence  
drop-priority drop-level } }  
Configure traffic priority  
which only applies link group  
ACL  
Remove  
setting which only applies  
link group ACL  
traffic  
priority  
undo  
traffic-priority  
inbound  
link-group  
{ acl-number | acl-name } [ rule rule ]  
system-index index here is the system index for an ACL rule. When delivering a rule,  
the system assigns an index to it, for convenience of later retrieval. You can also assign  
a system index for it when delivering an ACL rule with this command. However, you are  
not recommended to assign a system index if not urgently necessary.  
Note:  
z
z
For MPLS packets, other than that the dscp-value stands for their DSCP priority  
value, the three low-order bits of the value represent the EXP flag field. You set the  
EXP value when defining the dscp-value.  
The DSCP + Conform-Level 0 —> Service parameters mapping table and the EXP  
+ Conform-Level —> Service parameters mapping table (the mapping table for  
conform level 0) is used here.  
See the corresponding Command Manual for details of the commands.  
33.3.5 Configuring Traffic Redirection  
Traffic redirection changes packet forwarding direction, to CPU, other ports, other IP  
addresses or other cards.  
For interface cards, perform the following configurations in Ethernet port view or port  
group view.  
33-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Table 33-9 Configure traffic redirection  
Operation  
Command  
traffic-redirect inbound ip-group { acl-number |  
Configure traffic redirection acl-name } [ rule rule [ system-index index ] ] { cpu  
which only applies IP group  
ACL  
|
interface  
{
interface-name  
|
interface-type  
interface-num } destination-vlan { l2-vpn | l3-vpn } |  
next-hop ip-addr1 [ ip-addr2 ] | slot slotid vlanid }  
Remove traffic redirection  
setting which only applies IP  
group ACL  
undo  
traffic-redirect  
inbound  
ip-group  
{ acl-number | acl-name } [ rule rule ]  
traffic-redirect inbound ip-group { acl-number |  
Configure traffic redirection acl-name } [ rule rule ] link-group { acl-number |  
which applies IP group ACL acl-name } [ rule rule ] ] { cpu | interface  
and link group ACL at same { interface-name | interface-type interface-num }  
time  
destination-vlan { l2-vpn | l3-vpn } | next-hop  
ip-addr1 [ ip-addr2 ] | slot slotid vlanid }  
undo  
traffic-redirect  
inbound  
ip-group  
{ acl-number | acl-name } { rule rule link-group  
{ acl-number | acl-name } [ rule rule ] | link-group  
{ acl-number | acl-name } rule rule } or  
Remove traffic redirection  
setting which applies IP  
group ACL and link group  
ACL at same time  
undo  
traffic-redirect  
inbound  
link-group  
{ acl-number | acl-name } { rule rule ip-group  
{ acl-number | acl-name } | ip-group { acl-number |  
acl-name } rule rule }  
traffic-redirect inbound link-group { acl-number |  
Configure traffic redirection acl-name } [ rule rule [ system-index index ] ] { cpu  
which only applies link group  
ACL  
|
interface  
{
interface-name  
|
interface-type  
interface-num } destination-vlan { l2-vpn | l3-vpn } |  
next-hop ip-addr1 [ ip-addr2 ] | slot slotid vlanid }  
Remove traffic redirection  
setting which only applies  
link group ACL  
undo  
traffic-redirect  
inbound  
link-group  
{ acl-number | acl-name } [ rule rule ]  
system-index index here is the system index for an ACL rule. When delivering a rule,  
the system assigns an index to it, for convenience of later retrieval. You can also assign  
a system index for it when delivering an ACL rule with this command. However, you are  
not recommended to assign a system index if not urgently necessary.  
Note:  
z
z
z
Traffic redirection setting is only available for the permitted rules in the ACL.  
The packet redirected to the CPU cannot be forwarded normally.  
You can achieve policy route by selecting the next-hop keyword.  
See the corresponding Command Manual for details of the commands.  
33-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
33.3.6 Configuring Queue Scheduling  
Each port supports eight outbound queues except that port of XP4 board only supports  
four queues. The switch puts the packets into the queues according to the local  
precedence of packets. Queue scheduling is used to resolve problems of resource  
contention by many packets. The switch supports SP algorithm and WRR algorithm.  
Different outbound queues at the port may use different algorithms. The switch  
supports three scheduling modes:  
1) All-SP scheduling mode  
2) All-WRR mode: The outbound queues are divided into WRR queue 1 and WRR  
queue 2. The switch first schedules the queues in the WRR queue1. If no packets  
are waiting for being forwarded in WRR queue 1, then it begins to schedule the  
queues in WRR queue 2. By default, all queues at a port are in WRR queue 1.  
3) SP plus WRR mode: The outbound queues are put into different scheduling  
groups. SP group uses SP algorithm, WRR groups use WRR algorithm. The  
select one queue respectively from SP group, WRR group 1 and WRR group 2  
and schedule them using SP algorithm.  
Perform the following configurations in Ethernet port view or port group view.  
Table 33-10 Configure queue scheduling  
Operation  
Command  
queue-scheduler wrr group1  
{
{
{
queue-id  
queue-id  
Configuring  
scheduling  
queue  
queue-weight &<1-8> group2  
}
|
queue-weight } &<1-8> }*  
Restore the default setting undo queue-scheduler [ queue-id ] &<1-8>  
By default, the switch uses all-SP mode, so those queues not configured with WRR  
algorithm are SP mode.  
See the corresponding Command Manual for details of the commands.  
33.3.7 Configuring WRED Parameters  
In the case of network congestion, the switch drops packets to release system  
resources. And then no packets are put into long-delay queues.  
The switch allocates drop precedence for it when receiving a packet (also called  
coloring the packet). The drop precedence values range from 0 to 2, with 2 for red, 1 for  
yellow and 0 for green. In congestion, red packets will be first dropped, and green  
packets last.  
You can configure drop parameters and thresholds by queue or drop precedence.  
The following two drop modes are available:  
33-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
1) Tail drop mode: Different queues (red, yellow and red) are allocated with different  
drop thresholds. When these thresholds are exceeded respectively, excessive  
packets will be dropped.  
2) WRED drop mode: Drop precedence is taken into account in drop action. When  
only min-thresholds of red, yellow and green packets are exceeded, excessive  
packets are dropped randomly at given probability. But when max-thresholds of  
red, yellow and green packets are exceeded, all excessive packets will be  
dropped.  
You must first configure WRED parameters for every outbound queue in defining drop  
precedence.  
I. Configuring WRED parameters  
The switch provides four sets of default WRED parameters, respectively numbered as  
0 to 3. Each set includes 80 parameters, 10 parameters for each of the eight queues.  
The ten parameters are green-min-threshold, yellow-min-threshold, red-min-threshold,  
green-max-threshold, yellow-max-threshold, red-max-threshold, green-max-prob,  
yellow-max-prob, red-max-prob and exponent. Red, yellow and green packets  
respectively refer to those with drop precedence levels 2, 1 and 0.  
Perform the following configurations in the specified views.  
Table 33-11 Configure WRED parameters  
Operation  
Command  
wred wred-index  
Enter WRED index view (system view)  
Restore the default WRED parameters  
(system view)  
undo wred wred-index  
queue queue-id green-min-threshold  
green-max-threshold green-max-prob  
Configure WRED parameters (WRED yellow-min-threshold  
index view)  
yellow-max-threshold yellow-max-prob  
red-min-threshold red-max-threshold  
red-max-prob exponent  
Restore the default WRED parameters  
(WRED index)  
undo queue queue-id  
Exit WRED index view (WRED index  
view)  
quit  
The command restores the parameters of the specified WRED index as the default  
setting. The command restores the WRED parameters related to the queue as the  
default setting.  
The switch provides four sets of WRED parameters by default.  
See the corresponding Command Manual for details of the commands.  
33-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
II. Configuring drop algorithm  
Please perform the following configurations in Ethernet port view.  
Table 33-12 Configure drop algorithm  
Operation  
Command  
drop-mode { tail-drop | wred } [ wred-index ]  
undo drop-mode  
Configure drop algorithm  
Restore the default algorithm  
By default, tail drop mode is selected.  
See the corresponding Command Manual for details of the commands.  
33.3.8 Configuring Traffic Mirroring  
Traffic mirroring duplicates the traffic that matches ACL rules to the CPU, for traffic  
analysis and monitoring.  
Perform the following configurations in Ethernet port view or port group view.  
Table 33-13 Configure traffic mirroring  
Operation  
Command  
inbound  
{ acl-number | acl-name } [ rule rule  
[ system-index index ] ] cpu  
mirrored-to  
ip-group  
Configure traffic mirroring which only  
applies IP group ACL  
Remove traffic mirroring setting which undo mirrored-to inbound ip-group  
only applies IP group ACL  
{ acl-number | acl-name } [ rule rule ]  
mirrored-to inbound ip-group  
{ acl-number | acl-name } { rule rule  
link-group { acl-number | acl-name }  
[ rule rule [ system-index index ] ] |  
link-group { acl-number | acl-name }  
rule rule } cpu  
Configure traffic mirroring which applies  
IP group ACL and link group ACL at  
same time  
undo mirrored-to inbound ip-group  
Remove traffic mirroring setting which { acl-number | acl-name } { rule rule  
applies IP group ACL and link group link-group { acl-number | acl-name }  
ACL at same time  
[ rule rule ] | link-group { acl-number |  
acl-name } rule rule }  
mirrored-to  
{ acl-number | acl-name } [ rule rule  
[ system-index index ] ] cpu  
inbound  
link-group  
Configure traffic mirroring which only  
applies link group ACL  
Remove traffic mirroring setting which undo mirrored-to inbound link-group  
only applies link group ACL { acl-number | acl-name } [ rule rule ]  
system-index index here is the system index for an ACL rule. When delivering a rule,  
the system assigns an index to it, for convenience of later retrieval. You can also assign  
33-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
a system index for it when delivering an ACL rule with this command. However, you are  
not recommended to assign a system index if not urgently necessary.  
See the corresponding Command Manual for details of the commands.  
33.3.9 Configuring Port Mirroring  
Port mirroring duplicates data on the monitored port to the designated monitoring port,  
for purpose of data analysis and supervision. The switch supports multiple-to-one  
mirroring, that is, you can duplicate packets from multiple ports to a monitoring port.  
You can also specify the monitoring direction:  
z
z
Only inbound packets  
Only outbound packets  
Perform the following configurations in system view.  
Table 33-14 Configure port mirroring  
Operation  
Command  
mirroring-group groupId  
{
inbound  
|
Configure port mirroring  
outbound mirroring-port-list  
}
&<1-8>  
mirrored-to monitor-port  
Remove port mirroring setting  
undo mirroring-group groupId  
You can implement port mirroring configuration by setting mirroring groups at the port.  
Up to 20 mirroring groups can be configured at a port, with each group including one  
monitoring port and multiple monitored ports.  
Note:  
The Switch 8800 supports cross-board mirroring, that is, the monitoring and monitored  
ports can be at different boards.  
Consider these issues when configuring port mirroring:  
z
For intra-board mirroring, only one monitoring port can be configured for the  
mirroring groups in the same direction. For example, if one mirroring group, with  
port A as its monitoring port, has been configured on a board to monitor those  
received packets, you need to choose port A as its monitoring port when  
configuring a second mirroring group to monitor those received packets. The  
same restriction applies to the mirroring group to monitor those packets sent.  
For cross-board mirroring, only one monitoring port (which is on another board)  
can be configured for the mirroring groups in the same direction. For example, a  
mirroring group is configured on board 1, with port B on board 2 as its monitoring  
z
33-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
port. You can only choose port B on board 2 as its monitoring port when  
configuring a second mirroring group in the same direction on board 1.  
One mirroring group can contain as many as 24 monitored ports at most.  
You can configure as many as 24 monitored ports for all the mirroring groups in  
transmit group.  
z
z
z
z
You can configure 24 mirroring groups in both directions in total.  
One port can act as a mirroring port and a mirrored port at the same time for a  
different mirroring group in a different direction.  
More issues for the GV48 board (LSBM1GV48DA):  
z
For the mirroring (including incoming port mirroring and outgoing port mirroring) on  
the same GV48 board, only one monitoring port is allowed. For example, if you  
have configured a port mirroring group in a GV48 board, with port A as the  
monitoring port, then you can only choose port A as its monitoring port when  
configuring another port mirroring group.  
z
For all port groups configured in the system, only one monitoring port is allowed on  
the same GV48 board.  
For the XP4 board, the system creates two port groups by default. One group contains  
ports 0 and 1, and the other contains ports 2 and 3. Pay attention to the following  
limitation on port mirroring:  
z
Port mirroring across groups are not supported. That is, in a port monitoring group,  
the monitoring port and monitored port can only be ports 0 and 1, or ports 2 and 3.  
A port group can contain one incoming and one outgoing monitoring ports (other  
interface boards have each of them per board).  
z
See the corresponding Command Manual for details of the commands.  
33.3.10 Configuring Traffic Statistics  
Traffic statistics count packets of designated service traffic, that is, the packets match  
the defined ACL among those forwarded. You can view the information with the display  
qos-interface traffic-statistic command.  
Perform the following configurations in Ethernet port or port group view.  
Table 33-15 Configure traffic statistics  
Operation  
Command  
traffic-statistic inbound ip-group  
Configure traffic statistics which only { acl-number | acl-name } [ rule rule  
applies IP group ACL  
[ system-index index ] ] [ tc-index  
index ]  
undo  
traffic-statistic  
inbound  
Remove traffic statistics setting which  
only applies IP group ACL  
ip-group { acl-number | acl-name }  
[ rule rule ]  
33-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
traffic-statistic inbound link-group  
Configure traffic statistics which only { acl-number | acl-name } [ rule rule  
applies link group ACL  
[ system-index index ] ] [ tc-index  
index ]  
undo  
traffic-statistic  
inbound  
Remove traffic statistics setting which  
only applies link group ACL  
link-group { acl-number | acl-name }  
[ rule rule ]  
display qos-interface [ interface-name  
Display traffic statistics for the port  
|
interface-type  
interface-num  
]
traffic-statistic  
Note:  
The system counts the traffic on all ports in the group after you use the traffic-statistic  
command in port group view.  
system-index index here is the system index for an ACL rule. When delivering a rule,  
the system assigns an index to it, for convenience of later retrieval. You can also assign  
a system index for it when delivering an ACL rule with this command. However, you are  
not recommended to assign a system index if not urgently necessary.  
See the corresponding Command Manual for details of the commands.  
33.3.11 Displaying and Debugging QoS Configuration  
After these configurations are completed, you can use the display command in any  
view to view QoS running and check configuration result. You can clear QoS statistics  
using the reset traffic-statistic command in Ethernet port view or port group view.  
Table 33-16 Display and debug QoS configurations  
Operation  
Command  
mirroring display qos-interface  
Display  
configuration of a port  
traffic  
[
interface-name  
interface-type interface-num ] mirrored-to  
|
|
|
|
Display traffic  
priority display qos-interface  
[
interface-name  
interface-type interface-num ] traffic-priority  
configuration of a port  
Display traffic  
redirection display qos-interface  
[
interface-name  
interface-type interface-num ] traffic-redirect  
configuration of a port  
Display traffic statistics of a display qos-interface  
[
interface-name  
port  
interface-type interface-num ] traffic-statistic  
Display  
configuration  
port  
mirroring  
display mirroring-group [ groupid ]  
Display QoS configurations of display qos-interface  
[
interface-name  
|
all ports interface-type interface-num ] all  
33-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Operation  
Command  
limit display qos-interface  
Display  
configuration of a port  
traffic  
[
interface-name  
interface-type interface-num ] traffic-limit  
|
|
|
Display queue scheduling display qos-interface interface-name  
configuration of a port interface-type interface-num ] queue-scheduler  
[
Display traffic shaping display qos-interface interface-name  
[
configuration of a port  
interface-type interface-num ] traffic-shape  
Display the parameter settings  
for traffic policing  
display traffic-params [ traffic-index ]  
Display QoS configuration of a  
VLAN  
display qos-vlan [ vlan-id ] all  
Display  
configuration of a VLAN  
traffic  
priority  
display qos-vlan [ vlan-id ] traffic-priority  
display qos-vlan [ vlan-id ] traffic-limit  
display qos-vlan [ vlan-id ] traffic-redirect  
display qos-vlan [ vlan-id ] traffic-statistic  
Display traffic  
configuration of a VLAN  
limit  
Display traffic direction  
configuration of a VLAN  
Display traffic statistics of a  
VLAN  
Display  
Conform-level > Service  
parameter, EXP  
Conform-level > Service  
the  
DSCP  
+
display  
[
qos  
conform-level  
+
conform-level-value  
]
{ dscp-policed-service-map [ dscp-list ] |  
exp-policed-service-map  
local-precedence-cos-map }  
parameter  
Local-precedence  
and  
+
|
Conform-level > 802.1p  
priority mapping tables  
Display the CoS —  
>
display qos cos-drop-precedence-map  
display qos cos-local-precedence-map  
Drop-precedence  
table  
mapping  
Display the CoS —  
Local-precedence  
table  
>
mapping  
reset traffic-statistic inbound { { ip-group  
{ acl-number | acl-name } rule rule | link-group  
{ acl-number | acl-name } }* | { ip-group  
Clear traffic statistics  
{
acl-number  
|
acl-name  
}
|
link-group  
{ acl-number | acl-name } rule rule }* | ip-group  
{ acl-number | acl-name } rule rule link-group  
{ acl-number | acl-name } rule rule }  
See the corresponding Command Manual for description of display information and  
parameters.  
33-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
33.4 Configuration Example  
33.4.1 Traffic Shaping Configuration Example  
I. Network requirements  
Set traffic shaping for the outbound queue 2 at the port GE7/1/8: maximum rate  
500kbps, burst size 12k bytes.  
II. Network diagram  
GE7/1/8  
GE7/1/2  
GE7/1/1  
VLAN2,  
1.0.0.1/8  
VLAN3,  
2.0.0.1/8  
PC2  
PC1  
Figure 33-6 Network diagram for QoS configuration  
III. Configuration procedure  
1) Enter Ethernet port view.  
[SW8800] interface GigabitEthernet 7/1/8  
[SW8800-GigabitEthernet7/1/8]  
2) Set traffic shaping for the outbound queue 2 at the port: maximum rate 500 Kbps,  
burst size 12 KB.  
[SW8800-GigabitEthernet7/1/8] traffic-shape queue 2 500 12  
33.4.2 Port Mirroring Configuration Example  
I. Network requirements  
Use one server to monitor the packets of two ports. R&D department is accessed from  
the port GE3/1/1 and sales department from the port GE3/1/2. The server is connected  
to the port GE3/1/8.  
33-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
II. Network diagram  
GE3/1/1  
GE3/1/8
Server  
GE3/1/2  
Figure 33-7 Networking for port mirroring configuration  
III. Configuration procedure  
Define a mirroring group, with monitoring port as GigabitEthernet3/1/8.  
[SW8800] mirroring-group 1 inbound gigabitethernet3/1/1 gigabitethernet3/1/2  
mirrored-to gigabitethernet3/1/8  
[SW8800]  
mirroring-group  
2
outbound  
gigabitethernet3/1/1  
gigabitethernet3/1/2 mirrored-to gigabitethernet3/1/8  
33.4.3 Traffic Priority Configuration Example  
I. Network requirements  
Re-allocate service parameters according to the mapping table for DSCP 63 for the  
packets from PC1 (IP 1.0.0.1) during the time range 8:00 to 18:00 everyday.  
II. Network diagram  
GE7/1/8  
GE7/1/2  
GE7/1/1  
VLAN2,  
1.0.0.1/8  
VLAN3,  
2.0.0.1/8  
PC2  
PC1  
Figure 33-8 Network diagram for priority configuration  
III. Configuration procedure  
1) Define the time range.  
Define the time range from 8:00 to 18:00.  
[SW8800] time-range 3Com 8:00 to 18:00 daily  
2) Define the traffic from PC1.  
33-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Create a number-based basic ACL 2000 and enter it.  
[SW8800] acl number 2000  
Define ACL rule for the traffic from PC1.  
[SW8800-acl-basic-2000] rule 0 permit source 1.0.0.1 0 time-range 3Com  
3) Define the CoS> Conform-Level mapping table.  
Define the CoS > Conform-Level mapping table. The switch allocates drop  
precedence (all as 0 for the sake of simplification) for them when receiving packets.  
[SW8800] qos cos-drop-precedence-map 0 0 0 0 0 0 0 0  
The modified CoS> Conform-Level mapping table:  
Table 33-17 Modified CoS> Conform-Level mapping table  
CoS Value  
Drop-precedence  
0
1
2
3
4
5
6
7
0
0
0
0
0
0
0
0
4) Define the DSCP + Conform-Level > Service parameter mapping table.  
Define the DSCP + Conform-Level > Service parameter mapping table. Allocate a  
set of service parameters for the packets from PC1 according the mapping table for  
DSCP 63.  
[SW8800] qos conform-level 0  
[SW8800-conform-level-0] dscp 63 : 32 4 4 4 0  
The modified DSCP + Conform-Level > Service parameter mapping table:  
Table 33-18 Modified DSCP + Conform-Level > Service parameter mapping table  
Policed- Policed- Policed- Policed-Loca Policed-Drop  
DSCP CL  
DSCP  
32  
exp  
802.1p  
lprec  
Precedence  
63  
0
4
4
4
0
5) Re-allocate service parameters for the packets from PC1.  
33-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
Re-allocate service parameters for the packets from PC1.  
[SW8800-GigabitEthernet7/1/1] traffic-priority inbound ip-group 2000  
remark-policed-service dscp 63  
33.4.4 Traffic Redirection Configuration Example  
I. Network requirements  
Forward the packets sent from PC1 (IP 1.0.0.1) during the time range from 8:00 to  
18:00 every day to the address 2.0.0.1.  
II. Network diagram  
GE7/1/8  
GE7/1/2  
GE7/1/1  
VLAN2,  
1.0.0.1/8  
VLAN3,  
2.0.0.1/8  
PC2  
PC1  
Figure 33-9 Network diagram for traffic redirection configuration  
III. Configuration procedure  
1) Define the time range.  
Define the time range from 8:00 to 18:00.  
[SW8800] time-range 3Com 8:00 to 18:00 daily  
2) Define the traffic from PC1.  
Create a number-based basic ACL 2000 and enter it.  
[SW8800] acl number 2000  
Define ACL rule for the traffic from PC1.  
[SW8800-acl-basic-2000] rule 0 permit source 1.0.0.1 0 time-range 3Com  
3) Modify the next hop for the packets from PC1.  
Define the next hop for the packets from PC1 as 2.0.0.1.  
[SW8800-GigabitEthernet7/1/1] traffic-redirect inbound ip-group 2000 rule 0  
next-hop 2.0.0.1  
33-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
33.4.5 Queue Scheduling Configuration Example  
I. Network requirements  
Modify the correspondence between 802.1p priority levels and local priority levels to  
change the mapping between 802.1p priority levels and queues. That is, put packets  
into outbound queues according to the new mapping. Use WRR algorithm for the  
queues 0 to 5 at the port GE7/1/1. Set the queues 0, 1 and 2 into WRR queue 1, with  
weight respectively as 20, 20 and 30; set the queues 3, 4 and 5 into WRR queue 2, with  
weight respectively as 20, 20 and 40. The queues 6 and 7 use SP algorithm. See  
Queue Scheduling for the default mapping.  
Table 33-19 802.1p priority > Local precedence mapping table  
802.1p priority  
Local precedence  
0
1
2
3
4
5
6
7
7
6
5
4
3
2
1
0
II. Network diagram  
GE7/1/8  
GE7/1/2  
GE7/1/1  
VLAN2,  
VLAN3,  
1.0.0.1/8  
2.0.0.1/8  
PC2  
PC1  
Figure 33-10 Network diagram for queue-schedule configuration  
III. Configuration procedure  
1) Re-specify the mapping between 802.1p priority and local precedence.  
[SW8800] qos cos-local-precedence-map 7 6 5 4 3 2 1 0  
33-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
2) Use WRR algorithm for the queues 0 to 5. Set the queues 0, 1 and 2 into WRR  
queue 1, with weight respectively as 20, 20 and 30; set the queues 3, 4 and 5 into  
WRR queue 2, with weight respectively as 20, 20 and 40. Use SP algorithm for the  
queues 6 and 7.  
[SW8800-GigabitEthernet7/1/1] queue-scheduler wrr group1 0 20 1 20 2 30 group2  
3 20 4 20 5 40  
[SW8800] display qos-interface GigabitEthernet7/1/1 queue-scheduler  
GigabitEthernet7/1/1 Port scheduling:  
QID:  
scheduling-group  
weight  
-----------------------------------  
0 :  
1 :  
2 :  
3 :  
4 :  
5 :  
6 :  
7 :  
wrr , group1  
wrr , group1  
wrr , group1  
wrr , group2  
wrr , group2  
wrr , group2  
sp  
20  
20  
30  
20  
20  
40  
0
sp  
0
33.4.6 WRED Parameters Configuration Example  
I. Network requirements  
Set WRED parameters and drop algorithm for packets at the port GE7/1/1: Configure  
parameters for WRED 0; outbound queue ID is 7; green-min-threshold is 150;  
green-max-threshold is 500; green-max-prob is 5; yellow-min-threshold is 100;  
yellow-max-threshold is 150; yellow-max-prob is 10; red-min-threshold is 50;  
red-max-threshold is 100; red-max-prob is 15; exponent is 10; the port is in WRED drop  
mode; import the parameters of WRED 0.  
II. Network diagram  
GE7/1/8  
GE7/1/2  
GE7/1/1  
VLAN2,  
1.0.0.1/8  
VLAN3,  
2.0.0.1/8  
PC2  
PC1  
Figure 33-11 Network diagram for WRED parameters configuration  
33-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
III. Configuration procedure  
1) Configure WRED parameters  
Configure parameters for WRED 0.  
[SW8800] wred 0  
[SW8800-wred-0] queue 7 150 500 5 100 150 10 50 100 15 10  
2) Set drop algorithm and thresholds.  
Define the port GE7/1/1 in WRED drop mode, set the parameters of WRED 0.  
[SW8800-GigabitEthernet7/1/1] drop-mode wred 0  
33.4.7 Traffic Statistics Configuration Example  
I. Network requirements  
Suppose the IP address of PC1 is 1.0.0.1 and that of PC2 is 2.0.0.1. The switch is  
up-linked through the port GE7/1/8. Count the packets sent from the switch to PC1  
during the time range from 8:00 to 18:00 every day.  
II. Network diagram  
GE7/1/8  
GE7/1/2  
GE7/1/1  
VLAN2,  
1.0.0.1/8  
VLAN3,  
2.0.0.1/8  
PC2  
PC1  
Figure 33-12 Network diagram for traffic statistics configuration  
III. Configuration procedure  
1) Define the time range.  
Define the time range from 8:00 to 18:00.  
[SW8800] time-range 3Com 8:00 to 18:00 daily  
2) Define the traffic from PC1.  
Define ACL rule for the traffic from PC1.  
[SW8800] acl number 2000  
[SW8800-acl-basic-2000] rule 0 permit source 1.0.0.1 0.0.0.0 time-range 3Com  
33-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 33 QoS Configuration  
3) Count the packets to PC1 and display the result using the display command.  
[SW8800-GigabitEthernet7/1/1] traffic-statistic inbound ip-group 2000 rule 0  
[SW8800] display qos-interface GigabitEthernet7/1/1 traffic-statistic  
GigabitEthernet7/1/1: traffic-statistic  
Inbound:  
Matches: Acl 2000 rule 0 running  
12002688 bytes (green 1270244416 byte(s), yellow 1895874880 byte(s), red  
704683968 byte(s) )  
3333270 packets (green 0 byte(s), yellow 0 byte(s), red 0 byte(s) )  
33-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 34 Logon User ACL Control Configuration  
Chapter 34 Logon User ACL Control Configuration  
34.1 Overview  
As the Ethernet switches are used more and more widely over the networks, the  
security issue becomes even more important. The switches provide several logon and  
device accessing measures, mainly including TELNET access, SNMP access, and  
HTTP access (currently the Switch 8800 does not support it). The security control over  
the access measures is provided with the switches to prevent illegal users from logging  
on to and accessing the devices. There are two levels of security controls. At the first  
level, the user connection is controlled with ACL filter and only the legal users can be  
connected to the switch. At the second level, a connected user can log on to the device  
only if he can pass the password authentication.  
This chapter mainly introduces how to configure the first level security control over  
these access measures, that is, how to configure to filter the logon users with ACL. For  
detailed description about how to configure the first level security, refer to “getting  
started” module of Operation Manual.  
34.2 Configuring ACL for Telnet Users  
This configuration can filter out malicious or illegal connection request before password  
authentication.  
The following sections describe ACL configuration tasks.  
z
z
34.2.1 Defining ACL  
Currently number-based ACLs or advanced ACL can be imported, with the number  
ranging from 2000 to 3999.  
Perform the following configurations in system view.  
Table 34-1 Define basic ACL and advanced ACL  
Operation  
Command  
acl { number acl-number | name acl-name  
basic } match-order { config | auto }  
Enter basic ACL (system view)  
rule [ rule-id ] { permit | deny } [ source  
source-addr wildcard | any ] [ fragment ]  
[ time-range name ]  
Define a sub-rule (basic ACL  
view)  
34-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 34 Logon User ACL Control Configuration  
Operation  
Command  
Delete a sub-rule (basic ACL undo rule rule-id [ source ] [ fragment ]  
view) [ time-range ]  
Delete an ACL or all ACLs undo acl { number acl-number | name acl-name  
(system view) | all }  
Enter advanced ACL view from acl { number acl-number | name acl-name  
system view  
advanced } [ match-order { config | auto } ]  
rule [ rule-id ] { permit | deny } protocol [ source  
{ source-addr wildcard | any } ] [ destination  
{ dest-addr wildcard | any } ] [ source-port  
Define sub-rule( advanced operator port1 [ port2 ] ] [ destination-port  
ACL view)  
operator port1 [ port2 ] ] [ icmp-type type code ]  
[ established ] [ [ precedence precedence | tos  
tos ]* | dscp dscp ] [ fragment ] [ time-range  
name ] [ vpn-instance instance-name ]  
undo rule rule-id [ source | destination |  
Delete a sub-rule(advanced source-port | destination-port | icmp-type |  
ACL view )  
precedence | tos | dscp | fragment | time-range  
| vpn-instance ]*  
Delete an ACL or all ACLs undo acl { number acl-number | name acl-name  
(system view) | all }  
You can define multiple rules for an ACL by using the rule command several times.  
34.2.2 Importing ACL  
You can import a defined ACL in user interface view to achieve ACL control.  
Perform the following configurations respectively in system view and user interface  
view.  
Table 34-2 Import ACL  
Operation  
Enter user interface view (system view) user-interface [ type ] first-number  
Import the ACL (user interface view) acl acl-number { inbound | outbound }  
Command  
See the Command Manual for details about these commands.  
Note:  
Currently the ACL control function of TELNET user can reference to the number-based  
ACLs and advanced ACLs.  
34-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 34 Logon User ACL Control Configuration  
34.2.3 Configuration Example  
I. Network requirements  
Only the Telnet users from 10.110.100.52 and 10.110.100.46 can access the switch.  
II. Network diagram  
Internet  
Switch  
Figure 34-1 ACL configuration for Telnet users  
III. Configuration procedure  
Define a basic ACL.  
[SW8800] acl number 2000 match-order config  
[SW8800-acl-basic-2000] rule 1 permit source 10.110.100.52 0  
[SW8800-acl-basic-2000] rule 2 permit source 10.110.100.46 0  
[SW8800-acl-basic-2000] rule 3 deny source any  
[SW8800-acl-basic-2000] quit  
Import the ACL.  
[SW8800] user-interface vty 0 4  
[SW8800-user-interface-vty0-4] acl 2000 inbound  
34.3 Configuring ACL for SNMP Users  
The Switch 8800 supports remote network management (NM) and the user can use  
SNMP to access them. Proper ACL configuration can prevent illegal users from logging  
onto the switches.  
The following sections describe ACL configuration tasks.  
z
z
34.3.1 Defining ACL  
Currently only number-based ACLs can be imported, with the number ranging from  
2000 to 2999. See 34.3.1 “Defining ACL” for detailed configuration.  
34-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 34 Logon User ACL Control Configuration  
34.3.2 Importing ACL  
Import the defined ACL into the commands with SNMP community, username and  
group name configured, to achieve ACL control over SNMP users.  
Perform the following configurations in system view.  
Table 34-3 Import ACL  
Operation  
Command  
Import the defined ACL into the snmp-agent community { read | write }  
commands  
community configured  
with  
SNMP community-name [ [ mib-view view-name ] | [ acl  
acl-number ] ]*  
snmp-agent group { v1 | v2c } group-name  
[ read-view read-view ] [ write-view write-view ]  
[ notify-view notify-view ] [ acl acl-number ]  
snmp-agent group v3 group-name  
authentication privacy ] [ read-view  
Import the defined ACL into the  
commands with SNMP group  
name configured  
[
|
read-view ] [ write-view write-view ] [ notify-view  
notify-view ] [ acl acl-number ]  
snmp-agent usm-user { v1 | v2c } user-name  
group-name [ acl acl-number ]  
Import the defined ACL into the  
snmp-agent  
group-name [ authentication-mode { md5 | sha }  
auth-password privacy-mode des56  
priv-password ] [ acl acl-number ]  
usm-user  
v3  
user-name  
commands  
with  
SNMP  
username configured  
]
[
SNMP community is one of the features of SNMP v1 and SNMP v2, so you import the  
ACL into the commands with SNMP community configured, for the SNMP V1 and  
SNMP V2.  
SNMP username or group name is one of the features of SNMP V2 and above,  
therefore you import the ACL into the commands with SNMP username or group name  
configured, for the SNMP V2 and above. If you import the ACL into both features, the  
switch will filter both features for the users.  
Note:  
You can import different ACLs in the three commands listed above.  
See the Command Manual for details about these commands.  
Note:  
Currently you can import only the basic ACLs with digit IDs.  
34-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 34 Logon User ACL Control Configuration  
34.3.3 Configuration Example  
I. Network requirements  
Only SNMP users from 10.110.100.52 and 10.110.100.46 can access the switch.  
II. Network diagram  
Internet  
Switch  
Figure 34-2 ACL configuration for SNMP users  
III. Configuration procedure  
Define a basic ACL.  
[SW8800] acl number 2000 match-order config  
[SW8800-acl-baisc-2000] rule 1 permit source 10.110.100.52 0  
[SW8800-acl-baisc-2000] rule 2 permit source 10.110.100.46 0  
[SW8800-acl-basic-2000] rule 3 deny source any  
[SW8800-acl-baisc-2000] quit  
Import the ACL.  
[SW8800] snmp-agent community read 3Com acl 2000  
[SW8800] snmp-agent group v3 3Comgroup acl 2000  
[SW8800] snmp-agent usm-user v3 3Comuser 3Comgroup acl 2000  
34-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
Chapter 35 MPLS Architecture  
Note:  
A Switch 8800 running MPLS can serve as a router. Routers mentioned in this manual  
can be either a router in common sense, or a layer 3 Ethernet switch running MPLS.  
To enable MPLS function on the Switch 8800, you must select the interface cards that  
support MPLS. Note that all the B cards do not support MPLS. For example, FT48C  
card supports MPLS, but FT48B does not.  
35.1 MPLS Overview  
MPLS (Multiprotocol Label Switching) encapsulates network layer packets with short  
and fixed-length labels. As the name implies, it supports multiple protocols, such as IP,  
IPv6, and IPX. And it allows a device to make forwarding decision based on the labels  
attached to the received packets without going through the complex routing table  
lookup procedures with IP. MPLS brings together the advantages of the connectionless  
control with IP and the connection-oriented forwarding with ATM. In addition to the  
support from IP routing and control protocols, its powerful and flexible routing functions  
allows it to accommodate to various emerging applications.  
MPLS was initially proposed to accelerate the packet forwarding on routers, but it has  
been widely used in Traffic Engineering (TE), Virtual Private Network (VPN), and other  
aspects, and is becoming one of the most important standards on large scale IP  
networks.  
35.2 MPLS Basic Concepts  
35.2.1 FEC  
Forwarding Equivalence Class (FEC) is an important concept in MPLS. MPLS is  
actually a kind of classify-and-forward technology. It categorizes packets with the same  
forwarding strategy (same destination addresses, same forwarding routes and same  
QoS levels) into one class, which is called a FEC. Generally, the FEC classification is  
based on network layer address. Packets of the same FEC are processed in the same  
way in MPLS network.  
35-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
35.2.2 Label  
I. Label definition  
A label is a locally significant short identifier with fixed length, which is used to identify a  
FEC. When reaching at MPLS network ingress, packets are divided into different FECs,  
based on their FECs, different labels are encapsulated into the packets. Later  
forwarding is based on these labels.  
II. Label structure  
The structure of the label is shown in Figure 35-1.  
Exp  
S
TTL  
Label  
Figure 35-1 Label structure  
Label is located between the link layer header and the network layer packet, with the  
length of four bytes. A label contains four fields:  
Label: label value, 20 bits.  
Exp: three bits, reserved, used for COS.  
S: one bit, MPLS supports hierarchical label structure, namely multi-layer label. Value 1  
refers to the label of bottom layer.  
TTL: eight bits, with the same meaning as TTL in IP packet.  
III. Label operations  
1) Label mapping  
There are two types of label mapping: label mapping at ingress routers, and label  
mapping in MPLS domain.  
The first type of mapping is implemented at ingress label switching routers (LSR). The  
ingress LSRs group the incoming packets into multiple FECs based on certain  
principles, and then map corresponding labels to these FECs and record the mapping  
results into the label information base (LIB). In simple words, label mapping is to assign  
a label to a FEC.  
The second type is also called incoming label mapping (ILM), that is, to map each input  
label to a series of next hop label forwarding entries (NHLFE). The packets are  
forwarded along the paths based on the mapping results.  
2) Label encapsulation  
Figure 35-2 illustrates label encapsulation in different media:  
35-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
Ethernet  
SONET/SDH  
packet  
Ethernet  
header/PPP header  
Flag  
Flag  
Layer 3 data  
Frame mode  
ATM packet  
ATM header  
VPI/VCI  
Layer 3 data  
Layer 3 data  
Cell mode  
ATM packet  
Figure 35-2 Label position in packet  
In Ethernet packets and PPP packets, label stack lies between layer 2 header and layer  
3 data, acting like a shim. In ATM cell mode packets, VPI/VCI is used as the label.  
3) Label assignment and distribution  
Label distribution refers to the process of creating a corresponding label switching path  
(LSP) for a FEC.  
In the MPLS architecture, the decision to bind a particular label to a particular FEC is  
made by downstream LSR; after making the decision, the downstream LSR notifies the  
upstream LSR. That is to say, the label is assigned by the downstream LSR, and the  
assigned label is distributed from downstream to upstream.  
Two label distribution modes are available in MPLS: downstream unsolicited (DU)  
mode and downstream on demand (DoD) mode.  
z
For a specific FEC, if LSR originates label assignment and distribution even  
without receiving label request message from upstream, it is in DU mode.  
For a specific FEC, if LSR begins label assignment and distribution only after  
receiving label request message from upstream, it is in DoD mode.  
z
The upstream and downstream which have adjacency relation in label distribution  
should reach agreement on label distribution mode.  
To distribute labels to its peer, the LSR can use Label Distribution Protocol (LDP)  
messages or make the labels carried on other routing protocol messages.  
Note:  
Upstream and downstream are just on a relative basis: For a packet forwarding process,  
the transmit router serves as upstream LSR and receive router serves as downstream  
LSR. Currently, the Switch 8800 adopts the DU label distribution mode.  
4) Label assignment control mode  
There are two modes to control the assignment and distribution of labels: independent  
mode and ordered mode.  
35-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
In independent control mode, each LSR can send label mapping messages to the  
LSRs it connects to at anytime.  
In ordered control mode, a LSR can send label mapping messages to upstream only  
when it receives a specific label mapping messages of the next hop of a FEC or the  
LSR serves as LSP (Label Switching Path) egress node.  
Note:  
Currently, the Switch 8800 adopts the ordered label control mode.  
5) Label retention mode  
There are two label-retention modes: liberal label retention mode and conservative  
label retention mode.  
Suppose there are two LSRs: Ru and Rd. For a specific FEC, if LSR Ru has received  
the label binding from LSR Rd, in case Rd is not the next hop of Ru and Ru saves this  
binding, then it is the liberal label retention. And if Ru discards this binding, then it is the  
conservative label retention mode.  
In case it is required that LSR is capable of adapting route variation rapidly, you can use  
the liberal label retention mode. In case it is required that a few labels are saved in LSR,  
you can use the conservative label retention mode.  
Note:  
Currently, the Switch 8800 adopts the liberal label retention mode.  
35.2.3 LDP  
Label distribution protocol (LDP) is the signaling control protocol in MPLS, which  
controls binding labels and FECs between LSRs and coordinates a series of  
procedures between LSRs.  
35.3 MPLS Architecture  
35.3.1 MPLS Network Structure  
The basic composing unit of MPLS network is LSR (Label Switching Router). It runs  
MPLS control protocol and L3 routing protocol, exchanges routing messages with other  
LSRs and create the routing table, maps FECs with IP packet headers, binds FECs  
35-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
with labels, distributes label binding messages, establishes and maintains label  
forwarding table.  
The network consisting of LSRs is called MPLS domain. The LSR that is located at the  
edge of the domain is called edge LSR (LER, Labeled Edge Router). It connects an  
MPLS domain with a non-MPLS domain or with another MPLS domain, classifies  
packets, distributes labels (as ingress LER) and distracts labels (as egress LER). The  
ingress LER is termed as ingress and egress LER as egress.  
The LSR that is located inside the domain is called core LSR, which provides functions  
such as label swapping and label distribution. The labeled packets are transmitted  
along the LSP (Label Switched Path) composed of a series of LSRs.  
LSP  
Ingress  
Egress  
MPLS core router (LSR)  
MPLS edge router (LER)  
Figure 35-3 MPLS basic principle  
35.3.2 Forwarding Labeled Packets  
At the ingress, the packets entering the network are classified into FECs according to  
their characteristics. Usually, packets are classified into FECs according to the IP  
address prefix or host address. Packets in the same FEC pass through the same path  
(that is, LSP) in MPLS area. LSR assigns a short label of fixed length for the incoming  
FEC packet, and then forwards it through the corresponding interface.  
On the LSR along the LSP, the mapping table of the import/export labels has been  
established (the element of this table is referred to as Next Hop Label Forwarding Entry  
(NHLFE)). When the labeled packet arrives, LSR only needs to find the corresponding  
NHLFE from the table according to the label and replace the original label with a new  
one, and then forwards the labeled packet. This process is called Incoming Label Map  
(ILM).  
At the ingress, MPLS specifies a FEC for a specific packet, and the following routers  
only need to forward the packet by label switching, therefore this method is much  
simpler than general network layer forwarding and increases the forwarding speed.  
35-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
35.3.3 Establishing LSP  
Actually, the establishment of LSP refers to the process of binding FEC with the label,  
and then advertising this binding to the adjacent LSR on LSP. This process is  
implemented through LDP, which regulates the message in interactive processing and  
message structure between LSRs as well as routing mode.  
I. LDP working process  
Through sending Hello message periodically, an LSR finds its neighbor and then  
establish LDP session with the newly discovered adjacent LSR. By LDP session, the  
adjacent LSRs advertise such information as label switching mode, label space,  
session keepalive timer value to each other. LDP session is a TCP connection, which  
needs to be maintained through LDP message. In case there is not any other LDP  
message during the time period specified by the session keepalive timer value, and  
then it is necessary to send session keepalive message to maintain the existence of  
LDP session. Figure 35-4 illustrates the diagram of LDP label distribution.  
LSP1  
Ingress  
A
B
C
LSP2  
Egress  
Label request message  
D
E
Label map messageF  
MPLS core router (LSR)  
G
MPLS edge router (LER)  
H
LDP session  
Figure 35-4 Label distribution process  
For the label distribution mentioned previously, there are two modes: DoD and DU. The  
main difference between these two modes is that the label mapping messages are  
distributed actively or passively.  
In DoD mode, the label is distributed in this way: the upstream LSR sends label request  
message (containing FEC descriptive information) to the downstream LSR, and the  
downstream LSR distributes label for this FEC, and then it sends the bound label back  
to the upstream LSR through label map message. The time when the downstream LSR  
feeds back the label map message depends on whether this LSR uses independent  
label control mode or sequential label control mode. When the sequential label control  
mode is used by the downstream LSR, the label map message is sent back to its  
upstream LSR if only it has received the label map message from its downstream LSR.  
And when the independent label control mode is used by the downstream LSR, then it  
will send label map message to its upstream LSR immediately, no matter whether it has  
35-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
received the returned label map message from its downstream LSR. Usually, the  
upstream LSR selects the downstream LSR according to the information in its routing  
table. In Figure 35-4, LSRs on the way along LSP1 use the sequential label control  
mode, and the LSR F on LSP2 uses independent label control mode.  
In DU mode, the label is distributed in the following way: when LDP session is  
established successfully, the downstream LSR will actively distribute label map  
message to its upstream LSR. And the upstream LSR saves the label map information  
and processes the received label map information according to the routing table.  
II. LSP loop control  
While establishing LSP in MPLS domain, it is also necessary to prevent the presence of  
path loop. Then, such two methods as maximum hop count and path vector can be  
used.  
The maximum hop count method refers to that the hop-count information is contained  
in the message bound with the forwarding label, and the value pluses one for each hop.  
When the value exceeds the threshold value, it is considered that a loop presents, and  
the process for establishing LSP is terminated.  
The path vector method refers to that the path information is recorded in the message  
bound with the forwarding label, and, for every hop, the corresponding router checks if  
its ID is contained in this record. If not, the router adds its ID into the record; and if yes,  
it indicates that a loop presents and the process for establishing LSP is terminated.  
35.3.4 LSP Tunnel and Hierarchy  
I. LSP tunnel  
MPLS supports LSP tunnel technology. On an LSP path, LSR Ru and LSR Rd are both  
the upstream and the downstream for each other. However, the path between LSR Ru  
and LSR Rd may not be part of the path provided by routing protocol. MPLS allows  
establishing a new LSP path <Ru R1...Rn Rd> between LSR Ru and LSR Rd, and LSR  
Ru and LSR Rd are respectively the starting point and ending point of this LSP. The  
LSP between LSR Ru and LSR Rd is referred to as the LSP tunnel, which avoids the  
traditional encapsulated tunnel on the network layer. If the route along which the tunnel  
passes and the route obtained hop by hop from routing protocol is consistent, this  
tunnel is called hop-by-hop routing tunnel. And if the two routes are not consistent, then  
the tunnel of this type is called explicit routing tunnel.  
R1  
R2  
R3  
R4  
Layer 1  
Layer 2  
R21  
Figure 35-5 LSP tunnel  
R22  
35-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
As shown in Figure 35-5, LSP <R2 R21 R22 R3> is a tunnel between R2 and R3.  
II. Multi-layer label stack  
In MPLS, a packet may carry multiple labels which are in the form of stack. Operations  
to the stack follow the “last in first out” principle and it is always the labels at the top of  
the stack that decide how to forward packets. Pushing label indicates to add a label into  
a outgoing packet, then the depth of the label stack is the former one plus 1, and the  
current label of the packet changes to the newly added one; popping a label indicates to  
remove a label form a packet, then the depth of the packet is the former one minus 1,  
and the current label of the packet changes to the label of its underlayer.  
Multiple-layer label stack is used in LSP tunnel. When a packet travels in LSP tunnel,  
there will be multiple layers for the label of the packet. Then, at the ingress and egress  
of each tunnel, it is necessary to implement pushing and popping operation for the label  
stack. For each pushing operation, the label will be added with one layer. And there is  
no depth limitation for the label stack from MPLS.  
The labels are organized according to the principle of “last in first out” in the label stack,  
and MPLS processes the labels beginning from the top of the stack.  
If the depth of the label stack for a packet is m, it indicates that the label at the bottom of  
that stack is level 1 label, and the label at the top of the stack is level m label. A packet  
with no label can be regarded as a packet with empty label stack, that is, the depth of its  
label stack is 0.  
35.4 MPLS and other Protocols  
35.4.1 MPLS and Routing Protocols  
When LDP establishes LSP in hop-by-hop mode, the next hop is determined by using  
the information, which is usually collected by such routing protocols as IGP, BGP in  
each LSR route forwarding table, on the way. However, LDP just uses the routing  
information indirectly, rather than associates with various routing protocols directly.  
On the other hand, although LDP is the special protocol for implementing label  
distribution, it is not the sole protocol for label distribution. The existing protocols such  
as BGP, RSVP, after being extended, can also support MPLS label distribution. For  
some MPLS applications, it is also necessary to extend some routing protocols. For  
example, the application of MPLS VPN requires extending the BGP protocol, thus the  
BGP protocol can propagate VPN routing information.  
35.5 MPLS Application  
35.5.1 MPLS VPN  
To transmit data stream of private network on public network, traditional VPN uses  
tunnel protocols like GRE, L2TP, and PPTP. LSP itself is a tunnel on public network, so  
35-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 35 MPLS Architecture  
there are obvious advantages to implement VPN by MPLS. MPLS VPN connects the  
geographically different branches of private network by using LSP, forming a united  
network. MPLS VPN also supports the interconnection between different VPNs.  
CE3  
Private  
network branch 3  
PE3  
CE2  
CE1  
PE1  
Private  
network branch 1  
Private  
network branch 2  
Backbone network  
PE2  
Figure 35-6 MPLS-Based VPN  
The basic structure of MPLS-based VPN is shown in Figure 35-6. CE is the customer  
edge device, and it may either be a router or a switch, or perhaps a host. PE is a service  
provider edge router, which is located on the backbone network. PE is responsible for  
the management of VPN customers, establishing LSP connection between various  
PEs, route allocation among different branches of the same VPN customer.  
Usually the route allocation between PEs is realized by using extended BGP. MPLS  
VPN supports the IP address multiplexing between different branches and the  
interconnection between different VPNs. Compared with traditional route, it is  
necessary to add branch and VPN identifier information in VPN route. So, it is  
necessary to extend BGP so as to carry VPN routing information.  
35-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
Chapter 36 MPLS Basic Capability Configuration  
36.1 MPLS Basic Capability Overview  
Basic MPLS forwarding functions includes LDP session establishment and LSP path  
maintenance.  
The typical configuration procedure for enabling basic MPLS functions on a routing  
switch is as follows:  
1) Configure LSR ID  
2) Enable MPLS  
3) Enable LDP  
4) Enter VLAN interface view and enable MPLS and LDP on the interface  
Then the routing switch can provide MPLS forwarding and LDP signaling functions.  
If you want to modify the default parameters or enable some special functions, for  
example, manually creating LSP or explicit route, you can configure according to the  
methods in configuration list. For some complicated functions, configuration  
combination may be required.  
36.2 MPLS Configuration  
The following sections describe the required configuration tasks for MPLS basic  
capability:  
z
z
The following sections describe the optional configuration tasks for MPLS basic  
capability:  
z
z
36.2.1 Defining MPLS LSR ID  
Before configuring any other MPLS command, it is necessary to configure LSR ID firstly.  
This ID is usually in IP address format and must be unique in the domain.  
Perform the following configuration in the system view.  
36-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
Table 36-1 Define MPLS LSR ID  
Operation  
Command  
mpls lsr-id ip-address  
undo mpls lsr-id  
Define LSR ID  
Delete LSR ID  
By default, LSR ID is not defined.  
36.2.2 Enabling MPLS and Entering MPLS View  
In system view, you can first enable MPLS globally and enter MPLS view using the  
mpls command. Then you can directly enter MPLS view after using the mpls  
command in system view.  
Use the mpls command in VLAN interface view to enable MPLS on the VLAN  
interface.  
Table 36-2 Enter MPLS view  
Operation  
Command  
mpls  
Enable MPLS globally and enter MPLS view (system view)  
Enable MPLS on a VLAN interface (VLAN interface view)  
Disable MPLS globally or on a VLAN interface (system or VLAN  
interface view)  
undo mpls  
By default, MPLS is not enabled.  
36.2.3 Configuring the Topology-Driven LSP Setup Policy  
It refers to specifying filtering policy as all or ip-prefix.  
Perform the following configuration in MPLS view.  
Table 36-3 Configure the topology-driven LSP setup policy  
Operation  
Command  
lsp-trigger { all | ip-prefix ip-prefix }  
Configure the topology-Driven LSP  
setup policy  
Use the default value, which only allows undo lsp-trigger { all | ip-prefix  
32-bit IP to trigger ISP.  
ip-prefix }  
36.2.4 Configuring Static LSP  
You can manually set an LSR to be a node along an LSP, and place a limit on the traffic  
over the LSP. Depending on the position in an MPLS domain, an LSR along an LSP can  
36-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
be the ingress node, an intermediate node (also called transit node), or the egress  
node. Note that an LSP operates normally only after all the LSRs along the LSP have  
been properly configured.  
The undo static-lsp command is used to delete a specified LSP established manually.  
Perform the following configuration in MPLS view.  
Table 36-4 Set the local LSR to a node on a specified LSP  
Operation  
Command  
static-lsp ingress lsp-name  
dest-addr { addr-mask | mask-length } | l2vpn }  
{
destination  
Set the current LSR to the  
ingress node of the specified  
LSP  
nexthop  
next-hop-addr  
}
}
out-label  
out-label-value  
Cancel the ingress node  
setting of the specified LSP  
undo static-lsp ingress lsp-name  
static-lsp transit lsp-name  
incoming-interface interface-type interface-num  
in-label in-label-value nexthop next-hop-addr  
out-label out-label-value  
[
l2vpn  
]
Set the current LSR to an  
intermediate node along the  
specified LSP  
Cancel the intermediate node  
setting of the specified LSP  
undo static-lsp transit lsp-name  
Set the current LSR to the static-lsp egress lsp-name  
[
l2vpn  
]
egress node of the specified incoming-interface interface-type interface-num  
LSP  
in-label in-label-value  
Cancel the egress node  
setting of the specified LSP  
undo static-lsp egress lsp-name  
36.3 LDP Configuration  
The following sections describe the required LDP configuration tasks for MPLS basic  
capability:  
z
z
The following sections describe the optional LDP configuration tasks for MPLS basic  
capability:  
z
z
36.3.1 Enabling LDP protocol  
To configure LDP, first enable LDP.  
Perform the following configuration in the system view.  
36-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
Table 36-5 Enable/disable LDP view  
Operation  
Enable LDP protocol  
Command  
mpls ldp  
Disable LDP  
undo mpls ldp  
By default, LDP is disabled.  
36.3.2 Enabling LDP on VLAN interface  
To make the VLAN interface support LDP, you must enable LDP function on virtual  
interface in VLAN interface mode. After enabling the LDP function, the virtual interface  
then sets up session. It begins to set up LSP if in topology-driven mode,.  
Disabling LDP function on interface causes the break of all LDP session in VLAN  
interface, and all the LSP based on those sessions are deleted. So you must use this  
command with cautiously.  
Perform the following configuration in the interface view.  
Table 36-6 Enable/disable LDP on interface  
Operation  
Command  
mpls ldp enable  
mpls ldp disable  
Enable LDP function on interface  
Disable LDP function on interface  
By default, the interface LDP function is disabled.  
36.3.3 Configuring Remote-Peer for Extended Discovery Mode  
The remote-peer configuration is mainly used for extended discovery mode so that this  
LSR can establish sessions with LSRs that are not directly connected with it at the link  
layer.  
I. Create a remote-peer  
Perform the following configuration in the system view.  
Table 36-7 Create a remote-peer  
Operation  
Command  
Create  
remote-peer view  
a
remote-peer and enter  
mpls ldp remote-peer index  
undo mpls ldp remote-peer index  
Delete the corresponding remote-peer  
36-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
There is no default remote-peer.  
II. Configuring an address for the remote-peer  
You can specify the address of any LDP-enabled interface on the remote-peer or the  
address of the loopback interface on the LSR that has advertised the route as the  
address of the remote-peer.  
Perform the following configuration in the remote-peer view.  
Table 36-8 Configure a remote-peer address  
Operation  
Command  
remote-ip remoteip  
Configure a remote-peer address  
remoteip: the IP address of remote peer. It should be the LSR ID of the peer LSR.  
There is no default remote-peer.  
36.3.4 Configuring session parameters  
I. Configuring session hold-time  
The LDP entity on the interface sends Hello packets periodically to find out LDP peer,  
and the established sessions must also maintain their existence by periodic message  
(if there is no LDP message, then Keepalive message must be sent).  
Note:  
There are two types of LDP sessions: basic and remote. Basic session can be  
established only on two direct-connect switches, while remote session can be on two  
switches which are not directly connected. You can only configure basic sessions in  
VLAN interface view and remote sessions in remote-peer view.  
Caution:  
Modifying the holdtime parameter results in re-establish the original session, as well as  
the LSP over this session. Here the session refers to basic session, but not remote  
session.  
Perform the following configuration in VLAN interface view.  
36-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
Table 36-9 Configure basic session hold-time  
Operation  
Command  
mpls  
ldp  
timer  
{
session-hold  
Configure session hold-time  
Return to the default value  
session-holdtime | hello hello-holdtime }  
undo mpls ldp timer { session-hold | hello }  
By default, the session-holdtime is 60 seconds and hello-holdtime is 15 seconds.  
Perform the following configuration in remote-peer view.  
Table 36-10 Configure remote session hold-time  
Operation  
Command  
mpls ldp timer { targeted-session-hold |  
targeted-hello } {holdtime | interval } }  
Configure session hold-time  
undo  
mpls  
ldp  
timer  
Return to the default value  
{ targeted-session-hold | targeted-hello }  
By default, targeted-session-hold holdtime is 60 seconds, and the interval is 24  
seconds; targeted-hello holdtime is 45 seconds and the interval is 13 seconds.  
II. Configuring hello transport-address  
The transport-address discussed here refers to the address carried in the transport  
address TLV in hello messages. Generally, you can configure the transport-address to  
the MPLS LSR ID of the current LSR, but you can also configure the transport-address  
to other address flexibly as required by some applications.  
Perform the following configuration in VLAN interface view.  
Table 36-11 Configure hello transport-address  
Operation  
Command  
mpls ldp transport-ip  
ip-address }  
{
interface  
|
Configure hello transport-address  
Return to the default hello  
transport-address  
undo mpls ldp transport-ip  
Transport-address defaults to the MPLS LSR ID of the current LSR.  
If there are multiple links connecting two neighboring LSRs, all the LDP-enabled  
interfaces on the links connecting LSR and its neighbor must have the same transport  
address. You are recommended to use the same interface address for all of them, that  
is, LSR-ID.  
36-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
36.3.5 Configuring LDP Loop Detection Control  
I. Enabling loop detection  
It is used to enable or disable the loop detection function during LDP signaling process.  
The loop detection includes maximum hop count mode and path vector mode.  
The maximum hop count method refers to that the hop-count information is contained  
in the message bound with the forwarding label, and the value pluses one for each hop.  
When the value exceeds the threshold value, it is considered that a loop presents, and  
the process for establishing LSP is terminated.  
The path vector method refers to that the path information is recorded in the message  
bound with the forwarding label, and, for every hop, the corresponding router checks if  
its ID is contained in this record. If not, the router adds its ID into the record; and if yes,  
it indicates that a loop presents and the process for establishing LSP is terminated.  
When this method is used, if the defined maximum value is exceeded, it is considered  
that a loop happens and the LSP establishment fails.  
Perform the following configuration in the system view.  
Table 36-12 Enable loop detection  
Operation  
Enable loop detection  
Command  
mpls ldp loop-detect  
undo mpls ldp loop-detect  
Disable loop detection  
By default, the loop detection is disabled.  
II. Setting the maximum hop count for loop detection  
When maximum hop count mode is adopted for loop detection, the maximum  
hop-count value can be defined. And if the maximum value is exceeded, it is  
considered that a loop happens and the LSP establishment fails.  
Perform the following configuration in the system view.  
Table 36-13 Set the maximum hop count for loop detection  
Operation  
Command  
Set maximum hop count for loop  
detection  
mpls ldp hops-count hop-number  
Return to the default maximum hop  
count  
undo mpls ldp hops-count  
The maximum hop count defaults to 32.  
36-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
III. Setting the maximum hop count in path vector mode  
When path vector mode is adopted for loop detection, it is also necessary to specify the  
maximum value of LSP path. In this way, when one of the following conditions is met, it  
is considered that a loop happens and the LSP establishment fails.  
z
z
The record of this LSR already exists in the path vector recording table.  
The path hop count exceeds this maximum value.  
Perform the following configuration in the system view.  
Table 36-14 Set the maximum hop count in path vector mode  
Operation  
Command  
Set the maximum hop count in path  
vector mode  
mpls ldp path-vectors pv-number  
Return to the default maximum hop  
count in path vector mode  
undo mpls ldp path-vectors  
The maximum hop count defaults to 32.  
36.3.6 Configuring LDP Authentication Mode Between Every Two Routers  
Perform the following configuration in VLAN interface view or remote-peer view.  
Table 36-15 Configure LDP authentication mode  
Operation  
Command  
mpls ldp password [ cipher | simple ]  
password  
Configure LDP authentication Mode  
Remove LDP authentication  
undo mpls ldp password  
36.4 Displaying and Debugging MPLS  
36.4.1 Displaying and Debugging MPLS  
MPLS provides abundant display and debugging commands for monitoring LDP  
session state, tunnel, all the LSPs and their states, and so on. These commands are  
the powerful debugging and diagnosing tools.  
I. Displaying static LSPs  
After accomplishing the configuration tasks mentioned previously, you can execute the  
display command in any view to view the running state of a single or all the static LSPs  
and thus to evaluate the effect of the configurations.  
36-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
Table 36-16 Display the static LSP information  
Operation  
Command  
display mpls static-lsp [ include text |  
verbose ]  
Display the static LSP information  
II. Displaying MPLS-enabled interfaces  
After accomplishing the configuration tasks mentioned previously, you can execute the  
display command in any view to view the information related to the MPLS-enabled  
interfaces and thus to evaluate the effect of the configurations.  
Table 36-17 Display information of the MPLS-enabled interfaces  
Operation  
Command  
display mpls interface  
Display  
information  
MPLS-enabled interfaces  
of  
the  
III. Displaying LSP  
Execute the following commands in any view to display the information related to MPLS  
LSP.  
Table 36-18 Display the information about MPLS LSP  
Operation  
Command  
Display the information about MPLS display mpls lsp [ include text  
|
LSP  
verbose ]  
IV. Debugging MPLS  
You may execute the debugging command in user view to debug the information  
concerning all interfaces with MPLS function enabled.  
As enabling debugging may affect the router performance, you are recommended to  
use this command when necessary. Execute the undo form of this command to disable  
the corresponding debugging.  
Table 36-19 Enable/disable debugging for MPLS  
Operation  
Command  
Enable debugging for debugging mpls lspm { agent | all | event | ftn |  
MPLS LSP interface | packet | policy process | vpn }  
Disable debugging for undo debugging mpls lspm { agent | all | event | ftn |  
MPLS LSP  
interface | packet | policy process | vpn }  
36-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
V. Trapping MPLS  
This command is used to enable the trap function of MPLS during an LSP/LDP setup  
process.  
Perform the following configuration in system view.  
Table 36-20 Enable the trap function of MPLS  
Operation  
Command  
Enable the LDP trap function of MPLS  
Disable the LDP trap function of MPLS  
Enable the LSP trap function of MPLS  
Disable the LSP trap function of MPLS  
snmp-agent trap enable ldp  
undo snmp-agent trap enable ldp  
snmp-agent trap enable lsp  
undo snmp-agent trap enable lsp  
36.4.2 Displaying and Debugging LDP  
I. LDP display commands  
VRP provides abundant MPLS monitoring commands for monitoring states of LSRs,  
LDP sessions, interfaces and peers. These commands are the powerful debugging and  
diagnosing tools.  
After accomplishing the configuration tasks described earlier, you can execute the  
display command in any view to view the running state of LDP and thus to evaluate the  
effect of the configurations.  
Table 36-21 Display LDP  
Operation  
Display LDP information  
Command  
display mpls ldp  
Display buffer information for LDP  
display mpls ldp buffer-info  
display mpls ldp interface  
display mpls ldp lsp  
Display  
LDP-enabled  
interface  
information  
Display LDP saved label information  
Display information on all peers of LDP  
session  
display mpls ldp peer  
Display information of the remote-peers  
in the LDP sessions  
display mpls ldp remote  
display mpls ldp session  
Display states and parameters of LDP  
sessions  
36-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
II. LDP debugging commands  
Execute debugging command in user view for the debugging of various messages  
related to LDP  
Table 36-22 Enable/disable debugging for MPLS LDP  
Operation  
Command  
debugging mpls ldp { all | main | advertisement |  
session | pdu | notification | remote }[ interface  
interface-type interface-num ]  
Enable debugging for  
MPLS LDP  
undo mpls debugging ldp { all | main | advertisement |  
session | pdu | notification | remote } [ interface  
interface-type interface-num ]  
Disable debugging for  
MPLS LDP  
all: Displays all LDP-related debugging information  
main: Displays debugging information about LDP main tasks  
advertisement: Displays debugging information in processing LDP advertisements  
session: Displays debugging information in processing LDP session  
pdu: Displays debugging information in processing PDU packets  
notification: Displays debugging information in processing notifications  
remote: Displays debugging information about all remote peers  
interface-type Interface-num: Port type and port ID.  
Use the mpls ldp reset-session command in VLAN interface to reset a specific LDP  
session on the VLAN interface.  
Table 36-23 Reset LDP  
Operation  
Command  
Reset a specific LDP session on the  
VLAN interface (VLAN interface view)  
mpls ldp reset-session peer-address  
36.5 Typical MPLS Configuration Example  
I. Network requirements  
Figure 36-1 illustrates a network with four switches, which connects to each other  
through Ethernet.  
The four switches all support MPLS, and LSP can be established between any two  
switches with the routing protocol OSPF.LDP establishes LSP by using routing  
information of OSPF.  
36-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
II. Network diagram  
SwitchB  
VLAN201  
168.1.1.2  
VLAN203  
172.17.1.1  
Switch A  
SwitchD  
VLAN202  
100.10.1.2  
VLAN201  
168.1.1.1  
VLAN203  
172.17.1.2  
VLAN202  
100.10.1.1  
SwitchC  
Figure 36-1 Network diagram  
III. Configuration procedure  
1) Configure Switch A  
Configure LSR ID and enable MPLS and LDP.  
[SW8800] mpls lsr-id 168.1.1.1  
[SW8800] mpls  
[SW8800-mpls] quit  
[SW8800] mpls ldp  
Configure IP address and enable MPLS and LDP for VLAN interface 201.  
[SW8800] vlan 201  
[SW8800-vlan201] port gigabitethernet 2/1/1  
[SW8800-vlan201] quit  
[SW8800] interface Vlan-interface 201  
[SW8800-Vlan-interface201] ip address 168.1.1.1 255.255.0.0  
[SW8800-Vlan-interface201] mpls  
[SW8800-Vlan-interface201] mpls ldp enable  
[SW8800-Vlan-interface201] mpls ldp transport-ip interface  
Enable OSPF on the interface connecting Switch A with Switch B.  
[SW8800] Router id 168.1.1.1  
[SW8800] ospf  
[SW8800-ospf-1] area 0  
[SW8800-ospf-1-area-0.0.0.0] network 168.1.0.0 0.0.255.255  
2) Configure Switch B  
Configure LSR ID and enable MPLS and LDP.  
[SW8800] mpls lsr-id 172.17.1.1  
36-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
[SW8800] mpls  
[SW8800-mpls] quit  
[SW8800] mpls ldp  
Configure IP address and enable MPLS and LDP for VLAN interface 201.  
[SW8800] vlan 201  
[SW8800-vlan201] port gigabitethernet 2/1/1  
[SW8800-vlan201] quit  
[SW8800] interface Vlan-Interface 201  
[SW8800-Vlan-interface201] ip address 168.1.1.2 255.255.0.0  
[SW8800-Vlan-interface201] mpls  
[SW8800-Vlan-interface201] mpls ldp enable  
[SW8800-Vlan-interface201] mpls ldp transport-ip interface  
Configure IP address and enable MPLS and LDP for VLAN interface 203.  
[SW8800] vlan 203  
[SW8800-vlan203] port gigabitethernet 2/1/3  
[SW8800-vlan203] quit  
[SW8800] interface Vlan-Interface 203  
[SW8800-Vlan-interface203] ip address 172.17.1.1 255.255.0.0  
[SW8800-Vlan-interface203] mpls  
[SW8800-Vlan-interface203] mpls ldp enable  
[SW8800-Vlan-interface203] mpls ldp transport-ip interface  
Configure IP address and enable MPLS and LDP for VLAN interface 202.  
[SW8800] vlan 202  
[SW8800-vlan202] port gigabitethernet 2/1/2  
[SW8800-vlan202] quit  
[SW8800] interface Vlan-interface 202  
[SW8800-Vlan-interface202] ip address 100.10.1.2 255.255.255.0  
[SW8800-Vlan-interface202] mpls  
[SW8800-Vlan-interface202] mpls ldp enable  
[SW8800-Vlan-interface202] mpls ldp transport-ip interface  
[SW8800-Vlan-interface202] quit  
Enable OSPF on the interfaces respectively connecting Switch B with Switch A, Switch  
D and Switch C.  
[SW8800] Router id 172.17.1.1  
[SW8800] ospf  
[SW8800-ospf-1] area 0  
[SW8800-ospf-1-area-0.0.0.0] network 168.1.0.0 0.0.255.255  
[SW8800-ospf-1-area-0.0.0.0] network 172.17.0.0 0.0.255.255  
[SW8800-ospf-1-area-0.0.0.0] network 100.10.1.0 0.0.0.255  
[SW8800-ospf-1-area-0.0.0.0] quit  
3) Configure Switch C  
36-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
Configure LSR ID and enable MPLS and LDP.  
[SW8800] mpls lsr-id 100.10.1.1  
[SW8800] mpls  
[SW8800-mpls] quit  
[SW8800] mpls ldp  
Configure IP address and enable LDP and MPLS for VLAN interface 202.  
[SW8800] vlan 202  
[SW8800-vlan202] port gigabitethernet 2/1/1  
[SW8800-vlan202] quit  
[SW8800] interface Vlan-interface 202  
[SW8800-Vlan-interface202] ip address 100.10.1.1 255.255.255.0  
[SW8800-Vlan-interface202] mpls  
[SW8800-Vlan-interface202] mpls ldp enable  
[SW8800-Vlan-interface202] quit  
Enable OSPF on the interface connecting Switch C with Switch B.  
[SW8800] Router id 100.10.1.1  
[SW8800] ospf  
[SW8800-ospf-1] area 0  
[SW8800-ospf-1-area-0.0.0.0] network 100.10.1.0 0.0.0.255  
4) Configure Switch D  
Configure LSR ID and enable MPLS and LDP.  
[SW8800] mpls lsr-id 172.17.1.2  
[SW8800] mpls  
[SW8800-mpls] quit  
[SW8800] mpls ldp  
Configure IP address and enable MPLS and LDP for VLAN interface 203.  
[SW8800] vlan 203  
[SW8800-vlan203] port gigabitethernet 2/1/3  
[SW8800-vlan203] quit  
[SW8800] interface vlan-interface 203  
[SW8800-Vlan-interface203] ip address 172.17.1.2 255.255.0.0  
[SW8800-Vlan-interface203] mpls  
[SW8800-Vlan-interface203] mpls ldp enable  
Enable OSPF on the interface connecting Switch D with Switch B.  
[SW8800] Router id 172.17.1.2  
[SW8800] ospf  
[SW8800-ospf-1] area 0  
[SW8800-ospf-1-area-0.0.0.0] network 172.17.0.0 0.0.255.255  
36-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 36 MPLS Basic Capability Configuration  
36.6 Troubleshooting MPLS Configuration  
Symptom: Session cannot be setup with the peer after LDP is enabled on the interface.  
Troubleshooting:  
Cause 1: Loop detection configuration is different at the two ends.  
Solution: Check loop detection configuration at both ends to see if one end is  
configured while the other end is not (this will result in session negotiation failure).  
Cause 2: Local machine cannot get the route to peer LSR ID, so TCP connection  
cannot be set up and session cannot be established.  
Solution: The default address for session transfer is MPLS LSR ID. The local machine  
should issue the LSR ID route (often the loopback address) and lean the peer LSR ID  
route.  
36-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Chapter 37 BGP/MPLS VPN Configuration  
37.1 BGP/MPLS VPN Overview  
Traditional VPN, for which layer 2 tunneling protocols (L2TP, L2F and PPTP, and so on.)  
or layer 3 tunnel technology (IPSec, GRE and so on.) is adopted, is a great success  
and is therefore widely used. However, along with the increase of the size of VPNs , the  
deficiency of traditional VPN in such aspects as expansibility and manageability  
becomes more and more obvious. In addition, QoS (Quality of Service) and security  
are also the difficult problem for traditional VPN.  
Using the MPLS technology, service providers can implement the IP-based VPN  
services easily and enable their networks to meet the expansibility and manageability  
requirement for VPN. The VPN constructed by using MPLS also provides the possibility  
for the implementation of value-added service. Multiple VPNs can be formed from a  
single access point, and each VPN represents a different service, making the network  
able to transmit services of different types in a flexible way.  
Product currently provides comparatively complete BGP/MPLS VPN networking  
capabilities:  
z
Address isolation, allowing the overlap of address of different VPNs and public  
networks.  
z
Supporting MBGP advertising VPN routing information through public network,  
establishing BGP/MPLS VPN.  
z
z
Forwarding VPN data stream over MPLS LSP.  
Providing MPLS VPN performance monitoring and fault detecting tools.  
37-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
37.1.1 BGP/MPLS VPN Model  
I. BGP/MPLS VPN model  
site 1  
CE  
VPN1  
Backbone network of  
the service provider  
site 1  
PE  
P
P
CE  
PE  
PE  
VPN 2  
CE  
site 2  
VPN2  
site 3  
P
PE  
VPN1  
site 2  
CE  
CE  
Figure 37-1 MPLS VPN model  
As shown in Figure 37-1, MPLS VPN model contains three parts: CE, PE and P.  
z
CE (Customer Edge) device: It is a composing part of the customer network, which  
is usually connected with the service provider directly through an interface. It may  
be a router or a switch which cannot sense the existence of VPN.  
PE (Provider Edge) router: It is the Provider Edge router, namely the edge device  
of the provider network, which connects with your CE directly. In MPLS network,  
PE router processes all the operations for VPN.PE needs to possess MPLS basic  
forwarding capability.  
z
z
P (Provider) router: It is the backbone router in the provider network, which is not  
connected with CE directly. P router needs to possess MPLS basic forwarding  
capability.  
The classification of CE and PE mainly depends on the range for the management of  
the provider and the customer, and CE and PE are the edges of the management  
ranges.  
II. Nested BGP/MPLS VPN model  
In a basic BGP/MPLS VPN model, the PEs are in the network of the service provider  
and are managed by the service provider.  
When a VPN user wants to subdivide the VPN into multiple VPNs, the traditional  
solution is to configure these VPNs directly on the PEs of the service provider. This  
solution is easy to implement, but has the following disadvantages: the number of the  
VPNs carried on PEs may increase rapidly; the operator may have to perform more  
operations when required by a user to adjust the relation between the user's internal  
37-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
VPNs. These disadvantages not only increase the network operating cost, but also  
bring relevant management and security issues.  
The nested VPN is a better solution. Its main idea is to transfer VPNv4 route between  
PE and CE of common BGP MPLS/VPN such that user themselves can manage their  
internal VPN division, and the service provider can be saved from participating into  
users' internal VPN management.  
The following figure shows the network model for nested VPN:  
CE5  
VPN1  
provider PE  
provider PE  
CE6  
P
VPN2  
CE7  
VPN3  
customer VPN  
customer VPN  
customer PE  
customer PE  
CE2  
CE1  
CE3  
CE4  
VPN1  
VPN1  
VPN2  
VPN3  
Figure 37-2 Network model for nested BGP/MPLS VPN  
III. Basic concepts in BGP/MPLS VPN  
1) vpn-instance  
vpn-instance is an important concept in VPN routing in MPLS. In an MPLS VPN  
implementation, each site corresponds to a specific vpn-instance on PE (their  
association is implemented by binding vpn-instance to the VALN interface). If  
subscribers on one site belong to multiple VPNs, then the corresponding vpn-instance  
includes information about all these VPNs.  
Specifically, such information should be included in vpn-instance: label forwarding table,  
IP routing table, the interfaces bound with vpn-instance, and the management  
information (RD, route filtering policy, member interface list, and so on). It includes the  
VPN membership and routing rules of this site.  
PE is responsible for updating and maintaining the relationship between vpn-instance  
and VPN. To avoid data leakage from the VPN and illegal data entering into the VPN,  
each vpn-instance on the PE has an independent set of routing table and label  
forwarding table, in which the forwarding information of the message is saved  
2) MBGP  
MBGP (multiprotocol extensions for BGP-4, see RFC2283) propagates VPN  
membership information and routes between PE routers. It features backward  
37-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
compatibility: It not only supports traditional IPv4 address family, but also supports  
other address families, for example, VPN-IPv4 address family. MP-BGP ensures that  
VPN private routes are only advertised within VPNs, as well as implementing  
communication between MPLS VPN members.  
3) VPN-IPv4 address  
VPN is just a private network, so it can use the same IP address to indicate different  
sites. But the IP address is supposed as unique when MP-BGP advertises CE routes  
between PE routers, so routing errors may occur for the different meaning in two  
systems. The solution is to switch IPv4 addresses to VPN-IPv4 address to generate  
globally unique addresses before advertising them, so PE routers is required to support  
MP-BGP.  
A VPN-IPv4 address consists of 12 bytes, and the first eight bytes represent the RD  
(Route Distinguisher), which are followed by a 4-byte IPv4 address. The service  
providers can distribute RD independently. However, their special AS (Autonomous  
System) number must be taken as a part of the RD. After being processed in this way,  
even if the 4-byte IPv4 address contained in VPN-IPv4 address has been overlapped,  
the VPN-IPv4 address can still maintain globally unique. RD is only used within the  
carrier network to differentiate routes. When the RD is 0, a VPN-IPv4 address is just a  
IPv4 address in general sense.  
The route received by PE from CE is the IPv4 route that needs to be redistributed into  
vpn-instance routing table, and in this case a RD needs to be added. It is recommended  
that the same RD be configured for all routes from the same user site.  
IV. VPN Target attribute  
VPN Target attribute is one of the MBGP extension community attributes and is used to  
limit VPN routing information advertisement. It identifies the set of sites that can use  
some route, namely by which Sites this route can be received, and the PE router can  
receive the route transmitted by which Sites. The PE routers connected with the site  
specified in VPN Target can all receive the routes with this attribute.  
For PE routers, there are two sets of VPN Target attributes: one of them, referred to as  
Export Targets, is added to the route received from a direct-connect site in advertising  
local routes to remote PE routers. And the other one, known as Import Targets, is used  
to decide which routes can be imported into the routing table of this site in receiving  
routes from remote PE routers.  
When matching the VPN Target attribute carried by the route to filter the routing  
information received by the PE router, if the export VPN target set of the received route  
contains identical items with the import VPN target set of the local end, the route is  
imported into the VPN routing table and then advertised to the connected CE .  
Otherwise, the route will be rejected.  
37-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
ERT: Export Route Targets  
RD  
IPv4 address  
...  
ERT1 ERT2  
...  
ERTn  
MPLS VPN Route  
Import Route Targets:  
( IRT1, IRT2, ... ,IRTm )  
Figure 37-3 Route filtering through matching VPN Target attribute  
Note:  
The routes for other VPNs will not appear in the VPN's routing table by using VPN  
Target attribute to filter routing information received at PE router, so the CE-transmitted  
data will only be forwarded within the VPN.  
37.1.2 BGP/MPLS VPN Implementation  
BGP/MPLS VPN works on this principle: It uses BGP to propagate VPN private routing  
information on carrier backbone network, and uses MPLS to forward VPN service  
traffic.  
The following are introductions to BGP/MPLS implementation from two aspects:  
advertising VPN routing information and forwarding VPN packets.  
I. Advertising VPN routing information  
Routing information exchange has the following four types:  
1) Between CE and PE  
A PE router can learn routing information about the CE connected to it through static  
route, RIP (supporting multi-instance), OSPF (supporting multi-instance) or EBGP, and  
imports it in a vpn-instance.  
2) Between ingress PE and egress PE  
The ingress PE router uses MP-BGP to send information across public network: It  
advertises routing information learned from CE to the egress PE router (with MPLS  
label) and learns the CE routing information learned at the egress PE router.  
The internal connectivity among the VPN internal nodes is ensured through enabling  
IGP (for example, RIP and OSPF) or configuring static routes on the PEs.  
LSP setup between PEs  
37-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
LSPs must be set up between PEs for VPN data traffic forwarding with MPLS LSP. The  
PE router which receives packets from CE and create label protocol stack is called  
ingress LSR, while the BGP next hop (egress PE router) is egress LSR. Using LDP to  
create fully connected LSPs among PEs.  
3) Between PE and CE  
A CE can learn remote VPN routes from the PE connected through static routes, RIP,  
OSPF or EBGP.  
With above-mentioned steps, reachable routes can be established between CEs, for  
transmission of VPN private routing information over public network.  
II. Forwarding VPN packets  
On the ingress PE, two-layer label stack is formed for each VPN packet:  
Interior-layer label, also called MPLS label, is at the bottom of the label stack and  
distributed by M-BGP when the egress PE advertises routing information (in VPN  
forwarding table) to ingress GE. When VPN packets from public network reach the CE,  
they can be forwarded from the designated interface to the designated CE or site by  
searching for the target MPLS forwarding table according to the labels contained.  
Exterior-layer label, known as LSP initialization label, distributed by MPLS LDP, is at  
the top of the label stack and indicates an LSP from the ingress PE to egress PE. By the  
switching of exterior-layer label, VPN packets can be forwarded along the LSP to the  
peer PE.  
Figure 37-4 illustrates the details:  
Layer1  
Layer2  
1.1.1.2  
Layer2  
1.1.1.2  
1.1.1.2  
1.1.1.2  
CE1  
CE2  
PE1  
PE2  
P
P
site1  
1.1.1.1/24  
site2  
1.1.1.2/24  
Figure 37-4 Forwarding VPN packets  
1) Site 1 sends an IPv4 packet with the destination address 1.1.1.2 of to CE1. CE1  
looks up the IP routing table for a matched entry and sends the packet to PE1  
according to the matched entry.  
2) Depending on the interface the packet reaches and the destination of it, PE1 looks  
up the VPN-instance entry to obtain interior-layer label, exterior-layer label, BGP  
next hop (PE2), and output interfaces. After the establishment of labels, PE1  
forwards MPLS packets to the first P of LSP through output interface.  
37-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
3) Each P router on LSP forwards MPLS packets using exterior-layer label to the  
penultimate-hop router, namely the P router before PE2. The penultimate-hop  
router extracts the exterior-layer and sends MPLS packet to PE2.  
4) PE2 looks up in the MPLS forwarding table according to the interior-layer label and  
destination address to determine the egress interface for labeling operation and  
the packet. It then extracts the interior-layer label and forwards through the egress  
interface the IPv4 packet to CE2.  
5) CE2 looks up in the routing table and sends the packet in normal IPv4 packet  
forwarding mode to the site2.  
37.1.3 Nested BGP/MPLS VPN Implementation  
When implementing a nested BGP/MPLS VPN, pay attention to the following items:  
z
z
No address overlap is allowed between user's internal sub-VPNs.  
To ensure the VPN routing information is correctly advertised over the backbone  
network, the VPN-Targets of the user VPN and the internal sub-VPNs cannot be  
overlapped and must be specified by the service provider.  
z
The provider PE and the customer PE must be directly connected and cannot  
exchange VPNv4 route in Multihop-EBGP mode.  
Before configuring a nested BGP/MPLS VPN, you must complete the following tasks:  
z
Configuring IGP on the MPLS backbone network (including provider PE and P  
routers) to implement the IP connectivity on the backbone network.  
Configuring basic MPLS capability on the MPLS backbone network.  
Configuring MPLS LDP and setting up LDP LSP on the MPLS backbone network.  
Configuring BGP on the MPLS backbone network (create EBGP peers between  
provider PEs).  
z
z
z
z
Configuring basic MPLS capability on user-end network (including customer PEs).  
37.1.4 Hierarchical BGP/MPLS VPN Implementation  
As PE is required to aggregate multiple VPN routes on a BGP/MPLS VPN, it is prone to  
forming a bottleneck in a large-scale deployment or in the case that PE capacity is  
small.  
Hierarchical BGP/MPLS VPN divides an MPLS VPN into several MPLS VPNs in a  
hierarchical network structure. Each VPN takes on a role depending on its level. There  
are high performance requirements in routing and forwarding on the PEs at the higher  
level of MPLS VPN, because they are primarily used for connecting the backbone  
networks and providing access service for huge VPN clients. However, such  
requirements are relatively low for PEs at the lower level of the network as they  
primarily function to access the VPN clients at the edges. Congruous with the IP  
network model, HoVPN model improves the scalability of BGP/MPLS VPN, and hence  
allows lower-layer MPLS VPNs comprising low-end equipment to provide MPLS VPN  
accessing and interconnect through the high-end MPLS VPN backbone.  
37-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
As shown in Figure 37-5, the PEs directly connected with user devices are called UPE  
(underlayer PE or user-end PE); the devices in the core network connected with the  
UPEs are called SPE (superstratum PE or service-provider-end PE).  
Hierarchical PEs have the same appearance as that of the traditional PEs and can  
coexist with other PEs in the same MPLS network.  
UPEs are responsible for user access; they only maintain the routes of directly  
connected VPN sites, but not that of the remote sites. SPEs, however, are responsible  
for the maintenance and advertisement of VPN routes; they maintain all the routes of  
the VPNs connected by their UPEs, including the routes in both local and remote sites.  
UPE and SPE are relative concepts. In a multi-layer PE architecture, an upper layer PE  
is an SPE for its lower layer PE, and a lower layer PE is an UPE for its upper layer PE.  
The MBGP runs between SPE and UPE can be either MP-IBGP or MP-EBGP,  
depending on whether the SPE and the UPE are in the same AS.  
MPLS backbone  
network  
PE  
PE  
Upper VPN  
SPE  
Lower VPN  
VPN1 Site1  
CE  
UPE  
UPE  
VPN2 Site1  
VPN1 Site1  
VPN2 Site1  
CE  
CE  
CE  
Figure 37-5 Hierarchical BGP/MPLS VPN  
37.1.5 Introduction to OSPF Multi-instance  
As one of the most popular IGP routing protocols, OSPF is used as an internal routing  
protocol in many VPNs. Using OSPF on PE-CE links brings convenience to you  
because in this case CE routers only need to support OSPF protocol, without the need  
of supporting other protocols, and network administrator only have to know the OSPF  
protocol. If you want to transform conventional OSPF backbone into BGP/MPLS VPN,  
using OSPF between PE and CE can simplify this transform process.  
Therefore IETF raised two new OSPF VPN extension drafts, to provide a complete  
solution to SPPF problems in BGP/MPLS VPN application when OSPF is used as  
PE-CE routing protocol. In this case, PE router must be able to run multiple OSPF  
instances, each of which corresponds to one VPN instance, owns an individual  
37-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
interface, routing table, and sends VPN routing information over MPLS network using  
BGP/OSPF interaction.  
If supporting OSPF multi-instance, one router can run multiple OSPF procedures,  
which can be bound to different VPN instances. In practice, you can create one OSPF  
instance for each service type. OSPF multi-instance can fully isolate different services  
in transmission, which can solve security problems with low cost to meet the needs of  
customers. Generally, OSPF multi-instance is run on PEs; The CE running OSPF  
multi-instance in the LAN is called multi-VPN-instance CE. At present, isolation of LAN  
services implements by VLAN function of the switch. OSPF Multi-VPN-Instance CE  
provides schemes of services isolation implemented on routers.  
VPN- GREEN  
Si t e2  
OSPF Ar ea2  
CE31  
VPN-RED  
Site1  
OSPF Area0  
Area 2  
OSPF 100 VPN-GREEN  
PE3  
VPN- RED  
Si t e2  
OSPF Ar ea1  
CE21  
CE11  
Area 0  
OSPF 100 VPN-RED  
Area 0  
OSPF 100 VPN-RED  
MPLS VPN Backbone  
OSPF 200 VPN-GREEN  
Area 1  
PE1  
OSPF 200 VPN-GREEN  
Area 1  
VPN- GREEN  
Si t e1  
OSPF Ar ea1  
PE2  
CE12  
CE22  
Figure 37-6 OSPF multi-instance application in MPLS/BGP VPN PE  
Eng  
inee  
ring  
ospf 100  
vpn-engineering  
ospf 100  
vpn-engineering  
opsf 200  
vpn-rd  
opsf 200  
vpn-rd  
MP  
LS N  
etw  
ork  
R&  
D
ospf 300  
vpn-finances  
PE  
Multi-VPN-Instance CE  
ospf 300  
Fin  
ance  
s
vpn-finances  
Figure 37-7 Multi-VPN-instance CE application in conventional LAN  
37.1.6 Introduction to Multi-Role Host  
The VPN attribute of the packets from a CE to its PE lies on the VPN bound with the  
ingress interface. This, in fact determines that all the CEs forwarded by the PE through  
the same ingress interface belong to the same VPN; but in actual network  
environments, a CE may need to access multiple VPNs through one physical interface.  
Though you can configure different logical interfaces to meet this need, this  
37-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
compromised method brings additional configuration burden and has limitation in  
actual use.  
To resolve this problem, the idea of multi-role host is generated. Specifically to say, this  
idea is to differentiate the accesses to different VPNs through configuring policy routing  
based on IP addresses, and transmit downstream data flow from PE to CE by  
configuring static routing. The static routing under multi-role host circumstance is  
different from common hosts; it is implemented by specifying an interface of another  
VPN as the egress interface through a static route in a VPN; and thus allowing one  
logical interface to access multiple VPNs.  
37.2 BGP/MPLS VPN Configuration  
Implementing BGP/MPLS VPN functions requires the following procedures in general:  
Configure basic information on PE, CE and P; establish the logical or physical link with  
IP capabilities from PE to PE; advertise and update VPN network information.  
I. CE router  
The configuration on CE is relative simple. Only static route, RIP, OSPF or EBGP  
configuration is needed for VPN routing information exchange with the PE connected,  
MPLS configuration is not needed.  
II. PE router  
The configuration on PE is relative complex. After the configuration, the PE implements  
MPLS/BGP VPN core functions.  
The following sections describe the configuration tasks on a PE device:  
z
z
z
z
III. P router  
The configuration on P device is relative simple. The main task is to configure MPLS  
basic capacity on the P device to support LDP and MPLS forwarding.  
The following are detailed configurations.  
37.2.1 Configuring CE Router  
As a customer-side device, only basic configuration is required on a CE router, for  
routing information exchange with PE router. Currently route switching modes available  
include static route, RIP, OSPF, EBGP, and so on.  
37-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
I. Creating static route  
If you select static route mode for CE-PE route switching, you should then configure a  
private static route pointing to PE on CE.  
Perform the following configuration in the system view.  
Table 37-1 Create/delete a static route in VPN instance routing table  
Operation  
Command  
ip route-static ip-address { mask | mask-length }  
{ interface-name | gateway-address } [ preference  
preference-value ] [ reject | blackhole ]  
Create  
vpn-instance static route  
a
specified  
undo ip route-static ip-address { mask | mask-length }  
[ interface-name | gateway-address ] [ preference  
preference-value ]  
Delete  
vpn-instance static route  
a
specified  
By default, the preference value for a static route is 60. You can also specify preference  
for a static route.  
II. Configuring RIP  
If you select RIP mode for CE-PE route switching, you should then configure RIP on CE.  
For detailed RIP configuration steps, see the RIP section in this guide  
III. Configuring OSPF  
If you select OSPF mode for CE-PE route switching, you should then configure OSPF  
on CE. For configuring OSPF, see the routing protocol section of this guide.  
You must configure OSPF multi-instance to isolate services of different VPNs on CE  
router, which is now called Multi-VPN-Instance CE.  
You can bind OSPF procedures with VPN with the following command in OSPF view.  
Table 37-2 Configure the router as multi-VPN-instance CE  
Operation  
Command  
vpn-instance-capability  
simple  
Configure the router as multi-VPN-instance CE  
Remove the configuration  
undo vpn-instance-capability  
IV. Configuring EBGP  
If you select BGP mode for CE-PE route switching, you should then configure EBGP  
peer, import direct-connect route, static route and other IGP routes, for BGP to  
advertise VPN routes to PE.  
37-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
37.2.2 Configuring PE Router  
I. Configuring basic MPLS capability  
It includes configuring MPLS LSR ID, enable MPLS globally and enable MPLS in the  
corresponding VLAN interface view.  
See MPLS Basic Capacity Configure for details.  
II. Defining BGP/MPLS VPN site  
1) Create vpn-instance and enter vpn-instance view  
The VPN instance is associated with a site. The VPN membership and routing rules of  
a site is configured in the corresponding VPN instance.  
This command is used to create a new vpn-instance and enter the vpn-instance view,  
or directly enter the vpn-instance view if the vpn-instance already exists.  
Perform the following configuration in the system view.  
Table 37-3 Create a vpn-instance and enter vpn-instance view  
Operation  
Command  
Create a vpn-instance and enter  
vpn-instance view  
ip vpn-instance vpn-instance-name  
undo ip vpn-instance vpn-instance-name  
Delete a vpn-instance  
By default, no vpn-instance is defined.  
2) Configure RD for the vpn-instance  
After PE router is configured with RD, when a VPN route learned from CE is imported  
into BGP, BGP attaches the RD in front of the IPv4 address. Then the general IPv4  
address which may overlaps between several VPN IPv4 addresses in the VPN is  
turned into a globally unique VPN IPv4 address and thus ensure the correct routing in  
the VPN.  
Perform the following configuration in vpn-instance view.  
Table 37-4 Configure RD for the vpn-instance  
Operation  
Command  
Configure RD for the vpn-instance  
route-distinguisher route-distinguisher  
The parameter in the above command has no default value. A vpn-instance works only  
when a RD is configured for it. Other parameters for a vpn-instance cannot be  
configured before configuring a RD for it.  
To modify the RD, you must first delete the vpn-instance and reconfigure it.  
37-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
3) Configure vpn-instance description  
Perform the following configuration in vpn-instance view  
Table 37-5 Configure vpn-instance description  
Operation  
Command  
Configure vpn-instance description  
Delete vpn-instance description  
description vpn-instance-description  
undo description  
4) Configure vpn-target attribute for the vpn-instance  
VPN-target attribute, a BGP extension community attribute, controls advertisement of  
VPN routing information.  
The following is the advertisement controlling process of VPN routing information:  
z
z
z
When BGP is imported into a VPN route learned at CE, it associates a VPN-target  
extension community attribute list for the route. Usually the list is the VPN-instance  
output routing attribute list which is associated with CE.  
VPN instance defines input routing attribute list according to the  
import-extcommunity in VPN-target, defines the acceptable route range and  
import it.  
VPN instance modifies VPN-target attributes for the routes to be advertised,  
according to the export-extcommunity in VPN-target.  
Like an RD, an extension community includes an ASN plus an arbitrary number or an IP  
address plus an arbitrary number. There are two types of formats:  
The first one is related to autonomous system number (ASN), in the form of 16-bit ASN  
(can be 0 here): 32-bit user-defined number, for example, 100:1.  
The second one is related to IP address, in the form of 32-bit IP address (can be 0.0.0.0  
here):16-bit user-defined number, for example, 172.1.1.1:1.  
Perform the following configuration in the vpn-instance view.  
Table 37-6 Configure vpn-target attribute for the vpn-instance  
Operation  
Command  
vpn-target  
vpn-target-extcommunity  
Configure vpn-target attribute for the  
vpn-instance  
[
import-extcommunity  
|
export-extcommunity | both ]  
Delete the specified route-target undo vpn-target vpn-target-extcommunity  
attribute from the vpn-target attribute import-extcommunity  
[
|
list associated with the vpn-instance export-extcommunity | both ]  
37-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
By default, the value is both. In general all sites in a VPN can be interconnected, and  
the import-extcommunity and export-extcommunity attributes are the same, so you can  
execute the command only with the both option.  
Up to 16 vpn-targets can be configured with a command, and up to 20 vpn-targets can  
be configured for a VPN-instance.  
5) Limit the maximum number of routes in a vpn-instance  
This command is used to limit the maximum number of routes for a vpn-instance so as  
to avoid too many routes imported from a site.  
Perform the following configuration in the vpn-instance view.  
Table 37-7 Limit the maximum number of routes in the vpn-instance  
Operation  
Command  
routing-table limit { warn threshold |  
Limit the maximum number of routes in  
the vpn-instance  
simplyinteger  
syslog-alert }  
{
alarm-integer  
|
Remove the maximum number limitation undo routing-table limit  
Integer is in the range of 1 to 65536 and alarm-integer is in the range of 1 to 100.  
Note:  
Changing the maximum route limit for VPN-instance will not affect the existing routing  
table. To make the new configuration take effect immediately, you should rebuild the  
corresponding routing protocol or perform shutdown/undo shutdown operation on  
the corresponding interface.  
6) Configure packet redirection in hybrid MPLS VPN networking mode (in this mode,  
both the service card that does not support MPLS (e.g., B card) and the service  
card that supports MPLS are used) (optional).  
When you configure MPLS/VPN service, you need not replace all the MPLS-incapable  
B cards with MPLS-capable cards, just add a MPLS-capable card in the B card  
environment and that is all right. To use the Ethernet port on B card for the connection  
on CE side, you must configure packet redirection on B card in Ethernet port view to  
redirect packets to the Ethernet port on the MPLS-capable card for MPLS processing.  
z
Configure basic ACL.  
Perform the following configuration in the system view.  
37-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Table 37-8 Configure basic ACL  
Operation  
Configure basic ACL  
Delete basic ACL  
Command  
acl { number acl-number | name acl-name basic }  
[ match-order { config | auto } ]  
undo acl { number acl-number | name acl-name | all }  
z
Defines subrules for the basic ACL  
Perform the following configuration in corresponding ACL view.  
Table 37-9 Define subrules of the ACL  
Operation  
Command  
rule [ rule-id ] { permit | deny } [ source  
Define the subrule of basic ACL source-addr wildcard | any ] [ fragment ]  
[ time-range name ]  
undo rule rule-id [ source ] [ fragment ]  
[ time-range ]  
Delete the subrule of basic ACL  
z
Add Ethernet ports on the B card into a VLAN  
Perform the following configuration in VLAN view.  
Table 37-10 Add Ethernet ports into a VLAN  
Operation  
Command  
port interface_list  
Add one or a group of ports into a VLAN  
Remove one or a group of ports from a VLAN undo port interface_list  
z
Configure virtual interfaces for the above-mentioned VLAN.  
Perform the following configuration in the system view.  
Table 37-11 Configure VLAN interfaces for a VLAN  
Operation  
Command  
Configure VLAN interface  
Delete VLAN interface  
interface vlan-interface  
undo interface vlan-interface  
z
Configure packet redirection at the Ethernet port on B card.  
Packet redirection falls into three types:  
z
z
IP address-based packet redirection (all IP packets are allowed to pass),  
VLAN ID-based packet redirection,  
37-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
z
Both VLAN ID and IP address-based packet redirection.  
Perform the following configuration in the Ethernet port view.  
Table 37-12 Configure packet redirection at the Ethernet port on the B card  
Operation  
Command  
traffic-redirect inbound { link-group { acl-number |  
acl-name } [ rule rule [ system-index index ] ] | ip-group  
{ acl-number | acl-name } [ rule rule ] } {[ system-index  
index ] ] } interface { interface-name | interface-type  
interface-num } { l2-vpn |destination-vlan l3-vpn  
Configure  
redirection  
specific port on the  
supporting MPLS card.  
packet  
the  
to  
Delete  
packet undo  
traffic-redirect  
inbound  
{
link-group  
redirection  
configuration  
{ acl-number | acl-name } [ rule rule ] | ip-group  
{ acl-number | acl-name } [ rule rule ] }  
7) Associate interface with vpn-instance  
VPN instance is associated with the direct-connect site through interface binding.  
When the packets from the site reach the PE router though the interface bound, then  
the PE can look routing information (including next hop, label, egress interface, and so  
on.) up in the corresponding vpn-instance.  
This command can associate a vpn-instance with an interface.  
Perform the following configuration in VLAN interface view.  
Table 37-13 Associate interface with vpn-instance  
Operation  
Command  
binding  
ip  
vpn-instance  
vpn-instance  
Associate interface with vpn-instance  
vpn-instance-name  
Remove the association of the interface undo  
ip binding  
with vpn-instance  
vpn-instance-name  
Caution:  
As executing the ip binding vpn-instance command on an interface will delete the IP  
address of the interface, you must configure the IP address of the interface after  
executing that command when you bind the interface with a vpn-instance.  
III. Configuring PE-CE route exchanging  
These route exchanging modes are available between PE and CE: static route, RIP,  
OSPF, EBGP.  
1) Configure static route on PE  
37-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
You can configure a static route pointing to CE on PE for it to learn VPN routing  
information from CE.  
Perform the following configuration in the system view.  
Table 37-14 Configure static route in vpn-instance routing table  
Operation  
Command  
ip route-static vpn-instance vpn-instance-name1  
Create  
vpn-instance  
route  
a
specific vpn-instance-name2 … ip-address { mask | mask-length }  
static { interface-name | [ vpn-instance vpn-nexthop-name  
vpn-nexthop-address ] } [ preference preference-value ]  
[ reject | blackhole ]  
undo ip route-static vpn-instance vpn-instance-name1  
specific vpn-instance-name2 ip-address { mask | mask-length }  
static { interface-name [ vpn-instance vpn-nexthop-name  
vpn-nexthop-address ] } [ preference preference-value ]  
[ reject | blackhole ]  
Delete  
vpn-instance  
route  
a
By default, the preference value for a static route is 60. You can also specify another  
preference for the static route you are configuring.  
2) Configure RIP multi-instance  
If you select RIP mode for CE-PE route switching, you should then specify running  
environment for RIP instance on PE. With this command, you can enter RIP view and  
import and advertise RIP instance in the view.  
Perform the following configuration in the RIP view.  
Table 37-15 Configure PE-CE RIP instance  
Operation  
Command  
unicast  
ipv4-family  
vpn-instance-name  
[
]
vpn-instance  
Create PE-CE RIP instance  
undo ipv4-family [ unicast ] vpn-instance  
vpn-instance-name  
Delete PE-CE RIP instance  
Then configuring RIP multi-instance to import IBGP route.  
For details about RIP configuration, see RIP configuration section in Routing Protocol  
of this manual.  
3) Configure OSPF multi-instance on PE  
If you select OSPF mode for CE-PE route switching, you should then configure OSPF  
multi-instance on PE. Other configurations, such as MPLS basic configuration,  
vpn-instance configuration, do not change. Noted that when OSPF routes and  
direct-connect routes are imported in the VPN instance address family view, BGP  
37-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
routes should also be imported into OSPF. Here only introduces OSPF multi-instance  
configuration in detail.  
First step: Configure OSPF procedure.  
Perform the following configuration in the system view.  
Table 37-16 Configure OSPF procedure  
Operation  
Command  
ospf process-id [ router-id router-id-number ]  
[ vpn-instance vpn-instance-name ]  
Configure an OSPF procedure  
Delete an OSPF procedure  
undo ospf process-id  
By default, the procedure index is 1.  
Caution:  
An OSPF procedure can only belong to one VPN instance, while one VPN instance  
may contain multiple OSPF procedures. By default, an OSPF procedure belongs to  
public network.  
Step 2: Configure domain ID  
The domain ID is used to identify an OSPF autonomous system (AS), and the same  
OSPF domain must have the same domain ID. One process can be configured with  
only one domain ID; different processes can be configured with the same domain ID or  
different domain IDs.  
Perform the following configuration in the OSPF view.  
Table 37-17 Configure domain ID  
Operation  
Configure domain ID  
Return to the default value  
Command  
domain-id { id-number | id-addr }  
undo domain-id  
By default, id-number is 0 and id-addr is 0.0.0.0.  
It is recommended that all OSPF instances in a VPN are configured with either the  
same domain ID or the default value.  
37-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Caution:  
The configured value will not take effect unit the command reset ospf is executed.  
Step 3: Configure tag for imported VPN route (optional)  
If a VPN site links to multiple PEs, routing ring may present when the routes learned by  
MPLS/BGP are received by another PE router in being advertised by category-5/-7 LSA  
of a PE to the VPN site. To solve this problem, you should configure route-tag. It is  
recommended to configure identical route-tag for the PEs in the same VPN.  
Perform the following configuration in the OSPF view.  
Caution:  
The configured value will not take effect unit the command reset ospf is executed.  
Table 37-18 Configure tag for imported VPN route  
Operation  
Command  
route-tag tag-number  
undo route-tag  
Configure tag for imported VPN route  
Return to the default value  
tag-number is used to identify tag value; by default, the first two bytes are fixed, that is,  
0xD000, and the last two bytes is AS number of local BGP. For example, the AS  
number of local BGP is 100, and then its default tag value is 3489661028 in decimal  
notation. This value is an integer ranging from 0 to 4294967295.  
Step 4: Configure sham link (optional)  
Sham links are required between two PEs when backdoor links (that is, the OSPF links  
that do not pass through the MPLS backbone network) exist between the two PEs and  
data is expected to be transmitted over the MPLS backbone. A sham link between two  
PEs is considered as a link in OSPF domain. Its source and destination addresses are  
both the loopback interface address with 32-bit mask, but this loopback interface  
should be bound to a VPN instance and direct-connect routes must be imported into  
BGP by BGP.  
Perform the following configuration in the OSPF area view.  
37-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Table 37-19 Configure sham link  
Operation  
Command  
sham-link source-addr destination-addr [ cost cost-value ]  
[ simple password | md5 keyid key ] [ dead seconds ]  
[ hello seconds ] [ retransimit seconds ] [ trans-delay  
seconds ]  
Configure sham link  
Delete a sham link  
undo sham-link source-addr destination-addr  
By default, the cost value is 1, dead value is 40 seconds, hello value is 10 seconds,  
retransmit value is 5 seconds and trans-delay value is 1 second.  
4) Configure EBGP on PE  
If you select EBGP between PE and CE, you should configure a neighbor for each VPN  
in VPN instance address family sub-view, and import IGP route of CE.  
Step 1: Configure peer group  
Configuring peer group in VPN instance address family view.  
Table 37-20 Configure peer group  
Operation  
Command  
group group-name [ internal | external ]  
undo group group-name  
Configure a peer group  
Delete the specified peer group  
By default, the peer group is configured as internal. When BGP mode is used for  
PE-CE route switching, they often belong to different ASs, so you should configure  
EBGP peer as external.  
Step 2: Configure AS number for a specific neighbor and add group member to a peer  
group  
When EBGP mode is used for PE-CE route switching, you should configure AS number  
for a specific neighbor for every CE VPN-instance.  
Perform the following configuration in VPN instance address family view.  
Table 37-21 Configure AS number for a specific neighbor  
Operation  
Command  
group-name peer-address group  
Configure AS number for peer  
{
|
[
a specific neighbor  
group-name ] } as-number as-number  
Delete the AS number of a undo peer { group-name | [peer-address group  
specific neighbor  
group-name ] } as-number as-number]  
Step 3: Activate peer (group)  
37-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
By default, BGP neighbor is active while MBGP neighbor is inactive. You should  
activate MBGP neighbor in VPNv4 sub-address family view.  
Perform the following configuration in VPNv4 sub-address family view.  
Table 37-22 Activate/deactivate peer (group)  
Operation  
Activate the peer (group)  
Deactivate the peer (group)  
Command  
peer group-name enable  
undo peer group-name enable  
Step 4: Configure MBGP to import VPN route of direct-connect CE  
To advertise correct VPN route over public network to other PEs with which BGP  
adjacency has been created, a PE must import the VPN routing information of the  
direct-connect CE into its MBGP routing table.  
For example, if a static route is used between PE and CE, PE must import a static route  
in VPN-instance address family sub-view of MBGP (import-route static). If RIP is run  
between PE and CE, PE must import an RIP route in VPN-instance view of MBGP  
(import-route rip). If BGP is run between PE and CE, MBGP imports a direct-connect  
route.  
Perform the following configuration in VPN instance address family sub-view.  
Table 37-23 Import IGP route  
Operation  
Import IGP route  
Remove IGP route import  
Command  
import-route protocol [ process-id ] [ med med ]  
undo import-route protocol  
Step 5: Configure BGP as asynchronous.  
Perform the following configuration in VPN instance address family sub-view.  
Table 37-24 Configure BGP asynchronous with IGP  
Operation  
Command  
Configure BGP asynchronous with IGP  
undo synchronization  
By default, BGP is in asynchronous mode.  
Step 6: Permit route loop configuration in Hub&Spoke networking (optional)  
Generally speaking, PE-CE configuration is completed after you specify the AS number  
of neighbor; for the rest configuration, you can keep the system default values.  
37-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
In the case of standard BGP, BGP tests routing loop via AS number to avoid generating  
routing loop. In the case of Hub&Spoke networking, however, PE carries the AS  
number of the local autonomous system when advertising the routing information to CE,  
if EBGP is run between PE and CE. Accordingly, the updated routing information will  
carry the AS number of the local autonomous system when route update is received  
from CE. In this case, PE will not accept the route update information.  
This phenomenon can be avoided by executing the peer allow-as-loop command,  
which makes the PE still receives the route update information containing the local AS  
number from CE.  
Perform the following configuration in IPv4 instance sub-address family view.  
Table 37-25 Configure to allow/disable routing loop  
Operation  
Command  
group-name  
peer  
{
|
peer-address  
}
Configure to allow routing loop  
allow-as-loop asn_limit  
undo peer { group-name | peer-address }  
allow-as-loop asn_limit  
Configure to disable routing loop  
By default, the received route update information is not allowed to generate loop  
information.  
Step 7: Configure BGP features.  
IV. Configuring PE-PE route exchanging  
To exchange VPN-IPv4 routing information between PEs, you should configure  
MP-IBGP on PEs.  
Perform the following configuration in BGP view or PVN instance address family  
sub-view.  
1) Configure IBGP  
These steps are often required.  
Step 1: Configure BGP as asynchronous.  
Step 2: Configure BGP neighbor.  
Note that BGP adjacency is established through loopback interface and the sub-net  
mask must be 32 bits.  
Step 3: Permit BGP session over any operable TCP interface.  
In general, BGP uses the best local address in TCP connection. To keep TCP  
connection available even when the interface involved fails, you can perform the  
following configuration to permit BGP session over any interface through which TCP  
connection with the peer can be set up. The command here is usually executed  
together with the Loopback interface.  
37-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Table 37-26 Permit BGP session over any operable TCP interface  
Operation  
Command  
peer { peer-address | group-name }  
Permit BGP session over any operable  
TCP interface  
connect-interface  
{
interface-type  
interface_num }  
Use the best local address for TCP undo  
peer  
{
peer-address  
|
connection group-name } connect-interface  
BGP creates BGP adjacency to the peer end using specific interfaces, which is usually  
the loopback interface. Because this interface is always in the up state, and thus  
reduces the strike brought by network shock.  
2) Configure MP-IBGP  
Step 1: Enter protocol address family view.  
Perform the following configuration in BGP view.  
Table 37-27 Configure VPNv4 address family  
Operation  
Command  
Enter VPNv4 sub-address family view  
ipv4-family vpnv4 [ unicast ]  
Delete VPNv4 sub-address family view  
configuration  
undo ipv4-family vpnv4 [ unicast ]  
Step 2: Configure MBGP neighbor  
Configure internal neighbor of MBGP in VPNv4 sub-address family view.  
Table 37-28 Configure peer group  
Operation  
Create a peer group  
Delete a specific peer group  
Command  
group group-name [ internal | external ]  
undo group group-name  
Choose the internal keyword when using the command to create an IBGP peer group.  
Step 3: Activate peer (group)  
By default, BGP neighbor is active while MBGP neighbor is inactive. You must enable  
MBGP neighbor in VPNv4 sub-address family view.  
37-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Table 37-29 Enable/disable IBGP peer group  
Operation  
Enable a peer group  
Command  
peer group-name enable  
undo peer group-name enable  
Disable a specific peer group  
Step 4: Configure the local address as the next hop in route advertisement (optional)  
Since the default value is no configuration, you must show clearly to add in this  
configuration command when configuring MBGP of PE-PE.  
Perform the following configuration in VPNv4 sub-address family view.  
Table 37-30 Configure the local address as the next hop in route advertisement  
Operation  
Command  
peer-address  
peer  
{
|
group-name  
peer-address  
}
|
Configure the local address as the  
next hop in route advertisement  
next-hop-localpeer  
{
group-name } next-hop-local  
undo peer { peer-address | group-name }  
next-hop-local  
Remove the configuration  
Step 5: Transfer BGP update packet without AS number (optional)  
Perform the following configuration in VPNv4 sub-address family view.  
Table 37-31 Transfer BGP update packet without AS number  
Operation  
Command  
peer-address  
Transfer BGP update packet peer  
{
|
group-name  
}
without AS number  
public-as-only  
Transfer BGP update packet with undo peer { peer-address | group-name }  
AS number  
public-as-only  
Step 6: Advertise default route to the peer (group)  
This command adds a default route which uses local address as the next hop on the PE  
SPE (system processing engine)  
Table 37-32 Advertise default route to the peer (group)  
Operation  
Command  
peer-address  
peer  
{
|
group-name  
}
Advertise default route to the peer  
(group)  
default-route-advertise  
[
vpn-instance  
vpn-instancename]  
37-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Operation  
Command  
undo peer { peer-address | group-name }  
Remove to advertise default route  
to the peer (group)  
default-route-advertise  
[
vpn-instance  
vpn-instancename]  
Step 7: Configure BGP neighbor as the UPE of BGP/MPLS VPN  
This command is only used for UPE (user port function) of BGP/MPLS VPN.  
Configuring the following commands in the VPNv4 sub-address family view.  
Table 37-33 Configure BGP neighbor as the UPE of BGP/MPLS VPN  
Operation  
Command  
peer peer-address upe  
undo peer peer-address upe  
Configure BGP neighbor as the  
UPE of BGP/MPLS VPN  
Disable the configuration  
37.2.3 Configuring P Router  
P router does not maintain VPN routes, but do keep connection with public network and  
coordinate with PE in creating LSPs. These configurations are required on P router:  
Step 1: Configure MPLS basic capacity and enable LDP on the interfaces connecting P  
router to PE router, for forwarding MPLS packets. See Chapter 36 MPLS Basic  
Step 2: Enable OSPF protocol at the interfaces connecting P router to PE router and  
import direct-connect routes. See “OSPF” part in “Routing Protocol” for details.  
37.3 Displaying and Debugging BGP/MPLS VPN  
I. Displaying VPN address information from BGP table  
After the above configuration, execute display command in any view to display the  
running of the VPNv4 information in BGP database configuration, and to verify the  
effect of the configuration.  
Table 37-34 Display VPN address information from BGP table  
Operation  
Command  
bgp vpnv4  
display  
{
all  
|
|
}
|
route-distinguisher  
vpn-instance vpn-instance-name  
group network peer  
routing-table }  
rd-value  
Display VPN address information from  
BGP table  
{
|
|
37-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
II. Displaying IP routing table associated with vpn-instance  
After the above configuration, you can execute display command in any view to  
display the corresponding information in the IP routing tables related to vpn-instance,  
and to verify the effect of the configuration.  
Table 37-35 Display IP routing table associated with vpn-instance  
Operation  
Command  
display ip routing-table vpn-instance  
vpn-instance-name [ [ip-address ] [ verbose ] |  
statistics ]  
Display  
associated with vpn-instance  
IP  
routing  
table  
III. Displaying vpn-instance related information  
After the above configuration, executing the display command in any view can display  
the vpn-instance related information, including its RD, description, the interfaces  
associated with it, and so on. You can view the information to verify the configuration  
effect.  
Table 37-36 Display vpn-instance related information  
Operation  
vpn-instance  
information, including its RD, description,  
the interfaces associated with it, and so on.  
Command  
Display  
the  
related  
display  
ip  
vpn-instance  
[ vpn-instance-name | verbose ]  
IV. Debugging information concerning processing BGP  
Execute debugging command in user view for the debugging of the related  
vpn-instance information.  
Table 37-37 Enable the debugging for processing BGP  
Operation  
Command  
debugging bgp { all | event | normal | { keepalive |  
mp-update | open | packet | update | route-refresh |  
update } [ receive | send |] [ verbose ] }  
Enable the debugging for  
processing BGP  
undo debugging bgp { {all | event | normal |  
keepalive | mp-update | open | packet | update |  
route-refresh } [ receive | send | verbose ] } { all |  
event | normal | update }  
Disable the debugging  
37-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
V. Displaying MPLS l3vpn-lsp information  
Table 37-38 Display MPLS l3vpn-lsp information  
Operation  
Command  
display mpls l3vpn-lsp [ verbose] include text  
display mpls l3vpn-lsp vpn-instance  
Display MPLS l3vpn LSP  
information  
[
Display MPLS l3vpn LSP  
vpn-instance information  
vpn-instance-name ] [ transit | egress | ingress ]  
[include text | verbose ]  
VI. Displaying sham link  
Table 37-39 Display sham link  
Operation  
Command  
Display sham link  
display ospf [ process-id ] sham-link  
37.4 Typical BGP/MPLS VPN Configuration Example  
37.4.1 Integrated BGP/MPLS VPN Configuration Example  
I. Network requirements  
z
z
VPN-A includes CE1 and CE3; VPN-B includes CE2 and CE4.  
Subscribers in different VPNs cannot access each other. The VPN-target attribute  
for VPN-A is 111:1 and that for VPN-B is 222:2.  
z
The PEs and P are switches supporting MPLS, and CEs are common layer 3  
switches.  
Note:  
The configuration in this case is focused on:  
z
z
z
Configure EBGP to exchange VPN routing information between CEs and PEs.  
Configure OSPF for inter-PE communication between PEs.  
Configure MP-IBGP to exchange VPN routing information between PEs.  
37-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
II. Network diagram  
AS 65410  
AS 65430  
CE3  
CE1  
VLAN201  
VLAN201  
168.3.1.1/16  
168.1.1.1/16  
AS 100  
VPN-A  
VPN-A  
PE3  
PE1  
RD(100:1)  
RD(100:3)  
VLAN202  
168.1.1.2/16  
VLAN201  
172.1.1.1/16  
VLAN201  
172.3.1.1/16  
VLAN202  
168.3.1.2/16  
Loopback0  
202.100.1.1./32  
P
Loopback0  
202.100.1.3./32  
VLAN301  
VLAN302  
VLAN303  
VLAN304  
PE2  
PE4  
RD(100:4)  
VLAN202  
168.4.1.2/16  
RD(100:2)  
AS 65440  
CE4  
VLAN202  
AS 65420  
CE2  
VLAN201  
172.2.1.1./16  
VLAN201  
172.4.1.1./16  
168.2.1.2/16  
Loopback0  
202.100.1.2./32  
Loopback0  
202.100.1.4./32  
VLAN201  
168.2.1.1/16  
VLAN201  
168.4.1.1/16  
VPN-B  
VPN-B  
Figure 37-8 Network diagram for integrated BGP/MPLS VPN  
III. Configuration procedure  
The following are the configuration introduction to PE, CE and P switches.  
1) Configure CE1.  
Configure CE1 and PE1 as EBGP neighbors, import direct-connect routes and static  
routes to import intra-CE1 VPN routes into BGP and advertise to PE1.CE1connects to  
PE1 through interface Gigabitethernet 2/1/1.  
[CE1] vlan 201  
[CE1-vlan201] port gigabitethernet 2/1/1  
[CE1-vlan201] quit  
[CE1] interface Vlan-interface 201  
[CE1-Vlan-interface201] ip address 168.1.1.1 255.255.0.0  
[CE1-Vlan-interface201] quit  
[CE1] bgp 65410  
[CE1-bgp] group 168 external  
[CE1-bgp] peer 168.1.1.2 group 168 as-number 100  
[CE1-bgp] import-route direct  
[CE1-bgp] import-route static  
37-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Note:  
The configuration on the other three CE switches (CE2 to CE4) is similar to that on CE1,  
the details are omitted here.  
2) Configure PE1  
Configure vpn-instance for VPN-A on PE1, as well as other associated attributes to  
control advertisement of VPN routing information.  
[PE1] ip vpn-instance vpna  
[PE1-vpn-vpna] route-distinguisher 100:1  
[PE1-vpn-vpna] vpn-target 111:1 both  
[PE1-vpn-vpna] quit  
Configure PE1 and CE1 as MP-EBGP neighbors, import CE1 VPN routes learned into  
MBGP VPN-instance address family.  
[PE1] bgp 100  
[PE1-bgp] ipv4-family vpn-instance vpna  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] group 168 external  
[PE1-bgp-af-vpn-instance] peer 168.1.1.1 group 168 as-number 65410  
[PE1-bgp-af- vpn-instance] quit  
[PE1-bgp] quit  
Bind the VLAN interface connecting PE1 and CE1 to the VPN-A. Note that you should  
first configure association between the VLAN interface and VPN-instance, and then  
configure the IP address of the VLAN interface.  
[PE1] vlan 202  
[PE1-vlan202] port gigabitethernet 2/1/2  
[PE1-vlan202] quit  
[PE1] interface Vlan-interface 202  
[PE1-Vlan-interface202] ip binding vpn-instance vpna  
[PE1-Vlan-interface202] ip address 168.1.1.2 255.255.0.0  
[PE1-Vlan-interface202] quit  
Configure loopback interface. (For PE, the IP address for loopback interface must be a  
host address with 32-bit mask, to prevent the route is aggregated and then LSP cannot  
process correctly interior-layer labels.)  
[PE1] interface loopback0  
[PE1-LoopBack 0] ip address 202.100.1.1 255.255.255.255  
[PE1-LoopBack 0] quit  
Configure MPLS basic capacity and enable MPLS and LDP on VLAN interface  
connecting PE1 and P. Create LSP and achieve MPLS packet forwarding.  
37-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1] mpls lsr-id 202.100.1.1  
[PE1] mpls  
[PE1-mpls] quit  
[PE1] mpls ldp  
[PE1] vlan 201  
[PE1-vlan201] port gigabitethernet 2/1/1  
[PE1-vlan201] quit  
[PE1] interface Vlan-interface 201  
[PE1-Vlan-interface201] ip address 172.1.1.1 255.255.0.0  
[PE1-Vlan-interface201] mpls  
[PE1-Vlan-interface201] mpls ldp enable  
[PE1-Vlan-interface201] quit  
Enable OSPF on the interface connecting PE1 and P and on the loopback interface,  
import direct-connect routes. Achieve inter-PE communication.  
[PE1] ospf  
[PE1-ospf-1] area 0  
[PE1-ospf-1-area-0.0.0.0] network 172.1.0.0 0.0.255.255  
[PE1-ospf-1-area-0.0.0.0] network 202.100.1.1 0.0.0.0  
[PE1-ospf-1-area-0.0.0.0] quit  
[PE1-ospf-1] import-route direct  
[PE1-ospf-1] quit  
Set up MP-IBGP adjacency between PEs to exchange inter-PE VPN routing  
information and activate MP-IBGP peer in VPNv4 sub-address family view.  
[PE1] bgp 100  
[PE1-bgp] group 202 internal  
[PE1-bgp] peer 202.100.1.3 group 202  
[PE1-bgp] peer 202.100.1.3 connect-interface loopback0  
[PE1-bgp] ipv4-family vpnv4  
[PE1-bgp-af-vpn] peer 202 enable  
[PE1-bgp-af-vpn] peer 202.100.1.3 group 202  
[PE1-bgp-af-vpn] quit  
[PE1-bgp] quit  
3) Configure P:  
Configure MPLS basic capacity, enable LDP on the interfaces connecting P and PE for  
MPLS packet forwarding.  
[P] mpls lsr-id 172.1.1.2  
[P] mpls  
[P-mpls] quit  
[P] mpls ldp  
[P] interface loopback0  
[P-LoopBack 0] ip address 172.1.1.2 255.255.255.255  
37-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[P-LoopBack 0] quit  
[P] vlan 301  
[P-vlan301] port gigabitethernet 3/1/1  
[P-vlan301] quit  
[P] interface Vlan-interface 301  
[P-Vlan-interface301] ip address 172.1.1.2 255.255.0.0  
[P-Vlan-interface301] mpls  
[P-Vlan-interface301] mpls ldp enable  
[P-Vlan-interface301] quit  
[P] vlan 302  
[P-vlan302] port gigabitethernet 3/1/2  
[P-vlan302] quit  
[P] interface Vlan-interface 302  
[P-Vlan-interface302] ip address 172.2.1.2 255.255.0.0  
[P-Vlan-interface302] mpls  
[P-Vlan-interface302] mpls ldp enable  
[P-Vlan-interface302] quit  
[P] vlan 303  
[P-vlan303] port gigabitethernet 3/1/3  
[P-vlan303] quit  
[P] interface Vlan-interface 303  
[P-Vlan-interface303] ip address 172.3.1.2 255.255.0.0  
[P-Vlan-interface303] mpls  
[P-Vlan-interface303] mpls ldp enable  
[P-Vlan-interface303] quit  
[P] vlan 304  
[P-vlan304] port gigabitethernet 3/1/4  
[P-vlan304] quit  
[P] interface Vlan-interface 304  
[P-Vlan-interface304] ip address 172.4.1.2 255.255.0.0  
[P-Vlan-interface304] mpls  
[P-Vlan-interface304] mpls ldp enable  
[P-Vlan-interface304] quit  
Enable OSPF protocol on the interfaces connecting P and PE, import direct-connect  
route to achieve inter-PE communication.  
[P] ospf  
[P-ospf-1] area 0  
[P-ospf-1-area-0.0.0.0] network 172.1.1.0 0.0.255.255  
[P-ospf-1-area-0.0.0.0] network 172.2.1.0 0.0.255.255  
[P-ospf-1-area-0.0.0.0] network 172.3.1.0 0.0.255.255  
[P-ospf-1-area-0.0.0.0] network 172.4.1.0 0.0.255.255  
[P-ospf-1-area-0.0.0.0] quit  
37-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[P-ospf-1] import-route direct  
4) Configure PE3  
Note:  
The configuration on PE3 is similar to that on PE1, you should pay more attention to  
VPN routing attribute setting on PE3 to get information about how to control  
advertisement of a same VPN routing information (with same VPN-target) over MPLS  
network.  
Create VPN-instance for VPN-A on PE3, configure correlative attributes to control  
advertisement of VPN routing information.  
[PE3] ip vpn-instance vpna  
[PE3-vpn-vpna] route-distinguisher 100:3  
[PE3-vpn-vpna] vpn-target 111:1 both  
[PE3-vpn-vpna] quit  
Set up MP-EBGP adjacency between PE3 and CE3, import intra-CE3 VPN routes  
learned into MBGP VPN-instance address family.  
[PE3] bgp 100  
[PE3-bgp] ipv4-family vpn-instance vpna  
[PE3-bgp-af-vpn-instance] import-route direct  
[PE3-bgp-af-vpn-instance] group 168 external  
[PE3-bgp-af-vpn-instance] peer 168.3.1.1 group 168 as-number 65430  
[PE3-bgp-af-vpn-instance] quit  
[PE3-bgp] quit  
Bind the interface connecting PE3 and CE3 to VPN-A.  
[PE3] vlan 202  
[PE3-vlan202] port gigabitethernet 2/1/2  
[PE3-vlan202] quit  
[PE3] interface Vlan-interface 202  
[PE3-Vlan-interface202] ip binding vpn-instance vpna  
[PE3-Vlan-interface202] ip address 168.3.1.2 255.255.0.0  
[PE3-Vlan-interface202] quit  
Configure loopback interface  
[PE3] interface loopback0  
[PE3-LoopBack 0] ip address 202.100.1.3 255.255.255.255  
[PE3-LoopBack 0] quit  
Configure MPLS basic capacity and enable MPLS and LDP on VLAN interface  
connecting PE3 and P. Creates LSP and achieve MPLS packet forwarding.  
37-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE3] mpls lsr-id 202.100.1.3  
[PE3] mpls  
[PE3-mpls] quit  
[PE3] mpls ldp  
[PE3] vlan 201  
[PE3-vlan201] interface gigabitethernet 2/1/1  
[PE3-vlan201] quit  
[PE3] interface Vlan-interface 201  
[PE3-Vlan-interface201] ip address 172.3.1.1 255.255.0.0  
[PE3-Vlan-interface201] mpls  
[PE3-Vlan-interface201] mpls ldp enable  
[PE3-Vlan-interface201] quit  
Enable OSPF on the interface connecting PE3 and P and the loopback interface,  
import direct-connect routes.  
[PE3] ospf  
[PE3-ospf-1] area 0  
[PE3-ospf-1-area-0.0.0.0] network 172.3.0.0 0.0.255.255  
[PE3-ospf-1-area-0.0.0.0] network 202.100.1.3 0.0.0.0  
PE3-ospf-1-area-0.0.0.0] quit  
[PE3-ospf-1] import-route direct  
[PE3-ospf-1-area-0.0.0.0] import-route direct  
Set up MP-IBGP adjacency between PEs to exchange inter-PE VPN routing  
information.  
[PE3] bgp 100  
[PE3-bgp] group 202 internal  
[PE3-bgp] peer 202.100.1.1 group 202 as-number 100  
[PE3-bgp] peer 202.100.1.1 connect-interface loopback0  
[PE3-bgp] ipv4-family vpnv4  
[PE3-bgp-af-vpn] peer 202 enable  
[PE3-bgp-af-vpn] peer 202.100.1.1 group 202  
[PE3-bgp-af-vpn] quit  
5) Configure PE2 and PE4  
The configuration of PE2 and PE4 is similar to that of PE1 and PE3. The details are  
omitted here.  
37.4.2 Hybrid BGP/MPLS VPN Configuration Example  
I. Network requirements  
z
VPN-A includes CE-1 and CE-3; VPN-B includes CE-2 and CE-4  
37-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
z
Two Switch 8800s serve as PE devices, which support MPLS feature. CE-1 and  
CE-2 are two mid-range switches; a Layer 2 switch serves as both CE-3 and CE-4,  
which is accessed directly with users.  
z
Two PEs are configured with the same interface cards: Slot 2 holds the common  
interface card with FE ports (B card) and slot 3 holds the enhanced interface card  
with GE ports (C card).  
II. Network diagram  
vlan 10  
CE-3  
CE-4  
vlan 10  
CE-1  
192.168.1.1/24  
vlan 100  
192.168.1.2/24  
vlan 100  
vlan 20  
PE 2 vlan 20  
PE 1  
loopback0 1.1.1.9/32  
loopback0 2.2.2.9/32  
CE-2  
Figure 37-9 Network diagram for hybrid BGP/MPLS VPN  
III. Configure procedure  
1) Configure CE-1  
Create EBGP neighborhood between CE-1 and PE 1, import direct-connect routes and  
static routes to import the VPN routes inside CE-1 to BGP and to advertise to PE 1, link  
CE-1 to PE 1 through the Ethernet0/1/0 port.  
[CE1] interface ethernet 0/1/0  
[CE1-Ethernet0/1/0] ip address 20.1.1.1 255.255.0.0  
[CE1-Ethernet0/1/0] quit  
[CE1] bgp 65410  
[CE1-bgp] group 20 external  
[CE1-bgp] peer 20.1.1.2 group 20 as-number 100  
[CE1-bgp] import-route direct  
[CE1-bgp] import-route static  
Note:  
The configuration on CE-2 is similar to that on CE-1, so its detailed configuration is  
omitted here.  
2) Configure PE 1  
Configure VPN-instance.  
37-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Note:  
The configuration on VPN-B is similar to that on VPN-A and only VPN-Aconfiguration is  
detailed here.  
[PE1] ip vpn-instance vpna  
[PE1-vpn-vpna] route-distinguisher 100:1  
[PE1-vpn-vpna] vpn-target 100:1 both  
[PE1-vpn-vpna] quit  
Bind the VLAN interface connecting PE 1 and CE-1 to VPN-A.  
[PE1] vlan 10  
[PE1-vlan10] interface vlan-interface 10  
[PE1-vlan-interface10] ip binding vpn-instance vpna  
[PE1-vlan-interface10] ip address 20.1.1.2 255.255.255.0  
[PE1-vlan-interface10] quit  
Configure a basic IP ACL to allow redirection of all IP packets on CE.  
[PE1] acl number 2000  
[PE1-acl-basic-2000] rule 0 permit source any  
[PE1-acl-basic-2000] quit  
[PE1] interface Ethernet 2/1/1  
[PE1-Ethernet2/1/1] traffic-redirect inbound ip-group 2000 rule 0 interface  
GigabitEthernet 3/3/3 10 l3-vpn  
Create EBGP neighborhood between PE 1 and CE-1 and import the direct routes of the  
VPN-instance.  
[PE1] bgp 100  
[PE1-bgp] ipv4-family vpn-instance vpna  
[PE1-bgp-af-vpn-instance] group 20 external  
[PE1-bgp-af-vpn-instance] peer 20.1.1.1 group 20 as-number 65410  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] quit  
[PE1-bgp] quit  
Create MP-IBGP neighborhood between PE 1 and PE 2 to exchange VPN routing  
information between them, enable the IBGP peer in VPNv4 address family view.  
[PE1] bgp 100  
[PE1-bgp] group 2  
[PE1-bgp] peer 2.2.2.9 group 2  
[PE1-bgp] peer 2.2.2.9 connect-interface loopback0  
[PE1-bgp] ipv4-family vpnv4  
[PE1-bgp-af-vpn] peer 2 enable  
[PE1-bgp-af-vpn] peer 2.2.2.9 group 2  
37-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Globally enable MPLS.  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1] mpls lsr-id 1.1.1.9  
[PE1] mpls  
[PE1] mpls ldp  
Configure the public network interface and enable MPLS on it.  
[PE1] interface loopback0  
[PE1-LoopBack0] ip address 1.1.1.9 255.255.255.255  
[PE1-LoopBack0] quit  
[PE1] vlan 100  
[PE1-vlan100] port GigabitEthernet 3/1/1  
[PE1-vlan100] interface vlan-interface 100  
[PE1-vlan-interface100] ip address 192.168.1.1 255.255.255.0  
[PE1-vlan-interface100] mpls  
[PE1-vlan-interface100] mpls ldp enable  
[PE1-vlan-interface100] quit  
Enable OSPF on the interface connecting PE 1 and PE 2 and on the loopback interface,  
import direct routes to achieve the intercommunication between PE 1 and PE 2.  
[PE1] ospf 1 route-id 1.1.1.9  
[PE1-ospf-1] area 0  
[PE1-ospf-1-area-0.0.0.0] network 192.168.1.0 0.255.255.255  
[PE1-ospf-1-area-0.0.0.0] network 1.1.1.9 0.0.0.0  
[PE1-ospf-1-area-0.0.0.0] import-route direct  
3) Configure PE 2  
Note:  
Successful redirection configuration clears the VLAN configuration on the destination  
port:  
z
If the destination port is not a trunk port, the redirection configuration changes the  
port as a trunk port and clears all existing settings on the port, including protocol  
VLAN and static ARP.  
z
z
If the destination port is a trunk port and redirection has never been configured on it,  
the redirection configuration clears all existing settings.  
When the redirection configuration is removed, the source port is deleted from the  
VLAN to which the packets are redirected, no matter whether the port belongs to the  
VLAN before the redirection configuration.  
Configure the VPN-instance.  
37-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Note:  
The configuration on VPN-B is similar to that on VPN-A and only VPN-Aconfiguration is  
detailed here.  
[PE2] ip vpn-instance vpna  
[PE2-vpn-vpna] route-distinguisher 100:1  
[PE2-vpn-vpna] vpn-target 100:1 both  
[PE2-vpn-vpna] quit  
Configure the VLAN interface connecting PE 2 with CE-3 and bind the VLAN interface  
to VPN-A.  
[PE2] vlan 10  
[PE2-vlan10] interface vlan-interface 10  
[PE2-vlan-interface10] ip binding vpn-instance vpna  
[PE2-vlan-interface10] ip address 20.2.1.2 255.255.255.0  
[PE2-vlan-interface10] quit  
Configure a user-defined flow template and a link ACL, and then perform the  
redirection configuration.  
[PE2] flow-template user-defined slot 3 vlanid  
[PE2] acl number 4000  
[PE2-acl-link-4000] rule 0 permit ingress 10 egress any  
[PE2-acl-link-4000] quit  
[PE2] interface Ethernet 2/1/1  
[PE2-Ethernet2/1/1] port link-type trunk  
[PE2-Ethernet2/1/1] flow-template user-defined  
[PE2-Ethernet2/1/1] traffic-redirect inbound link-group 4000 rule 0 interface  
GigabitEthernet 3/3/3 10 l3-vpn  
Import the routes of the private network interface between PE 2 and CE-3.  
[PE2] bgp 100  
[PE2-bgp] ipv4-family vpn-instance vpna  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] quit  
[PE2-bgp] quit  
Create MP-IBGP neighborhood between PE 1 and PE 2 to exchange VPN routing  
information between them, enable the IBGP peer in VPNv4 address family view.  
[PE2] bgp 100  
[PE2-bgp] group 2  
[PE2-bgp] peer 1.1.1.9 group 2  
[PE2-bgp] peer 1.1.1.9 connect-interface loopback0  
[PE2-bgp] ipv4-family vpnv4  
37-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-bgp-af-vpn] peer 2 enable  
[PE2-bgp-af-vpn] peer 1.1.1.9 group 2  
Globally enable MPLS.  
[PE2] mpls lsr-id 2.2.2.9  
[PE2] mpls  
[PE2] mpls ldp  
Configure the public network interface and enable MPLS on it.  
[PE2] interface loopback0  
[PE2-LoopBack0] ip address 2.2.2.9 255.255.255.255  
[PE2-LoopBack0] quit  
[PE2] vlan 100  
[PE2-vlan100] port GigabitEthernet 3/1/1  
[PE2-vlan100] interface vlan-interface 100  
[PE2-vlan-interface100] ip address 192.168.1.2 255.255.255.0  
[PE2-vlan-interface100] mpls  
[PE2-vlan-interface100] mpls ldp enable  
[PE2-vlan-interface100] quit  
Enable OSPF on the interface connecting PE 1 and PE 2 and on the loopback interface,  
import direct routes to allow information exchange between PE 1 and PE 2.  
[PE2] ospf 1 route-id 2.2.2.9  
[PE2-ospf-1] area 0  
[PE2-ospf-1-area-0.0.0.0] network 192.168.1.0 0.255.255.255  
[PE2-ospf-1-area-0.0.0.0] network 2.2.2.9 0.0.0.0  
[PE2-ospf-1-area-0.0.0.0] import-route direct  
37-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Note:  
Cautions and configuration limitations in hybrid networking:  
z
For a trunk port on the common interface card, you can configure to redirect MPLS  
VPN of multiple VLANs to the same destination port.  
z
In a VLAN you can configure only one source port to redirect MPLS VPN to the  
destination port. It is unnecessary to make multiple redirection configurations in a  
VLAN which is redirected to the same destination port, since the VLAN can contain  
other ports (for Layer 2 forwarding).  
z
z
In a VLAN you can configure only one destination port to which MPLS VPN is  
redirected and the destination port must be in loopback state. Make sure before  
redirection configuration that no other loopback port exists in the VLAN.  
For a destination port on the enhanced interface card, you can make multiple  
redirection configurations and just need to trunk one VLAN for each redirection  
configuration. Loopback is set automatically on it after you make one redirection  
configuration on such a destination port, and no more redirection configurations can  
be made, so you must check that the destination port is not in manual shutdown  
state (the shutdown command is used) before making another redirection  
configuration.  
z
z
You are recommended to bind the VLAN interface to the VPN after making MPLS  
VPN redirection configuration, to enable your configuration.  
You cannot configure MPLS VPN redirection and protocol VLAN on the same port.  
That is, you cannot configure MPLS VPN redirection if you have enabled protocol  
VLAN, and vice versa. MPLS VPN redirection configuration clears all protocol  
VLANs on the destination port if there are any.  
z
z
You cannot configure MPLS VPN redirection on the POS port or use the POS port  
as the destination port for MPLS VPN redirection configuration.  
You cannot configure MPLS VPN redirection on the aggregation port or use the  
aggregation port as the destination port for MPLS VPN redirection configuration. If  
redirection configuration is made on the destination port on the common interface  
card or enhanced interface card, you cannot add it to any aggregation group.  
If VRRP is enabled on the VLAN interface where the source port for MPLS VPN  
redirection configuration belongs to, removing and inserting the enhanced interface  
card triggers state transition of the VRRP group on the VLAN interface.  
The trunk FE port can use only the VLAN of 1k for VPN access and MPLS  
forwarding, but you can define the starting VLAN ID. Then the VLANs which can  
pass the trunk FE port range from vlan-id to vlan-id+1023.  
z
z
37-39  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
37.4.3 Extranet Configuration Example  
I. Network requirements  
Company A and Company B are located at City A and City B respectively. Their  
headquarters is located at City C. They respectively own VPN1 and VPN2.  
In this case, VPN function is provided by MPLS. There are some shared resources at  
the City C for the two VPNs. All subscribers in both VPNs can access the shared  
resources, but VPN subscribers in City A and City B cannot access each other.  
The two companies cannot use identical IP addresses, for they share the same  
VPN-instance at PE-C.  
Note:  
In the case the configuration is focused on controlling access authority of VPN  
subscribers at different cities by configuring different VPN-target attributes at different  
PEs.  
II. Network diagram  
SP network  
AS100  
PE-A  
PE-C  
PE-B  
10.1.1.1  
20.1.1.1  
30.1.1.1  
VLAN301  
172.16.0.1/16  
VLAN301  
172.15.0.1/16  
VLAN301  
172.17.0.1/16  
VLAN201  
VLAN201  
VLAN201  
172.15.1.1/16  
172.16.1.1/16  
172.17.1.1/16  
City A  
City C  
City
CE-B  
CE-A  
CE-C  
AS65011  
AS65012  
AS65013  
10.11.1.0/24  
10.12.1.0/24  
PC  
PC  
PC  
PC  
PC  
PC  
PC  
VPN 1  
VPN 2  
Figure 37-10 Network diagram for Extranet  
37-40  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
III. Configuration procedure  
Note:  
This configuration procedure has omitted configurations between PE and P, and  
configurations on CEs. For these details refer to the former example.  
1) Configure PE-A:  
Configure VPN-instance 1 for VPN1 on PE-A, so that it can transceive VPN routing  
information of VPN-target 111:1.  
[PE-A] ip vpn-instance vpn-instance 1  
[PE-A-vpn-1] route-distinguisher 100:1  
[PE-A-vpn-1] vpn-target 111:1 both  
[PE-A-vpn-1] quit  
Set up MP-EBGP adjacency between PE-A and CE-A, import intra-CE-A VPN routes  
learned into MBGP VPN-instance address family.  
[PE-A] bgp 100  
[PE-A-bgp] ipv4-family vpn-instance vpn-instance1  
[PE-A-bgp-af-vpn-instance] import-route direct  
[PE-A-bgp-af-vpn-instance] import-route static  
[PE-A-bgp-af-vpn-instance] group 172 external  
[PE-A-bgp-af-vpn-instance] peer 172.15.1.1 group 172 as-number 65011  
[PE-A-bgp-af-vpn-instance] quit  
[PE-A-bgp] quit  
Bind VPN-instance1 with virtual interface of VLAN301 which connects CE-A.  
[PE-A] vlan 301  
[PE-A-vlan301] port gigabitethernet 3/1/1  
[PE-A-vlan301] quit  
[PE-A] interface Vlan-interface 301  
[PE-A-Vlan-interface301] ip binding vpn-instance vpn-instance1  
[PE-A-Vlan-interface301] ip address 172.15.0.1 255.255.0.0  
[PE-A-Vlan-interface301] quit  
Configure loopback interface  
[PE-A] interface loopback 0  
[PE-A-LoopBack0] ip address 10.1.1.1 255.255.255.255  
[PE-A-LoopBack0] quit  
Configure MPLS basic capacity.  
[PE-A] mpls lsr-id 10.1.1.1  
[PE-A] mpls  
37-41  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE-A-mpls] quit  
[PE-A] mpls ldp  
Set up MP-IBGP adjacency between PEs to exchange inter-PE VPN routing  
information and activate MP-IBGP peer in VPNv4 sub-address family view.  
[PE-A] bgp 100  
[PE-A-bgp] group 20 internal  
[PE-A-bgp] peer 20.1.1.1 group 20  
[PE-A-bgp] peer 20.1.1.1 connect-interface loopback 0  
[PE-A-bgp] ipv4-family vpnv4  
[PE-A-bgp-af-vpn] peer 20 enable  
[PE-A-bgp-af-vpn] peer 20.1.1.1 group 20  
[PE-A-bgp-af-vpn] quit  
2) Configure PE-C.  
Create a VPN-instance 2 on PE-C, so that it can transceive VPN routing information of  
VPN-target 111:1 and 222:2.  
[PE-C] ip vpn-instance vpn-instance 2  
[PE-C-vpn-2] route-distinguisher 100:2  
[PE-C-vpn-2] vpn-target 111:1 both  
[PE-C-vpn-2] vpn-target 222:2 both  
[PE-C-vpn-2] quit  
Set up MP-EBGP adjacency between PE-C and CE-C, import intra-CE-C VPN routes  
learned into MBGP VPN-instance address family.  
[PE-C] bgp 100  
[PE-C-bgp] ipv4-family vpn-instance vpn-instance2  
[PE-C-bgp-af-vpn-instance] import-route direct  
[PE-C-bgp-af-vpn-instance] import-route static  
[PE-C-bgp-af-vpn-instance] group 172 external  
[PE-C-bgp-af-vpn-instance] peer 172.16.1.1 group 172 as-number 65012  
[PE-C-bgp-af-vpn-instance] quit  
[PE-C-bgp] quit  
Bind VPN-instance2 with the interface of VLAN301 which connects CE-C.  
[PE-C] vlan 301  
[PE-C-vlan301] port gigabitethernet 3/1/1  
[PE-C-vlan301] quit  
[PE-C] interface Vlan-interface 301  
[PE-C-Vlan-interface301] ip binding vpn-instance vpn-instance2  
[PE-C-Vlan-interface301] ip address 172.16.0.1 255.255.0.0  
[PE-C-Vlan-interface301] quit  
Configure loopback interface  
[PE-C] interface loopback 0  
37-42  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE-C-LoopBack0] ip address 20.1.1.1 255.255.255.255  
[PE-C-LoopBack0] quit  
Configure MPLS basic capacity.  
[PE-C] mpls lsr-id 20.1.1.1  
[PE-C] mpls  
[PE-C-mpls] quit  
[PE-C] mpls ldp  
Set up MP-IBGP adjacency between PEs to exchange inter-PE VPN routing  
information and activate MP-IBGP peer in VPNv4 sub-address family view.  
[PE-C] bgp 100  
[PE-C-bgp] group 10  
[PE-C-bgp] peer 10.1.1.1 group 10  
[PE-C-bgp] peer 10.1.1.1 connect-interface loopback 0  
[PE-C-bgp] group 30  
[PE-C-bgp] peer 30.1.1.1 group 30  
[PE-C-bgp] peer 30.1.1.1 connect-interface loopback 0  
[PE-C-bgp] ipv4-family vpnv4  
[PE-C-bgp-af-vpn] peer 10 enable  
[PE-C-bgp-af-vpn] peer 10.1.1.1 group 10  
[PE-C-bgp-af-vpn] peer 30 enable  
[PE-C-bgp-af-vpn] peer 30.1.1.1 group 30  
[PE-C-bgp-af-vpn] quit  
3) Configure PE-B:  
Create VPN-instance 3 for VPN2 on PE-B, so that it can transceive VPN routing  
information of VPN-target 222:2.  
[PE-B] ip vpn-instance vpn-instance 3  
[PE-B-vpn-3] route-distinguisher 100:3  
[PE-B-vpn-3] vpn-target 222:2 both  
[PE-B-vpn-3] quit  
Set up MP-EBGP adjacency between PE-B and CE-B, import intra-CE-B VPN routes  
learned into MBGP VPN-instance address family.  
[PE-B] bgp 100  
[PE-B-bgp] ipv4-family vpn-instance vpn-instance3  
[PE-B-bgp-af-vpn-instance] import-route direct  
[PE-B-bgp-af-vpn-instance] import-route static  
[PE-B-bgp-af-vpn-instance] group 172 external  
[PE-B-bgp-af-vpn-instance] peer 172.17.1.1 group 172 as-number 65013  
[PE-B-bgp-af-vpn-instance] quit  
[PE-B-bgp] quit  
Bind VPN-instance3 with interface of VLAN301 which connects to CE-B.  
37-43  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE-B] vlan 301  
[PE-B-vlan301] port gigabitethernet 3/1/1  
[PE-B-vlan301] quit  
[PE-B] interface Vlan-interface 301  
[PE-B-Vlan-interface301] ip binding vpn-instance vpn-instance3  
[PE-B-Vlan-interface301] ip address 172.17.0.1 255.255.0.0  
[PE-B-Vlan-interface301] quit  
Configure loopback interface  
[PE-B] interface loopback 0  
[PE-B-LoopBack0] ip address 30.1.1.1 255.255.255.255  
[PE-B-LoopBack0] quit  
Configure MPLS basic capacity.  
[PE-B] mpls lsr-id 30.1.1.1  
[PE-B] mpls  
[PE-B-mpls] quit  
[PE-B] mpls ldp  
Set up MP-IBGP adjacency between PEs to exchange inter-PE VPN routing  
information and activate MP-IBGP peer in VPNv4 sub-address family view.  
[PE-B] bgp 100  
[PE-B-bgp] group 20  
[PE-B-bgp] peer 20.1.1.1 group 20  
[PE-B-bgp] peer 20.1.1.1 connect-interface loopback 0  
[PE-B-bgp] ipv4-family vpnv4  
[PE-B-bgp-af-vpn] peer 20 enable  
[PE-B-bgp-af-vpn] peer 20.1.1.1 group 20  
[PE-B-bgp-af-vpn] quit  
37.4.4 Hub&Spoke Configuration Example  
I. Network requirements  
Hub&Spoke networking is also called central server networking. The site in the center  
is called hub-site, while the one not in the center is called spoke-site. The hub-site  
knows the routes to all other sites in the same VPN, and the spoke-site must send its  
traffic first to hub-site and then to the destination. Hub-site is the central node of  
spoke-sites.  
A bank has a headquarters network and subsidiary networks, and it requires that the  
subsidiaries cannot directly exchange data with each other, but they can exchange data  
through the headquarters network which provides uniform control. In this case,  
Hub&Spoke networking topology is used: CE2 and CE3 are spoke-sites, while CE1 is a  
hub-site in the bank data center. CE1 controls communication between CE2 and CE3.  
37-44  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
z
Set up IBGP adjacency between PE1 and PE2 or PE1 and PE3, but not between  
PE2 and PE3, that is, VPN routing information cannot be exchanged between PE2  
and PE3.  
z
z
z
Create two VPN-instances on PE1, import VPN routes of VPN-target 100:11 and  
100:12, set VPN-target for VPN routes advertised as 100:2.  
Create a VPN-instance on PE2, import VPN routes of VPN-target 100:2, set  
VPN-target for VPN routes advertised as 100:11.  
Create a VPN-instance on PE3, import VPN routes of VPN-target 100:2, set  
VPN-target for VPN routes advertised as 100:12.  
Then PE2 and PE3 can only learn their neighbor’s routes through PE1.  
Note:  
In this case the configuration is focused on four points:  
z
Route advertisement can be controlled by VPN-target settings on different PEs.  
Routing loop is permitted only once, so that PE can receive route update messages  
with AS number included from CE.  
z
z
z
In Hub&Spoke networking, vpn-target of VPN-instance (VPN-instance3) which is  
used to release route on the PE1 cannot be the same with any vpn-target of  
VPN-instance (VPN-instance2) which is used to import route on PE1.  
In Hub&Spoke networking, route-distinguisher rd2 (100:3) of VPN-instance which is  
used to release route on the PE1 cannot be the same with the route-distinguisher  
rd1 (100:1) or rd4 (100:4) of corresponding VPN-instances on each PE2 and PE3;  
rd 1 and rd4 can be the same or not.  
37-45  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
II. Network diagram  
CE1  
Hub Site  
VLAN202  
VLAN201  
172.17.0.1/16  
172.16.0.1/16  
PE1  
Loopback0  
11.1.1.1/32  
Internet  
Spoke Site  
Spoke Site  
PE3  
20.1.1.2  
CE2  
PE2  
CE3  
VLAN201  
172.15.0.1/16  
VLAN201  
172.18.0.1/16  
Loopback0  
22.1.1.1/32  
Loopback0  
33.1.1.1/32  
Figure 37-11 Network diagram for Hub&Spoke  
III. Configuration procedure  
Note:  
The following contents are omitted in this case: MPLS basic capacity configuration  
between PEs, configuration between PE and P, configuration between CEs. For the  
details refer to 37.4.1 .  
1) Configure PE1  
Configure two VPN-instances on PE1, set specified VPN-target for the routes received  
from PE2 and PE3.  
[PE1] ip vpn-instance vpn-instance2  
[PE1-vpn-vpn-instance2] route-distinguisher 100:2  
[PE1-vpn-vpn-instance2] vpn-target 100:11 import-extcommunity  
[PE1-vpn-vpn-instance2] vpn-target 100:12 import-extcommunity  
[PE1-vpn-instance2] quit  
[PE1] ip vpn-instance vpn-instance3  
[PE1-vpn-vpn-instance3] route-distinguisher 100:3  
[PE1-vpn-vpn-instance3] vpn-target 100:2 export-extcommunity  
[PE1-vpn-vpn-instance3] quit  
Set up MP-EBGP adjacency between PE1 and CE1, import intra-CE1 VPN routes  
learned into MBGP VPN-instance address family, with one routing loop permitted.  
37-46  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1] bgp 100  
[PE1-bgp] ipv4-family vpn-instance vpn-instance2  
[PE1-bgp-af-vpn-instance] import-route static  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] group 17216 external  
[PE1-bgp-af-vpn-instance] peer 172.16.1.1 group 17216 as-number 65002  
[PE1-bgp-af-vpn-instance] quit  
[PE1-bgp] ipv4-family vpn-instance vpn-instance3  
[PE1-bgp-af-vpn-instance] import-route static  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] group 17217 external  
[PE1-bgp-af-vpn-instance] peer 172.17.1.1 group 17217 as-number 65002  
[PE1-bgp-af-vpn-instance] peer 172.17.1.1 allow-as-loop 1  
[PE1-bgp-af-vpn] quit  
[PE1-bgp] quit  
Bind VLAN interface connecting PE1 and CE1 to different VPN-instances. Bind the  
interface of the VLAN to which the Ethernet port Gigabitethernet 2/1/1 belongs to  
vpn-instance2, bind the interface of the VLAN to which the Ethernet port  
Gigabitethernet 2/1/2 belongs to vpn-instance3.  
[PE1] vlan 201  
[PE1-vlan201] port gigabitethernet 2/1/1  
[PE1-vlan201] quit  
[PE1] interface Vlan-interface 201  
[PE1-Vlan-interface201] ip binding vpn-instance vpn-instance2  
[PE1-Vlan-interface201] ip address 172.16.0.1 255.255.0.0  
[PE1-Vlan-interface201] quit  
[PE1] vlan 202  
[PE1-vlan202] port gigabitethernet 2/1/2  
[PE1-vlan202] quit  
[PE1] interface Vlan-interface 202  
[PE1-Vlan-interface202] ip binding vpn-instance vpn-instance3  
[PE1-Vlan-interface202] ip address 172.17.0.1 255.255.0.0  
[PE1-Vlan-interface202] quit  
Configure loopback interface  
[PE1] interface loopback 0  
[PE1-LoopBack0] ip address 11.1.1.1 255.255.255.255  
[PE1-LoopBack0] quit  
Set up MP-IBGP adjacency between PEs to exchange inter-PE VPN routing  
information and activate MP-IBGP peer in VPNv4 sub-address family view.  
[PE1] bgp 100  
[PE1-bgp] group 22  
37-47  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1-bgp] peer 22.1.1.1 group 22 as-number 100  
[PE1-bgp] peer 22.1.1.1 connect-interface loopback 0  
[PE1-bgp] group 33  
[PE1-bgp] peer 33.1.1.1 group 33 as-number 100  
[PE1-bgp] peer 33.1.1.1 connect-interface loopback 0  
[PE1-bgp] ipv4-family vpnv4  
[PE1-bgp-af-vpn] peer 22 enable  
[PE1-bgp-af-vpn] peer 22.1.1.1 group 22  
[PE1-bgp-af-vpn] peer 33 enable  
[PE1-bgp-af-vpn] peer 33.1.1.1 group 33  
[PE1-bgp-af-vpn] quit  
2) Configure PE2  
Create a VPN-instance on PE2, import VPN routing information of VPN-target 100:2  
and advertise VPN routing information of VPN-target 100:1.  
[PE2] ip vpn-instance vpn-instance1  
[PE2-vpn-vpn-instance1] route-distinguisher 100:1  
[PE2-vpn-vpn-instance1] vpn-target 100:11 export-extcommunity  
[PE2-vpn-vpn-instance1] vpn-target 100:2 import-extcommunity  
[PE2-vpn-vpn-instance1] quit  
Set up MP-EBGP adjacency between PE2 and CE2, import intra-CE2 VPN routes  
learned into MBGP VPN-instance address family.  
[PE2] bgp 100  
[PE2-bgp] ipv4-family vpn-instance vpn-instance1  
[PE2-bgp-af-vpn-instance] import-route static  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] group 172 external  
[PE2-bgp-af-vpn-instance] peer 172.15.1.1 group 172 as-number 65001  
[PE2-bgp-af-vpn-instance] quit  
[PE2-bgp] quit  
Bind the interface of the VLAN to which the port connecting PE2 and CE2 belongs to  
VPN-instance.  
[PE2] vlan 201  
[PE2-vlan201] port gigabitethernet 2/1/1  
[PE2-vlan201] quit  
[PE2] interface Vlan-interface 201  
[PE2-Vlan-interface201] ip binding vpn-instance vpn-instance1  
[PE2-Vlan-interface201] ip address 172.15.0.1 255.255.0.0  
[PE2-Vlan-interface201] quit  
Configure loopback interface  
[PE2] interface loopback 0  
[PE2-LoopBack0] ip address 22.1.1.1 255.255.255.255  
37-48  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-LoopBack0] quit  
Set up MP-IBGP adjacency between PE2 and PE1 to exchange inter-PE VPN routing  
information and activate MP-IBGP peer in VPNv4 sub-address family view.  
[PE2] bgp 100  
[PE2] group 11  
[PE2-bgp] peer 11.1.1.1 group 11 as-number 100  
[PE2-bgp] peer 11.1.1.1 connect-interface loopback 0  
[PE2-bgp] ipv4-family vpnv4  
[PE2-bgp-af-vpn] peer 11 enable  
[PE2-bgp-af-vpn] peer 11.1.1.1 allow-as-loop 1  
[PE2-bgp-af-vpn] quit  
[PE2-bgp] quit  
3) Configure PE3  
Create a VPN-instance on PE3, import VPN routing information of VPN-target 100:2  
and advertise VPN routing information of VPN-target 100:12.  
[PE3] ip vpn-instance vpn-instance2  
[PE3-vpn-vpn-instance2] route-distinguisher 100:4  
[PE3-vpn-vpn-instance2] vpn-target 100:12 export-extcommunity  
[PE3-vpn-vpn-instance2] vpn-target 100:2 import-extcommunity  
[PE3-vpn-vpn-instance2] quit  
Set up MP-EBGP adjacency between PE3 and CE3 import intra-CE3 VPN routes  
learned into MBGP VPN-instance address family.  
[PE3] bgp 100  
[PE3-bgp] ipv4-family vpn-instance vpn-instance2  
[PE3-bgp-af-vpn-instance] import-route static  
[PE3-bgp-af-vpn-instance] import-route direct  
[PE3-bgp-af-vpn-instance] group 172 external  
[PE3-bgp-af-vpn-instance] peer 172.18.1.1 group 172 as-number 65001  
[PE3-bgp-af-vpn-instance] quit  
[PE3-bgp] quit  
Bind the interface of the VLAN to which the port connecting PE3 and CE3 belongs to  
VPN-instance.  
[PE3] vlan 201  
[PE3-vlan201] port gigabitethernet 2/1/1  
[PE3-vlan201] quit  
[PE3] interface Vlan-interface 201  
[PE3-Vlan-interface201] ip binding vpn-instance vpn-instance2  
[PE3-Vlan-interface201] ip address 172.18.0.1 255.255.0.0  
[PE3-Vlan-interface201] quit  
Configure loopback interface  
37-49  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE3] interface loopback 0  
[PE3-LoopBack0] ip address 33.1.1.1 255.255.255.255  
[PE3-LoopBack0] quit  
Set up MP-IBGP adjacency between PE3 and PE1 to exchange inter-PE VPN routing  
information and activate MP-IBGP peer in VPNv4 sub-address family view.  
[PE3] bgp 100  
[PE3-bgp] group 11  
[PE3-bgp] peer 11.1.1.1 group 11  
[PE3-bgp] peer 11.1.1.1 connect-interface loopback 0  
[PE3-bgp] ipv4-family vpnv4  
[PE3-bgp-af-vpn] peer 11 enable  
[PE2-bgp-af-vpn] peer 11.1.1.1 group 11  
[PE2-bgp-af-vpn] peer 11.1.1.1 allow-as-loop 1  
[PE3-bgp-af-vpn] quit  
[PE3-bgp] quit  
37.4.5 CE Dual-home Configuration Example  
I. Network requirements  
For the applications which require high robustness of network, you may use CE  
dual-home networking mode.  
CE1 and CE2 are dual-homed; they are connected to both PE1 and PE2. Three PEs  
are connected to each other so the links between them are backed up. CE3 and CE4  
are single-homed; each of them is only connected to one PE.  
CE1 and CE3 are in one VPN, and CE2 and CE4 are in another VPN. The two VPNs  
cannot intercommunicate with each other.  
37-50  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
II. Network diagram  
AS:65003  
CE3  
AS:65004  
CE4  
VLAN211  
VLAN211  
192.168.13.2/24  
192.168.23.2/24  
Loopback0  
3.3.3.3/32  
VLAN314  
VLAN311  
192.168.13.1/24  
192.168.23.1/24  
VLAN312  
30.1.1.1/24  
VLAN313  
20.1.1.2/24  
PE3  
VLAN214  
20.1.1.1/24  
VLAN214  
30.1.1.2/24  
AS:100  
Loopback0  
1.1.1.1/32  
Loopback0  
2.2.2.2/32  
VLAN213  
10.1.1.1/24  
VLAN213  
10.1.1.2/24  
PE1  
PE2  
VLAN211  
172.11.11.1/24  
VLAN212  
172.21.21.1/24  
VLAN212  
172.12.12.1/24  
VLAN211  
172.22.22.1/24  
VLAN211  
172.11.11.2/24  
VLAN211  
172.22.22.2/24  
VLAN212  
172.12.12.2/24  
VLAN212  
172.21.21.2/24  
CE1  
AS:65001  
CE2  
AS:65002  
Figure 37-12 Network diagram for CE dual-home  
III. Configuration procedure  
Note:  
The configuration of CE router is omitted in this case and you can refer to Section  
1) Configure PE1  
Configure two VPN-instances 1.1 and 1.2 respectively for CE1 and CE2 on PE1, set  
different VPN-targets for them.  
[PE1] ip vpn-instance vpn-instance1.1  
[PE1-vpn-vpn-instance1.1] route-distinguisher 1.1.1.1:1  
[PE1-vpn-vpn-instance1.1] vpn-target 1.1.1.1:1  
[PE1-vpn-vpn-instance1.1] quit  
[PE1] ip vpn-instance vpn-instance1.2  
[PE1-vpn-vpn-instance1.2] route-distinguisher 2.2.2.2:2  
[PE1-vpn-vpn-instance1.2] vpn-target 2.2.2.2:2  
37-51  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1-vpn-vpn-instance1.2] quit  
Set up MP-EBGP adjacency between PE1 and CE1, import intra-CE1 VPN routes  
learned into VPN-instance 1.1.  
[PE1] bgp 100  
[PE1-bgp] ipv4-family vpn-instance vpn-instance1.1  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] import-route static  
[PE1-bgp-af-vpn-instance] group 17211 external  
[PE1-bgp-af-vpn-instance] peer 172.11.11.2 group 17211 as-number 65001  
[PE1-bgp-af-vpn-instance] quit  
[PE1-bgp] quit  
Set up MP-EBGP adjacency between PE1 and CE2, import intra-CE2 VPN routes  
learned into VPN-instance 1.2.  
[PE1-bgp] ipv4-family vpn-instance vpn-instance1.2  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] import-route static  
[PE1-bgp-af-vpn-instance] group 17221 external  
[PE1-bgp-af-vpn-instance] peer 172.21.21.2 group 17221 as-number 65002  
[PE1-bgp-af-vpn] quit  
[PE1-bgp] quit  
Bind the interface connecting PE1 and CE1 to VPN-instance 1.1 and interface  
connecting PE1 and CE2 to VPN-instance 1.2.  
[PE1] vlan 211  
[PE1-vlan211] port gigabitethernet 2/1/1  
[PE1-vlan211] quit  
[PE1] interface Vlan-interface 211  
[PE1-Vlan-interface211] ip binding vpn-instance vpn-instance1.1  
[PE1-Vlan-interface211] ip address 172.11.11.1 255.255.255.0  
[PE1-Vlan-interface211] quit  
[PE1] vlan 212  
[PE1-vlan212] port gigabitethernet 2/1/2  
[PE1-vlan212] quit  
[PE1] interface Vlan-interface 212  
[PE1-Vlan-interface212] ip binding vpn-instance vpn-instance1.2  
[PE1-Vlan-interface212] ip address 172.21.21.1 255.255.255.0  
[PE1-Vlan-interface212] quit  
Configure loopback interface  
[PE1] interface loopback 0  
[PE1-LoopBack0] ip address 1.1.1.1 255.255.255.255  
[PE1-LoopBack0] quit  
37-52  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Configure MPLS basic capacity, enable LDP on the interface connecting PE1 and PE2  
and the interface connecting PE1 and PE3.  
[PE1] mpls lsr-id 1.1.1.1  
[PE1] mpls  
[PE1-mpls] quit  
[PE1] mpls ldp  
[PE1] vlan 213  
[PE1-vlan213] port gigabitethernet 2/1/3  
[PE1-vlan213] quit  
[PE1] interface Vlan-interface213  
[PE1-Vlan-interface213] mpls  
[PE1-Vlan-interface213] mpls ldp enable  
[PE1-Vlan-interface213] mpls ldp transport-ip interface  
[PE1-Vlan-interface213] ip address 10.1.1.1 255.255.255.0  
[PE1-Vlan-interface213] quit  
[PE1] vlan 214  
[PE1-vlan214] port gigabitethernet 2/1/4  
[PE1-vlan214] quit  
[PE1] interface Vlan-interface 214  
[PE1-Vlan-interface214] mpls  
[PE1-Vlan-interface214] mpls ldp enable  
[PE1-Vlan-interface214] mpls ldp transport-ip interface  
[PE1-Vlan-interface214] ip address 30.1.1.2 255.255.255.0  
[PE1-Vlan-interface214] quit  
Enable OSPF on the interface connecting PE1 and PE2 and the interface connecting  
PE1 and PE3 and the loopback interface, to achieve inter-PE communication.  
[PE1] Router-id 1.1.1.1  
[PE1] ospf  
[PE1-ospf-1] area 0  
[PE1-ospf-1-area-0.0.0.0] network 1.1.1.1 0.0.0.0  
[PE1-ospf-1-area-0.0.0.0] network 30.1.1.2 0.0.0.255  
[PE1-ospf-1-area-0.0.0.0] network 10.1.1.1 0.0.0.255  
[PE1-ospf-1-area-0.0.0.0] quit  
[PE1-ospf-1] quit  
Set up MP-IBGP adjacency between PEs to exchange inter-PE VPN routing  
information and activate MP-IBGP peer in VPNv4 sub-address family view.  
[PE1] bgp 100  
[PE1-bgp] group 2  
[PE1-bgp] peer 2.2.2.2 group 2  
[PE1-bgp] peer 2.2.2.2 connect-interface loopback 0  
[PE1-bgp] group 3  
37-53  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1-bgp] peer 3.3.3.3 group 3  
[PE1-bgp] peer 3.3.3.3 connect-interface loopback 0  
[PE1-bgp] ipv4-family vpnv4  
[PE1-bgp-af-vpn] peer 2 enable  
[PE1-bgp-af-vpn] peer 2.2.2.2 group 2  
[PE1-bgp-af-vpn] peer 3 enable  
[PE1-bgp-af-vpn] peer 3.3.3.3 group 3  
[PE1-bgp-af-vpn] quit  
2) Configure PE2  
Note:  
The configuration of PE2 is similar to that of PE1, so only VPN-instance configuration is  
detailed here.  
Create two VPN-instances 2.1 and 2.2 respectively for CE1 and CE2 on PE2, configure  
different VPN-targets for them.  
[PE2] ip vpn-instance vpn-instance2.1  
[PE2-vpn-vpn-instance2.1] route-distinguisher 1.1.1.1:1  
[PE2-vpn-vpn-instance2.1] vpn-target 1.1.1.1:1  
[PE2-vpn-vpn-instance2.1] quit  
[PE2] ip vpn-instance vpn-instance2.2  
[PE2-vpn-vpn-instance2.2] route-distinguisher 2.2.2.2:2  
[PE2-vpn-vpn-instance2.2] vpn-target 2.2.2.2:2  
[PE2-vpn-vpn-instance2.2] quit  
Set up MP-EBGP adjacency between PE2 and CE1, import intra-CE1 VPN routes  
learned into VPN-instance2.1.  
[PE2] bgp 100  
[PE2-bgp] ipv4-family vpn-instance vpn-instance2.1  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] import-route static  
[PE2-bgp-af-vpn-instance] group 17212 external  
[PE2-bgp-af-vpn-instance] peer 172.12.12.2 group 17212 as-number 65001  
[PE2-bgp-af-vpn] quit  
Set up MP-EBGP adjacency between PE2 and CE2, import intra-CE2 VPN routes  
learned into VPN-instance2.2.  
[PE2-bgp] ipv4-family vpn-instance vpn-instance2.2  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] import-route static  
[PE2-bgp-af-vpn-instance] group 17222 external  
37-54  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-bgp-af-vpn-instance] peer 172.22.22.2 group 17222 as-number 65002  
[PE2-bgp-af-vpn] quit  
[PE2-bgp] quit  
Bind the interface connecting PE2 and CE1 to VPN-instance 2.1 and the interface  
connecting PE2 and CE2 to VPN-instance 2.2.  
[PE2] vlan 212  
[PE2-vlan212] port gigabitethernet 2/1/2  
[PE2-vlan212] quit  
[PE2] interface Vlan-interface 212  
[PE2-Vlan-interface212] ip binding vpn-instance vpn-instance2.1  
[PE2-Vlan-interface212] ip address 172.12.12.1 255.255.255.0  
[PE2-Vlan-interface212] quit  
[PE2] vlan 211  
[PE2-vlan211] port gigabitethernet 2/1/1  
[PE2-vlan211] quit  
[PE2] interface Vlan-interface 211  
[PE2-Vlan-interface211] ip binding vpn-instance vpn-instance2.2  
[PE2-Vlan-interface211] ip address 172.22.22.1 255.255.255.0  
[PE2-Vlan-interface211] quit  
3) Configure PE3  
Note:  
Only the VPN-instance configuration of PE3 is detailed here, other configurations are  
similar to that of the PE1 and PE2, and are omitted here.  
Create two VPN-instances 3.1 and 3.2 respectively for CE3 and CE4 on PE3, configure  
different VPN-targets for them.  
[PE3] ip vpn-instance vpn-instance3.1  
[PE3-vpn-vpn-instance3.1] route-distinguisher 1.1.1.1:1  
[PE3-vpn-vpn-instance3.1] vpn-target 1.1.1.1:1  
[PE3-vpn-vpn-instance3.1] quit  
[PE3] ip vpn-instance vpn-instance3.2  
[PE3-vpn-instance] route-distinguisher 2.2.2.2:2  
[PE3-vpn-instance] vpn-target 2.2.2.2:2  
[PE3-vpn-instance] quit  
Set up MP-EBGP adjacency between PE3 and CE3, import intra-CE3 VPN routes  
learned into VPN-instance3.1.  
[PE3] bgp 100  
[PE3-bgp] ipv4-family vpn-instance vpn-instance3.1  
37-55  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE3-bgp-af-vpn-instance] import-route direct  
[PE3-bgp-af-vpn-instance] import-route static  
[PE3-bgp-af-vpn-instance] group 192 external  
[PE3-bgp-af-vpn-instance] peer 192.168.13.2 group 192 as-number 65003  
[PE3-bgp-af-vpn-instance] quit  
[PE3-bgp] quit  
Set up MP-EBGP adjacency between PE3 and CE4, import intra-CE4 VPN routes  
learned into VPN-instance3.2.  
[PE3-bgp] ipv4-family vpn-instance vpn-instance3.2  
[PE3-bgp-af-vpn-instance] import-route direct  
[PE3-bgp-af-vpn-instance] import-route static  
[PE3-bgp-af-vpn-instance] group 232 external  
[PE3-bgp-af-vpn-instance] peer 192.168.23.2 group 232 as-number 65004  
[PE3-bgp-af-vpn-instance] quit  
[PE3-bgp] quit  
Bind the interface connecting PE3 and CE3 to VPN-instance3.1 and the interface  
connecting PE3 and CE4 to VPN-instance 3.2.  
[PE3] vlan 311  
[PE3-vlan311] port gigabitethernet 3/1/1  
[PE3-vlan311] quit  
[PE3] interface Vlan-interface 311  
[PE3-Vlan-interface311] ip binding vpn-instance vpn-instance3.1  
[PE3-Vlan-interface311] ip address 192.168.13.1 255.255.255.0  
[PE3-Vlan-interface311] quit  
[PE3] vlan 314  
[PE3-vlan314] port gigabitethernet 3/1/4  
[PE3-vlan314] quit  
[PE3] interface Vlan-interface 314  
[PE3-Vlan-interface314] ip binding vpn-instance vpn-instance3.2  
[PE3-Vlan-interface314] ip address 192.168.23.1 255.255.255.0  
[PE3-Vlan-interface314] quit  
37.4.6 Cross-domain BGP/MPLS VPN Configuration Example  
I. Network requirements  
A VPN subscriber has sites in both city A and B. Because of the geographical reason,  
site in City A accesses to the MPLS/VPN network of service provider in City A, and gets  
AS100 as the AS number; site in City B accesses to the MPLS/VPN network of service  
provider in City B, and gets AS200 as the AS number. The VPN goes through two ASs.  
CE1 and CE2 belong to VPN-A, while CE3 and CE4 belong to VPN-B.  
37-56  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
II. Network diagram  
AS 100  
Chapter 37 BGP/MPLS VPN Configuration  
AS 200  
VLAN205  
10.1.1.2/24  
VLAN205  
20.1.1.2/24  
VLAN205  
20.1.1.1/24  
VLAN205  
10.1.1.1/24  
VLAN206  
PE2:2.2.2.2/32  
98.98.98.1/24  
PE1:1.1.1.1/32  
98.98.98.2/24  
VLAN201  
172.11.11.1/24  
VLAN202  
172.21.21.1/24  
VLAN203  
VLAN204  
VLAN206  
172.12.12.1/24  
172.22.22.1/24  
P1:3.3.3.3/32  
P2:4.4.4.4/32  
VLAN201  
VLAN201  
VLAN201  
VLAN201  
172.21.21.2/24  
172.12.12.2/24  
172.11.11.2/24  
172.22.22.2/24  
CE1  
CE2  
CE4  
CE3  
PC4  
PC1  
192.168.11.10  
PC3  
192.168.21.10  
PC2  
192.168.12.10  
192.168.22.10  
Figure 37-13 Network diagram for ASBR  
III. Configuration procedure  
1) Configure PE1  
Enable MPLS and LDP.  
[PE1] mpls lsr-id 1.1.1.1  
[PE1] mpls  
[PE1-mpls] quit  
[PE1] mpls ldp  
Configure the VLAN interface connecting CE.  
[PE1] vlan 201  
[PE1-vlan201] port gigabitethernet 2/1/1  
[PE1-vlan201] quit  
[PE1] vlan 202  
[PE1-vlan202] port gigabitethernet 2/1/2  
[PE1-vlan202] quit  
Configure loopback interface.  
[PE1] interface loopback 0  
[PE1-LoopBack0] ip address 1.1.1.1 255.255.255.255  
Configure VPN-instance.  
[PE1] ip vpn-instance vpna  
[PE1-vpn-vpna] route-distinguisher 100:1  
[PE1-vpn-vpna] vpn-target 100:1 both  
[PE1] ip vpn-instance vpnb  
[PE1-vpn-vpnb] route-distinguisher 100:2  
[PE1-vpn-vpnb] vpn-target 100:2 both  
Configure VLAN interface connecting PE1 and P1.  
37-57  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1] vlan 205  
[PE1-vlan205] port gigabitethernet 2/2/1  
[PE1-vlan205] quit  
[PE1] interface Vlan-interface 205  
[PE1-Vlan-interface205] mpls  
[PE1-Vlan-interface205] mpls ldp enable  
[PE1-Vlan-interface205] ip address 10.1.1.2 255.255.255.0  
Bind the VLAN interface with the VPN-instance.  
[PE1] interface Vlan-interface 201  
[PE1-Vlan-interface201] ip binding vpn-instance vpna  
[PE1-Vlan-interface201] ip address 172.11.11.1 255.255.255.0  
[PE1-Vlan-interface201] quit  
[PE1] interface Vlan-interface 202  
[PE1-Vlan-interface202] ip binding vpn-instance vpnb  
[PE1-Vlan-interface202] ip address 172.21.21.1 255.255.255.0  
[PE1-Vlan-interface202] quit  
Enable EBGP between PE and CE.  
[PE1] bgp 100  
[PE1-bgp] ipv4-family vpn-instance vpna  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] group 172-11 external  
[PE1-bgp-af-vpn-instance] peer 172.11.11.2 group 172-11 as-number 65011  
[PE1-bgp- af-vpn] quit  
[PE1-bgp] ipv4-family vpn-instance vpnb  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] group 172-21 external  
[PE1-bgp-af-vpn-instance] peer 172.21.21.2 group 172-21 as-number 65021  
[PE1-bgp-af-vpn-instance] peer 172.21.21.2 next-hop-local  
[PE1-bgp-af-vpn-instace] quit  
Enable IBGP between PE-ASBRs.  
[PE1-bgp] group 3 internal  
[PE1-bgp] peer 3.3.3.3 group 3  
[PE1-bgp] peer 3.3.3.3 connect-interface loopback0  
[PE1-bgp] ipv4-family vpnv4  
[PE1-bgp-af-vpn] peer 3 enable  
[PE1-bgp-af-vpn] peer 3.3.3.3 group 3  
[PE1-bgp-af-vpn] quit  
[PE1-bgp] quit  
2) Configure PE2  
Configure MPLS.  
[PE2] mpls lsr-id 2.2.2.2  
37-58  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2] mpls  
[PE2-mpls] quit  
[PE2] mpls ldp  
Configure the VLAN interface connecting CE.  
[PE2] vlan 203  
[PE2-vlan203] port gigabitethernet 2/1/1  
[PE2-vlan203] quit  
[PE2] vlan 204  
[PE2-vlan204] port gigabitethernet 2/1/2  
[PE2-vlan204] quit  
Configure loopback interface.  
[PE2] interface loopback 0  
[PE2-LoopBack0] ip address 2.2.2.2 255.255.255.255  
Configure VPN-instance.  
[PE2] ip vpn-instance vpna  
[PE2-vpn-vpna] route-distinguisher 200:1  
[PE2-vpn-vpna] vpn-target 100:1 both  
[PE2] ip vpn-instance vpnb  
[PE2-vpn-vpnb] route-distinguisher 200:2  
[PE2-vpn-vpnb] vpn-target 100:2 both  
Configure the VLAN interface connecting PE2 and P2.  
[PE1] vlan 205  
[PE1-vlan205] port gigabitethernet 2/2/1  
[PE1-vlan205] quit  
[PE1] interface Vlan-interface 205  
[PE1-Vlan-interface205] mpls  
[PE1-Vlan-interface205] mpls ldp enable  
[PE1-Vlan-interface205] ip address 20.1.1.2 255.255.255.0  
Bind the VLAN interface with the VPN-instance.  
[PE2] interface Vlan-interface 203  
[PE2-Vlan-interface203] ip binding vpn-instance vpna  
[PE2-Vlan-interface203] ip address 172.12.12.1 255.255.255.0  
[PE2-Vlan-interface203] quit  
[PE2] interface Vlan-interface 204  
[PE2-Vlan-interface204] ip binding vpn-instance vpnb  
[PE2-Vlan-interface204] ip address 172.22.22.1 255.255.255.0  
[PE2-Vlan-interface204] quit  
Enable EBGP between PE and CE.  
[PE2] bgp 200  
[PE2-bgp] ipv4-family vpn-instance vpna  
37-59  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] group 172-12 external  
[PE2-bgp-af-vpn-instance] peer 172.12.12.2 group 172-12 as-number 65012  
[PE2-bgp] ipv4-family vpn-instance vpnb  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] group 172-22 external  
[PE2-bgp-af-vpn-instance] peer 172.22.22.2 group 172-22 as-number 65022  
[PE2-bgp-af-vpn-instance] quit  
[PE2] quit  
Enable IBGP between PE-ASBRs  
[PE2-bgp] group 4  
[PE2-bgp] peer 4.4.4.4 group 4  
[PE2-bgp] peer 4.4.4.4 connect-interface loopback0  
[PE2-bgp] ipv4-family vpnv4  
[PE2-bgp-af-vpn] peer 4 enable  
[PE2-bgp-af-vpn] peer 4.4.4.4 group 4  
3) Configure P1 (P2 in similar way)  
Configure MPLS basic capability.  
[P1] mpls lsr-id 3.3.3.3  
[P1] mpls  
[P1-mpls] quit  
[P1] mpls ldp  
Configure the interface loopback 0.  
[P1] interface loopback 0  
[P1-LoopBack0] ip address 3.3.3.3 255.255.255.255  
Configure VLAN interface connecting PE1.  
[P1] vlan 205  
[P1-vlan205] port gigabitethernet 2/1/1  
[P1-vlan205] quit  
[P1] interface Vlan-interface 205  
[P1-Vlan-interface205] mpls  
[P1-Vlan-interface205] mpls ldp enable  
[P1-Vlan-interface205] ip address 10.1.1.1 255.255.255.0  
[P1-Vlan-interface205] quit  
Configure VLAN interface connecting PE2.  
[P1] vlan 206  
[P1-vlan206] port gigabitethernet 2/1/2  
[P1-vlan206] quit  
[P1] interface Vlan-interface 206  
[P1-Vlan-interface206] mpls  
37-60  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[P1-Vlan-interface206] mpls ldp enable  
[P1-Vlan-interface206] ip address 98.98.98.1 255.255.255.0  
[P1-Vlan-interface206] quit  
Configure IBGP neighbors and EBGP neighbors.  
[P1] bgp 100  
[P1-bgp] group 1 internal  
[P1-bgp] peer 1.1.1.1 group 1  
[P1-bgp] peer 1.1.1.1 connect-interface loopback0  
[P1-bgp] group 4 external  
[P1-bgp] peer 98.98.98.2 group 4 as-number 200  
[P1-bgp] ipv4-family vpnv4  
[P1-bgp-af-vpn] peer 1 enable  
[P1-bgp-af-vpn] peer 1.1.1.1 group 1  
[P1-bgp-af-vpn] peer 1 next-hop-local  
[P1-bgp-af-vpn] peer 98 enable  
[P1-bgp-af-vpn] peer 98.98.98.2 group 98  
[P1-bgp-af-vpn] undo policy vpn-target  
37.4.7 Cross-Domain BGP/MPLS VPN Configuration Example — Option C  
I. Network requirements  
CE1 and CE2 belong to the same VPN. CE1 accesses the MPLS network through PE1  
in AS100; and CE2 accesses the MPLS network through PE2 in AS200.  
The example adopts Option C to implement a cross-domain BGP/MPLS VPN, that is,  
the VPN routing is managed by the Multi-hop MP-EBGP which advertise label  
VPN-IPv4 routes between PEs.  
II. Network diagram  
BGP/MPLS Backbone  
AS 200  
BGP/MPLS Backbone  
AS 100  
Loopback0:  
202.100.1.1/32  
Loopback0:  
202.200.1.1/32  
Pos2/1/0:  
192.1.1.1/24  
Pos2/1/0:  
192.1.1.2/24  
Pos1/1/0:  
162.1.1.1/16  
Pos1/1/0:  
172.1.1.1/16  
Loopback0:  
202.100.1.2/32  
Loopback0:  
200.200.1.2/32  
ASBR -PE1  
LSR ID:172.1.1.1  
ASBR-PE2  
LSR ID:162.1.1.1  
Pos1/0/0:  
172.1.1.2/16  
Pos1/0/0:  
162.1.1.2/16  
PE1  
LSR ID:  
172.1.1.2  
PE2  
LSR ID:  
162.1.1.2  
Ethernet2/1/0:  
168.2.2.1/16  
Ethernet2/1/0:  
168.1.1.1/16  
Ethernet1/1/0  
168.1.1.2/16  
Ethernet1/1/0  
168.2.2.2/16  
CE2  
AS 65002  
CE1  
AS 65001  
Figure 37-14 Network diagram for Multihop EBGP cross-domain VPN  
37-61  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
III. Configuration procedure  
z
z
z
z
Configuring OSPF on the MPLS backbone network  
Configuring basic MPLS capability on the MPLS backbone network  
Configuring a VPN instance on PEs.  
Configuring MP-BGP  
1) Configure OSPF as the IGP protocol on the MPLS backbone network; making  
OSPFs on PEs can learn routes from each other. Create OSPF neighbor between  
ASBR-PE and PE in the same AS.  
Configure PE1.  
[PE1] interface loopback0  
[PE1-LoopBack0] ip address 202.100.1.2 255.255.255.255  
[PE1-LoopBack0] quit  
[PE1] interface pos1/1/0  
[PE1-Pos1/1/0] ip address 172.1.1.2 255.255.0.0  
[PE1-Pos1/1/0] quit  
[PE1] ospf  
[PE1-ospf-1] area 0  
[PE1-ospf-1-area-0.0.0.0] network 172.1.0.0 0.0.255.255  
[PE1-ospf-1-area-0.0.0.0] network 202.100.1.2 0.0.0.0  
[PE1-ospf-1-area-0.0.0.0] quit  
[PE1-ospf-1] quit  
Configure ASBR-PE1  
[ASBR-PE1] interface loopback0  
[ASBR-PE1-LoopBack 0] ip address 202.100.1.1 255.255.255.255  
[ASBR-PE1-LoopBack 0] quit  
[ASBR-PE1] interface pos1/1/0  
[ASBR-PE1-Pos1/1/0] ip address 172.1.1.1 255.255.0.0  
[ASBR-PE1-Pos1/1/0] quit  
[ASBR-PE1] interface pos 2/1/0  
[ASBR-PE1-Pos2/1/0] ip address 192.1.1.1 255.255.255.0  
[ASBR-PE1-Pos2/1/0] quit  
[ASBR-PE1] ospf  
[ASBR-PE1-ospf-1] area 0  
[ASBR-PE1-ospf-1-area-0.0.0.0] network 172.1.0.0 0.0.255.255  
[ASBR-PE1-ospf-1-area-0.0.0.0] network 202.100.1.1 0.0.0.0  
[ASBR-PE1-ospf-1-area-0.0.0.0] quit  
[ASBR-PE1-ospf-1] quit  
Configure PE2  
[PE2] interface loopback0  
[PE2-LoopBack0] ip address 202.200.1.2 255.255.255.255  
[PE2-LoopBack0] quit  
37-62  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2] interface pos1/1/0  
[PE2-Pos1/1/0] ip address 162.1.1.2 255.255.0.0  
[PE2-Pos1/1/0] quit  
[PE2] ospf  
[PE2-ospf-1] area 0  
[PE2-ospf-1-area-0.0.0.0] network 162.1.0.0 0.0.255.255  
[PE2-ospf-1-area-0.0.0.0] network 202.200.1.2 0.0.0.0  
[PE2-ospf-1-area-0.0.0.0] quit  
[PE2-ospf-1] quit  
Configure ASBR-PE2  
[ASBR-PE2] interface loopback0  
[ASBR-PE2-LoopBack0] ip address 202.200.1.1 255.255.255.255  
[ASBR-PE2-LoopBack0] quit  
[ASBR-PE2] interface pos1/1/0  
[ASBR-PE2-Pos1/1/0] ip address 162.1.1.1 255.255.0.0  
[ASBR-PE2-Pos1/1/0] quit  
[ASBR-PE2] interface Pos 2/1/0  
[ASBR-PE2-Pos2/1/0] ip address 192.1.1.2 255.255.255.0  
[ASBR-PE2-Pos2/1/0] quit  
[ASBR-PE2] ospf  
[ASBR-PE2-ospf-1] area 0  
[ASBR-PE2-ospf-1-area-0.0.0.0] network 162.1.0.0 0.0.255.255  
[ASBR-PE2-ospf-1-area-0.0.0.0] network 202.200.1.1 0.0.0.0  
[ASBR-PE2-ospf-1-area-0.0.0.0] quit  
[ASBR-PE2-ospf-1] quit  
2) Configure basic MPLS capability on the MPLS backbone network to enable the  
network to forward VPN traffic.  
Note:  
MPLS must be enabled on the interfaces between the ASBR-PEs.  
Configure basic MPLS capability on PE1 and enable LDP on the interface connected to  
ASBR-PE1.  
[PE1] mpls lsr-id 172.1.1.2  
[PE1-mpls] lsp-trigger all  
[PE1-mpls] quit  
[PE1] mpls ldp  
[PE1-mpls-ldp] quit  
[PE1] interface pos1/1/0  
[PE1-Pos1/1/0] mpls  
37-63  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1-Pos1/1/0] mpls ldp  
[PE1-Pos1/1/0] quit  
Configure basic MPLS capability on ASBR-PE1, enable LDP on the interface  
connected to PE1, and enable MPLS on the interface connected to ASBR-PE2.  
[ASBR-PE1] mpls lsr-id 172.1.1.1  
[ASBR-PE1-mpls] lsp-trigger all  
[ASBR-PE1-mpls] quit  
[ASBR-PE1] mpls ldp  
[ASBR-PE1-mpls-ldp] quit  
[ASBR-PE1] interface pos1/1/0  
[ASBR-PE1-Pos1/1/0] mpls  
[ASBR-PE1-Pos1/1/0] mpls ldp  
[ASBR-PE1-Pos1/1/0] quit  
[ASBR-PE1] interface pos2/1/0  
[ASBR-PE1-Pos2/1/0] mpls  
[ASBR-PE1-Pos2/1/0] quit  
Configure basic MPLS capability on ASBR-PE2, enable LDP on the interface  
connected to PE2, and enable MPLS on the interface connected to ASBR-PE1.  
[ASBR-PE2] mpls lsr-id 162.1.1.1  
[ASBR-PE2-mpls] lsp-trigger all  
[ASBR-PE2-mpls] quit  
[ASBR-PE2] mpls ldp  
[ASBR-PE2-mpls-ldp] quit  
[ASBR-PE2] interface pos1/1/0  
[ASBR-PE2-Pos1/1/0] mpls  
[ASBR-PE2-Pos1/1/0] mpls ldp  
[ASBR-PE2-Pos1/1/0] quit  
[ASBR-PE2] interface pos2/1/0  
[ASBR-PE2-Pos2/1/0] mpls  
[ASBR-PE2-Pos2/1/0] quit  
Configure basic MPLS capability on PE2 and enable LDP on the interface connected to  
ASBR-PE2.  
[PE2] mpls lsr-id 162.1.1.2  
[PE2-mpls] lsp-trigger all  
[PE2-mpls] quit  
[PE2] mpls ldp  
[PE2-mpls-ldp] quit  
[PE2] interface pos1/1/0  
[PE2-Pos1/1/0] mpls  
[PE2-Pos1/1/0] mpls ldp  
[PE2-Pos1/1/0] quit  
37-64  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
3) Create a VPN instance on each PE, and bind the instance to the interface  
connected to the corresponding CE.  
Configure CE1  
[CE1] interface ethernet 1  
[CE1-Ethernet1] ip address 168.1.1.2 255.255.0.0  
[CE1-Ethernet1] quit  
Create a VPN instance on PE1 and bind it to the interface connected to CE1  
[PE1] ip vpn-instance vpna  
[PE1-vpn-vpn-vpna] route-distinguisher 100:2  
[PE1-vpn-vpn-vpna] vpn-target 100:1 both  
[PE1-vpn-vpn-vpna] quit  
[PE1] interface ethernet 2/1/0  
[PE1-Ethernet2/1/0] ip binding vpn-instance vpna  
[PE1-Ethernet2/1/0] ip address 168.1.1.1 255.255.0.0  
[PE1-Ethernet2/1/0] quit  
Configure CE2  
[CE2] interface ethernet 1  
[CE2-Ethernet1] ip address 168.2.2.2 255.255.0.0  
[CE2-Ethernet1] quit  
Create a VPN instance on PE2 and bind it to the interface connected to CE2  
[PE2] ip vpn-instance vpna  
[PE2-vpn-instance] route-distinguisher 200:2  
[PE2-vpn-instance] vpn-target 100:1 both  
[PE2-vpn-instance] quit  
[PE2] interface ethernet 2/1/0  
[PE2-Ethernet2/1/0] ip binding vpn-instance vpna  
[PE2-Ethernet2/1/0] ip address 168.2.2.1 255.255.0.0  
[PE2-Ethernet2/1/0] quit  
4) Configure MP-BGP, set up IBGP peer relation between PEs, and set up EBGP  
peer relation between PEs and their CEs.  
37-65  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Note:  
z
z
z
Enable the exchanging of label-carried IPv4 route between the following routers:  
PE1 and ASBR-PE1, PE2 and ASBR-PE2, ASBR-PE1 and ASBR-PE2.  
Make each ASBR-PE change the next hop to its own when it advertises routes to  
the PE in the same AS.  
Configure routing policy on each ASBR-PE as follows: make the ASBR-PE assign  
MPLS label when it advertises a route received from the PE in this AS to the  
ASBR-PE in the peer AS, and let the ASBR-PE assign a new MPLS label when it  
advertises a label-carried IPv4 route to the PE in this AS.  
Configure CE1  
[CE1] bgp 65001  
[CE1-bgp] group 20 external  
[CE1-bgp] peer 168.1.1.1 group 20 as-number 100  
[CE1-bgp] quit  
Configure PE1: set up EBGP peer relation with CE1, IBGP peer relation with  
ASBR-PE1, and Multihop MP-EBGP peer relation with PE2.  
[PE1] bgp 100  
[PE1-bgp] ipv4-family vpn-instance vpna  
[PE1-bgp-af-vpn-instance] group 10 external  
[PE1-bgp-af-vpn-instance] peer 168.1.1.2 group 10 as-number 65001  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] quit  
[PE1-bgp] group 20  
[PE1-bgp] peer 20 label-route-capability  
[PE1-bgp] peer 202.100.1.1 group 20  
[PE1-bgp] peer 202.100.1.1 connect-interface loopback0  
[PE1-bgp] group 30 external  
[PE1-bgp] peer 30 ebgp-max-hop  
[PE1-bgp] peer 200.200.1.2 group 30 as-number 200  
[PE1-bgp] peer 200.200.1.2 connect-interface loopback0  
[PE1-bgp] ipv4-family vpnv4  
[PE1-bgp-af-vpn] peer 30 enable  
[PE1-bgp-af-vpn] peer 200.200.1.2 group 30  
[PE1-bgp-af-vpn] quit  
[PE1-bgp] quit  
Configure ASBR-PE1: configure the route policy.  
[ASBR-PE1] acl number 2001  
[ASBR-PE1-acl-basic-2001] rule permit source 202.100.1.2 0  
[ASBR-PE1-acl-basic-2001] rule deny source any  
37-66  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[ASBR-PE1-acl-basic-2001] quit  
[ASBR-PE1] route-policy rtp-ebgp permit node 1  
[ASBR-PE1-route-policy] if-match acl 2001  
[ASBR-PE1-route-policy] apply mpls-label  
[ASBR-PE1-route-policy] quit  
[ASBR-PE1] route-policy rtp-ibgp permit node 10  
[ASBR-PE1-route-policy] if-match mpls-label  
[ASBR-PE1-route-policy] apply mpls-label  
[ASBR-PE1-route-policy] quit  
Configure ASBR-PE1: set up EBGP peer relation with ASBR-PE2, and IBGP peer  
relation with PE1.  
[ASBR-PE1] bgp 100  
[ASBR-PE1-bgp] import-route ospf  
[ASBR-PE1-bgp] group 10 external  
[ASBR-PE1-bgp] peer 10 label-route-capability  
[ASBR-PE1-bgp] peer 10 route-policy rtp-ebgp export  
[ASBR-PE1-bgp] peer 192.1.1.2 group 10 as-number 200  
[ASBR-PE1-bgp] group 20  
[ASBR-PE1-bgp] peer 20 label-route-capability  
[ASBR-PE1-bgp] peer 20 next-hop-local  
[ASBR-PE1-bgp] peer 20 route-policy rtp-ibgp export  
[ASBR-PE1-bgp] peer 202.100.1.2 group 20  
[ASBR-PE1-bgp] peer 202.100.1.2 connect-interface loopback0  
[ASBR-PE1-bgp] quit  
Configure CE2.  
[CE2] bgp 65002  
[CE2-bgp] group 10 external  
[CE2-bgp] peer 168.2.2.1 group 10 as-number 200  
[CE2-bgp] quit  
Configure PE2: set up EBGP peer relation with CE2, IBGP peer relation with  
ASBR-PE2, and Multihop MP-EBGP peer relation with PE1.  
[PE2] bgp 200  
[PE2-bgp] ipv4-family vpn-instance vpna  
[PE2-bgp-af-vpn-instance] group 10 external  
[PE2-bgp-af-vpn-instance] peer 168.2.2.2 group 10 as-number 65002  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] quit  
[PE2-bgp] group 20  
[PE2-bgp] peer 20 label-route-capability  
[PE2-bgp] peer 202.200.1.1 group 20  
[PE2-bgp] peer 202.200.1.1 connect-interface loopback0  
37-67  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-bgp] group 30 external  
[PE2-bgp] peer 30 ebgp-max-hop  
[PE2-bgp] peer 202.100.1.2 group 30 as-number 100  
[PE2-bgp] peer 202.100.1.2 connect-interface loopback0  
[PE2-bgp] ipv4-family vpnv4  
[PE2-bgp-af-vpn] peer 30 enable  
[PE2-bgp-af-vpn] peer 202.100.1.2 group 30  
[PE2-bgp-af-vpn] quit  
[PE2-bgp] quit  
Configure ASBR-PE2: configure the route policy.  
[ASBR-PE2] acl number 2001  
[ASBR-PE2-acl-basic-2001] rule permit source 200.200.1.2 0  
[ASBR-PE2-acl-basic-2001] rule deny source any  
[ASBR-PE2-acl-basic-2001] quit  
[ASBR-PE2] route-policy rtp-ebgp permit node 1  
[ASBR-PE2-route-policy] if-match acl 2001  
[ASBR-PE2-route-policy] apply mpls-label  
[ASBR-PE2-route-policy] quit  
[ASBR-PE2] route-policy rtp-ibgp permit node 10  
[ASBR-PE2-route-policy] if-match mpls-label  
[ASBR-PE2-route-policy] apply mpls-label  
[ASBR-PE2-route-policy] quit  
Configure ASBR-PE2: set up EBGP peer relation with ASBR-PE1, and IBGP peer  
relation with PE2.  
[ASBR-PE2] bgp 200  
[ASBR-PE2-bgp] import-route ospf  
[ASBR-PE2-bgp] group 10 external  
[ASBR-PE2-bgp] peer 10 label-route-capability  
[ASBR-PE2-bgp] peer 10 route-policy rtp-ebgp export  
[ASBR-PE2-bgp] peer 192.1.1.1 group 10 as-number 100  
[ASBR-PE2-bgp] group 20  
[ASBR-PE2-bgp] peer 20 label-route-capability  
[ASBR-PE2-bgp] peer 20 next-hop-local  
[ASBR-PE2-bgp] peer 20 route-policy rtp-ibgp export  
[ASBR-PE2-bgp] peer 202.200.1.2 group 20  
[ASBR-PE2-bgp] peer 202.200.1.2 connect-interface loopback0  
37.4.8 Hierarchical BGP/MPLS VPN Configuration Example  
I. Network requirements  
For those VPNs that have distinct hierarchy, an MPLS VPN covering a province and its  
cities, for example, incorporating the backbone network at the province level and the  
37-68  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
networks at the city level into a single MPLS VPN will impose a high requirement in  
performance on the equipment on the entire network, in the event that the network  
topology size is large. However, the requirement in equipment performance can  
become lower if this MPLS VPN is separated into two VPNs, the network at the  
province level and the network at the city level, for example.  
SPE acts as a PE on the network at the province level, and is connected with a  
downstream MPLS VPN at the city level. UPE acts as a PE on the network at the city  
level and provide access service for the VPN clients which are normally low-end  
routers.  
II. Network diagram  
PE  
PE  
PLS backbone  
Upper VPN  
VLAN201  
10.0.0.1/8  
Loopbac k0:10.0.0. 2  
SPE  
VLAN301  
10.0.0.2/8  
Loopbac k0:1.0.0.1  
UPE  
Lower VPN  
UPE  
VPN1 Site1  
VPN2 Site1  
VPN1 Site1  
VPN2 Site1  
CE  
CE  
CE  
CE  
Figure 37-15 Network diagram for hierarchical BGP/MPLS VPN  
III. Configuration procedure  
Note:  
This case only illustrates the configurations concerned with PEs in a hierarchical  
BGP/MPLS VPN.  
1) Configure SPE  
Configure the basic MPLS capability.  
[SPE] mpls lsr-id 1.0.0.2  
[SPE] mpls  
[SPE-mpls] quit  
37-69  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[SPE] mpls ldp  
Configure VPN-instance  
[SPE] ip vpn-instance vpn1  
[SPE-vpn-vpn1] route-distinguisher 100:1  
[SPE-vpn-vpn1] vpn-target 100:1 both  
Configure interfaces (So far as a PE router concerned, its LOOPBACK 0 interface must  
be assigned with a host address of 32-bit mask.  
[SPE] vlan 201  
[SPE-vlan201] port gigabitethernet 2/1/1  
[SPE-vlan201] quit  
[SPE] interface Vlan-interface 201  
[SPE-Vlan-interface201] ip address 10.0.0.1 255.0.0.0  
[SPE-Vlan-interface201] mpls  
[SPE-Vlan-interface201] mpls ldp enable  
[SPE-Vlan-interface201] quit  
[SPE] interface loopback0  
[SPE-LoopBack 0] ip address 1.0.0.2 255.255.255.255  
[SPE-LoopBack 0] quit  
Configure BGP  
[SPE] bgp 100  
[SPE] import direct  
[SPE-bgp] group 1 internal  
[SPE-bgp] peer 1.0.0.1 group 1  
[SPE-bgp] peer 1 connect-interface LoopBack0  
[SPE-bgp] ipv4-family vpn-instance vpn1  
[SPE--bgp-af-vpn-instance] import direct  
[SPE--bgp-af-vpn-instance] quit  
[SPE-bgp] ipv4-family vpnv4  
[SPE-bgp-af-vpn] peer 1 enable  
[SPE-bgp-af-vpn] peer 1.0.0.1 group 1  
[SPE-bgp-af-vpn] peer 1.0.0.1 upe  
[SPE-bgp-af-vpn] peer 1.0.0.1 default-route-advertise vpn-instance vpn1  
[SPE-bgp-af-vpn] quit  
[SPE-bgp] quit  
Configure OSPF  
[SPE] ospf  
[SPE] import-route direct  
[SPE-ospf-1] area 0  
[SPE-ospf-1-area-0.0.0.0] network 1.0.0.2 0.0.0.0  
[SPE-ospf-1-area-0.0.0.0] network 10.0.0.0 0.255.255.255  
2) Configure UPE  
37-70  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
Configure the basic MPLS capability.  
[UPE] mpls lsr-id 1.0.0.1  
[UPE] mpls  
[UPE-mpls] quit  
[UPE] mpls ldp  
Configure VPN-instance  
[UPE] ip vpn-instance vpn1  
[UPE-vpn-vpn1] route-distinguisher 100:1  
[UPE-vpn-vpn1] vpn-target 100:1 both  
Configure interfaces  
[UPE] vlan 301  
[UPE-vlan301] port gigabitethernet 2/2/1  
[UPE-vlan301] quit  
[UPE] interface Vlan-interface 301  
[UPE-Vlan-interface301] mpls  
[UPE-Vlan-interface301] mpls ldp enable  
[UE1-Vlan-interface301] mpls ldp transport-ip interface  
[UPE-Vlan-interface301] ip address 10.0.0.2 255.0.0.0  
[UPE-Vlan-interface301] quit  
[UPE] interface loopback0  
[UPE-LoopBack 0] ip address 1.0.0.1 255.255.255.255  
Configure BGP  
[UPE] bgp 100  
[UPE-bgp] group 1 internal  
[UPE-bgp] peer 1.0.0.2 group 1  
[UPE-bgp] ipv4-family vpn-instance vpn1  
[UPE--bgp-af-vpn-instance] import direct  
[UPE-bgp] ipv4-family vpnv4  
[UPE-bgp-af-vpn] peer 1 enable  
[UPE-bgp-af-vpn] peer 1.0.0.2 group 1  
Configure OSPF  
[UPE] ospf  
[UPE-ospf-1] import-route direct  
[UPE-ospf-1] area 0  
[UPE-ospf-1-area-0.0.0.0] network 1.0.0.1 0.0.0.0  
[UPE-ospf-1-area-0.0.0.0] network 10.0.0.2 0.255.255.255  
[UPE-ospf-1-area-0.0.0.0] quit  
37-71  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
37.4.9 OSPF Multi-instance sham link Configuration Example  
I. Network requirements  
As shown in the following picture, a company connects to a WAN through OSPF  
multi-instance function of a router. OSPF is bind to VPN1.MPLS VPN backbone runs  
between PEs and OSPF runs between PE and CE. Configure a sham link between  
PE1 and PE2 to ensure the traffic between CE1 and CE2 does not pass the backdoor  
link that directly connects CE1 and CE2.  
II. Network diagram  
LoopBack0: 1.1.1.1  
LoopBack0: 3.3.3.3  
PE3  
3.3.3.3  
LoopBack1:  
50.1.1.3  
CE1  
VLAN202  
168.1.13.1/24  
VLAN202  
168.1.13.2/24  
PE1 1.1.1.1  
VLAN201  
10.1.1.2/24  
10.10.10.10 VLAN201  
10.1.1.1/24  
LoopBack1:  
50.1.1.1  
VLAN203  
168.1.12.1/24  
VLAN202  
12.1.1.1/24  
VLAN201  
168.1.23.1/24  
MPLS VPN Backbone  
(168.1.1.0/24)  
sham link  
12.1.1.0/24  
(backdoor)  
VLAN202  
12.1.1.2/24  
VLAN203  
168.1.12.2/24  
VLAN202  
168.1.23.2/24  
20.2.1.0/24  
LoopBack1:50.1.1.2  
VLAN201  
20.1.1.2/24  
VLAN201  
20.1.1.1/24  
PE2  
CE2  
20.20.20.20  
2.2.2.2  
LoopBack0: 2.2.2.2  
Figure 37-16 Network diagram for OSPF multi-instance  
III. Configuration procedure  
1) Configure PE1  
Enable MPLS and LDP.  
[PE1] mpls lsr-id 50.1.1.1  
[PE1] mpls  
[PE1-mpls] quit  
[PE1] mpls ldp  
Configure VPN-instance.  
[PE1] ip vpn-instance vpn1  
[PE1-vpn-vpn1] route-distinguisher 2:1  
[PE1-vpn-vpn1] vpn-target 100:1 export-extcommunity  
[PE1-vpn-vpn1] vpn-target 100:1 import-extcommunity  
Configure VLAN interface.  
37-72  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1] vlan 203  
[PE1-vlan203] port gigabitethernet 2/1/3  
[PE1-vlan203] quit  
[PE1] interface Vlan-interface 203  
[PE1-Vlan-interface203] ip address 168.1.12.1 255.255.255.0  
[PE1-Vlan-interface203] mpls  
[PE1-Vlan-interface203] mpls ldp enable  
[PE1-Vlan-interface203] quit  
[PE1] vlan 201  
[PE1-vlan201] port gigabitethernet 2/1/1  
[PE1-vlan201] quit  
[PE1] interface Vlan-interface 201  
[PE1-Vlan-interface201] ip binding vpn-instance vpn1  
[PE1-Vlan-interface201] ip address 10.1.1.2 255.255.255.0  
[PE1-Vlan-interface201] ospf cost 1  
[PE1-Vlan-interface201] quit  
[PE1] vlan 202  
[PE1-vlan202] port gigabitethernet 2/1/2  
[PE1-vlan202] quit  
[PE1] interface Vlan-interface 202  
[PE1-Vlan-interface202] ip address 168.1.13.1 255.255.255.0  
[PE1-Vlan-interface202] ospf cost 1  
[PE1-Vlan-interface202] mpls  
[PE1-Vlan-interface202] mpls ldp enable  
[PE1-Vlan-interface202] mpls ldp transport-ip interface  
[PE1-Vlan-interface202] quit  
[PE1] interface loopback0  
[PE1-LoopBack0] ip binding vpn-instance vpn1  
[PE1-LoopBack0] ip address 1.1.1.1 255.255.255.255  
[PE1-LoopBack0] quit  
[PE1] interface loopback1  
[PE1-LoopBack1] ip address 50.1.1.1 255.255.255.255  
Configure BGP peer.  
[PE1] bgp 100  
[PE1-bgp] undo synchronization  
[PE1-bgp] group fc internal  
[PE1-bgp] peer 50.1.1.2 group fc  
[PE1-bgp] peer 50.1.1.2 connect-interface LoopBack1  
[PE1-bgp] peer 50.1.1.3 group fc  
Configure BGP and import OSPF routing and direct-connect route.  
[PE1-bgp] ipv4-family vpn-instance vpn1  
[PE1-bgp-af-vpn-instance] import-route ospf 100  
37-73  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE1-bgp-af-vpn-instance] import-route ospf-ase 100  
[PE1-bgp-af-vpn-instance] import-route ospf-nssa 100  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] undo synchronization  
Create and activate peer in MBGP.  
[PE1-bgp-af-vpn] ipv4-family vpnv4  
[PE1-bgp-af-vpn] peer fc enable  
[PE1-bgp-af-vpn] peer fc advertise-community  
[PE1-bgp-af-vpn] peer 50.1.1.2 group fc  
Bind OSPF process to VPN-instance.  
[PE1] ospf 100 router-id 1.1.1.1 vpn-instance vpn1  
[PE1-ospf-100] import-route bgp  
[PE1-ospf-100] area 0.0.0.0  
[PE1-ospf-100-area-0.0.0.0] network 10.1.1.0 0.0.0.255  
Configuring sham link  
[PE1-ospf-100-area-0.0.0.1] sham-link 1.1.1.1 2.2.2.2  
Configure the routes distributed to PE2 and PE3.  
[PE1] ospf 1000  
[PE1-ospf-1000] area 0  
[SW8800-ospf-1000-area-0.0.0.0] network 168.12.1.0 0.0.0.255  
[SW8800-ospf-1000-area-0.0.0.0] network 50.1.1.1 0.0.0.0  
2) Configure PE2  
Enable MPLS and LDP.  
[PE2] mpls lsr-id 50.1.1.2  
[PE2] mpls  
[PE2-mpls] quit  
[PE2] mpls ldp  
Configure vpn-instance vpn1.  
[PE2] ip vpn-instance vpn1  
[PE2-vpn-vpn1] route-distinguisher 2:1  
[PE2-vpn-vpn1] vpn-target 100:1 export-extcommunity  
[PE2-vpn-vpn1] vpn-target 100:1 import-extcommunity  
Configure VLAN interface.  
[PE2] vlan 203  
[PE2-vlan203] port gigabitethernet 2/1/3  
[PE2-vlan203] quit  
[PE2] interface Vlan-interface 203  
[PE2-Vlan-interface203] ip address 168.1.12.2 255.255.255.0  
[PE2-Vlan-interface203] mpls  
37-74  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-Vlan-interface203] mpls ldp enable  
[PE2-Vlan-interface203] quit  
[PE2] vlan 201  
[PE2-vlan201] port gigabitethernet 2/1/1  
[PE2-vlan201] quit  
[PE2] interface Vlan-interface 201  
[PE2-Vlan-interface201] ip binding vpn-instance vpn1  
[PE2-Vlan-interface201] ip address 20.1.1.2 255.255.255.0  
[PE2-Vlan-interface201] ospf cost 1  
[PE2-Vlan-interface201] quit  
[PE2] vlan 202  
[PE2-vlan202] port gigabitethernet 2/1/2  
[PE2-vlan202] quit  
[PE2] interface Vlan-interface 202  
[PE2-Vlan-interface202] ip address 168.1.23.2 255.255.255.0  
[PE2-Vlan-interface202] ospf cost 1  
[PE2-Vlan-interface202] mpls  
[PE2-Vlan-interface202] mpls ldp enable  
[PE2-Vlan-interface202] quit  
[PE2] interface LoopBack0  
[PE2-LoopBack0] ip binding vpn-instance vpn1  
[PE2-LoopBack0] ip address 2.2.2.2 255.255.255.255  
[PE2-LoopBack0] quit  
[PE2] interface LoopBack1  
[PE2-LoopBack1] ip address 50.1.1.2 255.255.255.255  
Configure BGP.  
[PE2] bgp 100  
[PE2-bgp] undo synchronization  
[PE2-bgp] group fc internal  
[PE2-bgp] peer 50.1.1.1 group fc  
[PE2-bgp] peer 50.1.1.1 connect-interface LoopBack1  
[PE2-bgp] peer 50.1.1.3 group fc  
Configure VPN-instance and import OSPF and direct-connect route.  
[PE2-bgp] ipv4-family vpn-instance vpn1  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] import-route ospf-nssa 100  
[PE2-bgp-af-vpn-instance] import-route ospf-ase 100  
[PE2-bgp-af-vpn-instance] import-route ospf 100  
[PE2-bgp-af-vpn-instance] undo synchronization  
Configure MBGP and enable peer.  
[PE2-bgp-af-vpn] ipv4-family vpnv4  
37-75  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-bgp-af-vpn] peer fc enable  
[PE2-bgp-af-vpn] peer fc advertise-community  
[PE2-bgp-af-vpn] peer 50.1.1.1 group fc  
Configure OSPF and import BGP and direct-connect route.  
[PE2] ospf 100 router-id 2.2.2.2 vpn-instance vpn1  
[PE2-ospf-100] import-route bgp  
[PE2-ospf-100] import-route static  
[PE2-ospf-100] area 0.0.0.0  
[PE2-ospf-100-area-0.0.0.0] network 20.1.1.0 0.0.0.255  
Configuring sham link  
[PE2-ospf-100-area-0.0.0.0] sham-link 2.2.2.2 1.1.1.1  
Configure static route to PE1 and PE3.  
[PE2] ip route-static 50.1.1.1 255.255.255.255 168.1.12.1  
[PE2] ip route-static 50.1.1.3 255.255.255.255 168.1.23.3  
Configure the routes distributed to PE1 and PE3.  
[PE1] ospf 1000  
[PE1-ospf-1000]area 0  
[SW8800-ospf-1000-area-0.0.0.0] network 168.12.1.0 0.0.0.255  
[SW8800-ospf-1000-area-0.0.0.0] network 50.1.1.1 0.0.0.0  
3) Configure CE1.  
Configure interfaces  
[CE1] vlan 202  
[CE1-vlan202] port gigabitethernet 2/1/2  
[CE1-vlan202] quit  
[CE1] interface Vlan-interface 202  
[CE1-Vlan-interface202] ip address 12.1.1.1 255.255.255.0  
[CE1-Vlan-interface202] ospf cost 100  
[CE1-Vlan-interface202] quit  
[CE1] vlan 201  
[CE1-vlan201] port gigabitethernet 2/1/1  
[CE1-vlan201] quit  
[CE1] interface Vlan-interface 201  
[CE1-Vlan-interface201] ip address 10.1.1.1 255.255.255.0  
[CE1-Vlan-interface201] ospf cost 1  
Configure OSPF.  
[CE1] ospf 100 router-id 10.10.10.129  
[CE1-ospf-100] import-route direct  
[CE1-ospf-100] area 0.0.0.0  
[CE1-ospf-100-area-0.0.0.0] network 10.1.1.0 0.0.0.255  
37-76  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[CE1-ospf-100-area-0.0.0.0] network 12.1.1.0 0.0.0.255  
4) Configure CE2  
Configure interface.  
[CE2] vlan 202  
[CE2-vlan202] port gigabitethernet 2/1/2  
[CE2-vlan202] quit  
[CE2] interface Vlan-interface 202  
[CE2-Vlan-interface202] ip address 12.1.1.2 255.255.255.0  
[CE2-Vlan-interface202] ospf cost 100  
[CE2-Vlan-interface202] quit  
[CE2] vlan 201  
[CE2-vlan201] port gigabitethernet 2/1/1  
[CE2-vlan201] quit  
[CE2] interface Vlan-interface 201  
[CE2-Vlan-interface201] ip address 20.1.1.1 255.255.255.0  
[CE2-Vlan-interface201] ospf cost 1  
Configure OSPF.  
[CE2] ospf 100 router-id 20.20.20.20  
[CE2-ospf-100] area 0.0.0.0  
[CE2-ospf-100-area-0.0.0.0] network 12.1.1.0 0.0.0.255  
[CE2-ospf-100-area-0.0.0.0] network 20.1.1.0 0.0.0.255  
37.4.10 Nested BGP/MPLS VPN Configuration Example  
I. Network requirements  
A VPN user has multiple nodes to access the service provider's BGP/MPLS backbone  
network. And this VPN is divided into three sub-VPNs: VPN1, VPN2 and VPN3.  
Some of the nodes of these sub-VPNs directly access a PE in the network, and some  
access a PE through the father VPN. That is, the adopted network structure is  
unsymmetrical.  
This example mainly describes the configuration of VPN1; the configuration of other  
sub-VPNs is similar.  
37-77  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
II. Network diagram  
CE5  
Pos1/1/0:  
18.1.1.2/8  
AS100  
VPN1  
AS50003  
prov_pe1  
5.5.5.5  
prov_pe2  
4.4.4.4  
CE6  
Pos2/1/0:  
18.1.1.1/8  
Pos1/1/0:  
10.1.1.1/8  
Pos1/1/0:  
10.1.1.2/8  
VPN2  
CE7  
Pos3/1/0:  
1.1.1.2/8  
Pos3/1/0:  
2.1.1.2/8  
VPN3  
Pos1/1/0:  
1.1.1.1/8  
Pos1/1/0:  
2.1.1.1/8  
cust_pe1  
6.6.6.6  
cust_pe2  
7.7.7.7  
AS600  
AS500  
Pos2/1/0:  
15.1.1.2/8  
Pos2/1/0:  
16.1.1.2/8  
Pos1/1/0:  
15.1.1.1/8  
Pos1/1/0:  
16.1.1.1/8  
CE3  
CE4  
CE2  
CE1  
VPN1  
AS50001  
VPN1  
AS50002  
VPN3  
VPN2  
Figure 37-17 Network diagram for nested VPN  
III. Configuration procedure  
Note:  
This procedure omits part of the configuration for CE router.  
1) Configure IGP on the service provider's backbone network.  
Configure prov_pe1  
<SW8800> system-view  
[SW8800] sysname prov_pe1  
[prov_pe1] interface LoopBack0  
[prov_pe1-LoopBack0] ip address 5.5.5.5 255.255.255.255  
[prov_pe1-LoopBack0] quit  
[prov_pe1] interface pos 1/1/0  
[prov_pe1-Pos1/1/0] link-protocol ppp  
[prov_pe1-Pos1/1/0] ip address 10.1.1.1 255.0.0.0  
[prov_pe1-Pos1/1/0] quit  
[prov_pe1] ospf  
[prov_pe1-ospf] area 0  
[prov_pe1-ospf-area-0.0.0.0] network 5.5.5.5 0.0.0.0  
37-78  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[prov_pe1-ospf-area-0.0.0.0] network 10.0.0.0 0.255.255.255  
Configure prov_pe2  
<SW8800> system-view  
[SW8800] sysname prov_pe2  
[prov_pe2] interface LoopBack0  
[prov_pe2-LoopBack0] ip address 4.4.4.4 255.255.255.255  
[prov_pe2-LoopBack0] quit  
[prov_pe2] interface pos 1/1/0  
[prov_pe2-Pos1/1/0] link-protocol ppp  
[prov_pe2-Pos1/1/0] ip address 10.1.1.2 255.0.0.0  
[prov_pe2] ospf  
[prov_pe2-ospf] area 0  
[prov_pe2-ospf-area-0.0.0.0] network 4.4.4.4 0.0.0.0  
[prov_pe2-ospf-area-0.0.0.0] network 10.0.0.0 0.255.255.255  
Configure basic MPLS capability and MPLS LDP on the backbone network.  
Configure prov_pe1  
[prov_pe1] mpls lsr-id 5.5.5.5  
[prov_pe1] mpls ldp  
[prov_pe1] interface pos 1/1/0  
[prov_pe1-Pos1/1/0] mpls  
[prov_pe1-Pos1/1/0] mpls ldp  
[prov_pe1-Pos1/1/0] quit  
Configure prov_pe2  
[prov_pe2] mpls lsr-id 4.4.4.4  
[prov_pe2] mpls ldp  
[prov_pe2] interface pos 1/1/0  
[prov_pe2-Pos1/1/0] mpls  
[prov_pe2-Pos1/1/0] mpls ldp  
[prov_pe2-Pos1/1/0] quit  
Configure IBGP between provider PEs.  
Configure prov_pe1  
[prov_pe1] bgp 100  
[prov_pe1-bgp] group ibgp internal  
[prov_pe1-bgp] peer 4.4.4.4 group ibgp  
[prov_pe1-bgp] peer 4.4.4.4 connect-interface LoopBack0  
[prov_pe1-bgp] ipv4-family vpnv4  
[prov_pe1-bgp-af-vpn] peer ibgp enable  
[prov_pe1-bgp-af-vpn] peer ibgp next-hop-local  
[prov_pe1-bgp-af-vpn] peer 4.4.4.4 group ibgp  
[prov_pe1-bgp-af-vpn] quit  
37-79  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[prov_pe1-bgp] quit  
Configure prov_pe2  
[prov_pe2] bgp 100  
[prov_pe2-bgp] group ibgp internal  
[prov_pe2-bgp] peer 5.5.5.5 group ibgp  
[prov_pe2-bgp] peer 5.5.5.5 connect-interface LoopBack0  
[prov_pe2-bgp] ipv4-family vpnv4  
[prov_pe2-bgp-af-vpn] peer ibgp enable  
[prov_pe2-bgp-af-vpn] peer ibgp next-hop-local  
[prov_pe2-bgp-af-vpn] peer 5.5.5.5 group ibgp  
[prov_pe2-bgp-af-vpn] quit  
[prov_pe2-bgp] quit  
2) Create a VPN instance on provider PEs to access customer PEs and directly  
connected user CEs.  
Configure prov_pe1  
[prov_pe1] ip vpn-instance customer_vpn  
[prov_pe1-vpn-instance] route-distinguisher 3:3  
[prov_pe1-vpn-instance] vpn-target 3:3  
[prov_pe1-vpn-instance] quit  
[prov_pe1] ip vpn-instance vpn1  
[prov_pe1-vpn-instance] route-distinguisher 1:1  
[prov_pe1-vpn-instance] vpn-target 1:1  
[prov_pe1-vpn-instance] vpn-target 3:3  
[prov_pe1-vpn-instance] quit  
[prov_pe1] interface pos 3/1/0  
[prov_pe1-Pos3/1/0] ip binding vpn-instance customer_vpn  
[prov_pe1-Pos3/1/0] link-protocol ppp  
[prov_pe1-Pos3/1/0] ip address 1.1.1.2 255.0.0.0  
[prov_pe1-Pos3/1/0] mpls  
[prov_pe1-Pos3/1/0] quit  
[prov_pe1] interface pos 2/1/0  
[prov_pe1-Pos2/1/0] ip binding vpn-instance vpn1  
[prov_pe1-Pos2/1/0] link-protocol ppp  
[prov_pe1-Pos2/1/0] ip address 18.1.1.1 255.0.0.0  
[prov_pe1-Pos2/1/0] quit  
Configure prov_pe2  
[prov_pe2] ip vpn-instance customer_vpn  
[prov_pe2-vpn-instance] route-distinguisher 3:3  
[prov_pe2-vpn-instance] vpn-target 3:3  
[prov_pe2-vpn-instance] quit  
[prov_pe2] interface pos 3/1/0  
37-80  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[prov_pe2-Pos3/1/0] ip binding vpn-instance customer_vpn  
[prov_pe2-Pos3/1/0] link-protocol ppp  
[prov_pe2-Pos3/1/0] ip address 2.1.1.2 255.0.0.0  
[prov_pe2-Pos3/1/0] mpls  
[prov_pe2-Pos3/1/0] quit  
Configure cust_pe1  
<SW8800> system-view  
[SW8800] sysname cust_pe1  
[cust_pe1] interface LoopBack0  
[cust_pe1-LoopBack0] ip address 6.6.6.6 255.255.255.255  
[cust_pe1-LoopBack0] quit  
[cust_pe1] mpls lsr-id 6.6.6.6  
[cust_pe1] interface pos 1/1/0  
[cust_pe1-Pos1/1/0] link-protocol ppp  
[cust_pe1-Pos1/1/0] ip address 1.1.1.1 255.0.0.0  
[cust_pe1-Pos1/1/0] mpls  
[cust_pe1-Pos1/1/0] quit  
Configure cust_pe2  
<SW8800> system-view  
[SW8800] sysname cust_pe2  
[cust_pe2] interface LoopBack0  
[cust_pe2-LoopBack0] ip address 7.7.7.7 255.255.255.255  
[cust_pe2-LoopBack0] quit  
[cust_pe2] mpls lsr-id 7.7.7.7  
[cust_pe2] interface pos 1/1/0  
[cust_pe2-Pos1/1/0] link-protocol ppp  
[cust_pe2-Pos1/1/0] ip address 2.1.1.1 255.0.0.0  
[cust_pe2-Pos1/1/0] mpls  
[cust_pe2-Pos1/1/0] quit  
3) Configure EBGP between provider PE and customer PE.  
Configure prov_pe1 to access the corresponding Customer PE.  
[prov_pe1] route-policy comm permit node 10  
[prov_pe1-route-policy-comm-10] if-match vpn-target 1:1  
[prov_pe1-route-policy-comm-10] quit  
[prov_pe1] bgp 100  
[prov_pe1-bgp] ipv4-family vpn-instance customer_vpn  
[prov_pe1-bgp-af-vpn-instance] group ebgp external  
[prov_pe1-bgp-af-vpn-instance] undo peer ebgp enable  
[prov_pe1-bgp-af-vpn-instance] peer 1.1.1.1 group ebgp as-number 600  
[prov_pe1-bgp] ipv4-family vpnv4  
[prov_pe1-bgp-af-vpn] nesting-vpn  
37-81  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[prov_pe1-bgp-af-vpn] peer ebgp vpn-instance customer_vpn enable  
[prov_pe1-bgp-af-vpn] peer 1.1.1.1 vpn-instance customer_vpn group ebgp  
[prov_pe1-bgp-af-vpn] peer 1.1.1.1 vpn-instance customer_vpn route-policy  
comm import  
[prov_pe1-bgp-af-vpn] quit  
Configure prov_pe1 to access CE5  
[prov_pe1-bgp] ipv4-family vpn-instance vpn1  
[prov_pe1-bgp-af-vpn-instance] group ebgp external  
[prov_pe1-bgp-af-vpn-instance] peer 18.1.1.2 group ebgp as-number 50003  
Configure prov_pe2 to access the corresponding Customer PE.  
[prov_pe2] route-policy com2 permit node 10  
[prov_pe2-route-policy-com2-10] if-match vpn-target 1:1  
[prov_pe2-route-policy-com2-10] quit  
[prov_pe2] bgp 100  
[prov_pe2-bgp] ipv4-family vpn-instance customer_vpn  
[prov_pe2-bgp-af-vpn-instance] group ebgp external  
[prov_pe2-bgp-af-vpn-instance] undo peer ebgp enable  
[prov_pe2-bgp-af-vpn-instance] peer 2.1.1.1 group ebgp as-number 500  
[prov_pe2-bgp] ipv4-family vpnv4  
[prov_pe2-bgp-af-vpn] nesting-vpn  
[prov_pe2-bgp-af-vpn] peer ebgp vpn-instance customer_vpn enable  
[prov_pe2-bgp-af-vpn] peer 2.1.1.1 vpn-instance customer_vpn group ebgp  
[prov_pe2-bgp-af-vpn] peer 2.1.1.1 vpn-instance customer_vpn route-policy  
com2 import  
Configure cust_pe1  
[cust_pe1] bgp 600  
[cust_pe1-bgp] group ebgp external  
[cust_pe1-bgp] undo peer ebgp enable  
[cust_pe1-bgp] peer 1.1.1.2 group ebgp as-number 100  
[cust_pe1-bgp] ipv4-family vpnv4  
[cust_pe1-bgp-af-vpn] peer ebgp enable  
[cust_pe1-bgp-af-vpn] peer 1.1.1.2 group ebgp  
Configure cust_pe2  
[cust_pe2] bgp 500  
[cust_pe2-bgp] group ebgp external  
[cust_pe2-bgp] undo peer ebgp enable  
[cust_pe2-bgp] peer 2.1.1.2 group ebgp as-number 100  
[cust_pe2-bgp] ipv4-family vpnv4  
[cust_pe2-bgp-af-vpn] peer ebgp enable  
[cust_pe2-bgp-af-vpn] peer 2.1.1.2 group ebgp  
37-82  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
4) On each Customer PE, configure the sub-VPN that accesses the network through  
the Customer PE.  
Configure cust_pe1  
[cust_pe1] ip vpn-instance vpn1  
[cust_pe1-vpn-instance] route-distinguisher 1:1  
[cust_pe1-vpn-instance] vpn-target 1:1  
[cust_pe1-vpn-instance] quit  
[cust_pe1] interface pos 2/1/0  
[cust_pe1-Pos2/1/0] ip binding vpn-instance vpn1  
[cust_pe1-Pos2/1/0] link-protocol ppp  
[cust_pe1-Pos2/1/0] ip address 15.1.1.2 255.0.0.0  
[cust_pe1-Pos2/1/0] quit  
[cust_pe1] bgp 600  
[cust_pe1-bgp] undo peer ebgp enable  
[cust_pe1-bgp] ipv4-family vpn-instance vpn1  
[cust_pe1-bgp-af-vpn-instance] group cegroup external  
[cust_pe1-bgp-af-vpn-instance] peer 15.1.1.1 group cegroup as-number 50001  
[cust_pe1-bgp-af-vpn-instance] quit  
[cust_pe1-bgp] quit  
Configure cust_pe2  
[cust_pe2] ip vpn-instance vpn1  
[cust_pe2-vpn-instance] route-distinguisher 1:1  
[cust_pe2-vpn-instance] vpn-target 1:1  
[cust_pe2] interface pos 2/1/0  
[cust_pe2-Pos2/1/0] ip binding vpn-instance vpn1  
[cust_pe2-Pos2/1/0] link-protocol ppp  
[cust_pe2-Pos2/1/0] ip address 16.1.1.2 255.0.0.0  
[cust_pe2-Pos2/1/0] quit  
[cust_pe2] bgp 500  
[cust_pe2-bgp] undo peer ebgp enable  
[cust_pe2-bgp] ipv4-family vpn-instance vpn1  
[cust_pe2-bgp-af-vpn-instance] group cegroup external  
[cust_pe2-bgp-af-vpn-instance] peer 16.1.1.1 group cegroup as-number 50002  
[cust_pe2-bgp-af-vpn-instance] quit  
[cust_pe2-bgp] quit  
37.4.11 OSPF Multi-instance CE Configuration Example  
I. Network requirements  
CE router in a VPN achieves service isolation by configuring multiple VPN instances.  
37-83  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
II. Network diagram  
vpn1  
VLAN202  
10.2.1.2/24  
ospf 100  
vpn1  
VLAN201  
10.1.1.2/24  
MP  
LS  
Netw  
ork  
PE  
vpn2  
VLAN204  
20.2.1.2/24  
VLAN203  
20.1.1.2/24  
ospf 300  
vpn2  
Multi-VPN-Instance CE  
Figure 37-18 Network diagram for OSPF multi-instance CE configuration  
III. Configuration procedure  
1) Configuring CE router  
Configure instance vpn1  
[CE] ip vpn-instance vpn1  
[CE-vpn-vpn1] route-distinguisher 100:1  
[CE-vpn-vpn1] vpn-target 100:1 export-extcommunity  
[CE-vpn-vpn1] vpn-target 100:1 import-extcommunity  
Configure instance vpn2  
[CE] ip vpn-instance vpn2  
[CE-vpn-vpn2] route-distinguisher 200:1  
[CE-vpn-vpn2] vpn-target 200:1 export-extcommunity  
[CE-vpn-vpn2] vpn-target 200:1 import-extcommunity  
Configure VLAN201  
[CE] vlan 201  
[CE-vlan201] port gigabitethernet 2/1/1  
[CE-vlan201] quit  
[CE] interface Vlan-interface 201  
[CE-Vlan-interface201] ip binding vpn-instance vpn1  
[CE-Vlan-interface201] ip address 10.1.1.2 255.255.255.0  
Configure VLAN202  
[CE] vlan 202  
[CE-vlan202] port gigabitethernet 2/1/2  
[CE-vlan202] quit  
[CE] interface Vlan-interface 202  
[CE-Vlan-interface202] ip binding vpn-instance vpn1  
[CE-Vlan-interface202] ip address 10.2.1.2 255.255.255.0  
[CE-Vlan-interface202] ospf cost 100  
Configure VLAN203  
37-84  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[CE] vlan 203  
[CE-vlan203] port gigabitethernet 2/1/3  
[CE-vlan203] quit  
[CE] interface Vlan-interface 203  
[CE-Vlan-interface203] ip binding vpn-instance vpn2  
[CE-Vlan-interface203] ip address 20.1.1.2 255.255.255.0  
Configure VLAN204  
[CE] vlan 204  
[CE-vlan204] port gigabitethernet 2/1/4  
[CE-vlan204] quit  
[CE] interface Vlan-interface 204  
[CE-Vlan-interface204] ip binding vpn-instance vpn2  
[CE-Vlan-interface204] ip address 20.2.1.2 255.255.255.0  
Configure ospf 100  
[CE] ospf 100 vpn-instance vpn1  
[CE-ospf-100] vpn-instance-capability simple  
[CE-ospf-100] area 0.0.0.0  
[CE-ospf-100-area-0.0.0.0] network 10.1.1.0 0.0.0.255  
[CE-ospf-100-area-0.0.0.0] network 10.2.1.0 0.0.0.255  
Configure ospf 300  
[CE] ospf 300 vpn-instance vpn2  
[CE-ospf-300] vpn-instance-capability simple  
[CE-ospf-300] area 0.0.0.1  
[CE-ospf-300-area-0.0.0.1] network 20.1.1.0 0.0.0.255  
[CE-ospf-300-area-0.0.0.1] network 20.2.1.0 0.0.0.255  
37.4.12 Multi-Role Host Configuration Example  
I. Network requirements  
CE1 and CE3 belong to VPN1, and CE2 belong to VPN2.  
The host PC2 with the IP address of 172.16.0.1 accesses the network through CE2. As  
a multi-role host, it can access both VPN1 and VPN2.  
37-85  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
II. Network diagram  
PC1  
172.18.0.1/16  
Ethernet2/1/0  
172.18.0.2/16  
AS65410  
CE1  
Ethernet1/1/0  
20.2.1.1/24  
AS100  
Loopback0:  
2.2.2.9/32  
Ethernet1/1/0  
Loopback0:  
1.1.1.9/32  
Ethernet3/1/0  
20.2.1.2/24  
Ethernet1/1/0  
192.168.1.1/24  
192.168.1.2/24  
PE2  
PE1  
Ethernet2/1/0  
20.3.1.2/24  
Ethernet2/1/0  
20.1.1.2/24  
Ethernet1/1/0  
20.3.1.1/24  
Ethernet1/1/0  
20.1.1.1/24  
CE2  
CE3  
Ethernet2/1/0  
172.16.0.2/16  
Ethernet2/1/0  
172.19.0.2/16  
AS65420  
AS65430  
PC2  
172.16.0.1/16  
PC3  
172.19.0.1/16  
Figure 37-19 Network diagram for multi-role host application  
III. Configuration procedure  
1) Configure OSPF as the IGP protocol on the MPLS backbone network.  
Configure OSPF on PE1:  
[PE1] interface loopback 0  
[PE1-LoopBack0] ip address 1.1.1.9 32  
[PE1-LoopBack0] quit  
[PE1] interface Ethernet1/1/0  
[PE1-Ethernet1/1/0] ip address 192.168.1.1 24  
[PE1-Ethernet1/1/0] quit  
[PE1] ospf  
[PE1-ospf-1] area 0  
[PE1-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255  
[PE1-ospf-1-area-0.0.0.0] network 1.1.1.9 0.0.0.0  
[PE1-ospf-1-area-0.0.0.0] quit  
[PE1-ospf-1] quit  
Configure OSPF on PE2:  
[PE2] interface loopback 0  
37-86  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-LoopBack0] ip address 2.2.2.9 32  
[PE2-LoopBack0] quit  
[PE2] interface Ethernet1/1/0  
[PE2-Ethernet1/1/0] ip address 192.168.1.2 24  
[PE2-Ethernet1/1/0] quit  
[PE2] ospf  
[PE2-ospf-1] area 0  
[PE2-ospf-1-area-0.0.0.0] network 192.168.1.0 0.0.0.255  
[PE2-ospf-1-area-0.0.0.0] network 2.2.2.9 0.0.0.0  
[PE2-ospf-1-area-0.0.0.0] quit  
[PE2-ospf-1] quit  
2) Configure basic MPLS capability and create VPN instances.  
Configure basic MPLS capability on PE1:  
[PE1] mpls lsr-id 1.1.1.9  
[PE1-mpls] lsp-trigger all  
[PE1-mpls] quit  
[PE1] mpls ldp  
[PE1-mpls-ldp] quit  
[PE1] interface Ethernet1/1/0  
[PE1-Ethernet1/1/0] mpls  
[PE1-Ethernet1/1/0] mpls ldp  
[PE1-Ethernet1/1/0] quit  
Create VPN instances for VPN1 and VPN2 on PE1, bind Ethernet3/1/0 to VPN1, and  
bind Ethernet2/1/0 to VPN2.  
[PE1] ip vpn-instance vpn1  
[PE1-vpn-vpn1] route-distinguisher 100:1  
[PE1-vpn-vpn1] vpn-target 100:1 both  
[PE1-vpn-vpn1] quit  
[PE1] ip vpn-instance vpn2  
[PE1-vpn-vpn2] route-distinguisher 100:2  
[PE1-vpn-vpn2] vpn-target 100:2 both  
[PE1-vpn-vpn2] quit  
[PE1] interface Ethernet3/1/0  
[PE1-Ethernet3/1/0] ip binding vpn-instance vpn1  
[PE1-Ethernet3/1/0] ip address 20.2.1.2 24  
[PE1-Ethernet3/1/0] quit  
[PE1] interface Ethernet2/1/0  
[PE1-Ethernet2/1/0] ip binding vpn-instance vpn2  
[PE1-Ethernet2/1/0] ip address 20.1.1.2 24  
[PE1-Ethernet2/1/0] quit  
Configure basic MPLS capability on PE2:  
37-87  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2] mpls lsr-id 2.2.2.9  
[PE2-mpls] lsp-trigger all  
[PE2-mpls] quit  
[PE2] mpls ldp  
[PE2-mpls-ldp] quit  
[PE2] interface Ethernet1/1/0  
[PE2-Ethernet1/1/0] mpls  
[PE2-Ethernet1/1/0] mpls ldp  
[PE2-Ethernet1/1/0] quit  
Create a VPN instance for VPN1 on PE2, and bind Ethernet2/1/0 to VPN1.  
[PE2] ip vpn-instance vpn1  
[PE2-vpn-vpn1] route-distinguisher 300:1  
[PE2-vpn-vpn1] vpn-target 100:1 both  
[PE2-vpn-vpn1] quit  
[PE2] interface Ethernet2/1/0  
[PE2-Ethernet2/1/0] ip binding vpn-instance vpn1  
[PE2-Ethernet2/1/0] ip address 20.3.1.2 24  
[PE2-Ethernet2/1/0] quit  
Configure BGP.  
Configure CE1:  
[CE1] interface Ethernet1/1/0  
[CE1-Ethernet1/1/0] ip address 20.2.1.1 24  
[CE1-Ethernet1/1/0] quit  
[CE1] bgp 65410  
[CE1-bgp] import-route direct  
[CE1-bgp] group 10 external  
[CE1-bgp] peer 20.2.1.2 group 10 as-number 100  
[CE1-bgp] quit  
Configure CE2:  
[CE2] interface Ethernet1/1/0  
[CE2-Ethernet1/1/0] ip address 20.1.1.1 24  
[CE2-Ethernet1/1/0] quit  
[CE2] bgp 65420  
[CE2-bgp] import-route direct  
[CE2-bgp] group 10 external  
[CE2-bgp] peer 20.1.1.2 group 10 as-number 100  
[CE2-bgp] quit  
Configure CE3:  
[CE3] interface Ethernet1/1/0  
[CE3-Ethernet1/1/0] ip address 20.3.1.1 24  
37-88  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[CE3-Ethernet1/1/0] quit  
[CE3] bgp 65430  
[CE3-bgp] import-route direct  
[CE3-bgp] group 10 external  
[CE3-bgp] peer 20.3.1.2 group 10 as-number 100  
[CE3-bgp] quit  
Configure PE1: set up IBGP peer relation with PE2 in BGP-VPNv4 sub-address family  
view; set up EBGP peer relation with CE2 in BGP-VPN instance view.  
[PE1] bgp 100  
[PE1-bgp] group 10  
[PE1-bgp] peer 2.2.2.9 group 10  
[PE1-bgp] peer 2.2.2.9 connect-interface loopback 0  
[PE1-bgp] ipv4-family vpnv4  
[PE1-bgp-af-vpn] peer 10 enable  
[PE1-bgp-af-vpn] peer 2.2.2.9 group 10  
[PE1-bgp-af-vpn] quit  
[PE1-bgp] ipv4-family vpn-instance vpn1  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] group 20 external  
[PE1-bgp-af-vpn-instance] peer 20.2.1.1 group 20 as-number 65410  
[PE1-bgp-af-vpn-instance] quit  
[PE1-bgp] ipv4-family vpn-instance vpn2  
[PE1-bgp-af-vpn-instance] import-route direct  
[PE1-bgp-af-vpn-instance] group 30 external  
[PE1-bgp-af-vpn-instance] peer 20.1.1.1 group 30 as-number 65420  
[PE1-bgp-af-vpn-instance] quit  
[PE1-bgp] quit  
Configure PE2: set up IBGP peer relation with PE1 in BGP-VPNv4 sub-address family  
view; set up EBGP peer relation with CE3 in BGP-VPN instance view.  
[PE2] bgp 100  
[PE2-bgp] group 10  
[PE2-bgp] peer 1.1.1.9 group 10  
[PE2-bgp] peer 1.1.1.9 connect-interface loopback 0  
[PE2-bgp] ipv4-family vpnv4  
[PE2-bgp-af-vpn] peer 10 enable  
[PE2-bgp-af-vpn] peer 1.1.1.9 group 10  
[PE2-bgp-af-vpn] quit  
[PE2-bgp] ipv4-family vpn-instance vpn1  
[PE2-bgp-af-vpn-instance] import-route direct  
[PE2-bgp-af-vpn-instance] group 20 external  
[PE2-bgp-af-vpn-instance] peer 20.3.1.1 group 20 as-number 65430  
[PE2-bgp-af-vpn-instance] quit  
37-89  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
[PE2-bgp] quit  
Configure multi-role host feature.  
Configure a default route pointing to PE1 on CE2.  
[CE2] ip route-static 0.0.0.0 0.0.0.0 20.1.1.2  
If routing protocol is used between CE2 and PE1, to avoid routing loop, disable PE1  
from advertising any route to CE2. In this example, no routing protocol is used between  
PE1 and CE2; so, a static route for PC2 is directly configured on PE1 (you can also  
adopt other similar configuration here).  
[PE1] ip route-static vpn-instance vpn2 172.16.0.0 16 20.1.1.1  
Import the route of VPN1 to VPN2 using the VPN Target attribute.  
[PE1] ip vpn-instance vpn2  
[PE1-vpn-vpn2] vpn-target 100:1 import-extcommunity  
37.5 Troubleshooting  
I. Symptom 1  
In central server topology networking mode, the local end switch (spoke PE) cannot  
learn the routing information of the peer end switch (spoke PE).  
Solution:  
z
z
Check whether the BGP adjacent of spoke PE and hub PE is created correctly.  
Check whether the routing attributes import/export relation of each VPN-instance  
is correct.  
z
Check from the hub PE that whether the routing information between two VPN  
instances can be learnt by each other. if not, perform the following operation:  
check if the EBGP protocol runs between hub PE and hub CE, check whether the  
peer peer-address allow-as-loop command is configured between PE and CE.  
II. Symptom 2  
PE at the local end can learn private network route of the PE at peer end, but two PEs  
cannot intercommunicate with each other.  
Solution:  
z
Check whether the loopback interface configured on the PE has the address with  
32-bit mask.  
z
z
Check whether the tag of private network route is correct.  
Check whether the LDP session is established using the display mpls ldp  
session command.  
z
Check whether the LSP tunnel is established using the display mpls lsp  
command.  
37-90  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 37 BGP/MPLS VPN Configuration  
III. Symptom 3  
In Hub&Spoke networking mode, spoke PE cannot learn the private networking route of  
Hub PE.  
Solution:  
z
Check whether the LSP tunnel is established using the display mpls lsp  
command.  
z
z
z
Check whether the BGP adjacent is established correctly.  
Check whether the routing import/export relation of the VPN-instance is correct.  
Check whether allow-as-loop is configured between spoke PE and hub PE.  
IV. Symptom 4  
Fall to specify the loopback interface at the peer end as the BGP neighbor.  
Solution:  
z
z
z
Check whether the local routing table has learnt the loopback interface routing  
information of the peer end using the display ip routing-table command.  
Check whether the address of the loopback interface at the peer end can be  
pinged using the ping command.  
Check whether the configuration information is correct using the display  
current-configuration bgp command; confirm that you have specified the local  
loopback interface as the interface to create adjacent interface with the peer end  
by using the peer peer-address connect-interface command; confirm that you  
have activate the neighbor in VPNv4 sub-address family view.  
z
Check whether the BGP information is correct on the PE at the peer end; check  
whether specified the local loopback interface as the interface to create adjacent  
with the peer end; and check whether you have configured VPN capacity.  
V. Symptom 5  
During ASBR configuration, VPN route interior label does not switch on the ASBR.  
Solution:  
z
z
Check whether the VPN neighbor is created correctly using the display bgp  
vpnv4 all peer command.  
Check whether ASBR is configured with the undo policy vpn-target command. If  
not, configure this command.  
37-91  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Chapter 38 MSTP Region-configuration  
38.1 Introduction to MSTP  
MSTP stands for Multiple Spanning Tree Protocol, which is compatible with Spanning  
Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP).  
STP is not fast in state transition. Even on a point-to-point link or a edge port, it has to  
take an interval twice as long as forward delay before the port transits to the forwarding  
state.  
RSTP converges fast, but has the following drawback like STP: all the network bridges  
in a LAN share one spanning tree and the redundant links cannot be blocked based on  
VLANs. Packets of all VLANs are forwarded along one spanning tree.  
MSTP makes up for the drawback of STP and RSTP. It not only converges fast, but also  
allows the traffic of different VLANs to be distributed along their respective paths, which  
provides a better load-balance mechanism for the redundant links.  
MSTP keeps a VLAN mapping table to associate VLANs with their spanning trees.  
Using MSTP, you can divide one switching network into multiple regions, each of which  
can have multiple spanning trees with each one independent of others. MSTP prunes  
the ring network into a loopfree tree to avoid the generation of loops and infinite  
circulations. It also provides multiple redundant paths for data forwarding to implement  
the load-balance mechanism of the VLAN data.  
38.1.1 MSTP Concepts  
There are 4 MST regions in Figure 38-1. Each region consists of four switches, all of  
which run MSTP. The following introduces the concept of MSTP with the help of this  
figure.  
38-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
CIST: common and  
internal spanning tree  
Area A0  
VLAN 1 mapped to Instance 1  
VLAN 2 mapped to Instance 2  
Other VLANs mapped to CIST  
MSTI: multiple spanning  
tree instance  
BPDU  
BPDU  
A
CST: common  
spanning tree  
B
C
D
Area D0  
BPDU  
VLAN 1 mapped to Instance  
1, domain root as B  
VLAN 2 mapped to Instance  
2, domain root as C  
Other VLANs mapped to  
CIST  
Area B0  
VLAN 1 mapped to Instance 1  
VLAN 2 mapped to Instance 2  
Other VLANs mapped to CIST  
Area C0  
VLAN 1 mapped to Instance 1  
VLANs 2 and 3 mapped to Instance 2  
Other VLANs mapped to CIST  
Figure 38-1 Basic MSTP concepts  
I. MST region  
Multiple Spanning Tree Regions: A multiple spanning tree region contains several  
switches and the network segments between them. These MSTP switches share the  
same region name, VLAN-spanning tree mapping configuration, and MSTP revision  
level configuration, and are connected directly. There can be several MST regions on a  
switching network. You can group several switches into a MST region, using MSTP  
configuration commands. For example, in Figure 38-1, the four switches in MST region  
A0 are configured with the same region name, the same VLAN mapping table (VLAN1  
is mapped to instance 1, VLAN 2 is mapped to instance 2, other VLANs is mapped to  
instance CIST), and the same revision level (not indicated in Figure 38-1).  
II. VLAN mapping table  
The VLAN mapping table is an attribute of MST region. It is used for describing the  
mapping relationship of VLANs and spanning tree instances (STIs). For example, in the  
VLAN mapping table of MST region A0 in Figure 38-1, VLAN1 is mapped to instance 1,  
VLAN 2 is mapped to instance 2, other VLANs is mapped to CIST.  
In the same region, the mapping relationship of VLANs and STIs must be consistent on  
all the switches in this region. Otherwise, VLAN and STI are not in the same region.  
III. IST  
Internal Spanning Tree (IST): a spanning tree in a MSTP region. The IST and the  
Common Spanning Tree (CST), together make up a Common and Internal Spanning  
Tree (CIST) for the entire switching network. The IST in a MST region is a fragment of  
the CIST. For example, every MST region in Figure 38-1 has an IST, which is a  
fragment of CIST.  
38-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
IV. CST  
Common Spanning Tree (CST): a LAN has only one CST. CST connects the spanning  
trees of all MST regions. Regard every MST region as a “switch”, and the CST is  
generated by the computing of “switches” through STP/RSTP. For example, the red line  
V. CIST  
Common and Internal Spanning Tree (CIST): A single spanning tree made up of ISTs  
and CST. It connects all switches in a switching network. CIST of Figure 38-1 is  
composed of ISTs in all MST regions and the CST.  
VI. MSTI  
Multiple Spanning Tree Instance (MSTI): multiple spanning trees can be generated with  
MSTP in an MST region and independent of one another. Such a spanning tree is  
called an MSTI. As shown is Figure 38-1, every MST region have many STIs. Each STI  
corresponds to a VLAN and is called a MSTI.  
VII. Region root  
The region root refers to the root of the IST and MSTI of the MST region. The spanning  
trees in an MST region have different topology and their region roots may also be  
different. For example, the region root of the STI 1 is the switch B and that of the STI 2  
is the switch C, as shown in Figure 38-1.  
VIII. Common Root Bridge  
The Common Root Bridge refers to the root bridge of CIST. For example, the common  
root bridge is a certain switch in A0, as shown in Figure 38-1.  
IX. Edge port  
The edge port refers to the port located at the MST region edge, connecting different  
MST regions, MST region and STP region, or MST region and RSTP region. For MSTP  
calculation, the edge port shall take the same role on MSTI and CIST instance. For  
example, as shown in Figure 38-1, if a switch in region A0 connects to the first port on a  
switch in region D0, and the common root bridge of the whole switching network is in  
A0, then this first port is an edge port of region D0.  
X. Port role  
In the process of MSTP calculation, a port can serve as a designated port, root port,  
master port, alternate port, or backup port.  
z
z
The root port is the one through which the data are forwarded to the root.  
The designated port is the one through which the data are forwarded to the  
downstream network segment or switch.  
38-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
z
z
Master port is the port connecting the entire region to the Common Root Bridge  
and located on the shortest path between them.  
An alternate port is a backup of the mater port, and also a backup port of a root  
port in the region. As a backup of the mater port, an alternate port will become a  
new master port after a master port is blocked.  
z
If two ports of a switch are connected, there must be a loop. In this case, the switch  
blocks one of them. The blocked one is called a backup port.  
A port can play different roles in different spanning tree instances.  
The following figure illustrates the earlier-mentioned concepts for your better  
understanding. In this figure, the switch A, B, C, and D make up a MST region. Port 1  
and 2 on switch A connects to the common root bridge; port 5 and 6 on switch C forms  
a loop; port 3 and 4 on switch D connects to other MST regions in the downstream  
direction.  
Connect to the root  
Edge port  
Port 2  
Port 1  
MST area  
Alternate port  
Master port  
A
B
C
Port 6  
Port 5  
D
Backup port  
Designated  
port  
Port 3  
Port 4  
Figure 38-2 Port roles  
XI. TC packet  
Topology change (TC) means the structure of the MSTP spanning tree changes due to  
some bridge change or some port change on the network. In versatile routing platform  
(VRP) implementation, when a port state changes from discarding to forwarding, it  
means TC occurs.  
The following section describes two kinds of STP packets:  
1) MSTP BPDU packet  
MSTP modules communicate with each other among bridges by MSTP BPDU packets.  
The following figure shows the MSTP BPDU packet format:  
38-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Figure 38-3 BPDU packet format  
Figure 38-4 MSTI information format of the last part in BPDU packets  
Besides field root bridge priority, root path cost, local bridge priority and port priority, the  
field flags which takes one byte in an instance is also used for role selection. The  
following figure describes the meaning of its eight bits:  
38-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
7
6
5
4
3
2
1
0
TcAck  
Agreement  
Forwarding  
Learning  
Proposal  
Tc  
Figure 38-5 Meaning of 1-byte Flags in BPDU packets  
The second and third bits together indicate MSTP port role.  
2) TC packet  
ATC packet is also an MSTP BPDU packet, but the lowest bit of its flags field is set to 1,  
which endows the TC packet with special meaning. So the TC packet has its special  
meaning. After receiving or detecting TC packets, a port will broadcast TC packets to  
tell the whole network the changed topology information at the fastest speed.  
38.1.2 MSTP Principles  
MSTP divides the entire Layer 2 network into several MST regions and calculates and  
generates CST for them. Multiple spanning trees are generated in a region and each of  
them is called an MSTI. The instance 0 is called IST, and others are called MSTI.  
Similar to RSTP, MSTP also use configuration messages to calculate and generate  
spanning trees, the difference is that it is the MSTP configuration information on the  
switches that is carried in the configuration messages.  
I. CIST calculation  
The CIST root is the highest-priority switch elected from the switches on the entire  
network through comparing their configuration BPDUs. MSTP calculates and  
generates IST in each MST region; at the same time it regards each MST region as a  
single "switch" and then calculates and generates the CST between the regions. The  
CST and ISTs together make up the CIST which connects all the switches in the whole  
switching network.  
II. MSTI calculation  
Inside an MST region, MSTP generates different MSTIs for different VLANs according  
to the association between VLAN and the spanning tree. The calculation process of  
MSTI is like that of RSTP.  
The following introduces the calculation process of one MSTI.  
The fundamental of STP is that the switches exchange a special kind of protocol packet  
(which is called configuration Bridge Protocol Data Units, or BPDU, in IEEE 802.1D) to  
decide the topology of the network. The configuration BPDU contains the information  
enough to ensure the switches to compute the spanning tree.  
Figure 38-6 shows the Designated bridge and designated port.  
38-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Switch A  
AP1  
AP2  
CP1  
BP1  
Switch C  
Switch B  
BP2  
CP2  
LAN  
Figure 38-6 Designated bridge and designated port  
For a switch, the designated bridge is a switch in charge of forwarding BPDU to the  
local switch via a port called the designated port accordingly. For a LAN, the designated  
bridge is a switch that is in charge of forwarding BPDU to the network segment via a  
port called the designated port accordingly. As illustrated in the Figure 38-6, Switch A  
forwards data to Switch B via the port AP1. To Switch B, the designated bridge is Switch  
A and the designated port is AP1. In the figure, Switch B and Switch C are connected to  
the LAN and Switch B forwards BPDU to LAN. So the designated bridge of LAN is  
Switch B and the designated port is BP2.  
z
The specific calculation process of STP algorithm.  
The following example illustrates the calculation process of STP.  
Figure 38-7 illustrates the practical network.  
Switch A  
with priority 0  
AP1  
AP2  
5
10  
BP1  
Switch B  
CP1  
with priority 1  
BP2  
4
CP2  
Switch C  
with priority 2  
Figure 38-7 Ethernet switch networking  
To facilitate the descriptions, only the first four parts of the configuration BPDU are  
described in the example. They are root ID (expressed as Ethernet switch priority), path  
cost to the root, designated bridge ID (expressed as Ethernet switch priority) and the  
designated port ID (expressed as the port number). As illustrated Figure 38-7, the  
38-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
priorities of Switch A, B and C are 0, 1 and 2 and the path costs of their links are 5, 10  
and 4 respectively.  
1) Initial state  
When initialized, each port of the switches generates the configuration BPDU taking  
itself as the root with a root path cost as 0, designated bridge IDs as their own switch  
IDs and the designated ports as their ports.  
Switch A:  
Configuration BPDU of AP1: {0, 0, 0, AP1}  
Configuration BPDU of AP2: {0, 0, 0, AP2}  
Switch B:  
Configuration BPDU of BP1: {1, 0, 1, BP1}  
Configuration BPDU of BP2: {1, 0, 1, BP2}  
Switch C:  
Configuration BPDU of CP2: {2, 0, 2, CP2}  
Configuration BPDU of CP1: {2, 0, 2, CP1}  
2) Select the optimum configuration BPDU  
Every switch transmits its configuration BPDU to others. When a port receives a  
configuration BPDU with a lower priority than that of its own, the switch discards the  
message and keep the local BPDU unchanged. When the port receives a  
higher-priority configuration BPDU, the switch uses the content in the received  
configuration BPDU to change the content of the local BPDU of this port. Then the  
switch compare the configuration BPDU of this port to those of other ports on it to elect  
the optimum configuration BPDU.  
The comparison rules are:  
z
z
The configuration BPDU with a smaller root ID has a higher priority.  
If the root IDs are the same, perform the comparison based on root path costs.  
The cost comparison is as follows: the path cost to the root recorded in the  
configuration BPDU plus the corresponding path cost of the local port is set as S,  
the configuration BPDU with a smaller S has a higher priority.  
z
If the costs of path to the root are also the same, compare in sequence the  
designated bridge ID, designated port ID and the ID of the port via which the  
configuration BPDU was received.  
For the convenience of expression, this example supposes that the optimum  
configuration BPDU can be elected just by the comparison of root IDs.  
3) Determine the root and designated ports, and update the configuration BPDU of  
designated ports.  
The port receiving the optimum configuration BPDU is designated to be the root port,  
whose configuration BPDU remains unchanged. Switch calculates a designated port  
38-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
BPDU for every port: substituting the root ID with the root ID in the configuration BPDU  
of the root port, the cost of path to root with the value made by the root path cost plus  
the path cost corresponding to the root port, the designated bridge ID with the local  
switch ID and the designated port ID with the local port ID.  
Switch compares the calculated BPDU with the BPDU of corresponding port. If the  
BPDU of corresponding port is better, the port is blocked, and the BPDU of the port  
remains unchanged. The port will not forward data and only receive but not send BPDU.  
If the calculated BPDU is better, the port will be the designated port, and the port BPDU  
will be modified by the calculated BPDU and sent out regularly.  
The comparison process of each switch is as follows.  
Switch A:  
AP1 receives the configuration BPDU from Switch B and finds out that the local  
configuration BPDU priority is higher than that of the received one, so it discards the  
received configuration BPDU. The configuration BPDU is processed on the AP2 in a  
similar way. Thus Switch A finds itself the root and designated bridge in the  
configuration BPDU of every port. It regards itself as the root, retains the configuration  
BPDU of each port and transmits configuration BPDU to others regularly thereafter. By  
now, the configuration BPDUs of the two ports are as follows:  
Configuration BPDU of AP1: {0, 0, 0, AP1}.  
Configuration BPDU of AP2: {0, 0, 0, AP2}.  
Switch B:  
BP1 receives the configuration BPDU from Switch A and finds that the received BPDU  
has a higher priority than the local one, so it updates its configuration BPDU.  
BP2 receives the configuration BPDU from Switch C and finds that the local BPDU  
priority is higher than that of the received one, so it discards the received BPDU.  
By now, the configuration BPDUs of each port are as follows: Configuration BPDU of  
BP1: {0, 0, 0, AP1}, Configuration BPDU of BP2: {1, 0, 1, BP2}.  
Switch B compares the configuration BPDUs of the ports and selects the BP1 BPDU as  
the optimum one because the current configuration BPDU {0, 5, 0, AP1} of BP1 has a  
higher priority than the configuration BPDU {1, 0, 1, BP2} of BP2. Thus BP1 is elected  
as the root port and the configuration BPDUs of Switch B ports are updated as follows.  
The configuration BPDU of the root port BP1 retains as {0, 5, 0, AP1}. BP2 updates root  
ID with that in the optimum configuration BPDU, the path cost to root with 5, sets the  
designated bridge as the local switch ID and the designated port ID as the local port ID.  
Thus, the configuration BPDU becomes {0, 5, 1, BP2}.  
Then, all the designated ports of Switch B transmit the configuration BPDUs regularly.  
Switch C:  
38-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
CP2 receives from the BP2 of Switch B the configuration BPDU {1, 0, 1, BP2} that has  
not been updated and then the updating process is launched. The configuration BPDU  
is updated as {1, 0, 1, BP2}.  
CP1 receives the configuration BPDU {0, 0, 0, AP2} from Switch A and Switch C  
launches the updating. The configuration BPDU is updated as {0, 0, 0, AP2}.  
Now, the configuration BPDU of CP1 is {0, 10, 0, AP2}, which has a higher priority than  
that of CP2.By comparison, CP1 configuration BPDU is elected as the optimum one.  
The CP1 is thus specified as the root port without modifying its configuration BPDU.  
However, CP2 will be blocked and its BPDU also remains unchanged, but it will not  
receive the data (excluding the STP packets) forwarded from Switch B until spanning  
tree calculation is launched again by some new events. For example, the link from  
Switch B to Switch C is down or the port receives any better configuration BPDU.  
CP2 will receive the updated configuration BPDU, {0, 5, 1, BP2}, from Switch B. Since  
this configuration BPDU is better then the old one, the old BPDU will be updated to {0,  
5, 1, BP2}.  
Meanwhile, CP1 receives the configuration BPDU from Switch A but its configuration  
BPDU is not updated and retain {0, 10, 0, AP2}.  
By comparison, {0, 9, 1, BP2}, the configuration BPDU of CP2, is elected as the  
optimum one. Thus, CP2 is elected as the root port, whose BPDU will not change, while  
CP1 is blocked, its BPDU is retained, and will not receive the data forwarded from  
Switch A until spanning tree calculation is triggered again by some changes. For  
example, the link from Switch B to Switch C is down or the port receives any better  
configuration BPDU  
Thus, the spanning tree is stabilized. The tree with the root bridge A is illustrated in the  
Switch A  
priority level as 0  
AP1  
5
BP1  
BP2  
4
Switch B  
priority level as 1  
CP2  
Switch C  
priority level as 2  
Figure 38-8 The final stabilized spanning tree  
To facilitate the descriptions, the description of the example is simplified. For example,  
the root ID and the Designated bridge ID in actual calculation should comprise both  
switch priority and switch MAC address. Designated port ID should comprise port  
priority and port ID. In the updating process of a configuration BPDU, other  
38-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
configuration BPDUs besides the first four items will make modifications according to  
certain rules. The basic calculation process is described below:  
In addition, with identical priority, the path cost of an aggregation port is smaller than  
that of a non-aggregation port. Therefore, under identical root ID, path cost value and  
designated switch ID, the switch will generally select the aggregation port as the root  
port.  
z
Configuration BPDU forwarding mechanism in STP:  
Upon the initiation of the network, all the switches regard themselves as the roots.The  
designated ports send the configuration BPDUs of local ports at a regular interval of  
HelloTime. If it is the root port that receives the configuration BPDU, the switch will  
enable a timer to time the configuration BPDU as well as increase MessageAge carried  
in the configuration BPDU by certain rules. If a path goes wrong, the root port on this  
path will not receive configuration BPDUs any more and the old configuration BPDUs  
will be discarded due to timeout. Hence, recalculation of the spanning tree will be  
initiated to generate a new path to replace the failed one and thus restore the network  
connectivity.  
However, the new configuration BPDU as now recalculated will not be propagated  
throughout the network right away, so the old root ports and designated ports that have  
not detected the topology change will still forward the data through the old path. If the  
new root port and designated port begin to forward data immediately after they are  
elected, an occasional loop may still occur. In STP, a transitional state mechanism is  
thus adopted to ensure the new configuration BPDU has been propagated throughout  
the network before the root port and designated port begin to send data again. That is,  
the root port and designated port should undergo a transitional state for a period of  
Forward Delay before they enter the forwarding state.  
And thus, the packets of a VLAN will be forwarded along the following path: in the MST  
region, the packets will be forwarded along the corresponding MSTI; among the  
regions, the packets will be forwarded along the CST.  
38.1.3 MSTP Implementation on the Switch  
MSTP is compatible with STP and RSTP. The MSTP switch can recognize both the  
STP and RSTP packets and calculate the spanning tree with them. Besides the basic  
MSTP functions, the Switch 8800 also provides some features that are easy to manage  
from users’ point of view. These features include root bridge hold, secondary root  
bridge, ROOT protection, BPDU protection, loop protection, hot swapping of the  
interface boards, master/slave switchover, and so on. Note that the spanning tree  
needs to be calculated again when a master/slave switchover occurs.  
38-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
38.2 Configuring MSTP  
MSTP configuration includes:  
z
z
z
z
z
z
z
z
38-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Setting the Timeout Factor of a Specific Bridge  
z
z
z
z
z
z
z
z
z
z
z
Only after MSTP is enabled on the device will other configurations take effect. Before  
enabling MSTP, you can configure the related parameters of the device and Ethernet  
ports, which will take effect upon enabling MSTP and stay effective even after resetting  
MSTP. The check region-configuration command can display the region parameters  
that have not yet taken effect. The display current-configuration command shows  
the parameters configured before MSTP is enabled. For those configured after MSTP  
is enabled, you can use the related display commands. For detailed information, refer  
to the “Display and Debug MSTP” section.  
Note:  
When GVRP and MSTP start on the switch simultaneously, GVRP packets will  
propagate along CIST which is a spanning tree instance. In this case, if you want to  
issue a certain VLAN through GVRP on the network, you should make sure that the  
VLAN is mapped to CIST when configuring the VLAN mapping table of MSTP.  
CIST is spanning tree instance 0.  
38.2.1 Configuring the MST Region for a Switch  
Which MST region a switch belongs to is determined with the configurations of the  
region name, VLAN mapping table, and MSTP revision level. You can perform the  
following configurations to put a switch into an MST region.  
I. Entering MST region view  
Perform the following configuration in system view.  
38-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Table 38-1 Enter MST region view  
Operation  
Command  
Enter MST region view (from system view)  
Restore the default settings of MST region  
stp region-configuration  
undo stp region-configuration  
II. Configuring parameters for the MST region  
Perform the following configuration in MST region view.  
Table 38-2 Configure the MST region for a switch  
Operation  
Command  
region-name name  
Restore the default MST region name undo region-name  
Configure the MST region name  
Configure VLAN mapping table  
instance instance-id vlan vlan-list  
Restore the default VLAN mapping  
table  
undo instance instance-id [ vlan vlan-list ]  
revision-level level  
Configure the MSTP revision level of  
MST region  
Restore the MSTP revision level of  
MST region  
undo revision-level  
An MST region can contain up to 49 spanning tree instances, among which the  
Instance 0 is IST and the Instances 1 through 48 are MSTIs. Upon the completion of the  
above configurations, the current switch is put into a specified MST region. Note that  
two switches belong to the same MST region only if they have been configured with the  
same MST region name, STI-VLAN mapping tables of an MST region, and the same  
MST region revision level.  
Configuring the related parameters, especially the VLAN mapping table, of the MST  
region, will lead to the recalculation of spanning tree and network topology flapping. To  
bate such flapping, MSTP triggers to recalculate the spanning tree according to the  
configurations only if one of the following conditions is met:  
z
A user manually activates the configured parameters related to the MST region,  
using the active region-configuration command.  
z
A user enables MSTP using the stp enable command.  
By default, the MST region name is the switch MAC address, all the VLANs in the MST  
region are mapped to the STI 0, and the MSTP region revision level is 0. You can  
restore the default settings of MST region, using the undo stp region-configuration  
command in system view.  
38-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
III. Activating the MST region configuration,and exit the MST region view  
Perform the following configuration in MST region view.  
Table 38-3 Activate the MST region configuration and exit the MST region view  
Operation  
Command  
Show the configuration information of the MST check  
region under revision  
region-configuration  
active  
region-configuration  
Manually activate the MST region configuration  
Exit MST region view  
quit  
38.2.2 Specifying the Switch as a Primary or a Secondary Root bridge  
MSTP can determine the spanning tree root through calculation. You can also specify  
the current switch as the root, using the command provided by the switch.  
You can use the following commands to specify the current switch as the primary or  
secondary root of the spanning tree.  
Perform the following configuration in system view.  
Table 38-4 Specify the switch as a primary or a secondary root bridge  
Operation  
Command  
Specify the current switch as the primary stp  
[
instance instance-id ] root  
root bridge of the specified spanning primary [ bridge-diameter bridgenum ]  
tree  
[ hello-time centi-senconds ]  
stp instance instance-id ] root  
[
Specify the current switch as the  
secondary root bridge of the specified  
spanning tree  
secondary  
bridgenum  
[
]
bridge-diameter  
[ hello-time  
centi-senconds ]  
Specify current switch not to be the  
primary or secondary root  
undo stp [ instance instance-id ] root  
After a switch is configured as the primary root bridge or the secondary root bridge,  
users cannot modify the bridge priority of the switch.  
You can configure the current switch as the primary or secondary root bridge of the STI  
(specified by the instance instance-id parameter). If the instance-id takes 0, the current  
switch is specified as the primary or secondary root bridge of the CIST.  
The root types of a switch in different STIs are independent of one another. The switch  
can be a primary or secondary root of any STI. However, it cannot serve as both the  
primary and secondary roots of one STI.  
38-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
If the primary root is down or powered off, the secondary root will take its place, unless  
you configure a new primary root. Of two or more configured secondary root bridges,  
MSTP selects the one with the smallest MAC address to take the place of the failed  
primary root.  
When configuring the primary and secondary switches, you can also configure the  
network diameter and hello time of the specified switching network. For detailed  
information, refer to the configuration tasks “Configure switching network diameter” and  
“Configure the Hello Time of the switch”.  
Note:  
You can configure the current switch as the root of several STIs. However, it is not  
necessary to specify two or more roots for an STI. In other words, do not specify the  
root for an STI on two or more switches.  
You can configure more than one secondary root for a spanning tree through specifying  
the secondary STI root on two or more switches.  
Generally, you are recommended to designate one primary root and more than one  
secondary root for a spanning tree.  
By default, a switch is neither the primary root nor the secondary root of the spanning  
tree.  
38.2.3 Configuring the MSTP Running Mode  
MSTP and RSTP are compatible and they can recognize the packets of each other.  
However, STP cannot recognize MSTP packets. To implement the compatibility, MSTP  
provides two operation modes, STP-compatible mode and MSTP mode. In  
STP-compatible mode, the switch sends STP packets via every port. In MSTP mode,  
the switch ports send MSTP or STP packets (when connected to the STP switch) and  
the switch provides multiple spanning tree function.  
You can use the following command to configure MSTP running mode. MSTP can  
intercommunicate with STP. If there is a STP switch in the switching network, you may  
use the command to configure the current MSTP to run in STP-compatible mode.  
Otherwise, configure it to run in MSTP mode.  
Perform the following configuration in system view.  
Table 38-5 Configure the MSTP running mode  
Operation  
Command  
stp mode stp  
stp mode mstp  
Configure MSTP to run in STP-compatible mode  
Configure MSTP to run in MSTP mode  
38-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Restore the default MSTP running mode  
undo stp mode  
Generally, if there is a STP switch on the switching network, the port connected to it will  
automatically transit from MSTP mode to STP-compatible mode. But the port cannot  
automatically transit back to MSTP mode after the STP switch is removed. In this case,  
you can execute the stp mcheck command to restore the MSTP mode.  
By default, MSTP runs in MSTP mode.  
38.2.4 Configuring the Bridge Priority for a Switch  
Whether a switch can be elected as the spanning tree root depends on its Bridge  
priority. The switch configured with a smaller Bridge priority is more likely to become the  
root. An MSTP switch may have different priorities in different STIs.  
You can use the following command to configure the Bridge priorities of the Designated  
bridge in different STIs.  
Perform the following configuration in system view.  
Table 38-6 Configure the Bridge priority for a switch  
Operation  
Command  
Configure the Bridge priority of the stp [ instance instance-id ] priority  
Designated bridge  
priority  
Restore the default Bridge priority of the undo stp [ instance instance-id ]  
Designated bridge  
priority  
When configuring the switch priority with the instance instance-id parameter as 0, you  
are configuring the CIST priority of the switch.  
Caution:  
In the process of spanning tree root election, of two or more switches with the same  
Bridge priorities, the one has a smaller MAC address is elected as the root.  
By default, the switch Bridge priority is 32768.  
38.2.5 Configuring the Max Hops in an MST Region  
The scale of MST region is limited by the max hops in an MST region, which is  
configured on the region root. As the BPDU travels from the spanning tree root, each  
time when it is forwarded by a switch, the max hops is reduced by 1. The switch  
38-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
discards the configuration BPDU with 0 hops left. This makes it impossible for the  
switch beyond the max hops to take part in the spanning tree calculation, thereby  
limiting the scale of the MST region.  
You can use the following command to configure the max hops in an MST region.  
Perform the following configuration in system view.  
Table 38-7 Configure the max hops in an MST region  
Operation  
Command  
stp max-hops hop  
Configure the max hops in an MST region  
Restore the default max hops in an MST region undo stp max-hops  
The more the hops in an MST region, the larger the scale of the region. Only the max  
hops configured on the region root can limit the scale of MST region. Other switches in  
the MST region also apply the configurations on the region root, even if they have been  
configured with max hops.  
By default, the max hop of an MST is 20.  
38.2.6 Configuring the Switching Network Diameter  
Any two hosts on the switching network are connected with a specific path carried by a  
series of switches. Among these paths, the one passing more switches than all others  
is the network diameter, expressed as the number of passed switches.  
You can use the following command to configure the diameter of the switching network.  
Perform the following configuration in system view.  
Table 38-8 Configure the switching network diameter  
Operation  
Command  
Configure the switching network diameter  
stp bridge-diameter bridgenum  
Restore the default switching network diameter undo stp bridge-diameter  
The network diameter is the parameter specifying the network scale. The larger the  
diameter is, the lager the scale of the network is.  
When a user configures the network diameter on a switch, MSTP automatically  
calculates and sets the hello time, forward-delay time and maximum-age time of the  
switch to the desirable values.  
Setting the network diameter takes effect on CIST only, but has no effect on MSTI.  
By default, the network diameter is 7 and the three corresponding timers take the  
default values.  
38-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Note:  
The stp bridge-diameter command configures the switching network diameter and  
determines the three MSTP time parameters (Hello Time, Forward Delay, and Max Age)  
accordingly.  
38.2.7 Configuring the Time Parameters of a Switch  
The switch has three time parameters, Forward Delay, Hello Time, and Max Age.  
Forward Delay is the switch state transition mechanism. The spanning tree will be  
recalculated upon link faults and its structure will change accordingly. However, the  
configuration BPDU recalculated cannot be immediately propagated throughout the  
network. The temporary loops may occur if the new root port and designated port  
forward data right after being elected. Therefore the protocol adopts a state transition  
mechanism. It takes a Forward Delay interval for the root port and designated port to  
transit from the learning state to forwarding state. The Forward Delay guarantees a  
period of time during which the new configuration BPDU can be propagated throughout  
the network.  
The switch sends Hello packet periodically at an interval specified by Hello Time to  
check if there is any link fault.  
Max Age specifies when the configuration BPDU will expire. The switch will discard the  
expired configuration BPDU.  
You can use the following command to configure the time parameters for the switch.  
Perform the following configuration in system view.  
Table 38-9 Configure the time parameters of a switch  
Operation  
Command  
Configure Forward Delay on the  
switch  
stp timer forward-delay centiseconds  
Restore the default Forward Delay of  
the switch  
undo stp timer forward-delay  
stp timer hello centiseconds  
undo stp timer hello  
Configure Hello Time on the switch  
Restore the default Hello Time on  
the switch  
Configure Max Age on the switch  
stp timer max-age centiseconds  
undo stp timer max-age  
Restore the default Max Age on the  
switch  
Every switch on the switching network adopts the values of the time parameters  
configured on the root bridge of the CIST.  
38-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Caution:  
The Forward Delay configured on a switch depends on the switching network diameter.  
Generally, the Forward Delay is supposed to be longer when the network diameter is  
longer. Note that too short a Forward Delay may redistribute some redundant routes  
temporarily, while too long a Forward Delay may prolong the network connection  
resuming. The default value is recommended.  
A suitable Hello Time ensures the switch to detect the link fault on the network but  
occupy moderate network resources. The default value is recommended. If you set too  
long a Hello Time, when there is packet dropped over a link, the switch may consider it  
as a link fault and the network device will recalculate the spanning tree accordingly.  
However, for too short a Hello Time, the switch frequently sends configuration BPDU,  
which adds its burden and wastes the network resources.  
Too short a Max Age may cause the network device frequently calculate the spanning  
tree and mistake the congestion as a link fault. However, if the Max Age is too long, the  
network device may not be able to discover the link fault and recalculate the spanning  
tree in time, which will weaken the auto-adaptation capacity of the network. The default  
value is recommended.  
To avoid frequent network flapping, the values of Hello Time, Forward Delay and  
Maximum Age should guarantee the following formulas.  
2 x (forward-delay – 1 second) >= maximum-age  
maximum-age >= 2 x (hello time + 1 second)  
You are recommended to use the stp root primary command to specify the network  
diameter and Hello Time of the switching network, and then MSTP will automatically  
calculate and give the rather desirable values.  
By default, Forward Delay is 15 seconds, Hello Time is 2 seconds, and Max Age is 20  
seconds.  
38-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
38.2.8 Setting the Timeout Factor of a Specific Bridge  
A switch transmits hello packet regularly to the adjacent bridges to check if there is link  
failure. Generally, if the switch does not receive the STP packets from the upstream  
switch for 3 times of hello time, the switch will decide the upstream switch is dead and  
will recalculate the topology of the network. Then, in a steady network, the recalculation  
may be caused when the upstream is busy. In this case, user can redefine the timeout  
interval to a longer time to avoid this kind of meaningless recalculation.  
You can use the following command to set the multiple value of hello time of a specified  
bridge.  
Perform the following configurations in system view.  
Table 38-10 Setting the timeout factor of a specific switch  
Operation  
Command  
stp timer-factor number  
undo stp timer-factor  
Set the timeout factor of a specified switch  
Restore the default timeout factor  
It is recommended to set 5, 6 or 7 as the timeout factor in the steady network.  
By default, the timeout factor of the switch is 3.  
38.2.9 Configuring the Max Transmission Speed on a Port  
The max transmission speed on a port specifies how many MSTP packets will be  
transmitted via the port every Hello Time.  
The max transmission speed on a port is limited by the physical state of the port and the  
network structure. You can configure it according to the network conditions.  
You can configure the max transmission speed on a port in the following ways.  
I. Configuration in system view  
Perform the following configuration in system view.  
Table 38-11 Configure the max transmission speed on a port  
Operation  
Command  
stp interface interface-list  
transmit-limit packetnum  
Configure the max transmission speed on a port  
Restore the default max transmission speed on a undo  
stp  
interface  
port interface-list transmit-limit  
38-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
II. Configuration in Ethernet port view  
Perform the following configuration in Ethernet port view.  
Table 38-12 Configure the max transmission speed on a port  
Operation  
Command  
Configure the max transmission speed on a port stp transmit-limit packetnum  
Restore the default max transmission speed on a  
port  
undo stp transmit-limit  
You can configure the max transmission speed on a port with either of the  
earlier-mentioned measures. For more about the commands, refer to the Command  
Manual.  
This parameter only takes a relative value without units. If it is set too large, too many  
packets will be transmitted during every Hello Time and too many network resources  
will be occupied. The default value is recommended.  
By default, the max transmission speed on every Ethernet port of the switch is 3.  
38.2.10 Configuring a Port as an Edge Port or Non-edge Port  
An edge port refers to the port not directly connected to any switch or indirectly  
connected to a switch over the connected network.  
You can configure a port as an edge port or non-edge port in the following ways.  
I. Configuration in system view  
Perform the following configuration in system view.  
Table 38-13 Configure a port as an edge port or a non-edge port  
Operation  
Command  
stp interface interface-list edged-port  
enable  
Configure a port as an edge port.  
stp interface interface-list edged-port  
disable  
Configure a port as a non-edge port.  
Restore the default setting of the port as undo stp interface interface-list  
a non-edge port.  
edged-port  
II. Configuration in Ethernet port view  
Perform the following configuration in Ethernet port view.  
38-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Table 38-14 Configure a port as an edge port or a non-edge port  
Operation  
Command  
stp edged-port enable  
stp edged-port disable  
Configure a port as an edge port.  
Configure a port as a non-edge port.  
Restore the default setting of the port as  
a non-edge port.  
undo stp edged-port  
You can configure a port as an edge port or a non-edge port with either of the  
earlier-mentioned measures.  
After configured as an edge port, the port can fast transit from blocking state to  
forwarding state without any delay. You can only set the port connecting with the  
terminal as an edge port.In the case that BPDU protection has not been enabled on the  
switch, the configured edge port will turn into a non-edge port again when it receives  
BPDU from other ports. In the case that BPDU protection is enabled, the port will be  
disabled. The configuration of this parameter takes effect on all the STIs. In other words,  
if a port is configured as an edge port or non-edge port, it is configured the same on all  
the STIs.  
It is better to configure the BPDU protection on the edged port, so as to prevent the  
switch from being attacked.  
Before BPDU protection is enabled on the switch, the port runs as a non-edge port  
when it receives BPDU, even if the user has set it as an edge port.  
If BPDU protection is enabled on the switch, the port is disabled. Only the network  
administrators can enable the port.  
By default, all the Ethernet ports of the switch have been configured as non-edge ports.  
Note:  
It is better to configure the port directly connected with the terminal as an edge port,  
and enable the BPDU function on the port. That is, to realize fast state-transition and  
prevent the switch from being attacked.  
38.2.11 Configuring the Path Cost of a Port  
Path Cost is related to the speed of the link connected to the port. On the MSTP switch,  
a port can be configured with different path costs for different STIs. Thus the traffic from  
different VLANs can run over different physical links, thereby implementing the  
VLAN-based load-balancing.  
You can configure the path cost of a port in the following ways.  
38-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
I. Configuration in system view  
Perform the following configuration in system view.  
Table 38-15 Configure the path cost of a port  
Operation  
Command  
stp interface interface-list [ instance  
instance-id ] cost cost  
Configure the path cost of a port.  
undo  
stp  
interface  
interface-list  
Restore the default path cost of a port.  
[ instance instance-id ] cost  
II. Configuration in Ethernet port view  
Perform the following configuration in Ethernet port view.  
Table 38-16 Configure the path cost of a port  
Operation  
Command  
Configure the path cost of a port  
stp [ instance instance-id ] cost cost  
undo stp [ instance instance-id ] cost  
Restore the default path cost of a port.  
You can configure the path cost of a port with either of the earlier-mentioned measures.  
Upon the change of path cost of a port, MSTP will recalculate the port role and transit  
the state. When instance-id takes 0, it indicates to set the path cost on the CIST.  
By default, MSTP is responsible for calculating the path cost of a port.  
38.2.12 STP Path Cost Calculation Standards on STP port  
The Switch 8800 uses its own legacy path calculation but both DOT1T and  
DOT1D-1998 path cost calculation can be used, as well. By default, the DOT1T is  
applied.  
The port rate must be obtained first before calculating the path cost of a port as the path  
cost is associated with the port rate. The three standards use their own way to work out  
the port rate, based on which each standard calculates the path cost of the by certain  
algorithm.  
I. DOT1T calculation standard  
1) Calculating the rate  
z
Aggregation port  
The rate of either a primary or a secondary port in an aggregation port group is the sum  
of the port rates in the group. If a port is down, the rate is 0.  
z
Non-aggregation port  
38-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
The actual rate counts.  
2) Calculating the path cost  
z
Full-duplex and non-aggregation port at a rate less than 1 GE  
Path cost = [200,000,000 / (rate × 10)] – 1  
z
Other ports  
Path cost = 200,000,000 / (rate × 10)  
II. DOT1D-1998 calculation standard  
1) Calculating the rate  
z
Aggregation port  
If the port is up, the actual rate counts. If the port is down, the rate is determined by that  
of the port which goes up first in the aggregation group. If all the ports in the  
aggregation group are down, the rate of the aggregation port is 0.  
z
Non-aggregation port  
The actual rate counts.  
2) Calculating the path cost  
Table 38-17 details the correspondence between the rate range and the path cost  
values of the ports.  
Table 38-17 Correspondence between the rate range and the path cost values  
Rate range  
Path cost value  
99 (for full-duplex port)  
[0, 10]  
95 (for aggregation port)  
100 (default)  
18 (for full-duplex port)  
15 (for aggregation port)  
19 (default)  
(10, 100]  
3 (for aggregation port)  
4 (default)  
(100,1000]  
2 (for aggregation port)  
1 (default)  
(1000,10000]  
> 10000  
1
III. The Switch 8800 legacy calculation standard  
1) Calculating the rate  
z
Aggregation port  
38-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
The rate of the primary port in an aggregation group is determined by the sum of the  
port rates in this group. No calculation is performed for secondary port.  
z
Non-aggregation port  
The actual rate counts, but the rate is 0 if the port is down.  
2) Calculating the path cost  
Table 38-18 details the correspondence between the rate range and the value range of  
the path cost of the ports.  
Table 38-18 Correspondence between the rate range and path cost range  
Rate range  
[0, 100]  
Path cost range  
2200 to (20 × rate)  
(100,1000]  
(1000,10000]  
> 10000  
220 to the integer of [(0.2 × rate)]  
22 to the integer of [(0.002 × rate)]  
1
You can specify the intended standard by using the following commands.  
Perform the following configuration in system view.  
Table 38-19 Specifying the standard to be followed in path cost calculation  
Operation  
Command  
Specify the standard to be adopted when the  
switch calculates the default path cost for the  
connected link  
stp  
pathcost-standard  
{ dot1d-1998 | dot1t legacy}  
Restore the default standard to be used  
undo stp pathcost-standard  
By default, the switch calculates the default path cost of a port by the DOT1T standard.  
38.2.13 Configuring the Priority of a Port  
For spanning tree calculation, the port priority is an importance factor to determine if a  
port can be elected as the root port. With other things being equal, the port with the  
highest priority will be elected as the root port. On the MSTP switch, a port can have  
different priorities in different STIs and plays different roles respectively. Thus the traffic  
from different VLANs can run over different physical links, thereby implementing the  
VLAN-based load-balancing.  
You can configure the port priority in the following ways.  
I. Configuration in system view  
Perform the following configuration in system view.  
38-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Table 38-20 Configure the port priority  
Operation  
Command  
Configure the port stp interface interface-list instance instance-id port  
priority.  
priority priority  
Restore the default undo stp interface interface-list instance instance-id  
port priority.  
port priority  
II. Configuration in Ethernet port view  
Perform the following configuration in Ethernet port view.  
Table 38-21 Configure the port priority  
Operation  
Command  
stp [ instance instance-id ] port priority priority  
Configure the port priority.  
Restore the default port priority. undo stp [ instance instance-id ] port priority  
You can configure the port priority with either of the earlier-mentioned measures. Upon  
the change of port priority, MSTP will recalculate the port role and transit the state.  
Generally, a smaller value represents a higher priority. If all the Ethernet ports of a  
switch are configured with the same priority value, the priorities of the ports will be  
differentiated by the index number. The change of Ethernet port priority will lead to  
spanning tree recalculation. You can configure the port priority according to actual  
networking requirements.  
By default, the priority of all the Ethernet ports is 128.  
38.2.14 Configuring the Port (Not) to Connect with the Point-to-Point Link  
The point-to-point link directly connects two switches.  
You can configure the port (not) to connect with the point-to-point link in the following  
ways.  
I. Configuration in system view  
Perform the following configuration in system view.  
Table 38-22 Configure the port (not) to connect with the point-to-point link  
Operation  
Command  
Configure the port to connect with the stp interface interface-list  
point-to-point link.  
point-to-point force-true  
Configure the port not to connect with the stp interface interface-list  
point-to-point link.  
point-to-point force-false  
38-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Operation  
Command  
Configure MSTP to automatically detect if the port stp interface interface-list  
is directly connected with the point-to-point link.  
point-to-point auto  
Configure MSTP to automatically detect if the port  
is directly connected with the point-to-point link,  
as defaulted.  
undo  
stp  
interface  
interface-list point-to-point  
II. Configuration in Ethernet port view  
Perform the following configuration in Ethernet port view.  
Table 38-23 Configure the port (not) to connect with the point-to-point link  
Operation  
Command  
point-to-point  
Configure the port to connect with the point-to-point stp  
link.  
force-true  
Configure the port not to connect with the stp  
point-to-point  
point-to-point link.  
force-false  
Configure MSTP to automatically detect if the port is  
directly connected with the point-to-point link.  
stp point-to-point auto  
Configure MSTP to automatically detect if the port is  
directly connected with the point-to-point link, as undo stp point-to-point  
defaulted.  
You can configure the port (not) to connect with the point-to-point link with either of the  
earlier-mentioned measures. For the ports connected with the point-to-point link, upon  
some port role conditions met, they can transit to forwarding state fast through  
transmitting synchronization packet, thereby reducing the unnecessary forwarding  
delay. If the parameter is configured as auto mode, MSTP will automatically detect if the  
current Ethernet port is connected with the point-to-point link.  
Note:  
For a link aggregation, only the master port can be configured to connect with the  
point-to-point link. If a port in auto-negotiation mode operates in full-duplex mode upon  
negotiation, it can be configured to connect with the point-to-point link.  
This configuration takes effect on the CIST and all the MSTIs. The settings of a port  
whether to connect the point-to-point link will be applied to all the STIs to which the port  
belongs. Note that a temporary loop may be redistributed if you configure a port that is  
not physically connected with the point-to-point link as connected to such a link by  
force.  
38-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
By default, the parameter is configured as auto.  
38.2.15 Configuring the mCheck Variable of a Port  
The port of an MSTP switch operates in either STP-compatible or MSTP mode.  
Suppose a port of an MSTP switch on a switching network is connected to an STP  
switch, the port will automatically transit to operate in STP-compatible mode. However,  
the port stays in STP-compatible mode and cannot automatically transit back to MSTP  
mode when the STP switch is removed. In this case, you can perform mCheck  
operation to transit the port to MSTP mode by force.  
You can use the following measure to perform mCheck operation on a port.  
I. Configuration in system view  
Perform the following configuration in system view.  
Table 38-24 Configure the mCheck variable of a port  
Operation  
Command  
Perform mCheck operation on a port.  
stp interface interface-list mcheck  
Note:  
By default, MSTP runs in MSTP mode, which is compatible with RSTP and STP (This  
mode can recognize MSTP BPDU, STP config BPDU and RSTP config BPDU).  
However, the STP switch can only recognize config BPDU (STP BPDU) sent by the  
STP and RSTP bridges. After the switch running STP-compatible mode switches back  
to MSTP mode, it will not send MSTP BPDU if you do not execute the stp mcheck  
command. Therefore, the connected device still sends config BPDU (STP BPDU) to it,  
causing the same configuration exists in different regions and other problems.  
Remember to perform stp interface mcheck after modifying stp mode.  
II. Configuration in Ethernet port view  
Perform the following configuration in Ethernet port view.  
Table 38-25 Configure the mCheck variable of a port  
Operation  
Command  
Perform mCheck operation on a port.  
stp mcheck  
38-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
You can configure mCheck variable on a port with either of the earlier-mentioned  
measures. Note that the command can be used only if the switch runs MSTP. The  
command does not make any sense when the switch runs in STP-compatible mode.  
38.2.16 Configuring the Switch Protection Function  
An MSTP switch provides BPDU protection, Root protection functions, loop protection  
and TC-protection.  
I. BPDU protection  
For an access device, the access port is generally directly connected to the user  
terminal (for example, PC) or a file server, and the access port is set to an edge port to  
implement fast transition. When such a port receives BPDU packet, the system will  
automatically set it as a non-edge port and recalculate the spanning tree, which causes  
the network topology flapping. In normal cases, these ports will not receive STP BPDU.  
If someone forges BPDU to attack the switch, the network will flap. BPDU protection  
function is used against such network attacks.  
II. Root protection  
The primary and secondary root bridges of the spanning tree, especially those of ICST,  
shall be located in the same region. It is because the primary and secondary roots of  
CIST are generally placed in the core region with a high bandwidth in network design.  
In case of configuration error or malicious attack, the legal primary root may receive the  
BPDU with a higher priority and then loose its place, which causes network topology  
change errors. Due to the illegal change, the traffic supposed to travel over the  
high-speed link may be pulled to the low-speed link and congestion will occur on the  
network. Root protection function is used against such problems.  
III. Loop protection  
The root port and other blocked ports maintain their states according to the BPDUs  
send by uplink switch. Once the link is blocked or has trouble, then the ports cannot  
receive BPDUs and the switch will select root port again. In this case, the former root  
port will turn into specified port and the former blocked ports will enter forwarding state,  
as a result, a link loop will be generated.  
After the loop protection is enabled, for the root port, its role will not change, but its state  
will change. For the blocked port, its role will change, but its state will maintain in  
discarding. The blocked port does not forward packets, thus avoiding link loop.  
38-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Note:  
For the loop protection-enabled port, if the port participates in STP calculation, all the  
instances of the port will be always set to be in discarding state regardless of the port  
role.  
IV. TC-protection  
As a general rule, the switch deletes the corresponding entries in the MAC address  
table and ARP table upon receiving TC-BPDU packets. Under malicious attacks of  
TC-BPDU packets, the switch shall receive a great number of TC-BPDU packets in a  
very short period. Too frequent delete operations shall consume huge switch resources  
and bring great risk to network stability.  
When the protection from TC-BPDU packet attack is enabled, the switch just perform  
one delete operation in a specified period (generally, 15 seconds) after receiving  
TC-BPDU packets, as well as monitoring whether it receives TC-BPDU packets during  
this period. Even if it detects a TC-BPDU packet is received in a period shorter than the  
specified interval, the switch shall not run the delete operation till the specified interval  
is reached. This can avoid frequent delete operations on the MAC address table and  
ARP table.  
You can use the following command to configure the protection functions of the switch.  
Perform the following configuration in corresponding configuration modes.  
Table 38-26 Configure the switch protection function  
Operation  
Command  
Configure BPDU protection of the switch (from  
system view)  
stp bpdu-protection  
Restore the disabled BPDU protection state as  
defaulted (from system view)  
undo stp bpdu-protection  
Configure Root protection of the switch (from stp interface interface-list  
system view)  
root-protection  
Restore the disabled Root protection state as undo  
stp  
interface  
defaulted (from system view)  
interface-list root-protection  
Configure Root protection of the switch (from  
Ethernet port view)  
stp root-protection  
Restore the disabled Root protection state as  
defaulted (from Ethernet port view)  
undo stp root-protection  
stp loop-protection  
stp loop-protection  
Configure loop protection function of the switch  
(from Ethernet port view)  
Restore the disabled loop protection state, as  
defaulted (from Ethernet port view)  
38-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Operation  
Command  
Configure TC protection of the switch (from  
system view)  
stp tc-protection enable  
stp tc-protection disable  
Disable TC protection (from system view)  
By default, only the protection from TC-BPDU packet attack is enabled on the switch.  
BPDU protection, Root protection and loop protection are disabled.  
After configured with BPDU protection, the switch will disable the edge port through  
MSTP which receives a BPDU, and notify the network manager at same time. These  
ports can be resumed by the network manager only.  
The port configured with Root protection only plays a role of designated port on every  
instance. Whenever such port receives a higher-priority BPDU, that is, it is about to turn  
into non-designated port, it will be set to listening state and not forward packets any  
more (as if the link to the port is disconnected). If the port has not received any  
higher-priority BPDU for a certain period of time thereafter, it will resume the normal  
state.  
For one port, only one configuration can be effective among loop protection, Root  
protection and Edge port configuration at the same moment.  
Note:  
The port configured with loop protection can only turn into discarding state on every  
instance. That such a port receives no configuration message for a long time indicates  
that it is about to change its state and role. Only the port role changes but the port  
discarding state remains unchanged, and no packets are forwarded. In this way, if the  
peer end cannot send BPDU packets due to error operation, and the port enters  
forwarding state directly for not receiving configuration message for a long time, no loop  
will be generated by enabling the loop protection.  
By default, the switch does not enable BPDU protection or Root protection.  
38.2.17 Enabling/Disabling MSTP on the Device  
You can use the following command to enable MSTP on the device.  
Perform the following configuration in system view.  
38-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Table 38-27 Enable/Disable MSTP on a device  
Operation  
Enable MSTP on a device.  
Command  
stp enable  
Disable MSTP on a device.  
stp disable  
undo stp  
Restore the disable state of MSTP, as defaulted.  
Only if MSTP has been enabled on the device will other MSTP configurations take  
effect. If MSTP is disabled on the device, MSTP cannot be enabled on a port.  
By default, MSTP is disabled.  
38.2.18 Enable/Disable Address Table Reset on Specified Port  
When a TC/TCN packet is received on a port, the system performs whole bridge  
traverse decision on the reset-arp enable/disable status. If reset-arp is enabled on the  
port, and the STP port is in active state, the system reset the MAC and dynamic ARP  
address tables on the port. In the case of TC/TCN entries of instance 0, the system  
removes the ARP entries of all instances. In the case of TC/TCN entries of other  
instances, the system removes the instance’s ARP entry.  
By default, this function is disabled.  
Perform the following configuration in Ethernet port view.  
Table 38-28 Enable/disable the reset of MAC and dynamic ARP address tables on a  
port  
Operation  
Command  
Enable/Disable the reset of MAC and dynamic stp reset-arp  
{
enable  
|
ARP address tables on a port of the device  
disable }  
By default, this function is disabled.  
38.2.19 Enabling/Disabling ARP Address Update  
ARP update is based on the following hypothesis: There are lots of bidirectional  
multicast and broadcast packets in the actual network. After the network topology  
changes, the MAC and ARP addresses may become invalid if the system does not  
delete ARP and MAC entries. However, if the peer sends a multicast or broadcast  
packet, the local port will learn ARP and MAC addresses. Then the system can find the  
corresponding ARP entries and update these entries according to the new port  
correspondence. This planning is also called: ARP address updates with MAC address.  
The stp update-arp command can be executed in the system view for the system to  
determine whether to adopt ARP address update flexibly. If ARP address update is  
38-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
disabled, upon receiving TC/TCN packets, the port broadcasts TC packets to delete the  
MAC address entries of the port in the STP active state on the bridge.  
Perform the following configuration in system view.  
Table 38-29 Enable/disable ARP address update  
Operation  
Command  
Enable/disable ARP address update  
stp update-arp { enable | disable }  
By default, ARP address update is enabled.  
Note:  
In general, the STP update-arp disable command works together with the stp  
reset-arp enable command in the port view. That is, the system removes MAC and  
ARP entries of the port after receiving TC/TCN packets.  
38.2.20 Enabling/Disabling MSTP on a Port  
You can use the following command to enable/disable MSTP on a port. You may  
disable MSTP on some Ethernet ports of a switch to spare them from spanning tree  
calculation. This is a measure to flexibly control MSTP operation and save the CPU  
resources of the switch.  
MSTP can be enabled/disabled on a port through the following ways.  
I. Configuration in system view  
Perform the following configuration in system view.  
Table 38-30 Enable/Disable MSTP on a port  
Operation  
Enable MSTP on a port.  
Disable MSTP on a port.  
Command  
stp interface interface-list enable  
stp interface interface-list disable  
II. Configuration in Ethernet port view  
Perform the following configuration in Ethernet port view.  
38-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Table 38-31 Enable/Disable MSTP on a port  
Operation  
Enable MSTP on a port.  
Disable MSTP on a port.  
Command  
stp enable  
stp disable  
You can enable/disable MSTP on a port with either of the earlier-mentioned measures.  
Note that redundant route may be generated after MSTP is disabled.  
By default, MSTP is enabled on all the ports after it is enabled on the device.  
38.3 Displaying and Debugging MSTP  
After the above configuration, execute the display command in any view to display the  
running of the MSTP configuration, and to verify the effect of the configuration. Execute  
the reset stp [ interface interface-list ] command in user view to clear the statistics of  
MSTP module. Execute the debugging command in user view to debug the MSTP  
module  
Table 38-32 Display and debug MSTP  
Operation  
Command  
Display the MSTP information about  
the current switch.  
display stp  
Display the configuration information display stp instance instance-id  
about the current port and the switch.  
[ interface interface-list ] [ brief ]  
Display the current configurations of  
the specified service board.  
display stp slot number [ brief ]  
Display the configuration information  
about the region.  
display stp region-configuration  
display stp tc [ instance instanceid ] { all  
| detected | received | sent }  
Display TC statistics  
Clear the MSTP statistics information.  
Enable event debugging of MSTP.  
Enable packet debugging of MSTP.  
reset stp [ interface interface-list ]  
debugging stp event  
debugging stp packet  
Enable/Disable  
receiving/transmitting, event, error)  
debugging on the port.  
MSTP  
(packet  
[ undo ] debugging stp [ interface  
interface-list ] { packet | event }  
Enable/Disable the global MSTP [ undo ] debugging stp { global-event |  
debugging.  
global-error | all }  
Enable/Disable  
debugging  
specified  
STI [ undo ] debugging stp instance  
instance-id  
38-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
Operation  
Command  
Enable STP global error or event debugging stp  
debugging global-event }  
{
global-error  
|
Disable STP global error or event undo debugging stp { global-error |  
debugging global-event }  
38.4 Typical MSTP Configuration Example  
I. Network requirements  
MSTP provides different forwarding paths for packets of different VLANs. The  
configurations are as follows: all the switches in the network belong to the same MST  
domain, packets of VLAN 10 travels along instance 1, packets of VLAN 30 travels along  
instance 3, packets of VLAN 40 travels along instance 4, and that of VLAN 20 travels  
along instance 0.  
In the following network diagram, Switch A and Switch B are devices of the  
convergence layer, Switch C and Switch D are devices of the access layer. VLAN 10  
and 30 function at the distribution and access layers, and VLAN 40 functions at the  
access layer only. So the root of instance 1 can be configured as Switch A, root of  
instance 3 can be Switch B, and root of instance 4 can be Switch C.  
II. Network diagram  
Permit :all VLAN  
Switch A  
Permit :  
Switch B  
Permit :  
VLAN 10, 20  
Permit :  
VLAN 10, 20  
VLAN 20, 30  
Permit :  
VLAN 20, 30  
Switch D  
Switch C  
Permit :VLAN 20, 40  
Figure 38-9 Network diagram for MSTP configuration  
Note:  
The explanations on the above figure which goes like “permit: XXXX” means that  
packets of these VLANs are permitted to pass.  
38-36  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 38 MSTP Region-configuration  
III. Configuration procedure  
1) Configurations on Switch A  
MST region  
[SW8800] stp region-configuration  
[SW8800-mst-region] region-name example  
[SW8800-mst-region] instance 1 vlan 10  
[SW8800-mst-region] instance 3 vlan 30  
[SW8800-mst-region] instance 4 vlan 40  
[SW8800-mst-region] revision-level 0  
Manually activate MST region configuration.  
[SW8800-mst-region] active region-configuration  
Specify Switch A as the root of instance 1  
[SW8800] stp instance 1 root primary  
2) Configurations on Switch B  
MST region.  
[SW8800] stp region-configuration  
[SW8800-mst-region] region-name example  
[SW8800-mst-region] instance 1 vlan 10  
[SW8800-mst-region] instance 3 vlan 30  
[SW8800-mst-region] instance 4 vlan 40  
[SW8800-mst-region] revision-level 0  
Manually activate MST region configuration.  
[SW8800-mst-region] active region-configuration  
Specify Switch B as the root of instance 3  
[SW8800] stp instance 3 root primary  
3) Configurations on Switch C  
MST region.  
[SW8800] stp region-configuration  
[SW8800-mst-region] region-name example  
[SW8800-mst-region] instance 1 vlan 10  
[SW8800-mst-region] instance 3 vlan 30  
[SW8800-mst-region] instance 4 vlan 40  
[SW8800-mst-region] revision-level 0  
Manually activate MST region configuration.  
[SW8800-mst-region] active region-configuration  
Specify Switch C as the root of instance 4.  
[SW8800] stp instance 4 root primary  
4) Configurations on Switch D  
38-37  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
MST region  
Chapter 38 MSTP Region-configuration  
[SW8800] stp region-configuration  
[SW8800-mst-region] region-name example  
[SW8800-mst-region] instance 1 vlan 10  
[SW8800-mst-region] instance 3 vlan 30  
[SW8800-mst-region] instance 4 vlan 40  
[SW8800-mst-region] revision-level 0  
Manually activate MST region configuration.  
[SW8800-mst-region] active region-configuration  
38-38  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
Chapter 39 802.1x Configuration  
39.1 802.1x Overview  
39.1.1 802.1x Standard Overview  
IEEE 802.1x (hereinafter simplified as 802.1x) is a port-based network access control  
protocol that is used as the standard for LAN user access authentication.  
In the LANs complying with the IEEE 802 standards, the user can access the devices  
and share the resources in the LAN through connecting the LAN access control device  
like the LAN Switch. However, in telecom access, commercial LAN (a typical example  
is the LAN in the office building) and mobile office etc., the LAN providers generally  
hope to control the user’s access. In these cases, the requirement on the  
above-mentioned “Port Based Network Access Control” originates.  
As the name implies, “Port Based Network Access Control” means to authenticate and  
control all the accessed devices on the port of LAN access control device. If the user’s  
device connected to the port can pass the authentication, the user can access the  
resources in the LAN. Otherwise, the user cannot access the resources in the LAN. It  
equals that the user is physically disconnected.  
802.1x defines port based network access control protocol and only defines the  
point-to-point connection between the access device and the access port. The port can  
be either physical or logical. The typical application environment is as follows: Each  
physical port of the LAN Switch only connects to one user workstation (based on the  
physical port) and the wireless LAN access environment defined by the IEEE 802.11  
standard (based on the logical port), etc.  
39.1.2 802.1x System Architecture  
The system using the 802.1x is the typical C/S (Client/Server) system architecture. It  
contains three entities, which are illustrated in the following figure: Supplicant System,  
Authenticator System and Authentication Sever System.  
The LAN access control device needs to provide the Authenticator System of 802.1x.  
The devices at the user side such as the computers need to be installed with the 802.1x  
client Supplicant software, for example, the 802.1x client provided by Microsoft  
Windows XP. The 802.1x Authentication Sever system normally stays in the carrier’s  
AAA center.  
Authenticator and Authentication Sever exchange information through EAP (Extensible  
Authentication Protocol) frames. The Supplicant and the Authenticator exchange  
information through the EAPoL (Extensible Authentication Protocol over LANs) frame  
defined by IEEE 802.1x. Authentication data are encapsulated in the EAP frame, which  
39-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
is to be encapsulated in the packets of other AAA upper layer protocols (e.g. RADIUS)  
so as to go through the complicated network to reach the Authentication Server. Such  
procedure is called EAP Relay.  
There are two types of ports for the Authenticator. One is the Uncontrolled Port, and the  
other is the Controlled Port. The Uncontrolled Port is always in bi-directional connection  
state. The user can access and share the network resources any time through the ports.  
The Controlled Port will be in connecting state only after the user passes the  
authentication. Then the user is allowed to access the network resources.  
Authenticator  
Authenticator System  
Supplicant  
System  
Server  
System  
Services  
offered  
by  
Authenticator  
PAE  
Authenticator  
Server  
Supplicant  
Authenticators  
System  
EAP protocol  
exchanges  
carried in  
Port  
unauthorized  
Uncontrolled  
Port  
higher layer  
protocol  
Controlled  
Port  
EAPoL  
LAN  
Figure 39-1 802.1x system architecture  
39.1.3 802.1x Authentication Process  
802.1x configures EAP frame to carry the authentication information. The Standard  
defines the following types of EAP frames:  
z
EAP-Packet: Authentication information frame, used to carry the authentication  
information.  
z
EAPoL-Start: Authentication originating frame, actively originated by the  
Supplicant.  
z
z
z
EAPoL-Logoff: Logoff request frame, actively terminating the authenticated state.  
EAPoL-Key: Key information frame, supporting to encrypt the EAP packets.  
EAPoL-Encapsulated-ASF-Alert: Supports the Alerting message of Alert Standard  
Forum (ASF).  
The EAPoL-Start, EAPoL-Logoff and EAPoL-Key only exist between the Supplicant  
and the Authenticator. The EAP-Packet information is re-encapsulated by the  
Authenticator System and then transmitted to the Authentication Server System. The  
EAPoL-Encapsulated-ASF-Alert is related to the network management information and  
terminated by the Authenticator.  
39-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
802.1x provides an implementation solution of user ID authentication. However, 802.1x  
itself is not enough to implement the scheme. The administrator of the access device  
should configure the AAA scheme by selecting RADIUS or local authentication so as to  
assist 802.1x to implement the user ID authentication. For detailed description of AAA,  
refer to the corresponding AAA configuration.  
39.1.4 Implementing 802.1x on Ethernet Switches  
The Switch 8800 not only supports the port access authentication method regulated by  
802.1x, but also extends and optimizes it in the following way:  
z
z
Support to connect several End Stations in the downstream via a physical port.  
The access control (or the user authentication method) can be based on port or  
MAC address.  
In this way, the system becomes much securer and easier to manage.  
39.2 802.1x Configuration  
The configuration tasks of 802.1x itself can be fulfilled in system view of the Ethernet  
switch. After the global 802.1x is enabled, the user can configure the 802.1x state of the  
port. The configured items will take effect after the global 802.1x is enabled.  
Note:  
When 802.1x is enabled on a port, the max number of MAC address learning which is  
configured by the command mac-address max-mac-count cannot be configured on  
the port, and vice versa.  
The following sections describe 802.1x configuration tasks.  
z
z
z
z
39-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
Checking the Users that Log on the Switch via Proxy  
z
z
z
z
z
z
39-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
Configuring 802.1x Timers  
z
Among the above tasks, the first one is compulsory, otherwise 802.1x will not take any  
effect. The other tasks are optional. You can perform the configurations at  
requirements.  
39.2.1 Enabling/Disabling 802.1x  
The following command can be used to enable/disable the 802.1x on the specified port  
or globally. When it is used in system view, if the parameter interface-list is not specified,  
802.1x will be globally enabled. If the parameter interface-list is specified, 802.1x will be  
enabled on the specified port. When this command is used in Ethernet port view, the  
parameter interface-list cannot be input and 802.1x can only be enabled on the current  
port.  
Perform the following configuration in system view or Ethernet port view.  
Table 39-1 Enable/Disable 802.1x  
Operation  
Enable the 802.1x  
Disable the 802.1x  
Command  
dot1x [ interface interface-list ]  
undo dot1x [ interface interface-list ]  
By default, 802.1x authentication has not been enabled globally and on any port.  
You cannot configure 802.1x on a port before you enable it globally. And you must  
disable 802.1x on each port before you disable 802,1x globally.  
39.2.2 Setting the Port Access Control Mode  
The following commands can be used for setting 802.1x access control mode on the  
specified port. When no port is specified, the access control mode of all ports is  
configured.  
Perform the following configuration in system view or Ethernet port view.  
Table 39-2 Set the port access control mode  
Operation  
Command  
dot1x port-control { authorized- force  
Set the port access control mode  
|
unauthorized-force  
|
auto  
}
[ interface interface-list ]  
Restore the default access control mode undo dot1x port-control [ interface  
of the port interface-list ]  
39-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
auto (automatic identification mode, which is also called protocol control mode). That is,  
the initial state of the port is unauthorized. It only permits EAPoL packets  
receiving/transmitting and does not permit the user to access the network resources. If  
the authentication flow is passed, the port will be switched to the authorized state and  
permit the user to access the network resources.  
The authorized-force keyword specifies the port to operate in authorized-force mode.  
Ports in this mode are always authorized. Users can access a network through this kind  
of port without being authorized.  
The unauthorized-force keyword specifies the port to operate in unauthorized-force  
mode. Ports in this mode are always unauthorized. They do not respond to  
authorization requests. Users cannot access a network through this kind of port.  
By default, the mode of 802.1x performing access control on the port is auto (automatic  
identification mode).  
39.2.3 Setting Port Access Control Method  
The following commands are used for setting 802.1x access control method on the  
specified port. When no port is specified in system view, the access control method of  
all ports is configured.  
Perform the following configuration in system view or Ethernet port view.  
Table 39-3 Set port access control method  
Operation  
Command  
dot1x port-method  
{
macbased  
|
Set port access control method  
portbased } [ interface interface-list ]  
Restore the default port access undo dot1x port-method [ interface  
control method interface-list ]  
The macbased keyword specifies to authenticate each user accessing through the  
port. And disconnection of a user does not affect other users. Whereas if you specify  
the portbased keyword, users can access a network without being authenticated if a  
user passes the authentication previously. But these users are denied when the one  
who passes the authentication first goes offline.  
By default, 802.1x authentication method on the port is macbased. That is,  
authentication is performed based on MAC addresses.  
39-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
39.2.4 Checking the Users that Log on the Switch via Proxy  
The following commands are used for checking the users that log on the switch via  
proxy.  
Perform the following configuration in system view or Ethernet port view.  
Table 39-4 Check the users that log on the switch via proxy  
Operation  
Command  
Enable the check for access users via dot1x supp-proxy-check { logoff |  
proxy trap } [ interface interface-list ]  
Cancel the check for access users via undo dot1x supp-proxy-check { logoff  
proxy | trap } [ interface interface-list ]  
These commands take effect on the ports specified by the interface-list parameter  
when executed in system view. The parameter interface-list cannot be input when the  
command is executed in Ethernet Port view and it has effect only on the current  
interface. After globally enabling proxy user detection and control in system view, only if  
you enable this feature on a specific port can this configuration take effects on the port.  
39.2.5 Setting Supplicant Number on a Port  
The following commands are used for setting number of users allowed by 802.1x on  
specified port. When no port is specified, all the ports accept the same number of  
supplicants.  
Perform the following configuration in system view or Ethernet port view.  
Table 39-5 Setting maximum number of users via specified port  
Operation  
Command  
Set maximum number of users via dot1x max-user user-number [ interface  
specified port interface-list ]  
Restore the maximum number of undo dot1x max-user  
users on the port to the default value interface-list ]  
[
interface  
By default, 802.1x allows up to 1024 supplicants on each port for the Switch 8800, and  
a Switch 8800 can accommodate a total of 2048 supplicants.  
39.2.6 Setting the Authentication in DHCP Environment  
If in DHCP environment the users configure static IP addresses, you can set 802.1x to  
disable the switch to trigger the user ID authentication over them with the following  
command.  
39-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
Perform the following configuration in system view.  
Table 39-6 Set the Authentication in DHCP Environment  
Operation  
Command  
Disable the switch to trigger the user ID  
authentication over the users who configure dot1x dhcp-launch  
static IP addresses in DHCP environment  
Enable the switch to trigger the authentication  
undo dot1x dhcp-launch  
over them  
By default, the switch can trigger the user ID authentication over the users who  
configure static IP addresses in DHCP environment.  
39.2.7 Configuring Authentication Method for 802.1x User  
The following commands can be used to configure the authentication method for  
802.1x user. Three kinds of methods are available: PAP authentication (RADIUS server  
must support PAP authentication), CHAP authentication (RADIUS server must support  
CHAP authentication), EAP relay authentication (switch send authentication  
information to RADIUS server in the form of EAP packets directly and RADIUS server  
must support EAP authentication).  
Perform the following configuration in system view.  
Table 39-7 Configure authentication method for 802.1x user  
Operation  
Command  
Configure authentication method for dot1x authentication-method { chap |  
802.1x user  
pap | eap md5-challenge}  
Restore the default authentication  
method for 802.1x user  
undo dot1x authentication-method  
By default, CHAP authentication is used for 802.1x user authentication.  
39.2.8 Enabling/Disabling Guest VLAN  
If Guest VLAN is enabled, a switch broadcasts active authentication packets to all  
802.1x-enabled ports. The ports not sending response packets are added to Guest  
VLAN when the maximum number of re-authentications is reached. Users in a Guest  
VLAN can utilize resources in the Guest VLAN without undergoing the 802.1x  
authentication, but they can utilize the resources outside the Guest VLAN only when  
they have passed the 802.1x authentication. In this way, unauthenticated users can still  
perform operations such as accessing some resources with the 802.1x client not  
installed, and upgrading 802.1x client.  
39-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
Perform the following configuration in system view or Ethernet interface view.  
Table 39-8 Enable/Disable Guest VLAN  
Operation  
Command  
guest-vlan vlan-id  
dot1x  
interface-list ]  
[
interface  
Enable Guest VLAN  
Disable Guest VLAN  
undo dot1x guest-vlan vlan-id [ interface  
interface-list ]  
Note that:  
z
Guest VLAN is only supported when the switch performs port-based  
authentication.  
z
z
A switch can have only one Guest VLAN.  
Users who are not authenticated, fail to be authenticated, or are offline are all  
members of the Guest VLAN.  
z
z
Guest VLANs can only be configured on access ports.  
You must use an existing VLAN ID, and the corresponding VLAN cannot be a  
super VLAN.  
z
You must perform corresponding configuration manually to isolate the Guest  
VLAN from other VLAN interfaces,.  
39.2.9 Setting the Maximum times of authentication request message  
retransmission  
The following commands are used for setting the maximum retransmission times of the  
authentication request message that the switch sends to the supplicant.  
Perform the following configuration in system view.  
Table 39-9 Set the maximum times of the authentication request message  
retransmission  
Operation  
Command  
Set the maximum times of the authentication  
request message retransmission  
dot1x retry max-retry-value  
Restore the default maximum retransmission  
times  
undo dot1x retry  
By default, the max-retry-value is 2. That is, the switch can retransmit the  
authentication request message to a supplicant for 2 times at most.  
39-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
39.2.10 Configuring 802.1x Timers  
The following commands are used for configuring the 802.1x timers.  
Perform the following configuration in system view.  
Table 39-10 Configure 802.1x timers  
Operation  
Command  
dot1x  
handshake-period-value  
quiet-period-value  
timer  
{
handshake-period  
quiet-period  
|
Configure timers  
|
tx-period tx-period-value  
|
supp-timeout supp-timeout-value | server-timeout  
server-timeout-value }  
Restore default settings undo dot1x timer { handshake-period | quiet-period |  
of the timers tx-period | supp-timeout | server-timeout }  
handshake-period: This timer begins after the user has passed the authentication.  
After setting handshake-period, system will send the handshake packet by the period.  
Suppose the dot1x retry time is configured as N, the system will consider the user  
having logged off and set the user as logoff state if system doesn’t receive the response  
from user for consecutive N times.  
handshake-period-value: Handshake period. The value ranges from 1 to 1024 in units  
of second and defaults to 30.  
quiet-period: Specifies the quiet timer. If an 802.1x user has not passed the  
authentication, the Authenticator will keep quiet for a while (which is specified by  
quiet-period timer) before launching the authentication again. During the quiet period,  
the Authenticator does not do anything related to 802.1x authentication.  
quiet-period-value: Specifies how long the quiet period is. The value ranges from 10 to  
120 in units of second and defaults to 60.  
server-timeout: Specifies the timeout timer of an Authentication Server. If an  
Authentication Server has not responded before the specified period expires, the  
Authenticator will resend the authentication request.  
server-timeout-value: Specifies how long the duration of a timeout timer of an  
Authentication Server is. The value ranges from 100 to 300 in units of second and  
defaults to 100 seconds.  
supp-timeout: Specifies the authentication timeout timer of a Supplicant. After the  
Authenticator sends Request/Challenge request packet which requests the MD5  
encrypted text, the supp-timeout timer of the Authenticator begins to run. If the  
Supplicant does not respond back successfully within the time range set by this timer,  
the Authenticator will resend the above packet.  
39-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
supp-timeout-value: Specifies how long the duration of an authentication timeout timer  
of a Supplicant is. The value ranges from 10 to 120 in units of second and defaults to  
30.  
tx-period: Specifies the transmission timeout timer. After the Authenticator sends the  
Request/Identity request packet which requests the user name or user name and  
password together, the tx-period timer of the Authenticator begins to run. If the  
Supplicant does not respond back with authentication reply packet successfully, then  
the Authenticator will resend the authentication request packet.  
tx-period-value: Specifies how long the duration of the transmission timeout timer is.  
The value ranges from 10 to 120 in units of second and defaults to 30.  
39.2.11 Enabling/Disabling quiet-period Timer  
You can use the following commands to enable/disable a quiet-period timer of an  
Authenticator (such as a Switch 8800). If an 802.1x user has not passed the  
authentication, the Authenticator will keep quiet for a while (which is specified by dot1x  
timer quiet-period command) before launching the authentication again. During the  
quiet period, the Authenticator does not do anything related to 802.1x authentication.  
Perform the following configuration in system view.  
Table 39-11 Enable/Disable a quiet-period timer  
Operation  
Command  
dot1x quiet-period  
undo dot1x quiet-period  
Enable a quiet-period timer  
Disable a quiet-period timer  
By default, quiet-period timer is disabled.  
39.3 Displaying and Debugging 802.1x  
After the above configuration, execute display dot1x command in any view to display  
the running of the 802.1x configuration, and to verify the effect of the configuration.  
Execute reset dot1x statistics command in user view to reset 802.1x statistics.  
Execute debugging command in user view to debug 802.1x.  
Table 39-12 Display and debug 802.1x  
Operation  
Command  
display dot1x [ sessions | statistics |  
Display the configuration, running and  
statistics information of 802.1x  
enabled-interface  
]
[
interface  
interface-list ]  
reset dot1x statistics [ interface  
interface-list ]  
Reset the 802.1x statistics information  
39-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
Enable  
debugging of 802.1x  
the  
error/event/packet/all debugging dot1x { error | event |  
packet | all }  
Disable the error/event/packet/all undo debugging dot1x { error | event |  
debugging of 802.1x.  
packet | all }  
39.4 802.1x Configuration Example  
I. Network requirements  
As shown in Figure 39-2, the workstation of a user is connected to the port Ethernet  
3/1/1 of the Switch.  
The switch administrator will enable 802.1x on all the ports to authenticate the  
supplicants so as to control their access to the Internet. The access control mode is  
configured as based on the MAC address  
All the supplicants belong to the default domain 3Com163.net, which can contain up to  
30 users. RADIUS authentication is performed first. If there is no response from the  
RADIUS server, local authentication will be performed. For accounting, if the RADIUS  
server fails to account, the user will be disconnected. In addition, when the user is  
accessed, the domain name does not follow the user name. Normally, if the user’s  
traffic is less than 2000 Byte/s consistently over 20 minutes, he will be disconnected.  
A server group, consisting of two RADIUS servers at 10.11.1.1 and 10.11.1.2  
respectively, is connected to the switch. The former one acts as the  
primary-authentication/secondary-accounting server. The latter one acts as the  
secondary-authentication/primary-accounting server. Set the encryption key as “name”  
when the system exchanges packets with the authentication RADIUS server and  
“money” when the system exchanges packets with the accounting RADIUS server.  
Configure the system to retransmit packets to the RADIUS server if no response  
received in 5 seconds. Retransmit the packet no more than 5 times in all. Configure the  
system to transmit a real-time accounting packet to the RADIUS server every 15  
minutes. The system is instructed to transmit the user name to the RADIUS server after  
removing the user domain name from the user name.  
The user name of the local 802.1x access user is localuser and the password is  
localpass (input in plain text). The idle cut function is enabled.  
39-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
II. Network diagram  
Authentication Servers  
(RADIUS Server Cluster  
IP Address: 10.11.1.1  
10.11.1.2)  
Switch  
Ethernet3/1/1  
Internet  
Authenticator  
Supplicant  
Figure 39-2 Enable 802.1x and RADIUS to perform AAA on the supplicant  
III. Configuration procedure  
Note:  
The following examples concern most of the AAA/RADIUS configuration commands.  
For details, refer to the chapter AAA and RADIUS/TACACS+ Protocol Configuration.  
The configurations of access user workstation is omitted.  
RADIUS server configuration is carried out in terms of RADIUS schemes. A RADIUS  
scheme actually can either be a stand-alone RADIUS server or two mutually backed up  
RADIUS servers with the same configuration and different IP addresses. So, for each  
RADIUS scheme, you need to configure the IP addresses for the primary and  
secondary RADIUS servers, and the shared key.  
Enable 802.1x globally.  
[SW8800] dot1x  
Enable the 802.1x performance on the specified port Ethernet 3/1/1.  
[SW8800] dot1x interface Ethernet 3/1/1  
Set the access control mode. (This command could not be configured, when it is  
configured as MAC-based by default.)  
[SW8800] dot1x port-method macbased interface Ethernet 3/1/1  
Create the RADIUS scheme radius1 and enters its configuration mode.  
[SW8800] radius scheme radius1  
Set IP address of the primary authentication/accounting RADIUS servers.  
[SW8800-radius-radius1] primary authentication 10.11.1.1  
39-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 39 802.1x Configuration  
[SW8800-radius-radius1] primary accounting 10.11.1.2  
Set the IP address of the secondary authentication/accounting RADIUS servers.  
[SW8800-radius-radius1] secondary authentication 10.11.1.2  
[SW8800-radius-radius1] secondary accounting 10.11.1.1  
Set the encryption key when the system exchanges packets with the authentication  
RADIUS server.  
[SW8800-radius-radius1] key authentication name  
Set the encryption key when the system exchanges packets with the accounting  
RADIUS server.  
[SW8800-radius-radius1] key accounting money  
Set the timeouts and times for the system to retransmit packets to the RADIUS server.  
[SW8800-radius-radius1] timer 5  
[SW8800-radius-radius1] retry 5  
Set the interval for the system to transmit real-time accounting packets to the RADIUS  
server.  
[SW8800-radius-radius1] timer realtime-accounting 15  
Configure the system to transmit the user name to the RADIUS server after removing  
the domain name.  
[SW8800-radius-radius1] user-name-format without-domain  
[SW8800-radius-radius1] quit  
Create the user domain 3Com163.net and enters its configuration mode.  
[SW8800] domain 3Com163.net  
Specify radius1 as the RADIUS scheme for the users in the domain 3Com163.net.  
[SW8800-isp-3Com163.net] radius-scheme radius1  
Set a limit of 30 users to the domain 3Com163.net.  
[SW8800-isp-3Com163.net] access-limit enable 30  
Enable idle cut function for the user and set the idle cut parameter in the domain  
3Com163.net.  
[SW8800-isp-3Com163.net] idle-cut enable 20 2000  
Add a local supplicant and sets its parameter.  
[SW8800] local-user localuser  
[SW8800-luser-localuser] service-type lan-access  
[SW8800-luser-localuser] password simple localpass  
39-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Chapter 40 AAA and RADIUS/TACACS+ Protocol  
Configuration  
40.1 AAA and RADIUS/TACACS+ Protocol Overview  
40.1.1 AAA Overview  
Authentication, Authorization and Accounting (AAA) provide a uniform framework used  
for configuring these three security functions to implement the network security  
management.  
The network security mentioned here refers to access control and it includes:  
z
z
z
Which user can access the network server?  
Which service can the authorized user enjoy?  
How to keep accounts for the user who is using network resource?  
Accordingly, AAA shall provide the following services:  
z
z
z
Authentication: authenticates if the user can access the network sever.  
Authorization: authorizes the user with specified services.  
Accounting: traces network resources consumed by the user.  
Generally, AAAadopts Client/Server architecture, with its client running at the managed  
side and its server centralizes and stores the user information. Therefore AAA  
framework takes good scalability, and is easy to realize the control and centralized  
management of user information.  
40.1.2 RADIUS Protocol Overview  
As mentioned above, AAA is a management framework, so it can be implemented by  
some protocols. RADIUS is such a protocol frequently used.  
I. What is RADIUS  
Remote Authentication Dial-In User Service, RADIUS for short, is a kind of distributed  
information switching protocol in Client/Server architecture. RADIUS can prevent the  
network from interruption of unauthorized access and it is often used in the network  
environments requiring both high security and remote user access. For example, it is  
often used for managing a large number of scattering dial-in users who use serial ports  
and modems. RADIUS system is the important auxiliary part of Network Access Server  
(NAS).  
After RADIUS system is started, if the user wants to have right to access other network  
or consume some network resources through connection to NAS (dial-in access server  
40-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
in PSTN environment or Ethernet switch with access function in Ethernet environment),  
NAS, namely RADIUS client end, will transmit user AAA request to the RADIUS server.  
RADIUS server has a user database recording all the information of user authentication  
and network service access. When receiving user’s request from NAS, RADIUS server  
performs AAA through user database query and update and returns the configuration  
information and accounting data to NAS. Here, NAS controls supplicant and  
corresponding connections, while RADIUS protocol regulates how to transmit  
configuration and accounting information between NAS and RADIUS.  
NAS and RADIUS exchange the information with UDP packets. During the interaction,  
both sides encrypt the packets with keys before uploading user configuration  
information (like password etc.) to avoid being intercepted or stolen.  
Note:  
The authentication and authorization of a RADIUS scheme cannot be performed  
separately.  
II. RADIUS operation  
RADIUS server generally uses proxy function of the devices like access server to  
perform user authentication. The operation process is as follows: First, the user send  
request message (the client username and encrypted password is included in the  
message ) to RADIUS server. Second, the user will receive from RADIUS server  
various kinds of response messages in which the ACCEPT message indicates that the  
user has passed the authentication, and the REJECT message indicates that the user  
has not passed the authentication and needs to input username and password again,  
otherwise he will be rejected to access.  
40.1.3 TACACS+ Protocol Overview  
I. TACACS+ SPECIALITY  
TACACS+ is an enhanced security protocol based on TACACS (RFC1492). Similar to  
the RADIUS protocol, it implements AAA for different types of users through  
communications with TACACS servers in the Server/Client model. TACACS+ can be  
used for the authentication, authorization and accounting of PPP and VPDN access  
users and login users.  
Compared with RADIUS, TACACS+ provides more reliable transmission and  
encryption, and therefore is more suitable for security control. The following table lists  
the primary differences between TACACS+ and RADIUS protocols:  
40-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Table 40-1 TACACS+ vs. RADIUS  
TACACS+  
RADIUS  
Adopts TCP, providing more reliable network  
transmission.  
Adopts UDP.  
Encrypts the entire packet except for the Encrypts only the password  
standard TACACS+ header.  
field in authentication packets.  
Separates authentication from authorization. For  
example, you can use RADIUS to authenticate  
but TACACS+ to authorize.  
Binds authentication with  
authorization.  
Suitable for security control.  
Suitable for accounting.  
Supports the authorization of different users to  
use the configuration commands of the routing Not support.  
module of the switch.  
Working as a client of TACACS+, the switch sends the username and password to the  
TACACS server for authentication, as shown in the following figure:  
Terminal User  
TACACS Server  
129.7.66.66  
User  
TACACS Client  
TACACS Server  
129.7.66.67  
Figure 40-1 Network diagram for TACACS+  
II. Basic message exchange procedures in TACACS+  
For example, use TACACS+ to implement authentication, authorization, and  
accounting for a telnet user. The basic message exchange procedures are as follows:  
z
A user requests access to the switch; the TACACS client sends a  
start-authentication packet to TACACS server upon receiving the request.  
The TACACS server sends back an authentication response requesting for the  
username; the TACACS client asks the user for the username upon receiving the  
response.  
z
z
The TACACS client sends an authentication continuance packet carrying the  
username after receiving the username from the user.  
40-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
z
The TACACS server sends back an authentication response, requesting for the  
login password. Upon receiving the response, the TACACS client requests the  
user for the login password.  
z
z
After receiving the login password, the TACACS client sends an authentication  
continuance packet carrying the login password to the TACACS server.  
The TACACS server sends back an authentication response indicating that the  
user has passed the authentication.  
z
z
The TACACS client sends the user authorization packet to the TACACS server.  
The TACACS server sends back the authorization response, indicating that the  
user has passed the authorization.  
z
Upon receipt of the response indicating an authorization success, the TACACS  
client pushes the configuration interface of the switch to the user.  
The TACACS client sends a start-accounting request to the TACACS server.  
The TACACS server sends back an accounting response, indicating that it has  
received the start-accounting request.  
z
z
z
z
The user logs off; the TACACS client sends a stop-accounting request to the  
TACACS server.  
The TACACS server sends a stop-accounting response to the client, which  
indicates it has received the stop-accounting request packet.  
The following figure illustrates the basic message exchange procedures:  
Figure 40-2 illustrates the basic message exchange procedures.  
40-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
TACACS  
Client  
TACACS  
Server  
User  
User logs on  
Authentication start packet  
Authentication response packet,  
requesting username  
Requests the user for  
username  
Authentication continuance packet,  
sending username to the server  
The user inputs username  
Authentication response packet,  
requesting password  
Requests the user  
for password  
Authentication continuance packet,  
sending password to the server  
User inputs the password  
Authentication response packet.  
Authentication succeeds  
Authorization request packet  
Authorization response  
packet. Authorization  
succeeds  
The user logs on successfully  
User logs off  
Accounting start packet  
Accounting start packet response  
Accounting stop packet  
Accounting stop packet response  
Figure 40-2 Basic message exchange procedures  
40.1.4 Implementing AAA/RADIUS on a Switch  
By now, we understand that in the above-mentioned AAA/RADIUS framework, a  
Switch 8800, serving as the user access device (NAS), is the client end of RADIUS. In  
other words, the AAA/RADIUS concerning client-end is implemented on the Switch  
8800. Figure 40-3 illustrates the RADIUS authentication network including the Switch  
8800.  
40-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
PC user1  
PC user2  
Authentication  
Accounting  
Server1  
ISP1  
8800 Series  
SW5500  
PC user3  
PC user4  
8800 Series  
Internet  
ISP2  
SW5500  
Figure 40-3 Network diagram for using RADIUS to authenticate  
40.2 AAA Configuration  
The following sections describe AAA configuration tasks.  
z
z
z
z
z
z
z
Among the above configuration tasks, creating ISP domain is compulsory, otherwise  
the supplicant attributes cannot be distinguished. The other tasks are optional. You can  
configure them at requirements.  
40.2.1 Creating/Deleting an ISP Domain  
What is Internet Service Provider (ISP) domain? To make it simple, ISP domain is a  
group of users belonging to the same ISP. Generally, for a username in the  
userid@isp-name format, taking gw20010608@3Com163.net as an example, the  
isp-name (i.e. 3Com163.net) following the @ is the ISP domain name. When a Switch  
8800 controls user access, as for an ISP user whose username is in userid@isp-name  
format, the system will take userid part as username for identification and take  
isp-name part as domain name.  
The purpose of introducing ISP domain settings is to support the multi-ISP application  
environment. In such environment, one access device might access users of different  
ISP. Because the attributes of ISP users, such as username and password formats, etc,  
may be different, it is necessary to differentiate them through setting ISP domain. In the  
40-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Switch 8800 ISP domain view, you can configure a complete set of exclusive ISP  
domain attributes on a per-ISP domain basis, which includes AAA policy ( RADIUS  
scheme applied etc.)  
For the Switch 8800, each supplicant belongs to an ISP domain. Up to 16 domains can  
be configured in the system. If a user has not reported its ISP domain name, the system  
will put it into the default domain.  
Perform the following configuration in system view.  
Table 40-2 Create/Delete an ISP domain  
Operation  
Command  
domain isp-name  
Create ISP domain or enter the view of a  
specified domain  
Remove a specified ISP domain  
undo domain isp-name  
Enable the default ISP domain specified by  
isp-name  
domain default enable isp-name  
domain default disable  
Restore the default ISP domain to “system”  
By default, a domain named “system” has been created in the system. The attributes of  
“system” are all default values.  
40.2.2 Configuring Relevant Attributes of an ISP Domain  
The relevant attributes of ISP domain include the adopted RADIUS scheme, ISP  
domain state, maximum number of supplicants, accounting optional enable/disable  
state, address pool definition, IP address assignment for PPP domain users, and user  
idle-cut enable/disable state where:  
z
The adopted RADIUS scheme is the one used by all the users in the ISP domain.  
The RADIUS scheme can be used for RADIUS authentication or accounting. By  
default, the default RADIUS scheme is used. The command shall be used  
together with the commands of setting RADIUS server and server cluster. For  
details, refer to the following Configuring RADIUS section of this chapter. If local is  
configured as the first scheme, only the local scheme will be adopted, neither  
RADIUS nor TACACS+ scheme will be adopted. When local scheme is adopted,  
only authentication and authorization will be performed, accounting will not be  
performed. None has the same effect as local. The usernames used for local  
authentication carry no domain name, so if the local scheme is configured, pay  
attention not to add domain name to the username when you configure a local  
user.  
z
Every ISP domain has two states: active and block. If an ISP domain is in active  
state, the users in it are allowed to request network services, while in block state,  
its users are inhibit from requesting any network service, which will not affect the  
40-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
users already online. An ISP is in active state once it is created, that is, at that time,  
all the users in the domain are allowed to request network services.  
Maximum number of supplicants specifies how many supplicants can be  
contained in the ISP. For any ISP domain, there is no limit to the number of  
supplicants by default.  
z
z
z
The idle cut function means: If the traffic from a certain connection is lower than  
the defined traffic, cut off this connection.  
The PPP access users can obtain IP addresses through the PPP address  
negotiation function.  
Perform the following configuration in ISP domain view.  
Table 40-3 Configure relevant attributes of an ISP domain  
Operation  
Command  
radius-scheme  
scheme  
{
radius-scheme-name  
TACACS+-scheme  
TACACS+-scheme-name [ local ] |  
local | none }  
[
local  
]
|
Configure the AAA scheme used by an  
ISP domain  
Restore the default AAA scheme used undo scheme { radius-scheme  
by an ISP domain TACACS+-scheme | none }  
|
Specify the ISP domain state to be used state { active | block }  
access-limit  
max-user-number }  
{
disable  
|
enable  
Set a limit to the amount of supplicants  
Restore the limit to the default setting  
Enable accounting to be optional  
Disable accounting to be optional  
Set the idle  
undo access-limit  
accounting optional  
undo accounting optional  
idle-cut { disable | enable minute flow }  
Define an address pool to assign IP ip pool pool-number low-ip-address  
addresses to users  
[ high-ip-address ]  
Delete the specified address pool  
undo ip pool pool-number  
By default, the local scheme is adopted, an ISP domain is in active state once it is  
created, no limit is set to the amount of supplicants, accounting optional is disabled,  
idle-cut is disabled, and no IP address pool is defined.  
40.2.3 Configuring Self-Service Server URL  
The self-service-url enable command must be incorporated with a RADIUS server  
(such as a CAMS server) that supports self-service. Self-service means that users can  
manage their accounts and card numbers by themselves. And a server with the  
self-service software is called a self-service server.  
40-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Once this function is enabled on the switch, users can locate the self-service server  
through the following operations:  
z
z
Select "Change user password" on the 802.1x client.  
After the client opens the default explorer (IE or NetScape), locate the specified  
URL page used to change the user password on the self-service server.  
Change user password on this page.  
z
Perform the following configuration in ISP domain view.  
Table 40-4 Configure the self-service server URL  
Operation  
Command  
Configure self-service server URL and configure the  
URL address used to change the user password on the  
self-service server  
self-service-url enable  
url-string  
Remove the configuration of self-service server URL  
self-service-url disable  
By default, self-service server URL is not configured on the switch.  
Note that, if "?" is contained in the URL, you must replace it with "|" when inputting the  
URL in the command line.  
The "Change user password" option is available only when the user passes the  
authentication; otherwise, this option is in grey and unavailable.  
40.2.4 Creating/Deleting a Local User  
A local user is a group of users set on NAS. The username is the unique identifier of a  
user. A supplicant requesting network service may use local authentication only if its  
corresponding local user has been added onto NAS.  
Perform the following configuration in system view.  
Table 40-5 Create/Delete a local user  
Operation  
Add a local user  
Command  
local-user user-name  
Delete all the local users  
undo local-user all  
undo local-user  
[ service-type { lan-access | ftp | telnet | ppp |  
ssh | terminal } ] }  
{
user-name  
|
all  
Delete a local user by specifying  
its type  
By default, there is no local user in the system.  
40-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
40.2.5 Setting the Attributes of a Local User  
The attributes of a local user include its password display mode, state, service type and  
some other settings.  
I. Setting the password display mode  
Perform the following configuration in system view.  
Table 40-6 Set the method that a local user uses to display password  
Operation  
Command  
Set the mode that a local user uses to local-user  
password-display-mode  
display password  
{ cipher-force | auto }  
Cancel the mode that the local user undo  
local-user  
uses to display password  
password-display-mode  
Where, auto means that the password display mode will be the one specified by the  
user at the time of configuring password (see the password command in the following  
table for reference), and cipher-force means that the password display mode of all the  
accessing users must be in cipher text.  
II. Setting/Removing the attributes of a local user  
Perform the following configuration in local user view.  
Table 40-7 Set/Remove the attributes concerned with a specified user  
Operation  
Command  
Set  
a
password for  
a
password { simple | cipher } password  
specified user  
Remove the password set for  
the specified user  
undo password  
Set the state of the specified  
user  
state { active | block }  
service-type { ftp [ ftp-directory directory ] |  
lan-access | ppp [call-number call-number |  
Set a service type for the callback-nocheck  
|
callback-number  
specified user  
callback-number ] | ssh [ level level | telnet |  
terminal ] | telnet [ level level | ssh | temninal ] |  
terminal [ level level | ssh | telnet ] }  
undo service-type { ftp [ ftp-directory directory ] |  
lan-access | ppp [call-number call-number |  
Cancel the service type of the callback-nocheck  
|
callback-number  
specified user  
callback-number ] | ssh [ level level | telnet |  
terminal ] | telnet [ level level | ssh | terminal ] |  
terminal [ level level | ssh | telnet ] }  
40-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Operation  
Command  
Set the priority of the  
specified user  
level level  
Restore the default priority of  
the specified user  
undo level  
attribute { ip ip-address | mac mac-address |  
Configure the attributes of idle-cut second | access-limit max-user-number |  
lan-access users  
vlan vlanid | location { nas-ip ip-address port  
portnum | port portnum }*  
Remove  
defined for the lan-access  
users  
the  
attributes  
undo attribute { ip | mac | idle-cut | access-limit |  
vlan | location }*  
By default, users are not authorized to any service, all their priorities are 0.  
40.2.6 Disconnecting a User by Force  
Sometimes it is necessary to disconnect a user or a category of users by force. The  
system provides the following command to serve for this purpose.  
Perform the following configuration in system view.  
Table 40-8 Disconnect a user by force  
Operation  
Command  
cut connection { all | access-type { dot1x | gcm |  
mac-authentication } | domain domain-name | interface  
interface-type interface-number | ip ip-address | mac  
mac-address | radius-scheme radius-scheme-name | vlan  
vlanid | ucibindex ucib-index | user-name user-name }  
Disconnect a user  
by force  
40.2.7 Configuring Dynamic VLAN Delivering  
Dynamic VLAN delivering enables an Ethernet switch to monitor network resources  
available to users by adding the ports to which the authenticated users connect to  
different VLANS according to the properties delivered by RADIUS servers. To work with  
Guest VLAN, ports are usually configured to perform port-based authentications. (If  
you configure a port to perform MAC address-based authentication, it can have only  
one user connected.)  
At present, a switch supports VLAN IDs delivered by RADIUS servers to be of string  
type. The port is added to the VLANs on a switch with their IDs matching the one  
delivered by the RADIUS servers. If this kind of VLANs does not exist, the VLAN  
delivering fails and the user fails to pass the authentication.  
Perform the following configuration in system view.  
40-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Table 40-9 Configure VLAN delivering mode  
Operation  
Command  
Configure the VLAN delivering mode to  
be of string type  
private-group-id mode standard  
Revert to the default VLAN delivering  
mode.  
undo private-group-id mode standard  
By default, a VLAN ID cannot be a string.  
40.3 Configuring RADIUS Protocol  
For the Switch 8800, the RADIUS protocol is configured on the per RADIUS scheme  
basis. In real networking environment, a RADIUS scheme can be an independent  
RADIUS server or a set of primary/secondary RADIUS servers with the same  
configuration but two different IP addresses. Accordingly, attributes of every RADIUS  
scheme include IP addresses of primary and secondary servers, shared key and  
RADIUS server type etc.  
Actually, RADIUS protocol configuration only defines some necessary parameters  
using for information interaction between NAS and RADIUS Server. To make these  
parameters take effect on an ISP domain, you must configure the ISP domain to use  
the RADIUS scheme configured with these parameters in ISP domain view. For more  
about the configuration commands, refer to the AAA Configuration section above.  
The following sections describe RADIUS protocol configuration tasks.  
z
z
z
z
z
z
z
z
z
z
z
z
z
z
z
40-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Among the above tasks, creating RADIUS scheme and setting IP address of RADIUS  
server are required, while other takes are optional and can be performed as your  
requirements.  
40.3.1 Creating/Deleting a RADIUS scheme  
As mentioned above, RADIUS protocol configurations are performed on the per  
RADIUS scheme basis. Therefore, before performing other RADIUS protocol  
configurations, it is compulsory to create the RADIUS scheme and enter its view.  
You can use the following commands to create/delete a RADIUS scheme.  
Perform the following configuration in system view.  
Table 40-10 Create/Delete a RADIUS server group  
Operation  
Command  
Create a RADIUS server group and  
enter its view  
radius scheme radius-server-name  
undo radius scheme radius-server-name  
Delete a RADIUS server group  
Several ISP domains can use a RADIUS server group at the same time. You can  
configure up to 16 RADIUS schemes, including the default server group named as  
System.  
By default, the system has a RADIUS scheme named “system” whose attributes are all  
default values.  
40.3.2 Setting IP Address and Port Number of a RADIUS Server  
After creating a RADIUS scheme, you are supposed to set IP addresses and UDP port  
numbers  
for  
the  
RADIUS  
servers,  
including  
primary/secondary  
authentication/authorization servers and accounting servers. So you can configure up  
to 4 groups of IP addresses and UDP port numbers. However, at least you have to set  
one group of IP address and UDP port number for each pair of primary/secondary  
servers to ensure the normal AAA operation.  
You can use the following commands to configure the IP address and port number for  
RADIUS schemes.  
Perform the following configuration in RADIUS scheme view.  
40-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Table 40-11 Set IP Address and Port Number of RADIUS Server  
Operation  
Set IP address and port number of primary primary  
Command  
authentication  
RADIUS authentication/authorization server.  
ip-address [ port-number ]  
Restore IP address and port number of primary  
RADIUS authentication/authorization or server undo primary authentication  
to the default values.  
Set IP address and port number of primary primary accounting ip-address  
RADIUS accounting server.  
[ port-number ]  
Restore IP address and port number of primary  
RADIUS accounting server or server to the undo primary accounting  
default values.  
Set IP address and port number of secondary secondary  
authentication  
RADIUS authentication/authorization server.  
ip-address [ port-number ]  
Restore IP address and port number of  
secondary  
RADIUS undo  
secondary  
accounting  
authentication/authorization or server to the authentication  
default values.  
Set IP address and port number of secondary secondary  
RADIUS accounting server.  
ip-address [ port-number ]  
Restore IP address and port number of  
secondary RADIUS accounting server or server undo secondary accounting  
to the default values.  
By default, as for the "system" RADIUS scheme created by the system:  
The IP address of the primary authentication server is 127.0.0.1, and the UDP port  
number is 1645.  
The IP address of the secondary authentication server is 0.0.0.0, and the UDP port  
number is 1812.  
The IP address of the primary accounting server is 127.0.0.1, and the UDP port number  
is 1646  
The IP address of the secondary accounting server is 0.0.0.0, and the UDP port  
number is 1813;  
As for the newly created RADIUS scheme:  
The IP address of the primary/secondary authentication server is 0.0.0.0, and the UDP  
port number of this server is 1812;  
The IP address of the primary/secondary accounting server is 0.0.0.0, and the UDP  
port number of this server is 1813;  
In real networking environments, the above parameters shall be set according to the  
specific requirements. For example, you may specify 4 groups of different data to map  
40-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
4
RADIUS servers, or specify one of the two servers as primary  
authentication/authorization server and secondary accounting server and the other one  
as secondary authentication/authorization server and primary accounting server, or  
you may also set 4 groups of exactly same data so that every server serves as a  
primary and secondary AAA server.  
To guarantee the normal interaction between NAS and RADIUS server, you are  
supposed to guarantee the normal routes between RADIUS/TACACS+ server and  
NAS before setting IP address and UDP port of the RADIUS/TACACS+ server. In  
addition, because RADIUS/TACACS+ protocol uses different UDP ports to  
receive/transmit authentication/authorization and accounting packets, you shall set two  
different ports accordingly. Suggested by RFC2138/2139, authentication/authorization  
port number is 1812 and accounting port number is 1813. However, you may use  
values other than the suggested ones. (Especially for some earlier RADIUS/TACACS+  
Servers, authentication/authorization port number is often set to 1645 and accounting  
port number is 1646.)  
The RADIUS/TACACS+ service port settings on the Switch 8800 are supposed to be  
consistent with the port settings on the RADIUS server. Normally, RADIUS accounting  
service port is 1813 and the authentication/authorization service port is 1812.  
Note:  
For a Switch 8800, the default RADIUS scheme authentication/authorization port is  
1645, the accounting port is 1646. And port 1812 and 1813 are for other schemes.  
40.3.3 Setting the RADIUS Packet Encryption Key  
RADIUS client (switch system) and RADIUS server use MD5 algorithm to encrypt the  
exchanged packets. The two ends verify the packet through setting the encryption key.  
Only when the keys are identical can both ends to accept the packets from each other  
end and give response.  
You can use the following commands to set the encryption key for RADIUS packets.  
Perform the following configuration in RADIUS scheme view.  
Table 40-12 Set RADIUS packet encryption key  
Operation  
Command  
Set RADIUS authentication/authorization packet  
encryption key  
key authentication string  
Restore  
the  
default  
RADIUS  
undo key authentication  
authentication/authorization packet encryption key  
40-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Set RADIUS accounting packet encryption key  
Restore the default RADIUS accounting packet  
key accounting string  
undo key accounting  
encryption key  
By default, the encryption keys of RADIUS authentication/authorization and accounting  
packets are all “3Com”.  
40.3.4 Setting the Response Timeout Timer of a RADIUS Server  
After RADIUS (authentication/authorization or accounting) request packet has been  
transmitted for a period of time, if NAS has not received the response from RADIUS  
server, it has to retransmit the request to guarantee RADIUS service for the user.  
You can use the following command to set response timeout timer of RADIUS server.  
Perform the following configuration in RADIUS scheme view.  
Table 40-13 Set the response timeout timer of a RADIUS server  
Operation  
Command  
timer second  
Set response timeout timer of RADIUS server  
Restore the response timeout timer of RADIUS  
server to default value  
undo timer  
By default, timeout timer of a RADIUS server is 3 seconds.  
40.3.5 Setting the Retransmission Times of RADIUS Request Packets  
Since RADIUS protocol uses UDP packet to carry the data, the communication process  
is not reliable. If the RADIUS server has not responded NAS before timeout, NAS has  
to retransmit RADIUS request packet. If it transmits more than the specified retry-times,  
NAS considers the communication with the current RADIUS server has been  
disconnected, and turn to send request packet to other RADIUS server.  
You can use the following command to set retransmission times of RADIUS request  
packet.  
Perform the following configuration in RADIUS scheme view.  
Table 40-14 Set the retransmission times of RADIUS request packets  
Operation  
Command  
retry retry-times  
undo retry  
Set retransmission times of RADIUS request  
packet  
Restore the default value of retransmission times  
40-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
By default, RADIUS request packet will be retransmitted up to three times.  
40.3.6 Enabling the Selection Of Radius Accounting Option  
If no RADIUS server is available or if RADIUS accounting server fails when the  
accounting optional is configured, the user can still use the network resource,  
otherwise, the user will be disconnected.  
Perform the following configuration in RADIUS scheme view.  
Table 40-15 Enable the selection of RADIUS accounting option  
Operation  
Command  
Enable the selection of RADIUS accounting option  
Disable the selection of RADIUS accounting option  
accounting optional  
undo accounting optional  
By default, selection of RADIUS accounting option is disabled.  
40.3.7 Setting a Real-time Accounting Interval  
To implement real-time accounting, it is necessary to set a real-time accounting interval.  
After the attribute is set, NAS will transmit the accounting information of online users to  
the RADIUS server regularly.  
You can use the following command to set a real-time accounting interval.  
Perform the following configuration in RADIUS scheme view.  
Table 40-16 Set a real-time accounting interval  
Operation  
Command  
Set a real-time accounting interval  
timer realtime-accounting minute  
Restore the default value of the interval undo timer realtime-accounting  
minute specifies the real-time accounting interval in minutes. The value shall be a  
multiple of 3.  
The value of minute is related to the performance of NAS and RADIUS server. The  
smaller the value is, the higher the performances of NAS and RADIUS are required.  
When there are a large amount of users (more than 1000, inclusive), we suggest a  
larger value. The following table recommends the ratio of minute value to the number of  
users.  
40-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Table 40-17 Recommended real-time accounting intervals for different number of  
users  
Number of users  
Real-time accounting interval in minutes  
1 to 99  
3
100 to 499  
500 to 999  
1000  
6
12  
15  
By default, minute is set to 12 minutes.  
40.3.8 Setting the Maximum Times of Real-time Accounting Request Failing  
to be Responded  
RADIUS server usually checks if a user is online with timeout timer. If the RADIUS  
server has not received the real-time accounting packet from NAS for long, it will  
consider that there is device failure and stop accounting. Accordingly, it is necessary to  
disconnect the user at NAS end and on RADIUS server synchronously when some  
unpredictable failure exists. The Switch 8800 supports setting maximum times of  
real-time accounting request failing to be responded. NAS will disconnect the user if it  
has not received real-time accounting response from RADIUS server for some  
specified times.  
You can use the following command to set the maximum times of real-time accounting  
request failing to be responded.  
Perform the following configuration in RADIUS scheme view.  
Table 40-18 Set the maximum times of real-time accounting request failing to be  
responded  
Operation  
Command  
Set maximum times of real-time accounting retry  
realtime-accounting  
request failing to be responded  
retry-times  
undo  
realtime-accounting  
retry  
Restore the maximum times to the default value  
How to calculate the value of retry-times? Suppose that RADIUS server connection will  
timeout in T and the real-time accounting interval of NAS is t, then the integer part of the  
result from dividing T by t is the value of count. Therefore, when applied, T is suggested  
the numbers which can be divided exactly by t.  
By default, the real-time accounting request can fail to be responded no more than 5  
times.  
40-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
40.3.9 Enabling/Disabling Stopping Accounting Request Buffer  
Because the stopping accounting request concerns account balance and will affect the  
amount of charge, which is very important for both the subscribers and the ISP, NAS  
shall make its best effort to send the request to RADIUS accounting server.  
Accordingly, if the request from the Switch 8800 to RADIUS accounting server has not  
been responded, switch shall save it in the local buffer and retransmit it until the server  
responds or discards the messages after transmitting for specified times. You can use  
the following command to set whether or not to save the stopping accounting requests.  
Perform the following configuration in RADIUS scheme view.  
Table 40-19 Enable/Disable stopping accounting request buffer  
Operation  
Enable stopping accounting request buffer stop-accounting-buffer enable  
Disable stopping accounting request undo  
stop-accounting-buffer  
Command  
buffer  
enable  
By default, the stopping accounting request will be saved in the buffer.  
40.3.10 Setting the Maximum Retransmitting Times of Stopping Accounting  
Request  
Because the stopping accounting request concerns account balance and will affect the  
amount of charge, which is very important for both the subscribers and the ISP, NAS  
shall make its best effort to send the message to RADIUS accounting server.  
Accordingly, if the request from the Switch 8800 to RADIUS accounting server has not  
been responded, switch shall save it in the local buffer and retransmit it until the server  
responds or discards the messages after transmitting for specified times. Use the  
following command to set the maximum retransmission times.  
Perform the following configuration in RADIUS scheme view.  
Table 40-20 Set the maximum retransmitting times of stopping accounting request  
Operation  
Command  
stop-accounting  
Set the maximum retransmitting times of retry  
stopping accounting request  
retry-times  
Restore the maximum retransmitting times of  
stopping accounting request to the default value  
undo retry stop-accounting  
By default, the stopping accounting request can be retransmitted for up to 500 times.  
40-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
40.3.11 Setting the Supported Type of RADIUS Server  
The Switch 8800 supports the standard RADIUS protocol and the extended RADIUS  
service platforms, such as IP Hotel, 201+ and Portal.  
You can use the following command to set the supported types of RADIUS servers.  
Perform the following configuration in RADIUS scheme view.  
Table 40-21 Set the supported type of RADIUS scheme  
Operation  
Command  
Set the Supported Type of RADIUS Server  
server-type { 3Com | standard }  
Restore the Supported Type of RADIUS  
Server to the default setting  
undo server-type  
By default, the newly created RADIUS scheme supports the server of standard type,  
while the "system" RADIUS scheme created by the system supports the server of  
3Com type  
40.3.12 Setting RADIUS Server State  
For the primary and secondary servers (no matter it is an authentication/authorization  
server or accounting server), if the primary is disconnected to NAS for some fault, NAS  
will automatically turn to exchange packets with the secondary server. However, after  
the primary one recovers, NAS will not resume the communication with it at once,  
instead, it continues communicating with the secondary one. When the secondary one  
fails to communicate, NAS will turn to the primary one again. The following commands  
can be used to set the primary server to be active manually, in order that NAS can  
communicate with it right after the troubleshooting.  
When the primary and secondary servers are both active or block, NAS will send the  
packets to the primary server only.  
Perform the following configuration in RADIUS scheme view.  
Table 40-22 Set RADIUS server state  
Operation  
Command  
state primary  
authentication } { block | active }  
{
accounting  
|
|
Set the state of primary RADIUS server  
Set the state of secondary RADIUS state  
secondary{ accounting  
sever authentication } { block | active }  
By default, the state of each server in RADIUS scheme server group is active.  
40-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
40.3.13 Setting the Username Format Transmitted to RADIUS Server  
As mentioned above, the supplicants are generally named in userid@isp-name format.  
The part following “@” is the ISP domain name. The Switch 8800 will put the users into  
different ISP domains according to the domain names. However, some earlier RADIUS  
servers reject the username including ISP domain name. In this case, you have to  
remove the domain name before sending the username to the RADIUS server. The  
following command of switch decides whether the username to be sent to RADIUS  
server carries ISP domain name or not.  
Perform the following configuration in RADIUS scheme view.  
Table 40-23 Set the username format transmitted to RADIUS server  
Operation  
Command  
Set Username Format Transmitted to user-name-format { with-domain |  
RADIUS Server  
without-domain }  
Note:  
If a RADIUS scheme is configured not to allow usernames including ISP domain names,  
the RADIUS scheme shall not be simultaneously used in more than one ISP domain.  
Otherwise, the RADIUS server will regard two users in different ISP domains as the  
same user by mistake, if they have the same username (excluding their respective  
domain names.)  
By default, as for the newly created RADIUS scheme, the username sent to RADIUS  
servers includes an ISP domain name; as for the "system" RADIUS scheme created by  
the system, the username sent to RADIUS servers excludes the ISP domain name.  
40.3.14 Setting the Unit of Data Flow that Transmitted to RADIUS Server  
The following command defines the unit of the data flow sent to RADIUS server.  
Perform the following configuration in RADIUS scheme view.  
Table 40-24 Set the unit of data flow transmitted to RADIUS server  
Operation  
Command  
data-flow-format data  
{
byte  
|
Set the unit of data flow transmitted to giga-byte | kilo-byte | mega-byte }  
RADIUS server  
packet  
{
giga-byte  
|
kilo-byte  
|
mega-byte | one-packet }  
Restore the unit to the default setting  
undo data-flow-format  
40-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
By default, the default data unit is byte and the default data packet unit is one packet.  
40.3.15 Creating/Deleting a Local RADIUS authentication Server  
RADIUS service, which adopts authentication/authorization/accounting servers to  
manage users, is widely used in the Switch 8800. Besides, local  
authentication/authorization service is also used in these products and it is called local  
RADIUS function, i.e. realize basic RADIUS function on the switch.  
Perform the following configuration in system view.  
Table 40-25 Creating/Deleting a local RADIUS authentication server  
Operation  
Command  
Create a local RADIUS authentication local-server nas-ip ip-address key  
server  
password  
Delete a local RADIUS authentication  
server  
undo local-server nas-ip ip-address  
By default, the IP address of local RADIUS authentication server group is 127.0.0.1 and  
the password is 3Com.  
When using local RADIUS server function, note that,  
1) The number of UDP port used for authentication/authorization is 1645 and that for  
accounting is 1646.  
2) The password configured by local-server command must be the same as that of  
the RADIUS authentication/authorization packet configured by the command key  
authentication in radius scheme view.  
3) The Switch 8800 serving as a local RADIUS authentication server currently only  
supports the CHAP and PAP authentication modes; they do not support the  
MD5-challenge mode.  
40.4 Configuring TACACS+ Protocol  
The following sections describe TACACS+ configuration tasks.  
z
z
40-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Configuring TACACS+ Authentication Servers  
z
z
z
z
z
z
z
Note:  
Pay attention to the following when configuring a TACACS server:  
z
TACACS+ server does not check whether a scheme is being used by users when  
changing most of HWTACS attributes, unless you delete the scheme.  
By default, the TACACS server has no key.  
z
In the above configuration tasks, creating TACACS+ scheme and configuring TACACS  
authentication/authorization server are required; all other tasks are optional and you  
can determine whether to perform these configurations as needed.  
40.4.1 Creating a HWTACAS Scheme  
As aforementioned, TACACS+ protocol is configured scheme by scheme. Therefore,  
you must create a TACACS+ scheme and enter TACACS+ view before you perform  
other configuration tasks.  
Perform the following configuration in system view.  
Table 40-26 Create a TACACS+ scheme  
Operation  
Command  
Create a TACACS+ scheme and TACACS+  
scheme  
scheme  
enter TACACS+ view  
TACACS+-scheme-name  
undo TACACS+  
TACACS+-scheme-name  
Delete a TACACS+ scheme  
By default, no TACACS+ scheme exists.  
If the TACACS+ scheme you specify does not exist, the system creates it and enters  
TACACS+ view. In TACACS+ view, you can configure the TACACS+ scheme  
specifically.  
The system supports up to 16 TACACS+ schemes. You can only delete the schemes  
that are not being used.  
40-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
40.4.2 Configuring TACACS+ Authentication Servers  
Perform the following configuration in TACACS+ view.  
Table 40-27 Configure TACACS+ authentication servers  
Operation  
Command  
Configure the TACACS+ primary primary authentication ip-address  
authentication server  
[ port ]  
Delete the TACACS+  
authentication server  
primary  
undo primary authentication  
Configure the TACACS+ secondary secondary authentication ip-address  
authentication server  
[ port ]  
Delete the TACACS+ secondary  
authentication server  
undo secondary authentication  
The primary and secondary authentication servers cannot use the same IP address.  
The default port number is 49.  
If you execute this command repeatedly, the new settings will replace the old settings.  
A TACACS scheme authentication server can be deleted only when no active TCP  
connection used to send authentication packets is using the server.  
40.4.3 Configuring TACACS+ Authorization Servers  
Perform the following configuration in TACACS+ view.  
Table 40-28 Configure TACACS+ authorization servers  
Operation  
Command  
Configure the primary TACACS+ primary  
authorization  
ip-address  
authorization server  
[ port ]  
Delete the primary  
authorization server  
TACACS+  
undo primary authorization  
Configure the secondary TACACS+ secondary authorization ip-address  
authorization server  
[ port ]  
Delete the secondary TACACS+  
authorization server  
undo secondary authorization  
40-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Note:  
If only authentication and accounting servers are configured and no authorization  
server is configured, both authentication and accounting can be performed normally for  
the ftp, telnet, and ssh users, but the priority of these users is 0 (that is, the lowest  
privilege level) by default,  
The primary and secondary authorization servers cannot use the same IP address. The  
default port number is 49.  
If you execute this command repeatedly, the new settings will replace the old settings.  
40.4.4 Configuring TACACS+ Accounting Servers and the Related Attributes  
I. Configuring TACACS+ accounting servers  
Perform the following configuration in TACACS+ view.  
Table 40-29 Configure TACACS+ accounting servers  
Operation  
the primary  
Command  
Configure  
accounting server  
TACACS  
primary accounting ip-address [ port ]  
Delete the primary TACACS accounting  
server  
undo primary accounting  
Configure the secondary TACACS secondary accounting ip-address  
accounting server  
[ port ]  
Delete the secondary  
accounting server  
TACACS  
undo secondary accounting  
Do not configure the same IP address for the primary accounting server and the  
secondary accounting server. Otherwise, an error occurs.  
By default, a TACACS accounting server uses an all-zero IP address and port 49.  
If you execute the primary accounting or secondary accounting command  
repeatedly, the newly configured settings overwrite the corresponding existing settings.  
You can delete a TACACS scheme only when no active TCP connection used to send  
authentication packets uses the server.  
II. Enabling stop-accounting packet retransmission  
Perform the following configuration in TACACS+ view.  
40-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Table 40-30 Configure stop-accounting packet retransmission  
Operation  
Command  
Enable stop-accounting packet retransmission and  
set the allowed maximum number of transmission  
attempts  
retry  
retry-times  
stop-accounting  
Disable stop-accounting packet retransmission  
undo retry stop-accounting  
reset  
Clear the stop-accounting request packets that stop-accounting-buffer  
have no response  
TACACS+-scheme  
TACACS+-scheme-name  
By default, stop-accounting packet retransmission is enabled, and the maximum  
number of transmission attempts is 300.  
40.4.5 Configuring the Source Address for TACACS+ Packets Sent by NAS  
Perform the following configuration in the corresponding view.  
Table 40-31 Configure the source address for TACACS+ packets sent by the NAS  
Operation  
Command  
Configure the source address for TACACS+ packets sent  
from the NAS (TACACS+ view)  
nas-ip ip-address  
Delete the configured source address for TACACS+  
packets sent from the NAS (TACACS+ view)  
undo nas-ip  
Configure the source address for TACACS+ packets sent TACACS+  
from the NAS (System view) ip-address  
nas-ip  
Cancel the configured source address for TACACS+ undo  
packets sent from the NAS (System view)  
nas-ip  
TACACS+  
The TACACS+ view takes precedence over the system view when configuring the  
source address for TACACS+ packets sent from the NAS.  
By default, the source address is not specified, and the virtual interface of the VLAN  
that contains the port to which the server connects for packet sending is used as the  
source address.  
40.4.6 Setting a Key for Securing the Communication with TACACS Server  
When using a TACACS server as an AAA server, you can set a key to improve the  
communication security between the switch and the TACACS server.  
Perform the following configuration in TACACS+ view.  
40-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Table 40-32 Set a key for securing the communication with the TACACS+ server  
Operation  
Command  
Configure  
a
key for securing the  
key { accounting | authorization |  
authentication } string  
communication with the accounting,  
authorization or authentication server  
undo key { accounting | authorization  
| authentication }  
Delete the configuration  
No key is configured by default.  
40.4.7 Setting the Username Format Acceptable to the TACACS Server  
Username is usually in the “userid@isp-name” format, with the domain name following  
“@”.  
If a TACACS server does not accept the username with domain name, you can remove  
the domain name and resend it to the TACACS server.  
Perform the following configuration in TACACS+ view.  
Table 40-33 Set the username format acceptable to the TACACS server  
Operation  
Command  
Send username with domain name  
Send username without domain name  
user-name-format with-domain  
user-name-format without-domain  
By default, each username sent to a TACACS server contains a domain name.  
40.4.8 Setting the Unit of Data Flows Destined for the TACACS Server  
Perform the following configuration in TACACS+ view.  
Table 40-34 Set the unit of data flows destined for the TACACS server  
Operation  
Command  
data-flow-format data { byte | giga-byte |  
kilo-byte | mega-byte }  
Set the unit of data flows  
destined for the TACACS server  
data-flow-format packet  
{
giga-packet  
|
kilo-packet | mega-packet | one-packet }  
Restore the default unit of data  
flows destined for the TACACS undo data-flow-format { data | packet }  
server  
The default data flow unit is byte.  
40-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
40.4.9 Setting Timers Regarding TACACS Server  
I. Setting the response timeout timer  
Since TACACS+ is implemented on the basis of TCP, server response timeout or TCP  
timeout may terminate the connection to the TACACS server.  
Perform the following configuration in TACACS+ view.  
Table 40-35 Set the response timeout timer  
Operation  
Set the response timeout time  
Restore the default setting  
Command  
timer response-timeout seconds  
undo timer response-timeout  
The default response timeout timer is set to 5 seconds.  
II. Setting the quiet timer for the primary TACACS server  
Perform the following configuration in TACACS+ view.  
Table 40-36 Set the quiet timer for the primary TACACS server  
Operation  
Command  
Set the quiet timer for the primary TACACS server  
Restore the default setting  
timer quiet minutes  
undo timer quiet  
The timer quiet command is used to make the switch ignore users' requests for server  
within the time configured in this command in case the communication between the  
switch and the server is terminated. In that case, the switch can send users' requests to  
the server only after it has waited a time no less than the time configured with this  
command for the communication to be resumed.  
By default, the primary TACACS server must wait five minutes before it can resume the  
active state. The time ranges from 1 to 255.  
III. Setting a realtime accounting interval  
The setting of real-time accounting interval is necessary to real-time accounting. After  
an interval value is set, the NAS transmits the accounting information of online users to  
the TACACS accounting server periodically.  
Perform the following configuration in TACACS+ view.  
40-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Table 40-37 Set a real-time accounting interval  
Operation  
Command  
Set a real-time accounting interval  
timer realtime-accounting minutes  
Restore the default real-time accounting  
interval  
undo timer realtime-accounting  
The interval is in minutes and must be a multiple of 3.  
The setting of real-time accounting interval somewhat depends on the performance of  
the NAS and the TACACS server: a shorter interval requires higher device performance.  
You are therefore recommended to adopt a longer interval when there are a large  
number of users (more than 1000, inclusive). The following table lists the numbers of  
users and the recommended intervals.  
Table 40-38 Numbers of users and the recommended intervals  
Number of users  
Real-time accounting interval (in minutes)  
1 to 99  
3
6
100 to 499  
500 to 999  
ƒ1000  
12  
ƒ15  
The real-time accounting interval defaults to 12 minutes.  
40.5 Displaying and Debugging AAA and RADIUS Protocol  
After the above configuration, execute display command in any view to display the  
running of the AAA and RADIUS/TACACS+ configuration, and to verify the effect of the  
configuration. Execute reset command in user view to reset AAA and  
RADIUS/TACACS+ statistics, etc. Execute debugging command in user view to  
debug AAA and RADIUS/TACACS+.  
Table 40-39 Display and debug AAA and RADIUS/TACACS+ protocol  
Operation  
Command  
Display the configuration information of  
the specified or all the ISP domains  
display domain [ isp-name ]  
40-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Operation  
Command  
display connection { access-type  
{ dot1x | gcm } | domain isp-name |  
interface  
Display related information of user’s interface-number | ip ip-address | mac  
connection mac-address radius-scheme  
radius-scheme-name | vlan vlanid |  
interface-type  
|
ucibindex ucib-index  
user-name }  
|
user-name  
display local-user [ domain isp-name |  
idle-cut disable enable  
Display related information of the local service-type { ftp | lan-access | ppp |  
{
|
}
|
user  
ssh | telnet | terminal } | state { active |  
block } | user-name user-name | vlan  
vlanid ]  
Display the statistics of local RADIUS display local-server { statistics |  
server group  
nas-ip }  
Display the configuration information of  
all the RADIUS server groups or a display radius [ radius-server-name ]  
specified one  
Display the statistics of RADIUS packets display radius statistics  
display  
stop-accounting-buffer  
{ radius-scheme radius-scheme-name  
| session-id session-id | time-range  
Display the stop-accounting requests  
saved in buffer without response  
start-time stop-time  
user-name }  
|
user-name  
Reset the statistics of RADIUS server  
reset radius statistics  
Display the specified or all the display  
TACACS+  
TACACS+ schemes  
[ TACACS+-server-name]  
Display the TACACS+ stop-accounting display  
stop-accounting-buffer  
requests saved in buffer without TACACS+-scheme  
response  
TACACS+-scheme-name  
reset  
stop-accounting-buffer  
{ radius-scheme radius-scheme-name  
| session-id session-id | time-range  
Delete the stop-accounting requests  
saved in buffer without response  
start-time stop-time  
user-name }  
|
user-name  
Delete the TACACS+ stop-accounting reset  
stop-accounting-buffer  
requests saved in buffer without TACACS+-scheme  
response  
TACACS+-scheme-name  
reset TACACS+  
statistics  
Reset the statistics of TACACS+ server  
{
accounting  
|
authentication  
|
authorization | all }  
Enable RADIUS packet debugging  
Disable RADIUS packet debugging  
debugging radius packet  
undo debugging radius packet  
40-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
Operation  
Command  
Enable debugging of local RADIUS debugging local-server { all | error |  
authentication server event | packet }  
Disable debugging of local RADIUS undo debugging local-server { all |  
authentication server  
error | event | packet }  
debugging TACACS+ { all | error |  
event | message | receive-packet |  
send-packet }  
Enable TACACS+ debugging  
undo debugging TACACS+ { all | error  
| event | message | receive-packet |  
send-packet }  
Disable TACACS+ debugging  
40.6 AAA and RADIUS/TACACS+ Protocol Configuration  
Examples  
For the hybrid configuration example of AAA/RADIUS/TACACS+ protocol and 802.1x  
protocol, refer to section 39.4 “802.1x Configuration Example”. It will not be detailed  
here.  
40.6.1 Configuring Authentication at Remote RADIUS Server  
Note:  
Configuring Telnet user authentication at the remote server is similar to configuring FTP  
users. The following description is based on Telnet users.  
I. Network Requirements  
In the environment as illustrated in the following figure, it is required to achieve through  
proper configuration that the RADIUS server authenticates the Telnet users to be  
registered.  
One RADIUS server (as authentication server) is connected to the switch and the  
server IP address is 10.110.91.146. The password for exchanging messages between  
the switch and the authentication server is "expert”. The switch cuts off domain name  
from username and sends the left part to the RADIUS server.  
40-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
II. Network Topology  
Authentication Servers  
( IP address:10.110.91.164 )  
Switch  
Internet
telnet user  
Figure 40-4 Network diagram for the remote RADIUS authentication of Telnet users  
III. Configuration procedure  
Add a Telnet user.  
Omitted  
Note:  
For details about configuring FTP and Telnet users, refer to User Interface  
Configuration of Getting Started Operation in this manual.  
Configure remote authentication mode for the Telnet user, i.e. scheme mode.  
[SW8800-ui-vty0-4] authentication-mode scheme  
Configure domain.  
[SW8800] domain cams  
[SW8800-isp-cams] quit  
Configure RADIUS scheme.  
[SW8800] radius scheme cams  
[SW8800-radius-cams] primary authentication 10.110.91.146 1812  
[SW8800-radius-cams] key authentication expert  
[SW8800-radius-cams] server-type 3Com  
[SW8800-radius-cams] user-name-format without-domain  
Associate the domain with RADIUS.  
[SW8800-radius-cams] quit  
[SW8800] domain cams  
[SW8800-isp-cams] radius-scheme cams  
40-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
40.6.2 Configuring Authentication at Local RADIUS Authentication Server  
Local RADIUS authentication of Telnet/FTP users is similar to the remote RADIUS  
authentication described in section 40.6.1 . But you should modify the server IP  
address in Figure 40-4 of section 40.6.1 to 127.0.0.1, authentication password to  
3Com, the UDP port number of the authentication server to 1645.  
Note:  
For details about local RADIUS authentication of Telnet/FTP users, refer to “40.3.15  
40.6.3 Configuring Authentication at Remote TACACS Server  
I. Network requirements  
Configure the switch to use a TACACS server to provide authentication and  
authorization services to login users (see the following figure).  
Connect the switch to one TACACS server (which acting as a AAA server) with the IP  
address 10.110.91.164. On the switch, set the shared key for AAA packet encryption to  
“expert”. Configure the switch to send usernames to the TACACS server with isp-name  
removed.  
On the TACACS server, set the shared key for encrypting the packets exchanged with  
the switch to “expert” .  
II. Network diagram  
Authentication Servers  
( IP address:10.110.91.164 )  
Switch  
Internet  
telnet user  
Figure 40-5 Network diagram for TACACS authentication  
40-33  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
III. Configuration procedure  
Configure the Telnet user.  
Here it is omitted.  
Note:  
The configuration of the FTP and Telnet users can refer to User Interface Configuration  
of Getting Started Operation section of this manual.  
Configure a TACACS+ scheme.  
[SW8800] TACACS+ scheme hwtac  
[SW8800-TACACS+-hwtac] primary authentication 10.110.91.164  
[SW8800-TACACS+-hwtac] primary authorization 10.110.91.164  
[SW8800-TACACS+-hwtac] key authentication expert  
[SW8800-TACACS+-hwtac] key authorization expert  
[SW8800-TACACS+-hwtac] user-name-format without-domain  
[SW8800-TACACS+-hwtac] quit  
Associate the domain with the TACACS+ scheme.  
[SW8800] domain TACACS+  
[SW8800-isp-TACACS+] scheme TACACS+-scheme hwtac  
40.7 Troubleshooting AAA and RADIUS/TACACS+  
RADIUS/TACACS+ protocol is located on the application layer of TCP/IP protocol suite.  
It mainly specifies how to exchange user information between NAS and  
RADIUS/TACACS+ server of ISP. So it is very likely to be invalid.  
I. Symptom: User authentication/authorization always fails  
Solution:  
z
The username may not be in the userid@isp-name format or NAS has not been  
configured with a default ISP domain. Please use the username in proper format  
and configure the default ISP domain on NAS.  
z
The user may have not been configured in the RADIUS/TACACS+ server  
database. Check the database and make sure that the configuration information of  
the user does exist in the database.  
z
z
The user may have input a wrong password. So please make sure that the  
supplicant inputs the correct password.  
The encryption keys of RADIUS/TACACS+ server and NAS may be different.  
Please check carefully and make sure that they are identical.  
40-34  
Download from Www.Somanuals.com. All Manuals Search And Download.  
Chapter 40 AAA and RADIUS/TACACS+ Protocol Con  
figuration  
3Com Switch 8800 Configuration Guide  
z
There might be some communication fault between NAS and RADIUS/TACACS+  
server, which can be discovered through pinging RADIUS/TACACS+ server from  
NAS. So please ensure the normal communication between NAS and  
RADIUS/TACACS+ server.  
II. Symptom: RADIUS/TACACS+ packet cannot be transmitted to  
RADIUS/TACACS+ server.  
Solution:  
z
The communication lines (on physical layer or link layer) connecting NAS and  
RADIUS/TACACS+ server may not work well. So please ensure the lines work  
well.  
z
z
The IP address of the corresponding RADIUS/TACACS+ server may not have  
been set on NAS. Please set a proper IP address for RADIUS/TACACS+ server.  
UDP ports of authentication/authorization and accounting services may not be set  
properly. So make sure they are consistent with the ports provided by  
RADIUS/TACACS+ server.  
III. Symptom: After being authenticated and authorized, the user cannot send  
charging bill to the RADIUS/TACACS+ server.  
Solution:  
z
z
The accounting port number may be set improperly. Please set a proper number.  
The accounting service and authentication/authorization service are provided on  
different servers, but NAS requires the services to be provided on one server (by  
specifying the same IP address). So please make sure the settings of servers are  
consistent with the actual conditions.  
40-35  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
Chapter 41 VRRP Configuration  
41.1 Introduction to VRRP  
Virtual Router Redundancy Protocol (VRRP) is a fault-tolerant protocol. In general, a  
default route (for example, 10.100.10.1 as shown in the following internetworking  
diagram) will be configured for every host on a network, so that the packets destined to  
some other network segment from the host will go through the default route to the Layer  
3 Switch, implementing communication between the host and the external network. If  
Switch is down, all the hosts on this segment taking Switch as the next-hop on the  
default route will be disconnected from the external network.  
Network  
Switch  
10.100.10.1  
Ethernet  
10.100.10.7  
10.100.10.8  
10.100.10.9  
Host 1  
Host 2  
Host 3  
Figure 41-1 Network diagram for LAN  
VRRP, designed for LANs with multicast and broadcast capabilities (such as Ethernet)  
settles the above problem. The diagram below is taken as an example to explain the  
implementation principal of VRRP. VRRP combines a group of LAN switches (including  
a Master and several Backups) into a virtual router.  
41-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
Network  
Actual IP address10.100.10.2  
Master  
Actual IP address10.100.10.3  
Backup  
Virtual IP address10.100.10.1  
Virtual IP address10.100.10.1  
10.100.10.7  
Ethernet  
10.100.10.8  
10.100.10.9  
Host 1  
Host 2  
Host 3  
Figure 41-2 Network diagram for virtual router  
This virtual router has its own IP address: 10.100.10.1 (which can be the interface  
address of a switch within the virtual router). The switches within the virtual router have  
their own IP addresses (such as 10.100.10.2 for the Master switch and 10.100.10.3 for  
the Backup switch). The host on the LAN only knows the IP address of this virtual router  
10.100.10.1 (usually called as virtual IP address of virtual router), but not the specific IP  
addresses 10.100.10.2 of the Master switch and 10.100.10.3 of the Backup switch.  
They configure their own default routes as the IP address of this virtual router:  
10.100.10.1. Therefore, hosts within the network will communicate with the external  
network through this virtual router. If a Master switch in the virtual group breaks down,  
another Backup switch will function as the new Master switch to continue serving the  
host with routing to avoid interrupting the communication between the host and the  
external networks.  
41.2 Configuring VRRP  
The following sections describe the VRRP configuration tasks:  
z
z
z
z
z
z
z
z
z
41-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
41.2.1 Enabling/Disabling the Function to Ping the Virtual IP Address  
This operation enables or disables the function to ping the virtual IP address of the  
virtual router. The standard protocol of VRRP does not support the ping function, then  
the user cannot judge with ping command whether an IP address is used by the virtual  
router. If the user configure the IP address for the host same as the virtual IP address of  
the virtual router, then all messages in this segment will be forwarded to the host.  
So the Switch 8800 provides the ping function to ping the virtual IP address of the  
virtual router.  
Perform the following configuration in system view.  
Table 41-1 Enable/disable the ping function  
Operation  
Command  
vrrp ping-enable  
undo vrrp ping-enable  
Enable to ping the virtual IP address  
Disable to ping the virtual IP address  
By default, the function to ping the virtual IP address is disabled.  
You should set the ping function before configuring the virtual router. If a virtual router is  
already established on the switch, you cannot perform this configuration any more.  
41.2.2 Enabling/Disabling the Check of TTL Value of VRRP Packet  
This operation configures whether to check TTL value of VRRP packet on the switch.  
The TTL value must be 225. If the switch find TTL is not 225 when receiving VRRP  
packet, the packet will be discarded.  
Perform the following configuration in VLAN interface view.  
Table 41-2 Enable/disable the check of TTL value of VRRP packet  
Operation  
Command  
vrrp un-check ttl  
undo vrrp un-check ttl  
Disable the check of TTL value of VRRP packet  
Enable the check of TTL value of VRRP packet  
By default, the switch checks TTL value of VRRP packets.  
41.2.3 Setting Correspondence Between Virtual IP Address and MAC  
Address  
This operation sets correspondence between the virtual lP address and the MAC  
address. In the standard protocol of VRRP, the virtual IP address of the virtual router  
corresponds to the virtual MAC address, to ensure correct data forwarding in the  
sub-net.  
41-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
Due to the chips installed, some switches support matching one IP address to multiple  
MAC addresses.  
The Switch 8800 not only guarantees correct data forwarding in the sub-net, but also  
support such function: the user can choose to match the virtual IP address with the real  
MAC address or virtual MAC address of the routing interface.  
The following commands can be used to set correspondence between the IP address  
and the MAC address.  
Perform the following configuration in system view.  
Table 41-3 Set correspondence between virtual IP address and MAC address  
Operation  
Command  
Set correspondence between the virtual  
IP address and the MAC address  
vrrp method { real-mac | virtual-mac }  
Set the correspondence to the default  
value  
undo vrrp method  
By default, the virtual IP address of the virtual router corresponds to the virtual MAC  
address.  
You should set correspondence between the virtual IP address of the virtual router and  
the MAC address before configuring the virtual router. Otherwise, you cannot configure  
the correspondence.  
If you set correspondence between the IP address of the virtual router and the real  
MAC address, you can configure only one virtual router on VLAN interface.  
41.2.4 Adding/Deleting a Virtual IP Address  
The following command is used for assigning a virtual IP address of the local segment  
to a virtual router or removing an assigned virtual IP address of a virtual router from the  
virtual address list.  
Perform the following configuration in VLAN interface view.  
Table 41-4 Add/delete a virtual IP address  
Operation  
Command  
vrrp vrid virtual-router-ID virtual-ip  
virtual-address  
Add a virtual IP address  
undo  
vrrp  
vrid virtual-router-ID  
Delete a virtual IP address  
[ virtual-ip virtual-address ]  
The virtual-router-ID covers the range from 1 to 255.  
41-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
The virtual-address can be an unused address in the network segment where the  
virtual router resides, or the IP address of an interface in the virtual router. If the IP  
address is of the switch in the virtual router, it can also be configured as virtual-address.  
In this case, the switch will be called an IP Address Owner. When adding the first IP  
address to a virtual router, the system will create a new virtual router accordingly. When  
adding a new address to this virtual router thereafter, the system will directly add it into  
the virtual IP address list.  
After the last virtual IP address is removed from the virtual router, the whole virtual  
router will also be removed. That is, there is no more virtual router on the interface any  
more and any configuration of it is invalid accordingly.  
41.2.5 Configuring the Priority of Switches in the Virtual Router  
The status of each switch in the virtual router will be determined by its priority in VRRP.  
The switch with the highest priority will become the Master.  
Perform the following configuration in VLAN interface view.  
Table 41-5 Configure the priority of switches in the virtual router.  
Operation  
Command  
Configure the priority of switches in the vrrp vrid virtual-router-ID priority  
virtual router.  
priority  
Clear the priority of switches in the  
virtual router.  
undo vrrp vrid virtual-router-ID priority  
The priority ranges from 0 to 255. The greater the number, the higher the priority.  
However the value can only be taken from 1 to 254. The priority 0 is reserved for special  
use and 255 is reserved for the IP address owner by the system.  
By default, the priority is 100.  
Note:  
The priority for IP address owner is always 255, which cannot be configured otherwise.  
41.2.6 Configuring Preemption and Delay for a Switch Within a Virtual  
Router  
Once a switch in the virtual router becomes the Master switch, so long as it still  
functions properly, other switches, even configured with a higher priority later, cannot  
become the Master switch unless they are configured to work in preemption mode. The  
switch in preemption mode will become the Master switch, when it finds its own priority  
41-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
is higher than that of the current Master switch. Accordingly, the former Master switch  
will become the Backup switch.  
Together with preemption settings, a delay can also be set. In this way, a Backup will  
wait for a period of time before becoming a Master. In an unstable network if the Backup  
switch has not received the packets from the Master switch punctually, it will become  
the Master switch. However, the failure of Backup to receive the packets may be due to  
network congestion, instead of the malfunction of the Master switch. In this case, the  
Backup will receive the packet after a while. The delay settings can thereby avoid the  
frequent status changing.  
Perform the following configuration in VLAN interface view.  
Table 41-6 Configure preemption and delay for a switch within a virtual router  
Operation  
Command  
vrid virtual-router-ID  
vrrp  
Enable the preemption mode and  
configure a period of delay.  
preempt-mode  
delay-value ]  
[
timer delay  
undo  
preempt-mode  
vrrp  
vrid virtual-router-ID  
Disable the preemption mode.  
The delay ranges from 0 to 255, measured in seconds. By default, the preemption  
mode is preemption with a delay of 0 second.  
Note:  
If preemption mode is cancelled, the delay time will automatically become 0 second.  
41.2.7 Configuring Authentication Type and Authentication Key  
VRRP provides following authentication types:  
z
z
simple: Simple character authentication  
md5: MD5 authentication  
In a network under possible security threat, the authentication type can be set to  
simple. Then the switch will add the authentication key into the VRRP packets before  
transmitting it. The receiver will compare the authentication key of the packet with the  
locally configured one. If they are the same, the packet will be taken as a true and legal  
one. Otherwise it will be regarded as an illegal packet to be discarded. In this case, an  
authentication key not exceeding 8 characters should be configured.  
In a totally unsafe network, the authentication type can be set to md5. The switch will  
use the authentication type and MD5 algorithm provided by the Authentication Header  
41-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
to authenticate the VRRP packets. In this case an authentication key not exceeding 8  
characters should be configured.  
Those packets failing to pass the authentication will be discarded and a trap packet will  
be sent to the network management system.  
Perform the following configuration in VLAN interface view.  
Table 41-7 Configure authentication type and authentication key  
Operation  
Command  
authentication-mode  
Configure authentication type and vrrp  
authentication key  
authentication-type authentication-key  
Remove authentication type and  
authentication key  
undo vrrp authentication-mode  
The authentication key is case sensitive.  
Note:  
The same authentication type and authentication key should be configured for all VLAN  
interfaces that belong to the virtual router.  
41.2.8 Configuring Virtual Router Timer  
The Master switch advertises its normal operation state to the switches within the  
VRRP virtual router by sending them VRRP packets regularly (at adver-interval). And  
the backup switch only receives VRRP packets. If the Backup has not received any  
VRRP packet from the Master after a period of time (specified by master-down-interval),  
it will consider the Master as down, and then take its place and become the Master.  
You can use the following command to set a timer and adjust the interval, adver-interval,  
between Master transmits VRRP packets. The master-down-interval of the Backup  
switch is three times that of the adver-interval. The excessive network traffic or the  
differences between different switch timers will result in master-down-interval timing out  
and state changing abnormally. Such problems can be solved through prolonging the  
adver-interval and setting delay time. adver-interval is measured in seconds.  
Perform the following configuration in VLAN interface view.  
41-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
Table 41-8 Configure virtual router timer  
Operation  
Command  
vrrp  
vrid  
virtual-router-ID timer  
Configure virtual router timer  
advertise adver-interval  
undo vrrp vrid virtual-router-ID timer  
advertise  
Clear virtual router timer  
By default, adver-interval is configured to be 1.  
41.2.9 Configuring Switch to Track a Specified Interface  
VRRP interface track function has expanded the backup function. Backup is provided  
not only to the interface where the virtual router resides, but also to some other  
malfunctioning switch interface. By implementing the following command you can track  
some interface.  
If the interface which is tracked is DOWN, the priority of the switch including the  
interface will reduce automatically by the value specified by value-reduced, thus  
resulting in comparatively higher priorities of other switches within the virtual router, one  
of which will turn to Master switch so as to track this interface.  
Perform the following configuration in VLAN interface view.  
Table 41-9 Configure switch to track a specified interface  
Operation  
Command  
vrrp  
vrid  
virtual-router-ID  
track  
Configure the switch to track a specified  
interface  
vlan-interface interface-num [ reduced  
value-reduced ]  
undo vrrp vrid virtual-router-ID track  
[ vlan-interface interface-num ]  
Stop tracking the specified interface  
By default, value-reduced is taken 10.  
Note:  
When the switch is an IP address owner, its interfaces cannot be tracked.  
If the interface tracked is up again, the corresponding priority of the switch, including  
the interface, will be restored automatically  
You can only track up to eight interfaces in one virtual router.  
41-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
41.3 Displaying and debugging VRRP  
After the above configuration, execute display command in any view to display the  
running of the VRRP configuration, and to verify the configuration. Execute debugging  
command in user view to debug VRRP configuration.  
Table 41-10 Display and debug VRRP  
Operation  
Command  
display vrrp [ interface vlan-interface  
interface-num [ virtual-router-ID ] ]  
Display VRRP state information  
display vrrp statistics [ vlan-interface  
interface-num [ virtual-router-ID ]  
Display VRRP statistics information  
Display VRRP summary information  
display vrrp summary  
Clear the statistics information about reset vrrp statistics [ vlan-interface  
VRRP  
interface-num [ virtual-router-ID ] ]  
debugging vrrp { state | packet |  
error }  
Enable VRRP debugging.  
undo debugging vrrp { state | packet |  
error }  
Disable VRRP debugging.  
You can enable VRRP debugging to check its running. You may choose to enable  
VRRP packet debugging (option as packet), VRRP state debugging (option as state),  
and/or VRRP error debugging (option as error). By default, VRRP debugging is  
disabled.  
41.4 VRRP Configuration Example  
41.4.1 VRRP Single Virtual Router Example  
I. Networking requirements  
Host A uses the VRRP virtual router which combines switch A and switch B as its  
default gateway to access host B on the Internet.  
VRRP virtual router information includes: virtual router ID1, virtual IP address  
202.38.160.111, switch A as the Master and switch B as the Backup allowed  
preemption.  
41-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
II. Networking diagram  
10.2.3.1  
Host B  
Internet  
VLAN-interface3: 10.100.10.2  
Switch_A  
Switch_B  
VLAN-interface2: 202.38.160.1  
VLAN-interface2: 202.38.160.2  
Virtual IP address: 202.38.160.111  
202.38.160.3  
Host A  
Figure 41-3 Network diagram for VRRP configuration  
III. Configuration Procedure  
Configure switch A  
Configure VLAN 2.  
[LSW-A] vlan 2  
[LSW-A-vlan2] interface vlan 2  
[LSW-A-vlan-interface2] ip address 202.38.160.1 255.255.255.0  
[LSW-A-vlan-interface2] quit  
Configure VRRP.  
[LSW-A] vrrp ping-enable  
[LSW-A] interface vlan 2  
[LSW_A-vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111  
[LSW_A-vlan-interface2] vrrp vrid 1 priority 110  
[LSW-A-vlan-interface2] vrrp vrid 1 preempt-mode  
Configure switch B  
Configure VLAN2.  
[LSW-B] vlan 2  
[LSW-B-vlan2] interface vlan 2  
41-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
[LSW-B-vlan-interface2] ip address 202.38.160.2 255.255.255.0  
[LSW-B-vlan-interface2] quit  
Configure VRRP.  
[LSW-B] vrrp ping-enable  
[LSW-B] interface vlan 2  
[LSW-B-vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111  
[LSW-B-vlan-interface2] vrrp vrid 1 preempt-mode  
The virtual router can be used soon after configuration. Host Acan configure the default  
gateway as 202.38.160.111.  
Under normal conditions, switch A functions as the gateway, but when switch A is  
turned off or malfunctioning, switch B will function as the gateway instead.  
Configure preemption mode for switch A, so that it can resume its gateway function as  
the Master after recovery.  
41.4.2 VRRP Tracking Interface Example  
I. Networking requirements  
Even when switch A is still functioning, it may want switch B to function as gateway  
when the Internet interface connected with it does not function properly. This can be  
implemented by configuration of tracking interface.  
In simple language, the virtual router ID is set as 1 with additional configurations of  
authorization key and timer.  
II. Networking diagram  
III. Configuration Procedure  
Configure switch A  
Configure VLAN2.  
[LSW-A] vlan 2  
[LSW-A-vlan2] interface vlan 2  
[LSW-A-vlan-interface2] ip address 202.38.160.1 255.255.255.0  
[LSW-A-vlan-interface2] quit  
Enable the function to ping the virtual IP address of virtual router.  
[SW8800LSW-A ] vrrp ping-enable  
Create a virtual router.  
[LSW-A] interface vlan 2  
41-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
[LSW_A-vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111  
Set the priority for the virtual router.  
[LSW_A-vlan-interface2] vrrp vrid 1 priority 110  
Set the authentication key for the virtual router.  
[LSW_A-vlan-interface2] vrrp authentication-mode md5 switch  
Set Master to send VRRP packets every 5 seconds.  
[LSW_A-vlan-interface2] vrrp vrid 1 timer advertise 5  
Track an interface.  
[LSW_A-vlan-interface2] vrrp vrid 1 track vlan-interface 3 reduced 30  
Configure switch B  
Configure VLAN2.  
[LSW-B] vlan 2  
[LSW-B-vlan2] interface vlan 2  
[LSW-B-vlan-interface2] ip address 202.38.160.2 255.255.255.0  
[LSW-B-vlan-interface2] quit  
Enable the function to ping the virtual IP address of virtual router.  
[SW8800LSW-B] vrrp ping-enable  
Create a virtual router.  
[LSW-B] interface vlan 2  
[LSW_B-vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111  
Set the authentication key for the virtual router.  
[LSW_B-vlan-interface2] vrrp authentication-mode md5 switch  
Set Master to send VRRP packets every 5 seconds.  
[LSW_B-vlan-interface2] vrrp vrid 1 timer advertise 5  
Under normal conditions, switch A functions as the gateway, but when the interface  
vlan-interface 3 of switch A is down, its priority will be reduced by 30, lower than that of  
switch B so that switch B will preempt the Master for gateway services instead.  
When vlan-interface3, the interface of switch A, recovers, this switch will resume its  
gateway function as the Master.  
41.4.3 Multiple Virtual Routers Example  
I. Networking requirements  
A Switch can function as the backup switch for many virtual routers.  
Such a multi-backup configuration can implement load balancing. For example, switch  
A as the Master switch of virtual router 1 can share the responsibility of the backup  
41-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
switch for virtual router 2 and vice versa for switch B. Some hosts employ virtual router  
1 as the gateway, while others employ virtual router 2 as the gateway. In this way, both  
load balancing and mutual backup are implemented.  
II. Networking diagram  
III. Configuration Procedure  
Configure switch A  
Configure VLAN2.  
[LSW-A] vlan 2  
[LSW-A-vlan2] interface vlan 2  
[LSW-A-vlan-interface2] ip address 202.38.160.1 255.255.255.0  
Create virtual router 1.  
[LSW_A-vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111  
Set the priority for the virtual router.  
[LSW_A-vlan-interface2] vrrp vrid 1 priority 150  
Create virtual router 2.  
[LSW_A-vlan-interface2] vrrp vrid 2 virtual-ip 202.38.160.112  
Configure switch B  
Configure VLAN2.  
[LSW-B] vlan 2  
[LSW-B-vlan2] interface vlan 2  
[LSW-B-vlan-interface2] ip address 202.38.160.2 255.255.255.0  
Create virtual router 1.  
[LSW_B-vlan-interface2] vrrp vrid 1 virtual-ip 202.38.160.111  
Create virtual router 2.  
[LSW_B-vlan-interface2] vrrp vrid 2 virtual-ip 202.38.160.112  
Set the priority for the virtual router.  
[LSW_B-vlan-interface2] vrrp vrid 2 priority 110  
Note:  
Multiple virtual routers are often used in actual network applications.  
41-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 41 VRRP Configuration  
41.5 Troubleshooting VRRP  
As the configuration of VRRP is not very complicated, almost all the malfunctions can  
be found through viewing the configuration and debugging information. Here are some  
possible failures you might meet and the corresponding troubleshooting methods.  
I. Fault 1: Frequent prompts of configuration errors on the console  
This indicates that an incorrect VRRP packet has been received. It may be because of  
the inconsistent configuration of another switch within the virtual router, or the attempt  
of some devices to send out illegal VRRP packets. The first possible fault can be solved  
through modifying the configuration. And as the second possibility is caused by the  
malicious attempt of some devices, non-technical measures should be resorted to.  
II. Fault 2: More than one Masters existing within the same virtual router  
There are also 2 reasons. One is short time coexistence of many Master switches,  
which is normal and needs no manual intervention. Another is the long time  
coexistence of many Master switches, which may be because switches in the virtual  
router cannot receive VRRP packets from each other, or receive some illegal packets.  
To solve such problems, an attempt should be made to ping among the many Master  
switches, and if such an attempt fails, check the device connectivity. If they can be  
pinged, check the VRRP configuration. For the configuration of the same VRRP virtual  
router, complete consistence for the number of virtual IP addresses, each virtual IP  
address, timer duration and authentication type must be guaranteed.  
III. Fault 3: Frequent switchover of VRRP state  
Such problem occurs when the virtual router timer duration is set too short. So the  
problem can be solved through prolonging this duration or configuring the preemption  
delay.  
41-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 42 HA Configuration  
Chapter 42 HA Configuration  
42.1 Introduction to HA  
HA (high availability) is to achieve a high availability of the system and to recover the  
system as soon as possible in the event of Fabric failures so as to shorten the MTBF  
(Mean Time Between Failure) of the system.  
The functions of HA are mainly implemented by the application running on the Fabric  
and slave board. The two boards are working in the master-slave mode: one board  
works in master mode, the other work in slave mode. If the master-slave system  
detects a fault in the Fabric, a hot master-slave switchover will be performed  
automatically. The slave board will try to connect and control the system bus while the  
original Fabric will try to disconnect from the bus. Thus, the master-slave switchover of  
the active system is completed, and at the same time the original Fabric is reset to  
recover as soon as possible and then function as the slave board. Even if the Fabric  
fails, the slave board can also take its role to ensure the normal operation, and the  
system can recover as soon as possible.  
The Switch 8800 supports hot swap of Fabric and slave board. The hot swap of  
Fabricss will cause master-slave switchover.  
The Switch 8800 supports manual master-slave switchover. You can change the  
current board state manually by executing command.  
The configuration file of slave is copied from the Fabric at the same time. This can  
ensure that the slave system continues to operate in the same configuration as that of  
the original active system after the slave system has taken place of the active system.  
The Switch 8800 supports automatic synchronization. The active system stores its  
configuration file and backup the configuration file to the slave system simultaneously  
when the master's configuration file is modified, ensuring the consistency of the  
configurations of the active system and slave system.  
Besides, the system can monitor the power supply and the working environment of the  
system and give timely alarms to avoid the escalation of failures and ensure safe  
operations of the system.  
42.2 Configuring HA  
The following sections describe the HA configuration tasks:  
z
z
z
z
42-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 42 HA Configuration  
z
42.2.1 Restarting the Slave System Manually  
In the environment in which the slave system is available, the user can restart the slave  
system manually.  
Perform the following configuration in user view.  
Table 42-1 Restart the slave system manually  
Operation  
Command  
Restart the slave system manually  
slave restart  
42.2.2 Starting the Master-Slave Switchover Manually  
In the environment in which the slave board is available and master in real-time backup  
state, the user can inform the slave board of a master-slave switchover by using a  
command if he expects the slave board to operate in place of the Fabric. After the  
switchover, the slave board will control the system and the original Fabric will be forced  
to reset.  
Perform the following configuration in user view.  
Table 42-2 Start the master-slave switchover manually  
Operation  
Command  
slave switchover  
Start the master-slave switchover  
manually  
The switchover manually will be ineffective if user set the system forbid master-slave  
switchover manually.  
42.2.3 Enabling/Disabling Automatic Synchronization  
The Switch 8800 supports automatic synchronization. The active system stores its  
configuration file and backup the configuration file to the slave system simultaneously  
when the master's configuration file is modified, ensuring the consistency of the  
configurations of the active system and slave system.  
You can enable/disable automatic synchronize of the Switch 8800.  
Perform the following configuration in system view.  
42-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 42 HA Configuration  
Table 42-3 Enable/Disable automatic synchronization  
Operation  
Command  
Enable automatic synchronization  
Disable automatic synchronization  
slave auto-update config  
undo slave auto-update config  
By default, the automatic synchronization of system is enabled.  
42.2.4 Synchronizing the Configuration File Manually  
Although the system can perform the synchronization automatically, the  
synchronization can occur only when the Fabric saves its configuration file. If the user  
expects to determine the backup of the configuration file by himself, he can do it  
manually to backup the configuration file saved in the Fabric.  
Perform the following configuration in user view.  
Table 42-4 Synchronize the configuration file manually  
Operation  
Command  
Synchronize the configuration file  
manually  
slave update configuration  
This operation can backup the configuration file to the slave board only if a slave  
system is available. The configuration file will be fully copied once at every time the  
operation is executed.  
42.2.5 Configuring the Load Mode of the Fabric and Slave Board  
The Switch 8800 supports two kinds of load modes (balance and single) between the  
Fabric and slave board. You can use the xbar command to configure XBar (cross bar)  
load mode.  
Perform the following configuration in system view.  
Table 42-5 Configure the XBar load mode  
Operation  
Command  
Configure the load mode of the Fabric  
and slave board  
xbar [ load-balance | load-single ]  
By default, the load mode of the Fabric and slave board is load-single.  
42-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 42 HA Configuration  
Caution:  
When a single Fabric is in position, the load-balance mode is not effective and the  
Fabric changes to the load-single mode automatically.  
42.3 Displaying and Debugging HA Configuration  
After the above configuration, execute display command in relevant view to display the  
running of the ACL configuration, and to verify the configuration. Execute debugging  
command in user view to enable HA module debugging function.  
Perform the following configuration in relevant view.  
Table 42-6 Display and debug HA configuration  
Operation  
Command  
Display the status of the Fabric and  
slave board(any view)  
display switchover state [ slot-id ]  
Display the load mode of the Fabric and  
slave board(system view)  
display xbar  
Enable the debugging information debugging ha { all | event | message |  
output of the HA module(user view) state }  
Disable the debugging information undo debugging ha { all | event |  
output of the HA module(user view) message | state }  
42-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
Chapter 43 File System Management  
43.1 File System Configuration  
43.1.1 File System Overview  
The Ethernet switch provides a file system module for user’s efficient management  
over the storage devices such as flash memory. The file system offers file access and  
directory management, mainly including creating the file system, creating, deleting,  
modifying and renaming a file or a directory and opening a file.  
By default, the file system needs user’s confirmation before executing the commands,  
such as deleting or overwriting a file, which may make losses.  
Based on the operated objects, the file system operation can be divided as follows. The  
following sections describe the file system configuration tasks.  
z
z
z
z
Note:  
The Switch 8800 supports master board and slave board. The two boards both have  
file system. User can operate the file on the two boards. In the case user operate the  
file on slave board, the file directory or URL should be started with “slot[No.]#flash:/”,  
the [No.] is the slave board number. For example, suppose slot 1 is slave board,  
“text.txt” file URL on slave board should be “slot1#flash:/text.txt”.  
Note:  
The limitation on the names of directories and files on switch are as follows:  
z
The name of one direction or file can be up to 64 characters long.  
The total number of characters including device, directory and file names can be up  
to 136 characters long.  
z
43-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
43.1.2 Directory Operation  
The file system can be used to create or delete a directory, display the current working  
directory, and display the information about the files or directories under a specified  
directory. You can use the following commands to perform directory operations.  
Perform the following configuration in user view.  
Table 43-1 Directory operation  
Operation  
Command  
mkdir directory  
Create a directory  
Delete a directory  
rmdir directory  
pwd  
Display the current working directory  
Display the information about directories or files  
Change the current directory  
dir [ / all ] [ file-url ]  
cd directory  
43.1.3 File Operation  
The file system can be used to delete or undelete a file and permanently delete a file.  
Also, it can be used to display file contents, rename, copy and move a file and display  
the information about a specified file. You can use the following commands to perform  
file operations.  
Perform the following configuration in user view.  
Table 43-2 File operation  
Operation  
Command  
delete [ /unreserved ] file-url  
undelete file-url  
Delete a file  
Undelete a file  
Delete a file from the recycle bin permanently reset recycle-bin [ file-url ]  
View contents of a file  
Rename a file  
Copy a file  
more file-url  
rename fileurl-source fileurl-dest  
copy fileurl-source fileurl-dest  
move fileurl-source fileurl-dest  
Move a file  
Display the information about directories or  
files  
dir [ / all ] [ file-url ]  
Execute the specified batch file (system view) execute filename  
43-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
Caution:  
When you use the delete command without the unreserved option to delete a file, the  
file is in fact saved in the recycle bin and still occupies some of the storage space. So,  
the frequent uses of this command may results in insufficient storage space of the  
Ethernet switch; in this case, you should find out the unused files kept in the recycle bin  
and permanently delete them with the reset recycle-bin command to reclaim the  
storage space.  
Note:  
The directory and file names on the switch have the following limitation:  
z
The maximum length of a directory or file name is 64 characters.  
The maximum length of a full path name (containing the device name, directory  
name and file name) is 136 characters.  
z
z
The move command takes effect only when the source and destination files are in  
the same device.  
43.1.4 Storage Device Operation  
The file system can be used to format a specified memory device. You can use the  
following commands to format a specified memory device.  
Switch supports compact flash (CF) card. After a CF card is inserted successfully, you  
can use such common commands as dir, cd, copy, delete, move to perform  
operations on the files in the card. You can also stop the CF card through a command  
before dismounting it.  
Perform the following configuration in user view.  
Table 43-3 Storage device operation  
Operation  
Command  
format filesystem  
Format the storage device  
Restore the space of the storage device fixdisk device  
Delete the CF card  
umount device  
Note: The error message “% Device can’t be found or file can’t be found in the  
directory” can indicate that the CF card is not formatted.  
43-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
43.1.5 Setting the Prompt Mode of the File System  
The following command can be used for setting the prompt mode of the current file  
system.  
Perform the following configuration in system view.  
Table 43-4 File system operation  
Operation  
Command  
Set the file system prompt mode.  
file prompt { alert | quiet }  
43.2 Configuration File Management  
43.2.1 Configuration File Management Overview  
The management module of configuration file provides a user-friendly operation  
interface. It saves the configuration of the Ethernet switch in the text format of  
command line to record the whole configuration process. Thus you can view the  
configuration information conveniently.  
The format of configuration file includes:  
z
z
z
It is saved in the command format.  
Only the non-default constants will be saved  
The organization of commands is based on command views. The commands in  
the same command mode are sorted in one section. The sections are separated  
with a blank line or a comment line (A comment line begins with exclamation mark  
“#”).  
z
z
Generally, the sections in the file are arranged in the following order: system  
configuration, Ethernet port configuration, vlan interface configuration, routing  
protocol configuration and so on.  
It ends with “end”.  
The following sections describe configuration file management tasks.  
z
z
z
z
43.2.2 Displaying the Current-Configuration and Saved-Configuration of  
Ethernet Switch  
After being powered on, the system will read the configuration files from Flash Memory  
for the initialization of the device. (Such configuration files are called  
saved-configuration files). If there is no configuration file in Flash Memory, the system  
43-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
will begin the initialization with the default parameters. Relative to the  
saved-configuration, the configuration in effect during the operating process of the  
system is called current-configuration. You can use the following commands to display  
the current-configuration and saved-configuration information of the Ethernet switch.  
Perform the following configuration in any view.  
Table 43-5 Display the configurations of the Ethernet switch  
Operation  
Command  
Display the saved-configuration  
information of the Ethernet switch  
display saved-configuration  
display current-configuration [ controller  
|
[
interface  
interface-number  
interface-type  
configuration  
Display the current-configuration  
information of the Ethernet switch  
]
|
[ configuration ] ] [ | { begin | exclude |  
include } regular-expression ]  
Display the running configuration of  
the current view  
display this  
Note:  
The configuration files are displayed in their corresponding saving formats.  
43.2.3 Modifying and Saving the Current-Configuration  
You can modify the current configuration of Ethernet switch through the CLI. Use the  
save command to save the current-configuration in the Flash Memory, and the  
configurations will become the saved-configuration when the system is powered on for  
the next time.  
Perform the following configuration in user view.  
Table 43-6 Save the current-configuration  
Operation  
Command  
save [ file-name ]  
Save the current-configuration  
Even if the problems like reboot and power-off occur during , the configuration file can  
be still saved to Flash.  
43-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
43.2.4 Erasing Configuration Files from Flash Memory  
The reset saved-configuration command can be used to erase configuration files  
from Flash Memory. The system will use the default configuration parameters for  
initialization when the Ethernet switch is powered on for the next time.  
Perform the following configuration in user view.  
Table 43-7 Erase configuration files from Flash Memory  
Operation  
Command  
Erase configuration files from Flash Memory  
reset saved-configuration  
You may erase the configuration files from the Flash in the following cases:  
z
z
After being upgraded, the software does not match with the configuration files.  
The configuration files in flash are damaged. (A common case is that a wrong  
configuration file has been downloaded.)  
43.2.5 Configuring the Name of the Configuration File Used for the Next  
Startup.  
Perform the following configuration in user view.  
Table 43-8 Configure the name of the configuration file used for the next startup  
Operation  
Command  
Configure the name of the configuration  
file used for the next startup  
startup saved-configuration cfgfile  
cfgfile is the name of the configuration file and its extension name can be “.cfg”. The file  
is stored in the root directory of the storage devices.  
After the above configuration, execute display command in any view to display the  
running of the configuration files, and to verify the effect of the configuration.  
Table 43-9 Display the information of the file used at startup  
Operation  
Command  
Display the information of the file used at startup display startup  
43.3 FTP Configuration  
43-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
Note:  
The system supports FTP services over VPN.  
43.3.1 FTP Overview  
FTP (File Transfer Protocol) is a universal method for transmitting files on the Internet  
and IP networks. In this method, files are copied from one system to another. FTP  
supports definite file types (such as ASCII and Binary) and file structures (byte stream  
and record). Even now, FTP is still used widely, while most users transmit files by Email  
and Web.  
FTP, a TCP/IP protocol on the application layer, is used for transmitting files between a  
remote server and a local host.  
The Ethernet switch provides the following FTP services:  
z
z
FTP server: You can run FTP client program to log in the server and access the  
files on it.  
FTP client: You can run the ftp X.X.X.X command (where, X.X.X.X represents the  
IP address of the remote FTP server) to set up a connection between the Ethernet  
switch and a remote FTP server to access the files on the remote server.  
Network  
Switch  
Figure 43-1 FTP configuration  
PC  
Table 43-10 lists the configuration of the switch as FTP client.  
Table 43-10 Configuration of the switch as FTP client  
Device  
Configuration  
Default  
Description  
You need first get FTP user  
command and password, and  
then log into the remote FTP  
server. Then you can get the  
directory and file authority.  
Log into the remote FTP  
Switch server directly with the ftp  
command.  
Start FTP server and make  
PC  
such settings as username,  
password, and authority.  
43-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
Table 43-11 lists the configuration of the switching as FTP server.  
Table 43-11 Configuration of the switch as FTP server  
Device  
Configuration  
Default  
Description  
You can view the configuration  
FTP server information of FTP server with  
is disabled. the  
display ftp-server  
command.  
Start FTP server.  
Configure authentication  
and authorization for  
FTP server.  
Configure username, password  
and authorized directory for  
FTP users.  
Switch  
Configure  
parameters for FTP  
server.  
running  
Configure timeout time value  
for FTP server.  
Log into the switch from  
FTP client.  
PC  
Caution:  
The prerequisite for normal FTP function is that the switch and PC are reachable.  
43.3.2 Enabling/Disabling FTP Server  
You can use the following commands to enable/disable the FTP server on the switch.  
Perform the following configuration in system view.  
Table 43-12 Enable/disable FTP Server  
Operation  
Enable the FTP server  
Disable the FTP server  
Command  
ftp server enable  
undo ftp server  
FTP server supports multiple users to access at the same time. A remote FTP client  
sends request to the FTP server. Then, the FTP server will carry out the corresponding  
operation and return the result to the client.  
By default, FTP server is disabled.  
43.3.3 Configuring the FTP Server Authentication and Authorization  
The authorization information of FTP server includes the path to the desired directory  
for FTP users. The FTP server service is available only for the authenticated and  
43-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
authorized users. You can use the following commands to configure FTP server  
authentication and authorization. The authorization information of FTP server includes  
the top working directory provided for FTP clients.  
Perform the following configuration in corresponding view.  
Table 43-13 Configure the FTP Server Authentication and Authorization  
Operation  
Command  
local-user { username | multicast [ domain  
Create new local user and enter domain-name  
]
ipaddress  
|
|
local user view(system view)  
password-display-mode  
{
auto  
cipher-force } }  
undo local-user  
{
username  
|
all  
[ service-type { ftp | lan-access | telnet | ppp  
| ssh | terminal } ] | multicast [ domain  
Delete local user(system view)  
domain-name  
]
ipaddress  
|
password-display-mode }  
Configure password for local  
user(local user view)  
password { cipher | simple } password  
Configure service type for local service-type { ftp [ ftp-directory directory ] |  
user(local user view)  
lan-access | telnet [ level level ] }  
Cancel password for local  
user(local user view)  
undo password  
Cancel service type for local undo service-type { ftp [ ftp-directory ] |  
user(local user view) lan-access | telnet [ level level ] }  
Only the clients who have passed the authentication and authorization successfully can  
access the FTP server.  
43.3.4 Configuring the Running Parameters of FTP Server  
You can use the following commands to configure the connection timeout of the FTP  
server. If the FTP server receives no service request from the FTP client for a period of  
time, it will cut the connection to it, thereby avoiding the illegal access from the  
unauthorized users. The period of time is FTP connection timeout.  
Perform the following configuration in system view.  
Table 43-14 Configuring FTP server connection timeout  
Operation  
Command  
Configure FTP server connection timeouts  
ftp timeout minute  
Restoring the default FTP server connection timeouts undo ftp timeout  
By default, the FTP server connection timeout is 30 minutes.  
43-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
43.3.5 Displaying and Debugging FTP Server  
After the above configuration, execute display command in any view to display the  
running of the FTP Server configuration, and to verify the effect of the configuration.  
Table 43-15 Display and debug FTP Server  
Operation  
Command  
display ftp-server  
display ftp-user  
Display FTP server  
Display the connected FTP users.  
The display ftp-server command can be used for displaying the configuration  
information about the current FTP server, including the maximum amount of users  
supported by FTP server and the FTP connection timeout. The display ftp-user  
command can be used for displaying the detail information about the connected FTP  
users.  
43.3.6 Disconnecting an FTP User  
Perform the following configuration in system view.  
Table 43-16 Disconnect an FTP user  
Operation  
Command  
ftp disconnect user-name  
Disconnect an FTP user.  
43.3.7 Introduction to FTP Client  
As an additional function provided by Ethernet switch, FTP client is an application  
module and has no configuration functions. The switch connects the FTP clients and  
the remote server and inputs the command from the clients for corresponding  
operations (such as creating or deleting a directory).  
43.3.8 FTP Client Configuration Example  
I. Network requirements  
The switch serves as FTP client and the remote PC as FTP server. The configuration  
on FTP server: Configure an FTP user named as switch, with password hello and with  
read & write authority over the Switch root directory on the PC. The IP address of a  
VLAN interface on the switch is 1.1.1.1, and that of the PC is 2.2.2.2. The switch and  
PC are reachable.  
43-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
The switch application switch.app is stored on the PC. Using FTP, the switch can  
download the switch.app from the remote FTP server and upload the vrpcfg.cfg to the  
FTP server under the switch directory for backup purpose.  
II. Network diagram  
Network  
Switch  
PC  
Figure 43-2 Network diagram for FTP configuration  
III. Configuration procedure  
1) Configure FTP server parameters on the PC: a user named as switch, password  
hello, read and write authority over the Switch directory on the PC.  
2) Configure the switch  
Log into the switch through the Console port locally or Telnet remotely.  
Then type in the right command in user view to establish FTP connection, then correct  
username and password to log into the FTP server.  
<SW8800> ftp 2.2.2.2  
Trying ...  
Press CTRL+K to abort  
Connected.  
220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user  
User(none):switch  
331 Give me your password, please  
Password:*****  
230 Logged in successfully  
[ftp]  
Caution:  
If the Flash Memory of the switch is not enough, you need to first delete the existing  
programs in the Flash Memory and then upload the new ones.  
Enter the authorized directory of the FTP server.  
[ftp] cd switch  
43-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
Use the put command to upload the vrpcfg.cfg to the FTP server.  
[ftp] put vrpcfg.cfg  
Use the get command to download the switch.app from the FTP server to the Flash  
directory on the FTP server.  
[ftp] get switch.app  
Use the quit command to release FTP connection and return to user view.  
[ftp] quit  
<SW8800>  
Use the boot boot-loader command to specify the downloaded program as the  
application at the next login and reboot the switch.  
<SW8800> boot boot-loader switch.app  
<SW8800> reboot  
43.3.9 FTP Server Configuration Example  
I. Network requirements  
Switch serves as FTP server and the remote PC as FTP client. The configuration on  
FTP server: Configure an FTP user named as switch, with password hello and with  
read & write authority over the flash root directory on the PC. The IP address of a VLAN  
interface on the switch is 1.1.1.1, and that of the PC is 2.2.2.2. The switch and PC are  
reachable.  
The switch application switch.app is stored on the PC. Using FTP, the PC can upload  
the switch.app from the remote FTP server and download the vrpcfg.cfg from the FTP  
server for backup purpose.  
II. Network diagram  
Network  
Switch  
PC  
Figure 43-3 Network diagram for FTP configuration  
III. Configuration procedure  
1) Configure the switch  
Log into the switch through the console port locally or Telnet remotely, and start FTP  
function and set username, password and file directory.  
43-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
[SW8800] ftp server enable  
[SW8800] local-user switch  
[SW8800-luser-switch] service-type ftp ftp-directory flash:  
[SW8800-luser-switch] password simple hello  
2) Run FTP client on the PC and establish FTP connection. Upload the switch.app to  
the switch under the Flash directory and download the vrpcfg.cfg from the switch.  
FTP client is not shipped with the switch, so you need to buy it separately.  
Caution:  
If the Flash Memory of the switch is not enough, you need to first delete the existing  
programs in the Flash Memory and then upload the new ones.  
3) When the uploading is completed, initiate file upgrade on the switch.  
Use the boot boot-loader command to specify the downloaded program as the  
application at the next login and reboot the switch.  
<SW8800> boot boot-loader switch.app  
<SW8800> reboot  
43.4 TFTP Configuration  
43.4.1 TFTP Overview  
Trivial File Transfer Protocol (TFTP) is a simple file transmission protocol. It is initially  
designed for the booting of free-disk systems (work stations or X terminals in general).  
Compared with FTP, another file transmission protocol, TFTP has no complicated  
interactive access interface or authentication control, and therefore it can be used  
when there is no complicated interaction between the clients and server. TFTP is  
implemented on the basis of UDP.  
TFTP transmission is originated from the client end. To download a file, the client sends  
a request to the TFTP server and then receives data from it and sends  
acknowledgement to it. To upload a file, the client sends a request to the TFTP server  
and then transmits data to it and receives the acknowledgement from it. TFTP transmits  
files in two modes, binary mode for program files and ASCII mode for text files.  
The administrator needs to configure the IP addresses of TFTP client and server before  
configuring TFTP, and makes sure that the route between the client and server is  
reachable.  
The switch can only function as a TFTP client.  
43-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
Network  
Switch  
PC  
Figure 43-4 TFTP configuration  
Table 43-17 lists the configuration of the switch as TFTP client.  
Table 43-17 Configuration of the switch as TFTP client  
Device  
Configuration  
Default  
Description  
TFTP is right for the case where no  
Configure IP address for  
the VLAN interface of  
the switch, in the same  
network segment as that  
of TFTP server.  
complicated  
interactions  
are  
required between the client and  
server. Make sure that the route is  
reachable between the switch and  
the TFTP server.  
Switch  
Use the tftp command to  
log into the remote TFTP  
server for file uploading  
and downloading.  
Start TFTP server and  
set authorized TFTP  
directory.  
PC  
43.4.2 Downloading Files by Means of TFTP  
To download a file, the client sends a request to the TFTP server and then receives  
data from it and sends acknowledgement to it. You can use the following commands to  
download files by means of TFTP.  
Perform the following configuration in user view.  
Table 43-18 Download files by means of TFTP  
Operation  
Command  
Download files by means of TFTP  
tftp tftp-server get source-file [ dest-file ]  
In the command, tftp-server indicates the IP address or host name of TFTP server;  
source-file indicates the file information to be downloaded from TFTP server; dest-file  
indicates the name of the file downloaded on switch.  
43-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
43.4.3 Uploading Files by Means of TFTP  
To upload a file, the client sends a request to the TFTP server and then transmits data  
to it and receives the acknowledgement from it. You can use the following commands to  
upload files.  
Perform the following configuration in user view.  
Table 43-19 Upload files by means of TFTP  
Operation  
Command  
Upload files by means of TFTP  
tftp tftp-server put source-file [ dest-file ]  
In the command, source-file indicates the file to be uploaded to server; dest-file  
indicates the saving directory on TFTP server; tftp-server indicates the IP address or  
host name of TFTP server.  
43.4.4 TFTP Client Configuration Example  
I. Network requirements  
The switch serves as TFTP client and the remote PC as TFTP server. Authorized TFTP  
directory is set on the TFTP server. The IP address of a VLAN interface on the switch is  
1.1.1.1, and that of the PC is 1.1.1.2.  
The switch application switch.app is stored on the PC. Using TFTP, the switch can  
download the switch.app from the remote TFTP server and upload the vrpcfg.cfg to the  
TFTP server under the switch directory for backup purpose.  
II. Network diagram  
Network  
Switch  
PC  
Figure 43-5 Network diagram for TFTP configuration  
III. Configuration procedure  
1) Start TFTP server on the PC and set authorized TFTP directory.  
2) Configure the switch  
Log into the switch (through local console or remote Telnet, refer to the Getting Started  
for login information), and then enter the system view.  
43-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 43 File System Management  
<SW8800> system-view  
[SW8800]  
Caution:  
If the Flash Memory of the switch is not enough, you need to first delete the existing  
programs in the Flash Memory and then upload the new ones.  
Configure IP address 1.1.1.1 for the VLAN interface, ensure the port connecting the PC  
is also in this VALN (VLAN 1 in this example).  
[SW8800] interface vlan 1  
[SW8800-vlan-interface1] ip address 1.1.1.1 255.255.255.0  
[SW8800-vlan-interface1] quit  
Enter system view and download the switch.app from the TFTP server to the Flash  
Memory of the switch.  
<SW8800> tftp 1.1.1.2 get switch.app switch.app  
Upload the vrpcfg.cfg to the TFTP server.  
<SW8800> tftp 1.1.1.2 put vrpcfg.cfg vrpcfg.cfg  
Use the boot boot-loader command to specify the downloaded program as the  
application at the next login and reboot the switch.  
<SW8800> boot boot-loader switch.app  
<SW8800> reboot  
43-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 44 MAC Address Table Management  
Chapter 44 MAC Address Table Management  
44.1 MAC Address Table Management Overview  
An Ethernet Switch maintains a MAC address table for fast forwarding packets. A table  
entry includes the MAC address of a device and the port ID of the Ethernet switch  
connected to it. The dynamic entries (not configured manually) are learned by the  
Ethernet switch. The Ethernet switch learns a MAC address in the following way: after  
receiving a data frame from a port (assumed as port A), the switch analyzes its source  
MAC address (assumed as MAC_SOURCE) and considers that the packets destined  
at MAC_SOURCE can be forwarded through the port A. If the MAC address table  
contains the MAC_SOURCE, the switch will update the corresponding entry; otherwise,  
it will add the new MAC address (and the corresponding forwarding port) as a new  
entry to the table.  
The system forwards the packets whose destination addresses can be found in the  
MAC address table directly through the hardware and broadcasts those packets whose  
addresses are not contained in the table. The network device will respond after  
receiving a broadcast packet and the response contains the MAC address of the device,  
which will then be learned and added into the MAC address table by the Ethernet  
switch. The consequent packets destined the same MAC address can be forwarded  
directly thereafter.  
MAC Address  
MACA  
Port  
1
1
2
2
MACB  
MACC  
......  
MACD MACA  
Port 1  
MACD  
......  
MACD MACA  
Port 2  
Figure 44-1 The Ethernet switch forwards packets with MAC address table  
The Ethernet switch also provides the function of MAC address aging. If the switch  
receives no packet for a period of time, it will delete the related entry from the MAC  
address table. However, this function takes no effect on the static MAC addresses.  
44-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 44 MAC Address Table Management  
You can configure (add or modify) the MAC address entries manually according to the  
actual networking environment. The entries can be static ones or dynamic ones.  
44.2 MAC Address Table Management Configuration  
The following sections describe the MAC address table management configuration  
tasks.  
z
z
z
44.2.1 Setting MAC Address Table Entries  
Administrators can manually add, modify, or delete the entries in MAC address table  
according to the actual needs. They can also delete all the (unicast) MAC address table  
entries related to a specified port or delete a specified type of entries, such as dynamic  
entries or static entries.  
You can use the following commands to add, modify, or delete the entries in MAC  
address table.  
Perform the following configuration in system view.  
Table 44-1 Set MAC address table entries  
Operation  
Command  
mac-address { static | dynamic } mac-addr  
Add/Modify an address entry interface  
{
interface-name  
|
interface-type  
interface-num } vlan vlan-id  
undo mac-address  
[
static  
|
dynamic  
]
[
mac-addr interface interface-name  
[
{
|
Delete an address entry  
interface-type interface-num } ] vlan vlan-id |  
interface interface-name interface-type  
interface-num } | vlan vlan-id ]  
{
|
44.2.2 Setting MAC Address Aging Time  
The setting of an appropriate aging time can effectively implement the function of MAC  
address aging. Too long or too short aging time set by subscribers will cause the  
problem that the Ethernet switch broadcasts a great mount of data packets without  
MAC addresses, which will affect the switch operation performance.  
If aging time is set too long, the Ethernet switch will store a great number of out-of-date  
MAC address tables. This will consume MAC address table resources and the switch  
will not be able to update MAC address table according to the network change.  
44-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 44 MAC Address Table Management  
If aging time is set too short, the Ethernet switch may delete valid MAC address table.  
You can use the following commands to set the MAC address aging time for the  
system.  
Perform the following configuration in system view.  
Table 44-2 Set the MAC address aging time for the system  
Operation  
Command  
Set the dynamic MAC address aging mac-address timer  
{
aging age  
|
time  
no-aging }  
Restore the default MAC address  
aging time  
undo mac-address timer aging  
In addition, this command takes effect on all the ports. However the address aging only  
functions on the dynamic addresses (the learned or configured as age entries by the  
user).  
By default, the aging-time is 300 seconds. With the no-aging parameter, the command  
performs no aging on the MAC address entries.  
Caution:  
The dynamic MAC address aging is completed during the second aging cycle.  
44.3 Maximum MAC Address Number Learned by Ethernet  
Port and Forwarding Option Configuration  
With MAC address learning, an Ethernet switch can obtain MAC addresses of every  
network devices on network segments connecting to a port. As for packets destined to  
those MAC addresses, the switch directly uses hardware to forward them. An overlarge  
MAC address table may cause the low forwarding performance of the switch.  
You can control the number of entries of the MAC address table by setting the  
maximum number of MAC addresses learned by a port. if you set the value to count,  
and when the number of MAC addresses learned by the port reaches this value, this  
port will no longer learn any more MAC addresses.  
You can also set the switch to drop corresponding packets when the number of MAC  
addresses learned by the port exceeds the configured threshold.  
44-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 44 MAC Address Table Management  
44.3.1 Maximum MAC Address Number Learned by a Port and Forwarding  
Option Configuration Tasks  
Maximum MAC address number learned by a port and forwarding option configuration  
tasks are described in the following table:  
Table 44-3 Configure the maximum number of MAC addresses learned by a port and  
forwarding option  
Sequence  
number  
Configuration item  
Command  
<SW8800>  
Description  
1
2
Enter system view  
system-view  
The port can be an  
Ethernet port or a  
GigabitEthernet  
port.  
[SW8800]  
interface  
Enter Ethernet port  
view  
{
interface_type  
interface_num  
interface_name }  
|
Ethernet port view  
prompt is related to  
the port you choose  
[SW8800-EthernetX/1/  
X]  
mac-address  
By default, the  
switch has no limit  
on the maximum  
number of MAC  
addresses learned  
by a port  
max-mac-count count  
Set the maximum  
number of MAC or  
addresses learned  
3
[SW8800-GigabitEther  
netX/1/X]  
mac-address  
by an Ethernet port  
max-mac-count count  
[SW8800-EthernetX/1/  
X] undo mac-address  
max-mac-count  
By default, the  
Set the switch to  
drop the packets  
whose source MAC  
addresses are not  
learned by the port  
when the number of  
switch  
packets  
source  
forwards  
whose  
MAC  
enable forward  
or  
addresses are not  
leaned by the port  
when the number of  
4
[SW8800-GigabitEther  
netX/1/X]  
undo  
MAC  
addresses  
MAC  
learned  
addresses  
exceeds  
mac-address  
max-mac-count  
enable forward  
learned exceeds the  
threshold value  
the threshold value  
44-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 44 MAC Address Table Management  
Sequence  
number  
Configuration item  
Command  
Description  
Set the maximum  
number of MAC  
addresses learned  
by an Ethernet port,  
[SW8800-EthernetX/1/  
X]  
mac-address  
and  
when  
the  
By default, the  
switch has no limit  
on the maximum  
number of MAC  
addresses learned  
by a port.  
max-mac-count count  
current number of  
MAC  
exceeds  
threshold  
whether the switch  
forwards packets or  
gives the network  
addresses or  
5
the  
value,  
[SW8800-EthernetX/1/  
X]mac-address  
max-mac-count  
enable forward alarm  
administrator  
alarm,  
an  
Use the corresponding undo command to cancel the configuration.  
44.3.2 Configuring Maximum MAC Address Number Learned by Ethernet  
Port and Forwarding Option Example  
I. Network requirements  
z
Set the maximum number of MAC addresses learned by Ethernet port  
Ethernet3/1/3 to 600  
z
Set the switch to drop the packets whose source MAC addresses are not learned  
by the port when the number of MAC addresses learned exceeds 600  
II. Configuration procedure  
1) Enter system view.  
<SW8800> system-view  
[SW8800]  
2) Enter Ethernet port view.  
[SW8800] interface ethernet 3/1/3  
3) Set the maximum number of MAC addresses learned by Ethernet port  
Ethernet3/1/3 to 600.  
[SW8800-Ethernet3/1/3] mac-address max-mac-count 600  
4) Set the switch to drop the packets whose source MAC addresses are not learned  
by the port when the number of MAC addresses learned exceeds 600.  
[SW8800-Ethernet3/1/3] undo mac-address max-mac-count enable forward  
44.4 Displaying and Debugging MAC Address Tables  
After the above configuration, execute the display command in any view to display the  
running of the MAC address table configuration, and to verify the effect of the  
configuration.  
44-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 44 MAC Address Table Management  
Execute the debugging command in user view to debug MAC address table  
configuration.  
Table 44-4 Display and debug MAC address tables  
Operation  
Command  
display mac-address [ mac-addr [ vlan vlan-id ]  
Display the information in the | [ static | dynamic ] [ interface { interface-name  
address table  
| interface-type interface-num } ] [ vlan vlan-id ]  
[ count ] ]  
Display the aging time of  
dynamic address table entries  
display mac-address aging-time  
44.5 Resetting MAC Addresses  
After configuration, use the reset mac-address command in user view to reset the  
configured mac-address table information.  
Table 44-5 Reset MAC addresses  
Operation  
Command  
reset mac-address { all | dynamic | static |  
Reset  
information  
mac-address  
table  
interface  
{
interface_type interface_num  
|
interface_name } | Vlan vlan_number}  
44.6 MAC Address Table Management Configuration  
Example  
I. Network requirements  
The user logs into the switch through the Console port to configure the address table  
management. It is required to set the address aging time to 500s and add a static  
address 00e0-fc35-dc71 to Ethernet2/1/2 in vlan1.  
44-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 44 MAC Address Table Management  
II. Network diagram  
Internet  
Network Port  
Console Port  
Switch  
Figure 44-2 Network diagram for address table management configuration  
III. Configuration procedure  
Enter the system view of the switch.  
<SW8800> system-view  
Add a MAC address (specify the native VLAN, port and state).  
[SW8800] mac-address static 00e0-fc35-dc71 interface ethernet2/1/2 vlan 1  
Set the address aging time to 500s.  
[SW8800] mac-address timer 500  
Display the MAC address configurations in any view.  
[SW8800] display mac-address interface ethernet2/1/2  
MAC ADDR  
VLAN ID  
STATE  
PORT INDEX  
AGING TIME(s)  
00-e0-fc-35-dc-71  
00-e0-fc-17-a7-d6  
00-e0-fc-5e-b1-fb  
00-e0-fc-55-f1-16  
1
1
1
1
Static  
Learned  
Learned  
Learned  
Ethernet2/1/2  
Ethernet2/1/2  
Ethernet2/1/2  
Ethernet2/1/2  
NOAGED  
500  
500  
500  
--- 4 mac address(es) found on port Ethernet2/1/2 ---  
44-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 45 Device management  
Chapter 45 Device management  
45.1 Device Management Overview  
With the device management function, the Ethernet Switch can display the current  
running state and event debugging information about the slots, thereby implementing  
the maintenance and management of the state and communication of the physical  
devices. In addition, there is a command available for rebooting the system, when  
some function failure occurs.  
45.2 Device Management Configuration  
The main device management tasks for you are to check the status of the boards, CPU,  
and the memory usage of the switch.  
The following sections describe the configuration tasks for device management:  
z
z
z
z
z
z
45.2.1 Rebooting the Ethernet Switch  
It would be necessary for users to reboot the Ethernet switch when failure occurs.  
Perform the following configuration in user view.  
Table 45-1 Reboot Ethernet switch  
Operation  
Command  
reboot [ slot slot-no ]  
Root Ethernet switch  
45.2.2 Enabling the Timing Reboot Function  
After you enable the timing reboot function on the switch, the switch will be rebooted on  
the specified time.  
Perform the following configuration in user view, and display schedule reboot  
command can be performed in any view.  
45-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 45 Device management  
Table 45-2 Enable the Timing Reboot Function  
Operation  
Command  
Enable the timing reboot function of the schedule reboot at hh:mm  
switch, and set specified time and date [ yyyy/mm/dd ]  
Enable the timing reboot function of the schedule reboot delay { hhh:mm |  
switch, and set waiting time  
mmm }  
Cancel the parameter configuration of timing  
reboot function of the switch  
undo schedule reboot  
Check the parameter configuration of the  
reboot terminal service of the current switch  
display schedule reboot  
Note:  
The precision of switch timer is 1 minute. The switch will reboot in one minute when  
time comes to the specified rebooting point.  
45.2.3 Designating the APP Adopted on Next Booting  
APP refers to the host application deployed on switch. In the case that there are several  
APPs in the Flash Memory, you can use this command to designate the APP adopted  
when booting the Ethernet switch next time.  
Perform the following configuration in user view.  
Table 45-3 Designate the APP adopted when booting the Ethernet switch next time  
Operation  
Command  
Designate the APP adopted when  
booting the Ethernet switch next time  
boot boot-loader file-url [ slot slot-no ]  
Note:  
The Switch 8800 supports master board and slave board. The two boards both have  
file system. User can operate the file on the two boards. In the case user designate the  
APP adopted on slave board next time, the file directory or URL should be started with  
“slot[No.]#flash:”, the [No.] is the slave board number. For example, suppose slot 1 is  
slave board, “text.txt” file URL on slave board should be “slot1#flash:/text.txt”.  
45-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 45 Device management  
45.2.4 Upgrading BootROM  
You can use followed command to upgrade the BootROM with the BootROM program  
in the Flash Memory. This configuration task facilitates the remote upgrade. You can  
upload the BootROM program file from a remote end to the switch by FTP and then use  
this command to upgrade the BootROM.  
Perform the following configuration in user view.  
Table 45-4 Upgrade BootROM  
Operation  
Command  
Upgrade BootROM  
boot bootrom file-url slot slot-num-list  
Note:  
The Switch 8800 supports master board and slave board. The two boards both have  
file system. User can operate the file on the two boards. In the case user upgrade the  
BootROM adopted on slave board, the file directory or URL should be started with  
“slot[No.]#flash:”, the [No.] is the slave board number. For example, suppose slot 1 is  
slave board, “text.txt” file URL on slave board should be “slot1#flash:/text.txt”.  
When you are upgrading the BootROM on a slave board, the boot code file must be  
present in the local flash.  
45.2.5 Setting Slot Temperature Limit  
The switch system alarms when the temperature on a slot exceeds the preset limit.  
Perform the following configuration in user view.  
Table 45-5 Set slot temperature limit  
Operation  
Command  
Set slot temperature limit  
temperature-limit slot down-value up-value  
Restore temperature limit to  
default value  
undo temperature-limit slot  
45.2.6 Updating Service Processing Boards  
The size of the flash for a main control board in a Switch 8800 is 16 MB, while the size  
of current host software including the host application of service processing board  
reaches over 15MB. If a compact flash (CF) card is not configured, the current flash  
cannot provide enough room to save loading files. Therefore for a Switch 8800 with the  
45-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 45 Device management  
main control board of a 16 MB flash, the service processing board cannot be updated  
according to the original procedure. To update it, you need to execute the following  
command to download host software containing the app file of service processing  
board host application to the system’s synchronous dynamic random access memory  
(SDRAM).  
Note:  
If you configure a CF card or the flash room of a subsequent main control board  
expands to 32MB, you need not to change the method to update boards. Then when  
loading files you only need to choose the APP files containing the application file of  
service processing board to update common interface boards and service processing  
boards.  
The error message “% Device can’t be found or file can’t be found in the directory” can  
indicate that the CF card is not formatted.  
Perform the following configuration in system view.  
Table 45-6 Update service processing boards  
Operation  
Command  
Download the host software of update l3plus slot slot-no filename file-name  
service processing board to ftpserver server-name username user-name  
the system memory  
password password [ port port-num ]  
45.3 Displaying and Debugging Device Management  
After the above configuration, execute display command in any view to display the  
running of the device management configuration, and to verify the effect of the  
configuration.  
Table 45-7 Display and Debug device management  
Operation  
Command  
display device [ detail | [ shelf  
shelf-no ] [ frame frame-no ] [ slot  
slot-no ] ]  
Display the module types and running states  
of each card.  
Display the application deployed on next  
startup  
display boot-loader  
Display the running state of the built-in fans. display fan [ fan-id ]  
Display the Used status of switch memory  
Display the state of the power.  
display memory [ slot slot-no ]  
display power [ powe-ID ]  
45-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Display CPU occupancy  
Chapter 45 Device management  
display cpu [slot slot-no ]  
45.4 Device Management Configuration Example  
45.4.1 Using the Switch as an FTP Client to Implement the Remote Upgrade  
I. Network requirements  
The user logs into the switch using Telnet, downloads the application from the FTP  
server to the flash memory of the switch, and implements remote upgrade using the  
right commands.  
The switch serves as an FTP client and the remote PC as an FTP server. The  
configuration on the FTP server is as follows: an FTP user is configured with the name  
switch, the password hello and the read & write authority over the Switch root directory  
on the PC. The IP address of a VLAN interface on the switch is 1.1.1.1, and the IP  
address of the PC is 2.2.2.2. The switch and PC are reachable with each other.  
The switch applications switch.app and boot.app are stored on the PC. Using FTP,  
these files can be downloaded from the remote FTP server to the switch.  
II. Network diagram  
Network  
Switch  
PC  
Figure 45-1 Network diagram for FTP configuration  
III. Configuration procedure  
1) Configure FTP server parameters on the PC: a user named as switch, password  
hello, read & write authority over the Switch directory on the PC. No further details  
are provided here.  
2) Configure the switch  
The switch has been configured with a Telnet user named as user, as 3-level user, with  
password hello, requiring username and password authentication.  
Use the telnet command to log into the switch.  
<SW8800>  
45-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 45 Device management  
Caution:  
If the flash memory of the switch is not enough, you need to first delete the existing  
programs in the flash memory and then download the new ones to the memory.  
Enter the corresponding command in user view to establish FTP connection. Then  
enter correct username and password to log into the FTP server.  
<SW8800> ftp 2.2.2.2  
Trying ...  
Press CTRL+K to abort  
Connected.  
220 WFTPD 2.0 service (by Texas Imperial Software) ready for new user  
User(none):switch  
331 Give me your password, please  
Password:*****  
230 Logged in successfully  
[ftp]  
Enter the authorized directory of the FTP server.  
[ftp] cd switch  
Use the get command to download the switch.app and boot.app files from the FTP  
server to the flash directory on the FTP client.  
[ftp] get switch.app  
[ftp] get boot.app  
Use the quit command to release FTP connection and return to user view.  
[ftp] quit  
<SW8800>  
Upgrade the BootROM of main board 0.  
<SW8800> boot bootrom boot.app slot 0  
Use the boot boot-loader command to specify the downloaded program as the  
application at the next login and reboot the switch.  
<SW8800> boot boot-loader switch.app  
<SW8800>display boot-loader  
The app to boot at the next time is: flash:/Switch.app  
The app to boot of board 0 at this time is: flash:/PLAT.APP  
<SW8800> reboot  
45-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 45 Device management  
45.4.2 Use the Switch as an FTP Server to Implement the Remote Upgrade  
I. Network requirements  
The switch serves as an FTP server and the PC as an FTP client. The configuration on  
the FTP server is as follows: an FTP user is configured with the name switch, the  
password hello and the read & write authority over the root directory of the switch. The  
IP address of a VLAN interface on the switch is 1.1.1.1, and the IP address of the PC is  
2.2.2.2. The switch and PC are reachable with each other.  
The switch application switch.app is stored on the PC. Using FTP, this file can be  
uploaded from the PC to the switch remotely, and the configuration file vrpcfg.txt on the  
switch can be downloaded to the PC as a backup.  
II. Network diagram  
Network  
Switch  
PC  
Figure 45-2 Network diagram for FTP configuration  
III. Configuration procedure  
1) Configure the switch  
Log into the switch through the console port locally or through telnet remotely (refer to  
the getting start module for details about the login modes).  
<SW8800>  
Enable FTP on the switch; configure a username, password and path.  
[SW8800] ftp server enable  
[SW8800] local-user switch  
[SW8800-luser-switch] service-type ftp ftp-directory flash:  
[SW8800-luser-switch] password simple hello  
2) Run the FTP client program on the PC to set up an FTP connection with the switch.  
Then upload the switch program switch.app to the flash root directory on the  
switch and download the configuration file vrpcfg.txt from the switch. The FTP  
client program is not provided along with the switch, so, it is for you to purchase  
and install it.  
45-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 45 Device management  
Caution:  
If the flash memory on the switch is not sufficient, delete the original application  
program in the flash before uploading the new one into the flash of the switch.  
3) After uploading, performs upgrading on the switch.  
<SW8800>  
You can use the boot boot-loader command to specify the new file as the application  
program on the next booting and reboot the switch to implement the upgrading of the  
application program.  
<SW8800> boot boot-loader switch.app  
<SW8800> reboot  
45-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Chapter 46 System Maintenance and Debugging  
46.1 Basic System Configuration  
The basic system configuration and management include:  
z
z
z
z
Switch name setting  
System clock setting  
Time zone setting  
Summer time setting  
46.1.1 Setting a Name for a Switch  
Perform the operation of sysname command in the system view.  
Table 46-1 set a name for a Switch  
Operation  
Command  
sysname sysname  
Set the switch name  
Restore the switch name to default value undo sysname  
46.1.2 Setting the System Clock  
Perform the following configuration in user view.  
Table 46-2 Set the system clock  
Operation  
Command  
clock datetime HH:MM:SS YYYY/MM/DD  
Set the system clock  
46.1.3 Setting the Time Zone  
You can configure the name of the local time zone and the time difference between the  
local time and the standard Universal Time Coordinated (UTC).  
Perform the following configuration in user view.  
46-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Table 46-3 Set the time zone  
Operation  
Command  
clock timezone zone_name { add |  
minus } HH:MM:SS  
Set the local time  
Restore to the default UTC time zone  
undo clock timezone  
By default, the UTC time zone is adopted.  
46.1.4 Setting the Summer Time  
You can set the name, starting and ending time of the summer time.  
Perform the following configuration in user view.  
Table 46-4 Set the summer time  
Operation  
Command  
clock  
summer-time  
zone_name  
Set the name and range of the summer  
time  
{ one-off | repeating } start-time  
start-date end-time end-date offset-time  
Remove the setting of the summer time undo clock summer-time  
By default, the summer time is not set.  
46.2 Displaying the State and Information of the System  
The switch provides the display command for displaying the the system state and  
statistics information.  
For the display commands related to each protocols and different ports, refer to the  
relevant chapters. The following display commands are used for displaying the system  
state and the statistics information.  
Perform the following operations in any view.  
Table 46-5 The display commands of the system  
Operation  
Command  
Display the system clock  
display clock  
Display the system version  
display version  
display  
debugging  
[
interface  
Display the state of the debugging  
{
interface-name  
|
interface-type  
interface-number } ] [ module-name ]  
46-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Operation  
Command  
display fiber-module  
Display the information about the  
optical module connected with a or  
in-place optical port on current  
display fiber-module  
[
interface-type  
frame  
interface-number | interface-name ]  
46.3 System Debugging  
46.3.1 Enabling/Disabling the Terminal Debugging  
The Ethernet switch provides various ways for debugging most of the supported  
protocols and functions, which can help you diagnose and address the errors.  
The following switches can control the outputs of the debugging information:  
z
z
Protocol debugging switch controls the debugging output of a protocol.  
Terminal debugging switch controls the debugging output on a specified user  
screen.  
The figure below illustrates the relationship between two switches.  
Debugging  
information  
Protocol debugging  
switch  
ON  
OFF  
ON  
Screen output switch  
OFF  
ON  
Figure 46-1 Debug output  
You can use the following commands to control the above-mentioned debugging.  
Perform the following operations in user view.  
46-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Table 46-6 Enabling/Disabling the debugging  
Operation  
Command  
debugging { all [ timeout interval ] |  
module-name [ debugging-option ] }  
Enable the protocol debugging  
Disable the protocol debugging  
undo debugging { all | module-name  
[ debugging-option ] }  
Enable the terminal debugging  
Disable the terminal debugging  
terminal debugging  
undo terminal debugging  
For more about the usage and format of the debugging commands, refer to the relevant  
chapters.  
Note:  
Since the debugging output will affect the system operating efficiency, do not enable  
the debugging without necessity, especially use the debugging all command with  
caution. When the debugging is over, disable all the debugging.  
46.3.2 Displaying Diagnostic Information  
When the Ethernet switch does not run well, you can collect all sorts of information  
about the switch to locate the source of fault. However, each module has its  
corresponding display command, you can use display diagnostic-information  
command.  
You can perform the following operations in any view.  
Table 46-7 displaying diagnostic information  
Operation  
Command  
display diagnostic information  
display diagnostic-information  
Note:  
When using the display diagnostic-information command to keep track of Ethernet  
switch, you should execute the command at least twice so that you can compare the  
information for locating problem.  
46-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
46.4 Testing Tools for Network Connection  
46.4.1 ping  
The ping command can be used to check the network connection and if the host is  
reachable.  
Perform the following configuration in any view.  
Table 46-8 The ping command  
Operation  
Command  
ping [ ip ] [ -a ip-address | -c count | -d | -h ttl | -i  
{interface-type interface-num | interface-name } | -n | - p  
pattern | -q | -r | -s packetsize | -t timeout | -tos tos | -v |  
-vpn-instance vpn-instance-name ]* host  
Support IP ping  
The output of the command includes:  
z
The response to each ping message. If no response packet is received when time  
is out, ”Request time out” information appears. Otherwise, the data bytes, the  
packet sequence number, TTL, and the round-trip time of the response packet will  
be displayed.  
z
The final statistics, including the number of the packets the switch sent out and  
received, the packet loss ratio, the round-trip time in its minimum value, mean  
value and maximum value.  
46.4.2 ping-distribute enable  
Use the ping-distribute enable command to enable the ping distribution function.  
Use the undo ping-distribute enable command to disable the ping distribution  
function.  
Perform the following configuration in system view.  
Table 46-9 Enable/disable the ping distribution function  
Operation  
Command  
Enable the ping distribution function  
ping-distribute enable  
Disable the ping distribution function  
undo ping-distribute  
By default, the ping distribution function is enabled.  
46-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
46.4.3 tracert  
The tracert is used for testing the gateways passed by the packets from the source  
host to the destination one. It is mainly used for checking if the network is connected  
and analyzing where the fault occurs in the network.  
The execution process of tracert is described as follows: Send a packet with TTL value  
as 1 and the first hop sends back an ICMP error message indicating that the packet  
cannot be sent, for the TTL is timeout. Re-send the packet with TTL value as 2 and the  
second hop returns the TTL timeout message. The process is carried over and over  
until the packet reaches the destination. The purpose to carry out the process is to  
record the source address of each ICMP TTL timeout message, so as to provide the  
route of an IP packet to the destination.  
Perform the following configuration in any view.  
Table 46-10 The tracert command  
Operation  
Trace route  
Command  
tracert [ -a source-IP | -f first-TTL | -m max-TTL | -p port |  
-q num-packet | -vpn-instance vpn-instance-name | -w  
timeout ] string  
46.5 Logging Function  
46.5.1 Introduction to Info-center  
The Info-center is an indispensable part of the Ethernet switch. It serves as an  
information center of the system software modules. The logging system is responsible  
for most of the information outputs, and it also makes detailed classification to filter the  
information efficiently. Coupled with the debugging program, the info-center provides  
powerful support for the network administrators and the R&D personnel to monitor the  
operating state of networks and diagnose network failures.  
When the log information is output to terminal or log buffer, the following parts will be  
included:  
% <priority> Timestamp Sysname Module name/Severity/Digest: Content  
For example:  
%Jun 7 05:22:03 2003 SW8800 IFNET/6/UPDOWN:Line protocol on interface  
Ethernet2/1/2, changed state to UP  
When the log information is output to info-center, the first part will be “<Priority>”.  
For example:  
% <189>Jun 7 05:22:03 2003 SW8800 IFNET/6/UPDOWN:Line protocol on interface  
Ethernet0/0/0, changed state to UP  
46-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
The description of the components of log information is as follows:  
1)  
%
In practical output, some of the information is started with the % character, which  
means a logging is necessary.  
2) Priority  
The priority is computed according to following formula: facility*8+severity-1. The  
default value for the facility is 23. The range of severity is 1~8, and the severity will be  
introduced in separate section.  
Priority is only effective when information is send to log host. There is no character  
between priority and timestamp.  
3) Timestamp  
If the logging information is send to the log host, the default format of timestamp is date  
The date format of timestamp is " Mmm dd hh:mm:ss yyyy".  
" Mmm " is month field, such as: Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep, Oct, Nov,  
Dec.  
"dd" is day field, if the day is little than 10th, one blank should be added, such as " 7".  
"hh:mm:ss" is time field, "hh" is from 00 to 23, "mm" and "ss" are from 00 to 59.  
"yyyy" is year field.  
4) Sysname  
The sysname is the host name, the default value is "SW8800".  
User can change the host name through sysname command.  
Notice: There is a blank between sysname and module name.  
5) Module name  
The module name is the name of module which create this logging information, the  
following sheet list some examples:  
Table 46-11 The module name field  
Module name  
8021X  
Description  
802.1X module  
ACL  
Access control list module  
ADBM  
ARP  
MAC address management module  
Address resolution protocol module  
Border gateway protocol module  
Configuration file management module  
Command module  
BGP  
CFM  
CMD  
default  
Default settings for all the modules  
46-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Module name  
DEV  
Description  
Device management module  
DHCP  
Dynamic host configuration protocol module  
Diagnosis module  
DIAGCLI  
DNS  
Domain name server module  
Multiprotocol label switching drive module  
Layer 2 drive module  
DRVMPLS  
DRVL2  
DRVL3  
DRVL3MC  
MPLS  
Layer 3 drive module  
Layer 3 multicast module  
MPLS drive module  
DRVQACL  
DRVVPLS  
ETH  
QACL drive module  
Virtual private LAN service drive module  
Ethernet module  
FTPS  
FTP server module  
HA  
High availability module  
IFNET  
Interface management module  
IGMP snooping module  
IGSP  
IP  
Internet protocol module  
Intermediate system-to-intermediate system intradomain  
routing protocol module  
ISIS  
L2INF  
L2V  
L2 interface management module  
L2 VPN module  
LACL  
LAN switch ACL module  
label distribution protocol module  
LINKAGG module  
LDP  
LINKAGG  
LQOS  
LS  
LAN switch QoS module  
Local server module  
LSPAGENT  
LSPM  
MIX  
Label switched path agent module  
Label switch path management module  
Dual system management module  
MMC module  
MMC  
MODEM  
MPLSFW  
Modem module  
MPLS forward module  
46-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Module name  
MPM  
Description  
Multicast port management module  
MSDP  
MSTP  
NAT  
Multicast source discovery protocol module  
Multiple spanning tree protocol module  
Network address translation module  
Network time protocol module  
Open shortest path first module  
Physical sublayer & physical layer module  
Point to point protocol module  
PSSINIT module  
NTP  
OSPF  
PHY  
PPP  
PSSINIT  
RDS  
RADIUS module  
RM  
Routing management module  
Remote monitor module  
RMON  
RSA  
RSA (Revest, Shamir and Adleman) encryption module  
Routing protocol module  
RTPRO  
SHELL  
SNMP  
SOCKET  
SSH  
User interface module  
Simple network management protocol module  
Socket module  
Secure shell module  
SYSM  
SYSMIB  
TAC  
System manage veneer module  
System MIB module  
Terminal access controller module  
Telnet module  
TELNET  
USERLOG  
VFS  
User calling logging module  
Virtual file system module  
VLAN  
Virtual local area network module  
Virtual operate system module  
VRRP (virtual router redundancy protocol) module  
VTY (virtual type terminal) module  
VOS  
VRRP  
VTY  
Notice: There is a slash ('/') between module name and severity.  
6) Severity  
46-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Switch information falls into three categories: log information, debugging information  
and trap information. The info-center classifies every kind of information into 8 severity  
or urgent levels. The log filtering rule is that the system prohibits outputting the  
information whose severity level is greater than the set threshold. The more urgent the  
logging packet is, the smaller its severity level is. The level represented by  
“emergencies” is 1, and that represented by “debugging” is 8. Therefore, when the  
threshold of the severity level is “debugging”, the system will output all the information.  
Definition of severity in logging information is as followed.  
Table 46-12 Info-center-defined severity  
Severity  
emergencies  
alerts  
Value  
Description  
The extremely emergent errors  
1
2
3
4
5
6
7
8
The errors that need to be corrected immediately.  
Critical errors  
critical  
errors  
The errors that need to be concerned but not critical  
Warning, there might exist some kinds of errors.  
The information should be concerned.  
Common prompting information  
warnings  
notifications  
informational  
debugging  
Debugging information  
Notice: There is a slash between severity and digest.  
7) Digest  
The digest is abbreviation, it represent the abstract of contents.  
Notice: There is a colon between digest and content. The digest can be up to 32  
characters long.  
46.5.2 Info-center Configuration  
Switch supports 7 output directions of information.  
The system assigns a channel in each output direction by default. See the table below.  
Table 46-13 Numbers and names of the channels for log output  
Output direction  
Console  
Channel number  
Default channel name  
console  
0
Monitor  
1
2
3
monitor  
loghost  
trapbuf  
Info-center loghost  
Trap buffer  
46-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Logging buffer  
snmp  
4
5
6
logbuf  
snmpagent  
logfile  
Log file  
Note:  
The settings in the 7 directions are independent from each other. The settings will take  
effect only after enabling the information center.  
The info-center of Ethernet Switch has the following features:  
z
z
z
z
Support to output log in 7 directions, i.e., Console, monitor to Telnet terminal,  
logbuffer, loghost, trapbuffer, and SNMP log file.  
The log is divided into 8 levels according to the significance and it can be filtered  
based on the levels.  
The information can be classified in terms of the source modules and the  
information can be filtered in accordance with the modules.  
The output language can be selected between Chinese and English.  
1) Sending the configuration information to the loghost.  
Table 46-14 Send the configuration information to the loghost  
Default  
value  
Device  
Configuration  
Configuration description  
By default,  
info-center  
is enabled.  
Other configurations are valid  
only if the info-center is enabled.  
Enable info-center  
The configuration about the  
loghost on the switch and that on  
loghost must be the same;  
otherwise the information cannot  
be sent to the loghost correctly.  
Set the information  
output direction to the  
loghost  
Switch  
You can define which modules  
and information to be sent out  
and the time-stamp format of  
information, and so on. You must  
turn on the switch of the  
corresponding module before  
Set information source  
Refer to configuration  
defining  
output  
debugging  
information.  
Loghost cases for related log  
host configuration  
2) Sending the configuration information to the console terminal.  
46-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Table 46-15 Send the configuration information to the console terminal.  
Default  
value  
Device  
Configuration  
Configuration description  
By default,  
info-center  
is enabled.  
Other configurations are valid  
only if the info-center is enabled.  
Enable info-center  
Set the information  
output direction to the  
Console  
You can define which modules  
and information to be sent out  
and the time-stamp format of  
information, and so on. You must  
turn on the switch of the  
corresponding module before  
Switch  
Set information source  
defining  
information.  
output  
debugging  
You  
information  
terminal display function  
can  
view  
after  
debugging  
enabling  
Enable  
terminal  
display function  
3) Sending the configuration information to the monitor terminal  
Table 46-16 Send the configuration information to the monitor terminal  
Default  
value  
Device  
Configuration  
Configuration description  
By default,  
info-center  
is enabled.  
Other configurations are valid  
only if the info-center is enabled.  
Enable info-center  
Set the information  
output direction to the  
monitor  
You can define which modules  
and information to be sent out  
and the time-stamp format of  
information, and so on. You must  
turn on the switch of the  
corresponding module before  
Switch  
Set information source  
defining  
output  
debugging  
information.  
Enable the terminal  
display function and  
this function for the  
corresponding  
For Telnet terminal and dumb  
terminal, to view the information,  
you must enable the current  
terminal display function using  
the terminal monitor command.  
information  
4) Sending the configuration information to the log buffer.  
46-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Table 46-17 Send the configuration information to the log buffer  
Default  
value  
Device  
Configuration  
Configuration description  
By default,  
info-center  
is enabled.  
Other configurations are valid  
only if the info-center is enabled.  
Enable info-center  
Set the information  
output direction to the  
logbuffer  
You can configure the size of the  
log buffer at the same time.  
Switch  
You can define which modules  
and information to be sent out  
and the time-stamp format of  
information, and so on. You must  
turn on the switch of the  
corresponding module before  
Set information source  
defining  
output  
debugging  
information.  
5) Sending the configuration information to the trap buffer.  
Table 46-18 Send the configuration information to the trap buffer  
Default  
value  
Device  
Configuration  
Configuration description  
By default,  
info-center  
is enabled.  
Other configurations are valid  
only if the info-center is enabled.  
Enable info-center  
Set the information  
output direction to the  
trapbuffer  
You can configure the size of the  
trap buffer at the same time.  
Switch  
You can define which modules  
and information to be sent out  
and the time-stamp format of  
information, and so on. You must  
turn on the switch of the  
corresponding module before  
Set information source  
defining  
output  
debugging  
information.  
6) Sending the configuration information to SNMP  
Table 46-19 Send the configuration information to SNMP  
Device  
Switch  
Configuration  
Default value  
Configuration description  
By default, Other configurations are valid  
info-center is only if the info-center is  
enabled. enabled.  
Enable  
info-center  
46-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Set  
Chapter 46 System Maintenance and Debugging  
the  
information  
output direction  
to SNMP  
You  
can  
define  
which  
modules and information to be  
sent out and the time-stamp  
format of information, and so  
on. You must turn on the  
switch of the corresponding  
module before defining output  
debugging information.  
Set information  
source  
Configure  
SNMP features  
The same as the  
SNMP  
configuration of  
the switch  
Network  
management  
workstation  
46.5.3 Sending the Configuration Information to the Loghost  
To send configuration information to the loghost, follow the steps below:  
1) Enabling info-center  
Perform the following configuration in system view.  
Table 46-20 Enable/disable info-center  
Operation  
Enable info-center  
Command  
info-center enable  
undo info-center enable  
Disable info-center  
Note:  
Info-center is enabled by default. After info-center is enabled, system performances are  
affected when the system processes much information because of information  
classification and outputting.  
2) Configuring to output information to the loghost  
Perform the following configuration in system view.  
46-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Table 46-21 Configure to output information to the loghost  
Operation  
Command  
info-center loghost host-ip-addr [ channel  
{ channel-number | channel-name } | facility  
Output information to the loghost  
local-number  
english } ]*  
|
language  
{
chinese  
|
Cancel the configuration of  
outputting information to loghost  
undo info-center loghost host-ip-addr  
Note that the IP address of log host must be correct.  
Note:  
Ensure to enter the correct IP address using the info-center loghost command to  
configure loghost IP address. If you enter a loopback address, the system prompts of  
invalid address appears.  
3) Configuring information source on the switch  
By this configuration, you can define the information that sent to console terminal is  
generated by which modules, information type, information level, and so on.  
Perform the following configuration in system view.  
Table 46-22 Define information source  
Operation  
Command  
info-center source { modu-name | default }  
channel { channel-number | channel-name }  
[ debug { level severity | state state }* | log { level  
severity | state state }* | trap { level severity | state  
state }* ]*  
Define information source  
Cancel the configuration of undo info-center source { modu-name | default |  
information source all } channel { channel-number | channel-name }  
modu-name specifies the module name; default represents all the modules; all  
represents all the information filter configuration in channelnum chunnel except default;  
level refers to the severity levels; severity specifies the severity level of information.  
The information with the level below it will not be output. channel-number specifies the  
channel number and channel-name specifies the channel name.  
When defining the information sent to the loghost, channel-number or channel-name  
must be set to the channel that corresponds to loghost direction.  
46-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Every channel has been set with a default record, whose module name is default and  
the module number is 0xffff0000. However, for different channels, the default record  
may have different default settings of log, trap and debugging. When there is no  
specific configuration record for a module in the channel, use the default one.  
Note:  
If you want to view the debugging information of some modules on the switch, you must  
select debugging as the information type when configuring information source,  
meantime using the debugging command to turn on the debugging switch of those  
modules.  
You can use the following commands to configure log information, debugging  
information and the time-stamp output format of trap information. This configuration will  
affect the timestamp of the displayed information.  
Perform the following configuration in system view:  
Table 46-23 Configure the output format of time-stamp  
Operation  
Command  
Configure the output format of the info-center timestamp { log | trap |  
time-stamp  
debugging } { boot | date | none }  
undo info-center timestamp { log |  
trap | debugging }  
Output time-stamp is disabled  
4) Configuring the loghost  
The configuration on the loghost must be the same with that on the switch. For related  
configuration, see the configuration examples in the later part.  
46.5.4 Sending the Configuration Information to Console terminal  
To send configuration information to console terminal, follow the steps below:  
1) Enabling info-center  
Perform the following configuration in system view.  
Table 46-24 Enable/disable info-center  
Operation  
Enable info-center  
Disable info-center  
Command  
info-center enable  
undo info-center enable  
46-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Note:  
Info-center is enabled by default. After info-center is enabled, system performances are  
affected when the system processes much information because of information  
classification and outputting.  
2) Configuring to output information to console terminal  
Perform the following configuration in system view.  
Table 46-25 Configure to output information to console terminal  
Operation  
Command  
console  
info-center  
channel  
Output information to Console  
{ channel-number | channel-name }  
Cancel the configuration of  
outputting information to Console  
undo info-center console channel  
3) Configuring information source on the switch  
By this configuration, you can define the information that sent to console terminal is  
generated by which modules, information type, information level, and so on.  
Perform the following configuration in system view:  
Table 46-26 Define information source  
Operation  
Command  
info-center source { modu-name | default }  
channel { channel-number | channel-name }  
[ debug { level severity | state state }* | log { level  
severity | state state }* | trap { level severity | state  
state }* ]*  
Define information source  
Cancel the configuration of undo info-center source { modu-name | default |  
information source all } channel { channel-number | channel-name }  
modu-name specifies the module name; default represents all the modules; all  
represents all the information filter configuration in channelnum chunnel except default;  
level refers to the severity levels; severity specifies the severity level of information.  
The information with the level below it will not be output. channel-number specifies the  
channel number and channel-name specifies the channel name.  
When defining the information sent to the console terminal, channel-number or  
channel-name must be set to the channel that corresponds to Console direction.  
Every channel has been set with a default record, whose module name is default and  
the module number is 0xffff0000. However, for different channels, the default record  
46-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
may have different default settings of log, trap and debugging. When there is no  
specific configuration record for a module in the channel, use the default one.  
Note:  
If you want to view the debugging information of some modules on the switch, you must  
select debugging as the information type when configuring information source,  
meantime using the debugging command to turn on the debugging switch of those  
modules.  
You can use the following commands to configure log information, debugging  
information and the time-stamp output format of trap information.  
This configuration will affect the timestamp of the displayed ifnormation.  
Perform the following configuration in system view:  
Table 46-27 Configure the output format of time-stamp  
Operation  
Command  
Configure the output format of the info-center timestamp { log | trap |  
time-stamp  
debugging } { boot | date | none }  
undo info-center timestamp { log |  
trap | debugging }  
Output time-stamp is disabled  
4) Enable terminal display function  
To view the output information at the console terminal, you must first enable the  
corresponding log, debugging and trap information functions at the switch.  
For example, if you have set the log information as the information sent to the console  
terminal, now you need to use the terminal logging command to enable the terminal  
display function of log information on the switch, then you can view the information at  
the console terminal.  
Perform the following configuration in user view:  
Table 46-28 Enable terminal display function  
Operation  
Command  
Enable terminal display function of debugging  
information  
terminal debugging  
Disable terminal display function of debugging  
information  
undo terminal debugging  
terminal logging  
Enable terminal display function of log information  
Disable terminal display function of log information undo terminal logging  
46-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Enable terminal display function of trap information terminal trapping  
Disable terminal display function of trap information undo terminal trapping  
46.5.5 Sending the Configuration Information to Telnet Terminal or Dumb  
Terminal  
To send configuration information to Telnet terminal or dumb terminal, follow the steps  
below:  
1) Enabling info-center  
Perform the following configuration in system view.  
Table 46-29 Enable/disable Info-center  
Operation  
Enable info-center  
Command  
info-center enable  
undo info-center enable  
Disable info-center  
Note:  
Info-center is enabled by default. After info-center is enabled, system performances are  
affected when the system processes much information because of information  
classification and outputting.  
2) Configuring to output information to Telnet terminal or dumb terminal  
Perform the following configuration in system view.  
Table 46-30 Configure to output information to Telnet terminal or dumb terminal  
Operation  
Command  
monitor  
Output information to Telnet terminal or info-center  
channel  
dumb terminal  
{ channel-number | channel-name }  
Cancel the configuration of outputting  
information to Telnet terminal or dumb undo info-center monitor channel  
terminal  
3) Configuring information source on the switch  
By this configuration, you can define the information that sent to Telnet terminal or  
dumb terminal is generated by which modules, information type, information level, and  
so on.  
Perform the following configuration in system view:  
46-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Table 46-31 Define information source  
Operation  
Command  
info-center source { modu-name | default }  
channel { channel-number | channel-name }  
[ debug { level severity | state state }* | log { level  
severity | state state }* | trap { level severity | state  
state }* ]*  
Define information source  
Cancel the configuration of undo info-center source { modu-name | default |  
information source all } channel { channel-number | channel-name }  
modu-name specifies the module name; default represents all the modules; all  
represents all the information filter configuration in channelnum chunnel except default;  
level refers to the severity levels; severity specifies the severity level of information.  
The information with the level below it will not be output. channel-number specifies the  
channel number and channel-name specifies the channel name.  
When defining the information sent to Telnet terminal or dumb terminal,  
channel-number or channel-name must be set to the channel that corresponds to  
monitor direction.  
Every channel has been set with a default record, whose module name is default and  
the module number is 0xffff0000. However, for different channels, the default record  
may have different default settings of log, trap and debugging. When there is no  
specific configuration record for a module in the channel, use the default one.  
Note:  
When there are more than one Telnet users or monitor users at the same time, some  
configuration parameters should be shared among the users, such as module-based  
filtering settings and severity threshold. When a user modifies these settings, it will be  
reflected on other clients.  
Note:  
If you want to view the debugging information of some modules on the switch, you must  
select debugging as the information type when configuring information source,  
meantime using the debugging command to turn on the debugging switch of those  
modules.  
You can use the following commands to configure log information, debugging  
information and the time-stamp output format of trap information.  
46-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
This configuration will affect the timestamp of the displayed information.  
Perform the following configuration in system view:  
Table 46-32 Configure the output format of time-stamp  
Operation  
Command  
Configure the output format of the info-center timestamp { log | trap |  
time-stamp  
debugging } { boot | date | none }  
undo info-center timestamp { log |  
trap | debugging }  
Output time-stamp is disabled  
4) Enabling terminal display function  
To view the output information at the Telnet terminal or dumb terminal, you must first  
enable the terminal display function, and then the corresponding terminal display  
function of log information on the switch.  
For example, if you have set the log information as the information sent to the Telnet  
terminal or dumb terminal, now you need to use the terminal monitor command to  
enable the terminal display function and the terminal logging command to enable the  
terminal display function of log information on the switch, then you can view the  
information at the Telnet terminal or dumb terminal.  
Perform the following configuration in user view:  
Table 46-33 Enable terminal display function  
Operation  
Command  
Enable terminal display function of log, debugging  
and trap information  
terminal monitor  
Disable terminal display function of the above  
information  
undo terminal monitor  
terminal debugging  
Enable terminal display function of debugging  
information  
Disable terminal display function of debugging  
information  
undo terminal debugging  
terminal logging  
Enable terminal display function of log information  
Disable terminal display function of log information undo terminal logging  
Enable terminal display function of trap information terminal trapping  
Disable terminal display function of trap information undo terminal trapping  
46.5.6 Sending the Configuration Information to the Log Buffer  
To send configuration information to the log buffer, follow the steps below:  
46-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
1) Enabling info-center  
Chapter 46 System Maintenance and Debugging  
Perform the following configuration in system view.  
Table 46-34 Enable/disable info-center  
Operation  
Enable info-center  
Command  
info-center enable  
undo info-center enable  
Disable info-center  
Note:  
Info-center is enabled by default. After info-center is enabled, system performances are  
affected when the system processes much information because of information  
classification and outputting.  
2) Configuring to output information to the log buffer  
Perform the following configuration in system view.  
Table 46-35 Configure to output information to log buffer  
Operation  
Command  
logbuffer  
info-center  
[
channel  
Output information to log buffer  
{ channel-number | channel-name } | size  
buffersize ]*  
Cancel the configuration of  
outputting information to log buffer  
undo info-center logbuffer [ channel | size ]  
3) Configuring information source on the switch  
By this configuration, you can define the information that sent to log buffer is generated  
by which modules, information type, information level, and so on.  
Perform the following configuration in system view:  
Table 46-36 Define information source  
Operation  
Command  
info-center source { modu-name | default }  
channel { channel-number | channel-name } [ debug  
{ level severity | state state }* | log { level severity |  
state state }* | trap { level severity | state state }* ]*  
Define information source  
Cancel the configuration of undo info-center source { modu-name | default |  
information source  
all } channel { channel-number | channel-name }  
46-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
modu-name specifies the module name; default represents all the modules; all  
represents all the information filter configuration in channelnum chunnel except default;  
level refers to the severity levels; severity specifies the severity level of information.  
The information with the level below it will not be output. channel-number specifies the  
channel number and channel-name specifies the channel name.  
When defining the information sent to log buffer, channel-number or channel-name  
must be set to the channel that corresponds to logbuffer direction.  
Every channel has been set with a default record, whose module name is default and  
the module number is 0xffff0000. However, for different channels, the default record  
may have different default settings of log, trap and debugging. When there is no  
specific configuration record for a module in the channel, use the default one.  
Note:  
If you want to view the debugging information of some modules on the switch, you must  
select debugging as the information type when configuring information source,  
meantime using the debugging command to turn on the debugging switch of those  
modules.  
You can use the following commands to configure log information, debugging  
information and the time-stamp output format of trap information.  
Perform the following configuration in system view:  
Table 46-37 Configure the output format of time-stamp  
Operation  
Command  
Configure the output format of the info-center timestamp { log | trap |  
time-stamp  
debugging } { boot | date | none }  
undo info-center timestamp { log |  
trap | debugging }  
Output time-stamp is disabled  
46.5.7 Sending the Configuration Information to the Trap Buffer  
To send configuration information to the trap buffer, follow the steps below:  
1) Enabling info-center  
Perform the following configuration in system view.  
Table 46-38 Enable/disable info-center  
Operation  
Enable info-center  
Command  
info-center enable  
46-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Disable info-center  
Chapter 46 System Maintenance and Debugging  
undo info-center enable  
Note:  
Info-center is enabled by default. After info-center is enabled, system performances are  
affected when the system processes much information because of information  
classification and outputting.  
2) Configuring to output information to the trap buffer  
Perform the following configuration in system view.  
Table 46-39 Configure to output information to trap buffer  
Operation  
Command  
info-center trapbuffer [ size buffersize |  
Output information to trap buffer  
channel  
{
channel-number  
|
channel-name } ]*  
Cancel  
the  
configuration  
of undo info-center trapbuffer [ channel |  
size ]  
outputting information to trap buffer  
3) Configuring information source on the switch  
By this configuration, you can define the information that sent to trap buffer is generated  
by which modules, information type, information level, and so on.  
Perform the following configuration in system view:  
Table 46-40 Define information source  
Operation  
Command  
info-center source { modu-name | default }  
channel { channel-number | channel-name } [ debug  
{ level severity | state state }* | log { level severity |  
state state }* | trap { level severity | state state }* ]*  
Define information source  
Cancel the configuration of undo info-center source { modu-name | default |  
information source all } channel { channel-number | channel-name }  
modu-name specifies the module name; default represents all the modules; all  
represents all the information filter configuration in channelnum chunnel except default;  
level refers to the severity levels; severity specifies the severity level of information.  
The information with the level below it will not be output. channel-number specifies the  
channel number and channel-name specifies the channel name.  
When defining the information sent to trap buffer, channel-number or channel-name  
must be set to the channel that corresponds to trapbuffer direction.  
46-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Every channel has been set with a default record, whose module name is default and  
the module number is 0xffff0000. However, for different channels, the default record  
may have different default settings of log, trap and debugging. When there is no  
specific configuration record for a module in the channel, use the default one.  
Note:  
If you want to view the debugging information of some modules on the switch, you must  
select debugging as the information type when configuring information source,  
meantime using the debugging command to turn on the debugging switch of those  
modules.  
You can use the following commands to configure log information, debugging  
information and the time-stamp output format of trap information.  
This configuration will affect the timestamp of the displayed information.  
Perform the following configuration in system view:  
Table 46-41 Configuring the output format of time-stamp  
Operation  
Command  
Configure the output format of the info-center timestamp { log | trap |  
time-stamp  
debugging } { boot | date | none }  
undo info-center timestamp { log |  
trap | debugging }  
Output time-stamp is disabled  
46.5.8 Sending the Configuration Information to SNMP Network  
Management  
To send configuration information to SNMP NM, follow the steps below:  
1) Enabling info-center  
Perform the following configuration in system view.  
Table 46-42 Enable/disable info-center  
Operation  
Enable info-center  
Disable info-center  
Command  
info-center enable  
undo info-center enable  
46-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Note:  
Info-center is enabled by default. After info-center is enabled, system performances are  
affected when the system processes much information because of information  
classification and outputting.  
2) Configuring to output information to SNMP NM  
Perform the following configuration in system view.  
Table 46-43 Configure to output information to SNMP NM  
Operation  
Command  
snmp  
info-center  
channel  
Output information to SNMP NM  
{ channel-number | channel-name }  
Cancel the configuration of outputting  
information to SNMP NM  
undo info-center snmp channel  
3) Configuring information source on the switch  
By this configuration, you can define the information that sent to SNMP NM is  
generated by which modules, information type, information level, and so on.  
Perform the following configuration in system view:  
Table 46-44 Define information source  
Operation  
Command  
info-center source { modu-name |  
default } channel { channel-number |  
channel-name } [ debug { level severity |  
state state }* | log { level severity | state  
state }* | trap { level severity | state  
state }* ]*  
Define information source  
undo info-center source { modu-name  
Cancel the configuration of information  
source  
|
default  
|
all  
}
channel  
{ channel-number | channel-name }  
modu-name specifies the module name; default represents all the modules; all  
represents all the information filter configuration in channelnum chunnel except default  
level refers to the severity levels; severity specifies the severity level of information.  
The information with the level below it will not be output. channel-number specifies the  
channel number and channel-name specifies the channel name.  
When defining the information sent to SNMP NM, channel-number or channel-name  
must be set to the channel that corresponds to SNMP direction.  
46-26  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Every channel has been set with a default record, whose module name is default and  
the module number is 0xffff0000. However, for different channels, the default record  
may have different default settings of log, trap and debugging. When there is no  
specific configuration record for a module in the channel, use the default one.  
Note:  
If you want to view the debugging information of some modules on the switch, you must  
select debugging as the information type when configuring information source,  
meantime using the debugging command to turn on the debugging switch of those  
modules.  
You can use the following commands to configure log information, debugging  
information and the time-stamp output format of trap information.  
This configuration will affect the timestamp of the displayed ifnormation.  
Perform the following configuration in system view:  
Table 46-45 Configure the output format of time-stamp  
Operation  
Command  
Configure the output format of the info-center timestamp { log | trap |  
time-stamp  
debugging } { boot | date | none }  
undo info-center timestamp { log |  
trap | debugging }  
Output time-stamp is disabled  
4) Configuring of SNMP and network management workstation on the switch  
You have to configure SNMP on the switch and the remote workstation to ensure that  
the information is correctly sent to SNMP NM. Then you can get correct information  
from network management workstation. SNMP configuration on switch refers to  
46.5.9 Displaying and Debugging Info-center  
After the above configuration, execute the display command in any view to view the  
running state of the info-center. You also can authenticate the effect of the configuration  
by viewing displayed information. Execute the reset command in user view to clear  
statistics of info-center.  
Perform the following configuration in user view. The display command still can be  
performed in any view.  
46-27  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Table 46-46 Display and debug info-center  
Operation  
Command  
Display the content of information display channel [ channel-number |  
channel  
channel-name ]  
Display configuration of system log  
and memory buffer  
display info-center  
display logbuffer [ summary ] [ level  
[ levelnum | emergencies | alerts | critical  
| debugging | errors | informational |  
notifications | warnings ] ] [ | [ begin |  
exclude | include text ] [ size sizenum ]  
Display the attribute of logbuffer and  
the information recorded in logbuffer  
Display the summary information display logbuffer summary  
[
level  
recorded in logbuffer  
severity ]  
display trapbuffer [ summary ] [ level  
[ levelnum | emergencies | alerts | critical  
| debugging | errors | informational |  
notifications | warnings ] ] [ size  
sizenum]  
Display the attribute of trapbuffer and  
the information recorded in trapbuffer  
Clear information in memory buffer  
Clear information in trap buffer  
reset logbuffer  
reset trapbuffer  
46.5.10 Configuration Examples of Sending Log to the Unix Loghost  
I. Network requirements  
The network requirements are as follows:  
z
z
z
Sending the log information of the switch to Unix loghost  
The IP address of the loghost is 202.38.1.10  
The information with the severity level above informational will be sent to the  
loghost  
z
z
The output language is English  
The modules that allowed to output information are ARP and IP  
II. Network diagram  
Network  
Switch  
PC  
Figure 46-2 Network diagram  
46-28  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
III. Configuration steps  
1) Configuration on the switch  
Enable info-center  
[SW8800] info-center enable  
Set the host with the IP address of 202.38.1.10 as the loghost; set the severity level  
threshold value as informational, set the output language to English; set that the  
modules which are allowed to output information are ARP and IP.  
[SW8800] info-center loghost 202.38.1.10 facility local4 language english  
[SW8800] info-center source arp channel loghost log level informational  
[SW8800] info-center source ip channel loghost log level informational  
2) Configuration on the loghost  
This configuration is performed on the loghost. The following example is performed on  
SunOS 4.0 and the operation on Unix operation system produced by other  
manufactures is generally the same to the operation on SunOS 4.0.  
Step 1: Perform the following command as the super user (root).  
mkdir /var/log/SW8800  
touch /var/log/SW8800/information  
Step 2: Edit file /etc/syslog.conf as the super user (root), add the following  
selector/actor pairs.  
SW8800 configuration messages  
local4.info  
/var/log/SW8800/information  
Note:  
Note the following points when editing /etc/syslog.conf:  
z
z
z
z
The note must occupy a line and start with the character #.  
There must be a tab other than a space as the separator in selector/actor pairs.  
No redundant space after file name.  
The device name and the acceptant log information level specified in  
/etc/syslog.conf must be consistent with info-center loghost and info-center loghost  
a.b.c.d facility configured on the switch. Otherwise, the log information probably  
cannot be output to the loghost correctly.  
Step 3: After the establishment of information (log file) and the revision of  
/etc/syslog.conf, you should send a HUP signal to syslogd (system daemon), through  
the following command, to make syslogd reread its configuration file /etc/syslog.conf.  
ps -ae | grep syslogd  
147  
46-29  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
kill -HUP 147  
After the above operation, the switch system can record information in related log files.  
Note:  
To configure facility, severity, filter and the file syslog.conf synthetically, you can get  
classification in great detail and filter the information.  
46.5.11 Configuration examples of sending log to Linux loghost  
I. Network requirements  
The Network requirements are as follows:  
z
z
z
Sending the log information of the switch to Linux loghost  
The IP address of the loghost is 202.38.1.10  
The information with the severity level above informational will be sent to the  
loghost  
z
z
The output language is English  
All modules are allowed to output information  
II. Network diagram  
Network  
Switch  
PC  
Figure 46-3 Network diagram  
III. Configuration procedure  
1) Configuration on the switch  
Enable info-center  
[SW8800] info-center enable  
Set the host with the IP address of 202.38.1.10 as the loghost; set the severity level  
threshold value as informational, set the output language to English; set all the modules  
are allowed output information.  
[SW8800] info-center loghost 202.38.1.10 facility local7 language english  
[SW8800] info-center source default channel loghost log level informational  
46-30  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
2) Configuration on the loghost  
This configuration is performed on the loghost.  
Step 1: Perform the following command as the super user (root).  
mkdir /var/log/SW8800  
touch /var/log/SW8800/information  
Step 2: Edit file /etc/syslog.conf as the super user (root), add the following  
selector/actor pairs.  
SW8800 configuration messages  
local7.info  
/var/log/SW8800/information  
Note:  
Note the following points when editing /etc/syslog.conf:  
z
z
z
z
The note must occupy a line and start with the character #.  
There must be a tab other than a space as the separator in selector/actor pairs.  
No redundant space after file name.  
The device name and the acceptant log information level specified in  
/etc/syslog.conf must be consistent with info-center loghost and info-center loghost  
a.b.c.d facility configured on the switch. Otherwise, the log information probably  
cannot be output to the loghost correctly.  
Step 3: After the establishment of information (log file) and the revision of  
/etc/syslog.conf, you should view the number of syslogd (system daemon) through the  
following command, kill syslogd daemon and reuse -r option the start syslogd in  
daemon.  
ps -ae | grep syslogd  
147  
kill -9 147  
syslogd -r &  
Note:  
For Linux loghost, you must ensure that syslogd daemon is started by -r option.  
After the above operation, the switch system can record information in related log files.  
46-31  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 46 System Maintenance and Debugging  
Note:  
To configure facility, severity, filter and the file syslog.conf synthetically, you can get  
classification in great detail and filter the information.  
46.5.12 Configuration Examples of Sending Log to the Console Terminal  
I. Network requirements  
The network requirements are as follows:  
z
z
Sending the log information of the switch to console terminal  
The information with the severity level above informational will be sent to the  
console terminal  
z
The output language is English  
The modules that allowed to output information are ARP and IP  
II. Network diagram  
console  
Switch  
PC  
Figure 46-4 Network diagram  
III. Configuration procedure  
1) Configuration on the switch  
Enable info-center.  
[SW8800] info-center enable  
Configure console terminal log output; allow modules ARP and IP to output information;  
the severity level is restricted within the range of emergencies to informational.  
[SW8800] info-center console channel console  
[SW8800] info-center source arp channel console log level informational  
[SW8800] info-center source ip channel console log level informational  
Enable terminal display function.  
<SW8800> terminal logging  
46-32  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
Chapter 47 SNMP Configuration  
47.1 SNMP Overview  
By far, the Simple Network Management Protocol (SNMP) has gained the most  
extensive application in the computer networks. SNMP has been put into use and  
widely accepted as an industry standard in practice. It is used for ensuring the  
transmission of the management information between any two nodes. In this way,  
network administrators can easily search and modify the information on any node on  
the network. In the meantime, they can locate faults promptly and implement the fault  
diagnosis, capacity planning and report generating. SNMP adopts the polling  
mechanism and provides the most basic function set. It is most applicable to the  
small-sized, fast-speed and low-cost environment. It only requires the unverified  
transport layer protocol UDP; and is thus widely supported by many other products.  
In terms of structure, SNMP can be divided into two parts, namely, Network  
Management Station and Agent. Network Management Station is the workstation for  
running the client program. At present, the commonly used NM platforms include Sun  
NetManager and IBM NetView. Agent is the server software operated on network  
devices. Network Management Station can send GetRequest, GetNextRequest and  
SetRequest messages to the Agent. Upon receiving the requests from the Network  
Management Station, Agent will perform Read or Write operation according to the  
message types, generate and return the Response message to Network Management  
Station. On the other hand, Agent will send Trap message on its own initiative to the  
Network Management Station to report the events whenever the device encounters any  
abnormalities such as restart.  
47.2 SNMP Versions and Supported MIB  
To uniquely identify the management variables of a device in SNMP messages, SNMP  
adopts the hierarchical naming scheme to identify the managed objects. It is like a tree.  
Atree node represents a managed object, as shown in the figure below. Thus the object  
can be identified with the unique path starting from the root.  
47-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
1
2
1
1
2
1
2
B
6
5
A
Figure 47-1 Architecture of the MIB tree  
The MIB (Management Information Base) is used to describe the hierarchical  
architecture of the tree and it is the set defined by the standard variables of the  
monitored network device. In the above figure, the managed object B can be uniquely  
specified by a string of numbers {1.2.1.1}. The number string is the Object Identifier of  
the managed object.  
The current SNMP Agent of Ethernet switch supports SNMP V1, V2C and V3. The  
MIBs supported are listed in the following table.  
Table 47-1 MIBs supported by the Ethernet Switch  
MIB attribute  
MIB content  
References  
RFC1213  
MIB II based on TCP/IP network  
device  
RFC1493  
RFC2675  
RFC1724  
RFC2819  
RFC2665  
RFC1253  
RFC1573  
BRIDGE MIB  
RIP MIB  
Public MIB  
RMON MIB  
Ethernet MIB  
OSPF MIB  
IF MIB  
47-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
MIB attribute  
MIB content  
References  
DHCP MIB  
QACL MIB  
ADBM MIB  
RSTP MIB  
VLAN MIB  
Private MIB  
Device management  
Interface management  
47.3 Configuring SNMP  
The following sections describe the SNMP configuration tasks.  
z
z
z
z
z
z
z
z
z
z
47.3.1 Setting Community Names  
z
SNMP V1 and SNMPV2C adopt the community name authentication scheme.  
SNMP Community is named with a character string, which is called community  
name. SNMP community name defines the relationship between SNMP manager  
and SNMP agent. The community name functions like a password, that is, it  
controls the access of the SNMP manager to the SNMP agent. You can choose to  
specify one or more community name-related features: Define MIB views of all the  
accessible MIB subsets.  
z
Define the read-only or read-write access mode of the community name to the MIB.  
The community with read-only authority can only query the device information,  
whereas the community with read-write authority can also configure the device.  
Perform the following configuration in system view.  
47-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
Table 47-2 Set community names  
Operation  
Command  
snmp-agent community  
community-name [ [ mib-view view-name ] [ acl  
acl-list ] ]  
{
read | write  
}
Set the community name and  
the access authority  
Remove  
the  
community  
name and the access undo snmp-agent community community-name  
authority  
47.3.2 Setting the System Information  
System information includes the ID and the contact method of the administrator, the  
location of the Ethernet switch and the version of the SNMP.  
The ID and the contact method of the administrator is a character string describing the  
contact information used for the system maintenance. Through this information, the  
device maintenance staffs can obtain the manufacturer information of the device so as  
to contact the manufacturer in case the device is in trouble. You can use the following  
command to set the contact information.  
The location information of the Ethernet switch is a management variable of the system  
group in MIB, which represents the location of the managed device.  
Perform the following configuration in system view.  
Table 47-3 Set the system information  
Operation  
Command  
snmp-agent sys-info { contact sysContact |  
location sysLocation | version { { v1 | v2c | v3 }*  
| all } }  
Set the system information  
undo snmp-agent sys-info { { contact |  
location }* | version { { v1 | v2c | v3 }* | all } }  
Restore the default information  
By default, the version is SNMPv3  
47.3.3 Enabling/Disabling SNMP Agent to Send Trap  
The managed device transmits trap without request to the Network Management  
Station to report some critical and urgent events (such as restart).  
You can use the following commands to enable or disable the managed device to send  
trap message.  
Perform the following configuration in corresponding views.  
47-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
Table 47-4 Enable/disable SNMP Agent to send Trap  
Operation  
Command  
snmp-agent trap enable [ standard  
[
[
authentication  
linkdown  
]
[
coldstart  
]
Enable the sending of trap(system view)  
]
[
linkup bgp  
]
|
[ backwardtransition ] [ established ] |  
vrrp [ authfailure | newmaster ] ]  
undo  
snmp-agent  
trap  
enable  
[
standard  
[
authentication  
]
Disable the sending of trap(system view) [ coldstart ] [ linkdown ] [ linkup ] | bgp  
[ backwardtransition ] [ established ] |  
vrrp [ authfailure | newmaster ] ]  
Enable the switch ports to send SNMP  
trap messages (Ethernet port view or enable snmp trap updown  
VLAN interface view)  
Disable the switch port to send SNMP  
trap messages (Ethernet port view or undo enable snmp trap updown  
VLAN interface view)  
By default, the current port or VLAN interface sends trap messages.  
47.3.4 Setting the Destination Address of Trap  
You can use the following commands to set or delete the destination address of the  
trap.  
Perform the following configuration in system view.  
Table 47-5 Set the destination address of trap  
Operation  
Command  
snmp-agent target-host trap address  
udp-domain  
udp-port-number ] params securityname  
community-string v1 v2c v3  
[ authentication | privacy ] ]  
host-addr  
[
udp-port  
Set the destination address of trap  
[
|
|
Delete the destination address of undo snmp-agent target-host host-addr  
trap  
securityname community-string  
47.3.5 Setting Lifetime of Trap Message  
You can use the following command to set lifetime of Trap message. Trap message that  
exists longer than the set lifetime will be dropped.  
Perform the following configuration in system view.  
47-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
Table 47-6 Set the lifetime of Trap message  
Operation  
Command  
Set lifetime of Trap message  
Restore lifetime of Trap message  
snmp-agent trap life seconds  
undo snmp-agent trap life  
By default, the lifetime of Trap message is 120 seconds.  
47.3.6 Setting the Engine ID of a Local or Remote Device  
You can use the following commands to set the engine ID of a local or remote device.  
Perform the following configuration in system view.  
Table 47-7 Set the engine ID of a local or remote device  
Operation  
Command  
Set the engine ID of the device  
snmp-agent local-engineid engineid  
Restore the default engine ID of the  
device.  
undo snmp-agent local-engineid  
The engine ID of the device is in hexadecimal notation and has at least five characters,  
which can be IP address, MAC address or self-defined text. It defaults to the enterprise  
number + the device information.  
47.3.7 Setting/Deleting an SNMP Group  
You can use the following commands to set or delete an SNMP group.  
Perform the following configuration in system view.  
Table 47-8 Set/Delete an SNMP Group  
Operation  
Command  
snmp-agent group { v1 | v2c } group-name  
[
read-view read-view  
]
[
write-view  
write-view ] [ notify-view notify-view ] [ acl  
acl-list ]  
Set an SNMP group  
snmp-agent  
[ authentication | privacy ] [ read-view  
read-view write-view write-view  
[notify-view notify-view ] [ acl acl-list ]  
group  
v3  
group-name  
]
[
]
undo snmp-agent group { v1 | v2c }  
group-name  
Delete an SNMP group  
undo snmp-agent group v3 group-name  
[ authentication | privacy ]  
47-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
47.3.8 Setting the Source Address of Trap  
You can use the following commands to set or remove the source address of the trap.  
Perform the following configuration in system view.  
Table 47-9 Set the source address of trap  
Operation  
Command  
snmp-agent trap source interface-name  
interface-num  
Set the Source Address of Trap  
Remove the source address of trap  
undo snmp-agent trap source  
Note:  
Currently, this command takes effect only on the interfaces with vlan-interface type.  
47.3.9 Adding/Deleting a User to/from an SNMP Group  
You can use the following commands to add or delete a user to/from an SNMP group.  
Perform the following configuration in system view.  
Table 47-10 Add/Delete a user to/from an SNMP group  
Operation  
Command  
snmp-agent usm-user { v1 | v2c } username  
groupname [ acl acl-list ]  
snmp-agent usm-user v3 username groupname  
Add a user to an SNMP group.  
[
authentication-mode  
authpassstring privacy-mode  
privpassstring } ] ] [ acl acl-list ]  
{
md5  
|
sha  
}
[
{
des56  
undo snmp-agent usm-user { v1 | v2c }  
username groupname  
Delete a user from an SNMP  
group.  
undo snmp-agent usm-user v3 username  
groupname { local | engineid engine-id }  
You must first configure the SNMP engine ID before configuring the remote user for an  
agent, because the engine ID is required during the authentication. If you forget to  
configure the engine ID before adding a user, the operation of adding this user will fail.  
For SNMP V1 and V2c, this operation is adding a new community name, while for  
SNMP V3, this operation is adding a user for an SNMP group.  
47-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
47.3.10 Creating/Updating View Information or Deleting a View  
You can specify the view to control the access to the MIB by SNMP manager. You can  
use either the predefined views or the self-defined views. You can use the following  
commands to create, update the information of views or delete a view.  
Perform the following configuration in system view.  
Table 47-11 Create/Update view information or delete a view  
Operation  
Create/Update  
Command  
view snmp-agent mib-view { included | excluded }  
view-name oid-tree  
information  
Delete a view  
undo snmp-agent mib-view view-name  
47.3.11 Setting the Size of the SNMP Packet Sent/Received by an Agent  
You can use the following commands to set the size of SNMP packet sent/received by  
an agent.  
Perform the following configuration in system view.  
Table 47-12 Set the size of the SNMP packet sent/received by an agent  
Operation  
Command  
packet  
Set the size of the SNMP packet snmp-agent  
max-size  
sent/received by an agent  
byte-count  
Restore the default size of the SNMP  
packet sent/received by an agent  
undo snmp-agent packet max-size  
The agent can receive/send the SNMP packets of the sizes ranging from 484 to 17940,  
measured in bytes. By default, the size of an SNMP packet is 1500 bytes.  
47.3.12 Disabling SNMP Agent  
To disable SNMP Agent, perform the following configuration in system view.  
Table 47-13 Disable snmp agent  
Operation  
Disable snmp agent  
Command  
undo snmp-agent  
If users disable NMP Agent, it will be enabled whatever snmp-agent command is  
configured thereafter.  
47-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
47.4 Displaying and Debugging SNMP  
After the above configuration, execute the display command in any view to display the  
running of the SNMP configuration, and to verify the effect of the configuration.  
Table 47-14 Display and debug SNMP  
Operation  
Command  
Display the statistics information about  
SNMP packets  
display snmp-agent statistics  
Display the engine ID of the active display snmp-agent { local-engineid |  
device  
remote-engineid }  
Display the group name, the security  
mode, the states for all types of views, display  
and the storage mode of each group of [ group-name ]  
the switch.  
snmp-agent  
group  
display  
snmp-agent  
usm-user  
Display SNMP user information in the  
group user table  
[ engineid engineid | group groupname  
| username username ]*  
display  
[ read | write ]  
snmp-agent  
community  
Display the current community name  
Display the current MIB view  
display snmp-agent  
[ exclude | include | { viewname  
mib-view } ]  
mib-view  
Display the contact character strings,  
location character strings, and the  
SNMP version of the system  
display snmp-agent sys-info [ contact  
| location | version ]*  
47.5 SNMP Configuration Example  
I. Network requirements  
Network Management Station and the Ethernet switch are connected through the  
Ethernet. The IP address of Network Management Station is 129.102.149.23 and that  
of the VLAN interface on the switch is 129.102.0.1. Perform the following configurations  
on the switch: setting the community name and access authority, administrator ID,  
contact and switch location, and enabling the switch to send trap packets.  
47-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
II. Network diagram  
129.102.0.1  
129.102.149.23  
NMS  
Ethernet  
Figure 47-2 Network diagram for SNMP configuration  
III. Configuration procedure  
Enter the system view.  
<SW8800> system-view  
Set the community name, group and user.  
[SW8800] snmp-agent sys-info version all  
[SW8800] snmp-agent community write public  
[SW8800] snmp-agent mib include internet 1.3.6.1  
[SW8800] snmp-agent group v3 managev3group write internet  
[SW8800] snmp-agent usm v3 managev3user managev3group  
Set the VLAN interface 2 as the interface for network management. Add port  
GigabitEthernet 2/1/3 to the VLAN 2. This port will be used for network management.  
Set the IP address of VLAN interface 2 as 129.102.0.1.  
[SW8800] vlan 2  
[SW8800-vlan2] port gigabitethernet 2/1/3  
[SW8800-vlan2] interface vlan 2  
[SW8800-Vlan-interface2] ip address 129.102.0.1 255.255.0.0  
Enable SNMP agent to send the trap to network management station whose IP address  
is 129.102.149.23. The SNMP community is public.  
[SW8800] snmp-agent trap enable standard authentication  
[SW8800] snmp-agent trap enable standard coldstart  
[SW8800] snmp-agent trap enable standard linkup  
[SW8800] snmp-agent trap enable standard linkdown  
[SW8800] snmp-agent target-host trap address udp-domain 129.102.149.23  
udp-port 5000 params securityname public  
IV. Configure network management system  
The PC on which the network management resides requires for login configuration. As  
for Mib-Browser, the login configuration is as follows: SNMPV1/V2 logs in using the  
default community name public, and the SNMPV3 logs in using managev3user.  
47-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 47 SNMP Configuration  
Users can query and configure the Ethernet switch through the network management  
system. For details, see the manuals for the network management products.  
47-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 48 RMON Configuration  
Chapter 48 RMON Configuration  
48.1 RMON Overview  
Remote Network Monitoring (RMON) is a type of IETF-defined MIB. It is the most  
important enhancement to the MIB II standard. It mainly used for monitoring the data  
traffic on a segment and even on a whole network. It is one of the widely used Network  
Management standards by far.  
RMON is implemented fully based on the SNMP architecture (which is one of its  
outstanding advantages) and compatible with the existing SNMP framework, and  
therefore it is unnecessary to adjust the protocol. RMON includes NMS and the Agent  
running on the network devices. On the network monitor or detector, RMON Agent  
tracks and accounts different traffic information on the segment connected to its port,  
such as the total number of packets on a segment in a certain period of time or that of  
the correct packets sent to a host. ROMN helps the SNMP monitor the remote network  
device more actively and effectively, which provides a highly efficient means for the  
monitoring of the subnet operations. RMON can reduce the communication traffic  
between the NMS and the agent, thus facilitates an effective management over the  
large interconnected networks.  
RMON allows multiple monitors. It can collect data in two ways.  
z
One is to collect data with a special RMON probe. NMS directly obtains the  
management information from the RMON probe and controls the network  
resource. In this way, it can obtain all the information of RMON MIB  
z
Another way is to implant the RMON Agent directly into the network devices (for  
example router, switch and HUB), so that the devices become network facilities  
with RMON probe function. RMON NMS uses the basic SNMP commands to  
exchange data information with SNMP Agent and collect NM information.  
However, limited by the device resources, normally, not all the data of RMON MIB  
can be obtained with this method. In most cases, only four groups of information  
can be collected. The four groups include alarm information, event information,  
history information and statistics information.  
The Ethernet Switch implements RMON in the second method by far. With the  
RMON-supported SNMP Agent running on the network monitor, NMS can obtain such  
information as the overall traffic of the segment connected to the managed network  
device port, the error statistics and performance statistics, thereby implementing the  
management (generally remote management) over the network.  
48.2 Configuring RMON  
48-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 48 RMON Configuration  
Note:  
Before configuring RMON, you must ensure that the SNMP agent is properly  
configured. See Chapter 50 SSH Terminal Service for the SNMP agent configuration.  
The following sections describe the RMON configuration tasks.  
z
z
z
z
z
48.2.1 Adding/Deleting an Entry to/from the Event Table  
RMON event management defines the event ID and the handling of the event.  
You can handle the event in the following ways:  
z
z
z
Keeping logs  
Sending the trap messages to NMS  
Keeping logs and sending the trap messages to NMS  
Perform the following configuration in system view.  
Table 48-1 Add/delete an entry to/from the event table  
Operation  
Command  
rmon event event-entry [ description  
string ] { log | trap trap-community |  
Add an entry to the event table  
log-trap log-trapcommunity  
[ owner rmon-station ]  
|
none  
}
Delete an entry from the event table undo rmon event event-entry  
48.2.2 Adding/Deleting an Entry to/from the Alarm Table  
RMON alarm management can monitor the specified alarm variables such as the  
statistics on a port. When a value of the monitored data exceeds the defined threshold,  
an alarm event will be generated. And then the events are handled according to the  
definition, which is decided in the event management.  
Note:  
Before adding an entry to the alarm table, you need to define the event referenced in  
the alarm table by using the rmon event command.  
48-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 48 RMON Configuration  
Perform the following configuration in system view.  
Table 48-2 Add/delete an entry to/from the alarm table  
Operation  
Command  
rmon alarm entry-number alarm-variable  
sampling-time delta absolute  
{
|
}
Add an entry to the alarm table  
rising-threshold  
threshold-value1  
event-entry1  
falling-threshold  
threshold-value2 event-entry2 [ owner text ]  
Delete an entry from the alarm table undo rmon alarm entry-number  
After you defined the alarm entry, the system then processes the entry in the following  
way:  
1) Sampling the defined alarm-variable according to the time interval sampling-time  
that you have set  
2) Comparing the sampled value with the configured threshold and handling them in  
the way described in the following table  
Table 48-3 Handling the alarm entry  
Case  
Processing  
The sampled value is greater than the The defined event event-entry1 is  
configured upper limit threshold-value1 triggered  
The sampled value is less than the The defined event event-entry2 is  
configured lower limit threshold-value2 triggered  
48.2.3 Adding/Deleting an Entry to/from the Extended RMON Alarm Table  
You can use the command to add/delete an entry to/from the extended RMON alarm  
table. The extended alarm entry performs mathematical operation to the sampled value  
of the alarm variable, and then the result will be compared with the configured threshold  
to implementing the alarm function.  
Note:  
Before adding extended alarm entry, you need to define the referenced event in the  
extended alarm entry by using the rmon event command.  
You can define up to 50 prialarm entries.  
Perform the following configuration in system view.  
48-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 48 RMON Configuration  
Table 48-4 Add/delete an entry to/from the extended RMON alarm table  
Operation  
Command  
rmon  
[ alarm-des ] sampling-timer { delta | absolute |  
Add an entry to the extended changeratio } rising-threshold threshold-value1  
prialarm  
entry-number  
alarm-var  
RMON alarm table  
event-entry1 falling-threshold threshold-value2  
event-entry2 entrytype forever cycle  
cycle-period } [ owner text ]  
{
|
Delete an entry from the  
extended RMON alarm table  
undo rmon prialarm entry-number  
After you define the extended alarm entry, the system processes the entry in the  
following way:  
1) Sampling the defined prialarm-formula according to the time interval  
sampling-time that you have set  
2) Performing the operation to the sampled value according to the defined formula  
prialarm-formula  
3) Comparing the resule with the configured threshold and handling them in the way  
described in the following table  
Table 48-5 Handling the extended alarm entry  
Case  
Processing  
The result is greater than the configured The defined event event-entry1 is  
upper limit threshold-value1 triggered  
The result is less than the configured lower The defined event event-entry2 is  
limit threshold-value2 triggered  
48.2.4 Adding/Deleting an Entry to/from the History Control Table  
The history data management helps you set the history data collection, periodical data  
collection and storage of the specified ports. The sampling information includes the  
utilization ratio, error counts and total number of packets.  
You can use the following commands to add/delete an entry to/from the history control  
table.  
Perform the following configuration in Ethernet port view.  
Table 48-6 Add/delete an entry to/from the history control table  
Operation  
Command  
Add an entry to the history rmon history entry-number buckets number  
control table.  
interval sampling-interval [ owner text-string ]  
48-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 48 RMON Configuration  
Delete an entry from the  
history control table.  
undo rmon history entry-number  
History control entry calculates various data at the sampling time interval.You can use  
the display rmon history command to view the information of the history control entry.  
48.2.5 Adding/Deleting an Entry to/from the Statistics Table  
The RMON statistics management concerns the port usage monitoring and error  
statistics when using the ports. The statistics include collision, CRC and queuing,  
undersize packets or oversize packets, timeout transmission, fragments, broadcast,  
multicast and unicast messages and the usage ratio of bandwidth.  
You can use the following commands to add/delete an entry to/from the statistics table.  
Perform the following configuration in Ethernet port view.  
Table 48-7 Add/delete an entry to/from the statistics table  
Operation  
Command  
rmon statistics entry-number [ owner  
text-string ]  
Add an entry to the statistics table  
Delete an entry from the statistics table  
undo rmon statistics entry-number  
Statistics entry calculates the accumulated information starting from the time defined by  
an event. You can use the display rmon history command to view the information of  
the statistics entry.  
48.3 Displaying and Debugging RMON  
After the above configuration, execute the display command in any view to display the  
running of the RMON configuration, and to verify the effect of the configuration.  
Table 48-8 Display and debug RMON  
Operation  
Command  
Display the RMON statistics  
display rmon statistics [ port-num ]  
Display the history information of RMON display rmon history [ port-num ]  
display  
[ alarm-table-entry ]  
rmon  
alarm  
prialarm  
event  
Display the alarm information of RMON  
Display the extended alarm information display  
rmon  
of RMON  
[ prialarm-table-entry ]  
display  
[ event-table-entry ]  
rmon  
Display the RMON event  
48-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 48 RMON Configuration  
display  
[ event-number ]  
rmon  
eventlog  
Display the event log of RMON  
48.4 RMON Configuration Example  
I. Network requirements  
Set an entry in RMON Ethernet statistics table for the Ethernet port performance, which  
is convenient for network administrators’ query.  
II. Network diagram  
Internet  
Network Port  
Console Port  
Switch  
Figure 48-1 Network diagram for RMON configuration  
III. Configuration procedure  
Configure RMON.  
[SW8800-Ethernet2/1/1] rmon statistics 1 owner 3Com-rmon  
View the configurations in user view.  
<SW8800> display rmon statistics Ethernet 2/1/1  
Statistics entry 1 owned by 3Com-rmon is VALID.  
Gathers statistics of interface Ethernet2/1/1. Received:  
octets  
: 270149,  
packets  
: 1954  
broadcast packets  
:1570  
,
,
,
,
multicast packets:365  
oversized packets:0  
jabbers packets :0  
undersized packets :0  
fragments packets :0  
CRC alignment errors:0  
collisions  
:0  
Dropped packet events (due to lack of resources):0  
48-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 48 RMON Configuration  
Packets received according to length (in octets):  
64  
:644  
, 65-127 :518  
, 512-1023:3  
, 128-255 :688  
, 1024-1518:0  
256-511:101  
48-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
Chapter 49 NTP Configuration  
49.1 Brief Introduction to NTP  
49.1.1 NTP Functions  
As the network topology gets more and more complex, it becomes important to  
synchronize the clocks of the equipment on the whole network. Network Time Protocol  
(NTP) is the TCP/IP that advertises the accurate time throughout the network.  
NTP ensures the consistency of the following applications:  
z
z
For the increment backup between the backup server and client, NTP ensures the  
clock synchronization between the two systems.  
For multiple systems that coordinate to process a complex event, NTP ensures  
them to reference the same clock and guarantee the right order of the event.  
Guarantee the normal operation of the inter-system (Remote Procedure Call).  
Record for an application when a user logs in to a system, a file is modified, or  
some other operation is performed.  
z
z
49.1.2 Basic Operating Principle of NTP  
The following figure illustrates the basic operating principle of NTP:  
packet  
LS_A  
NTP  
10:00:00am  
Network  
1.  
LS_B  
packet  
NTP  
10:00:00am  
11:00:01am  
Network  
2.  
3.  
LS_A  
LS_B  
10:00:00am  
packet  
11:00:01am 11:00:02am  
NTP  
Network  
LS_B  
LS_A  
NTP Packet received at 10:00:03  
Network  
LS_A  
4.  
LS_B  
Figure 49-1 Basic operating principle of NTP  
In the figure above, Ethernet Switch A and Ethernet Switch B are connected through  
the Ethernet port. They have independent system clocks. Before implement automatic  
clock synchronization on both switches, we assume that:  
49-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
z
z
z
Before synchronizing the system clocks on Ethernet Switch A and B, the clock on  
Ethernet Switch A is set to 10:00:00am, and that on B is set to 11:00:00am.  
Ethernet Switch B serves as an NTP time server. That is, Ethernet Switch A  
synchronizes the local clock with the clock of B.  
It takes 1 second to transmit a data packet from either A or B to the opposite end.  
The system clocks are synchronized as follows:  
z
z
z
z
Ethernet Switch A sends an NTP packet to Ethernet Switch B. The packet carries  
the timestamp 10:00:00am (T1) that tells when it left Ethernet Switch A.  
When the NTP packet arrives at Ethernet Switch B, Ethernet Switch B adds a local  
timestamp 11:00:01am (T2) to it.  
When the NTP packet leaves Ethernet Switch B, Ethernet Switch B adds another  
local timestamp 11:00:02am (T3) to it.  
When Ethernet Switch A receives the acknowledgement packet, it adds a new  
timestamp 10:00:03am (T4) to it.  
Now Ethernet Switch A collects enough information to calculate the following two  
important parameters:  
z
The delay for a round trip of an NTP packet traveling between the Switch A and B:  
Delay= (T4-T1) - (T3-T2).  
z
Offset of Ethernet Switch A clock relative to Ethernet Switch B clock: offset=  
( (T2-T1) + (T4-T3) ) /2.  
In this way, Ethernet Switch A uses the above information to set the local clock and  
synchronize it with the clock on Ethernet Switch B.  
The operating principle of NTP is briefly introduced above. For details, refer to  
RFC1305.  
49.2 NTP Configuration  
NTP is used for time synchronization throughout a network. The following sections  
describe the NTP configuration tasks.  
z
z
z
z
z
z
z
z
49.2.1 Configuring NTP Operating Mode  
You can set the NTP operating mode of an Ethernet Switch according to its location in  
the network and the network structure. For example, you can set a remote server as the  
49-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
time server of the local equipment. In this case the local Ethernet Switch works as an  
NTP client. If you set a remote server as a peer of the local Ethernet Switch, the local  
equipment operates in symmetric active mode. If you configure an interface on the local  
Ethernet Switch to transmit NTP broadcast packets, the local Ethernet Switch will  
operates in broadcast mode. If you configure an interface on the local Ethernet Switch  
to receive NTP broadcast packets, the local Ethernet Switch will operates in broadcast  
client mode. If you configure an interface on the local Ethernet Switch to transmit NTP  
multicast packets, the local Ethernet Switch will operates in multicast mode. Or you  
may also configure an interface on the local Ethernet Switch to receive NTP multicast  
packets, the local Ethernet Switch will operates in multicast client mode.  
z
z
z
z
z
z
Configure NTP server mode  
Configure NTP peer mode  
Configure NTP broadcast server mode  
Configure NTP broadcast client mode  
Configure NTP multicast server mode  
Configure NTP multicast client mode  
I. Configuring NTP Server Mode  
Set a remote server whose ip address is ip-address as the local time server. ip-address  
specifies a host address other than a broadcast, multicast or reference clock IP  
address. In this case, the local Ethernet Switch operates in client mode. In this mode,  
only the local client synchronizes its clock with the clock of the remote server, while the  
reverse synchronization will not happen.  
Perform the following configuration in system view.  
Table 49-1 Configure NTP time server  
Operation  
Command  
ntp-service unicast-server ip-address [ version  
number  
|
authentication-keyid  
keyid  
|
Configure NTP time server  
Cancel NTP server mode  
source-interface { interface-name | interface-type  
interface-number } | priority ]*  
undo ntp-service unicast-server ip-address  
NTP version number number ranges from 1 to 3 and defaults to 3; the authentication  
key ID keyid ranges from 1 to 4294967295; interface-name or interface-type  
interface-number specifies an interface, from which the source IP address of the NTP  
packets sent from the local Ethernet Switch to the time server will be taken, the  
interface can be VLAN interface and Loopback interface; priority indicates the time  
server will be the first choice.  
49-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
II. Configuring NTP Peer Mode  
Set a remote server whose ip address is ip-address as the peer of the local equipment.  
In this case, the local equipment operates in symmetric active mode. ip-address  
specifies a host address other than a broadcast, multicast or reference clock IP  
address. In this mode, both the local Ethernet Switch and the remote server can  
synchronize their clocks with the clock of opposite end.  
Perform the following configuration in system view.  
Table 49-2 Configure NTP peer mode  
Operation  
Command  
ntp-service unicast-peer ip-address [ version  
number  
|
authentication-key  
keyid  
|
Configure NTP peer mode  
Cancel NTP peer mode  
source-interface { interface-name | interface-type  
interface-number } | priority ]*  
undo ntp-service unicast-peer ip-address  
NTP version number number ranges from 1 to 3 and defaults to 3; the authentication  
key ID keyid ranges from 1 to 4294967295; interface-name or interface-type  
interface-number specifies an interface, from which the source IP address of the NTP  
packets sent from the local Ethernet Switch to the peer will be taken, the interface can  
be VLAN interface and Loopback interface; priority indicates the peer will be the first  
choice for time server.  
III. Configuring NTP Broadcast Server Mode  
Designate an interface on the local Ethernet Switch to transmit NTP broadcast packets.  
In this case, the local equipment operates in broadcast mode and serves as a  
broadcast server to broadcast messages to its clients regularly.  
Perform the following configuration in VLAN interface view.  
Table 49-3 Configure NTP broadcast server mode  
Operation  
Command  
broadcast-server  
ntp-service  
Configure NTP broadcast server mode [ authentication-keyid keyid version  
number ]*  
Cancel NTP broadcast server mode  
undo ntp-service broadcast-server  
NTP version number number ranges from 1 to 3 and defaults to 3; the authentication  
key ID keyid ranges from 1 to 4294967295; This command can only be configured on  
the interface where the NTP broadcast packets will be transmitted.  
49-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
IV. Configuring NTP Broadcast Client Mode  
Designate an interface on the local Ethernet Switch to receive NTP broadcast  
messages and operate in broadcast client mode. The local Ethernet Switch listens to  
the broadcast from the server. When it receives the first broadcast packets, it starts a  
brief client/server mode to switch messages with a remote server for estimating the  
network delay. Thereafter, the local Ethernet Switch enters broadcast client mode and  
continues listening to the broadcast and synchronizes the local clock according to the  
arrived broadcast message.  
Perform the following configuration in VLAN interface view.  
Table 49-4 Configure NTP broadcast client mode  
Operation  
Command  
Configure NTP broadcast client mode  
Disable NTP broadcast client mode  
ntp-service broadcast-client  
undo ntp-service broadcast-client  
This command can only be configured on the interface where the NTP broadcast  
packets will be received.  
V. Configuring NTP Multicast Server Mode  
Designate an interface on the local Ethernet Switch to transmit NTP multicast packets.  
In this case, the local equipment operates in multicast mode and serves as a multicast  
server to multicast messages to its clients regularly.  
Perform the following configuration in VLAN interface view.  
Table 49-5 Configure NTP multicast server mode  
Operation  
Command  
ntp-service multicast-server [ ip-address ]  
[ authentication-keyid keyid | ttl ttl-number  
| version number ]*  
Configure NTP multicast server  
mode  
undo  
[ ip-address ]  
ntp-service  
multicast-server  
Cancel NTP multicast server mode  
NTP version number number ranges from 1 to 3 and defaults to 3; the authentication  
key ID keyid ranges from 1 to 4294967295; ttl-number of the multicast packets ranges  
from 1 to 255; And the multicast IP address defaults to 224.0.1.1. Actually, for the  
Switch 8800, you can set 224.0.1.1 as the multicast IP address only.  
This command can only be configured on the interface where the NTP multicast packet  
will be transmitted.  
49-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
VI. Configuring NTP Multicast Client Mode  
Designate an interface on the local Ethernet Switch to receive NTP multicast messages  
and operate in multicast client mode. The local Ethernet Switch listens to the multicast  
from the server. When it receives the first multicast packets, it starts a brief client/server  
mode to switch messages with a remote server for estimating the network delay.  
Thereafter, the local Ethernet Switch enters multicast client mode and continues  
listening to the multicast and synchronizes the local clock by the arrived multicast  
message.  
Perform the following configuration in VLAN interface view.  
Table 49-6 Configure NTP multicast client mode  
Operation  
Command  
multicast-client  
ntp-service  
[ ip-address ]  
Configure NTP multicast client mode  
Cancel NTP multicast client mode  
undo ntp-service multicast-client  
Multicast IP address ip-address defaults to 224.0.1.1; this command can only be  
configured on the interface where the NTP multicast packets will be received. Actually,  
for the Switch 8800, you can set 224.0.1.1 as the multicast IP address only.  
49.2.2 Configuring NTP ID Authentication  
Enable NTP authentication, set MD5 authentication key, and specify the reliable key. A  
client will synchronize itself by a server only if the serve can provide a reliable key.  
Perform the following configuration in system view.  
Table 49-7 Configure NTP authentication  
Operation  
Command  
Enable NTP authentication  
Disable NTP authentication  
ntp-service authentication enable  
undo ntp-service authentication enable  
49.2.3 Setting NTP Authentication Key  
This configuration task is to set NTP authentication key.  
Perform the following configuration in system view.  
49-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
Table 49-8 Configure NTP authentication key  
Operation  
Command  
ntp-service authentication-keyid number  
authentication-mode md5 value  
Configure NTP authentication key  
undo ntp-service authentication-keyid  
number  
Remove NTP authentication key  
Key number number ranges from 1 to 4294967295; the key value contains 1 to 32  
ASCII characters.  
49.2.4 Setting Specified Key as Reliable  
This configuration task is to set the specified key as reliable.  
Perform the following configuration in system view.  
Table 49-9 Set the specified key as reliable  
Operation  
Command  
ntp-service reliable authentication-keyid  
key-number  
Set the specified key as reliable  
undo  
ntp-service  
reliable  
Cancel the specified reliable key.  
authentication-keyid key-number  
Key number key-number ranges from 1 to 4294967295  
49.2.5 Designating an Interface to Transmit NTP Messages  
If the local equipment is configured to transmit all the NTP messages, these packets  
will have the same source IP address, which is taken from the IP address of the  
designated interface.  
Perform the following configuration in system view.  
Table 49-10 Designate an interface to transmit NTP messages  
Operation  
Command  
Designate an interface to ntp-service source-interface { interface-name |  
transmit NTP messages  
interface-type interface-number }  
Cancel the interface to  
transmit NTP messages  
undo ntp-service source-interface  
An interface is specified by interface-name or interface-type interface-number, and the  
interface can be VLAN interface and Loopback interface at present. The source  
address of the packets will be taken from the IP address of the interface. If the  
49-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
ntp-service unicast-server or ntp-service unicast-peer command also designates a  
transmitting interface, use the one designated by them.  
49.2.6 Setting NTP Master Clock  
This configuration task is to set the external reference clock or the local clock as the  
NTP master clock.  
Perform the following configuration in system view.  
Table 49-11 Set the external reference clock or the local clock as the NTP master clock  
Operation  
Command  
refclock-master  
Set the external reference clock or the ntp-service  
local clock as the NTP master clock.  
[ ip-address ] [ stratum ]  
undo ntp-service refclock-master  
[ ip-address ]  
Cancel the NTP master clock settings  
ip-address specifies the IP address 127.127.1.u of a reference clock, in which u ranges  
from 0 to 3. stratum specifies how many stratums the local clock belongs to and ranges  
from 1 to 15.  
The IP address defaults 127.127.1.0, and the stratum defaults to 8.  
49.2.7 Setting Authority to Access a Local Ethernet Switch  
Set authority to access the NTP services on a local Ethernet Switch. This is a basic and  
brief security measure, compared to authentication. An access request will be matched  
with peer, server, server only, and query only in an ascending order of the limitation.  
The first matched authority will be given.  
Perform the following configuration in system view.  
Table 49-12 Set authority to access a local Ethernet switch  
Operation  
Command  
access  
Set authority to access a local ntp-service  
{
query  
|
Ethernet switch  
synchronization | server | peer } acl-number  
Cancel settings of the authority to undo ntp-service access  
{
query |  
access a local Ethernet switch synchronization | server | peer }  
IP address ACL number is specified through the acl-number parameter and ranges  
from 2000 to 2999. The meanings of other authority levels are as follows:  
query: Allow control query for the local NTP service only.  
synchronization: Allow request for local NTP time service only.  
49-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
server: Allow local NTP time service request and control query. However, the local  
clock will not be synchronized by a remote server.  
peer: Allow local NTP time service request and control query. And the local clock will  
also be synchronized by a remote server.  
49.2.8 Setting Maximum Local Sessions  
This configuration task is to set the maximum local sessions.  
Perform the following configurations in system view.  
Table 49-13 Set the maximum local sessions  
Operation  
Command  
ntp-service  
number  
max-dynamic-sessions  
Set the maximum local sessions  
Resume the maximum number of local undo  
sessions  
max-dynamic-sessions  
ntp-service  
number specifies the maximum number of local sessions, ranges from 0 to 100, and  
defaults to 100.  
49.3 Displaying and Debugging NTP  
After completing the above configurations, you can use the display command to show  
how NTP runs and verify the configurations according to the outputs.  
In user view, you can use the debugging command to debug NTP.  
Table 49-14 Display and debug NTP  
Operation  
Command  
Display the status of NTP service  
display ntp-service status  
Display the status of sessions maintained by display ntp-service sessions  
NTP service  
[ verbose ]  
Display the brief information about every NTP  
time server on the way from the local display ntp-service trace  
equipment to the reference clock source.  
Enable NTP debugging  
debugging ntp-service  
49-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
49.4 NTP Configuration Example  
49.4.1 Configuring a NTP Server  
I. Network requirements  
On SW88001, set local clock as the NTP master clock at stratum 2. On SW88002,  
configure SW88001 as the time server in server mode and set the local equipment as in  
client mode. (Note: SW88001 supports to configure the local clock as the master clock)  
II. Network diagram  
Vlan-interface2:  
3.0.1.31  
Vlan-interface2:  
1.0.1.11  
Quidway3  
Quidway1  
Quidway2  
Vlan-interface2:  
3.0.1.32  
1.0.1.2  
3.0.1.2  
Quidway0  
Quidway4  
Quidway5  
Vlan-interface2:  
1.0.1.12  
Vlan-interface2:  
3.0.1.33  
......  
Figure 49-2 Typical NTP configuration network diagram  
III. Configuration procedure  
Configure Ethernet Switch SW88001:  
Enter system view.  
<SW88001> system-view  
Set the local clock as the NTP master clock at stratum 2.  
[SW88001] ntp-service refclock-master 2  
Configure Ethernet Switch SW88002:  
Enter system view.  
<SW88002> system-view  
Set SW88001 as the NTP server.  
[SW88002] ntp-service unicast-server 1.0.1.11  
The above examples synchronized SW88002 by SW88001. Before the  
synchronization, the SW88002 is shown in the following status:  
[SW88002] display ntp-service status  
clock status: unsynchronized  
49-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
clock stratum: 16  
reference clock ID: none  
nominal frequency: 100.0000 Hz  
actual frequency: 100.0000 Hz  
clock precision: 2^17  
clock offset: 0.0000 ms  
root delay: 0.00 ms  
root dispersion: 0.00 ms  
peer dispersion: 0.00 ms  
reference time: 00:00:00.000 UTC Jan 1 1900(00000000.00000000)  
After the synchronization, SW88002 turns into the following status:  
[SW88002] display ntp-service status  
Clock status: synchronized  
Clock stratum: 3  
Reference clock ID: 1.0.1.11  
Nominal frequency: 60.0002 Hz  
Actual frequency: 60.0002 Hz  
Clock precision: 2^17  
Clock offset: -9.8258 ms  
Root delay: 27.10 ms  
Root dispersion: 49.29 ms  
Peer dispersion: 10.94 ms  
Reference time: 19:21:32.287 UTC Oct 24 2004(C5267F3C.49A61E0C)  
By this time, SW88002 has been synchronized by SW88001 and is at stratum 3, higher  
than SW88001 by 1.  
Display the sessions of SW88002 and you will see SW88002 has been connected with  
SW88001.  
[SW88002] display ntp-service sessions  
source  
********************************************************************  
[12345]1.0.1.11 LOCAL(0) 377 64 16 -0.4 0.0 0.9  
reference  
stra reach poll now offset delay disper  
3
note: 1 source(master),2 source(peer),3 selected,4 candidate,5 configured  
49.4.2 NTP Peer Configuration Example  
I. Network requirements  
On SW88003, set local clock as the NTP master clock at stratum 2. On SW88002,  
configure SW88001 as the time server in server mode and set the local equipment as in  
client mode. At the same time, SW88005 sets SW88004 as its peer. (Note: SW88003  
supports to configure the local clock as the master clock)  
49-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
II. Network diagram  
See Figure 7-2.  
III. Configuration procedure  
Configure Ethernet Switch SW88003:  
Enter system view.  
<SW88003> system-view  
Set the local clock as the NTP master clock at stratum 2.  
[SW88003] ntp-service refclock-master 2  
Configure Ethernet Switch SW88004:  
Enter system view.  
<SW88004> system-view  
Set SW88001 as the NTP server at stratum 3 after synchronization.  
[SW88004] ntp-service unicast-server 3.0.1.31  
Configure Ethernet Switch SW88005: (SW88004 has been synchronized by SW88003)  
Enter system view.  
<SW88005> system-view  
Set the local clock as the NTP master clock at stratum 1.  
[SW88005] ntp-service refclock-master 1  
After performing local synchronization, set SW88004 as a peer.  
[SW88005] ntp-service unicast-peer 3.0.1.32  
The above examples configure SW88004 and SW88005 as peers and configure  
SW88005 as in active peer mode and SW88004 in passive peer mode. Since  
SW88005 is at stratum 1 and SW88004 is at stratum 3, synchronize SW88004 by  
SW88005.  
After synchronization, SW88004 status is shown as follows:  
[SW88004] display ntp-service status  
Clock status: synchronized  
Clock stratum: 2  
Reference clock ID: 3.0.1.31  
Nominal frequency: 60.0002 Hz  
Actual frequency: 60.0002 Hz  
Clock precision: 2^17  
Clock offset: -9.8258 ms  
Root delay: 27.10 ms  
Root dispersion: 49.29 ms  
Peer dispersion: 10.94 ms  
49-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
Reference time: 19:21:32.287 UTC Oct 24 2004(C5267F3C.49A61E0C)  
By this time, SW88004 has been synchronized by SW88005 and it is at stratum 2, or  
higher than SW88005 by 1.  
Display the sessions of SW88004 and you will see SW88004 has been connected with  
SW88005.  
[Quidwa4] display ntp-service sessions  
source  
********************************************************************  
[12345]3.0.1.33 LOCAL(0) 377 64 16 0.0 0.0 0.9  
note: 1 source(master),2 source(peer),3 selected,4 candidate,5 configured  
reference  
stra reach poll now offset delay disper  
2
49.4.3 Configure NTP Broadcast Mode  
I. Network requirements  
On SW88003, set local clock as the NTP master clock at stratum 2 and configure to  
broadcast packets from Vlan-interface2. Configure SW88004 and SW88001 to listen to  
the broadcast from their Vlan-interface2 respectively. (Note: SW88003 supports to  
configure the local clock as the master clock)  
II. Network diagram  
See Figure 7-2.  
III. Configuration procedure  
Configure Ethernet Switch SW88003:  
Enter system view.  
<SW88003> system-view  
Set the local clock as the NTP master clock at stratum 2.  
[SW88003] ntp-service refclock-master 2  
Enter Vlan-interface2 view.  
[SW88003] interface vlan-interface 2  
Set it as broadcast server.  
[SW88003-Vlan-Interface2] ntp-service broadcast-server  
Configure Ethernet Switch SW88004:  
Enter system view.  
<SW88004> system-view  
Enter Vlan-interface2 view.  
[SW88004] interface vlan-interface 2  
[SW88004-Vlan-Interface2] ntp-service broadcast-client  
49-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
Configure Ethernet Switch SW88001:  
Enter system view.  
<SW88001> system-view  
Enter Vlan-interface2 view.  
[SW88001] interface vlan-interface 2  
[SW88001-Vlan-Interface2] ntp-service broadcast-client  
The above examples configured SW88004 and SW88001 to listen to the broadcast  
through Vlan-interface2, SW88003 to broadcast packets from Vlan-interface2. Since  
SW88001 and SW88003 are not located on the same segment, they cannot receive  
any broadcast packets from SW88003, while SW88004 is synchronized by SW88003  
after receiving its broadcast packet.  
After the synchronization, you can find the state of SW88004 as follows:  
[SW88004] display ntp-service status  
clock status: synchronized  
clock stratum: 3  
reference clock ID: LOCAL(0)  
nominal frequency: 100.0000 Hz  
actual frequency: 100.0000 Hz  
clock precision: 2^17  
clock offset: 0.0000 ms  
root delay: 0.00 ms  
root dispersion: 10.94 ms  
peer dispersion: 10.00 ms  
reference time: 20:54:25.156 UTC Mar 7 2002(C0325201.2811A112)  
By this time, SW88004 has been synchronized by SW88003 and it is at stratum 3,  
higher than SW88003 by 1.  
Display the status of SW88004 sessions and you will see SW88004 has been  
connected to SW88003.  
[SW88002] display ntp-service sessions  
source  
reference  
LOCAL(0)  
LOCAL(0)  
0.0.0.0  
stra reach poll now offset delay disper  
[12345]127.127.1.0  
[5]1.0.1.11  
7
377  
0
64  
64  
64  
57  
-
0.0  
0.0  
0.0  
0.0  
0.0  
0.0  
1.0  
0.0  
0.0  
3
[5]128.108.22.44  
16  
0
-
note: 1 source(master),2 source(peer),3 selected,4 candidate,5 configured  
49.4.4 Configure NTP Multicast Mode  
I. Network requirements  
SW88003 sets the local clock as the master clock at stratum 2 and multicast packets  
from Vlan-interface2. Set SW88004 and SW88001 to receive multicast messages from  
49-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
their respective Vlan-interface2. (Note: SW88003 supports to configure the local clock  
as the master clock)  
II. Network diagram  
See Figure 7-2.  
1) Configuration procedure  
Configure Ethernet Switch SW88003:  
Enter system view.  
<SW88003> system-view  
Set the local clock as a master NTP clock at stratum 2.  
[SW88003] ntp-service refclock-master 2  
Enter Vlan-interface2 view.  
[SW88003] interface vlan-interface 2  
Set it as a multicast server.  
[SW88003-Vlan-Interface2] ntp-service multicast-server  
Configure Ethernet Switch SW88004:  
Enter system view.  
<SW88004> system-view  
Enter Vlan-interface2 view.  
[SW88004] interface vlan-interface 2  
Enable multicast client mode.  
[SW88004-Vlan-Interface2] ntp-service multicast-client  
Configure Ethernet Switch SW88001:  
Enter system view.  
<SW88001> system-view  
Enter Vlan-interface2 view.  
[SW88001] interface vlan-interface 2  
Enable multicast client mode.  
[SW88001-Vlan-Interface2] ntp-service multicast-client  
The above examples configure SW88004 and SW88001 to receive multicast  
messages from Vlan-interface2, SW88003 multicast messages from Vlan-interface2.  
Since SW88001 and SW88003 are not located on the same segments, SW88001  
cannot receive the multicast packets from SW88003, while SW88004 is synchronized  
by SW88003 after receiving the multicast packet.  
49-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
49.4.5 Configure Authentication-Enabled NTP Server Mode  
I. Network requirements  
SW88001 sets the local clock as the NTP master clock at stratum 2. SW88002 sets  
SW88001 as its time server in server mode and itself in client mode and enables  
authentication. (Note: SW88001 supports to configure the local clock as the master  
clock)  
II. Network diagram  
See Figure 7-2.  
III. Configuration procedure  
Configure Ethernet Switch SW88001:  
Enter system view.  
<SW88001> system-view  
Set the local clock as the master NTP clock at stratum 2.  
[SW88001] ntp-service refclcok-master 2  
Configure Ethernet Switch SW88002:  
Enter system view.  
<SW88002> system-view  
Set SW88001 as time server.  
[SW88002[ ntp-service unicast-server 1.0.1.11  
Enable authentication.  
[SW88002] ntp-service authentication enable  
Set the key.  
[SW88002] ntp-service authentication-keyid 42 authentication-mode md5  
aNiceKey  
Set the key as reliable.  
[SW88002] ntp-service reliable authentication-keyid 42  
[Qudiway2] ntp-service unicast-server 1.0.1.11 authentication-keyid 42  
The above examples synchronized SW88002 by SW88001. Since SW88001 has not  
been enabled authentication, it cannot synchronize SW88002. And now let us do the  
following additional configurations on SW88001 :  
Enable authentication.  
[SW88001] ntp-service authentication enable  
Set the key.  
49-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 49 NTP Configuration  
[SW88001] ntp-service authentication-keyid 42 authentication-mode md5  
aNiceKey  
Configure the key as reliable.  
[SW88001] ntp-service reliable authentication-keyid 42  
49-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Chapter 50 SSH Terminal Service  
50.1 SSH Terminal Service  
50.1.1 SSH Overview  
This chapter introduces the secure shell (SSH) feature. When a user telnets to the  
switch from an insecure network, the SSH feature can provide secure information and  
powerful authentication functionality, thereby protecting the switch from attacks such as  
IP address spoofing and clear text password interception attacks.  
The switch can act as either SSH server or SSH client. When used as an SSH server,  
the switch supports multiple connections with SSH clients; when used as an SSH client,  
the switch supports SSH connections with the SSH server-enabled switch, UNIX hosts,  
and so on.  
Currently, the switch supports SSH 2.0.  
Figure 50-1 and Figure 50-2 illustrate two methods for establishing an SSH channel  
between a client and the server:  
z
z
Connect through a LAN  
Connect through a WAN  
Switch  
SSH server  
Workstation  
100BASE-TX  
Ethernet  
Laptop  
Server  
PC  
SSH client  
Figure 50-1 Establish an SSH channel through a LAN  
50-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Workstation  
Local switch  
Local Ethernet  
Laptop  
Workstation  
PC  
SSH client  
Server  
WAN  
Remote Ethernet  
Remote switch  
SSH server  
Laptop  
PC  
Server  
Figure 50-2 Establish an SSH channel through a WAN  
To establish an SSH authentication secure connection, the server and the client must  
go through the following five phases:  
1) Version number negotiation:  
z
The client sends a TCP connection request.  
z
After the TCP connection is established, the server and the client negotiate the  
version number.  
z
If the negotiation succeeds, the key algorithm negotiation phase starts; otherwise,  
the server tears down the TCP connection.  
2) Key algorithm negotiation:  
z
z
z
z
z
The server generates a RSA key pair randomly, and sends the public key in the  
key pair to the client.  
The client uses the public key from the server and a random number generated  
locally (in length of eight bytes) as parameters to calculate the session key.  
Using the public key from the server, the client encrypts the random number for  
calculating the session key and sends the result to the server.  
Using the local private key, the server decrypts the data sent by the client and  
obtains the random number used by the client.  
The server uses the public key and the random number from the client as  
parameters to calculate the session key with the same algorithm as on the client.  
The resulting key is 16 bytes long.  
On completion of the above steps, the server and the client obtains the same session  
key. During the session, both ends use the same session key to perform encryption and  
decryption, thereby guaranteeing the security of data transfer.  
3) Authentication mode negotiation:  
z
The client sends its username information to the server.  
50-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
z
The server initiates a procedure to authenticate the user. If the server is configured  
not to authenticate the user, the process proceeds to session request phase  
directly.  
z
The client employs an authentication mode to authenticate the server till the  
authentication succeeds or the server tears down the connection because of  
timeout.  
Note:  
SSH provides two authentication modes: password authentication and RSA  
authentication.  
1) Password authentication procedure:  
z
The client sends the username and password to the server;  
z
The server compares the username and password sent from the client with the local  
configuration. If it finds an exact match, the authentication succeeds.  
2) RSA authentication procedure:  
z
z
z
The server configures an RSA public key for the client;  
The client sends its RSA public key member module to the server;  
The server performs validity authentication on the member module. If the  
authentication succeeds, the server generates a random number, encrypts it using  
the RSA public key from the client, and sends the encrypted information back to the  
client;  
z
Both the server and the client uses the random number and the session ID with the  
length of 16 characters as parameters to calculate the authentication data;  
The client sends the authentication data it generates to the server;  
The server compares the authentication data from the client with that locally  
calculated. If they match, the authentication succeeds.  
z
z
4) Session request: If the authentication succeeds, the client sends a session  
request to the server. When the server has successfully processed the request,  
SSH enters the interactive session phase.  
5) Interactive session: The client and the server exchange data till the session is  
over.  
50.1.2 SSH Server Configuration  
The following table describes the SSH server configuration tasks.  
Table 50-1 SSH2.0 Configuration tasks  
Num  
Item  
Command  
Description  
1
Entering system view  
<SW8800> system-view  
50-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Num  
Item  
Command  
user-interface  
Description  
Entering VTY type of user [SW8800]  
interface view vty X X  
2
Configure the protocol [SW8800-ui-vtyX-X]  
supported by current user protocol inbound { all | ssh Optional  
interface | telnet }  
3
4
Returning to system view [SW8800-ui-vtyX-X] quit  
Generating a local RSA [SW8800]  
rsa  
rsa  
key pair  
local-key-pair create  
5
6
Required  
Required  
Destroying a local RSA [SW8800]  
key pair  
local-key-pair destroy  
[SW8800]  
ssh  
user  
username  
By  
users  
default,  
are  
Configure the SSH user  
authentication mode  
authentication-type  
password  
password-publickey | all }  
{
|
rsa  
|
unable to log  
in.  
Optional  
By default, the  
system does  
not update the  
server key.  
Configure the updating [SW8800]  
ssh  
server  
7
cycle of the server key  
rekey-interval hours  
Optional  
Configure  
authentication timeout  
the  
SSH [SW8800]  
ssh  
server  
server  
8
9
By default, it is  
60 seconds.  
timeout seconds  
Optional  
[SW8800]  
authentication-retries  
times  
ssh  
Configure the number of  
SSH authentication retries  
By default, it is  
three times.  
[SW8800]  
peer-public-key key-name  
rsa  
Enter public key view  
10  
Required  
Generate RSA key using See Generating the Client  
key generator tool Public Key.  
Entering public key edit [SW8800-rsa-public-key]  
view to edit the key  
public-key-code begin  
11  
12  
Required  
Required  
Exiting public key edit [SW8800-rsa-public-key]  
view  
public-key-code end  
[SW8800] ssh  
username assign rsa-key Required  
keyname  
user  
Specifying the public key  
for an SSH user  
13  
14  
Optional  
By default, the  
system does  
Configure  
first-authentication SSH  
server  
[SW8800]  
first-time enable  
ssh  
client  
not  
the  
perform  
first  
authentication.  
50-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Num  
Item  
Command  
Description  
Optional  
By default, the  
Configure  
compatibility mode  
the  
SSH [SW8800]  
ssh  
server  
server  
is  
15  
compatible_ssh1x enable  
compatible  
with  
the  
SSH1.x client.  
I. Configuring the protocol the current user interface supports  
Use this configuration task to specify the protocol the current user interface supports.  
Perform the following configuration in VTY user interface view.  
Table 50-2 Configure the protocol the current user interface supports  
Operation  
Command  
Configure the protocol the current user protocol inbound { all | pad | ssh |  
interface supports telnet }  
By default, the system supports all protocols.  
Caution:  
z
z
If the supported protocol configured in the user interface is SSH, make sure to  
configure the authentication mode for logging into the user interface to  
authentication-mode scheme (using AAA authentication mode).  
If the authentication mode is configured as authentication-mode password or  
authentication-mode none, the configuration of protocol inbound ssh will fail,  
and vice versa.  
II. Generating or destroying an RSA key pair  
Use this configuration task to generate or destroy an RSA key pair (including the host  
key and server key) of the server. The naming conventions for the keys are switchname  
+ host and switchname + server respectively.  
After this command is entered, the system prompts you to input the number of the key  
pair bits. Pay attention to the following:  
z
The host key and the server key must have a difference of at least 128 bits in  
length.  
50-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
z
The minimum and maximum lengths for the host key and the server key are 512  
bits and 2048 bits respectively.  
Perform the following configuration in system view.  
Table 50-3 Generate an RSA key pair  
Operation  
Command  
Generate an RSA key pair  
Destroy an RSA key pair  
rsa local-key-pair create  
rsa local-key-pair destroy  
Caution:  
z
z
Generating the RSA key pair of the server is the first step to perform after SSH login.  
This command needs to be performed only once; you need not re-perform it after  
rebooting the switch.  
z
If a key pair exists before the configuration, a prompt will appear asking if you want  
to replace it.  
III. Configuring the user authentication mode  
Use this configuration task to specify the authentication mode for an SSH user. You  
must specify an authentication mode for a new user; otherwise, the new user will not be  
able to log in.  
Perform the following configuration in system view.  
Table 50-4 Configure the authentication mode for an SSH user  
Operation  
Command  
Configure the authentication ssh user username authentication-type  
mode for an SSH user { password | rsa | password-publickey | all }  
Restore the default undo  
ssh user username  
unable-to-login mode  
authentication-type  
By default, no login authentication mode is specified, that is, SSH users are unable to  
log in.  
IV. Configuring the updating cycle of the server key  
Use this configuration task to set the updating cycle of the server key to secure the SSH  
connection in best effort.  
Perform the following configuration in system view  
50-6  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Table 50-5 Configure the updating cycle of the server key  
Operation  
Command  
Configure the updating cycle of the  
server key  
ssh server rekey-interval hours  
Cancel the updating cycle configuration undo ssh server rekey-interval  
By default, the system does not update the server key.  
V. Configuring the authentication timeout  
Use this configuration task to set the authentication timeout of SSH connections.  
Perform the following configuration in system view.  
Table 50-6 Set the SSH authentication timeout  
Operation  
Command  
Set the SSH authentication timeout  
ssh server timeout seconds  
Restore the default SSH authentication timeout undo ssh server timeout  
By default, the authentication timeout is 60 seconds.  
VI. Configuring the number of authentication retries  
Use this configuration task to set the number of authentication retries an SSH user can  
request for a connection, thereby preventing illegal behaviors such as malicious  
guessing.  
Perform the following configuration in system view.  
Table 50-7 Configure the number of SSH authentication retries  
Operation  
Command  
Configure the number of SSH  
authentication retries  
ssh server authentication-retries times  
Restore the default number of SSH  
authentication retries  
undo ssh server authentication-retries  
By default, the number of authentication retries is 3.  
VII. Entering the public key view  
Use this configuration command to enter the public key view and specify the name of  
the public key of the client.  
Perform the first configuration in the following table in system view.  
50-7  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Table 50-8 Public key configuration  
Operation  
Command  
Enter the public key view  
rsa peer-public-key key-name  
peer-public-key end  
Exit the public view and return to the  
system view  
Note:  
The configuration commands are applicable to the environments where the server  
employs RSA authentication on SSH users. If the server adopts password  
authentication on SSH users, these configurations are not necessary.  
VIII. Entering the public key edit view  
After entering the public key view by the rsa peer-public-key command, you can use  
the public-key-code begin command to enter the public key edit view and input the  
public key of the client.  
When inputting the public key, you may type spaces between the characters (the  
system will delete the spaces automatically), or press <Enter> and then continue to  
input the key. Note that the public key must be a hexadecimal string coded in the public  
key format.  
Perform the following configuration in public key view.  
Table 50-9 Enter the public key edit view  
Operation  
Command  
Enter the public key edit view  
public-key-code begin  
IX. Generating the Client Public Key  
The client public key is generated using the PuTTY Key Generator application. Perform  
the following procedure to generate the key.  
Table 50-10 Generate the Client Public Key  
Operation  
Command  
Run the PuTTY Key Generator  
application  
50-8  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
While the Generator is running, move your mouse over the blank area of the  
window.  
Save the pair of keys as publickey and  
File names are aaa.pub and aaa.pri  
privatekey.  
50-9  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Convert the file aaa.pub into key configuration data in Hex.  
Convert the converted result into the CLI of the switch unit  
[SW8800-rsa-key-code]  
[SW8800-rsa-key-code]30818602818061239F5A4D909049C7F43AC1CAC6221BAC8B  
[SW8800-rsa-key-code]450CE4DD4F0B3C9684078BA5CA1F5248FF05D3C9A087B664  
[SW8800-rsa-key-code]97B82DFB40B8F7C4C1855842AE5B4B8D7DB5E34A160BD1E7  
[SW8800-rsa-key-code]265936330B3DFEB50A5250CDB464D91D5B33EA5CE2C3E784  
[SW8800-rsa-key-code]49917115DBBE596518BC245DAB066A873AE94D2598383A35  
[SW8800-rsa-key-code]64A35FEC 7A69A650 DE1B73CE 18C50201 25  
[SW8800-rsa-key-code]  
[SW8800-rsa-key-code]public-key-code end  
[SW8800-rsa-public-key]peer-public-key ?  
end  
[SW8800-rsa-public-key]peer-public  
-key end  
Exit from editing the peer public key  
[SW8800]  
[SW8800]dis rsa peer-public-key  
=====================================  
Key name: aaa  
Key address:  
=====================================  
Key Code:  
308186  
028180  
61239F5A4D909049C7F43AC1CAC6221BAC8B450CE4DD4F0B3C9684078BA5CA1F  
5248FF05D3C9A087B66497B82DFB40B8F7C4C1855842AE5B4B8D7DB5E34A160B  
D1E7265936330B3DFEB50A5250CDB464D91D5B33EA5CE2C3E78449917115DBBE  
596518BC245DAB066A873AE94D2598383A3564A35FEC7A69A650DE1B73CE18C5  
0201  
25  
[SW8800]  
50-10  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
X. Exiting the public key edit view  
Use this configuration task to return from the public key edit view to the public key view  
and save the input public key. Before saving the input public key, the system will check  
the validity of the key:  
z
z
If the public key string contains any illegal character, the configured key is invalid;  
If the configured key is valid, it will be saved to the public key list.  
Perform the following configuration in public key edit view.  
Table 50-11 Exit the public key edit view  
Operation  
Command  
public-key-code end  
Exit the public key edit view  
XI. Specifying the public key for an SSH user  
Use this configuration task to specify an existing public key for an SSH user.  
Perform the following configuration in system view.  
Table 50-12 Specify the public key for an SSH user  
Operation  
Command  
ssh user username assign rsa-key  
keyname  
Specify the public key for an SSH user  
Cancel the corresponding relationship undo ssh user username assign  
between the user and the public key  
rsa-key  
XII. Configuring the server compatibility mode  
Use this configuration task to set whether the server should be compatible with the SSH  
1.x client.  
Perform the following configuration in system view.  
Table 50-13 Configure the compatibility mode  
Operation  
Command  
Set the server to be compatible with the  
SSH 1.x client  
ssh server compatible_ssh1x enable  
Set the server to be incompatible with  
the SSH 1.x client  
undo ssh server compatible_ssh1x  
By default, the server is compatible with the SSH 1.x client.  
50-11  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
50.1.3 SSH Client Configuration  
The following sections describe the SSH client configuration tasks.  
z
z
z
Set to perform the first-time authentication on the SSH server to be accessed  
Specifying the public key of the server  
Configuring the first-time authentication of the server  
I. Starting the SSH client  
Use this configuration task to enable the the SSH client, establish the connection with  
the server, and carry out interactive session.  
Perform the following configuration in system view.  
Table 50-14 Start the SSH client  
Operation  
Command  
ssh2 { host-ip | host-name } [ port-num ] [ prefer_kex  
{
dh_group1  
|
dh_exchange_group  
}
]
[ prefer_ctos_cipher { des | 3des | aes128 } ]  
[ prefer_stoc_cipher { des | 3des | aes128 } ]  
[ prefer_ctos_hmac { sha1 | sha1_96 | md5 | md5_96 } ]  
[ prefer_stoc_hmac { sha1 | sha1_96 | md5 | md5_96 } ]  
Start the SSH client  
II. Specifying the public key of the server  
Use this configuration task to allocate a existent public key to the client.  
Perform the following configuration in system view.  
Table 50-15 Specify the public key of the server  
Operation  
Command  
ssh client server-ip assign rsa-key  
keyname  
Specify the public key of the server  
Cancel the corresponding relationship undo ssh client server-ip assign  
between the server and the public key  
rsa-key  
III. Configuring the first-time authentication of the server  
Use this configuration task to configure or cancel the first-time authentication of the  
server performed by the SSH client.  
The first-time authentication means that when the SSH client accesses the server for  
the first time in the case that there is no local copy of the server’s public key, the user  
can choose to proceed to access the server and save a local copy of the server’s public  
key; when the client accesses the server next time, it uses the saved public key to  
authenticate the server.  
50-12  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Perform the following configuration in system view.  
Table 50-16 Configure the first-time authentication of the server  
Operation  
Command  
Configure the first-time authentication of the server ssh client first-time enable  
Cancel the first-time authentication of the server  
undo ssh client first-time  
By default, the client does not perform the first-time authentication.  
50.1.4 Displaying and Debugging SSH  
On completion of the above configurations, you can use the display command in any  
view to view the operation of the configured SSH and further verify the result of the  
configurations. You can also debug SSH by performing the debugging command in  
user view.  
Table 50-17 Display information relevant to SSH  
Operation  
Command  
Display the public key of the host key pair and  
the server key pair of the server  
display rsa local-key-pair public  
Display the public key of the specified RSA display  
rsa  
peer-public-key  
key pair of the client [ brief | name keyname ]  
Display the SSH status information and display ssh server { status |  
session information  
session }  
display ssh user-information  
[ username ]  
Display information about the SSH user  
debugging ssh server { vty index  
| all }  
Enable SSH debugging  
Disable SSH debugging  
undo debugging ssh server { vty  
index | all }  
50.1.5 SSH Server Configuration Example  
I. Network requirements  
As shown in Figure 50-3, a PC (SSH client) running SSH 2.0-enabled client software  
establishes a local connection with the switch (SSH server) to better guarantee the  
security of exchanged information.  
50-13  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
II. Network diagram  
Switch  
PC  
SSH server  
SSH client  
Figure 50-3 Network diagram for SSH server  
III. Configuration procedure  
1) Generate the RSA key.  
[SW8800] rsa local-key-pair create  
Note:  
If the configuration for generating the local key has already been completed, skip this  
step.  
2) Set the user login authentication mode.  
The following shows the configuration methods for both password authentication and  
RSA public key authentication.  
z
Password authentication.  
Create the local user client001, and set the authentication mode of the user interface to  
AAA.  
[SW8800] user-interface vty 0 4  
[SW8800-ui-vty0-4] authentication-mode scheme  
Specify the login protocol for user client001 as SSH.  
[SW8800-ui-vty0-4] protocol inbound ssh  
[SW8800] local-user client001  
[SW8800-luser-client001] password simple 3Com  
[SW8800] ssh user client001 authentication-type password  
50-14  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Note:  
You can use the default values for SSH authentication timeout and retries. After  
completing the above configurations, you can run the SSH 2.0-enabled client software  
on any other terminal connected with the switch and access the switch with the  
username client001 and password 3Com.  
z
RSA public key authentication.  
Create the local user client001, and set the authentication mode of the user interface to  
AAA.  
[SW8800] user-interface vty 0 4  
[SW8800-ui-vty0-4] authentication-mode scheme  
Specify the login protocol for user client002 as SSH.  
[SW8800-ui-vty0-4] protocol inbound ssh  
Set the authentication mode for the remote user on the switch to publickey.  
[SW8800] ssh user client002 authentication-type publickey  
Using the SSH 2.0-enabled client software, randomly generate an RSA key pair and  
send the public key to the server.  
Configure the public key of the client. Refer to Generating the Client Public Key for  
details.  
[SW8800] rsa peer-public-key SW8800002  
[SW8800-rsa-public-key] public-key-code begin  
[SW8800-rsa-key-code] 308186028180739A291ABDA704F5D93DC8FDF84C427463  
[SW8800-rsa-key-code] 1991C164B0DF178C55FA833591C7D47D5381D09CE82913  
[SW8800-rsa-key-code] D7EDF9C08511D83CA4ED2B30B809808EB0D1F52D045DE4  
[SW8800-rsa-key-code] 0861B74A0E135523CCD74CAC61F8E58C452B2F3F2DA0DC  
[SW8800-rsa-key-code] C48E3306367FE187BDD944018B3B69F3CBB0A573202C16  
[SW8800-rsa-key-code] BB2FC1ACF3EC8F828D55A36F1CDDC4BB45504F020125  
[SW8800-rsa-key-code] public-key-code end  
[SW8800-rsa-public-key] peer-public-key end  
[SW8800]  
#Allocate an existent public key SW8800002 to user client002.  
[SW8800] ssh user client002 assign rsa-key SW8800002  
Start the SSH client software on the terminal preserving the RSA private key, and  
perform the corresponding configurations to establish the SSH connection.  
50-15  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
50.1.6 SSH Client Configuration Example  
I. Network requirements  
As shown in Figure 50-4:  
z
z
Switch A is used as an SSH client.  
Switch B is used as the SSH server, and the IP address is 10.165.87.136.  
II. Network diagram  
Switch B  
SSH server  
IP address  
:
10.165.87.136  
Switch A  
SSH client  
PC  
Figure 50-4 Network diagram for SSH client  
III. Configuration procedure  
Configure the client to perform the first-time authentication of the server.  
z
Employ password authentication mode, and start using the default encryption  
algorithm.  
Log onto the SSH2 server with IP address 10.165.87.136.  
[SW8800] ssh2 10.165.87.136  
Please input the username:sshuser1  
Trying 10.165.87.136  
Press CTRL+K to abort  
Connected to 10.165.87.136 ...  
Enter password:  
*********************************************************  
*
*
All rights reserved (1997-2004)  
*
*
Without the owner's prior written consent,  
*no decompiling or reverse-engineering shall be allowed.*  
*********************************************************  
<SW8800>  
Configure the client to authenticate the server for the first time.  
<SW8800> system-view  
50-16  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
[SW8800] ssh client first-time enable  
Access the remote server and perform operations.  
z
Employ RSA public key authentication mode, and start using the corresponding  
encryption algorithm configured.  
[SW8800] ssh2 10.165.87.136 22 perfer_kex dh_group1 perfer_ctos_cipher des  
perfer_stoc_cipher 3des perfer_ctos_hmac md5 perfer_stoc_hmac md5  
Please input the username: client003  
Trying 10.165.87.136...  
Press CTRL+K to abort  
Connected to 10.165.87.136...  
The Server is not autherncated.Do you continue access it?(Y/N):y  
Do you want to save the server's public key?(Y/N):y  
*********************************************************  
*
*
All rights reserved (1997-2004)  
*
*
Without the owner's prior written consent,  
*no decompiling or reverse-engineering shall be allowed.*  
*********************************************************  
<SW8800>  
Configure the client to authenticate the server for the first time.  
<SW8800> sys  
[SW8800] ssh client first-time enable  
Access the remote server and perform operations.  
50.2 SFTP Service  
50.2.1 SFTP Overview  
Secure FTP is established on SSH connections, which makes remote users able to  
securely log in to the switch and perform file management and transfer operations such  
as system upgrade, and thereby providing higher security for data transfer. At the same  
time, since the switch can be used as a client, users can log in to remote devices to  
transfer files securely.  
50.2.2 SFTP Server Configuration  
SFTP server configuration tasks are described in this section:  
z
z
Configuring the service type to be used  
Starting the SFTP server  
I. Configuring the service type to be used  
Use this configuration task to set the SSH service type to be used.  
Perform the following configuration in system view.  
50-17  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Table 50-18 Configure the service type to be used  
Operation  
Command  
ssh user username service-type  
{ telnet | sftp | all }  
Configure the service type to be used  
Restore the default service type  
undo ssh user username service-type  
By default, the service type is telnet.  
II. Starting the SFTP server  
Perform the following configuration in system view.  
Table 50-19 Start the SFTP server  
Operation  
Command  
Start the SFTP server  
sftp server enable  
Shut down the SFTP server  
undo sftp server enable  
By default, the SFTP server is shut down.  
50.2.3 SFTP Client Configuration  
The following table describes the SFTP client configuration tasks.  
Table 50-20 SFTP client configuration tasks  
Num  
Item  
Command  
<SW8800>  
Description  
1
Enter system view  
system-view  
[SW8800]  
sftp ipaddr [ prefer_kex  
{
dh_group1  
dh_exchange_group } ]  
prefer_ctos_cipher  
{ des | 3des | aes128 } ]  
prefer_stoc_cipher  
{ des | 3des | aes128 } ]  
prefer_ctos_hmac  
{ sha1 | sha1_96 | md5 |  
md5_96  
prefer_stoc_hmac  
|
[
[
2
Starting the SFTP client  
Required  
[
}
]
[
{ sha1 | sha1_96 | md5 |  
md5_96 } ]  
50-18  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Num  
Item  
Command  
Description  
sftp-client> bye  
sftp-client> exit  
sftp-client> quit  
3
Shut down the SFTP client  
Optional  
Chang  
the sftp-client>  
cd  
current directory [remote-path ]  
Return to the  
sftp-client> cdup  
upper directory  
Display  
current directory  
the  
sftp-client> pwd  
SFTP  
4
directory  
operation  
sftp-client>  
[remote-path ]  
dir  
ls  
Display the file  
list  
specified  
directory  
in  
the  
a
sftp-client>  
[remote-path ]  
Delete  
sftp-client>  
remote-path  
rmdir  
directory on the  
server  
Change  
the  
name of the sftp-client>  
rename  
specified file on oldname newname  
the server  
Download a file  
sftp-client>  
get  
from the remote  
remote-file [ local-file ]  
server  
Upload a local  
sftp-client> put local-file  
[ remote-file ]  
file  
to  
the  
SFTP file  
operation  
remote server  
5
Optional  
sftp-client>  
[remote-path ]  
dir  
ls  
Display the file  
list  
in  
the  
specified  
directory  
sftp-client>  
[remote-path ]  
sftp-client>  
remote-file  
remove  
delete  
Delete  
a
file  
from the server  
sftp-client>  
remote-file  
sftp-client>  
[ command ]  
help  
6
Command help on the client  
Optional  
I. Starting the SFTP client  
Use this configuration task to start the SFTP client program, establish a connection with  
the remote SFTP server, and enter the SFTP client view.  
50-19  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Perform the following configuration in system view.  
Table 50-21 Start the SFTP client  
Operation  
Command  
prefer_kex  
sftp  
ipaddr  
[
{
dh_group1  
|
dh_exchange_group } ] [ prefer_ctos_cipher { des | 3des |  
aes128 } ] [ prefer_stoc_cipher { des | 3des | aes128 } ]  
[ prefer_ctos_hmac { sha1 | sha1_96 | md5 | md5_96 } ]  
[ prefer_stoc_hmac { sha1 | sha1_96 | md5 | md5_96 } ]  
Start the SFTP  
client  
II. Shutting down the SFTP client  
Use this configuration task to shut down the SFTP client program.  
Perform the following configuration in SFTP client view.  
Table 50-22 Shut down the SFTP client  
Operation  
Command  
bye  
exit  
quit  
Shut down the SFTP client  
Note:  
The three commands, bye, exit, and quit, have the same functionality. You can also  
use the quit command in port group view.  
III. SFTP directory operations  
As shown in Table 50-23, available SFTP directory operations include: change or  
display the current directory, create or delete a directory, display the specified file or  
directory.  
Perform the following configuration in SFTP client view.  
Table 50-23 SFTP directory operations  
Operation  
Change the current directory  
Return to the upper directory  
Display the current directory  
Command  
cd remote-path  
cdup  
pwd  
dir [ remote-path ]  
Display the list of files in the specified  
50-20  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Operation  
Command  
directory  
ls [ remote-path ]  
Create a new directory on the server  
Delete a directory from the server  
mkdir remote-path  
rmdir remote-path  
Note:  
The dir command and the ls command have the same functionality.  
IV. SFTP file operations  
As shown in Table 50-24, available SFTP file operations include: change the name of a  
file, download a file, upload a file, display the list of files, and delete a file.  
Perform the following configuration in SFTP user view.  
Table 50-24 SFTP file operations  
Operation  
Command  
Change the name of the specified file on  
the server  
rename old-name new-name  
Download a file from the remote server  
Upload a local file to the remote server  
get remote-file [ local-file ]  
put local-file [ remote-file ]  
dir [ remote-path ]  
Display the list of files in the specified  
directory  
ls [ remote-path ]  
delete remote-file  
Delete a file from the server  
remove remote-file  
Note:  
z
z
The dir command and the ls command have the same functionality.  
The delete command and the remove command have the same functionality.  
V. Displaying help information  
Use this command to display command-relevant help information such as the format of  
the command, parameter configurations, and so on.  
Perform the following configuration in SFTP client view.  
50-21  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
Table 50-25 Display help information for client commands  
Operation  
Display help information for client commands  
Command  
help [ command-name ]  
50.2.4 SFTP Configuration Example  
I. Network requirements  
As shown in Figure 50-5:  
z
z
z
Switch B is used as the SFTP server, and its IP address is 10.111.27.91;  
Switch B is used as the SFTP client;  
An SFTP user is configured with the username 8040 and password SW8800.  
II. Network diagram  
Switch B  
SFTP server  
IP address  
:
10.111.27.91  
Switch A  
SFTP client  
PC  
Figure 50-5 Network diagram for SFTP  
III. Configuration procedure  
1) Configure Switch B.  
Start the SFTP server.  
[SW8800] sftp-server enable  
Specify the service type as SFTP.  
[SW8800] ssh user 8040 service-type sftp  
Set the authentication mode to password.  
[SW8800] ssh user 8040 authentication-type password  
2) Configure Switch A.  
Configure the server with a public key whose name is the IP address of the server.  
[SW8800] rsa peer-public-key 10.111.27.91  
50-22  
Download from Www.Somanuals.com. All Manuals Search And Download.  
 
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
[SW8800-rsa-public-key] public-key-code begin  
[SW8800-rsa-key-code] 308186028180739A291ABDA704F5D93DC8FDF84C427463  
[SW8800-rsa-key-code] 1991C164B0DF178C55FA833591C7D47D5381D09CE82913  
[SW8800-rsa-key-code] D7EDF9C08511D83CA4ED2B30B809808EB0D1F52D045DE4  
[SW8800-rsa-key-code] 0861B74A0E135523CCD74CAC61F8E58C452B2F3F2DA0DC  
[SW8800-rsa-key-code] C48E3306367FE187BDD944018B3B69F3CBB0A573202C16  
[SW8800-rsa-key-code] BB2FC1ACF3EC8F828D55A36F1CDDC4BB45504F020125  
[SW8800-rsa-key-code] public-key-code end  
[SW8800-rsa-public-key] peer-public-key end  
[SW8800] ssh client 10.111.27.91 assign rsa-key 10.111.27.91  
Establish the SSH connection between the client and the server.  
[SW8800] ssh2  
Please input the username:8040  
Trying  
Press CTRL+K to abort  
Connected to 10.111.27.91 ...  
Enter password:SW8800  
*********************************************************  
*
*
All rights reserved (1997-2004)  
*
*
Without the owner's prior written consent,  
*no decompiling or reverse-engineering shall be allowed.*  
*********************************************************  
<SW8800>  
Establish a connection with the remote SFTP server and enter the SFTP client view.  
<SW8800> sys  
[SW8800] sftp 10.111.27.91  
Display the current directory of the server, delete file z, and check if the directory has  
been deleted successfully.  
sftp-client> dir  
-rwxrwxrwx  
-rwxrwxrwx  
-rwxrwxrwx  
drwxrwxrwx  
-rwxrwxrwx  
-rwxrwxrwx  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
1759 Aug 23 06:52 vrpcfg.cfg  
225 Aug 24 08:01 pubkey2  
283 Aug 24 07:39 pubkey1  
0 Sep 01 06:22 new  
225 Sep 01 06:55 pub  
0 Sep 01 08:00 z  
sftp-client> delete z  
Remove this File?(Y/N)  
flash:/zy  
File successfully Removed  
sftp-client> dir  
-rwxrwxrwx  
1 noone  
nogroup  
1759 Aug 23 06:52 vrpcfg.cfg  
50-23  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
-rwxrwxrwx  
-rwxrwxrwx  
drwxrwxrwx  
-rwxrwxrwx  
1 noone  
1 noone  
1 noone  
1 noone  
nogroup  
nogroup  
nogroup  
nogroup  
225 Aug 24 08:01 pubkey2  
283 Aug 24 07:39 pubkey1  
0 Sep 01 06:22 new  
225 Sep 01 06:55 pub  
Create a new directory new1, and check if the new directory has been created  
successfully.  
sftp-client> mkdir new1  
New path created  
sftp-client> dir  
-rwxrwxrwx  
-rwxrwxrwx  
-rwxrwxrwx  
drwxrwxrwx  
-rwxrwxrwx  
drwxrwxrwx  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
1759 Aug 23 06:52 vrpcfg.cfg  
225 Aug 24 08:01 pubkey2  
283 Aug 24 07:39 pubkey1  
0 Sep 01 06:22 new  
225 Sep 01 06:55 pub  
0 Sep 02 06:30 new1  
Change the directory name new1 to new2, and check if the directory name has been  
changed successfully.  
sftp-client> rename new1 new2  
sftp-client> dir  
-rwxrwxrwx  
-rwxrwxrwx  
-rwxrwxrwx  
drwxrwxrwx  
-rwxrwxrwx  
drwxrwxrwx  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
1759 Aug 23 06:52 vrpcfg.cfg  
225 Aug 24 08:01 pubkey2  
283 Aug 24 07:39 pubkey1  
0 Sep 01 06:22 new  
225 Sep 01 06:55 pub  
0 Sep 02 06:33 new2  
Download file pubkey2 from the server to a local device, and change the file name to  
pu.  
sftp-client> get pubkey2 pu  
Downloading file successfully ended  
Upload local file pu to the server, change the file name to puk, and check if the  
operations are successful.  
sftp-client> put pu puk  
Uploading file successfully ended  
sftp-client> dir  
-rwxrwxrwx  
-rwxrwxrwx  
-rwxrwxrwx  
drwxrwxrwx  
drwxrwxrwx  
-rwxrwxrwx  
-rwxrwxrwx  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
1 noone  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
nogroup  
1759 Aug 23 06:52 vrpcfg.cfg  
225 Aug 24 08:01 pubkey2  
283 Aug 24 07:39 pubkey1  
0 Sep 01 06:22 new  
0 Sep 02 06:33 new2  
283 Sep 02 06:35 pu  
283 Sep 02 06:36 puk  
50-24  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 50 SSH Terminal Service  
sftp-client>  
Exit SFTP.  
sftp-client> quit  
Bye  
<SW8800>  
50-25  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 51 PoE Configuration  
Chapter 51 PoE Configuration  
51.1 PoE Overview  
51.1.1 PoE on the Switch  
The Switch 8800 supports power-over-Ethernet (PoE). Equipped with external power  
supply and PoE-capable cards, Switch 8800s can provide 48 VDC power for remote  
powered devices (PDs, such as IP phones, WLAN APs, and Network cameras) through  
twisted pairs.  
z
The Switch 8800 supports IEEE802.3af standard. While they can also supply  
power to PDs noncompliant with the standard.  
The power supply of the Switch 8800 is administered by the Fabric; each PoE card on  
the switch can be viewed as a power sourcing equipment (PSE), which administers the  
power supplying of all the ports on it independently.  
The Switch 8800 can transmit data and supply power in the mean time through the  
signal lines (1, 3, 2, and 6) of the category-3/5 twisted pairs. Using converters, they can  
also supply power to the PDs that can be powered only through spare lines (4, 5, 7, and  
8).  
z
The Switch 8800 supplies power through the Ethernet electrical ports on the  
service cards. Each service card can supply power to up to 48 remote devices at  
the maximum distance of 100 m (328 feet).  
z
z
The maximum power that can be supplied by each Ethernet port to its PD is 15.4  
W.  
When supplying power to remote devices, the maximum total power that can be  
provided by the Switch 8800 is 4500 W (220 V)/2250 W (110V). The switch  
determines whether or not to supply power to the next remote PD it discovered  
depending on the total power it currently supply.  
Note:  
z
z
When a remote PD is powered by an Switch 8800, the PD needs not have any  
external power supply.  
If the remote PD has an external power supply, the Switch 8800 and the external  
power supply will be redundant with each other for the PD.  
51-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 51 PoE Configuration  
51.1.2 External PSE4500-A Power System  
If PSE4500-A power system is taken as the external power supply of the switch, the  
power distribution is as follows:  
1) Input voltage: 90 VAC to 160 VAC  
z
One PSU (power supply unit) of the PSE4500-A power system can provide 1200  
W of power.  
2) Input voltage: 160 VAC to 264 VAC  
z
One PSU of the PSE4500-A power system can provide 2500 W of power.  
If the PSE4500-A power modules are in 2+1 redundancy, then each module  
provides a power of 1500 W.  
z
51.2 PoE Configuration  
The Switch 8800 can automatically detect any connected device that needs a remote  
power supply and feeds power to this device.  
z
z
z
Depending on your actual network requirement, you can set the maximum PoE  
power totally supplied by the switch through the command line.  
You can set the maximum PoE power supplied by a card through the command  
line.  
You can also control the PoE on each PoE port independently through the  
command line. The control includes: enabling/disabling the PoE feature, and  
setting the maximum PoE power, the PoE mode and the PoE priority on the port.  
51.2.1 PoE Configuration Tasks  
The following table describes the PoE configuration tasks on the Switch 8800.  
51-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 51 PoE Configuration  
Table 51-1 PoE configuration tasks on the Switch 8800  
No  
Item  
system  
Command  
system-view  
Description  
Enter  
view  
1
As  
a
result of this  
command, a port view  
prompt is displayed, which  
varies with the port type  
you selected.  
Enter  
port view  
Ethernet interface interface-type  
interface-number  
2
3
Enable PoE on  
the port  
By default, PoE is disabled  
on a port.  
poe enable  
You can set the maximum  
PoE power supplied by a  
max-power port depending on the  
power of the actual PD. By  
default, the max-power is  
16800 mW.  
Set the maximum  
PoE  
power poe  
4
5
6
supplied by the max-power  
port  
The Switch 8800 supports  
Set the PoE poe mode { signal | only signal line PoE mode.  
mode on the port spare | auto }  
By default, the PoE mode  
on a port is signal.  
You can set the PoE  
priority  
on  
a
port  
Set the PoE  
priority on the  
port  
poe priority { critical | depending on the practical  
high | low }  
situation. By default, the  
PoE priority on a port is  
low.  
You can execute this  
command in any view.  
Executing the display poe  
Display the PoE display poe interface  
state of a specific interface-name  
or all ports of the interface-type  
[
|
7
interface  
command  
without any option displays  
the PoE status of all the  
ports.  
switch  
interface-num ]  
You can execute this  
command in any view.  
Display the PoE  
power  
display poe interface Executing the display poe  
power  
information of a power [ interface-name | interface  
8
9
specific or all interface-type  
command without any  
option displays the PoE  
power information about  
all the ports.  
ports  
of  
the interface-num ]  
switch  
Display the PoE  
status and PoE  
power  
You can execute this  
command in any view  
display poe pse  
information  
each card  
of  
51-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 51 PoE Configuration  
To cancel the configurations, use the corresponding undo commands. For details  
about the parameters, refer to the Command Manual.  
Note:  
z
z
When setting the maximum PoE power supplied by the switch, you must set it to a  
value greater than the total power that has been distributed to the cards. Otherwise,  
the command cannot be executed successfully. The maximum power ranges from  
3000 mW to 16800 mW.  
Before setting the maximum power supplied by a card, make sure the remaining  
power of the switch is no less than the full power of the card, and the power you can  
set for a card ranges from 37 W to 806 W.  
z
z
z
The reserved power for a blank slot will be recycled automatically by the system if  
you insert a PoE-incapable card into the slot.  
When a card is almost fully loaded and a new PD is added, the switch will respond to  
the PD according to the PoE priority set on the port.  
The PoE priority of each port is based on its card. In other words, the switch cannot  
compare the priorities of ports on different cards.  
51.3 Comprehensive Configuration Example  
I. Network requirements  
z
z
Two PoE-capable cards are installed in slots 3 and 5 on a Switch 8800.  
GigabitEthernet3/1/1 through GigabitEthernet3/1/48 are connected with IP  
phones and GigabitEthernet5/1/1 through GigabitEthernet5/1/48 are connected  
with access point (AP) devices.  
z
z
The IP phones connected to GigabitEthernet3/1/23 and GigabitEthernet3/1/24 do  
not need PoE.  
GigabitEthernet3/1/48 is reserved for the use of network management, so it needs  
higher priority.  
z
z
Slot 3 is provided with 400 W power and slot 5 is provided with full power.  
The input power of the AP device connected to GigabitEhternet5/1/15 cannot be  
greater than 9000 mW.  
51-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 51 PoE Configuration  
II. Network diagram  
Figure 51-1 PoE remote power supplying  
III. Configuration procedure  
Set the maximum power to 400 W on the card in slot 3. By default, the power of each  
card is full, so the power on the card in slot 5 need not be configured.  
[SW8800] poe max-power 400 slot 3  
Enable PoE on the ports GigabitEthernet3/1/1 through GigabitEthernet3/1/48.  
[SW8800-GigabitEthernet3/1/1] poe enable  
[SW8800-GigabitEthernet3/1/2] poe enable  
[SW8800-GigabitEthernet3/1/3] poe enable  
Go on the configuration till the port GigabitEthernet3/1/48.  
Enable PoE on the ports GigabitEthernet5/1/1 through GigabitEthernet5/1/48.  
[SW8800-GigabitEthernet5/1/1] poe enable  
[SW8800-GigabitEthernet5/1/2] poe enable  
[SW8800-GigabitEthernet5/1/3] poe enable  
Go on the configuration till the port GigabitEthernet5/1/48.  
Set the PoE priority of the port GigabitEthernet3/1/48 to critical, the PD connected with  
GigabitEthernet3/1/48 will be powered in precedence on the premise that other ports'  
power supplying is not interrupted.  
[SW8800-GigabitEthernet3/1/48] poe priority critical  
Set the maximum PoE power on the GigabitEthernet5/1/15 port to 9000 mW.  
[SW8800] interface GigabitEthernet5/1/15  
[SW8800-GigabitEthernet5/1/15] poe max-power 9000  
51-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 52 PoE PSU Supervision Configuration  
Chapter 52 PoE PSU Supervision Configuration  
52.1 Introduction to PoE PSU Supervision  
The PoE-capable Switch 8800 can monitor the external PoE PSUs through the power  
supervision module on the PoE external power system.  
The PoE PSU supervision module enables you to:  
z
z
z
Set the alarm thresholds for the AC input voltages of the PoE PSUs.  
Set the alarm thresholds for the DC output voltages of the PoE PSUs.  
Query PSU information such as voltage and power.  
52.2 AC Input Alarm Thresholds Configuration  
You can set the AC input alarm thresholds for the PoE PSUs to enable the Switch 8800  
to monitor the AC input voltages of the PSUs in real time through the PoE supervision  
module.  
52.2.1 AC Input Alarm Thresholds Configuration Tasks  
Table 52-1 AC input alarm thresholds configuration tasks  
No  
Item  
Command  
system-view  
Description  
1
Enter system view  
Required,  
poe-power input-thresh and the max  
Set the overvoltage alarm  
threshold of AC input (upper  
threshold) for the PoE PSUs  
2
3
upper string  
voltage  
is  
264.0 V.  
Required,  
Set the undervoltage alarm  
threshold of AC input (lower  
threshold) for the PoE PSUs  
poe-power input-thresh and the min  
lower string  
voltage  
90.0 V.  
is  
Optional, and  
you can  
execute this  
command in  
any view.  
Display the AC input state of display  
each PoE PSU  
ac-input state  
poe-power  
4
52-1  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 52 PoE PSU Supervision Configuration  
Note:  
z
z
z
You can set the thresholds to any appropriate values in the range, but make sure  
the lower threshold is less than the upper threshold.  
For 220 VAC input, it is recommended to set the upper threshold to 264 V and the  
lower threshold to 181 V.  
For 110 VAC input, it is recommended to set the upper threshold to 132 V and the  
lower threshold to 90 V.  
52.2.2 AC Input Alarm Thresholds Configuration Example  
I. Network requirements  
z
z
Set the overvoltage alarm threshold of AC input for PoE PSUs to 264.0 V.  
Set the undervoltage alarm threshold of AC input for PoE PSUs to 181.0 V.  
II. Configuration procedure  
Enter system view.  
<SW8800> system-view  
Set the overvoltage alarm threshold of AC input for PoE PSUs to 264.0 V.  
[SW8800] poe-power input-thresh upper 264.0  
Set the undervoltage alarm threshold of AC input for PoE PSUs to 181.0 V.  
[SW8800] poe-power input-thresh lower 181.0  
Display the information about the AC input for the PoE PSUs.  
[SW8800] display poe-power ac-input state  
52.3 DC Output Alarm Thresholds Configuration  
You can set the DC output alarm thresholds for the PoE PSUs to enable the Switch  
8800 to monitor the DC output voltages of the PSUs in real time through the PoE  
supervision module.  
52-2  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 52 PoE PSU Supervision Configuration  
52.3.1 DC Output Alarm Thresholds Configuration Tasks  
Table 52-2 DC output alarm thresholds configuration tasks  
No  
Operation  
Command  
system-view  
Description  
1
Enter system view  
Required,  
poe-power output-thresh and the range  
Set the overvoltage alarm  
threshold of DC output (upper  
threshold) for the PoE PSUs  
2
3
upper string  
is 55.0 V to  
57.0 V.  
Required,  
Set the undervoltage alarm  
threshold of DC output (lower  
threshold) for the PoE PSUs  
poe-power output-thresh and the range  
lower string  
is 45.0 V to  
47.0 V.  
Optional, and  
you  
can  
Display the DC output state display  
poe-power  
4
5
execute this  
command in  
any view.  
of the PoE PSUs.  
dc-output state  
Optional, and  
Display the DC output  
voltage/current value of the  
PoE PSUs  
you  
can  
display poe-power  
dc-output value  
execute this  
command in  
any view.  
Note:  
For both 220 VAC and 110 VAC input, it is recommended to set the upper threshold to  
57.0 V and the lower threshold to 45.0 V.  
52.3.2 DC Output Alarm Thresholds Configuration Example  
I. Network requirements  
z
z
Set the overvoltage alarm threshold of DC output for the PoE PSUs to 57.0 V.  
Set the undervoltage alarm threshold of DC output for the PoE PSUs to 45.0 V.  
II. Configuration procedure  
Enter system view.  
<SW8800> system-view  
Set the overvoltage alarm threshold of DC output for the PoE PSUs to 57.0 V.  
[SW8800] poe-power output-thresh upper 57.0  
Set the undervoltage alarm threshold of DC output for the PoE PSUs to 45.0 V.  
52-3  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 52 PoE PSU Supervision Configuration  
[SW8800] poe-power output-thresh lower 45.0  
Display the DC output state of the PoE PSUs.  
[SW8800] display poe-power dc-output state  
Display the DC output voltage/current values of the PoE PSUs.  
[SW8800] display poe-power dc-output value  
52.4 Displaying PoE Supervision Information  
After completing the above configurations, you can execute the display command in  
any view to query the PoE state of the switch. Then you can view the display output to  
check the effect of these configurations.  
Table 52-3 Display PoE supervision information  
No  
Operation  
Command  
Description  
You can  
execute this  
command in  
any view.  
display  
Display the basic information  
about the PoE PSUs.  
1
supervision-module  
information  
You  
can  
Display  
detailed  
alarm  
execute this  
command in  
any view.  
2
3
information about the PoE display poe-power alarm  
PSUs.  
You  
can  
Display the number and state  
of the switches of the PoE  
PSUs.  
display poe-power switch execute this  
state  
command in  
any view.  
For details about display output, refer to the Command Manual.  
52.5 PoE PSU Supervision Configuration Example  
I. Network requirements  
z
z
z
Insert a PoE-capable card into slot 3 of the Switch 8800.  
Connect GigabitEthernet3/1/1 to GigabitEthernet3/1/48 to IP phones.  
Set the AC input and DC output alarm thresholds to appropriate values.  
52-4  
Download from Www.Somanuals.com. All Manuals Search And Download.  
3Com Switch 8800 Configuration Guide  
Chapter 52 PoE PSU Supervision Configuration  
II. Network diagram  
Figure 52-1 Network diagram for PoE supervision configuration  
III. Configuration procedure  
Enter system view.  
<SW8800> system-view  
Set the overvoltage alarm threshold of AC input for PoE PSUs to 264.0 V.  
[SW8800] poe-power input-thresh upper 264.0  
Set the undervoltage alarm threshold of AC input for PoE PSUs to 181.0 V.  
[SW8800] poe-power input-thresh lower 181.0  
Set the overvoltage alarm threshold of DC output for the PoE PSUs to 57.0 V.  
[SW8800] poe-power output-thresh upper 57.0  
Set the undervoltage alarm threshold of DC output for the PoE PSUs to 45.0 V.  
[SW8800] poe-power output-thresh lower 45.0  
52-5  
Download from Www.Somanuals.com. All Manuals Search And Download.  

Accusys Network Card ACS 61100 User Manual
Allied Telesis Switch SB251 13 User Manual
Altec Lansing Portable Speaker IM600USB User Manual
American DJ Laser Pointer IMAGE 8 DMX User Manual
American Standard Indoor Furnishings 0451001 User Manual
Asus Network Card P5GC MX User Manual
Atlona TV Converter Box AT AT HDSDI User Manual
Bakers Pride Oven Kitchen Entertainment Center CA34 CV9 User Manual
Beko Air Conditioner BK 5200 User Manual
Beko Oven MF 5 User Manual