Maipu S3400 Web Configuration
Maipu S3400 Web Configuration
No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any
language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual
or otherwise without the prior written consent of Maipu Communication Technology Co., Ltd.
Maipu makes no representations or warranties with respect to this document contents and specifically disclaims any implied
warranties of merchantability or fitness for any specific purpose. Further, Maipu reserves the right to revise this document
and to make changes from time to time in its content without being obligated to notify any person of such revisions or
changes.
Maipu values and appreciates comments you may have concerning our products or this document. Please address comments
to:
All other products or services mentioned herein may be registered trademarks, trademarks, or service marks of their
respective manufacturers, companies, or organizations.
Accessibility:
(Contents, index, headings, numbering)
Good
Fair
Average
Poor
Editorial:
(Language, vocabulary, readability, clarity, technical accuracy, content)
Good
Fair
Average
Poor
Your Please check suggestions to improve this document:
suggestions
Improve introduction
Make more concise
to improve
Improve Contents
Add more step-by-step
the
procedures/tutorials
document
Improve arrangement
Add more technical information
Include images
Make it less technical
Add more detail
Improve index
Contents
Product Information................................................................................................9
Features .................................................................................................................................9
System Version Information ..................................................................................................11
VLAN Configuration............................................................................................... 45
Port Mode .............................................................................................................................45
Basic Configuration................................................................................................................46
MAC-VLAN Configuration .......................................................................................................48
IP Subnet VLAN Configuration................................................................................................49
Protocol VLAN Configuration ..................................................................................................50
Q-in-Q (Vlan dot1q tunnel) Configuration ...............................................................................52
L2 Protocol Control Configuration ...........................................................................................54
ACL Configuration................................................................................................. 56
Configure IP Standard Access List ..........................................................................................57
OAM Configuration................................................................................................ 95
CFM Configuration.................................................................................................................95
Port Configuration .................................................................................................................99
OAM Basic Configurations ....................................................................................................100
OAM Status Display.............................................................................................................108
OAM Remote Loopback Test ................................................................................................110
ELMI Configuration ..............................................................................................................112
EVC-UNI Configuration ........................................................................................................114
EVC ....................................................................................................................................116
Web Configuration
Convention
Preparations
This section describes the preparations for the WEB configuration of Maipu
switch.
Note
The browser that supports the web configuration described in the chapter
is Internet Explorer7.0 or above.
Login
The web management system of the device supports two kinds of users,
including administrator and common users. Maipu switch described in the
manual does not have default user name or password, so you need to
telnet to the device and configure login user in shell so that the web
management system can be used normally. The following are the shell
commands for configuring users.
Configure administrator:
Product Information
The section describes the features and version information of Maipu switch.
Features
Maipu switch provides carrier-class Ethernet access switches for carriers’
customers. It supports next generation L2 and L3 features and meets the
requirements of customers for QoS, OAM, VPN, Multi-service and
Protection. It can help customers develop IPTV, VoIP, VPN, wireless access
and TDMoIP services. The high integrated platform design meets the
requirement of the customer that a box provides rich physical interface
and software features to reduce the total cost (TCO) and operating
expenses (OpEx).
It is the first in the world to adopt dual power supply, high integrated
E1/T1 interface, standard PoE, and optical-electric Ethernet access on the
access device. The operators adopt it to be deployed in 2G/3G base station
for developing multi-service access (wireless, VPN, and mobile) and
completing the reconstruction from TDM to IP.
Note
Note
, as follows:
Note
Note
Description: The port description information for easy memory. You can
configure the description information for one port. For example, one port
is distributed to Company A and you can configure the description
information as “company A”. The description information comprises up to
240 characters and there can be blanks between the characters. By
default, the port does not have description information;
Status: Port status. When the value is enabled, it indicates that the port
is enabled; when the value is disabled, it indicates that the port is disabled
and cannot enter into the normal working state. The default value is
enabled.
Link: The physical status of the port. By default, after the port is
connected, the light is on and the link status is UP; when the port is not
connected, the link status is down.
Set speed: The management speed of the port, including “10”, “100”,
“1000”, “10000”,and “auto”. Unit is M. “auto” means “auto-negotiation”;
Act speed: The actual speed of the port, including “10”, “100”, “1000”,
“10000”, and “auto”. Unit is M. “auto” means “auto-negotiation”;
Set duplex: The management duplex status of the port, including “auto”,
“full”, and “half”. “auto” means “auto-negotiation”; “full” means “full-
duplex”; “half” means “half-duplex”;
Act duplex: The actual duplex status of the port, including “auto”, “full”,
and “half”. “auto” means “auto-negotiation”; “full” means “full-duplex”;
“half” means “half-duplex”;
Set flow control: The management flow control of the port. “on” means
to enable the port flow control; “off” means to disable the port flow control;
Act flow control: The actual flow control of the port. “on” means to
enable the port flow control; “off” means to disable the port flow control.
Mdix: The signal sending mode of the port. “normal” means that lines 1
and 2 are used for sending and line 3 and 6 are used for receiving; “cross”
means that lines 1 and 2 are used for receiving and lines 3 and 6 are used
for sending; “auto” means to select normal or cross automatically.
Mtu: The MTU of the port. MTU is checked when inputting and outputting
packets. The MTU is not checked when being output. If the length of the
frame received by the port exceeds the set MTU, the frame is discarded.
The unit is byte. It is required the configured value must be multiples of
four bytes. Otherwise, it is cut down to the multiples of four. For example,
the configured value is 1501 bytes, the system adjusts it to be 1500 bytes.
The default value is 1824.
Link delay: The status delay time of the port. The default value is 0.
Pvid: The ID of the VLAN to which the port belongs. The default value is 1.
Edit: Click the icon of one port and you can configure the port.
Tick the check box before the port number, click batch edit and you can
edit the ports in batches.
Port: The numbers of all ports in the switch, including the aggregation
port number;
Port type: The UNI/NNI attribute of the port. Each physical port of the
switch has UNI/NNI attribute. By default, all 10M/100M ports are set as
UNI ports and other ports are set as NNI ports. You can also modify the
UNI/NNI attribute of each port via configuration.
Edit: Click the icon of one port and you can configure the port. Click
recover to recover the port to the factory status.
Tick the check box before the port number, click batch edit and you can
edit the ports in batches.
Edit: Click the icon of one port and you can configure the port.
Tick the check box before the port number, click batch edit and you can
edit the ports in batches.
Mode: The aggregation mode of the link aggregation. “manual” means the
manual aggregation mode; “lacp” means the protocol aggregation mode.
Edit: Click the icon of one aggregation group and you can configure
the aggregation group. Click the icon of one aggregation group and you
can delete the aggregation group.
Add: Click Add and you can create one new link aggregation group;
Note
Note
Note
Note
Note
batch delete: Click batch delete and you can delete the aggregation
groups in batches.
Note
To delete the link aggregations in batches, you should first tick the check
boxes before the aggregation groups. When the prompt box appears, click
Yes to delete the selected records or click Cancel and the selected
records are not deleted.
Port: The number of the port configured with port monitoring in the
switch;
Host Limit: The maximum number of the hosts that are monitored;
Add: Click Add and you can perform the adding operation;
Note
Tick the check boxes in the port list and you can add port monitoring in
batches. For example, after selecting ports 0/0, 0/1, and 0/2, click set and
then the ports 0/0, 0/1, and 0/2 are configured with port monitoring.
When adding new port monitoring, the details of monitor protocol ether,
monitor protocol ip and monitor protocol tcp/udp are unavailable.
Edit: Click the icon of one port and you can configure the port. Click
the icon of one port and you can delete the port.
Batch edit: Click batch edit and you can edit the ports in batches.
As shown in the above figure, the selected ports are displayed in the
selected form in the lower port list.
Note
After clicking the edit icon, you can set the parameters of the port
monitoring. The host monitoring can be enabled only after the port
monitoring is enabled and you should select Monitor by source IP or
Monitor by source MAC. You can view the details by clicking the detail
button of monitor protocol ether, monitor protocol ip and monitor
protocol tcp/udp.
After clicking the delete all button of monitor protocol ether, monitor
protocol ip and monitor protocol tcp/udp, a confirming box appears
and click Yes to delete all information or click Cancel. Click and you can
delete the single monitoring information.
Batch delete: Click batch delete and you can delete the port monitoring
in batches.
Port: the number of the port on which the port monitoring is enabled;
Drop Amount: The total number of the packets dropped by the port;
Port Host Information: the numbers of all physical ports in the switch.
You can select administration packets, broadcast packets, forwarding
packets, multicast packets, other packets or all packets from the drop-
down list. After selecting one, click Search and the details about the
select packet type are displayed as follows.
Drop Amount: The total number of the packets dropped by the host;
Backlist Information: Display the backlist to view the hosts that initiate
the attack; If based on IP, the host address is IP address; if based on MAC,
the host address is the MAC address;
Max User Number: the maximum number of users of the port. The
default value is 256;
EAP relay: the EAP mode of the port, including EAP relay or EAP
termination. “enable” means to enable the EAP relay mode; “disable”
means to disable the EAP relay mode (enable the EAP termination mode).
The default value is disable;
Timeout Quiet Period: the punishment time of the port (second). When
the successive failed authentication times of one reaches the upper
threshold, the user cannot perform authentication during the punishment
time. The default value is 60.
Add: Click add and you can perform the adding operation.
Note
Note
Note
You can select multiple check boxes in the port list to perform batch
operation.
Edit: Click of one port and you can edit the port. Click recover to
recover the port to the factory status.
Note
Note
Note
For the port-based authentication mode, the maximum user number of the
port does not take effect; for the user-based authentication mode, the
configuration of guest vlan does not take effect.
Port: The number of the port configured with IP Source Guard (including
aggregation port number);
Add: Click add and you can perform the adding operation. The filter mode
can be selected only when ISG is enabled.
Edit: Click of one port and you can edit the port.
Port: The number of the port configured with the port security (including
the aggregation port number);
Port MAX Rule: the MAX rule of the port. The default value is 0;
Violation Mode: Used to decide the processing for receiving the error
packets;
Aging Time of MAC Address: the address aging time of the port (min);
the default value is 1;
Edit: Click the icon of one port and you can edit the port. Click the
icon of one port and you can delete the port.
Add: Click add and you can perform the adding operation.
Note
You can tick multiple check boxes in the port list to perform the batch
operation.
Click the icon of one port and you can edit the port.
Click the icon of one port and you can delete the port.
You can tick the check boxes before the port numbers in the port list to
perform the batch operation.
Delete Specified MAC of Port: Tick the check boxes in the port list and
you can delete the specified MAC addresses of ports in batches;
Note
When type of mac address is all, it means to delete all MAC addresses;
when type of mac address is configured, it means to delete all MAC
address except for MAX rules; when type of mac address is learned, it
means to delete the MAC addresses learned by MAX rules.
IP Binding Configuration
This section describes the configuration information about the IP binding.
Port: The number of the port configured with IP binding (including the
aggregation port)
IpAddress: IP address
Note
One port can be bound for several times, so the interface adopts the
paging function for users to view. The interface can be paged as desired
by adjusting the text box before change page size. For example, the
interface has three pieces of information. If the user inputs one and then
clicks change page size, the interface is displayed by three pages. If the
user does not input, but clicks change page size directly, the interface is
paged by the default 20, as follows.
Add: Click add and you can perform the adding operation.
Batch delete: Tick the check boxes in the port list, click batch delete
and you can perform the batch operation.
delete by port: click delete by port and you can delete all binding
information on the port.
IP Rule Configuration
This section describes the configuration information about the IP rule.
Port: the number of the port configured with IP rule (including the
aggregation port);
Action: the executed action of the rule. “permit” means that the executed
action of the rule is permit; “deny” means that the executed action of the
rule is deny.
endIp: The end IP address of the rule application; if the parameter is not
specified, it is equivalent to add one single IP;
Note
One port can be bound for several times, so the interface adopts the
paging function for users to view. The interface can be paged as desired
by adjusting the text box before change page size. For example, the
interface has three pieces of information. If the user inputs one and then
clicks change page size, the interface is displayed by three pages. If the
user does not input, but clicks change page size directly, the interface is
paged by the default 20, as follows.
Add: Click add and you can perform the adding operation.
Note
Tick the check boxes in the port list and you can perform the batch
operation. End IP must be larger than Start IP. If End IP is not input, it is
equivalent to add one single IP.
Batch delete: Tick the check boxes in the port list, click batch delete
and you can perform the batch operation.
Port: the number of the port configured with MAC rule (including the
aggregation port);
Action: the executed action of the rule. “permit” means that the executed
action of the rule is permit; “deny” means that the executed action of the
rule is deny.
Note
One port can be bound for several times, so the interface adopts the
paging function for users to view. The interface can be paged as desired
by adjusting the text box before change page size. For example, the
interface has three pieces of information. If the user inputs one and then
clicks change page size, the interface is displayed by three pages. If the
user does not input, but clicks change page size directly, the interface is
paged by the default 20, as follows.
Add: Click add and you can perform the adding operation.
Note
Tick the check boxes in the port list and you can perform the batch
operation.
Batch delete: Tick the check boxes in the port list, click batch delete
and you can perform the batch operation.
Note
Note
Host-inactive-times: the host aging time of the port monitoring (the unit
is the sampling period). The default value is 5s.
dynamic MAC address; no ticking the check box means to disable the
aging function;
SNMP switch: Ticking the check box means to enable snmp-server; not
ticking the check box means to disable the snmp-server;
Permit Host with TCP Connection: The list of the hosts that are
permitted to set up TCP connection with the switch; the displayed
information is the IP addresses of the hosts;
Add: Click Add and you can add the host that permits setting up the TCP
connection;
Note
One port can be bound for several times, so the interface adopts the
paging function for users to view. The interface can be paged as desired
by adjusting the text box before change page size. For example, the
interface has three pieces of information. If the user input one and then
click change page size, the interface is displayed by three pages. If the
user does not input, but clicks change page size directly, the interface is
paged by the default 20, as follows.
Batch delete: Tick the check boxes in the port list, click batch delete
and you can perform the batch operation.
MAC Address Type: The options in the drop-down list are dynamic, static,
drop, and all (without drop);
Note
There are a lot of MAC addresses, so the interface adopts the paging
function for users to view. The interface can be paged as desired by
adjusting the text box before change page size. For example, the
interface has three pieces of information. If the user inputs one and then
clicks change page size, the interface is displayed by three pages. If the
user does not input, but clicks change page size directly, the interface is
paged by the default 20, as follows.
Add: Click Add and you can add a new MAC address. The MAC address
type includes static and drop.
MAC Searching
This section describes the information about the MAC address.
MAC Address Type: DYNAMIC means dynamic MAC address; DROP means
to filter MAC address; STATIC means the static MAC address;
With the fuzzy search function, after inputting a part of MAC address, click
Search, as follows.
When the user does not input MAC address, click Search and all MAC
addresses are displayed.
Note
Note
Port: the number of the port configured with MAC address learning
(including the aggregation port);
Caution
When the MAC address learning function is not enabled on the port,
modifying the number of learned MAC addresses does not take effect.
In the MAC learning configuration based on port, Click of one port and
you can edit it.
Note
The following is the interface of editing the MAC address learning of S3900.
Batch edit: Click batch edit and you can perform the batch editing
operation;
Note
The following is the interface of editing the MAC address learning of S3900.
Note
Note
Click and you can delete the corresponding port; click Batch delete
and you can delete in batches.
ARP Management
This section describes the ARP information.
Note
Search Mac by Ip: Input IP address in the text box before the search
button, click search and then you can find the corresponding MAC
addresses; When no matching item is found, it is displayed as not found.
Search Ip by Mac: Input MAC address in the text box before the search
button, click search and then you can find the corresponding IP addresses.
When no matching item is found, it is displayed as not found.
ARP Binding
This section describes the information about the ARP binding.
Click Add:
Vrf: In the drop-down list, all configured vrf in the device is displayed; if
no configured vrf, it is displayed as “--”.
Alias: In the drop-down list, “--” and “alias” are displayed. If alias is
selected, alias is displayed in the alias list after configuring successfully, as
shown in the above figure;
Click the icon and you can perform the deleting operation; click batch
delete and you can perform the batch deleting operation;
Note
In the chapter, all physical ports in the port list are displayed in the form
of a/b/c; the aggregation ports are displayed as 1, 2, 3…64.
VLAN Configuration
This section describes the VLAN configuration of Maipu switch.
Port Mode
This section describes the configuration of the port mode.
The default VLAN of the access port is the one to which it belongs, which
cannot be configured.
Trunk port can Hybrid port can belong to several VLANs. The default VLAN
can be configured.
Paging
The system has the default value for the number of the records displayed
in each page. You can input the desired number of the records displayed in
. When is selected,
automatically turn to the next page (if it is the last page, turn to the home
page) as long as the previous page is set successfully.
Basic Configuration
This section describes the port-based VLAN configuration.
Port-Based VLAN
The port-based VLAN regards the port as one member added to the VLAN.
The port can forward the packets of the VLAN.
Add VLAN
Click and you can add a new VLAN.
You can select multiple ports from the port list and click to add the
selected ports to the member port list, but the types of the selected ports
must be consistent (here, the classification standard is: hybrid mode/non-
hybrid mode); click and you can remove the ports from the
Edit VLAN
Click and you can edit the corresponding VLAN.
VLAN ID cannot be edited and the other parts are the same as the section
of Add VLAN.
MAC-VLAN Configuration
This section describes the MAC-based VLAN configuration in the port VLAN.
z If the source MAC address of the packet is consistent with the MAC
address of the VLAN that is distributed based on MAC, the packet is
distributed to the VLAN ID of the MAC VLAN.
z If the packet does not match the MAC address set by MAC VLAN, the
packet is distributed to the default VLAN ID of the port.
A d d M A C - V LA N
Click , and you can add new MAC-VLAN.
The protocol VLAN defines the protocol profile, which comprises the frame
encapsulation and protocol type. One port can be configured with several
protocol profiles. When the protocol VLAN is enabled on the port, the
protocol profile is configured on the port.
The protocol VLAN processes the untag packet received by the port as
follows:
z If the packet does not match the protocol profile, the packet is
distributed to the default VLAN ID of the port.
When configuring the protocol VLAN, multiple ports can be selected at the
same time. Profile is the existing protocol profile number. If there is no
protocol profile, configure the protocol profile first.
By default, the order of the priorities of the four VLANs from high to low is
MAC-based VLAN, IP subnet-based VLAN, protocol-based VLAN, and port-
based VLAN. On one port, the divided VLAN takes effect by the priority
and only one divided VLAN can take effect.
Ticking the check box means that the VLAN function is enabled on the port.
Otherwise, disable the VLAN function.
Q-IN-Q Configuration
TPID (Tag Protocol Identifier): It is one tag field in the packet and
indicates the protocol type of the VLAN Tag. The value of the VLAN Tag
field is 0x8100. The default value of the outer VLAN Tag in the Vlan dot1q
tunnel packet is 0x8100. Different manufacturers may set different outer
VLAN Tags for the Vlan dot1q tunnel packet, such as 0x9100.
802.1p: Configure the value of the priority filed in the inner Tag of the
port to be copied to the priority field in the outer Tag.
Note
Mapping Configuration
Click the icon for configuring the mapping to configure Q-IN-Q
mapping on the port.
Note
When configuring new selective Vlan dot1q tunnel and if there are conflict
items, the system automatically delete all conflict Vlan dot1q tunnel
(mapping) items and then set new items.
1. L2 protocol tunnel
Enable the L2 protocol tunnel function on the port and the destination MAC
address of the L2 protocol packet entering the port is replaced as the
special multicast MAC address (by default, it is 01-00-0c-cd-cd-d0). The
2. L2 protocol discard
3. L2 protocol peer
Note
The MAC address should be the one prompted in the command line and
cannot be any other MAC address.
Caution
On the devices at the two sides of the L2 protocol tunnel, the configured
special multicast MAC addresses for replacing the destination MAC
addresses of the L2 protocol packets should be consistent.
Select the port from the left port list and then configure the L2 protocol
control.
Caution
When the port on which the L2 protocol tunnel function is enabled receives
the corresponding L2 protocol tunnel packets, the system shuts down the
port temporarily.
ACL Configuration
The full name of ACL is Access Control List, which is called Access List for
short. The configurations related with the ACL function in Maipu switch
include Action Group configuration, Traffic Meter configuration, and Time
Range configuration.
Main contents:
If the access list is named by numbers, the four kinds of access lists all
have the fixed value ranges.
The operation brings in the name and type of the specified ACL, which
cannot be changed.
Delete
Click and you can delete one access list (if the access list is referenced,
all configurations about the access list become invalid after the access list
is deleted, but you can create an access list with the same name to
recover).
Click after one rule in the list and you can delete the rule.
For the operations of creating action group and time range, refer to time
range configuration or action group configuration.
The ACL can be named by numbers or customized by the user. For naming
by numbers, refer to the following table.
The operation brings in the name and type of the specified ACL, which
cannot be changed.
Delete
Click and you can delete one access list (if the access list is referenced,
all configurations about the access list become invalid after the access list
is deleted, but you can create an access list with the same name to
recover).
Click after one rule in the list and you can delete the rule.
Bind Object
Click to enter into the interface for binding object. For
details, refer to the section of Apply ACL to Object.
Create one MAC standard access list, which can be named by numbers or
by the user. For naming by number, refer to the IP-ACL section.
The operation brings in the name and type of the specified ACL, which
cannot be changed.
Delete
Click and you can delete one access list (if the access list is referenced,
all configurations about the access list become invalid after the access list
is deleted, but you can create an access list with the same name to
recover).
Click after one rule in the list and you can delete the rule.
Bind Object
For binding time range and action group, refer to the IP-ACL section.
Create
Click to create one MAC extended access list
and then select the type.
Create one MAC extended access list, which can be named by numbers or
by the user. For naming by numbers, refer to the IP-ACL section.
z IP type: 0x0800
The operation brings in the name and type of the specified ACL, which
cannot be changed.
Delete
Click and you can delete one access list (if the access list is referenced,
all configurations about the access list become invalid after the access list
is deleted, but you can create an access list with the same name to
recover).
Click after one rule in the list and you can delete the rule.
The status of the time range includes ACTIVE and INACTIVE. The status of
the time range depends on the current status of the time periods in the
time range. If any time period is in the ACTIVE state, the time range is in
the ACTIVE state.
Create
Click to create one time range. The time range
includes two kinds:
The name of the time range cannot begin with numbers or exceed 31
characters.
Absolute time range: It is required to configure the year, month, day, hour
and minute of the start time and end time.
The operation brings in the name of the specified time range, which
cannot be changed.
Delete
Click and you can delete one time range (if the time range is
referenced, all configurations about the time range become invalid after
the time range is deleted, but you can create a time range with the same
name to recover).
There are two kinds of actions groups, includi9ng ingress action group and
egress action group. The ingress action group is also divided to ingress L2
action group and ingress L3 action group.
Note
Note
Note
Note
Note
Create
Click to create one action group.
Note
Note
Note
Note
Note
The name of the action group cannot begin with numbers and comprises
31 characters at most.
Counter:
Note
Note
Meter:
Mirror port:
Configure packet mirroring action in the action group. This is to mirror the
matched packets to the specified port.
Re-direct Port:
Note
Note
Note
Note
Note
Note
Configure L2 Remark:
Note
Note
Configure L3 Remark:
Edit
Click and you can edit the attributes of the action group.
Note
Note
Note
Note
Note
Here, the name of the action group cannot be changed, but the other
attributes can be edited.
Delete
Click and you can delete one action group (if the action group is
referenced, all configurations about the action group become invalid after
the action group is deleted, but you can create an action group with the
same name to recover).
Apply
Click to apply ACL to object.
Note
Viewing and deleting the time range and action group bound to ACL are
performed on the interface of the bound ACL.
Delete
Click and you can delete the binding relation between the binding
object and ACL (deleting the binding time domain and action group is
performed on the corresponding ACL interface).
Configure Meter
To support packet traffic control function, you can specify one meter name
in the action group. One meter can be configured as one global resource
and also can be referenced by multiple action groups.
Create
Click to create one new meter.
Edit
Click after one meter record and you can edit the meter.
Delete
Click after one meter record and you can delete the meter.
QoS Configuration
This chapter describes the QoS usage and configuration of the port.
Main contents:
z Priority mapping
z Dropping mode
z Speed limitation
z Traffic statistics
Priority Mapping
The priority mapping is to map to the local priority according to the dscp
or 802.1p value of the packet. The priority mapping is to configure the
relation of theses mappings. S4100 only has the front three kinds of
mapping.
4. lp-dscp mapping: map to the dscp value of the packet according to the
local priority Ip;
6. lp-cosp mapping: map to the cosq value according to the local priority
Ip;
Note
Note
Note
Edit
Edit single priority mapping: Click to edit the priority mapping of the
port.
Note
Note
Click Edit and the selected ports are displayed. The selected ports cannot
be changed, but the mappings of the ports can be edited.
Batch Edit: Click and you can edit the priorities of all selected ports.
Note
Note
Delete
Delete Single Priority Mapping: Click to delete all priority mappings of
the port.
Note
Note
SP (Strict Priority): Queue 7 has the highest priority and queue 0 has the
lowest priority;
Note
Note
The SP and RR modes have no weight values, so they are displayed “--".
Edit
Edit Single Queue Scheduling: Click to edit the queue scheduling
mode of the port.
Note
Note
On the interface, there is the selected port and policies. The policies can
be modified.
Batch Edit: Click to edit the queue scheduling mode of the selected
ports.
Note
Note
Delete
Delete Single Queue Scheduling: Click to delete the queue scheduling
mode of the port and recover to the SP mode.
Note
Note
Drop Mode
The port supports two drop modes, including Tail Drop and SWRED.
Note
Note
Edit
Edit Single: Click to edit the drop mode of one port.
Note
Note
Batch Edit: Click to edit the drop mode of the selected ports.
Note
Note
Delete
Delete Single: Click to delete the drop mode of the port. By default, the
drop mode is tail-drop mode.
Note
Note
Rate Limitation
To ensure that that the information flow over the network does not
overload and cause blocking. Maipu series switches provide port-based
speed limitation at the input direction, that is, limit the total speed at the
receiving direction of the port and the overloading flow is dropped. The
configured parameters are bandwidth threshold (Kbit, 64K is the minimum
granularity and the burst flow (bytes).
Edit
Edit Single: Click to edit the speed limitation of one port.
On the interface, there is the selected port and the related parameter
values for modification. The port cannot be modified.
Batch Edit: Click to edit the speed limitation of the selected ports.
On the interface, there are the selected ports. You can also input the
desired ports according to the port format.
Delete
Delete Single: Click to delete the speed limitation of the corresponding
port.
Edit
Edit Single: Click to configure the flow shaping of the port.
On the interface, there is the select port and the related values. The port
cannot be modified.
Batch Edit: Click to edit the flow shaping of all selected ports.
On the interface, there are only the selected ports. You can also input the
desired ports according to the port format.
Delete
Delete Single Flow Shaping: Click to delete the flows shaping of the
corresponding port.
Configure the flow shaping for the queue on the port. The value range of
the queue number is 0-7. The later four parameters are committed
information rate (CIR), committed burst size (CBS), peak burst size (PBS),
and peak information rate (PIR). Here, PIR, CIR and step length are all 64.
If the input value is not the multiple of 64, the diver automatically adjusts
it. The values of CBS and PBS are an integer multiple of 4096. The
calculation method is consistent with the burst-size command.
Edit
Edit Single Flow Shaping: Click to edit the flow shaping of the current
queue number on the port.
On the interface, there are the selected ports, queue ID, and the flow
shaping values. Here, the selected ports and queue ID cannot be modified.
Batch Edit: Click to edit the flow shaping of any queue number of all
selected ports.
On the interface, there are only the select ports. Edit the flow shaping of
one queue of the selected ports.
Delete
Delete Single Flow Shaping: Click to delete the flow shaping of current
queue number on the port.
Flow Statistics
The port, vlan and global flow statistics are supported.
Note
Note
View Ports
Select the port and click .
Note
Note
View Vlan
Input Vlan ID and click .
Note
Note
View Global
Click the Global Tab.
OAM Configuration
CFM Configuration
The IEEE 802.1ag protocol calls Ethernet OAM function as Connectivity
Fault Management (CFM). It is service-based end-to-end Ethernet OAM
function.
Action:
Click to add remote MEP; click to delete the remote peer MEP.
Port Configuration
Configure the CFM function on the port.
You can set whether to enable the CFM function on the ports in batches.
Set: select the port number and the port status, and then click Set, as
follows:
Note
After enabling the OAM function of the port, the OAM status in the list is
displayed in the bold black form. Otherwise, it is not in bold form.
Port: the number of the port on which the OAM event log is to be
configured;
Event Log Status: “Enable” means to enable the event log information;
“Disable” means to disable the event log information; by default, the event
log information is enabled;
Cache Size: the maximum number of the cached event log information of
the Ethernet OAM; the default value is 50;
Event Log Detail: When the port is configured with the maximum cache
size, there is the link of the details. Click Detail to display the detailed
information as follows. Click Close to hide the information.
Set: Select port number, event log status, and cache size, and then click
Set as follows.
Note
After enabling the OAM event log of the port, the event log status in the
list is displayed in the bold black form. Otherwise, it is not in bold form.
Port: the number of the port on which the OAM detection packet is
configured;
OAM Mode: It is the Ethernet OAM mode. “Active” means the Ethernet
OAM mode is active; “Passive” means the Ethernet OAM mode is passive.
The default value is active.
Hello rate: It is the interval for sending hello packets (that is information
OAMPDU) of Ethernet OAM. The default value is 1000.
Set: Select the port number, OAM mode, Hello rate, and Hello timeout,
and then click Set as follows.
Port: the number of the port on which the OAM link monitoring is to be
configured;
High threshold value and action: the upper threshold of the error
signal detection of Ethernet OAM link monitoring and the error response
processing for the upper threshold of the error signal detection of Ethernet
OAM link monitoring; by default, the upper threshold is no monitor;
Low threshold value and action: the low threshold of the error signal
detection of Ethernet OAM link monitoring and the error response
processing for the low threshold of the error signal detection of Ethernet
OAM link monitoring; by default, the low threshold is 1;
High threshold value and action: the upper threshold of the error
frame detection of Ethernet OAM link monitoring and the error response
processing for the upper threshold of the error frame detection of Ethernet
OAM link monitoring; the default upper threshold value is no monitor;
Low threshold value and action: the low threshold of the error frame
detection of Ethernet OAM link monitoring and the error response
processing for the low threshold of the error frame detection of Ethernet
OAM link monitoring; the default low threshold is 1;
High threshold value and action: the upper threshold of the error
frame periodical detection of Ethernet OAM link monitoring and the error
response processing for the upper threshold of the error frame periodical
Low threshold value and action: the low threshold of the error frame
periodical detection of Ethernet OAM link monitoring and the error
response processing for the low threshold of the error frame periodical
detection of Ethernet OAM link monitoring; the default low threshold is 1;
High threshold value and action: the upper threshold of the error
frame seconds detection of Ethernet OAM link monitoring and the error
response processing for the upper threshold of the error frame seconds
detection of Ethernet OAM link monitoring; the default upper threshold
value is no monitor;
Low threshold value and action: the low threshold of the error frame
seconds detection of Ethernet OAM link monitoring and the error response
processing for the low threshold of the error frame seconds detection of
Ethernet OAM link monitoring; the default low threshold is 1;
The setting list includes Link Monitor Status, Monitor Error Symbol,
Monitor Error Frame, Monitor Error Frame Period, and Monitor Error Frame
Seconds.
The selected port numbers are automatically added to the port list. After
successful setting, the following interface is shown.
Note
After enabling OAM link monitoring configuration on the port, the link
monitoring status in the list is displayed in bold and black form. Otherwise,
it is displayed not in bold form.
Note
The interface comprises tabs. When the user sets one tab, the setting
takes effect only on the current tab. For example, select Monitor Error
Frame Seconds, click Set and the setting takes effect only on the tab.
Note
Note
Port: the number of the port to be configured with OAM remote loopback
test;
Note
After enabling the OAM remote loopback test function on the port, the
remote loopback function in the list is displayed in black and bold form.
Otherwise, it is displayed not in bold form.
Port: the number of the port to send the remote loopback command;
Loopback Test Time: the time of the remote loopback test; the unit is
second;
Start: to send the command of enabling remote loopback test to the peer
end;
Stop: to send the command of disabling remote loopback test to the peer
end;
ELMI Configuration
E-LMI (Ethernet local management interface) is put forward by MEF and
the serial No. is MEF16. Metro-E forum defines a group of extending
service attributes and related parameters used to provide the Ethernet
services from UNI to UNI. The E-LMI protocol can get and transmit the
sufficient EVC and UNI status information, and UNI and EVC configuration
information from the PE device to the CE device, so as to complete the
configuration of the CE device.
E-LMI Running Parameters on PE: Select the desired port, and click
.
EVC-UNI Configuration
Configure the UNI type of the local port. Currently, there are three types,
including bundling, all-to-one, and multiplexing.
Bundling: One UNI port can be bound to several EVCs, and one or several
CEVLANs are mapped to the EVCs;
all-to-one: One UNI port is bound to only one EVC and all CEVLANs are
mapped to the EVC;
multiplexing: One UNI port can be bound to several EVCs and only one
CEVLAN is mapped to the EVCs.
Only the ports on which the E-LMI protocol is enabled in PE mode can be
displayed.
Edit
Click to edit the UNI-ID and UNI type of the port.
Batch edit: Select the desired ports, and then click to edit the
UNI-ID and the type of the ports.
Delete
Delete Single: Click to delete the UNI-ID of the port and recover the
default value of the system, that is, UNI-port-X/XX.
EVC
EVC is put forward by MEF. It is the virtual connection to connect two or
more UNIs and switch Ethernet service frames between them.
Create
Click to create one new EVC.
View Details
Click to view the details of EVC.
Edit
Click to edit the EVC.
Delete
Click to delete the EVC.
Apply
Click to jump to the EVC binding interface to perform
the operation of applying EVC.
Anti-Attack Detection
Configuration
Overview
This section describes the configurations of the attack detection and scan
detection.
Note
Note
Note
Attack Detection
Packet Attack Detection
The packet attack detection configuration includes:
z Attack detection of TCP SYN packet with source port smaller than
1024
Note
Note
Note
Note
ACL: The ACL can be serial No., a number between 1 and 2000. It can
also be the name of the ACL.
Delete: Select the desired ICMP flood attack detection configurations, and
click to delete them.
Note
The following is the interface of adding syn flood attack detection of S3900.
Note
The following is the interface of adding syn flood attack detection of S4100.
ACL: The ACL can be serial No., a number between 1 and 2000. It can
also be the name of the ACL.
Delete: Select the desired syn flood attack detection configurations, and
click to delete them.
Note
Note
ACL: The ACL can be serial No., a number between 1 and 2000. It can
also be the name of the ACL.
Delete: Select the desired smurf attack detection configurations, and click
to delete them.
Note
Note
ACL: The ACL can be serial No., a number between 1 and 2000. It can
also be the name of the ACL.
Scan Detection
Introduction to Scan Detection
The scan detection module can find the address scan and port scan attacks.
By default, the system has a set of scan detection thresholds. The user
can customize the scan threshold to reach the more detailed scan
detection. When it is found that the scan happens to one address, the user
can define prohibiting the access in a small period of time. The default
value is 15s. Meanwhile, the system records the IP scan in the log for the
user to analyze.
Note
When configuring the scan detection, whether to clear the scan statistics
information can be configured. To enable the scan detection, tick the To
enable the scan detection function check box. To configure the custom
scan, first select to enable the default scan. If the items of the custom
scan are not specified (that is, adopt the default values), it is regarded
that the default scan detection protection is enabled.
Compared with the dynamic routing protocol, the advantages of the static
route include the security and the resource efficiency. The static route
does not need to occupy the line bandwidth like the dynamic routing
protocol. It can improve the network performance and does not need to
occupy the CPU period to calculate and notify the route. The disadvantage
is that when the network topology changes, it does not have the auto re-
configuration mechanism and needs the user to configure manually.
The static route can be re-distributed to the dynamic routing protocol, but
the route of the dynamic routing protocol cannot be re-distributed to the
static route table. Besides, the route loop caused by configuring the static
route cannot be avoided.
The static route is useful for the security of the small network. For
example, there is only one path connected to the outer network. For the
large-scale network, the static route can perform the security control for
some services or links. Most networks adopt the dynamic routing protocol
between the network devices, but one or two static routes can be
configured for some special cases.
DNS Configuration
Overview
This section describes the DNS configuration.
The Preferred DNS server and Alternate DNS server can be configured.
Note
System Management
Overview
This section describes the system management and configuration.
NTP Configuration
Click to enter the NTP configuration interface.
z Authentication key
z NTP client
z Trusted key
Authentication-key Configuration:
Trusted-key Configuration:
z Stratum value
z Authentication-key
Stratum Configuration
Administrator Configuration
Set the passwords of administrator and guest, set the password for
entering the enable mode, set whether to enable guest user, and so on.
Note
Re-start the device. The IOS program upgrade can take effect only after
restarting the device.
Click Backup to back up the configuration files of the device to the local.
Log Management
The system log function includes two aspects:
z Output and save the log message in various forms, including printing
to the console port, printing to the telnet terminal via the switch,
writing to the memory, writing to the flash file, sending to the log
server and so on;
Save Configuration
Overview
The save function is to save all current configurations to the device.
After modifying the system configuration, the user can save the current
configuration as the configuration parameters for enabling the switch next
time.