RAX711-C (a) Configuration Guide (Rel_01)



Comments



Description

www.raisecom.com RAX711-C (A) Configuration Guide (Rel_01) Raisecom Proprietary and Confidential i Copyright © Raisecom Technology Co., Ltd. Raisecom Technology Co., Ltd. provides customers with comprehensive technical support and services. For any assistance, please contact our local office or company headquarters. Website: http://www.raisecom.com Tel: 8610-82883305 Fax: 8610-82883056 Email: [email protected] Address: Raisecom Building, No. 11, East Area, No. 10 Block, East Xibeiwang Road, Haidian District, Beijing, P.R.China Postal code: 100094 ----------------------------------------------------------------------------------------------------------------------------------------- Notice Copyright © 2017 Raisecom All rights reserved. No part of this publication may be excerpted, reproduced, translated or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm, without permission in Writing from Raisecom Technology Co., Ltd. is the trademark of Raisecom Technology Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute the warranty of any kind, express or implied. Raisecom RAX711-C (A) Configuration Guide Preface Preface Objectives This document introduces features and related configurations supported by the RAX711-C, including basic principles and configuration procedures of basic configurations, zero- configuration, interface management, Ethernet, IP services, routing, OAM, QoS, network reliability, security, and system management and maintenance. In addition, this document provides related configuration examples. The appendix of this document provides terms, acronyms, and abbreviations involved in this document. This document helps you master principles and configurations of the RAX711-C systematically, and networking with the RAX711-C. Versions The following table lists the product versions related to this document. Product name Product version Hardware version RAX711-C P100R001C00 or later A.00 or later Conventions Symbol conventions The symbols that may be found in this document are defined as follows. Symbol Description Indicate a hazard with a medium or low level of risk which, if not avoided, could result in minor or moderate injury. Indicate a potentially hazardous situation that, if not avoided, could cause equipment damage, data loss, and performance degradation, or unexpected results. Raisecom Proprietary and Confidential i Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Symbol Description Provide additional information to emphasize or supplement important points of the main text. Indicate a tip that may help you solve a problem or save time. General conventions Convention Description Times New Roman Normal paragraphs are in Times New Roman. Arial Paragraphs in Warning, Caution, Notes, and Tip are in Arial. Boldface Names of files, directories, folders, and users are in boldface. For example, log in as user root. Italic Book titles are in italics. Lucida Console Terminal display is in Lucida Console. Book Antiqua Heading 1, Heading 2, Heading 3, and Block are in Book Antiqua. Command conventions Convention Description Boldface The keywords of a command line are in boldface. Italic Command arguments are in italics. [] Items (keywords or arguments) in square brackets [ ] are optional. { x | y | ... } Alternative items are grouped in braces and separated by vertical bars. Only one is selected. [ x | y | ... ] Optional alternative items are grouped in square brackets and separated by vertical bars. One or none is selected. { x | y | ... } * Alternative items are grouped in braces and separated by vertical bars. A minimum of one or a maximum of all can be selected. [ x | y | ... ] * Optional alternative items are grouped in square brackets and separated by vertical bars. A minimum of none or a maximum of all can be selected. Raisecom Proprietary and Confidential ii Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface User level conventions User level Description 0–4 Checking level: execute basic commands for performing network diagnostic function, clearing system information, and showing command history. 5–10 Monitoring level: execute commands for system maintenance. 11–14 Configuration level: execute commands for configuring services, such as VLAN and IP routing. 15 Management level: execute commands for running systems. Interface type and value range Format Description interface-type Interface type, including:  client: physical interface at the user side  line: physical interface at the line side  snmp: SNMP interface  vlan: VLAN interface  port-channel: LAG interface and sub-interface  loopback: loopback interface interface-number Interface ID, varying with the device model and interface type, ranging as below:  client: 1–12  line: 1–4  snmp: 1  vlan: 1–4094  port-channel: 1–3  loopback: 1 Change history Updates between document versions are cumulative. Therefore, the latest document version contains all updates made to previous versions. Issue 01 (2017-07-10) Initial commercial release Raisecom Proprietary and Confidential iii Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Contents 1 Basic configurations ..................................................................................................................... 1 1.1 CLI ................................................................................................................................................................... 1 1.1.1 Introduction ............................................................................................................................................. 1 1.1.2 Levels ...................................................................................................................................................... 2 1.1.3 Modes...................................................................................................................................................... 2 1.1.4 Shortcut keys ........................................................................................................................................... 5 1.1.5 Viewing command history ...................................................................................................................... 6 1.1.6 Acquiring help ......................................................................................................................................... 6 1.2 Accessing device .............................................................................................................................................. 9 1.2.1 Accessing device through Console interface ........................................................................................... 9 1.2.2 Accessing device through Telnet ........................................................................................................... 10 1.2.3 Accessing device through SSHv2 ......................................................................................................... 11 1.2.4 Managing users ..................................................................................................................................... 12 1.2.5 Checking configurations ....................................................................................................................... 13 1.3 File management ............................................................................................................................................ 13 1.3.1 Introduction ........................................................................................................................................... 13 1.3.2 Managing configuration files ................................................................................................................ 14 1.4 Backup and upgrade ....................................................................................................................................... 15 1.4.1 Introduction ........................................................................................................................................... 15 1.4.2 Upgrading system software in BootROM mode ................................................................................... 15 1.4.3 Upgrading system software in system configuration mode .................................................................. 18 1.4.4 Backing up system software in system configuration mode ................................................................. 19 1.4.5 Checking configurations ....................................................................................................................... 19 1.5 Time management .......................................................................................................................................... 19 1.5.1 Introduction ........................................................................................................................................... 19 1.5.2 Configuring time and time zone ............................................................................................................ 20 1.5.3 Configuring DST .................................................................................................................................. 21 1.5.4 Configuring NTP/SNTP ........................................................................................................................ 21 1.5.5 Checking configurations ....................................................................................................................... 22 1.6 Configuring Banner ........................................................................................................................................ 22 1.6.1 Preparing for configurations ................................................................................................................. 22 1.6.2 Configuring Banner............................................................................................................................... 22 Raisecom Proprietary and Confidential iv Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 1.6.3 Enabling Banner display ....................................................................................................................... 23 1.6.4 Checking configurations ....................................................................................................................... 23 2 Interface management ................................................................................................................ 24 2.1 Introduction .................................................................................................................................................... 24 2.1.1 Ethernet interface .................................................................................................................................. 24 2.1.2 VLAN interface..................................................................................................................................... 24 2.1.3 Aggregation group interface .................................................................................................................. 24 2.1.4 Loopback interface ................................................................................................................................ 24 2.1.5 Interface configuration modes............................................................................................................... 24 2.2 Configuring basic information about interface ............................................................................................... 25 2.2.1 Configuring basic information about interface ..................................................................................... 25 2.2.2 Configuring Jumboframe on the interface ............................................................................................ 25 2.3 Configuring Ethernet interface ....................................................................................................................... 26 2.4 Configuring VLAN interface ......................................................................................................................... 26 2.5 Configuring loopback interface ...................................................................................................................... 26 2.6 Checking configurations ................................................................................................................................ 27 2.7 Maintenance ................................................................................................................................................... 27 3 Zero-configuration ...................................................................................................................... 28 3.1 Introduction .................................................................................................................................................... 28 3.1.1 Principles of zero-configuration ............................................................................................................ 28 3.1.2 CO zero-configuration .......................................................................................................................... 30 3.1.3 Zero-configuration of remote device..................................................................................................... 32 3.2 Configuring local zero-configuration ............................................................................................................. 33 3.2.1 Preparing for configurations ................................................................................................................. 33 3.2.2 Configuring zero-configuration server based on extended OAM ......................................................... 33 3.2.3 Configuring zero-configuration server based on DHCP ....................................................................... 35 3.2.4 Checking configurations ....................................................................................................................... 38 3.3 Configuring remote zero-configuration .......................................................................................................... 38 3.3.1 Preparing for configurations ................................................................................................................. 38 3.3.2 (Optional) configuring remote zero-configuration ................................................................................ 39 3.3.3 (Optional) configuring zero-configuration polling ................................................................................ 40 3.3.4 Checking configurations ....................................................................................................................... 40 3.4 Configuration examples ................................................................................................................................. 40 3.4.1 Example for configuring DHCP-based zero-configuration ................................................................... 40 3.4.2 Example for configuring zero-configuration based on extended OAM ................................................ 42 4 IP routing ...................................................................................................................................... 45 4.1 Introduction .................................................................................................................................................... 45 4.1.1 Routing.................................................................................................................................................. 45 4.1.2 Static route ............................................................................................................................................ 45 4.1.3 ARP ....................................................................................................................................................... 46 4.1.4 DHCP .................................................................................................................................................... 46 Raisecom Proprietary and Confidential v Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 4.2 Configuring route management ...................................................................................................................... 51 4.2.1 Preparing for configurations ................................................................................................................. 51 4.2.2 Configuring routing management ......................................................................................................... 51 4.2.3 Checking configurations ....................................................................................................................... 51 4.3 Configuring static route .................................................................................................................................. 52 4.3.1 Preparing for configurations ................................................................................................................. 52 4.3.2 Configuring static route ........................................................................................................................ 52 4.4 Configuring routing policy ............................................................................................................................. 53 4.4.1 Configuring IP prefix-list ...................................................................................................................... 53 4.4.2 Configuring route mapping table .......................................................................................................... 53 4.5 Configuring ARP ............................................................................................................................................ 54 4.5.1 Preparing for configurations ................................................................................................................. 54 4.5.2 .Configuring ARP ................................................................................................................................. 55 4.5.3 Checking configurations ....................................................................................................................... 55 4.6 Configuring DHCPv4 Client .......................................................................................................................... 55 4.7 Configuring DHCPv4 Server ......................................................................................................................... 57 4.7.1 Preparing for configurations ................................................................................................................. 57 4.7.2 Creating and configuring IPv4 address pool ......................................................................................... 57 4.7.3 Configuring DHCPv4 Server of the interface ....................................................................................... 58 4.7.4 Checking configurations ....................................................................................................................... 58 4.8 Maintenance ................................................................................................................................................... 58 4.9 Configuration examples ................................................................................................................................. 58 4.9.1 Example for configuring DHCPv4 Client ............................................................................................. 58 4.9.2 Example for configuring DHCPv4 Server ............................................................................................ 60 4.9.3 Example for configuring ARP ............................................................................................................... 61 5 Ethernet ......................................................................................................................................... 63 5.1 Introduction .................................................................................................................................................... 63 5.1.1 MAC address table ................................................................................................................................ 63 5.1.2 VLAN ................................................................................................................................................... 66 5.1.3 Super VLAN ......................................................................................................................................... 69 5.1.4 QinQ...................................................................................................................................................... 71 5.1.5 Loop detection ...................................................................................................................................... 72 5.1.6 Interface protection ............................................................................................................................... 72 5.1.7 Port mirroring........................................................................................................................................ 72 5.1.8 Storm control ........................................................................................................................................ 73 5.1.9 L2CP ..................................................................................................................................................... 74 5.2 Configuring MAC address table..................................................................................................................... 74 5.2.1 Preparing for configurations ................................................................................................................. 74 5.2.2 Configuring static MAC address table .................................................................................................. 75 5.2.3 Configuring dynamic MAC address table ............................................................................................. 75 5.2.4 Configuring blackhole MAC address .................................................................................................... 76 Raisecom Proprietary and Confidential vi Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 5.2.5 Configuring suppression of MAC address flapping .............................................................................. 76 5.2.6 Checking configurations ....................................................................................................................... 76 5.2.7 Maintenance .......................................................................................................................................... 76 5.3 Configuring VLAN ........................................................................................................................................ 77 5.3.1 Preparing for configurations ................................................................................................................. 77 5.3.2 Configuring VLAN properties .............................................................................................................. 77 5.3.3 Configuring VLANs based on Access interface .................................................................................... 78 5.3.4 Configuring VLANs based on Trunk interface ..................................................................................... 78 5.3.5 Checking configurations ....................................................................................................................... 79 5.4 Configuring super VLAN ............................................................................................................................... 79 5.4.1 Preparing for configurations ................................................................................................................. 79 5.4.2 Configuring super VLAN ..................................................................................................................... 80 5.4.3 Checking configurations ....................................................................................................................... 80 5.5 Configuring basic QinQ ................................................................................................................................. 81 5.5.1 Preparing for configurations ................................................................................................................. 81 5.5.2 Configuring basic QinQ ........................................................................................................................ 81 5.5.3 Configuring egress interface to Trunk mode ......................................................................................... 81 5.5.4 Checking configurations ....................................................................................................................... 82 5.6 Configuring selective QinQ ........................................................................................................................... 82 5.6.1 Preparing for configurations ................................................................................................................. 82 5.6.2 Configuring selective QinQ .................................................................................................................. 82 5.6.3 Checking configurations ....................................................................................................................... 83 5.7 Configuring VLAN mapping ......................................................................................................................... 84 5.7.1 Preparing for configurations ................................................................................................................. 84 5.7.2 Configuring 1:1 VLAN mapping .......................................................................................................... 84 5.7.3 Configuring N:1 VLAN mapping ......................................................................................................... 85 5.7.4 Checking configurations ....................................................................................................................... 85 5.8 Configuring loop detection............................................................................................................................. 85 5.8.1 Preparing for configurations ................................................................................................................. 85 5.8.2 Configuring loop detection ................................................................................................................... 85 5.8.3 Checking configurations ....................................................................................................................... 86 5.8.4 Maintenance .......................................................................................................................................... 86 5.9 Configuring interface protection .................................................................................................................... 86 5.9.1 Preparing for configurations ................................................................................................................. 86 5.9.2 Configuring interface protection ........................................................................................................... 87 5.9.3 Checking configurations ....................................................................................................................... 87 5.10 Configuring port mirroring ........................................................................................................................... 87 5.10.1 Preparing for configurations ............................................................................................................... 87 5.10.2 Configure port mirroring of CPU packets ........................................................................................... 87 5.10.3 Configuring port mirroring ................................................................................................................. 88 5.10.4 Checking configurations ..................................................................................................................... 88 5.11 Configuring storm control ............................................................................................................................ 88 Raisecom Proprietary and Confidential vii Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 5.11.1 Preparing for configurations ................................................................................................................ 88 5.11.2 Configuring storm control ................................................................................................................... 88 5.11.3 Checking configurations ..................................................................................................................... 89 5.12 Configuring L2CP ........................................................................................................................................ 89 5.12.1 Preparing for configurations ............................................................................................................... 89 5.12.2 Configuring global L2CP .................................................................................................................... 89 5.12.3 Configuring L2CP profile ................................................................................................................... 90 5.12.4 Applying L2CP profile ........................................................................................................................ 91 5.12.5 Checking configurations ..................................................................................................................... 91 5.13 Maintenance ................................................................................................................................................. 91 5.14 Configuration examples ............................................................................................................................... 92 5.14.1 Example for configuring MAC address table...................................................................................... 92 5.14.2 Example for configuring VLAN and interface protection ................................................................... 93 5.14.3 Example for configuring basic QinQ .................................................................................................. 97 5.14.4 Example for configuring port mirroring ............................................................................................ 100 5.14.5 Examples for configuring storm control ........................................................................................... 101 5.14.6 Example for configuring L2CP ......................................................................................................... 102 6 Clock synchronization ............................................................................................................. 106 6.1 Introduction .................................................................................................................................................. 106 6.1.1 SyncE .................................................................................................................................................. 107 6.1.2 IEEE 1588 v2 protocol (PTP) ............................................................................................................. 107 6.2 Configuring clock synchronization based on SyncE .................................................................................... 108 6.2.1 Preparing for configurations ............................................................................................................... 108 6.2.2 Configuring clock source properties of SyncE ................................................................................... 108 6.2.3 Choosing clock source for SyncE manually ....................................................................................... 109 6.2.4 Checking configurations ..................................................................................................................... 109 6.3 Configuring PTP-based clock synchronization ............................................................................................ 109 6.3.1 Preparing for configurations ............................................................................................................... 109 6.3.2 Configuring PTP ................................................................................................................................. 110 6.3.3 Checking configurations ..................................................................................................................... 110 7 Network reliability ................................................................................................................... 111 7.1 Introduction .................................................................................................................................................. 111 7.1.1 ELPS ................................................................................................................................................... 112 7.1.2 ERPS ................................................................................................................................................... 115 7.1.3 Link aggregation ................................................................................................................................. 120 7.1.4 Interface backup .................................................................................................................................. 123 7.1.5 Link-state tracking .............................................................................................................................. 125 7.2 Configuring ELPS ........................................................................................................................................ 126 7.2.1 Preparing for configurations ............................................................................................................... 126 7.2.2 Creating protection lines ..................................................................................................................... 126 7.2.3 Configuring ELPS fault detection modes............................................................................................ 127 Raisecom Proprietary and Confidential viii Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 7.2.4 (Optional) configuring ELPS switching control ................................................................................. 128 7.2.5 Checking configurations ..................................................................................................................... 128 7.3 Configuring ERPS ........................................................................................................................................ 129 7.3.1 Preparing for configurations ............................................................................................................... 129 7.3.2 Creating ERPS protection ring ............................................................................................................ 129 7.3.3 (Optional) creating ERPS protection tributary ring ............................................................................ 131 7.3.4 Configuring ERPS fault detection modes ........................................................................................... 132 7.3.5 (Optional) configuring ERPS switching control ................................................................................. 132 7.3.6 Checking configurations ..................................................................................................................... 133 7.4 Configuring link aggregation ....................................................................................................................... 133 7.4.1 Preparing for configurations ............................................................................................................... 133 7.4.2 Configuring manual link aggregation ................................................................................................. 133 7.4.3 Configuring static LACP link aggregation .......................................................................................... 134 7.4.4 Configuring manual backup link aggregation ..................................................................................... 135 7.4.5 Configuring static LACP backup link aggregation ............................................................................. 136 7.4.6 Checking configurations ..................................................................................................................... 137 7.5 Configuring interface backup ....................................................................................................................... 137 7.5.1 Preparing for configurations ............................................................................................................... 137 7.5.2 Configuring basic functions of interface backup ................................................................................ 138 7.5.3 (Optional) configuring interface FS .................................................................................................... 138 7.5.4 Checking configurations ..................................................................................................................... 139 7.6 Configuring link-state tracking .................................................................................................................... 139 7.6.1 Preparing for configurations ............................................................................................................... 139 7.6.2 Configuring link-state tracking ........................................................................................................... 139 7.6.3 Checking configurations ..................................................................................................................... 140 7.7 Configuration examples ............................................................................................................................... 140 7.7.1 Example for configuring manual link aggregation .............................................................................. 140 7.7.2 Examples for configuring link-state tracking ...................................................................................... 142 7.7.3 Example for configuring static LACP link aggregation ...................................................................... 143 8 OAM ............................................................................................................................................ 146 8.1 Introduction .................................................................................................................................................. 146 8.1.1 EFM .................................................................................................................................................... 146 8.1.2 CFM .................................................................................................................................................... 149 8.1.3 SLA ..................................................................................................................................................... 151 8.1.4 Y.1564 ................................................................................................................................................. 152 8.2 Configuring EFM ......................................................................................................................................... 153 8.2.1 Preparing for configurations ............................................................................................................... 153 8.2.2 Configuring EFM basic functions ....................................................................................................... 154 8.2.3 Configuring EFM active functions ...................................................................................................... 154 8.2.4 Configuring EFM passive functions ................................................................................................... 155 8.2.5 Configuring link monitoring and fault indication ............................................................................... 156 Raisecom Proprietary and Confidential ix Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 8.2.6 Checking configurations ..................................................................................................................... 157 8.3 Configuring CFM ......................................................................................................................................... 158 8.3.1 Preparing for configurations ............................................................................................................... 158 8.3.2 Enabling CFM ..................................................................................................................................... 158 8.3.3 Configuring CFM basic functions ....................................................................................................... 159 8.3.4 Configuring fault detection ................................................................................................................. 160 8.3.5 Configuring fault acknowledgement ................................................................................................... 160 8.3.6 Configuring fault location ................................................................................................................... 161 8.3.7 Configuring AIS .................................................................................................................................. 162 8.3.8 Configuring LCK ................................................................................................................................ 163 8.3.9 Configuring CSF ................................................................................................................................. 164 8.3.10 Checking configurations ................................................................................................................... 164 8.4 Configuring SLA .......................................................................................................................................... 165 8.4.1 Preparing for configurations ............................................................................................................... 165 8.4.2 Configuring SLA operation ................................................................................................................. 166 8.4.3 Configuring SLA operation scheduling............................................................................................... 168 8.4.4 Configuring maintenance window ...................................................................................................... 169 8.4.5 Checking configurations ..................................................................................................................... 169 8.5 Configuring Y.1564 ...................................................................................................................................... 169 8.5.1 Preparing for configurations ............................................................................................................... 169 8.5.2 Configuring test task ........................................................................................................................... 170 8.5.3 Checking configurations ..................................................................................................................... 171 8.6 Maintenance ................................................................................................................................................. 171 9 QoS ............................................................................................................................................... 172 9.1 Introduction .................................................................................................................................................. 172 9.1.1 Priority trust ........................................................................................................................................ 173 9.1.2 Priority mapping ................................................................................................................................. 173 9.1.3 Traffic classification ............................................................................................................................ 174 9.1.4 Traffic policy ....................................................................................................................................... 175 9.1.5 Queue scheduling ................................................................................................................................ 175 9.1.6 Congestion avoidance ......................................................................................................................... 177 9.1.7 Queue shaping ..................................................................................................................................... 178 9.1.8 Rate limiting........................................................................................................................................ 178 9.2 Configuring priority trust and priority mapping ........................................................................................... 178 9.2.1 Preparing for configurations ............................................................................................................... 178 9.2.2 Configuring priority trust .................................................................................................................... 179 9.2.3 Configuring mapping between DSCP priority and local priority based on interface .......................... 179 9.2.4 Configuring mapping from CoS priority to local priority based on interface ..................................... 179 9.2.5 Configuring mapping from IP precedence to local priority based on interface ................................... 180 9.2.6 Configuring mapping from Exp to local priority ................................................................................ 180 9.2.7 Configuring DSCP priority remarking ................................................................................................ 181 Raisecom Proprietary and Confidential x Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 9.2.8 Configuring CoS priority remarking ................................................................................................... 181 9.2.9 Configuring Exp remarking ................................................................................................................ 181 9.2.10 Checking configurations ................................................................................................................... 182 9.3 Configuring traffic classification and traffic policy ..................................................................................... 182 9.3.1 Preparing for configurations ............................................................................................................... 182 9.3.2 Creating and configuring traffic classification .................................................................................... 183 9.3.3 Creating and configuring traffic policing profile ................................................................................ 183 9.3.4 Creating and configuring traffic policy ............................................................................................... 184 9.3.5 Checking configurations ..................................................................................................................... 185 9.3.6 Maintenance ........................................................................................................................................ 185 9.4 Configuring congestion avoidance ............................................................................................................... 185 9.4.1 Preparing for configurations ............................................................................................................... 185 9.4.2 Configuring WRED profile ................................................................................................................. 186 9.4.3 Configuring flow profile ..................................................................................................................... 186 9.4.4 Checking configurations ..................................................................................................................... 186 9.5 Configuring queue shaping and queue scheduling ....................................................................................... 187 9.5.1 Preparing for configurations ............................................................................................................... 187 9.5.2 Configuring queue shaping ................................................................................................................. 187 9.5.3 Configuring queue scheduling ............................................................................................................ 187 9.5.4 Checking configurations ..................................................................................................................... 188 9.5.5 Maintenance ........................................................................................................................................ 188 9.6 Configuring rate limiting .............................................................................................................................. 188 9.6.1 Preparing for configurations ............................................................................................................... 188 9.6.2 Configuring interface-based rate limiting ........................................................................................... 188 9.6.3 Checking configurations ..................................................................................................................... 189 9.7 Configuration examples ............................................................................................................................... 189 9.7.1 Example for configuring rate limiting based on traffic policy ............................................................ 189 9.7.2 Example for configuring queue scheduling and congestion avoidance............................................... 192 9.7.3 Example for configuring interface-based rate limiting ....................................................................... 195 10 RSOM ........................................................................................................................................ 198 10.1 Introduction ................................................................................................................................................ 198 10.1.2 Types of Ethernet services................................................................................................................. 199 10.2 Configuring RSOM .................................................................................................................................... 202 10.2.1 Preparing for configurations ............................................................................................................. 202 10.2.2 (Optional) configuring L2CP profile ................................................................................................. 202 10.2.3 Configure CoS profile ....................................................................................................................... 203 10.2.4 Configuring bandwidth profile .......................................................................................................... 204 10.2.5 Configuring interface ........................................................................................................................ 205 10.2.6 Configuring CFM .............................................................................................................................. 205 10.2.7 Configuring SLA .............................................................................................................................. 206 10.2.8 Configuring SLA test and measurement ........................................................................................... 206 Raisecom Proprietary and Confidential xi Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 10.2.9 Configuring Y.1564 ........................................................................................................................... 207 10.2.10 Configuring loopback ..................................................................................................................... 208 10.2.11 Configuring services ....................................................................................................................... 209 10.2.12 Checking configurations ................................................................................................................. 210 10.3 Maintenance ............................................................................................................................................... 211 10.4 Configuration examples ............................................................................................................................. 211 10.4.1 Example for configuring RSOM ....................................................................................................... 211 11 Security...................................................................................................................................... 219 11.1 Introduction ................................................................................................................................................ 219 11.1.1 ACL ................................................................................................................................................... 219 11.1.2 CPU protection .................................................................................................................................. 219 11.1.3 RADIUS ............................................................................................................................................ 220 11.1.4 TACACS+ ......................................................................................................................................... 220 11.2 Configuring ACL ........................................................................................................................................ 221 11.2.1 Preparing for configurations .............................................................................................................. 221 11.2.2 Configuring ACL .............................................................................................................................. 221 11.2.3 Configuring filter .............................................................................................................................. 223 11.2.4 Checking configurations ................................................................................................................... 223 11.3 Configuring CPU protection....................................................................................................................... 223 11.3.1 Preparing for configurations .............................................................................................................. 223 11.3.2 Configuring global CPU protection .................................................................................................. 224 11.3.3 Configuring interface CPU preotection ............................................................................................. 224 11.3.4 Checking configurations ................................................................................................................... 224 11.4 Configuring RADIUS ................................................................................................................................. 224 11.4.1 Preparing for configurations .............................................................................................................. 224 11.4.2 Configuring RADIUS authentication ................................................................................................ 225 11.4.3 Configuring RADIUS accounting ..................................................................................................... 225 11.4.4 Checking configurations ................................................................................................................... 226 11.5 Configuring TACACS+ .............................................................................................................................. 226 11.5.1 Preparing for configurations .............................................................................................................. 226 11.5.2 Configuring TACACS+ authentication ............................................................................................. 226 11.5.3 Checking configurations ................................................................................................................... 226 11.6 Maintenance ............................................................................................................................................... 227 11.7 Configuration examples ............................................................................................................................. 227 11.7.1 Examples for configuring ACL ......................................................................................................... 227 11.7.2 Example for configuring RADIUS.................................................................................................... 228 11.7.3 Example for configuring TACACS+ ................................................................................................. 229 12 System management and maintenance............................................................................... 231 12.1 Introduction ................................................................................................................................................ 231 12.1.1 LLDP ................................................................................................................................................ 231 12.1.2 SNMP................................................................................................................................................ 233 Raisecom Proprietary and Confidential xii Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 12.1.3 E1 NMS channel ............................................................................................................................... 235 12.1.4 Optical module DDM........................................................................................................................ 235 12.1.5 System log ......................................................................................................................................... 235 12.1.6 Alarm management ........................................................................................................................... 236 12.1.7 CPU monitoring ................................................................................................................................ 241 12.1.8 RMON .............................................................................................................................................. 241 12.1.9 Device monitoring............................................................................................................................. 241 12.1.10 Loopback......................................................................................................................................... 242 12.1.11 Fault detection ................................................................................................................................. 243 12.2 Configuring LLDP ..................................................................................................................................... 245 12.2.1 Preparing for configurations ............................................................................................................. 245 12.2.2 Enabling global LLDP ...................................................................................................................... 245 12.2.3 Enabling interface LLDP .................................................................................................................. 245 12.2.4 Configuring basic functions of LLDP ............................................................................................... 246 12.2.5 Configuring LLDP alarm .................................................................................................................. 246 12.2.6 Checking configurations ................................................................................................................... 246 12.3 Configuring SNMP .................................................................................................................................... 247 12.3.1 Preparing for configurations ............................................................................................................. 247 12.3.2 Configuring basic functions of SNMP .............................................................................................. 247 12.3.3 Configuring Trap ............................................................................................................................... 248 12.3.4 Checking configurations ................................................................................................................... 249 12.4 Configuring optical module DDM ............................................................................................................. 250 12.4.1 Preparing for configurations ............................................................................................................. 250 12.4.2 Enabling optical module DDM ......................................................................................................... 250 12.4.3 Checking configurations ................................................................................................................... 250 12.5 Configuring system log .............................................................................................................................. 251 12.5.1 Preparing for configurations ............................................................................................................. 251 12.5.2 Configuring basic information about system log .............................................................................. 251 12.5.3 Configuring output destination of system logs.................................................................................. 252 12.5.4 Checking configurations ................................................................................................................... 252 12.6 Configuring alarm management ................................................................................................................. 252 12.6.1 Preparing for configurations ............................................................................................................. 252 12.6.2 Configuring basic functions of alarm management .......................................................................... 253 12.6.3 Configuring Layer 3 power failure or fiber breakage alarms ............................................................ 254 12.6.4 Checking configurations ................................................................................................................... 254 12.7 Configuring memory monitoring ............................................................................................................... 254 12.7.1 Preparing for configurations ............................................................................................................. 254 12.7.2 Configuring memory monitoring ...................................................................................................... 254 12.7.3 Checking configurations ................................................................................................................... 255 12.8 Configuring CPU monitoring ..................................................................................................................... 255 12.8.1 Preparing for configurations ............................................................................................................. 255 12.8.2 Viewing CPU monitoring information .............................................................................................. 255 Raisecom Proprietary and Confidential xiii Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 12.8.3 Configuring CPU monitoring alarm .................................................................................................. 255 12.8.4 Checking configruations ................................................................................................................... 256 12.9 Configuring RMON ................................................................................................................................... 256 12.9.1 Preparing for configurations ............................................................................................................. 256 12.9.2 Configuring RMON statistics ........................................................................................................... 256 12.9.3 Configuring RMON historical statistics ............................................................................................ 257 12.9.4 Checking configurations ................................................................................................................... 257 12.10 Configuring fan monitoring...................................................................................................................... 257 12.10.1 Configuring fan monitoring ............................................................................................................ 257 12.10.2 Checking configurations ................................................................................................................. 258 12.11 Configuring loopback ............................................................................................................................... 258 12.11.1 Preparing for configurations............................................................................................................ 258 12.11.2 Configuring interface loopback ....................................................................................................... 258 12.11.3 Checking configurations ................................................................................................................. 259 12.12 Configuring fault detection ...................................................................................................................... 259 12.12.1 Configuring task scheduling ........................................................................................................... 259 12.12.2 Ping ................................................................................................................................................. 260 12.12.3 Traceroute ....................................................................................................................................... 260 12.13 Maintenance ............................................................................................................................................. 261 12.14 Configuration examples ........................................................................................................................... 261 12.14.1 Examples for configuring LLDP basic functions ............................................................................ 261 12.14.2 Examples for outputting system logs to log host ............................................................................ 264 13 Appendix .................................................................................................................................. 266 13.1 Terms .......................................................................................................................................................... 266 13.2 Acronyms and abbreviations ...................................................................................................................... 268 Raisecom Proprietary and Confidential xiv Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Figures Figure 3-1 Principles of CO/remote zero-configuration....................................................................................... 29 Figure 3-2 Zero-configuration on indirect connection between remote devices .................................................. 31 Figure 3-3 Zero-configuration on direct connection between remote devices ..................................................... 32 Figure 3-4 Configuring indirectly-connected remote zero-configuration ............................................................ 41 Figure 3-5 Configuring directly-connected remote zero-configuration ............................................................... 43 Figure 4-1 Typical DHCP application .................................................................................................................. 47 Figure 4-2 Structure of DHCP packet .................................................................................................................. 48 Figure 4-3 Configuring DHCPv4 relay ................................................................................................................ 59 Figure 4-4 Configuring DHCPv4 server .............................................................................................................. 60 Figure 4-5 Configuring ARP ................................................................................................................................ 62 Figure 5-1 Unicast forwarding mode of MAC address ........................................................................................ 65 Figure 5-2 Multicast forwarding mode of MAC address ..................................................................................... 66 Figure 5-3 Broadcast forwarding mode of MAC address .................................................................................... 66 Figure 5-4 VLAN partition .................................................................................................................................. 67 Figure 5-5 Formats of the standard Ethernet frame and 802.1Q frame ................................................................ 68 Figure 5-6 Sub-VLAN and super VLAN partition ............................................................................................... 70 Figure 5-7 Typical networking of basic QinQ ...................................................................................................... 71 Figure 5-8 Principles of port mirroring ................................................................................................................ 73 Figure 5-9 Configuring MAC address table ......................................................................................................... 92 Figure 5-10 Configuring VLAN........................................................................................................................... 94 Figure 5-11 Configuring basic QinQ .................................................................................................................... 98 Figure 5-12 Configuring port mirroring ............................................................................................................. 100 Figure 5-13 Configuring storm control .............................................................................................................. 102 Figure 5-14 L2CP networking ............................................................................................................................ 103 Figure 6-1 Principles of SyncE .......................................................................................................................... 107 Figure 7-1 Structure of an APS packet ............................................................................................................... 112 Raisecom Proprietary and Confidential xv Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Figure 7-2 ELPS 1+1 and 1:1 protection switching modes ................................................................................ 114 Figure 7-3 Unidirectional protection switching ................................................................................................. 114 Figure 7-4 Structure of a R-APS packet ............................................................................................................. 115 Figure 7-5 ERPS ring network ........................................................................................................................... 117 Figure 7-6 Idle status of Ethernet ring network .................................................................................................. 118 Figure 7-7 Protection state of Ethernet ring network ......................................................................................... 119 Figure 7-8 Tributary ring model ......................................................................................................................... 120 Figure 7-9 Link aggregation ............................................................................................................................... 120 Figure 7-10 Principles of interface backup ........................................................................................................ 124 Figure 7-11 Principles of VLAN-based interface backup .................................................................................. 125 Figure 7-12 Interface-to-interface link-state tracking ........................................................................................ 125 Figure 7-13 Configuring manual link aggregation ............................................................................................. 141 Figure 7-14 Link-state tracking networking ....................................................................................................... 142 Figure 7-15 Configuring static LACP link aggregation ..................................................................................... 144 Figure 8-1 OAM loopback ................................................................................................................................. 147 Figure 8-2 MDs at different levels ..................................................................................................................... 149 Figure 8-3 MEP and MIP ................................................................................................................................... 150 Figure 8-4 Roundtrip test scenario ..................................................................................................................... 153 Figure 9-1 Structure of IP packet header ............................................................................................................ 173 Figure 9-2 Structures of ToS priority and DSCP priority ................................................................................... 173 Figure 9-3 Structure of a VLAN packet ............................................................................................................. 174 Figure 9-4 Structure of CoS priority .................................................................................................................. 174 Figure 9-5 Traffic classification process ............................................................................................................ 175 Figure 9-6 SP scheduling ................................................................................................................................... 176 Figure 9-7 WRR scheduling ............................................................................................................................... 176 Figure 9-8 WDRR scheduling ............................................................................................................................ 177 Figure 9-9 Configuring rate limiting based on traffic policy ............................................................................. 190 Figure 9-10 Configuring queue scheduling and congestion avoidance .............................................................. 193 Figure 9-11 Configuring interface-based rate limiting ....................................................................................... 196 Figure 10-1 Ethernet service networking ........................................................................................................... 198 Figure 10-2 Location of UNIs and NNIs in a network topology ........................................................................ 200 Figure 10-3 RSOM networking.......................................................................................................................... 211 Figure 11-1 Configuring ACL ............................................................................................................................ 227 Raisecom Proprietary and Confidential xvi Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Figure 11-2 Configuring RADIUS ..................................................................................................................... 228 Figure 11-3 TACACS+ networking ................................................................................................................... 229 Figure 12-1 Structure of LLDPDU packet ......................................................................................................... 232 Figure 12-2 Structure of a TLV packet ............................................................................................................... 232 Figure 12-3 Interface loopback .......................................................................................................................... 242 Figure 12-4 Principles of Ping ........................................................................................................................... 244 Figure 12-5 Principle of Traceroute ................................................................................................................... 244 Figure 12-6 Configuring LLDP basic functions ................................................................................................. 262 Figure 12-7 Outputting system logs to log host ................................................................................................. 264 Raisecom Proprietary and Confidential xvii Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Tables Table 4-1 Fields of DHCP packet ......................................................................................................................... 48 Table 4-2 Fields of DHCP Option ........................................................................................................................ 49 Table 5-1 Interfaces modes and modes for processing packets ............................................................................ 69 Table 7-1 Values of fields in APS specific information ...................................................................................... 112 Table 7-2 Fields in the R-APS specific information........................................................................................... 115 Table 9-1 Mapping between local priority and DSCP priority ........................................................................... 174 Table 9-2 Mapping between local priority and CoS priority .............................................................................. 174 Table 9-3 Mapping between local priority and IP precedence ........................................................................... 174 Table 10-1 Types of Ethernet services ................................................................................................................ 199 Table 12-1 TLV types ......................................................................................................................................... 232 Table 12-2 Alarm fields ...................................................................................................................................... 237 Table 12-3 Alarm levels ..................................................................................................................................... 237 Raisecom Proprietary and Confidential xviii Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 1 Basic configurations This chapter describes basic information and configuration procedures of the RAX711-C, and provides related configuration examples, including the following sections:  CLI  Accessing device  File management  Backup and upgrade  Time management  Configuring Banner 1.1 CLI 1.1.1 Introduction The Command Line Interface (CLI) is a medium for you to communicate with the RAX711-C. You can configure, monitor, and manage the RAX711-C through the CLI. You can log in to the RAX711-C through the terminal equipment or through a computer that runs the terminal emulation program. Enter commands at the system prompt. The CLI supports the following features:  Configure the RAX711-C locally through the Console interface.  Configure the RAX711-C locally or remotely through Telnet/Secure Shell v2 (SSHv2).  Commands are classified into different levels. You can execute the commands that correspond to your level only.  The commands available to you depend on which mode you are currently in.  Shortcut keys can be used to execute commands.  Check or execute a historical command by checking command history. The last 20 historical commands can be saved on the RAX711-C.  Enter a question mark (?) at the system prompt to obtain online help.  The RAX711-C supports multiple intelligent analysis methods, such as fuzzy match and context association. Raisecom Proprietary and Confidential 1 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 1.1.2 Levels The RAX711-C classifies commands into 16 levels in a descending order:  0–4: checking level. You can execute basic commands, such as ping, clear, and history, for performing network diagnostic function, clearing system information, and showing command history.  5–10: monitoring level. You can execute commands, such as show, for system maintenance.  11–14: configuration level. You can execute commands for configuring services, such as Virtual Local Area Network (VLAN) and Internet Protocol (IP) routing.  15: management level. You can execute commands for running systems. 1.1.3 Modes The command mode is an environment where a command is executed. A command can be executed in one or multiple certain modes. The commands available to you depend on which mode you are currently in. After connecting the RAX711-C, enter the user name and password to enter privileged EXEC mode. Raisecom# In privileged EXEC mode, use the config command to enter global configuration mode. Raisecom#config Raisecom(config)#  The CLI prompt Raisecom is a default host name. You can modify it by using the hostname string command in privileged EXEC mode.  Some commands executed in global configuration mode can also be executed in other modes. The functions vary on command modes.  You can use the exit or quit command to return to the upper command mode. However, in privileged EXEC mode, you need to use the exit or quit command to exit.  You can use the end command to return to privileged EXEC mode from any modes but privileged EXEC mode. Command modes supported by the RAX711-C are listed in the following table. Mode Access mode Prompt Privileged EXEC Enter the correct user name and Raisecom# password. Raisecom Proprietary and Confidential 2 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Mode Access mode Prompt Global configuration In privileged EXEC mode, use Raisecom(config)# the config command. SNMP interface In global configuration mode, Raisecom(config-snmp1)# configuration use the interface snmp interface-number command. Physical layer In global configuration mode, Raisecom(config- interface use the interface client clientif)# configuration interface-number. In global configuration mode, Raisecom(config- use the interface line interface- lineif)# number. VLAN interface In global configuration mode, Raisecom(config- configuration use the interface vlan vlan-id. vlanif)# AP-Switchport In global configuration mode, Raisecom(ap-switchport- configuration use the interface ap- mode)# switchport-mode. Batch interface In global configuration mode, Raisecom(config-range)# configuration use the interface range { client | line } interface-number. Aggregation group In global configuration mode, Raisecom(config-port- configuration use the interface port-channel channelif)# channel-number. Route mapping In global configuration mode, Raisecom(config-route- configuration use the route-map map-name map)# { permit | deny } number command. VLAN configuration In global configuration mode, Raisecom(config-vlan)# use the lan vlan-id command. Basic IP ACL In global configuration mode, Raisecom(config-acl-ip- configuration use the access-list acl-number -std)# command. The acl-number parameter ranges from 1000 to 1999. Extended IP ACL In global configuration mode, Raisecom(config-acl-ip- configuration use the access-list acl-number -ext)# command. The acl-number parameter ranges from 2000 to 2999. MAC ACL In global configuration mode, Raisecom(config-acl- configuration use the access-list acl-number mac)# command. The acl-number parameter ranges from 3000 to 3999. Raisecom Proprietary and Confidential 3 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Mode Access mode Prompt User ACL In global configuration mode, Raisecom(config-acl- configuration use the access-list acl-number duf)# command. The acl-number parameter ranges from 5000 to 5999. Basic IPv6 ACL In global configuration mode, Raisecom(config-acl- configuration use the access-list acl-number ipv6)# command. Wherein, acl-number ranges from 6000 to 6999. Extended IPv6 ACL In global configuration mode, Raisecom(config-acl- configuration use the access-list acl-number advanced)# command. Wherein, acl-number ranges from 7000 to 7999. cos-remark In global configuration mode, Raisecom(cos-remark)# configuration use the mls qos mapping cos- remark profile-id command. cos-to-pri In global configuration mode, Raisecom(cos-to-pri)# configuration use the mls qos mapping cos- to-local-priority profile-id command. dscp-mutation In global configuration mode, Raisecom(dscp- configuration use the mls qos mapping dscp- mutation)# mutation profile-id command. dscp-to-pri In global configuration mode, Raisecom(dscp-to-pri)# configuration use the mls qos mapping dscp- to-local-priority profile-id command. ipp-to-pri In global configuration mode, Raisecom(ipp-to-pri)# configuration use the mls qos mapping ipp- to-local-priority profile-id command. WRED profile In global configuration mode, Raisecom(wred)# configuration use the mls qos wred profile profile-id command. CMAP configuration In global configuration mode, Raisecom(config-cmap)# use the class-map class-map- name command. Traffic monitoring In global configuration mode, Raisecom(traffic- profile configuration use the mls qos policer-profile policer)# policer-name [ single ] command. PMAP configuration In global configuration mode, Raisecom(config-pmap)# use the policy-map policy-map- name command. Raisecom Proprietary and Confidential 4 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Mode Access mode Prompt Traffic policy bound In PMAP configuration mode, Raisecom(config-pmap- with traffic use the class-map class-map- c)# classification name command. configuration Service instance In global configuration mode, Raisecom(config- configuration use the service csi-id level md- service)# level command. 1.1.4 Shortcut keys The RAX711-C supports the following shortcut keys. Shortcut key Description Up Arrow (↑) Show the previous command if there is any command entered earlier; the display has no change if the current command is the earliest one in history records. Down Arrow (↓) Show the next command if there is any newer command. The display does not change if the current command is the newest one in history records. Left Arrow (←) Move the cursor leftward by one character. The display does not change if the cursor is already at the beginning of the command. Right Arrow (→) Move the cursor rightward by one character. The display does not change if the cursor is already at the end of the command. Backspace Delete the character before the cursor. The display does not change if the cursor is already at the beginning of the command. Tab Press Tab after entering a complete keyword, and the cursor will automatically appear a space to the end. Press Tab again, and the system will show the follow-up entering keywords. Press Tab after entering an incomplete keyword, and the system automatically executes partial helps:  When only one keyword matches the entered incomplete keyword, the system takes the complete keyword to replace the entered incomplete keyword and leaves one space between the cursor and end of the keyword.  When no keyword or multiple keywords match the entered incomplete keyword, the system displays the prefix, and you can press Tab to check words circularly. In this case, there is no space from the cursor to the end of the keyword. Press Space bar to enter the next word.  If you enter an incorrect keyword, pressing Tab will move the cursor to the next line and the system will prompt an error. In this case, the entered keyword does not change. Ctrl+A Move the cursor to the beginning of the command. Ctrl+C Interrupt the ongoing command, such as ping and traceroute. Raisecom Proprietary and Confidential 5 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Shortcut key Description Ctrl+D or Delete Delete the character at the cursor. Ctrl+E Move the cursor to the end of the command. Ctrl+K Delete all characters from the cursor to the end of the command. Ctrl+X Delete all characters before the cursor (except the cursor location). Ctrl+Z Return to privileged EXEC mode from the current mode (except privileged EXEC mode). Space bar or Y Scroll down one screen. Enter Scroll down one line. 1.1.5 Viewing command history The RAX711-C support viewing or executing a historical command through the history command in any command mode. By default, the last 20 historical commands are saved. The RAX711-C can save a maximum of 20 historical commands through the terminal history command in privileged EXEC mode. 1.1.6 Acquiring help Complete help You can acquire complete help under following three conditions:  You can enter a question mark (?) at the system prompt to display a list of commands and brief descriptions available for each command mode. Raisecom#? The command output is as below: clear Clear screen enable Turn on privileged mode command exit Exit current mode and down to previous mode help Message about help history Most recent history command language Language of help message list List command quit Exit current mode and down to previous mode terminal Configure terminal test Test command . Raisecom Proprietary and Confidential 6 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface  After you enter a keyword, press the Space bar and enter a question mark (?), all correlated commands and their brief descriptions are displayed if the question mark (?) matches another keyword. Raisecom(config)#clock ? The command output is as below: display Display mode Clock mode set Set system time and date summer-time Set summer time timezone Set system timezone offset  After you enter a parameter, press Space bar and enter a question mark (?), associated parameters and descriptions of these parameters are displayed if the question mark (?) matches a parameter. Raisecom(config)#interface client ? The command output is as below: client 1 client 2 client 3 client 4 <1-4> Port number Incomplete help You can acquire incomplete help under following three conditions:  After you enter part of a particular character string and a question mark (?), a list of commands that begin with a particular character string is displayed. Raisecom(config)#c? The command output is as below: channel-ring Channel ring config class-map Set class map Raisecom Proprietary and Confidential 7 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface clear Clear buffer content clock Clock command-log Log the command to the file console console cpu Configure cpu parameters cpu-protect Config cpu protect information create Create static VLAN crossconnect Config crossconnect  After you enter a command, press Space bar, and enter a particular character string and a question mark (?), a list of commands that begin with a particular character string is displayed. Raisecom(config)#show li? The command output is as below: link-state-tracking Link state tracking  After you enter a partial command name and press Tab, the full form of the keyword is displayed if there is a unique match command. Error messages The following table lists some error messages that you might encounter while using the CLI to configure the RAX711-C. Error information Description % Incomplete command. The entered command is incomplete. Error input in the position market by The keyword marked with "^" is invalid or does '^' not exist. Ambiguous input in the position The keyword marked with "^" is unclear. market by '^' % " * "Unconfirmed command. The entered command is not unique. % " * "Unknown command. The entered command does not exist. % You Need higher priority! You need more authority to exist the command. Raisecom Proprietary and Confidential 8 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 1.2 Accessing device 1.2.1 Accessing device through Console interface The Console interface of the RAX711-C is a Universal Serial Bus (USB) A-shaped female interface, which is translated into a Universal Asynchronous Receiver/Transmitter (UART) in the device. The Console interface is used to connect the RAX711-C to a PC that runs the terminal emulation program. You can configure and manage the RAX711-C through this interface. This management method does not involve network communication. You must log in to the RAX711-C through the Console interface under the following 2 conditions:  The RAX711-C is powered on for the first time.  You cannot log in to the RAX711-C through Telnet. Log in to the RAX711-C through the Console interface as below: Before logging in to the RAX711-C through the USB interface, install the driver for translating the USB interface into the UART interface to the PC. To download the driver, visit http://www.raisecom.com.cn/support.php and then click USB Console Driver. Step 1 Use the configuration cable with dual USB male interfaces to connect the Console interface of the RAX711-C with the USB interface of the PC, as shown in Figure 1-1. Figure 1-1 Accessing the device through the Console interface Step 2 Run the terminal emulation program on the PC, such as Hyper Terminal on Microsoft Windows XP. Enter the connection name at the Connection Description dialog box and then click OK. Step 3 Select COM N (N refers to the COM interface ID into which the USB interface is translated) at the Connect To dialog box and then click OK. Step 4 Configure parameters as shown in Figure 1-2 and then click OK Raisecom Proprietary and Confidential 9 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Figure 1-2 Configuring parameters of Hyper Terminal Step 5 Enter the configuration interface and then enter the user name and password to log in to the RAX711-C. By default, both the user name and password are configured to raisecom. Hyper Terminal is not available on Windows Vista or Windows 7 Operating System (OS). If you use these OSs, you have to download Hyper Terminal package and install it. 1.2.2 Accessing device through Telnet Through Telnet, you can remotely log in to the RAX711-C through a PC, so you should prepare a PC for each RAX711-C. Working as the Telnet server, the RAX711-C provides the following Telnet services: As shown in Figure 1-3, connect the PC and the RAX711-C and ensure that the route between them is reachable. You can log in to and configure the RAX711-C by running Telnet Client program on a PC. Raisecom Proprietary and Confidential 10 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Figure 1-3 Networking as the Telnet server Before logging in to the RAX711-C through Telnet, you must log in to the RAX711-C through the Console interface, configure the IP address of the SNMP interface, and enable Telnet service. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface snmp 1 Enter out-of-band network management interface configuration mode. 3 Raisecom(config-snmp1)#ip address Configure the IP address of the out-of-band network ip-address [ ip-mask ] management interface. Raisecom(config-snmp1)#exit 4 Raisecom(config)#telnet-server close (Optional) close the specified Telnet session. terminal-telnet session-number 5 Raisecom(config)#telnet-server max- (Optional) configure the maximum number of Telnet session session-number sessions supported by the RAX711-C. By default, it is 5. 1.2.3 Accessing device through SSHv2 Telnet is an authentication mode that is lack of security. In addition, it adopts Transmission Control Protocol (TCP) to transmit the password and data in clear text. It will cause malicious attack, such as Deny of Service (DoS), IP address spoofing, and route spoofing because only Telnet service is provided. With more attention is put on network security, the traditional modes (TCP and FTP) for transmitting the password and data in clear text are not accepted gradually. SSHv2 is a network security protocol, which can effectively prevent the disclosure of information in remote management through data encryption, and provides greater security for remote login and other network services in network environment. SSHv2 builds up a secure channel over TCP. Besides, SSHv2 supports other service ports as well as standard port 22, thus avoiding illegal attacks from network. Before accessing the RAX711-C through SSHv2, you must log in to the RAX711-C through the Console interface and enable SSH service. Raisecom Proprietary and Confidential 11 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#genera Generate local SSHv2 key pair and designate its length. By default, te ssh-key length the length of the local SSHv2 key pair is configured to 512 bits. 3 Raisecom(config)#ssh2 Start SSHv2 server. By default, the RAX711-C does not start the server SSHv2 server. 4 Raisecom(config)#ssh2 (Optional) configure SSHv2 authentication method. By default, the server authentication RAX711-C adopts the password authentication mode. { password | rsa-key } 5 Raisecom(config)#ssh2 (Optional) when the rsa-key authentication method is adopted, type server authentication the public key of clients to the RAX711-C. pubkeyname public-key pubkey 6 Raisecom(config)#ssh2 (Optional) configure SSHv2 authentication timeout. The RAX711-C server authentication- refuses to authenticate and open the connection when client timeout period authentication time exceeds the upper threshold. By default, the SSHv2 authentication timeout is configured to 600s. 7 Raisecom(config)#ssh2 (Optional) configure the allowable times for SSHv2 authentication server authentication- failure. The RAX711-C refuses to authenticate and open the retries times connection when client authentication failure times exceed the upper threshold. By default, the allowable times for SSHv2 authentication failure are configured to 20. 8 Raisecom(config)#ssh2 (Optional) configure the SSHv2 listening port ID. By default, the server port port-number SSHv2 listening port ID is configured to 22. When configuring the SSHv2 listening port ID, the input parameter cannot take effect immediately without rebooting the SSHv2 service. 9 Raisecom(config)#ssh2 Configure the SSH key renegotiation time. server rekey-interval interval By default, it is 0; namely, SSH key renegotiation is not conducted. 1.2.4 Managing users When you start the RAX711-C for the first time, connect the PC to the Console interface on the RAX711-C, enter the default user name and password to log in to and configure the RAX711-C. By default, both the user name and password are raisecom If there is no privilege restriction, any remote user can log in to the RAX711-C through Telnet when the Simple Network Management Protocol (SNMP) interface or other service interfaces on the RAX711-C are configured with IP addresses. This is unsafe to the RAX711-C and network. Creating the user name and configuring the password and privilege help manage login users and ensure network and device security. Raisecom Proprietary and Confidential 12 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Step Command Description 1 Raisecom#user name user-name Create or modify the user name and password. password [ cipher | simple ] password 2 Raisecom#user name user-name Configure the level and privilege of the user. privilege privilege-level 3 Raisecom#user user-name service-type Configure the login mode of the user. { all | console | lan-access | ssh | telnet | web } 4 Raisecom#console login line Configure the mode for login from the Console interface to serial line password. 5 Raisecom#line { password | encrypt- Configure the serial line password. password } password 6 Raisecom#password check { simple | Configure the complexity of the administrator complex } password. 7 Raisecom#login-trap enable Configure user logout to trigger a Trap. 8 Raisecom#delete user-file Delete the user file. 1.2.5 Checking configurations No. Command Description 1 Raisecom#show user { active | table Show information about logged users or the user [ detail ] } information table. 2 Raisecom#show interface snmp 1 Show the IP address of the out-of-band network management interface. 3 Raisecom#show ssh2 public-key Show the public key for SSHv2 authentication. [ authentication | rsa ] 4 Raisecom#show ssh2 session Show configurations of SSHv2 sessions. 5 Raisecom#show ssh2 server Show configurations of the SSHv2 server. 1.3 File management 1.3.1 Introduction System files System files are the software/files required for running the device, including the system Bootrom file, system configuration file, system startup file, and FPGA file. In general, these files are saved to the memory of the device. File management refers to backing up, upgrading, loading, and deleting system files. Raisecom Proprietary and Confidential 13 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface System Bootrom file The system Bootrom file (BootROM software) is used to initialize the RAX711-C. After the device is powered on, the BootROM software is running to initialize the device. You can upgrade the BootROM software if a new version is available. For details, see section 1.4 Backup and upgrade. System startup file The system startup file (with the ".z" suffix) is used to start and operate the device. It supports the normal operating and realizes functions of the device. You can upgrade the system startup file if a new version is available. In addition, to avoid a system fault, you can back up the system startup file. For details, see section 1.4 Backup and upgrade. The RAX711-C supports 2 sets of system startup software simultaneously, providing master- to-slave switching of dual systems. System configuration file The system configuration file (with the ".cfg" suffix) is the configuration item to be loaded when the device is booted at this time or next time. After being powered on, the device reads the configuration file from the memory for initialization. If there is no configuration file in the memory, the device will use the default configuration file. Configuration parameters in the configuration file are divided into the following 2 types:  Configuration parameters used for initialization are startup configurations.  Configuration parameters used when a device is running properly are running configurations. You can modify running configurations through CLI. To make these modified running configurations as startup configurations when the device is powered on next time, you should save running configurations to the memory (by using the write command) to form a configuration file. Operations on the system configuration file include loading, upgrading, backing up, and deleting the system configuration file. For details about load, backup, and upgrade, see section 1.4 Backup and upgrade. 1.3.2 Managing configuration files No. Command Description 1 Raisecom#auto-write enable Enable automatic saving of configurations. Raisecom#auto-write interval interval Configure the auto-saving period. By default, it is 5min. 2 Raisecom#erase [ file-name | backup- Delete files from the memory. config | startup-config slot slot-id | all ] 3 Raisecom#show auto-write info Show auto-saving configurations. Raisecom Proprietary and Confidential 14 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface No. Command Description 4 Raisecom#show startup-config [ slot slot- Show configuration loaded for device startup. id ] 5 Raisecom#show running-config Show current configurations of the device. 5 Raisecom#show backup-config Show backup configurations of the device. 7 Raisecom#show startup Show information about files for system startup. 8 Raisecom#copy { backup-config startup- Load the configuration file. config | startup-config backup-config | startup-config running-config } 9 Raisecom#switch startup-config backup- Switch the startup configuration file to the config backup configuration file 1.4 Backup and upgrade 1.4.1 Introduction Backup Backup refers to copying the saved system file from the device memory to the server memory for recovering the backup file when the device fails. This ensures that the device works properly. You need to recover the old system file in the following cases:  The system file is lost or damaged because the device fails.  The device works improperly because of upgrade failure. The RAX711-C supports backing up the system configuration file, system startup file, and system log file. Upgrade To resolve the following problems, you can upgrade the device:  Adding new features to the device  Releasing the new software after fixing Bugs of the current software The RAX711-C supports being upgraded through the following 2 modes:  FTP upgrade in BootROM mode  FTP/TFTP upgrade in system configuration mode The RAX711-C supports IPv4-based FTP/TFTP. 1.4.2 Upgrading system software in BootROM mode In the following cases, you need to upgrade system software in BootROM mode:  The RAX711-C is booted for the first time. Raisecom Proprietary and Confidential 15 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface  The system files are damaged.  The RAX711-C cannot be booted properly. Before upgrading the system software through BootROM, you should build a FTP environment, taking a PC as the FTP server and the RAX711-C as the client. Basic requirements are as below.  The RAX711-C is connected to the FTP server through SNMP interface.  Configure the FTP server and ensure the FTP server is available.  Configure the IP address of the FTP server to be in the same network segment as that of the RAX711-C which is configured through the t command. Step Operation 1 Log in to the RAX711-C through serial interface as the administrator and enter privileged EXEC mode and then use the reboot command to reboot the RAX711-C. Raisecom#reboot Please input 'yes' to confirm:yes Rebooting ... begin... ram size:128M testing...done Init flash ...Done RAX711-C_BOOTSTRAP_5.1.5_20131224, Raisecom Compiled Jul 24 2016,18:05:41 Base Ethernet MAC address: 00:0e:5e:45:45:45 Press SPACE to enter bootrom menu...... 0 Raisecom Proprietary and Confidential 16 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Step Operation 2 Press Space bar to enter the raisecom interface when "Press space into bootrom menu..." appears on the screen, then input "?" to display the command list: [Raisecom]:? ? print this list ? - alias for 'help' b - booting system ce - erase flash expect BOOT cf - check flash crc help - print online help i - modify ip address if - download flash m - download fpga mdmac - modify MAC address of - upload flash old - switch to U-Boot console pie - input manufacturer information r - reset CPU or switch console u - updating system ub - updating uboot The entered letters are case sensitive. Raisecom Proprietary and Confidential 17 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Step Operation 3 Type "u" to download the system boot file through TFTP and replace the original one, the information displayed is shown as below: Index Partition Free Size(byte) -------------------------------------------------- 1 core/ 36143104 Please select a partition: 1 choose mode for updating core file. ----------------------------------- - 1. | serial - ----------------------------------- - 2. | network - ----------------------------------- please input your choice:2 configure network information ... host ip address: 1.1.1.1 user: raisecom password: raisecom filename: system.bin Loading... Done Saving file to flash... Ensure the input file name is correct. In addition, the file name should not be longer than 80 characters. 4 Type "r" to execute the bootstrap file quickly. The RAX711-C will be rebooted and upload the downloaded system boot file. 1.4.3 Upgrading system software in system configuration mode Before upgrading the system software, you should build a FTP/TFTP environment, taking a PC as the TFTP server and the RAX711-C as the client. Basic requirements are as below.  The RAX711-C is connected to the TFTP server through the Client/Line interface.  Configure the IP address of the PC and ensure that the route between the PC and the RAX711-C is reachable. Step Command Description 1 Raisecom#download { backup-config | Download the system software through bootstrap | dhcpLease | fpga | mcu | FTP/TFTP. startup-config | system-boot } { ftp ip- address username password filename | tftp ip-address filename } 2 Raisecom#reboot [now | in minute ] Restart the device. The device will load the newly-downloaded system startup file automatically. Raisecom Proprietary and Confidential 18 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 1.4.4 Backing up system software in system configuration mode Before backing up the system software, you should build a FTP/TFTP environment, taking a PC as the TFTP server and the RAX711-C as the client. Basic requirements are as below.  The RAX711-C is connected to the TFTP server through the Client/Line interface.  Configure the IP address of the PC and ensure that the route between the PC and the RAX711-C is reachable. Step Command Description 1 Raisecom#upload { accident-logfile | alarm-logfile | all- Upload the system logfile | backup-config | command-log | dhcpLease | fpga | Bootstrap file and paf | running-config | running-logfile | startup-config | configuration file to system-boot } { ftp ip-address user-name password file-name | the backup server. tftp ip-address file-name } 1.4.5 Checking configurations No. Command Description 1 Raisecom#show version Show the version of the system. 2 Raisecom#show startup Show the file used for starting the system. 3 Raisecom#show startup-config Show configurations for starting the system. 1.5 Time management 1.5.1 Introduction Device time To ensure that the RAX711-C can cooperate with other devices, you need to configure system time and time zone precisely for the RAX711-C. DST Daylight Saving Time (DST) is configured locally to save energy. About 110 countries around the world apply DST in summer, but vary in details. Thus, you need to consider detailed DST rules locally before configuration. The RAX711-C supports configuring DST. Time protocols With development and extension of Internet in all aspects, multiple applications involved in time need accurate and reliable time, such as online realtime transaction, distributed network calculation and processing, transport and flight management, and data management. A Raisecom Proprietary and Confidential 19 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface network requires time protocols to distribute precise time. At present, there are two common time protocols: Network Time Protocol (NTP) and Simple Network Time Protocol (SNTP). NTP is a standard protocol for time synchronization in telecommunication network. It is defined by RFC1305. It is used to perform time synchronization between the distributed time server and clients. NTP transmits data based on UDP, using UDP port 123. NTP is used to perform time synchronization on all hosts and switches in the network. Therefore, these devices can provide various applications based on the uniformed time. In addition, NTP can ensure a very high accuracy with an error about 10ms. Devices which support NTP can both be synchronized by other clock sources and can synchronize other devices as the clock source. In addition, these devices can be synchronized mutually through the NTP packet. NTP supports performing time synchronization through multiple NTP working modes:  Server/Client mode In this mode, the client and server are relative. The device used for providing the time standard is a server while the device used for receiving time services is a client. The client sends clock synchronization message to different servers. The servers work in server mode automatically after receiving the synchronization message and send response messages. The client receives response messages, performs clock filtering and selection, and is synchronized to the preferred server. In this mode, the client can be synchronized to the server but the server cannot be synchronized to the client.  Symmetric peer mode In this mode, there are the symmetric active peer and symmetric passive peer. The device, which sends the NTP synchronization packet actively, is the symmetric active peer. The device working in the symmetric active mode sends clock synchronization messages to the device working in the symmetric passive mode. The device that receives this message automatically enters the symmetric passive mode and sends a reply. By exchanging messages, the symmetric peer mode is established between the two devices. Then, the two devices can synchronize, or be synchronized by each other. The RAX711-C supports working as the NTP v1/v2/v3 client to be synchronized by the server. RFC1361 simplifies NTP and provides Simple Network Time Protocol (SNTP). Compared with NTP, SNTP supports the server/client mode only. The RAX711-C supports working as the SNTP client to be synchronized by the server. 1.5.2 Configuring time and time zone Step Command Description 1 Raisecom#clock set hour minute Configure the system time. second year month day By default, it is 8:00:00, Jan 1, 2000. 2 Raisecom#clock timezone { + | - Configuring the system time zone. } hour minute timezone-name By default, it is GMT +8:00. Raisecom Proprietary and Confidential 20 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 1.5.3 Configuring DST Daylight Saving Time (DST) is set locally to save energy, but vary in details. Thus, you need to consider detailed DST rules locally before configurations. Step Command Description 1 Raisecom#clock summer-time enable Enable DST on the RAX711-C. By default, DST is disabled. 2 Raisecom#clock summer-time recurring Configure the begin time and end time of DST. { start-week | last } { sun | mon | tue | wed | thu | fri | sat } start- By default, the time offset is 60 minutes. month hour minute { end-week | last } { sun | mon | tue | wed | thu | fri | sat } end-month- hour minute offset  When you configure the system time manually, if the system uses DST, such as DST from 2 a.m. on the second Sunday, April to 2 a.m. on the second Sunday, September every year, you have to advance the clock one hour faster during this period, that is, set the time offset as 60min. So the period from 2 a.m. to 3 a.m. on the second Sunday, April each year is inexistent. Configuring time manually in this period will fail.  The DST in southern hemisphere is opposite to the northern hemisphere, which is from September to April next year. If the start time is later than end time, the system will suppose that it is in the southern hemisphere. That is to say, the DST is the period from the start time this year to the end time next year. 1.5.4 Configuring NTP/SNTP Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ntp server ip- (Optional) configure the IP address of the NTP server address [ version version-number ] for the client that works in server/client mode. 3 Raisecom(config)#ntp peer ip- (Optional) configure the IP address of the NTP server address [ version version-number ] for the RAX711-C that works in symmetric peer mode. 4 Raisecom(config)#sntp server ip- (Optional) configure the IP address of the SNTP server address for the RAX711-C that works in SNTP client mode. 5 Raisecom(config)#ntp reclock-master ip-address [ stratum ] Configure the NTP reference clock source in server/client mode. Raisecom Proprietary and Confidential 21 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface  If the RAX711-C is configured as the NTP reference clock source, it cannot be configured as neither the NTP server nor NTP symmetric peer, or cannot be synchronized by other devices; vice versa.  SNTP and NTP are mutually exclusive. If you have configured the IP address of the NTP server on the RAX711-C, you cannot configure SNTP on the RAX711-C; vice versa. 1.5.5 Checking configurations No. Command Description 1 Raisecom#show clock [ summer-time Show configurations on the system time, time recurring ] zone, and DST. 2 Raisecom#show sntp Show SNTP configurations. 3 Raisecom#show ntp status Show NTP configurations. 4 Raisecom#show ntp associations [ detail ] Show configurations of NTP association. 5 Raisecom#show clock interface Show information about clock interfaces. 1.6 Configuring Banner 1.6.1 Preparing for configurations Scenario Banner is a message to be displayed when you log in to or exit the RAX711-C, such as the precautions or disclaimer. You can configure Banner of the RAX711-C as required. In addition, the RAX711-C provides the Banner switch. After Banner display is enabled, the configured Banner information appears when you log in to or exit the RAX711-C. After configuring Banner, you should use the write command to save configurations. Otherwise, Banner information is lost when the RAX711-C is restarted. Prerequisite N/A 1.6.2 Configuring Banner Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 22 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface Step Command Description 2 Raisecom(config)#banner Configure Banner contents. Enter the banner login and word, login word press Enter, enter Banner contents, and then end with the word Enter text message followed character. by the character ’word’ to finish.User can stop configuration by inputing’ Ctrl+c’ The word parameter is a 1-byte character. It is the message word beginning and end marker of the Banner contents. These 2 marks must be the identical character. We recommend selecting the specified character that will not occur at the message. The message parameter is the Banner contents. Up to 2560 characters are supported. 3 Raisecom(config)#clear (Optional) clear Banner contents. banner login 1.6.3 Enabling Banner display Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#banner Enable Banner display. enable By default, Banner display is disabled. 1.6.4 Checking configurations No. Command Description 1 Raisecom#show banner login Show Banner status and contents of the configured Banner. Raisecom Proprietary and Confidential 23 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 2 Interface management This chapter describes configurations of interface management, including the following sections:  Introduction  Configuring basic information about interface  Configuring Ethernet interface  Configuring VLAN interface  Configuring loopback interface  Checking configurations  Maintenance 2.1 Introduction 2.1.1 Ethernet interface The Ethernet physical interface works at the data link layer and forwards Layer 2 packets. 2.1.2 VLAN interface The VLAN interface is a logical interface, which is used to implement inter-VLAN Layer 3 interworking. Each VLAN corresponds to one VLAN interface. After being configured with an IP address, the VLAN interface can be a gateway of network devices in this VLAN, thus implementing forwarding of cross-segment packets based on IP address at Layer 3. 2.1.3 Aggregation group interface The aggregation group interface is a logical interface. It binds multiple physical interfaces logically and aggregates these physical interfaces to be a Link Aggregation Group (LAG), thus implementing load balancing on each member interface. 2.1.4 Loopback interface The loopback interface is a logical interface. Because its physical layer status and link layer protocol are always Up and are with high stability, the IP address can be configured on the loopback interface and as an ID of a device. 2.1.5 Interface configuration modes The RAX711-C supports the following interface configuration modes:  Physical layer interface configuration mode Raisecom Proprietary and Confidential 24 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface  Aggregation group interface configuration mode  VLAN interface configuration mode  Loopback interface configuration mode The interface configuration mode mentioned in this document refers to multiple interface configuration modes if not otherwise stated. 2.2 Configuring basic information about interface 2.2.1 Configuring basic information about interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface- Enter physical layer interface configuration type interface-number mode. 3 Raisecom(config-port)#description Configure descriptions of the interface. string 4 Raisecom(config-port)#shutdown (Optional) shut down the interface. 2.2.2 Configuring Jumboframe on the interface The Ethernet interface may receive Jumboframe, which is greater than the standard frame size, when transmitting high-throughput data. The system will discard these Jumboframes directly. After you configure allowing Jumboframes to pass, the system will continue to process them when the Ethernet interface receives Jumboframes, whose size is greater than the standard size but within the specified size range. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#jumboframe Configure the Jumboframe that is allowed to pass frame-size through the interface. By default, it is 9600 bytes. Raisecom Proprietary and Confidential 25 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 2.3 Configuring Ethernet interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter interface configuration mode. interface-type interface-number By default, the interface is in physical layer interface configuration mode. 3 Raisecom(config-port)#duplex Configure the duplex mode of the interface. { full | half | auto } 4 Raisecom(config-port)#speed Configure the rate of the interface. { auto | 10 | 100 | 1000 | 10G } 5 Raisecom(config-port)#tpid Configure the TPID of the interface. { 8100 | 9100 | 88a8 } By default, it is 0x8100. 2.4 Configuring VLAN interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface vlan vlan-id Enter VLAN interface configuration mode. 3 Raisecom(config-vlanif)#ip address ip- Configure primary and slave IP addresses and address [ ip-mask ] subnet masks of the VLAN interface. 4 Raisecom(config-port)#mtu size Configure the MTU of the interface. By default, it is 1500 bytes. 5 Raisecom(config-port)#mac mac-address Configure the MAC address of the interface. 2.5 Configuring loopback interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface loopback Enter loopback interface configuration mode. interface-number 3 Raisecom(config-port)#ip address ip- Configure primary and secondary IP addresses address [ ip-mask ] and subnet mask of the loopback interface. Raisecom Proprietary and Confidential 26 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide Preface 2.6 Checking configurations No. Command Description 1 Raisecom#show interface interface-type interface-number Show interface status. 2.7 Maintenance Command Description Raisecom(config-port)#clear interface statistics (Optional) clear interface statistics. Raisecom Proprietary and Confidential 27 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration 3 Zero-configuration This chapter describes principles and configuration procedures of zero-configuration, including the following sections:  Introduction  Configuring local zero-configuration  Configuring remote zero-configuration  Configuration examples 3.1 Introduction When the carrier brings more and more requirements for manageability and maintenance of the network, overall management of the entire network becomes the objective of the carrier. In this case, remote Packet Switching (PS) devices should be able to be managed. Though traditional remote PS devices support Operation, Administration, and Management (OAM), protection switching, rate limiting, and service sending, and also can be managed, but they must be carefully configured before being managed. These configurations are complex in large-scale construction, and have high requirements on construction personnel who must take tools like laptops and be familiar with CLI. As a result, low efficiency in service activation becomes a bottleneck for large-scale application of remote PS devices. To solve the previous problem, Raisecom has developed zero-configuration through which remote devices support plug and management. This simplifies implementation, facilitates wide-scale deployment, and accelerates network management. 3.1.1 Principles of zero-configuration Figure 3-1 shows the zero-configuration network topology of the RAX711-C. The network topology is composed of CO zero-configuration servers, remote zero-configuration devices, and the NView NNM system. After being powered on and connected to the network, the remote devices can detect the zero- configuration server automatically. After finding the zero-configuration server, the devices can obtain NMS parameters, such as the management VLAN, management IP address, and default route from the zero-configuration server. Then, the devices will be discovered and managed by the NView NNM system. Raisecom Proprietary and Confidential 28 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration The CO devices, as zero-configuration servers, respond detection requests of remote devices and configure correct NMS parameters for them. The RAX711-C can work as the zero-configuration server to assign IP addresses for remote iTN devices and can work as remote devices to obtain management IP addresses from the zero-configuration server. Figure 3-1 Principles of CO/remote zero-configuration Raisecom zero-configuration is implemented through DHCP or extended OAM:  Zero-configuration based on DHCP Figure 3-1 shows the zero-configuration networking topology based on DHCP. CO RAX711- C A is a zero-configuration server, and the remote RAX711-C C and RAX711-L A are remote zero-configuration devices. The CO and remote devices can be connected indirectly, and also can communicate indirectly through Raisecom devices or network devices of other vendors. The remote device obtains NMS parameters by sending DHCP packets, and CO device receives packets and sends Offer packets.  Zero-configuration based on extended OAM Figure 3-1 shows the zero-configuration networking topology based on extended OAM. RAX711-C B is directly connected to RAX711-L B. NMS parameters are assigned between CO device and remote device through extended OAM; wherein, the CO device is in OAM active mode, and the remote device is in passive mode. By default, the IP RAN remote device is in OAM passive mode. Raisecom Proprietary and Confidential 29 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration 3.1.2 CO zero-configuration As a CO zero-configuration server, the RAX711-C supports two zero-configuration schemes: zero-configuration based on DHCP or extended OAM. The RAX711-C responds requests from the remote devices, assigns or reuses management IP addresses, and maintains the address pool. Zero-configuration based on DHCP As shown in Figure 3-2, DHCP is running between the RAX711-C and RAX711-L; wherein, the CO device is configured as the DHCP server while the remote device is configured as the DHCP client. The remote device applies for NMS parameters from the CO device as below: Step 1 The uplink physical interface on the remote device triggers the automatical application for the IP address, traverses DHCP Discovery packets sent from VLANs 1–4094. Packets carry the Option 60 field, which contains vendor information and VLAN. Step 2 Receiving the Discover packet, the CO device selects the corresponding address pool according to information carried on the Option 60 field and the IP address of the gateway to assign the idle IP address for the remote device, and forms Offer packet to send to the remote device. Step 3 After the remote device receives the Offer packet, it will stop sending the Discovery packet and configure polling. It then analyses the Offer packet and obtain the management VLAN. Step 4 The remote device configures the management interface to Trunk mode according to the management VLAN, and allows packets of the management VLAN to pass. It sends the Request packet, which carries CO information and assigned IP address, through the management VLAN. Step 5 After receiving the request packet, the CO device verifies whether the information is correct; if it is correct, the CO device sends the ACK packet to the remote device; otherwise sends the NAK packet. Step 6 After receiving the ACK packet, the remote device creates a management interface, configures the IP address, and reconfigures other applied NMS parameters. Raisecom Proprietary and Confidential 30 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Figure 3-2 Zero-configuration on indirect connection between remote devices Zero-configuration based on DHCP is applicable to directly-connected or indirectly- connected remote devices. Zero-configuration based on extended OAM As shown in Figure 3-3, the extended OAM protocol, which is used to assign NMS parameters, is running between the CO RAX711-C and the remote RAX711-L. The CO device is configured to work in OAM active mode while the remote device is configured to work in OAM passive mode. The powered-on remote device automatically triggers automatical application for the IP address, and applies parameters of IP address and VLAN of the NMS by sending extended OAM packets. Zero-configuration based on extended OAM protocol is applicable to directly-connected remote devices. Raisecom Proprietary and Confidential 31 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Figure 3-3 Zero-configuration on direct connection between remote devices When the CO device is manually configured to OAM active mode and enabled with extended OAM, it automatically discovers the remote device after being powered on. 3.1.3 Zero-configuration of remote device The RAX711-C, as the zero-configuration remote device, supports obtaining NMS parameters from the zero-configuration server. After the remote device is properly connected to the network, power on it. Then, it sends DHCP Discovery packets to obtain NMS parameters. The remote device triggers zero- configuration in the following modes:  Powering it on  Configuring it through CLI  Automatically triggered a period after it fails to obtain the IP address  Triggered when its interface becomes Up/Down after it fails to obtain the IP address Raisecom Proprietary and Confidential 32 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration 3.2 Configuring local zero-configuration 3.2.1 Preparing for configurations Scenario  When a local RAX711-C is connected with remote devices, it can discover these remote devices by using the extended OAM protocol and configure the management IP address, management VLAN, and default route for them. Therefore, the NView NNM system can quickly manage remote devices through the public IP address and global interface ID of the RAX711-C without being configured manually.  When the local RAX711-C and remote devices are connected directly/indirectly, both the local and remote devices can provide zero-configuration through Dynamic Host Configuration Protocol (DHCP). Prerequisite  The RAX711-C is a local device.  The local zero-configuration server is connected to the NView NNM system and remote devices properly.  Perform the following operations on the local device based on the extended OAM protocol: – Create and activate the management VLAN. – The interface of the remote device used for direct connection is configured to work in Trunk mode and allows the management VLAN to pass. – Manually enable the OAM active mode on the interface.  Based on DHCP, the remote device is connected to the network and configured as the zero-configuration client. It has created and activated the management VLAN. 3.2.2 Configuring zero-configuration server based on extended OAM Configuring management VLAN Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#create vlan vlan- Create and activate a VLAN. id active Raisecom Proprietary and Confidential 33 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Step Command Description 3 Raisecom(config)#oam mng-vlan vlan- Configure the remote management VLAN for zero- id configuration. By default, it is VLAN 0. After configuring the remote management VLAN through this command, do not manually modify switching attributes of the downlink interface on the CO device; otherwise, the NMS channel will be disconnected. 4 Raisecom(config)#interface Enter interface configuration mode. interface-type interface-number 5 Raisecom(config-port)#oam enable Enable OAM. 6 Raisecom(config-port)#oam active Configure the OAM active mode of the interface. Configuring address pool and gateway Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ip oam server Configure the address pool of the OAM property and pool pool-name enter address pool configuration mode. By default, there is an OAM-based address pool named oam-def-pool. Its address range is from 172.221.218.2 to 172.221.218.201, its subnet mask is 255.255.252.0, and its gateway is 172.221.216.1. 3 Raisecom(config-pool)#address Configure the IP address range and subnet mask of the start-ip-address end-ip-address address pool. mask { mask-address | mask- length } 4 Raisecom(config-pool)#gateway ip- Configure the gateway of the address pool. address Raisecom(config-pool)#exit Exit address pool configuration mode. 5 Raisecom(config)#interface vlan Enter VLAN interface configuration mode. The VLAN vlan-id is the preconfigured management VLAN. 6 Raisecom(config-vlanif)#ip address Configure the IP address of the VLAN interface, which ip-address should be the gateway address of the address pool. Raisecom Proprietary and Confidential 34 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Configuring NAT Network Address Translation (NAT) is used to convert the private management IP address of the remote device to the public IP address. Through zero-configuration, the remote device obtains a private IP address from the local device. NAT can be used to translate the private IP address into the public IP address of the management network and distinguish different remote devices in a form of public IP address+global interface ID. Network management information transmitted between remote devices and the NView NNM system is forwarded through the public IP address. Therefore, you should configure the public IP address and related management VLAN of the local device. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#access-list Create an ACL and enter ACL configuration mode. acl-number 3 Raisecom(config-acl-ipv4- Configure an ACL filtering rule. advanced)#rule [ rule-id ] permit ip source-ip-address Sent the packet, whose source IP address complies with the source-ip-mask any ACL filtering rule, to the CPU. Raisecom(config-acl-ipv4- Exit ACL configuration mode. advanced)#exit 4 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number The interface is used to connect the public network. 5 Raisecom(config-port)#ip Configure the IP address of the public network, which is address ip-address ip-mask used to communicate with the NView NNM system. 6 Raisecom(config-port)#nat Configure NAT. outbound acl-number The ACL ID is identical to the one created at step 2. 7 Raisecom(config-port)#exit Enter global configuration mode. 8 Raisecom(config)#nat server Configure the mapping between the private network and { tcp | udp } private-ip- public network. address private-port public-ip- address public-port 9 Raisecom(config)#nat static Configure static address mapping of basic NAT. [ outband ] private-ip-address public-ip-address 3.2.3 Configuring zero-configuration server based on DHCP Configuring zero-configuration Server based on VLAN interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#create vlan vlan- Create a VLAN, and activate it. id active 3 Raisecom(config)#interface vlan Enter VLAN interface configuration mode. The VLAN vlan-id ID is the ID of the created VLAN. Raisecom Proprietary and Confidential 35 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Step Command Description 4 Raisecom(config-vlanif)#ip address Configure the IP address on the interface, which is ip-address consistent with the gateway of the address pool. 5 Raisecom(config-vlanif)#ip dhcp Enable DHCP Server on the interface. server By default, it is disabled. Raisecom(config-vlanif)#exit Exit interface configuration mode. 6 Raisecom(config)#ip dhcp server Create an address pool of the DHCP property, and enter pool pool-name address pool configuration mode. By default, there is an OAM-based address pool named oam-def-pool. Its address range is from 172.221.216.2 to 172.221.218.1, its subnet mask is 255.255.252.0, and its gateway is 172.221.216.1. 7 Raisecom(config-pool)#address Configure the IP address range and subnet mask of the start-ip-address end-ip-address address pool. mask { mask-address | mask- length } 8 Raisecom(config-pool)#gateway ip- Configure the default gateway of the address pool. address The gateway is identical to the private IP address of the management IP address assigned to the remote device by the local device. 9 Raisecom(config-pool)#lease Configure the lease period of the address pool. expired { minute | infinite } By default, it is infinite. 10 Raisecom(config-pool)#option 60 Configure information carried by Option60. vendor-string 11 Raisecom(config-pool)#trap server- Configure the IP address of the SNMP server (NView ip ip-address NNM system) to which the Trap is sent. 12 Raisecom(config-pool)#tftp-server- Configure the TFTP server related to the address pool. ip ip-address 13 Raisecom(config-pool)#exit Exit address pool configuration mode. If the zero-configuration server assigns management IP addresses to remote devices based on VLAN interface, network management information exchanged between local and remote devices is tagged packets with the management VLAN ID. Configuring NAT NAT is used to convert the private management IP address of the remote device to the public IP address. Through zero-configuration, the remote device obtains a private IP address from the local device. NAT can be used to translate the private IP address into the public IP address of the management network and distinguish different remote devices in a form of public IP Raisecom Proprietary and Confidential 36 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration address+global interface ID. Network management information transmitted between remote devices and the NView NNM system is forwarded through the public IP address. Therefore, you should configure the public IP address and related management VLAN of the local device. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#access- Create an ACL and enter ACL configuration mode. list acl-number 3 Raisecom(config-acl-ip- Configure an ACL filtering rule. ext)#rule [ rule-id ] permit ip source-ip- Sent the packet, whose source IP address complies with the ACL address source-ip-mask any filtering rule, to the CPU. 4 Raisecom(config-acl-ip- Exit ACL configuration mode. ext)#exit 5 Raisecom(config)#interface Enter VLAN interface configuration mode. vlan vlan-id The interface is used to connect the public network. 6 Raisecom(config-vlanif)#ip Configure the IP address of the public network, which is used to address ip-address ip-mask communicate with the NView NNM system. 7 Raisecom(config- Configure NAT. vlanif)#nat outbound acl- number The ACL ID is identical to the one created at step 2. (Optional) releasing IP address When changing a remote device, which has applied for a management IP address, to prevent the IP address from being occupied for a long time, you should manually release the IP address at the local server. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ip Release the specified IP address. dhcp address ip- address release This command is used to release the lease table and NAT table of the local device only without influencing the IP address of the remote device. (Optional) configuring lease file management The RAX711-C supports saving and synchronizing the lease file automatically, as well as deleting the lease file. When changing the local zero-configuration server, you can upload assigned IP addresses in a form of lease to the TFTP/FTP/SFTP server (such as a PC) for backup. After changing the local device, you can download the backup lease file to the local device to confirm that these assigned IP addresses are not lost. Raisecom Proprietary and Confidential 37 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ip dhcp lease save Save the lease file. 3 Raisecom(config)#ip dhcp lease erase (Optional) delete the lease file from the DHCP server. 4 Raisecom(config)#exit Exit global configuration mode. 5 Raisecom#upload dhcpLease { { ftp | sftp } Upload the lease file to the PC through ip-address username password filename | TFTP/FTP/SFTP. tftp ip-address } filename 6 Raisecom#download dhcpLease { { ftp | Download the lease file from the PC sftp } ip-address username password through TFTP/FTP/SFTP. filename | tftp ip-address } filename 3.2.4 Checking configurations No. Command Description 1 Raisecom(config)#show ip dhcp Show configurations of interfaces of the DHCP server. server 2 Raisecom(config)#show ip dhcp Show assigned IP addresses and information about server lease remote devices. 3 Raisecom(config)#show ip server Show configurations of the DHCP or OAM address pool. pool [ pool-name ] 4 Raisecom(config)#show ip dhcp Show statistics on the DHCP server. server statistics 5 Raisecom(config)#show ip dhcp Show static binding information about IP addresses in the static-bind address pool and the MAC address. 6 Raisecom(config)#show oam zero Show configurations of directly-connected zero- config configurations. 7 Raisecom(config)#show remote Show configurations of remote devices in directly- config-info all connected zero-configuration server mode. 3.3 Configuring remote zero-configuration 3.3.1 Preparing for configurations Scenario The remote devices are scattered at the user side of the network, so configuring them takes a lot of time and efforts. Remote zero-configuration supports applying for NMS parameters, such as the management IP address, management VLAN, and default gateway, after the Raisecom Proprietary and Confidential 38 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration devices are powered on. Therefore, devices can be managed quickly. This improves the efficiency for configuring devices. In general, remote devices can automatically apply for IP addresses when they are properly connected to the local device and zero-configuration server of the local device is configured properly. To change parameters about remote zero-configuration, see this section. This section is applicable to the remote RAX711-C indirectly-connected to the zero- configuration server. Prerequisite  Both the local and remote devices are configured with zero-configuration mode.  No interface of the remote device is configured with the management VLAN.  The uplink interface is UP. 3.3.2 (Optional) configuring remote zero-configuration IP addresses obtained through zero-configuration are permanently valid without lease limit. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ip dhcp (Optional) configure the RAX711-C to work as the zero- client mode { zeroconfig | configuration remote device or common DHCP client. normal } By default, the RAX711-C works as the zero-configuration remote device. After the RAX711-C obtains NMS parameters and configurations are complete in remote zero-configuration mode, it cannot be changed to the common DHCP client in principle. 3 Raisecom(config)#interface Enter physical layer interface configuration mode. vlan vlan-id 4 Raisecom(config-vlanif)#ip Enable remote zero-configuration, meanwhile, you can specify the address dhcp [ server-ip IP address of the local DHCP server. If you specify the IP address ip-address ] of the DHCP server, the remote device receives IP addresses assigned by the specified DHCP server. 5 Raisecom(config-vlanif)#ip Configure information about the DHCP client, including the host dhcp client { class-id name, class ID, and client ID. The information is added to the class-id | client-id DHCP packet sent by the DHCP client. client-id | hostname host- name }  If the remote device has obtained an IP address through DHCP, it is believed that the remote device has obtained an IP address successfully regardless of whether the default gateway is configured successfully or not. Raisecom Proprietary and Confidential 39 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration  IP addresses, which are obtained in extended OAM mode, can be overridden by the manually-configured ones on the same VLAN interface.  IP addresses, which are obtained in DHCP mode, can be overridden by the manually-configured ones on the same VLAN interface.  You can configure the IP address manually based on VLAN interface. 3.3.3 (Optional) configuring zero-configuration polling Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ip dhcp Configure the zero-configuration polling period. Its unit is hour. client zeroconfig polling period hour By default, it is 2 hours. 3.3.4 Checking configurations No. Command Description 1 Raisecom(config)#show ip dhcp client Show configurations and automatically-obtained information about the DHCP client. 3.4 Configuration examples 3.4.1 Example for configuring DHCP-based zero-configuration Networking requirements As shown in Figure 3-4, the RAX711-C works as the local zero-configuration server and is enabled with DHCP Server. The RAX711-L is enabled with remote zero-configuration. The RAX711-C assigns the IP address, default gateway, and management VLAN to the RAX711- L through the VLAN interface (the IP address is 173.31.1.150, and the associated management VLAN is VLAN 10) of the RAX711-C. The route between the RAX711-C and the NView NNM system is reachable. The IP address and management VLAN of Client interface 1 are configured to 173.31.1.150 and VLAN 10 respectively. Configure the following items on the RAX711-C:  Address pool name: pool1  IP address range: 172.31.1.100/16-172.31.1.149/16  Default gateway of the address pool: 172.31.1.150/16  Private IP address and VLAN interface of the device: 172.31.1.150/16 and VLAN 10  Public IP address and VLAN interface of the device: 128.10.10.10/16 and VLAN 100 Raisecom Proprietary and Confidential 40 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Configure local zero-configuration on the RAX711-C to ensure that the RAX711-L can automatically obtain NMS parameters and can be managed. By default, the RAX711-L is enabled with Trap. Figure 3-4 Configuring indirectly-connected remote zero-configuration Configuration steps Configure local zero-configuration on the RAX711-C. Step 1 Configure DHCP Server. Raisecom#config Raisecom(config)#interface vlan 10 Raisecom(config-vlan10)#ip dhcp server Raisecom(config-vlan10)#ip address 172.31.1.150 255.255.0.0 Raisecom(config-vlan10)#exit Step 2 Create and configure the address pool. Raisecom(config)#ip dhcp server pool pool1 Raisecom(config-pool)#address 172.31.1.100 172.31.1.149 mask 16 Raisecom(config-pool)#gateway 172.31.1.150 Raisecom(config-pool)#lease expired infinite Raisecom(config-pool)#option 60 raisecom010 Raisecom(config-pool)#exit Step 3 Configure NAT. Raisecom Proprietary and Confidential 41 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Raisecom(config)#access-list 2001 Raisecom(config-acl-ipv4-advanced)#rule 10 permit ip 172.31.0.0 255.255.0.0 any Raisecom(config-acl-ipv4-advanced)#exit Raisecom(config)#interface vlan 100 Raisecom(config-vlan100)#ip address 128.10.10.10 255.255.0.0 Raisecom(config-vlan100)#nat outbound 2001 Checking results Use the show ip dhcp server command to show configurations of DHCP Server on the RAX711-C. Raisecom(config)#show ip dhcp server Interface Status ------------------------------------ vlan10 Enable Use the show ip server pool command to show address pool configurations of the DHCP server on the RAX711-C. Raisecom(config)#show ip server pool Pool Name: : pool1 pool type : DHCP Address Range : 172.31.1.1~172.31.1.149 Address Mask : 255.255.0.0 Gateway : 172.31.1.150 DNS Server: : 0.0.0.0 Secondary DNS : 0.0.0.0 Tftp Server : 0.0.0.0 Lease time : infinite Trap Server: : 0.0.0.0 option60 : raisecom010 3.4.2 Example for configuring zero-configuration based on extended OAM Networking requirements As shown in Figure 3-5, as the local zero-configuration server, the RAX711-C is enabled with OAM active functions. The RAX711-C is connected to the PTN through Client interface 1 and then accesses the NView NNM system. The RAX711-L is connected to the RAX711-C through Client interface 2. The RAX711-L is enabled with OAM passive functions and is connected upstream to the RAX711-C through Line interface 1. Configure the following items on the RAX711-C: Raisecom Proprietary and Confidential 42 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration  Management VLAN of the device: VLAN 20  Address pool name: pool2  IP address range: 172.31.8.1/16-172.31.8.149/16  Default gateway of the address pool: 172.31.8.1  Private IP address and VLAN interface of the device: 172.31.8.1 and VLAN 20  Public IP address and VLAN interface of the device: 128.10.10.10 and VLAN 100  IP address of NAT public network: 128.10.10.10  Interface mode and allowed VLAN of Client interface 2 on the RAX711-C: Trunk mode and VLAN 20 Configure local zero-configuration on the RAX711-C to ensure that the RAX711-L can automatically obtain NMS parameters and can be managed. By default, the RAX711-L is enabled with OAM and works in passive mode. Figure 3-5 Configuring directly-connected remote zero-configuration Configuration steps Step 1 Configure the management VLAN, and activate it. Raisecom(config)#create vlan 1-4094 active Raisecom(config)#oam mng-vlan 20 Step 2 Enable OAM on Client interface 2 on the RAX711-C and configure the RAX711-C to work in active mode. Raisecom(config)#interface client 2 Raisecom(config-port)#oam enable Raisecom(config-port)#oam active Raisecom(config-port)#exit Raisecom Proprietary and Confidential 43 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 3 Zero-configuration Step 3 Configure the address pool. Raisecom(config)#ip oam server pool pool2 Raisecom(config-pool)#address 172.31.8.1 172.31.8.149 mask 255.255.0.0 Raisecom(config-pool)#gateway 172.31.8.1 Raisecom(config-pool)#exit Raisecom(config)#interface vlan 20 Raisecom(config-vlan20)#ip address 172.31.8.1 255.255.0.0 Raisecom(config-vlan20)#exit Step 4 Configure NAT. Raisecom(config)#access-list 2002 Raisecom(config-acl-ipv4-advanced)#rule 20 permit ip 172.31.8.0 255.255.0.0 any Raisecom(config-acl-ipv4-advanced)#exit Raisecom(config)#interface vlan 100 Raisecom(config-vlan10)#ip address 128.10.10.10 255.255.0.0 Raisecom(config-vlan10)#nat outbound 2002 Raisecom(config-vlan10)#exit Checking results Use the show remote config-info all command to show assigned IP addresses on the RAX711-C. Raisecom(config)#show remote config-info all Local port:client1 Local port:client2 MAC Address: 000e.5e01.0001 IP Address/mask: 172.31.8.2/255.255.0.0 IP Interface Vlan: 20 IP Default-gateway: N/A Local port:client3 Local port:client4 Local port:client5 Local port:client6 Local port:client7 Local port:client8 Local port:client9 Local port:client10 Local port:client11 Local port:client12 Local port:line1 Local port:line2 Local port:line3 Local port:line4 Raisecom Proprietary and Confidential 44 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing 4 IP routing This chapter describes principles and configuration procedures of IP routing, and provides related configuration examples, including the following sections:  Introduction  Configuring route management  Configuring static route  Configuring routing policy  Configuring ARP  Configuring DHCPv4 Client  Configuring DHCPv4 Server  Maintenance  Configuration examples 4.1 Introduction 4.1.1 Routing Routing refers to transmitting information from the source to the destination network. A route works by selecting the route in turn to transmit information to the destination network. The router selects a route according to the routing table of the local system. Selecting an optimal route is the key for optimizing the router or routing protocol. A routing table contains the following types of routes: the static route, default route, and dynamic route. 4.1.2 Static route The static route provides the following usage:  In the small-scale network, the administrator adds the static route to the routing table. Generally, the static route is pre-configured during installing the device.  A static route can reach either the edge of the network or the external network from the edge of the network.  A static route can be used as the default route. If the route entry meeting requirements cannot be discovered from the routing table in the network, the device uses the default route. Raisecom Proprietary and Confidential 45 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing The static route has the following advantages:  Occupying less CPU processing time  Convenient for the administrator to know route  Simple configuration However, its disadvantage is that you need to consider the entire network situation when configuring it. When the network structure changes, you need to manually configure it. Therefore, when the network is expanded, you need more time to configure and maintain the static route. Besides, making mistakes is easy in configuring the static route. The default route, a special static route, is used when the matched route cannot be discovered in the routing table. 4.1.3 ARP Address Resolution Protocol (ARP) is used to resolve IP addresses of the network layer into hardware addresses of data link layer. On the TCP/IP network, each host is assigned with an IP address, which is called a logical address used to identify the host in the network. To transmit packets through physical links, you must learn the physical address of the destination host. This needs to establish a mapping between the IP address and the physical address. A physical address on the Ethernet is a 48-bit MAC address. To transmit packets to the destination host, a protocol must resolve the IP address of the host into a 48-bit MAC address, which is the ARP. It not only resolves IP addresses into MAC addresses, but also establishes mappings between them. 4.1.4 DHCP With continuous extension of network scale and improvement of network complexity, the number of PCs always exceeds the one of available IP addresses. In addition, with wide application of laptops and wireless network, positions of PCs are changed frequently. Therefore, IP addresses must be updated frequently, which may lead to more complex network configurations. Dynamic Host Configuration Protocol (DHCP) is developed to solve these problems. DHCP works in client/server mode. A client sends an IP address configuration request to the server and the server returns IP address configurations to the client to dynamically configure the IP address. Generally, there is one DHCP server and multiple clients (PCs/Laptops) in the typical DHCP application, as shown in Figure 4-1. Raisecom Proprietary and Confidential 46 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Figure 4-1 Typical DHCP application The RAX711-C supports DHCPv4, which is related to IPv4. DHCP packets DHCP packets are grouped into 8 types. The DHCP server and DHCP clients communicate with each other through these 8 packets.  DHCP DISCOVER: the first packet for DHCP clients performing the DHCP process when they access the network initially. It is used to discover the DHCP server.  DHCP OFFER: the packet used by the DHCP server to respond the DHCP DISCOVER packet. This packet carries various configurations.  DHCP REQUEST: this packet is used for these purposes: – After clients are initiated, they send the broadcast DHCP REQUEST packet to reply the DHCP OFFER packet sent by the DHCP server. – After clients are rebooted, they send the broadcast DHCP REQUEST packet to confirm the previously-assigned IP addresses. – After a client is bound to an IP address, it sends the unicast DHCP REQUEST packet to extend the IP address lease time.  DHCP ACK: a packet used by the DHCP server to acknowledge the DHCP REQUEST packet sent by the client. The IP address and related configurations take effect after the client receiving the DHCP ACK packet.  DHCP NAK: a packet used by the DHCP server to refuse the DHCP REQUEST packet sent by the client. For example, the DHCP server will refuse the DHCP REQUEST packet when the lease time of the IP address assigned to the client expires, or when the client is moved to a new network.  DHCP DECLINE: the packet used by clients to inform the DHCP server when clients discover that assigned IP addresses conflicts. In addition, clients will re-apply to the DHCP server for IP addresses.  DHCP RELEASE: a packet used by the client to actively release the IP address assigned by the DHCP server. After receiving the packet, the SHCP server will assign the IP address to another client.  DHCP INFORM: a packet used by the client to get other configurations (such as the gateway address and DNS server address) from the DHCP server after the client gets an IP address from the DHCP server, Figure 4-2 shows the structure of the DHCP packet. Raisecom Proprietary and Confidential 47 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Figure 4-2 Structure of DHCP packet Table 4-1 describes fields of the DHCP packet. Table 4-1 Fields of DHCP packet Name Length (B) Description op 1 Packet type  1: request packet  2: response packet htype 1 Hardware address type of a DHCP client hlen 1 Hardware address length of a DHCP client hops 1 Number of DHCP relays that DHCP request packet pass The value is added by 1 once the DHCP request packet passes through a DHCP relay. xid 4 Transaction ID, a random number chosen by the DHCP client. It is used to identify an address request process. secs 2 Time elapsed since the DHCP client initiates a DHCP request. At present, it is not used and is configured to 0. flags 2 The first bit is a broadcast response identifier, which is used to identify that the DHCP server sends the response packet in the unicast/broadcast mode  0: unicast  1: broadcast Other bits are configured to 0. ciaddr 4 IP address of the DHCP client, which is padded when the DHCP client is being bound, updated, or rebounded. In addition, this IP address can be used to respond the ARP request. yiaddr 4 IP address of the DHCP client allocated by the DHCP server siaddr 4 IP address of the DHCP server Raisecom Proprietary and Confidential 48 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Name Length (B) Description giaddr 4 IP address of the first DHCP relay where the DHCP request packet pass chaddr 16 Hardware address of the DHCP client sname 64 Name of the DHCP server file 128 Startup configuration file name and route information about the DHCP client specified by the DHCP server options Variable Optional variable length fields, including the packet type, length valid lease, IP address of the Domain Name System (DNS) server, and IP address of the Windows Internet Name Server (WINs) DHCP Option DHCP uses Option fields of the packet to transmit control information and network configuration parameters for dynamically assigning IP addresses and providing richer network configurations for clients. There are 255 Option fields defined by DHCP, where the end Option filed is 255. Table 4-2 lists some common DHCP Option fields. Table 4-2 Fields of DHCP Option Code Description 3 Router option, used to specify the gateway address of DHCP clients 6 DNS server option, used to specify the DNS server address assigned for DHCP clients 18 IPv6-based DHCP client identifier option, used to specify interface information about DHCP clients 51 IP address lease option 53 DHCP packet type option, used to identify the DHCP packet type 55 Request parameter list option, used for DHCP clients to specify network configuration parameters to be received from the DHCP server. The contents of the option are values of parameters requested by DHCP clients. 61 DHCP client identifier option, used to specify device information about DHCP clients 66 TFTP server name option, used to specify the domain name of TFTP server assigned to DHCP clients 67 Startup file name option, used to specify the startup file name assigned to DHCP clients 82 DHCP client identifier option. It can be customized and is mainly used to identify positions of DHCP clients. Raisecom Proprietary and Confidential 49 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Code Description 150 TFTP server address option, used to specify the address of TFTP server assigned to DHCP clients 184 DHCP reserved option. At present, Option184 is mainly used to carry information required for voice call. With Option184, the DHCP server can assign IP address to DHCP clients that support the voice feature. In addition, the DHCP server can provide information related to voice call. 255 End option DHCP Option fields 18, 61, and 82 represents relay information in the DHCP packet. When DHCP clients send the request packet to the DHCP server, DHCP relay/DHCP Snooping will add Option fields to the request packet, if the packet needs to pass through the DHCP relay/DHCP Snooping. DHCP Option fields 18, 61, and 82 can be used to record DHCP client information on the DHCP server. Together with other software, DHCP Option fields 18, 61, and 82 can control and account IP address assignment. For example, cooperating with IP Source Guard, DHCP Option fields 18, 61, and 82 can resist effectively fraud of IP address+MAC address. The Option82 field contains up to 255 sub-options. If the Option82 field is defined, at least one sub-options needs to be defined. At present, the RAX711-C supports 2 sub-options: Sub- Option 1 (Circuit ID) and Sub-Option 2 (Remote ID).  Sub-Option 1: the VLAN ID and interface ID of the interface that receives the DHCP request packet  Sub-Option 2: MAC address (DHCP relay) of interface that receives the DHCP request packet or the bridge MAC address (DHCP Snooping) of the device DHCP Client The RAX711-C can be taken as a DHCP client to get an IP address from the DHCP server for the DHCP server managing the device. DHCP Server In the following scenarios, you need to use the DHCP server to assign IP addresses:  In a large network scale, it is a heavy workload to manually configure IP addresses. In addition, it is difficult to perform centralized management on the whole network.  When the number of hosts in the network exceeds the one of IP addresses supported by the network, you cannot assign a fixed IP address for each host. For example, the IPS limits the number of users accessing the network. Therefore, a great number of users need to get their IP address dynamically.  In a network, only a few hosts need fixed IP addresses and most hosts do not need fixed IP addresses. The RAX711-C supports acting as the DHCP server. For occupation time of IP addresses, hosts have different requirements. Servers may use a fixed IP address for a long time. Some hosts may use a dynamically-assigned IP address for a long time. Some PCs may need an IP address assigned temporarily. Raisecom Proprietary and Confidential 50 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing For these different requirements, the DHCP server provides 3 IP address assignment policies:  Assign IP addresses manually: the network administrator assigns fixed IP addresses for a few specified hosts (such as WWW server). The MAC address of the client is bound to an IP address. When the client applies for an IP address, the DHCP server finds the fixed IP address based on the MAC address of the client and then assigns the IP address to the client.  Assign IP addresses automatically: assign fixed IP addresses for some hosts that access the network initially. These IP addresses are used by hosts for a long time. Assign IP addresses dynamically: assign an IP address to a client in a "lease" form. After the lease time expires, the client needs to re-apply for an IP address. Most clients obtain a dynamically-assigned IP address. 4.2 Configuring route management 4.2.1 Preparing for configurations Scenario Dynamic routing protocols require the Router ID. If no Router ID is specified when these dynamic routing protocols are enabled, the Router ID of routing management will be used. The RAX711-C has the capability to establish and refresh the routing table. In addition, it can forward data packets based on the routing table. By viewing the routing table, you can learn network topology structure and locate faults. Prerequisite N/A 4.2.2 Configuring routing management Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#router id router-id Configure the router ID. 4.2.3 Checking configurations No. Command Description 1 Raisecom#show router id Show the Router ID. 2 Raisecom#show ip route [ protocol { static | Show the routing table. connected | rip } ] [ detail ] 3 Raisecom#show ip route ip-address [ mask- Show the route to the destination address ] [ longer-prefixes ] [ detail ] address. Raisecom Proprietary and Confidential 51 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing No. Command Description 4 Raisecom#show ip route ip-address1 [ mask- Show the route between 2 IP address1 ] ip-address2 [ mask-address2 ] addresses. [ detail ] 5 Raisecom#show ip route summary Show route summary. 4.3 Configuring static route 4.3.1 Preparing for configurations Scenario The static route has the following advantages:  Consume less time for the CPU to process them.  Facilitate the administrator to learn the route.  Be configured easily. However, when configuring the static route, you need to consider the whole network. If the network structure is changed, you need to modify the routing table manually. Once the network scale is enlarged, it will consume lots of time to configure and maintain the network. In addition, it may cause more errors. The default route is a specific static route. It will be used when no matched route is found in the routing table. Prerequisite N/A 4.3.2 Configuring static route Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ip route { ip-address mask- Configure the static route. address | ip-address/mask } next-hop [ distance distance ] [ description string ] [ tag tag ] 3 Raisecom(config)#ip route static distance (Optional) configure the default distance administrative distance of the static route. By default, it is 1. Raisecom Proprietary and Confidential 52 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing 4.4 Configuring routing policy 4.4.1 Configuring IP prefix-list Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ip prefix-list prefix- Create an IP prefix-list. name [ seq seq-number ] { deny | permit } any If no prefix-list ID (seq-number) is configured, Raisecom(config)#ip prefix-list prefix- the system will generate a prefix-list ID name [ seq seq-number ] { deny | automatically. The generated pre-fix list ID has permit } ip-address/mask [ ge min- 5 digits. length ] [ le max-length ] 3 Raisecom(config)#ip prefix-list prefix- Configure descriptions of the IP prefix-list. name description string If the length of descriptions exceeds 80 characters, the first 80 characters are available.  If one record is in permit type, all mismatched routes are in deny type by default. Only matched routes can pass filtering of the IP prefix-list.  If one record is in deny type, all mismatched routes are in deny type by default. Even matched routes cannot pass filtering of the IP prefix-list. Therefore, you need to add a permit record after multiple deny records to allow other routes to pass.  If there are multiple records in the IP prefix-list, there must be a record in permit type. 4.4.2 Configuring route mapping table Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#route-map Create the route mapping table and enter route mapping map-name { permit | deny } configuration mode. number 3 Raisecom(config-route- (Optional) configure descriptions of the route mapping table. map)#description string If there is any space in descriptions, descriptions should be within quotes. 4 Raisecom(config-route-map)#on- (Optional) configure the on-match sub-clause to continuing match next to match at the next node. By default, the process is finished after matching. 5 Raisecom(config-route-map)#on- (Optional) configure the on-match sub-clause to continuing match goto number to match at some node. By default, the process is finished after matching. Raisecom Proprietary and Confidential 53 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Step Command Description 6 Raisecom(config-route- (Optional) continue to match routes by scheduling other map)#call map-name routing table after matching the route. By default, the process is finished after matching. 7 Raisecom(config-route- (Optional) configure the match sub-clause to matching the map)#match ip next-hop acl- next hop based on the extended IP ACL. number 8 Raisecom(config-route- (Optional) configure the match sub-clause to matching the map)#match ip next-hop prefix- next hop based on the IP prefix-list. list prefix-name 9 Raisecom(config-route- (Optional) configure the match sub-clause to matching the IP map)#match ip address acl- address based on the extended IP ACL. number 10 Raisecom(config-route- (Optional) configure the match sub-clause to matching the IP map)#match ip address prefix- address based on the IP prefix-list. list prefix-name 11 Raisecom(config-route- (Optional) configure the match sub-clause to matching the map)#match interface name interface name. 12 Raisecom(config-route- (Optional) configure the match sub-clause to the matching map)#match metric metric rule that is based on the route metric value. 13 Raisecom(config-route- (Optional) configure the match sub-clause to the matching map)#match tag tag rule that is based on the Tag field of the route tagging. 14 Raisecom(config-route-map)#set (Optional) configure the set sub-clause to modifying the metric [ + | - ] metric route metric value after matching. 15 Raisecom(config-route-map)#set (Optional) configure the set sub-clause to modifying the metric-type { type-1 | type- route metric type after matching. 2 } 16 Raisecom(config-route-map)#set (Optional) configure the set sub-clause to modifying the src ip-address source IP address after matching. 17 Raisecom(config-route-map)#set (Optional) configure the set sub-clause to modifying the ip next-hop ip-address next-hop IP address of the route after matching. 18 Raisecom(config-route-map)#set (Optional) configure the set sub-clause to modifying the tag tag routing information tag after matching. 4.5 Configuring ARP 4.5.1 Preparing for configurations Scenario ARP is a protocol used to resolve IP addresses into Ethernet MAC addresses (physical addresses). Raisecom Proprietary and Confidential 54 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Prerequisite Configure the IP address of the interface. 4.5.2 .Configuring ARP Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#arp mode Configure ARP mode. { learn-all | learn-reply- only } By default, learn MAC addresses of all hosts. 3 Raisecom(config)#arp aging- (Optional) configure the aging time of dynamic ARP entries. time time By default, the aging time is configured to 1200s. 4 Raisecom(config)#arp ip- (Optional) configure the static ARP entry. address mac-address 5 Raisecom(config)#interface Enter interface configuration mode. interface-type interface- number 6 Raisecom(config-port)#arp Enable dynamic ARP learning on the interface. learning enable By default, dynamic ARP learning is enabled on the interface. 7 Raisecom(config-port)#arp max- Configure the maximum number of dynamically-learned learning-num number ARP entries. 4.5.3 Checking configurations No. Command Description 1 Raisecom#show arp [ ip-address | [ local-proxy ] Show ARP information. interface vlan vlan-id | static ] 4.6 Configuring DHCPv4 Client 4.6.1 Preparing for configurations Scenario When working as the DHCPv4 client, the RAX711-C can obtain an IP address from the DHCPv4 server. You can use the IP address to manage the RAX711-C. When IP addresses are assigned in a dynamic mode, the IP address assigned to the DHCPv4 client has a lease period. When the lease period expires, the DHCPv4 server will withdraw the IP address. If the DHCPv4 client wishes to continue to use the IP address, it needs to renew the IP address. If the lease period does not expire and the DHCPv4 client does not need to use the IP address, it can release the IP address. Raisecom Proprietary and Confidential 55 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing The RAX711-C supports configuring DHCP Client on the VLAN interface only. Prerequisite The RAX711-C is not enabled with DHCPv4 Server and works in common DHCP Client mode. 4.6.2 (Optional) configuring DHCPv4 Client Before enabling the DHCPv4 client on the VLAN interface to apply for the IP address, configure DHCPv4 client information. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface vlan Enter VLAN interface configuration mode. vlan-id 3 Raisecom(config-vlanif)#ip dhcp Configure DHCPv4 client information, including the client { class-id class-id | client- class ID, client ID, and host name. id client-id | hostname hostname } 4.6.3 Configuring DHCPv4 Client on VLAN interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface vlan Enter VLAN interface configuration mode. vlan-id 3 Raisecom(config-vlanif)#ip address Configure DHCPv4 Client and specify the IP address dhcp [ server-ip ip-address ] of the DHCPv4 server. It means enabling the DHCPv4 client to apply for the IP address. 4.6.4 (Optional) renewing/releasing IPv4 address Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface vlan Enter VLAN interface configuration mode. vlan-id 3 Raisecom(config-vlanif)#ip dhcp Renew the IPv4 address. client renew 4 Raisecom(config-port)#no ip address (Optional) release the IPv4 address. dhcp Raisecom Proprietary and Confidential 56 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing 4.6.5 Checking configurations No. Command Description 1 Raisecom#show ip dhcp client [ interface- Show configurations of DHCPv4 Client. type interface-number ] 4.7 Configuring DHCPv4 Server 4.7.1 Preparing for configurations Scenario When the RAX711-C works as the DHCPv4 server, the DHCPv4 client can obtain the IP address from the RAX711-C. Prerequisite The RAX711-C is not enabled with DHCPv4 Client. In addition, the DHCPv4 server works in common DHCPv4 server mode. 4.7.2 Creating and configuring IPv4 address pool Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ip dhcp server pool Create the IPv4 address pool and enter address pool-name pool configuration mode. 3 Raisecom(config-pool)#address start-ip- Configure the range of the IPv4 address pool. address end-ip-address mask { mask | mask-length } 4 Raisecom(config-pool)#lease expired Configure the lease period of the IPv4 address { minute | infinite } pool. 5 Raisecom(config-pool)#dns-server ip- Configure the DNS server of the IPv4 address address [ secondary ] pool. 6 Raisecom(config-pool)#gateway ip-address Configure the default gateway of the IPv4 address pool. 7 Raisecom(config-pool)#option 60 vendor- Configure information carried by Option 60. string 8 Raisecom(config-pool)#tftp-server ip- Configure the TFTP server of the IPv4 address address pool. 9 Raisecom(config-pool)#trap server-ip ip- Configure the Trap server of the IPv4 address address pool. Raisecom Proprietary and Confidential 57 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing 4.7.3 Configuring DHCPv4 Server of the interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface vlan vlan-id Enter interface configuration mode. 3 Raisecom(config-vlanif)#ip dhcp server Enable DHCPv4 Server. 4.7.4 Checking configurations No. Command Description 1 Raisecom#show ip dhcp server Show DHCP server configurations. 2 Raisecom#show ip dhcp server Show assigned IPv4 addresses and client information. lease 3 Raisecom#show ip dhcp server Show packet statistics on the DHCPv4 server. statistics 4 Raisecom#show ip dhcp static- Show DHCPv4 static lease information. bind 4.8 Maintenance Command Description Raisecom#show arp [ ip-address | [ local-proxy ] Show ARP information. interface vlan vlan-id | static ] 4.9 Configuration examples 4.9.1 Example for configuring DHCPv4 Client Networking requirements As shown inFigure 4-3, the RAX711-C works as the DHCPv4 client with the host name being set to raisecom. The RAX711-C accesses to the DHCPv4 server and the NView NNM system through the service interface. The DHCPv4 server assigns an IP address to the RAX711-C. Therefore, the NView NNM system can discover and manage the RAX711-C. Raisecom Proprietary and Confidential 58 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Figure 4-3 Configuring DHCPv4 relay Configuration steps Step 1 Configure DHCPv4 relay. Raisecom#config Raisecom(config)#interface vlan 1 Raisecom(config-vlan1)#ip dhcp client hostname raisecom Step 2 Apply for an IP address through the DHCP mode. Raisecom(config-vlan1)#ip address dhcp server-ip 192.168.1.1 Checking configurations Use the show ip dhcp client command to show DHCPv4 relay configurations. Raisecom#show ip dhcp client dhcp client mode: zeroconfig Hostname: raisecom Class-ID: Raisecom-RITP_5.1.2 Client-ID: Raisecom-000e5e454545-IF0 DHCP Client is requesting for a lease. Assigned IP Addr: 0.0.0.0 Subnet mask: 0.0.0.0 Default Gateway: -- Client lease Starts: Jan-01-1970 08:00:00 Client lease Ends: Jan-01-1970 08:00:00 Client lease duration: 0(sec) DHCP Server: 0.0.0.0 Tftp server name: -- Raisecom Proprietary and Confidential 59 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Tftp server IP Addr: -- Startup_config filename: -- NTP server IP Addr: -- Root path: -- 4.9.2 Example for configuring DHCPv4 Server Networking requirements As shown inFigure 4-4, the RAX711-C works as the DHCPv4 server for assigning IP address to DHCPv4 clients. Parameters are configured as below:  Lease time: 8 hours  Name of IP address pool: pool1  IP address range: 172.31.1.2–172.31.1.100  IP address of the DNS server: 172.31.100.1 Figure 4-4 Configuring DHCPv4 server Configuration steps Step 1 Create and configure the IP address pool. Raisecom#config Raisecom(config)#ip dhcp server pool pool1 Raisecom(config-pool)#address 172.31.1.2 172.31.1.100 mask 24 Raisecom(config-pool)#lease expired 4320 Raisecom(config-pool)#dns-server 172.31.100.1 Raisecom(config-pool)#exit Step 2 Configure DHCP Server on the interface. Raisecom Proprietary and Confidential 60 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Raisecom(config)#interface client 1 Raisecom(config-client1)#ip dhcp server Checking configurations Use the show ip dhcp server command to show configurations of DHCPv4 Server. Raisecom#show ip dhcp server Interface Status ------------------------------ client1 Enable Use the show ip server pool command to show IP address pool configurations of the DHCPv4 server. Raisecom#show ip server pool Pool name Pool type ---------------------------------------- Pool1 dhcp Pools count: 1 4.9.3 Example for configuring ARP Networking requirements As shown inFigure 4-5, the RAX711-C is connected to hosts. In addition, it connects to the Router through Client interface 1. The IP address and MAC address of the Router are configured to 192.168.27.1/24 and 000e.5e12.1234 respectively. Configure the aging time of dynamic ARP entries to 600s. To enhance security of communication between the RAX711-C and the Router, you need to configure static ARP entries on the RAX711-C. Raisecom Proprietary and Confidential 61 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A)Configuration Guide 4 IP routing Figure 4-5 Configuring ARP Configuration steps Step 1 Add a static ARP entry. Raisecom(config)#arp 192.168.27.1 000e.5e12.1234 Step 2 Configure the aging time of dynamic ARP entries to 600s. Raisecom(config)#arp aging-time 600 Checking results Use the show arp command to show information about all ARP entries in the ARP table. Raisecom#show arp ARP aging-time: 600 seconds(default: 1200s) ARP mode: Learn all ARP table: Total: 4 Static: 1 Dynamic: 3 IP Address Mac Address Interface Vlan Type Age(s) status ----------------------------------------------- 172.16.70.1 000E.5E12.1234 vlan1 1 static -- PERMANENT 172.16.70.9 14FE.B5EE.F22C vlan1 1 dynamic 135 REACHABLE 172.16.70.15 D4BE.D9E4.F8EE vlan1 1 dynamic 292 REACHABLE 172.16.70.16 000C.29C6.03AD vlan1 1 dynamic 412 REACHABLE Raisecom Proprietary and Confidential 62 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet 5 Ethernet This chapter describes principles and configuration procedures of Ethernet, and provides related configuration examples, including the following sections:  Introduction  Configuring MAC address table  Configuring VLAN  Configuring super VLAN  Configuring selective QinQ  Configuring VLAN mapping  Configuring loop detection  Configuring interface protection  Configuring port mirroring  Configuring storm control  Configuring L2CP  Maintenance  Configuration examples 5.1 Introduction 5.1.1 MAC address table MAC address entries Layer 2 devices forward Ethernet packets through MAC address forwarding rules. Each device has a forwarding table, the MAC address table, where a MAC address is corresponding to one interface. The MAC address table is a Layer 2 forwarding table including relation between the MAC address and forwarding interface. All packets in the ingress direction of the interface are forwarded according to MAC address table. It is the basis for Ethernet devices to forward Layer 2 packets quickly. MAC address entries include the following information:  The source MAC address Raisecom Proprietary and Confidential 63 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet  Interface ID corresponding to the source MAC address  VLAN ID of the interface  The type of MAC address Classification of MAC address table MAC address entries include static MAC address entries and dynamic MAC address entries.  Static MAC address entries: called permanent address, can be added/deleted manually and is not aged. For a network with relatively fixed devices, you can reduce the broadcast traffic by adding static MAC address entries manually to improve interface security. The static MAC address table is reserved after the device is reset, hot swapping of the interface card, or interface card is reset.  Dynamic MAC address entries: the dynamic MAC address table is created by automatically learning the source MAC addresses of received packets. It can be aged based on the configured aging time. MAC address table is cached in the RAX711-C, and the capacity of MAC address table saved in the RAX711-C depends on the cache capacity. Generally, the dynamic MAC address table is not reserved after the device is reset, hot swapping of the interface card, or interface card is reset.  Blackhole MAC address entries: used to discard packets with the specified destination MAC address, manually configured, not aged MAC address aging time The MAC address aging mechanism is suitable for the dynamic MAC address entry only. The capacity of the MAC address on the RAX711-C is limited. To fully use resources of MAC address forwarding table, the RAX711-C updates MAC address table through the aging mechanism. And the system creates dynamic MAC address entry, at the same time, enables the aging timer. If the RAX711-C fails to receive packets from the dynamic MAC address entry once more within the aging time, the MAC address entry will be deleted. MAC address learning Most MAC address entries are created and maintained through MAC address learning. When a packet is sent to a device, the device will look up the MAC address table for the interface ID that is related to the destination MAC address of the packet. If successful, the device will forward the packets to the received interface. Meanwhile, the device will add the relevant source MAC address, interface ID, and VLAN ID to the MAC address table. When a packet is sent to the learned MAC address through other interfaces, the packet will be directly forwarded to the received interface according to the MAC address table. If the destination MAC address is not listed in the MAC address, the device floods the packets to all interfaces except for the interface that receives this packet. In addition, the source MAC address of the packet will be added to the MAC address table on the device. MAC address limit The RAX711-C obtains MAC address of each network device in the network segment connected with certain interface through MAC address learning. For these packets transmitted to the MAC address, the RAX711-C conducts hardware forwarding by directly looking up MAC address, thus improving forwarding rate of the chip. This feature is used to limit MAC address entries. If the MAC address table is over great, it may cost more time to search for a MAC address entry. Therefore, the forwarding Raisecom Proprietary and Confidential 64 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet performance of Ethernet switches will decrease. However, MAC address limit can troubleshoot this problem. MAC address limit is an effective method to manage the MAC address table. When MAC address entries learned by the interface or VLAN reach the configured maximum, the interface does not learn MAC address any more. Forwarding modes of MAC address When forwarding packets based on MAC address entries, the RAX711-C adopts following modes:  Unicast: when a MAC address entry, which is related to the destination MAC address of a packet, is listed in the MAC address table, the RAX711-C will directly forward the packet to the received interface through the egress interface of the MAC address entry. Otherwise, the RAX711-C broadcasts the packet, as shown in Figure 5-1. Figure 5-1 Unicast forwarding mode of MAC address  Multicast: when the destination address of packets received on the RAX711-C is a multicast MAC address, if a MAC address entry, which is related to the destination MAC address of a packet, is listed in the MAC address table, the RAX711-C will directly forward the packet to the received interface through the egress interface of the MAC address entry. Otherwise, the RAX711-C broadcasts the packet, as shown in Figure 5-2. Raisecom Proprietary and Confidential 65 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Figure 5-2 Multicast forwarding mode of MAC address  Broadcast: if the destination address of packets received on the RAX711-C is all F's, or a MAC address entry, which is related to the destination MAC address of a packet, is listed in the MAC address table, the RAX711-C will forward the packet to all interfaces, except the receiving interface, through broadcast forwarding mode of MAC address, as shown in Figure 5-3. Figure 5-3 Broadcast forwarding mode of MAC address 5.1.2 VLAN Introduction By maintaining MAC address table, the Layer 2 switch forwards packets according to MAC address table. This effectively uses network bandwidth and improves network performance. The Layer 2 switch can effectively isolate collision domains but cannot effectively partition broadcast domains. If the number of PCs is over great, this will generates excessive broadcast traffic, thus causing network performance to decline sharply and even the network to crash. Raisecom Proprietary and Confidential 66 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet To ensure fast running of the network, broadcast domains must be partitioned to reduce broadcast traffic. Therefore, the VLAN technology is introduced. Virtual Local Area Network (VLAN) is a Layer 2 isolation technology that partitions devices in a LAN logically to different parts. These parts are independent and cannot communicate with each other. However, they can communicate through the router or Layer 3 switch. By partitioning VLANs, you can isolate broadcast domains and reduce broadcast storms. Figure 5-4 shows how to partition a VLAN. VLAN and LAN have the same features, but the difference is that devices in the same VLAN can communicate regardless of physical locations. Figure 5-4 VLAN partition As shown in Figure 5-4, Shanghai and Beijing belong to two LANs, but no services are transmitted between hosts belonging to the same LAN. When broadcast storm occurs, host in a same LAN will receive broadcast packets, causing occupancy and waste of bandwidth. By partitioning VLAN, the hosts which do not need to communicate are isolated, thus enhancing network security and reducing broadcast traffic and broadcast storm. Advantages Advantages of VLAN partition are as below:  Partitioning broadcast domains reduces broadcast storm. One VLAN is a logic subnet and a broadcast domain.  The network security is enhanced. Devices in a same VLAN can receive data frame each other, but cannot receive data frame sent from other devices in the different VLAN. Devices in different VLANs cannot communicate directly, but they can communicate through routers or Layer 3 devices.  Network management is simplified. Different from physical subnets partitioned by the router, PCs included in the VLAN can be in different locations. Any PC can be added to the same VLAN. Working principles After VLAN is partitioned, the RAX711-C will be virtually divided to multiple logic devices. MAC address learning and data switching of these devices are based on VLAN. Each VLAN is corresponding to an independent MAC address table. Raisecom Proprietary and Confidential 67 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet When receiving a data frame on the interface, the RAX711-C will check the VLAN of the interface, and then check the MAC address table related to the VLAN. If the destination address of the data frame is in the MAC address table, related to the VLAN, the RAX711-C will forward this data frame. Otherwise, it will discard this data frame. 802.1Q and VLAN Tag After VLAN is configured on the RAX711-C, to identify data frame of different VLANs, you need to add VLAN Tag, namely, the VLAN tag, to the data frame. This performance is implemented through 802.1Q. 802.1Q stipulates a new Ethernet frame field. Compared with standard Ethernet frame, VLAN packets add a four-byte 802.1Q tag to the source address. Figure 5-5 shows formats of the standard Ethernet frame and 802.1Q frame. Figure 5-5 Formats of the standard Ethernet frame and 802.1Q frame  Tag Protocol Identifier (TPID): it is a new frame type defined by the IEEE. It means the packet is added 802.1Q tag. Its identification value is 0x8100.  VLAN Identifier (VID): a 12-bit field specifying the VLAN to which the frame belongs. The value ranges from 1 to 4094. A Port VLAN ID (PVID) is a default VLAN ID. In an interface-based VLAN, each interface has a PVID. When an Untagged packet is sent to the interface, the RAX711-C will forward this packet according to the PVID Tag. VLANs supported by the RAX711-C meet the IEEE 802.1Q standard. The RAX711-C supports 4094 concurrent VLANs.  Canonical Format Indicator (CFI): It is used to distinguish the format of frames when the bus Ethernet and Fiber Distributed Digital Interface (FDDI)/Token Ring network exchange data.  Priority: a 3-bit field which indicates the frame priority level. Values are from 0 (best effort) to 7 (highest). The bigger the number is, the higher the priority is. When the network is congested, the device sends packets with higher priorities first. Interfaces modes and modes for processing packets The iTN28800 interface modes are divided into Access mode and Trunk mode. Table 5-1 lists comparison on interface modes and modes for processing packets. Raisecom Proprietary and Confidential 68 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Table 5-1 Interfaces modes and modes for processing packets Interface Processing modes for ingress packet Processing modes for egress type packet Untagged Tagged packet packet  If the VLAN ID of a  If the VLAN ID of a packet is Access Add the Access packet is identical to identical to the Access VLAN VLAN Tag the Access VLAN ID, ID, send the packet after to packets. receive the packet. without its Tag.  If the VLAN ID of a  If the VLAN ID of a packet is packet is in the Access in the Access egress-allowed egress-allowed list, list, send the untagged packet receive the packet. after removing its Tag. Otherwise, discard the Otherwise, discard the packet. packet.  If the VLAN ID of a  If the VLAN ID of a packet is Trunk Add the Native packet is in the Trunk in the Trunk allowed list, and VLAN Tag allowed list, receive not in the Trunk untagged list, to packets. the packet. Otherwise, send the packet without its discard the packet. original Tag.  If the configured  If the VLAN ID of a packet is Native VLAN is the in the Trunk untagged list, send default VLAN, the packet without its original received the packet. Tag. VLAN partition Generally, VLAN partition modes are as below:  Interface-based VLAN partition: it is the simplest and most effective partition mode. It defines VLAN members based on interface. After interfaces are assigned to the specified VLAN, they can forward packets of the specified VLAN.  Subnet-based VLAN partition: it is based on IP address of each host. When the host is relocated, you need not reconfigure VLAN. However, each device must check network address of each data packet, thus consuming time and reducing forwarding efficiency of chip.  MAC-based VLAN partition: it is suitable for configuring a VLAN for each host with MAC address. When the host is relocated, you need not reconfigure VLAN. When the number of hosts is tens of thousands, lots of configurations are needed, thus badly reducing the forwarding rate of data packets.  Protocol-based VLAN partition: it is based on protocol supported by each host. When the host is moved, you need not reconfigure VLAN and add frame tag to identify VLAN, which reduces network communication. However, each device must check the Ethernet frame header of each data packet, thus consuming much time and reducing forwarding efficiency of chip. The RAX711-C supports interface-based VLAN partition. 5.1.3 Super VLAN The traditional ISP network assigns each customer an IP subnet. In this case, three IP addresses are wasted because they cannot be used by hosts. They are the network ID, Raisecom Proprietary and Confidential 69 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet directional broadcasting address, and gateway of the subnet. If some unassigned IP addresses exist in the subnet of some customers, the network scalability becomes worse and IP addresses are wasted. Super VLAN involve the super VLAN and sub-VLAN as below:  Super VLAN: contain Layer 3 logic interfaces but physical interfaces. It is a set of multiple sub-VLANs.  Sub-VLAN: contain physical interfaces but Layer 3 logic interfaces, use the IP address of the Layer 3 logic interface of the super VLAN as the default gateway to communicate with the external Layer 3 switch through ARP proxy. Sub-VLANs are isolated from each other like common VLANs on the Layer 2. ARP proxy refers to the process that a source host in a subnet of a physical network sends the ARP request to the destination host of a subnet of another physical network and the gateway connected to the source host sends ARP Reply message through the MAC address of its interface in replacement of the destination host. As shown in Figure 5-6, a host in sub-VLAN 100 communicates with that in sub-VLAN 200. When super VLAN 10 is enabled with ARP proxy, its Layer 3 interface implements ARP learning, processing received and sent ARP packets, and ARP proxy. Figure 5-6 Sub-VLAN and super VLAN partition If host A in VLAN 100 wishes to communicate with host B in VLAN 200, it sends an ARP request packet with the destination IP address of 10.10.10.200 and MAC address of the broadcast address. The packet carries VLAN 100 Tag and is firstly received by the CPU. The switch configures the Rx interface to VLAN 10 according to mapping between the super VLAN and sub-VLAN so that ARP learning, processing received and sent ARP packets, and ARP proxy can be later implemented in VLAN 10. Raisecom Proprietary and Confidential 70 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Host B is not in the broadcast domain of VLAN 100, so it fails to receive the ARP request packet. After ARP proxy is enabled, the interface of VLAN 10 replies host A with its MAC address as the MAC address of host B when the ARP request packet sent from host A on Layer 2 reaches the switch. However, the ARP entry of host B does not exist on the switch, so the interface of super VLAN 10 send the ARP request packet to each sub-VLAN (excluding the VLAN sending the ARP request packet) to request the MAC address of host B. After host B replies, packets to be sent from host A to host B are sent to the switch which forward these packets normally on Layer 3. The process for host B to send host B the packet is similar as above. 5.1.4 QinQ QinQ (also called Stacked VLAN or Double VLAN) is a Layer 3 tunnel technology based on IEEE 802.1Q. It is defined in 802.1ad standard. Basic QinQ QinQ is a simple Layer 2 VPN tunnel technology. QinQ encapsulates an outer VLAN Tag for a private packet, so that the packet traverses the backbone network of the Internet service provider (ISP) carrying double VLAN tags. In the ISP, the packet is transmitted according to the outer VLAN Tag (public VLAN Tag). And the private VLAN Tag is transmitted as the data in the packet. Figure 5-7 Typical networking of basic QinQ Figure 5-7 shows the typical networking of basic QinQ. As the Provider Edge (PE), the uplink interfaces of the RAX711-C access the PE network, and the downlink interfaces access the user devices. When the packet is transmitted from user device to PE, the VLAN tag carried on the packets is VLAN 100. After traversing the PE, the packet is added outer tag, VLAN 200, and then enters the PE network through uplink interface of the PE. After the packet with outer tag, VLAN 200, is transmitted from the PE to the other PE, the other PE sends the packet to the user device after removing the outer tag, VLAN 200. At this time, the packet carries a VLAN Tag again, VLAN 100. Selective QinQ Selective QinQ is an enhanced application for basic QinQ. Based on some features, selective QinQ can perform traffic classification on users' data and encapsulate different data flows with different outer VLAN Tags. With selective QinQ, you can encapsulate different Tags for packets with different inner Tags based on the mapping rule. In addition to all functions realized by basic QinQ, selective QinQ can also perform different operations on packets received by the same interface based on different VLAN Tags. Selective QinQ can provide more flexible networking capabilities. With selective QinQ, devices can classify customer devices on the interface that is connected to the access layer, Raisecom Proprietary and Confidential 71 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet encapsulating different outer Tags for various customer devices. In addition, selective QinQ adopts the outer Tag to configure the QoS policy on the public network, flexibly configure the data transmission priority, and provide related services for users. 5.1.5 Loop detection Loop detection is used to eliminate impact on the network and improve network error- detection, error tolerance, and stability. Loop detection is applied to the edge interface. Loop detection based on interface works based on interface. When a loop is found on an interface, the RAX711-C will block the interface. After the automatical restoration time expires, the RAX711-C releases the interface. Loop detection works as below: Step 1 The interface periodically sends a Loopback-detection packet (interval is configurable. By default, it is 1s). Step 2 The RAX711-C checks whether the interface enabled with loop detection receives Loopback- detection packet. Step 3 If yes, and one of the following conditions is met, the RAX711-C will block the interface and send a Trap by default, or take different actions as configured.  The Loopback-detection packet is sent from the local device, and the ID of the interface sending the packet is smaller than the ID of the receiving interface.  The Loopback-detection packet is sent from other devices, and the MAC address of the local device is greater than the source MAC address of the packet. Step 4 After detecting a loop in configured non-shutdown mode, the RAX711-C automatically starts the automatic restoration and releases the block interface after the loop is eliminated. 5.1.6 Interface protection When you need to isolate Layer 2 data among different interfaces, you can add these interfaces to different VLANs. Sometimes when you need to isolate Layer 2 data among different interfaces in the same VLAN, you can apply interface protection. You can enable interface protection on interfaces that need to be controlled, thus isolating Layer 2 data among different interfaces like physical isolation. This enhances network security, and provide flexible networking scheme for users. After being configured with interface protection, interfaces cannot transmit packets to each other. However, they can still communicate with interfaces that are not enabled with interface protection. 5.1.7 Port mirroring Port mirroring refers to mirroring packets of the source ports to the monitor port without affecting packets forwarding. After port mirroring takes effect, packets in the ingress and egress directions of a port will be copied to the monitor port. The mirroring port and monitor port cannot be the same port. You can use this function to monitor the receiving and sending status of a port and analyze the network situation. Raisecom Proprietary and Confidential 72 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Figure 5-8 Principles of port mirroring PC 1 accesses the network through Client port 1 on the RAX711-C. PC 3 is the monitor PC and is connected to Client port 2 on the RAX711-C. To monitor packets sent by PC 1, you need to configure Client port 1 as the mirroring port and enable port mirroring for packets on the ingress port. Configure Client port 2 as the monitor port, namely, the mirroring destination port. When forwarding a packet sent by PC 1, the RAX711-C mirrors the packet to Client port 2. PC 3 connected to the monitor port receives and analyzes these mirrored packets. 5.1.8 Storm control The Layer 2 network is a broadcast domain. When an interface receives excessive broadcast, unknown multicast, and unknown unicast packets, broadcast storm occurs. If you do not control broadcast packets, broadcast storm may occur and occupies much network bandwidth. Broadcast storm can degrade network performance and impact forwarding of unicast packets or even lead to communication halt. Restricting broadcast flow generated from network on Layer 2 device can suppress broadcast storm and ensure common unicast forwarding normally. Occurrence of broadcast storm The following flows may cause broadcast flow:  Unknown unicast packets: unicast packets of which the destination MAC is not in the MAC address table, namely, the Destination Lookup Failure (DLF) packets. If these packets are excessive in a period, the system floods them and broadcast storm may occur.  Unknown multicast packets: multicast packets of which the destination MAC is not in the MAC address table. If these packets are excessive in a period, the system floods them and broadcast storm may occur.  Broadcast packets: packets of which the destination MAC is multicast. If these packets are excessive in a period, broadcast storm may occur. Raisecom Proprietary and Confidential 73 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Principles of storm control Storm control filters broadcast, unknown multicast, unknown unicast packets that may generate broadcast storm on the network. After storm control is enabled, the RAX711-C will automatically discard broadcast packets. If storm control is disabled or broadcast packets have not reached the preconfigured threshold, the RAX711-C will normally forward packets to other interfaces of the device. 5.1.9 L2CP Metro Ethernet Forum (MEF) introduces service concepts, such as EPL, EVPL, EP-LAN, and EVP-LAN. Different service types have different processing modes for Layer 2 Control Protocol (L2CP) packets. The RAX711-C supports the following L2CP packets:  CDP  802.1x  LACP  LLDP  802.3ah  PVST  STP  VTP MEF6.1 defines processing modes for L2CP as below.  Discard: discard the packet, by applying the configured L2CP profile on the ingress interface of the RAX711-C.  Peer: send packets to the CPU in the same way as the discard action.  Tunnel: transparently transmit packets. It is more complex than discard and peer mode, requiring cooperating profile at network side interface and carrier side interface tunnel terminal to allow packets to pass through the carrier network. 5.2 Configuring MAC address table 5.2.1 Preparing for configurations Scenario When configuring the MAC address table, you can configure static MAC addresses for fixed and important devices to prevent illegal users from accessing the network from other locations. To avoid saving excessive dynamic MAC addresses to the MAC address table and exhausting resources of the MAC address table, you need to configure the aging time of dynamic MAC addresses to ensure upgrading dynamic MAC addresses effectively. Raisecom Proprietary and Confidential 74 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Prerequisite N/A 5.2.2 Configuring static MAC address table Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mac-address Add a static unicast MAC address to the MAC address table. static unicast mac-address vlan vlan-id interface-type interface-number It must be a unicast MAC address. The local MAC address, multicast address, all-F, and all-0 MAC addresses cannot be configured as the static MAC address. 5.2.3 Configuring dynamic MAC address table Commands for steps 2 to 4 are used to configure dynamic MAC address limit in interface configuration mode. Commands for steps 5–9 are used to configure dynamic MAC address limit in VLAN configuration mode and VSI configuration mode respectively. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#mac-address Enable MAC address learning. learning enable By default, MAC address learning is enabled. 4 Raisecom(config-port)#mac-address (Optional) configure dynamic MAC address limit. threshold threshold-value [ action { discard | forward } ] By default, no dynamic MAC address limit is configured. 5 Raisecom(config)#vlan vlan-id Enter VLAN configuration mode. 6 Raisecom(config-vlan)#mac-address Enable MAC address learning. learning enable By default, MAC address learning is enabled. 7 Raisecom(config)#mac-address aging- (Optional) configure the aging time of MAC address. time second By default, the aging time is 300s. 8 Raisecom(config)#vlan vlan-id (Optional) enter VLAN configuration mode. 9 Raisecom(config-vlan)#mac-address (Optional) configure dynamic MAC address limit. threshold threshold-value By default, no dynamic MAC address limit is configured. Raisecom Proprietary and Confidential 75 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet 5.2.4 Configuring blackhole MAC address Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mac-address blackhole Create the blackhole MAC address. By default, mac-address vlan vlan-id no blackhole MAC address is configured. 5.2.5 Configuring suppression of MAC address flapping Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mac- Enable global suppression of MAC address flapping. address move-restrain enable By default, it is disabled. 3 Raisecom(config)#mac- Enable Trap sending for global suppression of MAC address address mac-move trap flapping. enable By default, it is enabled. 5.2.6 Checking configurations No. Command Description 1 Raisecom#show mac-address count [ vlan vlan-id ] Show the number of MAC [ interface-type interface-number ] addresses. 2 Raisecom#show mac-address { all | static | Show MAC addresses. dynamic } [ vlan vlan-id ] [ interface-type interface-number ] 3 Raisecom#show mac-address learning [ vlan | Show enabling information about interface-type interface-number ] the automatic learning of MAC address table. 4 Raisecom#show mac-address mac-move Show status of MAC address flapping. 5 Raisecom#show mac-address threshold [ interface- Show configurations of MAC type interface-number | vlan vlan-list ] address limit. 5.2.7 Maintenance No. Command Description 1 Raisecom(config)#clear mac-address { all | Clear MAC addresses of a blackhole | dynamic | static | mac-address } [ vlan specified type. vlan-id ] [ interface-type interface-number ] Raisecom Proprietary and Confidential 76 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet No. Command Description 2 Raisecom(config)#search mac-address mac-address Query a MAC address. { all | dynamic | static } [ interface-type interface-number ] [ vlan vlan-id ] 5.3 Configuring VLAN 5.3.1 Preparing for configurations Scenario The main function of VLAN is to partition logic network segments. There are 2 typical application modes:  Small LAN: on one Layer 2 device, the LAN is carved up to several VLANs. Hosts that connect to the device are carved up by VLANs. So hosts in the same VLAN can communicate, but hosts between different VLANs cannot communicate. For example, the financial department needs to be separated from other departments and they cannot access each other. In general, the port connected to the host is in Access mode.  Big LAN or enterprise network: multiple Layer 2 devices connect to multiple hosts and these devices are concatenated. Packets take VLAN Tag for forwarding. Ports of multiple devices, which have identical VLAN, can communicate, but hosts between different VLANs cannot communicate. This mode is used for enterprises that have many people and need a lot of hosts, and the people and hosts are in the same department but different positions. Hosts in one department can access each other, so you have to carve up VLAN on multiple devices. Layer-3 devices like a router are required if you want to communicate among different VLANs. The concatenated ports among devices are in Trunk mode. Prerequisite N/A 5.3.2 Configuring VLAN properties Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#create vlan vlan-list Create a VLAN. active By default, there is no VLAN and the interface is not added to any VLAN. 3 Raisecom(config)#vlan vlan-id Enter VLAN configuration mode. 4 Raisecom(config-vlan)#name vlan-name (Optional) configure the VLAN name. Raisecom(config-vlan)#exit 5 Raisecom(config)#interface interface- Enter physical layer interface configuration mode. type interface-number Raisecom Proprietary and Confidential 77 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Step Command Description 6 Raisecom(config-port)#switchport mode Configure the current interface to be an { access | trunk } Access/Trunk interface. By default, all interfaces are Access interfaces. 7 Raisecom(config-port)#switchport Configure the type of packets that are disallowed reject-frame { tagged | untagged } to pass on the interface.  VLANs that are created through the vlan vlan-id command are in active status.  All configurations of a VLAN cannot take effect until the VLAN is activated. 5.3.3 Configuring VLANs based on Access interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface-type Enter physical layer interface interface-number configuration mode. 3 Raisecom(config-port)#switchport mode access Configure the interface mode to Access. 4 Raisecom(config-port)#switchport access vlan Configure the interface Access VLAN. vlan-id 5 Raisecom(config-port)#switchport access egress- Configure the VLAN list allowed by allowed vlan { all | vlan-list } [ confirm ] the Access interface. Raisecom(config-port)#switchport access egress- allowed vlan { add | remove } vlan-list 5.3.4 Configuring VLANs based on Trunk interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface- Enter physical layer interface configuration mode. type interface-number 3 Raisecom(config-port)#switchport mode Configure the interface mode to Trunk. trunk 4 Raisecom(config-port)#switchport trunk Configure the interface Native VLAN. native vlan vlan-id 5 Raisecom(config-port)# switchport trunk (Optional) configure the VLAN list allowed by allowed vlan { all | vlan-list } the Trunk interface. [ confirm ] Raisecom Proprietary and Confidential 78 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Step Command Description 6 Raisecom(config-port)#switchport trunk (Optional) configure the Untagged VLAN list untagged vlan { all | vlan-list } allowed by the Trunk interface. [ confirm ] 7 Raisecom(config-port)#switchport trunk (Optional) configure the action taken by the native vlan { tagged | untagged } Trunk interface when a packet with the Native VLAN Tag comes out of the interface.  The Trunk interface permits Native VLAN packets passing regardless of configurations for Trunk Allowed VLAN list and Trunk Untagged VLAN list on the interface. And forwarded packets do not carry VLAN TAG.  When configuring a Native VLAN, the system will automatically create and activate a VLAN if you do not create the VLAN in advance.  The interface permits Trunk Allowed VLAN packets passing. If the VLAN is a Trunk Untagged VLAN, the VLAN TAG of the packet is removed on the egress interface. Otherwise, the packet is not modified.  If the configured Native VLAN is not the default VLAN and there is no default VLAN in the VLAN list on the Trunk interface, the interface will not allow packets in the default VLAN to pass.  When configuring a Trunk Untag VLAN list, the system automatically adds all Untagged VLAN to the Trunk allowed VLAN.  Trunk allowed VLAN list and Trunk Untagged VLAN list are valid for the static VLAN only. 5.3.5 Checking configurations No. Command Description 1 Raisecom#show vlan [ vlan-list | static Show configurations and status of all VLANs or | dynamic ] [ detail ] a specified VLAN. 2 Raisecom#show switchport interface Show switching configurations on the interface interface-type interface-number 5.4 Configuring super VLAN 5.4.1 Preparing for configurations Scenario With super VLAN, hosts that are connected to the same switch but belong to different VLANs can communicate on Layer 3 by using the IP address of Layer 3 interface of the super VLAN as the default gateway. Raisecom Proprietary and Confidential 79 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Prerequisite  After being configured, the super VLAN cannot contain any member interfaces. If a VLAN has member interfaces, it cannot be configured with attributes of super VLAN.  Create a VLAN to be added to the super VLAN, and activate it. 5.4.2 Configuring super VLAN Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#create vlan vlan-id Create a VLAN. active 3 Raisecom(config)#vlan vlan-id Enter VLAN configuration mode. 4 Raisecom(config-vlan)#supervlan Configure the VLAN as a super VLAN. 5 Raisecom(config-vlan)#subvlan [ add | Configure sub-VLANs of the super VLAN. remove ] subvlan-id 6 Raisecom(config-vlan)#exit Exit VLAN configuration mode. 7 Raisecom(config)#interface vlan vlan-id Enter VLAN interface configuration mode. 8 Raisecom(config-vlanif)#ip address ip- Configure the IP address of the super VLAN. address 9 Raisecom(config-vlanif)#arp local-proxy Enable local ARP proxy of the super VLAN. enable By default, it is disabled. After being configured as a super VLAN, a VLAN cannot be configured with the VLAN interface and IP address. 5.4.3 Checking configurations No. Command Description 1 Raisecom#show supervlan [ vlan-id ] Show configurations of super VLAN and sub- Raisecom#show vlan VLANs. 2 Raisecom#show ip interface brief Show configurations of the IP address of the super VLAN. Raisecom Proprietary and Confidential 80 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet 5.5 Configuring basic QinQ 5.5.1 Preparing for configurations Scenario With basic QinQ, you can add outer VLAN Tag and freely plan your own private VLAN ID. Therefore, the data between devices on both ends of the Internet Service Provider (ISP) network can be transparently transmitted, without conflicting with the VLAN ID in the ISP network. Prerequisite  Connect interfaces and configure physical parameters of interfaces. Make the physical layer Up.  Create a VLAN. 5.5.2 Configuring basic QinQ Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls double-tagging (Optional) configure the TPID of global inner inner-tpid tpid Tags. 3 Raisecom(config)#interface interface- Enter interface configuration mode. type interface-number 4 Raisecom(config-port)#tpid tpid Configure the interface TPID. By default, it is 0x8100. 5 Raisecom(config-port)#dot1q-tunnel Enable basic QinQ on the interface. 6 Raisecom(config-port)#dot1q-tunnel cos (Optional) enable the inner CoS Tag to override override the outer CoS Tag. By default, this function is disabled. 7 Raisecom(config-port)#switchport access (Optional) add the Access interface to the VLAN. vlan vlan-id Raisecom(config-port)#switchport trunk (Optional) add the Trunk interface to the VLAN. native vlan vlan-id 5.5.3 Configuring egress interface to Trunk mode Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#switchport Configure the interface to Trunk mode. mode trunk Raisecom Proprietary and Confidential 81 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet 5.5.4 Checking configurations No. Command Description 1 Raisecom#show dot1q-tunnel Show configurations of basic QinQ. 5.6 Configuring selective QinQ 5.6.1 Preparing for configurations Scenario Different from basic QinQ, selective QinQ features different outer VLAN Tags for services on the network, such as voice, video, and data services. It can group services when services are forwarded, implementing the VLAN mapping between inner and outer VLAN tags. Prerequisite  Connect interfaces and configure physical parameters of interfaces. Make the physical layer Up.  Create a VLAN. 5.6.2 Configuring selective QinQ Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls double-tagging inner- (Optional) configure the TPID value of the tpid tpid inner Tag. 3 Raisecom(config)#interface interface-type Enter interface configuration mode. interface-number 4 Raisecom(config-port)#tpid tpid Configure the interface TPID. By default, it is 0x8100. 5 Raisecom(config-port)#switchport vlan- Configure selective QinQ rules on the mapping cvlan vlan-list [ cos cos-value ] interface in ingress direction. add-outer vlan-id [ cos cos-value ] 6 Raisecom(config-port)#switchport vlan- Add double VLAN Tags to untagged mapping both cvlan vlan-id add-outer vlan- packets received by the interface. id [ cos cos-value ] { translate vlan-id | remove } Raisecom(config-port)#switchport vlan- Add the outer VLAN Tag to packets with mapping both cvlan vlan-id cos cos-value1 CVLAN and CoS received by the interface. add-outer vlan-id [ cos cos-value2 ] { translate vlan-id | remove } Raisecom Proprietary and Confidential 82 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Step Command Description Raisecom(config-port)#switchport vlan- Configure VLAN mapping rules for packets mapping both outer vlan-id [ inner vlan- with the outer VLAN Tag or double VLAN id ] translate vlan-id1 vlan-id2 [ cos cos- Tags received by the interface. value ] Raisecom(config-port)#switchport vlan- Add the outer VLAN Tag to packets with mapping both priority-tagged cos cos-value1 priority Tag and CoS received on the add-outer vlan-id [ cos cos-value2 ] interface. Raisecom(config-port)#switchport vlan- Add the outer VLAN Tag to packets with mapping both { untag | priority-tagged } priority Tag and untagged packets received add-outer vlan-id [ cos cos-value ] on the interface. [ translate vlan-id | remove ] Raisecom(config-port)#switchport vlan- Add the outer VLAN Tag to packets with mapping both inner vlan-id add-outer vlan- VLAN Tag received on the interface, and id [ cos cos-value ] specify the outer CoS. 7 Raisecom(config-port)#switchport vlan- (Optional) configure the interface to discard mapping-miss discard packets that mismatch VLAN mapping rules.  If you have configured selective QinQ based on VLAN+CoS, or specified the CoS value of the added outer Tag, you need to use the no dotlq-tunnel command on the interface to disable basic QinQ.  The switchport interface cannot be configured with selective QinQ in aggregation group configuration mode. 5.6.3 Checking configurations No. Command Description 1 Raisecom#show dot1q-tunnel Show configurations of basic QinQ. 2 Raisecom#show vlan-mapping interface Show configurations of selective QinQ. interface-type interface-number add-outer 3 Raisecom#show vlan-mapping both interface Show VLAN mapping rules in both interface-type interface-number directions of the interface. Raisecom Proprietary and Confidential 83 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet 5.7 Configuring VLAN mapping 5.7.1 Preparing for configurations Scenario Differentiated from QinQ, VLAN mapping only changes the VLAN tag but does not encapsulate additional multilayer VLAN Tag. You just need to change VLAN Tag to make packets transmitted according to carrier's VLAN mapping rules, without increasing frame length of the original packet. VLAN mapping is used in the following situations:  Map user services into one carrier VLAN ID.  Map multi-user services into one carrier VLAN ID. Prerequisite  Connect the interface, configure its physical parameters, and make it Up at the physical layer.  Create and activate a VLAN. 5.7.2 Configuring 1:1 VLAN mapping Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface-type Enter physical layer interface configuration interface-number mode. 3 Raisecom(config-port)#switchport vlan- Configure 1:1 VLAN mapping rules on the mapping { egress | ingress } vlan-id ingress/egress interface. translate vlan-id You can configure 1:1 VLAN mapping based on outer VLAN ID, outer CoS, inner VLAN ID, and inner CoS. 4 Raisecom(config-port)#switchport vlan- Configure VLAN+CoS VLAN mapping mapping egress outer vlan-list [ cos cos- rules on the egress interface. value ] [ inner vlan-list ] [ cos cos- value ] translate [ outer-vid vlan-id ] [ outer-cos cos-value ] [ inner-vid vlan- id ] [ inner-cos cos-value ] 5 Raisecom(config-port)#switchport vlan- (Optional) configure the interface to discard mapping-miss discard mismatched packets on the interface in ingress direction. For packets complying with VLAN mapping rules, forward them after VLAN mapping. Namely, the forwarded VLAN is the mapped VLAN and the MAC address of the packet is learnt from the mapped VLAN. Raisecom Proprietary and Confidential 84 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet 5.7.3 Configuring N:1 VLAN mapping Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#switchport Configure N:1 VLAN mapping rules on the vlan-mapping both vlan-list ingress/egress interface. translate vlan-id By default, VLAN mapping is disabled. 5.7.4 Checking configurations No. Command Description 1 Raisecom#show vlan-mapping interface interface-type Show configurations of interface-number { both | egress | ingress } translate VLAN mapping. 5.8 Configuring loop detection 5.8.1 Preparing for configurations Scenario On the network, hosts or Layer 2 devices connected to access devices may form a loop intentionally or involuntarily. Enable loop detection on downlink interfaces on all access devices to avoid the network congestion generated by unlimited copies of data traffic. When a loop is detected on an interface, the interface will be blocked. Prerequisite Configure physical parameters of the interface and make it Up at the physical layer. 5.8.2 Configuring loop detection For directly-connected devices, you cannot enable loop detection on both ends simultaneously. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface- Enter interface configuration mode. type interface-number Raisecom Proprietary and Confidential 85 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Step Command Description 3 Raisecom(config-port)#loopback- Enable loop detection on an interface. detection [ pkt-vlan { untag | vlan- id } ] [ hello-time second ] [ restore- (Optional) configure the VLAN for sending time second ] [ action { block | trap- packets, the period for sending Hello packets, only | shutdown } ] [ log-interval restoration period, action taken for loops, and minute ] logging interval. Raisecom(config-port)#loopback- Enable loop detection on an interface. detection detect-vlanlist vlan-list [ hello-time second ] [ restore-time (Optional) configure the VLAN list for loop second ] [ action { discard-vlan | detection, the period for sending Hello packets, trap-only | shutdown } ] [ log-interval restoration period, action taken for loops, and minute ] logging interval. 4 Raisecom(config-port)#loopback- (Optional) configure the interval for outputting detection manual restore log for the loop detection. By default, it is 0 minute. 5.8.3 Checking configurations No. Command Description 1 Raisecom#show loopback-detection [ interface- Show configurations of loop detection on type interface-number ] [ detail ] the interface. 5.8.4 Maintenance No. Command Description 1 Raisecom(config)#clear loopback-detection Clear statistics on loop detection on the statistic [ interface-type interface-number ] interface. 5.9 Configuring interface protection 5.9.1 Preparing for configurations Scenario To isolate Layer 2 data among interfaces in a VLAN and implement isolation similar to physical isolation, you need to configure interface protection. By configuring interface protection, you can isolate data among interfaces in a VLAN, enhance network security, and provide flexible networking scheme for users. Raisecom Proprietary and Confidential 86 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Prerequisite N/A 5.9.2 Configuring interface protection Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#switchport Enable interface protection. protect 5.9.3 Checking configurations No. Command Description 1 Raisecom#show switchport protect Show configurations of interface protection. 5.10 Configuring port mirroring 5.10.1 Preparing for configurations Scenario Port mirroring refers to mirroring packets of the specified mirroring port to the specified monitor port or LAG without affecting packet forwarding. You can use this function to monitor the receiving and sending status of one or more ports and analyze the network situation. Prerequisite N/A 5.10.2 Configure port mirroring of CPU packets Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mirror- Configure port mirroring of CPU packets, and configure port group group-id source-cpu mirroring rules. [ ingress | egress ] You can configure port mirroring in both the ingress and egress directions. Raisecom Proprietary and Confidential 87 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet 5.10.3 Configuring port mirroring Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mirror-group Create a port mirroring group. group-id 3 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number 4 Raisecom(config-port)#mirror- Configure the monitor port of port mirroring. group group-id monitor-port 5 Raisecom(config-port)#mirror- Configure the mirroring port and the mirroring rules. group group-id source-port { ingress | egress } You can configure port mirroring in both the ingress and egress directions. 5.10.4 Checking configurations No. Command Description 1 Raisecom#show mirror-group [ group-id ] Show configurations of port mirroring. 5.11 Configuring storm control 5.11.1 Preparing for configurations Scenario Configuring storm control on Layer 2 devices can prevent broadcast storm when broadcast packets increase sharply on the network. Therefore, this helps ensure that the unicast packets can be properly forwarded. In addition, you can configure storm control to filter packets to forward or discard packets. Prerequisite Connect interfaces and configure physical parameters of interfaces. Make the physical layer Up. 5.11.2 Configuring storm control Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface- Enter physical layer interface configuration mode. type interface-number Raisecom Proprietary and Confidential 88 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Step Command Description 3 Raisecom(config-port)#storm-control Configure the storm control threshold. { broadcast | unknown-multicast | dlf | all } bps bps By default, it is 0, namely, no rate limiting. 4 Raisecom(config-port)#storm-filter Enable storm filtering. { broadcast | unknown-multicast | dlf | all } enable By default, it is disabled. When storm control is enabled, you can configure rate limiting but rate limiting will not take effect. After storm control is disabled, rate limiting will take effect. 5.11.3 Checking configurations No. Command Description 1 Raisecom#show storm-control interface Show configurations of storm control. [ interface-type interface-number ] 5.12 Configuring L2CP 5.12.1 Preparing for configurations Scenario On the access device of MAN, you can configure a L2CP profile on user network interface according to services from the carrier to configure L2CP of the user network so that L2CP packets from the user network are processed in different ways. Prerequisite N/A 5.12.2 Configuring global L2CP Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#l2cp-process Configure the multicast destination MAC address of tunnel destination-address transparently transmitted packets. mac-address By default, it is 010E.5E00.0003. Raisecom Proprietary and Confidential 89 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet The multicast destination MAC address cannot begin with 0180.C2 or 010E.5E (except 010E.5E00.0003). 5.12.3 Configuring L2CP profile Configuring basic information about L2CP profile Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#l2cp- Create a L2CP profile for processing packets. process profile profile-id Enter L2CP profile configuration mode. 3 Raisecom(config-l2cp- (Optional) configure the name of the L2CP profile. profile)#name string 4 Raisecom(config-l2cp- Configure the action for processing L2CP packets of the specified profile)#l2cp-process type. protocol { oam | stp | dot1x | lacp | lldp | By default: cdp | vtp | pvst | elmi  L2CP profile 1 sends OAM, Dot1x, LACP, and LLDP packets to | udld | pagp | all } the CPU, discards VTP, PVST, CDP, UDLD, and PAGP packets, action { tunnel | drop and transparently transmit STP packets. | peer }  L2CP profile 2 transparently transmits STP, Dot1x, LACP, CDP, VTP, PVST, ELMI, UDLD, and PAGP packets, and sends OAM and LLDP packets to the CPU.  A new L2CP profile transparently transmits STP, Dot1x, LACP, CDP, VTP, PVST, LLDP, ELMI, UDLD, and PAGP packets, and sends OAM packets to the CPU. Configuring transparently transmitted packets Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#l2cp- Create a L2CP profile for processing packets. process profile profile-id Enter L2CP profile configuration mode. 3 Raisecom(config-l2cp- Configure the egress interface for transparently transmitting profile)#tunnel interface- L2CP packets, namely, the carrier-side interface. type interface-number 4 Raisecom(config-l2cp- Configure the type of the tunnel for transparently transmitting profile)#tunnel tunnel-type L2CP packets to MAC. { mac } Raisecom Proprietary and Confidential 90 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Step Command Description 5 Raisecom(config-l2cp- When the type of the tunnel for transparent transmission is profile)#tunnel vlan vlan-id MAC, configure the VLAN ID for transparently transmitting L2CP packets. In addition, you must configure the carrier-side interface to allow packets of this VLAN to pass. 5.12.4 Applying L2CP profile Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#l2cp-process Apply the L2CP profile on the interface. profile profile-id 5.12.5 Checking configurations No. Command Description 1 Raisecom#show l2cp-process profile [ profile- Show information about the created id ] L2CP profile. 2 Raisecom#show l2cp-process [ interface-type Show configurations of L2CP on the interface-number ] interface. 3 Raisecom#show l2cp-process tunnel statistics Show statistics on L2CP packets on [ interface-type interface-number ] the interface. 5.13 Maintenance Command Description Raisecom(config)#clear mac-address { all | blackhole | Clear MAC addresses. dynamic | static | mac-address } [ vlan vlan-id ] [ interface-type interface-number ] Raisecom(config)#search mac-address mac-address { all Query MAC addresses. | dynamic | static } [ interace-type interface- number ] [ vlan vlan-id ] Raisecom(config)#clear arp Clear the ARP address table. Raisecom(config-port)#clear loopback-detection Clear statistics on loop detection. statistic Raisecom Proprietary and Confidential 91 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Command Description Raisecom(config)#clear l2cp-process tunnel statistics Clear statistics on L2CP packets on interface-type interface-number the interface. 5.14 Configuration examples 5.14.1 Example for configuring MAC address table Networking requirements As shown in Figure 5-9, the switch is connected upstream to the IP network through Client interface 1 on the RAX711-C to make PC 2 and PC 3 access the IP network. Configure a static unicast MAC address on Client interface 2 for forwarding packets from the switch to the IP network. Meanwhile, enable dynamic MAC address learning on the RAX711-C. Configuration parameters are as below:  MAC address of the switch : 000E.5E03.0405  VLAN and type of Client interface 1: VLAN 10 and Access  Aging time of dynamic MAC addresses: 500s Figure 5-9 Configuring MAC address table Configuration steps Step 1 Create and activate VLAN 10. Add Client interface 1 to VLAN 10. Raisecom Proprietary and Confidential 92 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Raisecom#config Raisecom(config)#create vlan 10 active Raisecom(config)#interface client 1 Raisecom(config-client1)#switchport access vlan 10 Raisecom(config-client1)#exit Step 2 Configure a static MAC address, which is in VLAN 10. Raisecom(config)#mac-address static unicast 000e.5e03.0405 vlan 10 client 1 Step 3 Configure the aging time of the MAC address to 500s. Raisecom(config)#mac-address aging-time 500 Raisecom(config)#exit Checking results Use the show mac-address static command to show configurations of MAC addresses. Raisecom#show mac-address static Mac Address Port Vlan Flags ------------------------------------------------------------------ 000E.5E03.0406 client 1 10 static 5.14.2 Example for configuring VLAN and interface protection Networking requirements As shown in Figure 5-10, PC 1, PC 2, and PC 5 are in VLAN 10; PC 3 and PC 4 are in VLAN 20. RAX711-C A and RAX711-C B are connected through a Trunk interface and disallow packets of VLAN 20 to pass. Therefore, PC 3 and PC 4 cannot communicate with each other. Enable interface protection on PC 1 and PC 2 to make them fail to communicate. However, PC 1 and PC 2 can communicate with PC 5 respectively. Raisecom Proprietary and Confidential 93 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Figure 5-10 Configuring VLAN Configuration steps Step 1 Create and activate VLAN 10 and VLAN 20 on RAX711-C A and RAX711-C B respectively.  Configure RAX711-C A. RAX711-CA#config RAX711-CA(config)#create vlan 10,20 active  Configure RAX711-C B. RAX711-CB#config RAX711-CB(config)#create vlan 10,20 active Step 2 Add Client interface 1 (Access) and Client interface 2 (Access) on RAX711-C B to VLAN 10. Add Client interface 3 (Access) to VLAN 20. Line 1 is in Trunk mode and allows packets of VLAN 10 to pass. RAX711-CB(config)#interface client 1 RAX711-CB(config-client1)#switchport mode access RAX711-CB(config-client1)#switchport access vlan 10 RAX711-CB(config-client1)#exit RAX711-CB(config)#interface client 2 RAX711-CB(config-client2)#switchport mode access RAX711-CB(config-client2)#switchport access vlan 10 RAX711-CB(config-client2)#exit Raisecom Proprietary and Confidential 94 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet RAX711-CB(config)#interface client 3 RAX711-CB(config-client3)#switchport mode access RAX711-CB(config-client3)#switchport access vlan 20 RAX711-CB(config-client3)#exit RAX711-CB(config)#interface line 1 RAX711-CB(config-line1)#switchport mode trunk RAX711-CB(config-line1)#switchport trunk allow vlan 10 RAX711-CB(config-line1)#exit Step 3 Add Client interface 2 (Access) on RAX711-C A to VLAN 10 and Client interface 1 (Trunk) to VLAN 20. Client interface 1 works in Trunk mode and allows packets of VLAN 10 to pass. RAX711-CA(config)#interface client 2 RAX711-CA(config-client2)#switchport mode access RAX711-CA(config-client2)#switchport access vlan 10 RAX711-CA(config-client2)#exit RAX711-CA(config)#interface client 1 RAX711-CA(config-client1)#switchport mode trunk RAX711-CA(config-client1)#switchport trunk native vlan 20 RAX711-CA(config-port)#exit RAX711-CA(config)#interface line 1 RAX711-CA(config-line1)#switchport mode trunk RAX711-CA(config-line1)#switchport trunk allow vlan 10 RAX711-CA(config-line1)#exit Step 4 Enable interface protection on Client interface 1 and Client interface 2 on RAX711-C B. RAX711-CB(config)#interface client 1 RAX711-CB(config-client1)#switchport protect RAX711-CB(config-client1)#exit RAX711-CB(config)#interface client 2 RAX711-CB(config-client2)#switchport protect RAX711-CB(config-client2)#exit Checking results Use the show vlan command to show VLAN configurations. Take RAX711-C B for example. RAX711-CB#show vlan Switch Mode: -- VLAN Name State Status Priority Member-Ports ------------------------------------------------------------------------- 1 VLAN0001 active static -- 2 VLAN0002 active static -- 3 VLAN0003 active static -- Raisecom Proprietary and Confidential 95 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet 4 VLAN0004 active static -- 5 VLAN0005 active static -- 6 VLAN0006 active static -- 7 VLAN0007 active static -- 8 VLAN0008 active static -- 9 VLAN0009 active static -- 10 VLAN0010 active static -- client 1 client 2 client 2 20 VLAN0020 active static --client 3 Use the show switchport interface command to show VLAN configurations on the interface. Take RAX711-C B for example. RAX711-CB#show switchport interface client 1 Interface: client1 Switch Mode: switch Reject frame type: none Administrative Mode: access Operational Mode: access Access Mode VLAN: 10 Administrative Access Egress VLANs: Operational Access Egress VLANs: 10 Trunk Native Mode VLAN: 0 Administrative Trunk Allowed VLANs: Operational Trunk Allowed VLANs: Administrative Trunk Untagged VLANs: Operational Trunk Untagged VLANs: Administrative private-vlan host-association: Administrative private-vlan mapping: Operational private-vlan: -- Use the show switchport protect command to show configurations of interface protection. RAX711-CB#show switchport protect Port Protected State Port Protected State -------------------------- line1 disable line2 disable line3 disable line4 disable client1 enable client2 enable client3 enable client4 enable client5 disable client6 disable client7 disable client8 disable Raisecom Proprietary and Confidential 96 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet client9 disable client10 disable client11 disable client12 disable Use the ping command to learn allowable VLANs for the Trunk interface.  If PC1 can ping through PC 5, VLAN 10 communicates properly.  If PC 2 can ping through PC 5, VLAN 10 communicates properly.  If PC 3 fails to ping through PC 4, VLAN 20 communicates improperly. By executing the ping command between PC 1 and PC 2, check configurations of interface protection. If PC1 fails to ping through PC 2, interface protection takes effect. 5.14.3 Example for configuring basic QinQ Networking requirements As shown in Figure 5-11, RAX711-C A and RAX711-C B are connected to VLAN 100 and VLAN 200 respectively. To communicate through the ISP, Department A and Department C, Department B and Department D should set the outer Tag to VLAN 1000. Configure Client interface1 and Client interface 2 on RAX711-C A and RAX711-C B working in dot1q-tunnel mode and being connected to VLAN 100 and VLAN 200. Client interface 1 is used to connect the ISP network, which works in Trunk mode and allows double-tagged packets to pass. The TPID is configured to 9100. Raisecom Proprietary and Confidential 97 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Figure 5-11 Configuring basic QinQ Configuration steps Step 1 Create and activate VLAN 100, VLAN 200, and VLAN 1000.  Configure RAX711-C A. RAX711-CA#config RAX711-CA(config)#create vlan 100,200,1000 active  Configure RAX711-C B. RAX711-CB#config RAX711-CB(config)#create vlan 100,200,1000 active Step 2 Configure Client interface 1 and Client interface 2 to work in dot1q-tunnel mode. Configure the outer TPID to 9100.  Configure RAX711-C A. Raisecom Proprietary and Confidential 98 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet RAX711-CA(config)#interface client 1 RAX711-CA(config-client1)#tpid 9100 RAX711-CA(config-client1)#switchport mode access RAX711-CA(config-client1)#switchport access vlan 1000 RAX711-CA(config-client1)#dot1q-tunnel RAX711-CA(config-client1)#exit RAX711-CA(config)#interface client 2 RAX711-CA(config-client2)#tpid 9100 RAX711-CA(config-client2)#switchport mode trunk RAX711-CA(config-client2)#switchport trunk native vlan 1000 RAX711-CA(config-client2)#dot1q-tunnel RAX711-CA(config-client2)#exit  Configure RAX711-C B. RAX711-CB(config)#interface client 1 RAX711-CB(config-client1)#tpid 9100 RAX711-CB(config-client1)#switchport mode access RAX711-CB(config-client1)#switchport access vlan 1000 RAX711-CB(config-client1)#dot1q-tunnel RAX711-CB(config-client1)#exit RAX711-CB(config)#interface client 2 RAX711-CB(config-client2)#tpid 9100 RAX711-CB(config-client2)#switchport mode trunk RAX711-CB(config-client2)#switchport trunk native vlan 1000 RAX711-CB(config-client2)#dot1q-tunnel RAX711-CB(config-client2)#exit Step 3 Configure Line interface 1 to allow double-tagged packets to pass.  Configure RAX711-C A. RAX711-CA(config)#interface line 1 RAX711-CA(config-line1)#switchport mode trunk RAX711-CA(config-line1)#switchport trunk allowed vlan 1000 RAX711-CA(config-line1)#exit  Configure RAX711-C B. RAX711-CB(config)#interface line 1 RAX711-CB(config-line1)#switchport mode trunk RAX711-CB(config-line1)#switchport trunk allowed vlan 1000 RAX711-CB(config-line1)#exit Raisecom Proprietary and Confidential 99 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Checking results Use the show dot1q-tunnel command to show QinQ configurations. Take RAX711-C A for example. RAX711-CA(config-port)#show dot1q-tunnel Inner TPID: 0x8100 Interface QinQ Status Outer TPID on port Cos override Vlan-map-miss drop ------------------------------------------------------------------------- --- client1 -- 0x8100 disable disable client2 -- 0x8100 disable disable client3 -- 0x8100 disable disable client4 -- 0x8100 disable disable line1 -- 0x8100 disable disable line2 -- 0x8100 disable disable vsap1 -- 0x8100 disable disable 5.14.4 Example for configuring port mirroring Networking requirements As shown in Figure 5-12, user network 1 is connected to the RAX711-C through Client interface 1 and user network 2 is connected to the RAX711-C through Client interface 2. The network administrator needs to monitor packets transmitted to and sent by user network 1 through the monitor PC, obtain anomalous data traffic, and analyze and address problems. The monitor PC is connected to the RAX711-C through Client interface 3. Figure 5-12 Configuring port mirroring Configuration steps Step 1 Create port mirroring group 1. Raisecom Proprietary and Confidential 100 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Raisecom#config Raisecom(config)#mirror group 1 Step 2 Configure Client interface 3 to the monitor port. Raisecom(config)#interface client 3 Raisecom(config-client3)#mirror-group 1 monitor-port Step 3 Configure Client interface 1 to the mirroring port and configure the mirroring rule to ingress. Raisecom(config)#interface client 1 Raisecom(config-client1)#mirror-group 1 source-port ingress Checking results Use the show mirror-group command to show port mirroring configurations. Raisecom#show mirror-group Mirror Group 1 : Monitor Port : client3 Source Port : client1 : ingress 5.14.5 Examples for configuring storm control Networking requirements As shown in Figure 5-13, to control the influence of the broadcast storm on RAX711-C A, you need to deploy storm control on RAX711-C A to control broadcast packets. The storm control threshold is configured to 2000 pps. Raisecom Proprietary and Confidential 101 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Figure 5-13 Configuring storm control Configuration steps Configure storm control on RAX711-C A. Raisecom#config Raisecom(config)#interface line 1 Raisecom(config-line1)#storm-filter broadcast enable Raisecom(config-line1)#storm-control broadcast pps 2000 Raisecom(config-port)#exit Raisecom(config)#interface line 2 Raisecom(config-line2)#storm-filter broadcast enable Raisecom(config-line2)#storm-control broadcast pps 2000 Checking results Use the show storm-control command to show configurations of storm control. Raisecom(config)#show storm-control interface line 1 Interface Packet-Type Filter-Status Bps(Kbps) RealBps ------------------------------------------------------------------------- --- line1 Broadcast Enable 2000 1984 Multicast Disable 2000 1984 Dlf Disable 2000 1984 5.14.6 Example for configuring L2CP Networking requirements As shown in Figure 5-14, configure L2CP on RAX711-C A and RAX711-C B to transparently transmit L2CP packets of Customer A and Customer B through the MAN as below. Raisecom Proprietary and Confidential 102 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet  Specify the multicast destination MAC address of them to 0100.1234.1234.  Configure the STP packets of Customer A to pass the MAN, and discard other packets. The type of the tunnel is MAC, with the multicast MAC address of 0100.1234.1234 and VLAN of VLAN 1000.  Configure the STP and LLDP packets of Customer B to pass the MAN, and discard other packets. The type of the tunnel is MAC, with the multicast MAC address of 0100.1234.5678 and VLAN of VLAN 2000. Figure 5-14 L2CP networking Configuration steps Configure RAX711-C A and RAX711-C B. Configurations of RAX711-C A are the same as those of RAX711-C B. Take RAX711-C A for example. Step 1 Configure the VLAN of the carrier-side interface. Raisecom#config Raisecom(config)#create vlan 1000,2000 active Raisecom(config)#interface line 1 Raisecom(config-port)#switchport mode trunk Raisecom(config-port)#switchport trunk allowed vlan 1000,2000 Raisecom(config-port)#exit Step 2 Configure L2CP profile 1. Raisecom(config)#l2cp-process tunnel destination-address 0100.1234.1234 Raisecom(config)#l2cp-process profile 1 Raisecom(config-l2cpproflie)#name CustomerA Raisecom(config-l2cpproflie)#l2cp-process protocol all action drop Raisecom(config-l2cpproflie)#l2cp-process protocol stp action tunnel Raisecom(config-l2cpproflie)#tunnel line 1 Raisecom(config-l2cpproflie)#tunnel tunnel-type mac Raisecom(config-l2cpproflie)#tunnel vlan 1000 Raisecom(config-l2cpproflie)#exit Step 3 Configure L2CP profile 2. Raisecom Proprietary and Confidential 103 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet Raisecom(config)#l2cp-process profile 2 Raisecom(config-l2cpproflie)#name CustomerB Raisecom(config-l2cpproflie)#l2cp-process protocol all action drop Raisecom(config-l2cpproflie)#l2cp-process protocol stp action tunnel Raisecom(config-l2cpproflie)#l2cp-process protocol lldp action tunnel Raisecom(config-l2cpproflie)#tunnel line 1 Raisecom(config-l2cpproflie)#tunnel tunnel-type mac Raisecom(config-l2cpproflie)#tunnel vlan 2000 Raisecom(config-l2cpproflie)#exit Step 4 Apply L2CP profiles. Raisecom(config)#interface client 1 Raisecom(config-port)#l2cp-process profile 1 Raisecom(config-port)#interface client 2 Raisecom(config-port)#l2cp-process profile 2 Raisecom(config-port)#exit Checking results Use the show l2cp-process profile command to show L2CP configurations. Raisecom#show l2cp-process profile Destination MAC Address for Encapsulated Packets: 0100.1234.1234 ProfileId: 1 Name: CustomerA BpduType Mac-address l2cp-process Mac-vlan EgressPort tunneltype ------------------------------------------------------------------------- ------------- stp 0180.C200.0000 tunnel 1000 line1 mac dot1x 0180.C200.0003 drop 1000 line1 mac lacp 0180.C200.0002 drop 1000 line1 mac oam 0180.C200.0002 drop 1000 line1 mac cdp 0100.0CCC.CCCC drop 1000 line1 mac vtp 0100.0CCC.CCCC drop 1000 line1 mac pvst 0100.0CCC.CCCD drop 1000 line1 mac lldp 0180.C200.000E drop 1000 line1 mac elmi 0180.C200.0007 drop 1000 line1 mac udld 0100.0CCC.CCCC drop 1000 line1 mac pagp 0100.0CCC.CCCC drop 1000 line1 mac ProfileId: 2 Name: CustomerB BpduType Mac-address l2cp-process Mac-vlan EgressPort tunneltype ------------------------------------------------------------------------- ------------- stp 0180.C200.0000 tunnel 2000 line1 mac dot1x 0180.C200.0003 drop 2000 line1 mac lacp 0180.C200.0002 drop 2000 line1 mac oam 0180.C200.0002 drop 2000 line1 mac Raisecom Proprietary and Confidential 104 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 5 Ethernet cdp 0100.0CCC.CCCC drop 2000 line1 mac vtp 0100.0CCC.CCCC drop 2000 line1 mac pvst 0100.0CCC.CCCD drop 2000 line1 mac lldp 0180.C200.000E tunnel 2000 line1 mac elmi 0180.C200.0007 drop 2000 line1 mac udld 0100.0CCC.CCCC drop 2000 line1 mac pagp 0100.0CCC.CCCC drop 2000 line1 mac ProfileId: 3 Name: BpduType Mac-address l2cp-process Mac-vlan EgressPort tunneltype ------------------------------------------------------------------------- ------------- stp 0180.C200.0000 tunnel -- client1 mac dot1x 0180.C200.0003 tunnel -- client1 mac lacp 0180.C200.0002 tunnel -- client1 mac oam 0180.C200.0002 peer -- client1 mac cdp 0100.0CCC.CCCC tunnel -- client1 mac vtp 0100.0CCC.CCCC tunnel -- client1 mac pvst 0100.0CCC.CCCD tunnel -- client1 mac lldp 0180.C200.000E tunnel -- client1 mac elmi 0180.C200.0007 tunnel -- client1 mac udld 0100.0CCC.CCCC tunnel -- client1 mac pagp 0100.0CCC.CCCC tunnel -- client1 mac Raisecom Proprietary and Confidential 105 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 6 Clock synchronization 6 Clock synchronization This chapter describes principles and configuration procedures of clock synchronization, and provides related configuration examples, including the following sections:  Introduction  Configuring clock synchronization based on SyncE  Configuring PTP-based clock synchronization 6.1 Introduction IP-based network is the development trend of network and services. At present, there are a lot of difficulties to be encountered for changing the traditional Time Division Multiplex (TDM) network to IP-based PTN. One significant problem is how to traverse traditional TDM services in IP-based Packet Transport Network (PTN). When services (such as E1/T1) are transmitted through the traditional TDM network, clock signals can be transmitted accurately. In addition, the receiver can recover TDM services based on the extracted clock signals. Meanwhile, the TDM line can provide the synchronization reference clock for some networks. Therefore, how to perform clock synchronization is a significant for deploying the PTN. Clock synchronization is divided into 2 modes:  Frequency synchronization: has identical time interval.  Phase synchronization: has identical time interval and begin time. The harshest requirement for clock synchronization introduced by the communication network lies in the application of clock synchronization in the wireless scenarios. Frequencies of signals in various base stations must be in a certain precision. Otherwise, base stations fail when signals are being switched. Some wireless mechanisms adopt synchronous base station technologies, such as Time Division-Synchronous Code Division Multiple Access (TD- SCDMA) or Code Division Multiple Access 2000 (CDMA2000). These wireless mechanisms have higher requirements on phase synchronization. At present, Synchronous Ethernet (SyncE) is used to synchronize frequency of devices at the physical layer. Synchronous Ethernet synchronize phases of devices in the network through the clock synchronization technology based on Institute of Electrical and Electronics Engineers (IEEE) 1588v2 protocol. Raisecom Proprietary and Confidential 106 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 6 Clock synchronization 6.1.1 SyncE Physical-layer synchronization technologies are widely used in the traditional TDM network. Each node can extract clock signals from the physical link or the external synchronization interface. It selects the clock source with best quality from multiple clock sources, takes it as the local clock, and transmits it to the downstream devices. Therefore, it synchronizes clocks of all devices to the master reference clock by locking the host. SyncE adopted by the PTN has similar principles, as shown in Figure 6-1. iTN B selects the clock signal with highest quality level as the clock source (the TDM device in Figure 6-1) based on Synchronization Status Message (SSM). And then iTN B sends the received highly- accurate clock signals through the physical-layer chip. Based on the clock data recovery technology integrated in the physical-layer chip, iTN A recovers the clock signals from the serial data flow and then transmits the clock signals to the clock subcard. After being processed by the clock subcard, these clock signals are sent to other clocks through interfaces. Therefore, upstream clocks and downstream clocks are cascaded and clock synchronization is realized on the PTN. Figure 6-1 Principles of SyncE The clock synchronization mechanism of SyncE is mature and reliable. It can meet timing interface metrics defined by International Telecommunications Union - Telecommunication Standardization Sector (ITU-T) G.832. In addition, it cannot be influenced by network load changes. However, because clock signals are transmitted along the clock link, SyncE requires all paths of the clock link to have the synchronous Ethernet feature. 6.1.2 IEEE 1588 v2 protocol (PTP) SyncE supports frequency synchronization only. However, the IEEE 1588v2 protocol supports both frequency synchronization and phase synchronization. Therefore, the IEEE 1588v2 protocol is widely used in the PTN and it is a development trend of clock synchronization technology. The IEEE 1588v2 protocol, also known as Precision Time Protocol (PTP), is used to synchronize clocks of all nodes throughout the precision synchronous distributed network. With the hardware and software, PTP can synchronize system clocks of network devices to the master clock of the network. It achieves clock accuracy in the nanosecond range. Compared with 10ms delay of PTN without being enabled with PTP, the one enabled with PTP improves clock synchronization indexes greatly. The RAX711-C supports working as the Transparent Clock (TC) device. Raisecom Proprietary and Confidential 107 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 6 Clock synchronization 6.2 Configuring clock synchronization based on SyncE 6.2.1 Preparing for configurations Scenario In the PTN, to communicate properly, the sender must put the pulse in the specified timeslot when sending the digital pulse signal and the receiver can extract the pulse from the specified timeslot. To realize this, you must resolve the synchronization problem. SyncE can perform clock synchronization in the PTN. Because it does not support phase synchronization but frequency synchronization only, SyncE is applied for the base station, fixed network TDM relay, leased clock network relay, and wireless base stations which have no requirement on phase synchronization, such as Global System for Mobile Communications (GSM) and Wideband Code Division Multiple Access (WCDMA). The RAX711-C supports selecting the optimum clock source automatically. You just need to configure clock source properties of SyncE. In addition, the RAX711-C supports selecting the specified clock source manually. Prerequisite N/A 6.2.2 Configuring clock source properties of SyncE Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#synce enable Enable SyncE. By default, SyncE is disabled. 3 Raisecom(config)#synce operation- Configure the working status of the SyncE. type { auto-select | forced-freerun | forced-holdover } By default, it is forced freerun. 4 Raisecom(config)#synce source (Optional) configure the SSM quality level of the { internal | interface { clock0 | SyncE clock source. interface-type interface-number } priority priority [ scr-id id ] [ quality-level level ] [ ring- outside ] 5 Raisecom(config)#synce ssm (Optional) enable SyncE SSM quality level to { standard | extend | disable } participate in selection of the clock source and [ transmit-threshold threshold ] configure the sending threshold. 6 Raisecom(config)#synce switch-mode Enable auto reverse mode of the SyncE clock source, { revertive [ wtr-time time ] | and configure the WTR time. non-revertive } By default, auto reverse mode is enabled. 7 Raisecom(config)#clock interface Configure the 2M clock mode. clock0 mode { digital [ sa sa ] | digital-crc [ sa sa ] | anolog } [ shutdown-threshold quality-level level ] Raisecom Proprietary and Confidential 108 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 6 Clock synchronization 6.2.3 Choosing clock source for SyncE manually Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#synce manual-source { internal | Switch the clock source interface { clock0 | interface-type interface- manually. number } } 3 Raisecom(config)#synce forced-source { internal | Switch the clock source interface { clock0 | interface-type interface- forcibly. number } } 4 Raisecom(config)# synce source { internal | interface Lock out the clock source. { clock0 | interface-type interface-number } priority priority lockout 6.2.4 Checking configurations No. Command Description 1 Raisecom#show synce Show global configurations of SyncE. 2 Raisecom#show synce source Show configurations of the SyncE clock source. 3 Raisecom#show synce ssm Show information about SyncE SSM. 6.3 Configuring PTP-based clock synchronization 6.3.1 Preparing for configurations Scenario SyncE supports frequency synchronization only. PTP supports both frequency synchronization and phase synchronization. Therefore, PTP is suitable for scenarios which have requirements on frequency synchronization and phase synchronization, such as clock synchronization of TD-SCDMA/CDMA200 base stations. Generally, the RAX711-C, as the TC device, can perform PTP clock synchronization with upstream and downstream devices when PTP clock synchronization is configured globally or on interfaces of the RAX711-C. Prerequisite N/A Raisecom Proprietary and Confidential 109 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 6 Clock synchronization 6.3.2 Configuring PTP Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ptp enable Enable global PTP. By default, global PTP is disabled. 3 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number 4 Raisecom(config-port)#ptp Enable PTP on an interface. enable By default, PTP is disabled on all interfaces. 6.3.3 Checking configurations No. Command Description 1 Raisecom#show ptp Show global/interface PTP configurations. Raisecom Proprietary and Confidential 110 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7 Network reliability This chapter describes principles and configuration procedures of network reliability, and provides related configuration examples, including the following sections:  Introduction  Configuring ELPS  Configuring ERPS  Configuring link aggregation  Configuring interface backup  Configuring link-state tracking  Configuration examples 7.1 Introduction Ethernet is widely used because of its simplicity, high-efficiency and low-cost features. For a long time, the reliability is one major factor that restricts the development of traditional Ethernet in Telecom network. The poor reliability is related to the packet feature of carried services and the mechanism of Ethernet. Traffics of packet services are transmitted in burst mode, which is difficult for maintain stable service traffic. As two significant features of Ethernet, the Statistical Time Division Multiplexing (STDM) technology and MAC address learning mechanism improve the utilization rate of channels and devices. However, they also bring uncertainty to service bandwidth and service paths. To enhance the reliability of Ethernet and to meet the requirements on the Telecom network, you can deploy specified reliability technology in the Ethernet. Network reliability technologies supported by the RAX711-C include link aggregation, interface backup, Ethernet Linear Protection Switching (ELPS), Ethernet Ring Protection Switching (ERPS), and link-state tracking. Raisecom Proprietary and Confidential 111 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7.1.1 ELPS Introduction Ethernet Linear Protection Switching (ELPS) is an end-to-end protection technology based on Automatic Protection Switching (APS) protocol of the ITU-TG.8031 recommendation. It is used to protect an Ethernet connection. It can be applied to various network structures, such as the ring network. APS packet is a kind of Connectivity Fault Management (CFM) packet. It is an APS packet when the OpCode value in the CFM packet is configured to 0x39. The outer structure of the APS packet is defined by the ITU-T Y.1731. Based on this, the G.8031 defines APS specific information by using 4 bytes. Figure 7-1 shows the structure of the APS packet. Figure 7-1 Structure of an APS packet As shown in Figure 7-1, the MEL field is inserted with the Maintenance Entity Group (MEG) level of the APS packet. For descriptions about the Version, OpCode, Flags, and END TLV, see ITU-T Y.1731 and their values are listed in Figure 7-1. Table 7-1 describes fields in the APS specific information. Table 7-1 Values of fields in APS specific information Field Value Description Request/State 1111 Lockout of protection (LO) with highest The request priority type, indicating the 1110 Signal fail for protection (SF-P) condition 1101 Forced switch (FS) signal, command 1011 Signal fail for working (SF-W) signal, and status signal 1001 Signal degradation (SD) of the protection 0111 Manual switch (MS) line. Priorities 0110 Depreciated of these 3 signals are 0101 Wait to restore (WTR) descending. 0100 Exercise (EXER) 0010 Reverse request (RR) 0001 Do not revert (DNR) Raisecom Proprietary and Confidential 112 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Field Value Description 0000 No request (NR) Others Reserved Protection A 0 No APS channel Four Type protection 1 APS channel types B 0 1+1 protection switching (with fixed identified by bridge) value 1 or 0 1 1:1 protection switching (with fixed bridge) D 0 Unidirectional protection switching 1 Bidirectional protection switching R 0 Non-revertive mode 1 Revertive mode Requested signal 0 No signal The local request 1 Normal service signals signals carried 2–255 Reserved by the protection line Bridged signal 0 No signal Signals of bridge 1 Normal service signals connection in 2–255 Reserved the protection line Reserved All 0 Reserved field. This filed should be ignored when being received. The G.8031 defines 1+1 protection switching and 1:1 protection switching. ELPS technology takes a simple, fast, and predictable mode to realize network resource switching, easier for Carrier to plan network more efficiently and learn network active status. ELPS protection switching modes As shown in Figure 7-2, ELPS supports 1+1 and 1:1 protection switching modes. Raisecom Proprietary and Confidential 113 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Figure 7-2 ELPS 1+1 and 1:1 protection switching modes 1+1 protection switching: each working line is assigned with a protection line. Generally, in the protection domain, the source end sends traffic through the working and protection lines while the destination end receives the traffic from one line. The destination end selects the working/protection line based on some pre-configured standard, such as the server failure indication. Services are switched to the protection line directly when the working line fails.  1:1 protection switching: each working line is assigned with a protection line. The source end sends traffic through the working/protection line. Generally, the source sends traffic through the working line. The protection line is a backup line. When the working line fails, the source end and destination end communicate through APS protocol to switch traffic to the protection line simultaneously. Based on whether the source end and destination end switch traffic simultaneously, ELPS is divided into unidirectional switching and bidirectional switching:  Unidirectional switching: as shown in Figure 7-3, when one direction of a line fails, one end can receive the traffic while the other end fails to receive the traffic. The end failing to receive the traffic detects a fault and switches the traffic. And the other end does not detect the fault and switch traffic. Therefore, both ends may receive the traffic through different lines. Figure 7-3 Unidirectional protection switching  Bidirectional switching: when a line fails, even in one direction, both ends communicate through APS protocol to switch traffic to the protection line. Therefore, both ends receive and send the traffic through the same line. 1+1 protection switching is divided into unidirectional switching and bidirectional switching. 1:1 protection switching supports bidirectional switching only. ELPS provides 3 modes to detect a fault. Raisecom Proprietary and Confidential 114 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability  Detect faults based on the physical interface status: learning link fault quickly and switching services immediately, suitable for detecting the fault between neighbor devices  Detect faults based on CFM: suitable for multi-device crossing detection  Detect faults based on the physical interface and CFM: sending Trap when detecting a fault on the physical link/CFM The RAX711-C supports 1:1 bidirectional protection switching, 1+1 bidirectional protection switching, and 1+1 unidirectional protection switching, and these 3 fault detection modes. 7.1.2 ERPS Introduction Ethernet Ring Protection Switching (ERPS) is a protection switching technology based on the Ring Automatic Protection Switching (R-APS) protocol of the ITU-TG.8032 recommendation. It is used in Ethernet rings. Generally, ERPS can avoid broadcast storm caused by data loopback in Ethernet rings. When a link/device on the Ethernet ring fails, traffic can be quickly switched to the backup link to ensure restoring services quickly. Similar to the ELPS APS packet, R-APS packet is a CFM packet, which is defined by the Y.1731 and G.8032. Figure 7-4 shows the structure of the R-APS packet. Figure 7-4 Structure of a R-APS packet Table 7-2 describes items in the R-APS specific information. Table 7-2 Fields in the R-APS specific information Field Value Description Request/State 1011 Signal fail. It is a R-APS packet which is sent by the node that detects the link fault. It is used to identify the local SF event. 0000 No request (NR), which is sent by the node that detects the link fault. It is used to identify that the generated SF event is cleared. Raisecom Proprietary and Confidential 115 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Field Value Description Others Reserved Status RB 0 The RPL is blocked. For all non RPL Owner nodes, the value is configured to 0. 1 The blocked RPL is released. DNF 0 FDB refresh by be triggered. 1 The FDB refresh is not trigged. Node ID – The MAC address of the node, which is unique. Reserved All 0 Reserved field. This filed should be ignored when being received. Filtering DataBase (FDB) clearing refers to removing MAC addresses of learned FDBs of the node. ERPS adopts advantages of multiple ring network technologies, such as Ethernet Automatic Protection Switching (EAPS), Resilient Packet Ring (RPR), Synchronous Digital Hierarchy (SDH), and STP. It is the newest mature standard of the Ethernet ring protection switching technology, providing the following functions:  Optimizing the detection mechanism  Detecting bidirectional faults  Support multi-network and multi-domain structures  Realizing 50ms protection switching performance  Supporting multiple working modes, such as primary-to-backup and load balancing modes ERPS uses the control VLAN in the ring network to transmit ring network control information. Meanwhile, combining with the topology feature of the ring network, it discovers link fault quickly and enable the backup link to restore service fast. Raisecom Proprietary and Confidential 116 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Related concepts Figure 7-5 ERPS ring network Related concepts of ERPS are shown as below:  Ring Protection Link (RPL): it is a link between RPL nodes. In normal status, the interface of the link is blocked to avoid a loopback. One Ethernet ring has a RPL only.  RPL Owner: it is a node connected to the RPL. It is specified by the user, used to block/release the RPL interface. In normal status, it blocks the RPL interface to avoid a loopback.  RPL Neighbor: it is the other node connected to the RPL. It cooperates with the RPL Owner to provide protection switching.  Control VLAN: it is an independent VLAN channel used by ERPS to carry R-APS packets. It is identical to the VLAN monitored in the CFM domain. In addition, the control VLAN ID can be identical to the service VLAN ID. Properties (level, domain name, MA name, and VLAN ID) of all CFM domains must be identical. Otherwise, ERPS ring fails to be established. During ERPS protection switching process, 3 timers are used.  Guard Timer: it is used to filter outdated R-APS packets to avoid error protection switching actions on the node. When the Guard Timer is running, received R-APS packets will be discarded.  WTR Timer: the WTR Timer on the RPL Owner begins to time when the working line recovers from a fault. In addition, a WTR running signal is output during the WTR Timer running process. Services are switched back to the working line when the WTR Timer times out. The WTR Timer is used to avoid frequent switching caused by unstable working line.  Holdoff Timer: it is used to coordinate other protection switching coexisting with the link protection. When one or more new faults are detected, the Holdoff Timer is triggered. During the Holdoff Timer running process, the system will detect the link status regardless of whether the fault that triggers the Holdoff Timer exists. The system will report the fault to ERPS if it exists. Raisecom Proprietary and Confidential 117 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Basic protection mechanism The G.8032 defines 5 states of the node on the Ethernet ring.  Idle state: the normal working state without no fault  Protection state: the state to which services are switched after a fault is detected. The APS process is triggered by the fault detected by the Continuity Check Message (CCM) of Ethernet Operation, Administration and OAM (OAM).  Pending state: the state before a fault is resolved  FS state: the state when a FS command is being applied  MS state: the state when a FS command is being applied To ensure the protection switching stability, the G.8032 defines a WTR timer. After the RPL Owner receives a fault recovery signal, services cannot be switched back to the working line after the WTR timer times out. Figure 7-6 and Figure 7-7 show the basic protection mechanism of ERPS. Figure 7-6 Idle status of Ethernet ring network As shown in Figure 7-6, when the Ethernet ring network is in idle state, links have the following features:  All nodes are connected to form a ring.  The ERPS protocol sends NR/RB signals continuously through the RPL Owner. The NR/RB signal indicates that no fault is generated. The RPL is blocked to avoid a loopback.  Connected nodes use the OAM CCM packet to monitor links.  When a fault is generated during on the Ethernet ring, the ERPS protocol uses the Y.1731 SF type to trigger protection switching. Raisecom Proprietary and Confidential 118 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Figure 7-7 Protection state of Ethernet ring network As shown in Figure 7-7, when a fault is detected, the system enables APS to enter the protection state.  After the Holdoff Timer times out, the node connected to the failed link blocks the link and sends the SF signal to notify other nodes of the fault. As shown in Figure 7-7, when the link between Nodes D and E fails, the Nodes D and E send the SF signal to other nodes respectively.  The SF signal triggers the RPL Owner to open the RPL interface and triggers all nodes to clear the FDB. And then the link enters the protection state. When a fault is recovered, the links performs fault recovery switching:  Nodes connected to the failed link are stilled blocked. After the Guard Timer times out. Nodes D and E send R-APS NR signals, which indicates no local fault request.  When receiving the first NR signal, the RPL Owner enables the WTR timer immediately.  After the WTR Timer times out. The RPL Owner blocks the RPL and sends the R-APS signal (NR/RB), which indicates no local fault request. The RPL link is blocked.  After receiving the R-APS signal (NR/RB), other nodes refresh the FDB. The Node sending the NR signal will stop sending the packet periodically and release the blocked interface.  All nodes on the link return to the idle state. Tributary ring The revision of the G.8032 provides the protection mechanism of Ethernet multi-ring. The tributary ring is an attached ring of the existing ring. It is connected with other rings/network through an interconnected node (node connecting multiple rings). The tributary ring is not closed. And interconnected node does not belong to the tributary ring. Raisecom Proprietary and Confidential 119 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Figure 7-8 Tributary ring model As shown in Figure 7-8, nodes B and C are interconnected nodes. The channel connecting the 2 interconnected nodes is called the R-APS virtual channel. The R-APS virtual channel is used for the intersecting node on the intersecting ring. If an intersection ring has a R-APS virtual channel, the main ring provides a virtual channel for APS packets of the tributary ring. It means that APS packets of the tributary ring will be transmitted to the main ring. Otherwise, the main ring does not provide a virtual channel for ARP packets of the tributary ring and APS packets of the tributary ring are terminated at the intersecting node. The main ring and tributary ring are taken as 2 rings. Each ring is configured with a RPL Owner. Protection switching of the multi-ring is similar to the one of the single ring. Each ring processes its own fault. When a shared link fails, the main ring is switched to the protection state while no action is performed on the tributary ring. 7.1.3 Link aggregation Introduction Link aggregation is a load balancing technology. With link aggregation, multiple physical Ethernet interfaces are combined to form a logical aggregation group. Multiple physical links in one aggregation group are taken as a logical link. Link aggregation helps share traffic among member interfaces in an aggregation group. These aggregated links can back up data for each other dynamically. In addition to effectively improving the reliability on links between devices, link aggregation can help gain greater bandwidth without upgrading hardware. For related protocols, see IEEE 802.3ad. Among Ethernet reliability technologies, link aggregation is the most widely-used and simplest one. Figure 7-9 Link aggregation As shown in Figure 7-9, RAX711-C A and RAX711-C B are connected through 2 Ethernet physical links. You can bind these 2 links to form a logical link Aggregation 1. This logical link has the following advantages: Raisecom Proprietary and Confidential 120 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability  Improving link reliability: members in the link aggregation group can back up data for each other dynamically. When a link fails, the other links can replace it to improve link reliability effectively.  Increasing link capacity: by binding multiple physical links, you can get greater bandwidth without upgrading the existing device. The capacity of a physical link equals to the sum capacity of all physical links.  Balancing load: traffic is distributed to different members based on some algorithm, to implement link-level load balancing.  Optimizing network management: member interfaces in a LAG are managed as a logical interface.  Saving IP addresses: only one IP address is required for a LAG without configuring IP addresses for member interfaces in the LAG. In link aggregation, multiple Ethernet interfaces are bound to a LAG. These Ethernet interfaces are called member interfaces and the logical interface is named as the Trunk interface. The number of LAGs supported by devices is different. In addition, the number of member interfaces supported by the LAG varies on the device. The RAX711-C supports up to 11 LAGs and each LAG supports up to 8 member interfaces. A LAG should contain 1–8 active interfaces. LACP Link Aggregation Control Protocol (LACP) is a protocol based on the IEEE 802.3ad. LACP communicates with the peer through Link Aggregation Control Protocol Data Unit (LACPDU). After being enabled with LACP, an interface notifies the peer of its system LACP priority, system MAC address, interface LACP priority, interface ID, and operation key by sending LACPDU to the peer. After receiving the LACPDU, the peer compares its information with the ones received by other interfaces to select an active interface. Therefore, both interfaces work in active mode. Member interfaces in a LAG are in 2 states: active and standby. Active interfaces can participate into forwarding user data while standby interfaces fails to do so. Each member interface in a LAG has an operation key, which indicates the aggregation capability of the member interface. The operation key is a configuration combination automatically generated by the LAG based on configurations of the interface (including the speed, duplex mode, Up/Down status, and basic configurations). The operation key will be re-calculated when any item in the configuration combination changes. Member interfaces in a LAG must have the identical operation key. Interface status Member interfaces in a LAG have two kinds of statuses:  Active status: send/receive LACP packets and forward user data. This kind of interfaces is called the LAG active interface.  Standby status: send/receive LACP packets, but does not forward user data. This kind of interfaces is called the LAG backup interface. The RAX711-C supports 11 LAGs. Each LAG supports up to 8 member interfaces. Link aggregation modes  Manual aggregation mode Raisecom Proprietary and Confidential 121 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability In this mode, multiple physical interfaces are added to a LAG to form a logical interface. Links connected to the logical interface share the traffic.  Static LACP aggregation mode It is a mode of the LACP. In this mode, you must enable LACP in advance. The Selection Logic of the LACP decides how to select the Trunk interface,  Dynamic LACP aggregation mode In this mode, you must enable LACP in advance. The system creates and deletes the LAG and member interfaces automatically. Interfaces cannot be aggregated dynamically unless the following requirements are met: – Basic configurations of interfaces are identical. – Speed and duplex configurations of interfaces are identical. – Interfaces are connected to the same device. – The peer interfaces meet these requirements. The RAX711-C supports manual aggregation and static LACP aggregation modes. Load balancing Load balancing is a cluster technology used to enhance the capability for processing services and ensure service reliability by sharing traffic among multiple devices/links. If an interface meets all requirements for an active interface, the interface will be the active interface of a LAG. Therefore, the interface can share traffic with other active ones based on the link aggregation load balancing mode or load balancing algorithm, The load balancing algorithm is realized by directly mapping or mapping based on the CRC Hash value of the MAC address. With different load balancing modes and their combination, interfaces can share traffic in a LAG. There are 6 load balancing modes:  Load balancing based on source MAC address  Load balancing based on destination MAC address  Load balancing based on XOR result of the source and destination MAC addresses  Load balancing based on source IP address  Load balancing based on destination IP address  Load balancing based on XOR result of the source and destination IP addresses Primary/Slave link aggregation The primary/slave link aggregation refers to a LAG consisting of two member interfaces which back up each other. One is in Active status while the other is in Standby status. Primary/Slave link aggregation is divided into manual primary/slave link aggregation and static LACP primary/slave link aggregation. The RAX711-C supports manual primary/slave link aggregation and static LACP primary/slave link aggregation. Raisecom Proprietary and Confidential 122 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7.1.4 Interface backup Introduction Interface backup refers to that two interfaces on a device work in primary/backup mode. Under normal conditions, the primary interface transmits services while the backup interface works as backup. When the primary interface or link fails and thus service transmission fails, the backup interface will work. In this way, network reliability is enhanced. In dual uplink networking, Spanning Tree Protocol (STP) is used to block the redundancy link and implement backup. Though STP can meet users' backup requirements, it fails to meet performance requirements. Though Rapid Spanning Tree Protocol (RSTP) is used, the convergence is second level only. This is poor performance for the high-end Ethernet device as the core of the carrier-grade network. Interface backup, targeted for dual uplink networking, implements backup and fast convergence. It is designed for the dual uplink networking application to ensure the performance and simplify configurations. You can achieve link redundancy by manually configuring interface backup when STP is disabled. Interface backup and STP cannot be concurrently enabled. Interface backup works based on an interface backup group which contains a primary interface and a backup interface, wherein:  The link with the primary interface is the primary link.  The link with the backup interface is the backup link. Under normal conditions, the primary link is in Standby status, and serves as backup. The primary or backup interface in the interface backup group can be a physical interface or a LAG interface. In the interface backup group, one interface is Up while the other is Standby. At any time, only one interface can be in forwarding status. When the forwarding interface is faulty, the backup interface can be transit to the forwarding status to resume the link. Raisecom Proprietary and Confidential 123 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Principles Figure 7-10 Principles of interface backup As shown in Figure 7-10, Line 1 and Line 2 on iTN A are connected to their uplink devices respectively. The interface forwarding status is as below:  Under normal conditions, Line 1 is the primary interface while Line 2 is the backup interface. Line 1 and its uplink device forward packets while Line 2 and its uplink device do not forward packets.  When Line 1 fails or the link between Line 1 and its uplink device fails, Line 2 and its uplink device forward packets.  When Line 1 restores normally and keeps Up for a period (restore-delay), Line 1 restores to forwarding packets and Line 2 restores to standby status. When a switching between the primary interface and backup interface occurs, the iTN A sends a Trap to the NView NNM system. By applying interface backup to different VLANs, you can make 2 interfaces forward packets simultaneously in different VLANs. As shown in Figure 7-11, by configuring a VLAN and adding interfaces to the VLAN, you can realize VLAN-based interface backup. Raisecom Proprietary and Confidential 124 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Figure 7-11 Principles of VLAN-based interface backup In different VLANs, interface forwarding status is shown as below:  Under normal conditions, in VLANs 1000–1500, Line 1 is the primary interface and Line 2 is the backup interface. In VLANs 1501–2000, Line 2 is the primary interface and Line 1 is the backup interface. Therefore, Line 1 forwards traffic of VLANs 1000–1500, and Line 2 forwards traffics of VLANs 1501–2000.  When Line 1 fails or the link between Line 1 and its uplink device fails, Line 2 forwards traffic of VLANs 1000–2000.  When Line 1 restores normally and keeps Up for a period (restore-delay), Line 1 forwards traffic of VLANs 1000–1500, and Line 2 forwards traffics of VLANs 1501– 2000. VLAN-based interface backup can be used for load balancing. In addition, it does not depend on configurations of the uplink device, thus facilitating operations. 7.1.5 Link-state tracking Link-state tracking provide an interface linkage scheme to expand the range of link backup. By monitoring the uplinks and synchronizing downlinks, the fault generated on the uplink device can be transmitted to downlink devices to trigger switching. This helps avoid traffic loss when downlink devices cannot sense faults of uplinks. As shown in Figure 7-12, Line 1 of iTN A is the primary interface and Line 2 is the backup interface. The upstream interfaces (Line 1 and Line 2) and downstream interface (Client 1) are added to a link-state group. When upstream interfaces fail, the downstream interface is in Down status. The downlink interface returns to Up status once one or both uplink interfaces recover. Therefore, the uplink link status is notified to the downstream devices immediately. Uplink interfaces work properly when the downlink interface fails. Figure 7-12 Interface-to-interface link-state tracking Raisecom Proprietary and Confidential 125 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7.2 Configuring ELPS 7.2.1 Preparing for configurations Scenario To make the Ethernet reliability reach telecom-grade (network self-healing time less than 50ms), you can deploy ELPS at Ethernet. ELPS is used to protect the Ethernet connection. It is an end-to-end protection technology. ELPS provides 3 modes to detect a fault.  Detect faults based on the physical interface status: learning link fault quickly and switching services immediately, suitable for detecting the fault between neighbor devices.  Detect faults based on CFM: suitable for multi-device crossing detection.  Detect faults based on the physical interface and CFM: sending Trap when detecting a fault on the physical link/CFM. Prerequisite  Connect interfaces and configure physical parameters for them. Make the physical layer Up.  Create the management VLAN and VLANs of the working and protection interfaces.  Configure CFM detection between devices (preparing for CFM detection mode). 7.2.2 Creating protection lines Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet Create the ELPS protection line and configure the protection mode. line-protection line-id working { interface-type The protection group is in non-revertive mode if you configure the interface-number vlan-id non-revertive parameter. protection interface-type  In revertive mode, when the working line recovers from a fault, interface-number vlan-id traffic is switched from the protection line to the working line. { one-to-one } [ non-  In non-revertive mode, when the working line recovers from a revertive ] protocol-vlan fault, traffic is not switched from the protection line to the vlan-id working line. 3 Raisecom(config)#ethernet (Optional) configure a name for the ELPS protection line. line-protection line-id name string 4 Raisecom(config)#ethernet (Optional) configure the WTR timer. In revertive mode, when the line-protection line-id working line recovers from a fault, traffic is not switched to the wtr-timer wtr-timer working line unless the WTR timer times out. By default the WTR time value is configured to 5min. We recommend that WTR timer configurations on both ends keep consistent. Otherwise, we cannot ensure 50ms quick switching. Raisecom Proprietary and Confidential 126 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step Command Description 5 Raisecom(config)#ethernet (Optional) configure the HOLDOFF timer. Hold-off timer line-protection line-id configurations on both ends should be consistent. hold-off-timer holdoff- timer By default, the HOLDOFF timer value is configured to 0. If the HOLDOFF timer value is over great, it may influence 50ms switching performance. Therefore, we recommend setting the HOLDOFF timer value to 0. 6 Raisecom(config)#ethernet (Optional) enable ELPS Trap. line-protection trap enable By default, ELPS Trap is disabled. 7.2.3 Configuring ELPS fault detection modes  Fault detection modes of the working line and protection line can be different. However, we recommend that fault detection mode configurations of the working line and protection line keep consistent.  When configuring end-to-end fault detection mode for the working/protection line, we do not recommend using the physical link detection mode if there are other devices along the link. We recommend using the CC fault detection mode. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet line- Configure the fault detection mode of the working protection line-id { working | line/protection line to failure-detect physical-link. protection } failure-detect physical-link By default, the fault detection mode is configured to failure- detect physical-link. Raisecom(config)#ethernet line- Configure the fault detection mode of the working protection line-id { working | line/protection line to failure-detect cc. protection } failure-detect cc [ md md-name ] ma ma-name level This fault detection mode cannot take effect unless you level mep local-mep-id remote- finish related configurations on CFM. mep-id Raisecom(config)#ethernet line- Configure the fault detection mode of the working protection line-id { working | line/protection line to failure-detect physical-link-or-cc. protection } failure-detect physical-link-or-cc [ md md- In this mode, it believes that the link fails when a fault is name ] ma ma-name level level detected on the physical link/CC. mep local-mep-id remote-mep-id This fault detection mode cannot take effect unless you finish related configurations on CFM. Raisecom Proprietary and Confidential 127 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7.2.4 (Optional) configuring ELPS switching control By default, traffic is automatically switched to the protection line when the working line fails. Therefore, you need to configure ELPS switching control in some special cases. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet line- Lock protection switching. After this protection line-id lockout configuration, the traffic is not switched to the protection line even the working line fails. 3 Raisecom(config)#ethernet line- Switch the traffic from the working line to the protection line-id force-switch protection line forcedly. 4 Raisecom(config)#ethernet line- Switch the traffic from the working line to the protection line-id manual-switch protection line manually. Its priority is lower than the one of forced switch and APS. 5 Raisecom(config)#ethernet line- In non-revertive mode, switch the traffic from protection line-id manual-switch-to-work the protection line to the working line. After you perform the MS-W operation (Traffic is switched from the protection line back to the working line.), if a fault/recovery event occurs or if other protection group commands, such as lockout, force-switch, or manual-switch, are executed, both ends of the protection group may select different lines. In this case, you should use the clear ethernet line-protection line-id end-to-end command command to delete configured protection group command to make both ends of the protection group select the identical line. 7.2.5 Checking configurations No. Command Description 1 Raisecom#show ethernet line-protection Show configurations of the protection line. [ line-id ] 2 Raisecom#show ethernet line-protection Show protection line statistics. [ line-id ] statistics 3 Raisecom#show ethernet line-protection Show APS information. [ line-id ] aps Raisecom Proprietary and Confidential 128 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7.3 Configuring ERPS 7.3.1 Preparing for configurations Scenario With development of Ethernet to Telecom-grade network, voice and video multicast services bring higher requirements on Ethernet redundant protection and fault-recovery time. The fault-recovery time of current STP system is in second level that cannot meet requirements. By defining different roles for nodes on a ring, ERPS can block a loopback to avoid broadcast storm in normal condition. Therefore, the traffic can be quickly switched to the protection line when working lines or nodes on the ring fail. This helps eliminate the loopback, perform protection switching, and automatically recover from faults. In addition, the switching time is shorter than 50ms. The RAX711-C supports the single ring, intersecting ring, and tangent ring. ERPS provides 2 modes to detect a fault:  Detect faults based on the physical interface status: learning link fault quickly and switching services immediately, suitable for detecting the fault between neighbor devices.  Detect faults based on CFM: suitable for unidirectional detection or multi-device crossing detection.  Detect faults based on the physical interface and CFM: sending Trap when detecting a fault on the physical link/CFM. Prerequisite  Connect interfaces and configure physical parameters for them. Make the physical layer Up.  Create the management VLAN and VLANs of the working and protection interfaces.  Configure CFM detection between devices (preparing for CFM detection mode). 7.3.2 Creating ERPS protection ring  Only one device on the protection ring can be set to the Ring Protection Link (RPL) Owner and one device is configured to RPL Neighbor. Other devices are configured to ring forwarding nodes.  In actual, the tangent ring consists of 2 independent single rings. Configurations on the tangent ring are identical to the ones on the common single ring. The intersecting ring consists of a main ring and a tributary ring. Configurations on the main ring are identical to the ones on the common single ring. For details about configurations on the tributary ring, see section 7.3.3 (Optional) creating ERPS protection tributary ring. Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 129 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step Command Description 2 Raisecom(config)#ethernet ring-protection Create a protection ring and set the node to ring-id east interface-type interface- the RPL Owner. number west interface-type interface- number node-type rpl-owner rpl { east | By default, there is no ERPS protection ring. west } ] [ not-revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlan-list ] The east and west interfaces cannot be the same one. Raisecom(config)#ethernet ring-protection Create a protection ring and set the node to ring-id east interface-type interface- the RPL Neighbour. number west interface-type interface- number node-type rpl-neighbour rpl { east | west } ] [ not-revertive ] [ protocol- vlan vlan-id ] [ block-vlanlist vlan- list ] Raisecom(config)#ethernet ring-protection Create a protection line and set the node to ring-id east interface-type interface- the protection forwarding node. number west interface-type interface- number [ not-revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlan-list ] 3 Raisecom(config)#ethernet ring-protection (Optional) configure a name for the ring-id name string protection ring. 4 Raisecom(config)#ethernet ring-protection (Optional) configure the G.8032 protocol ring-id version { 1 | 2 } version. By default, version 1 is available. 5 Raisecom(config)#ethernet ring-protection (Optional) after the ring Guard timer is ring-id guard-time guard-timer configured, the failed node does not process APS packets during a period. By default, the ring Guard timer is configured to 500ms. 6 Raisecom(config)#ethernet ring-protection (Optional) configure the ring WTR timer. In ring-id wtr-time minute revertive mode, when the working line recovers from a fault, traffic is not switched to the working line unless the WTR timer times out. By default, the ring WTR time value is configured to 5min. 7 Raisecom(config)#ethernet ring-protection (Optional) configure the ring HOLDOFF ring-id holdoff-time holdoff-timer timer. Hold-off timer configurations on both ends should be consistent. By default, the ring HOLDOFF timer value is configured to 0. If the ring HOLDOFF timer value is over great, it may influence 50ms switching performance. Therefore, we recommend setting the ring HOLDOFF timer value to 0. Raisecom Proprietary and Confidential 130 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7.3.3 (Optional) creating ERPS protection tributary ring  Only the intersecting ring consists of a main ring and a tributary ring.  Configurations on the main ring are identical to the ones on the single ring/tangent ring. For details, see section 7.3.2 Creating ERPS protection ring.  Configurations of non-intersecting nodes of the intersecting ring are identical to the ones on the single ring/tangent ring. For details, see section 7.3.2 Creating ERPS protection ring. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet ring- Create the tributary ring on the intersecting node protection ring-id east interface-type and set the intersecting node to the RPL Owner. interface-number west interface-type interface-number node-type rpl-owner By default, the protocol VLAN is configured to 1. rpl { east | west } ] [ not- Blocked VLANs range from 1 to 4094. revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlan-list ] The links between 2 intersecting nodes belong to the main ring. Therefore, when you configure the tributary ring on the intersecting node, you can only configure the west or east interface. Raisecom(config)#ethernet ring- Create the tributary ring on the intersecting node protection ring-id east interface-type and set the intersecting node to the RPL interface-number west interface-type Neighbour. interface-number node-type rpl- neighbour rpl { east | west } ] [ not- revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlan-list ] Raisecom(config)#ethernet ring- Create the tributary ring on the intersecting node protection ring-id east interface-type and set the intersecting node to the protection interface-number west interface-type forwarding node. interface-number [ not-revertive ] [ protocol-vlan vlan-id ] [ block- vlanlist vlan-list ] 3 Raisecom(config)#ethernet ring- (Optional) configure the tributary ring virtual protection ring-id raps-vc { with | channel mode on the intersecting node. without } By default, the tributary ring virtual channel adopts the with mode. Transmission modes on 2 intersecting nodes must be identical. 4 Raisecom(config)#ethernet ring- Enable the ring Propagate switch on the protection ring-id propagate enable intersecting node. By default, the ring Propagate switch is disabled. Raisecom Proprietary and Confidential 131 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7.3.4 Configuring ERPS fault detection modes Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet Configure the ERPS fault detection mode to failure-detect ring-protection ring-id physical-link. { east | west } failure- detect physical-link By default, the ERPS fault detection mode is configured to failure-detect physical-link. Raisecom(config)#ethernet Configure the ERPS fault detection mode to failure-detect cc. ring-protection ring-id { east | west } failure- This ERPL fault detection mode cannot take effect unless you detect cc [ md md-name ] ma finish related configurations on CFM. ma-name level level mep If you configure the MD, the MA should be below the local-mep-id remote-mep-id configured md-level. Raisecom(config)#ethernet Configure the ERPS fault detection mode to failure-detect ring-protection ring-id physical-link-or-cc. { east| west } failure- detect physical-link-or-cc In this mode, it believes that the link fails when a fault is [ md md-name ] ma ma-name detected on the physical link/CC. level level mep local-mep- This ERPL fault detection mode cannot take effect unless you id remote-mep-id finish related configurations on CFM. If you configure the MD, the MA should be below the configured md-level. 7.3.5 (Optional) configuring ERPS switching control By default, traffic is automatically switched to the protection line when the working line fails. Therefore, you need to configure ERPS switching control in some special cases. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet Switch the traffic on the protection ring to the west/east ring-protection ring-id force- interface forcedly. switch { east | west }  east: block the east interface.  west: block the west interface. 3 Raisecom(config)#ethernet Switch the traffic on the protection ring to the west/east ring-protection ring-id interface manually. Its priority is lower than the one of manual-switch { east | west } forced switch and APS. Raisecom Proprietary and Confidential 132 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability 7.3.6 Checking configurations No. Command Description 1 Raisecom)#show ethernet ring-protection Show ERPS protection ring configurations. [ ring-id ] 2 Raisecom)#show ethernet ring-protection Show ERPS protection ring status. [ ring-id ] status 3 Raisecom)#show ethernet ring-protection Show ERPS protection ring statistics. [ ring-id ] statistics 7.4 Configuring link aggregation 7.4.1 Preparing for configurations Scenario When needing to provide greater bandwidth and reliability for a link between two devices, you can configure manual or static LACP link aggregation. Prerequisite  Configure physical parameters of the interface and make the physical layer Up.  In a LAG, member interfaces that share loads must be identically configured. Otherwise, data cannot be forwarded properly. These configurations include QoS, QinQ, VLAN, interface properties, and MAC address learning. – QoS: traffic policing, traffic shaping, congestion avoidance, rate limiting, SP queue, WRR queue scheduling, WFQ queue, interface priority, and interface trust mode. – QinQ: QinQ status on the interface, added outer VLAN tag, policies for adding outer VLAN Tags for different inner VLAN IDs. – VLAN: the allowed VLAN, default VLAN, and the link type (Trunk, Hybrid, and Access) on the interface, and whether VLAN packets carry Tag. – Interface properties: speed, duplex mode, and link Up/Down status. – MAC address learning: MAC address learning status and MAC address limit. 7.4.2 Configuring manual link aggregation Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface port-channel Enter aggregation group configuration mode. channel-number 3 Raisecom(config-port-channelif)#mode Configure the working mode of the aggregation manual group to manual link aggregation. Raisecom Proprietary and Confidential 133 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step Command Description 4 Raisecom(config-port-channelif)#{ max- (Optional) configure the maximum/minimum active | min-active } links value number of active links of the LACP LAG. threshold By default, the maximum and minimum numbers of active links are configured to 4 and 1 respectively. 5 Raisecom(config-port-channelif)#load- (Optional) configuring the load balancing mode sharing mode { dst-ip | dst-mac | label of the LAG. By default, load sharing mode is | src-dst-ip | src-dst-mac | src-ip | configured to src-dst-mac, which means src-mac } selecting the forwarding interface according to the OR operation result of source MAC address and destination MAC address. 6 Raisecom(config-port-channelif)#exit Return to global configuration mode. 7 Raisecom(config)#interface interface- Enter interface configuration mode. type interface-number 8 Raisecom(config-port)#port-channel Add the interface to the aggregation group. channel-number 7.4.3 Configuring static LACP link aggregation Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#lacp system- (Optional) configure the system LACP priority. priority system-priority The smaller the value is, the higher the system LACP priority is. The end with a higher system LACP priority is the active end. LACP selects the active interface and standby interface based on configurations on the active end. If the system LACP priorities are identical, select the one with a smaller MAC address as the active end. By default, the system LACP priority is configured to 32768. 3 Raisecom(config)#lacp timeout (Optional) configure the LACP timeout mode. { fast | slow } By default, it is slow. 4 Raisecom(config)#interface port- Enter aggregation group configuration mode. channel channel-number 5 Raisecom(config-port- Configure the working mode of the aggregation group channelif)#mode lacp to static LACP link aggregation. 6 Raisecom(config-port- (Optional) configure the maximum/minimum number channelif)#{ max-active | min- of active links of the LACP LAG. active } links value threshold By default, the maximum and minimum numbers of active links are configured to 4 and 1 respectively. 7 Raisecom(config-port- Return to global configuration mode. channelif)#exit Raisecom Proprietary and Confidential 134 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step Command Description 8 Raisecom(config)#interface Enter interface configuration mode. interface-type interface-number 9 Raisecom(config-port)#port-channel Add the physical interface to the aggregation group. channel-number 10 Raisecom(config-port)#lacp mode (Optional) configure the LACP mode of member { active | passive } interfaces. By default, the LACP mode is configured to active. LACP connection fails if both ends of a link are in passive mode. 11 Raisecom(config-port)#lacp port- (Optional) configure the interface LACP priority. The priority port-priority interface LACP priority affects the selection of LACP default interface. The smaller the number is, the higher the priority is. By default, the system LACP priority is configured to 32768. 12 Raisecom(config-port)#exit Return to global configuration mode.  In a static LACP LAG, a member interface can be an active/standby one. Both the active interface and standby interface can receive and send LACPDU. However, the standby interface cannot forward user packets.  The system selects a default interface based on the following conditions in order: whether the neighbor is discovered, maximum interface rate, highest interface LACP priority, smallest interface ID. The default interface is in active status. Interfaces, which have the same rate, peer device, and operation key of the operation key with the default interface, are in active status. Other interfaces are in standby status. 7.4.4 Configuring manual backup link aggregation Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface port-channel Enter aggregation group configuration mode. channel-number 3 Raisecom(config-port-channelif)#mode Configure the working mode of the aggregation manual backup group to manual backup link aggregation. 4 Raisecom(config-port-channelif)#master- Configure the master interface of link port interface-type interface-number aggregation. 5 Raisecom(config-port- Configure the revertive mode and delay recovery channelif)#restore-mode { non-revertive time of the LAG. | revertive [ restore-delay second ] } By default, the revertive mode is configured to non-revertive. 6 Raisecom(config-port-channelif)#exit Return to global configuration mode. Raisecom Proprietary and Confidential 135 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step Command Description 7 Raisecom(config)#interface interface- Enter interface configuration mode. type interface-number 8 Raisecom(config-port)#port-channel Add interfaces to the LAG. channel-number 9 Raisecom(config-port)#exit Return to global configuration mode. 7.4.5 Configuring static LACP backup link aggregation Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#lacp system-priority (Optional) configure the system LACP priority. system-priority The smaller the value is, the higher the system LACP priority is. The end with a higher system LACP priority is the active end. LACP selects the active interface and standby interface based on configurations on the active end. If the system LACP priorities are identical, select the one with a smaller MAC address as the active end. By default, the system LACP priority is configured to 32768. 3 Raisecom(config)#lacp timeout { fast | (Optional) configure the LACP timeout mode. slow } 4 Raisecom(config)#interface port-channel Enter aggregation group configuration mode. channel-number 5 Raisecom(config-port-channelif)#mode Configure the working mode of the aggregation lacp [ backup ] group to static LACP backup link aggregation. 6 Raisecom(config-port-channelif)#master- Configure the master interface of link port interface-type interface-number aggregation. 7 Raisecom(config-port- Configure the revertive mode and delay recovery channelif)#restore-mode { non-revertive time of the LAG. | revertive [ restore-delay second ] } By default, the revertive mode is configured to non-revertive. 8 Raisecom(config-port-channelif)#exit Return to global configuration mode. 9 Raisecom(config)#interface interface- Enter interface configuration mode. type interface-number 10 Raisecom(config-port)#port-channel Add physical interfaces to the LAG. channel-number 11 Raisecom(config-port)#lacp mode (Optional) configure the LACP mode of member { active | passive } interfaces. By default, the LACP mode is configured to active. LACP connection fails if both ends of a link are in passive mode. Raisecom Proprietary and Confidential 136 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step Command Description 12 Raisecom(config-port)#lacp port- (Optional) configure the interface LACP priority. priority port-priority The interface LACP priority affects the selection of LACP default interface. The smaller the number is, the higher the priority is. By default, the system LACP priority is configured to 32768. 13 Raisecom(config-port)#exit Return to global configuration mode. 7.4.6 Checking configurations No. Command Description 1 Raisecom#show lacp Show local system LACP interface status, identifier, interface priority, internal management key, operation key, and interface status machine. 2 Raisecom#show lacp Show neighbor LACP information, including identifier, interface priority, neighbor device ID, Age, operation key ID, interface ID, and interface status machine. 3 Raisecom#show lacp Show interface LACP statistics, including total number of received LACP statistics packets, number of received and transmitted Marker packets, number of received and transmitted Marker Response packets, and number of error packets. 4 Raisecom#show lacp Show local system LACP global enabling status, device ID, LACP priority, sys-id and MAC address. 5 Raisecom#show Show whether the current system is enabled with link aggregation, link port-channel aggregation load-sharing mode, member interfaces and currently-active member interfaces in all current aggregation groups. Currently active member interfaces refers to interfaces in UP status in the aggregation group. 7.5 Configuring interface backup 7.5.1 Preparing for configurations Scenario Interface backup can realize redundancy backup and fast switching of primary and backup links, VLAN-based interface backup can realize load balancing among different interfaces. Interface backup ensures millisecond level switching and simplifies configurations. Raisecom Proprietary and Confidential 137 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Prerequisite  Create a VLAN.  Add interfaces to the VLAN. 7.5.2 Configuring basic functions of interface backup Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface- Enter interface configuration mode. type interface-number 3 Raisecom(config-port)#port backup Configure the interface backup group. interface-type interface-number [ vlanlist vlan-list ] 4 Raisecom(config-port)#port backup (Optional) configure the fault restoration mode restore-mode { non-revertive | and restore-delay. revertive [ restore-delay second ] } By default, the fault restoration mode is revertive, and the restore-delay is configured to 15s. 5 Raisecom(config-port)#exit Return to global configuration mode.  In an interface backup group, an interface cannot concurrently be the primary interface and backup interface.  In a VLAN, an interface/LAG is a member of only one interface backup group.  If you configure a LAG as a member of the interface backup group, you need to configure the interface with the smallest interface ID in the LAG as the member of the interface backup interface. When the member interface is in Up status, all interfaces in the aggregation group are in Up status. When the member interface is in Down status, all interfaces in the aggregation group are in Down status. 7.5.3 (Optional) configuring interface FS  After FS is successfully configured, the primary and backup links will be switched. The working link is switched to the protection link. For example, when both the primary and backup interfaces are in Up status, if the data is being transmitted through the primary link, data will be switched from the primary link to the backup link after forced switch is performed.  In the CLI, the backup interface ID is an optional parameter. If the primary interface is configured with multiple interface backup pairs, you should input the backup interface ID. Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 138 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step Command Description 2 Raisecom(config)#interface interface-type Enter interface configuration mode. interface-number 3 Raisecom(config-port)#port backup interface-type Configure FS to the backup link. backup-interface-number force-switch [ vlan vlan-id ] 7.5.4 Checking configurations No. Command Description 1 Raisecom#show port backup [ group ] Show status of interface backup. 7.6 Configuring link-state tracking 7.6.1 Preparing for configurations Scenario When the uplink of the middle device fails and the middle device fails to inform the downlink devices of the fault, the traffic cannot be switched to the backup line. This may cause traffic break. Link-state tracking is used to add the uplink interfaces and downlink interfaces of the middle device to a link-state group. In addition, it is used to monitor the uplink interfaces. When all uplink interfaces fail, downlink interfaces are in Down status. When one failed uplink interface recovers from the fault, all downlink interfaces are in Up status. Therefore, faults of the uplinks can be notified to the downlink devices in time. If downlink interfaces fail, uplink interfaces still work properly. Prerequisite Connect interfaces, configure physical parameters of the interfaces, and make the physical layer Up. 7.6.2 Configuring link-state tracking Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#link-state-tracking Create an interface-based link-state group. group group-number Raisecom(config)#link-state-tracking Create an MEP-based link-state group. group group-number upstream ma-name ma-name cfm-mepid mep-id level level Raisecom Proprietary and Confidential 139 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step Command Description Raisecom(config)#link-state-tracking Create an ELPS-based link-state group. group group-number upstream elps- 8031-link line-id 3 Raisecom(config)#interface interface- Enter physical layer interface configuration mode. type primary-interface-number 4 Raisecom(config-port)#link-state- Configure the link-state group for the interface and tracking group group-number the interface type. { upstream | downstream } 5 Raisecom(config-port)#exit Enable Trap sending for the link-state group. Raisecom(config)#link-state-tracking group group-number trap enable By default, it is disabled. 6 Raisecom(config)#link-state-tracking Configure the action taken for link-state tracking. group group-number action { delete- vlan vlan-id | flush-erps ring-id | suspend-vlan vlan-id } The action can be configured only when the fault source is MEP or ELPS. Raisecom(config)#interface interface- Configure the action taken for link-state tracking. type primary-interface-number Raisecom(config-port)#link-state- tracking group group-number action { block-vlanlist vlan-list | modify- The action can be configured only when the pvid vlan-id } fault source is an interface. 7.6.3 Checking configurations No. Command Description 1 Raisecom#show link-state-tracking group Show configurations of a link-state group. [ group-number ] 7.7 Configuration examples 7.7.1 Example for configuring manual link aggregation Networking requirements As shown in Figure 7-13, to improve the reliability of the link between RAX711-C A and RAX711-C B, you can configure manual link aggregation on RAX711-C A and RAX711-C B. Add Client interface 1 and Client interface 2 to a LAG to form a single logical interface. The LAG performs load balancing according to the source MAC address. Raisecom Proprietary and Confidential 140 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Figure 7-13 Configuring manual link aggregation Configuration steps Configuration procedures for RAX711-C A and RAX711-C B are identical. In this section, take configurations on RAX711-C A for example. Step 1 Create a manual LAG. Raisecom#hostname RAXA RAXA#config RAXA(config)#interface port-channel 1 RAXA(config-port-channel1)#mode manual RAXA(config-port-channel1)#exit Step 2 Add interfaces to the LAG. RAXA(config)#interface client 1 RAXA(config-client1)#port-channel 1 RAXA(config-port)#exit RAXA(config)#interface client 2 RAXA(config-client2)#port-channel 1 RAXA(config-client2)#exit Step 3 Configure the load-sharing mode of the LAG. RAXA(config)#interface port-channel 1 RAXA(config-port-channel1)#load-sharing mode scr-mac Checking results Use the show port-channel command to show global configurations on manual link aggregation. RAXA#show port-channel Raisecom Proprietary and Confidential 141 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Group 1 information: Mode : Manual Load-sharing mode : src-dst-mac MinLinks: 1 Max-links : 4 UpLinks : 0 Priority-Preemptive: Disable Member Port: client1 client2 7.7.2 Examples for configuring link-state tracking Networking requirements As shown in Figure 7-14, to enhance network reliability, RAX711-C B is connected to RAX711-C A and RAX711-C C through Link 1 and Link 2 respectively. Link 1 is the primary line and Link 2 is the backup line. Link 2 does not forward data unless Link 1 fails. RAX711-C A is connected upstream to the IP network in link aggregation mode. When all uplinks of RAX711-C A fail, RAX711-C A should inform RAX711-C B of the fault to switch the traffic to the backup line in time. Therefore, you need to deploy link-state tracking on RAX711-C A. Configure interface-based link-state tracking on Line interface 1 on RAX711-C A so that the RAX711-C A will block VLAN 10 upon uplink faults. Figure 7-14 Link-state tracking networking Configuration steps Step 1 Create a link-state group. Raisecom(config)#link-state-tracking group 1 Raisecom Proprietary and Confidential 142 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Step 2 Add uplink interfaces to the link-state group. Raisecom(config)#interface line 1 Raisecom(config-port)#link-state-tracking group 1 upstream Step 3 Add the downlink interface to the link-state group. Raisecom(config)#interface client 1 Raisecom(config-port)#link-state-tracking group 1 downstream Step 4 Configure the action taken for link-state tracking to blocking VLAN 10 of Line interface 1. Raisecom(config)#link-state-tracking group 1 action block-vlan 10 line 1 Checking results Use the show link-state-tracking group command to show configurations of the link-state group. Raisecom(config)#show link-state-tracking group 1 Link-state-tracking Group: 1 Trap State: disable UpStream Type: port UpStream PortList: line 1 Action Mode: block-vlan Action PortList: client 1 Action Vlan List: 10 Link-state-tracking State: normal Fault-type: port-shutdown 7.7.3 Example for configuring static LACP link aggregation Networking requirements As shown in Figure 7-15, to improve the reliability of the link between RAX711-C A and RAX711-C B, you can configure static LACP link aggregation on RAX711-C A and RAX711-C B. Add Client 1 and Client 2 to a LAG to form a logical interface. Raisecom Proprietary and Confidential 143 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Figure 7-15 Configuring static LACP link aggregation Configuration steps Step 1 Configure the static LACP LAG on RAX711-C A, and configure RAX711-C A to the active end. Raisecom#hostname RAXA RAXA#config RAXA(config)#lacp system-priority 1000 RAXA(config)#interface port-channel 1 RAXA(config-port-channel1)#mode lacp RAXA(config-port-channel1)#exit RAXA(config)#interface client 1 RAXA(config-client1)#port-channel 1 RAXA(config-client1)#lacp port-priority 1000 RAXA(config-client1)#lacp mode active RAXA(config-client1)#exit RAXA(config)#interface client 2 RAXA(config-client2)#port-channel 1 RAXA(config-client2)#lacp mode active RAXA(config-client2)#exit Step 2 Configure the static LACP LAG on RAX711-C B. Raisecom#hostname RAXB RAXB#config RAXB(config)#interface port-channel 1 RAXB(config-port-channel1)#mode lacp RAXB(config-port-channel1)#exit RAXB(config)#interface client 1 RAXB(config-client1)#port-channel 1 RAXB(config-client1)#exit RAXB(config)#interface client 2 RAXB(config-client2)#port-channel 1 RAXB(config-client2)#exit Raisecom Proprietary and Confidential 144 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 7 Network reliability Checking results Use the show port-channel command on RAX711-C A to show global configurations on static LACP link aggregation. RAXA#show port-channel 1 Group 1 information: Mode : Lacp Load-sharing mode : src-dst-mac MinLinks: 1 Max-links : 8 UpLinks : 0 Priority-Preemptive: Disable Member Port: client1 client2 Efficient Port: Raisecom Proprietary and Confidential 145 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM 8 OAM This chapter describes principles and configuration procedures of OAM, and provides related configuration examples, including the following sections:  Introduction  Configuring EFM  Configuring CFM  Configuring SLA  Configuring Y.1564  Maintenance 8.1 Introduction Initially, Ethernet is designed for LAN. Operation, Administration, and Maintenance (OAM) is weak because of its small size and a NE-level administrative system. With continuous development of Ethernet technology, the application scale of Ethernet in Telecom network becomes wider and wider. Compared with LAN, the link length and network size of Telecom network is bigger and bigger. The lack of effective management and maintenance mechanism has seriously obstructed Ethernet technology applying to the Telecom network. To confirm connectivity of Ethernet virtual connection, effectively detect, confirm, and locate faults on network, measure network utilization and network performance, and provide service according Service Level Agreement (SLA), implementing OAM on Ethernet has becoming an inevitable developing trend. 8.1.1 EFM Complying with IEEE 802.3ah protocol, Ethernet in the First Mile (EFM) is a link-level Ethernet OAM technology. It provides link connectivity detection, link fault monitoring, remote fault notification, and so on, for a link between two directly connected devices. EFM is mainly used for Ethernet links on edges of the network accessed by users. OAM mode and OAM discovery The Ethernet OAM connection process is the OAM discovery phase, where an OAM entity discovers a remote OAM entity and establishes a session with it. Raisecom Proprietary and Confidential 146 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM In the discovery phase, a connected Ethernet OAM entity (interface enabled with OAM) informs others of its Ethernet OAM configurations and Ethernet OAM capabilities supported by the local node by exchanging information OAM PDU. After the OAM entity receives parameters of the peer, it decides whether to establish OAM connection. If both ends agree on establishment of the OAM connection, Ethernet OAM protocol will work on the link layer. The RAX711-C can choose one of the following 2 modes to establish Ethernet OAM connection:  Active mode  Passive mode Only the OAM entity in active mode can initiate OAM connection while the OAM entity in passive mode just waits for connection request of the active OAM entity. After the OAM connection is established, both ends keep connected by exchanging information OAM PDU. If an OAM entity does not receive information OAM PDU within 5s, it believes that connection expires and connection re-establishment is required. OAM loopback OAM loopback occurs only after the Ethernet OAM connection is established. When connected, the active OAM entity initiates the OAM loopback command, and the peer OAM entity responds to the command. When the remote OAM entity is in loopback mode, all packets but OAM PDU packets are sent back. By observing the returned PAMPDU packets, the network administrator can judge the link performance (including packet loss ratio, delay, and jitter). Figure 8-1 OAM loopback As shown in Figure 8-1, Line interface 1 on RAX711-C A works in active mode. After the 802.3ah OAM connection between RAX711-C A and RAX711-C B is established, enable remote loopback on Client 1. The process for OAM loopback is as below: Step 1 RAX711-C A sends a Loopback Control OAM PDU packet with the Enable information to RAX711-C B, and waits for response. Step 2 After receiving the Loopback Control OAM PDU packet with the Enable information, RAX711-C B replies the Information OAM PDU packet to RAX711-C A, and enters the loopback state. Raisecom Proprietary and Confidential 147 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Step 3 After receiving the response, RAX711-C A sends a non-OAM PDU test packet to RAX711-C B. Step 4 After receiving a non-OAM PDU test packet, RAX711-C B sends it back to RAX711-C A. Stop OAM loopback as below: Step 1 If RAX711-C A needs to stop remote loopback, it sends a Loopback Control OAM PDU packet with the Disable information to RAX711-C B. Step 2 After receiving the Loopback Control OAM PDU packet with the Disable information, RAX711-C B exits from loopback state and sends an Information OAM PDU packet to RAX711-C A. You can troubleshoot the RAX711-C through loop detection in different phases. OAM events Detecting Ethernet failures is difficult, especially when the physical communication works properly while the network performance deteriorates slowly. A flag is defined in OAM PDU packet to allow an OAM entity to transmit fault information to the peer. The flag may stand for the following threshold events:  Link fault: signals from the peer are lost.  Dying gasp: an unpredictable event occurs, such as power failure.  Critical event: an uncertain critical event occurs. The RAX711-C does not support dying gasp and critical event detection. In the OAM connection, an OAM entity keeps sending Information OAM PDUs. The local OAM entity can inform the peer OAM entity of threshold events through Information OAM PDUs. In this way, the network administrator can learn the link state and take actions accordingly. The network administrator monitors Ethernet OAM through the Event Notification OAM PDU. When a link fails, the local OAM entity detects the failure, and actively sends Event Notification OAM PDU to the peer active OAM entity to inform the following threshold events. Therefore, the network administrator can dynamically master the network status through the link monitoring process.  Error frame event: the number of error frames exceeds the threshold in a time unit.  Error frame period event: the number of error frames exceeds the threshold in a period (specified N frames).  Error frame second event: the number of error frames in M seconds exceeds the threshold. The second when an errored frame is generated is called the erroed frame second.  Error symbol period event: the number of error symbols received in a period (monitor window) exceeds the threshold. If an error frame occurs in a second, the second is an error frame second. Raisecom Proprietary and Confidential 148 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Acquiring OAM MIB The RAX711-C learns the status and parameters of the peer link by acquiring link configurations/statistics on the peer through OAM. 8.1.2 CFM To extend the Ethernet technology application in the telecom-class network, the Ethernet needs to reach the same service level with the carrier-class transmission network. Connectivity Fault Management (CFM) solves this problem by providing the comprehensive OAM tools for the telecom-class Ethernet. CFM, a network-level Ethernet OAM technology, implements end-to-end connectivity fault detection, fault reporting, fault judgement, and fault positioning. It is used to diagnose fault actively for Ethernet Virtual Connection (EVC), provide cost-effective network maintenance solutions, and improve network maintenance through the fault management function. The RAX711-C provides CFM compatible with both ITU-Y.1731 and IEEE 802.1ag standards. CFM consists of following components:  MD Maintenance Domain (MD), also called Maintenance Entity Group (MEG), is a network that runs CFM. It defines network range of OAM management. MD has a level property, with 8 levels (level 0 to level 7). The bigger the number is, the higher the level is and the larger the MD range is. Protocol packets in a lower-level MD will be discarded after entering a higher- level MD. If no Maintenance association End Point (MEP) but a Maintenance association Intermediate Point (MIP) is in a high-level MD, the protocol can traverse the higher-level MD. However, packets in a higher-level MD can traverse lower-level MDs. In the same VLAN range, different MDs can be adjacent, embedded, but not crossed. As shown in Figure 8-2, MD 2 is in MD 1. Packets in MD 1 need to traverse MD 2. Configure MD 1 to be at level 6, and MD 2 to be at level 3. Then packets in MD 1 can traverse MD 2 and implement connectivity fault management of the whole MD 1. However, packets in MD 2 cannot diffuse into MD 1. In actual applications, MD 2 is a server layer while MD 1 is a client layer. Figure 8-2 MDs at different levels  MA Raisecom Proprietary and Confidential 149 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Maintenance Association (MA) is maintenance nodes collection in the MD. A MD can configure multiple MAs, and each MA is corresponding to one Service Instance. CFM packets can be transmitted between maintenance nodes that are in a same MA. One service instance corresponds to one service and is mapped to a group of VLANs. VLANs of different service instances cannot cross. Though a service instance can be mapped to multiple VLANs, one service instance can only use a VLAN for sending or receiving OAM packets. This VLAN is the master VLAN of the service instance.  MEP As shown in Figure 8-3, the MEP is an edge node of a service instance, confirming the range and edge of the MD. MEPs can be used to send and process CFM packets. The service instance and the MD where the MEP locates decide VLANs and levels of packets received and sent by the MEP. For any device that runs CFM in the network, the MEP is called local MEP. For MEPs on other devices of the same service instance, they are called Remote Maintenance association End Points (RMEP). Multiple MEPs can be configured in a service instance. As for the packets, sent from the MEP in a service instance, with the same S-VLAN TAG, priority, and C-VLAN TAG, the MEP can receive the OAM packet sent from other MEP in a same service instance, and forward higher- level packets. Figure 8-3 MEP and MIP  MIP As shown in Figure 8-3, the MIP is the internal node of a service instance, which is automatically created by the device. MIP cannot actively send CFM packets but can process and response to Link Trace Message (LTM) and LoopBack Message (LBM) packets.  MP MEP and MIP are called Maintenance Point (MP). CFM provides the following OAM functions:  Fault detection (Continuity Check, CC) The function is realized by periodically sending Continuity Check Messages (CCMs). One MEP sends CCM and other MEPs in the same service instance can verify the RMEP status when receiving this packet. If MEPs cannot properly receive CCMs sent by RMEPs during Raisecom Proprietary and Confidential 150 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM 3.5 CCM intervals or CCMs have errors checked by CC, it is believed that the link fails. Then a fault Trap will be sent according to configured alarm priority.  Fault acknowledgement (LoopBack, LB) This function is used to verify the connectivity between two MPs through the source MEP sending LoopBack Message (LBM) and the destination MP sending LoopBack Reply (LBR). After checking the fault, the administrator manually confirms whether the fault occurs or not to prevent misinformation. The source MEP sends a LBM to certain destination MP who needs to acknowledge a fault. When receiving the LBM, the destination MP sends a LBR to the source MEP. If the source MEP receives this LBR, it is believed that the route is reachable. Otherwise, a connectivity fault occurs.  Fault location (LinkTrace, LT) The source MEP sends LinkTrace Message (LTM) to the destination MP and all MPs on the LTM transmission route will send a LinkTrace Reply (LTR) to the source MEP. By recording valid LTR and LTM, this function can be used to locate faults.  Alarm Indication Signal (AIS) This function is used to inhibit alarms when a fault is detected at the server layer (sub-layer). When detecting a fault, the MEP (including the server MEP) sends an AIS frame to the client MD. By transmitting ETH-AIS frames, the device can inhibit or stop an alarm on MEP (or server MEP). When receiving an AIS frame, the MEP must inhibit alarms for all peer MEPs regardless of connectivity, because this frame does not include information about MEPs that are at the same level with the failed MEP. With AIS, the device can inhibit the alarm information at client level when the server layer (sub-layer) fails. Therefore, the network is easy for maintenance and management.  Ethernet lock signal (Lock, LCK) This function is used to notify managed lock and service interruption of server layer (sub- layer) MEPs. The data traffic is sent to a MEP that expects to receive it. This function helps the MEP that receives ETH-LCK frame to identify a fault. It is a managed lock action for server layer (sub-layer) MEP. Lock is an optional OAM management function. One typical scenario for applying this function is to perform detection when services are interrupted. In general, CFM is an end-to-end OAM technology at the server layer. It helps reduce operation and maintenance cost. In addition, it improves the competitiveness of service providers. 8.1.3 SLA Service Level Agreement (SLA) is an agreement between users and a service provider about the service quality, priority, and responsibility. It is a telecommunication service evaluating standard negotiated by the service provider and users. In technology, SLA is a real-time network performance detection and statistic technology, which can collect statistics on responding time, network jitter, delay, packet loss ratio, and so on. SLA can be used to monitor related metrics by selecting different tasks for different applications. Basic concepts involved in SLA are as below:  Operation Raisecom Proprietary and Confidential 151 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM It is a static concept. It is a point-to-point SLA network performance test task, including Layer 2 network delay/jitter test (y1731-echo/y1731-jitter).  Test It is a dynamic concept. It is used to describe an execution of one operation.  Detection It is a dynamic concept. It is used to describe a procedure for sending-receiving detection packets in a test. According to the definition of operation, one test can contain multiple detections (For an Echo operation, one test contains one detection only).  Scheduling It is a dynamic concept. It is used to describe a scheduling of one operation. One scheduling contains multiple periodical tests. The RAX711-C supports SLA operations based on RFC2544, with measurement indexes including the latency, frame loss rate, and throughput. It supports measurement based on Ethernet networking. It can work as an initiator or loopback node of the test. 8.1.4 Y.1564 Introduction In Ethernet tests, RFC2544 measures performances of interconnected devices in extreme conditions, and it can test only one measurement index at a time. As various Ethernet services are deployed worldwide, the traditional RFC2544 tests cannot meet users' requirements on Ethernet service tests, it takes a long time, and it interrupts services, which are obvious disadvantages. ITU-T Y.1564, defined by ITU-T, by overcoming these disadvantages, becomes a standard for configuring Ethernet services and measuring performances. ITU-T Y.1564, also called Ethernet Service Activation Measurement (EtherSAM), is a method for measuring activation of Ethernet services. It can verify all SLA parameters through one single test and guarantees that the network can provide optimized QoS. Compared with RFC2544, ITU-T Y.1564 has the following enhanced features:  Support concurrent test of multiple services.  Support the online test. Raisecom Service Activation Measurement (RCSAM), developed by Raisecom on the basis of ITU-T Y.1564, is a module used to measure whether the network meets SLA requirements. RCSAM test types RCSAM consists of two phases: service configuration test and service performance test. It can guarantee that each service flow is correctly configured and transmitting the service flow to the user is qualified.  Service configuration test: this test is used to verify correctness of service configurations. Before a service is activated, a test flow is generated based on features of the service and is used to test whether network configurations meet service SLA requirements. During test, each service must be independently tested. The service configuration test is divided into 6 steps by the size of the test flow. Each step lasts 1s to 60s, covering rate, frame loss rate, latency, and jitter. The size of the test flow is as below: – 25% ×CIR Raisecom Proprietary and Confidential 152 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM – 50% ×CIR – 75% ×CIR – 100% × CIR – CIR + EIR – CIR + 125% × EIR  Service performance test: this test is used to measure the performance of the service and thus guarantee the quality of the service during a long period. It supports concurrent test of multiple services. All services during the test must be configured with the same CIR and start test as triggered at the same time. All key indexes of each service must be measured, such as Information Rate (IR), Frame Time Delay (FTD), Frame Delay Variation, (FDV), and Frame Loss Rate (FLR). RCSAM scenario RCSAM is applied in the following three test scenarios:  Roundtrip: as shown in Figure 8-4, the local device is enabled with Y.1564 while the remote device is enabled with loopback. However, this scenario may not be accurate enough because the test result will be affected by the policy of the device with the lower device if both devices are configured with a policy. Figure 8-4 Roundtrip test scenario  One-way: both devices are enabled with Y.1564. The test is unidirectional. Namely, the local device sends packets while the remote device receives packets. In this case, clock synchronization must be considered. We recommend using IEEE 1588 to make the test more accurate.  Bidirectional: both devices are enabled with Y.1564. The test is targeted for EtherSAM in each direction to locate the fault in configuration or poor performance in a direction. At present, the RAX711-C supports the Roundtrip test only. 8.2 Configuring EFM 8.2.1 Preparing for configurations Scenario Deploying EFM between directly-connected devices can effectively improve the management and maintenance capability of Ethernet links and ensure normal operation of the network. Raisecom Proprietary and Confidential 153 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Prerequisite Connect interfaces and configure physical parameters of interfaces. Make the physical layer Up. 8.2.2 Configuring EFM basic functions Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#oam send- (Optional) configure the OAM PDU delivery period and timeout. period period-number timeout time By default, the OAM PDU delivery time is configured to 1s (the period-number parameter is configured to 10; 10 × 100ms = 1s) and the timeout is configured to 5s. 3 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface- number 4 Raisecom(config-port)#oam Configure the working mode of EFM. { active | passive } By default, the RAX711-C works in passive mode. 5 Raisecom(config-port)#oam Enable EFM OAM of the link. enable By default, it is disabled. 8.2.3 Configuring EFM active functions EFM active functions can be configured when the RAX711-C is in active mode. (Optional) configuring RAX711-C to initiate EFM remote loopback  You can discover network faults in time by periodically detecting loopbacks. By detecting loopbacks in segments, you can locate exact areas where faults occur and you can troubleshoot these faults.  When a link is in the loopback status, the RAX711-C returns all packets but OAM packets received by the link to the peer. At this time, the user data packet cannot be forwarded properly. Therefore, disable this function immediately when detection is not required. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#oam Enable the physical interface to initiate remote loopback. remote-loopback Raisecom Proprietary and Confidential 154 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Step Command Description 4 Raisecom(config-port)#oam (Optional) configure the timeout for the physical interface loopback timeout time to initiate remote loopback. By default, it is 3s. 5 Raisecom(config-port)#oam (Optional) configure the retry times for the physical loopback retry times interface to initiate remote loopback. By default, it is 2 times. (Optional) viewing current variable values of peer device By getting the current variable values of the peer, you can get current link status. IEEE 802.3 Clause 30 defines and explains supported variables and their denotation gotten by OAM in details. The variable takes Object as the maximum unit. Each object contains Package and Attribute. A package contains several attributes. Attribute is the minimum unit of a variable. When an OAM variable is obtained, object, package, branch, and leaf description of attributes are defined by Clause 30 to describe requesting object, and the branch and leaf are followed by variable to denote object responds variable request. The RAX711-C supports getting OAM information and interface statistics. Peer variable cannot be obtained unless EFM connection is established. Step Command Description 1 Raisecom#show oam peer oam-info [ interface-type Show OAM basic information interface-number ] about the peer device. Raisecom#show oam peer [ interface-type interface- number ] 8.2.4 Configuring EFM passive functions The passive functions of EFM can be configured regardless of the RAX711-C is in active or passive mode. (Optional) configuring device to respond to EFM remote loopback The peer EFM remote loopback will not take effect until the remote loopback response is configured on the local device. Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 155 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Step Command Description 2 Raisecom(config)#inte Enter physical layer interface configuration mode. rface interface-type interface-number 3 Raisecom(config- Configure the Layer 2 physical interface to ignore/respond to EFM port)#oam loopback remote loopback sent by the peer device. { ignore | process } By default, the Layer 2 physical interface ignores EFM remote loopback. 8.2.5 Configuring link monitoring and fault indication (Optional) configuring OAM link monitoring OAM link monitoring is used to detect and report link errors in different conditions. When detecting a fault on a link, the RAX711-C provides the peer with the generated time, window, and threshold, and so on, by OAM event notification packets. The peer receives event notification and reports it to the NView NNM system through SNMP Trap. Besides, the local device can directly report events to the NView NNM system through SNMP Trap. By default, the system sets default value for error generated time, window, and threshold. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface- number 3 Raisecom(config-port)#oam Configure the monitor window and threshold for an error frame errored-frame window event. framewindow threshold framethreshold By default, the monitor window is configured to 1s and the threshold is configured to 1 error frame. 4 Raisecom(config-port)#oam Configure the monitor window and threshold for an error frame errored-frame-period window period event. frameperiodwindow threshold frameperiodthreshold By default, the monitor window is configured to 1000ms and the threshold is configured to 1 error frame. 5 Raisecom(config-port)#oam Configure the monitor window and threshold for an error frame errored-frame-seconds seconds event. window framesecswindow threshold By default, the monitor window is configured to 60s and the framesecsthreshold threshold is configured to 1s. 6 Raisecom(config-port)#oam Configure the monitor window and threshold for an error errored-symbol-period symbol event. window symperiodwindow threshold By default, the monitor window is configured to 1s and the symperiodthreshold threshold is configured to 1 error frame. Raisecom Proprietary and Confidential 156 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM (Optional) configuring OAM fault indication Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface- Enter physical layer interface configuration type interface-number mode. 3 Raisecom(config-port)#oam notify Enable OAM notification of fault information { critical-event | dying-gasp | errored- and OAM link events. frame | errored-frame-period | errored- frame-seconds | errored-symbol-period } By default, OAM notification of all links is enable enabled. 4 Raisecom(config-port)#oam event trap Enable OAM Trap of local OAM link events. enable By default, it is disabled. 5 Raisecom(config-port)#oam peer event Enable OAM Trap of peer OAM link events. trap { enable | disable } By default, it is disabled. 8.2.6 Checking configurations No. Command Description 1 Raisecom#show oam [interface-type interface- Show configurations of OAM basic number ] functions. 2 Raisecom#show oam event [interface-type Show local OAM link events. interface-number ] [ critical ] 3 Raisecom#show oam loopback [interface-type Show configurations of OAM remote interface-number ] loopback. 4 Raisecom#show oam notify [interface-type Show configurations of OAM notification. interface-number ] 5 Raisecom#show oam peer oam-info [ interface- Show basic information about the OAM type interface-number ] peer. 6 Raisecom#show oam peer event [interface-type Show information about OAM peer events. interface-number ] [ critical ] 7 Raisecom#show oam peer link-statistic Show statistics on peer OAM link. [interface-type interface-number ] 8 Raisecom#show oam statistics [interface-type Show OAM statistics. interface-number ] 9 Raisecom#show oam trap [interface-type Show information about OAM Trap. interface-number ] Raisecom Proprietary and Confidential 157 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM 8.3 Configuring CFM 8.3.1 Preparing for configurations Scenario To expand application of Ethernet technologies at a Telecom-grade network, the Ethernet must ensure the same QoS as the Telecom-grade transport network. CFM solves this problem by providing overall OAM tools for the Telecom-grade Ethernet. CFM can provide following OAM functions:  Fault detection (Continuity Check, CC)  Fault acknowledgement (LoopBack, LB)  Fault location (LinkTrace, LT)  Alarm Indication Signal (AIS)  Ethernet lock signal (Lock, LCK)  Client Signal Fail (CSF) Prerequisite  Connect interfaces and configure physical parameters of the interfaces. Make the physical layer Up.  Create a VLAN.  Add interfaces to the VLAN. 8.3.2 Enabling CFM  CFM fault detection and CFM fault location functions cannot take effect until the CFM is enabled.  To enable CFM on an interface, you need to enable global CFM in global configuration mode and then enable CFM on the interface.  When global CFM is disabled, it does not affect enabling/disabling EFM on the interface.  Ethernet LM cannot take effect unless CFM is enabled on the ingress interface of the service packet and MEP-related interfaces.  CFM is configured in physical layer interface configuration mode only. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet cfm enable Enable global CFM. By default, it is disabled. 3 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number 4 Raisecom(config-port)#ethernet cfm Enable CFM on the physical interface. enable By default, it is disabled. Raisecom Proprietary and Confidential 158 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM 8.3.3 Configuring CFM basic functions Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet cfm mode Configure the CFM working mode. { master | slave } By default, it is in slave mode. 3 Raisecom(config)#ethernet cfm domain Create a MD. [ md-name domain-name ] level md-  If a MD name is assigned by the md-name level parameter, it indicates that the MD is in 802.1ag style. And all MAs and CCMs in the MD are in 802.1ag style.  If a MD name is not assigned, the MD is in Y.1731 style and all MAs and CCMs in the MD are in Y.1731 style.  Support configuring Y.1731 and 802.1ag CFM concurrently.  If the MD name is specified, it must be globally unique.  Levels of different MDs must be different. 4 Raisecom(config)#service csi-id Create a service instance and enter service instance level md-level configuration mode. 5 Raisecom(config-service)#service Configure the VLAN related to the MA. vlan-list vlan-list [ primary vlan- id ] 6 Raisecom(config-service)#service mep Configure the MEP based on the service instance. [ up | down ] mpid mep-id Before configuring MEP, relating the service [ interface-type interface-number ] instance to the VLAN. Configure the MEP in physical layer interface configuration mode. 7 Raisecom(config-service)#service Add static remote MEP of the service instance remote-mep mep-list interface-type manually. interface-number 802.1ag down MEP needs to manually add the remote MEP and specify the interface. It fails to find the remote MEP automatically. 8 Raisecom(config-service)#service Enable alarm inhibition. suppress-alarms enable mep { mep- list | all } By default, it is enabled. Raisecom Proprietary and Confidential 159 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM 8.3.4 Configuring fault detection Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet cfm errors (Optional) configure the archive-hold time of error archive-hold-time minutes CCMs. By default, it is 100min. 3 Raisecom(config)#service csi-id level Enter service instance configuration mode. md-level 4 Raisecom(config-service)#service cc (Optional) configure the delivery period of CCMs. interval { 3ms | 10ms | 100ms | 1 | 10 | 60 | 600 } 5 Raisecom(config-service)#service cc Enable MEP to send CCMs. enable mep { mep-list | all } 6 Raisecom(config-service)#service (Optional) configure the CVLAN of the MA. cvlan vlan-id 7 Raisecom(config-service)#service (Optional) configure the priority of CFM OAM priority priority packets. By default, it is 7. 8.3.5 Configuring fault acknowledgement Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#service csi-id level md- Enter service instance configuration level mode. 3 Raisecom(config-service)#ping mac-address Perform Layer 2 Ping for acknowledging [ count count-number ] [ size size ] faults. [ source mep-id ] [ timeout time ] [ padding { null | null-crc | prbs | prbs- By default, 5 LBMs are sent. The TLV crc } ] [ cos cos-value ] [ non-drop ] length of a packet is configured to 64. The RAX711-C automatically looks for Raisecom(config-service)#ping mep mep-id an available source MEP. [ ttl ttl ] [ count count-number ] [ size size ] [ source mep-id ] [ timeout time ] [ padding { null | null-crc | prbs | prbs- crc } ] [ cos cos-value ] [ non-drop ] To perform Ping MEP operation, 802.1ag down MEP needs to be configured with the static remote MAC address. 4 Raisecom(config-service)#ping ethernet Perform Layer 2 multicast Ping for multicast [ size size ] [ timeout time ] acknowledging faults. [ padding { null | null-crc | prbs | prbs- crc } ] [ cos cos-value ] [ non-drop ] Raisecom Proprietary and Confidential 160 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM  Before executing this command, you must ensure that global CFM is enabled. Otherwise, the Ping operation fails.  If there is no MEP in a service instance, Ping operation will fail because of failing to find source MEP.  Ping operation will fail if the specified source MEP is invalid. For example, the specified source MEP does not exist or CFM is disabled on the interface where the specified source MEP is.  Ping operation will fail if the Ping operation is performed based on the specified destination MEP ID and the MAC address of destination is not found based on the MEP ID.  Ping operation will fail if other users are using the specified source MEP to perform Ping operation.  To perform LB, you must enable global Ethernet CFM and AC-side CFM if a service instance is associated with emulated Ethernet PW. 8.3.6 Configuring fault location Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#service csi-id Enter service instance configuration mode. level md-level 3 Raisecom(config- Perform Layer 2 Traceroute for locating faults. service)#traceroute mac-address [ ttl ttl ] [ source mep-id ] By default, the TLV length of a packet is configured to [ size packet-size ] 64. The RAX711-C automatically looks for an Raisecom(config- available source MEP. service)#traceroute mep mep-id [ ttl ttl ] [ source mep-id ] [ interface-mode ] [ timeout To perform Traceroute MEP operation, 802.1ag time ] [ size packet-size ] down MEP needs to be configured with the static remote MAC address. 4 Raisecom(config-service)#exit (Optional) enable LinkTrace cache. Raisecom(config)#ethernet cfm When LinkTrace cache is enabled, you can use the traceroute cache enable show ethernet cfm traceroute cache command to learn the routes discovered through the cache storage protocol. When LinkTrace cache is disabled, the result will be automatically erased by the traceroute command. By default, LinkTrace cache is disabled. 5 Raisecom(config)#ethernet cfm (Optional) configure the hold time of data in the traceroute cache { hold-time LinkTrace cache and LinkTrace cache size. minute | size size } By default, the hold time is configured to 100min and the LinkTrace cache size is configured to 100. Raisecom Proprietary and Confidential 161 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM  Before executing this command, you must ensure that global CFM is enabled. Otherwise, the Traceroute operation fails.  If there is no MEP in a service instance, Traceroute operation will fail because of failing to find source MEP.  Traceroute operation will fail if the specified source MEP is invalid. For example, the specified source MEP does not exist or CFM is disabled on the interface where the specified source MEP is.  Traceroute operation will fail if the Ping operation is performed based on the specified destination MEP ID and the MAC address of destination is not found based on the MEP ID.  If the CC feature is invalid, you can ensure Layer 2 Traceroute operation works normally by configuring static RMEP and specifying MAC address.  Traceroute operation will fail if other users are using the specified source MEP to perform Traceroute operation. 8.3.7 Configuring AIS Configuring AIS on server-layer devices Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet cfm domain Create a MD. [ md-name domain-name ] level md- level 3 Raisecom(config)#service csi-id Enter service instance configuration mode. level md-level 4 Raisecom(config-service)#service ais Configure the level of the MD to which AIS is sent. level md-level The MD level must be higher than the service instance level. 5 Raisecom(config-service)#service ais (Optional) configure the AIS delivery period. By period { 1 | 60 } default, the AIS delivery period is configured to 1s. 6 Raisecom(config-service)#service ais Enable AIS delivery. enable By default, AIS delivery is disabled. Configuring AIS on client-layer devices Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet cfm domain [ md- Create a MD. name domain-name ] level md-level Raisecom Proprietary and Confidential 162 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Step Command Description 3 Raisecom(config)#service csi-id level md- Enter service instance configuration mode. level 4 Raisecom(config-service)#service suppress- Enable alarm inhibition. alarms enable mep { mep-list | all } By default, alarm inhibition is enabled. 8.3.8 Configuring LCK Configuring LCK on server-layer devices Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet cfm domain Create a MD. [ md-name domain-name ] level md- level 3 Raisecom(config)#service csi-id level Enter service instance configuration mode. md-level 4 Raisecom(config-service)#service lck Configure the level for sending the LCK packet. level md-level [ vlan vlan-id ] The level must be higher than the service instance level. By default, use the level of the MIP, which is higher than the MEP level, to send the LCK packet. 5 Raisecom(config-service)#service lck (Optional) configure the LCK packet delivery period { 1 | 60 } period. By default, the LCK packet delivery period is configured to 1s. 6 Raisecom(config-service)#service lck Configure the MEP to send the LCK packet. start mep { mep-list | all } By default, the MEP does not send the LCK packet. Configuring LCK on client-layer devices Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet cfm domain [ md- Create a MD. name domain-name ] level md-level 3 Raisecom(config)#service csi-id level md- Enter service instance configuration mode. level 4 Raisecom(config-service)#service suppress- Enable alarm inhibition. alarms enable mep { mep-list | all } By default, alarm inhibition is enabled. Raisecom Proprietary and Confidential 163 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM 8.3.9 Configuring CSF Configuring LCK on server-layer devices Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#ethernet cfm Create a MD. domain [ md-name domain-name ] level md-level 3 Raisecom(config)#service csi-id Enter service instance configuration mode. level md-level 4 Raisecom(config-service)#service (Optional) configure the CSF packet delivery period. csf period { 1 | 60 } By default, the CSF packet delivery period is configured to 1s. 5 Raisecom(config-service)#service Enable the MEP to send the LCK packet. csf enable mpid mep-id 6 Raisecom(config-service)#service (Optional) enable CSF Trap. csf trap enable 8.3.10 Checking configurations No. Command Description 1 Raisecom#show cfm csf Show CSF information. 2 Raisecom#show ethernet cfm Show CFM global configurations. 3 Raisecom#show ethernet cfm ais [ level md- Show AIS information. level ] [ source ] 802.1ag MDs do not support AIS. 4 Raisecom#show ethernet cfm domain [ level Show MD configurations. md-level ] 5 Raisecom#show ethernet cfm errors [ level Show error CCM information. md-level ] 6 Raisecom#show ethernet cfm lck [ level md- Show LCK information. level ] [ source ] 802.1ag MDs do not support LCK. 7 Raisecom#show ethernet cfm local-mp Show local MEP configurations. [ interface interface-type interface- number ] Raisecom#show ethernet cfm local-mp [ level md-level ] 8 Raisecom#show ethernet cfm remote-mep Show remote MEP configurations. [ level md-level [ service csi-id [ mpid mep-id ] ] ] Raisecom Proprietary and Confidential 164 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM No. Command Description 9 Raisecom#show ethernet cfm remote-mep Show remote static MEP configurations. static [ level md-level ] 10 Raisecom#show ethernet cfm traceroute-cache Show information about routes in the LinkTrace cache. 8.4 Configuring SLA 8.4.1 Preparing for configurations Scenario To ensure that users can get qualified network services. The Carrier and users sign a Service Level Agreement (SLA). To effectively fulfil the SLA, the carrier needs to deploy the SLA feature on the device to measure the network performance and takes the measurement result as the basis for ensuring the network performance. By selecting two detection points (source and destination RAX711-C devices), SLA configures and schedules SLA operations on a detection point. Therefore, configurations and network performance between these 2 detection points can be detected. SLA gathers statistics about round-trip packet loss ratio, round-trip/unidirectional (SD/DS) delay, jitter, throughput, and LM packet loss ratio test. In addition, it reports these data to the upper monitoring software (such as the NView NNM system) to help analyze network performance for getting an expected result. When configuring SLA on the RAX711-C, note the following matters:  Up to 16 operations can be configured and scheduled concurrently.  Before scheduling a SLA operation, you have to establish the CFM environment.  Do not modify the scheduling information or re-schedule the SLA operation if the current scheduling does not stop.  Up to 20 detection packets are available for one test and up to 5 pieces of statistics records are shown. Prerequisite  When configuring Layer 2 test operations, you should deploy CFM between local and remote devices that need to be detected. Layer 2 packets can be forwarded between local and remote devices.  When configuring Layer 3 test operations (icmp-echo and icmp-jitter), Layer 3 Ping operation succeeds between local and remote devices. Raisecom Proprietary and Confidential 165 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM 8.4.2 Configuring SLA operation Configuring basic functions of SLA test Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#sla oper-number Configure the delay, jitter, and packet loss { delay-threshold | jitter-threshold | detection alarm thresholds. loss-rate-threshold } { current | average } [ ds | sd | two-way ] By default, they are 5000000μs, 10000000us, and threshold 9999 (namely, 99.99%) respectively. 3 Raisecom(config)#sla oper-number Enable delay, jitter, and packet loss alarms. { delay-trap | jitter-trap | loss-pkt- trap } { current | average } [ ds | sd By default, they are disabled. | two-way ] enable 4 Raisecom(config)#sla oper-num Configure the availability test threshold. availability-threshold [ ds | sd | two- way ] threshold By default, it is 5000, namely, 50%. 5 Raisecom(config)#sla oper-num Configure the frame loss rate threshold in the availability-flr-threshold threshold SLA availability test. By default, it is 0. 6 Raisecom(config)#sla oper-num Configure the number of CHLI availability availability-num-consecutive-high-flr indicators in the SLA availability test. number By default, it is 5. 7 Raisecom(config)#sla oper-num Configure the number of consecutive indicators availability-num-consecutive-intervals in the SLA availability test. number By default, it is 10. 8 Raisecom(config)#sla oper-num Enable availability Trap. availability-trap [ ds | sd | two-way ] enable By default, it is disabled. 9 Raisecom(config)#sla oper-num Enable availability change Trap. availabilitychange-trap [ ds | sd | two-way ] enable By default, it is disabled. 10 Raisecom(config)#sla private-tlv enable Configure the encapsulation private TLV of SLA test packets. By default, it is disabled. 11 Raisecom(config)#sla pkt-type { eth Configure the type of SLA test packets. dest-mac mac-address [ cvlan vlan-id ] [ svlan vlan-id ] | ipv4 dest-ip ip- address [ source-ip ip-address ] [ dest-udp-port port-id ] [ source-udp- port port-id ] } 12 Raisecom(config)#sla alarm Enable overall SLA alarm. { availabilitychange | threshold } enable Raisecom Proprietary and Confidential 166 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Configuring SLA test operation Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#sla oper-num icmp dest-ipaddr ip- Create the Layer 3 SLA delay test address [ dscp dscp-value ] [ interval period ] operation. [ size size ] 3 Raisecom(config)#sla oper-num y1731 latency remote- Configure the Y1731 delay test mep mep-id level level svlan vlan-id [ cvlan cvlan- operation based on the destination id ] [ cos cos-value ] [ interval interval-num ] MEP ID. [ size size ] dm Raisecom(config)#sla oper-num y1731 latency remote- Configure the Y1731 delay test mac mac-address level level svlan vlan-id [ cvlan operation based on the destination cvlan-id ] [ cos cos-value ] [ interval interval- MAC address. num ] [ size size ] dm 4 Raisecom(config)#sla oper-num y1731 pkt-loss Configure the Y1731 packet loss remote-mep mep-id level level svlan svlan-id ratio test operation based on the [ cvlan cvlan-id ] [ cos cos-value ] [ interval destination MEP ID. interval-num ] [ size size ] [ slm ] When you perform packet loss ratio test operation, we recommend specifying the MAC address of the remote MEP, when you use the service remote-mep command to configure it. Raisecom(config)#sla oper-num y1731 pkt-loss Configure the Y1731 packet loss remote-mac mac-address level level svlan svlan-id ratio test operation based on the [ cvlan cvlan-id ] [ cos cos-value ] [ interval destination MAC address. interval-num ] [ size size ] [ slm ] 5 Raisecom(config)#sla y1731 latency quick-input Quickly create an Ethernet delay [ level level ] [ svlan vlan-id ] dm and jitter operation.  After configuring one operation (differed by operation ID), you cannot modify or configure it again. You need to delete the operation in advance if you need to configure it again.  SLA supports scheduling up to 16 operations at one time. Before you stop scheduling the same operation, you cannot modify scheduling information or re- schedule the operation. If you need to reschedule the operation, you need to finish the scheduling (reach scheduling life time or stop scheduling) before performing the next scheduling.  During Ethernet SLA measurement, the operation performs delay and jitter measurement in hardware mode, when you create the DOWN MEP (specify the MD name when you configure the MD) and use the DM packet to create the operation. The delay and jitter measurement accuracy in hardware mode is at a microsecond level. Other modes are realized in software mode. The delay and jitter measurement accuracy in software mode is at a millisecond level. Raisecom Proprietary and Confidential 167 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Configuring RFC2544-based test operation Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#sla oper-num rfc2544 latency interface Configure RFC2544 delay interface-type interface-number [ eth dest-mac mac- test operation based on address ] [ cvlan vlan-id ] [ svlan vlan-id ] [ cos Ethernet. cos ] [ pkt-size pkt-size ] Raisecom(config)#sla oper-num rfc2544 latency interface Configure RFC2544 delay interface-type interface-number ipv4 dest-ip ip-address test operation based on IP. [ source-ip ip-address ] [ dest-udp-port port-id ] [ source-udp-port port-id ] [ tc tc ] [ ttl ttl ] [ pkt- size pkt-size ] Raisecom(config)#sla oper-num rfc2544 latency interface Configure RFC2544 delay interface-type interface-number [ pkt-size pkt-size ] test operation based on interface. 3 Raisecom(config)#sla oper-num rfc2544 pkt-loss interface Configure RFC2544 packet interface-type interface-number [ eth dest-mac mac- loss ratio test operation address ] [ cvlan vlan-id ] [ svlan vlan-id ] [ cos based on Ethernet. cos ] [ pkt-size pkt-size ] [ rate rate ] Raisecom(config)#sla oper-num rfc2544 pkt-loss interface Configure RFC2544 packet interface-type interface-number ipv4 dest-ip ip-address loss ratio test operation [ source-ip ip-address ] [ dest-udp-port port-id ] based on IP. [ source-udp-port port-id ] [ tc tc ] [ ttl ttl ] [ pkt- size pkt-size ] [ rate rate ] Raisecom(config)#sla oper-num rfc2544 pkt-loss interface Configure RFC2544 packet interface-type interface-number [ pkt-size pkt-size ] loss ratio test operation [ rate rate ] based on interface. 4 Raisecom(config)#sla oper-num rfc2544 throughput Configure RFC2544 interface interface-type interface-number [ eth dest-mac throughput test operation mac-address ] [ cvlan vlan-id ] [ svlan vlan-id ] [ cos based on Ethernet. cos ] [ pkt-size pkt-size ] [ threshold threshold ] Raisecom(config)#sla oper-num rfc2544 throughput Configure RFC2544 interface interface-type interface-number ipv4 dest-ip throughput test operation ip-address [ source-ip ip-address ] [ dest-udp-port based on IP. port-id ] [ source-udp-port port-id ] [ tc tc ] [ ttl ttl ] [ pkt-size pkt-size ] [ threshold threshold ] Raisecom(config)#sla oper-num rfc2544 throughput Configure RFC2544 interface interface-type interface-number [ pkt-size throughput test operation pkt-size ] [ threshold threshold ] based on interface. 8.4.3 Configuring SLA operation scheduling Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 168 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Step Command Description 2 Raisecom(config)#sla schedule [ oper-num | all ] [ life Schedule the SLA operation. { forever | life-time } ] [ begin ]  The operation lifetime should not be shorter than the interval for scheduling the SLA operation.  The interval for scheduling the SLA operation should not be shorter than 20s. 8.4.4 Configuring maintenance window Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#sla (Optional) start the emergency maintenance window. maintenance { start | stop } You can use the stop form of this command to close the emergency maintenance window. 8.4.5 Checking configurations No. Command Description 1 Raisecom#show sla Show configurations about SLA operations. 2 Raisecom#show sla { all | Show configurations of SLA operations. oper-num } configuration 3 Raisecom#show sla { all | Show the last test information about an operation. oper-num } result 4 Raisecom#show sla { all | Show configured threshold and alarm status of SLA oper-num } threshold operations. 5 Raisecom#show sla maintenance Show the SLA maintenance window. 8.5 Configuring Y.1564 8.5.1 Preparing for configurations Scenario To learn about configuration parameters and performance of Ethernet services, you can make related configurations of Y.1564 on the RAX711-C. On the same device, Y.1564 is exclusive with RFC2544 and Loopback. Raisecom Proprietary and Confidential 169 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Prerequisite N/A 8.5.2 Configuring test task Configuring test types of RCSAM Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#sla pkt-type eth dest-mac mac-address Configure the format of [ cvlan vlan-id ] [ tpid tpid ] [ cos cos-value ] [ cfi Y.1564 global test cfi-value ] [ svlan vlan-id ] [ tpid tpid ] [ cos cos- packets. value ] [ cfi cfi-value ] Raisecom(config)#sla pkt-type ipv4 dest-ip ip-address source-ip ip-address [ dest-udp-port port-id ] [ source- udp-port port-id ] [ tc tc ] [ svlan vlan-id ] [ ttl ttl ] 3 Raisecom(config)#sla oper-num y1564 bandwidth enable Enable bandwidth configuration. By default, it is enabled. 4 Raisecom(config)#sla oper-num y1564 performance interface Create a Y.1564 interface-type interface-number eth dest-mac mac-address performance test [ cvlan vlan-id ] [ tpid tpid ] [ cos cos-value ] [ cfi operation. cfi-value ] [ svlan vlan-id ] [ tpid tpid ] [ cos cos- value ] [ cfi cfi-value ] [ pkt-size { radom | size } ] [ frame-pattern { null | prbs } ] bandwidth bandwidth tc tc group-id group-id Raisecom(config)#sla oper-num y1564 performance interface interface-type interface-number ipv4 dest-ip ip-address source-ip ip-address [ dest-udp-port port-id ] [ source- udp-port port-id ] [ svlan vlan-id ] [ nexthop-ip ip- address ] [ smac mac-address ] [ ttl ttl ] [ pkt-size { radom | size } ] [ frame-pattern { null | prbs } ] bandwidth bandwidth tc tc group-id group-id Raisecom(config)#sla oper-num y1564 performance interface Configure the RCSAM interface-type interface-number video | voice } dest-ip test services based on the ip-address source-ip ip-address [ svlan vlan-id ] VLAN and CoS or based [ nexthop-ip ip-address ] [ smac mac-address ] [ ttl on the VLAN and DSCP. ttl ] [ frame-pattern { null | prbs } ] bandwidth bandwidth tc tc 5 Raisecom(config)#sla oper-num y1564 throughput interface Create a Y.1564 interface-type interface-number eth dest-mac mac-address throughput test operation. [ cvlan vlan-id ] [ tpid tpid ] [ cos cos-value ] [ cfi cfi-value ] [ svlan vlan-id ] [ tpid tpid ] [ cos cos- value ] [ cfi cfi-value ] [ pkt-size { radom | size } ] [ frame-pattern { null | prbs } ] [ cir cir cbs cbs ] [ eir eir ebs ebs ] [ mode cir [ step step ] [ eir ] [ overload ] ] [ group-id group-id ] Raisecom Proprietary and Confidential 170 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 8 OAM Step Command Description Raisecom(config)#sla oper-num y1564 throughput interface interface-type interface-number ipv4 dest-ip ip-address source-ip ip-address [ dest-udp-port port-id ] [ source- udp-port port-id ] [ tc tc ] [ svlan vlan-id ] [ nexthop- ip ip-address ] [ smac mac-address ] [ ttl ttl ] [ pkt- size { radom | size } ] [ frame-pattern { null | prbs } ] [ cir cir cbs cbs ] [ eir eir ebs ebs ] [ mode cir [ step step ] [ eir ] [ overload ] ] [ group-id group-id ] Raisecom(config)#sla oper-num y1564 performance interface interface-type interface-number { video | voice } dest-ip ip-address source-ip ip-address [ ttl ttl ] [ frame- pattern { null | prbs } ] [ cir cir cbs cbs ] [ eir eir ebs ebs ] [ mode cir [ step step ] [ eir ] [ overload ] ] [ group-id group-id ] 6 Raisecom(config)#sla schedule group-id group-id [ life Schedule the Y.1564 test { life | forever } ] operation. Raisecom(config)#sla schedule group-id group-id period period throughput 8.5.3 Checking configurations No. Command Description 1 Raisecom#show sla group-id group-id Show configurations of the Y.1564 test. configuration 2 Raisecom#show sla group-id group-id result Show results of the Y.1564 test. 8.6 Maintenance Command Description Raisecom(config)#clear oam config Clear OAM configurations. [ interface-type interface-number ] Raisecom(config)#clear extended-oam Clear statistics on extended OAM. statistics interface-type interface-number Raisecom(config)#clear ethernet cfm errors Clear error CCM records. [ level md-level ] Raisecom(config)#clear ethernet cfm Clear information about alarm suppression of suppress-alarm source MEPs. Raisecom(config)#clear ethernet cfm Clear LinkTrace cache configurations. traceroute-cache Raisecom Proprietary and Confidential 171 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9 QoS This chapter describes principles and configuration procedures of QoS, and provides related configuration examples, including the following sections:  Introduction  Configuring priority trust and priority mapping  Configuring traffic classification and traffic policy  Configuring congestion avoidance  Configuring queue shaping and queue scheduling  Configuring rate limiting  Configuration examples 9.1 Introduction Generally, Internet (IPv4), which bases on the storage-and-forward mechanism, only provides "best-effort" service for users. When the network is overloaded or congested, this service mechanism will fail to transmit packets timely and completely. With the ever-growing of network application, users bring different Quality of Service (QoS) requirements on network application. Then network should distribute and schedule resources for different network applications according to users' demands. QoS guarantees timeliness and integrity of importance services when the network is overloaded or congested, thus making the network run efficiently. QoS consists of a number of traffic management technologies:  Priority trust  Priority mapping  Traffic classification  Traffic policy  Queue scheduling  Congestion avoidance  Queue shaping  Rate limiting Raisecom Proprietary and Confidential 172 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9.1.1 Priority trust Priority trust refers that a packet adopts its own priority as the classification standard to perform follow-up QoS management on the packet. The RAX711-C supports interface-based priority trust. Priorities are divided into priorities based on Differentiated Services Code Point (DSCP) of IP packets and priorities based on Class of Service (CoS) of VLAN packets. If the RAX711-C does not trust DSCP/CoS priorities carried by packets, you can configure remarking or specify the interface priority. 9.1.2 Priority mapping Priority mapping refers to sending packets to different queues with different local priorities according to pre-configured mapping between external priority and local priority. Therefore, packets in different queues can be scheduled on the egress interface. The local priority refers to an internal priority that is assigned to packets. It is related to the queue number on the egress interface. The bigger the value is, the more quickly the packet is processed. The RAX711-C supports priority mapping based on DSCP priority or IP precedence of IP packets or CoS priority of VLAN packets. ToS priority and DSCP priority Figure 9-1 shows the structure of IP packet header. An 8-bit ToS field is contained in this packet. In RFC1349, the first 3 bits of the ToS field represent the ToS priority, ranging from 0 to 7. In RFC2474, the ToS field is re-defined. The first 6 bits (0–5 bits) represent the priority of IP packets, which is called DSCP priority, ranging from 0 to 63. The last 2 bits (6 and 7 bits) are reserved bits. Figure 9-2 shows the structures of ToS and DSCP priorities. Figure 9-1 Structure of IP packet header Figure 9-2 Structures of ToS priority and DSCP priority Raisecom Proprietary and Confidential 173 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS CoS priority IEEE 802.1Q VLAN packets are a modification of Ethernet packets. A 4-byte 802.1Q header is added between the source MAC address and protocol type, as shown in Figure 9-3. The 802.1Q header consists a 2-byte Tag Protocol Identifier (TPID, valuing 0x8100) filed and a 2- byte Tag Control Information (TCI) field. Figure 9-3 Structure of a VLAN packet The first 3 bits of the TCI field represent the CoS priority, which ranges from 0 to 7, as shown in Figure 9-4. CoS priority is used to ensure QoS in Layer 2 network. Figure 9-4 Structure of CoS priority By default, the mapping between the RAX711-C local priority and DSCP, CoS priorities is listed in Table 9-1 and Table 9-2. Table 9-1 Mapping between local priority and DSCP priority Local 0 1 2 3 4 5 6 7 DSCP 0–7 8–15 16–23 24–31 32–39 40–47 48–55 56–63 Table 9-2 Mapping between local priority and CoS priority Local 0 1 2 3 4 5 6 7 CoS 0 1 2 3 4 5 6 7 Table 9-3 Mapping between local priority and IP precedence Local 0 1 2 3 4 5 6 7 IP 0 1 2 3 4 5 6 7 9.1.3 Traffic classification Traffic classification is a process that recognizes specified packets according to some certain rule. All resulting packets can be treated differently to differentiate the service implied to users. Raisecom Proprietary and Confidential 174 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS The RAX711-C supports classifying traffics based on ToS and DSCP priority of IP packets and CoS priority of VLAN packets. In addition, it supports classifying traffics based on ACL rules and VLAN IDs. Figure 9-5 displays the traffic classification process. Figure 9-5 Traffic classification process 9.1.4 Traffic policy After performing traffic classification on packets, you need to perform different operations on packets of different categories. A traffic policy is formed when traffic classifiers are bound to traffic behaviours. Rate limiting based on traffic policy Rate limiting refers to limiting network traffics. Rate limiting is used to control the speed of traffic in the network. By dropping the traffic that exceeds the speed, you can control the traffic within a reasonable range. Therefore, network resources and Carrier's benefits are protected. Redirection Redirection refers that a packet is not forwarded according to the mapping between the original destination address and the interface. Instead, the packet is redirected to a specified interface for forwarding, realizing routing based on traffic policy. Remarking Remarking refers to re-configuring some priority fields for some packets, so that devices can re-classify packets based on their own standards. In addition, downstream nodes can provide differentiated QoS services depending on remarking information. The RAX711-C supports performing re-remarking on the following priority fields of packets:  DSCP priority of IP packets  CoS priority of VLAN packets 9.1.5 Queue scheduling Devices need to perform queue scheduling when delay-sensitive services need better QoS services than delay-insensitive services and when the network is congested once in a while. Raisecom Proprietary and Confidential 175 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Queue scheduling adopts different scheduling algorithms to send packets in a queue. Scheduling algorithms supported by the RAX711-C include Strict-Priority (SP), Weight Round Robin (WRR), and Weight Deficit Round Robin (WDRR). All scheduling algorithms are designed for addressing specified traffic problems. And they have different effects on bandwidth distribution, delay, and jitter.  SP: the device strictly schedules packets in a descending order of priority. Packets with lower priority cannot be scheduled until packets with higher priority are scheduled, as shown in Figure 9-6. Figure 9-6 SP scheduling  WRR: on the basis of scheduling packets in a polling manner according to the priority, the device schedules packets according to the weight of the queue, as shown in Figure 9- 7. Figure 9-7 WRR scheduling  WDRR: on the basis of scheduling packets in a polling manner according to the priority, the device schedules packets according to the weight of the queue. In addition, during the scheduling, if one queue has redundant bandwidth, the device will temporarily assign Raisecom Proprietary and Confidential 176 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS this bandwidth to another queue. During next scheduling, the assigned schedule will return equal bandwidth to the original queue, as shown in Figure 9-8. Figure 9-8 WDRR scheduling 9.1.6 Congestion avoidance By monitoring utilization of network resources (queues/memory buffer), congestion avoidance can discard packets actively when congestion occurs or when network traffic increases. It is a traffic control mechanism that is used to resolve network overload by adjusting network traffic. The traditional packet loss policy uses the Tail-Drop mode to process all packets equally without differentiating class of services. When congestion occurs, packets at the end of a queue are discarded until congestion is resolved. This Tail-Drop policy may cause TCP global synchronization. In TCP global synchronization, packets of multiple TCP connections are discarded, these TCP connections enter congestion avoidance and slow startup status simultaneously to reduce and adjust traffic. And later these TCP connections co-occur at some time to result in traffic peak. Therefore, network traffic is not stable, which influences the link utilization rate. RED The Random Early Detection (RED) technology discards packets randomly and makes multiple TCP connection not reduce transport speed simultaneously to avoid TCP global synchronization. The RED algorithm configures a minimum threshold and maximum threshold for length of each queue. In addition:  Packets are not discarded when the queue length is smaller than the minimum threshold.  All received packets are discarded when the queue length is greater than the maximum threshold.  Packets to be received are discarded randomly when the queue length is between the minimum and maximum thresholds. Add a random number to the packet to be received and compare the random number with the drop ratio of the current queue. If the random Raisecom Proprietary and Confidential 177 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS number is greater than the drop ration, the packet is discarded. The greater the queue size is, the higher the packet drop probability is. WRED The Weighted Random Early Detection (WRED) technology also discards packets randomly to avoid TCP global synchronization. However, the random drop parameter generated by WRED technology is based on the priority. WRED differentiates drop policies through the color of packets. This helps ensure that high-priority packets have a smaller packet drop probability. The RAX711-C can perform WRED on TCP packets by color but perform WRED on non-TCP packets regardless of color. The RAX711-C performs congestion avoidance based on WRED. 9.1.7 Queue shaping When the interface speed of downstream devices is smaller than the one of upstream devices, congestion avoidance may occur on interfaces of downstream devices. At this time, you can configure traffic shaping on the egress interface of upstream devices to shape upstream traffic. This helps resolve congestion problem occurs on downstream devices. Queue shaping is a traffic control technology applied to the interface queues. It can be used to control speed of all packets in a specified interface queue, buffer packets whose speed exceeds the threshold, and then forward them when enough bandwidth is available. If the packet size exceeds the buffer queue size, the packet is discarded. 9.1.8 Rate limiting Besides rate limiting based on traffic policy, the RAX711-C also supports rate limiting based on interface, VLAN, and interface+VLAN. Similar to rate limiting based on traffic policy, the RAX711-C discards excess traffic. 9.2 Configuring priority trust and priority mapping 9.2.1 Preparing for configurations Scenario For packets from upstream devices, you can select to trust the priorities taken by these packets. For packets whose priorities are not trusted, you can process them with traffic classification and traffic policy. In addition, you can modify DSCP priorities by configure interface-based DSCP priority remarking. After configuring priority trust, the RAX711-C can perform different operations on packets with different priorities, providing related services. Before performing queue scheduling, you need to assign a local priority for a packet. For packets from the upstream device, you can map the outer priorities of these packets to various local priorities. In addition, you can directly configure local priorities for these packets based on interfaces. And then device will perform queue scheduling on these packets basing on local priorities. Generally, for IP packets, you need to configure the mapping between DHCP priority and local priority. For VLAN packets, you need to configure the mapping between CoS priority and local priority. Raisecom Proprietary and Confidential 178 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Prerequisite N/A 9.2.2 Configuring priority trust Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface- Enter interface configuration mode. type interface-number 3 Raisecom(config-port)#mls qos trust Configure the priority trusted by an interface. { cos | dscp | inner-cos | ipp | port- priority } By default, the interface trusts the CoS priority. 4 Raisecom(config-port)#mls qos priority Configure the interface priority. priority By default, it is 5. 9.2.3 Configuring mapping between DSCP priority and local priority based on interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos mapping Create the DSCP-to-local-priority (color) mapping dscp-to-local-priority profile-id profile and enter dscp-to-pri configuration mode. 3 Raisecom(dscp-to-pri)#dscp dscp-value Configure mapping from the DSCP priority to local to local-priority localpri-value priority (color). [ color { green | red | yellow } ] 4 Raisecom(dscp-to-pri)#dscp dscp-value Discard packets of the specified DSCP priority drop according to the profile from DSCP to local priority. 5 Raisecom(dscp-to-pri)#exit Exit dscp-to-pri configuration mode. Raisecom(config)#interface interface- type interface-number Enter interface configuration mode. 6 Raisecom(config-port)#mls qos dscp- Apply the DSCP-to-local priority (color) mapping to-local-priority profile-id profile to an interface. 9.2.4 Configuring mapping from CoS priority to local priority based on interface Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 179 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Step Command Description 2 Raisecom(config)#mls qos mapping cos-to- Create the CoS-to-local priority (color) local-priority profile-id mapping profile and enter cos-to-pri configuration mode. 3 Raisecom(cos-to-pri)#cos cos-value to local- Configure mapping from the CoS priority priority localpri-value [ color { green | to local priority (color). red | yellow } ] 4 Raisecom(cos-to-pri)#cos cos-value drop Discard packets of the specified CoS priority according to the profile from DSCP to local priority. 5 Raisecom(cos-to-pri)#exit Exit cos-to-pri configuration mode. Raisecom(config)#interface interface-type interface-number Enter interface configuration mode. 6 Raisecom(config-port)#mls qos cos-to-local- Apply the CoS-to-local-priority (color) priority profile-id [ dei enable ] mapping profile to an interface. 9.2.5 Configuring mapping from IP precedence to local priority based on interface Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos mapping ipp-to- Create the ipp-to-local-priority (color) local-priority profile-id mapping profile and enter ipp-to-pri configuration mode. 3 Raisecom(ipp-to-pri)#ipp ipp-value to local- Configure mapping from IP precedence to priority localpri-value [ color { green | local priority (color). red | yellow } ] 4 Raisecom(ipp-to-pri)#exit Exit ipp-to-pri configuration mode. Raisecom(config)#interface interface-type interface-number Enter interface configuration mode. 5 Raisecom(config-port)#mls qos ipp-to-local- Apply the ipp-to-local-priority (color) priority profile-id mapping profile to an interface. 9.2.6 Configuring mapping from Exp to local priority Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos mapping exp-to- Create the Exp-to-pri (color) mapping local-priority profile-id profile and enter exp-to-pri configuration mode. 3 Raisecom(exp-to-pri)#exp exp-value to local- Configure mapping from the Exp to local priority localpri-value [ color { green | priority (color). red | yellow } ] Raisecom Proprietary and Confidential 180 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9.2.7 Configuring DSCP priority remarking Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos mapping dscp- Create the DSCP remarking profile and mutation profile-id enter dscp-mutation configuration mode. 3 Raisecom(dscp-mutation)#dscp dscp-value to Remark the DSCP priority of specified new-dscp dscp-value packets. 4 Raisecom(dscp-mutation)#exit Exit dscp-mutation configuration mode. Raisecom(config)#interface interface-type interface-number Enter interface configuration mode. 5 Raisecom(config-port)#mls qos dscp-mutation Apply the DSCP remarking profile to an profile-id interface. 6 Raisecom(config-port)#mls qos default-dscp Configure the default DSCP on the dscp-value interface. 9.2.8 Configuring CoS priority remarking Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos mapping cos-remark Create the CoS remarking profile and enter profile-id dscp-remark configuration mode. 3 Raisecom(cos-remark)#local-priority Configure the mapping from the local localpri-value to cos cos-value priority to CoS priority. 4 Raisecom(cos-remark)#exit Exit cos-remark configuration mode. Raisecom(config)#interface interface-type interface-number Enter interface configuration mode. 5 Raisecom(config-port)#mls qos cos-remark- Enable local-priority-to-CoS mapping. mapping { enable | disable } [ dei enable ] 6 Raisecom(config-port)#mls qos cos-remark Apply the CoS remarking profile to an profile-id interface. 9.2.9 Configuring Exp remarking Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos mapping local- Create the Exp-to-local-priority mapping priority-to-exp profile-id profile and enter pri-to-exp configuration mode. Raisecom Proprietary and Confidential 181 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Step Command Description 3 Raisecom(pri-to-exp)#local-priority Configure the mapping from the local localpri-value to exp exp-value priority to Exp. 9.2.10 Checking configurations No. Command Description 1 Raisecom#show mls qos mapping dscp-to-local- Show information about the DSCP-to- priority [ default | profile-id ] local-priority (color) mapping profile. 2 Raisecom#show mls qos mapping cos-to-local- Show information about the CoS-to- priority [ default | profile-id ] local-priority (color) mapping profile. 3 Raisecom#show mls qos mapping dscp-mutation Show information about the DSCP [ default | profile-id ] remarking profile. 4 Raisecom#show mls qos mapping cos-remark Show information about the CoS [ default | profile-id ] remarking profile. 5 Raisecom#show mls qos mapping local-priority- Show information about the local to-exp [ default | profile-id ] priority-to-Exp mapping profile. 6 Raisecom#show mls qos interface [ interface- Show QoS information on the interface. type interface-number ] 7 Raisecom#show mls qos mapping ipp-to-local- Show information about the ipp-to-local- priority [ default | profile-id ] priority (color) mapping profile. 9.3 Configuring traffic classification and traffic policy 9.3.1 Preparing for configurations Scenario Traffic classification is the basis of QoS. For packets from upstream devices, you can classify them according to ACL rules. After traffic classification, the device can provide related operations for different packets, providing differentiated services. After configurations, the traffic classification cannot take effect until being bound to traffic policy. The selection of traffic policy depends on the packet status and current network load status. In general, when a packet is sent to the network, you need to limit the speed according to Committed Information Rate (CIR) and remark the packet according to the service feature. Prerequisite N/A Raisecom Proprietary and Confidential 182 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9.3.2 Creating and configuring traffic classification Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#class-map class-map-name [ match- Create traffic classification and all | match-any ] enter CMAP configuration mode. 3 Raisecom(config-cmap)#match { access-list { acl- Define rules for traffic number | name } | cos cos-value | dscp dscp-value | classification. exp exp-value | inner-cos cos-value | inner-vlan vlan-id | ip precedence ipp-value | ip tos tos- value | label label | second-label label | vlan vlan-id 9.3.3 Creating and configuring traffic policing profile To perform traffic policing on packets, you need to configure traffic policing profile and then quote this profile under the traffic classification, which is bound to traffic policy. On the traffic policing profile, you can configure traffic policing rules or perform relate operations on specified packets based on the color. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos policer-profile Create the traffic policing profile and enter policer-name [ single | hierarchy | traffic policing profile configuration mode. aggregate ] 3 Raisecom(traffic-policer)#drop-color red (Optional) configure the device to discard packets of the specified color. 4 Raisecom(traffic-policer)#set-cos { green (Optional) configure the mapping from packet green-value | yellow yellow-value | red color to CoS priority. red-value } * 5 Raisecom(traffic-policer)#set-dscp (Optional) configure the mapping from packet { green green-value | red red-value } * color to DHCP priority. 6 Raisecom(traffic-policer)#set-pri { green (Optional) configure the mapping from packet green-value | red red-value } * color to local priority. 7 Raisecom(traffic-policer)#recolor (Optional) recolor the packet. { green-recolor red | red-recolor green } * QoS uses the CAR to classify and color the packet. The downstream network can accept the color result of the upstream network or recolor the packet based on its classification standard. 8 Raisecom(traffic-policer)#cir cir cbs cbs (Optional) configure rate limiting parameters. [ ebs ebs ] Raisecom Proprietary and Confidential 183 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9.3.4 Creating and configuring traffic policy Steps 5–10 are coordinate. You can select one as required. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#policy-map policy-map- Create a traffic policy and enter PMAP name configuration mode. 3 Raisecom(config-pmap)#class-map class- Add the traffic classification to the traffic policy map-name and enter CMAP configuration mode.  The traffic classification, bound with the traffic policy, must be based on at least one rule. Otherwise, the binding operation fails.  When the traffic policy is applied to an interface, you cannot delete the bound traffic classification or modify its configuration.  One traffic classification can be applied to multiple traffic policies. 4 Raisecom(config-pmap-c)#policer Import a traffic policing profile (policer) into the policer-name traffic policy. 5 Raisecom(config-pmap-c)#set { cos cos- (Optional) configure packet remarking. value | dscp dscp-value | local- priority priority-value } Raisecom(config-pmap-c)#set { inner- vlan inner-vlan-id | vlan vlan-id } 6 Raisecom(config-pmap-c)#add outer-vlan (Optional) configure the VLAN ID of the added vlan-id outer VLAN Tag. 7 Raisecom(config-pmap-c)#redirect-to (Optional) configure the redirection rule to [ interface-type interface-number ] forward matched packets through the specified interface. 8 Raisecom(config-pmap-c)#copy-to-mirror (Optional) copy the traffic to the mirroring group-id monitoring group. 9 Raisecom(config-pmap-c)#forward-to-cpu (Optional) forward traffic to the CPU. 10 Raisecom(config-pmap-c)#statistics (Optional) enable traffic statistics. enable 11 Raisecom(config-pmap-c)#exit Exit CMAP configuration mode. Raisecom(config-pmap)#exit Raisecom(config)#interface interface- Exit PMAP configuration mode. type interface-number Enter interface configuration mode. 12 Raisecom(config-port)#service-policy Apply the traffic policy to an interface. { ingress | egress } policy-map-name Raisecom Proprietary and Confidential 184 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9.3.5 Checking configurations No. Command Description 1 Raisecom#show class-map [ class-map-name ] Show information about traffic classification. 2 Raisecom#show mls qos policer [ policer-name ] Show rate limiting rules. 3 Raisecom#show policy-map [ policy-map-name ] [ class Show information about traffic class-map-name ] policies. 4 Raisecom#show service-policy interface Show information about applied Raisecom#show service-policy interface interface- policies. type interface-number [ egress | ingress ] 5 Raisecom#show service-policy statistics interface Show statistics on applied traffic interface-type interface-number { egress | ingress } policies. [ class-map class-map-name ] 9.3.6 Maintenance Command Description Raisecom(config)#clear service-policy statistics interface Show traffic classification interface-type interface-number { egress | ingress } information. Raisecom(config)#clear service-policy statistics interface Show rate limiting rules. interface-type interface-number { egress | ingress } [ class-map class-map-name ] 9.4 Configuring congestion avoidance 9.4.1 Preparing for configurations Scenario To avoid network congestion and to resolve TCP global synchronization, you can configure congestion avoidance to adjust the network traffic and resolve network overload. The RAX711-C supports WRED-based congestion avoidance. When the interface speed of downstream devices is smaller than the one of upstream devices, traffic congestion may occur on interfaces of downstream devices. At this time, you can configure queue and traffic shaping on the egress interface of upstream devices to shape upstream traffic. Prerequisite N/A Raisecom Proprietary and Confidential 185 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9.4.2 Configuring WRED profile Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos wred Create a WRED profile and enter WRED profile profile profile-id configuration mode. 3 Raisecom(wred)#wred color { green Configure information about the WRED profile. | red | yellow } start-drop- threshold start-drop end-drop- For non-TCP packets, it does not distinguish the color. threshold end-drop max-drop- You need to configure the wred start-drop-threshold probability max-drop or wred color green parameter. 9.4.3 Configuring flow profile Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#mls qos flow- Create a WRED profile and enter flow profile queue profile flow-profile-id configuration mode. 3 Raisecom(flow-queue)#scheduler Configure the queue scheduling policy. { wdrr| wrr } By default, it is SP, namely, strict priority policy. 4 Raisecom(flow-queue)#queue queue- Configure the queue, weight, shaping, and WRED id [ weight weight-value ] information about the flow profile. If you do not [ shaping cir cir-value [ cbs configure the weight, queues will be scheduled by SP. cbs-value ] pir pir-value [ pbs pbs-value ] ] [ wred profile profile-id ] 9.4.4 Checking configurations No. Command Description 1 Raisecom#show mls qos wred profile [ profile- Show configurations of the WRED list ] profile. 2 Raisecom#show mls qos flow-queue profile Show configurations of the flow profile. flow-profile-list 3 Raisecom#show mls qos queue interface Show information about queues on the interface-type interface-number interface. 4 Raisecom#show mls qos queue statistics Show statistics on queues on the interface interface-type interface-number interface. Raisecom Proprietary and Confidential 186 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9.5 Configuring queue shaping and queue scheduling 9.5.1 Preparing for configurations Scenario When the interface speed of downstream devices is smaller than the one of upstream devices, congestion avoidance may occur on interfaces on downstream devices. At this time, you can configure queue and traffic shaping on the egress interface of upstream devices to shape upstream traffic. Prerequisite N/A 9.5.2 Configuring queue shaping Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface-type Enter interface configuration mode. interface-number 3 Raisecom(config-port)#mls qos shaping { ingress Configure queue shaping for queues of | egress } pir pir-value [ pbs pbs-value ] the interface. 9.5.3 Configuring queue scheduling Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface-type Enter interface configuration mode. interface-number 3 Raisecom(config-port)#mls qos queue queue-id Configure the maximum buffer of the max-buffer max-buffer-value specified queue on the interface By default, it is 500. 4 Raisecom(config-port)#mls qos queue queue-id Configure queue shaping of the specified shaping cir cir-value [ cbs cbs-value ] pir queue on the interface. pir-value [ pbs pbs-value ] 5 Raisecom(config-port)#mls qos queue queue-id Apply the WRED profile to the specified wred profile-id queue on the interface. 6 Raisecom(config-port)#mls qos queue Configure the queue scheduling policy. scheduler { { { drr | wrr } [ weight1 weight2 weight3 weight4 weight5 weight6 weight7 weight8 ] } | sp } Raisecom Proprietary and Confidential 187 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS 9.5.4 Checking configurations No. Command Description 1 Raisecom#show mls qos queue interface Show information about queues on an interface-type interface-number interface. 2 Raisecom#show mls qos shaping interface Show information about queue shaping. [ interface-type interface-number [ ingress | egress ] ] 3 Raisecom#show mls qos queue statistics Show queue statistics on the interface. interface interface-type interface-number 4 Raisecom#show mls qos queue { max-buffer | Show configurations of queues on the shaping | wred } [ interface ] interface-type specified interface. interface-number 9.5.5 Maintenance Command Description Raisecom(config)#clear mls qos queue statistics interface Clear queue statistics on an interface-type interface-number [ queueid queue-id ] interface. 9.6 Configuring rate limiting 9.6.1 Preparing for configurations Scenario To transmit specific services at a specified rate upon network congestion, you can configure rate limting. In this case, received packets are matched with the profile to guarantee normal transmission of specific services. Prerequisite Create VLANs. 9.6.2 Configuring interface-based rate limiting Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#bandwidth-profile Create a bandwidth profile, and configure the index cir cir cbs cbs [ color-aware ] rate limiting for forwarding packets. Raisecom(config)#bandwidth-profile index cir cir cbs cbs eir eir ebs ebs [ color-aware [ coupling ] ] Raisecom Proprietary and Confidential 188 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Step Command Description 3 Raisecom(config)#bandwidth-profile bwp- Configure the description of the bandwidth index description string profile. 4 Raisecom(config)#interface interface- Enter interface configuration mode. type interface-number 5 Raisecom(config-port)#bandwidth Configure the interface to quote the bandwidth { ingress | egress } [ vlan vlan-id ] profile. [ cos cos-value ] bwp-index 9.6.3 Checking configurations No. Command Description 1 Raisecom#show bandwidth interface interface-type Show information about the interface-number interface-based bandwidth profile. 2 Raisecom#show bandwidth-profile [ index ] Show configurations of the bandwidth profile. 9.7 Configuration examples 9.7.1 Example for configuring rate limiting based on traffic policy Networking requirements As shown in Figure 9-9, User A, User B, and User C are respectively connected to the RAX711-C through Router A, Router B, and Router C. User A requires voice and video services; User B requires voice, video, and data services; User C requires video and data services. According to users' requirements, make following rules:  For User A, provide 25 Mbit/s bandwidth, configure the burst traffic to 100 bytes, and discard excess traffic.  For User B, provide 35 Mbit/s bandwidth, configure the burst traffic to 100 bytes, and discard excess traffic.  For User C, provide 30 Mbit/s bandwidth, configure the burst traffic to 100 bytes, and discard excess traffic. Raisecom Proprietary and Confidential 189 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Figure 9-9 Configuring rate limiting based on traffic policy Configuration steps Step 1 Create and configure traffic classification. Raisecom#config Raisecom(config)#access-list 1001 Raisecom(config-acl-ip-std)#rule 1 permit 1.1.1.1 255.255.255.0 Raisecom(config-acl-ip-std)#exit Raisecom(config)#class-map usera Raisecom(config-cmap)#match access-list 1001 Raisecom(config-cmap)#exit Raisecom(config)#access-list 1002 Raisecom(config-acl-ip-std)#rule 2 permit 1.1.2.1 255.255.255.0 Raisecom(config-acl-ip-std)#exit Raisecom(config)#class-map userb Raisecom(config-cmap)#match access-list 1002 Raisecom(config-cmap)#exit Raisecom(config)#access-list 1003 Raisecom(config-acl-ip-std)#rule 3 permit 1.1.3.1 255.255.255.0 Raisecom(config-acl-ip-std)#exit Raisecom(config)#class-map userc Raisecom(config-cmap)#match access-list 1003 Raisecom(config-cmap)#exit Step 2 Create traffic policing profiles and configure rate limiting rules. Raisecom(config)#mls qos policer-profile usera single Raisecom(traffic-policer)#cir 25000 cbs 100 Raisecom(traffic-policer)#drop-color red Raisecom(traffic-policer)#exit Raisecom Proprietary and Confidential 190 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Raisecom(config)#mls qos policer-profile userb single Raisecom(traffic-policer)#cir 35000 cbs 100 Raisecom(traffic-policer)#drop-color red Raisecom(traffic-policer)#exit Raisecom(config)#mls qos policer-profile userc single Raisecom(traffic-policer)#cir 30000 cbs 100 Raisecom(traffic-policer)#drop-color red Raisecom(traffic-policer)#exit Step 3 Create and configure traffic policies. Raisecom(config)#policy-map usera Raisecom(config-pmap)#class-map usera Raisecom(config-pmap-c)#policer usera Raisecom(config-pmap-c)#exit Raisecom(config-pmap)#exit Raisecom(config)#interface client 1 Raisecom(config-client1)#service-policy ingress usera Raisecom(config-client1)#exit Raisecom(config)#policy-map userb Raisecom(config-pmap)#class-map userb Raisecom(config-pmap-c)# policer userb Raisecom(config-pmap-c)#exit Raisecom(config-pmap)#exit Raisecom(config)#interface client 2 Raisecom(config-client2)#service-policy ingress userb Raisecom(config-client2)#exit Raisecom(config)#policy-map userc Raisecom(config-pmap)#class-map userc Raisecom(config-pmap-c)#policer userc Raisecom(config-pmap-c)#exit Raisecom(config-pmap)#exit Raisecom(config)#interface client 3 Raisecom(config-client3)#service-policy ingress userc Checking results Use the show class-map command to show configurations of traffic classification. Raisecom#show class-map usera Class Map usera (id 0) (ref 1) Match acl 1001 Raisecom#show class-map userb Class Map userb (id 1) (ref 1) Match acl 1002 Raisecom#show class-map userc Class Map userb (id 2) (ref 0) Match acl 1003 Raisecom Proprietary and Confidential 191 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Use the show mls qos policer command to show configurations of rate limiting rules. Raisecom#show mls qos policer single-policer: usera mode:flow color:blind cir: 25000 kbps cbs: 100 kB single-policer: usera mode:flow color:blind cir: 35000 kbps cbs: 100 kB single-policer: usera mode:flow color:blind cir: 35000 kbps cbs: 100 kB Use the show policy-map command to show configurations of traffic policies. Raisecom#show policy-map usera Policy Map usera Class-map usera police usera Raisecom#show policy-map userb Policy Map userb Class-map userb police userb Raisecom#show policy-map userc Policy Map userc Class-map userc police userc 9.7.2 Example for configuring queue scheduling and congestion avoidance Networking requirements As shown in Figure 9-10, User A requires voice and video services; User B requires voice, video, and data services; User C requires video and data services. CoS priorities for voice, video and, data services are configured with 5, 4, and 2 respectively. And these three CoS priorities are mapped to local priorities 6, 5, and 2 respectively. Make following rules based on service types.  Perform SP scheduling on voice service to ensure that the traffic is first transmitted.  Perform WRR scheduling on video service and configure the weight to 50.  Perform WRR scheduling on data service and configure the weight to 20. In addition, you need to configure the discarding threshold to 50 to avoid network congestion caused by too high burst traffic. Raisecom Proprietary and Confidential 192 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Figure 9-10 Configuring queue scheduling and congestion avoidance Configuration steps Step 1 Create a WRED profile. Raisecom#config Raisecom(config)#mls qos wred profile 1 Raisecom(wred)#wred start-drop-threshold 50 end-drop-threshold 90 max- drop-probability 60 Raisecom(wred)#exit Step 2 Configure the priority trust and congestion avoidance on interfaces. Raisecom(config)#mls qos flow-queue profile 6 Raisecom(flow-queue)#scheduler wrr Raisecom(flow-queue)#queue 6 weight 50 Raisecom(flow-queue)#queue 3 weight 20 wred profile 1 Raisecom(flow-queue)#exit Raisecom(config)#interface line 1 Raisecom(config-line1)# mls qos flow-queue 6 Raisecom(config)#interface client 1 Raisecom(config-client1)#mls qos trust cos aisecom(config)#interface client 2 Raisecom(config-client2)#mls qos trust cos Raisecom(config)#interface client 3 Raisecom(config-client3)#mls qos trust cos Raisecom(config-client3)#exit Step 3 Configure the mapping from the CoS priority and local priority. Raisecom Proprietary and Confidential 193 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Raisecom(config)#mls qos mapping cos-to-local-priority 1 Raisecom(cos-to-pri)#cos 5 to local-priority 6 Raisecom(cos-to-pri)#cos 4 to local-priority 5 Raisecom(cos-to-pri)#cos 2 to local-priority 2 Raisecom(cos-to-pri)#exit Raisecom(config)#interface client 1 Raisecom(config-client1)#mls qos cos-to-local-priority 1 Raisecom(config-client1)#interface interface client 2 Raisecom(config-client2)#mls qos cos-to-local-priority 1 Raisecom(config-client2)#interface interface client 3 Raisecom(config-client3)#mls qos cos-to-local-priority 1 Raisecom(config-client3)#exit Checking results Use the show mls qos mapping cos-to-local-priority command to show mapping configurations on specified priorities. Raisecom#show mls qos mapping cos-to-local-priority G:GREEN Y:Yellow R:RED cos-to-localpriority(color) Index Description CoS: 0 1 2 3 4 5 6 7 ------------------------------------------------------------------------- 1 localpri(color): 0(G) 1(G) 2(G) 3(G) 5(G) 6(G) 6(G) 7(G) Use the show mls qos command to show configurations of priority trust and queue scheduling mode on specified interfaces. Raisecom#show mls qos interface client 1 Interface TrustMode UntaggedPriority Cos-PriProfile Dscp-PriProfile Dscp-Mutation Cos-Remark ----------------------------------------------------------------------- client 1 cos 5 0 0 0 0 Use the show mls qos flow-queue command to show configurations of queue scheduling. Raisecom#show mls qos flow-queue profile 2 CIR: Committed information rate,unit:Kbps CBS: Committed burst size,unit:KB PIR: Peak information rate,unit:Kbps PBS: Peak burst size,unit:KB ProfileIndex :2 Flow-Queue-Description : Flow-Queue-Reference :3 Raisecom Proprietary and Confidential 194 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Flow-Queue-Scheduler :wrr QueueId Weight Wred CIR(Kbps) CBS(KB) PIR(Kbps) PBS(KB) ---------------------------------------------------------------- 1 0 0 -- -- -- -- 2 0 0 -- -- -- -- 3 0 1 -- -- -- -- 4 0 0 -- -- -- -- 5 0 0 -- -- -- -- 6 20 0 -- -- -- -- 7 50 0 -- -- -- -- 8 0 0 -- -- -- -- Use the show mls qos wred profile command to show WRED profile configurations. Raisecom#show mls qos wred profile GSDT:Green Start Drop Threshold GEDT:Green End Drop Threshold GDP :Green Drop Probability YSDT:Yellow Start Drop Threshold YEDT:Yellow End Drop Threshold YDP :Yellow Drop Probability RSDT:Red Start Drop Threshold REDT:Red End Drop Threshold RDP :Red Drop Probability Index Description Ref GSDT GEDT GDP YSDT YEDT YDP RSDT REDT RDP ------------------------------------------------------------------------- 1 3 50 90 60 50 90 60 50 90 60 9.7.3 Example for configuring interface-based rate limiting Networking requirements As shown in Figure 9-11, User A, User B, and User C are connected to the RAX711-C through Switch A, Switch B, and Switch C. User A requires voice and video services; User B requires voice, video, and data services; User C requires video and data services. According to users' requirements, make following rules:  For User A, provide 25 Mbit/s bandwidth, configure the burst traffic to 100 Kbytes, configure the EIR to 50 Mbit/s, and configure the EBS to 200 Kbytes.  For User B, provide 35 Mbit/s bandwidth, configure the burst traffic to 100 Kbytes, configure the EIR to 70 Mbit/s, and configure the EBS to 200 Kbytes.  For User A, provide 30 Mbit/s bandwidth, configure the burst traffic to 100 Kbytes, configure the EIR to 60 Mbit/s, and configure the EBS to 200 Kbytes. Raisecom Proprietary and Confidential 195 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS Figure 9-11 Configuring interface-based rate limiting Configuration steps Step 1 Configure the bandwidth profile. Raisecom#config Raisecom(config)#bandwidth-profile 1 cir 25000 cbs 100 eir 50000 ebs 200 Raisecom(config)#bandwidth-profile 2 cir 35000 cbs 100 eir 70000 ebs 200 Raisecom(config)#bandwidth-profile 3 cir 30000 cbs 100 eir 60000 ebs 200 Step 2 Apply the bandwidth profile to the interface. Raisecom(config)#interface client 1 Raisecom(config-client1)#bandwidth ingress 1 Raisecom(config-client1)#interface client 2 Raisecom(config-client2)#bandwidth ingress 2 Raisecom(config-client2)#interface client 3 Raisecom(config-client3)#bandwidth ingress 3 Checking results Use the show bandwidth interface command to show configurations of interface-based rate limiting. Raisecom#show bandwidth interface client 1 Port Direction bwp-index hv-bwp-index Cir(kbps) Cbs(KB) Eir(kbps) Ebs(KB) ------------------------------------------------------------------------- Raisecom Proprietary and Confidential 196 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 9 QoS client1 Ingress 1 -- 25000 100 50000 200 Raisecom#show bandwidth interface client 2 Port Direction bwp-index hv-bwp-index Cir(kbps) Cbs(KB) Eir(kbps) Ebs(KB) ------------------------------------------------------------------------- client2 Ingress 2 -- 35000 100 70000 200 Raisecom#show bandwidth interface client 3 Port Direction bwp-index hv-bwp-index Cir(kbps) Cbs(KB) Eir(kbps) Ebs(KB) ------------------------------------------------------------------------- client3 Ingress 3 -- 30000 100 60000 200 Raisecom# Raisecom Proprietary and Confidential 197 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM 10 RSOM This chapter describes principles and configuration procedures of RSOM, and provide configuration examples, including the following sections:  Introduction  Configuring RSOM  Maintenance  Configuration examples 10.1 Introduction Raisecom Service Oriented Management (RSOM) is based on the MEF40, and aims to promote usability of the Ethernet, activate and manage the Ethernet PLS. Ethernet services include Ethernet Virtual Connection (EVC) and its corresponding UNI. Each EVC is corresponding to a service. Figure 10-1 shows the Ethernet service networking. User network A and User network B are connected to the carrier's network through the UNI, and they communicate through an EVC established on the carrier's network. RSOM contains two parts of Ethernet services: service transmission and test and measurement. When a service is created and normally transmitted, it can be tested and measured through SLA and RCSAM. Figure 10-1 Ethernet service networking Raisecom Proprietary and Confidential 198 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM 10.1.2 Types of Ethernet services Types of Ethernet services are as below:  E-Line: Ethernet Private Line (EPL) services, leased line services implemented through point-to-point EVC  E-LAN: Ethernet Virtual Private Local Access Network (E-LAN) services implemented through point-to-multipoint EVC for customers in multiple positions  E-Tree: Ethernet Private Tree (EPT) services, Ethernet point-to-multipoint services implemented through tree point-to-multipoint EVC. One node is the root node while others are leaf nodes. The root node can communicate with leaf nodes while leaf nodes cannot communicate with each other. Table 10-1 lists types of Ethernet services according to sharing of services and bandwidth. Table 10-1 Types of Ethernet services Type Service UNIs per Service instances Bandwidth sharing EVC per UNI  Dedicated UNI E-Line Point-to-point 2 1  Dedicated network transmission EPL bandwidth  Shared UNI Point-to-point 2 or more 1 or more  Shared network transmission bandwidth EVPL by multiple customers  Dedicated UNI E-LAN EPLAN Multiple 1  Dedicated network transmission bandwidth  At least one shared UNI EVPLAN Multiple 1 or more  Shared network transmission bandwidth by service instances of multiple customers  Dedicated UNI E-Tree EP-Tree, Multiple 1  Dedicated network transmission Ethernet Private Tree bandwidth  At least one shared UNI EVP-Tree Multiple 1 or more  Shared network transmission bandwidth by service instances of multiple customers Services transmission of the Ethernet service Based on the different profiles, services transmission of the Ethernet service matches the packets entering the service and deal with them according to rules. The Ethernet service supports the following profiles.  L2CP profile: it supports configuring the protocol for matching packets and corresponding action for processing them. It also supports configuring transparent transmission of L2CP packets to the specified destination MAC address.  CoS profile: it is namely the QoS profile. It is used for the bandwidth profile. It supports configuring CoS and traffic classification rules. Packets enter the queue and are transmitted according to traffic classification rule. Because according to different classification rules, the rules of priority mapping are different, thus packets enter the Raisecom Proprietary and Confidential 199 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM queue configured through Ethernet QoS to schedule according to different priority mapping rules.  Bandwidth profile: it supports configuring coupling function and color aware mode, and supports configuring rate limiting rule. Interfaces Physical interfaces on the RAX711-C work as the UNI or NNI. The UNI is the interace where the user network accesses the carrier's network. The NNI is a forwarding interface inside the carrier's network. Figure 10-2 shows the location of UNIs and NNIs in a network topology. Figure 10-2 Location of UNIs and NNIs in a network topology Rules for mapping packets When an untagged packet reaches the UNI, it will be added with a VLAN ID of PVID. When a tagged packet reaches the UNI, it is mapped into the corresponding EVC according to its CEVLAN ID and then forwarded. Rules for mapping among the UNI, CEVLAN, and EVC are as below:  All-to-one: there is only one EVC on a UNI, and all CEVLANs are mapped into the EVC.  Bundling: there is only one EVC on a UNI, and CEVLANs are mapped into EVCs as required.  Bundling-multiplex: there are multiple EVCs on a UNI, and each EVC is mapped into a CEVLAN.  Multiplex: there are multiple EVCs on a UNI, and CEVLANs are mapped into EVCs as required. There is a table for mapping CEVLANs and EVCs on a UNI. You can configure it after learning its mapping rules. For example, there are 2 EVCs on UNI 1, and they carry packets of CEVLANs 1–100 to the EVC 1 and then forward these packets. They also carry packets of CEVLANs 200–300 to the EVC 2 and then forward these packets. Rules for classifying traffic When packets enter a UNI, they will enter the EVC corresponding to the carried CEVLAN ID and then be classified by local priority in the following types: Raisecom Proprietary and Confidential 200 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM  Based on interface: on a UNI, local priorities (CoS priorities) are the same; namely, all EVCs on the UNI are the same.  Based on EVC: on an EVC, local priorities (CoS priorities) are the same.  Based on DSCP: packets that carry the specified DSCP list are configured as a data flow. Before packets are classified by carried DSCP in the EVC, you should configure mappings between DSCP and local priorities (CoS priorities) to conduct rate limit based on CoS (namely, you can configure non-IP packets to be added with the default DSCP priority on the UNI).  Based on PCP: packets that carry the specified PCP list (carried CoS priority) are configured as a data flow. Before packets are classified by carried PCP in the EVC, you should configure mappings between PCP and local priorities (CoS priorities) to conduct rate limit based on CoS.  Based on L2CP: after an EVC is established, a L2CP profile can be quoted; in this way, packets that carry the specified MAC address and protocol ID are configured as a data flow. You can combine the L2CP profile with the interface, EVC, DSCP, and PCP during configurations. – When you combine the L2CP profile with the EVC, DSCP, and PCP, the EVC will check whether an arriving packet is a L2CP packet. If yes, the EVC classifies packets by L2CP rules. If no, the EVC classifies packets by EVC, DSCP, and PCP rules. – When you combine the L2CP profile with the interface, the local priority based on interface and that based on L2CP are different. For example, the local priority based on interface is 1 while that based on L2CP is 2. When packets reach the UNI, they are classified by local priority 2 if they are L2CP packets, or by local priority 1 if they are non-L2CP packets. To configure traffic classification based on interface or EVC,  When CEVLAN and CoS reservation are enabled, packets enter the UNI with their carried CEVLAN and CoS, and packet CoS is the local priority.  When CEVLAN and CoS reservation are disabled, packets will be processed as untagged packets and obtain the PVID and local priority from the UNI. Rate limiting After an EVC is established, you need to configure rate limiting by simply quoting a bandwidth profile (containing multiple rate limiting rules, with each rule corresponding to a local priority) in the ingress and egress direction of a UNI. Namely, rate limiting works based on local priority in the following types:  Based on interface: packets are matched with the uniform local priority of the UNI and thus processed with rate limiting.  Based on EVC: packets are matched with the uniform local priority of the EVC and thus processed with rate limiting.  Based on DSCP: the DSCP flow is matched with the local priority of the UNI and thus processed with rate limiting.  Based on PCP: the PCP flow is matched with the local priority of the UNI and thus processed with rate limiting. When rate limiting is configured on basis of DSCP or PCP, all DSCP flows or PCP flows of the EVC must be conducted with or without rate limiting. When they are conducted with rate limiting, you cannot configure rate limiting based on EVC. When they are conducted without rate limiting, the CIR of DSCP flows or PCP flows must be smaller than the EVC CIR. Raisecom Proprietary and Confidential 201 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Test and measurement of Ethernet service Test and measurement of the Ethernet service function is achieved by the SLA, Y.1564, Loopback, and CFM. When the Ethernet service is created, you can start the Y.1564 test to measure its indexes, such as the delay, jitter, and frame loss rate. 10.2 Configuring RSOM 10.2.1 Preparing for configurations Scenario RSOM includes service transmission and service test and measurement. To configure service transmission, configure L2CP, CoS bandwidth profile, bandwidth profile, and flow profile, and connect services with each profile. Packets entering the service will be processed according to rules of the applied profile. To configure service test and measurement, configure the SLA, Y.1564, and loopback, associate the service with each function, and test functions in the service. Prerequisite Global CFM and interface CFM are enabled on devices at both ends of the EVC. 10.2.2 (Optional) configuring L2CP profile Step Configuration Description 1 Raisecom#config Enter the RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice)#l2cp-profile Create the L2CP profile group, and enter the l2cp-profile-id L2CPprofile group configuration mode. By default, the system has 3 profiles, but the default profile cannot be deleted and modified. 3 Raisecom(mefservice- Configure the L2CP profile group description. l2cpprofile)#description string By default, it is mef-l2cp-profile-group--l2cp- profile-id. 4 Raisecom(mefservice- Create the L2CP bandwidth profile. l2cpprofile)#l2cp-item l2cp-item-id 5 Raisecom(mefservice-l2cpitem)#l2cp- Configure protocol rules and processing command protocol { stp | lacp | lamp | link- of the packets corresponding to the L2CP bandwidth oam | esmc | dot1x | elmi | lldp | profile. ptp | cdp | vtp | pvst | udld | pagp } action { discard | forward | peer | tunnel } Raisecom Proprietary and Confidential 202 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Step Configuration Description 6 Raisecom(mefservice-l2cpitem)#dest- Configure the destination MAC rules and processing mac mac-address [ ethertype value command of the packets corresponding to the L2CP [ sub-type value ] ] action bandwidth profile. { discard | forward | peer | tunnel } By default, processing action is Tunnel. Raisecom(mefservice-l2cpitem)#exit 7 Raisecom(mefservice-l2cpprofile)# Configure transparent transmission of the L2CP exit packets with the specified destination MAC address. Raisecom(mefservice)#l2cp-process tunnel destination mac-address By default, transparent transport the L2CP packets with destination MAC address 010e.5e00.0003. 10.2.3 Configure CoS profile Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice)#cos-profile cos- Create CoS profile group, and enter CoS profile profile-id configuration mode. 3 Raisecom(mefservice-cosprofile)#name Configure CoS profile group description. name By default, CoS profile group description is cos- profile-id. 4 Raisecom(mefservice-cosprofile)#coslable Configure CoS value of CoS profile. cos-value [ remark-pcp pcp-value ] By default, it is 0. Re-mark PCP is 0. 5 Raisecom(mefservice-cosprofile)#type Configure services traffic offload mode of the { evc | dscp dscp-list | pcp pcp-list } CoS profile. After service traffic is classified, it Raisecom(mefservice-cosprofile)#type will be transmitted according to QoS rule of the { evc | dscp dscp-list | pcp pcp-list } Ethernet. l2cp { l2cp-profile-id | default1 | default2 | default3 } When you do not need to process L2CP packets Raisecom(mefservice-cosprofile)#type in a specified way, you can skip configuration l2cp { l2cp-profile-id | default1 | of rules for classifying L2CP packets. default2 | default3 } By default, it is PCP mode Cos is from 0 to 7. In the EVC configuration mode, the association way between UNI and EVC is different, and traffic classification is different.  When the association mode is All-To-One and Bundling, the packets carrying interface priority, Untagged packets, and packets carrying C-Tag enter the same line, namely line 1.  When the association way is Bundling-Multipex or Multipex, all the packets enter the same line, namely line 1. In the DSCP configuration mode, the association way between UNI and EVC is different, and traffic classification is different. Raisecom Proprietary and Confidential 203 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM  When the association way is All-To-One, Layer 3 packets is mapped to the local priority according to carried DSCP, and enter the corresponding line; Non-Layer 3 packets is mapped to the local priority according to services Default-DSCP configured by the default-dscp command, and enter the corresponding line. If DSCP is full mapping, do not discard the packets.  When the association way is Bundling, Bundling-Multipex, and Multipex, Layer 3 packets is mapped to the local priority according to carried DSCP, and enter the corresponding line; Non-Layer 3 packets is mapped to the local priority according to services Default-DSCP configured by the default-dscp command, and enter the corresponding line. When the DSCP carried on the Layer 3 does not match with services DSCP, discard the packets. In the PCP configuration mode, the association way between UNI and EVC is different, and traffic classification is different.  When the association way is All-To-One, the packets carrying interface priority and the packet carrying C-Tag according to configured PCP are mapped to the local priority; untagged packets is mapped to the local priority according to default-cepriority configured by the default-cepriority command. In the L2CP configuration mode, the packets are matched and processed according to L2CP profile attribute. In the L2CP and DACP, PCP or EVC mixed mode, classification follows L2CP, DSCP, PCP, and EVC in descending priority. 10.2.4 Configuring bandwidth profile Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice)#bandwidth enable Enable global bandwidth. By default, it is enabled. 3 Raisecom(mefservice)#bandwidth-profile Create a bandwidth profile group, and enter bandwidth-profile-id bandwidth profile group configuration. 4 Raisecom(mefservice- Create bandwidth profile group, and enter bwpprofile)#bandwidth-item bandwidth- bandwidth profile group configuration. item-id Raisecom(mefservice-bwpitem)#bandwidth- Create hierarchical bandwidth profile, and enter hierachy hierarchical bandwidth profile configuration mode. By default, the new hierarchical bandwidth profile does not limit on the speed and color blind mode. 5 Raisecom(mefservice-bwpitem)#name name Configure bandwidth profile description. By default, it is 123. 6 Raisecom(mefservice-bwpitem)#cir cir cbs Configure speed-limit rule for the bandwidth cbs [ eir eir ebs ebs ] profile. Raisecom(mefservice-bwpitem)#cir unlimited 7 Raisecom(mefservice-bwpitem)#color-mode Configure color aware mode for the bandwidth { aware | blind } profile. 8 Raisecom(mefservice-bwpitem)#coupling Enable bandwidth coupling. enable Raisecom Proprietary and Confidential 204 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Step Configuration Description 9 Raisecom(mefservice-bwpitem)#cos-profile Configure bandwidth profile to quote the CoS cos-profile-id profile. 10.2.5 Configuring interface Step Configuration Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface- Enter physical layer interface configuration type interface-number mode. 3 Raisecom(config-port)#mef-type { uni | Configure physical interface type. nni } By default, the line interface is the NNI while the client interface is the UNI. 4 Raisecom(config-port)#exit Enter RSOM configuration mode. Raisecom(config)# mefservice 5 Raisecom(mefservice)#interface Enter RSOM UNI configuration mode. interface-type interface-number 6 Raisecom(mefservice-interface)#uni-id Configure UNI interface identification. string 7 Raisecom(mefservice- Configure the association between interface and interface)#bandwidth-profile { ingress | bandwidth group. egress } bandwidth-profile-id 8 Raisecom(mefservice-interface)#l2cp- (Optional) configure the association between profile { l2cp-profile-id | default1 | the UNI interface and L2CP profile group. default2 | default3 } service service-id 9 Raisecom(mefservice-interface)#bundling- Configure association rules between the CE type { all-to-one | bundling | bundling- VLAN on the UNI and services. multiplex | multiplex } By default, it is All-To-One. 10 Raisecom(mefservice- interface)#default- Configure the default CE VLAN of the cevlan vlan-id Untagged packets. By default, it is VLAN 1. 11 Raisecom(mefservice- interface)#default- Configure the default CE VLAN priority of the cepriority priority Untagged packets. By default, it is 0. 10.2.6 Configuring CFM Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice)#service service-id Enter service configuration mode. Raisecom Proprietary and Confidential 205 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Step Configuration Description 3 Raisecom(mefservice-evc)#md level level Configure the MD level. By default, it is level 5. 4 Raisecom(mefservice-evc)#cfm local-mep Configure the local MEP ID. mep-id 5 Raisecom(mefservice-evc)#far-end remote- Configure UNI interface information on the uni-id { ip-address ip-address | mac service remote devices. mac-address | remote-mep mep-id } 6 Raisecom(mefservice-evc)#cc enable Enable transmitting CCM. By default, it is disabled. 7 Raisecom(mefservice-evc)#cc interval { 1 Configure the transmission period of the CCM, | 10 | 60 | 600 | 3ms | 10ms | 100ms } By default, it is 3.3s. 8 Raisecom(mefservice-evc)#ping { remote- Configure PING RMEP. mep mep-id | mac-address } [ size size ] 9 Raisecom(mefservice-evc)#traceroute Configure Traceroute RMEP. { remote-mep mep-id | mac-address } [ size size ] Parameters related to CFM on the service are calculated automatically by the system, such as the MD name and MA name. 10.2.7 Configuring SLA Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice)#performance-tier Create a threshold configuration profile, performance-tier-id and enter threshold configuration profile mode. 3 Raisecom(mefservice- Configure the description of a profile. thresholdprofile)#description string By default, it is PTperformance-tier-id. 4 Raisecom(mefservice-thresholdprofile)#cos- Configure index thresholds and CoS in lable cos-value { availability | delay | the SLA threshold profile. jitter | loss-rate } threshold-value 10.2.8 Configuring SLA test and measurement Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice Raisecom Proprietary and Confidential 206 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Step Configuration Description 2 Raisecom(mefservice)#service service-id Enter EVC configuration mode. 3 Raisecom(mefservice-evc)#performance-tier Configure association between the performance-tier-id service and threshold profile. 4 Raisecom(mefservice-evc)#sla remote-ip ip- Configure the IP address of the remote address device for the SLA test. 5 Raisecom(mefservice-evc)#sla remote-mep { all Configure the RMEP of the SLA test. | mep-list } [ size size ] 6 Raisecom(mefservice-evc)#sla start Start the SLA test. 10.2.9 Configuring Y.1564 Configuring Y.1564 test traffic profile Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice)#flow profile Create Y.1564 traffic profile, and enter traffic flow-profile-id profile configuration mode. 3 Raisecom(mefservice- Configure Y.1564 traffic profile description. flowprofile)#description string By default, description about traffic profile is FLOW-flow-profile-id. 4 Raisecom(mefservice- Configure Y.1564 test traffic type. flowprofile)#frame type { vsm | udp source-port port-number dest-port By default, it is VSM packet. port-number } 5 Raisecom(mefservice- Configure next hop IP address of Y.1564 test flowprofile)#nexthop ip-address ip- traffic only when the packet of Y.1564 test is UDP. address 6 Raisecom(mefservice- Configure the frame size of Y.1564 test traffic. flowprofile)#frame length single length By default, it is uniframe and it is 512 bytes. 7 Raisecom(mefservice-flowprofile)# Configure Y.1564 test traffic calibration. frame pattern prbs 8 Raisecom(mefservice- Configure the source IP address of Y.1564 test flowprofile)#source-ip ip-address traffic. 9 Raisecom(mefservice- Configure the source MAC address of Y.1564 flowprofile)#source-mac mac-address traffic. Raisecom Proprietary and Confidential 207 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Configuring Y.1564 test Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice)#service service-id Enter EVC configuration mode. 3 Raisecom(mefservice-evc)#rcsam flow- Configure association between service and profile flow-profile-id Y.1564 traffic profile. 4 Raisecom(mefservice-evc)#performance- Configure association between services and tier performance-tier-id threshold profile. 5 Raisecom(mefservice-evc)#rcsam duration Configure Y.1564 test period. { forever | period } By default, it is 15 minutes. 6 Raisecom(mefservice-evc)#rcsam Configure Y.1564 performance test bandwidth performance cir ratio ratio ratio. By default, it is 100%. 7 Raisecom(mefservice-evc)#rcsam Configure remote devices information of the { remote-mac mac-address | remote-mep Layer 2 Y.1564 test based on CFM or remote { all | mep-id } } devices MAC. Raisecom(mefservice-evc)#rcsam remote- Configure information, carried in emulated user ip ip-address packets, about the remote device for the Layer 3 Y.1564 test on Internet leased line services. 8 Raisecom(mefservice-evc)#rcsam start Start the Y.1564 test. { both | configuration | performance } The SLA test and Y.1564 test share threshold profile. During the test, it needs to bind respective threshold profile. 10.2.10 Configuring loopback Configure the loopback test as below. Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice)#service service-id Create the service, and enter EVC configuration mode. 3 Raisecom(mefservice-evc)#loopback type Configure the type of loopback packets. { vsm | udp source-port port-number dest-port port-number } By default, it is VSM. 4 Raisecom(mefservice-evc)#loopback enable Enable service loopback. Raisecom Proprietary and Confidential 208 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM  The loopback and Y.1564 test needs to cooperate with each other. Enable loopback on the remote device, and then enable Y.1564 test on the local device for test.  Be cautious about starting service loopback because it can have influence on normal services.  After the loopback test is complete, the loopback disable command to disable loopback immediately. 10.2.11 Configuring services Step Configuration Description 1 Raisecom#config Enter RSOM configuration mode. Raisecom(config)#mefservice 2 Raisecom(mefservice-evc)#sdp Configure association between the service and interface-type interface-number SDP interface. [ interface-type backup-interface- number ] 3 Raisecom(mefservice-evc)#sap Configure association between service and SAP, interface-type interface-number and enter service UNI configuration mode, 4 Raisecom(mefservice-evcuni)#cevlan-map Configure the CE VLAN on the service UNI. vlan-list 5 Raisecom(mefservice-evcuni)#type Configure UNI interface type of the E-Tree { leaf | root } services only when the type of the Ethernet service is configured to E-Tree. 6 Raisecom(mefservice-evcuni)#bandwidth- Configure association between UNI of the service profile { ingress | egress } and bandwidth profile group. bandwidth-profile-id 7 Raisecom(mefservice-evcuni)#exit Exit UNI configuration mode. 8 Raisecom(mefservice)#service service- Enter service configuration mode. id 9 Raisecom(mefservice-evc)#id string Configure the service ID. By default, it is service-service-id. 10 Raisecom(mefservice-evc)#type { eline Configure the type of the Ethernet service. | elan | etree } By default, it is E-LAN. 11 Raisecom(mefservice-evc)#cevlan-cos Enable preservation of the CE VLAN and CoS preservation label of packets. By default, it is enabled. 12 Raisecom(mefservice-evc)#default-dscp Configure the default DSCP priority of non-IP dscp packets. By default, it is 0. 13 Raisecom(mefservice-evc)#encapsulate- Configure the mode for the service to process mode { forward | svlan } received packets. By default, the service adds a SVLAN Tag to received packets. Raisecom Proprietary and Confidential 209 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Step Configuration Description 14 Raisecom(mefservice-evc)#primary-vid Configure the SVLAN for the service. vlan-id By default, it is VLAN 1. 15 Raisecom(mefservice-evc)#link-state- Enable link-state tracking for the service. tracking enable 16 Raisecom(mefservice-evc)#statistics Enable service statistics. enable 17 Raisecom(mefservice-evc)#no shutdown Enable the service. Test and measurement of the service mainly aim at test of the EVC on the network side. Services include EVC and corresponding UNI. To configure the EVC UNI, you need to configure the content as below:  Enter interface configuration mode, and configure interface type of the physical layer according to the mef-type command. For example, configure the physical interface as the UNI or NNI.  In the RSOM configuration mode, enter UNI interface configuration mode by using the interface command, and configure attributes of the UNI.  Enter the EVC mode; associate the EVC and UNI by using the sap command. The SAP interface is the UNI of the service. 10.2.12 Checking configurations No. Configuration Description 1 Raisecom#show rsom l2cp-profile [ l2cp-profile-id Show configurations of the L2CP | default1 | default2 | default3 ] profile group. 2 Raisecom#show rsom cos-profile [ cos-profile-id ] Show configurations of the CoS profile group. 3 Raisecom#show rsom bandwidth-profile bandwidth- Show configurations of the profile-id bandwidth profile group. 4 Raisecom#show rsom uni interface [ interface-type Show the UNI interface. interface-number ] 5 Raisecom#show rsom statistics interface Show the UNI interface statistics. [ interface-type interface-number ] 6 Raisecom#show rsom service service-id performance Show statistics on the SLA test. { remote-ip ip-address | remote-mep mep-id } 7 Raisecom#show rsom service statistics [ service- Show service statistics. id ] 8 Raisecom#show rsom service [ service-id ] status Show the service status. Raisecom Proprietary and Confidential 210 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM 10.3 Maintenance Command Description Raisecom(mefservice-evc)#clear statics Clear EVC statistics. 10.4 Configuration examples 10.4.1 Example for configuring RSOM Networking requirements As shown in Figure 10-3, to fast activate point-to-point Ethernet leased line services, establish an EVC between iTN A and iTN B. Then, start the Y.1564 test to measure indexes, such as delay, jitter, and packet loss rate. The Ethernet lease line should meet the following requirements:  Allow all VLANs to pass the EVC.  Classify packets and limit their rate based on CoS in the EVC, with packet priorities 0–2 corresponding to local priority 1, packet priorities 3–5 corresponding to local priority 2, and packet priorities 6–7 corresponding to local priority 3.  Apply the same rate limit on packets of different priorities in the EVC. Configure CIR to 10 Mbit/s, CBS to 100 Kbytes, CIR to 10 Mbit/s, and EBS to 100 Kbytes.  Test the performance and configurations of the service by using a test flow of packets with a fixed length. Figure 10-3 RSOM networking Configuration steps Configuration of iTN A and those of iTN B are similar. The following steps take iTN A for example and will clarify their differences. Step 1 Create a CoS profile which classifies traffic based on PCP. Raisecom#config Raisecom(config)#mefservice Raisecom(mefservice)#cos-profile 1 Raisecom(mefservice-cosprofile)#coslable 1 Raisecom(mefservice-cosprofile)#type pcp 0-2 Raisecom(mefservice-cosprofile)#exit Raisecom Proprietary and Confidential 211 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Raisecom(mefservice)#cos-profile 2 Raisecom(mefservice-cosprofile)#coslable 2 Raisecom(mefservice-cosprofile)#type pcp 3-5 Raisecom(mefservice-cosprofile)#exit Raisecom(mefservice)#cos-profile 3 Raisecom(mefservice-cosprofile)#coslable 3 Raisecom(mefservice-cosprofile)#type pcp 6,7 Raisecom(mefservice-cosprofile)#exit Step 2 Enable global bandwidth. Raisecom(mefservice)#bandwidth enable Step 3 Create a bandwidth profile, and configure it to quote the CoS profile. Raisecom(mefservice)#bandwidth-profile 1 Raisecom(mefservice-bwpprofile)#bandwidth-item 1 Raisecom(mefservice-bwpitem)#cir 10000 cbs 100 eir 10000 ebs 100 Raisecom(mefservice-bwpitem)#cos-profile 1 Raisecom(mefservice-bwpitem)#exit Raisecom(mefservice-bwpprofile)#bandwidth-item 2 Raisecom(mefservice-bwpitem)#cir 10000 cbs 100 eir 10000 ebs 100 Raisecom(mefservice-bwpitem)#cos-profile 2 Raisecom(mefservice-bwpitem)#exit Raisecom(mefservice-bwpprofile)#bandwidth-item 3 Raisecom(mefservice-bwpitem)#cir 10000 cbs 100 eir 10000 ebs 100 Raisecom(mefservice-bwpitem)#cos-profile 3 Raisecom(mefservice-bwpitem)#exit Raisecom(mefservice-bwpprofile)#exit Step 4 Create a SLA threshold profile. Raisecom(mefservice)#performance-tier 5 Raisecom(mefservice-thresholdprofile)#cos-label 1 availability 100 Raisecom(mefservice-thresholdprofile)#cos-label 1 delay 500 Raisecom(mefservice-thresholdprofile)#cos-label 1 jitter 500 Raisecom(mefservice-thresholdprofile)#cos-label 1 loss-rate 100 Raisecom(mefservice-thresholdprofile)#cos-label 2 availability 100 Raisecom(mefservice-thresholdprofile)#cos-label 2 delay 500 Raisecom(mefservice-thresholdprofile)#cos-label 2 jitter 500 Raisecom(mefservice-thresholdprofile)#cos-label 2 loss-rate 100 Raisecom(mefservice-thresholdprofile)#cos-label 3 availability 100 Raisecom(mefservice-thresholdprofile)#cos-label 3 delay 500 Raisecom(mefservice-thresholdprofile)#cos-label 3 jitter 500 Raisecom(mefservice-thresholdprofile)#cos-label 3 loss-rate 100 Raisecom(mefservice-thresholdprofile)#exit Raisecom Proprietary and Confidential 212 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Step 5 Create a RCSAM profile. Raisecom(mefservice)#flow profile 2 Raisecom(mefservice-flowprofile)#frame type vsm Raisecom(mefservice-flowprofile)#frame length single 512 Raisecom(mefservice-flowprofile)#exit Raisecom(mefservice)#exit Step 6 Configure physical layer interface configuration mode. Enable interface CFM. Raisecom(config)#interface client 1 Raisecom(config-port)#mef-type uni Raisecom(config-port)#ethernet cfm enable Raisecom(mefservice-port)#uni-id itnauni1 Raisecom(config-port)#exit Raisecom(config)#interface line 1 Raisecom(config-port)#mef-type nni Raisecom(config-port)#ethernet cfm enable Raisecom(config-port)#exit Step 7 Configure SAP and SDP of EVC services. Configure SAP to quote the bandwidth profile. Configure the UNI ID to itnauni1 on iTN A. Configure the UNI ID to itnbuni1 on iTN B. Raisecom(config)#mefservice Raisecom(mefservice)#service 1 Raisecom(mefservice-evc)#sap client 1 Raisecom(mefservice-evcuni)#bandwidth-profile ingress 1 Raisecom(mefservice-evcuni)#bandwidth-profile egress 1 Raisecom(mefservice-evcuni)#exit Raisecom(mefservice-evc)#sdp line 1 Step 8 Create an EVC service. Configure the name of the remote UNI to 2 and MEP to 2 on iTN A. Configure the name of the remote UNI to 1 and MEP to 1 on iTN B. Raisecom(mefservice-evc)#type eline Raisecom(mefservice-evc)#encapsulate-mode forward Raisecom(mefservice-evc)#primary-vid 10 Raisecom(mefservice-evc)#far-end 2 remote-mep 2 Step 9 Configure OAM. Configure the local MEP to 1 on iTN A. Configure the local MEP to 2 on iTN B. Raisecom Proprietary and Confidential 213 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Raisecom(mefservice-evc)#cfm local-mep 1 Raisecom(mefservice-evc)#cc enable Step 10 Configure the EVC to quote the threshold profile. Raisecom(mefservice-evc)#performance-tier 5 Step 11 Configure the EVC to quote the RCSAM flow profile. Raisecom(mefservice-evc)#rcsam flow-profile 2 Step 12 Activate the EVC. Raisecom(mefservice-evc)#no shutdown Step 13 Configure the RCSAM remote MEP on iTN A. Raisecom(mefservice-evc)#rcsam remote-mep 2 Step 14 Enable loopback on iTN B. Raisecom(mefservice-evc)#loopback enable Step 15 Start the RCSAM test of the EVC. Raisecom(mefservice-evc)#rcsam start both Checking results Use the show rsom service command on iTN A to view EVC configurations. ServiceIndex: 1,State: no shutdown Identifier: service1 Type: eline,Statistics: enable Cevlan-Cos: Preserve,Default-dscp: 0 Encapsulte-Mode: forward,Primary-vid: 10 Raisecom Proprietary and Confidential 214 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Sdp 1: line 1 Sdp 2: -- Sap: client 1 Type: Root,Cevlan-map: 1-4094 Ingress-bwp-profile: 1,Egress-bwp-profile: 1 farend configuration information: far-end 2 remote-mep 2 cfm configuration information: md level: 5 cc interval: 3.3ms Sdp 1: line 1 Sdp 2: -- cfm local-mep: 1 cc enable sla configuration information: performance-tier: 5 description: Performancetier5 cos-label 1 delay 500 cos-label 1 jitter 500 cos-label 1 loss-rate 100 cos-label 1 availability 100 cos-label 2 delay 500 cos-label 2 jitter 500 cos-label 2 loss-rate 100 cos-label 2 availability 100 cos-label 3 delay 500 cos-label 3 jitter 500 cos-label 3 loss-rate 100 cos-label 3 availability 100 sla remote-ip 172.16.70.32 sla start Transmit Interval(msec): 1000 schedule Period(sec): 300 Schedule Life(sec): Forever Y.1564 configuration information: flow profile: 2 description: RcSamFlow2 frame type: vsm source-port: -- dest-port: -- frame length type: single frame size: 512 frame pattern: null source-mac: -- source-ip: -- nexthop ip-address: -- rcsam duration: 15 rcsam performance cir ratio: 100 loopback configuration information: loopback type: vsm source-port: -- dest-port: -- loopback disable Use the show rsom service rcsam result command on iTN A to view results of the test. Raisecom(mefservice-evc)#show rsom service 1 rcsam result Rcsam configuration test detail result: Service Index: 1 Cos-label: 1 Raisecom Proprietary and Confidential 215 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Far-end type: remote-mep Far-end value: 2 Test result: PASS Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)) Test-step Throughput(Kbps) FD(us) FDV(us) FLR(0.001%) result --------------------------------------------------------------------- 1 0 12 0 0 PASS 2 0 0 0 0 PASS 3 64 12 0 0 PASS 4 64 12 0 0 PASS 5 192 12 0 0 PASS 6 192 12 0 0 PASS Rcsam performance test total result: Service Index: 1 Cos-label: 1 test status: IDLE AVAIL(%): 0 Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)), AVAIL(100(0.001%)) Parameter min mean max ---------------------------------------------- IR(Kbps) 64 64 64 FD(us) 12 12 13 FDV(us) 0 0 1 FLR(%%) 0 0 0 FDR -- 1 -- BER -- 0 -- Rcsam performance test last result: Service Index: 1 Cos-label: 1 Last Index: 1 test status: IDLE test start time: 2016-08-10,23:24:20.0 AVAIL(%): 0 Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)), AVAIL(100(0.001%)) Parameter min mean max ------------------------------------------------- IR(Kbps) -- 64 -- FD(us) 12 12 13 FDV(us) 0 0 1 FLR(%%) -- 0 -- BER -- 0 -- Rcsam configuration test detail result: Service Index: 1 Cos-label: 2 Far-end type: remote-mep Far-end value: 2 Test result: PASS Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)) Raisecom Proprietary and Confidential 216 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM Test-step Throughput(Kbps) FD(us) FDV(us) FLR(0.001%) result -------------------------------------------------------------------- 1 0 12 0 0 PASS 2 0 0 0 0 PASS 3 64 12 0 0 PASS 4 64 12 0 0 PASS 5 192 12 0 0 PASS 6 192 12 0 0 PASS Rcsam performance test total result: Service Index: 1 Cos-label: 2 test status: IDLE AVAIL(%): 0 Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)), AVAIL(100(0.001%)) Parameter min mean max ------------------------------------------------- IR(Kbps) 64 64 64 FD(us) 12 12 13 FDV(us) 0 0 1 FLR(%%) 0 0 0 FDR -- 1 -- BER -- 0 -- Rcsam performance test last result: Service Index: 1 Cos-label: 2 Last Index: 1 test status: IDLE test start time: 2016-08-10,23:24:20.0 AVAIL(%): 0 Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)), AVAIL(100(0.001%)) Parameter min mean max ------------------------------------------------ IR(Kbps) -- 64 -- FD(us) 12 12 13 FDV(us) 0 0 1 FLR(%%) -- 0 -- BER -- 0 -- Rcsam configuration test detail result: Service Index: 1 Cos-label: 3 Far-end type: remote-mep Far-end value: 2 Test result: PASS Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)) Test-step Throughput(Kbps) FD(us) FDV(us) FLR(0.001%) result -------------------------------------------------------------------- 1 0 12 0 0 PASS 2 0 0 0 0 PASS 3 64 12 0 0 PASS Raisecom Proprietary and Confidential 217 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 10 RSOM 4 64 12 0 0 PASS 5 192 12 0 0 PASS 6 192 12 0 0 PASS Rcsam performance test total result: Service Index: 1 Cos-label: 3 test status: IDLE AVAIL(%): 0 Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)), AVAIL(100(0.001%)) Parameter min mean max ------------------------------------------------- IR(Kbps) 64 64 64 FD(us) 12 12 12 FDV(us) 0 0 0 FLR(%%) 0 0 0 FDR -- 0 -- BER -- 0 -- Rcsam performance test last result: Service Index: 1 Cos-label: 3 Last Index: 1 test status: IDLE test start time: 2016-08-10,23:24:20.0 AVAIL(%): 0 Flow profile ID: 2 SAC: FD(500us), FDV(500us), FLR(100(0.001%)), AVAIL(100(0.001%)) Parameter min mean max ------------------------------------------------- IR(Kbps) -- 64 -- FD(us) 12 12 12 FDV(us) 0 0 0 FLR(%%) -- 0 -- BER -- 0 -- Raisecom Proprietary and Confidential 218 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security 11 Security This chapter describes principles and configuration procedures of security, and provides related configuration examples, including the following sections:  Introduction  Configuring CPU protection  Configuring RADIUS  Configuring TACACS+  Maintenance  Configuration examples 11.1 Introduction With continuous development of Internet technology, network is increasingly applied. More and more enterprises make development with network. How to ensure the data and resource security becomes a significant problem. In addition, the device performance is reduced or the device operates improperly in case users access the network in an unconscious but aggressive way. Security technologies, such as Access Control List (ACL) and user authentication, can improve network and device security effectively. 11.1.1 ACL To control influence of illegal packets on the network, you need to configure a series of rules on network devices to decide which packets can be transmitted. There rules are defined through ACL. ACL is a series of sequential rules composed by permit | deny sentences. These rules describe packets based on based on source MAC addresses, destination MAC addresses, source IP addresses, destination IP addresses, and interface IDs. The device decides packets to be received or refused based on these rules. 11.1.2 CPU protection Because the network environment of the RAX711-C is complex, the RAX711-C may be attacked by multiple packets, such as ARP packets, BPDU packets, and ICMP packets. If the Raisecom Proprietary and Confidential 219 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security RAX711-C receives a great number of attack packets in a short period, the CPU may work with full load. Therefore, the RAX711-C cannot process normal services in time, degrading device performance. To effectively use resources and prevent packet attacks, the RAX711-C needs to protect the CPU. In a certain interval, when the number of some packet received by an interface exceeds the configured CIR, the RAX711-C (or interface) will calculate the number of allowable data to pass according to preconfigured CIR and CBS, discard excess data, and send a Trap on the attacking by this type of packets. 11.1.3 RADIUS Remote Authentication Dial In User Service (RADIUS) is a standard communication protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for remote users. RADIUS uses the User Datagram Protocol (UDP) as the transport protocol (port 1812 is for authentication. Port 1813 is for accounting) and has good instantaneity. In addition, RADIUS supports re-transmission mechanism and backup server mechanism. Therefore, it provides good reliability. RADIUS works in client/server mode. Network devices are clients of the RADIUS server. RADIUS server is responsible for receiving users' connection requests, authenticating uses, and replying configurations required by all clients to provide services for users. This mode can control users accessing devices and network to improve network security. Clients and the RADIUS server communicate with each other through the shared key. The shared key is not transmitted through the network. In addition, any user password needs to be encapsulated when it is transmitted through clients and RADIUS. This helps prevent getting the user password by sniffing unsecure network. RADIUS accounting is designed for RADIUS authenticated users. When a user logs in to the device, the device sends an Account-Start packet to the RADIUS accounting server to begin accounting. During login, the device sends Account-Update packets to the RADIUS accounting server. When the user exits from the device, no accounting packet is sent to the RADIUS accounting server. These packets contain the login time. With these packets, the RADIUS accounting server can record the access time and operation of each user. 11.1.4 TACACS+ Terminal Access Controller Access Control System (TACACS+) is a network access authentication protocol, similar to RADIUS. Compared with RADIUS, TACACS+ has the following features:  Use TCP port 49, providing the higher transmission reliability. RADIUS uses the UDP port.  Encapsulate the whole standard TACACS+ packet but for the TACACS+ header, providing the higher security. RADIUS encapsulates the user password only.  Separate TACACS+ authentication from TACACS+ authorization and TACACS+ accounting, providing a more flexible deployment mode. Therefore, compared with RADIUS, TACACS+ is more secure and reliable. However, as an open protocol, RADIUS is more widely-used. Raisecom Proprietary and Confidential 220 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security 11.2 Configuring ACL 11.2.1 Preparing for configurations Scenario To filter packets, you should configure ACL on a network device to identify objects to be filtered. Then, the network device can allow or disallow packets of specified types to pass according to preconfigured rules. Prerequisite N/A 11.2.2 Configuring ACL Select steps 3–8 as required. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#access-list acl-number [ name Create an ACL and enter ACL acl-name ] configuration mode. The value of acl-number parameter defines the type of ACL configuration mode.  Values 1000–0999: basic IP ACL  Values 2000–2999: extended IP ACL  Values 3000–3999: MAC ACL  Values 4000–4999: MPLS ACL  Values 5000–5999: user ACL  Values 6000–6999: basic IPv6 ACL  Vaules 7000–7999: advanced ACL 3 Raisecom(config-acl-ip-std)#rule [ rule-id ] (Optional) configure the basic IP ACL { deny | permit } { source-ip-address source- rule. ip-mask | any } 4 Raisecom(config-acl-ip-ext)#rule [ rule-id ] (Optional) configure the extended IP { deny | permit } { protocol-id | icmp | igmp | ACL rule. ip } { source-ip-address source-ip-mask | any } { destination-ip-address destination-ip-mask | any } [ dscp dscp-value | precedence precedence-value | tos tos-value ] [ ttl ttl- value ] [ fragment ] Raisecom Proprietary and Confidential 221 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security Step Command Description Raisecom(config-acl-ip-ext)#rule [ rule-id ] { deny | permit } { tcp | udp } { source-ip- address source-ip-mask | any } [ source-port | range mini-port max-port ]{ destination-ip- address destination-ip-mask | any } [ destination-port | range mini-port max-port ] [ dscp dscp-value | precedence precedence-value | tos tos-value ] [ ttl ttl-value ] [ fragment ] 5 Raisecom(config-acl-mac)#rule [ rule-id ] (Optional) configure the MAC ACL { deny | permit } { source-mac-address source- rule. mac-mask | any } { destination-mac-address destination-mac-mask | any } [ ethertype { ethertype [ ethertype-mask ] | ip | arp } ] [ svlan svlan-id ] [ cvlan cvlan-id ] [cos cos ] [ inner-cos inner-cos ] 6 Raisecom(config-acl-udf)#rule [ rule-id ] (Optional) configure the user ACL { deny | permit } { layer2 | ipv4 } rule-string rule. rule-mask offset-value 7 Raisecom(config-acl-ipv6)#rule [ rule-id ] (Optional) configure basic IPv6 ACL { deny | permit } { protocol-id | ipv6 } rules. { source-ipv6-address/M | any } { destination- ipv6-address/M | any } [ traffic-class class- value ] [ flow-label label-value ] [ fragment ] Raisecom(config-acl-ipv6)#rule [ rule-id ] { deny | permit } icmpv6 { source-ipv6- address/M | any } { destination-ipv6-address/M | any } [ icmpv6-type icmpv6-type [ icmpv6- code ] ] [ traffic-class class-value ] [ flow- label label-value ] [ fragment ] Raisecom(config-acl-ipv6)#rule [ rule-id ] { deny | permit } tcp { source-ipv6-address/M | any } [ source-port ] { destination-ip- address/M | any } [ destination-port ] [ ack ack-value ] [ fin fin-value ] [ psh psh-value ] [ rst rst-value ] [ syn syn-value ] [ urg urg- value ] [ traffic-class class-value ] [ flow- label label-value ] [ fragment ] Raisecom(config-acl-ipv6)#rule [ rule-id ] { deny | permit } udp { source-ipv6-address/M | any } [ source-port ] { destination-ip- address/M | any } [ destination-port ] [ traffic-class class-value ] [ flow-label label-value ] [ fragment ] Raisecom Proprietary and Confidential 222 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security Step Command Description 8 Raisecom(config-acl-advanced)#rule [ rule-id ] (Optional) configure advanced ACL { deny | permit } { source-mac-address source- rules. mac-mask | any } { destination-mac-address destination-mac-mask | any } [ svlan svlanid ] [ cvlan cvlanid ] [cos cos ] [ inner-cos inner- cos ] { source-ip-address source-ip-mask | any } { destination-ip-address destination-ip- mask | any } [ dscp dscp-value | precedence precedence-value | tos tos-value ] [ ttl ttl- value ] [ fragment ] 11.2.3 Configuring filter Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface-type Enter interface configuration mode. interface-number 3 Raisecom(config-port)#filter { ingress | Apply the ACL rule to the interface. egress } access-list { acl-number | name acl- name } [ statistics ] 11.2.4 Checking configurations No. Command Description 1 Raisecom#show access-list [ acl-number | name acl- Show ACL information. name ] 2 Raisecom#show filter interface Show filter information. Raisecom#show filter interface interface-type interface-number [ ingress | egress ] 11.3 Configuring CPU protection 11.3.1 Preparing for configurations Scenario When the RAX711-C receives a great number of attack packets in a short period, the CPU will run with full load and its utilization rate will reach to 100%, which may cause the breakdown of the device. CPU CAR helps efficiently limit the rate of packets entering the CPU. Raisecom Proprietary and Confidential 223 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security Prerequisite N/A 11.3.2 Configuring global CPU protection Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#cpu-protect car Configure the protocol type, rate limiting mode, { arp | dhcp | global | icmp | igmp | CIR, and CBS of global CPU packet protection. tcp } kbps cir cir cbs cbs By default, the CIR and CBS are respectively configured to 500 pps and 500 pkt globally. 11.3.3 Configuring interface CPU preotection Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#cpu- Configure the CIR and CBS of physical interface CPU protect car { arp | dhcp | icmp packet protection. | igmp | tcp } { kbps | pps } cir cir cbs cbs By default, default configurations of CPU CAR are adopted. 11.3.4 Checking configurations No. Command Description 1 Raisecom#show cpu-protect statistics Show configurations of global CPU protection. 2 Raisecom#show cpu-protect car statistics Show CPU CAR statistics on the interface. [ interface-type interface-number ] 11.4 Configuring RADIUS 11.4.1 Preparing for configurations Scenario To control users to access devices and network, you can deploy the RADIUS server at the network to authenticate and account users. The RAX711-C can be used as a Proxy of the RADIUS server to authenticate users based on results returned by the RADIUS server. Raisecom Proprietary and Confidential 224 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security Prerequisite N/A 11.4.2 Configuring RADIUS authentication Step Command Description 1 Raisecom#radius [ backup ] ip-address Specify the IP address and port ID of the RADIUS [ auth-port port-id ] authentication server. The backup parameter is used to specify a backup RADIUS authentication server. 2 Raisecom#user login { local-user | Configure the authentication mode for login when radius-user | local-radius | radius- RADIUS authentication is applied. local [ server-no-response ] } 11.4.3 Configuring RADIUS accounting Step Command Description 1 Raisecom#aaa accounting Enable RADIUS accounting. login enable By default, RADIUS accounting is disabled. 2 Raisecom#radius Specify the IP address and port ID of the RADIUS accounting server. [ backup ] accounting- By default, the UDP port ID is configured to 1813. server ip-address [ auth-port port-id ] The backup parameter is used to specify a backup RADIUS accounting server. 3 Raisecom#radius Configure the shared key used for communicating with the RADIUS [ backup ] accounting- accounting server. The shared key must be identical to the one server key string configured on the RADIUS accounting server. Otherwise, accounting operation fails. By default, the shared key is empty. 4 Raisecom#aaa accounting Configure the processing policy for accounting failure. fail { online | offline} By default, the processing policy is configured to online. In indicates that users are allowed to log in if accounting operation fails. 5 Raisecom#aaa accounting Configure the interval for sending accounting update packets. If the update period interval is configured to 0, it indicates that no accounting update packet is sent. By default, the interval for sending accounting update packets is configured to 0. With the Account-Start packet, Account-Update packet, and Account-Stop packet, the RADIUS server can record the access time and operations of each user. Raisecom Proprietary and Confidential 225 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security 11.4.4 Checking configurations No. Command Description 1 Raisecom#show radius-server Show configurations of the RADIUS server. 11.5 Configuring TACACS+ 11.5.1 Preparing for configurations Scenario To control users accessing devices and network, you can deploy the RADIUS server in the network to authenticate and account users. Compared with RADIUS, TACACS+ is more secure and reliable. The RAX711-C can be used as a Proxy of the TACACS+ server to authenticate users based on results returned by the TACACS+ server. Prerequisite N/A 11.5.2 Configuring TACACS+ authentication Step Command Description 1 Raisecom#tacacs-server [ backup ] Specify the IP address and port ID of the TACACS+ ip-address [ auth-port port-id ] authentication server. The backup parameter is used to specify a backup TACACS+ authentication server. 2 Raisecom#tacacs-server key string Configure the shared key for TACACS+ authentication. 3 Raisecom#tacacs [ backup ] Specify the IP address and port ID of the TACACS+ accounting-server ip-address accounting server. [ auth-port port-id ] The backup parameter is used to specify a backup TACACS+ accounting server. 4 Raisecom#user login { local-user Configure the authentication mode for login when | tacacs-user | local-tacacs | TACACS+ authentication is applied. tacacs-local [ server-no- response ] } 11.5.3 Checking configurations No. Command Description 1 Raisecom#show tacacs-server Show TACACS+ server configurations. Raisecom Proprietary and Confidential 226 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security 11.6 Maintenance Command Description Raisecom(config)#clear filter statistics interface-type interface- Clear statistics on the number { ingress | egress } [ access-list acl-number ] filter. 11.7 Configuration examples 11.7.1 Examples for configuring ACL Networking requirements As shown in Figure 11-1, to control users accessing the server, you can deploy ACL on RAX711-C A to disallow 192.168.1.1 to access the server with the IP address of 192.168.1.100. Figure 11-1 Configuring ACL Configuration steps Step 1 Configure IP ACL. Raisecom#config Raisecom(config)#access-list 2001 Raisecom(config-acl-ip-ext)#rule 1 deny ip 192.168.1.1 255.255.255.0 192.168.1.100 255.255.255.0 Step 2 Apply ACL to Client interface 2 on RAX711-C A. Raisecom(config)#interface client 2 Raisecom(config-port)#filter ingress access-list 2001 Raisecom Proprietary and Confidential 227 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security Checking results Use the show access-list command to show ACL configurations. Raisecom#show access-list 2001 advanced-ipv4 ACL 2001, 1 rules ACL's step is 10 rule 1 deny ip 192.168.1.1 255.255.255.0 192.168.1.100 255.255.255.0 Use the show filter command to show filter configurations. Raisecom#show filter interface client 2 Interface Direction Acl-Num ----------------------------------------- client2 ingress 2001 11.7.2 Example for configuring RADIUS Networking requirements As shown in Figure 11-2, to control users accessing RAX711-C A, you need to deploy RADIUS authentication and accounting on RAX711-C A to authenticate users logging in to RAX711-C A and record their operations. Configure the interval for sending Account-Update packet to 2min. Configure the processing policy for accounting failure to offline. Figure 11-2 Configuring RADIUS Configuration steps Step 1 Authenticate login users through RADIUS. Raisecom#radius 192.168.1.1 Raisecom#radius-key raisecom Raisecom#user login radius-user Step 2 Account login users through RADIUS. Raisecom Proprietary and Confidential 228 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security Raisecom#aaa accounting login enable Raisecom#radiusaccounting-server 192.168.1.1 Raisecom#radius accounting-server key raisecom Raisecom#aaa accounting fail offline Raisecom#aaa accounting update 120 Checking results Use the show radius-server command to show RADIUS configurations. Raisecom#show radius-server Authentication server IP: 192.168.1.1 port:1812 Backup authentication server IP:0.0.0.0 port:1812 Authentication server key: raisecom Accounting server IP: 192.168.1.1 port:1813 Backup accounting server IP: 0.0.0.0 port:1813 Accounting server key: raisecom Accounting login: enable Update interval(min.): 120 Accounting fail policy: offline 11.7.3 Example for configuring TACACS+ Networking requirements As shown in Figure 11-3, to control users accessing RAX711-C A, you need to deploy TACACS+ authentication on RAX711-C A to authenticate users logging in to RAX711-C A. Figure 11-3 TACACS+ networking Configuration steps Authenticate login users through TACACS+. Raisecom#tacacs-server 192.168.1.1 Raisecom#tacacs-serverkey raisecom Raisecom#user login tacacs-user Raisecom Proprietary and Confidential 229 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 11 Security Checking results Use the show tacacs-server command to show TACACS+ configurations. Raisecom#show tacacs-server Server Address: 192.168.1.1 Backup Server Address: -- Sever Shared Key: raisecom Accounting server Address: -- Backup Accounting server Address: -- Total Packet Sent: 0 Total Packet Recv: 0 Num of Error Packets: 0 Raisecom Proprietary and Confidential 230 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12 System management and maintenance This chapter describes principles and configuration procedures of system management and maintenance, and provides related configuration examples, including following sections:  Introduction  Configuring LLDP  Configuring SNMP  Configuring optical module DDM  Configuring system log  Configuring alarm management  Configuring memory monitoring  Configuring CPU monitoring  Configuring RMON  Configuring fan monitoring  Configuring loopback  Configuring fault detection  Maintenance  Configuration examples 12.1 Introduction 12.1.1 LLDP With the enlargement of network scale and increase of network devices, the network topology becomes more and more complex and network management becomes very important. A lot of network management software adopts auto-detection function to trace changes of network topology, but most of the software can only analyze the Layer 3 network and cannot make sure the interfaces connect to other devices. Link Layer Discovery Protocol (LLDP) is based on IEEE 802.1ab standard. Network management system can fast grip the Layer 2 network topology and changes. Raisecom Proprietary and Confidential 231 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance LLDP organizes the local device information in different Type Length Value (TLV) and encapsulates in Link Layer Discovery Protocol Data Unit (LLDPDU) to transmit to straight- connected neighbour. It also saves the information from neighbour as standard Management Information Base (MIB) for network management system querying and judging link communication. LLDP packet The LLDP packet is an Ethernet packet encapsulated with LLDPDU in data unit and transmitted by multicast. LLDPDU is data unit of LLDP. The device encapsulates local information in TLV before forming LLDPDU, then several TLV fit together in one LLDPDU and encapsulated in Ethernet data for transmission. As shown in Figure 12-1, LLDPDU is made by several TLV, including 4 mandatory TLV and several optional TLV. Figure 12-1 Structure of LLDPDU packet As shown in Figure 12-2, each TLV denotes a piece of information on the local device, such as the device ID, interface ID, related Chassis ID TLV, Port ID TLV, and fixed TLV. Figure 12-2 Structure of a TLV packet Table 12-1 lists TLV types. Table 12-1 TLV types TLV type Description Optional/Required 0 End Of LLDPDU Required 1 Chassis ID Required 2 Port ID Required 3 Time To Live Required 4 Port Description Optional 5 System Name Optional 6 System Description Optional 7 System Capabilities Optional Raisecom Proprietary and Confidential 232 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance TLV type Description Optional/Required 8 Management Address Optional Principles of LLDP LLDP is a kind of point-to-point one-way issuance protocol, which notifies local device link status to the peer device by sending LLDPDU (or sending LLDPDU when link status changes) periodically from the local device to peer device. The procedure of packet exchange:  When local device transmits packet, it gets system information required by TLV from NView NNM (Network Node Management) and gets configuration information from LLDP MIB to generate TLV and form LLDPDU to transmit to peer.  The peer receives LLDPDU and analyzes TLV information. If there is any change, the information will be updated in neighbor MIB table of LLDP and notifies NView NNM system. When the device status is changed, the RAX711-C sends a LLDP packet to the peer. To avoid sending LLDP packet continuously because of device status changes frequently, you can configure a delay timer for sending the LLDP packet. The aging time of Time To Live (TTL) of local device information in the neighbour node can be adjusted by modifying the parameter values of aging coefficient, sends LLDP packets to neighbour node, after receiving LLDP packets, neighbour node will adjust the aging time of its neighbour nodes (sending side) information. Aging time formula, TTL = Min {65535, (interval × hold-multiplier)}:  Interval indicates the time period to send LLDP packets from neighbor node.  Hold-multiplier refers to the aging coefficient of device information in neighbor node. 12.1.2 SNMP Simple Network Management Protocol (SNMP) is designed by the Internet Engineering Task Force (IETF) to resolve problems in managing network devices connected to the Internet. Through SNMP, a network management system can manage all network devices that support SNMP, including monitoring network status, modifying configurations of a network device, and receiving network alarms. SNMP is the most widely used network management protocol in TCP/IP networks. Working mechanism SNMP is separated into two parts: Agent and NMS. In the SNMP network, the Agent is a managed device while the NMS is a manager. The Agent and NMS communicate through SNMP packets transmitted through UDP. The RAX711-C and Raisecom NView NNM system communicate with each other through SNMP. Raisecom NView NNM system can provide friendly Human Machine Interface (HMI) to facilitate network management. The below functions can be realized through it:  Send request packets to the RAX711-C.  Receive reply packets and Trap packets from the RAX711-C, and show result. Raisecom Proprietary and Confidential 233 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Agent is a program stays on the RAX711-C, providing the below functions:  Receive/Reply request packets from the NView NNM system.  Read/Write packets and generate response packets according to the packets type, then return the result to the NView NNM system.  Define trigger condition according to protocol modules, enter/exit system, or reboot the RAX711-C when conditions are satisfied; reply module sends Trap packets to NView NNM system via agent to report current status of device. Agent can be configured with several versions. Agent use different versions to communicate with different NView NNM systems. However, SNMP version of the NView NNM system must be consistent with the one on Agent when they are communicating. Otherwise, they cannot communicate properly. SNMP versions Till now, SNMP has three versions: v1, v2c, and v3, described as below.  SNMPv1 uses community name authentication mechanism. The community name, a string defined by an agent, acts like a secret. The network management system can visit the agent only by specifying its community name correctly. If the community name carried in a SNMP message is not accepted by the RAX711-C, the message will be dropped.  Compatible with SNMPv1, SNMPv2c also uses community name authentication mechanism. SNMPV2c supports more operation types, data types, and error codes, and thus better identifying errors.  SNMPv3 uses User-based Security Model (USM) authentication mechanism. You can configure whether USM authentication is enabled and whether encryption is enabled to provide higher security. USM authentication mechanism allows authenticated senders and prevents unauthenticated senders. Encryption is to encrypt messages transmitted between the network management system and agents, thus preventing interception. The RAX711-C supports v1, v2c, and v3 of SNMP. MIB Management Information Base (MIB) is the collection of all objects managed by NMS. It defines attributes for the managed objects:  Name  Access authority  Data type The device-related statistic contents can be reached by accessing data items. Each proxy has its own MIB. MIB can be taken as an interface between NMS and Agent, through which NMS can read/write every managed object in Agent to manage and monitor the device. MIB store information in a tree structure, its root is on the top, without name. Nodes of the tree are the managed objects, which take a uniquely path starting from root (OID) for identification. SNMP packets can access network devices by checking the nodes in MIB tree directory. The RAX711-C supports standard MIB and Raisecom customized MIB. Raisecom Proprietary and Confidential 234 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.1.3 E1 NMS channel The E1 NMS channel transmits NMS information through the Sa4 bit and Sa5 bit of TS0 or an independent timeslot in E1 frames, so it is called Sa bit NMS or independent timeslot NMS. The CO device manages remote devices through the E1 NMS channel. 12.1.4 Optical module DDM Small Form-factor Pluggables (SFP) is an optical module in optical module transceivers. The SFP Digital Diagnostic Monitoring (DDM) provides a method for monitoring performance. By analyzing monitored data provided by the SFP module, the administrator can predict the lifetime of the SFP module, isolate system faults, as well as verify the compatibility of the SFP module. The SFP module offers 5 performance parameters:  Temperature for the transceiver  Internal Power Feeding Voltage (PFV)  Tx bias current  Tx optical power  Rx optical power 12.1.5 System log The system log means that the device records system information and debugging information in a log and sends the log to the specified destination. When the device fails to work, you can check and locate the fault easily. The module can classify and manage all system logs and then send them to different destination ends to provide powerful support for the administrator and developer for diagnosing network faults. The system information and some scheduling output will be sent to the system log to deal with. According to the configuration, the system will send the log to various destinations. The destinations that receive the system log are divided into:  Console: send the log message to the local console through Console interface.  Host: send the log message to the host.  Monitor: send the log message to the monitor.  Flash: send the log file to the Flash of the device. Generally, the system log is in a format of timestamp module-level- Message content. An instance of the system log is as below: FEB-22-2005 14:27:33 CONFIG-7-CONFIG:USER "raisecom" Run "logging on" FEB-22-2005 06:46:20 CONFIG-6-LINK_D:port 2 Link Down FEB-22-2005 06:45:56 CONFIG-6-LINK_U:port 2 Link UP Raisecom Proprietary and Confidential 235 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.1.6 Alarm management An alarm refers to information generated by the system based on module failures when a fault is generated on the RAX711-C or some working condition changes. The alarm is used to report some urgent and important events and notify them to the network administrator promptly, which provides strong support for monitoring device operation and diagnosing faults. The alarm is stored in the alarm buffer. Meanwhile, the alarm is generated to log information. If the NView NNM system is configured, the alarm will be sent to it through SNMP. The information sent to the NView NNM system is called Trap. Classification of alarms There are 3 kinds of alarms according to properties of an alarm:  Fault alarm: alarms generated because of hardware failure or anomaly of important functions, such as port Down alarm  Recovery alarm: alarms generated when device failure or abnormal function returns to normal, such as port Up alarm;  Event alarm: prompted alarms or alarms that are generated because the fault alarm and recovery alarm cannot be related, such as alarms generated because of failing to Ping. Alarms are divided into 5 types according to functions:  Communication alarm: alarms related to the processing of information transmission, including alarms generated because of communication failure between Network Elements (NEs), NEs and NMS, or NMS and NMS  Service quality alarm: alarms caused by service quality degradation, including congestion, performance decline, high resource utilization rate, and the bandwidth reducing  Processing error alarm: alarms caused by software or processing errors, including software errors, memory overflow, version mismatching, and abnormal program aborts  Environmental alarm: alarms caused by equipment location-related problems, including the temperature, humidity, ventilation. and other abnormal working conditions  Device alarm: alarms caused by failure of physical resources, including the power supply, fan, processor, clock, input/output interface, and other hardware. Alarm output There are 3 alarm output modes:  Alarm buffer: alarms are recorded in tabular form, including the current alarm table and history alarm table. − Current alarm table: records alarms which are not cleared, acknowledged or restored. − History alarm table: consists of acknowledged and restored alarms, recording the cleared, auto-restored, or manually acknowledged alarms.  Log: alarms are generated to system log when recorded in the alarm buffer, and stored in the alarm log buffer.  Trap: alarms sent to the NView NNM system when the NView NNM system is configured Raisecom Proprietary and Confidential 236 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Alarms will be broadcasted according to various terminals configured on the RAX711-C, including CLI terminal and NView NNM system. Log output of alarms starts with the symbol "#", and the output format is: #Index TimeStamp HostName ModuleName/Severity/name:Arise From Description Table 12-2 describes alarm fields. Table 12-2 Alarm fields Field Description Index Alarm index TimeStamp Time when an alarm is generated ModuleName Name of a module that generates an alarm Severity Alarm level Name Alarm name Arise From Description Descriptions about an alarm Alarm levels The alarm level is used to identify the severity degree of an alarm. The level is defined in Table 12-3. Table 12-3 Alarm levels Level Description Syslog Critical (3) This alarm has affected system services and requires 1 (Alert) immediate troubleshooting. Restore the device or source immediately if they are completely unavailable, even it is not during working time. Major (4) This alarm has affected the service quality and requires 2 (Critical) immediate troubleshooting. Restore the device or source service quality if they decline; or take measures immediately during working hours to restore all performances. Minor (5) This alarm has not influenced the existing service yet, 3 (Error) which needs further observation and take measures at appropriate time so as to avoid more serious fault. Warning (6) This alarm will not affect the current service, but 4 maybe the potential error will affect the service, so it (Warning) can be considered as needing to take measures. Raisecom Proprietary and Confidential 237 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Level Description Syslog Indeterminate (2) Uncertain alarm level, usually the event alarm. 5 (Notice) Cleared (1) This alarm shows to clear one or more reported alarms. 5 (Notice) Related concepts Related concepts about alarm management are displayed as below:  Alarm inhibition The RAX711-C only records root-cause alarms but incidental alarms when enabling alarm inhibition. For example, the generation of alarm A will inevitably produce alarm B, then alarm B is inhibited and does not appear in the alarm buffer or record the log information when enabling alarm inhibition. By enabling alarm inhibition, the RAX711-C can effectively reduce the number of alarms. The root-cause alarm and all other incidental alarms will be recorded on the RAX711-C when alarm inhibition is disabled.  Alarm auto-report Auto-report refers that an alarm will be reported to the NView NNM system automatically with its generation and the NView NNM system does not need to query or synchronize alarms actively. You can configure auto-report to some alarm, some alarm source, or the specified alarm from specified alarm source. The alarm source refers to an entity that generates related alarms, such as interfaces, devices, or cards.  Alarm monitoring Alarm monitoring is used to process alarms generated by modules: − When alarm monitoring is enabled, the alarm module will receive alarms generated by modules, and process them according to configurations of the alarm module, such as recording alarm in the alarm buffer and recording system logs. − When alarm monitoring is disabled, the alarm module will discard alarms generated by modules without follow-up treatment. In addition, alarms will not be recorded on the RAX711-C. You can perform alarm monitoring on some alarm, alarm source, or specified alarm from specified alarm source.  Alarm reverse mode In real operating environment, there are some reasonable but meaningless alarms. You can use some mode to hidden these alarms without affecting the system to monitor them. This alarm processing mode is alarm reverse. Raisecom Proprietary and Confidential 238 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Alarm reverse refers to the device will report the information opposite to actual status when recording alarm information, or report the alarm when there is no alarm information. Not report if there is alarm information. Currently, the device is only in support of reverse mode configuration of the interface. There are three reverse modes to be configured; the specific definitions are as below: − Non-reverse mode Device alarm is reported normally. − Manual reverse mode Configure the alarm reverse mode of an interface as manual reverse mode, then no matter what the current alarm state is, the reported alarm state of the interface will be changed opposite to the actual alarm state immediately, that is to say, not report when there are alarms, report when there are not alarms actually. The interface will maintain the opposite alarm state regardless of the alarm state changes before the alarm reverse state being restored to non- reverse mode. − Auto-reverse mode Configure the alarm reverse mode as auto-reverse mode. If the interface has not actual reverse alarm currently, the configuration will return fail; if the interface has actual reverse alarm, the configuration is success and enter reverse mode, i.e. the interface reported alarm status is changed opposite to the actual alarm status immediately. After the alarm is finished, the enabling state of interface alarm reverse will ends automatically and changes to non-reverse alarm mode so that the alarm state can be reported normally in next alarm.  Alarm delay Alarm delay refers that the RAX711-C will record alarms and report them to the NView NNM system after a delay but not immediately when alarms generate. Delay for recording and reporting alarms are identical. By default, an alarm is reported after 0s it is generated and an alarm is cleared after 0s it is finished.  Alarm storage mode Alarm storage mode refers to how to record new generated alarms when the alarm buffer is full. There are two ways: − stop: stop mode, when the alarm buffer is full, new generated alarms will be discarded without recording. − loop: loop mode, when the alarm buffer is full, the new generated alarms will replace old alarm information and take rolling records. The current alarm list can record up to 1000 alarms and the historical alarm table can record up to 500 alarms. Use the configured storage mode to deal with newly-generated alarms when the alarm table is full.  Clearing alarms Clear the current alarm, which means deleting current alarms from the current alarm table. The cleared alarms will be saved to the historical alarm table and an all-alarm alarm is generated.  Viewing alarms Raisecom Proprietary and Confidential 239 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance The administrator can view alarms and monitor alarms directly on the RAX711-C. If the RAX711-C is configured with the NView NNM system, the administrator can monitor alarms on the NView NNM system. Hardware monitoring alarms Hardware monitoring is used to monitor the operating environment of the RAX711-C. The alarms to be monitored include:  Power supply dying-gasp alarm The RAX711-C supports dual power supplies. The power supply dying-gasp alarm is divided into single power supply dying-gasp alarm and dual power supply dying-gasp alarm. − Single power supply dying-gasp alarm: inform users that power supply 1/power supply 2 is powered off. saving to the temperature beyond threshold alarm table, sending Trap to the NView NNM system, and outputting to the system log. − Device dying-gasp: 2 power supplies are powered off. Support outputting to system log only.  Temperature beyond threshold alarm The device supports temperature beyond threshold alarm event, when the current temperature is lower than low temperature threshold, the low temperature alarm event will generate. The RAX711-C supports saving to the temperature beyond threshold alarm table, sending Trap to the NView NNM system, and outputting to the system log. When the device current temperature is higher than high temperature threshold, the high temperature alarm event will generate. The RAX711-C supports saving to the device hardware environment monitoring alarm table, sending Trap to the NView NNM system, and outputting to the system log.  Voltage beyond threshold alarm The device supports voltage beyond threshold alarm event, when the current voltage is lower than low voltage threshold, the low voltage alarm event will generate. The RAX711-C supports saving to the voltage beyond threshold alarm table, sending Trap to the NView NNM system, and outputting to the system log. When current voltage value of the monitored voltage is greater than the threshold, a high voltage alarm is generated. The RAX711-C supports saving to the voltage beyond threshold alarm table, sending Trap to the NView NNM system, and outputting to the system log. The RAX711-C monitors 3.3 V master chip voltage only.  Interface status anomaly alarm Each interface has 3 alarm events: − Interface link-fault alarm: link failure alarm refers to the peer link signal loss. The alarm event only aims at optical interface, but not electrical interface. − Interface link-down alarm: interface status Down alarm. The RAX711-C supports saving alarms to the hardware environment monitoring alarm table, sending Trap to the NView NNM system, and outputting to the system log. Raisecom Proprietary and Confidential 240 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.1.7 CPU monitoring The RAX711-C supports CPU monitoring, which is used to monitor task status, CPU utilization rate, and stack usage in real time, helping the administrator locate the fault quickly. CPU monitoring can provide the following functions:  Viewing CPU utilization – View CPU hold time and utilization rate of all tasks in each period (5 seconds, 1 minute, 10 minutes, or 2 hours). The total CPU utilization rate within each period can be displayed statically or dynamically. – View the operating status of all tasks and the detailed operating status information about specified tasks. – View historical CPU utilization rate within each period. – View the dying gasp task information.  CPU utilization rate threshold alarm Within a specified sampling period, the system will generate an alarm and send Trap if CPU utilization rate is over the configured rising threshold or below the declining threshold. The Trap provides 5 task IDs and their CPU utilization rates of tasks which have the highest CPU utilization rate in the latest period (5 seconds, 1 minute, or 10 minutes). 12.1.8 RMON Remote Network Monitoring (RMON) is a standard developed by the Internet Engineering Task Force (IETF). RMON is used to monitor network data through different Agents and NMS. RMON is an extension to SNMP. However, compared with SNMP, ROMN is more active and efficient for monitoring remote devices. The administrator can quickly trace faults generated on the network, network segments, or devices. With RMON, data traffic between the NMS and Agent is reduced greatly. In addition, RMON helps effectively manage the large-scale network, which makes up for SNMP restrictions across the increasing distributed network. At present, RMON implements 4 function groups:  Statistics group: collect statistic information on each interface, including the number of received packets and packet size distribution statistics.  History group: similar with the statistics group, it only gathers statistics in an assigned detection period.  Alarm group: monitor an assigned MIB object, configure the upper and lower thresholds in an assigned time interval, and trigger an event if the monitored object exceeds the threshold.  Event group: cooperating with the alarm group, when an alarm triggers an event, it records the event, such as sending Trap or writing it into the log. 12.1.9 Device monitoring Temperature monitoring The RAX711-C support monitoring the temperature and can be configured with the high temperature alarm threshold and low temperature alarm threshold. Raisecom Proprietary and Confidential 241 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Fan monitoring The RAX711-C supports fan monitoring, which is used to monitor the rotational speed and temperature of the fan. When the rotational speed and temperature of the fan are abnormal, an alarm is generated and Trap messages are sent. The RAX711-C monitors the fan in two modes:  Forced monitoring: the rotational speed of the fan is fixed.  Automatic monitoring: the rotational speed of the fan is automatically adjusted according to temperature change. In automatic monitoring mode, the rotational speed is classified into 4 levels. Each level corresponds to a group of temperature range. The RAX711-C automatically adjusts the rotational speed of the fan according to temperature change. 12.1.10 Loopback As shown in Figure 12-3, interface loopback test (Loopback) is a common method for checking interface and network problems. Return the packets, which meet rules and related parameters defined by users, to the RAX711-C B through Client 1 of RAX711-C A. By counting packets transmitted and received by an interface, RAX711-C B can detect the network connectivity. Figure 12-3 Interface loopback Ingress packets and egress packets As shown Figure 12-3, ingress packets and egress packets are defined as below:  Ingress packets: test packets received by Client interface 1  Egress packets: test packets returned to the peer device through Client interface 1 Loopback parameters Loopback parameters include the source MAC address, destination MAC address, source IP address, destination IP address, SVLAN ID, and CVLAN ID. When you configure a loopback parameter and enable loopback of the related rule, packets, which meet the parameter, will be used for loopback. Raisecom Proprietary and Confidential 242 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Loopback hold time The loopback hold time ranges from 0 to 30 minutes. When the hold time expires, loopback of some rule will be automatically disabled on the interface. When the hold time is configured to 0 minute, loopback will be performed continuously until being disabled manually. Swap of unicast source MAC address Swap of unicast source MAC address refers to swapping the source MAC address of egress packets to the local MAC addresses of RAX711-C A or destination MAC address of ingress packets. Only unicast packets support source MAC address translation. For multicast and broadcast packets, their MAC addresses are the local MAC address of the RAX711-C A. Swap of multicast destination MAC address Swap of multicast destination MAC address refers to swapping destination MAC addresses of egress packets to the MAC address of RAX711-C B. Namely, after loopback, multicast and broadcast packets are changed to unicast packets. If destination MAC address translation is disabled, destination MAC address of egress packets are the multicast and broadcast MAC addresses of original packets. Swap of multicast destination IP address  For multicast IP packets, when swap of the destination IP address is enabled, the destination IP address of egress packets are swap from the original multicast IP address to the source IP address of ingress packets. Namely. The multicast packets are changed to unicast packets to return to the peer. When destination IP address translation is disabled, the destination IP address of egress packets are the original multicast IP address.  For broadcast IP packets, the destination IP address is swapped to the source IP address of the ingress packets regardless of whether swap of the destination IP address is enabled or not.  The source IP address of all egress packets is always swapped to the configured local IP address. By default, the local IP address of the RAX711-C is configured to 127.0.0.1. 12.1.11 Fault detection Ping Ping derives from the sonar location operation, which is used to detect whether the network is normally connected. Ping is achieved with ICMP echo packets. If an Echo Reply packet is sent back to the source address during a valid period after the Echo Request packet is sent to the destination address, it indicates that the route between source and destination address is reachable. If no Echo Reply packet is received during a valid period and timeout information is displayed on the sender, it indicates that the route between source and destination addresses is unreachable. Figure 12-4 shows the principles of Ping. Raisecom Proprietary and Confidential 243 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Figure 12-4 Principles of Ping Traceroute Just as Ping, Traceroute is a commonly-used maintenance method in network management. Traceroute is often used to test the network nodes of packets from sender to destination, detect whether the network connection is reachable, and analyze network fault The following shows how Traceroute works:  First, send a piece of TTL1 sniffer packet (where the UDP port number of the packet is unavailable to any application programs in destination side).  TTL deducts 1 when reaching the first hop. Because the TTL value is 0, in the first hop the device returns an ICMP timeout packet, indicating that this packet cannot be sent.  The sending host adds 1 to TTL and resends this packet.  Because the TTL value is reduced to 0 in the second hop, the device will return an ICMP timeout packet, indicating that this packet cannot be sent. The above steps continue until the packet reaches the destination host, which will not return ICMP timeout packets. Because the port number of destination host is not be used, the destination host will send the port unreachable packet and finish the test. Thus, the sending host can record the source address of each ICMP TTL timeout packet and analyze the path to the destination according to the response packet. Figure 12-5 shows the principle of Traceroute. Figure 12-5 Principle of Traceroute Raisecom Proprietary and Confidential 244 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.2 Configuring LLDP 12.2.1 Preparing for configurations Scenario When you obtain connection information between devices through the NView NNM system for topology discovery, you need to enable LLDP on the RAX711-C. Therefore, the RAX711- C can notify its information to the neighbours mutually, and store neighbour information to facilitate the NView NNM system querying information. Prerequisite N/A 12.2.2 Enabling global LLDP After global LLDP is disabled, you cannot re-enable it immediately. Global LLDP cannot be enabled unless the restart timer times out. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#lldp enable Enable global LLDP. By default, global LLDP is disabled. 12.2.3 Enabling interface LLDP Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#lldp enable Enable interface LLDP. By default, interface LLDP is enabled. 4 Raisecom(config-port)#lldp dest- Configure the destination MAC address of LLDP address mac-address packets sent by the interface. By default, it is 0180.c200.000e. Raisecom Proprietary and Confidential 245 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.2.4 Configuring basic functions of LLDP We recommend configuring the LLDP delivery period in advance. The delivery period and delivery delay are interact on each other. The delivery delay must be smaller than or equal to 1/4 of the delivery period. Otherwise, the configuration will fail. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#lldp (Optional) configure the period timer of the LLDP packet. message-transmission interval second By default, it is 30s. 3 Raisecom(config)#lldp (Optional) configure the delay timer of the LLDP packet. message-transmission delay second By default, it is 2s. 4 Raisecom(config)#lldp (Optional) configure the aging coefficient of the LLDP packet. message-transmission hold- multiplier coefficient By default, it is 4. 5 Raisecom(config)#lldp (Optional) configure the restart timer. After global LLDP is restart-delay second disabled, it cannot be enabled unless the restart timer times out. By default, it is 2s. 12.2.5 Configuring LLDP alarm When the network changes, you need to enable LLDP Trap to send topology update Trap to the NView NNM system immediately. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#lldp trap- (Optional) configure the interval for sending LLDP Traps. interval second By default, it is 5s. After enabled with LLDP Trap, the RAX711-C will send Traps after detecting aged neighbours, newly-added neighbours, and changed neighbour information. 12.2.6 Checking configurations No. Command Description 1 Raisecom#show lldp local config Show LLDP local configurations. 2 Raisecom#show lldp local system-data Show information about the LLDP [ interface-type interface-number ] local system. Raisecom Proprietary and Confidential 246 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance No. Command Description 3 Raisecom#show lldp remote [ interface-type Show information about LLDP interface-number ] [ detail ] neighbors. 4 Raisecom#show lldp statistic [ interface-type Show statistics on LLDP packets. interface-number ] 12.3 Configuring SNMP 12.3.1 Preparing for configurations Scenario When you need to log in to the RAX711-C through the NView NNM system, you should configure basic SNMP functions on the RAX711-C. Prerequisite  Configure the IP address of the SNMP interface.  Configure static routing, making the route between the RAX711-C and the NView NNM system reachable. 12.3.2 Configuring basic functions of SNMP Configure basic functions of SNMPv3 for the RAX711-C as below. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#snmp-server access Create and configure the SNMP access group. group-name [ read view-name ] [write view-name ] [notify view-name ][ context context-name { exact | prefix } ] usm { noauthnopriv | authnopriv | authpriv } 3 Raisecom(config)#snmp-server group name (Optional) configure the mapping between user user usm users and access groups. 4 Raisecom(config)#snmp-server contact (Optional) configure the identifier and contact syscontact mode of the administrator. 5 Raisecom(config)#snmp-server host ip- Configure the address of SNMP target host. address version 3 { noauthnopriv | authnopriv | authpriv } user-name [ udpport udpport ] 6 Raisecom(config)#snmp-server location (Optional) specify the physical location of the sysLocation RAX711-C. Raisecom Proprietary and Confidential 247 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description 7 Raisecom(config)#snmp-server user user- Create the user name and configure the name [ remote engine-id ] authentication authentication mode. { md5 | sha } password [ privacy privacy ] 8 Raisecom(config)#snmp-server view view- Configure the SNMP view. name oid-tree [ mask ] { included | excluded } 9 Raisecom(config)#snmp-server lldp-trap Enable Trap. Use the snmp-server lldp-trap enable disable command to disable Trap. Configure basic functions of SNMPv1/v2c for the RAX711-C as below. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#snmp-server community name [ view view ] { ro | rw } Create the community name and configure the related view and authority. 3 Raisecom(config)#snmp-server contact contact (Optional) configure the identifier and contact mode of the administrator. 4 Raisecom(config)#snmp-server host ip- address version { 1 | 2c } community- Configure the address of SNMP target host. string [ udpport port-id ] 5 Raisecom(config)#snmp-server location location (Optional) specify the physical location of the RAX711-C. 12.3.3 Configuring Trap Trap configurations on SNMPv1, v2c, and v3 are identical except for Trap target host configurations. Please configure Trap as required. Trap means refers to unrequested information sent to the NView NNM system automatically, which is used to report some critical events. Before configuring Trap, you need to perform the following configurations:  Configure basic functions of SNMP. For SNMPv3, you need to configure the user name and SNMP view.  Configure a routing protocol, making the route between the RAX711-C and the NView NNM system reachable. Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 248 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description 2 Raisecom(config)#interface interface- Enter SNMP interface configuration mode. type interface-number 3 Raisecom(config-port)#ip address snmp 1 Configure the IP address of the SNMP interface on the RAX711-C. 4 Raisecom(config-port)#exit Exit SNMP interface configuration mode and enter global configuration mode. 5 Raisecom(config)#snmp-server host ip- address version 3 { noauthnopriv | (Optional) configure SNMPv3-based Trap target authnopriv | authpriv } name host. [ udpport udpport ] 6 Raisecom(config)#snmp-serverhost ip- (Optional) configure SNMPv1-/SNMPv2c-based Trap address version { 1 | 2c } name target host. [udpport udpport ] 7 Raisecom(config)#snmp-server enable traps Enable SNMP to send Trap. 12.3.4 Checking configurations No. Command Description 1 Raisecom#show snmp access Show configurations of the SNMP access group. 2 Raisecom#show snmp community Show configurations of the SNMP community. 3 Raisecom#show snmp config Show basic configurations of SNMP. 4 Raisecom#show snmp group Show the mapping between SNMP users and the access group. 5 Raisecom#show snmp host Show information about the Trap target host. 6 Raisecom#show snmp statistics Show SNMP statistics. 7 Raisecom#show snmp user Show information about SNMP users. 8 Raisecom#show snmp view Show information about SNMP views. 9 Raisecom#show snmp trap remote Show the enabling status of Trap on the remote device. Raisecom Proprietary and Confidential 249 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.4 Configuring optical module DDM 12.4.1 Preparing for configurations Scenario Optical module DDM provides a method for monitoring SFP performance parameters. By analyzing monitored data provided by the optical module, the administrator can predict the SFP module lifetime, isolate system faults, as well as verify the compatibility of the optical module. Prerequisite N/A 12.4.2 Enabling optical module DDM Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#transceiver ddm Enable optical module DDM. enable By default, optical module DDM is disabled. 3 Raisecom(config)#transceiver ddm Configure the polling interval for optical module DDM. poll_interval interval By default, it is 15s. 4 Raisecom(config)#snmp-server trap Enable optical module DDM Trap on interfaces. transceiver enable By default, it is disabled. 12.4.3 Checking configurations No. Command Description 1 Raisecom#show transceiver [interface-type Show historical information about optical interface-number history { 15m | 24h } ] module DDM. 2 Raisecom#show transceiver ddm interface-type Show optical module DDM information. interface-list [ detail ] 3 Raisecom#show transceiver ddm poll_interval Show the polling interval for optical module DDM. 4 Raisecom#show transceiver information Show information about optical module interface-type interface-number DDM. 5 Raisecom#show transceiver threshold- Show violation information about optical violations interface-type interface-number module parameters. Raisecom Proprietary and Confidential 250 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.5 Configuring system log 12.5.1 Preparing for configurations Scenario The RAX711-C generates critical information, debugging information, or error information about the system to system logs and outputs the system logs to log files or transmits them to the host, Console interface, or monitor for viewing and locating faults. Prerequisite N/A 12.5.2 Configuring basic information about system log Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#logging on (Optional) Enable system log. By default, system log is enabled. 3 Raisecom(config)#logging time- (Optional) configure the timestamp of system log. stamp { debug | log } { datetime | none | Uptime } The optional parameter debug is used to assign debug-level (7) system log timestamp. By default, this system log does not have timestamp The optional parameter log is used to assign levels 0–6 system log timestamp. By default, these system logs adopt date-time as timestamp. 4 Raisecom(config)#logging rate- (Optional) configure the transport rate of system log. limit rate By default, no transport rate is configured. 5 Raisecom(config)#logging (Optional) configure the discriminator of the system log. discriminator distriminator- number { facility | mnemonics | msg-body } { drops | includes } key Raisecom(config)#logging discriminator distriminator- number { facility | mnemonics | msg-body } none 6 Raisecom(config)#logging buginf (Optional) send Level 7 (debugging) debugging log. [ high | normal | low | none ] 7 Raisecom(config)#logging (Optional) enable the sequence number field of the log. sequence-number You can use the no form of this command to disable the sequence number field of the log. 8 Raisecom(config)#logging time- (Optional) configure the timestamp for logs. stamp { debug | log } { datetime | uptime | none } Raisecom Proprietary and Confidential 251 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.5.3 Configuring output destination of system logs Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#logging console [ log-level | (Optional) output system logs to alerts | critical | debugging | discriminator | the Console interface. emergencies | errors | informational | notifications | warnings ] 3 Raisecom(config)#logging host ip-address[ log- (Optional) output system logs to level | alerts | critical | debugging | the log host. discriminator discriminator-number | emergencies | errors | informational | notifications | warnings ] 4 Raisecom(config)#logging monitor[ log-level | (Optional) output system logs to alerts | critical | debugging | emergencies | the monitor. errors | informational | notifications | warnings ] 5 Raisecom(config)#logging buffered [ log-level | (Optional) output system logs to alerts | critical | debugging | emergencies | the log buffer. errors | informational | notifications | warnings ] 6 Raisecom(config)#logging buffered size size (Optional) configure the log buffer size. 7 Raisecom(config)#logging history (Optional) output system logs to the log history table. 8 Raisecom(config)#logging history size size Configure the log history table size. 12.5.4 Checking configurations No. Command Description 1 Raisecom#show logging Show configurations of system logs. 12.6 Configuring alarm management 12.6.1 Preparing for configurations Scenario When the RAX711-C fails, the alarm management module will collect the fault information and output the alarm in a log. The alarm information includes the time when the alarm is generated, the name and descriptions of the alarm. It helps you quickly locate the fault. Raisecom Proprietary and Confidential 252 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance If the RAX711-C is installed with the NView NNM system, the alarm is reported to the NView NNM system. The NView NNM system gives the reasons and suggestions to help you deal with the problem in time. With alarm management, you can directly perform following operations on the RAX711-C: alarm inhibition, alarm auto-report, alarm monitoring, alarm inverse, alarm delay, alarm storage mode, alarm clearing, and alarm viewing. Prerequisite After hardware monitoring is configured on the RAX711-C,  When alarms are output in Syslog form, alarms are generated to the system log. When needing to send alarms to the log host, you need to configure the IP address of the log host on the RAX711-C.  When needing to send alarms to the NView NNM system in a Trap form, you need to configure the IP address of the NView NNM system on the RAX711-C. 12.6.2 Configuring basic functions of alarm management Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#alarm Enter alarm configuration mode. 3 Raisecom(config-alarm)#alarm inhibit (Optional) enable alarm inhibition. enable By default, alarm inhibition is enabled. 4 Raisecom(config-alarm)#alarm auto-report (Optional) enable alarm auto-report of all { enable | disable } index index alarms. 5 Raisecom(config-alarm)#alarm monitor (Optional) enable alarm monitoring. { enable | disable } index index 6 Raisecom(config-alarm)#alarm inverse (Optional) configure alarm inverse. { enable | disable } interface-type interface-number By default, it is enabled. 7 Raisecom(config-alarm)#alarm { active | (Optional) configure the delay for generating clear } delay second an alarm and the delay for clearing an alarm. By default, both of them are 0s. 8 Raisecom(config-alarm)#alarm active (Optional) configure the alarm storage mode. storage-mode { loop | stop } By default, the alarm storage mode is configured to stop. 9 Raisecom(config-alarm)#alarm clear all (Optional) clear all current alarms. Raisecom(config-alarm)#alarm clear index (Optional) clear alarms with the specified index alarm index. For modules, which support the alarm feature, can be enabled/disabled with alarm monitoring, alarm auto-report, and alarm clearing. Raisecom Proprietary and Confidential 253 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance 12.6.3 Configuring Layer 3 power failure or fiber breakage alarms Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#power-down trap enable Enable Layer 3 power failure alarm. By default, it is disabled. 12.6.4 Checking configurations No. Command Description 1 Raisecom#show alarm { auto- Show current alarm parameters. report | inverse | monitor } config Alarm parameters displayed by this command include alarm inhibition, alarm inverse mode, alarm delay, alarm storage mode, alarm buffer size, and alarm log size. 2 Raisecom#show alarm cleared Show cleared alarms. 3 Raisecom#show power-down Show configurations of Layer 3 power failure alarm. 12.7 Configuring memory monitoring 12.7.1 Preparing for configurations Scenario This feature enables you to monitor the memory utilization of the system in real time and configure memory utilization crossing threshold alarms, thus facilitating you to locate and clear faults in time or assist NMS personnel to locate faulty. Prerequisite To output memory utilization alarms as Trap, you must configure the IP address of the target server for outputting Trap, namely, the IP address of the NMS server. 12.7.2 Configuring memory monitoring Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#memory Configure the alarm threshold for memory utilization. threshold recovering recovering-threshold rising By default, the recovering alarm threshold for memory rising-threshold utilization is 75, namely, 75%; the rising alarm threshold for memory utilization is 95, namely, 95%. Raisecom Proprietary and Confidential 254 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description 3 Raisecom(config)#memory Configure the interval for sampling the memory. interval value By default, it is 60s. 12.7.3 Checking configurations No. Command Description 1 Raisecom#show memory [ management | module Show memory statistics. { value | bufferpool | diff } | overflow ] 12.8 Configuring CPU monitoring 12.8.1 Preparing for configurations Scenario CPU monitoring is used to monitor task status, CPU utilization rate, and stack usage in real time. It provides CPU utilization threshold alarm to facilitate discovering and eliminating a hidden danger, helping the administrator locate the fault quickly. Prerequisite To output CPU monitoring alarms in a Trap form. You need to configure the IP address of Trap target host on the RAX711-C, that is, the IP address of the NView NNM system. 12.8.2 Viewing CPU monitoring information Step Command Description 1 Raisecom#show cpu-utilization [ dynamic | history Show CPU utilization rate. { 10min | 1min | 2hour | 5sec } ] 2 Raisecom#show process [ dead | sorted { priority Show task status. | name } | taskname ] 3 Raisecom#show process cpu [ sorted [ 10min | 1min Show CPU utilization rate of all | 5sec | invoked ] ] tasks. 12.8.3 Configuring CPU monitoring alarm Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 255 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description 2 Raisecom(config)#cpu (Optional) configure the rising threshold and recovering threshold of threshold recovering CPU alarm. recovering-threshold rising rising- By default, they are 99 and 79 respectively, namely, 99% and 79% threshold respectively. 3 Raisecom(config)#cpu (Optional) configure the interval for sampling the CPU. interval value By default, it is 60s. 12.8.4 Checking configruations No. Command Description 1 Raisecom#show cpu-utilization Show CPU utilization and related configurations. 2 Raisecom#show process [ dead | pid Show status of each process. pid-value | sorted { priority | name } | taskname ] 3 Raisecom#show process cpu [ sorted Show CPU utilization of each task. [ 10mins | 1min | 5secs | invoked ] ] 12.9 Configuring RMON 12.9.1 Preparing for configurations Scenario RMON helps monitor and count network traffics. Compared with SNMP, RMON is a more efficient monitoring method. After you specifying the alarm threshold, the RAX711-C actively sends alarms when the threshold is exceeded without gaining variable information. This helps reduce the traffic of managing and managed devices and facilitates managing the network. Prerequisite The route between the RAX711-C and the NView NNM system is reachable. 12.9.2 Configuring RMON statistics Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter physical layer interface configuration mode. interface-type interface-number Raisecom Proprietary and Confidential 256 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description 3 Raisecom(config-port)#rmon Enable RMON statistics on an interface. statistics [ owner owner-name ] By default, RMON statistics is enabled on all interfaces, and the owner is monitoretherstats. 12.9.3 Configuring RMON historical statistics Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface interface-type Enter physical layer interface interface-number configuration mode. 3 Raisecom(config-port)#rmon history Enable RMON historical group. [ shortinterval short-period ] [ longinterval long-period ] [ buckets buckets-number ] By default, RMON historical group is [ owner owner-name ] disabled on all interfaces, shortinterval is 30s, longinterval is 1800s, buckets is 10, and string is monitorHistory. 12.9.4 Checking configurations No. Command Description 1 Raisecom#show rmon [ alarms | Show RMON configurations. events ] 2 Raisecom#show rmon history Show historic information about RMON. interface-type interface-list 3 Raisecom#show rmon statistics Show statistical information about RMON. [ interface-type interface-list ] 12.10 Configuring fan monitoring 12.10.1 Configuring fan monitoring When the RAX711-C is installed in a hot environment, the overhigh temperature will affect heat dissipation performance of the RAX711-C. Therefore, you need to configure fan monitoring, which is used to automatically adjust the rotational speed of the fan based on environment temperature and help the RAX711-C work properly. Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 257 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description 2 Raisecom(config)#fan- Configure the working mode of the fan. monitor mode { auto | enforce } By default, it is auto. 3 Raisecom(config)#fan (Optional) configure the rotational speed in forced monitoring enforce level level mode. By default, it is 4. 4 Raisecom(config)#fan- (Optional) configure the temperature scale. monitor temperature-scale value-1 value-2 value-3 By default, it is 0°C for level 1, 35°C for level 2, 45°C for level 3, and 55°C for level 4. 5 Raisecom(config)#fan- Enable fan monitoring Trap. monitor trap send enable 12.10.2 Checking configurations No. Command Description 1 Raisecom#show fan-monitor Show configurations and status of fan monitoring. { information | status } 12.11 Configuring loopback 12.11.1 Preparing for configurations Scenario The network maintenance engineers can detect and analyze interface and network faults through interface loopback. Ingress packets and egress packets are defined as below:  Ingress packets: test packets received by an interface  Egress packets: test packets returned to the peer device through an interface Prerequisite When the current interface is in Forwarding status, packets entering the interface can be properly forwarded or transmitted to the CPU. 12.11.2 Configuring interface loopback Step Command Description 1 Raisecom#config Enter global configuration mode. Raisecom Proprietary and Confidential 258 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description 2 Raisecom(config)#interface interface-type Enter interface configuration mode. interface-number 3 Raisecom(config-port)#loopback { external Enable interface loopback. | internal } [ access-list acl-number ] in-service { enable | disable } 4 Raisecom(config-port)#loopback { external Configure the loopback direction of the | internal } interface. 5 Raisecom(config-port)#loopback { external Configure the interface loopback rule based | internal } access-list acl-number [ swap on ACL. sip source-ip-address ] [ swap smac source-mac-address ] [ swap dip-disable ] [ swap dmac-disable ] [ swap udp-dport- disable ] 6 Raisecom(config-port)#loopback { external Configure the interface loopback rule based | internal } rc-sam { l2 | l3 } on RCSAM Layer 2 or Layer 3 packet. 7 Raisecom(config-port)#loopback statistic Enable statistics on loopback packets. { enable | disable } By default, it is disabled. 8 Raisecom(config-port)#loopback timeout Configure the loopback interface. minute By default, it is 0; namely, the loopback is permanent. 12.11.3 Checking configurations No. Command Description 1 Raisecom#show loopback [ interface-type Show configurations of interface loopback. interface-number ] 12.12 Configuring fault detection 12.12.1 Configuring task scheduling When you need to use some commands to perform periodical maintenance on the RAX711-C, you can configure task scheduling. The RAX711-C supports achieving task scheduling through the schedule list and CLI. You can use commands to perform periodical operation just by specifying the begin time, period, and end time of a specified task in the schedule list and bind the schedule list to the CLI. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#schedule-list list-number start date-time Create and configure mm-dd-yyyy hh:mm:ss Raisecom Proprietary and Confidential 259 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description Raisecom(config)#schedule-list list-number start date-time the schedule list. mm-dd-yyyy hh:mm:ss every { day | week } stop mm-dd-yyyy hh:mm:ss Raisecom(config)#schedule-list list-number start date-time mm-dd-yyyy hh:mm:ss every days-interval time-interval [ stop mm-dd-yyyy hh:mm:ss ] Raisecom(config)#schedule-list list-number start Up–time days-after-startup hh:mm:ss Raisecom(config)#schedule-list list-number start Up–time days-after-startup hh:mm:ss every days-interval time-interval [ stop days-after-startup hh:mm:ss ] 3 Raisecom#show schedule-list Show schedule list configurations. 12.12.2 Ping Step Command Description 1 Raisecom#ping [ vrf vpn-instance-name ] ip- (Optional) use the ping command to test address [ count count ] [ size size ] IPv4 network connectivity. [ source ip-address ] [ waittime second ] 2 Raisecom#ping ipv6 ipv6-address [ count (Optional) use the ping command to test count ] [ size size ] [ waittime second ] IPv6 network connectivity. The RAX711-C cannot perform other operations in the process of Ping. It can perform other operations only when Ping is finished or Ping is broken off by pressing Ctrl+C. 12.12.3 Traceroute Before using Traceroute, you should configure the IP address and default gateway of the RAX711-C. Step Command Description 1 Raisecom#config Enter global configuration mode. 2 Raisecom(config)#interface Enter interface configuration mode. interface-type interface-number 3 Raisecom(config-port)#ip address Configure the IP address of the interface. ip-address [ ip-mask ] vlan-id 4 Raisecom(config-port)#exit Exit interface configuration mode and enter global configuration mode. 5 Raisecom(config)#ip default- Configure the default gateway. gateway ip-address Raisecom Proprietary and Confidential 260 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Step Command Description 6 Raisecom(config)#exit Exit global configuration mode and enter privileged EXEC configuration mode. 7 Raisecom#traceroute { [ vrf vpn- (Optional) use the traceroute command to test network instance-name ] ip-address | ipv6 connectivity and show nodes passed by the packet. ipv6-address } [ firstttl first- ttl ] [ maxttl max-ttl ] [ port By default, the initial TTL is 1; the maximum TTL is port-number ] [ waittime second ] 30; the interface ID is 33433; the timeout is 3s; the [ count times ] [ size size ] number of detection packets is 3. 12.13 Maintenance Command Description Raisecom(config)#clear filter statistics Clear filter statistics. interface interface-type interface-number Raisecom(config)#clear lldp global statistic Clear LLDP global statistics. Raisecom(config)#clear lldp statistic Clear LLDP statistics on the specified [ interface-type interface-number ] interface. Raisecom(config)#clear lldp remote-table Clear information about LLDP neighbors on [ interface-type interface-number ] the specified interface. Raisecom(config)#clear mac-address { all | Clear MAC addresses in the MAC address dynamic | static } [ interface-type interface- table. number ] Raisecom(config)#clear logging buffer Clear contents in the buffer. Raisecom(config)#clear logging statistics Clear log statistics. 12.14 Configuration examples 12.14.1 Examples for configuring LLDP basic functions Networking requirements As shown in Figure 12-6, RAX711-C A and RAX711-C B are connected to the NView NNM system. Enable LLDP on links between RAX711-C A and RAX711-C B. And then you can query the Layer 2 link changes through the NView NNM system. Raisecom Proprietary and Confidential 261 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Figure 12-6 Configuring LLDP basic functions Configuration steps Step 1 Configure the management IP address. Configure RAX711-C A. Raisecom(config)#create vlan 1024 active Raisecom(config)#interface client 1 Raisecom(config-client1)#switchport access vlan 1024 Raisecom(config-client1)#exit Raisecom(config)#interface line 1 Raisecom(config-line1)#switchport access vlan 1024 Raisecom(config-line1)##ip address 10.10.10.1 Raisecom(config-line1)#exit Configure RAX711-C B. Raisecom(config)#create vlan 1024 active Raisecom(config)#interface client 1 Raisecom(config-port)#switchport access vlan 1024 Raisecom(config-port)#exit Raisecom(config)#interface line 1 Raisecom(config-line1)#switchport access vlan 1024 Raisecom(config-line1)#ip address 10.10.10.2 Raisecom(config-line1)#exit Step 2 Configure LLDP properties. Configure RAX711-C A. Raisecom Proprietary and Confidential 262 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Raisecom(config)#lldp enable Raisecom(config)#lldp message-transmission interval 60 Raisecom(config)#lldp message-transmission delay 9 Raisecom(config)#lldp trap-interval 10 Configure RAX711-C B. Raisecom(config)#lldp enable Raisecom(config)#lldp message-transmission interval 60 Raisecom(config)#lldp message-transmission delay 9 Raisecom(config)#lldp trap-interval 10 Checking results Use the show lldp local config command to show local configurations. Take RAX711-C A for example. Raisecom#show lldp local config System configuration: ------------------------------------------------------------------ LLDP enable status: enable (default is disabled) LldpMsgTxInterval: 60 (default is 30s) LldpMsgTxHoldMultiplier: 4 (default is 4) LldpReinitDelay: 2 (default is 2s) LldpTxDelay: 9 (default is 2s) LldpNotificationInterval: 10 (default is 5s) LldpNotificationEnable: enable (default is enabled) ------------------------------------------------------------------ Port Status -------------------------------------------------------- PC1 enable PC2 enable line1 enable line2 enable line3 enable line4 enable client1 enable client2 enable client3 enable client4 enable client5 enable client6 enable client7 enable client8 enable client9 enable client10 enable client11 enable client12 enable Raisecom Proprietary and Confidential 263 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Use the show lldp remote command to show neighbour information. On RAX711-C A: Raisecom#show lldp remote Port ChassisId PortId SysName MgtAddress ExpiredTime ------------------------------------------------------------------------- interface 1000E.5E02.B010 client1 RAXB10.10.10.2 106 On RAX711-C B: Raisecom#show lldp remote Port ChassisId PortId SysName MgtAddress ExpiredTime ------------------------------------------------------------------------- interface 1000E.5E12.F120 client1 RAXA10.10.10.1 106 12.14.2 Examples for outputting system logs to log host Networking requirements As shown in Figure 12-7, configure system log to output system logs of the RAX711-C to the log host, facilitating log viewing at any time. Figure 12-7 Outputting system logs to log host Configuration steps Step 1 Configure the IP address of the SNMP interface on the RAX711-C. Raisecom#config Raisecom(config)#interface snmp 1 Raisecom(config-snmp1)#ip address 20.0.0.6 255.0.0.0 1 Raisecom(config-snmp1)#exit Step 2 Output system logs to the log host. Raisecom(config)#logging on Raisecom(config)#logging host 20.0.0.168 warnings Raisecom Proprietary and Confidential 264 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 12 System management and maintenance Raisecom(config)#logging rate-limit 2 Checking results Use the show logging command to show system log configurations. Raisecom#show logging Syslog logging: enable Dropped Log messages: 0 Dropped debug messages: 0 Rate-limited: 2 messages per second Squence number display: disable Debug level time stamp: none Log level time stamp: datetime Log buffer size: 4kB Debug level: low Syslog history logging: disable Syslog history table size:1 Dest Status Level LoggedMsgs DroppedMsgs Discriminator ---------------------------------------------------------------------- buffer disable informational(6) 0 0 0 console enable informational(6) 3 0 0 trap disable warnings(4) 0 0 0 file disable warnings(4) 0 0 0 Log host information: Max number of log server: 10 Current log server number: 1 Target Address Level Facility Sent Drop Discriminator ------------------------------------------------------------------------- 20.0.0.168 warnings(4) local7 0 0 0 Check whether the log information is displayed on the terminal emulation Graphical User Interface (GUI) of the PC. 07-01-2014 11:31:28Local0.Debug 20.0.0.6JAN 01 10:22:15 RAX711-C: CONFIG-7- CONFIG:USER " raisecom " Run " logging on " 07-01-2014 11:27:41Local0.Debug 20.0.0.6JAN 01 10:18:30 RAX711-C: CONFIG-7- CONFIG:USER " raisecom " Run " ip address 20.0.0.6 255.0.0.0 1 " 07-01-2014 11:27:35Local0.Debug 20.0.0.10 JAN 01 10:18:24 RAX711-C: CONFIG- 7-CONFIG:USER " raisecom " Run " ip address 20.0.0.6 255.0.0.1 1 " 07-01-2014 11:12:43Local0.Debug 20.0.0.10 JAN 01 10:03:41 RAX711-C: CONFIG- 7-CONFIG:USER " raisecom " Run " logging host 20.0.0.168 local0 7 " 07-01-2014 11:12:37Local0.Debug 20.0.0.10 JAN 01 10:03:35 RAX711-C: CONFIG- 7-CONFIG:USER " raisecom " Run " logging on" Raisecom Proprietary and Confidential 265 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 13 Appendix 13 Appendix This chapter lists terms and abbreviations involved in this document, including the following sections  Terms  Acronyms and abbreviations 13.1 Terms A A series of ordered rules composed of permit | deny sentences. These Access rules are based on the source MAC address, destination MAC address, Control List source IP address, destination IP address, interface ID and so on. The (ACL) device decides to receive or refuse the packets based on these rules. C A standard defined by IEEE. It defines protocols and practices for OAM Connectivity (Operations, Administration, and Maintenance) for paths through 802.1 Fault bridges and local area networks (LANs). Used to diagnose fault for EVC Management (Ethernet Virtual Connection). Cost-effective by fault management (CFM) function and improve Ethernet maintenance. E Encapsulation A technology used by the layered protocol. When the lower protocol receives packets from the upper layer, it will map packets to the data of the lower protocol. The outer layer of the data is encapsulated with the lower layer overhead to form a lower protocol packet structure. For example, an IP packet from the IP protocol is mapped to the data of 802.1Q protocol. The outer layer is encapsulated by the 802.1Q frame header to form a VLAN frame structure. Raisecom Proprietary and Confidential 266 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 13 Appendix Complying with IEEE 802.3ah protocol, EFM is a link-level Ethernet Ethernet in OAM technology. It provides the link connectivity detection, link fault the First Mile monitoring, remote fault notification, and so on. for a link between two (EFM) directly-connected devices. EFM is mainly used for the Ethernet link on edges of the network accessed by users. L Link A computer networking term which describes using multiple network Aggregation cables/ports in parallel to increase the link speed beyond the limits of any one single cable or port, and to increase the redundancy for higher availability. M A term in data communication area. The structure is fixed, with its Message header defining the destination address and the text as the actual packet. It can also include information about the termination of packets. P In data communication field, packet is the data unit for switching and transmitting information. In transmission, it will be continuously encapsulated and decapsulated. The header is used to define the Packet destination address and source address. The trailer contains information indicating the end of the packet. The payload data in between is the actual packet. In packet switching network, data is partitioned into multiple data segments. The data segment is encapsulated by control information, such as, destination address, to form the switching packet. The switching Packet packet is transmitted to the destination in the way of storage-forwarding switching in the network. Packet switching is developed based on the storage- forwarding method and has merits of both circuit switching and packet switching. Q QinQ QinQ is (also called Stacked VLAN or Double VLAN) extended from 802.1Q, defined by IEEE 802.1ad recommendation. Basic QinQ is a simple layer-2 VPN tunnel technology, encapsulating outer VLAN Tag for client private packets at carrier access end; the packets take double VLAN Tag passing through trunk network (public network). In public network, packets only transmit according to outer VLAN Tag, the private VLAN Tag are transmitted as data in packets. V Raisecom Proprietary and Confidential 267 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 13 Appendix Virtual Local VLAN is a protocol proposed to solve broadcast and security issues for Area Ethernet. It divides devices in a LAN into different segments logically Network rather than physically, thus implementing multiple virtual work groups (VLAN) which are based on Layer 2 isolation and do not affect each other. VLAN mapping is mainly used to replace the private VLAN Tag of the Ethernet service packet with the ISP's VLAN Tag, making the packet transmitted according to ISP's VLAN forwarding rules. When the packet VLAN is sent to the peer private network from the ISP network, the VLAN Tag mapping is restored to the original private VLAN Tag according to the same VLAN forwarding rules. Thus, the packet is sent to the destination correctly. 13.2 Acronyms and abbreviations A ACL Access Control List APS Automatic Protection Switching C CE Customer Edge CFM Connectivity Fault Management CoS Class of Service D DHD Dual Home Device DRR Deficit Round Robin DSCP Differentiated Services Code Point E EFM Ethernet in the First Mile F FTP File Transfer Protocol G GPS Global Positioning System Raisecom Proprietary and Confidential 268 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 13 Appendix GSM Global System for Mobile Communications H HA High Availability I ICCP Inter-Chassis Communication Protocol IEEE Institute of Electrical and Electronics Engineers IETF Internet Engineering Task Force IP Internet Protocol International Telecommunications Union - Telecommunication ITU-T Standardization Sector L LACP Link Aggregation Control Protocol LBM LoopBack Message LBR LoopBack Reply LLDP Link Layer Discovery Protocol LLDPDU Link Layer Discovery Protocol Data Unit LTM LinkTrace Message LTR LinkTrace Reply M MA Maintenance Association MAC Medium Access Control MD Maintenance Domain MEG Maintenance Entity Group MEP Maintenance associations End Point MIB Management Information Base MIP Maintenance association Intermediate Point MTU Maximum Transferred Unit N Raisecom Proprietary and Confidential 269 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 13 Appendix NTP Network Time Protocol O OAM Operation, Administration, and Maintenance P PDU Protocol Data Unit PE Provider Edge PSN Packet Switched Network PTN Packet Transport Network PW Pseudo Wire PWE3 Pseudo Wire Emulation Edge-to-Edge Q QoS Quality of Service R RMEP Remote Maintenance association End Point RMON Remote Network Monitoring S SAToP Structure-Agnostic TDM over Packet SFP Small Form-factor Pluggables SLA Service Level Agreement SNMP Simple Network Management Protocol SNTP Simple Network Time Protocol SP Strict-Priority SSH Secure Shell T TCI Tag Control Information TCP Transmission Control Protocol TFTP Trivial File Transfer Protocol Raisecom Proprietary and Confidential 270 Copyright © Raisecom Technology Co., Ltd. Raisecom RAX711-C (A) Configuration Guide 13 Appendix TLV Type Length Value ToS Type of Service TPID Tag Protocol Identifier V VPN Virtual Private Network VLAN Virtual Local Area Network W WRR Weight Round Robin Raisecom Proprietary and Confidential 271 Copyright © Raisecom Technology Co., Ltd. Address: Raisecom Building, No. 11, East Area, No. 10 Block, East Xibeiwang Road, Haidian District, Beijing, P.R.China Postal code: 100094 Tel: +86-10-82883305 Fax: 8610-82883056 http://www.raisecom.com Email: [email protected]
Copyright © 2024 DOKUMEN.SITE Inc.