zxr10 5900e Series 1 PDF
zxr10 5900e Series 1 PDF
zxr10 5900e Series 1 PDF
Version 2.8.23.B
ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech Industrial Park,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900
Fax: (86) 755 26770801
URL: http://ensupport.zte.com.cn
E-mail: [email protected]
The contents of this document are protected by copyright laws and international treaties. Any reproduction or distribution of
this document or any portion of this document, in any form by any means, without the prior written consent of ZTE CORPO-
RATION is prohibited. Additionally, the contents of this document are protected by contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE CORPORATION
or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions are dis-
claimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose, title or non-in-
fringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the use of or reliance on the
information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications covering the subject
matter of this document. Except as expressly provided in any written license between ZTE CORPORATION and its licensee,
the user of this document shall not acquire any license to the subject matter herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
Revision History
Chapter Summary
Chapter Summary
VLAN Configuration
Table of Contents
VLAN Overview .................................................................. 1
Configuring VLAN ............................................................... 6
Configuring PVLAN.............................................................10
Configuring QinQ ...............................................................11
Configuring Subnet VLAN....................................................11
Configuring Protocol VLAN ..................................................13
Configuring VLAN Translation ..............................................14
Configuring SuperVLAN ......................................................14
VLAN Maintenance and Diagnosis.........................................16
VLAN Overview
Virtual Local Area Network (VLAN) is a technology that divides a
physical network into several logical (virtual) Local Area Networks
(LANs). Each VLAN is identified by a VLAN ID (VID).
VLAN technology divides users within a physical LAN into different
broadcast domains (VLANs) according to requirements. Users with
the same demands are grouped to the same broadcast domain,
while those with different demands are separated.
Each VLAN, like a logically independent LAN, shares the same at-
tributes as those physical LANs. All broadcast and unicast traffics
within a VLAN are limited to the VLAN but are not forwarded to
any other VLAN. Devices in different VLANs must rely on L3 rout-
ing switching for communication between them.
VLAN provides the following advantages:
1. Lower broadcast traffic on the network
2. Enhanced network security
3. Streamlined network management
VLAN Type
LAN type of a device depends on how it will divide a received frame
to a VLAN. ZXR10 5900E supports port-based VLAN, the simplest
and most effective method of VLAN division. It divides its various
ports into different VLANs, so that any traffic received on a port
belongs to its corresponding VLAN.
Assume ports 1, 2 and 3 belong to the same VLAN, while the other
ports belong to other VLANs, then frames received on port 1 are
broadcast to ports 2 and 3 only while they are not passed to any
other port. When a user in a VLAN moves to a new location, it no
longer belongs to the original VLAN unless the user is assigned to
that VLAN again.
VLAN Tag
It is possible to transmit services of several VLANs over a single
link if a frame carries information about its native VLAN while being
passed through a network. IEEE 802.1Q implements this function
through attaching a VLAN tag to the Ethernet frame.
A VLAN tag is a four-byte long number, and it comes after the
source MAC address and before the length/type field in an Ethernet
frame. Figure 1 shows the VLAN tag format.
It connects two devices that can identify VLAN tags and car-
ries several VLAN’s services. It transmits tagged frames only
to several VLANs. The most common trunk link is the one be-
tween two VLAN switches.
3. Hybrid Link
It transmits both tagged and untagged frames. For a given
VLAN, however, it only transmits frames of the same type.
Default VLAN
ZXR10 5900E has a default VLAN initially, which has the following
features:
� VLAN ID as 1
� VLAN name as VLAN0001
� All ports included
� Untagged by default on all ports
PVLAN
To improve network security, messages among different users shall
be separated. The traditional method is to assign a VLAN to each
user. The method has obvious limitation, which can be seen from
the following aspects:
1. At present, IEEE 802.1Q standard supports utmost 4094
VLANs, which limits the number of users and network expan-
sion.
2. Each VLAN corresponds to one IP subnet, so vast divided sub-
nets will cause the waste of IP addresses.
3. Planning and management to a mass of VLANs and IP subnets
is extremely complicated.
PVLAN (Private VLAN) technology is developed to solve these prob-
lems.
PVLAN divides the ports in VLAN into three types: the port con-
necting to the user is called Isolate Port, the port connecting to a
group of users that need interconnection and intercommunication
is called Community Port and the port connecting to the upstream
router is called Promiscuous Port. The isolated port communicates
with the promiscuous port only, but not with any other isolated
port or community port. Community port can communicate with
promiscuous port and any other community port, but not with iso-
lated port. Thus ports in the same VLAN are separated. The user
who connects with isolated port can only communicate with its
default gateway, the user who connects community port can in-
terconnect and intercommunicate. Network security is ensured.
ZXR10 5900E supports 20 PVLAN groups, each group having cus-
tomized isolated ports and at most 256 isolated ports, 16 commu-
nity ports and 8 promiscuous ports.
QinQ
QinQ, also known as VLAN stack, is a graphic name for the IEEE
802.1Q based tunnel protocol. QinQ technology encapsulates the
original VLAN tag (inner tag) with another VLAN tag (outer tag) so
that the inner tag is masked.
QinQ implements simple Layer 2 VPN (L2VPN) without protocol
support, applicable to small-sized LANs with L3 switches as their
core.
QinQ typical networking is shown in Figure 2. Port to the cus-
tomer network is called the customer port. The port to the Service
Provider network is called the uplink port, and the SP edge access
device is called Povider Edge (PE).
Subnet VLAN
Subnet-based VLAN applies to L2 VLAN networks for flexible con-
figuration of data frame forwarding. Subnet-based VLAN forward
a data frame to a VLAN based on the source IP address. This
source IP address based VLAN can forward user data from differ-
ent subnets cross several VLANs, while remain the original VLAN
membership unchanged.
Protocol VLAN
Protocol-based VLAN applies to L3 networks or those running many
protocols. Protocol-based VLAN divides packets based on their
network layer encapsulation protocol. Packets with the same tag
belong to the same protocol VLAN. This network layer protocol
based VLAN can broadcast packets cross several VLAN switches.
It allows users to move freely in the network while remain their
VLAN membership unchanged.
This solution eliminates the need to reconfigure the VLAN when a
user moves to another physical location in the network. In addi-
tion, as VLANs are identified based on the protocol type instead of
attached frame tag, traffic through the network reduces.
Protocol VLAN is not only enabled on all physical ports by default
but also disabled on ports according to demands, which identifies
that VLANs are based on the packet tag only. It separates packets
with different tags so that users have access to data from other
users in the same VLAN only.
ZXR10 5900E supports up to 16 protocol VLANs. This means that
protocol VLANs support processing packets with 16 kinds of tags.
VLAN Translation
VLAN translation permits the switches of different users to have
same VLAN ID. With VLAN translation, core switch modifies the
same VLAN ID of edge switches into the different VLAN ID. This
function isolate user in core switch and simply the configuration of
edge switch.
ZXR10 5900E support 768 VLAN translation.
SuperVLAN
On a traditional ISP network, one IP subnet is allocated to each
user, which means that the occupation of three IP addresses by a
single user as its subnet address, broadcast address and default
gateway address. Even if there are a number of idle IP addresses
Configuring VLAN
Creating VLAN
Command Function
Command Function
Command Function
Command Function
There are three VLAN link types for Ethernet interface of ZXR10
5900E: Access mode, Trunk mode and Hybrid mode. Access mode
is used by default.
� Ports of access mode belong to only one VLAN, support un-
tagged frames and are usually connected to computers.
� Ports of trunk mode can belong to several VLANs (re-
ceives/sends packets from/to several VLANs), support tagged
frames, and are usually used as trunk ports between switches.
� Ports of hybrid mode can belong to several VLANs (re-
ceives/sends packets from/to several VLANs), support both
tagged and untagged frames (customized), and can be used
to connect both switches and computers.
Ports of hybrid mode are different from trunk ports. They send
both tagged and untagged frames (trunk ports send untagged
frames only when they are from the default VLAN).
Command Function
Command Function
Command Function
Command Function
Command Function
Command Function
This sets the frame type of the port which can receive all types
of frames including untagged and tagged frames. By default, all
frames are received.
Command Function
Configuration of Switch A:
ZXR10_A(config)#vlan 10
ZXR10_A(config-vlan10)#switchport pvid gei_1/1-2
ZXR10_A(config-vlan10)#exit
ZXR10_A(config)#vlan 20
ZXR10_A(config-vlan20)#switchport pvid gei_1/4-5
ZXR10_A(config-vlan20)#exit
ZXR10_A(config)#interface gei_1/24
ZXR10_A(config--gei_1/24)#switchport mode trunk
ZXR10_A(config-gei_1/24)#switchport trunk vlan 10
ZXR10_A(config-gei_1/24)#switchport trunk vlan 20
ZXR10_A(config-gei_1/24)#exit
Configuration of Switch B:
ZXR10_B(config)#vlan 10
ZXR10_B(config-vlan10)#switchport pvid gei_1/1-2
ZXR10_B(config-vlan10)#exit
ZXR10_B(config)#vlan 20
ZXR10_B(config-vlan20)#switchport pvid gei_1/4-5
ZXR10_B(config-vlan20)#exit
ZXR10_B(config)#interface gei_1/24
ZXR10_B(config-gei_1/24)#switchport mode trunk
ZXR10_B(config-gei_1/24)#switchport trunk vlan 10
ZXR10_B(config-gei_1/24)#switchport trunk vlan 20
ZXR10_B(config-gei_1/24)#exit
Configuring PVLAN
St- Command Function
ep
Configuring QinQ
St- Command Function
ep
Configuration of Switch B:
ZXR10_B(config)#vlan 10
ZXR10_B(config-vlan)#exit
ZXR10_B(config)#interface gei_1/1
ZXR10_B(config-if)#switchport qinq customer
ZXR10_B(config-if)#switchport access vlan 10
ZXR10_B(config-if)#exit
ZXR10_B(config)#interface gei_1/24
ZXR10_B(config-if)#switchport qinq uplink
ZXR10_B(config-if)#switchport mode trunk
ZXR10_B(config-if)#switchport trunk vlan 10
ZXR10_B(config-if)#exit
Configuration of switch:
/*Create a VLAN and assign ports to it*/
ZXR10(config)#interface gei_1/1
ZXR10(config-gei_1/1)#switchport mode hybrid
ZXR10(config-gei_1/1)#switchport hybrid native vlan 20
ZXR10(config-gei_1/1)#switchport hybrid vlan 20 untag
ZXR10(config-gei_1/1)#exit
ZXR10(config)#interface gei_1/2
ZXR10(config-gei_1/2)#switchport mode hybrid
ZXR10(config-gei_1/2)#switchport hybrid native vlan 30
ZXR10(config-gei_1/2)#switchport hybrid vlan 30 untag
ZXR10(config-gei_1/2)#exit
ZXR10(config)#interface gei_1/10
ZXR10(config-gei_1/10)#switchport mode hybrid
ZXR10(config-gei_1/10)#switchport hybrid vlan 20,30 untag
ZXR10(config-gei_1/10)#exit
/*Create subnet VLAN data*/
ZXR10(config)#vlan subnet-map session-no
1 20.20.20.0 255.255.255.0 vlan 20
ZXR10(config)#vlan subnet-map session-no
2 30.30.30.1 255.255.255.255
vlan 30
/*disable subnet VLAN in some ports which don’t need subnet VLAN*/
ZXR10(config)#interface gei_1/5
ZXR10(config-gei_1/5)#vlan subnet-map disable
ZXR10(config-gei_1/5)#exit
Configuring VLAN
Translation
St- Command Function
ep
Configuring SuperVLAN
St- Command Function
ep
Configuration of Switch A:
/*Create a SuperVLAN, and assign subnet and gateway for it*/
ZXR10_A(config)#interface supervlan10
ZXR10_A(config-supervlan10)#ip address 10.1.1.1 255.255.255.0
ZXR10_A(config-supervlan10)#exit
/*Add the SubVLAN to the SuperVLAN*/
ZXR10_A(config)#vlan 2
ZXR10_A(config-vlan2)#supervlan 10
ZXR10_A(config-vlan2)#exit
ZXR10_A(config)#vlan 3
ZXR10_A(config-vlan3)#supervlan 10
ZXR10_A(config-vlan3)#exit
/*Set vlan trunk port*/
ZXR10_A(config)#interface gei_1/10
ZXR10_A(config-gei_1/10)#switchport mode trunk
ZXR10_A(config-gei_1/10)#switchport trunk vlan 2-3
ZXR10_A(config-gei_1/10)#exit
Configuration of Switch B
ZXR10_B(config)#interface gei_1/1
ZXR10_B(config-gei_1/1)#switchport access vlan 2
ZXR10_B(config-gei_1/1)#exit
ZXR10_B(config)#interface gei_1/2
ZXR10_B(config-gei_1/2)#switchport access vlan 2
ZXR10_B(config-gei_1/2)#exit
ZXR10_B(config)#interface gei_1/5
ZXR10_B(config-gei_1/5)#switchport access vlan 3
ZXR10_B(config-gei_1/5)#exit
ZXR10_B(config)#interface gei_1/6
ZXR10_B(config-gei_1/6)#switch access vlan 3
ZXR10_B(config-gei_1/6)#exit
ZXR10_B(config)#interface gei_1/10
2. This example shows information of all the VLANs with their port
mode as Trunk.
ZXR10(config)#show vlan trunk
VLAN Name Status Said MTU IfIndex PvidPorts UntagPorts
TagPorts
------------------------------------------------------------------
1 VLAN0001 active 100001 1500 0
10 VLAN0010 active 100010 1500 0 gei_1/3
100 VLAN0100 active 100100 1500 0
gei_1/3
130 VLAN0130 active 100130 1500 0
136 VLAN0136 active 100136 1500 0
200 VLAN0200 active 100200 1500 0
gei_1/3
ZXR10(config)#
SVLAN Configuration
Table of Contents
SVLAN Overview ...............................................................17
SVLAN Configuration ..........................................................17
SVLAN Configuration Example .............................................19
SVLAN Maintenance and Diagnosis.......................................21
SVLAN Overview
The full name of SVLAN is selective VLAN. SVLAN is a kind of VLAN
tunnel technology. It provides multi-point to multi-point VLAN
transparent transportation service and simple Layer 2 VPN tunnel
by means of adding a VLAN tag outside original 802.1Q tag and
getting rid of outside VLAN tag when the packet is transported to
edge switch.
SVLAN has the function of providing SPVLAN tag according to traf-
fic, which is different from that ordinary QinQ adds SPVLAN tag
based on ports. That is, in the same Customer port, according
to difference between traffic carried CVLAN tags, provide corre-
sponding SPVLAN tag based on user demands.
SVLAN can modify outer tag value according to inner tag, outer
tag, or the combination of the former tages. Also it can control
if downlink stream need to be redirected from uplink port to cus-
tomer port.
With SVLAN function, User can implement map from QOS to
SPVLAN of CVLAN tag.
SVLAN Configuration
1. To configure SVLAN, use the following command.
Paramters Description:
Parameter Description
outer-vlan The packet has two layer tages before entering into customer
port, it designates outer VID.
Paramters Description:
Parameter Description
SVLAN Configuration
Example
Basic SVLAN Configuration
Example 1: Port 1 is a customer port, and port 2 is an uplink port.
When CVLAN is 10, 12 and untag, the packet from port1 SPVLAN
is 997,998 and 999 respectively.
ZXR10(config)#switchport gei_1/1 qinq customer
ZXR10(config)#interface gei_1/2
ZXR10(config-if)#switchport mode hybrid
ZXR10(config-if)#switchport hybrid vlan 997 tag
ZXR10(config-if)#switchport hybrid vlan 998 tag
ZXR10(config-if)#switchport hybrid vlan 999 tag
ZXR10(config-if)#exit
ZXR10(config)#vlan qinq extend-session-no 1 customer-port gei_1/1
uplink-port gei_1/2 in-vlan 10 ovlan 997
ZXR10(config)#vlan qinq extend-session-no 2 customer-port gei_1/1
uplink-port gei_1/2 in-vlan 12 ovlan 998
ZXR10(config)#vlan qinq extend-session-no 3 customer-port gei_1/1
uplink-port gei_1/2 untag ovlan 999
SVLAN COS
Configuration
Table of Contents
SVLAN COS Overview.........................................................23
Configuring SVLAN COS......................................................23
SVLAN COS Configuration Example ......................................24
SVLAN COS Maintenance and Diagnosis................................24
Note:
Each physical port can only apply one session. The new configura-
tion will replaces the old one. For example, configure the following
two commands on gei_1/1 interface configuration mode:
1. cos-mode cos-map-session 1
2. cos-mode cos-map-session 2
Here only 2 takes effect.
Table of Contents
Introduction to MAC Address ...............................................27
Configuring MAC Address Table............................................29
MAC Address Table Configuration Example ............................34
Switch analyzes the source MAC address and VLANID (for ex-
ample, MAC1+VID1) once it receives a data frame on a port.
If judging the MAC address to be valid and learnable, the switch
checks MAC1+VID1 in its MAC address table. If the entry is not
found, the address is added to the MAC address table, other-
wise the entry is updated.
Note:
i. MAC address learning is to learn the source MAC address
of received data frames, not the destination MAC address.
ii. MAC address learning applies to unicast addresses only, not
to broadcast or multicast addresses.
Command Function
Command Function
Command Function
Command Function
ZXR10(config)# mac limit-num [interface <port-name This limits MAC address count
>]<max-number> on a port.
Command Function
Command Function
Command Function
MAC_Address vid vpn port per stc toS wtd srF dsF
Frm Time
--------------------------------------------------------------
0000.2222.2222 2 0 fei_2/1/2 1 0 0 0 0 0
1 0:00:14:19
0000.1111.1111 2 0 fei_2/1/2 1 0 0 0 0 0
1 0:00:14:28
PC1, PC2 and PC3 work as servers, and their MAC addresses are
bound to the ports of switch B. There are a number of individual
users connecting to the ZXR10 2826E, so MAC address learning
protection (with the MAC address count as 1000 and protect time
as 120s) is need to be enabled on the proper switch B port. In
addition, it is need to set the MAC address aging time to 180s on
switch B.
Configuration of switch B
/*Configure MAC address binding on the port*/
ZXR10_B(config)#mac add permanent 00D0.8765.95CA
interface gei_1/1 vlan 1
ZXR10_B(config)#mac add permanent 00D0.8765.95CB
interface gei_1/3 vlan 2
ZXR10_B(config)#mac add permanent 00D0.8765.95CC
interface gei_1/5 vlan 3
/*Configure MAC address learning protection on the port*/
ZXR10_B(config)#mac limit-num interface gei_1/7 1000
ZXR10_B(config)#mac protect interface gei_1/7 enable
ZXR10_B(config)#mac protect time 120
STP Configuration
Table of Contents
STP Overview ...................................................................37
Configuring STP ................................................................45
BPDU Protection Configuration ............................................48
STP Configuration Examples................................................49
BPDU Protection Configuration Example................................52
STP Maintenance and Diagnosis...........................................54
STP Overview
Spanning Tree Protocol (STP) is applied to a loop network. It blocks
some redundant paths with certain algorithms so that the loop net-
work is pruned into a tree network without any loop, thus avoiding
the infinite loop of packets in the loop network.
STP is implemented by exchanging Bridge Protocol Data Unit
(BPDU) messages among involved switches in an extended LAN.
The following operations can be performed by exchanging BPDU
messages:
1. Selecting a root switch from the stable spanning tree topology.
2. Selecting a designated switch from the network.
3. Setting redundant switch ports to Discarding, to avoid loops in
the topology.
STP module of ZXR10 5900E supports three modes: SSTP, RSTP
and MSTP, which respectively observes IEEE802.1d, IEEE802.1w
and IEEE802.1s standards.
SSTP Mode
Single Spanning Tree Protocol (SSTP) fully observes IEEE802.1d
standards in terms of function. The bridge running SSTP can fully
inter work with those running RSTP and MSTP.
RSTP Mode
Rapid Spanning Tree Protocol (RSTP) provides a faster aggregation
speed than STP (that is, SSTP mode). When the network topology
changes, the state of the redundant switch port can make a fast
shift (Discard > Forword) in the case of point-to-point connection.
MSTP Mode
Two concepts are added to Multiple Spanning Tree Protocol
(MSTP): instance and VLAN mapping. SSTP/RSTP mode can be
regarded as a special case of the MSTP mode. There only exists
one instance, that is, instance 0. The MSTP mode also provides
fast aggregation and load balance under the VLAN environment.
In SSTP and RSTP modes, there is no concept of VLAN. There ex-
ists one port state, that is, forwarding state. The state of a port
in different VLANs is the same. In MSTP mode there can exist
multiple spanning-tree instances. Forwarding states of a port un-
der different VLANs can be different. Many independent sub-tree
instances can be formed inside the MST area to implement load
balance.
The following are the basic concepts of MSTP:
1. MST Config ID
It is a forwarding scheme for frames with different VIDs. That
is in an MST area all the bridges are forwarded to specific span-
ning trees (CIST or an MST instance) according to the VID in
the frame.
MST Config ID is composed of the following parts:
� Configuration name: a character string of 32 bytes.
� Version: non-negative integer of two bytes.
� Configuration summary: signature based on the MST Con-
fig Table and after MD5 processing, with a length of 16
bytes.
MST Config Table is composed of 4,096 continuous dual-types.
The First and last dual-bytes are 0. Other dual-byte represents
a binary number. Second dual-byte stands for the MSTID to
which VID 1 corresponds. Third dual-byte stands for the MSTID
to which VID 2 corresponds and the second last dual-byte rep-
resents the MSTID to which VID 4094 corresponds. Configura-
tion summary is obtained by calculating the MST Config Table
and a fixed KEY value through the HMAC-MD5 algorithm. By
resolution, it can know a certain VID belongs to which MST in-
stance or CIST.
2. MST Area
Each MST area is composed of one or several connected bridges
with the same MST Config ID. These bridges use the same in-
stances. This area also includes the LAN designating the bridge
in the CIST instance.
Note:
Bridges in an MST area mush have same MST config ID. Two
bridges with same MST config ID are probably in different MST
area. For example, if two bridges with the same MST config
ID are connected through the LAN of another MST area, they
should belong to different MST area.
BPDU Protection
BPDU Overview Switches calculating spanning tree according to the content of
BPDU packet. Network topology once changes spanning tree will
be calculated again. If the network is large, the calculation will be
very frequent. This influence switches to transmit packet. At the
same time, the change of Root Bridge also brings some problem.
BPDU protection overcomes these problems.
BPDU Protection If a port is set as an edge port, BPDU protection function will shut
of Edge Port down this port when the edge port receives a BPDU packet. It
outputs alarm information to monitor terminal.
BPDU protection of edge port maintains the stable of network
topology. Device which connects to edge port can not influence
the spanning-tree. It can implement by setting port DOWN and
outputing alarm information at terminal when receiving BPDU
packet at the edge port. The example is shown as Figure 7.
packet and shut down the port which connects to switch D. This
solves the problem of network performance.
Port Loopback Loopback protection provides addtional layer 2 protection function.
Protection One reason for STP loop takes places in a network with redundant
Function link is that one port which in blocking state becomes a designated
port and enters into FORWARDING state. A blocking port when
doesn’t receive a BPDU packet. STP thinks that there isn’t a loop.
Port will transmit from BLOCKING state to FORWARDING state,
this will create a loop.
When port loopback protection is configured and blocking port
don’t receive BPDU packet. Port will transmit into LOOP_INCON-
SISTENT state. This state is blocking state and it doesn’t transmit
any data.
In Figure 11, switch A and switch B are both core switches and
switch A is a root switch. Switch C is a edge switch. Port of switch
C which connects to switch B is blocked. The flow of BPDU is as
direction of arrow.
Configuring STP
Enabling/Disabling STP
Command Function
Note:
Disable STP on ZXR10 5900E, all ports that physical status is up
are set Forwarding status. In default, STP is disabled.
Command Function
Note:
In CST structure, hello-time of every switch is determined by the
root of switch. Max-hops takes effect only when this node serves
as the area root node of an instance in the MST area.
Creating Instances
In MSTP mode, users can turn connected switches into an MST
area by creating or deleting instances. Implementing fast aggre-
gation and load balance of the whole network.
Note:
ZXR10 5900E has on instance 0 only in SSTP/RSTP mode. In MSTP
mode, the instance 0 exists by default and cannot be deleted at
all.
Note:
Four conditions decide whether switches belong to same MST
area: same MST configuration, same MST configuration version
No., same INS-VLAN mapping table, and switch interconnection
or not.
Function Example
Note:
Bridge and port priority of ZXR10 5900E must be configured after
the instance has been created.
Command Function
BPDU Protection
Configuration
Configuring BPDU Protection on
Edge Port
2 ZXR10(config-gei_1/x)#no spanning-tree guard loop This deletes the port that has
instance 1 a loopback protection function
in instance 1.
Switch A Configuration
/*Configure the MST area*/
ZXR10_A(config)#spanning-tree enable
ZXR10_A(config)#spanning-tree mode mstp
ZXR10_A(config)#spanning-tree mst configuration
ZXR10_A(config-mstp)#name zte
ZXR10_A(config-mstp)#revision 2
Switch B Configuration
/* Configure the MST area*/
ZXR10_B(config)#spanning-tree mode mstp
ZXR10_B(config)#spanning-tree mst configuration
ZXR10_B(config-mstp)#name zte
ZXR10_B(config-mstp)#revision 2
Switch C Configuration
/*Configure the MST area*/
ZXR10_C(config)#spanning-tree mode mstp
ZXR10_C(config)#spanning-tree mst configuration
ZXR10_C(config-mstp)#name zte
ZXR10_C(config-mstp)#revision 2
BPDU Protection
Configuration Example
Edge Port BPDU Protection
Configuration Examples
Note:
In the following three cases, loops cannot been avoided even if
STP function of switch is enabled.
1. Two switches but multiple parallel links. One converge port
configurations and the other does not do so.
2. One switch converge configurations of multiple ports but one
port in the aggregation port group is connected to other ports
of the local equipment in self-loop mode.
3. Two switches but two parallel links. Due to unknown reasons,
both of them cannot receive BPDU packets from the opposite
side.
ZESR/ZESR+
Configuration
Table of Contents
ZESR/ZESR+ Overview ......................................................57
Configuring ZESR/ZESR+ ...................................................58
ZESR/ZESR+ Configuration Example ....................................61
ZESR/ZESR+ Overview
ZESRZTE Ethernet Smart Ringis a solution for solving the layer 2
loop problem (RFC 3619). Compared with STP, the biggest advan-
tage is that the link will switch and recover quickly when one way
is disconnected and the shortest time is 50ms.
ZESR is applicable with multi-ring area. Multi-ring is designated
that every level is an independent ring and low-level has two entry
points to connect with high-level ring. The highest level ring is
named as major-level ring and others are named as access rings.
Multi-area is named that there are many protection instances on
the same ring suitable to different service vlan. Their logic routes
are different and independent.
ZESR+ , in double nodes double uplinks networking, improves the
current ZESR to meet redundancy protection for uplink and node
at the same time in double nodes double uplinks networking.
Configuring ZESR/ZESR+
Configuring ZESR Area Protection
Instance
Parameter Description:
Parameter Description
<0-500> Preup value, the unit is second. After Master detects that
loop is up, the status is switched until delaying preup time.
The default value is 0.
< 1-6> Hello value, the unit is second. the time of master/zess-transit
major interface sending hello protocol message, the default is
1s.
After node role and interface are ensured, preforward and preup
can be configured, of which hello, fail and preup only can be used
for master or zess-tranist, preup only can be configured as mas-
ter or zess-master. Interface must be configured in control vlan
before it is configured. Interface can use lacp interface but must
be dynamic lacp and member interface must close stp.
Besides secondery interface of zess-master node decides blocking
location. Therefore the interface must be placed on the uplink
which need to be blocked, but secondery interface of zess-transit
is suggested to be placed on uplink.
Example 1. This example shows how to configure control vlan as 4000, role
as master, interface as gei_2/10 and gei_2/20.
ZXR10(config)# zesr ctrl-vlan 4000 major-level role master
gei_2/10 gei_2/20
2 ZXR10(config)#no zesr ctrl-vlan < 1-4094> level This cancels the configuration
<1-2> seg <1-4> of access ring ZESR.
Parameter description
< 1-4094> Area control vlan, indicating zesr area
<1-2> Level of access ring
<1-4> access ring SN, at most 4 access rings in each level.
<1-600> Preforward value, the unit is second. After the discon-
nected port reconnecting, unless ZESR protocol is set or after wait-
ing for preforward time open automatically and the default is 10s.
<0-500> Preup value, the unit is second. After Master or edge-
control detects that loop is up, the status is switched until delaying
preup time. The default value is 0.
<primary-interface-name> <secondary-interface-name> access
ring two interfaces.
< 1-6> Hello value, the unit is second. The default is 1s.
< 3-18> The maximum time dalay that master or edge-control
hasn't received hello packet. The unit is second. The default value
is 3s.
<edge-interface-name> edge node interface
Switch could be in the entry that major-ring and access ring con-
nect. At that time, it can be in major-ring or access ring . There
are two interfaces in major-ring and one interface in access ring .
Switch is named as entry node. The entry node could be edge-as-
sistant and edge-control in access ring and edge-control plays a
general node master role.
Example 1. This example shows how to configure control vlan as 4000, role
as master, level as 1 , seg as 1, ports as gei_2/10 gei_2/10
ZXR10(config)# zesr ctrl-vlan 4000 level 1 seg 1 role
master gei_2/10 gei_2/20
Command Function
ZESR/ZESR+ Configuration
Example
ZESR Configuration Example
As shown in Figure 18,
ZXR10_S1(config)#interface smartgroup1
ZXR10_S1(config-smartgroup1)#switchport mode trunk
ZXR10_S1 (config-smartgroup1)#smartgroup mode 802.3ad
ZXR10_S1(config-smartgroup1)switchport trunk vlan 100-200
ZXR10_S1(config-smartgroup1)switchport trunk vlan 4000
ZXR10_S1(config-smartgroup1)exit
ZXR10_S1(config)#interface smartgroup2
ZXR10_S1(config-smartgroup2)#switchport mode trunk
ZXR10_S1 (config-smartgroup2)#smartgroup mode 802.3ad
ZXR10_S1(config-smartgroup2)#switchport trunk vlan 100-200
ZXR10_S1(config-smartgroup2)#switchport trunk vlan 4000
ZXR10_S1(config-smartgroup2)#exit
ZXR10_S1(config)#interface gei_1/1
ZXR10_S1(config-gei_1/1)#negotiation auto
ZXR10_S1(config-gei_1/1)#switchport mode trunk
ZXR10_S1(config-gei_1/1)#switchport trunk vlan 100-200
ZXR10_S1(config-gei_1/1)#switchport trunk vlan 4000
ZXR10_S1(config-gei_1/1)#smartgroup 1 mode active
ZXR10_S1(config-gei_1/1)#spanning-tree disable
ZXR10_S1(config-gei_1/1)#exit
ZXR10_S1(config)#interface gei_1/2
ZXR10_S1(config-gei_1/2)#negotiation auto
ZXR10_S1(config-gei_1/2)#switchport mode trunk
ZXR10_S1(config-gei_1/2)#switchport trunk vlan 100-200
ZXR10_S1(config-gei_1/2)#switchport trunk vlan 4000
ZXR10_S1(config-gei_1/2)#smartgroup 1 mode active
ZXR10_S1(config-gei_1/2)#spanning-tree disable
ZXR10_S1(config-gei_1/2)#exit
ZXR10_S1(config)#interface gei_1/3
ZXR10_S1(config-gei_1/3)#negotiation auto
ZXR10_S1(config-gei_1/3)#switchport mode trunk
ZXR10_S1(config-gei_1/3)#switchport trunk vlan 100-200
ZXR10_S1(config-gei_1/3)#switchport trunk vlan 4000
ZXR10_S1(config-gei_1/3)#smartgroup 2 mode active
ZXR10_S1(config-gei_1/3)#spanning-tree disable
ZXR10_S1(config-gei_1/3)#exit
ZXR10_S1(config)#interface gei_1/4
ZXR10_S1(config-gei_1/4)#negotiation auto
ZXR10_S1(config-gei_1/4)#switchport mode trunk
SW2 Configuration
ZXR10_S2(config)#spanning-tree enable
ZXR10_S2(config)#spanning-tree mst configuration
ZXR10(config-mstp)# nstance 1 vlan 100-200
ZXR10(config-mstp)#exit
ZXR10_S2(config)#interface smartgroup1
ZXR10_S2(config-smartgroup1)switchport mode trunk
ZXR10_S2 (config-smartgroup1)#smartgroup mode 802.3ad
ZXR10_S2(config-smartgroup1)switchport trunk vlan 100-200
ZXR10_S2(config-smartgroup1)switchport trunk vlan 4000
ZXR10_S2(config-smartgroup1)exit
ZXR10_S2(config)#interface gei_1/1
ZXR10_S2(config-gei_1/1)switchport mode trunk
ZXR10_S2(config-gei_1/1)switchport trunk vlan 100-200
ZXR10_S2(config-gei_1/1)switchport trunk vlan 4000
ZXR10_S2(config-gei_1/1)exit
ZXR10_S2(config)#interface gei_1/2
ZXR10_S2(config-gei_1/2)switchport mode trunk
ZXR10_S2(config-gei_1/2)switchport trunk vlan 100-200
ZXR10_S2(config-gei_1/2)switchport trunk vlan 4000
ZXR10_S2(config-gei_1/2)exit
ZXR10_S2(config)#interface gei_1/3
ZXR10_S2(config-gei_1/3)negotiation auto
ZXR10_S2(config-gei_1/3)switchport mode trunk
ZXR10_S2(config-gei_1/3)switchport trunk vlan 100-200
ZXR10_S2(config-gei_1/3)switchport trunk vlan 4000
ZXR10_S2(config-gei_1/3)smartgroup 1 mode active
ZXR10_S2(config-gei_1/3)spanning-tree disable
ZXR10_S2(config-gei_1/3)exit
ZXR10_S2(config)#interface gei_1/4
ZXR10_S2(config-gei_1/4)negotiation auto
ZXR10_S2(config-gei_1/4)switchport mode trunk
ZXR10_S2(config-gei_1/4)switchport trunk vlan 100-200
ZXR10_S2(config-gei_1/4)switchport trunk vlan 4000
ZXR10_S2(config-gei_1/4)smartgroup 1 mode active
ZXR10_S2(config-gei_1/4)spanning-tree disable
ZXR10_S2(config-gei_1/4)exit
SW3 Configuration
Interface instance configuration is as SW2
ZXR10_S3(config)#zesr ctrl-vlan 4000 protect-instance 1
ZXR10_S3(config)#zesr ctrl-vlan 4000 major level role master
smartgroup1 gei_1/1
ZXR10_S3(config)#zesr ctrl-vlan 4000 level 1 seg 1 role
edge- assistant gei_1/2
SW4 configuration
Interface instance configuration is as SW2
ZXR10_S4(config)#zesr ctrl-vlan 4000 protect-instance 1
ZXR10_S4(config)#zesr ctrl-vlan 4000 level 1 seg 1 role master
gei_1/1 gei_1/2
Node 2 configuration:
//configure ZESR+ Master node
ZXR10_S2(config)#spanning-tree enable
ZXR10_S2(config)#spanning-tree mst configuration
ZXR10(config-mstp)# instance 1 vlan 100-200
ZXR10(config-mstp)#exit
//connect ZXR10-1
ZXR10_S2(config)#interface gei_2/1
ZXR10_S2(config-gei_2/1)switchport mode trunk
ZXR10_S2(config-gei_2/1)switchport trunk vlan 100-200
ZXR10_S2(config-gei_2/1)switchport trunk vlan 4000
ZXR10_S2(config-gei_2/1)exit
//connect ZXR10-3
ZXR10_S2(config)#interface gei_2/2
ZXR10_S2(config-gei_2/2)negotiation auto
ZXR10_S2(config-gei_2/2)switchport mode trunk
ZXR10_S2(config-gei_2/2)switchport trunk vlan 100-200
ZXR10_S2(config-gei_2/2)switchport trunk vlan 4000
ZXR10_S2(config-gei_2/2)exit
//connect ZXR10-4
ZXR10_S2(config)#interface gei_2/3
ZXR10_S2(config-gei_2/3)negotiation auto
ZXR10_S2(config-gei_2/3)switchport mode trunk
ZXR10_S2(config-gei_2/3)switchport trunk vlan 100-200
ZXR10_S2(config-gei_2/3)switchport trunk vlan 4000
ZXR10_S2(config-gei_2/3)exit
Node 3 configuration:
The configuration such as interface instance of node 3 is the same
as that of node 2.
//Configure ZESR+ Tansit node
ZXR10_S3(config)#zesr ctrl-vlan 4000 protect-instance 1
ZXR10 s3(config)#zesr ctrl-vlan 4000 major-level role zess-transit
gei_3/2 gei_3/1 //configure zess-transit node
/*When configuring zess-transit role, note that Primary interface
decides the direction that node sends hello frame, therefor
Primary interface must be configured the corresponding interface
of link between ZXR10-2 and ZXR10-3, or configuration error will occur.*/
ZXR10 s3(config)#zesr ctrl-vlan 4000 level 1 seg 1 role edge-assistant
gei_3/3 //configure ordinary ZESR border node role
Node 4 configuration:
The configuration such as interface instance of node 4 is the same
as that of node 2.
//Configure ZESR low-level main node
ZXR10_S4(config)#zesr ctrl-vlan 4000 protect-instance 1
ZXR10 s4(config)#zesr ctrl-vlan 4000 level 1 seg 1 role master
gei_4/2 gei_4/1 //configure ordinary ZESR master role
ZESS Configuration
Table of Contents
ZESS Overview .................................................................67
Configuring ZESS ..............................................................68
ZESS Configuration Example ...............................................71
ZESS Maintenance .............................................................74
ZESS Overview
ZESS is ZTE Ethernet Smart Switch technology. It is efficient link
switch mechanism. When fault occurs, main link can switch to
standby link automatically and quickly to ensure service data nor-
mal transmission.
Function description is as follows: As shown in Figure 20, node 1
supports ZESS function, of which port 1 is primary port and port 2
is secondary port. When node 1 detects that both primary port and
secondary port are up, blocks protection service VLAN forwarding
function of secondary port. When node 1 detects that primary port
is DOWN, blocks that of primary port and open that of secondary
port. When node 1 detects that primary port recovers as UP, in in-
version mode, open primary port and block secondary port again,
whereas in non-inversion mode, keep primary port as blocked and
secondary port as open. In addition, when ZESS is switching, FDB
of block port need to be updated.
Configuring ZESS
Creating ZESS Domain
Create ZESS domain protect-instance and configure ports. Each
domain protects one instance. The maximum number of domain
is 4. This is the first step of creating ZESS.
Paramters Description
Parameter Description
< 0-16> ZESS protect instance, same as ZESR and STP, put service
vlan into protect instance.
Parameter Description
Command Function
ZXR10(config)#zess domain < 1-4> preup <1-600> The default preup time is 5
seconds.
Paramters Description
Parameter Description
<1-600> Preup value, the unit is second. After ZESS detects that link
recovers, it doesn't switch state quickly until delaying preup
time. The default value is 5 seconds.
Command Function
Paramters Description
Parameter Description
Parameter Description:
Parameter Description
< 1-4094> Control vlan Id, it is used to send flush packet which is
multicast in this vlan.
Paramters Description
Parameter Description
< 1-4094> control vlan identifier, after configuring, this port will receive
zess flush packet with same control vlan and forward it. It
shall be noted that zess domain used port can't be added into
the same vlan receiving table.
Example 1. Configure port gei_1/4 receive control vlan 2000 flush packet.
ZXR10(config-gei_1/4)# zess receive-vlan 2000
2. Delete port gei_1/4 from the table that control vlan is 2000.
ZXR10(config-gei_1/4)# no zess receive-vlan 2000
Command Function
ZXR10(config)#zess clear receive-vlan {<1-4094>| all} This clears all ports with zess
receive-vlan in designated vlan.
Paramters Description
Parameter Description
Example This example shows how to clear all ports with zess receive-vlan.
ZXR10(config)# zess clear receive-vlan all
ZESS Configuration
Example
The networking figure is as shown in Figure 21.
Node 1-3 comprise ZESS uplink network, node 2-3 connect upper
layer network. By default, the upper layer network is connected
and simplified as that connection node 2 and node 3 connect di-
rectly, node 1 configures ZESS.
Node 1: sg1(gei_1/1,gei_1/2) connect node 2, sg2(gei_1/3,
gei_1/4) connect node 3.
Node 2: gei_1/1 connect node 3, sg1 (gei_1/3, gei_1/4) connect
node 1.
Node 3: gei_1/1 connects node 2, sg2(gei_1/3, gei_1/4) connect
node 1.
Node 1 is configured as ZESS node that domain is 1, protect in-
stance is 1 and control vlan is 4000.
Put node 2-3 port, node 1 port, and the connection port between
2 and 3 into ZESS receive-vlan 4000 table.
Node 1 configuration:
ZXR10_S1(config)#spanning-tree enable
ZXR10_S1(config)#spanning-tree mst configuration
ZXR10(config-mstp)# instance 1 vlan 100-200
ZXR10(config-mstp)#exit
ZXR10_S1(config)#interface smartgroup1
ZXR10_S1(config-smartgroup1)#switchport mode trunk
ZXR10_S1 (config-smartgroup1)#smartgroup mode 802.3ad
ZXR10_S1(config-smartgroup1)switchport trunk vlan 100-200
ZXR10_S1(config-smartgroup1)switchport trunk vlan 4000
ZXR10_S1(config-smartgroup1)exit
ZXR10_S1(config)#interface smartgroup2
ZXR10_S1(config-smartgroup2)#switchport mode trunk
ZXR10_S1 (config-smartgroup2)#smartgroup mode 802.3ad
ZXR10_S1(config-smartgroup2)#switchport trunk vlan 100-200
ZXR10_S1(config-smartgroup2)#switchport trunk vlan 4000
ZXR10_S1(config-smartgroup2)#exit
ZXR10_S1(config)#interface gei_1/1
ZXR10_S1(config-gei_1/1)#negotiation auto
ZXR10_S1(config-gei_1/1)#switchport mode trunk
ZXR10_S1(config-gei_1/1)#switchport trunk vlan 100-200
ZXR10_S1(config-gei_1/1)#switchport trunk vlan 4000
ZXR10_S1(config-gei_1/1)#smartgroup 1 mode active
ZXR10_S1(config-gei_1/1)#spanning-tree disable
ZXR10_S1(config-gei_1/1)#exit
ZXR10_S1(config)#interface gei_1/2
ZXR10_S1(config-gei_1/2)#negotiation auto
ZXR10_S1(config-gei_1/2)#switchport mode trunk
ZXR10_S1(config-gei_1/2)#switchport trunk vlan 100-200
ZXR10_S1(config-gei_1/2)#switchport trunk vlan 4000
ZXR10_S1(config-gei_1/2)#smartgroup 1 mode active
ZXR10_S1(config-gei_1/2)#spanning-tree disable
ZXR10_S1(config-gei_1/2)#exit
ZXR10_S1(config)#interface gei_1/3
ZXR10_S1(config-gei_1/3)#negotiation auto
ZXR10_S1(config-gei_1/3)#switchport mode trunk
ZXR10_S1(config-gei_1/3)#switchport trunk vlan 100-200
ZXR10_S1(config-gei_1/3)#switchport trunk vlan 4000
ZXR10_S1(config-gei_1/3)#smartgroup 2 mode activ
ZXR10_S1(config-gei_1/3)#spanning-tree disable
ZXR10_S1(config-gei_1/3)#exit
ZXR10_S1(config)#interface gei_1/4
ZXR10_S1(config-gei_1/4)#negotiation auto
ZXR10_S1(config-gei_1/4)#switchport mode trunk
ZXR10_S1(config-gei_1/4)#switchport trunk vlan 100-200
ZXR10_S1(config-gei_1/4)#switchport trunk vlan 4000
ZXR10_S1(config-gei_1/4)#smartgroup 2 mode active
ZXR10_S1(config-gei_1/4)#spanning-tree disable
ZXR10_S1(config-gei_1/4)#exit
Node 2 configuration:
ZXR10_S2(config)#spanning-tree enable
ZXR10_S2(config)#spanning-tree mst configuration
ZXR10(config-mstp)# instance 1 vlan 100-200
ZXR10(config-mstp)#exit
ZXR10_S2(config)#interface smartgroup1
ZXR10_S2(config-smartgroup1)switchport mode trunk
ZXR10_S2 (config-smartgroup1)#smartgroup mode 802.3ad
ZXR10_S2(config-smartgroup1)switchport trunk vlan 100-200
ZXR10_S2(config-smartgroup1)switchport trunk vlan 4000
ZXR10_S2(config-smartgroup1)exit
ZXR10_S2(config)#interface gei_1/1
ZXR10_S2(config-gei_1/1)switchport mode trunk
ZXR10_S2(config-gei_1/1)switchport trunk vlan 100-200
ZXR10_S2(config-gei_1/1)switchport trunk vlan 4000
ZXR10_S2(config-gei_1/1)exit
ZXR10_S2(config)#interface gei_1/3
ZXR10_S2(config-gei_1/3)negotiation auto
ZXR10_S2(config-gei_1/3)switchport mode trunk
ZXR10_S2(config-gei_1/3)switchport trunk vlan 100-200
ZXR10_S2(config-gei_1/3)switchport trunk vlan 4000
ZXR10_S2(config-gei_1/3)smartgroup 1 mode active
ZXR10_S2(config-gei_1/3)spanning-tree disable
ZXR10_S2(config-gei_1/3)exit
ZXR10_S2(config)#interface gei_1/4
ZXR10_S2(config-gei_1/4)negotiation auto
ZXR10_S2(config-gei_1/4)switchport mode trunk
ZXR10_S2(config-gei_1/4)switchport trunk vlan 100-200
ZXR10_S2(config-gei_1/4)switchport trunk vlan 4000
ZXR10_S2(config-gei_1/4)smartgroup 1 mode active
ZXR10_S2(config-gei_1/4)spanning-tree disable
ZXR10_S2(config-gei_1/4)exit
ZXR10_S2(config)#interface smartgroup1
ZXR10_S2(config-smartgroup1)#zess receive-vlan 4000
ZXR10_S2(config)#interface gei_1/1
Node 3 configuration:
The configuration such as port instance is as node 2.
ZXR10_S3(config)#interface smartgroup1
ZXR10_S3(config-smartgroup1)#zess receive-vlan 4000
ZXR10_S3(config)#interface gei_1/1
ZXR10_S3(config-gei_1/1)#zess receive-vlan 4000
ZESS Maintenance
To show ZESS configuration, use the following command.
Paramters Description
Parameter Description
Table of Contents
ZESR and SVLAN Linkage Networking Overview.....................75
Configuring ZESR and SVLAN Linkage Networking .................76
Configuration Example .......................................................78
Note:
1. When configuring SVLAN based on ACL, configure downlink
data flow is not redirection.
2. The designated uplink port when configuring SVLAN is totally
equivalent to the ordinary port that has the same VLAN at-
tribute. The packet with double-layer tag will be broadcast in
VLAN that outer tag designates.
Note:
Port is configured as customer port of SVLAN based on ACL. The
learning L2 entry on port is vlan id of inner tag , need to enable
MAC duplication for customer port. CPU duplicates a L2 entry of
outer tag vlan id, downlink packet can get customer port informa-
tion according to outer vlan id L2 entry.
Command Function
Note:
When loopback enable is configured, port learning function will be
closed automatically, whereas port learning function is opened au-
tomatically when loopback disable is configured. Loopback port
as uplink port of SVLAN only receives packet that SVLAN cus-
tomer port redirects after adding tags and loopbacks to uplink port,
which doesn't receive packet forwarded by uplink port. Therefore
it needn't port learning function. If port learning function is not
disabled, port learns L2 entry when loopbacking message, which
causes L2 entry, set by MAC duplication function on customer port,
to be coverd.
Note:
1. Uplink data packet is forwarded by customer port and broad-
cast in SPVLAN after looped by loopback port. To prevent cus-
tomer port from receiving data message looped by loopback
port, generally, configure a one-way PVLAN data whose source
port is loopback port and destination port is customer port.
2. Downlink data packet is forwarded directly to customer port
information by uplink port, needn't be forwarded to loopback
port. To avoid that the data packet that uplink port forwards
to loopback port loops and is forwarded to uplink port again,
must configure a one-way PVLAN data whose source port is
uplink port and destination port is loopback port.
Configuring ZESR
Refer to ZESR configuration chapter.
Configuration Example
1. Configure gei_1/1 as customer port on the switch, the CVID
which receives data packet is VLAN 10, configure gei_1/3/ and
gei_1/4 as uplink port, the SPVID which forwards data packet
is VLAN 100, configure SVLAN based on ACL and configure
Link Aggregation
Configuration
Table of Contents
Link Aggregation Overview .................................................81
Configuring Link Aggregation ..............................................82
Link Aggregation Configuration Example ...............................83
Link Aggregation Maintenance and Diagnosis.........................84
Configuring Link
Aggregation
1. To create a trunk group, use the following command.
2. To add a member port to the trunk group and set the port
aggregation mode, use the following command.
When aggregation mode is set to on, port runs static trunk and
both ends taking part in aggregation should be set to on.
When aggregation mode is set to active or passive, port runs
LACP. Active indicates a port is in active negotiation mode. Pas-
sive indicates a port is in passive negotiation mode. When con-
figuring dynamic link aggregation, set the aggregation mode
of one end to active and that of other to passive or both ends
to active.
Note:
VLAN link type of member port must be consistent with that of
smartgroup. Otherwise, port is not allowed to join trunk group.
3. To set load balance mode for port link aggregation, use the
following command.
Link Aggregation
Configuration Example
Switches A and B are connected through the smartgroup port,
which is converged by four physical ports. The smartgroup op-
erates in trunk mode with VLANs 10 and 20 borne. This is shown
in Figure 22.
Switch A configuration:
/*Create a trunk group*/
ZXR10_A(config)#interface smartgroup1
ZXR10_A(config-smartgroup1)#exit
/* bind ports to Trunk group */
ZXR10_A(config)#interface gei_1/1
ZXR10_A(config-gei_1/1)#smartgroup 1 mode active
ZXR10_A(config-gei_1/1)#exit
ZXR10_A(config)#interface gei_1/2
ZXR10_A(config-gei_1/2)#smartgroup 1 mode active
ZXR10_A(config-gei_1/2)#exit
ZXR10_A(config)#interface gei_1/3
ZXR10_A(config-gei_1/3)#smartgroup 1 mode active
ZXR10_A(config-gei_1/3)#exit
ZXR10_A(config)#interface gei_1/4
ZXR10_A(config-gei_1/4)#smartgroup 1 mode active
ZXR10_A(config-gei_1/4)#exit
/*Modify VLAN link type of smartgroup port*/
ZXR10_A(config)#interface smartgroup1
ZXR10_A(config-smartgroup1)#switchport mode trunk
Switch B configuration
ZXR10_B(config)#interface smartgroup1
ZXR10_A(config-smartgroup1)#smartgroup mode 802.3ad
ZXR10_B(config-smartgroup1)#exit
ZXR10_B(config)#interface gei_1/5
ZXR10_B(config-gei_1/5)#smartgroup 1 mode passive
ZXR10_B(config-gei_1/5)#exit
ZXR10_B(config)#interface gei_1/6
ZXR10_B(config-gei_1/6)#smartgroup 1 mode passive
ZXR10_B(config-gei_1/6)#exit
ZXR10_B(config)#interface gei_1/7
ZXR10_B(config-gei_1/7)#smartgroup 1 mode passive
ZXR10_B(config-gei_1/7)#exit
ZXR10_B(config)#interface gei_1/8
ZXR10_B(config-gei_1/8)#smartgroup 1 mode passive
ZXR10_B(config-gei_1/8)#exit
ZXR10_B(config)#interface smartgroup1
ZXR10_B(config-smartgroup1)#switchport mode trunk
ZXR10_B(config-smartgroup1)#switchport trunk vlan 10
ZXR10_B(config-smartgroup1)#switchport trunk vlan 20
ZXR10_B(config-smartgroup1)#switchport trunk native vlan 10
Link Aggregation
Maintenance and Diagnosis
To facilitate link aggregation maintenance and diagnosis, use the
following command.
When Agg State is selected and Port State is 0x3d, port ag-
gregation succeeds. If the aggregation fails, Agg State is uns-
elected.
2. This example shows how to view the count of the received and
transmitted packets of the member port.
ZXR10(config)#show lacp 2 counter
Smartgroup:2
Actor LACPDUs Marker LACPDUs Marker
Port Tx Rx Tx Rx Err Err
-------------------------------------------------------------------
gei_1/7 11 5 0 0 0 0
gei_1/8 10 6 0 0 0 0
ZXR10(config)#
IGMP Snooping
Configuration
Table of Contents
IGMP Snooping Overview....................................................87
Configuring IGMP Snooping.................................................89
IGMP Snooping Configuration Example .................................92
IGMP Snooping Maintenance and Diagnosis...........................93
Fast Leave
When switch monitors the IGMPv2 leave message of designated
group, it does not send the query message. Instead, the switch
directly deletes the corresponding port in the layer 2 forward entry.
Take care when enabling fast leave function in a VLAN, if one of the
multiple hosts in a port leaves multicast group, other hosts of the
same multicast group in the port cannot receive multicast traffic
of the multicast group.
Configuring ssm-mapping
To configure ssm-mappingtake received igmp v2 client as v3 client
to handle, use the following commands.
Command Function
ZXR10(config)#ip igmp snooping mode proxy vlan <vlan This enables IGMP proxy
id> function.
IGMP Snooping
Configuration Example
Ports gei_1/1, gei_1/3 and gei_1/5 are connected to host. Port
gei_1/7 is connected to multicast router. These ports belong to
VLAN 10. Enable IGMP Snooping on switch. This is shown in Figure
24.
IGMP Snooping
Maintenance and Diagnosis
ZXR10 5900E provides show command to view information re-
lated to IGMP Snooping, to help maintenance and diagnosis.
UDLD Configuration
Table of Contents
UDLD Overview .................................................................95
Configuring UDLD ..............................................................96
UDLD Overview
UDLD is a layer 2 logic link detection protocol. It can detect Eth-
ernet link logic connectivity and verify physical connectivity. Dif-
ferent from physical connection detection, UDLD detects based on
neighbor. The layer 1 device is transparent to UDLD.
UDLD detection builds up neighbor relationship with adjacent layer
2 devices firstly. When the Ethernet port whose status is UP opens
UDLD function, this port sends Hello packet that neighbor has en-
tered to inform other adjacent related devices. The adjacent re-
lated devices port that opens UDLD function receives this Hello
packet and sends an Echo packet back. From the point of view of
this device, that receiving this Echo packet means that the two de-
vices are interconnection and the neighbor relationship with peer
device has established on this device and sends Echo packet back.
After the peer receiving Echo packet, the relationship on the two
devices is established.
After both sides establish the neighbor relationship, send detection
Hello packet at regular time to detect if the detection link works
normally. When receiving the Hello detection packet sent from
neighbor, update local storage neighbor buffer information and re-
set neighbor outtime. If exceed neighbor aging time and still not
receiving Hello detection packet, consider that link is on abnormal
working condition and need different working modes to handle.
UDLD has two working modes: ordinary mode and aggressive
mode. In ordinary mode, only when packets are received and
link is verified to be through in uni-direction, this interface can be
down; in case corresponding packets are not received or link fails
to be verified through in uni-direction, this operation will not be
conducted on the interface; In aggressive mode, as long that link
fails to be verified to be through bidirectionally, the interface will
be down. The common point of the two modes is that in any cir-
cumstance, as long as the link is not verified to work normally ,
print alarm.
Generally speaking, there are several conditions that UDLD sets
interface down.
Configuring UDLD
UDLD Global Configuration
5 ZXR10(config)#udld recovery timer <port-list> This sets the time when the
interface is recoverd as up
automatically for the reason
that UDLD causes interface
down (the default is 30s).
LLDP
Table of Contents
LLDP Overview ..................................................................99
Configuring LLDP ............................................................. 100
LLDP Configuration Example ............................................. 100
LLDP Overview
LLDP Link Layer Discovery Protocol is a new protocol defined in
802.1ab. It makes the adjacent devices send information to each
other to update physical topology information and establish de-
vice management information base. The workflow of LLDP is as
follows:
1. send local device link and management information to adjacent
device;
2. Local device receives adjacent device network management
information;
3. Store adjacent device network management information in lo-
cal device MIB database. Network management software can
query device layer 2 connection status in MIB database.
LLDP is not configuration protocol of remote system or signal con-
trol protocol between ports. LLDP can discover the adjacent de-
vices layer 2 configuration is not same, but it doesn't provide
mechanism to solve the problem, it only reports this problem to
upper layer management device.
In a word, LLDP is a kind of neighbor finding protocol. It defines a
standard for the network devices in the Ethernet such as switch,
router and wireless lan access point. It can announce its existence
to other nodes in the network and save discovery information of
every neighbor device. For example, device configuration, device
ID and other information can be announced by this protocol
LLDP defines a common announcement information set, a trans-
mission announcement protocol and a kind of way to save the
receiving announcement information. The device that need to an-
nounce its information can put multiple pieces of announcement
information into one LLDPDU Link Layer Discovery Protocol Data
Unit to transmit. This LLDPDU contains a sting of variable length
short message units, which is called Type Length Value(TLV). The
description is as follows:
� Type means the information type that need to send;
� Length means information byte number;
Configuring LLDP
LLDP configuration includes global configuration and interface con-
figuration. Only finishes these two parts of configuration, can this
protocol take effect.
LLDP Configuration
Example
Connect the two devices to implement LLDP protocol discovery, as
shown in Figure 25.
Configuration of S1:
Zxr10#conf t
Zxr10(config)#lldp enable
Zxr10(config)#lldp enable interface gei_1/1
Configuration of S2:
Zxr10#conf t
Zxr10(config)#lldp enable
Zxr10(config)#lldp enable interface gei_1/1
L2PT Configuration
Table of Contents
L2PT Overview ................................................................ 103
Command Configuration ................................................... 103
L2PT Configuration Example.............................................. 104
L2PT Overview
In the VPN mode of QinQ, if the VPN users in different locations
want to run their layer 2 protocol, core network need to transpar-
ently transmit these layer 2 protocol packets. These packets can't
be transparently transmitted, L2PT is used to transparently trans-
mit client network layer 2 protocol packet in QinQ VPN network
environment.
The fullname of L2PT is layer 2 protocol tunnel, which is a layer
2 protocol tunnel technology. The principle is that the receiving
layer 2 protocol packet is encapsulated by a multicast address on
tunnled port of edge switch, and then the encapsulated packet is
broadcast in vlan, these packets are de-encapsulated on the port
of remote switch that enables tunneled. In the end, transparent
transmission is implemented. Layer 2 protocol packet (STP), on
the port that doesn't enable L2PT, will not be transmitted in the
provider network, which will cause that the client network forms
several unconnected stp domain based on area border and the
client VPN network can't run a uniform STP topology. L2PT can
help user to meet the requirement by transparently transmitting
STP BPDU packet in VPN.
Command Configuration
To enable port or close L2PT tunnel, use the following command.
Command Function
2 protocol mode that need tunneled, which only supports stp pro-
tocol. The default is disabled.
Note:
QinQ or SVLAN need to be configured on tunnel access port to
take an effect on port tunneled configuration function, which im-
plements L2PT packet transparent transmission function.
Switch A and switch B are edge switches, which are at the edge
of provider network. They are used to connect network device
of user. Tunnel is configured on a port of edge switch to imple-
ment packet encapsulation or de-encapsulation. Switch 1, switch
2, switch 3, switch 4 and switch 5 are client network switches,
which belong to the same VPN.
The client network device that switch A connects transparently
transmits STP protocol packet to the client network device that
switch B connects through provider network devices, which fin-
ishes one-way transparent transmission. The configuration is as
follows;
1. On tunnel access edge switch A, the port that connects the
client network device is configured L2PT tunnel, QinQ customer
port and enabled STP protocol; The port that connects provider
network is configured trunk port.
Zxr10#conf t
Zxr10(config)#vlan 10
Zxr10(config-vlan10)#exit
Zxr10(config)#inter gei_1/1
Zxr10(config-gei_1/1)#l2protocol-tunneled stp enable
Zxr10(config-gei_1/1)#switchport qinq customer
Zxr10(config-gei_1/1)#switchport access vlan 10
Zxr10(config-gei_1/1)#exit
Zxr10(config)#interface gei_1/2
Zxr10(config-gei_1/2)#switchport mode trunk
Zxr10(config-gei_1/2)#switchport trunk vlan 10
Zxr10(config-gei_1/2)#exit
Zxr10(config)#spanning-tree enable
Ethernet OAM
Configuration
Table of Contents
802.3ah Overview ........................................................... 107
Configuring 802.3ah ........................................................ 109
CFM Configuration ........................................................... 112
802.3ah Overview
IEEE 802.3ah is management of "link" level. It monitors and fault
process Point to Point ethernet link. Sometimes "Detection of the
last mile" means that. Link layer OAM is mainly used in Point to
Point direct-connect link detection.
Overview
Figure 27 views the location of OAM in ISO/IEC OSI reference mod-
ule. LLC( logical link control ) or other MAC client layer are above
OAM, MAC layer or optional MAC control sub-layer are below OAM.
OAM layer is optional. OAM function mainly includes the following
three functions:
� Remote discovery
� Remote loopback
� Link monitor
DTE joining OAM sub-layer supports active/passive mode. When
enabling OAM, DTE that supports the two modes should select ac-
tive or passive.
Remote Discovery
OAM provides mechanism for detecting if remote DTE has OAM
sub-layer, if find it isn't satisfied, OAM client will know the result
and generate fail alarm. There are two cases for fail. One is that
peer end doesn't open OAM function, another is link connection
fault. During the remote discovery process, the information OAM-
PDU tag domain carries current link event (link fault, emergency
failure and emergency event). But the specific fault definition ,
composed of link fault, emergency failure and emergency event,
relates to implementation. So there are two ways to know link has
fault by remote discovery. One is knew by OAMPDU timeout, an-
other is to define some detailed emergency link events to let client
layer know which fault occurs on link from information OAMPDU.
The DTE which is configured active mode lauches discovery
process. When discovery process finishes, remote OAM peer en-
tity is in active mode, active DTE is allowed to send any OAMPDU,
DTE configured passive mode doesn't launch discovery process,
passive DTE feedbacks remote DTE launching discovery process.
Remote Loopback
OAM provides optional data link layer frame loopback mode. It is
controlled by the remote. OAM remote loopback is used for fault
location and link performance test. When remote DTE is in OAM
remote loop mode, local and remote DTE statistics can be querid
and compared at any time. Query can happen before , during
and after the process that loop is sent to remote DTE. In addition,
analyze OAM sub-layer loop frame to ensure additional information
about link health ( namely ensure frame dropping for link fault).
If an OAM client has sent a Loopback Control OAMPDU and is wait-
ing for the peer DTE to respond with an Information OAMPDU that
indicates it is in OAM remote loopback mode, and that OAM client
receives an OAM remote loopback command from the peer device,
the following procedures are recommended: a)If the local DTE has
a higher source_address than the peer, it should enter OAM remote
loopback mode at the command of its peer. If the local DTE has
a lower source_address than the peer, it should ignore the OAM
remote loopback command from its peer and continue as if it were
never received.
Link Monitor
Link monitor function is to do statistics for fault symbols or fault
frames that physical layer receives during fixed time. The driver
has a counter which is always doing the statistics of fault frame,
fault symbol, and total receiving frame number. The platform
reads these information at specific time, then judge and process
according to fault symbol number, fault frame number and total
frame number, detect what kind of event happens and generate
the corresponding event to inform OAMPDU.
There are four types of link event:
1. Link fault symbol period event, count the fault symbol gener-
ated in specific time. Period is defined by symbols number that
physical layer receives in some time.
2. Fault frame event, count the fault frame generated in specific
time.
3. Fault frame period event, count the fault frame generated in
specific time. The period is defined by receiving frame number.
4. Fault frame second accumulated event, count the fault frame
second generated in specific time. Period is defined by time
interval.
Configuring 802.3ah
Function Configuration
Instance Configuration
As shown in Figure 28, run ethernet-oam on R1 and R2. R1 port
is gei_1/1, R2 port is gei_1/2.
Configuration of R2:
ZXR10(config)#set ethernet-oam enable
ZXR10(config)#interface gei_1/2
ZXR10(config-gei_1/2)#set ethernet-oam enable
ZXR10(config-gei_1/2)#set ethernet-oam period 10 timeout 3 mode active
Remote DTE
-----------
Config:
Mode : passive
Link Monitor : support
Unidirection : nonsupport
Remote Loopback : support
Mib Retrieval : nonsupport
PDU max size : 1518
Status:
Parser : forward
Multiplexer : forward
Stable : yes
Mac Address : 00.19.c6.00.2b.fc
PDU Revision : 1
CFM Configuration
CFM Overview
Connectivity Fault Management (CFM) is useful to Virtual Bridged
Local Area Networks for detecting, isolating, and reporting connec-
tivity faults. It is aimed primarily at Provider Bridged Networks,
but is useful also for C-VLAN networks.
CFM that current switch mainly supports implementation based on
IEEE 802.1ag.
The manager of network plans the network service and divides the
whole network into multiple MDs for management and diagnosis,
single domain is as shown in Figure 29.
The domain in the figure defines a series of ports on edge de-
vice and internal device. The gray point on the edge device is
service port that connects the devices out of domain, which is
defined maintenance edge point (MEP). The black port (includes
those devices on the domain intermediate device) is the port that
connects devices in the domain, which is defined as maintenance
intermediate pointMIP. Implement domain management function
by defining MEP and MEP.
Route discovery: MEP use LTM/LTR to track the route from one
MEP to another MEP or between MIPs.
Fault detection: MEP use periodically sending and receiving CCM
information to detect network connection. It mainly detects con-
nection fault and unwanted connection (fault connection status).
Fault affirmation and isolation: This function belongs to manage-
ment act, manager affirms fault bill by LBM/LBR, then does the
isolation operation.
Fault notification: When MEP has connection fault, the relevant re-
port information will be sent to the designated management sys-
tem such as NMSTRAP and so on.
Network status detection: estimate network connection status or
network delay jitter status through detecting the packet with time
stamp between MEPs or packet transceiver with counter value.
MP, includes MEP and MIP, is the smallest entity of management
layer realizable function. By comparison, realizable function of
MEP is more complicated than that of MIP and management con-
figuration is more complex. In some extent, CFM function is mainly
implemented by MEP. MEP can send, receive and handle any one
of above information. But MIP only can handle LTM and LBM infor-
mation and send LTR and LBR information.
Configuring CFM
26 ZXR10(config-md-ma)#mep < 1-8191> client-level < This sets level value of client
0-7> MEP and alarm function use.
Command Function
LB can be used only when MD, MA, MP and RMEP establish suc-
cessfully and global enabled is opened. When using LB func-
tion, destination MP parameter can use established RMEP ID ,
RMEP MAC address or middle MIP MAC address.
LB function supports SG interface.
2. To enable LT function, use the following command.
LTM (Linktrace Message) : It is originated by MEP. It is used to
track the route from MIP to MIP until LTM arrived its destination
or MEP can’t be forwarded. It is used in fault isolation and route
discovery. LTM , multicast packet, whose destination address
is selected according to MD level of sending MEP , is forwarded
to appropriate MD level MP by bridge network. LTM packet
passing middle and MIP of MD and MA all send a LTR to source
MEP to ensure the packet arrives here. Destination MP could
be MIP.
Command Function
Command Function
ZXR10#cfm ltr-read trans-id <1-4294967295> This reads one time LTR route
information. If read one time
arriving a certain MP route,
this route must be discovered
successfully.
Command Function
Command Function
Command Function
Command Function
ZXR10#show ma {all |( session <1-32>)} md <1-16> This shows all MAs in one MD or
a certain MA once.
Command Function
1 ZXR10#debug cfm pkt {all | (megid md <1-16> This opens Debug function.
ma <1-32> mep <1-8191>) }[{[direction {send In management mode, print
|rcv|alll}],[pkt-nums <10-100>],[time-interval all receiving and sending
<4-10000>]}] packets of all mep related
ports or only print one or
several receiving, sending or
receiving/sending packets in
one mep selectively (default
is 10), but the time interval
of printing packet can be
4-10000ms.
Instance Configuration
The three switches use LT function.
The network figure is shown as Figure 31:
00d0.d052.1200
Sflow Configuration
Table of Contents
Overview........................................................................ 123
Configuring sFlow ............................................................ 125
SFlow Configuration Example ............................................ 125
SFlow Maintenance and Diagnosis...................................... 126
Overview
With the rapid development of network service in business envi-
ronment application, network scale becomes larger and larger, the
number of network devices increases repeatedly, and network flow
becomes more complicated, therefore the cost of network mainte-
nance keeps on increasing. How to manage the network devices
effectively and how to monitor and analyze real network traffic on
real-time have become one of the problem which device carrier pay
more attention to. At present, each equipment manufacturer pro-
vides various network flow monitor technology, but most of these
flow monitor technology are private or need specific hardware sup-
port technology. SFLOW is a standard flow monitor technology set
by IETF currently. It has low requirements on hardware , low re-
source consumption on device and good technology commonality.
Therefore it is applied by many equipment manufacturers.
SFLOW function is composed of three parts: sFlow packet sam-
pling unit, sFlow agent unit, sFlow collector(analyzer). SFlow
packet sampling unit and sFlow agent unit are generally integrated
into network device, but sFLOW collection is outside of system,
which analyzes multiple sFlow agent packets in the network.
SFlow sampling unit is the base of sFlow technology. Sampling
procedure is that sample the packet of network on the interface
which supports sFlow and send the sampling packet to sFlow agent
device to handle. SFlow Collector is the network device that sFlow
manage, monitor, collect and analyze. It is responsible for storing
packet sended from each sFlow Agent on the network and then
analyzing to give device traffic and various analysis report of ser-
vice.
SFlow Collector
SFlow Collector is the network device that sFlow manage, monitor,
collect and analyze. It is responsible for storing packet sended
from each sFlow Agent on the network and then analyzing to give
device traffic and various analysis report of service. Meanwhile,
some collector software that have MIB function can configure sFlow
agent.
Configuring sFlow
1. To enable/disable sflow module, use the following command.
Command Function
Command Function
SFlow Configuration
Example
The networking figure is as shown in Figure 32.
sflow enable
sflowagent ip-addr: 10.40.1.1
sflwcollector ip-addr: 10.40.1.2
IPFIX Configuration
Table of Contents
IPFIX Overview ............................................................... 129
Configuring IPFIX ............................................................ 131
IPFIX Configuration Example ............................................. 133
IPFIX Maintenance and Diagnosis ...................................... 134
IPFIX Overview
IPFIX Overview
IPFIX (IP Flow Information Export) is used to analyze and perform
statistics to communication traffic and flow direction in network. In
2003, IETF select Netflow V9 as IPFIX standard from 5 candidate
schemes.
To analyze and perform statistics to data flow in network, it is
needed to distinguish types of packets transmitted in network.
Due to non-connection oriented characteristics of IP network, the
communication of different types of services in network can be a
series of IP packets sent from one terminal device to another ter-
minal device. This series of packets actually forms one data flow
of a service in carrier network. If management system can distin-
guish all flows in the entire network and correctly record transmit
time of each flow, occupied network port, transmit source/desti-
nation address and size of data flows, traffic and flow direction of
all communications in the entire carrier network can be analyzed
and performed with statistics.
By telling differences among different flows in network, it is avail-
able to judge if two IP packets belong to the same one flow. This
can be realized by analyzing 7 attributes of IP packet: source IP
address, destination IP address, source port id, destination id, L3
protocol type, TOS byte (DSCP), ifIndex for network device input
(or output).
With above 7 attributes of IP packet, flows of different service
types transmitted in network can be rapidly distinguished. Each
distinguished data flow can be traced separately and counted accu-
rately, its flow direction characteristics such as transmit direction
and destination can be recorded, and the start time, end time, ser-
vice type, contained packet number, byte number and other traffic
information can be performed statistics.
As a macro analysis tool for network communication, Netflow tech-
nology doesn't analyze the specific data contained in each packet
in network, instead it tests characteristics of transmitted data flow,
which enables Netflow technology with good scalability: support-
ing high-speed network port and large-scale telecom network.
As for processing mechanism, IPFIX introduces multi-level pro-
cessing procedures:
� In preprocessing stage, IPFIX can filter data flow of a specific
level or perform sampling to packets on high-speed network
interface based on demands of network management. With
IPFIX, processing load of network device can be relieved and
scalability of system can be enhanced while the needed man-
agement information is collected and performed statistics.
� In postprocessing stage, IPFIX can select to output all collected
original statistics of data flow to upper-layer server for data
sorting and summary; alternatively, network device can per-
form data aggregation to original statistics in various modes
and send the summary statistics result to upper layer man-
agement server. The latter one can reduce the data quantity
output by network device, thus decreasing requirement to con-
figuration of upper layer management server and promoting
scalability and working efficiency of upper layer management
system.
IPFIX outputs data in format of template. Network device will send
packet template and data flow records respectively to upper layer
management server when outputting data in IPFIX format. Packet
template specifies format and length of packet in subsequently
sent data flow record for management server processing subse-
quent packets. Meanwhile to avoid packet loss and errors in packet
transmission, network device repeats sending packet template to
upper layer management server regularly.
Sampling
IPFIX supports packet number-based sampling as well as time-
based sampling. Sampling rate can be configured on each inter-
face separately.
Timeout Management
As for collected flow data,
� In case data are not updated within the inactive time, data will
be output to NM server;
� As for long time active flow, the data will also be output to NM
server after active time.
Data Output
After collecting data flows in network, network device always out-
puts them to NM server. IPFIX supports to output data to multiple
NM servers. Generally, data are output to two servers: master
server and slave server.
IPFIX adopts template-based data output mode. IFPIX supports to
send template every a few packets or at a certain interval. Packet
template specifies the format and length of packets in subsequent
data flows, and server resolves subsequent data flows according
to template.
Configuring IPFIX
Basic Configuration
ZXR10(config)#ip stream cache entries <number> This sets the number of data
flow entries stored in IPFIX
module, 4096 by default.
ZXR10(config)#ip stream cache timeout active<number> This sets aging time of active
stream.
As for long time active stream, in case it exceeds the set aging
time, this data flow will age out, in minutes, 30 minutes by default.
ZXR10(config)#ip stream cache timeout inactive<numb This sets aging time of inactive
er> stream.
If data of a flow are not updated within the specified time, the
aging information will be notified to stream record, in seconds, 15
seconds by default.
ZXR10(config)#ip stream export destination This sets the address and port id
<ip-address> udp-port of NM server, to which packets
are sent.
ZXR10(config)#ip stream export source <ip-address> This sets source address for
network device sending packets.
Configuring TOPN
Command Functions
ZXR10(config)#ip stream topn N sort-by {bytes|packets} This sets size and sorting
behavior of TOPN (by packet
number or byte number).
Template Configuration
Setting Template
Command Functions
Deleting Template
Command Functions
Running Template
Command Functions
IPFIX Configuration
Example
An IPFIX configuration example is given here with network topol-
ogy as shown in Figure 33.
BPDU
- Bridge Protocol Data Unit
CIST
- Common and Internal Spanning Tree
CST
- Common Spanning Tree
HMAC-MD5
- Hashed Message Authentication Code with MD5
IGMP
- Internet Group Management Protocol
ISP
- Internet Service Provider
IST
- Internal Spanning Tree
LACP
- Link Aggregation Control Protocol
MAC
- Medium Access Control
MD5
- Message Digest 5 Algorithm
MSTP
- Multiple Spanning Tree Protocol
OAM
- Operation, Administration and Maintenance
PE
- Provider Edge
PVLAN
- Private Virtual Local Area Network
RSTP
- Rapid Spanning Tree Protocol
STP
- Spanning Tree Protocol
UDLD
- UniDirectional Link Detection
VID
- VLAN Identifier
VLAN
- Virtual Local Area Network
ZESR
- ZTE Ethernet Switch Ring
ZESS
- ZTE Ethernet Smart Switch