logo资料库

广达交换机配置文档.pdf

第1页 / 共110页
第2页 / 共110页
第3页 / 共110页
第4页 / 共110页
第5页 / 共110页
第6页 / 共110页
第7页 / 共110页
第8页 / 共110页
资料共110页,剩余部分请下载后查看
Revision History
Customer Service
Proprietary Note
Trademarks
About This Document
Kontron Support for Switch Software
Audience
Organization
Additional Documentation
Advisory Conventions
Typographical Conventions
About Fastpath Software Modules
Two Year Warranty
1. System Configuration
1.1 Traceroute
1.1.1 CLI Example
1.2 Configuration Scripting
1.2.1 Overview
1.2.2 Considerations
1.2.3 CLI Examples
1.3 Outbound Telnet
1.3.1 Overview
1.3.2 CLI Examples
1.4 Pre-Login Banner
1.4.1 Overview
1.4.2 CLI Example
1.5 Simple Network Time Protocol (SNTP)
1.5.1 Overview
1.5.2 CLI Examples
1.6 Syslog
1.6.1 Overview
1.6.2 CLI Examples
1.7 Port Description
1.7.1 CLI Example
1.8 Storm Control
1.8.1 CLI Example
1.9 Cable Test
1.9.1 CLI Example
2. Switching Configuration
2.1 Virtual LANs
2.1.1 VLAN Configuration Example
2.1.2 CLI Examples
2.1.3 Private Edge VLANs
2.1.4 CLI Example
2.2 IGMP Snooping
2.2.1 Overview
2.2.2 CLI Examples
2.3 IGMP Proxy
2.3.1 CLI examples
2.4 Link Aggregation/Port-channels
2.4.1 CLI Example
2.5 Port Mirroring
2.5.1 Overview
2.5.2 CLI Examples
2.6 Port Security
2.6.1 Overview
2.6.2 Operation
2.6.3 CLI Examples
2.7 Link Layer Discovery Protocol
2.7.1 CLI Examples
2.8 Denial of Service Attack Protection
2.8.1 Overview
2.8.2 CLI Examples
2.9 DHCP Filtering
2.9.1 Overview
2.9.2 Limitations
2.9.3 CLI Examples
2.10 Configuring Spanning Tree Protocol
2.10.1 Configuring Spanning Tree Protocol
3. Routing Configuration
3.1 Port Routing
3.1.1 Port Routing Configuration
3.2 VLAN Routing
3.2.1 CLI Examples
3.2.2 VLAN Routing RIP Configuration
3.2.3 VLAN Routing OSPF Configuration
3.3 Virtual Router Redundancy Protocol
3.3.1 CLI Examples
3.4 Proxy Address Resolution Protocol (ARP)
3.4.1 Overview
3.4.2 CLI Examples
3.5 OSPF
3.5.1 OSPF Concepts and Terms
3.5.2 CLI Examples
3.6 Routing Information Protocol
3.6.1 RIP Configuration
3.6.2 CLI Examples
3.7 Route Preferences
3.7.1 Assigning Administrative Preferences to Routing Protocols
3.7.2 Assigning Administrative Preferences to Static Routes
3.7.3 Using Equal Cost Multipath
3.8 Loopback Interfaces
4. Device Security
4.1 802.1x Network Access Control
4.1.1 802.1x Network Access Control Example
4.2 Access Control Lists (ACLs)
4.2.1 Overview
4.2.2 MAC ACLs
4.2.3 IP ACLs
4.2.4 ACL Configuration Process
4.2.5 IP ACL CLI Examples
4.2.6 MAC ACL CLI Examples
4.3 RADIUS
4.3.1 RADIUS Configuration Example
4.4 TACACS+
4.4.1 TACACS+ Configuration Example
5. IPv6
5.1 Overview
5.2 Interface Configuration
5.2.1 CLI Example
5.3 DHCPv6
5.3.1 CLI Examples
6. Quality of Service
6.1 Class of Service Queuing
6.1.1 Ingress Port Configuration
6.1.2 Egress Port Configuration—Traffic Shaping
6.1.3 Queue configuration
6.1.4 Queue Management Type
6.1.5 CLI Examples
6.2 Differentiated Services
6.2.1 CLI Example
6.2.2 DiffServ for VoIP Configuration Example
7. Multicast
7.1 Overview
7.2 IGMP Configuration
7.2.1 CLI Example
7.3 IGMP Proxy
7.3.1 CLI Examples
7.4 MLD
7.4.1 CLI Example
7.5 DVMRP
7.5.1 CLI Example
7.6 PIM
7.6.1 PIM-SM
7.6.2 PIM-DM
» Kontron User's Guide « FASTPATH Configuration Guide Document Revision 1.1 Document ID: FASTPATH Configuration Guide Issue Date: June 2011 If it's embedded, it's Kontron. www.kontron.com
Revision History Rev. Index 1.0 1.1 Brief Description of Changes Date of Issue Initial Issue Minor edits in all chapters 13.05.2011 07.06.2011 Customer Service Contact Information: Kontron Canada, Inc. 4555 Ambroise-Lafortune Boisbriand, Québec, Canada J7H 0A4 Tel: (450) 437-5682 (800) 354-4223 (450) 437-8053 Fax: E-mail: support@ca.kontron.com Kontron Modular Computer GmbH Sudetenstrasse 7 87600 Kaufbeuren Germany +49 (0) 8341 803 333 +49 (0) 8341 803 339 support-kom@kontron.com Visit our site at:www.kontron.com © 2011 Kontron, an International Corporation. All rights reserved. The information in this user's guide is provided for reference only. Kontron does not assume any liability arising out of the application or use of the information or products described herein. This user's guide may contain or reference information and products protected by copyrights or patents and does not convey any license under the patent rights of Kontron, nor the rights of others. Kontron is a registered trademark of Kontron. All trademarks, registered trademarks, and trade names used in this user's guide are the property of their respective owners. All rights reserved. Printed in Canada. This user's guide contains information proprietary to Kontron. Customers may reprint and use this user's guide in other publications. Customers may alter this user's guide and publish it only after they remove the Kon- tron name, cover, and logo. Kontron reserves the right to make changes without notice in product or component design as warranted by evolution in user needs or progress in engineering or manufacturing technology. Changes that affect the operation of the unit will be documented in the next revision of this user's guide. ii Configuration Guide www.kontron.com
Table of Contents Revision History .................................................................................................................. ii Customer Service ................................................................................................................ ii Proprietary Note ................................................................................................................vii Trademarks .....................................................................................................................vii About This Document ..........................................................................................................vii Kontron Support for Switch Software .....................................................................................viii Audience ....................................................................................................................viii Organization .....................................................................................................................ix Additional Documentation ....................................................................................................ix Advisory Conventions ...........................................................................................................ix Typographical Conventions .................................................................................................... x About Fastpath Software Modules ........................................................................................... x Two Year Warranty ...............................................................................................................xi 1. System Configuration .......................................................................................1 1.1 Traceroute ............................................................................................................ 1 1.1.1 CLI Example ................................................................................................... 2 1.2 Configuration Scripting ........................................................................................... 2 1.2.1 Overview ........................................................................................................ 2 1.2.2 Considerations ................................................................................................ 3 1.2.3 CLI Examples .................................................................................................. 3 1.3 Outbound Telnet .................................................................................................... 5 1.3.1 Overview ........................................................................................................ 5 1.3.2 CLI Examples .................................................................................................. 6 1.4 Pre-Login Banner ................................................................................................... 7 1.4.1 Overview ........................................................................................................ 7 1.4.2 CLI Example ................................................................................................... 7 1.5 Simple Network Time Protocol (SNTP) ......................................................................... 8 1.5.1 Overview ........................................................................................................ 8 1.5.2 CLI Examples .................................................................................................. 8 1.6 Syslog ............................................................................................................... 10 1.6.1 Overview ...................................................................................................... 10 1.6.2 CLI Examples ................................................................................................ 10 1.7 Port Description ................................................................................................... 13 1.7.1 CLI Example ................................................................................................. 13 1.8 Storm Control ...................................................................................................... 13 1.8.1 CLI Example ................................................................................................. 14 1.9 Cable Test .......................................................................................................... 14 1.9.1 CLI Example ................................................................................................. 15 2. Switching Configuration ................................................................................. 16 2.1 Virtual LANs ........................................................................................................ 16 2.1.1 VLAN Configuration Example ............................................................................ 17 2.1.2 CLI Examples ................................................................................................ 17 2.1.3 Private Edge VLANs ........................................................................................ 19 2.1.4 CLI Example ................................................................................................. 19 2.2 IGMP Snooping .................................................................................................... 20 2.2.1 Overview ...................................................................................................... 20 iii Configuration Guide www.kontron.com
2.2.2 CLI Examples ................................................................................................ 20 2.3 IGMP Proxy ......................................................................................................... 22 2.3.1 CLI examples ................................................................................................ 22 2.4 Link Aggregation/Port-channels .............................................................................. 23 2.4.1 CLI Example ................................................................................................. 23 2.5 Port Mirroring ..................................................................................................... 25 2.5.1 Overview ...................................................................................................... 25 2.5.2 CLI Examples ................................................................................................ 26 2.6 Port Security ....................................................................................................... 27 2.6.1 Overview ...................................................................................................... 27 2.6.2 Operation .................................................................................................... 28 2.6.3 CLI Examples ................................................................................................ 28 2.7 Link Layer Discovery Protocol .................................................................................. 29 2.7.1 CLI Examples ................................................................................................ 29 2.8 Denial of Service Attack Protection ........................................................................... 30 2.8.1 Overview ...................................................................................................... 30 2.8.2 CLI Examples ................................................................................................ 31 2.9 DHCP Filtering ..................................................................................................... 31 2.9.1 Overview ...................................................................................................... 31 2.9.2 Limitations .................................................................................................. 31 2.9.3 CLI Examples ................................................................................................ 32 2.10Configuring Spanning Tree Protocol .......................................................................... 33 2.10.1 Configuring Spanning Tree Protocol ................................................................... 33 3. Routing Configuration .................................................................................... 38 3.1 Port Routing ....................................................................................................... 38 3.1.1 Port Routing Configuration .............................................................................. 38 3.2 VLAN Routing ...................................................................................................... 40 3.2.1 CLI Examples ................................................................................................ 40 3.2.2 VLAN Routing RIP Configuration ........................................................................ 42 3.2.3 VLAN Routing OSPF Configuration ...................................................................... 45 3.3 Virtual Router Redundancy Protocol .......................................................................... 46 3.3.1 CLI Examples ................................................................................................ 47 3.4 Proxy Address Resolution Protocol (ARP) ................................................................... 49 3.4.1 Overview ...................................................................................................... 49 3.4.2 CLI Examples ................................................................................................ 49 3.5 OSPF ................................................................................................................. 50 3.5.1 OSPF Concepts and Terms ................................................................................ 50 3.5.2 CLI Examples ................................................................................................ 51 3.6 Routing Information Protocol ................................................................................. 58 3.6.1 RIP Configuration .......................................................................................... 58 3.6.2 CLI Examples ................................................................................................ 59 3.7 Route Preferences ................................................................................................ 60 3.7.1 Assigning Administrative Preferences to Routing Protocols ...................................... 60 3.7.2 Assigning Administrative Preferences to Static Routes ............................................ 61 3.7.3 Using Equal Cost Multipath .............................................................................. 62 3.8 Loopback Interfaces ............................................................................................. 63 4. Device Security .............................................................................................. 65 4.1 802.1x Network Access Control ................................................................................ 65 4.1.1 802.1x Network Access Control Example .............................................................. 66 4.2 Access Control Lists (ACLs) ..................................................................................... 67 4.2.1 Overview ...................................................................................................... 67 iv Configuration Guide www.kontron.com
4.2.2 MAC ACLs ..................................................................................................... 68 4.2.3 IP ACLs ........................................................................................................ 68 4.2.4 ACL Configuration Process ................................................................................ 69 4.2.5 IP ACL CLI Examples ....................................................................................... 69 4.2.6 MAC ACL CLI Examples ..................................................................................... 70 4.3 RADIUS .............................................................................................................. 73 4.3.1 RADIUS Configuration Example ......................................................................... 73 4.4 TACACS+ ............................................................................................................. 75 4.4.1 TACACS+ Configuration Example ........................................................................ 75 5. IPv6 ............................................................................................................. 77 5.1 Overview ............................................................................................................ 77 5.2 Interface Configuration ......................................................................................... 77 5.2.1 CLI Example ................................................................................................. 78 5.3 DHCPv6 ............................................................................................................. 80 5.3.1 CLI Examples ................................................................................................ 81 6. Quality of Service ........................................................................................... 82 6.1 Class of Service Queuing ........................................................................................ 82 6.1.1 Ingress Port Configuration ............................................................................... 82 6.1.2 Egress Port Configuration—Traffic Shaping .......................................................... 83 6.1.3 Queue configuration ...................................................................................... 83 6.1.4 Queue Management Type ................................................................................. 83 6.1.5 CLI Examples ................................................................................................ 83 6.2 Differentiated Services .......................................................................................... 86 6.2.1 CLI Example ................................................................................................. 87 6.2.2 DiffServ for VoIP Configuration Example .............................................................. 89 7. Multicast ...................................................................................................... 91 7.1 Overview ............................................................................................................ 91 7.2 IGMP Configuration .............................................................................................. 91 7.2.1 CLI Example ................................................................................................. 92 7.3 IGMP Proxy ......................................................................................................... 92 7.3.1 CLI Examples ................................................................................................ 92 7.4 MLD .................................................................................................................. 94 7.4.1 CLI Example ................................................................................................. 94 7.5 DVMRP .............................................................................................................. 94 7.5.1 CLI Example ................................................................................................. 95 7.6 PIM .................................................................................................................. 96 7.6.1 PIM-SM ....................................................................................................... 96 7.6.2 PIM-DM ....................................................................................................... 98 v Configuration Guide www.kontron.com
List of Figures Figure 1-1: Log Files Key......................................................................................................... 10 Figure 2-1: VLAN Example Network Diagram ................................................................................ 17 Figure 2-2: LAG/Port-channel Example Network Diagram ................................................................ 23 Figure 3-1: Port Routing Example Network Diagram....................................................................... 38 Figure 3-2: VLAN Routing Example Network Diagram ..................................................................... 40 Figure 3-3: RIP for VLAN Routing Example Network Diagram ............................................................ 42 Figure 3-4: VRRP Example Network Configuration ......................................................................... 46 Figure 3-5: OSPF Example Network Diagram: Border Router ............................................................. 51 Figure 3-6: OSPF Configuration—Stub Area and NSSA Area .............................................................. 53 Figure 3-7: OSPF Configuration—Virtual Link................................................................................ 55 Figure 3-8: Port Routing Example Network Diagram....................................................................... 58 Figure 3-9: Forwarding Without ECMP ........................................................................................ 61 Figure 3-10:Next Hop with Two Static Routes................................................................................ 61 Figure 4-1: FASTPATH with 802.1x Network Access Control .............................................................. 64 Figure 4-2: IP ACL Example Network Diagram............................................................................... 67 Figure 4-3: RADIUS Servers in a FASTPATH Network........................................................................ 73 Figure 4-4: FASTPATH with TACACS+ ........................................................................................... 74 Figure 5-1: IPv6 Example ........................................................................................................ 77 Figure 5-2: DHCPv6 Prefix Delegation Scenario............................................................................. 79 Figure 6-1: CoS Mapping and Queue Configuration........................................................................ 83 Figure 6-2: CoS Configuration Example System Diagram ................................................................. 84 Figure 6-3: DiffServ Internet Access Example Network Diagram ........................................................ 86 Figure 6-4: DiffServ VoIP Example Network Diagram ...................................................................... 88 vi Configuration Guide www.kontron.com
Preface Proprietary Note This document contains information proprietary to Kontron AG. It may not be copied or transmitted by any means, disclosed to others, or stored in any retrieval system or media without the prior written consent of Kontron AG or one of its authorized agents. The information contained in this document is, to the best of our knowledge, entirely correct. However, Kon- tron AG cannot accept liability for any inaccuracies or the consequences thereof, or for any liability arising from the use or application of any circuit, product, or example shown in this document. Kontron AG reserves the right to change, modify, or improve this document or the product described herein, as seen fit by Kontron AG without further notice. Trademarks Kontron AG and the Kontron logo are trade marks owned by Kontron AG, Germany. In addition, this document may include names, company logos and trademarks, which are registered trademarks and, therefore, propri- etary to their respective owners. About This Document This configuration guide provides examples of the use of FASTPATH software in typical network applications. It describes the use and advantages of specific functions provided by FASTPATH software, and includes infor- mation on configuring those functions using the command line interface (CLI). The Configuration Guide is relevant for the following Kontron product families: • CompactPCI Switches CP6930, CP6923 and CP3923 • MicroTCA Carrier Hubs AM4904 and AM4910 • AdvancedTCA Carrier AT8404 • AdvancedTCA Switches AT8904 and AT8910 • VPX Switch VX3910 CLI commands and configuration options may vary depending on the particular product and the FASTPATH version running. There may be differences in command syntax or command availability, please refer to the CLI Reference Manual provided for the product you are using. vii Configuration Guide www.kontron.com
Kontron Support for Switch Software In case of support questions related to the Fastpath software on any of the products, please contact Kontron Support. Contact details are given in the corresponding product User's Guide. To be able to process support cases as fast as possible, please add the following information: Preface • Output of • show boardinfo version • show tech-support • Information of use-case • Overall system setup • Block diagram of used I/Fs and connected devices • Configuration of external devices (ETHx setup, ...) Audience The information in this guide is intended for any of the following individuals: • System administrators who are responsible for configuring and operating a network using FASTPATH software • Software engineers who are integrating FASTPATH software into a router or switch product • Level 1 and/or Level 2 Support providers To obtain the greatest benefit from this guide, you should have an understanding of the base software and should have read the specification for your networking device platform. You should also have basic know- ledge of Ethernet and networking concepts. viii Configuration Guide www.kontron.com
分享到:
收藏