Siemens S223 Users Manual SURPASS HiD 6615 S323 R1.5 User

S223 to the manual e39cc7ab-1acf-4461-8ae5-60957e3d12f4

2015-02-05

: Siemens Siemens-S223-Users-Manual-410389 siemens-s223-users-manual-410389 siemens pdf

Open the PDF directly: View PDF PDF.
Page Count: 381

DownloadSiemens Siemens-S223-Users-Manual- SURPASS HiD 6615 S323 R1.5 User Manual  Siemens-s223-users-manual
Open PDF In BrowserView PDF
User Manual
SURPASS hiD 6615 S223/S323 R1.5
UMN:CLI
A50010-Y3-C150-2-7619

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Important Notice on Product Safety
Elevated voltages are inevitably present at specific points in this electrical equipment. Some of the
parts may also have elevated operating temperatures.
Non-observance of these conditions and the safety instructions can result in personal injury or in
property damage.
Therefore, only trained and qualified personnel may install and maintain the system.
The system complies with the standard EN 60950-1 / IEC 60950-1. All equipment connected has to
comply with the applicable safety standards.

The same text in German:
Wichtiger Hinweis zur Produktsicherheit
In elektrischen Anlagen stehen zwangsläufig bestimmte Teile der Geräte unter Spannung. Einige
Teile können auch eine hohe Betriebstemperatur aufweisen.
Eine Nichtbeachtung dieser Situation und der Warnungshinweise kann zu Körperverletzungen und
Sachschäden führen.
Deshalb wird vorausgesetzt, dass nur geschultes und qualifiziertes Personal die Anlagen installiert
und wartet.
Das System entspricht den Anforderungen der EN 60950-1 / IEC 60950-1. Angeschlossene Geräte
müssen die zutreffenden Sicherheitsbestimmungen erfüllen.

Trademarks:
All designations used in this document can be trademarks, the use of which by third parties for their
own purposes could violate the rights of their owners.

Copyright (C) Siemens AG 2005-2006.
Issued by the Communications Group
Hofmannstraße 51
D-81359 München
Technical modifications possible.
Technical specifications and features are binding only insofar as
they are specifically and expressly agreed upon in a written contract.

2

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Reason for Update
Summary: System software upgrade added

Details:
Chapter/Section

Reason for Update

11

System software upgrade added

Issue History
Issue

Date of Issue

Reason for Update

01

07/2006

Initial release

02

08/2006

System software upgrade added

Number

A50010-Y3-C150-2-7619

3

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

This document consists of a total 381 pages. All pages are issue 2.

Contents

4

1
1.1
1.2
1.3
1.4
1.5
1.6

Introduction ....................................................................................................... 20
Audience........................................................................................................... 20
Document Structure.......................................................................................... 20
Document Convention ...................................................................................... 21
Document Notation ........................................................................................... 21
CE Declaration of Conformity ........................................................................... 21
GPL/LGPL Warranty and Liability Exclusion .................................................... 22

2
2.1

System Overview.............................................................................................. 23
System Features............................................................................................... 24

3
3.1
3.1.1
3.1.2
3.1.3
3.1.4
3.1.5
3.1.6
3.1.7
3.1.8
3.1.9
3.1.10
3.1.11
3.1.12
3.2
3.2.1
3.2.2
3.2.3
3.2.4
3.2.5

Command Line Interface (CLI) ......................................................................... 27
Command Mode ............................................................................................... 27
Privileged EXEC View Mode ............................................................................ 29
Privileged EXEC Enable Mode......................................................................... 29
Global Configuration Mode............................................................................... 29
Bridge Configuration Mode............................................................................... 30
Rule Configuration Mode.................................................................................. 31
DHCP Configuration Mode ............................................................................... 32
DHCP Option 82 Configuration Mode .............................................................. 32
Interface Configuration Mode ........................................................................... 33
RMON Configuration Mode .............................................................................. 33
Router Configuration Mode .............................................................................. 34
VRRP Configuration Mode ............................................................................... 34
Route-Map Configuration Mode ....................................................................... 35
Useful Tips ........................................................................................................ 36
Listing Available Commands ............................................................................ 36
Calling Command History................................................................................. 37
Using Abbreviation............................................................................................ 38
Using Command of Privileged EXEC Enable Mode......................................... 38
Exit Current Command Mode ........................................................................... 39

4
4.1
4.1.1
4.1.2
4.1.3
4.1.4
4.1.4.1
4.1.4.2
4.1.5
4.1.6
4.1.7
4.1.8
4.1.8.1
4.1.8.2
4.2
4.2.1

System Connection and IP Address ................................................................. 40
System Connection........................................................................................... 40
System Login .................................................................................................... 40
Password for Privileged EXEC Mode ............................................................... 41
Changing Login Password................................................................................ 42
Management for System Account..................................................................... 42
Creating System Account ................................................................................. 42
Configuring Security Level................................................................................ 43
Limiting Number of User................................................................................... 47
Telnet Access.................................................................................................... 47
Auto Log-out ..................................................................................................... 48
System Rebooting ............................................................................................ 48
Manual System Rebooting ............................................................................... 48
Auto System Rebooting.................................................................................... 49
System Authentication ...................................................................................... 49
Authentication Method...................................................................................... 50

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.2.2
4.2.3
4.2.4
4.2.4.1
4.2.4.2
4.2.4.3
4.2.4.4
4.2.5
4.2.5.1
4.2.5.2
4.2.5.3
4.2.5.4
4.2.6
4.2.7
4.2.8
4.3
4.3.1
4.3.2
4.3.3
4.3.4
4.3.5
4.3.6
4.3.7
4.3.8
4.4
4.4.1
4.4.1.1
4.4.1.2
4.4.1.3
4.4.1.4
4.4.1.5
4.4.2
4.4.2.1
4.4.2.2
4.4.2.3
4.5
4.5.1
4.5.1.1
4.5.1.2
4.5.1.3
4.5.1.4
4.5.1.5
4.5.1.6
4.5.1.7
4.5.1.8
4.5.2
4.5.2.1
4.5.2.2
4.5.2.3
4.5.2.4
4.5.3

A50010-Y3-C150-2-7619

UMN:CLI

Authentication Interface.....................................................................................50
Primary Authentication Method .........................................................................50
RADIUS Server .................................................................................................51
RADIUS Server for System Authentication .......................................................51
RADIUS Server Priority .....................................................................................51
Timeout of Authentication Request....................................................................51
Frequency of Retransmit ...................................................................................52
TACACS Server.................................................................................................52
TACACS Server for System Authentication.......................................................52
TACACS Server Priority ....................................................................................52
Timeout of Authentication Request....................................................................52
Additional TACACS+ Configuration...................................................................53
Accounting Mode...............................................................................................54
Displaying System Authentication .....................................................................54
Sample Configuration ........................................................................................55
Assigning IP Address.........................................................................................56
Enabling Interface..............................................................................................57
Disabling Interface.............................................................................................57
Assigning IP Address to Network Interface .......................................................58
Static Route and Default Gateway ....................................................................58
Displaying Forwarding Information Base(FIB) Table.........................................59
Forwarding Information Base(FIB) Retain.........................................................59
Displaying Interface ...........................................................................................60
Sample Configuration ........................................................................................60
SSH (Secure Shell) ...........................................................................................61
SSH Server........................................................................................................61
Enabling SSH Server.........................................................................................61
Displaying On-line SSH Client...........................................................................61
Disconnecting SSH Client .................................................................................61
Displaying Connection History of SSH Client....................................................61
Assigning Specific Authentication Key...............................................................62
SSH Client .........................................................................................................62
Login to SSH Server..........................................................................................62
File Copy ...........................................................................................................62
Configuring Authentication Key .........................................................................62
802.1x Authentication ........................................................................................64
802.1x Authentication ........................................................................................65
Enabling 802.1x.................................................................................................65
Configuring RADIUS Server..............................................................................65
Configuring Authentication Mode ......................................................................66
Authentication Port ............................................................................................67
Force Authorization............................................................................................67
Configuring Interval for Retransmitting Request/Identity Packet ......................67
Configuring Number of Request to RADIUS Server .........................................68
Configuring Interval of Request to RADIUS Server ..........................................68
802.1x Re-Authentication ..................................................................................68
Enabling 802.1x Re-Authentication ...................................................................68
Configuring the Interval of Re-Authentication ...................................................69
Configuring the Interval of Requesting Re-authentication.................................69
802.1x Re-authentication ..................................................................................69
Initializing Authentication Status ........................................................................70

5

UMN:CLI

6

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.5.4
4.5.5
4.5.6
4.5.7

Applying Default Value...................................................................................... 70
Displaying 802.1x Configuration....................................................................... 70
802.1x User Authentication Statistic ................................................................. 70
Sample Configuration ....................................................................................... 71

5
5.1
5.1.1
5.2
5.2.1
5.2.2
5.2.3
5.2.4
5.2.5
5.2.6
5.2.7
5.2.7.1
5.2.7.2
5.2.7.3
5.2.8
5.2.9
5.3

Port Configuration............................................................................................. 73
Port Basic ......................................................................................................... 73
Selecting Port Type........................................................................................... 73
Ethernet Port Configuration .............................................................................. 74
Enabling Ethernet Port ..................................................................................... 74
Auto-negotiation................................................................................................ 75
Transmit Rate ................................................................................................... 75
Duplex Mode..................................................................................................... 76
Flow Control...................................................................................................... 76
Port Description ................................................................................................ 77
Traffic Statistics................................................................................................. 78
The Packets Statistics....................................................................................... 78
The CPU statistics ............................................................................................ 79
The Protocol statistics....................................................................................... 79
Port Status ........................................................................................................ 80
Initializing Port Statistics ................................................................................... 80
Port Mirroring .................................................................................................... 80

6
6.1
6.1.1
6.1.2
6.1.3
6.1.4
6.1.5
6.1.6
6.1.7
6.1.8
6.1.9
6.1.10
6.1.11
6.1.12
6.1.12.1
6.1.12.2
6.1.12.3
6.1.12.4
6.1.12.5
6.1.13
6.1.14
6.2
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5
6.3
6.3.1

System Environment ........................................................................................ 83
Environment Configuration ............................................................................... 83
Host Name........................................................................................................ 83
Time and Date .................................................................................................. 83
Time Zone......................................................................................................... 84
Network Time Protocol ..................................................................................... 84
NTP (Network Time Protocol)........................................................................... 85
Simple Network Time Protocol (SNTP) ............................................................ 85
Terminal Configuration...................................................................................... 86
Login Banner .................................................................................................... 87
DNS Server....................................................................................................... 87
Fan Operation................................................................................................... 88
Disabling Daemon Operation ........................................................................... 88
System Threshold............................................................................................. 88
CPU Load ......................................................................................................... 88
Port Traffic ........................................................................................................ 89
Fan Operation................................................................................................... 89
System Temperature......................................................................................... 90
System Memory................................................................................................ 90
Enabling FTP Server ........................................................................................ 90
Assigning IP Address of FTP Client.................................................................. 91
Configuration Management .............................................................................. 91
Displaying System Configuration...................................................................... 91
Saving System Configuration ........................................................................... 92
Auto-Saving ...................................................................................................... 92
System Configuration File ................................................................................ 92
Restoring Default Configuration ....................................................................... 93
System Management........................................................................................ 94
Network Connection ......................................................................................... 94

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

6.3.2
6.3.3
6.3.4
6.3.5
6.3.6
6.3.7
6.3.8
6.3.9
6.3.10
6.3.11
6.3.12
6.3.13
6.3.14
6.3.15
6.3.16
6.3.17

IP ICMP Source-Routing ...................................................................................97
Tracing Packet Route ........................................................................................98
Displaying User Connecting to System .............................................................99
MAC Table .........................................................................................................99
Configuring Ageing time ..................................................................................100
Running Time of System .................................................................................100
System Information..........................................................................................100
System Memory Information ...........................................................................101
CPU packet limit ..............................................................................................101
Average of CPU Load......................................................................................101
Running Process .............................................................................................101
Displaying System Image................................................................................102
Displaying Installed OS ...................................................................................102
Default OS .......................................................................................................102
Switch Status ...................................................................................................103
Tech Support ...................................................................................................103

7
7.1
7.1.1
7.1.2
7.1.3
7.1.4
7.1.5
7.1.6
7.1.7
7.1.8
7.1.8.1
7.1.8.2
7.1.8.3
7.1.8.4
7.1.8.5
7.1.9
7.1.9.1
7.1.9.2
7.1.9.3
7.1.9.4
7.1.9.5
7.1.9.6
7.1.9.7
7.1.10
7.1.11
7.2
7.2.1
7.2.2
7.2.3
7.2.4
7.2.5
7.3
7.3.1
7.3.2

Network Management .....................................................................................104
Simple Network Management Protocol (SNMP) .............................................104
SNMP Community ...........................................................................................104
Information of SNMP Agent .............................................................................105
SNMP Com2sec ..............................................................................................106
SNMP Group ...................................................................................................106
SNMP View Record .........................................................................................107
Permission to Access SNMP View Record .....................................................107
SNMP Version 3 User......................................................................................108
SNMP Trap ......................................................................................................108
SNMP Trap Host..............................................................................................109
SNMP Trap Mode ............................................................................................109
Enabling SNMP Trap .......................................................................................110
Disabling SNMP Trap ...................................................................................... 111
Displaying SNMP Trap ....................................................................................112
SNMP Alarm ....................................................................................................112
Enabling Alarm Notification .............................................................................112
Default Alarm Severity .....................................................................................113
Alarm Severity Criterion...................................................................................113
Generic Alarm Severity....................................................................................114
ADVA Alarm Severity .......................................................................................115
ERP Alarm Severity .........................................................................................116
STP Guard Alarm Severity ..............................................................................117
Displaying SNMP Configuration ......................................................................117
Disabling SNMP ..............................................................................................118
Operation, Administration and Maintenance (OAM)........................................119
OAM Loopback................................................................................................119
Local OAM Mode.............................................................................................120
OAM Unidirection ............................................................................................120
Remote OAM...................................................................................................120
Displaying OAM Configuration ........................................................................121
Link Layer Discovery Protocol (LLDP) ............................................................123
LLDP Operation...............................................................................................123
LLDP Operation Type ......................................................................................123

A50010-Y3-C150-2-7619

7

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.3.3
7.3.4
7.3.5
7.3.6
7.4
7.4.1
7.4.1.1
7.4.1.2
7.4.1.3
7.4.1.4
7.4.1.5
7.4.1.6
7.4.1.7
7.4.2
7.4.2.1
7.4.2.2
7.4.2.3
7.4.2.4
7.4.2.5
7.4.2.6
7.4.2.7
7.4.2.8
7.4.2.9
7.4.2.10
7.4.3
7.4.3.1
7.4.3.2
7.4.3.3
7.4.3.4
7.4.3.5
7.4.3.6
7.4.3.7
7.5
7.5.1
7.5.2
7.5.3
7.5.4
7.5.5
7.5.6
7.5.7
7.6
7.6.1
7.6.2
7.6.2.1
7.6.2.2
7.6.2.3
7.6.2.4
7.6.2.5
7.6.2.6
7.6.2.7
7.6.3

8

Basic TLV........................................................................................................ 123
LLDP Message ............................................................................................... 124
Interval and Delay Time.................................................................................. 124
Displaying LLDP Configuration....................................................................... 125
Remote Monitoring (RMON)........................................................................... 126
RMON History................................................................................................. 126
Source Port of Statistical Data........................................................................ 127
Subject of RMON History ............................................................................... 127
Number of Sample Data ................................................................................. 127
Interval of Sample Inquiry............................................................................... 127
Activating RMON History................................................................................ 128
Deleting Configuration of RMON History........................................................ 128
Displaying RMON History............................................................................... 128
RMON Alarm................................................................................................... 129
Subject of RMON Alarm ................................................................................. 129
Object of Sample Inquiry ................................................................................ 130
Absolute Comparison and Delta Comparison ................................................ 130
Upper Bound of Threshold ............................................................................. 130
Lower Bound of Threshold ............................................................................. 131
Configuring Standard of the First Alarm.......................................................... 131
Interval of Sample Inquiry............................................................................... 131
Activating RMON Alarm.................................................................................. 132
Deleting Configuration of RMON Alarm.......................................................... 132
Displaying RMON Alarm................................................................................. 132
RMON Event................................................................................................... 132
Event Community ........................................................................................... 132
Event Description............................................................................................ 133
Subject of RMON Event ................................................................................. 133
Event Type...................................................................................................... 133
Activating RMON Event.................................................................................. 133
Deleting Configuration of RMON Event.......................................................... 134
Displaying RMON Event................................................................................. 134
Syslog ............................................................................................................. 135
Syslog Output Level ....................................................................................... 135
Facility Code ................................................................................................... 137
Syslog Bind Address....................................................................................... 137
Debug Message for Remote Terminal ............................................................ 138
Disabling Syslog ............................................................................................. 138
Displaying Syslog Message............................................................................ 138
Displaying Syslog Configuration..................................................................... 138
Rule and QoS ................................................................................................. 139
How to Operate Rule and QoS....................................................................... 139
Rule Configuration .......................................................................................... 140
Rule Creation.................................................................................................. 140
Rule Priority .................................................................................................... 140
Packet Classification ...................................................................................... 141
Rule Action...................................................................................................... 143
Applying Rule.................................................................................................. 145
Modifying and Deleting Rule........................................................................... 145
Displaying Rule............................................................................................... 146
QoS................................................................................................................. 146

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

7.6.3.1
7.6.3.2
7.6.3.3
7.6.3.4
7.6.3.5
7.6.4
7.6.4.1
7.6.4.2
7.6.4.3
7.6.4.4
7.6.4.5
7.6.4.6
7.6.4.7
7.7
7.8
7.9
7.9.1
7.10
7.10.1
7.10.2
7.11
7.12
7.12.1
7.12.2
7.12.3
7.12.4
7.12.5
7.13
7.13.1
7.13.1.1
7.13.1.2
7.13.2
7.13.3
7.13.4
7.13.5
7.14
7.14.1
7.14.2
7.14.3
7.14.4
7.15
7.15.1
7.15.2
7.16
7.16.1
7.16.1.1
7.16.1.2
7.16.2
7.17

Scheduling Algorithm.......................................................................................147
Qos Weight ......................................................................................................149
802.1p Priory-to-queue Mapping.....................................................................149
Queue Parameter ............................................................................................150
Displaying QoS................................................................................................150
Admin Access Rule..........................................................................................150
Rule Creation...................................................................................................151
Rule Priority .....................................................................................................151
Packet Classification .......................................................................................152
Rule Action ......................................................................................................153
Applying Rule ..................................................................................................153
Modifying and Deleting Rule ...........................................................................154
Displaying Rule................................................................................................154
NetBIOS Filtering.............................................................................................155
Martian Filtering...............................................................................................156
Max Host .........................................................................................................156
Max New Hosts ...............................................................................................157
Port Security ....................................................................................................158
Port Security on Port .......................................................................................158
Port Security Aging ..........................................................................................160
MAC Table .......................................................................................................161
MAC Filtering...................................................................................................163
Default Policy of MAC Filtering........................................................................163
Adding Policy of MAC Filter.............................................................................163
Deleting MAC Filter Policy...............................................................................164
Listing of MAC Filter Policy .............................................................................164
Displaying MAC Filter Policy ...........................................................................164
Address Resolution Protocol (ARP) ................................................................165
ARP Table........................................................................................................165
Registering ARP Table.....................................................................................166
Displaying ARP Table ......................................................................................166
ARP Alias.........................................................................................................167
ARP Inspection................................................................................................167
Gratuitous ARP................................................................................................169
Proxy-ARP.......................................................................................................169
ICMP Message Control ...................................................................................169
Blocking Echo Reply Message........................................................................170
Interval for Transmit ICMP Message ...............................................................170
Transmitting ICMP Redirect Message.............................................................172
The policy of unreached messages.................................................................173
IP TCP Flag Control.........................................................................................173
RST Configuration ...........................................................................................173
SYN Configuration...........................................................................................174
Packet Dump ...................................................................................................174
Verifying Packet Dump ....................................................................................174
Packet Dump by Protocol ................................................................................175
Packet Dump with Option ................................................................................175
Debug Packet Dump .......................................................................................177
Displaying the usage of the packet routing table.............................................177

8

System Main Functions ...................................................................................178

A50010-Y3-C150-2-7619

9

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.1
8.1.1
8.1.1.1
8.1.1.2
8.1.1.3
8.1.1.4
8.1.1.5
8.1.2
8.1.3
8.1.4
8.1.5
8.1.6
8.1.7
8.1.8
8.1.8.1
8.1.8.2
8.1.8.3
8.1.9
8.1.9.1
8.1.9.2
8.1.10
8.1.11
8.2
8.2.1
8.2.1.1
8.2.1.2
8.2.1.3
8.2.2
8.2.2.1
8.2.2.2
8.2.2.3
8.2.2.4
8.2.2.5
8.2.2.6
8.2.2.7
8.2.2.8
8.2.2.9
8.3
8.3.1
8.3.2
8.3.3
8.3.4
8.3.5
8.3.5.1
8.3.5.2
8.3.5.3
8.3.5.4
8.3.5.5
8.3.5.6
8.3.5.7
8.3.5.8

10

VLAN .............................................................................................................. 178
Port-Based VLAN ........................................................................................... 179
Creating VLAN................................................................................................ 180
Specifying PVID .............................................................................................. 180
Assigning Port to VLAN .................................................................................. 180
Deleting VLAN ................................................................................................ 180
Displaying VLAN............................................................................................. 181
Protocol-Based VLAN..................................................................................... 181
MAC address-based VLAN ............................................................................ 181
Subnet-based VLAN ....................................................................................... 182
Tagged VLAN.................................................................................................. 182
VLAN Description ........................................................................................... 183
Displaying VLAN Information.......................................................................... 183
QinQ ............................................................................................................... 184
Double Tagging Operation.............................................................................. 185
Double Tagging Configuration ........................................................................ 185
TPID Configuration ......................................................................................... 186
Layer 2 Isolation ............................................................................................. 186
Port Isolation................................................................................................... 187
Shared VLAN.................................................................................................. 187
VLAN Translation............................................................................................ 189
Sample Configuration ..................................................................................... 189
Link Aggregation ............................................................................................. 192
Port Trunk ....................................................................................................... 193
Configuring Port Trunk.................................................................................... 193
Disabling Port Trunk ....................................................................................... 194
Displaying Port Trunk Configuration ............................................................... 194
Link Aggregation Control Protocol (LACP) ..................................................... 194
Configuring LACP ........................................................................................... 195
Packet Route .................................................................................................. 195
Operating Mode of Member Port .................................................................... 196
Identifying Member Ports within LACP ........................................................... 197
BPDU Transmission Rate............................................................................... 197
Key value of Member Port .............................................................................. 197
Priority of Member Port................................................................................... 198
Priority of Switch ............................................................................................. 198
Displaying LACP Configuration ...................................................................... 199
Spanning-Tree Protocol (STP)........................................................................ 200
STP Operation ................................................................................................ 201
RSTP Operation ............................................................................................. 205
MSTP Operation ............................................................................................. 209
Configuring STP/RSTP/MSTP/PVSTP/PVRSTP Mode (Required) ................211
Configuring STP/RSTP/MSTP........................................................................ 212
Activating STP/RSTP/MSTP .......................................................................... 212
Root Switch..................................................................................................... 212
Path-cost......................................................................................................... 212
Port-priority ..................................................................................................... 213
MST Region.................................................................................................... 214
MSTP Protocol................................................................................................ 215
Point-to-point MAC Parameters...................................................................... 215
Edge Ports ...................................................................................................... 215

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.5.9
8.3.6
8.3.6.1
8.3.6.2
8.3.6.3
8.3.6.4
8.3.7
8.3.8
8.3.9
8.3.9.1
8.3.9.2
8.3.9.3
8.3.9.4
8.3.9.5
8.3.9.6
8.3.9.7
8.3.9.8
8.3.10
8.4
8.4.1
8.4.1.1
8.4.1.2
8.4.1.3
8.4.1.4
8.4.1.5
8.4.1.6
8.4.1.7
8.5
8.5.1
8.5.2
8.6
8.6.1
8.6.2
8.7
8.8
8.8.1
8.8.1.1
8.8.1.2
8.8.1.3
8.8.1.4
8.8.1.5
8.8.1.6
8.8.1.7
8.8.1.8
8.8.1.9
8.8.1.10
8.8.1.11
8.8.1.12
8.8.1.13
8.8.1.14
8.8.1.15

A50010-Y3-C150-2-7619

UMN:CLI

Displaying Configuration .................................................................................216
Configuring PVSTP/PVRSTP..........................................................................217
Activating PVSTP/PVRSTP.............................................................................217
Root Switch .....................................................................................................218
Path-cost .........................................................................................................218
Port-priority ......................................................................................................218
Root Guard ......................................................................................................219
Restarting Protocol Migration ..........................................................................219
Bridge Protocol Data Unit Configuration .........................................................220
Hello Time........................................................................................................220
Forward Delay .................................................................................................221
Max Age...........................................................................................................221
BPDU Hop .......................................................................................................222
BPDU Filter......................................................................................................222
BPDU Guard....................................................................................................222
Self Loop Detection .........................................................................................223
Displaying BPDU Configuration ......................................................................224
Sample Configuration ......................................................................................225
Virtual Router Redundancy Protocol (VRRP)..................................................227
Configuring VRRP ...........................................................................................228
Associated IP Address.....................................................................................228
Access to Associated IP Address ....................................................................229
Master Router and Backup Router..................................................................229
VRRP Track Function ......................................................................................231
Authentication Password.................................................................................232
Preempt ...........................................................................................................233
VRRP Statistics ...............................................................................................234
Rate Limit ........................................................................................................234
Configuring Rate Limit .....................................................................................235
Sample Configuration ......................................................................................235
Flood Guard.....................................................................................................236
Configuring Flood-Guard .................................................................................236
Sample Configuration ......................................................................................237
Bandwidth ........................................................................................................237
Dynamic Host Configuration Protocol (DHCP)................................................238
DHCP Server ...................................................................................................239
DHCP Pool Creation........................................................................................240
DHCP Subnet ..................................................................................................240
Range of IP Address........................................................................................240
Default Gateway ..............................................................................................241
IP Lease Time..................................................................................................241
DNS Server .....................................................................................................242
Manual Binding................................................................................................242
Domain Name..................................................................................................243
DHCP Server Option .......................................................................................243
Static Mapping .................................................................................................243
Recognition of DHCP Client ............................................................................243
IP Address Validation.......................................................................................244
Authorized ARP ...............................................................................................244
Prohibition of 1:N IP Address Assignment.......................................................245
Ignoring BOOTP Request................................................................................245

11

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.1.16
8.8.1.17
8.8.2
8.8.2.1
8.8.2.2
8.8.2.3
8.8.2.4
8.8.2.5
8.8.3
8.8.3.1
8.8.3.2
8.8.3.3
8.8.4
8.8.4.1
8.8.4.2
8.8.5
8.8.5.1
8.8.5.2
8.8.5.3
8.8.5.4
8.8.5.5
8.8.6
8.8.6.1
8.8.6.2
8.8.6.3
8.8.6.4
8.8.6.5
8.8.6.6
8.8.6.7
8.8.6.8
8.8.7
8.8.7.1
8.8.7.2
8.8.7.3
8.8.7.4
8.8.7.5
8.8.7.6
8.8.7.7
8.8.8
8.8.8.1
8.8.8.2
8.8.8.3
8.8.9
8.8.9.1
8.8.9.2
8.8.10
8.9
8.9.1
8.9.2
8.9.3
8.9.3.1

12

DHCP Packet Statistics .................................................................................. 245
Displaying DHCP Pool Configuration ............................................................. 246
DHCP Address Allocation with Option 82 ....................................................... 247
DHCP Class Capability................................................................................... 247
DHCP Class Creation ..................................................................................... 247
Relay Agent Information Pattern..................................................................... 247
Associating DHCP Class ................................................................................ 248
Range of IP Address for DHCP Class ............................................................ 248
DHCP Lease Database .................................................................................. 249
DHCP Database Agent ................................................................................... 249
Displaying DHCP Lease Status ...................................................................... 249
Deleting DHCP Lease Database .................................................................... 250
DHCP Relay Agent ......................................................................................... 250
Packet Forwarding Address............................................................................ 251
Smart Relay Agent Forwarding....................................................................... 251
DHCP Option 82 ............................................................................................. 252
Enabling DHCP Option 82.............................................................................. 253
Option 82 Sub-Option..................................................................................... 253
Option 82 Reforwarding Policy ....................................................................... 254
Option 82 Trust Policy .................................................................................... 254
Simplified DHCP Option 82 ............................................................................ 255
DHCP Client ................................................................................................... 256
Enabling DHCP Client .................................................................................... 256
DHCP Client ID............................................................................................... 256
DHCP Class ID ............................................................................................... 256
Host Name...................................................................................................... 256
IP Lease Time................................................................................................. 257
Requesting Option .......................................................................................... 257
Forcing Release or Renewal of DHCP Lease ................................................ 257
Displaying DHCP Client Configuration ........................................................... 257
DHCP Snooping ............................................................................................. 258
Enabling DHCP Snooping .............................................................................. 258
DHCP Trust State ........................................................................................... 258
DHCP Rate Limit ............................................................................................ 259
DHCP Lease Limit .......................................................................................... 259
Source MAC Address Verification................................................................... 259
DHCP Snooping Database Agent................................................................... 260
Displaying DHCP Snooping Configuration ..................................................... 261
IP Source Guard ............................................................................................. 261
Enabling IP Source Guard .............................................................................. 261
Static IP Source Binding ................................................................................. 262
Displaying IP Source Guard Configuration..................................................... 262
DHCP Filtering................................................................................................ 263
DHCP Packet Filtering.................................................................................... 263
DHCP Server Packet Filtering ........................................................................ 263
Debugging DHCP ........................................................................................... 264
Ethernet Ring Protection (ERP)...................................................................... 265
ERP Operation................................................................................................ 265
Loss of Test Packet (LOTP)............................................................................ 267
Configuring ERP ............................................................................................. 267
ERP Domain ................................................................................................... 267

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

8.9.3.2
8.9.3.3
8.9.3.4
8.9.3.5
8.9.3.6
8.9.3.7
8.9.3.8
8.9.3.9
8.9.3.10
8.10
8.10.1
8.10.2
8.10.3
8.10.4
8.10.5
8.10.6
8.11
8.12
8.13
8.14

RM Node .........................................................................................................268
Port of ERP domain.........................................................................................268
Protected VLAN...............................................................................................268
Protected Activation.........................................................................................268
Manual Switch to Secondary...........................................................................269
Wait-to-Restore Time.......................................................................................269
Learning Disable Time.....................................................................................269
Test Packet Interval .........................................................................................269
Displaying ERP Configuration .........................................................................270
Stacking ...........................................................................................................270
Switch Group ...................................................................................................271
Designating Master and Slave Switch.............................................................271
Disabling Stacking ...........................................................................................272
Displaying Stacking Status ..............................................................................272
Accessing to Slave Switch from Master Switch ..............................................272
Sample Configuration ......................................................................................272
Broadcast Storm Control .................................................................................274
Jumbo-frame Capacity ....................................................................................275
Blocking Direct Broadcast ...............................................................................276
Maximum Transmission Unit (MTU) ................................................................276

9
9.1
9.1.1
9.1.2
9.1.3
9.1.4
9.1.5
9.1.6
9.1.7
9.2
9.2.1
9.2.1.1
9.2.1.2
9.2.1.3
9.2.1.4
9.2.2
9.2.2.1
9.2.2.2
9.2.2.3
9.2.2.4
9.2.2.5
9.2.3
9.2.4
9.2.4.1
9.2.4.2
9.2.5
9.2.5.1
9.2.5.2
9.2.5.3
9.2.5.4

IP Multicast ......................................................................................................278
Multicast Routing Information Base.................................................................279
Enabling Multicast Routing (Required)............................................................279
Limitation of MRIB Routing Entry ....................................................................279
Clearing MRIB Information ..............................................................................280
Displaying MRIB Information...........................................................................281
Multicast Time-To-Live Threshold....................................................................281
MRIB Debug ....................................................................................................281
Multicast Aging ................................................................................................282
Internet Group Management Protocol (IGMP) ................................................283
IGMP Basic Configuration ...............................................................................283
IGMP Version per Interface .............................................................................283
Removing IGMP Entry.....................................................................................284
IGMP Debug ....................................................................................................284
IGMP Robustness Value .................................................................................284
IGMP Version 2 ...............................................................................................284
IGMP Static Join Setting..................................................................................284
Maximum Number of Groups ..........................................................................285
IGMP Query Configuration ..............................................................................285
IGMP v2 Fast Leave........................................................................................287
Displaying the IGMP Configuration .................................................................287
L2 MFIB ...........................................................................................................288
IGMP Snooping Basic Configuration...............................................................288
Enabling IGMP Snooping per VLAN ...............................................................288
Robustness Count for IGMP v2 Snooping ......................................................289
IGMP v2 Snooping ..........................................................................................289
IGMP v2 Snooping Fast Leave .......................................................................290
IGMP v2 Snooping Querier .............................................................................291
IGMP v2 Snooping Last-Member-Interval .......................................................293
IGMP v2 Snooping Report Method .................................................................294

A50010-Y3-C150-2-7619

13

UMN:CLI

14

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.5.5
9.2.5.6
9.2.6
9.2.6.1
9.2.6.2
9.2.6.3
9.2.7
9.2.7.1
9.2.7.2
9.2.7.3
9.2.7.4
9.2.7.5
9.2.8
9.2.8.1
9.2.8.2
9.2.8.3
9.2.8.4
9.2.8.5
9.2.9
9.3
9.3.1
9.3.1.1
9.3.1.2
9.3.1.3
9.3.1.4
9.3.1.5
9.3.2
9.3.3
9.3.4
9.3.4.1
9.3.4.2
9.3.4.3
9.3.4.4
9.3.5
9.3.5.1
9.3.5.2
9.3.5.3
9.3.5.4
9.3.5.5
9.3.6
9.3.7
9.3.8
9.3.8.1
9.3.8.2
9.3.8.3
9.3.9
9.3.10
9.3.11

Mrouter Port.................................................................................................... 294
Multicast TCN Flooding .................................................................................. 295
IGMP v3 Snooping.......................................................................................... 297
IGMP Snooping Version ................................................................................. 297
Join Host Management................................................................................... 297
Immediate Block ............................................................................................. 298
Multicast VLAN Registration (MVR) ............................................................... 298
Enabling MVR................................................................................................. 299
MVR Group Address....................................................................................... 299
MVR IP Address ............................................................................................. 299
Send and Receive Port................................................................................... 300
Displaying MVR Configuration........................................................................ 300
IGMP Filtering and Throttling.......................................................................... 300
Creating IGMP Profile..................................................................................... 301
Policy of IGMP Profile..................................................................................... 301
Group Range of IGMP Profile......................................................................... 301
Applying IGMP Profile to the Filter Port.......................................................... 302
Max Number of IGMP Join Group .................................................................. 302
Displaying IGMP Snooping Table ................................................................... 303
PIM-SM (Protocol Independent Multicast-Sparse Mode) ............................... 303
PIM Common Configuration ........................................................................... 304
PIM-SM and Passive Mode ............................................................................ 305
DR Priority ...................................................................................................... 305
Filters of Neighbor in PIM ............................................................................... 306
PIM Hello Query ............................................................................................. 306
PIM Debug...................................................................................................... 307
BSR and RP ................................................................................................... 307
Bootstrap Router (BSR).................................................................................. 307
RP Information................................................................................................ 308
Static RP for Certain Group ............................................................................ 308
Enabling Transmission of Candidate RP Message ........................................ 309
KAT (Keep Alive Time) of RP.......................................................................... 310
Ignoring RP Priority......................................................................................... 310
PIM-SM Registration ...................................................................................... 310
Rate Limit of Register Message ..................................................................... 310
Registeration Suppression Time..................................................................... 310
Filters for Register Message from RP .............................................................311
Source Address of Register Message .............................................................311
Reachability for PIM Register Process ........................................................... 312
SPT Switchover .............................................................................................. 312
PIM Join/Prune Interoperability ...................................................................... 313
Cisco Router Interoperability .......................................................................... 313
Checksum of Full PIM Register Message ...................................................... 313
Candidate RP Message with Cisco BSR........................................................ 314
Excluding GenID Option ................................................................................. 314
PIM-SSM Group ............................................................................................. 315
PIM Snooping ................................................................................................. 315
Displaying PIM-SM Configuration................................................................... 316

10
10.1

IP Routing Protocol......................................................................................... 317
Border Gateway Protocol (BGP) .................................................................... 317

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.1.1
10.1.1.1
10.1.1.2
10.1.1.3
10.1.2
10.1.2.1
10.1.2.2
10.1.2.3
10.1.2.4
10.1.2.5
10.1.3
10.1.4
10.1.4.1
10.1.4.2
10.1.4.3
10.1.4.4
10.1.5
10.1.5.1
10.1.5.2
10.1.5.3
10.1.5.4
10.1.5.5
10.1.6
10.2
10.2.1
10.2.2
10.2.3
10.2.4
10.2.4.1
10.2.4.2
10.2.4.3
10.2.4.4
10.2.4.5
10.2.4.6
10.2.4.7
10.2.4.8
10.2.5
10.2.6
10.2.6.1
10.2.6.2
10.2.6.3
10.2.6.4
10.2.6.5
10.2.6.6
10.2.6.7
10.2.6.8
10.2.7
10.2.8
10.2.9
10.2.10
10.2.11

A50010-Y3-C150-2-7619

UMN:CLI

Basic Configuration .........................................................................................318
Configuration Type of BGP..............................................................................318
Enabling BGP Routing.....................................................................................318
Disabling BGP Routing....................................................................................319
Advanced Configuration ..................................................................................319
Summary of Path.............................................................................................320
Automatic Summarization of Path ...................................................................320
Multi-Exit Discriminator (MED) ........................................................................321
Choosing Best Path.........................................................................................321
Graceful Restart ..............................................................................................323
IP Address Family............................................................................................324
BGP Neighbor .................................................................................................325
Default Route...................................................................................................325
Peer Group ......................................................................................................325
Route Map .......................................................................................................326
Force Shutdown ..............................................................................................326
BGP Session Reset.........................................................................................327
Session Reset of All Peers ..............................................................................327
Session Reset of Peers within Particular AS...................................................328
Session Reset of Specific Route .....................................................................329
Session Reset of External Peer ......................................................................329
Session Reset of Peer Group..........................................................................330
Displaying and Managing BGP .......................................................................331
Open Shortest Path First (OSPF)....................................................................333
Enabling OSPF................................................................................................333
ABR Type Configuration ..................................................................................335
Compatibility Support ......................................................................................335
OSPF Interface................................................................................................335
Authentication Type .........................................................................................336
Authentication Key...........................................................................................336
Interface Cost ..................................................................................................337
Blocking Transmission of Route Information Database ..................................338
Routing Protocol Interval .................................................................................338
OSPF Maximum Transmission Unit (MTU) .....................................................340
OSPF Priority...................................................................................................340
OSPF Network Type........................................................................................341
Non-Broadcast Network ..................................................................................341
OSPF Area ......................................................................................................342
Area Authentication .........................................................................................342
Default Cost of Area ........................................................................................343
Blocking the Transmission of Routing Information Between Area ..................343
Not So Stubby Area (NSSA)............................................................................344
Area Range .....................................................................................................346
Shortcut Area...................................................................................................346
Stub Area .........................................................................................................347
Virtual Link .......................................................................................................347
Default Metric ..................................................................................................349
Graceful Restart Support.................................................................................349
Opaque-LSA Support ......................................................................................351
Default Route...................................................................................................351
Finding Period .................................................................................................352

15

UMN:CLI

16

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.12
10.2.13
10.2.14
10.2.15
10.2.16
10.2.17
10.2.18
10.2.18.1
10.2.18.2
10.2.18.3
10.2.18.4
10.3
10.3.1
10.3.2
10.3.3
10.3.4
10.3.5
10.3.6
10.3.7
10.3.8
10.3.9
10.3.9.1
10.3.9.2
10.3.9.3
10.3.10
10.3.11
10.3.12
10.3.13
10.3.14
10.3.15
10.3.16

External Routes to OSPF Network ................................................................. 353
OSPF Distance ............................................................................................... 354
Host Route...................................................................................................... 355
Passive Interface ............................................................................................ 355
Blocking Routing Information.......................................................................... 356
Summary Routing Information........................................................................ 356
OSPF Monitoring and Management ............................................................... 356
Displaying OSPF Protocol Information ........................................................... 357
Displaying Debugging Information.................................................................. 359
Limiting Number of Database ......................................................................... 359
Maximum Process of LSA .............................................................................. 360
Routing Information Protocol (RIP)................................................................. 361
Enabling RIP................................................................................................... 361
RIP Neighbor Router ...................................................................................... 362
RIP Version..................................................................................................... 363
Creating available Static Route only for RIP .................................................. 364
Redistributing Routing Information ................................................................. 364
Metrics for Redistributed Routes .................................................................... 366
Administrative Distance .................................................................................. 367
Originating Default Information....................................................................... 367
Routing Information Filtering .......................................................................... 367
Filtering Access List and Prefix List ................................................................ 368
Disabling the transmission to Interface .......................................................... 368
Offset List........................................................................................................ 368
Maximum Number of RIP Routes................................................................... 369
RIP Network Timer.......................................................................................... 369
Split Horizon.................................................................................................... 370
Authentication Key.......................................................................................... 370
Restarting RIP ................................................................................................ 371
UDP Buffer Size of RIP................................................................................... 371
Monitoring and Managing RIP ........................................................................ 372

11
11.1
11.2
11.3

System Software Upgrade.............................................................................. 373
General Upgrade ............................................................................................ 373
Boot Mode Upgrade ....................................................................................... 374
FTP Upgrade .................................................................................................. 377

12

Abbreviations .................................................................................................. 379

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Illustrations
Fig. 2.1
Fig. 3.1
Fig. 4.1
Fig. 4.2
Fig. 5.1
Fig. 5.2
Fig. 6.1
Fig. 6.2
Fig. 7.1
Fig. 7.2
Fig. 7.3
Fig. 7.4
Fig. 8.1
Fig. 8.2
Fig. 8.3
Fig. 8.4
Fig. 8.5
Fig. 8.6
Fig. 8.7
Fig. 8.8
Fig. 8.9
Fig. 8.10
Fig. 8.11
Fig. 8.12
Fig. 8.13
Fig. 8.14
Fig. 8.15
Fig. 8.16
Fig. 8.17
Fig. 8.18
Fig. 8.19
Fig. 8.20
Fig. 8.21
Fig. 8.22
Fig. 8.23
Fig. 8.24
Fig. 8.25
Fig. 8.26
Fig. 8.27
Fig. 8.28
Fig. 8.29
Fig. 8.30
Fig. 8.31
Fig. 8.32
Fig. 8.33
Fig. 8.34
Fig. 8.35
Fig. 8.36
Fig. 8.37

A50010-Y3-C150-2-7619

Network Structure with hiD 6615 S223/S323.................................................23
Software mode structure ................................................................................28
Process of 802.1x Authentication...................................................................64
Multiple Authentication Servers......................................................................65
hiD 6615 S223/S323 Interface .......................................................................73
Port Mirroring..................................................................................................81
Ping Test for Network Status ..........................................................................97
IP Source Routing ..........................................................................................97
Weighted Round Robin ................................................................................147
Weighted Fair Queuing ................................................................................148
Strict Priority Queuing ..................................................................................148
NetBIOS Filtering .........................................................................................155
Port-based VLAN .........................................................................................179
Example of QinQ Configuration ...................................................................184
QinQ Frame..................................................................................................184
In Case Packets Going Outside in Layer 2 environment .............................187
In Case External Packets Enter under Layer 2 environment (1) .................188
In Case External Packets Enter under Layer 2 environment (2) .................188
Link Aggregation...........................................................................................193
Example of Loop ..........................................................................................200
Principle of Spanning Tree Protocol .............................................................200
Root Switch ..................................................................................................201
Designated Switch .......................................................................................202
Port Priority...................................................................................................203
Port State......................................................................................................204
Alternate Port and Backup port ....................................................................205
Example of Receiving Low BPDU................................................................206
Convergence of 802.1d Network..................................................................207
Network Convergence of 802.1w (1)............................................................207
Network Convergence of 802.1w (2)............................................................208
Network Convergece of 802.1w (3)..............................................................208
Compatibility with 802.1d (1)........................................................................209
Compatibility with 802.1d (2)........................................................................209
CST and IST of MSTP (1) ............................................................................210
CST and IST of MSTP (2) ............................................................................211
Example of PVSTP.......................................................................................217
Root Guard...................................................................................................219
Example of Layer 2 Network Design in RSTP Environment ........................225
Example of Layer 2 Network Design in MSTP Environment........................226
VRRP Operation...........................................................................................227
VRRP Track..................................................................................................232
Rate Limit and Flood Guard .........................................................................236
DHCP Service Structure...............................................................................238
Example of DHCP Relay Agent....................................................................250
DHCP Option 82 Operation..........................................................................253
DHCP Server Packet Filtering......................................................................264
Ethernet Ring Protocol Operation in Failure State .......................................265
Ring Protection.............................................................................................266
Link Failure Recovery ..................................................................................266

17

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Fig. 8.38
Fig. 8.39
Fig. 9.1
Fig. 9.2
Fig. 9.3
Fig. 9.4
Fig. 9.5
Fig. 9.6
Fig. 9.7

18

Ring Recovery ............................................................................................. 267
Example of Stacking.................................................................................... 270
IGMP Snooping Configuration Network ...................................................... 278
PIM-SM Configuration Network................................................................... 278
IGMP Snooping and PIM-SM Configuration Network ................................. 279
IP Multicasting ............................................................................................. 290
RPT of PIM-SM ........................................................................................... 304
STP of PIM-SM............................................................................................ 304
In Case Multicast Source not Directly Connected to Multicast Group ........ 313

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Tables
Tab. 1.1
Tab. 1.2
Tab. 3.1
Tab. 3.2
Tab. 3.3
Tab. 3.4
Tab. 3.5
Tab. 3.6
Tab. 3.7
Tab. 3.8
Tab. 3.9
Tab. 3.10
Tab. 3.11
Tab. 3.12
Tab. 3.13
Tab. 6.1
Tab. 6.2
Tab. 6.3
Tab. 6.4
Tab. 7.1
Tab. 7.2
Tab. 7.3
Tab. 7.4
Tab. 8.1
Tab. 8.2
Tab. 8.3

A50010-Y3-C150-2-7619

Overview of Chapters.....................................................................................20
Command Notation of Guide Book ................................................................21
Main Commands of Privileged EXEC View Mode .........................................29
Main Commands of Privileged EXEC Enable Mode ......................................29
Main Commands of Global Configuration Mode ............................................30
Main Commands of Bridge Configuration Mode ............................................31
Main Commands of Rule Configuration Mode ...............................................31
Main Commands of DHCP Configuration Mode ............................................32
Main Commands of DHCP Option 82 Configuration Mode............................32
Main Commands of Interface Configuration Mode ........................................33
Main Commands of RMON Configuration Mode ...........................................33
Main Commands of Router Configuration Mode............................................34
Main Commands of VRRP Configuration Mode.............................................34
Main Commands of Route-map Configuration Mode.....................................35
Command Abbreviation..................................................................................38
World Time Zone ............................................................................................84
Options for Ping..............................................................................................95
Options for Ping for Multiple IP Addresses.....................................................96
Options for Tracing Packet Route ..................................................................98
Default 802.1p Priory-to-queue Map ............................................................149
ICMP Message Type ....................................................................................170
Mask Calculation of Default Value ...............................................................171
Options for Packet Dump .............................................................................176
Advantages and Disadvantages of Tagged VLAN .......................................183
STP Path-cost ..............................................................................................213
RSTP Path-cost............................................................................................213

19

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

1 Introduction
1.1

Audience
This manual is intended for SURPASS hiD 6615 S223/S323 single-board Fast Ethernet
switch operators and maintenance personnel for providers of Ethernet services. This
manual assumes that you are familiar with the following:
• Ethernet networking technology and standards
• Internet topologies and protocols
• Usage and functions of graphical user interfaces.

1.2

Document Structure
Tab. 1.1 briefly describes the structure of this document.
Chapter
1 Introduction

Introduces the overall information of the document.

2 System Overview

Introduces the hiD 6615 S223/S323 system. It also lists the features
of the system.

3 Command Line Interface (CLI)

Describes how to use the Command Line Interface (CLI).

4 System Connection and IP Address

Describes how to manage the system account and IP address.

5 Port Configuration

Describes how to configure the Ethernet ports.

6 System Environment

Describes how to configure the system environment and management functions.

7 Network Management

Describes how to configure the network management functions.

8 System Main Functions

Describes how to configure the system main functions.

9 IP Multicast.

Describes how to configure the IP multicast packets.

10 IP Routing Protocol.

Describes how to configure IP routing protocol.

12 Abbreviations

Tab. 1.1

20

Description

Lists all abbreviations and acronyms which appear in this document.

Overview of Chapters

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

1.3

UMN:CLI

Document Convention
This guide uses the following conventions to convey instructions and information.
Information

i

This information symbol provides useful information when using commands to configure
and means reader take note. Notes contain helpful suggestions or references.
Warning

!

1.4

This warning symbol means danger. You are in a situation that could cause bodily injury
or broke the equipment. Before you work on any equipment, be aware of the hazards involved with electrical circuitry and be familiar with standard practices for preventing accidents by making quick guide based on this guide.

Document Notation
The following table shows commands used in guide book. Please be aware of each
command to use them correctly.
Notation
a

Commands you should use as is.

NAME, PROFILE, VALUE, …

Variables for which you supply values.

PORTS

For entry this variable, see Section 5.1.

[]
<>
{}
|

Tab. 1.2

1.5

Description

Commands or variables that appear within square brackets [ ] are
optional.
Range of number that you can use.
A choice of required keywords appears in braces { }. You must select one.
Optional variables are separated by vertical bars |.

Command Notation of Guide Book

CE Declaration of Conformity
The CE declaration of the product will be fulfilled if the construction and cabling is undertaken in accordance with the manual and the documents listed there in, e.g. mounting instructions, cable lists where necessary account should be taken of project-specific documents.
Deviations from the specifications or unstipulated changes during construction, e.g. the
use of cable types with lower screening values can lead to violation of the CE requirements. In such case the conformity declaration is invalidated and the responsibility
passes to those who have caused the deviations.

A50010-Y3-C150-2-7619

21

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

1.6

GPL/LGPL Warranty and Liability Exclusion
The Siemens product, SURPASS hiD 6615, contains both proprietary software and “Open
Source Software”. The Open Source Software is licensed to you at no charge under the
GNU General Public License (GPL) and the GNU Lesser General Public License (LGPL).
This Open Source Software was written by third parties and enjoys copyright protection.
You are entitled to use this Open Source Software under the conditions set out in the GPL
and LGPL licenses indicated above. In the event of conflicts between Siemens license
conditions and the GPL or LGPL license conditions, the GPL and LGPL conditions shall
prevail with respect to the Open Source portions of the software.
The GPL can be found under the following URL:
http://www.gnu.org/copyleft/gpl.html
The LGPL can be found under the following URL:
http://www.gnu.org/copyleft/lgpl.html
In addition, if the source code to the Open Source Software has not been delivered with
this product, you may obtain the source code (including the related copyright notices) by
sending your request to the following e-mail address: opensrc@dasannetworks.com You
will, however, be required to reimburse Siemens for its costs of postage and copying.
Any source code request made by you must be sent within 3 years of your purchase of
the product. Please include a copy of your sales receipt when submitting your request.
Also please include the exact name and number of the device and the version number of
the installed software.
The use of Open Source Software contained in this product in any manner other than the
simple running of the program occurs at your own risk, that is, without any warranty
claims against Siemens. For more information about the warranties provided by the authors of the Open Source Software contained in this product, please consult the GPL and
LGPL.
You have no warranty claims against Siemens when a defect in the product is or couldhave been caused by changes made by you in any part of the software or its configuration. In addition, you have no warranty claims against Siemens when the Open Source
Software infringes the intellectual property rights of a third party.
Siemens provides no technical support for either the software or the Open Source Software contained therein if either has been changed.

22

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

2 System Overview
SURPASS hiD 6615 L3 switch is typical Layer 3 switch intended to construct large-scale
network, which provides aggregated function of upgraded LAN network consisted of typical Ethernet switch. Layer 3 switch can connect to PC, web server, LAN equip-ment,
backbone equipment, or another switch through various interfaces.
SURPASS hiD 6615 L3 switch supports routing based on VLAN, IP multicasting, and provides Layer 3 switching service such as IP packet filtering or DHCP.
The Fig. 2.1 shows network construction with using hiD 6615 S223/S323.

Fig. 2.1

A50010-Y3-C150-2-7619

Network Structure with hiD 6615 S223/S323

23

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

2.1

System Features
Main features of hiD 6615 S223/S323, having Fast Ethernet switch and Layer 3 switching
function which supports both Ethernet switching and IP routing, are follow.

!

Routing functionalities such as RIP, OSPF, BGP and PIM-SM are only available for hiD
6615 S323. (Unavailable for hiD 6615 S223)

VLAN
Virtual Local Area Network (VLAN) is made by dividing one network into several logical
networks. Packet can not be transmitted and received between different VLANs. Therefore it can prevent unnecessary packets accumulating and strengthen security. The hiD
6615 S223/S323 recognizes 802.1q tagged frame and supports maximum 4096 VLANs
and Port based, Protocol based, MAC based VLANs.

Quality of Service (QoS)
For the hiD 6615 S223/S323, QoS-based forwarding sorts traffic into a number of classes
and marks the packets accordingly. Thus, different quality of service is providing to each
class, which the packets belong to. The QoS capabilities enable network managers to
protect mission-critical applications and support differentiated level of bandwidth for managing traffic congestion. The hiD 6615 S223/S323 support ingress and egress (shaping)
rate limiting, and different scheduling type such as SP (Strict Priority), WRR (Weighted
Round Robin) and WFQ (Weighted Fair Queuing).

Multicasting
Because broadcasting in a LAN is restricted if possible, multicasting could be used instead of broadcasting by forwarding multicast packets only to the member hosts who
joined multicast group. The hiD 6615 S223/S323 provides IGMP V2, IGMP snooping and
PIM-SM for host membership management and multicast routing.

SNMP
Simple Network Management Protocol (SNMP) is to manage Network Elements using
TCP/IP protocol. The hiD 6615 S223/S323 supports SNMP version 1, 2, 3 and Remote
Monitoring (RMON). Network operator can use MIB also to monitor and manage the hiD
6615 S223/S323.

IP Routing
The hiD 6615 S323 is Layer 3 switch, which has routing table and IP address as router.
Therefore, it supports static routing, RIP v1/v2, OSPF v2 and BGP v4 for unicast routing.

24

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

DHCP
The hiD 6615 S223/S323 supports DHCP (Dynamic Host Control Protocol) Server that
automatically assigns IP address to clients accessed to network. That means it has IP
address pool, and operator can effectively utilize limited IP source by leasing temporary
IP address. In layer 3 network, DHCP request packet can be sent to DHCP server via
DHCP relay and Option 82 function.

Spanning Tree Protocol (STP)
To prevent loop and preserve backup route in layer 2 network, the hiD 6615 S223/S323
supports STP (802.1D). Between STP enabled switches, a root bridge is automatically
selected and the network remains in tree topology. But the recovery time in STP is very
slow (about 30 seconds), RSTP (Rapid Spanning Tree Protocol) is also provided. IEEE
802.1W defines the recovery time as 2 seconds. If there is only one VLAN in the network,
traditional STP works. However, in more than one VLAN network, STP cannot work per
VLAN. To avoid this problem, the hiD 6615 S223/S323 supports Multiple Spanning Tree
Protocol (MSTP).

Link Aggregation (Trunking)
The hiD 6615 S223/S323 aggregates several physical interfaces into one logical port
(aggregate port). Port trunk aggregates interfaces with the standard of same speed, same
duplex mode, and same VLAN ID. According to IEEE 802.3ad, the hiD 6615 S223/S323
can configure maximum 8 aggregate ports and up to 12 trunk groups.

LACP
The hiD 6615 S223/S323 supports Link Aggregation Control Protocol (LACP), complying
with IEEE 802.3ad, which aggregates multiple links of equipments to use more enlarged
bandwidth.

System Management based on CLI
It is easy for users who administer system by using telnet or console port to configure the
functions for system operating through CLI. CLI is easy to configure the needed functions
after looking for available commands by help menu different with UNIX.

Broadcast Storm Control
Broadcast storm control is, when too much of broadcast packets are being transmitted to
network, a situation of network timeout because the packets occupy most of transmit capacity. The hiD 6615 S223/S323 supports broadcast and multicast storm control, which
disuses flooding packet, that exceed the limit during the time configured by user.

A50010-Y3-C150-2-7619

25

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

RADIUS and TACACS+
hiD 6615 S223/S323 supports client authentication protocol, that is RADIUS(Remote Authentication Dial-In User Service) and TACACS+(Terminal Access Controller Access Control System Plus). Not only user IP and password registered in switch but also authentication through RADIUS server and TACACS+ server are required to access. Therefore, security of system and network management is strengthened.

26

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

3 Command Line Interface (CLI)
This chapter describes how to use the Command Line Interface (CLI) which is used to
configure the hiD 6615 S223/S323 system.
•
•

3.1

Command Mode
Useful Tips

Command Mode
You can configure and manage the hiD 6615 S223/S323 by console terminal that is installed on user’s PC. For this, use the CLI-based interface commands. Connect RJ45-toDB9 console cable to the hiD 6615 S223/S323.
This chapter explains how CLI command mode is organized before installing. CLI
command mode is consisted as follow:
• Privileged EXEC View Mode
• Privileged EXEC Enable Mode
• Global Configuration Mode
• Bridge Configuration Mode
• Rule Configuration Mode
• DHCP Configuration Mode
• DHCP Option 82 Configuration Mode
• Interface Configuration Mode
• RMON Configuration Mode
• Router Configuration Mode
• VRRP Configuration Mode
• Route-Map Configuration Mode

A50010-Y3-C150-2-7619

27

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Fig. 3.1 shows hiD 6615 S323 software mode structure briefly.

Fig. 3.1

28

Software mode structure

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

3.1.1

UMN:CLI

Privileged EXEC View Mode
When you log in to the switch, the CLI will start with Privileged EXEC View mode that is a
read-only mode. In this mode, you can see a system configuration and information with
several commands.
Tab. 3.1 shows main command of Privileged EXEC View mode.
Command
enable

Opens Privileged EXEC Enable mode.

exit

Logs out the switch.

show

Shows a system configuration and information.

Tab. 3.1

3.1.2

Description

Main Commands of Privileged EXEC View Mode

Privileged EXEC Enable Mode
To configure the switch, you need to open Privileged EXEC Enable mode with the enable
command, then the system prompt will changes from SWITCH> to SWITCH#.
Command

Mode
View

enable

Description
Opens Privileged EXEC Enable mode.

You can set a password to Privileged EXEC Enable mode to enhance security. Once setting a password, you should enter a configured password, when you open Privileged
EXEC Enable mode.
Tab. 3.2 shows main commands of Privileged EXEC Enable mode.
Command
clock

Inputs time and date in system.

configure terminal

Opens Configuration mode.

telnet

Connects to another device through telnet.

terminal length

Configures the number of lines to be displayed in screen.

traceroute

Traces transmission path of packet.

where

Finds users accessed to system through telnet.

Tab. 3.2

3.1.3

Description

Main Commands of Privileged EXEC Enable Mode

Global Configuration Mode
In Global Configuration mode, you can configure general functions of the system. You can
also open another configuration mode from this mode.
To open Global Configuration mode, enter the configure terminal command, and then
the system prompt will be changed from SWITCH# to SWITCH(config)#.
Command
configure terminal

A50010-Y3-C150-2-7619

Mode
Enable

Description
Opens Global Configuration mode from Privileged
EXEC Enable mode.

29

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Tab. 3.3 shows a couple of important main commands of Global Configuration mode.
Command
access-list

Configures policy to limit routing information on the standard of AS.

arp

Registers IP address and MAC address in ARP table.

bgp

Helps BGP configuration.

bridge

Opens Bridge Configuration mode.

copy

Makes a backup file for the configuration of the switch.

dot1x

Configures various functions of 802.1x daemon.

end

Closes current mode and returns to User EXEC mode.

exit

Closes current mode and returns to previous mode.

hostname

Changes host name of the switch.

exec-timeout

Configures auto-logout function.

fan

Configures fan operation

interface

Opens Interface Configuration mode.

ip

Configures various functions of the interface.

passwd

Changes a system password.

qos

Configures QoS.

restore factory-defaults

Restores the default configuration of the switch.

rmon-alarm

Opens Rmon-alarm configuration mode.

rmon-event

Opens Rmon-event configuration mode.

rmon-history

Opens Rmon-history configuration mode.

route-map

Opens Route-map Configuration mode.

router

Opens Router Configuration mode.(OSPF. RIP, VRRP, PIM, BGP)

snmp

Configures SNMP.

sntp

Configures SNTP

syslog

Configures syslog.

time-zone

Configures time zone.

Tab. 3.3

3.1.4

Description

Main Commands of Global Configuration Mode

Bridge Configuration Mode
In Bridge Configuration mode, you can configure various Layer 2 functions such as VLAN,
STP, LACP, EFM OAM, etc.
To open Bridge Configuration mode, enter the bridge command, then the system prompt
will be changed from SWITCH(config)# to SWITCH(bridge)#.
Command
bridge

30

Mode
Global

Description
Opens Bridge Configuration mode.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Tab. 3.4 shows a couple of main commands of Bridge Configuration mode.
Command
auto-reset

Configures the system for automatic rebooting

dhcp-server-filter

Configures packet filtering of DHCP server.

erp

Configures ERP function

lacp

Configures LACP function.

lldp

Configures LLDP function

mac

Manages MAC address

mac-flood-guard

Configures mac-flood-guard.

mirror

Configures mirroring function.

oam

Configures EFM-OAM protocol

port

Sets port configuration

stp

Configures Spanning Tree Protocol

trunk

Configures trunk-function.

vlan

Configures VLAN function.

Tab. 3.4

3.1.5

Description

Main Commands of Bridge Configuration Mode

Rule Configuration Mode
You can open Rule Configuration mode using the command, rule NAME create, on
Global Configuration mode.
If you open Rule Configuration mode, the system prompt is changed from
SWITCH(config)# to SWITCH(config-rule[name])#.
Command
rule NAME create

Mode
Global

Description
Opens Rule Configuration mode.

On the Rule Configuration mode, it is possible to configure the condition and operational
method for the packets to which the rule function is applied.
Tab. 3.5 shows a couple of important main commands of Rule Configuration mode.
Command

Description

apply

Configures rule configuration and applies it to the switch.

mac

Configures a packet condition by MAC address.

match

Configures an operational condition which meets the packet condition.

port

Configures a packet condition by port number.

priority

Configures the priority for rule.

vlan

Configures VLAN.

Tab. 3.5

A50010-Y3-C150-2-7619

Main Commands of Rule Configuration Mode

31

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

3.1.6

DHCP Configuration Mode
To open DHCP Configuration mode, use the command, ip dhcp pool POOL, on Global
Configuration mode as follow. Then the prompt is changed from SWITCH(config)# to
SWITCH(config-dhcp[POOL])#.
Command
ip dhcp pool POOL

Mode
Global

Description
Opens DHCP Configuration mode to configure DHCP.

DHCP Configuration mode is to configure range of IP address used in DHCP server,
group in subnet, and default gateway of subnet.
Command
default-router

Configures a default gateway of subnet.

dns-server

Configures DNS server.

range

Configures a range of IP address used in DHCP server.

subnet

Configures a subnet

Tab. 3.6

3.1.7

Description

Main Commands of DHCP Configuration Mode

DHCP Option 82 Configuration Mode
To open DHCP Option 82 Configuration mode, use the command, ip dhcp option82, on
Global Configuration mode as follow. Then the prompt is changed from SWITCH(config)#
to SWITCH(config-opt82)#.
Command
ip dhcp option82

Mode
Global

Description
Opens DHCP Option 82 Configuration mode for DHCP
option 82 configuration.

On DHCP Option 82 Configuration mode, configure a range of IP address used in DHCP
server and designate the group in subnet and configure default gateway of the subnet.
Tab. 3.7 is the main commands of DHCP Option 82 Configuration mode of hiD 6615
S223/S323.
Command
policy

Configures a rule for option 82 packet.

remote-id

Configures a remote ID.

system-remote-id

Configures the remote ID of the system.

system-circuit-id

Configures the circuit ID of the system.

Tab. 3.7

32

Description

Main Commands of DHCP Option 82 Configuration Mode

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

3.1.8

UMN:CLI

Interface Configuration Mode
To open Interface Configuration mode, enter the command, interface INTERFACE, on
Global Configuration mode, and then the prompt is changed from SWITCH(config)# to
SWITCH(config-if)#.
Command

Mode

interface INTERFACE

Global

Description
Opens Interface Configuration mode.

Interface Configuration mode is to assign IP address in Ethernet interface and to activate
or deactivate interface.
Tab. 3.8 shows a couple of main commands of Interface Configuration mode.
Command
bandwidth

Configures bandwidth used to make routing information.

description

Makes description of interface.

ip

Assigns IP address.

shutdown

Deactivates interface.

mtu

Sets MTU value to interface.

Main Commands of Interface Configuration Mode

Tab. 3.8

3.1.9

Description

RMON Configuration Mode
To open RMON-Alarm Configuration mode, enter rmon-alarm <1-65534>. To open
RMON-Event Configuration mode, input rmon-event <1-65534>. And to open RMONHistory Configuration mode, enter rmon-history <1-65534>.
Tab. 3.9 shows a couple of important main commands of RMON Configuration mode.
Command

Description

active

Enables each RMON configuration.

community

Configures password for trap message transmission right.

description

Describes the RMON event.
Configures to generate RMON alarm when object is less than config-

falling-event

ured threshold.

falling-threshold

Shows the subject, which configures each RMON and uses related

owner

information.
Configures to generate RMON alarm when object is more than config-

rising-event

ured threshold.

requested-buckets

Tab. 3.9

A50010-Y3-C150-2-7619

Defines the falling threshold

Defines a bucket count for the interval.

Main Commands of RMON Configuration Mode

33

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

3.1.10

Router Configuration Mode
To open Router Configuration mode, use the following command. The system prompt is
changed from SWITCH(config)# to SWITCH(config-router)#.

!

Command

Mode

router IP-PROTOCOL

Global

Description
Opens Router Configuration mode.

Routing functionalities such as RIP, OSPF, BGP, VRRP and PIM-SM are only available for
hiD 6615 S323. (Unavailable for hiD 6615 S223)
According to routing protocol way, Router Configuration mode is divided into BGP, RIP,
and OSPF. They are used to configure each IP routing protocol.
Tab. 3.10 shows a couple of main commands of Router Configuration mode.
Command
distance

Configures distance value to find better route.

neighbor

Configures neighbor router.

network

Configures network to operate each routing protocol.

redistribute

Registers transmitted routing information to another router’s table.

Tab. 3.10

3.1.11

Description

Main Commands of Router Configuration Mode

VRRP Configuration Mode
To open VRRP Configuration mode, use the following command. The system prompt is
changed from SWITCH(config)# to SWITCH(config-router)#.
Command
router vrrp INTERFACE GROUPID

Mode

Description

Global

Opens VRRP Configuration mode.

Tab. 3.11 shows a couple of main commands of Router Configuration mode.
Command
associate

Configures associated IP address same with virtual router.

authentication

Configures password of virtual router group.

preempt

Activates/deactivates preempt.

track

Configures VRRP track.

vip-access

Configures the function of accessing associated IP address.

vr-priority

Assigns priority to virtual router.

vr-timers

Tab. 3.11

34

Description

Configures advertisement time, which means the interval that master
router distributes its information to another virtual router.

Main Commands of VRRP Configuration Mode

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

3.1.12

UMN:CLI

Route-Map Configuration Mode
To open Route-map Configuration mode, use the following command. The prompt is
changed from SWITCH(config)# to SWITCH(config-route-map)#.
Command
route-map NAME {permit | deny}
<1-65535>

Mode
Global

Description
Opens Route-map Configuration mode.

On Route-map Configuration mode, you can configure the place where information is
from and sent in routing table.
Tab. 3.12 shows a couple of important main commands of Route-map Configuration
mode.
Command

Description

match

Transmits routing information to specified place.

set

Configures router address and distance.

Tab. 3.12

A50010-Y3-C150-2-7619

Main Commands of Route-map Configuration Mode

35

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

3.2

Useful Tips
This section provides useful functions for user’s convenience while using CLI commands.
They are as follow.
• Listing Available Commands
• Calling Command History
• Using Abbreviation
• Using Command of Privileged EXEC Enable Mode
• Exit Current Command Mode

3.2.1

Listing Available Commands
To list available commands, input question mark . When you input the question mark
 in each command mode, you can see available commands used in this mode and
variables following after the commands.
The following is the available commands on Privileged EXEC Enable mode of the hiD
6615 S223/S323.
SWITCH# ?
Exec commands:
clear

Reset functions

clock

Manually set the system clock

configure

Enter configuration mode

copy

Copy from one file to another

debug

Debugging functions (see also 'undebug')

disconnect
enable

Disconnect user connection
Turn on privileged mode command

erase

Erase saved configuration

exit

End current mode and down to previous mode

halt

Halt process

help

Description of the interactive help system

no

Negate a command or set its defaults

ping

Send echo messages

quote

Execute external command

rcommand

Management stacking node

release

Release the acquired address of the interface

reload

Reload the system

renew

Re-acquire an address for the interface

restore

Restore configurations

show

Show running system information

ssh

Configure secure shell

tech-support

Technical Supporting Function for Diagnosis System

(ommitted)
SWITCH#

i

Question mark  will not be seen in the screen and you do not need to press
 key to display commands list.

If you need to find out the list of available commands of the current mode in detail, use
the following command.

36

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Command

Mode

Description
Shows available commands of the current mode.

show list
All
show cli

Shows available commands of the current mode with
tree structure.

The following is an example of displaying list of available commands of Privileged EXEC
Enable mode.
SWITCH# show list
clear arp
clear arp IFNAME
clear ip bgp *
clear ip bgp * in
clear ip bgp * in prefix-filter
clear ip bgp * ipv4 (unicast|multicast) in
clear ip bgp * ipv4 (unicast|multicast) in prefix-filter
clear ip bgp * ipv4 (unicast|multicast) out
clear ip bgp * ipv4 (unicast|multicast) soft
clear ip bgp * ipv4 (unicast|multicast) soft in
clear ip bgp * ipv4 (unicast|multicast) soft out
-- more –

i

Press the  key to skip to the next list.
In case of the hiD 6615 S223/S323 installed command shell, you can find out commands
starting with specific alphabet. Input the first letter and question mark without space. The
following is an example of finding out the commands starting “s” in Privileged EXEC Enable mode of hiD 6615 S223/S323.
SWITCH# s ?
show

Show running system information

ssh
Configure secure shell
SWITCH# s

Also, it is possible to view variables you should input following after commands. After inputting the command you need, make one space and input question mark. The following
is an example of viewing variables after the command, write. Please note that you must
make one space after inputting.
SWITCH# write ?
memory

Write to NV memory

terminal

Write to terminal

SWITCH# write

3.2.2

Calling Command History
In case of installed command shell, you do not have to enter repeated command again.
When you need to call command history, use this arrow key <↑>. When you press the arrow key, the latest command you used will be displayed one by one.
The following is an example of calling command history after using several commands.

A50010-Y3-C150-2-7619

37

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

After using these commands in order: show clock → configure terminal → interface 1
→ exit, press the arrow key <↑> and then you will see the commands from latest one:
exit → interface 1 → configure terminal → show clock.
SWITCHconfig)# exit
SWITCH# show clock
Mon, 5 Jan 1970 23:50:12 GMT+0000
SWITCH# configure terminal
SWITCH(config)# interface 1
SWITCH(config-if)# exit
SWITCH(config)# exit
SWITCH# (press the arow key ↑)
↓
SWITCH# exit (arrow key ↑)
↓
SWITCH# interface 1 (arrow key ↑)
↓
SWITCH# configure terminal (arrow key ↑)
↓
SWITCH# show clock (arrow key ↑)

The hiD 6615 S223/S323 also provides the command that shows the commands used
before up to 100 lines.
Command

Mode
Enable

show history

3.2.3

Description
Shows a command history.

Using Abbreviation
Most of the commands can be used also with abbreviated form. The following table
shows some examples of abbreviated commands.
Command
clock

cl

exit

ex

show

sh

configure terminal

con te

Tab. 3.13

3.2.4

Abbreviation

Command Abbreviation

Using Command of Privileged EXEC Enable Mode
You can execute the commands of Privileged EXEC Enable mode as show, ping, telnet,
traceroute, and so on regardless of which mode you are located on.
To execute the commands of Privileged EXEC Enable mode on another mode, use the
following command.
Command
do COMMAND

38

Mode
All

Description
Executes the commands of Privileged EXEC mode.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

3.2.5

UMN:CLI

Exit Current Command Mode
To exit to the previous command mode, use the following command.
Command
exit
end

!

Mode
All

Description
Exits to the previous command mode.
Exits to Privileged EXEC enable mode.

If you use the command, exit, on Privileged EXEC View mode or Privileged EXEC Enable mode, you will be logged out!

A50010-Y3-C150-2-7619

39

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4 System Connection and IP Address
4.1

System Connection
After installing switch, the hiD 6615 S223/S323 is supposed to examine that each port is
rightly connected to network and management PC. And then, user connects to system to
configure and manage the hiD 6615 S223/S323. This section provides instructions how to
change password for system connection, connect to system through telnet as the following order.
• System Login
• Password for Privileged EXEC Mode
• Changing Login Password
• Management for System Account
• Limiting Number of User
• Telnet Access
• Auto Log-out
• System Rebooting

4.1.1

System Login
After installing the hiD 6615 S223/S323, finally make sure that each port is correctly connected to PC for network and management. And then, turn on the power and boot the
system as follow.
Step 1
When you turn on the switch, booting will be automatically started and login prompt will
be displayed.
SWITCH login:

Step 2
When you enter login ID at the login prompt, password prompt will be displayed. And enter password to open Privileged EXEC View mode. By default setting, login ID is configured as admin and it is possible to access without password.
SWITCH login: admin
Password:
SWITCH>

Step 3
In Privileged EXEC View mode, you can check only the configuration for the switch. To
configure and manage the switch, you should begin Privileged EXEC Enable mode. The
following is an example of beginning Privileged EXEC Enable mode.
SWITCH> enable
SWITCH#

40

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.1.2

UMN:CLI

Password for Privileged EXEC Mode
You can configure a password to enhance the security for Privileged EXEC Enable mode.
To configure a password for Privileged EXEC Enable mode, use the following command.
Command
passwd enable PASSWORD

Mode

Configures a password to begin Privileged EXEC EnGlobal

able mode.
Configures an encrypted password.

passwd enable 8 PASSWORD

!

Description

password enable does not support encryption at default value. Therefore, it shows the
string (or password) as it is when you use the show running-config command. In this
case, the user’s password shown to everyone and has insecure environment.
To encrypt the password which will be shown at running-config, you should use the service password-encryption command. And to represent the string (password) is encrypted, input 8 before the encrypted string.
When you use the password enable command with 8 and “the string”, you will make into
Privileged EXEC Enable mode with the encrypted string. Therefore, to log in the system,
you should do it with the encrypted string as password that you configured after 8. In
short, according to using the 8 option or not, the next string is encrypted or not.
The following is an example of configure the password in Privileged EXEC Enable mode
as testpassword.
SWITCH# configure terminal
SWITCH(config)# passwd enable testpassword
SWITCH(config)#

The following is an example of accessing after configuring the password.
SWITCH login: admin
Password:
SWITCH > enable
Password:
SWITCH#

To delete the configured password, use the following command.
Command
no passwd enable

Mode
Global

Description
Deletes the password.

The created password can be displayed with the command, show running-config. To
encrypt the password not to be displayed, use the following command.
Command
service password-encryption

A50010-Y3-C150-2-7619

Mode
Global

Description
Encrypts system password.

41

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To disable password encryption, use the following command.

4.1.3

Command

Mode

no service password-encryption

Global

Description
Disables password encryption.

Changing Login Password
To configure a password for created account, use the following command.
Command
passwd [NAME]

Mode
Global

Description
Configures a password for created account.

The following is an example of changing password.
SWITCH(config)# passwd Siemens
Changing password for Siemens
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
Enter new password:junior95
Re-enter new password:junior95
Password changed.
SWITCH(config)#

!

4.1.4

4.1.4.1

The password you are entering won’t be seen in the screen, so please be careful not to
make mistake.

Management for System Account

Creating System Account
For the hiD 6615 S223/S323, the administrator can create a system account. In addition,
it is possible to set the security level from 0 to 15 to enhance the system security.
To create a system account, use the following command.
Command

Mode

Creates a system account.

user add NAME DESCRIPTION
user add NAME level <0-15>
DESCRIPTION

i

42

Description

Global

Creates a system account with a security level.

The account of level 0 to level 14 without any configuring authority only can use exit and
help in Privileged EXEC View mode and cannot access to Privileged EXEC Enable mode.
The account with the highest level 15 has a read-write authority.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To delete the created account, use the following command.
Command
user del NAME

Mode
Global

Description
Delete the created account.

To display the created account, use the following command.
Command

Enable/Global

show user

4.1.4.2

Mode

Description
Shows the created account.

Configuring Security Level
For the hiD 6615 S223/S323, it is possible to configure the security level from 0 to 15 for
a system account. The level 15, as the highest level, has a read-write authority. The administrator can configure from level 0 to level 14. The administrator decides which level
user uses which commands in which level. As the basic right from level 0 to level 14, it is
possible to use exit and help command in Privileged EXEC Enable mode and it is not
possible to access to Privileged EXEC Enable mode.
To define the security level and its authority, use the following command.
Command

Mode

Description

privilege bgp level <0-15>

Uses the specific command of BGP Configuration mode

{COMMAND | all}

in the level.

privilege bridge level <0-15>

Uses the specific command of Bridge Configuration

{COMMAND | all}

mode in the level.

privilege configure level <0-15>

Uses the specific command of Global Configuration

{COMMAND | all}

mode in the level.

privilege dhcp-option82 level

Uses the specific command of DHCP Option 82 Con-

<0-15> {COMMAND | all}

figuration mode in the level.

privilege dhcp-pool level <0-15>

Uses the specific command of DHCP Configuration

{COMMAND | all}

mode in the level.

privilege dhcp-class level

Uses the specific command of DHCP Option 82 Con-

<0-15> {COMMAND | all}

Global

figuration mode in the level.

privilege dhcp-pool-class level

Uses the specific command of DHCP Configuration

<0-15> {COMMAND | all}

mode in the level.

privilege enable level <0-15>

Uses the specific command of Privileged EXEC mode

{COMMAND | all}

in the level.

privilege interface level <0-15>

Uses the specific command of Interface Configuration

{COMMAND | all}

mode in the level.

privilege ospf level <0-15>

Uses the specific command of OSPF Configuration

{COMMAND | all}

mode in the level.

privilege pim level <0-15>

Uses the specific command of PIM Configuration mode

{COMMAND | all}

in the level.

privilege rip level <0-15>

Uses the specific command of RIP Configuration mode

{COMMAND | all}

in the level.

A50010-Y3-C150-2-7619

43

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode

Description

privilege rmon-alarm level
<0-15> {COMMAND | all}

Uses the specific command of RMON Configuration

privilege rmon-event level

mode in the level.

<0-15> {COMMAND | all}
privilege rmon-history level

Uses the specific command of RMON Configuration

<0-15> {COMMAND | all}

mode in the level.

privilege route-map level
<0-15> {COMMAND | all}

Global

Uses the specific command of Route-map Configuration mode in the level.

privilege rule level <0-15>

Uses the specific command of Rule Configuration mode

{COMMAND | all}

in the level.

privilege view level <0-15>

Uses the specific command of User EXEC mode in the

{COMMAND | all}

level.

privilege vrrp level <0-15>

Uses the specific command of VRRP Configuration

{COMMAND | all}

mode in the level.

The commands that are used in low level can be also used in the higher level. For example, the command in level 0 can be used in from level 0 to level 14.
The commands should be input same as the displayed commands by show list. Therefore, it is not possible to input the commands in the bracket separately.
SWITCH# show list
clear arp-inspection mapping counter
clear arp-inspection statistics
clear cpu statistics (PORTS|)
clear ip bgp *
clear ip bgp * in
clear ip bgp * in prefix-filter
clear ip bgp * ipv4 (unicast|multicast) in
clear ip bgp * ipv4 (unicast|multicast) in prefix-filter
clear ip bgp * ipv4 (unicast|multicast) out
clear ip bgp * ipv4 (unicast|multicast) soft
clear ip bgp * ipv4 (unicast|multicast) soft in
clear ip bgp * ipv4 (unicast|multicast) soft out
clear ip bgp * out
clear ip bgp * soft
clear ip bgp * soft in
clear ip bgp * soft out
clear ip bgp * vpnv4 unicast in
clear ip bgp * vpnv4 unicast out
--More-(Omitted)

It is not possible to input clear ip bgp * ipv4 unicast in. You should input like clear ip
bgp * ipv4 {unicast | multicast} in.
The commands starting with the same character are applied by inputting only the starting
commands. For example, if you input show, all the commands starting with show are
applied.

44

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To delete a configured security level, use the following command.
Command

Mode

Description
Deletes all configured security levels.

no privilege
no privilege bgp level <0-15>
{COMMAND | all}
no privilege bridge level <0-15>
{COMMAND | all}
no privilege configure level
<0-15> {COMMAND | all}
no privilege dhcp-option82 level
<0-15> {COMMAND | all}
no privilege dhcp-pool level
<0-15> {COMMAND | all}
no privilege dhcp-class level
<0-15> {COMMAND | all}
no privilege dhcp-pool-class
level <0-15> {COMMAND | all}
no privilege enable level <0-15>
{COMMAND | all}
no privilege interface level
<0-15> {COMMAND | all}
no privilege ospf level <0-15>
{COMMAND | all}

Global

Delete a configured security level on each mode.

no privilege pim level <0-15>
{COMMAND | all}
no privilege rip level <0-15>
{COMMAND | all}
no privilege rmon-alarm level
<0-15> {COMMAND | all}
no privilege rmon-event level
<0-15> {COMMAND | all}
no privilege rmon-history level
<0-15> {COMMAND | all}
no privilege route-map level
<0-15> {COMMAND | all}
no privilege rule level <0-15>
{COMMAND | all}
no privilege view level <0-15>
{COMMAND | all}
no privilege vrrp level <0-15>
{COMMAND | all}

A50010-Y3-C150-2-7619

45

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To display a configured security level, use the following command.
Command
show privilege

Mode

Description

View

Shows a configured security level.

Enable
show privilege now

Global

Shows a security level of current mode.

The following is an example of creating the system account test0 having a security level
10 and test1 having a security level 1 without password.
SWITCH(config)# user add test0 level 0 level0user
Changing password for test0
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
Enter new password:(Enter)
Bad password: too short.
Warning: weak password (continuing).
Re-enter new password: (Enter)
Password changed.
SWITCH(config)# user add test1 level 1 level1user
Changing password for test1
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
Enter new password: (Enter)
Bad password: too short.
Warning: weak password (continuing).
Re-enter new password: (Enter)
Password changed.
SWITCH(config)# show user
====================================================
User name

Description

Level

====================================================
test0

level0user

0

test1

level1user

1

SWITCH(config)#

The following is an example of configuring an authority of the security level 0 and 1.
SWITCH(config)# privilege view level 0 enable
SWITCH(config)# privilege enable level 0 show
SWITCH(config)# privilege enable level 1 configure terminal
SWITCH(config)# show privilege
Command Privilege Level Configuration
----------------------------------------------Node

All

Level

Command

EXEC(ENABLE)

1

configure terminal

EXEC(VIEW)

0

enable

EXEC(ENABLE)

0

show

3 entry(s) found.
SWITCH(config)#

In the above configuration, as level 0, it is possible to use only show command in Privi-

46

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

leged EXEC Enable mode; however as level 1, it is possible to use not only the commands in level 1 but also time configuration commands in Privileged EXEC Enable mode
and accessing commands to Global Configuration mode.

4.1.5

Limiting Number of User
For hiD 6615 S223/S323, you can limit the number of user accessing the switch through
both console port and telnet. In case of using the system authentication with RADIUS or
TACACS+, the configured number includes the number of user accessing the switch via
the authentication server.
To set the number of user accessing the switch, use the following command.
Command
login connect <1-8>

4.1.6

Mode
Global

Description
Sets the number of user accessing the switch.
Default: 8

Telnet Access
To connect to the host through telnet at remote place, use the following command.

!

Command

Mode

telnet DESTINATION [TCP-PORT]

Enable

Description
Connects to a remote host.
DESTINATION: IP address or host name

In case of telnet connection, you should wait for [OK] message, when you save a system
configuration. Otherwise, all changes will be deleted when the telnet session is disconnected.
SWITCH# write memory
[OK]
SWITCH#

The system administrator can disconnect users connected from remote place. To disconnect a user connected through telnet, use the following command.
Command
disconnect TTY-NUMBER

Mode
Enable

Description
Disconnects a user connected through telnet.

The following is an example of disconnecting a user connected from a remote place.
SWITCH# where
admin at from console for 4 days 22 hours 15 minutes 24.88 seconds
admin at ttyp0 from 10.0.1.4:1670 for 4 days 17 hours 53 minutes 28.76 seconds
admin at ttyp1 from 147.54.140.133:49538 for 6 minutes 34.12 seconds
SWITCH# disconnect ttyp0
SWITCH# where
admin at from console for 4 days 22 hours 15 minutes 34.88 seconds
admin at ttyp1 from 147.54.140.133:49538 for 6 minutes 44.12 seconds
SWITCH#

A50010-Y3-C150-2-7619

47

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.1.7

Auto Log-out
For security reasons of the hiD 6615 S223/S323, if no command is entered within the
configured inactivity time, the user is automatically logged out of the system. Administrator can configure the inactivity timer.
To enable auto-logout function, use the following command.
Command

Mode

Description
Enables auto log-out.

exec-timeout <1-35791> [<0-59>]

Global

1-35791: time unit in minutes (by default 10 minutes)
0-59: time unit in seconds
Disables auto log-out.

exec-timeout 0

To display a configuration of auto-logout function, use the following command.
Command
show exec-timeout

Mode
Enable
Global

Description
Shows a configuration of auto-logout function.

The following is an example of configuring auto-logout function as 60 seconds and viewing the configuration.
SWITCH(config)# exec-timeout 60
SWITCH(config)# show exec-timeout
Log-out time : 60 seconds
SWITCH(config)#

4.1.8

4.1.8.1

System Rebooting

Manual System Rebooting
When installing or maintaining the system, some tasks require rebooting the system by
various reasons. Then you can reboot the system with a selected system OS.
To restart the system manually, use the following command.
Command
reload [os1 | os2]

Mode
Enable

Description
Restarts the system.

If you reboot the system without saving new configuration, new configuration will be deleted. So, you have to save the configuration before rebooting. Not to make that mistake,
hiD 6615 S223/S323 is supported to print the following message to ask if user really
wants to reboot and save configuration.
If you want to continue to reboot, press  key, if you want to save new configuration,
press  key.
SWITCH# reload
Do you want to save the system configuration? [y/n]]

48

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.1.8.2

UMN:CLI

Auto System Rebooting
The hiD 6615 S223/S323 reboots the system according to user’s configuration. There are
two basises for system rebooting. These are CPU and memory. CPU is rebooted in case
CPU Load or Interrupt Load continues for the configured time. Memory is automatically
rebooted in case memory low occurs as the configured times.
To enable auto system rebooting function, use the following command.
Command

Mode

Description
Configure to reboot the system automatically in case
an average of CPU or interrupt load exceeds the con-

auto-reset cpu <50-100> <1-100>

figured value during the user-defined time.

TIME

50-100: average of CPU load per 1 minute
1-100: average of interrupt load
Bridge

TIME: minute
Configure to reboot the system automatically in case

auto-reset memory <1-120> <1-

memory low occurs as the configured value.

10>

1-120: time of memory low
1-10: count of memory low(The default is 5)

no auto-reset {cpu | memory}

Disables auto system rebooting.

To show auto system rebooting configuration, use the following command.
Command

Mode

show auto-reset {cpu | memory}

Global/
Bridge

Description
Shows a configuration of auto-rebooting function.

The following is an example of configuring auto-restarting function in case CPU load or
Interrupt load maintains over 70% during 60 seconds and viewing the configuration.
SWITCH(config)# SWITCH(bridge)# auto-reset cpu 70 70 1
SWITCH(bridge)# show auto-reset cpu
-----------------------------Auto-Reset Configuration(CPU)
-----------------------------auto-reset:

70

interrupt load:

70

continuation time:
SWITCH(bridge)#

4.2

on

cpu load:

1

System Authentication
For the enhanced system security, the hiD 6615 S223/S323 provides two authentication
methods to access the switch using Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+).

A50010-Y3-C150-2-7619

49

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.2.1

Authentication Method
To set the system authentication method, use the following command.
Command

Mode

Description
Set the system authentication method.
local: authentication for console access
remote: authentication for telnet access

login {local | remote} {radius |
tacacs | host | all} enable

radius: selects RADIUS authentication.
Global

tacacs: selects TACACS+ authentication.
host: selects nominal system authentication (default).
all: selects all the authentication methods.

login {local | remote} {radius |

Disables a configured system authentication method.

tacacs | host | all} disable

4.2.2

Authentication Interface
If more than 2 interfaces are specified to the hiD 6615 S223/S323, you can designate one
specific interface to access RADIUS or TACACS server.
To designate an authentication interface, use the following command.
Command

Mode

Description
Designates an authentication interface.

login {radius | tacacs} interface
INTERFACE [A.B.C.D]

radius: selects RADIUS authentication.
Global

tacacs: selects TACACS+ authentication.
INTERFACE: interface name
A.B.C.D: IP address (optional)

4.2.3

Primary Authentication Method
You can set the order of the authentication method with giving the priority to each authentication method. To set the primary authentication method, use the following command
Command

Mode

Description
Set the primary authentication method.
local: authentication for console access

login {local | remote} {radius |
tacacs | host} primary

Global

remote: authentication for telnet access
radius: selects RADIUS authentication.
tacacs: selects TACACS+ authentication.
host: selects nominal system authentication (default).

50

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.2.4

4.2.4.1

UMN:CLI

RADIUS Server

RADIUS Server for System Authentication
To add/delete the RADIUS server for system authentication, use the following command.
Command

Mode

Description
Adds the RADIUS server with its information.

login radius server A.B.C.D

A.B.C.D: RADIUS server address

KEY

KEY: authentication key value
Adds the RADIUS server with its information.
Global

login radius server A.B.C.D

A.B.C.D: RADIUS server address

KEY auth_port PORT acct_port

KEY: authentication key value

PORT

auth_port: Enters authentication port number(optional)
acct_port: Enters accounting port number(optional)
Deletes an added RADIUS server.

no login radius server A.B.C.D

i
4.2.4.2

You can add up to 5 RADIUS servers.

RADIUS Server Priority
To specify the priority of a registered RADIUS server, use the following command.
Command
login

radius

server

Mode
move

A.B.C.D <1-5>

4.2.4.3

Description
Specifies the priority of RADIUS server.

Global

A.B.C.D: IP address
1-5: priority of RADIUS server

Timeout of Authentication Request
After the authentication request, the hiD 6615 S223/S323 waits for the response from the
RADIUS server for specified time.
To specify a timeout value, use the following command.
Command
login radius timeout <1-100>

A50010-Y3-C150-2-7619

Mode
Global

Description
Specifies a timeout value.
1-100: waiting-time for the response (default: 3)

51

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.2.4.4

Frequency of Retransmit
If there is no response from RADIUS server, the hiD 6615 S223/S323 is supposed to retransmit an authentication request. To set the frequency of retransmitting an authentication request, use the following command.
Command

Mode

login radius retransmit <1-10>

4.2.5

4.2.5.1

Global

Description
Sets the frequency of retransmit.
1-10: Enters the times of retry (default: 3)

TACACS Server

TACACS Server for System Authentication
To add/delete the TACACS server for system authentication, use the following command.
Command

Mode

Description
Adds the TACACS server with its information.
A.B.C.D: IP address

login tacacs server A.B.C.D KEY
Global

Deletes an added TACACS server.

no login tacacs server A.B.C.D

i

KEY: authentication key value
A.B.C.D: IP address

You can add up to 5 TACACS servers.
After adding the TACACS server, you should register interface of TACACS server connected to user’s switch. Use the following command.
Command
login

tacacs

interface

Mode

Registers interface of TACACS server connected to

NAME

A.B.C.D

Global

user’s switch.
Clears TACACS server interface

no login tacacs interface

4.2.5.2

Description

TACACS Server Priority
To specify the priority of a registered TACACS server, use the following command.
Command
login

tacacs

A.B.C.D <1-5>

4.2.5.3

server

Mode
move

Description
Specifies the priority of RADIUS server.

Global

A.B.C.D: TACACS server address
1-5: the priority of TACACS server

Timeout of Authentication Request
After the authentication request, the hiD 6615 S223/S323 waits for the response from the
TACACS server for specified time.

52

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To specify a timeout value, use the following command.
Command
login tacacs timeout <1-100>

4.2.5.4

Mode
Global

Description
Specifies a timeout value.
1-100: waiting-time for the response (default: 3)

Additional TACACS+ Configuration
The hiD 6615 S223/S323 provides several additional options to configure the system authentication via TACACS server.
TCP Port for the Authentication
To specify TCP port for the system authentication, use the following command.
Command

Mode

Specifies TCP port for the authentication.

login tacacs socket-port
<1-65535>

Description

Global

1-65535: TCP port
Deleted the configured TCP port for the authentication

no login tacacs socket-port

Authentication Type
To select the authentication type for TACACS+, use the following command.
Command

Mode

Description
Selects the authentication type for TACACS+.

login tacacs auth-type {ascii |
pap | chap}

ascii: plain text
Global

pap: password authentication protocol
chap: challenge handshake authentication protocol
Deletes a specified authentication type.

no login tacacs auth-type

Priority Level
You can define a priority level of user. According to the defined priority level, the user has
different authorization to access the DSLAM. This priority must define in the TACACS
server in the same way.
To define the priority level of user, use the following command.
Command

Mode

login tacacs priority-level {min |
user | max | root}
no login tacacs priority-level

i

Description
Defines the priority level of user, refer the below infor-

Global

mation for the order of priority.
Deletes a defined priority level.

The order of priority is root = max > user > min.

A50010-Y3-C150-2-7619

53

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.2.6

Accounting Mode
The hiD 6615 S223/S323 provides the accounting function of AAA (Authentication, Authorization, and Accounting). Accounting is the process of measuring the resources a user
has consumed. Typically, accounting measures the amount of system time a user has
used or the amount of data a user has sent and received.
To set an accounting mode, use the following command.
Command

Mode

Description
Sets an accounting mode.

login accounting-mode {none |
start | stop | both}

none: disables an accounting function.
Global

start: measures start point only.
stop: measures stop point only.
both: measures start and stop point both.

4.2.7

Displaying System Authentication
To display a configured system authentication, use the following command.
Command
show login

54

Mode
Enable
Global

Description
Shows a configured system authentication.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.2.8

UMN:CLI

Sample Configuration
[Sample Configuration 1] Configuration RADIUS server
The following is an example of configuring authorization method in SURPASS hiD 6615. It
is configured to add RADIUS to default method in case of clients connecting through console and telnet. And, the priority is given to RADIUS in case of clients connecting through
console and to default method in case of clients connecting through telnet.
Then, show the configuration. And The following is an example of configuring frequency
of retransmit and timeout of response after registering RADIUS server.

SWITCH(config)# user add user test1
Changing password for user
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
Enter new password:vertex
Re-enter new password:vertex
Password changed.
SWITCH(config)# login local radius enable
SWITCH(config)# login remote radius enable
SWITCH(config)# login local radius primary
SWITCH(config)# login remote host primary
SWITCH(config)# login radius server add 100.1.1.1 1
SWITCH(config)# login radius retransmit 5
SWITCH(config)# login radius timeout 10
SWITCH(config)# show login
[AUTHEN]
Local login

: radius host

Remote login : host radius

Displayed according to priority.

Accounting mode : both
-----------------------------------[HOST]
maximum_login_counts : 8
-----------------------------------[RADIUS]

100.1.1.1 1
Radius Retries : 5
Radius Timeout : 10
Radius Interface : default
-----------------------------------[TACACS]

Tacacs Timeout : 3
Tacacs Socket Port : 49
Tacacs Interface : default
Tacacs PPP Id : 1
Tacacs Authen Type : ASCII
Tacacs Priority Level : MIN
SWITCH(config)#

A50010-Y3-C150-2-7619

55

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

[Sample Configuration 2] Configuration TACACS+ server
The following is an example of configuring authorization method as TACACS+.

SWITCH(config)# user add user test1
Changing password for user
Enter the new password (minimum of 5, maximum of 8 characters)
Please use a combination of upper and lower case letters and numbers.
Enter new password:vertex
Re-enter new password:vertex
Password changed.
SWITCH(config)# login local tacacs enable
SWITCH(config)# login remote tacacs enable
SWITCH(config)# login local tacacs primary
SWITCH(config)# login remote tacacs primary
SWITCH(config)# login tacacs server add 200.1.1.1 1
SWITCH(config)# login tacacs interface default
SWITCH(config)# login tacacs socket-port 1
SWITCH(config)# login tacacs auth-type pap
SWITCH(config)# login tacacs timeout 10
SWITCH(config)# login tacacs priority-level root
SWITCH(config)# show login
[AUTHEN]
Local login

: tacacs host

Remote login : tacacs host

Displayed according to the priority

Accounting mode : both
-----------------------------------[HOST]
maximum_login_counts : 8
-----------------------------------[RADIUS]

Radius Retries : 3
Radius Timeout : 3
Radius Interface : default
-----------------------------------[TACACS]

200.1.1.1 1
Tacacs Timeout : 10
Tacacs Socket Port : 1
Tacacs Interface : default
Tacacs PPP Id : 1
Tacacs Authen Type : PAP
Tacacs Priority Level : MAX(ROOT)
SWITCH(config)#

4.3

Assigning IP Address
The switch uses only the data’s MAC address to determine where traffic needs to come
from and which ports should receive the data. Switches do not need IP addresses to
transmit packets. However, if you want to access to the hiD 6615 S223/S323 from remote

56

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

place with TCP/IP through SNMP or telnet, it requires IP address.
You can enable interface to communicate with switch interface on network and assign IP
address as the following:
• Enabling Interface
• Disabling Interface
• Assigning IP Address to Network Interface
• Static Route and Default Gateway
• Displaying Forwarding Information Base(FIB) Table
• Forwarding Information Base(FIB) Retain
• Displaying Interface
• Sample Configuration

4.3.1

Enabling Interface
To assign an IP address to an interface, you need to enable the interface first. If the interface is not enabled, you cannot access it from a remote place, even though an IP address
has been assigned.
To display if interface is enabled, use the command, show running-config.
Interface Configuration Mode
To open Interface Configuration mode of the interface you are about to enable interface,
use the following command.
Command

Mode

interface INTERFACE

Global

Description
Opens Interface Configuration mode of the interface.

To enable the interface, use the following command.
Command
no shutdown

Mode

Description

Interface

Enables the interface on Interface Configuration mode.

The following is an example of enabling interface on Interface Configuration mode.
SWITCH# configure terminal
SWITCH(config)# interface 1
SWITCH(config-if)# no shutdown
SWITCH(config-if)#

4.3.2

Disabling Interface
To disable the interface, use the following commands on Interface Configuration mode.
Before disabling interface on Interface Configuration mode, you should open the mode,
and then use the follow command.
Command
shutdown

A50010-Y3-C150-2-7619

Mode

Description

Interface

Disables an interface on Interface Configuration mode.

57

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.3.3

Assigning IP Address to Network Interface
After enabling interface, you need to assign IP address. To assign IP address to specified
network interface, use the following command.
Command

Mode

Description
Assigns IP address to an interface.

ip address IP-ADDRESS/M
Interface
ip address IP-ADDRESS/M secondary

Assigns secondary IP address to an
interface.

To disable the assigned IP address, use the following command.
Command

Mode

Removes assigned IP address to an interface.

no ip address IP-ADDRESS/M
no ip address IP-ADDRESS/M

Description

Interface

Removes assigned secondary IP address to an interface.

secondary

To display an assigned IP address, use the following command.
Command

Interface

show ip

4.3.4

Mode

Description
Shows an assigned IP address of the interface.

Static Route and Default Gateway
It is possible to configure the static route. Static route is a route which user configures
manually. Packets are transmitted to the destination through static route. Static route includes destination address, neighbor router to receive packet, the number of routes that
packets have to go through.
To configure static route, use the following command.
Command

Mode

Description

ip route A.B.C.D SUBNET-MASK

Configures static route.

{GATEWAY | null} [<1-255>]

A.B.C.D: destination IP prefix

ip route A.B.C.D/M { SUBNET-MASK | null} [<1-

GATEWAY: Ip gateway address

255> | src IP-ADDRESS]

1-255: Distance value
Global

no ip route A.B.C.D SUBNET-MASK
{ GATEWAY | null} [<1-255>]

Deletes configured static route.

no ip route IP-ADDRESS/M
{ SUBNET-MASK | null} [<1-255>]

To configure default gateway, use the following command on Global Configuration mode.
Command
ip route default { GATEWAY | null} [<1-255>]
no ip route default { GATEWAY | null} [<1-255>]

58

Mode

Description
Configures default gateway.

Global

GATEWAY: Ip gateway address
Deletes default gateway.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The following is an example of configuring static route to reach three destinations, which
are not directly connected.
SWITCH(config)# ip route 100.1.1.0/24 10.1.1.2
SWITCH(config)# ip route 200.1.1.0/24 20.1.1.2
SWITCH(config)# ip route 172.16.1.0/24 30.1.1.2

To display configured static route, use the following command.
Command
show

ip

route

{A.B.C.D

Mode
|

A.B.C.D/M | bgpㅣconnectedㅣ
isisㅣkernelㅣospfㅣripㅣstatic |

Enable

summary | static}

Global

Shows configured routing information.

Shows configured routing information with IP routing

show ip route database static

4.3.5

Description

table database.

Displaying Forwarding Information Base(FIB) Table
The FIB is a table that contains a mirror image of the forwarding information in the IP routing table. When routing or topology changes occur in the network the route processor updates the IP routing table and CEF updates the FIB. Because there is a one-to-one correlation between FIB entries and routing table entries, the FIB contains all known routes
and eliminates the need for route cache maintenance that is associated with switching
paths, such as fast switching and optimum switching. FIB is used for making IP destination prefix-based switching decisions and maintaining next-hop address information
based on the information in the IP routing table.
The forwarding information base (FIB) table contains information that the forwarding
processors require to make IP forwarding decisions.
To display Forwarding Information Base table, use the following command.
Command

Mode

Description

Enable
show ip route fib

Global

Displays Forwarding Information Base table.

Bridge

4.3.6

Forwarding Information Base(FIB) Retain
Use this command to modify the retain time for stale routes in the Forwarding Information
Base (FIB) during NSM restart.
Command

Mode

Configures the retain time for FIB during NSM restart

fib retain
{forever | time <1-65535>}
no fib retain
{forever | time <1-65535>}

A50010-Y3-C150-2-7619

Description

Global

Default: 60sec
Restores is as a default

59

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.3.7

Displaying Interface
To display interface status and configuration, use the following command.
Command

Mode
Enable

show interface [INTERFACE]

Global
Interface

4.3.8

Description
Shows interface status and configuration.
INTERFACE: interface name

show ip interface [INTERFACE]

Enable

Shows brief information of interface.

brief

Global

INTERFACE: interface name

Sample Configuration
[ Sample Configuration 1 ]
The followings are examples of enabling interface 1 in two ways.
① On Configuration Mode
SWITCH# configure terminal
SWITCH(config)# interface noshutdown 1
SWITCH(config)#

② On Interface Configuration Mode
SWITCH# configure terminal
SWITCH(config)# interface 1
SWITCH(config-if)# no shutdown
SWITCH(config-if)#

[ Sample Configuration 2 ]
The following is an example of assigning IP address 192.168.1.10 to 1.
SWITCH(config-if)# ip address 192.168.1.10/16
SWITCH(config-if)# show ip
IP-Address

Scope

Status

------------------------------------192.168.1.10/16

global

SWITCH(config-if)#

[ Sample Configuration 3 ]
The following is an example of configuring default gateway.
SWITCH# configure terminal
SWITCH(config)# ip route default 192.168.1.254
SWITCH(config)#

60

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.4

UMN:CLI

SSH (Secure Shell)
Network security is getting more important according to using network has been generalized between users. However, typical FTP and telnet service has weakness for security.
SSH (Secure Shell) is security shell for login. Through SSH, all data are encoded, traffic
is compressed. So, transmit rate becomes faster, and tunnel for existing ftp and pop,
which are not safe in security, is supported.

4.4.1

SSH Server
The hiD 6615 S223/S323 can be operated as SSH server. You can configure the switch
as SSH server with the following procedure.
•
•
•
•
•

4.4.1.1

Enabling SSH Server
Displaying On-line SSH Client
Disconnecting SSH Client
Displaying Connection History of SSH Client
Assigning Specific Authentication Key

Enabling SSH Server
To enable/disable SSH server, use the following command.
Command
ssh server enable

Mode
Global

ssh server disable

4.4.1.2

Description
Enables SSH server.
Disables SSH server.

Displaying On-line SSH Client
To display SSH clients connected to SSH server, use the following command.
Command

Enable/Global

show ssh

4.4.1.3

Mode

Description
Shows SSH clients connected to SSH server.

Disconnecting SSH Client
To disconnect an SSH client connected to SSH server, use the following command.
Command
ssh disconnect PID

4.4.1.4

Mode
Global

Description
Disconnects SSH clients connected to SSH server.
PID: SSH client number

Displaying Connection History of SSH Client
To display the connection history of SSH client, use the following command.
Command
show ssh history

A50010-Y3-C150-2-7619

Mode

Description

Enable

Shows the connection history of SSH clients who are

Global

connected to SSH server up to now.

61

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.4.1.5

Assigning Specific Authentication Key
After enabling ssh server, each client will upload generated key. The ssh server can assign specific key among the uploaded keys from several clients.
To verify Authentication Key, use the following command.
Command

Mode
Global

ssh key verify FILENAME

i
4.4.2

Description
Verifys generated ssh key.

If the ssh server verify the key for specific client, other clients must download the key file
from ssh server to login.

SSH Client
The hiD 6615 S223/S323 can be used as SSH client with the following procedure.
•
•
•

4.4.2.1

Login to SSH Server
File Copy
Configuring Authentication Key

Login to SSH Server
To login to SSH server after configuring the hiD 6615 S223/S323 as SSH client, use the
following command.
Command

Mode

Description
Logins to SSH server.

ssh login DESTINATION

Enable

[PUBLIC_KEY]

DESTINATION: IP address of SSH server or hostname
and account
PUBLIC_KEY: Specify public key.

4.4.2.2

File Copy
To copy a file from/to SSH server, use the following command.
Command
copy

{scp

l

sftp}

Mode
config

{download l upload} CONFIGFILE

4.4.2.3

Enable
Global

Description

Downloads or uploads a file to through SSH server.

Configuring Authentication Key
SSH client can access to server through authentication key after configuring authentication key and informing it to server. It is safer to use authentication key than inputting
password every time for login, and it is also possible to connect to several SSH servers
with using one authentication key.

62

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure authentication key in the hiD 6615 S223/S323, use the following command.
Command

Mode

Description
Configures authentication key.

ssh keygen {rsa1 | rsa | dsa}

Global

rsa1: SSH ver. 1 public key for the authentication
rsa: SSH ver. 2 public key for the authentication
dsa: SSH ver. 2 public key for the authentication

To configure authentication key and connect to SSH server with the authentication key,
perform the following procedure.
Step 1
Configure the authentication key in the switch.
SWITCH_A(config)# ssh keygen dsa
Generating public/private dsa key pair.
Enter file in which to save the key (/etc/.ssh/id_dsa):
Enter passphrase (empty for no passphrase):networks
Enter same passphrase again:networks
Your identification has been saved in /etc/.ssh/id_dsa.
Your public key has been saved in /etc/.ssh/id_dsa.pub.
The key fingerprint is:
d9:26:8e:3d:fa:06:31:95:f8:fe:f6:59:24:42:47:7e root@hiD6615
SWITCH_A(config)#

Step 2
Connect to SSH server with the authentication key.
SWITCH_A# ssh login 172.16.209.10
Enter passphrase for key '/etc/.ssh/id_dsa': networks
SWITCH_B#

To display the configured authentication keys in the hiD 6615 S324, use the following
command.
Command
show key-list

A50010-Y3-C150-2-7619

Mode
Enable
Global

Description
Shows an authentication key of SSH server.

63

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.5

802.1x Authentication
To enhance security and portability of network management, there are two ways of authentication based on MAC address and port-based authentication which restrict clients
attempting to access to port. The port-based authentication (802.1x) decides to give access to RADIUS server having the information about user who tries to access.
802.1x authentication adopts EAP (Extensible Authentication Protocol) structure. In EAP
system, there are EAP-MD5 (Message Digest 5), EAP-TLS (Transport Level Security),
EAP-SRP (Secure Remote Password), EAP-TTLS(Tunneled TLS) and the hiD 6615
S223/S323 supports EAP-MD5 and EAP-TLS. Accessing with user’s ID and password,
EAP-MD5 is one-way Authentication based on the password. EAP-TLS accesses through
the mutual authentication system of server authentication and personal authentication
and it is possible to guarantee high security because of mutual authentication system.
At a request of user Authentication, from user’s PC EAPOL-Start type of packets are
transmitted to authenticator and authenticator again requests identification. After getting
respond about identification, request to approve access to RADIUS server and be authenticated by checking access through user’s information.
The following figure explains the process of 802.1x authentication.
EAPOL
(EAP over LAN)

EAP over RADIUS

RADIUS
Server
[Suppliant]

[Authenticator]

[Authentication Server]

EAPOL-Start

EAP-Request / Identity

EAP-Response / Identity

EAP-Request

EAP-Response

RADIUS-Access-Request

RADIUS-Access-Challenge

RADIUS-Access-Request

EAP-Success

RADIUS-Access-Accept

]
Fig. 4.1

Process of 802.1x Authentication

To enable 802.1x authentication on port of the hiD 6615 S223/S323, you should be able
to perform the following tasks.

64

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.5.1

4.5.1.1

UMN:CLI

802.1x Authentication

Enabling 802.1x
To configure 802.1x, the user should enable 802.1x daemon first. In order to enable
802.1x daemon, use the following command.
Command

Mode

dot1x system-auth-control

Global

no dot1x system-auth-control

4.5.1.2

Description
Enables 802.1x daemon.
Disables 802.1x daemon.

Configuring RADIUS Server
As RADIUS server is registered in authenticator, authenticator also can be registered in
RADIUS server.
Here, authenticator and RADIUS server need extra data authenticating each other besides they register each other’s IP address. The data is the key and should be the same
value for each other. For the key value, every kinds of character can be used except for
the space or special character.

RADIUS
Server
[Suppliant]

[Authenticator]

[Authentication Server]

RADIUS Servers

Authentication request
in order

A : 10.1.1.1
B : 20.1.1.1
Designate as default
RADIUS server

Response

C : 30.1.1.1
:
J : 100.1.1.1

Fig. 4.2

Multiple Authentication Servers

If you register in several servers, the authentication server starts form RADIUS server
registered as first one, then requests the second RADIUS server in case there’s no response. According to the order of registering the authentication request, the authentication request is tried and the server which responds to it becomes the default server from
the point of response time.

A50010-Y3-C150-2-7619

65

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

After default server is designated, all requests start from the RADIUS server. If there’s no
response from default server again, the authentication request is tried for RADIUS server
designated as next one.
To configure IP address of RADIUS server and key value, use the following command.
Command

Mode

Description
Registers RADIUS server with key value and UDP port
of radius server.

dot1x radius-server host {IP-

IP-ADDRESS: Ip address of radius server

ADDRESS | NAME} auth-port <0-

NAME: host name

65535> key KEY

0-65535: UDP port number
Global

dot1x radius-server host {IP-

Configures IP address of RADIUS server and key

ADDRESS | NAME} key KEY

value.

no dot1x radius-server host {IP-

Deletes a registered RADIUS server.

ADDRESS | NAME}

i

KEY: the value of key

You can designate up to 5 RADIUS servers as authenticator.
The key is authentication information between the authenticator and RADIUS server. The
authenticator and RADIUS server must have a same key value, and you can use alphabetic characters and numbers for the key value. The space or special character is not allowed.
You can configure the priority for the radius server that have configured by user.
Command

Mode

dot1x radius-server move {IPADDRESS | NAME} priority PRI-

Configures the priority of radius server.
Global

IP-ADDRESS: Ip address of radius server
NAME: host name

ORITY

4.5.1.3

Description

Configuring Authentication Mode
You can change the authentication mode from the port-based to the MAC-based. To
change the authentication mode, use the following command.
Command
dot1x

auth-mode

Mode
mac-base

PORTS

no dot1x auth-mode mac-base
PORTS

i

66

Description
Sets the authentication mode to the MAC-based.

Global
Restores the authentication mode to the port-based.

Before setting the authentication mode to the MAC-based, you need to set a MAC filtering
policy to deny them for all the Ethernet ports. To configure a MAC filtering policy, see Section 7.12.1

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.5.1.4

UMN:CLI

Authentication Port
After configuring 802.1x authentication mode, you should select the authentication port.
Command

Mode

dot1x nas-port PORTS

Global

no dot1x nas-port PORTS

4.5.1.5

Description
Designates 802.1x authentication port.
Disables 802.1x authentication port.

Force Authorization
The hiD 6615 S223/S323 can allow the users to request the access regardless of the authentication from RADIUS server. For example, it is possible to configure not to be authenticated from the server even though a client is authenticated from the server.
To manage the approval for the designated port, use the following command.
Command

Mode

dot1x port-control {auto | force-

Configures the way of authorization to control port

authorized | force-unauthorized}
Global

PORTS

Description

whether it has the RADIUS authentication or not.
Deletes the configuration of the way of authorization to

no dot1x port-control PORTS

control port.

auto: Follows the authentication of RADIUS server.
force-authorized: Gives the authorization to a client even though RADIUS server
didn’t approve it.
force-unauthorized: Don’t give the authorization to a client even though RADIUS
server authenticates it.

4.5.1.6

Configuring Interval for Retransmitting Request/Identity Packet
In hiD 6615 S223/S323, it is possible to specify how long the device waits for a client to
send back a response/identity packet after the device has sent a request/identity packet.
If the client does not send back a response/identity packet during this time, the device retransmits the request/identity packet.
To configure the number of seconds that the switch waits for a response to a request/identity packet, use the following command.
Command
dot1x

timeout

Mode

tx-period

no

dot1x

PORTS

A50010-Y3-C150-2-7619

timeout

Sets reattempt interval for requesting request/identity

<1-

65535> PORTS

packet.
Global

tx-period

Description

1-65535: retransmit interval (default: 30)
Disables the interval for requesting identity.

67

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.5.1.7

Configuring Number of Request to RADIUS Server
After 802.1x authentication configured as explained above and the user tries to connect
with the port, the process of authentication is progressed among user’s PC and the
equipment as authenticator and RADIUS server. It is possible to configure how many
times the device which will be authenticator requests for authentication to RADIUS server.
To configure times of authentication request in the hiD 6615 S223/S323, please use the
command in Global Configuration mode.
Command
dot1x radius-server retries <110>

4.5.1.8

Mode

Description
Configure times of authentication request to RADIUS

Global

server.
1-10: retry number

Configuring Interval of Request to RADIUS Server
For the hiD 6615 S223/S323, it is possible to set the time for the retransmission of packets to check RADIUS server. If there’s a response from other packets, the switch waits for
a response from RADIUS server during the configured time before resending the request.
To set the interval of request to RADIUS server, use the following command.
Command
dot1x radius-server timeout <1120>

Mode
Global

Description
Configures the interval of request to RADIUS server.
1-120: 1-120 seconds (Default value: 1)

You should consider the distance from the server for configuring the interval of requesting
the authentication to RADIUS server. If you configure the interval too short, the authentication couldn’t be realized. If it happens, you’d better to reconfigure the interval longer.

4.5.2

802.1x Re-Authentication
In hiD 6615 S223/S323, it is possible to update the authentication status on the port periodically. To enable re-authentication on the port, you should perform the below procedure.
Step 1
Enable 802.1x re-authentication
Step 2
Configure the interval of re-authentication
Step 3
Configuring the interval of requesting re-authentication in case of re-authentication fails.
Step 4
Executing 802.1x re-authenticating regardless of the interval

4.5.2.1

Enabling 802.1x Re-Authentication
To enable 802.1x re-authentication using the following command.

68

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command
dot1x reauth-enable PORTS

UMN:CLI

Mode
Global

no dot1x reauth-enable PORTS

4.5.2.2

Description
Enables 802.1x re-authentication.
Disables 802.1x re-authentication.

Configuring the Interval of Re-Authentication
RAIDIUS server contains the database about the user who has access right. The database is real-time upgraded so it is possible for user to lose the access right by updated
database even though he is once authenticated. In this case, even though the user is accessible to network, he should be authenticated once again so that the changed database
is applied to. Besides, because of various reasons for managing RADIUS server and
802.1x authentication port, the user is supposed to be re-authenticated every regular time.
The administrator of hiD 6615 S223/S323 can configure a term of re-authentication.
To configure a term of re-authentication, use the following command.
Command

Mode

dot1x timeout reauth-period <14294967295> PORTS

Sets the period between re-authentication attempts.
Global

no dot1x timeout reauth-period

Deletes the period between re-authentication attempts.

PORTS

4.5.2.3

Description

Configuring the Interval of Requesting Re-authentication
When the authenticator sends Request/Identity packet for re-authentication and no response is received from the suppliant for the number of seconds, the authenticator retransmits the request to the suppliant. In hiD 6615 S223/S323, you can set the number of
seconds that the authenticator should wait for a response to request/identity packet from
the suppliant before retransmitting the request.
To set a period that the authenticator waits for a response, use the following command.
Command

Mode

Description
Sets reattempt interval for requesting request/identity

dot1x timeout quiet-period <165535> PORTS

no dot1x timeout quiet-period
PORTS

4.5.2.4

packet.
Global

1-65535: reattempt interval seconds
PORTS: enters port number
Disables the interval for requesting identity.

802.1x Re-authentication
In 4.5.2.2 Configuring the Interval of Re-Authentication, it is described even though the
user is accessible to network, he should be authenticated so that the changed database
is applied to.
Besides, because of various reasons managing RADIUS server and 802.1x authentication port, the user is supposed to be re-authenticated every regular time.
To implement re-authentication immediately regardless of configured time interval, user

A50010-Y3-C150-2-7619

69

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

the following command.
Command
dot1x reauthenticate PORTS

4.5.3

Mode
Global

Description
Implement re-authentication regardless of the configured time interval.

Initializing Authentication Status
The user can initialize the entire configuration on the port. Once the port is initialized, the
supplicants accessing to the port should be re-authenticated.
Command
dot1x initialize PORTS

4.5.4

Mode
Global

Description
Initializes the authentication status on the port.

Applying Default Value
To apply the default value to the system, use the following command.

4.5.5

Command

Mode

dot1x default PORTS

Global

Description
Applies the default value.

Displaying 802.1x Configuration
To display 802.1x configuration, use the following command.
Command
show dot1x [PORTS]

4.5.6

Mode
Enable
Global

Description
Shows 802.1x configuration.

802.1x User Authentication Statistic
To display the statistics about the process of 802.1x user authentication, use the following
command.
Command
show dot1x statistics PORTS

Mode
Global

Description
Shows the statistics of 802.1x user authentication on
the port.

To reset statistics by deleting the statistics of 802.1x user authentication, use the following
command.
Command
dot1x clear statistics PORTS

70

Mode
Global

Description
Makes reset state by deleting the statistics of 802.1x
on the port.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

4.5.7

UMN:CLI

Sample Configuration
The following is to show the configuration after configuring pot number 4 as the authentication port and registering IP address of authentication port and information of RADIUS
server.
SWTICH(config)# dot1x system-auth-control
SWTICH(config)# dot1x nas-port 4
SWTICH(config)# dot1x port-control force-authorized 4
SWTICH(config)# dot1x radius-server host 10.1.1.1 auth-port 4 key test
SWTICH(config)# show dot1x
802.1x authentication is enabled.
RADIUS Server : 10.1.1.1 (Auth key : test)
------------------------------------------------------|
802.1x

1

2

3

4

|123456789012345678901234567890123456789012

------------------------------------------------------PortEnable |...p......................................
PortAuthed |...u......................................
MacEnable |..........................................
MacAuthed |..........................................
------------------------------------------------------p = port-based, m = mac-based, a = authenticated, u = unauthenticated
SWTICH(config)#

The following is configuring a term of re-authentication as 1800 and a tem of reauthentication as 1000 sec.
SWTICH(config)# dot1x timeout quiet-period 1000 4
SWTICH(config)# dot1x timeout reauth-period 1800 4
SWTICH(config)# dot1x reauth-enable 4
SWTICH(config)# show dot1x 4
Port 4
SystemAuthControl : Enabled
ProtocolVersion

: 0

PortControl

: Force-Authorized

PortStatus

: Unauthorized

ReauthEnabled

: True

QuietPeriod

: 1000

ReauthPeriod

: 1800

SWTICH(config)#

The following is an example of showing the configuration after configuring the authentication based on MAC address.
SWTICH(config)# dot1x auth-mode mac-base 4
SWTICH(config)# show dot1x
802.1x authentication is enabled.
RADIUS Server : 10.1.1.1 (Auth key : test)
------------------------------------------------------|
802.1x

1

2

3

4

|123456789012345678901234567890123456789012

------------------------------------------------------PortEnable |..........................................

A50010-Y3-C150-2-7619

71

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

PortAuthed |..........................................
MacEnable |...m......................................
MacAuthed |...u......................................
------------------------------------------------------p = port-based, m = mac-based, a = authenticated, u = unauthenticated
SWTICH(config)#

72

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

5 Port Configuration
It is possible for user to configure basic environment such as auto-negotiate, transmit rate,
and flow control of the hiD 6615 S223/S323 port. Also, it includes instructions how to configure port mirroring and port as basic.

5.1

Port Basic
It is possible to configure default environment of port such as port state, speed. To configure port, you need to open Bridge Configuration mode by using the command, bridge,
on Global Configuration mode. When you begin Bridge Configuration mode, system
prompt will be changed from SWITCH(config)# to SWITCH(bridge)#.
SWITCH(config)# bridge
SWITCH(bridge)#

The hiD 6615 S223/S323 have 12 electrical and optical combo 100/1000Base-X Ethernet
ports. The direction to configure each port is different depending on its features. Read the
below instruction carefully and follow it before you configure.
Refer to below figure for front interfaces of hiD 6615 S223/S323.
LNK MGMT ACT

RUN
RPU
DIAG

S323

RX

Fig. 5.1

1

1 2 3 4 5 6 7 8 9 10 11 12

2

3

4

5

6

7

8

9

10

11

12

SURPASS
hiD 6615

L/A
1G
CONSOLE

TX

hiD 6615 S223/S323 Interface

To display the configuration of the physical port, use the following command.
Command

Mode

Description

Enable

show port [PORTS]

Global

Shows port configuration.

Bridge

When you use the command, show port command, if you input letter at port-number, the
message, “% Invalid port: port'” will be displayed, and if you input wrong number, the
message, “% Invalid range: 100 [1-18]” will be displayed.
SWITCH(bridge)# show port port
%Invalid port: port
SWITCH(bridge)# show port 100
%Invalid range: 100 [1-18]
SWITCH(bridge)#

5.1.1

Selecting Port Type
User should select port type due to the hiD6615 S223/S323 switch ports have two types
(RJ45 and SFP). To select port type, use the following command.

A50010-Y3-C150-2-7619

73

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode

port medium PORT {sfp | rj45}

Description
Selects port type

Bridge

(Default: RJ45)

To view the configuration of switch port type, use the following command.
Command

Mode

Description

Enable
Shows port type

Global

show port medium

Bridge

5.2
5.2.1

Ethernet Port Configuration
Enabling Ethernet Port
To enable/disable a port, use the following command.
Command

Mode

port {enable | disable} PORTS

Bridge

Description
Enables/disables a port, enter a port number.
(Default: enable)

The following is an example of disabling the Ethernet port 1 to 3.
SWITCH(config)# bridge
SWITCH(bridge)# show port 1-5
------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL INSTALLED

(ADMIN/OPER)
------------------------------------------------------------------1:

Ethernet

1

Up/Down

Auto/Half/0

Off

N

2:

Ethernet

1

Up/Down

Auto/Half/0

Off

N

3:

Ethernet

1

Up/Down

Auto/Half/0

Off

N

4:

Ethernet

1

Up/Down

Auto/Half/0

Off

N

5:

Ethernet

1

Up/Down

Auto/Half/0

Off

N

SWITCH(bridge)# port disable 1-3
SWITCH(bridge)# show port 1-5
------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL INSTALLED

(ADMIN/OPER)
------------------------------------------------------------------1:

Ethernet

1

Down/Down

Auto/Half/0

Off

N

2:

Ethernet

1

Down/Down

Auto/Half/0

Off

N

3:

Ethernet

1

Down/Down

Auto/Half/0

Off

N

4:
5:

Ethernet
Ethernet

1
1

Up/Down
Up/Down

Auto/Half/0
Auto/Half/0

Off
Off

N
N

SWITCH(bridge)#

74

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

5.2.2

UMN:CLI

Auto-negotiation
Auto-negotiation is a mechanism that takes control of the cable when a connection is established to a network device. Auto-negotiation detects the various modes that exist in the
network device on the other end of the wire and advertises it own abilities to automatically
configure the highest performance mode of interoperation. As a standard technology, this
allows simple, automatic connection of devices that support a variety of modes from a variety of manufacturers.
To enable/disable the auto-negotiation on an Ethernet port, use the following command.
Command

Mode

port nego PORTS {on | off}

Bridge

Description
Configures the auto-negotiation of the specified port,
enter the port number.

For the hiD 6615 S223/S323, you can configure transmit rate and duplex mode as standard to configure transmit rate or duplex mode of connected equipment even when autonegotiation is enabled. For example, when you configure transmit rate as 10Mbps with
configured auto-negotiation, a port is worked by the standard 10Mbps/full duplex mode.

i

By default, auto-negotiation is activated in 10/100/1000Base-TX port of the hiD 6615
S223/S323. However you cannot configure auto-nego in fiber port.

The following is an example of deleting auto-negotiate of port 7 and 8, and showing it.
SWITCH(bridge)#
SWITCH(bridge)# port nego 7-8 off
SWITCH(bridge)# show port 7-8
------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL INSTALLED

(ADMIN/OPER)
------------------------------------------------------------------7:

Ethernet

8: Ethernet
SWITCH(bridge)#

5.2.3

7

Up/Up

Force/Full/100

Off

Y

8

Up/Up

Force/Full/100

Off

Y

Transmit Rate
To set transmit rate of Ethernet port, use the following command.
Command

Mode

Description
Sets transmit rate of Ethernet port as

port speed PORTS {10 | 100 | 1000}

Bridge

10/100/1000Mbps, enter the port number.

i

When auto-nego is activated, it is impossible to change transmit rate.
The following is an example of configuring transmit rate of port 1 as 10Mbps and showing
it.

A50010-Y3-C150-2-7619

75

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

SWITCH(bridge)# show port 1
------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL INSTALLED

(ADMIN/OPER)
------------------------------------------------------------------1:

Ethernet

1

Up/Up

Force/Half/100

Off

Y

SWITCH(bridge)# port speed 1 10
SWITCH(bridge)# show port 1
------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL INSTALLED

(ADMIN/OPER)
------------------------------------------------------------------1: Ethernet
SWITCH(bridge)#

5.2.4

1

Up/Up

Force/Half/10

Off

Y

Duplex Mode
Only unidirectional communication is practicable on half duplex mode, and bidirectional
communication is practicable on full duplex mode. By transmitting packet for two ways,
Ethernet bandwidth is enlarged two times- 10Mbps to 20Mbps, 100Mbps to 200Mbps.
To set duplex mode, use the following command.
Command

Mode

port duplex PORTS {full | half}

Bridge

Description
Sets full or half duplex mode of specified port, enter the
port number.

The following is an example of configuring duplex mode of port 1 as half mode and showing it.
SWITCH(bridge)# show port 1
------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL INSTALLED

(ADMIN/OPER)
------------------------------------------------------------------1:

Ethernet

1

Up/Up

Force/Full/100

Off

Y

SWITCH(bridge)# port duplex 1 half
SWITCH(bridge)# show port 1
------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL INSTALLED

(ADMIN/OPER)
------------------------------------------------------------------1:

Ethernet

1

Up/Down

Force/Half/100

Off

Y

SWITCH(bridge)#

5.2.5

Flow Control
Ethernet ports on the switches use flow control to restrain the transmission of packets to
the port for a period time. Typically, if the receive buffer becomes full, the port transmits a
pause packet that tells remote ports to delay sending more packets for a specified period
time. In addition, the Ethernet ports can receive and act upon pause packets from other
devices.

76

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure flow control of the Ethernet port, use the following command.
Command

Mode

port flow-control PORTS {on |

Description

Bridge

off}

Configures flow control for a specified port, enter the
port number. (default: off)

The following is an example of configuring flow control to port 25.
SWITCH(bridge)# show port 25
-----------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL

INSTALLED

(ADMIN/OPER)
-----------------------------------------------------------------------25

Ethernet

1

Up/Down

Auto/Half/0

Off

Y

SWITCH(bridge)# port flow-control 25 on
SWITCH(bridge)# show port 25
------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

FLOWCTRL INSTALLED

(ADMIN/OPER)
------------------------------------------------------------------25: Ethernet
SWITCH(bridge)#

5.2.6

1

Up/Down

Auto/Half/0

On

Y

Port Description
To specify a description of an Ethernet port, use the following command.
Command

Mode

port description PORTS
Bridge

DESCRIPTION

Description
Specifies a description of an Ethernet port.
Deletes description of specified port.

no port description PORTS

To view description of port, use the following command.
Command

Mode

Description

Enable

show port description PORTS

Global
Bridge

Shows description of one port or more.

Interface

The following is an example of making description of port 1 and viewing it.
SWITCH(bridge)# port description 1 test1
SWITCH(bridge)# show port description 1
-----------------------------------------------------------NO

TYPE

STATE

LINK

DESCRIPTION

(ADM/OPR)
-----------------------------------------------------------1 Unknown
SWITCH(bridge)#

A50010-Y3-C150-2-7619

Up/Down

0HDX test1

77

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

5.2.7
5.2.7.1

Traffic Statistics
The Packets Statistics
To display traffic statistic of each port or interface with MIB or RMON MIB data defined,
use the following commands.
Command

Mode

Description

show port statistics avg-pkt

Shows traffic statistics of average packet for a specified

[PORTS]

Ethernet port.

show port statistics avg-pps

Shows traffic statistics of average packet type for a

Enable

[PORTS]

specified Ethernet port.

Global

show port statistics interface

Shows interface MIB counters of a specified Ethernet

Bridge

[PORTS]

port.

show port statistics rmon

Shows RMON MIB counters of a specified Ethernet

[PORTS]

port.

The following is an example of displaying traffic average of port 1.
SWITCH(bridge)# show port statistics avg-pkt 1
============================================================================
Slot/Port|

Tx

|

Rx

---------------------------------------------------------------------------Time

| pkts/s |

bits/s

| pkts/s |

bits/s

============================================================================
port 1 --------------------------------------------------------------------5 sec:

1

608

120

61,848

1 min:

3

3,242

122

62,240

10 min:
0
SWITCH(bridge)#

440

39

20,272

The following is an example of displaying RMON statistic counters of port 1.
SWITCH(bridge)# show port statistics rmon 1
Port1
EtherStatsDropEvents

0

EtherStatsOctets

5,669,264

EtherStatsPkts 71,811
EtherStatsBroadcastPkts 36,368
EtherStatsMulticastPkts 32,916
EtherStatsCRCAlignErrors

0

EtherStatsUndersizePkts 0

78

EtherStatsOversizePkts

0

EtherStatsFragments

0

EtherStatsJabbers

0

EtherStatsCollisions

0

EtherStatsPkts64Octets

165,438

EtherStatsPkts65to127Octets

12,949

EtherStatsPkts128to255Octets

1,662

EtherStatsPkts256to511Octets

31,177

EtherStatsPkts512to1023Octets

12

EtherStatsPkts1024to1518Octets
SWITCH(bridge)#

64

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Otherwise, to clear all recorded statistics of port and initiate, use the following command.
Command

Mode

Description

Enable

clear port statistics {PORTS | all}

Global

Clears all recorded port statistics.

Bridge

5.2.7.2

The CPU statistics
To display CPU statistics of Ethernet port, use the following command.
Command
show cpu statistics avg-pkt
[PORTS]

Mode
Enable
Global

show cpu statistics total
[PORTS]

Bridge

Description
Shows cpu traffic statistics of average packet for a
specified Ethernet port.
Shows cpu traffic statistics of Interface group for a
specified Ethernet port.

To delete all CPU statistics of specified Ethernet port, use the following command.
Command
clear cpu statistics [PORTS ]

5.2.7.3

Mode
Global
Bridge

Description
Deletes all CPU statistics for an Ethernet port.

The Protocol statistics
To enable/disable protocol statistics
Command
protocol statistics {enable | disable} [{arp | icmp | ip | tcp |
udp}]

Mode

Description

Global
Bridge

To display protocols’ statistics of Ethernet port, use the following command.
Command
show protocol statistics avg-pkt
[PORTS]

Mode
Enable
Global

show protocol statistics total
[PORTS]

Bridge

Description
Shows protocols (arp, icmp, ip, tcp, udp) statistics of
average packet for a specified Ethernet port.
Shows protocols (arp, icmp, ip, tcp, udp) statistics of
Interface group for a specified Ethernet port.

To delete all protocol statistics of specified Ethernet port, use the following command.
Command

Mode

clear protocol statistics

Global

[PORTS ]

Bridge

A50010-Y3-C150-2-7619

Description
Deletes all protocols statistics for an Ethernet port.

79

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

5.2.8

Port Status
To display a port status, use the following command.
Command

Mode

Description
Shows configured state of port, enter the port number.

show port PORTS
Enable
Global

show port description [PORTS]

Bridge

show port module-info [PORTS]

Shows port specific description (max. number of characters is 100), enter the port number.
Shows port module information.

The following is an example of displaying port information for port 1 to 12.
SWITCH# show port 1-12
-----------------------------------------------------------------------NO

TYPE

PVID

STATUS

MODE

(ADMIN/OPER)

FLOWCTRL

INSTALLED

(ADMIN/OPER)

------------------------------------------------------------------------

5.2.9

1:

Ethernet

1

Up/Down

Force/Full/0

Off/ Off

2:

Ethernet

1

Up/Down

Force/Full/0

Off/ Off

Y
Y

3:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

4:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

5:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

6:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

7:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

8:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

9:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

10:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

11:

Ethernet

1

Up/Down

Auto/Full/0

Off/ Off

Y

12:
Ethernet
SWITCH#

1

Up/Down

Auto/Full/0

Off/ Off

Y

Initializing Port Statistics
To clear all recorded statistics of port and initiate, use the following command. It is possible to initiate statistics of port and select specific port.
Command
clear port statistics {PORT ㅣall}

5.3

Mode
Global

Function
Initializes port statistics. It is possible to select several
ports.

Port Mirroring
Port mirroring is the function of monitoring a designated port. Here, one port to monitor is
called monitor port and a port to be monitored is called mirrored port. Traffic transmitted
from mirrored port is sent to monitor port so that user can monitor network traffic.
The following is a network structure to analyze the traffic by port mirroring It analyzes traffic on the switch and network status by configuring Mirrored port and Monitor port connecting the computer, that the watch program is installed, to the port configured as Monitor port.

80

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Fig. 5.2

UMN:CLI

Port Mirroring

To configure port mirroring, designate mirrored ports and monitor port. Then enable port
mirroring function. Monitor port should be connected to the watch program installed PC.
You can designate only one monitor port but many mirrored ports for one switch.
Step 1
Activate the port mirroring, using the following command.
Command
mirror enable

Mode
Bridge

Description
Activates port mirroring.

Step 2
Designate the monitor port, use the following command.
Command
mirror monitor {PORTS I cpu}

Mode
Bridge

Description
Designates the monitor port.

Step 3
Designate the mirrored ports, use the following command.
Command
mirror add PORTS [ingress |
egress]

A50010-Y3-C150-2-7619

Mode

Description
Designates the mirrored ports.

Bridge

ingress: ingress traffic
egress: egress traffic

81

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Step 4
To delete and modify the configuration, use the following command.
Command

Mode

Description
Deactivate monitoring.

mirror disable
Bridge

mirror del PORTS [ingress |

Delete a port from the mirrored ports.

egress]

Step 5
To disable monitoring function, use the following command.
Command

Mode

Description

Bridge

no mirror monitor

Disable port mirroring function.

The following is an example of configuring port mirroring with a port.
Step 1
Connect a motoring PC to the monitor port of the switch.
Step 2
Enable mirroring function.
SWITCH(bridge)# mirror enable
SWITCH(bridge)#

Step 3
Configure the monitor port 1 and mirroring port 2, 3, 4 and 5.
SWITCH(bridge)# mirror monitor 1
SWITCH(bridge)# mirror add 2
SWITCH(bridge)# mirror add 3-5
SWITCH(bridge)#

Step 4
Check the configuration.
SWITCH(bridge)# show mirror
Mirroring enabled
Monitor port =
----------------------------------|

1

|123456789012
----------------------------------Ingress Mirrored Ports|............
Egress Mirrored Ports|............
SWITCH(bridge)#

82

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

6 System Environment
6.1

Environment Configuration
You can configure a system environment of the hiD 6615 S223/S323 with the following
items:
•
•
•
•
•
•
•
•
•
•
•

6.1.1

Host Name
Time and Date
Time Zone
Network Time Protocol
Simple Network Time Protocol (SNTP)
Terminal Configuration
Login Banner
DNS Server
Fan Operation
Disabling Daemon Operation
System Threshold

Host Name
Host name displayed on prompt is necessary to distinguish each device connected to
network.
To set a new host name, use the following command.
Command
hostname NAME
no hostname [NAME]

Mode
Global

Description
Creates a host name of the switch, enter the name.
Deletes a configured host name, enter the name.

To see a new host name, use the following command.
Command
show running-config hostname

Mode
Global

Description
Shows the host name.

The following is an example of changing hostname to “hiD6615”
SWITCH(config)# hostname hiD6615
hiD6615(config)#

6.1.2

Time and Date
To set system time and date, use the following command.
Command

Mode

Description

clock DATETIME

Enable

Sets system time and date.

show clock

Global

Shows system time and date.

A50010-Y3-C150-2-7619

83

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is an example of setting system time and date as 10:20pm, July 4th, 2005.
SWITCH# clock 06 Mar 2006 10:20
Mon, 6 Mar 2006 10:20:00 GMT+0000
SWITCH#

6.1.3

Time Zone
The hiD 6615 S223/S323 provides three kinds of time zone, GMT, UCT and UTC. The
time zone of the switch is predefined as GMT (Greenwich Mean Time). Also you can set
the time zone where the network element belongs.
To set the time zone, use the following command (Refer to the below table).
Command

Mode

time-zone TIMEZONE

Global
Enable

show time-zone

Global

Description
Sets the time zone.
Shows the world time zone map.

Tab. 6.1 shows the world time zone.
Time Zone

Country/City

Time Zone

Country/City

Time Zone

Country/City

GMT-12

Eniwetok

GMT-3

Rio De Janeiro

GMT+6

Rangoon

GMT-11

Samoa

GMT-2

Maryland

GMT+7

Singapore

GMT-10

Hawaii, Honolulu

GMT-1

Azores

GMT+8

Hong Kong

GMT-9

Alaska

GMT+0

London, Lisbon

GMT+9

Seoul, Tokyo

GMT-8

LA, Seattle

GMT+1

Berlin, Rome

GMT+10

Sydney,

GMT-7

Denver

GMT+2

Cairo, Athens

GMT+11

Okhotsk

GMT-6

Chicago, Dallas

GMT+3

Moscow

GMT+12

Wellington

GMT-5

New York, Miami

GMT+4

Teheran

GMT-4

George Town

GMT+5

New Delhi

Tab. 6.1

6.1.4

World Time Zone

Network Time Protocol
The Network Time Protocol (NTP) provides a mechanism to synchronize time on computers across an internet. The specification for NTP is defined in RFC 1119.
To enable/disable the NTP function, use the following command.
Command
ntp

SERVER1

Mode

[[SERVER2]

Enables the NTP function with specified NTP server.
SERVER: server IP address

SERVER3]]

ntp start
no ntp

84

Description

Global

Operates the NTP function with specified NTP server.
Disables the NTP function.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To display a configured NTP, use the following command.
Command

Mode
Enable

show ntp

Global

Description
Shows a configured NTP function.

The following is an example of configuring 203.255.112.96 as NTP server, running it and
showing it.
SWITCH(config)# ntp 203.255.112.96
SWITCH(config)# ntp start
SWITCH(config)# show ntp
ntp started
ntp server 203.255.112.96
SWITCH(config)#

The following is an example of releasing NTP and showing it.
SWITCH(config)# no ntp
SWITCH(config)# show ntp
ntp stoped
SWITCH(config)#

6.1.5

NTP (Network Time Protocol)
The hiD 6615 S223/S323 sends and receives the messages constantly with NTP server
in order to adjust the recent time. NTP bind-address help NTP server classify the user’s
swith.
To assign IP address that transmitting the message with NTP server, use the following
command.
Command

Mode

Description
Assigns IP address which receiving the message from

ntp bind-address A.B.C.D

no ntp bind-address

6.1.6

Global

server during transmitting the messages with NTP
server.
Deletes the binding-IP address.

Simple Network Time Protocol (SNTP)
NTP (Network Time Protocol) and SNTP (Simple Network Time Protocol) are the same
TCP/IP protocol in that they use the same UDP time packet from the Ethernet Time
Server message to compute accurate time. The basic difference in the two protocols is
the algorithms being used by the client in the client/server relationship.
The NTP algorithm is much more complicated than the SNTP algorithm. NTP normally
uses multiple time servers to verify the time and then controls the rate of adjustment or
slew rate of the PC which provides a very high degree of accuracy. The algorithm determines if the values are accurate by identifying time server that doesn’t agree with other
time servers. It then speeds up or slows down the PC's drift rate so that the PC's time is

A50010-Y3-C150-2-7619

85

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

always correct and there won't be any subsequent time jumps after the initial correction.
Unlike NTP, SNTP usually uses just one Ethernet Time Server to calculate the time and
then it "jumps" the system time to the calculated time. It can, however, have back-up
Ethernet Time Servers in case one is not available.
To configure the switch in SNTP, use the following commands.
Command

Mode

Specifies the IP address of the SNTP server. It is pos-

sntp SERVER 1 [SERVER 2]
[SERVER 3]

Description

Global

sible up to three number of server.
SERVER: server IP address
Disables SNTP function.

no sntp

To display SNTP configuration, use the following command.
Command

Mode
Enable

show sntp

Global

Description
Show SNTP configuration.

The following is to register SNTP server as 203.255.112.96 and enable it.
SWITCH(config)# sntp 203.255.112.96
SWITCH(config)# show sntp
==========================
sntpd is running.
==========================
Time Servers
-------------------------1st : 203.255.112.96
==========================
SWITCH(config)#

i
6.1.7

You can configure up to 3 servers so that you use second and third servers as backup
use in case the first server is down.

Terminal Configuration
By default, the hiD 6615 S223/S323 is configured to display 24 lines composed by 80
characters on console terminal. The maximum line displaying is 512 lines.
To set the number of line displaying on terminal screen, use the following command.
Command
terminal length <0-512>
no terminal length

86

Mode

Description
Sets the number of line displaying on console terminal,

Global

enter the value.
Restores a default line displaying.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

6.1.8

UMN:CLI

Login Banner
It is possible to set system login and log-out banner. Administrator can leave a message
to other users with this banner.
To set system login and log-out banner, use the following command.
Command

Mode

Description
Sets a banner before login the system.

banner
banner login

Global

Sets a banner when successfully log in the system.
Sets a banner when failing to login the system.

banner login-fail

To restore a default banner, use the following command.
Command

Mode

Description

no banner
no banner login

Global

Restores a default banner.

no banner login-fail

To display a current login banner, use the following command.
Command
show banner

6.1.9

Mode
Enable
Global

Description
Shows a current login banner.

DNS Server
To set a DNS server, use the following command.
Command
dns server A.B.C.D

Mode
Global

no dns server A.B.C.D
Enable

show dns

Global

Description
Sets a DNS server.
Removes a DNS server.
Shows a DNS server.

If a specific domain name is registered instead of IP address, user can do telnet, FTP,
TFTP and ping command to the hosts on the domain with domain name.
To configure DNS domain name, use the following command.
Command
dns search DOMAIN
no dns search DOMAIN

Mode
Global

Description
Searches a domain name.
Removes a domain name.

It is possible to delete DNS server and domain name at the same time with the below
command.

A50010-Y3-C150-2-7619

87

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode
Global

no dns

6.1.10

Description
Deletes DNS server and domain name.

Fan Operation
In hiD 6615 S223/S323, it is possible to control fan operation. To control fan operation,
use the following command.
Command

Mode

fan operation {on | off}

i
6.1.11

Global

Description
Configures fan operation.

It is possible to configure to start and stop fan operation according to the system temperature. To configure this, refer the Section 6.1.12.3.

Disabling Daemon Operation
You can disable the daemon operation unnecessarily occupying CPU. To disable certain
daemon operation, use the following command.
Command

Mode
Enable

halt PID

Description
Disables the daemon operation.

You can display PID of daemon with the show process command.
SWITCH# show process
USER

6.1.12

PID %CPU %MEM

VSZ
1448

RSS TTY
592 ?

STAT START
S

15:56

TIME COMMAND

admin

1

0.0

0.5

0:03 init [3]

admin

2

0.0

0.0

0

0 ?

S

15:56

admin

3

0.0

0.0

0

0 ?

SN

15:56

0:00 [ksoftirqd_CPU0]

admin
--More--

4

0.0

0.0

0

0 ?

S

15:56

0:00 [kswapd]

0:00 [keventd]

System Threshold
You can configure the switch with various kinds of the system threshold like CPU load,
traffic, temperature, etc. Using this threshold, the hiD 6615 S223/S323 generates syslog
messages, sends SNMP traps, or performs a related procedure.

6.1.12.1

CPU Load
To set a threshold of CPU load, use the following command.
Command

Mode

Sets a threshold of CPU load in the unit of percent (%).

threshold cpu <21-100> {5 | 60 |
600} [<20-100> {5 | 60 | 600}]
no threshold cpu

88

Description

Global

20-100: CPU load (default: 50)
5 | 60 | 600: time Interval (second)
Deletes a configured threshold of CPU load.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To show a configured threshold of CPU load, use the following command.
Command

Mode
All

show cpuload

6.1.12.2

Description
Shows a configured threshold of CPU load.

Port Traffic
To set a threshold of port traffic, use the following command.
Command
threshold

port

Mode

Sets a threshold of port traffic.

PORTS

PORTS: port number (1/1, 1/2, 2/1, …)

THRESHOLD {5 | 60 | 600} {rx |

tx}

Global

no threshold port PORTS {rx |

THRESHOLD: threshold value (unit: kbps)
5 | 60 | 600: time Interval (unit: second)
Deletes a configured threshold of port traffic.

tx}

i

Description

The threshold of the port is set to the maximum rate of the port as a default.
To show a configured threshold of port traffic, use the following command.
Command

Mode
Enable

show port threshold

6.1.12.3

Global

Description
Shows a configured threshold of port traffic.

Fan Operation
The system fan will operate depending on a configured fan threshold. To set a threshold
of port traffic, use the following command.
Command

Mode

Description
Sets a threshold of fan operation in the unit of centi-

threshold

fan

grade (°C).

START-TEMP
Global

STOP-TEMP

START-TEMP: starts fan operation. (default: 30)
STOP-TEMP: stops fan operation. (default: 0)
Deletes a configured threshold of fan operation.

no threshold fan

!

When you set a threshold of fan operation, START-TEMP must be higher than STOPTEMP.
To show a configured threshold of fan operation, use the following command.
Command
show status fan

A50010-Y3-C150-2-7619

Mode
Enable /Global / Bridge

Description
Shows a status and configured threshold of fan operation.

89

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

6.1.12.4

System Temperature
To set a threshold of system temperature, use the following command.
Command

Mode

Description
Sets a threshold of system temperature in the unit of

threshold temp VALUE VALUE

Global

centigrade (°C).
VALUE: Threshold temperature between -40 ~ 100
Deletes a configured threshold of system temperature.

no threshold temp

To show a configured threshold of system temperature, use the following command.
Command
show status temp

6.1.12.5

Mode

Description

Enable

Shows a status and configured threshold of system

Global

temperature.

System Memory
To set a threshold of system memory in use, use the following command.
Command

Mode

Description
Sets a threshold of system memory in the unit of per-

threshold memory <20-100>

Global

20-100: system memory in use
Deletes a configured threshold of system memory.

no threshold memory

6.1.13

cent (%).

Enabling FTP Server
FTP server is enabled on hiD 6615 S223/S323 by default. But this configuration can’t
provide the security serveice becaue it’s easy to access to the port #23 by others. If the
default configuration is unnecessary on sysem, user can disable the system as FTP
server.
To enable/disable the system of hiD S223/S323 as FTP server, use the following command.
Command
ftp server {enableㅣdisable}

Mode
Global

Description
Enables/ disables the function for FTP serve
Default: enable

The follwing is an example of displaying the status of FTP server.
SWITCH(config)# ftp server disable
SWITCH(config)# show running-config
(Omitted)
!
ftp server disable
(Omitted)
SWTICH(config)#

90

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

6.1.14

UMN:CLI

Assigning IP Address of FTP Client
Serveral IP addresses can be assigned on hiD 6615 S223/S323. But user can specify
one source IP address connecting FTP server when the switch is a client. To configure
FTP binding address as a source IP address when hiD 6615 S223/S323 as a client connects to FTP server, use the following command.
Command

Mode

Binds a source IP address for connecting to FTP

ftp bind-address A.B.C.D

Global

6.2

server..
Deletes FTP bind-address

no ftp bind-address

i

Description

Please be careful that the FTP bind-address is also applied to TFTP server’s bindaddress.

Configuration Management
You can verify if the system configurations are correct and save them in the system. This
section contains the following functions.
•
•
•
•
•

6.2.1

Displaying System Configuration
Saving System Configuration
Auto-Saving
System Configuration File
Restoring Default Configuration

Displaying System Configuration
To display a current running configuration of the system, use the following command.
Command

Mode

Shows a configuration of the system.

show running-config
show

running-config

Description

{admin-

rule | arp | bridge | dns | full |
hostname | instance | interface
Shows a configuration of the system with the specific

INTERFACE I login | pm | qos |

rmon-alarm | rmon-event | rmon-

All

option.

history | router {bgp | pim | rip |
ospf | vrrp} | rule | snmp | syslog
| time-out | time-zone | time-out}

show

running-config

router

{bgp | ospf | pim | rip | vrrp}

A50010-Y3-C150-2-7619

Shows only the configuration that corresponds to each
option.

91

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is an example to display a configuration of syslog.
SWITCH# show running-config syslog
!
syslog start
syslog output info local volatile
syslog output info local non-volatile
!
SWITCH#

6.2.2

Saving System Configuration
If you change a configuration of the system, you need to save the changes in the system
flash memory. To save all changes of the system, use the following command.
Command
write memory

!

6.2.3

Mode
All

Description
Saves all changes in the system flash memory.

When you use the command, write memory, make sure there is no key input until [OK]
message appears.

Auto-Saving
In hiD 6615 S223/S323, it is possible to save the configuration automatically. To configure
the con-figuration periodically, use the following command.
Command
write interval <10-1440>

Mode

Saves auto-configuration periodically.
Global

10-1440: auto-saving interval (Default: 10 minute)
Disables auto-saving function.

no write interval

6.2.4

Description

System Configuration File
To manage a system configuration file, use the following command.
Command

Mode

Copies a running configuration file.

copy running-config {FILENAME

FILENAME: configuration file name

| startup-config}

startup-config: startup configuration file
Copies a startup configuration file.

copy startup-config FILENAME

copy FILENAME startup-config

Description

FILENAME: configuration file name.
Enable

Copies a specified configuration file to the startup configuration file.
FILENAME: configuration file name

copy FILENAME1 FILENAME2

erase FILENAME

92

Copies a specified configuration file to another configuration file.
Deletes a specified configuration file.
FILENAME: configuration file name

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To back up a system configuration file using FTP or TFTP, use the following command.
Command

Description

copy {ftp | tftp} config upload

Uploads a file to ftp or fttp server with a name config-

{FILE-NAME | startup-config}

ured by user.

copy {ftp | tftp} config download

Downloads a file from ftp or fttp server with a name

{FILE-NAME | startup-config}

copy {ftp | tftp} os upload {os1 |

i

Mode

Enable

configured by user.
Uploads a file to ftp or fttp server with a name of os1 or

os2}

os2.

copy {ftp | tftp} os download

Downloads a file from ftp or fttp server with a name of

{os1 | os2}

os1 or os2.

To access FTP to back up the configuration or use the backup file, you should know FTP
user ID and the password. To back up the configuration or use the file through FTP, you
can check the file transmission because hash function is automatically turned on.
To display a system configuration file, use the following command.
Command
show startup-config
show config-list

Mode
Enable
Enable
Global

Description
Shows a current startup configuration.
Shows a list of configuration files.

The following is an example of displaying a list of configuration files.
SWITCH(config)# copy running-config SURPASShiD6615
SWITCH(config)# show config-list
=========================
CONFIG-LIST
=========================
l3_default
SURPASShiD6615
SWITCH(config)#

To delete backup file, use the following command.
Command
erase config FILENAME

6.2.5

Mode
Enable

Description
Deletes backup file.

Restoring Default Configuration
To restore a default configuration of the system, use the following command.
Command

Mode

Restores a factory default configuration.

restore factory-defaults
restore layer2-defaults
restore layer3-defaults

A50010-Y3-C150-2-7619

Description

Global

Restores an L2 default configuration.
Restores an L3 default configuration.

93

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

i

After restoring a default configuration, you need to restart the system to initiate.
The following is an example of restoring a default configuration of the system.
SWITCH(config)# restore factory-defaults
You have to restart the system to apply the changes
SWITCH(config)#

6.3

System Management
When there is any problem in the system, you must find what the problem is and its solution. Therefore, you should not only be aware of a status of the system but also verify that
the system is configured properly.
This section includes the following functions with CLI command.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

6.3.1

Network Connection
IP ICMP Source-Routing
Tracing Packet Route
Displaying User Connecting to
MAC Table
Running Time of System
System Information
System Memory Information
Average of CPU Load
Running Process
Displaying System Image
Displaying Installed OS
Default OS
Switch Status
Tech Support

Network Connection
To verify if your system is correctly connected to the network, use the command, ping.
For IP network, this command transmits echo message to ICMP (Internet Control Message Protocol). ICMP is internet protocol that notifies fault situation and provides information on the location where IP packet is received. When ICMP echo message is received
at the location, its replying message is returned to the place where it came.
To perform a ping test to verify network status, use the following command.
Command
ping [IP-ADDRESS]

94

Mode
Enable

Description
Performs a ping test to verify network status.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The following is the basic information to operate ping test.
Items

Description
Supports ping test. Default is IP.

Protocol [ip]
Target IP address

Sends ICMP echo message by inputting IP address or host name of
destination in order to check network status with relative.

Repeat count [5]

Sends ICMP echo message as many as count. Default is 5.

Datagram size [100]

Ping packet size. Default is 100 bytes.

Timeout in seconds [2]
Extended commands [n]

Tab. 6.2

It is considered as successful ping test if reply returns within the configured time interval. Default is 2 seconds.
Shows the additional commands. Default is no.

Options for Ping

The following is an example of ping test 5 times to verify network status with IP address
172.16.1.254.
SWITCH# ping
Protocol [ip]: ip
Target IP address: 172.16.1.254
Repeat count [5]: 5
Datagram size [100]: 100
Timeout in seconds [2]: 2
Extended commands [n]: n
PING 172.16.1.254 (172.16.1.254) 100(128) bytes of data.
Warning: time of day goes back (-394us), taking countermeasures.
108 bytes from 172.16.1.254: icmp_seq=1 ttl=255 time=0.058 ms
108 bytes from 172.16.1.254: icmp_seq=2 ttl=255 time=0.400 ms
108 bytes from 172.16.1.254: icmp_seq=3 ttl=255 time=0.403 ms
108 bytes from 172.16.1.254: icmp_seq=4 ttl=255 time=1.63 ms
108 bytes from 172.16.1.254: icmp_seq=5 ttl=255 time=0.414 ms
--- 172.16.1.254 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 8008ms
rtt min/avg/max/mdev = 0.058/0.581/1.632/0.542 ms
SWITCH#

When multiple IP addresses are assigned to the switch, sometimes you need to verify the
connection status between the specific IP address and network status.
In this case, use the same process as ping test and then input the followings after extended commands. It is possible to verify the connection between specific IP address and
network using the following command.

A50010-Y3-C150-2-7619

95

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is the information to use ping test for multiple IP addresses.
Items
Source address or interface

Type of service [0]:

Description
Designates the address where the relative device should respond in
source ip address.
The service filed of QoS (Quality Of Service) in Layer 3 application. It
is possible to designate the priority for IP Packet.
Decides whether Don’t Fragment (DB) bit is applied to Ping packet or
not. Default is no. If the user choose ‘yes’, when the packets pass

Set DF bit in IP header? [no]

through the segment compromised with the smaller data unit, it prevents the packet to be Fragment. Therefore there could be error message.

Data pattern [0xABCD]

Tab. 6.3

Configures data pattern. Default is OxABCD.

Options for Ping for Multiple IP Addresses

The following is to verify network status between 172.16.157.100 and 172.16.1.254 when
IP address of the switch is configured as 172.16.157.100.
SWITCH# ping
Protocol [ip]:
Target IP address: 172.16.1.254
Repeat count [5]: 5
Datagram size [100]: 100
Timeout in seconds [2]: 2
Extended commands [n]: y
Source address or interface: 172.16.157.100
Type of service [0]: 0
Set DF bit in IP header? [no]: no
Data pattern [0xABCD]:
PATTERN: 0xabcd
PING 172.16.1.254 (172.16.1.254) from 172.16.157.100 : 100(128) bytes of data.
108 bytes from 172.16.1.254: icmp_seq=1 ttl=255 time=30.4 ms
108 bytes from 172.16.1.254: icmp_seq=2 ttl=255 time=11.9 ms
108 bytes from 172.16.1.254: icmp_seq=3 ttl=255 time=21.9 ms
108 bytes from 172.16.1.254: icmp_seq=4 ttl=255 time=11.9 ms
108 bytes from 172.16.1.254: icmp_seq=5 ttl=255 time=30.1 ms
--- 172.16.1.254 ping statistics --5 packets transmitted, 5 received, 0% packet loss, time 8050ms
rtt min/avg/max/mdev = 11.972/21.301/30.411/8.200 ms
SWITCH#

96

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

6.3.2

UMN:CLI

IP ICMP Source-Routing
If you implement PING test to verify the status of network connection, icmp request arrives at the final destination as the closest route according to the routing theory.
C

D
B
Reply
E

Request

A (hiD 6615)

PING test to C

The route for general PING test
PC

Fig. 6.1

Ping Test for Network Status

In the above figure, if you perform ping test from PC to C, it goes through the route of
「A→B→C」. This is the general case. But, the hiD 6615 S223/S323 can enable to perform ping test from PC as the route of「A→E→D→C」.
C

D
Reply

B

Request

E

PING test to C

A (hiD 6615)

PC

Fig. 6.2

A50010-Y3-C150-2-7619

IP Source Routing

97

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To perform ping test as the route which the manager designated, use the following steps.
Step 1
Enable IP source-routing function from the equipment connected to PC which the PING
test is going to be performed.
To enable/disable IP source-routing in the hiD 6615 S223/S323, use the following command.
Command
ip icmp source-route

Mode
Global

no ip icmp source-route

Description
Enable IP source-routing function.
Disable IP source-routing function.

Step 2
Performs the ping test from PC as the designate route with the ping command

6.3.3

Tracing Packet Route
You can discover the routes that packets will actually take when traveling to their destinations. To do this, the traceroute command sends probe datagram and displays the roundtrip time for each node.
If the timer goes off before a response comes in, an asterisk (*) is printed on the screen.
Command
traceroute [ADDRESS]

Mode
Enable

traceroute ip ADDRESS

Description
Traces packet routes through the network.
ADDRESS: IP address or host name

The following is the basic information to trace packet routes.
Items

Description
Supports ping test. Default is IP.

Protocol [ip]
Target IP address

Sends ICMP echo message by inputting IP address or host name of
destination in order to check network status with relative.

Source address

Source IP address which other side should make a response.

Numeric display [n]

Hop is displayed the number instead of indications or statistics.

Timeout in seconds [2]
Probe count [3]

It is considered as successful ping test if reply returns within the configured time interval. Default is 2 seconds.
Set the frequency of probing UDP packets.
The TTL field is reduced by one on every hop. Set the time to trace

Maximum time to live [30]

hop transmission (The number of maximum hops). Default is 30 seconds.
Selects general UDP port to be used for probing Port. The default is

Port Number [33434]

33434. The command of traceroute depends on the port range of destination host up to base + nhops – 1 through the base.

Tab. 6.4

98

Options for Tracing Packet Route

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The following is an example of tracing packet route sent to 10.2.2.20.
SWITCH# traceroute 10.2.2.20
traceroute to 10.2.2.20 (10.2.2.20), 30 hops max, 38 byte packets
1 10.2.2.20 (10.2.2.20) 0.598 ms 0.418 ms 0.301 ms
SWITCH#

6.3.4

Displaying User Connecting to System
To display current users connecting to the system from a remote place or via console interface, use the following command.
Command

Mode
Enable

where

Description
Shows current users connecting to the system from a
remote place or via console interface.

The following is an example of displaying if there is any accessing user from remote place.
SWITCH# where
admin at ttyp0 from 10.20.1.32:2196 for 30 minutes 35.56 seconds
admin at ttyS0 from console for 28 minutes 10.90 seconds
SWITCH#

6.3.5

MAC Table
To display MAC table recorded in specific port, use the following command.
Command

Mode
Enable

show mac BRIDGE [PORTS]

Global
Bridge

Description
Shows MAC table.
BRIDGE: bridge name

The following is an example of displaying MAC table recorded in default.
SWITCH(config)# show mac 1
port

mac addr

permission

in use

==================================================================
eth01

00:0b:5d:98:92:da

OK

16.62

eth01

00:14:c2:d9:8a:b5

OK

56.62

eth01

00:01:02:50:d6:b9

OK

72.62

eth01

00:0d:9d:8c:00:ee

OK

72.62

eth01

00:15:00:39:4d:2e

OK

92.62

eth01

00:0e:e8:8b:24:ae

OK

115.48

eth01

00:14:c2:d9:4c:f0

OK

115.48

eth01

00:0b:5d:53:4d:96

OK

124.62

eth01

00:13:20:4b:05:af

OK

132.62

eth01

00:0e:e8:f0:b3:63

OK

152.62

(skipped)
SWITCH(config)#

A50010-Y3-C150-2-7619

99

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

6.3.6

Configuring Ageing time
SURPASS hiD 6615 records MAC Table to prevent Broadcast packets from transmitting.
And unnecessary MAC address that does not response during specified time is deleted
from the MAC table automatically. The specified time is called Ageing time.
To specify the Ageing time, use the following command.
Command
mac

aging-time

Mode
<10-

Specifies the Ageing time.

Bridge

21474830>

6.3.7

Description

Default: 300sec

Running Time of System
To display running time of the system, use the following command.
Command

Mode
Enable

show uptime

Global

Description
Shows running time of the system.

The following is an example of displaying running time of the system.
SWITCH# show uptime
10:41am up 15 days, 10:55, 0 users, load average: 0.05, 0.07, 0.01
SWITCH#

6.3.8

System Information
To display the system information, use the following command.
Command

Mode
Enable

show system

Global

Description
Shows the system information.

The following is an example of displaying the system information of hiD 6615 S223/S323.
SWITCH(config)# show system
SysInfo(System Information)
Model Name

: SURPASS hiD6615 S323

Main Memory Size

: 128 MB

Flash Memory Size

: 8 MB(INTEL 28F640J3), 32 MB(INTEL 28F256J3)

S/W Compatibility

: 3, 7

H/W Revision

: DS-T3-07F-A2

NOS Version

: 3.06

B/L Version

: 4.69

H/W Address

: 00:d0:cb:27:01:66

PLD Version

: 0x10

Serial Number
SWITCH(config)#

100

: N/A

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

6.3.9

UMN:CLI

System Memory Information
To display a system memory status, use the following command.
Command
show memory
show memory {bgp | dhcp | imi |
lib | nsm | ospf | pim | rip}

6.3.10

Mode
Enable
Global

Description
Shows system memory information.
Shows system memory information with a specific
option.

CPU packet limit
To limit the packets of CPU, use the following command.
Command
cpu packet limit <500-6000>

Mode

Description

Global

It is possible to display the packet limit of CPU using the following command.
Command

Mode

show cpu packet limit

Enable

Description

View
Global

6.3.11

Average of CPU Load
It is possible to display average of CPU load using the following command.
Command

Mode
View

show cpuload

Enable
Global

6.3.12

Description
Shows threshold of CPU utilization and average of
CPU utilization.

Running Process
The hiD 6615 S223/S323 provides a function that shows information of the running processes. The information with this command can be very useful to manage the switch.
To display information of the running processes, use the following command.
Command
show process

A50010-Y3-C150-2-7619

Mode
Enable
Global

Description
Shows information of the running processes.

101

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is an example of displaying information of the running processes.
SWITCH# show process
USER

VSZ

RSS

TTY

STAT

START TIME

COMMAND

admin

PID %CPU %MEM
1

0.2

0.2

1448

596

?

S

20:12 0:05

init [3]

admin

2

0.0

0.0

0

0

?

S

20:12 0:00

[keventd]

admin

3

0.0

0.0

0

0

?

SN

20:12 0:00

[ksoftirqd_CPU0]

admin

4

0.0

0.0

0

0

?

S

20:12 0:00

[kswapd]

admin

5

0.0

0.0

0

0

?

S

20:12 0:00

[bdflush]

admin

6

0.0

0.0

0

0

?

S

20:12 0:00

[kupdated]

admin

7

0.0

0.0

0

0

?

S

20:12 0:00

[mtdblockd]

admin

8

0.0

0.0

0

0

?

SW<

20:12 0:00

[bcmDPC]

admin

9

1.4

0.0

0

0

?

SW<

20:12 0:29

[bcmCNTR.0]

admin

10

1.4

0.0

0

0

?

SW<

20:12 0:29

[bcmCNTR.1]

admin

17

0.0

0.0

0

0

?

SWN

20:12 0:00

[jffs2_gcd_mtd3]

admin

149

0.0

0.3

1784

776

?

S

Jan01 0:00

/sbin/syslogd –m

admin

151

0.0

0.2

1428

544

?

S

Jan01 0:00

/sbin/klogd -c 1

admin

103

2.6

2.0

20552 5100

?

S

20:12 0:53

/usr/sbin/swchd

--more-(Omitted)
SWITCH#

6.3.13

Displaying System Image
To check a current system image version, use the following command.
Command
show version

Mode
Enable
Global

Description
Shows version of system image.

To display a size of the current system image, use the following command.
Command
show os-size

6.3.14

Mode
Enable
Global

Description
Shows size of system image.

Displaying Installed OS
To display utilization of flash memory, use the followng command.
Command
show flash

6.3.15

Mode
Enable
Global

Description
Shows utilization of flash memory.

Default OS
The hiD 6615 S223/S323 supports dual OS You can show the flash memory by using
show system command. When there are two kinds of system images installed, user can

102

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

configure one of two as default OS what user wants.
In hiD 6615 S223/S323, a system image saved in os1 is configured as default OS by
default.
To desgnate a default OS, use the following command.

6.3.16

Command

Mode

default-os {os1 | os2}

Enable

Description
Desgnates default OS of switch.

Switch Status
To display temperature of switch, power status, and fan status, use the following
command.
Command

6.3.17

Mode

Description

show status fan

Enable

Shows fan status of switch.

show status power

Global

Shows power status.

show status temp

Bridge

Shows temperature of switch.

Tech Support
In hiD 6615 S223/S323, you can display the configuration and configuration file, log
information, register, memory, debugging information using the following commands. By
checking tech supporting, check the system errors and use it for solving the problem.
Command

Mode

tech-support {all | crash-info}
console
tech-support {all | crash-info}
remote IP-ADDRESS {ftp | tftp}

!

Description
Check tech support on console.

Enable

Save the contents of tech support in a specified address.

Tech support contents displayed on console are showed at once regardless of the number of display lines of terminal screen.

A50010-Y3-C150-2-7619

103

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7 Network Management
7.1

Simple Network Management Protocol (SNMP)
Simple Network Management Protocol (SNMP) system is consisted of three parts: SNMP
manager, a managed device and SNMP agent. SNMP is an application-layer protocol that
allows SNMP manager and agent stations to communicate with each other. SNMP provides a message format for sending information between SNMP manager and SNMP
agent. The agent and MIB reside on the switch. In configuring SNMP on the switch, you
define the relationship between the manager and the agent. According to community, you
can give right only to read or right both to read and to write. The SNMP agent has MIB
variables to reply to request from SNMP administrator. And SNMP administrator can obtain data from the agent and save data in the agent. The SNMP agent gets data from MIB,
which saves information on system and network.
SNMP agent sends trap to administrator for specific cases. Trap is a warning message to
alert network status to SNMP administrator.
The hiD 6615 S223/S323 enhances accessing management of SNMP agent more and
limit the range of OID opened to agents.
The following is how to configure SNMP.
•
•
•
•
•
•
•
•
•
•
•

7.1.1

SNMP Community
Information of SNMP Agent
SNMP Com2sec
SNMP Group
SNMP View Record
Permission to Access SNMP View Record
SNMP Version 3 User
SNMP Trap
SNMP Alarm
Displaying SNMP Configuration
Disabling SNMP

SNMP Community
Only an authorized person can access an SNMP agent by configuring SNMP community
with a community name and additional information.
To configure an SNMP community to allow an authorized person to access, use the following command on Global configuration mode.
Command

Mode

snmp community {ro | rw} COMMUNITY
[IP-ADDRESS] [OID]

no snmp community {ro | rw} COMMUNITY

i
104

Description
Creates SNMP community.

Global

COMMUNITY: community name
Deletes a created community.
COMMUNITY: community name

You can configure up to 3 SNMP communities for each read-only and read-write.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To display a configured SNMP community, use the following command.
Command

Mode
Enable

show snmp community

Global

Description
Shows a created SNMP community.

The following is an example of creating 2 SNMP communities.
SWITCH(config)# snmp community ro public
SWITCH(config)# snmp community rw private
SWITCH(config)# show snmp community
Community List
Type Community

Source

OID

----------------------------------------------ro
rw

public
private

SWITCH(config)#

7.1.2

Information of SNMP Agent
You can specify basic information of SNMP agent as administrator, location, and address
that confirm its own identity.
To set basic information of SNMP agent, use the following command.
Command

Mode

Description

snmp contact NAME

Sets a name of administrator.

snmp location LOCATION

Sets a location of SNMP agent.

snmp agent-address IP-ADDRESS

Global

Sets an IP address of SNMP agent.

no snmp contact
Deletes specified basic information for

no snmp location

each item.

no snmp agent-address IP-ADDRESS

The following is an example of specifying basic information of SNMP agent.
SWITCH(config)# snmp contact Brad
SWITCH(config)# snmp location Germany
SWITCH(config)#

To display basic information of SNMP agent, use the following command.
Command

Mode

Shows a name of administrator.

show snmp contact
show snmp location
show snmp agent-address

A50010-Y3-C150-2-7619

Description

Enable
Global

Shows a location of SNMP agent.
Shows an IP address of SNMP agent.

105

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.1.3

SNMP Com2sec
SNMP v2 authorizes the host to access the agent according to the identity of the host and
community name. The command, com2sec, specifies the mapping from the identity of
the host and community name to security name.
To configure an SNMP security name, use the following command.
Command

Mode

Description
Specifies the mapping from the identity of the host and

snmp com2sec SECURITY

community name to security name, enter security and

{IP-ADDRESS | IP-ADDRESS/M}

community name.

COMMUNITY

Global

SECURITY: security name
COMMUNITY: community name
Deletes a specified security name, enter the security
name.

no snmp com2sec SECURITY

SECURITY: security name
Enable

show snmp com2sec

Global

Shows a specified security name.

The following is an example of configuring SNMP com2sec.
SWITCH(config)# snmp com2sec TEST 10.1.1.1 PUBLIC
SWITCH(config)# show snmp com2sec
Com2Sec List
SecName

Source

Community

--------------------------------------com2sec TEST
10.1.1.1 PUBLIC
SWITCH(config)#

7.1.4

SNMP Group
You can create an SNMP group that can access SNMP agent and its community that belongs to a group.
To create an SNMP group, use the following command.
Command

Mode

Creates SNMP group, enter the group name.

snmp group GROUP {v1 | v2c |
v3} SECURITY

GROUP: group name
Global

SECURITY: security name

no snmp group GROUP {v1 | v2c

Deletes SNMP group, enter the group name.

| v3} SECURITY

GROUP: group name

show snmp group

106

Description

Enable
Global

Shows a created SNMP group.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.1.5

UMN:CLI

SNMP View Record
You can create an SNMP view record to limit access to MIB objects with object identity
(OID) by an SNMP manager.
To configure an SNMP view record, use the following command.
Command

Mode

Description
Creates an SNMP view record.
VIEW: view record name

snmp view VIEW {included |
excluded} OID [MASK]

included: includes sub-tree.
Global

excluded: excludes sub-tree.
OID: OID number
MASK: Mask value (e.g. ff | ff.ff )
Deletes a created SNMP view record.

no snmp view VIEW [OID]

VIEW: view record name

To display a created SNMP view record, use the following command.
Command
show snmp view

Mode
Enable
Global

Description
Shows a created SNMP view record.

The following is an example of creating an SNMP view record.
SWITCH(config)# snmp view TEST included 410
SWITCH(config)# show snmp view
View list
-----------------------------------------------view TEST included 410
SWITCH(config)#

7.1.6

Permission to Access SNMP View Record
To grant an SNMP group to access a specific SNMP view record, use the following command.
Command

Mode

Description

snmp access GROUP {v1 | v2c}

Grants an SNMP group to access a specific SNMP

READ-VIEW WRITE-VIEW NO-

view record.

TIFY-VIEW

GROUP: group name

snmp access GROUP v3 {noauth | auth | priv} READ-VIEW
WRITE-VIEW NOTIFY-VIEW

no snmp access GROUP

A50010-Y3-C150-2-7619

Global

Grants an SNMP version 3 group to access a specific
SNMP view record.
GROUP: group name
Deletes a granted SNMP group to access a specific
SNMP view record.

107

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To display a granted an SNMP group to access a specific SNMP view record, use the following command.
Command
show snmp access

Mode

Description

Enable

Shows a granted an SNMP group to access a specific

Global

SNMP view record

The following is an example of permission to accessing an SNMP view record.
SWITCH(config)#
SWITCH(config)# snmp access regroup v1 test none none
SWITCH(config)# show snmp access
Access List
GroupName

SecModel SecLevel ReadView

WriteView

NotifyView

-----------------------------------------------------------------------------rogroup
v1
SWITCH(config)#

7.1.7

noauth

TEST

none

none

SNMP Version 3 User
In SNMP version 3, you can register an SNMP agent as user. If you register SNMP version 3 user, you should configure it with the authentication key.
To create/delete SNMP version 3 user, use the following command.
Command

Mode

Description
Creates SNMP version 3 user.

snmp user USER {md5 | sha}
AUTH-KEY [des PRIVATE-KEY]

USER : enters user name
Global

AUTH-KEY: Authentication passphrase (min length:8)
PRIVATE-KEY: Privacy passphrase (min length: 8)
Deletes a registered SNMP version 3 user.

no snmp user USER

To display SNMP version 3 user, use the following command.
Command
show snmp user

7.1.8

Mode
Enable
Global

Description
Displays SNMP version 3 user.

SNMP Trap
SNMP trap is an alert message that SNMP agent notifies SNMP manager about certain
problems. If you configure SNMP trap, switch transmits pertinent information to network
management program. In this case, trap message receivers are called trap host.

108

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.1.8.1

UMN:CLI

SNMP Trap Host
To set an SNMP trap host, use the following command.
Command

Mode

Description

snmp trap-host
IP-ADDRESS [COMMUNITY]

snmp trap2-host
IP-ADDRESS [COMMUNITY]

Specifies IP address of an SNMP trap host.
Global

snmp inform-trap-host

Specifies IP address of SNMP information trap host.

IP-ADDRESS [COMMUNITY]

i

You need to configure an SNMP trap host with the snmp trap2-host command, if you
manage the switch via the ACI-E.
To delete a specified SNMP trap host, use the following command.
Command

Mode

no snmp trap-host IP-ADDRESS
Global

no snmp trap2-host IP-ADDRESS

Deletes a specified SNMP trap host.
Deletes a specified information trap host.

no snmp inform-trap-host IP-ADDRESS

i

Description

You can set maximum 16 SNMP trap hosts with inputting one by one.
The following is an example of setting an SNMP trap host.
SWITCH(config)# snmp trap-host 10.1.1.3
SWITCH(config)# snmp trap-host 20.1.1.5
SWITCH(config)# snmp trap-host 30.1.1.2
SWITCH(config)#

7.1.8.2

SNMP Trap Mode
To select an SNMP trap-mode, use the following command.
Command
snmp trap-mode {alarm-report |
event}

•
•

i

Mode
Global

Description
Selects SNMP trap-mode according to user’s network
environment. ( alarm-report or event)

“event” trap-mode is set by default. It means that Dasan trap OID will be used upon
sending the trap if the trap-mode is “event”
“alarm-report” trap-mode will be used form SLE MIB OID which is Siemens private
OID.

In order to manage hiD 6615 S223/S323 using ACI-E, the trap-mode must be set as
“alarm-report”. Otherwise, ACI-E would not recognize any traps set from the hiD 6615
S223/S323.

A50010-Y3-C150-2-7619

109

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.1.8.3

Enabling SNMP Trap
The system provides various kind of SNMP trap, but it may inefficiently work if all these
trap messages are sent very frequently. Therefore, you can select each SNMP trap sent
to an SNMP trap host.

i

The system is configured to send all the SNMP traps as default.
•
•
•
•

•

•
•

•

•

authentication-failure is shown to inform wrong community is input when user trying
to access to SNMP inputs wrong community.
cold-start is shown when SNMP agent is turned off and restarts again.
link-up/down is shown when network of port specified by user is disconnected, or
when the network is connected again.
memory-threshold is shown when memory usage exceeds the threshold specified
by user. Also, when memory usage falls below the threshold, trap message will be
shown to notify it.
cpu-threshold is shown when CPU utilization exceeds the threshold specified by
user. Also, when CPU load falls below the threshold, trap message will be shown to
notify it.
port-threshold is shown when the port traffic exceeds the threshold configured by
user. Also, when port traffic falls below the threshold, trap message will be shown.
temperature-threshold is shown when the system temperature exceeds the threshold configured by user. Also, when system temperature falls below the threshold, trap
message will be shown.
dhcp-lease is shown when there is no more IP address can be assigned in subnet of
DHCP server. Even if only one subnet does not have IP address to assign when
there are several subnets, this trap message will be seen.
fan/power/module is shown when there is any status-change of fan, power, and
module.

To enable SNMP trap, use the following command.
Command

Mode

Configures the system to send SNMP trap when SNMP

snmp trap auth-fail

authentication is fail.
Configures the system to send SNMP trap when SNMP

snmp trap cold-start
snmp

trap

link-up

agent restarts.
Configures the system to send SNMP trap when a port

PORTS

[NODE]

is connected to network.

snmp trap link-down PORTS
[NODE]

Global

is disconnected from network.

load exceeds or falls below the threshold.
Configures the system to send SNMP trap when the

snmp trap port-threshold

port traffic exceeds or falls below the threshold.
Configures the system to send SNMP trap when sys-

snmp trap temp-threshold

Command

Configures the system to send SNMP trap when a port

Configures the system to send SNMP trap when CPU

snmp trap cpu-threshold

110

Description

tem temperature exceeds or falls below the threshold.

Mode

Description

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Configures the system to send SNMP trap when no
more IP address that can be assigned in the subnet of

snmp trap dhcp-lease

DHCP server is left.

snmp trap fan

Configures the system to send SNMP trap when the
Global

Configures the system to send SNMP trap when any

snmp trap power

problem occurs in power.
Configures the system to send SNMP trap when there

snmp trap module

7.1.8.4

fan begins to operate or stops.

is any problem in module.

Disabling SNMP Trap
To disable SNMP trap, use the following command.
Command

Mode

Description

no snmp trap auth-fail
no snmp trap cold-start
no snmp trap link-up PORTS
[NODE]

no snmp trap link-down PORTS
[NODE]

no snmp trap cpu-threshold

Global

Disables each SNMP trap.

no snmp trap port-threshold
no snmp trap temp-threshold
no snmp trap dhcp-lease
no snmp trap fan
no snmp trap power
no snmp trap module

!

When you use the no snmp command, all configurations concerning SNMP will be
deleted.

A50010-Y3-C150-2-7619

111

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.1.8.5

Displaying SNMP Trap
To display a configuration of SNMP trap, use the following command.
Command

Mode
Enable

show snmp trap

Global

Description
Shows a configuration of SNMP trap.

The following is an example of configuring IP address 10.1.1.1 as trap-host, 20.1.1.1 as
trap2-host and 30.1.1.1 as inform-trap-host.
SWITCH(config)# snmp trap-host 10.1.1.1
SWITCH(config)# snmp trap2-host 20.1.1.1
SWITCH(config)# snmp inform-trap-host 30.1.1.1
SWITCH(config)# show snmp trap
Trap-Host List
Host

Community

-----------------------------------------inform-trap-host 30.1.1.1
trap2-host

20.1.1.1

trap-host

10.1.1.1

Trap List
Trap-type

Status

-------------------------auth-fail

enable

cold-start

enable

cpu-threshold

enable

port-threshold

enable

dhcp-lease

enable

power

enable

module

enable

fan

enable|

temp-threshold

enable

SWITCH(config)#

7.1.9

SNMP Alarm
The hiD 6615 S223/S323 provides an alarm notification function. The alarm will be sent to
a SNMP trap host whenever a specific event in the system occurs through CLI and ACI-E.
You can also set the alarm severity on each alarm and make the alarm be shown only in
case of selected severity or higher. This enhanced alarm notification allows system administrators to manage the system efficiently.

7.1.9.1

Enabling Alarm Notification
To configure whether the switch enable transmitting SNMP alarm or not, use the following
command.
Command
snmp notify-activity {enable |
disable}

112

Mode
Global

Description
Enables/disables an alarm notification on CLI or ACI-E.
(default: disable)

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.1.9.2

UMN:CLI

Default Alarm Severity
To configure a priority of alarm, use the following command.
Command
snmp

alarm-severity

Mode
default

{critical | major | minor | warning

Global

| intermediate}

7.1.9.3

Description
Configures the priority of alarm.
(default: minor)

Alarm Severity Criterion
You can set an alarm severity criterion to make an alarm be shown only in case of selected severity or higher. For example, if an alarm severity criterion has been set to major,
you will see only an alarm whose severity is major or critical.
To configure alarm-severity criteria in CLI, use the following command.
Command
snmp

alarm-severity

Mode
criteria

{critical | major | minor | warning
| intermediate}

i
!

Global

Description
Configures the severity criterion.
(default: warning)

The order of alarm severity is critical > major > minor > warning > intermediate.
The alarm severity option is valid only in ACI-E.

A50010-Y3-C150-2-7619

113

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.1.9.4

Generic Alarm Severity
To configure generic alarm severity, use the following command.
Command

Mode

snmp alarm-severity fan-fail {critical | major |

Configures the priority of fan-fail alarm

minor | warning | intermediate}
snmp alarm-severity cold-start {critical | major

Configures the priority of cold-start

| minor | warning | intermediate}

alarm

snmp alarm-severity broadcast-over {critical |

Configures the priority of broadcast-

major | minor | warning | intermediate}

over alarm

snmp alarm-severity cpu-load-over {critical |

Configures the priority of cpu-load-over

major | minor | warning | intermediate}

alarm

snmp alarm-severity dhcp-lease {critical | ma-

Configures the priority of DHCP-lease

jor | minor | warning | intermediate}

alarm

snmp alarm-severity dhcp-illegal {critical |

Configures the priority of DHCP-illegal

major | minor | warning | intermediate}

alarm

snmp alarm-severity fan-remove {critical |

Configures the priority of fan-remove

major | minor | warning | intermediate}

alarm

snmp alarm-severity ipconflict {critical | major

Configures the priority of IP conflict

| minor | warning | intermediate}

alarm

snmp alarm-severity memory-over {critical |

Configures the priority of memory-over

major | minor | warning | intermediate}

alarm

snmp alarm-severity mfgd-block {critical |

Configures the priority of MFGD-block

major | minor | warning | intermediate}
snmp alarm-severity port-link-down {critical |

114

Description

Global

alarm
Configures the priority of port-link-down

major | minor | warning | intermediate}

alarm

snmp alarm-severity port-remove {critical |

Configures the priority of port-remove

major | minor | warning | intermediate}

alarm

snmp alarm-severity port-thread-over {critical |

Configures the priority of port-thread-

major | minor | warning | intermediate}

over alarm.

snmp alarm-severity power-fail {critical | major

Configures the priority of power-fail

| minor | warning | intermediate}

alarm

snmp alarm-severity power-remove {critical |

Configures the priority of power-remove

major | minor | warning | intermediate}

alarm

snmp alarm-severity rmon-alarm-rising {criti-

Configures the priority of RMON-alarm-

cal | major | minor | warning | intermediate}

rising alarm.

snmp alarm-severity rmon-alarm-falling {criti-

Configures the priority of RMON-alarm-

cal | major | minor | warning | intermediate}

falling alarm.

snmp alarm-severity system-restart {critical |

Configures the priority of system-restart

major | minor | warning | intermediate}

alarm.

snmp alarm-severity module-remove {critical |

Configures

major | minor | warning | intermediate}

remove alarm.

snmp alarm-severity temperature-high {critical

Configures the priority of temperature-

| major | minor | warning | intermediate}

high alarm.

the

priority

of

module-

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

If you want to delete a configured alarm severity, use the following command.
Command

Mode

Description

no snmp alarm-severity fan-fail
no snmp alarm-severity cold-start
no snmp alarm-severity broadcast-over
no snmp alarm-severity cpu-load-over
no snmp alarm-severity dhcp-lease
no snmp alarm-severity dhcp-illegal
no snmp alarm-severity fan-remove
no snmp alarm-severity ipconflict
no snmp alarm-severity memory-over
no snmp alarm-severity mfgd-block

Global

Deletes a configured alarm severity.

no snmp alarm-severity port-link-down
no snmp alarm-severity port-remove
no snmp alarm-severity port-thread-over
no snmp alarm-severity power-fail
no snmp alarm-severity power-remove
no snmp alarm-severity rmon-alarm-rising
no snmp alarm-severity rmon-alarm-falling
no snmp alarm-severity system-restart
no snmp alarm-severity module-remove
no snmp alarm-severity temperature-high

7.1.9.5

ADVA Alarm Severity
To configure a severity of alarms for ADVA status, use the following command.
Command

Mode

Description

snmp alarm-severity adva-fan-fail {critical |

Sends alarm notification with the sever-

major | minor | warning | intermediate}

ity when ADVA informs fan-fail.
Sends alarm notification with the sever-

snmp alarm-severity adva-if-misconfig {critical

ity when ADVA informs there’s any mis-

| major | minor | warning | intermediate}

configuration.
Sends alarm notification with the sever-

snmp alarm-severity adva-if-opt-thres {critical |
major | minor | warning | intermediate}
snmp alarm-severity adva-if-rcv-fail {critical |
major | minor | warning | intermediate}

Global

ity when ADVA informs traffic is over
threshold on optical interface.
Sends alarm notification with the severity when ADVA informs to fail to receive
the packets.

adva-if-sfp-mismatch

Sends alarm notification with the sever-

{critical | major | minor | warning | intermedi-

ity when ADVA informs SFP module is

ate}

mismatched.

snmp

A50010-Y3-C150-2-7619

alarm-severity

115

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode

Description
Sends alarm notification with the sever-

snmp alarm-severity adva-if-trans-fault {criti-

ity when ADVA informs to fail to transmit

cal | major | minor | warning | intermediate}

the packets.
Sends alarm notification with the sever-

snmp alarm-severity adva-psu-fail {critical |

ity when ADVA informs there’s any

major | minor | warning | intermediate}

problem on the power.
Sends alarm notification with the sever-

snmp alarm-severity adva-temperature {critical

ity when ADVA informs there is any

| major | minor | warning | intermediate}

problem in temperature.
Sends alarm notification with the sever-

snmp alarm-severity adva-voltage-high {criti-

ity when ADVA informs the voltage is

cal | major | minor | warning | intermediate}

high.
Sends alarm notification with the sever-

snmp alarm-severity adva-voltage-low {critical

ity when ADVA informs the voltage is

| major | minor | warning | intermediate}

low.

If you want to clear a configured ADVA alarm prioirity, use the following command.
Command

Mode

Description

no snmp alarm-severity adva-fan-fail
no snmp alarm-severity adva-if-misconfig
no snmp alarm-severity adva-if-opt-thres
no snmp alarm-severity adva-if-rcv-fail
no snmp alarm-severity adva-if-sfp-mismatch

Global

no snmp alarm-severity adva-if-trans-fault

Clears

a

configured

ADVA

alarm

prioirity.

no snmp alarm-severity adva-psu-fail
no snmp alarm-severity adva-temperature
no snmp alarm-severity adva-voltage-high
no snmp alarm-severity adva-voltage-low

7.1.9.6

ERP Alarm Severity
To configure a severity of alarms for ERP status, use the following command.
Command

Mode

Description
Sends alarm notification with the sever-

snmp alarm-severity erp-domain-lotp {critical |

ity when no test packet has been re-

major | minor | warning | intermediate}

ceived within 3 test packet intervals in
Global

snmp

alarm-severity

erp-domain-multi-rm

{critical | major | minor | warning | intermedi-

ERP mechanism.
Sends alarm notification with the severity when a Multiple RM node is created.

ate}

116

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Command

Mode

Description

erp-domain-reach-fail

Sends alarm notification with the sever-

{critical | major | minor | warning | intermedi-

ity when there is disconnection between

ate}

ERP domains

snmp

alarm-severity

Sends alarm notification with the severGlobal

ity when no test packet has been re-

snmp alarm-severity erp-domain-ulotp {critical

ceived within 3 test packet intervals in

| major | minor | warning | intermediate}

one ERP port while test packets are
received in the other port with ERP
state.

To delete a configured severity of alarm for ERP status, use the following command.
Command

Mode

Description

no snmp alarm-severity erp-domain-lotp
no snmp alarm-severity erp-domain-multi-rm

Global

no snmp alarm-severity erp-domain-reach-fail

Deletes a configured severity of alarm
for ERP status.

no snmp alarm-severity erp-domain-ulotp

7.1.9.7

STP Guard Alarm Severity
To configure a severity of alarm for STP guard status, use the following command.
Command

Mode

snmp alarm-severity stp-bpdu-

Sends alarm notification with the severity when there is

guard {critical | major | minor |
warning | intermediate}

Description

stp-bpdu-guard problem
Global

snmp alarm-severity stp-root-

Sends alarm notification with the severity when there is

guard {critical | major | minor |

stp-root-guard problem

warning | intermediate}

To delete a configured severity of alarm for STP guard status, use the following command.
Command

Mode

Description

no snmp alarm-severity stpbpdu-guard

Global

no snmp alarm-severity stp-

Deletes a configured severity of alarm for STP guard
status.

root-guard

7.1.10

Displaying SNMP Configuration
To display all configurations of SNMP, use the following command.
Command
show snmp

A50010-Y3-C150-2-7619

Mode
Enable
Global

Description
Shows all configurations of SNMP.

117

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To display a configured severity of alarm, use the following commands.
Command

Mode
Enable

show snmp alarm-severity

Global

Description
Shows a configured severity of alarm.

To deletes a recorded alarm in the system, use the following command.
Command

Mode
Enable

snmp clear alarm-history

Global

Description
Deletes a recorded alarm in the system.

The following is an example of showing the transmitted alarm and delete the records.
SWITCH(config)# show snmp alarm-history
cold-start

minor

Fri Mar 25 15:30:56 2005 System booted.

SWITCH(config)# snmp clear alarm-history
SWITCH(config)# show snmp alarm-history
SWITCH(config)#

To display a current alarm report, use the following command.
Command
show snmp alarm-report

Mode
Enable
Global

Description
Shows a current alarm report.

To deletes a recorded alarm report in the system, use the following command.
Command
snmp clear alarm-report

7.1.11

Mode
Enable
Global

Description
Deletes a recorded alarm report in the system.

Disabling SNMP
To disable SNMP feature, use the following command.
Command
no snmp

!

118

Mode
Global

Description
Disables SNMP feature.

When you use the above command, all configurations concerning SNMP will be deleted.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.2

UMN:CLI

Operation, Administration and Maintenance (OAM)
In the enterprise, Ethernet links and networks have been managed via Simple Network
Management Protocol (SNMP). Although SNMP provides a very flexible management solution, it is not always efficient and is sometimes inadequate to the task.
First, using SNMP assumes that the underlying network is operational because SNMP relies on IP connectivity; however, you need management functionality even more when the
underlying network is non-operational. Second, SNMP assumes every device is IP accessible. This requires provisioning IP on every device and instituting an IP overlay network even if the ultimate end-user service is an Ethernet service. This is impractical in a
carrier environment.
For these reasons, carriers look for management capabilities at every layer of the network.
The Ethernet layer has not traditionally offered inherent management capabilities, so the
IEEE 802.3ah Ethernet in the First Mile (EFM) task force added the Operations, Administration and Maintenance (OAM) capabilities to Ethernet like interfaces. These management capabilities were introduced to provide some basic OAM function on Ethernet media.
EFM OAM is complementary, not competitive, with SNMP management in that it provides
some basic management functions at Layer 2, rather than using Layer 3 and above as
required by SNMP over an IP infrastructure. OAM provides single-hop functionality in that
it works only between two directly connected Ethernet stations. SNMP can be used to
manage the OAM interactions of one Ethernet station with another.

7.2.1

OAM Loopback
For OAM loopback function, both the switch and the host should support OAM function.
OAM loopback function enables Loopback function from the user’s device to the host,
which connected to the user’s device and operates it.
To enable/disable local OAM function, use the following command.
Command
oam local admin enable PORTS
oam local admin disable PORTS

Mode
Bridge

Description
Enables local OAM.
Disables local OAM.

To configure loopback function of the host connected to the switch, use the following
command.
Command

Mode

Enables loopback function of peer

oam remote loopback enable PORTS

oam remote loopback disable PORTS
oam remote loopback start PORTS

A50010-Y3-C150-2-7619

Description

device.
Bridge

Disables loopback function of peer
device.
Operates loopback.

119

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.2.2

Local OAM Mode
To configure Local OAM, use the following command.
Command
oam

local

mode

Mode
{active

|

passive} PORTS

i
7.2.3

Bridge

Description
Configures the mode of local OAM.

Both request and loopback are possible for local OAM active. However, request or loopback is impossible for local OAM passive.

OAM Unidirection
When RX is impossible in local OAM, it is possible to send the information by using TX.
To enable/disable the function, use the following command.
Command

Mode

oam local unidirection enable
PORTS

Sends the information by using TX.
Bridge

oam local unidirection disable

Disables to transmit the information by using TX.

PORTS

7.2.4

Description

Remote OAM
To enable/disable remote OAM, use the following command.
Command

Mode

oam remote oam admin <1-2>
enable PORTS
oam remote oam admin <1-2>

Description
Enables remote OAM.

Bridge
Disables remote OAM.

disable PORTS

To configure the mode of remote OAM, use the following command.
Command
oam remote oam mode <1-2>
{active | passive} PORTS

120

Mode
Bridge

Description
Configures the mode of remote OAM.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To display the information of peer host using OAM function, use the following command.
Command

Mode

Description

oam remote alarm optical <1-3>
<0-65535> PORTS

oam remote alarm temperature
<0-255> PORTS

oam remote alarm voltage {min |
max} <0-65535> PORTS
oam remote electrical mode {full
| half} PORTS

oam remote general autonego
<1-4> {enable | disable} PORTS

oam remote general forwarding
<3-4> {enable | disable} PORTS

oam remote general speed <1-

Bridge

4> <0-4294967295>PORTS

Shows the information of peer host using OAM function.

oam remote general user <1-4>
STRING PORTS

oam remote system interface
{unforced | forceA | forceB}
PORTS

oam remote system interval <0255> PORTS

oam

remote

system

mode

{master | slave} PORTS

oam

remote

system

reset

PORTS

7.2.5

Displaying OAM Configuration
To display OAM configuration, use the following command.
Command

Mode

Description

show oam

Shows OAM configuration.

show oam local [PORTS]

Shows local OAM configuration.

show oam remote [PORTS]

Enable

show oam remote variable <0-

Global

255> <0-255> PORTS

Bridge

Shows remote OAM configuration.
Shows remote OAM variable.

show oam remote variable specific

<0-255>

<0-255>

<0-4>

Shows remote OAM specific variable.

PORTS

A50010-Y3-C150-2-7619

121

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is to configure to enable OAM loopback function through 25 port of the
switch and operate once.
SWITCH(bridge)# oam local admin enable 25
SWITCH(bridge)# oam remote loopback enable 25
SWITCH(bridge)# show oam local 25
LOCAL PORT[25]
------------------------------------------item

|

value

------------------------------------------admin

|

mode

|

ENABLE
ACTIVE

mux action

|

FORWARD

par action

|

DISCARD

variable

|

UNSUPPORT

link event

|

UNSUPPORT

loopback

|

SUPPORT(disable)

uni-direction

|

UNSUPPORT(disable)

------------------------------------------SWITCH(bridge)# show oam remote 25
REMOTE PORT[25]
------------------------------------------item

|

value

------------------------------------------mode

|

ACTIVE

MAC address

|

00:d0:cb:27:00:94

variable

|

UNSUPPORT

link event

|

UNSUPPORT

loopback

|

SUPPORT(enable)

uni-direction

|

UNSUPPORT

------------------------------------------SWITCH(bridge)# oam remote loopback start 25
PORT[25]: The remote DTE loopback is success.
SWITCH(bridge)#

122

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.3

UMN:CLI

Link Layer Discovery Protocol (LLDP)
Link Layer Discovery Protocol (LLDP) is the function of transmitting data for network
management for the switches connected in LAN according to IEEE 802.1ab standard.

7.3.1

LLDP Operation
The hiD 6615 S223/S323 supporting LLDP transmits the management information between near switches. The information carries the management information that can recognize the switches and the function. This information is saved in internal MIB (Management Information Base)
When LLDP starts to operate, the switches send their information to near switches. If
there is some change in local status, it sends their changed information to near switch to
inform their status. For example, if the port status is disabled, it informs that the port is
disabled to near switches. And the switch that receives the information from near
switches processes LLDP frame and saves the information of the other switches. The
information received from other switches is aged.

7.3.2

LLDP Operation Type
If you activated LLDP on a port, configure LLDP operation type.
Each LLDP operation type works as the follow:
• both: sends and receive LLDP frame.
• tx_only: only sends LLDP frame.
• rx_only: only receives LLDP frame.
• disable: does not process any LLDP frame.

To configure how to operate LLDP, use the following command.
Command
lldp adminstatus PORTS {both |
tx_only | rx_only | disable}

7.3.3

Mode
Bridge

Description
Configurs LLDP operation type.
(default: disable)

Basic TLV
LLDP is transmitted through TLV. There are mandatory TLV and optional TLV. In optional
TLV, there are basic TLV and organizationally specific TLV. Basic TLV must be in the
switch where LLDP is realized, specific TLV can be added according to the feature of the
switch.

A50010-Y3-C150-2-7619

123

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

In hiD 6615 S223/S323, the administrator can enable and disable basic TLV by selecting
it. To enable basic TLV by selecting it, use the following command.
Command

Mode

Description

lldp enable PORTS {portdescrip-

Selects basic TLV that is sent in the port.

tion | sysname | sysdescription |

portdescription: Port’s description

syscap}

syscap: System’s capablility
Bridge

lldp

disable

PORTS

sysname: System’s name
sysdescription: System’s description

{portde-

scription | sysname | sysde-

Disables basic TLV configured as sent in the port.

scription | syscap}

7.3.4

LLDP Message
In hiD 6615 S223/S323, it is possible to configure the interval time and times of sending
LLDP message. To configure the interval time and times of LLDP message, use the following command.
Command
lldp msg txinterval <5-32768>

Mode

Configures the interval of sending LLDP message. The
Bridge

lldp msg txhold <2-10>

i
7.3.5

Description

unit is second.
Configures the periodic times of LLDP message.

Default for sending LLDP message is 4 times in every 30 seconds.

Interval and Delay Time
In hiD 6615 S223/S323, the administrator can configure the interval time of enabling
LLDP frame after configuring LLDP operation type. To configure the interval time of enabling LLDP frame after configuring LLDP operation type, use the following command.
Command

Mode

lldp reinitdelay <1-10>

Bridge

Description
Configures the interval time of enabling LLDP frame
from the time of configuring not to process LLDP
frame. (default: 2)

To configure delay time of transmitting LLDP frame, use the following command.

124

Command

Mode

lldp txdelay <1-8192>

Bridge

Description
Configures delay time of transmitting LLDP frame.
(default: 2)

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.3.6

UMN:CLI

Displaying LLDP Configuration
To display LLDP configuration, use the following command.
Command

Mode

Description

show lldp config PORTS

Enable

Shows LLDP configuration.

show lldp remote PORTS

Global

Show statistics for remote entries.

show lldp statistics PORTS

Bridge

Shows LLDP operation and statistics.

To delete an accumulated statistics on the port, use the following command.
Command

Mode
Global

clear lldp statistics PORTS

Bridge

Description
Deletes an accumulated statistics on the port.

The following is to configure to enable LLDP function on Bridge Configuration modethrough port number 10 of the switch and operate it.
SWITCH(bridge)# show lldp config 10
GLOBL:
----------------------------------------------------------------------MsgTxInterval

= 30

MsgTxHold

= 4

ReInitDelay

= 2

TxDelay

=>

txTTL = 120

= 2

----------------------------------------------------------------------PORTS active
10: disable

adminStat|optTLVs
Tx<->Rx|0xf= PortDesc, SysName, SysDesc, SysCap

SWITCH(bridge)# lldp enable 10
SWITCH(bridge)# lldp disable 10 portdescription
SWITCH(bridge)# lldp adminstatus 10 tx_only
SWITCH(bridge)# lldp msg txinterval 50
SWITCH(bridge)# lldp msg txhold 8
SWITCH(bridge)# show lldp config 10
GLOBL:
----------------------------------------------------------------------MsgTxInterval
MsgTxHold

= 50
= 8

ReInitDelay

= 2

TxDelay

= 2

=>

txTTL = 400

----------------------------------------------------------------------PORTS active
10: enable

adminStat|optTLVs
Tx only |0xe= SysName, SysDesc, SysCap

SWITCH(bridge)#

A50010-Y3-C150-2-7619

125

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.4

Remote Monitoring (RMON)
Remote Monitoring (RMON) is a function to monitor communication status of devices
connected to Ethernet at remote place. While SNMP can give information only about the
device mounted SNMP agent, RMON gives information about overall segments including
devices. Thus, user can manage network more effectively. For instance, in case of SNMP
it is possible to be informed traffic about certain ports but through RMON you can monitor
traffics occurred in overall network, traffics of each host connected to segment and current status of traffic between hosts.
Since RMON processes quite lots of data, its processor share is very high. Therefore,
administrator should take intensive care to prevent performance degradation and not to
overload network transmission caused by RMON. There are nine defined RMON MIB
groups in RFC 1757: Statistics, History, Alarm, Host, Host Top N, Matrix, Filter, Packet
Capture and Event. The system supports two MIB groups of them, most basic ones: Statistics (only for uplink ports) and History.

7.4.1

RMON History
RMON history is periodical sample inquiry of statistical data about each traffic occurred in
Ethernet port. Statistical data of all ports are pre-configured to be monitored at 30-minute
interval, and 50 statistical data stored in one port. It also allows you to configure the time
interval to take the sample and the number of samples you want to save.
The following is an example of displaying the default configuration of RMON history.
SWITCH(config)# show rmon-history config 5
RMON History configuration:
===========================
history index

: 5

data source

: 0/1 (1)

buckets requested

: 50

buckets granted

: 50

interval time (s)

: 1800

owner

: none

status

: under create

SWITCH(config)#

To open RMON-history mode, use the following command.
Command
rmon-history <1-65535>

Mode
Global

Description
Opens RMON-history Configuration mode.
1-65535: index number

The following is an example of opening RMON-history Configuration mode with index
number 5.
SWITCH(config)# rmon-history 5
SWITCH(config-rmonhistory[5])#

Input a question mark  at the system prompt on RMON Configuration mode if you

126

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

want to list available commands.
The following is an example of listing available commands on RMON Configuration mode.
SWITCH(config-rmonhistory[5])# ?
RMON history configuration commands:
active

Activate the history

data-source

Set data source port

do

To run exec commands in config mode

exit

End current mode and down to previous mode

help

Description of the interactive help system

interval

Define the time interval for the history

owner

Assign the owner who define and is using the history

requested-buckets

Define the bucket count for the interval

show

Show running system information

resources

SWITCH(config-rmonhistory[5])#

7.4.1.1

Source Port of Statistical Data
To specify a source port of statistical data, use the following command.
Command
data-source NAME

7.4.1.2

Mode
RMON

Description
Specifies a data object ID.
NAME: enters a data object ID. (ex. ifindex.n1/port1)

Subject of RMON History
To identify subject using RMON history, use the following command.
Command
owner NAME

7.4.1.3

Mode
RMON

Description
Identifies subject using related data, enter the name
(max. 32 characters).

Number of Sample Data
To configure the number of sample data of RMON history, use the following command.
Command

Mode

Description
Defines a bucket count for the interval, enter the num-

requested-buckets <1-65535>

RMON

ber of buckets.
1-65535: bucket number (default: 50)

7.4.1.4

Interval of Sample Inquiry
To configure the interval of sample inquiry in terms of second, use the following command.
Command
interval <1-3600>

A50010-Y3-C150-2-7619

Mode
RMON

Description
Defines the time interval for the history (in seconds),
enter the value. (default: 1800)

127

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

i
7.4.1.5

1 sec is the minimum time which can be selected. But the minimum sampling interval
currently is 30 sec, i.e., all intervals will be round up to a multiple of 30 seconds.

Activating RMON History
To activate RMON history, use the following command.
Command

Mode
RMON

active

i

7.4.1.6

Description
Activates RMON history.

Before activating RMON history, check if your configuration is correct. After RMON history
is activated, you cannot change its configuration. If you need to change configuration, you
need to delete the RMON history and configure it again.

Deleting Configuration of RMON History
When you need to change a configuration of RMON history, you should delete an existing
RMON history.
To delete RMON history, use the following command.
Command

Mode

no rmon-history <1-65535>

7.4.1.7

RMON

Description
Deletes RMON history of specified number, enter the
value for deleting.

Displaying RMON History
To display RMON history, use the following command.
Command
show

running-config

Mode
rmon-

history

i

All

Description
Shows a configured RMON history.

Always the last values will be displayed but no more than the number of the granted
buckets.

The following is an example of displaying RMON history.
SWITCH(config-rmonhistory [5])# show running-config rmon-history
!
rmon-history 5
owner test
data-source ifindex.hdlc1
interval 60
requested-buckets 25
active
!
SWITCH(config-rmonhistory [5])#

128

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.4.2

UMN:CLI

RMON Alarm
There are two ways to compare with the threshold: absolute comparison and delta comparison.
Absolute Comparison: Comparing sample data with the threshold at configured interval, if the data is more than the threshold or less than it, alarm is occurred
Delta Comparison: Comparing difference between current data and the latest data
with the threshold, if the data is more than the threshold or less than it, alarm is occurred.

•
•

You need to open RMON Alarm Configuration mode first to configure RMON alarm.
Command

Mode

rmon-alarm <1-65535>

Global

Description
Opens RMON Alarm Configuration mode.
1-65535: index number

The following is an example of listing available commands on RMON-alarm Configuration
mode.
SWITCH(config)# rmon-alarm 1
SWITCH(config-rmonalarm[1])# ?
RMON alarm configuration commands:
active

Activate the event

do

To run exec commands in config mode

exit

End current mode and down to previous mode

falling-event

Associate the falling threshold with an existing RMON

falling-threshold

Define the falling threshold

help

Description of the interactive help system

owner

Assign the owner who define and is using the history

event

resources
rising-event

Associate the rising threshold with an existing RMON

rising-threshold

Define the rising threshold

sample-interval

Specify the sampling interval for RMON alarm

event

sample-type

Define the sampling type

sample-variable

Define the MIB Object for sample variable

show

Show running system information

startup-type

Define startup alarm type (default : rising)

write

Write running configuration to memory or terminal

SWITCH(config-rmonalarm[1])#

7.4.2.1

Subject of RMON Alarm
User needs to configure RMON alarm and identify subject using many kinds of data from
alarm. To identify subject of alarm, use the following command.
Command
owner NAME

A50010-Y3-C150-2-7619

Mode
RMON

Description
Identifies subject using related data, enter the name
(max. 32 characters).

129

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.4.2.2

Object of Sample Inquiry
User needs object value used for sample inquiry to provide RMON Alarm. The following is
rule of object for sample inquiry. To assign object used for sample inquiry, use the following command.
Command
sample-variable MIB-OBJECT

7.4.2.3

Mode
RMON

Description
Assigns MIB object used for sample inquiry.

Absolute Comparison and Delta Comparison
It is possible to select the way to compare MIB object used for sample inquiry in case of
configuring RMON Alarm. Absolute comparison directly compares object selected as
sample with the threshold. For instance, when you want to know the point of 30,000 times
of sample inquiry, if you configure apSvcConnections as 30,000, it is for Absolute comparison. To compare object selected as sample with the threshold, use the following
command.
Command

Mode

sample-type absolute

RMON

Description
Compares object with the threshold directly.

Delta comparison compares difference between current data and the latest data with the
threshold. For instance, in order to know the point of variable notation rule 100,000 more
than the former rule, configure apCntHits as Delta comparison. To configure delta comparison, use the following command.
Command
sample-type delta

7.4.2.4

Mode
RMON

Description
Compares difference between current data and the
latest data with the threshold.

Upper Bound of Threshold
If you need to occur alarm when object used for sample inquiry is more than upper bound
of threshold, you have to configure the upper bound of threshold. To configure upper
bound of threshold, use the following command.
Command
rising-threshold VALUE

Mode
RMON

Description
Configures upper bound of threshold.
VALUE: 0-2147483647

After configuring upper bound of threshold, configure to generate RMON event when object is more than configured threshold. Use the following command.
Command

Mode

Description
Configures to generate RMON event when object is

rising-event <1-65535>

RMON

more than configured threshold.
1-65535: event index

130

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.4.2.5

UMN:CLI

Lower Bound of Threshold
If you need to occur alarm when object used for sample inquiry is less than lower bound
of threshold, you should configure lower bound of threshold. To configure lower bound of
threshold, use the following command.
Command
falling-threshold NUMBER

Mode
RMON

Description
Configures lower bound of threshold.

After configuring lower bound of threshold, configure to generate RMON event when object is less than configured threshold. Use the following command.
Command
falling-event <1-65535>

7.4.2.6

Mode
RMON

Description
Configures to generate RMON alarm when object is
less than configured threshold.

Configuring Standard of the First Alarm
It is possible for users to configure the standard the first time alarm is occurred. The user
can select the first point when object is more than threshold, or the first point when object
is less than threshold, or the first point when object is more than threshold or less than
threshold.
To configure the first RMON alarm to occur when object is less than lower bound of
threshold first, use the following command.
Command
startup-type falling

Mode
RMON

Description
Configures the first RMON Alarm to occur when object
is less than lower bound of threshold first.

To configure the first alarm to occur when object is firstly more than upper bound of
threshold, use the following command.
Command
startup-type rising

Mode
RMON

Description
Configures the first Alarm to occur when object is firstly
more than upper bound of threshold.

To configure the first alarm to occur when object is firstly more than threshold or less than
threshold, use the following command.
Command
startup-type rising-and-falling

7.4.2.7

Mode
RMON

Description
Configures the first Alarm to occur when object is firstly
more than threshold or less than threshold.

Interval of Sample Inquiry
The interval of sample inquiry means time interval to compare selected sample data with
upper bound of threshold or lower bound of threshold in terns of seconds.

A50010-Y3-C150-2-7619

131

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To configure interval of sample inquiry for RMON alarm, use the following command.
Command

Mode

sample-interval <0-65535>

7.4.2.8

RMON

Description
Configures interval of sample inquiry.
(unit: second)

Activating RMON Alarm
After finishing all configurations, you need to activate RMON alarm. To activate RMON
alarm, use the following command.
Command

Mode
RMON

active

7.4.2.9

Description
Activates RMON alarm.

Deleting Configuration of RMON Alarm
When you need to change a configuration of RMON alarm, you should delete an existing
RMON alarm.
To delete RMON alarm, use the following command.
Command

Mode

no rmon-alarm <1-65535>

7.4.2.10

Global

Description
Deletes RMON history of specified number, enter the
value for deleting.

Displaying RMON Alarm
To display RMON alarm, use the following command.
Command
show

running-config

alarm

7.4.3

Mode
rmon-

All

Description
Shows a configured RMON alarm.

RMON Event
RMON event identifies all operations such as RMON alarm in the switch. You can configure event or trap message to be sent to SNMP management server when sending RMON
alarm.
You need to open RMON Event Configuration mode to configure RMON event.
Command
rmon-event <1-65535>

7.4.3.1

Mode
Global

Description
Opens RMON Event Configuration mode.
1-65535: index number

Event Community
When RMON event is happened, you need to input community to transmit SNMP trap
message to host. Community means a password to give message transmission right.

132

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure community for trap message transmission, use the following command.
Command

Mode

Description
Configures password for trap message transmission

community NAME

RMON

right.
NAME: community name

7.4.3.2

Event Description
It is possible to describe event briefly when event is happened. However, the description
will not be automatically made. Thus administrator should make the description.
To make a description about event, use the following command.
Command
description DESCRIPTION

7.4.3.3

Mode
RMON

Description
Describes the event.
Max: 126 character

Subject of RMON Event
You need to configure event and identify subject using various data from event. To identify
subject of RMON event, use the following command.
Command

Mode

Description
Identifies subject of event. You can use maximum 126

owner NAME

RMON

characters and this subject should be same with the
subject of RMON alarm.

7.4.3.4

Event Type
When RMON event happened, you need to configure event type to arrange where to
send event.
To configure event type, use the following command.
Command

Mode

Configures event type as log type. Event of log type is

type log

type trap

7.4.3.5

Description

sent to the place where the log file is made.
RMON

Configures event type as trap type. Event of trap type
is sent to SNMP administrator and PC.

type log-and-trap

Configures event type as both log type and trap type.

type none

Configures none event type.

Activating RMON Event
After finishing all configurations, you should activate RMON event. To activate RMON
event, use the following command.

A50010-Y3-C150-2-7619

133

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode
RMON

active

7.4.3.6

Description
Activates RMON event.

Deleting Configuration of RMON Event
Before changing the configuration of RMON event, you should delete RMON event of the
number and configure it again.
To delete RMON event, use the following command.
Command

Mode

no rmon-event <1-65535>

7.4.3.7

Global

Description
Delete RMON event of specified number.

Displaying RMON Event
To display RMON alarm, use the following command.
Command
show
event

134

running-config

Mode
rmon-

All

Description
Shows a configured RMON event.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.5

UMN:CLI

Syslog
The syslog is a function that allows the network element to generate the event notification
and forward it to the event message collector like a syslog server. This function is enabled
as default, so even though you disable this function manually, the syslog will be enabled
again.
This section contains the following contents.
Syslog Output Level
Facility Code
Syslog
Disabling Syslog
Displaying Syslog Message
Displaying Syslog Configuration

•
•
•
•
•
•

7.5.1

Syslog Output Level
Syslog Output Level without a Priority
To set a syslog output level, use the following command.
Command

Mode

syslog output {emerg | alert | crit

Generates a syslog message of selected level or

| err | warning | notice | info |

higher and forwards it to the console.

debug} console
syslog output {emerg | alert | crit
| err | warning | notice | info |

debug} local {volatile | non-

Description

Generates a syslog message of selected level or
Global

volatile}

higher in the system memory.
volatile: deletes a syslog message after restart.
non-volatile: reserves a syslog message.

syslog output {emerg | alert | crit

Generates a syslog message of selected level or

| err | warning | notice | info |

higher and forwards it to a remote host.

debug} remote IP-ADDRESS

To disable a specified syslog output, use the following command.
Command

Mode

Description

Global

Deletes a specified syslog output.

no syslog output {emerg | alert |
crit | err | warning | notice | info |
debug} console
no syslog output {emerg | alert |
crit | err | warning | notice | info |
debug} local {volatile | nonvolatile}
no syslog output {emerg | alert |
crit | err | warning | notice | info |
debug} remote IP-ADDRESS

A50010-Y3-C150-2-7619

135

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Syslog Output Level with a Priority
To set a user-defined syslog output level with a priority, use the following command.
Command

Mode

Description

syslog output priority {auth | authpriv | cron |
daemon | kern | local1 | local2 | local3 | local4 |

Generates a user-defined syslog mes-

local5 | local6 | local7 | lpr | mail | news | sys-

sage with a priority and forwards it to

log | user | uucp} {emerg | alert | crit | err |

the console.

warning | notice | info} console
Generates a user-defined syslog mes-

syslog output priority {auth | authpriv | cron |

sage with a priority in the system mem-

daemon | kern | local1 | local2 | local3 | local4 |
local5 | local6 | local7 | lpr | mail | news | syslog | user | uucp} {emerg | alert | crit | err |

ory.
Global

volatile: deletes a syslog message after
restart.

warning | notice | info} local {volatile | non-

non-volatile: reserves a syslog mes-

volatile}

sage.

syslog output priority {auth | authpriv | cron |
daemon | kern | local1 | local2 | local3 | local4 |

Generates a user-defined syslog mes-

local5 | local6 | local7 | lpr | mail | news | sys-

sage with a priority and forwards it to a

log | user | uucp} {emerg | alert | crit | err |

remote host.

warning | notice | info} remote IP-ADDRESS

To disable a user-defined syslog output level, use the following command.
Command

Mode

Description

no syslog output priority {auth | authpriv | cron
| daemon | kern | local1 | local2 | local3 | local4
| local5 | local6 | local7 | lpr | mail | news | sys-

log | user | uucp} {emerg | alert | crit | err |
warning | notice | info} console
no syslog output priority {auth | authpriv | cron
| daemon | kern | local1 | local2 | local3 | local4
| local5 | local6 | local7 | lpr | mail | news | sys-

log | user | uucp} {emerg | alert | crit | err |

Global

Deletes a specified user-defined syslog
output level with a priority.

warning | notice | info} local {volatile | nonvolatile}
no syslog output priority {auth | authpriv | cron
| daemon | kern | local1 | local2 | local3 | local4
| local5 | local6 | local7 | lpr | mail | news | sys-

log | user | uucp} {emerg | alert | crit | err |
warning | notice | info} remote IP-ADDRESS

i

136

The order of priority is emergency > alert > critical > error > warning > notice > info >
debug. If you set a specific level of syslog output, you will receive only a syslog message
for selected level or higher. If you want receive a syslog message for all the levels, you
need to set the level to debug.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The following is an example of configuring syslog message to send all logs higher than
notice to remote host 10.1.1.1 and configuring local1.info to transmit to console.
SWITCH(config)# syslog output notice remote 10.1.1.1
SWITCH(config)# syslog output priority local1 info console
SWITCH(config)# show syslog
System logger on running!
info

7.5.2

local volatile

info

local non-volatile

notice

remote 10.1.1.1

local1.info
SWITCH(config)#

console

Facility Code
You can set a facility code of the generated syslog message. This code make a syslog
message distinguished from others, so network administrator can handle various syslog
messages efficiently.
To set a facility code, use the following command.
Command

Mode

syslog local-code <0-7>

Global

no syslog local-code

Description
Sets a facility code.
Deletes a specified facility code.

The following is an example of configuring priority of all syslog messages which is transmitted to remote host 10.1.1.1, as the facility code 0.
SWITCH(config)# syslog output err remote 10.1.1.1
SWITCH(config)# syslog local-code 0
SWITCH(config)# show syslog
System logger on running!

7.5.3

info

local volatile

info

local non-volatile

err

remote 10.1.1.1

local_code
SWITCH(config)#

0

Syslog Bind Address
You can specify IP address to attach to the syslog message for its identity. To specify IP
address for syslog identity, use the following command.
Command
syslog bind-address A.B.C.D
no syslog bind-address

A50010-Y3-C150-2-7619

Mode
Global

Description
Specifies IP address for a syslog message identity.
Deletes a specified binding IP address.

137

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.5.4

Debug Message for Remote Terminal
To display a syslog debug message to a remote terminal, use the following command.
Command
terminal monitor

Mode
Enable

no terminal monitor

i
7.5.5

Description
Enables a terminal monitor function.
Disables a terminal monitor function.

Terminal monitor is not possible to be operational in local console.

Disabling Syslog
To disable the syslog manually, use the following command.
Command

Global

no syslog

7.5.6

Mode

Description
Disables the syslog.

Displaying Syslog Message
To display a received syslog message in the system memory, use the following command.
Command

Mode

Description
Shows a received syslog message.

show syslog local {volatile |
non-volatile} [NUMBER]

volatile: removes a syslog message after restart.
Enable

non-volatile: reserves a syslog message.

Global

NUMBER: shows the last N syslog messages.

show syslog local {volatile |

Shows the syslog messages from the latest one.

non-volatile} reverse

7.5.7

clear syslog local {volatile | non-

Enable

volatile}

Global

Removes a received syslog message.

Displaying Syslog Configuration
To display a configuration of the syslog, use the following command.
Command
show syslog
show syslog {volatile | nonvolatile} information

138

Mode
Enable
Global

Description

Shows a configuration of the syslog.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6

UMN:CLI

Rule and QoS
The hiD 6615 S223/S323 provides rule and QoS feature for traffic management. The rule
classifies incoming traffic, and then processes the traffic according to user-defined policies. You can use the physical port, 802.1p priority (CoS), VLAN ID, DSCP, and so on to
classify incoming packets.
You can configure the policy in order to change some data fields within a packet or to relay packets to a mirror monitor by a “Rule” function. QoS (Quality of Service) is one of
useful functions to provide the more convenient service of network traffic for users. It is
very serviceable to prevent overloading and delaying or failing of sending traffic by giving
priority to traffic.
By the way, you need to be careful for other traffics not to be failed by the traffic configured as priority by user. QoS can give a priority to a specific traffic by basically offering
the priority to the traffic or limiting the others. When processing data, data are usually
supposed to be processed in time-order like first in, first out.
This way, not processing specific data first, might lose all data in case of overloading traffics. However, in case of overloading traffics QoS can apply processing order to traffic by
reorganizing priorities according to its importance. By favor of QoS, you can predict network performance in advance and manage bandwidth more effectively.

7.6.1

How to Operate Rule and QoS
For the hiD 6615 S223/S323, rules operate as follows.

!

•

Rule Creation
To classify the packets according to the specific basis, configure the policies about
them first. The basis used to classify the packets is 802.1p priority (CoS), VLAN ID,
DSCP and port number. Additionally, a unique name needs to be assigned to each
rule.

•

Rule Priority
Assigns a priority to a rule (precedence to other rules).

•

Packet Classification
Configures the policy to adjust how and what is to be classified within transmitted
packets.

•

Rule Match
Configures the policy classifying the action(s) to be performed if the configured rule
classification fits transmitted packet(s).
– mirror transmits the classified traffic to monitor port.
– redirect transmits the classified traffic to specified port.
– permit allows traffic matching given characteristics.
– deny blocks traffic matching given characteristics.

•

Rule Apply
Applies the just configured rule. Configured values will be checked and the rule becomes activated within the system.

An already applied rule can not be modified. It needs to be deleted and then created
again with changed values.

A50010-Y3-C150-2-7619

139

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6.2

7.6.2.1

•

Scheduling Algorithm
To handle overloading of traffics, you need to configure differently processing orders
of graphic by using scheduling algorithm. The hiD 6615 S223/S323 provides:
– Strict Priority Queuing (SPQ)
– Weighted Round Robin (WRR)
– Weighted Fair Queuing (WFQ).

•

Queue Weight
Queue weight can be used to additionally adjust the scheduling mode per queue in
WRR or WFQ mode.
– Queue weight controls the scheduling precedence of the internal packet queues.
The higher the weight value the higher the scheduling precedence of this queue.

Rule Configuration

Rule Creation
For the hiD 6615 S223/S323, you need to open Rule Configuration mode first. To open
Rule Configuration mode, use the following command.
Command
rule NAME create

Mode
Global

Description
Opens Rule Configuration mode, enter rule name.

After opening Rule Configuration mode, the prompt changes from SWITCH(config)# to
SWITCH(config-rule[name])#.
After opening Rule Configuration mode, a rule can be configured by user. The rule priority,
rule match, rule action, and action parameter(s) can be configured for each rule.

i

!

7.6.2.2

1. The rule name must be unique. Its size is limited to 63 significant characters.
2. The order in which the following configuration commands will be entered is arbitrary.
3. The configuration of a rule being configured can be changed as often as wanted
(inclusive rule type) until the command, apply, will be entered.
4. Use the command, show rule-profile, to display the configuration entered up to now.
You can not create the rule name which started with alphabet ‘a’ If you try to enter ‘a’, the
error message will be appeared. .

Rule Priority
If rules that are more than two match the same packet then the rule having a higher priority will be processed first.
To set a priority for a rule, use the following command.
Command
priority {low | medium | high |
highest}

140

Mode
Rule

Description
Sets a priority for a rule.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6.2.3

UMN:CLI

Packet Classification
After configuring a packet classification for a rule, then configure how to process the
packets. To specify a packet-classifying pattern, use the following command.

!

When specifying a source and destination IP address as a packet-classifying pattern, the
destination IP address must be after the source IP address.

Command

Mode

Description
Classifies a physical port:
SRC-PORT: source port number

port {SRC-PORT | any} {DST-

DST-PORT: destination port number

PORT | cpu | any}

cpu: CPU port
any: any physical port (ignore)
Classifies a VLAN:

vlan {VID | any}

VLAN: 1-4094
any: any VLAN (ignore)
Classifies a DSCP value:

dscp {<0-63> | any}

0-63: DSCP value
any: any DSCP (ignore)
Classifies the IEEE 802.1p priority:

cos {<0-7> | any}

0-7: 802.1p priority value
any: any 802.1p priority value (ignore)
Classifies all ToS field:

tos {<0-255> | any}

0-255: ToS value
any: any ToS value (ignore)
Classifies an IP precedence:

ip-prec {<0-7> | any}

Rule

0-7: IP precedence value
any: any IP precedence value (ignore)
Classifies a packet length:

length {<21-65535> | any}

21-65535: IP packet length
any: any IP packet length (ignore)
Classifies the Ethernet type:
TYPE-NUM: Ethernet type field (hex, e.g. 0800 for

ethtype {TYPE-NUM | arp | any}

IPv4)
arp: address resolution protocol
any: any Ethernet type (ignore)

mac

{SRC-MAC-ADDRESS

SRC-MAC-ADDRESS
BITS

|

any}

/

|

MASK-

{DST-MAC-

ADDRESS IDST-MAC-ADDRESS/
MASK BITS I any}

Classifies MAC address:
SRC-MAC-ADDRESS: source MAC address
DST-MAC-ADDRESS: destination MAC address
any: any source/destination MAC address (ignore)
Classifies an IP address:

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D: source/destination IP address

{A.B.C.D | A.B.C.D/M | any} [0-

A.B.C.D/M: source/destination IP address with mask

255]

any: any source/destination IP address
0-255: IP protocol number

A50010-Y3-C150-2-7619

141

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode

Description
Classifies an IP protocol (ICMP):
A.B.C.D: source/destination IP address

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D/M: source/destination IP address with mask

{A.B.C.D | A.B.C.D/M | any} icmp

any: any source/destination IP address
icmp: ICMP
Classifies an IP protocol (ICMP):
A.B.C.D: source/destination IP address

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D/M: source/destination IP address with mask

{A.B.C.D | A.B.C.D/M | any} icmp

any: any source/destination IP address

{<0-255> | any} [<0-255> | any]

icmp: ICMP
0-255: ICMP message type number
0-255: ICMP message code number
Classifies an IP protocol (TCP/UDP):
A.B.C.D: source/destination IP address

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D/M: source/destination IP address with mask

{A.B.C.D | A.B.C.D/M | any} {tcp |

any: any source/destination IP address

udp}

tcp: TCP
Rule

udp: UDP
Classifies an IP protocol (TCP/UDP):
A.B.C.D: source/destination IP address

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D/M: source/destination IP address with mask

{A.B.C.D | A.B.C.D/M | any} {tcp |

any: any source/destination IP address

udp}

tcp: TCP

{<0-65535>

|

any}

{<0-

65535> | any}

udp: UDP
0-65535: TCP/UDP source/destination port number
any: any TCP/UDP source/destination port
Classifies an IP protocol (TCP):
A.B.C.D: source/destination IP address
A.B.C.D/M: source/destination IP address with mask

ip {A.B.C.D | A.B.C.D/M | any}

any: any source/destination IP address

{A.B.C.D | A.B.C.D/M | any} tcp

tcp: TCP

{<0-65535> | any} {<0-65535> |

0-65535: TCP source/destination port number

any} {TCP-FLAG | any}

any: any TCP source/destination port
TCP-FLAG: TCP flag (e.g. S(SYN), F(FIN))
any: any TCP flag

To delete a specified packet-classifying pattern, use the following command.
Command

Mode

Description

no vlan
no cos
no tos
no length

Rule

Deletes a specified packet-classifying pattern for each
option.

no ethtype
no mac
no ip

142

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6.2.4

UMN:CLI

Rule Action
To specify a rule action (match) for the packets matching configured classifying patterns,
use the following command.
Command

Mode

Description

match deny

Denies a packet.

match permit

Permits a packet.
Redirects to specified egress port:

match redirect PORT

PORT: uplink port number

match mirror

Sends a copy to mirror monitoring port.

match dscp <0-63>

Changes DSCP field, enter DSCP value.
Changes 802.1p class of service, enter CoS value.

match cos <0-7>

0-7: CoS value
Overwrites 802.1p CoS field in the packet.

match cos <0-7> overwrite

0-7: CoS value
Overwrites 802.1p CoS field in the packet same as IP

match cos same-as-tos
overwrite
match ip-prec <0-7>

match ip-prec same-as-cos
match bandwidth BANDWIDTH
match vlan <1-4094>
match copy-to-cpu
match counter

Rule

ToS precedence bits.
Changes IP ToS precedence bits in the packet.
0-7: ToS precedence value
Changes IP ToS precedence bits in the packet, same
as 802.1p CoS value.
Determines maximum allowed bandwidth (Mbps).
Specifies matched-packet VLAN ID
1-4094: VLAN ID
Copies to CPU.
Counts how many times the packets come into configured Rule.

match egress filter PORT

Deletes a specified egress port.

match egress port PORT

Overwrites a specified egress port

A50010-Y3-C150-2-7619

143

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To delete a specified rule action (match), use the following command.
Command

Mode

Description

no match deny
no match permit
no match redirect
no match mirror
no match dscp
no match cos

Rule

Deletes a specified rule action.

no match ip-prec
no match bandwidth
no match vlan
no match copy-to-cpu
no match counter
no match egress

To specify a rule action (no-match) for the packets not matching configured classifying
patterns, use the following command.
Command

Mode
Denies a packet.

no-match deny

Redirects to specified egress port:

no-match redirect PORT

PORT: uplink port number (e.g. 25-28)

no-match mirror

Sends a copy to mirror monitoring port.

no-match dscp <0-63>

Changes DSCP field, enter DSCP value.
Changes 802.1p class of service, enter CoS value.

no-match cos <0-7>
no-match cos <0-7> overwrite

0-7: CoS value
Rule

Overwrites 802.1p CoS field in the packet.
0-7: CoS value

no-match cos same-as-tos-over-

Overwrites 802.1p CoS field in the packet same as IP

write

ToS precedence bits.

no-match ip-prec <0-7>

no-match ip-prec same-as-cos
no-match copy-to-cpu

144

Description

Changes IP ToS precedence bits in the packet.
0-7: ToS precedence value
Changes IP ToS precedence bits in the packet, same
as 802.1p CoS value.
Copies to CPU.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To delete a specified rule action (no-match), use the following command.
Command

Mode

Description

no no-match deny
no no-match redirect
no no-match mirror
no no-match dscp

Rule

Deletes a specified rule action.

no no-match cos
no no-match ip-prec
no no-match copy-to-cpu

7.6.2.5

Applying Rule
After configuring rule using the above commands, apply it to the system with the following
command. If you do not apply the rule to the system, all specified rules will be lost.
To save and apply a rule, use the following command.
Command

Rule

apply

i

7.6.2.6

Mode

Description
Applies a rule to the system.

1.

The switch performs a detailed plausibility check and rejects the rule if the
configuration is incomplete, contains bad or unsupported values or conflicts to other
rules. In this case, the switch informs about the reason and the operator may correct
the values
2. The switch may reject a rule with the message “% Already exist rule” allthough the
name will not be listed by command, show rule. Unfortunately, the entered name in
this case interferes with the name of an internally managed rule.
Remedy: Select another name for the rule (e.g. add a prefix).
3. All previously entered values remain valid after successful (or unsuccessful)
execution of command, apply. That is, if several rules being different only in one
value should be created, then only the one changed value needs to be entered again.

Modifying and Deleting Rule
To modify a rule, use the following command.
Command
rule NAME modify

Mode

Description

Global

Modifies a rule, enter a rule name.

To delete a rule, use the following command.
Command
no rule [NAME]

A50010-Y3-C150-2-7619

Mode
Global

Description
Deletes a rule, enter a rule name optionally.

145

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6.2.7

Displaying Rule
The following command can be used to show a certain rule by its name, all rules of a certain type, or all rules at once sorted by rule type.
Command

Mode

Shows a rule, enter a rule name.

show rule NAME
show rule

Description

NAME: rule name
Enable
Global

Shows all rules sorted by type.

show rule all

Shows all rules and admin access rules sorted by type.

show rule statistics

Shows rule statistics.

show rule-profile

Rule

Shows a current configuration of a rule.

The following is an example of configuring specific rule action on rule profile and showing
it.
SWITCH# configure terminal
SWITCH(config)# rule jean create
SWITCH(config-rule[jean])# priority low
SWITCH(config-rule[jean])# match copy-to-cpu
SWITCH(config-rule[jean])# apply
SWITCH(config-rule[jean])# exit
SWITCH(config)# rule jean create
% Already exist rule
SWITCH(config)# show rule
rule jean
priority low
port any any
match copy-to-cpu
SWITCH(config)# rule jean modify
SWITCH(config-rule[jean])no match copy-to-cpu
SWITCH(config-rule[jean]) show rule
rule jean
priority low
port any any
SWITCH(config-rule[jean])

7.6.3

QoS
For hiD 6615 S223/S323, it is possible to use Strict Priority Queuing, Weighted Round
Robin and Weighted Fair Queuing for a packet scheduling mode.
The following steps explain how QoS can be configured.
• Scheduling Algorithm
• Qos Weight
• 802.1p Priory-to-queue Mapping
• Queue Parameter
• Displaying QoS

146

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6.3.1

UMN:CLI

Scheduling Algorithm
To process incoming packets by the queue scheduler, the hiD 6615 S223/S323 provides
the scheduling algorithm as Strict Priority Queuing (SP), Weighted Round Robin (WRR)
and Weighted Fair Queuing (WFQ).
Weighted Round Robin (WRR)
WRR processes packets as much as weight. Processing the packets that have higher
priority is the same way as strict priority queuing. However, it passes to next stage after
processing as configured weight so that it is possible to configure for packet process not
to be partial to the packets having higher priority. However, there is a limitation of providing differentiated service from those existing service.
The process in WRR when packets having the Queue numbers
Lowest priority

highest priority

7
7

3

1

Weight = 1

3

4

3

4

Weight = 1

7

Weight = 1

6

7

Weight = 1

Weight = 2

Weighted, Round-Robin Scheduler

3

Fig. 7.1

3

4

7

7

1

3

4

6

7

7

Weighted Round Robin

Weighted Fair Queuing (WFQ)
Weighted fair queuing (WFQ) provides automatically sorts among individual traffic
streams without requiring that you first define access lists. It can manage one way or two
way streams of data: traffic between pairs of applications or voice and video.
In WFQ, packets are sorted in weighted order of arrival of the last bit, to determine transmission order. Using order of arrival of last bit emulates the behavior of Time Division
Multiplexing (TDM), hence "fair"
From one point of view, the effect of this is that WFQ classifies sessions as high- or lowbandwidth. Low-bandwidth traffic gets priority, with high-bandwidth traffic sharing what's
left over. If the traffic is bursting ahead of the rate at which the interface can transmit, new
high-bandwidth traffic gets discarded after the configured or default congestive-messages
threshold has been reached. However, low-bandwidth conversations, which include control-message conversations, continue to enquire data.

A50010-Y3-C150-2-7619

147

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Weighted Fair Queuing

Fig. 7.2

Strict Priority Queuing (SP)
SPQ processes first more important data than the others. Since all data are processed by
their priority, data with high priority can be processed fast but data without low priority
might be delayed and piled up. This method has a strong point of providing the distinguished service with a simple way. However, if the packets having higher priority enter,
the packets having lower priority are not processed.
The processing order in Strict Priority Queuing in case of entering
packets having the Queue numbers as below
Lowest priority

highest priority

7
7

3

1

3

4

3

4

7
6

7

Output Scheduler

1

Fig. 7.3

148

3

3

3

4

4

6

7

7

7

7

Strict Priority Queuing

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To select a packet scheduling mode, use the following command.
Command

Mode

Description
Selects a packet scheduling mode for a ports:

qos scheduling-mode {sp | wrr}

sp: strict priority queuing
Global

Selects a scheduling mode for handling CPU packets

qos cpu scheduling-mode sp

i
7.6.3.2

wrr: weighted round robin
sp: strict priority queuing

The default scheduling mode is WRR. And it is possible to assign a different scheduling
mode to each port.

Qos Weight
To set a weight for WRR scheduling mode only, use the following command.
Command

Mode

Description
Sets a weight for each port and queue:

qos weight PORTS <0-3> {<115> | unlimited}

PORTS: port numbers
Global

0-7: queue number
1-15: weight value (default: 1)
unlimited: strict priority queuing

7.6.3.3

802.1p Priory-to-queue Mapping
For the hiD 6615 S223/S323, it is possible to configure how packets having a certain
802.1p priority will be stored into which queue. Default mapping is shown as below (default values).
CoS
(802.1p Priority)

Description

Queue Mapping

Reduced Queue Mapping

(8 Queues)

(4 Queues)

0

Lowest: Best Effort IP (be)

2

1

1

Background (bg)

0

0

2

Spare (spare)

1

0

3

Excellent Effort (ee)

3

1

4

Controlled Load (cl)

4

2

5

Video (video)

5

2

6

Voice (voice)

6

3

7

Highest: Network Control (ctrl)

7

3

Tab. 7.1

A50010-Y3-C150-2-7619

Default 802.1p Priory-to-queue Map

149

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To define an 802.1p priory-to-queue map for 8 queues, use the following command.
Command

Mode

Description
Priority to queue number mapping, priority value (0-7)
according to 802.1p:
0 = lowest: best effort (be)
1: background (bg)
2: spare (spare)

qos map <0-7> <0-3>

Global

3: excellent effort (ee)
4: controlled load (cl)
5: video (video)
6: voice (voice)
7: network control (ctrl)
Queue value:
0-3: queue number

7.6.3.4

Queue Parameter
To configure a queue parameter, use the following command.
Command

Mode

Description
Sets a ingress back-pressure:

qos ibp PORTS <1-8191>

PORTS: port numbers
Sets a maximum packet size per queue for egress port:

qos pktlimit PORTS <0-3> <4-

PORTS: port numbers

2047>

0-3: queue number

qos seglimit PORTS <0-3> <1-

Global

Sets a maximum segment per queue for egress port:
PORTS: port numbers

8191>

0-3: queue number

no qos ibp PORTS
Restroes it as a default.

no qos pktlimit PORTS <0-3>
no qos seglimit PORTS <0-3>

7.6.3.5

Displaying QoS
To display a configuration of QoS, enter following command.
Command

Mode

Shows the configuration of QoS for all ports.

show qos
show qos PORTS
show qos buffer PORTS
show qos cpu

7.6.4

Description

Enable
Global
Bridge

Shows the configuration of QoS per each port.
Shows the configuration of a buffer per each port.
Shows the configuration of QoS for CPU packets.

Admin Access Rule
For the hiD 6615 S223/S323, it is possible to block a specific service connection like telnet, FTP, ICMP, etc with an admin access rule function.

150

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6.4.1

UMN:CLI

Rule Creation
For the hiD 6615 S223/S323, you need to open Admin Access Rule Configuration mode
first. After opening Admin Access Rule Configuration mode, the prompt changes from
SWITCH(config)# to SWITCH(config-admin-rule[NAME])#.
To open Rule Configuration mode, use the following command.
Command
rule NAME create admin

Mode
Global

Description
Opens Admin Access Rule Configuration mode, enter
rule name.

After opening Admin Access Rule Configuration mode, a rule can be configured by user.
The rule priority, packet classification and rule action(s) can be configured for each rule.

i

7.6.4.2

1. The rule name must be unique. Its size is limited to 63 significant characters.
2. The order in which the following configuration commands will be entered is arbitrary.
3. The configuration of a rule being configured can be changed as often as wanted
(inclusive rule type) until the command, apply, will be entered.
4. Use the command, show rule-profile, to display the configuration entered up to now.

Rule Priority
If rules that are more than two match the same packet then the rule having a higher priority will be processed first.
To set a priority for an admin access rule, use the following command.
Command
priority {low | medium | high |
highest}

A50010-Y3-C150-2-7619

Mode
Admin-rule

Description
Sets a priority for a rule.
(Defaul: low)

151

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6.4.3

Packet Classification
After configuring a packet classification for a rule, then configure how to process the
packets. To specify a packet-classifying pattern, use the following command.

!

When specifying a source and destination IP address as a packet-classifying pattern, the
destination IP address must be after the source IP address.
Command

Mode

Description
Classifies an IP address:

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D: source/destination IP address

{A.B.C.D | A.B.C.D/M | any} [0-

A.B.C.D/M: source/destination IP address with mask

255]

any: any source/destination IP address
0-255: IP protocol number
Classifies an IP protocol (ICMP):
A.B.C.D: source/destination IP address

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D/M: source/destination IP address with mask

{A.B.C.D | A.B.C.D/M | any} icmp

any: any source/destination IP address
icmp: ICMP
Classifies an IP protocol (ICMP):
A.B.C.D: source/destination IP address

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D/M: source/destination IP address with mask

{A.B.C.D | A.B.C.D/M | any} icmp

any: any source/destination IP address

{<0-255> | any} {<0-255> | any}

icmp: ICMP
0-255: ICMP message type number
0-255: ICMP message code number
Classifies an IP protocol (TCP/UDP):

ip {A.B.C.D | A.B.C.D/M | any}
{A.B.C.D | A.B.C.D/M | any} {tcp |

udp}

A.B.C.D: source/destination IP address
Admin-rule

A.B.C.D/M: source/destination IP address with mask
any: any source/destination IP address
tcp: TCP
udp: UDP
Classifies an IP protocol (TCP/UDP):
A.B.C.D: source/destination IP address

ip {A.B.C.D | A.B.C.D/M | any}

A.B.C.D/M: source/destination IP address with mask

{A.B.C.D | A.B.C.D/M | any} {tcp |

any: any source/destination IP address

udp}

tcp: TCP

{<1-65535>

|

any}

{<1-

65535> | any}

udp: UDP
0-65535: TCP/UDP source/destination port number
any: any TCP/UDP source/destination port
Classifies an IP protocol (TCP):
A.B.C.D: source/destination IP address

ip {A.B.C.D | A.B.C.D/M | any}
{A.B.C.D | A.B.C.D/M | any} tcp
{<0-65535> | any} {<0-65535> |

any} {TCP-FLAG | any}

A.B.C.D/M: source/destination IP address with mask
any: any source/destination IP address
tcp: TCP
0-65535: TCP source/destination port number
any: any TCP source/destination port
TCP-FLAG: TCP flag (e.g. S(SYN), F(FIN))
any: any TCP flag

152

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.6.4.4

UMN:CLI

Rule Action
To specify a rule action (match) for the packets matching configured classifying patterns,
use the following command.
Command
match deny

Mode
Admin-rule

match permit

Description
Denies a packet.
Permits a packet.

To delete a specified rule action (match), use the following command.
Command
no match deny

Mode
Admin-rule

Description
Deletes a specified rule action.

no match permit

To specify a rule action (no-match) for the packets not matching configured classifying
patterns, use the following command.
Command
no-match deny

Mode
Admin-rule

no-match permit

Description
Denies a packet.
Permits a packet.

To delete a specified rule action (no-match), use the following command.
Command
no no-match deny

Mode
Admin-rule

Description
Deletes a specified rule action.

no no-match permit

7.6.4.5

Applying Rule
After configuring rule using the above commands, apply it to the system with the following
command. If you do not apply a rule to the system, all specified rules will be lost.
To save and apply an admin access rule, use the following command.
Command
apply

i

1.

2.

3.

A50010-Y3-C150-2-7619

Mode
Admin-rule

Description
Applies an admin access rule to the system.

The switch performs a detailed plausibility check and rejects the rule if the
configuration is incomplete, contains bad or unsupported values or conflicts to other
rules. In this case, the switch informs about the reason and the operator may correct
the values
The switch may reject a rule with the message “% Already exist rule” allthough the
name will not be listed by command, show rule. Unfortunately, the entered name in
this case interferes with the name of an internally managed rule.
Remedy: Select another name for the rule (e.g. add a prefix).
All previously entered values remain valid after successful (or unsuccessful)

153

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

execution of command, apply. That is, if several rules being different only in one
value should be created, then only the one changed value needs to be entered again.

7.6.4.6

Modifying and Deleting Rule
To modify a rule, use the following command.
Command
rule NAME modify admin

Mode
Global

Description
Modifies an admin access rule, enter a rule name.

To delete a rule, use the following command.
Command
no rule admin

Mode

Deletes an admin access rule, enter a rule name opGlobal

tionally.
Deletes all rules and admin access rules.

no rule all

7.6.4.7

Description

Displaying Rule
The following command can be used to show a certain rule by its name, all rules of a certain type, or all rules at once sorted by rule type.
Command

Mode

Shows all admin access rules sorted by type.

show rule admin
show rule all

Enable
Global

154

Shows all rules and admin access rules sorted by type.
Shows rule statistics.

show rule statistics
show rule-profile

Description

Admin-rule

Shows a current configuration of a rule.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.7

UMN:CLI

NetBIOS Filtering
NetBIOS (Network Basic Input/Output System) is a program that allows applications on
different computers to communicate within a local area network (LAN). NetBIOS is used
in Ethernet, included as part of NetBIOS Extended User Interface (NetBEUI). Resource
and information in the same network can be shared with this protocol.
But the more computers are used recently, the more strong security is required. To secure
individual customer’s information and prevent information leakages in the LAN environmen, the hiD 6615 S223/S323 provides NetBIOS filtering function.
LAN environment for Internet Service

Internet

Information

Shared

Needs to prevent sharing
information between customers

Fig. 7.4

NetBIOS Filtering

Without NetBIOS filtering, customer’s data may be opened to each other even though the
data should be kept. To keep customer’s information and prevent sharing information in
the above case, NetBIOS filtering is necessary.
Command
netbios-filter PORTS

Mode
Bridge

Description
Configures NetBIOS filtering to a specified port.

To disable NetBIOS filtering according to user’s request, use the following command.
Command
no netbios-filter PORTS

Mode
Bridge

Description
Disables NetBIOS filtering from a specified port.

To display a configuration of NetBIOS filtering, use the following command.
Command
show netbios-filter

A50010-Y3-C150-2-7619

Mode
Global
Bridge

Description
Shows a configuration of NetBIOS filtering.

155

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is an example of configuring NetBIOS filtering in port 1~5 and showing it.
SWITCH(bridge)# netbios-filter 1-5
SWITCH(bridge)# show netbios-filter
o:enable .:disable
-------------------------1

2

12345678901234567890123456|
-------------------------ooooo.....................
-------------------------SWITCH(bridge)#

7.8

Martian Filtering
It is possible to block packets, which trying to bring different source IP out from same
network. If packet brings different IP address, not its source IP address, then it is impossible to know it makes a trouble. Therefore, you would better prevent this kind of packet
outgoing from your network. This function is named as Martian filter.
To block packets which try to bring different source IP out from same network, use the following command.
Command

Mode

Description
Blocks packets which bring different source IP address

ip martian-filter INTERFACE

Global

from specified interface.
INTERFACE: enter the interface name.

i

It is not possible to configure both QoS and Martian filter at the same time.
To disable the configured Martian filter function, use the following command.
Command
no ip martian-filter INTERFACE

i
7.9

Mode
Global

Description
Disables a configured Martian filter function.
INTERFACE: enter an interface name.

To see a configuration of Martian filter, use the show running-config command.

Max Host
You can limit the number of users by configuring maximum number of users also named
as max hosts for each port. In this case, you need to consider not only the number of PCs
in network but also devices such as switches in network.
For the hiD 6615 S223/S323, you have to lock the port like MAC filtering before configuring max hosts. In case of ISPs, it is possible to arrange billing plan for each user by using
this configuration.
To configure max host, use the following command.

156

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Command

Mode

Description
Limits the number of connection to a port by setting

max-hosts PORTS <1-16>

maximum host:
Bridge

PORTS: enter the port number.
1-16: enter the maximum MAC number.
Deletes configured max-host, enter the port number.

no max-hosts PORTS

The following is an example of configuring to allow two MAC addresses to port 3, and five
addresses to port 1, 2, and to ten addresses to port 7.
SWITCH(bridge)# max-hosts 3 2
SWTICH(bridge)# max-hosts 1 5
SWTICH(bridge)# max-hosts 2 5
SWTICH(bridge)# max-hosts 7 10
SWTICH(bridge)#

To display configured max host, use the following command.
Command

Mode

Description

Enable
Global

show max-hosts

Shows configured max host.

Bridge

The following is an example of displaying configured max hosts.
SWITCH(bridge)# show max-hosts

7.9.1

port

1 :

0/5

(current/max)

port

2 :

0/5

(current/max)

port

3 :

0/2

(current/max)

port

4 :

0/Unlimited (current/max)

port

5 :

0/Unlimited (current/max)

port

6 :

0/Unlimited (current/max)

port

7 :

0/10

port

8 :

0/Unlimited (current/max)

port 9 :
port 10 :

0/Unlimited (current/max)
0/Unlimited (current/max)

(current/max)

Max New Hosts
Max-new-hosts feature is to limit the number of users by configuring the number of MAC
address that can be learned on the system and on the port for a second. The number of
MAC address that can be learned on the system has the priority.

A50010-Y3-C150-2-7619

157

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To configure max new hosts, use the following command.
Command
max-new-hosts

PORTS

Mode

The number of MAC address that can be learned on

MAX-

MAC-NUMBER

Description

Bridge

the port for a second.

max-new-hosts system PORTS

The number of MAC address that can be learned on

MAX-MAC-NUMBER

the system for a second.

To delete configured max new hosts, use the following command.
Command

Mode

Description
Deletes the number of MAC address that can be

no max-new-hosts PORTS
Bridge

no max-new-hosts system

learned on the port.
Deletes the number of MAC address that can be
learned on the system.

To display configured max new hosts, use the following command.
Command

Mode

Description

Enable

show max-new-hosts

Global

Shows the configured Max-new-hosts.

Bridge

If MAC that already counted disappears before passing 1 second and starts learning
again, it is not counted. In case the same MAC is detected on the other port also, it is not
counted again. For example, if MAC that was learned on port 1 is detected on port 2, it is
supposed that MAC moved to the port 2. So, it is deleted from the port 1 and learned on
the port 2 but it is not counted.

7.10

Port Security
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the PCs that are allowed to access the port. When you assign
secure MAC addresses to a secure port, the port does not forward packets with source
addresses outside the group of defined addresses. If you limit the number of secure MAC
addresses to one and assign a single secure MAC address, the PC attached to that port
is assured the full bandwidth of the port.

7.10.1

Port Security on Port
Step 1
Enable port security on the port.
Command
port security PORTS

158

Mode
Bridge

Description
Enables port security on the port.
PORT: selects port number

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Step 2
Set the maximum number of secure MAC address for the port.
Command

Mode

port security PORTS maximum
<1-16384>

Description
Sets a maximum number of secure MAC address for

Bridge

the port.
1-16384: Maximum number of addresses (default: 1)

Step 3
Set the violation mode and the action to be taken.
Command

Mode

port security PORTS violation
{shutdown | protect | restrict}

Bridge

Description
Selects a violation mode.

When configuring port security, note that the following information about port security violation modes:
• protect drops packets with unknown source addresses until you remove a sufficient
number of secure MAC addresses to drop below the maximum value.
• restrict drops packets with unknown source addresses until you remove a sufficient
number of secure MAC addresses to drop below the maximum value and causes the
Security Violation counter to increment.
• shutdown puts the interface into the error-disabled state immediately and sends an
SNMP trap notification
Step 4
Enter a secure MAC address for the port.
Command

Mode

Description
Sets a secure MAC address for the port.

port

security

PORTS

mac-

address MACADDR vlan NAME

Bridge

PORTS: select the port number.
MACADDR: enter the MAC address.
NAME: vlan name

To disable the configuration of port secure, use the following command.
Command

Mode

Description
Disables port security on the port.

no port security PORTS

Deletes a secure MAC address for the port.

no port security PORTS mac-

PORTS: enter the port number

address MACADDR vlan NAME
Bridge

MACADDR: enter the MAC address.

no port security PORTS maxi-

Returns to the default number of secure MAC address.

mum

(default: 1)

no port security PORTS viola-

Returns to the violation mode to the default. (shutdown

tion

mode)

A50010-Y3-C150-2-7619

159

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To display the configuration of port security, use the following command.
Command

Mode

show port security [PORTS]

Description

Bridge

Shows port security on the port.

This is an example of configuring port security on port 7.
SWITCH(config)# bridge
SWITCH(bridge)# port security 7
SWITCH(bridge)# port security 7 maximum 10000
SWITCH(bridge)# port security 7 violation protect
SWITCH(bridge)# port security 7 mac-address 00:02:a5:74:9b:17 vlan 1
SWITCH(bridge)# show port security 7
========================================================================
port

security

violation

aging

type

static

maximum current

========================================================================
7

enabled

protect

-

absolute

-

10000

1

========================================================================
port

vlan

secure-mac-addr

status

in use

========================================================================
7

1

00:02:a5:74:9b:17

static

-

SWITCH(bridge)# no port security 7 maximum
SWITCH(bridge)# no port security 7 violation
SWITCH(bridge)# show port security 7
========================================================================
port

security

violation

aging

type

static

maximum current

========================================================================
7

enabled

shutdown

-

absolute

-

1

0

========================================================================
port

vlan

secure-mac-addr

status

in use

========================================================================
SWITCH(bridge)#

7.10.2

Port Security Aging
Port security aging is to set the aging time for all secure addresses on a port. Use this
feature to remove and add PCs on a secure port without manually deleting the existing
secure MAC addresses while still limiting the number of secure addresses on a port.
Command
port

security

PORTS

Mode
aging

Enables aging for configured secure addresses.

static
port security PORTS aging time
<1-1440>

port security PORTS aging type
{absolute | inactivity}

•
•

160

Description

Bridge

Configures aging time in minutes for the port. All the
secure addresses age out exactly after the time.
Configures aging type.

absolute all the secure addresses on this port age out exactly after the time (minutes) specified lapses and are removed from the secure address list.
inactivity the secure addresses on this port age out only if there is no data traffic
from the secure source addresses for the specified time period.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To disable the configuration of port secure aging, use the following command.
Command

Mode

Description

no port security PORTS aging

Disables aging for only statistically configured secure

static

addresses.

no port security PORTS aging
time

Bridge

no port security PORTS aging

Disables port secure aging for all secure addresses on
a port.
Returns to the default condition. (absolute)

type

To display the configuration of port security, use the following command.
Command

Mode

Description

Enable

show port security [PORTS]

Global

Shows port security on the port.

Bridge

7.11

MAC Table
A dynamic MAC address is automatically registered in the MAC table, and it is removed if
there is no access to/from the network element corresponding to the MAC address during
the specified MAC aging time. On the other hand, a static MAC address is manually registered by user. This will not removed regardless of the MAC aging time before removing
it manually.
To manage MAC table in the switch, use the following command.
Command

Mode

Description
Specifies a static MAC address in the MAC table.
NAME: enter the bridge name.

mac NAME PORT MACADDR
Bridge

mac aging-time <10-21474830>

A50010-Y3-C150-2-7619

PORT: enter the port number.
MACADDR: enter the MAC address.
Specifies MAC aging time:
10-21474830: aging time (default: 300)

161

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To remove registered dynamic MAC addresses from the MAC table, use the following
command.
Command

Mode

Description

clear mac

Clears dynamic MAC addresses.

clear mac NAME

Clears dynamic MAC addresses.
Clears dynamic MAC addresses.

clear mac NAME PORT

Enable

NAME: enter the bridge name.

Global

PORT: enter the port number.

Bridge

Clears dynamic MAC addresses.

clear mac NAME PORT

NAME: enter the bridge name.

MACADDR

PORT: enter the port number.
MACADDR: enter the MAC address.

To remove static MAC addresses manually registered by user from the MAC table, use
the following command.
Command

Mode

Description

no mac

Deletes static MAC addresses.

no mac NAME

Deletes static MAC addresses, enter the bridge name.
Deletes static MAC addresses.
NAME: enter the bridge name.

no mac NAME PORT
Bridge

PORT: enter the port number.
Deletes a specified static MAC address.
NAME: enter the bridge name.

no mac NAME PORT MACADDR

PORT: enter the port number.
MACADDR: enter the MAC address.

To display a MAC table in the switch, use the following command.
Command

Mode
Enable

show mac NAME [PORT]

Global
Bridge

i

162

Description
Shows switch MAC address, selection by port number
(subscriber port only):
NAME: enter the bridge name
PORT: select the port number.

There are more than a thousand of MAC addresses in MAC table. And it is difficult to find
information you need at one sight. So, the system shows certain amount of addresses
displaying –more– on standby status. Press any key to search more. After you find the information, you can go back to the system prompt without displaying the other table by
pressing .

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.12

UMN:CLI

MAC Filtering
It is possible to forward frame to MAC address of destination. Without specific performance degradation, maximum 4,096 MAC addresses can be registered.

7.12.1

Default Policy of MAC Filtering
The basic policy of filtering based on system is set to allow all packets for each port.
However the basic policy can be changed for user’s requests.
After configuring basic policy of filtering for all packets, use the following command on
Bridge mode to show the configuration.
Command

Mode

mac-filter default-policy {deny |
permit} PORTS

Bridge

Description
Configures basic policy of MAC Filtering in specified
port.

By default, basic filtering policy provided by system is configured to permit all packets in
each port.
Sample Configuration
This is an example of blocking all packets in port 1~3 and port 7.
SWTICH(bridge)#

mac-filter default-policy deny 5-10

SWTICH(bridge)# mac-filter default-policy permit 2
SWTICH(bridge)# show mac-filter default-policy
------------------------PORT POLICY | PORT POLICY
------------+-----------1 PERMIT |

2 PERMIT

3 PERMIT |

4 PERMIT

5

DENY

|

6

DENY

7

DENY

|

8

DENY

9

DENY

|

10

DENY

11 PERMIT |

12 PERMIT

13 PERMIT |

14 PERMIT

15 PERMIT |

16 PERMIT

17 PERMIT |

18 PERMIT

19 PERMIT |

20 PERMIT

21 PERMIT |

22 PERMIT

23 PERMIT |

24 PERMIT

25 PERMIT |

26 PERMIT

27 PERMIT |
SWITCH(bridge)#

7.12.2

28 PERMIT

Adding Policy of MAC Filter
You can add the policy to block or to allow some packets of specific address after configuring the basic policy of MAC Filtering. To add this policy, use the following commands on
Bridge Configuration mode.

A50010-Y3-C150-2-7619

163

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode

mac-filter add MACADDR

Bridge

{deny | permit}

Description
Allows or blocks packet which brings configured mac
address to specified port.

Variable MAC-ADDRESS is composed of twelve digits number in Hexa decimal. It is possible to check it by using the show mac command. 00:d0:cb:06:01:32 is an example of
MAC address.

7.12.3

Deleting MAC Filter Policy
To delete MAC filtering policy, use the following command.
Command
mac-filter del SOURCE-MACADDR
[<1-4094>]

Mode
Bridge

Description
Deletes filtering policy for specified MAC address.

To delete MAC filtering function, use the following command.
Command
no mac-filter

7.12.4

Mode

Description

Bridge

Deletes all MAC filtering functions.

Listing of MAC Filter Policy
If you need to make many MAC filtering policies at a time, it is hard to input command
one by one. In this case, it is more convenient to save MAC filtering policies at
“/etc/mfdb.conf” and display the list of MAC filtering policy. To view the list of MAC filtering
policy at /etc/mfdb.conf, use the following command.
Command
mac-filter list

7.12.5

Mode

Description

Bridge

Shows the list of MAC filtering policy at /etc/mfdb.conf.

Displaying MAC Filter Policy
To show a configuration about MAC filter policy, use the following command.
Command
show mac-filter default-policy

Mode
Enable / Global / Bridge

Description
Shows MAC filter policy.

show mac-filter

164

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Sample Configuration
The latest policy is recorded as number 1. The following is an example of permitting MAC
address 00:02:a5:74:9b:17 and 00:01:a7:70:01:d2 and showing table of filter policy.
SWITCH(bridge)# mac-filter add 00:02:a5:74:9b:17 permit
SWITCH(bridge)# mac-filter add 00:01:a7:70:01:d2 permit
SWITCH(bridge)# show mac-filter
=================================
ID |

MAC

| ACTION

=================================
1

00:01:a7:70:01:d2

PERMIT

2

00:02:a5:74:9b:17

PERMIT

SWITCH(bridge)#

The following is an example of displaying one configuration.
SWITCH(bridge)# show mac-filter 1
=================================
ID |

MAC

| ACTION

=================================
1 00:01:a7:70:01:d2
SWITCH(bridge)#

7.13

PERMIT

Address Resolution Protocol (ARP)
Device connected to IP network has two addresses, LAN address and network address.
LAN address is sometimes called as data link because it is used in Layer 2 level, but
more commonly the address is known as MAC address. Ethernet Switch needs 48-bitMAC address to transmit packets. In this case, the process of finding proper MAC address from IP address is called as address resolution.
On the other hand, the progress of finding proper IP address from MAC address is called
as reverse address resolution. Siemens switches find MAC address from IP address
through address resolution protocol (ARP).
This chapter consists of these sections:
• ARP Table
• ARP Alias
• Gratuitous ARP
• Proxy-ARP

7.13.1

ARP Table
Hosts typically have an ARP table, which is a cache of IP/MAC address mappings. The
ARP Table automatically maps the IP address to the MAC address of a switch. In addition
to address information, the table shows the age of the entry in the table, the encapsulation method, and the switch interface (VLAN ID) where packets are forwarded.
The hiD 6615 ARP saves IP/MAC addresses mappings in ARP table for quick search. Referring to the information in ARP table, packets attached IP address is transmitted to network. When configuring ARP table, it is possible to do it only in some specific interfaces.

A50010-Y3-C150-2-7619

165

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.13.1.1

Registering ARP Table
The contents of ARP table are automatically registered when MAC address corresponds
to MAC address is founded. The network administrator could use MAC address of specific IP address in Network by registering on ARP table.
To make specific IP address to be accorded with MAC address, use the following command.
Command

Mode

Description
Sets a static ARP entry, enter the IP address and the
MAC address.

arp A.B.C.D MACADDR

MACADDR: enter the MAC address.
Global

Sets a static ARP entry, enter the IP address, the MAC

arp A.B.C.D MACADDR INTER-

address and enter an interface name.

FACE

INTERFACE: enter an interface name.
MACADDR: enter the MAC address.

To delete registered IP address and MAC address or change all the contents of ARP table,
use one of the following command.
Command

Mode

Negates a command or set sets its default

no arp A.B.C.D
Global

no arp A.B.C.D INTERFACE

Negates a command or set sets its default, enter the IP
address and enter the interface name.

clear arp

Enable
Global

clear arp INTERFACE

7.13.1.2

Description

Deletes all the contents of ARP table.
Deletes all the contents of ARP table, enter the interface name.

Displaying ARP Table
To display ARP table registered in switch, use one of the following command.
Command

Mode

show arp

Enable

show arp {INTERFACE | A.B.C.D}

Global

Description
Shows ARP table.
Shows ARP table for specified interface, enter the interface name or IP address. (br1, br2, ...).

The following is an example of registering 10.1.1.1 as IP address and 00:d0:cb:00:00:01
as MAC address. This command displays ARP table.
SWITCH(config)# arp 10.1.1.1 00:d0:cb:00:00:01
SWITCH(config)# show arp
-----------------------------------------------------------Address

HWaddress

Type

Interface

------------------------------------------------------------

166

10.254.254.105

00:bb:cc:dd:ee:05

DYNAMIC

br4094

10.2.2.1
SWITCH(config)#

00:00:cd:01:82:d0

DYNAMIC

br2

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.13.2

UMN:CLI

ARP Alias
Although clients are joined in same client switch, it may be impossible to communicate
between clients for their private security. When you need to make them communicate
each other, the hiD 6615 S223/S323 supports ARP alias, which responses ARP request
from client net through concentrating switch.
To register address of client net range in ARP alias, use the following command.
Command
arp-alias A.B.C.D A.B.C.D
[MACADDR]

i

Mode
Global

Description
Registers IP address range and MAC address in ARP
alias to make user’s equipment response ARP request.

Unless you input MAC address, MAC address of user’s equipment will be used for ARP
response.
To delete registered IP address range of ARP alias, use the following command.
Command
no arp-alias START-IP-ADDRESS
END-IP-ADDRESS

Mode
Global

Description
Deletes a registered IP address range of ARP alias.

To display ARP alias, use the following command.
Command
show arp-alias

7.13.3

Mode
Enable
Global

Description
Shows a registered ARP alias.

ARP Inspection
ARP provides IP communication by mapping an IP address to a MAC address. But a malicious user can attack ARP caches of systems by intercepting traffic intended for other
hosts on the subnet. For example, Host B generates a broadcast message for all hosts
within the broadcast domain to obtain the MAC address associated with the IP address of
Host A. If Host C responses with an IP address of Host A (or B) and a MAC address of
Host C, Host A and Host B can use Host C’s MAC address as the destination MAC address for traffic intended for Host A and Host B.
ARP Inspection is a security feature that validates ARP packets in a network. It intercepts
and discards ARP packets with invalid IP-MAC address binding.
To enable and disable ARP Inspection on the hiX 5430 system, use the following command.
Command
ip arp inspection vlan VLAN
no ip arp inspection vlan VLAN

A50010-Y3-C150-2-7619

Mode

Global

Description
Enables ARP-inspection function on a VLAN.
Disables ARP-inspection function on a VLAN.

167

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

You can configure the switch to perform additional checks on the destination MAC address, the sender and target IP address and the source MAC address.
Command

Mode

Description
Inspects specific check on incoming ARP packets.
src-mac: checks the source MAC address. Packets
with different MAC addresses are classified as invalid

ip arp inspection validate {src-

are dropped.

mac | dst-mac | ip}

dst-mac: checks the destination MAC address. Packets
with different MAC addresses are classified as invalid
Global

are dropped.
ip: checks the unexpected IP address.
Applies ARP ACL to the VLAN.

ip arp inspection filter NAME

NAME: ARP ACL name. It is created with the arp ac-

vlan VLAN

cess-list NAME command.

ip arp inspection trust port

Configures a connection between switches as trusted.

PORTS

PORTS: trusted port number.

To remove the specific ARP Inspection configuration, use the following commands
Command

Mode

Description

no ip arp inspection validate
{src-mac | dst-mac | ip}

no ip arp inspection filter NAME
vlan VLAN

Global

Removes specific ARP inspection configuration.

no ip arp inspection trust port
PORTS

To display checking and statistics, use the following command.
Command

Mode

Description

show ip arp inspection [vlan
VLAN]

show ip arp inspection statistics
[vlan VLAN]

Enable
Global

Displays the information of ARP inspection.

Bridge

show ip arp inspection trust
[port PORTS]

To clear ARP inspection mapping counter and statistics, use the following command.

168

Command

Mode

clear ip arp inspection statistics

Global

[vlan VLAN]

Bridge

Description
Clears ARP inspection statistics.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.13.4

UMN:CLI

Gratuitous ARP
Gratuitous ARP is a broadcast packet like an ARP request. It containing IP address and
MAC address of gateway, and the network is accessible even though IP addresses of
specific host’s gateway are repeatedly assigned to the other.
Configure Gratuitous ARP interval and transmission count using following commands.
And configure transmission delivery-start in order to transmit Gratuitous ARP after ARP
reply.
Gratuitous ARP is transmitted after some time from transmitting ARP reply.
Command

Mode

Description
Configures a gratuitous ARP.

arp-patrol TIME COUNT [TIME]

Global

TIME: transmit interval
COUNT: transmit count
Disables a gratuitous ARP.

no arp-patrol

The following is an example of configuring the transmission interval as 10 sec and transmission times as 4 and showing it.
SWITCH(config)# arp-patrol 10 4
SWITCH(config)# show running-config
Building configuration...
Current configuration:
hostname SWITCH
(Omitted)
arp-patrol 10 4
!
no snmp
!
SWITCH(config)#

7.13.5

Proxy-ARP
To configure Proxy-ARP, you need to enter Interface configuration mode and use the following command.
Command
ip proxy-arp

Mode
Interface

no ip proxy-arp

7.14

Description
Sets proxy-ARP at specified Interface
Removes the configured proxy-ARP from the interface.

ICMP Message Control
ICMP stands for Internet Control Message Protocol. When it is impossible to transmit data
or configure route for data, ICMP sends error message about it to host. The first 4 bytes
of all ICMP messages are same, but the other parts are different ac-cording to type field
value and code field value. There are fifteen values of field to distinguish each different
ICMP message, and code field value helps to distinguish each type in detail.
The following table shows explanation for fifteen values of ICMP message type.

A50010-Y3-C150-2-7619

169

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Type

Value

Type

Value

ICMP_ECHOREPLY

0

ICMP_DEST_UNREACH

3

ICMP_SOURCE_QUENCH

4

ICMP_REDIRECT

5

ICMP_ECHO

8

ICMP_TIME_EXCEEDED

11

ICMP_PARAMETERPROB

12

ICMP_TIMESTAMP

13

ICMP_TIMESTAMPREPLY

14

ICMP_INFO_REQUEST

15

ICMP_INFO_REPLY

16

ICMP_ADDRESS

17

ICMP_ADDRESSREPLY

18

Tab. 7.2

ICMP Message Type

The following figure shows simple ICMP message construction.
0

7
8-bit Type

15 16

31

8-bit Code

16-bit Checksum

(Contents Depend on Type and Code)

It is possible to control ICMP message through user’s configuration. You can configure to
block the echo reply message to the partner who is doing ping test to device and interval
to transmit ICMP message.

7.14.1

Blocking Echo Reply Message
It is possible to configure block echo reply message to the partner who is doing ping test
to switch. To block echo reply message, use the following commands.
Command

Mode

Description
Blocks echo reply message to all partners who are

ip icmp ignore echo all
Global

ip icmp ignore echo broadcast

taking ping test to device.
Blocks echo reply message to partner who is taking
broadcast ping test to device.

To release the blocked echo reply message, use the following commands.
Command

Mode

Releases blocked echo reply message to all partners

no ip icmp ignore echo all
Global

7.14.2

Description

who are taking ping test to device.

no ip icmp ignore echo broad-

Releases blocked echo reply message to partner who

cast

is taking broadcast ping test to device.

Interval for Transmit ICMP Message
User can configure the interval for transmit ICMP message. After you configure the interval, ICMP message will be blocked until the period based on the last message is up. For
example, if you configure the interval as 1 second, ICMP will not be sent within 1 second
after the last message has been sent.

170

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure interval to transmit ICMP message, the administrator should configure the
type of message and the interval time.
Use the following command, to configure the interval for transmit ICMP message.
Command

Mode

ip icmp interval rate-mask MASK

Global

Description
Configures the interval for transmit ICMP message.
MASK: user should input hexadecimal value until
0xFFFFFFFF. The default is 0x1818.

If mask that is input as hexadecimal number is calculated as binary number “1” means
“Status ON”, “0” means “Status OFF”. In binary number, if the digit showed as “1”
matches with the value of ICMP message. It means ICMP Message is selected as “Status
ON”. Digit value starts from 0.
For example, if hexadecimal number “8” is changed as binary number, it is “1000”. In
1000, 0 digit is “0” and 1 digit is “0”, 2 digit is “0” and 3 digit is “1”. The digit showed as “1”
is “3” and ICMP_DEST_UNREACH means ICMP value is “3”. Therefore,
ICMP_DEST_UNREACH is chosen the message of limiting the transmission time.
Default is 0x1818. If 1818 as hexadecimal number is changed as binary number, it is
1100000011000. By calculating from 0 digit, 3 digit, 4 digit, 11 digit, 12 digit is “1” and it is
“STATUS ON”. Therefore, the message that corresponds to 3, 4, 11, and 12 is chosen as
the message limiting the transmission rate.
Tab. 7.3 shows the result of mask calculation of default value.
Type

Status

ICMP_ECHOREPLY (0)

OFF

ICMP_DEST_UNREACH (3)

ON

ICMP_SOURCE_QUENCH (4)

ON

ICMP_REDIRECT (5)

OFF

ICMP_ECHO (8)

OFF

ICMP_TIME_EXCEEDED (11)

ON

ICMP_PARAMETERPROB (12)

ON

ICMP_TIMESTAMP (13)

OFF

ICMP_TIMESTAMPREPLY (14)

OFF

ICMP_INFO_REQUEST (15)

OFF

ICMP_INFO_REPLY (16)

OFF

ICMP_ADDRESS (17)

OFF

ICMP_ADDRESSREPLY (18)

OFF

Tab. 7.3

A50010-Y3-C150-2-7619

Mask Calculation of Default Value

171

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To configure the limited ICMP transmission time, use the following command.
Command
ip icmp interval rate-limit INTERVAL

i

Mode
Global

Description
Configures a limited ICMP transmission time.
INTERVAL: 0-2000000000 (unit: 10 ms)

The default ICMP interval is 1 second (100 ms).
To return to default ICMP configuration, use the following command.
Command
ip icmp interval default

Mode
Global

Description
Returns to default configuration.

To display ICMP interval configuration, use the following command.
Command
show ip icmp interval

7.14.3

Mode
Enable
Global

Description
Shows ICMP interval configuration.

Transmitting ICMP Redirect Message
User can configure to transmit ICMP Redirect Message. Transmitting ICMP Redirect
Message is one of the ways preventing DoS(Denial of Service), and this can make the
switch provide the constant service to the hosts.SURPASS hiD 6615 transmits more optimized route to the host than the present route between the host connected to the switch
and the specific destination.
To activate the function transmitting ICMP Redirect Message, use the following command.
Command

Mode

Activates the function transmitting ICMP Redirect

ip redirects
Global

no ip redirecs

172

Description

Message
Deactivates the function transmitting ICMP Redirect Message.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The following is an example for configuring ICMP Redirect Message and checking the
configuration.
SWITCH(config)# show running-config
(omitted)
interface 1
ip address 222.121.68.247/24
!
!
!
SWITCH(config)# ip redirects
SWITCH(config)# show running-config
(omitted)
interface 1
ip address 222.121.68.247/24
!!
ip redirects
!
!
SWITCH(config)#

7.14.4

The policy of unreached messages
When the packets can’t reach Destination host or the network, the switch is supposed to
bring them back to the source IP address. What if too many unreached packets are coming into the system, it might cause slow down the system operation.
Not to bring these messages back to source IP address on a specific interface, use the
following command on Interface Configuration mode.
Command

Mode

Configures not to bring unreached messages back to

ip unreachables
Interface

no ip unreachables

7.15

Description

their source IP address on interface.
Brings all unreached messages back to their source IP
address on interface.

IP TCP Flag Control
TCP (Transmission Control Protocol) header includes six kinds of flags that are URG,
ACK, PSH, RST, SYN, and FIN. For the hiD 6615 S223/S323, you can configure RST
and SYN as the below.

7.15.1

RST Configuration
RST sends a message when TCP connection can not be done to a person who tries to
make it. However, it is also possible to configure to block the message. This function will

A50010-Y3-C150-2-7619

173

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

help prevent that hackers can find impossible connections.
To configure not to send the message that informs TCP connection can not be done, use
the following command.
Command

Mode

Configures to block the message that informs TCP

ip tcp ignore rst-unknown
Global

no ip tcp ignore rst-unknown

7.15.2

Description

connection can not be done.
Responds the message again that informs TCP connection is not possible.

SYN Configuration
SYN sets up TCP connection. The hiD 6615 S223/S323 transmits cookies with SYN to a
person who tries to make TCP connection. And only when transmitted cookies are returned, it is possible to permit TCP connection. This function prevents connection overcrowding because of accessed users who are not using and helps the other users use
service.
To permit connection only when transmitted cookies are returned after sending cookies
with SYN, use the following command.
Command

Mode

Permits only when transmitted cookies are returned

ip tcp syncookies
Global

no ip tcp syncookies

7.16

Description

after sending cookies with SYN.
Disables configuration to permit only when transmitted
cookies are returned after sending cookies with SYN.

Packet Dump
Failures in network can occur by certain symptom. Each symptom can trace to one or
more problems by using specific troubleshooting tools. The hiD 6615 S223/S323 switch
provides the debug command to dump packet. Use debug commands only for problem
isolation. Do not use it to monitor normal network operation. The debug commands produce a large amount of processor overhead.

7.16.1

Verifying Packet Dump
You can configure a packet dump type to verify dumped packets as the follows.
•
•

Packet Dump by Protocol
Packet Dump with Option

The hiD 6615 S223/S323 also provides debug command for Layer 3 routing protocols
(BGP, OSPF, RIP and PIM). If you want to debug about them, refer to the each configuration chapter.

174

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.16.1.1

UMN:CLI

Packet Dump by Protocol
You can see packets about BOOTPS, DHCP, ARP and ICMP using the following command.
Command

Mode

Description

debug packet {interface INTERFACE | port PORTS} protocol

Shows packet dump by protocol.

{bootps | dhcp | arp | icmp} {src-

ip A.B.C.D | dest-ip A.B.C.D}
debug packet {interface INTERFACE | port PORTS} host {src-ip
Shows host packet dump.

A.B.C.D | dest-ip A.B.C.D} {src-

port <1-65535> | dest-port <165535>}

debug packet {interface INTER-

Enable
Shows multicast packet dump.

FACE | port PORTS} multicast
{src-ip A.B.C.D | dest-ip A.B.C.D}

debug packet {interface INTERFACE

|

port

PORTS}

src-ip

A.B.C.D | dest-ip A.B.C.D}

Show packet dump by source IP address or destination

debug packet {interface INTER-

IP address.

FACE | port PORTS} dest-ip
A.B.C.D

7.16.1.2

Packet Dump with Option
You can verify packets with TCP dump options using the following command.
Command
debug packet OPTION

A50010-Y3-C150-2-7619

Mode
Enable

Description
Shows packet dump using options.

175

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Tab. 7.4 shows the options for packet dump.
Option

Description

-a

Change Network & Broadcast address to name.

-d

Change the complied packet-matching code to readable letters and close it

-e

Output link-level header of each line

-f

Output outer internet address as symbol
Buffer output data in line. This is useful when other application tries to receive data from

-l

tcpdump.

-n

Do not translate all address (e.g. port, host address)

-N

When output host name, do not print domain.

-O

Do not run packet-matching code optimizer. This option is used to find bug in optimizer

-p

Interface is not remained in promiscuous mode

-q

Reduce output quantity of protocol information. Therefore, output line is shorter.

-S

Output TCP sequence number not relative but absolute

-t

Time is not displayed on each output line

-v

Display more information

-w

Save the captured packets in a file instead of output

-x

Display each packet as hexacode

-c NUMBER

Close the debug after receive packets as many as the number

-F FILE

Recieves file as filter expression. All additional expressions on command line are ignored.
Desinate the interface where the intended packets are transmitted. If not designated, it

-i INTERFACE

automatically select a interface which has the lowest number within the system interfaces
(Loopback is excepted)

-r FILE

Read packets from the file which created by ‘-w’ option.
This is used to configure sample packet except the 68 byte default value. The 68 byte is
appropriate value for IP, ICMP, TCP and UDP, but it can truncate protocol information of
Name server or NFS packets. If sample size is long, the system should take more time to

-s SNAPLEN

inspect and packets can be dropped for small buffer size. On the contrary, if the sample
size is small, information can be leaked as the amount. Therefore, user should adjust the
size as header size of protocol.
Display the selected packets by conditional expression as the intended type.
rpc (Remote Procedure Call)
rtp (Real-time Transport Protocol)

-T TYPE

rtcp (Real-time Transport Control Protocal)
vat (Visual Audio Tool)
wb (distributed White Board)

EXPRESSION

Tab. 7.4

176

Conditional expression

Options for Packet Dump

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

7.16.2

UMN:CLI

Debug Packet Dump
The hiD 6615 S223/S323 provides network debugging function to prevent system overhead for unknown packet inflow. Monitoring process checks CPU load per 5 seconds. If
there is more traffic than threshold, user can capture packets using TCP Dump and save
it to file. User can download the dump file with the name of file-number.dump after FP
connection to the system. Verify the dumped packet contents with a packet analyze
promgram.
To debug packet dump, use the following command.
Command

Mode

Description
Debug with according to the conditions

debug

packet

log

COUNT: packet counting

COUNT

VALUE TIME [1-10]

Enable

VALUE: CPU-threshold
1-10: file number
Release the debug configuration

no debug packet log

i
7.17

Basically, user can save current configuration with write memory command. However,
the dump file is not saved.

Displaying the usage of the packet routing table
The packet routing based on host uses L3 table as it’s memory. It searches the information of destination addess in L3 table to get the Nexthop information and transmits packets through Rewriting process.
If it does not find the information of destination in L3 table, it refers to CPU routing table
and records Nexthop information in L3 table and then transmits the packets through Rewriting process. hiD 6615 provides 4k of L3 table.
The packet routing based on network complements the ineffectual process of recording
with packet unit.
hiD 6615 uses LPT table as it’s memory and it provides 16k of LPM table.
To show the usage of L3 table, LPM table or interface used in packet routing, use the following command.
Command
show ip tables summary

A50010-Y3-C150-2-7619

Mode
Enable

Description
Show the usage of L3 table or LPM table or interface

177

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8 System Main Functions
8.1

VLAN
The first step in setting up your bridging network is to define VLAN on your switch. VLAN
is a bridged network that is logically segmented by customer or function. Each VLAN contains group of ports called VLAN members. On the VLAN network, packets received on a
port are forwarded only to ports that belong to the same VLAN as the receiving port. Network devices in different VLANs cannot communicate with one another without a Layer 3
switching device to route traffic between the VLANs. These VLANs improve performance
because they reduce the propagation of local traffic, and they improve security benefits
because they completely separate traffic.
Enlarged Network Bandwidth
Users belonged in each different VLAN can use more enlarged bandwidth than no VLAN
composition because they do not receive unnecessary Broadcast information. A properly
implemented VLAN will restrict multicast and unknown unicast traffic to only those links
necessary to only those links necessary to reach members of the VLAN associated with
that multicast (or unknown unicast) traffic.
Cost-Effective Way
When you use VLAN to prevent unnecessary traffic loading because of broadcast, you
can get cost-effective network composition since switch is not needed.
Strengthened Security
When using a shared-bandwidth LAN, there is no inherent protection provided against
unwanted eavesdropping. In addition to eavesdropping, a malicious user on a shared
LAN can also induce problems by sending lots of traffic to specific targeted users or network as a whole. The only cure is to physically isolate the offending user. By creating
logical partitions with VLAN technology, we further enhance the protections against both
unwanted eavesdropping and spurious transmissions. As depicted in Figure, a properly
implemented port-based VLAN allows free communication among the members of a
given VLAN, but does not forward traffic among switch ports associated with members of
different VLANs. That is, a VLAN configuration restricts traffic flow to a proper subnet
comprising exactly those links connecting members of the VLAN. Users can eavesdrop
only on the multicast and unknown unicast traffic within their own VLAN presumably the
configured VLAN comprises a set of logically related users.
User Mobility
By defining a VLAN based on the addresses of the member stations, we can define a
workgroup independent of the physical location of its members. Unicast and multicast
traffic (including server advertisements) will propagate to all members of the VLAN so that
they can communicate freely among themselves.

178

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.1.1

UMN:CLI

Port-Based VLAN
The simplest implicit mapping rule is known as port-based VLAN. A frame is assigned to a
VLAN based solely on the switch port on which the frame arrives. In the example depicted in Figure, frames arriving on ports 1 through 4 are assigned to VLAN 1, frame from
ports 5 through 8 are assigned to VLAN 2, and frames from ports 9 through 12 are assigned to VLAN 3.
Stations within a given VLAN can freely communicate among themselves using either
unicast or multicast addressing. No communication is possible at the Data Link layer between stations connected to ports that are members of different VLANs. Communication
among devices in separate VLANs can be accomplished at higher layers of the architecture, for example, by using a Network layer router with connections to two or more VLANs.
Multicast traffic, or traffic destined for an unknown unicast address arriving on any port,
will be flooded only to those ports that are part of the same VLAN. This provides the desired traffic isolation and bandwidth preservation. The use of port-based VLANs effectively partitions a single switch into multiple sub-switches, one for each VLAN.
VLAN 1

5

4
3

VLAN 3

6

2
1

7
8
9
10
12
11

VLAN 2

Fig. 8.1

Port-based VLAN

The IEEE 802.1q based ports on the switches support simultaneous tagged and
untagged traffic. An 802.1q port is assigned a default port VLAN ID (PVID), and all
untagged traffic is assumed to belong to the port default PVID. Thus, the ports participating in the VLANs accept packets bearing VLAN tags and transmit them to the port VLAN
ID.
The below functions are explained.
• Creating VLAN
• Specifying PVID
• Assigning Port to VLAN
• Deleting VLAN
• Displaying VLAN

A50010-Y3-C150-2-7619

179

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.1.1.1

Creating VLAN
To configure VLAN on user’s network, use the following command.
Command
vlan create VLANS

i
8.1.1.2

Mode
Bridge

Description
Creates new VLAN by assigning VLAN ID:
VLANS: enter the number of VLAN ID (from 1 to 4094).

The variable VLANS is a particular set of bridged interfaces. Frames are bridged only
among interfaces in the same VLAN.

Specifying PVID
By default, PVID 1 is specified to all ports. You can also configure PVID. To configure
PVID in a port, use the following command.
Command

Mode

Description
Configures VLAN PVID:

vlan pvid PORTS PVIDS

Bridge

PORTS: enter the port numbers.
PVIDS: enter the PV IDs (1 to 4094 multiple entries
possible).

8.1.1.3

Assigning Port to VLAN
To assign a port to VLAN, use the following command.
Command

Mode

Description
Assigns a port to VLAN:

vlan add VLANS PORTS {tagged

VLANS: enter the VLAN ID.

| untagged}
Bridge

PORTS: enter the port number.
Deletes associated ports from specified VLAN:
VLANS: enter the VLAN ID.

vlan del VLANS PORTS

PORTS: enter the port number to be deleted.

i
8.1.1.4

When you assign several ports to VLAN, you have to enter each port separated by a
comma without space or use dash mark “-“ to arrange port range.

Deleting VLAN
To delete VLAN, use the following command.
Command
no vlan VLANS

i

180

Mode
Bridge

Description
Deletes VLAN, enter the VLAN ID to be deleted.

When you delete VLAN, all ports must be removed from VLAN before, see the below
procedure.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.1.1.5

UMN:CLI

Displaying VLAN
To display a configuration of VLAN, use the following command.
Command

Mode
Enable

show vlan [VLANS]

Global
Bridge

8.1.2

Description
Shows the configuration for specific VLAN, enter VLAN
ID.

Protocol-Based VLAN
User can use a VLAN mapping that associates a set of processes within stations to a
VLAN rather than the stations themselves. Consider a network comprising devices supporting multiple protocol suites. Each device may have an IP protocol stack, an AppleTalk
protocol stack, an IPX protocol stack and so on.
If we configure VLAN-aware switches such that they can associate a frame with a VLAN
based on a combination of the station’s MAC source address and the protocol stack in
use, we can create separate VLANs for each set of protocol-specific applications.
To configure protocol-based VLAN, follow these steps.
1. Configure VLAN groups for the protocols you want to use.
2. Create a protocol group for each of the protocols you want to assign to a VLAN.
3. Then map the protocol for each interface to the appropriate VLAN
Command

Mode

Description
Configures protocol based VLAN.

vlan

pvid

PORTS

[ethertype

ETHERTYPE] <1-4094>

PORTS: input a port number
Bridge

no vlan pvid PORTS ethertype
[ETHERTYPE]

ETHERTYPE: 0x800
1-4094: Vlan ID
Removes protocol based VLAN.

Because Protocol Based VLAN and normal VLAN run at the same time, Protocol Based
VLAN operates only matched situation comparing below two cases.
1. When Untagged Frame comes in and matches with Protocol VLAN Table, tags PVID
which configured on Protocol VLAN. But in no matched situation, tags PVID which
configured on and operates VLAN.
2. When Tagged Frame comes in and VID is 0, it switches by Protocol VLAN Table. But
if VID is not 0, it switches by normal VLAN Table.

8.1.3

MAC address-based VLAN
In order to configure VLAN based on MAC address, user should designate MAC address.
use the following command.

A50010-Y3-C150-2-7619

181

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode

vlan macbase MAC-ADDRESS
<1-4094>

no

vlan

Configure VLAN based on MAC address
Bridge

macbase

MAC-

Clears configured VLAN based on MAC address.

ADDRESS

8.1.4

Description

Subnet-based VLAN
In order to configure VLAN based on Subnet, user should designate Subnet. use the following command.
Command

Mode

vlan subnet IP-ADDRESS/M <14094>

Bridge

no vlan subnet {IP-ADDRESS}

Description
Configure VLAN based on Subnet
Clears configured VLAN based on Subnet.

To make precedence between MAC address and Subnet based VLAN, user can choose
one of both with below command.
Command
vlan precedence {MAC / SUBNET}

8.1.5

Mode
Bridge

Description
Configure precedence between MAC based
VLAN and Subnet based VLAN.

Tagged VLAN
In a VLAN environment, a frame’s association with a given VLAN is soft; the fact that a
given frame exists on some physical cable does not imply its membership in any particular VLAN. VLAN association is determined by a set of rules applied to the frames by
VLAN-aware stations and/or switches.
There are two methods for identifying the VLAN membership of a given frame:
• Parse the frame and apply the membership rules (implicit tagging).
• Provide an explicit VLAN identifier within the frame itself.
VLAN Tag
A VLAN tag is a predefined field in a frame that carries the VLAN identifier for that frame.
VLAN tags are always applied by a VLAN –aware device. VLAN-tagging provides a number of benefits, but also carries some disadvantages.

182

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Advantages

Disadvantages

VLAN association rules only need to be applied
once.

Tags can only be interpreted by VLAN aware devices.

Only edge switches need to know the VLAN as-

Edge switches must strip tags before forwarding

sociation rules.

frames to legacy devices or VLAN-unaware domains.

Core switches can get higher performance by

Insertion or removal of a tag requires recalculation of

operating on an explicit VLAN identifier.

the FCS, possibly compromising frame integrity.

VLAN-aware end stations can further reduce the

Tag insertion may increase the length of a frame be-

performance load of edge switches.

yond the maximum allowed by legacy equipment.

Tab. 8.1

Advantages and Disadvantages of Tagged VLAN

Mapping Frames to VLAN
From the perspective the VLAN-aware devices, the distinguishing characteristic of a
VLAN is the means used to map a given frame to that VLAN. In the case of tagged frame,
the mapping is simple – the tag contains the VLAN identifier for the frame, and the frame
is assumed to belong to the indicated VLAN. That’s all there is to it.
To configure the tagged VLAN, use the following command.
Command

Mode

Description
Configures tagged VLAN on a port:

vlan add VLANS PORTS tagged

Bridge

VLANS: enter the VLAN ID.
PORTS: enter the port number

8.1.6

VLAN Description
You can describe each VLAN with the following command
Command

Mode

Description
Describes VLAN characteristic:

vlan description VLANS DESC

Bridge

DESC: enter the detail description
Deletes the description about specified VLAN ID.

no vlan description VLANS

8.1.7

VLANS: enter the VLAN ID.

Displaying VLAN Information
User can display the VLAN information about Port based VLAN, Protocol based VLAN
and QinQ.
Command

Mode

Description
Shows all VLAN configurations.

show vlan
show vlan VLANS

Enable

Shows a configuration for specific VLAN.

show vlan description

Global

Shows a description for specific VLAN.

show vlan dot1q-tunnel

Bridge

Shows QinQ configuration.

show vlan protocol

A50010-Y3-C150-2-7619

Shows VLAN based on protocol.

183

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.1.8

QinQ
QinQ or Double Tagging is one way for tunneling between networks
Customer A

Customer A

VLAN 200

VLAN 641

T

PVID 641

VLAN 200

U

U
T

T

T

T
Trunk Port

Trunk Port

Tunnel Port

Tunnel Port

T

U

U

T

VLAN 201

VLAN 201

T: Tagged
U: Untagged

Customer B

Fig. 8.2

T
Tunnel Port

Tunnel Port

Customer B

Example of QinQ Configuration

If QinQ is configured on the hiD 6615 S223/S323, it transmits packets adding another Tag
to original Tag. Customer A group and customer B group can guarantee security because
telecommunication is done between each VLANs at Double Tagging part.
Double tagging is implemented with another VLAN tag in Ethernet frame header.
Preamble

Destination

Source

802.1Q VLAN Tag

TPID 8100

Priority

Type/Length

Canonical

LLC

Data

FCS

12-bit identifier

VLAN Ethernet Frame

Preamble

Destination

TPID 8100/9100

Priority

Source

Canonical

VLAN Tag

802.1Q VLAN Tag

12-bit identifier

Type/Length

TPID 8100

Priority

LLC

Data

Canonical

FCS

12-bit identifier

Ethernet Frame using 802.1Q Tunneling

Fig. 8.3

QinQ Frame

Port which connected with Service Provider is Uplink port (internal), and which connected
with customer is Access port (external).
Tunnel Port
By tunnel port we mean a LAN port that is configured to offer 802.1Q-tunneling support. A
tunnel port is always connected to the end customer, and the input traffic to a tunnel port
is always 802.1Q tagged traffic. The different customer VLANs existing in the traffic to a
tunnel port shall be preserved when the traffic is carried across the network
Trunk Port
By trunk port we mean a LAN port that is configured to operate as an interswitch link/port,

184

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

able of carrying double-tagged traffic. A trunk port is always connected to another trunk
port on a different switch. Switching shall be performed between trunk ports and tunnels
ports and between different trunk ports.

8.1.8.1

Double Tagging Operation
Step 1
If there is no SPVLAN Tag on received packet, SPVLAN Tag is added.
SPVLAN Tag = TPID : Configured TPID
VID : PVID of input port
Step 2
If received packet is tagged with CVLAN, the switch transmits it to uplink port changing to
SPVLAN + CVLAN. When TPID value of received packet is same with TPID of port, it
recognizes as SPVLAN, and if not as CVLAN.
Step 3
If Egress port is Access port (Access port is configured as Untagged), remove SPVLAN. If
egress port is uplink port, transmit as it is.
Step 4
The hiD 6615 S223/S323 switch has 0x8100 TPID value as default and other values are
used as hexadecimal number.

8.1.8.2

Double Tagging Configuration
Step 1
Designate the QinQ port.
Command

Mode

vlan dot1q-tunnel enable PORTS

Bridge

Description
Configures a qinq port.
PORTS: selects port number qinq to be enabled

Step 2
Configure the same PVID with the VLAN of peer network on the designated qinq port.
Command

Mode

Description
Configures a qinq port.

vlan pvid PORTS <1-4094>

Bridge

PORTS: selects port number qinq to be enabled
<1-4094>: VLAN ID

To disable double tagging, use the following command
Command
vlan
PORTS

i

dot1q-tunnel

Mode
disable

Bridge

Description
Configures a qinq port.
PORTS: a port qinq to be disabled

When you configure Double tagging on the hiD 6615 S223/S323, consider the below attention list.

A50010-Y3-C150-2-7619

185

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

•
•
•
•
•

8.1.8.3

DT and HTLS cannot be configured at the same time. (If switch should operate as
DT, HTSL has to be disabled.)
TPID value of all ports on switch is same.
Access Port should be configured as Untagged, and Uplink port as Tagged.
Ignore all tag information of port which comes from untagged port (Access Port).
Port with DT function should be able to configure Jumbo function also

TPID Configuration
TPID (Tag Protocol Identifier) is a kind of Tag protocol, and it indicates the currently used
tag information. User can change the TPID. By default the port which is configured as
802.1q (0x8100) cannot work as VLAN member.
Use the following command to set TPID on a QinQ port.
Command
vlan dot1q-tunnel tpid TPID

8.1.9

Mode
Bridge

Description
Configures TPID.

Layer 2 Isolation
Private VLAN is a kind of LAN Security function using by Cisco products, and it can be
classified to Private VLAN and Private edge. Until now, there is no standard document of
it.
Private VLAN Edge
Private VLAN edge (protected port) is a function in local switch. That is, it cannot work on
between two different switches with protected ports. A protected port cannot transmit any
traffic to other protected ports.
Private VLAN
Private VLAN provides L2 isolation within the same Broadcast Domain ports. That means
another VLAN is created within a VLAN. There are three type of VLAN mode.
• Promiscuous: A promiscuous port can communicate with all interfaces, including the
isolated and community ports within a PVLAN.
•

Isolated: An isolated port has complete Layer 2 separation from the other ports within
the same PVLAN, but not from the promiscuous ports. PVLANs block all traffic to isolated ports except traffic from promiscuous ports. Traffic from isolated port is for
warded only promiscuous ports.

•

Community: Community ports communicate among themselves and with their promiscuous ports. These interfaces separate at Layer 2 from all other interfaces inother communities or isolated ports within their PVLAN.

The difference between Private VLAN and Private VLAN edge is that PVLAN edge guarantees security for the ports in a VLAN using protected port and PVLAN guarantees port
security by creating sub-VLAN with the three types (Promiscuous, Isolation, and Community). And because PVLAN edge can work on local switch, the isolation between two
switches is impossible.
The hiD 6615 S223/S323 provides Private VLAN function like Private VLAN edge of
Cisco product. Because it does not create any sub-VLAN, port security is provided by port

186

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

isolation. If you want to configure Private VLAN on the hiD 6615 S223/S323 switch, refer
to Port Isolation configuration.

8.1.9.1

Port Isolation
The Port Isolation feature is a method that restricts L2 switching between isolated ports in
a VLAN. Nevertheless, flows between isolated port and non-isolated port are not restricted. If you use the port protected command, packet cannot be transmitted between
protected ports. However, to non-protected ports, communication is possible.
To configure Port Isolation, use the following command.
Command
port protected PORTS
no port protected [PORTS]

8.1.9.2

Mode
Bridge

Description
Enables port isolation.
Disables port isolation.

Shared VLAN
This chapter is only for Layer 2 switch operation. The hiD 6615 S223/S323 is Layer 3
switch, but it can be used for Layer 2 also. Because there is no routing information in
Layer 2 switch, each VLAN cannot communicate. Especially, the uplink port should receive packets from all VLANs. Therefore, when you configure the hiD 6615 S223/S323 as
Layer 2 switch, the uplink ports have to be included in all VLANs.

Fig. 8.4

In Case Packets Going Outside in Layer 2 environment
As above configuration with untagged packet, if an untagged packet comes into port 1, it
is added with tag 1 for PVID 1. And the uplink port 24 is also included in the default
VLAN; it can transmit to port 24.
However, a problem is possible to occur for coming down untagged packets to uplink
ports. If an untagged packet comes to uplink ports from outer network, the system does
not know which PIVD it has and where should it forward.

A50010-Y3-C150-2-7619

187

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Fig. 8.5
In Case External Packets Enter under Layer 2 environment (1)
To transmit the untagged packet from uplink port to subscriber, a new VLAN should be
created including all subscriber ports and uplink ports. This makes the uplink ports to recognize all other ports.
FID helps this packet forwarding. FDB is MAC Address Table that recorded in CPU. FDB
table is made of FID (FDB Identification). Because the same FID is managed in the same
MAC table, it can recognize how to process packet forwarding. If the FID is not same, the
system cannot know the information from MAC table and floods the packets.

Outer Network
SWITCH(bridge)# show vlan
u: untagged port, t: tagged port
----------------------------------------------------------------|
1
2
3
4
Name( VID| FID) |123456789012345678901234567890123456789012
----------------------------------------------------------------default(
1|
6) |u...uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu
br2(
2|
6) |.u.....................u..................
br3(
3|
6) |..u....................u..................
br4(
4|
6) |...u...................u..................
br5(
5|
6) |....u..................u..................
br6(
6|
6) |uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu

Uplink Port

default

br2

br3

br4

br5
SWITCH(bridge)#

Fig. 8.6

In Case External Packets Enter under Layer 2 environment (2)
In conclusion, to use the hiD 6615 S223/S323 as Layer 2 switch, user should add the uplink port to all VLANs and create new VLAN including all ports. If the communication between each VLAN is needed, FID should be same.
To configure FID, use the following command.
Command

Mode

Description
Configures FID.

vlan fid VLANS FID

Bridge

VLANS: enters VLAN name
FID: enters FID value

188

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.1.10

UMN:CLI

VLAN Translation
VLAN Translation is simply an action of Rule. This function is to translate the value of
specific VLAN ID which classified by Rule. The switch makes Tag adding PVID on
Untagged packets, and use Tagged Packet as it is. That is, all packets are tagged in the
Switch, and VLAN Translation is to change the VLAN ID value of Tagged Packet in the
Switch. This function is to adjust traffic flow by changing the VLAN ID of packet.
Step 1
Open Rule Configuration mode using rule NAME create command..
Step 2
Classify the packet that VLAN Translation will be applied by Rule..
Step 3
Designate the VLAN ID that will be changed in the first step by the match vlan <1-4094>
command.
Step 4
Open Bridge Configuration mode using the bridge command.
Step 5
Add the classified packet to VLAN members of the VLAN ID that will be changed.

8.1.11

Sample Configuration
[Sample Configuration 1] Configuring Port-based VLAN
The following is assigning vlan id of 2,3 and 4 to port 2, port 3, and port 4.

default br2

br3

br4

SWITCH(bridge)# vlan create 2
SWITCH(bridge)# vlan create 3
SWITCH(bridge)# vlan create 4
SWITCH(bridge)# vlan del default 2-4
SWITCH(bridge)# vlan add 2 2 untagged
SWITCH(bridge)# vlan add 3 3 untagged
SWITCH(bridge)# vlan add 4 4 untagged
SWITCH(bridge)# vlan pvid 2 2
SWITCH(bridge)# vlan pvid 3 3
SWITCH(bridge)# vlan pvid 4 4
SWITCH(bridge)# show vlan
u: untagged port, t: tagged port
-----------------------------------------------------------------

A50010-Y3-C150-2-7619

189

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

|

1

2

3

4

Name( VID| FID) |123456789012345678901234567890123456789012
----------------------------------------------------------------default(

1|

1)

|u...uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu

br2(

2|

2)

|.u........................................

br3(

3|

3)

|..u.......................................

br4(
SWITCH(bridge)#

4|

4)

|...u......................................

[Sample Configuration 2] Deleting Port-based VLAN
The following is deleting vlan id 3 among configured VLAN.
SWITCH(bridge)# vlan del 3 3
SWITCH(bridge)# exit
SWITCH(config)# interface 3
SWITCH(interface)# shutdown
SWITCH(interface)# exit
SWITCH(config)# bridge
SWITCH(bridge)# no vlan 3
SWITCH(bridge)# show vlan
u: untagged port, t: tagged port
----------------------------------------------------------------|

1

2

3

4

Name( VID| FID) |123456789012345678901234567890123456789012
----------------------------------------------------------------default(

1|

1)

|u.u.uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu

br2(

2|

2)

|.u........................................

br4(
SWITCH(bridge)#

4|

4)

|...u......................................

[Sample Configuration 3] Configuring Protocol-based VLAN
The following is an example of configuring protocol based VLAN on the port 2 and port 4
0x900 packet among
the packets entering
to Port 4

0x800 packet among
the packets entering
to Port 2.

default br2

br3

br4

SWITCH(bridge)# vlan pvid 2 ethertype 0x800 5
SWITCH(bridge)# vlan pvid 4 ethertype 0x900 6
SWITCH(bridge)# show vlan protocol

190

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

--------------------------------------------------------------|

1

2

3

4

Ethertype | VID |123456789012345678901234567890123456789012
--------------------------------------------------------------0x0800

5 .p........................................

0x0900

6 ...p......................................

SWITCH(bridge)#

With above configuration, the packets from port number 2 and 4 are decided according to
the protocol. In case the protocol is incongruous, the route is decided according to the
port based VLAN.

[Sample Configuration 4] Configuring QinQ
10 port of SWITCH 1 and 11 port of SWITCH 2 are connected to the network where different VLANs are configured. To communicate without changing VLAN configuration of
SWITCH 1 and SWITCH 2 which communicate with PVID 10, configure it as follows.

i

You should configure the ports connected to network communicating with PVID 11 as
Tagged VLAN port.
< SWITCH 1 >
SWITCH(bridge)# vlan dot1q-tunnel enable 10
SWITCH(bridge)# vlan pvid 10 11
SWITCH(bridge)# show vlan dot1q-tunnel
Tag Protocol Id : 0x8100 (d: double-tagging port)
---------------------------------------------------|

1

2

3

4

Port |123456789012345678901234567890123456789012
---------------------------------------------------dtag .........d................................
SWITCH(bridge)#

< SWITCH 2 >
SWITCH(bridge)# vlan dot1q-tunnel enable 11
SWITCH(bridge)# vlan pvid 11 11
SWITCH(bridge)# show vlan dot1q-tunnel
Tag Protocol Id : 0x8100 (d: double-tagging port)
---------------------------------------------------|

1

2

3

4

Port |123456789012345678901234567890123456789012
---------------------------------------------------dtag ..........d...............................
SWITCH(bridge)#

[Sample Configuration 5] Configuring Shared VLAN with FID
Configure br2, br3, br4 in the hiD 6615 S223/S323 configured Layer 2 environment and
24 ports as Uplink port is configured. To transmit untagged packet through Uplink port
rightly, follow below configuration.

A50010-Y3-C150-2-7619

191

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Outer Network

Uplink Port

default

br2

br4

br3

SWITCH(bridge)# vlan create br2
SWITCH(bridge)# vlan create br3
SWITCH(bridge)# vlan create br4
SWITCH(bridge)# vlan del default 3-8
SWITCH(bridge)# vlan add br2 3,4 untagged
SWITCH(bridge)# vlan add br3 5,6 untagged
SWITCH(bridge)# vlan add br4 7,8 untagged
SWITCH(bridge)# vlan add br2 24 untagged
SWITCH(bridge)# vlan add br3 24 untagged
SWITCH(bridge)# vlan add br4 24 untagged
SWITCH(bridge)# vlan create br5
SWITCH(bridge)# vlan add br5 1-42 untagged
SWITCH(bridge)# vlan fid 1-5 5
SWITCH(bridge)# show vlan
u: untagged port, t: tagged port
----------------------------------------------------------------|

1

2

3

4

Name( VID| FID) |123456789012345678901234567890123456789012
-----------------------------------------------------------------

8.2

default(

1|

5)

|uu......uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu

br2(

2|

5)

|..uu...................u..................

br3(

3|

5)

|....uu.................u..................

br4(

4|

5)

|......uu...............u..................

br5(
SWITCH(bridge)#

5|

5)

|uuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuuu

Link Aggregation
Link Aggregation Control Protocol (LACP) complying with IEEE 802.3ad bundles several
physical ports together to one logical port so that user can get enlarged bandwidth.

192

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Bandwidth
with 1 port
Enlarged bandwidth
with many ports

A logical port that can be made by
aggregating a number of the ports.

Fig. 8.7

Link Aggregation

The hiD 6615 S223/S323 supports two kinds of link aggregation as port trunk and LACP.
There’s a little difference in these two ways. In case of port trucking, it is quite troublesome to set the configuration manually and the rate to adjust to the network environment
changes when connecting to the switch using logical port. However, if the user configures
physical port aggregated with the logical port in each switches, the switches are connected as the configuration. Therefore it is easier for user to configure comparing to the
port trunk and could quickly respond to the environmental changes.

8.2.1

Port Trunk
Port trucking enables you to dynamically group similarly configured interfaces into a single logical link (aggregated port) to increase bandwidth, while reducing the traffic congestion.

8.2.1.1

Configuring Port Trunk
To make logical port by aggregating the ports, use the following command.
Command

Mode

trunk <0-5> PORT
trunk distmode <0-5> PORTS
{dstip | dstmac | srcdstip |

srcdstmac | srcip | srcmac}

i

Description
Adds a port to the aggregation port group.
Adds a port to the aggregation group and designates

Bridge

physical port as logical port and decide which packets
are transmitted to the aggregated port.
1-5: Trunk Group ID

For the hiD 6615 S223/S323, source destination MAC address is basically used to decide
packet route.
If packets enter to logical port aggregating several ports and there’s no way to decide
packet route, the packets could be gathered on particular member port so that it is not
possible to use logical port effectively. Therefore hiD 6615 S223/S323 is configured to
decide the way of packet route in order to divide on member port effectively when packets

A50010-Y3-C150-2-7619

193

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

enter. It is decided with Source IP address, Destination IP address, Source MAC address,
Destination Mac address and the user could get information of packets to decided packet
route.
•
•
•
•
•
•

dstip: Destination IP address
dstmac: Destination MAC address
srcdstip: Refer to both Source IP address and Destination IP address
srcdstmac: Refer to both Source MAC address and Destination MAC address
srcip: Source IP address
srcmac: Source MAC address.

The port designated as member port of port trunk is automatically deleted from existing
VLAN. Therefore, if member port and aggregated port exist in other VLAN, VLAN configuration should be changed for the aggregated port.

8.2.1.2

Disabling Port Trunk
To remove the configured port trunk from specified trunk group, use the following command.
Command
no trunk<0-5> PORTS
no trunk distmode <0-5>

i
8.2.1.3

Mode

Description

Bridge

Releases a configured trunk port.

If the user deleted member port from logical port or release port trunk, they are automatically contained as default VLAN.

Displaying Port Trunk Configuration
To display a configuration of port trunk, use the following command.
Command

Mode

Description

Enable

show trunk

Global

Shows a configuration for trunk.

Bridge

8.2.2

Link Aggregation Control Protocol (LACP)
Link Aggregation Control Protocol (LACP) is the function of using wider bandwidth by aggregating more than two ports as a logical port as previously stated port trunk function. If
the integrated port by configuring from port trunk is in other VLAN which is different from
VLAN where existing member port is originally belong to, it should be moved to VLAN
where the existing member port is belong to. However, the integrated port configured by
LACP is automatically added to appropriate VLAN.

i

The LACP aggregator from LACP could support up to 14 so that it is possible to input aggregator number from 0 to 13, and group ID of port trunk and aggregator number of LACP
cannot be configured repeatedly.
The following explains how to configure LACP.

194

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Configuring LACP
Packet Route
Operating Mode of Member Port
Priority of Switch
Identifying Member Ports within LACP
BPDU Transmission Rate
Key value of Member Port
Priority
Displaying LACP Configuration

•
•
•
•
•
•
•
•
•

8.2.2.1

UMN:CLI

Configuring LACP
Step 1
Activate LACP function, using the following command.
Command

Mode

Description
Enables LACP of designated Aggregator-number:

lacp aggregator

AGGREGATIONS: select aggregator ID that should be

AGGREGATIONS
Bridge

no lacp aggregator

enabled for LACP (valid value from 0 to 13).
Disables LACP for designated Aggregator-number,
select the aggregator ID that should be disabled for

AGGREGATIONS

LACP.

Step 2
Configure the physical port that is a member of aggregated port. In order to configure the
member port, use the following command.
Command

Mode

Description
Configures physical port that is member port of aggregator; select the port number(s) that should be enabled

lacp port PORTS
Bridge

no lacp port PORTS

8.2.2.2

for LACP.
Deletes member port of Aggregator, select the port
number(s) that should be disabled for LACP.

Packet Route
When packets enter to logical port integrating several ports, if there’s no process to decide the packet route, it is not possible to use logical port effectively from focusing packets on a particular member port.
If these packets enter to logical port aggregating several ports and there’s no way to decide packet route, the packets could be gathered on particular member port so that it is
not possible to use logical port effectively.
Therefore the hiD 6615 S223/S323 is configured to decide the way of packet route in order to divide on member port effectively when packets are transmitted. It can be selected
with Source IP address, destination IP address, source MAC address, destination MAC
address and the user could get the information of packets to decided packet route.

A50010-Y3-C150-2-7619

195

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

•
•
•
•
•
•

i

dstip: Destination IP address
dstmac: Destination MAC address
srcdstip: Runs by reference to both Source IP address and Destination IP address
srcdstmac: Source MAC address and Destination MAC address
srcip: Source IP address
srcmac: Source MAC address.

For the hiD 6615 S223/S323, srcdstmac (source MAC address and destination MAC address) is basically used to decide packet route.
After configuring aggregator, you should configure packets transmitting aggregator port.
The following is the command of configuring packets transmitting aggregator port.
Command

Mode

lacp aggregator distmode AGGREGETIONS {srcmac | dstmac
| srcdstmac | srcip | dstip |

Description
Defines packets transmitted by way of aggregator

Bridge

which is a logical aggregated port:
AGGREGATIONS: select the aggregator ID <0-13>.

srcdstip}

To disable configuring packets, use the following command.
Command
no lacp aggregator
AGGREGETIONS

8.2.2.3

Mode
Bridge

Description
Deletes destination MAC address, select the aggregator ID.

Operating Mode of Member Port
After configuring member port, configure the mode of member port. There are two kinds
of mode Active mode and Passive mode in member port. The port of Passive mode starts
LACP when there’s Active mode on the port of opposite switch. The priority of Active
mode is higher that that of Passive mode so that the port of Passive mode follows the
port of Active mode.

i

If each member port of the connected switch is configured as Active mode and Passive
mode, Active mode is the standard. If both switches are configured as Passive mode, link
for member ports of two switches is not realized.
To configure the mode of member port, use the following command.
Command
lacp port activity PORTS {active
| passive}

Mode
Bridge

Description
Configure the mode of member port, select the member port number. (default: active)

To delete an operating mode of configured member port, use the following command.
Command
no lacp port activity PORTS

196

Mode
Bridge

Description
Deletes operation mode of configured member port,
select the member port number.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.2.2.4

UMN:CLI

Identifying Member Ports within LACP
The port configured as member port is basically configured to aggregate to LACP. However, even though the configuration as member port is not released, they could operate
as independent port without being aggregated to LACP. These independent ports cannot
be configured as trunk port because they are independent from being aggregated to
LACP under the condition of being configured as member port.
To configure member port to aggregate to LACP, use the following command.
Command
lacp port aggregation PORTS
{aggregatable | individual}

Mode

Description
Designates whether a member port joins LACP or not,

Bridge

select the member port should be included. (default:
aggregatable)

To clear aggregated to LACP of configured member port, use the following command.

8.2.2.5

Command

Mode

no lacp port aggregation PORTS

Bridge

Description
Deletes the configured member port in LACP, select
the member port.

BPDU Transmission Rate
Member port transmits BPDU with its information. For the hiD 6615 S223/S323, it is possible to configure the BPDU transmission rate, use the following command.
Command

Mode

Description
Configures BPDU transmission rate:

lacp port timeout PORTS {short |
long}

Bridge

PORTS: select the port number.
short: fast rate (once every 1 sec)
long: slow rate (30 sec: default)

To clear BPDU transmission rate, use the following command (clear means long timeout).
Command
no lacp port timeout PORTS

8.2.2.6

Mode
Bridge

Description
Deletes BPDU transmission rate of configured member
port, select the port number.

Key value of Member Port
Member port of LACP has key value. All member ports in one aggregator have same key
values. To make an aggregator consisted of specified member ports, configure different
key value with key value of another port.
Command
lacp port admin-key PORTS <115>

A50010-Y3-C150-2-7619

Mode

Description
Configures key value of member port:

Bridge

PORTS: select the port number.
1-15: select the port key value. (default: 1)

197

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To delete key value of configured member port, use the following command.
Command
no lacp port admin-key PORTS

8.2.2.7

Mode
Bridge

Description
Deletes key value of selected member port, select the
member port number.

Priority of Member Port
To configure priority of LACP member port, use the following command.
Command
lacp port priority PORTS <165535>

Mode
Bridge

Description
Sets the LACP priority of member port, select the port
number. (default: 32768)

To remove port priority of configured member port, use the following command.
Command
no lacp port priority PORTS

8.2.2.8

Mode
Bridge

Description
Deletes port priority of selected member port, select
the member port number.

Priority of Switch
In case the member ports of connected switches are configured as Active mode (LACP
system enabled), it is required to configure which switch would be a standard for it. For
this case, the user could configure the priority on switch. The following is the command of
configuring the priority of the switch in LACP function.
Command
lacp system priority <1-65535>

Mode
Bridge

Description
Sets the priority of the switch in LACP function, enter
the switch system priority. (default: 32768)

To delete the priority of configured switch, use the following command.
Command
no lacp system priority

198

Mode
Bridge

Description
Clears the priority of the configured switch.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.2.2.9

UMN:CLI

Displaying LACP Configuration
To display a configured LACP, use the following command.
Command

Mode

Shows the information of aggregated port.

show lacp aggregator
show lacp aggregator AGGREEnable

GATIONS

show lacp port

Description

Global
Bridge

Shows the information of selected aggregated port.
Shows the information of member port.

show lacp port PORTS

Shows the information of appropriated member port.

show lacp statistics

Shows aggregator statistics.

To clear LACP statistics information, use the following command.
Command

Mode

Description

Enable

clear lacp statistics

Global

Clears the information of statistics.

Bridge

A50010-Y3-C150-2-7619

199

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3

Spanning-Tree Protocol (STP)
LAN, which is composed of double-path like token ring, has the advantage that it is possible to access in case of disconnection with one path. However, there is another problem
named Loop when you always use the double-path.

Switch A

Switch B

PC-A

Fig. 8.8

PC-B

Example of Loop

Loop is when there are more than one path between switches (SWITCH A, B), PC A
sends packet through broadcast or multicast and then the packet keeps rotating. It
causes superfluous data-transmission and network fault.
STP (Spanning-Tree Protocol) is the function to prevent Loop in LAN with more than two
paths and to utilize the double-path efficiently. It specify in IEEE 802.1d. If STP is configured, there is no Loop since it chooses more effective path of them and closes the other
path. In other words, when SWITCH C in the below figure sends packet to SWITCH B,
path 1 is chosen and path 2 is blocked.

PC-B

VLAN 1
Switch A

Switch D

Switch B
Blocking

Path 1
Path 2

PC-A

Fig. 8.9

200

Switch C

Principle of Spanning Tree Protocol

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Meanwhile, RSTP (Rapid Spanning-Tree Protocol) defined in IEEE 802.1w innovate reduces the time of network convergence on STP (Spanning-Tree Protocol). It is easy and
fast to configure new protocol.
Also, 802.1w includes 802.1d inside, so it can provide compatibility with 802.1d. For more
detail description of STP and RSTP, refer to the following.
•
•
•
•
•
•
•
•
•
•

8.3.1

STP Operation
RSTP Operation
MSTP Operation
Configuring STP/RSTP/MSTP/PVSTP/PVRSTP Mode (Required)
Configuring STP/RSTP/MSTP
Configuring PVSTP/PVRSTP
Root Guard
Restarting Protocol Migration
Bridge Protocol Data Unit Configuration
Sample Configuration

STP Operation
The 802.1d STP defines port state as blocking, listening, learning, and forwarding. When
STP is configured in LAN with double-path, switches exchange their information including
bridge ID. It is named as BPDU (Bridge Protocol Data Unit). Switches decide port state
based on the exchanged BPDU and automatically decide optimized path to communicate
with the root switch.
Root Switch
The most important information to decide the root switch is bridge ID. Bridge ID is composed of 2 bytes-priority and 6 bytes-MAC address. The root switch is decided with the
lowest bridge ID.
Switch A
Priority : 8

ROOT
DP

DP

RP

RP
Switch C
Priority : 10

Switch B
Priority : 9

DP

DP
RP

RP = Root Port
DP = Designated Port
Switch D

Fig. 8.10

A50010-Y3-C150-2-7619

Root Switch

201

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

After configuring STP, these switches exchange their information. The priority of SWITCH
A is 8, the priority of SWITCH B is 9 and the priority of SWITCH C is 10. In this case,
SWITCH A is automatically configured as a root switch.
Designated Switch
After deciding a root switch, while SWITCH A transmits packets to SWITCH C, SWITCH A
compares exchanged BPDU to decide the path. The most important information to decide
path is the path-cost. Path-cost depends on transmission rate of LAN interface and path
with lower path-cost is selected.
The standard to decide designated switch is total root path-cost which is added with pathcost to root. Path-cost depends on transmit rate of switch LAN interface and switch with
lower path-cost is selected to be designated switch.
Switch A
Priority : 8

Path-cost
50

Designated
Switch

Root Switch

Path-cost
100

Switch C
Priority : 10

Switch B
Priority : 9

Path-cost
100

Path-cost
100

Path 1
Path 2

Switch D

(PATH 1 = 50 + 100 = 150, PATH 2 = 100 + 100 = 200, PATH 1 < PATH 2, ∴ PATH 1 selected

Fig. 8.11

Designated Switch

In case of the above picture showing SWITCH C sends packet, path-cost of PATH 1 is
150 and path- cost of PATH 2 is total 200(100 + 100 ; path-cost of SWITCH C to B + pathcost of SWITCH B to C). Therefore lower path-cost, PATH 1 is chosen. In this case, port
connected to Root switch is named Root port. In the above picture, port of SWITCH C
connected to SWITCH A as Root switch is Root port. There can be only one Root port on
equipment.
The standard to decide designated switch is total root path-cost which is added with pathcost to root. Switch with lower path-cost is selected to be designated switch. When root
path-costs are same, bridge ID is compared.

202

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Designated Port and Root Port
A Root Port is the port in the active topology that provides connectivity from the Designated Switch toward the root. A Designated Port is a port in the active topology used to
forward traffic away from the root onto the link for which this switch is the Designated
Switch. That is; except root port in each switch, selected port to communicate is designated port.
Port Priority
Meanwhile, when path-costs of two paths are same, port-priority is compared. As the below picture, suppose that two switches are connected. Since the path-costs of two paths
are 100, same, their port priorities are compared and port with smaller port priority is selected to transmit packet.

i

All these functions are automatically performed by BPDU, which is the information of
switch. It is also possible to configure BPDU to modify root switch or path manually.

Root

- Path-cost 100
- Port priority 7
- Port 1
Path 1

Path 2
- Path-cost 100
- Port priority 8
- Port 2
( path-cost of PATH 1 = path-cost of PATH 2 = 100 ∴ unable to compare
PATH 1 port priority = 7, PATH 2 port priority = 8, PATH 1< PATH 2, ∴ PATH 1 is chosen )

Fig. 8.12

A50010-Y3-C150-2-7619

Port Priority

203

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Port States
Each port on a switch can be in one of five states.

Listening
BPDUs or timeout indicate
Potential to become active

Blocking

BPDUs indicate port
should not be active
BPDUs indicate port
should not be active

Forwarding timer
expired

Learning

Forwarding timer
expired

BPDUs indicate port
should not be active

Forwarding

Disabled
Fig. 8.13

204

Port State

•

Blocking
a port that is enabled, but that is neither a Designated port nor a Root port, will be in
the blocking state. A blocking port will not receive or forward data frames, nor will it
transmit BPDUs, but instead it will listen for other’s BPDUs to determine if and when
the port should consider becoming active in the spanning tree.

•

Listening
the port is still not forwarding data traffic, but is listening to BPDUs in order to
compute the spanning tree. The port is comparing its own information (path cost,
Bridge Identifier, Port Identifier) with information received from other candidates and
deciding which is best suited for inclusion in the spanning tree.

•

Learning
the port is preparing to forward data traffic. The port waits for a period of time to build
its MAC address table before actually forwarding data traffic. This time is the
forwarding delay.

•

Forwarding
After some time learning address, it is allowed to forward data frame. This is the
steady state for a switch port in the active spanning tree.

•

Disabled
When disabled, a port will neither receive nor transmit data or BPDUs. A port is in this
state because it is broken or disabled by administrator.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.2

UMN:CLI

RSTP Operation
STP or RSTP is configured on network where Loop can be created. However, RSTP is
more rapidly progressed than STP at the stage of reaching to the last topology. This section describes how the RSTP more improved than STP works. It contains the below sections.
•
•
•
•

Port States
BPDU Policy
Rapid Network Convergence
Compatibility with 802.1d.

Port States
RSTP defines port states as discarding, learning, and forwarding. Blocking of 802.1d and
listening is combined into discarding. Same as STP, root port and designated port are decided by port state. But a port in blocking state is divided into alternate port and backup
port. Alternate port means a port blocking BPDUs of priority of high numerical value from
other switches, and backup port means a port blocking BPDUs of priority of high numerical value from another port of same equipment.
Switch A
ROOT

Switch C

Switch B
Alternate
Port

Designated
Port
Path 1

Backup
Port

Path 2

Switch D

Fig. 8.14

Alternate Port and Backup port

The difference of between alternate port and backup port is that alternate port can alternate path of packet when there is a problem between Root switch and SWITCH C but
Backup port cannot provide stable connection in that case.

A50010-Y3-C150-2-7619

205

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

BPDU Policy
802.1d forwards BPDU following Hello-time installed in root switch and the other switch
except root switch its own BPDU only when receiving BPDU from root switch. However, in
802.1w not only root switch but also all the other switches forward BPDU following Hellotime. BPDU is more frequently changed than the interval root switch exchanges, but with
802.1w it becomes faster to be master of the situation of changing network.
By the way, when low BPDU is received from root switch or designated switch, it is immediately accepted. For example, suppose that root switch is disconnected to SWITCH B.
Then, SWITCH B is considered to be root because of the disconnection and forwards
BPDU.
However, SWITCH C recognizes root existing, so it transmits BPDU including information
of root to Bridge B. Thus, SWITCH B configures a port connected to SWITCH C as new
root port.

Switch A
ROOT

New Root
Port
Switch B

Low BPDU

Switch C
BPDU including
Root information

Fig. 8.15

Example of Receiving Low BPDU

Rapid Network Convergence
A new link is connected between SWITCH A and root. Root and SWITCH A is not directly
connected, but indirectly through SWITCH D. After SWITCH A is newly connected to root,
packet cannot be transmitted between the ports because state of two switches becomes
listening, and no loop is created.
In this state, if root transmits BPDU to SWITCH A, SWITCH A transmits new BPDU to
SWITCH A and SWITCH C, switch C transmits new BPDU to SWITCH D. SWITCH D,
which received BPDU from SWITCH C makes port connected to SWITCH C Blocking
state to prevent loop after new link.

206

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

ROOT
1. New link created
Switch A
2. Transmit BPDU
at listening state

Switch B

Switch C

3. Block to
prevent loop
BPDU Flow

Fig. 8.16

Switch D

Convergence of 802.1d Network

This is very an epochal way of preventing a loop. The matter is that communication is
disconnected during two times of BPDU Forward-delay till a port connected to switch D
and SWITCH C is blocked. Then, right after the connection, it is possible to transmit
BPDU although packet cannot be transmitted between switch A and root.
ROOT
1. New link created
Switch A
2. Negotiate between
Switch A and ROOT
(Traffic Blocking)

Switch B

Switch C

Switch D

Fig. 8.17

A50010-Y3-C150-2-7619

Network Convergence of 802.1w (1)

207

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

SWITCH A negotiates with root through BPDU. To make link between SWITCH A and root,
port state of non-edge designated port of SWITCH is changed to blocking. Although
SWITCH A is connected to root, loop will not be created because SWITCH A is blocked to
SWITCH Band C. In this state, BPDU form root is transmitted to SWITCH B and C
through SWITCH A. To configure forwarding state of SWITCH A, SWITCH A negotiates
with SWITCH B and SWITCH C.
ROOT
3. Forwarding
Switch A

3. Negotiate between
Switch A and Switch B
(Traffic Blocking)

3. Negotiate between
Switch A and Switch C
(Traffic Blocking)

Switch B

Switch C

Switch D

Fig. 8.18

Network Convergence of 802.1w (2)

SWITCH B has only edge-designated port. Edge designated does not cause loop, so it is
defined in 802.1w to be changed to forwarding state. Therefore, SWITCH B does not
need to block specific port to forwarding state of SWITCH A. However since SWITCH C
has a port connected to SWITCH D, you should make blocking state of the port.
ROOT

Switch A

4. Forwarding state

Switch B

4. Forwarding state

Switch C

4. Block to make Forwarding
state of Switch A
Switch D

Fig. 8.19

208

Network Convergece of 802.1w (3)

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

It is same with 802.1d to block the connection of SWITCH D and SWITCH C. However,
802.1w does not need any configured time to negotiate between switches to make forwarding state of specific port. So it is very fast progressed. During progress to forwarding
state of port, listening and learning are not needed. These negotiations use BPDU.
Compatibility with 802.1d
RSTP internally includes STP, so it has compatibility with 802.1d. Therefore, RSTP can
recognize BPDU of STP. But, STP cannot recognize BPDU of RSTP. For example, assume that SWITCH A and SWITCH B are operated as RSTP and SWITCH A is connected
to SWITCH C as designated switch. Since SWITCH C, which is 802.1d ignores RSTP
BPDU, it is interpreted that switch C is not connected to any switch or segment.
Switch A
(802.1w)

Switch B
(802.1w)

RSTP BPDU

Fig. 8.20

Switch C
(802.1d)

STP BPDU

Compatibility with 802.1d (1)

However, SWITCH A converts a port received BPDU into RSTP of 802.1d because it can
read BPDU of SWITCH C. Then SWITCH C can read BPDU of SWITCH A and accepts
SWITCH A as designated switch.

Switch A
(802.1w)

Switch B
(802.1w)

Switch C
(802.1d)

STP BPDU

Fig. 8.21

8.3.3

Compatibility with 802.1d (2)

MSTP Operation
To operate the network more effectively, the hiD 6615 S223/S323 uses MSTP (Multiple
Spanning-Tree Protocol). It constitutes the network with VLAN subdividing existing LAN
domain logically and configure the route by VLAN or VLAN group instead of existing routing protocol.

A50010-Y3-C150-2-7619

209

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Operation
Here explains how STP/MSTP differently operates on the LAN. Suppose to configure 100
of VLAN from Switch A to B, C. In case of STP, there’s only a STP on all of VLAN and it
does not provide multiple instances.
While existing STP is a protocol to prevent Loop in a LAN domain establishes STP per
VLAN in order to realize routing suitable to VLAN environment.
It does not need to calculate all STP for several VLAN so that traffic overload could be
reduced. By reducing unnecessary overload and providing multiple transmission route for
data forwarding, it realizes load balancing and provides many VLAN through Instances.
MSTP
In MSTP, VLAN is classified to groups with same Configuration ID. Configuration ID is
composed of Revision name, Region name and VLAN/Instance mapping. Therefore, to
have same configuration ID, all of these tree conditions should be the same. VLAN classified with same configuration ID is called MST region. In a region, there’s only a STP so
that it is possible to reduce the number of STP comparing to PVSTP. There’s no limitation
for region in a network environment but it is possible to generate Instances up to 64.
Therefore instances can be generated from 1 to 64. Spanning-tree which operates in
each region is IST (Internal Spanning-Tree). CST is applied by connecting each spanning-tree of region. Instance 0 means that there is not any Instance generated from
grouping VLAN, that is, it does not operate as MSTP. Therefore Instance 0 exists on all
the ports of the equipment. After starting MSTP, all the switches in CST exchanges BPDU
and CST Root is decided by comparing their BPDU. Here, the switches that don’t operate
with MSTP have instance 0 so that they can also join BPUD exchanges. The operation of
deciding CST Root is CIST (Common & Internal Spanning-Tree).
Legacy 802.1d

CST

Switch A

Region B (IST)
Legacy 802.1d

CST Root & IST Root

Switch B

Switch C
Instance 2

Instance 1
IST Root

Instance 2
Instance 3
Switch D

Fig. 8.22

210

Region A (IST)
Switch E

CST and IST of MSTP (1)

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

In CST, A and B are the switches operating with STP and C, D and, E are those operating
with MSTP. First, in CST, CIST is established to decide CST Root. After CST root is decided, the closest switch to CST root is decided as IST root of the region. Here, CST root
in IST is IST root.

Legacy 802.1d

CST

Switch A

Region B (IST)

Region C (IST)

CST Root & IST Root

Switch B

Switch C

IST Root
Instance 2

Instance 1
IST Root

Instance 2
Instance 3
Switch D
Fig. 8.23

Region A (IST)
Switch E

CST and IST of MSTP (2)

In above situation, if B operates with MSTP, B will send it’s BPDU to CST root and IST
root in order to request itself to be CST root. However, if any BPDU having higher priority
than that of B is sent, B cannot be CST root.
For the hiD 6615 S223/S323, the commands configuring MSTP are also used to configure STP and RSTP.

8.3.4

Configuring STP/RSTP/MSTP/PVSTP/PVRSTP Mode (Required)
First of all, you need to configure force-version to decide the mode before STP is configured. To decide force-version of the switch, use the following command.
Command
stp force-version {stp | rstp |
mstp | pvstp | pvrstp}

Mode
Bridge

Description
Configures Force-version in the bridge.

To delete STP configuration from the switch, use the following command.
Command
no stp force-version

A50010-Y3-C150-2-7619

Mode
Bridge

Description
Removes force-version configuration.

211

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.5

Configuring STP/RSTP/MSTP
To configure STP and RSTP, use the following steps.
Step 1
Decide STP mode using the stp force-version {stp | rstp} command.
Step 2
Activate MST daemon using the stp mst enable command.
Step 3
Configure detail options if specific commands are required.

8.3.5.1

Activating STP/RSTP/MSTP
To enable/disable STP, RSTP, and MSTP in the force-version, use the following command.
Command

Mode

stp mst {enable | disable}

Bridge

Description
Enables/disables STP, RSTP or MSTP function.

Even though STP function does not operated, loop event does not occur in a switch
which belongs to the non-dual path LAN environment.

8.3.5.2

Root Switch
To establish STP, RSTP, or MSTP function, first of all, root switch should be decided. In
STP or RSTP, it is named as root switch and in MSTP it is as IST root switch. Each switch
has its own bridge ID, and root switch on same LAN is decided by comparing their bridge
ID. However, the user can modify root switch by configuring priority for it. The switch having the lowest priority is decided as root switch.
To change root switch by configuring priority for it, use the following command.
Command

Mode

Configures the priority of the switch:

stp mst priority MSTID-RANGE
<0-61440>

no

stp

mst

RANGE

8.3.5.3

MSTID-RANGE: select instance number 0.
Bridge

priority

MSTID-

Description

0-61440: priority value in steps of 4096 (default: 32768)
Clears the Priority of the switch, enter the instance
number.

Path-cost
After deciding root switch, you need to decide to which route you will forward the packet.
To do this, the standard is path-cost.
Generally, path cost depends on transmission speed of LAN interface in the switch. The
following table shows path cost according to transmit rate of LAN interface.
You can use same commands to configure STP and RSTP, but their path-costs are totally different. Please be careful not to make mistake.

212

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Transmit Rate

Path-cost

4M

250

10M

100

100M

19

1G

4

10G

2

Tab. 8.2

STP Path-cost

Transmit Rate

Path-cost

4M

20,000,000

10M

2,000,000

100M

200,000

1G

20,000

10G

2,000

Tab. 8.3

RSTP Path-cost

When the route decided by path-cost gets overloading, you would better take another
route. Considering these situations, it is possible to configure path-cost of root port so that
user can configure route manually.
To configure path-cost, use the following command.
Command

Mode

Sets the path-cost to configure route:

stp mst path-cost

MSTID_RANGE: select instance number (0-64).

MSTID-RANGE PORTS
<1-200000000>

8.3.5.4

Description

Bridge

PORTS: select the port number.
1-200000000: enter the path cost value.

no stp mst path-cost

Deletes the configured path-cost, enter the instance

MSTID-RANGE PORTS

number and the port number.

Port-priority
When all conditions of two switches are same, the last standard to decide route is portpriority. It is also possible to configure port priority so that user can configure route manually. In order to configure port-priority, use the following command.
Command

Mode

stp mst port-priority
MSTID-RANGE PORTS <0-240>

no stp mst port-priority
MSTID-RANGE PORTS

A50010-Y3-C150-2-7619

Description
Configures port-priority.

Bridge
Disables port priority configuration.

213

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.5.5

MST Region
If MSTP is established in the hiD 6615 S223/S323, decide which MST region the switch is
going to belong to by configuring MST configuration ID. Configuration ID contains region
name, revision, VLAN map.
To set configuration ID, use the following command.
Command

Mode

Description
Designate the name for the region:
name: set the MST region name.

stp mst config-id name NAME

NAME: enter name to give the MST region.
Configure the range of VLAN that is going to be group-

stp mst config-id map <1-64>
VLAN-RANGE

ing as a region:
Bridge

1-64: select an instance ID number.
VLAN-RANGE: enter a number of the VLANs to be
mapped to the specified instance.
Configure the switches in the same MST boundary as

stp mst config-id revision <0-

same number:

65535>

i

0-65535: set the MST configuration revision number.

In case of configuring STP and RSTP, you don’t need to configure configuration ID. If it is
configured, error message is displayed.
To delete configuration ID, use the following command.
Command

Mode

Delete the entire configured configuration ID.

no stp mst config-id

Deletes the name of region, enter the MST region

no stp mst config-id name

no stp mst config-id map <1-64>

Description

name.
Bridge

Deletes entire VLAN-map or part of it, select the instance ID number and the number of the VLANs to

[VLAN-RANGE]

remove from the specified instance.
Deletes the configured revision number.

no stp mst config-id revision

After configuring configuration ID in the hiD 6615 S223/S323, you should apply the configuration to the switch. After changing or deleting the configuration, you must apply it to
the switch. If not, it does not being injected into the switch.
To apply the configuration to the switch after configuring configuration ID, use the following command.
Command
stp mst config-id commit

i

214

Mode
Bridge

Description
Commits the configuration of the region.

After deleting the configured configuration ID, apply it to the switch using the above command.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.5.6

UMN:CLI

MSTP Protocol
MSTP protocol has a backward compatibility. MSTP is compatible with STP and RSTP. If
some other bridge runs with STP mode and send BPDU version of STP or RSTP, MSTP
automatically changes to STP mode. STP mode can not be changed to MSTP mode
automatically. If administrator wants to change network topology to MSTP mode, administrator has to clear previous detected protocol manually.
To configure the protocol, use the following command.
Command
stp clear-detected-protocol
PORTS

8.3.5.7

Mode

Description
Clears detected protocol and trys administrative proto-

Bridge

col.
PORTS: select the port number.

Point-to-point MAC Parameters
The internal sub layer service makes available a pair of parameters that permit inspection
of, and control over, the administrative and operational state of the point-to-point status of
the MAC entity by the MAC relay entity.
To configure the point-to-point status, use the following command.
Command

Mode

Description
Sets point-to-point MAC:
PORTS: select the port number

stp point-to-point-mac PORTS
{auto | force-true | force-false}

Bridge

auto: auto detect
force-true: force to point-to-point MAC
force-false: force to shared MAC (not point-to point
MAC)

True means, the MAC is connected to a point-to-point LAN, i.e., there is at most one
other system attached to the LAN. False means, the MAC is connected to a non point-topoint LAN, i.e., there can be more than one other system attached to the LAN.
To delete the point-to-point configuration, use the following command.

8.3.5.8

Command

Mode

no stp point-to-point-mac PORT

Bridge

Description
Deletes point-to-point MAC configuration:
PORT: select the port number.

Edge Ports
Edge ports are used for connecting end devices. There are no switches or spanning-tree
bridges after the edge port.
To configure edge port mode, use the following command.
Command

Mode

stp edge-port PORTS

Bridge

A50010-Y3-C150-2-7619

Description
Sets port edge mode:
PORTS: select the port number.

215

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To delete the edge port mode, use the following command.
Command
no stp edge-port PORTS

8.3.5.9

Mode
Bridge

Description
Deletes port edge mode:
PORTS: select the port number.

Displaying Configuration
To display the configuration after configuring STP, RSTP, and MSTP, use the following
command.
Command

Mode

Description
Shows the configuration of STP/RSTP/MSTP.

show stp

Shows the configuration when it is configured as

show stp mst

show stp mst MSTID-RANGE

MSTP.
Shows the configuration of specific Instance, enter the
Enable
Global
Bridge

instance number.
Shows the configuration of the specific Instance for the
ports:

show stp mst MSTID-RANGE {all

MSTID_RANGE: select the MST instance number.

| PORTS} [detail]

all: select all ports.
PORTS: select port number.
detail: show detail information (as option).

i

In case STP or RSTP is configured in the SURPASS hiD 6615 S223/S323, you should
configure MSTID-RANGE as 0.
To display a configured MSTP of the switch, use the following command.
Command

show stp mst config-id {current |
pending}

216

Mode
Enable
Global
Bridge

Description
Shows the MSTP configuration identifier:
current: shows the current configuration as it is used to
run MST.
pending: shows the edited configuration.

i

For example, after the user configures configuration ID, if you apply it to the switch with
stp mst config-id commit command, you can check configuration ID with the show stp
mst config-id current command.

i

However, if the user did not use the stp mst config-id commit command in order to apply to the switch after configuration, the configuration could be checked with the show
stp mst config-id pending command.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.6

UMN:CLI

Configuring PVSTP/PVRSTP
STP and RSPT are designed with one VLAN in the network. If a port becomes blocking
state, the physical port itself is blocked. But PVSTP (Per VLAN Spanning Tree Protocol)
and PVRSTP (Per VLAN Rapid Spanning Tree Protocol) maintains spanning tree instance for each VLAN in the network. Because PVSTP treats each VLAN as a separate
network, it has the ability to load balance traffic by forwarding some VLANs on one trunk
and other VLANs. PVRSTP provides the same functionality as PVSTP with enhancement.

VLAN 3
VLAN 1
Blocking

Switch A

Switch D
Switch B
Blocking
Blocking

VLAN 2

Switch C

Fig. 8.24

8.3.6.1

Example of PVSTP

Activating PVSTP/PVRSTP
To configure PVSTP or PVRSTP, configure force-version in order to decide the mode. In
order to decide force-version, use the following command.
Command
stp pvst enable VLAN-RANGE

Mode
Bridge

Description
Activates PVSTP or PVRSTP function.
VLAN-RANGE : Vlan name

PVSTP is activated after selecting PVSTP in Force-version using the above command
and PVRSTP is activated after selecting PVRSTP using the above commands. In PVSTP
and PVRSTP, it is possible to configure only the current VLAN. If you input VLAN that
does not exist, error message is displayed.
For the switches in LAN where dual path doesn’t exist, Loop does not generate even
though STP function is not configured. To disable configured PVSTP, PVRSTP, use the
following command.
Command
stp pvst disable

A50010-Y3-C150-2-7619

Mode
Bridge

Description
Disables PVSTP or PVRSTP in VLAN.

217

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.6.2

Root Switch
In order establish PVSTP, PVRSTP function, first of all, Root switch should be decided.
Each switch has its own Bridge ID and Root switch on same LAN is decided by comparing their Bridge ID. However, the user can change Root switch by configuring Priority for it.
The switch having the lowest priority is decided as Root switch.
To change Root switch by configuring Priority for it, use the following command.
Command

Mode

stp pvst priority VLAN-RANGE
<0-61440>

Configures a priority of switch.
Bridge

no stp pvst priority

Clears a priority of switch.

VLAN-RANGE

8.3.6.3

Description

Path-cost
After deciding Root switch, you need to decide to which route you will forward the packet.
To do this, the standard is path-cost. Generally, path-cost depends on transmission speed
of LAN interface in switch. In case the route is overload based on Path-cost, it is better to
take another route.
By considering the situation, the user can configure Path-cost of Root port in order to designate the route on ones own. To configure Path-cost, use the following command.
Command

Mode

Configures path-cost to configure route

stp pvst path-cost VLAN-RANGE PORTS
<1-200000000>

Bridge

no stp pvst path-cost VLAN-RANGE PORTS

8.3.6.4

Description

on user’s own.
Clears path-cost configuration.

Port-priority
When all conditions of two switches are same, the last standard to decide route is portpriority. It is also possible to configure port priority so that user can configure route manually. To configure port priority, use the following command.
Command

Mode

stp pvst port-priority
VLAN-RANGE PORTS <0-240>

no stp pvst port-priority
VLAN-RANGE PORTS

218

Description
Configures port-priority.

Bridge
Disables port priority configuration.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.7

UMN:CLI

Root Guard
The standard STP does not allow the administrator to enforce the position of the root
bridge, as any bridge in the network with lower bridge ID will take the role of the root
bridge. Root guard feature is designed to provide a way to enforce the root bridge placement in the network. Even if the administrator sets the root bridge priority to zero in an effort to secure the root bridge position, there is still no guarantee against bridge with priority zero and a lower MAC address.

Service provider

Customer

Switch A
Root Switch

Fig. 8.25

Switch B

Root Guard
Configuration

Root Guard

Software-based bridge applications launched on PCs or other switches connected by a
customer to a service-provider network can be elected as root switches. If the priority of
bridge B is zero or any value lower than that of the root bridge, device B will be elected as
a root bridge for this VLAN. As a result, network topology could be changed. This may
lead to sub-optimal switching. But, by configuring root guard on switch A, no switches behind the port connecting to switch A can be elected as a root for the service provider’s
switch network. In which case, switch A will block the port connecting switch B.
To configure Root-Guard, use the following command.
Command

Mode

stp pvst root-guard

Configures Root Guard on PVST network.

VLAN-RANGE PORTS

stp mst root-guard
MSTID-RANGE PORTS

Description

Configures Root Guard on MST network.
Bridge

no stp pvst root-guard
VLAN-RANGE PORTS

Disables Root Guard.

no stp mst root-guard
MSTID-RANGE PORTS

8.3.8

Restarting Protocol Migration
There are two switches which configured as STP and RSTP. Usually, in this case, STP
protocol is used between two switches. But if someone configures the STP switch to
RSTP mode, what happens? Because the RSTP switch already received STP protocol
packet, the two switches still can work with STP mode even though RSTP is enabled at
both. If you enable this command, the switch checks STP protocol packet once again.

A50010-Y3-C150-2-7619

219

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To clear configured Restarting Protocol Migration, use the following command.
Command
stp clear-detected-protocol
PORTS

8.3.9

Mode
Bridge

Description
Configures restarting protocol migration function.

Bridge Protocol Data Unit Configuration
Bridge Protocol Data Unit (BPDU) is a transmission message in LAN in order to configure,
maintain the configuration for STP/RSTP/MSTP. Switches that STP is configured exchange their information BPDU to find best path. MSTP BPDU is general STP BPDU having additional MST data on it’s end. MSTP part of BPDU does not rest when it is out of
Region.

i
8.3.9.1

•

Hello Time
Hello time decides an interval time when a switch transmits BPDU. It can be configured from 1 to 10 seconds. The default is 2 seconds.

•

Max Age
Root switch transmits new information every time based on information from another
switches. However, if there are many switches on network, it takes lots of time to
transmit BPDU. And if network status is changed while transmitting BPDU, this in
formation is useless. To get rid of useless information, max age is identified in each
information.

•

Forward Delay
Switches find location of another switches connected to LAN though received BPDU
and transmit packets. Since it takes certain time to receive BPDU and find the location before transmitting packet, switches send packet at regular interval. This interval
time is named forward delay.

The configuration for BPDU is applied as selected in force-version. The same commands
are used for STP, RSTP, MSTP, PVSTP and PVRSTP.

Hello Time
Hello time decides an interval time when a switch transmits BPDU. To configure hello
time, use the following command.
Command

Mode

Description
Configures hello time to transmit the message in STP,
RSTP and MSTP:

stp mst hello-time <1-10>
Bridge

stp pvst hello-time
VLAN-RANGE <1-10>

220

1-10: set the hello time. (default: 2)
Configures hello time to transmit the message in
PVSTP and PVRSTP:
1-10: set the hello time. (default: 2)

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To clear configured hello-time, use the following command.
Command

Mode

Returns to the default hello time value of STP, RSTP

no stp mst hello-time
Bridge

8.3.9.2

Description

and MSTP.

no stp pvst hellow-time VLAN-

Returns to the default hello time value of PVSTP and

RANGE

PVRSTP.

Forward Delay
It is possible to configure forward delay, which means time to take port status from listening to forwarding. To configure forward delay, use the following command.
Command

Mode

Description
Modifies forward-delay in STP, RSTP or MSTP, enter a

stp mst forward-delay <4-30>
Bridge

delay time value. (default: 15)

stp pvst forward-delay

Modifies forward-delay in PVSTP and PVRSTP, enter a

VLAN-RANGE <4-30>

delay time value of VLAN. (default: 15)

To delete a configured forward delay, use the following command.
Command

Mode

Returns to the default value of STP, RSTP and MSTP.

no stp mst forward-delay
no stp pvst forward-delay VLAN-

Bridge

Returns to the default value of PVSTP and PVRSTP
per VLAN.

RANGE

8.3.9.3

Description

Max Age
Max age shows how long path message is valid. To configure max age to delete useless
messages, use the following command.
Command

Mode

Configures max age of route message of STP, RSTP

stp mst max-age <6-40>

or MSTP, enter a max age time value. (default: 20)
Bridge

stp pvst max-age VLAN-RANGE
<6-40>

i

Description

Configures max age of route message of PVSTP,
PVRSTP, enter a max age time value of VLAN. (default: 20)

It is recommended that max age is configured less than twice of forward delay and more
than twice of hello time.

A50010-Y3-C150-2-7619

221

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To delete a configured max age, use the following command.
Command

Mode

Returns to the default max-age value of STP, RSTP

no stp mst max-age
Bridge

8.3.9.4

Description

and MSTP.

no stp pvst max-age VLAN-

Returns to the default max-age value of PVSTP and

RANGE

PVRSTP.

BPDU Hop
In MSTP, it is possible to configure the number of hop in order to prevent BPDU from
wandering. BPDU passes the switches as the number of hop by this function.
To configure the number of hop of BPDU in MSTP, use the following command.
Command
stp mst max-hops <1-40>

Mode

Configures the number of hop for BPDU, set the numBridge

ber of possible hops in the region.
Deletes the number of hop for BPDU in MSTP.

no stp mst max-hops

8.3.9.5

Description

BPDU Filter
BPDU filtering allows you to avoid transmitting on the ports that are connected to an end
system. If the BPDU Filter feature is enabled on the port, then incoming BPDUs will be filtered and BPDUs will not be sent out of the port. To set the BPDU filter on the port, use
the following command.
Command
stp bpdu-filter {enable | disable}
PORTS

Mode

Description
Forbids all STP BPDUs to go out the specific port and

Bridge

not to recognize incoming STP BPDUs the specific
port.

By default, it is disabled. The BPDU filter-enabled port acts as if STP is disabled on the
port. This feature can be used for the ports that are usually connected to an end system
or the port that you don’t want to receive and send unwanted BPDU packets. Be cautious
about using this feature on STP enabled uplink or trunk port. If the port is removed from
VLAN membership, correspond BPDU filter will be automatically deleted.

8.3.9.6

BPDU Guard
BPDU guard has been designed to allow network designers to enforce the STP domain
borders and keep the active topology predictable. The devices behind the ports with STP
enabled are not allowed to influence the STP topology. This is achieved by disabling the
port upon receipt of BPDU. This feature prevents Denial of Service (DoS) attack on the
network by permanent STP recalculation. That is caused by the temporary introduction
and subsequent removal of STP devices with low (zero) bridge priority.

222

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure BPDU guard in the switch, perform the following procedure.
Step 1
Configure the specific port as edge-port.
Command

Mode

stp edge-port PORTS

Bridge

no stp edge-port PORTS

Description
Configures the port as Edge port.
Disables Edge port configuration.

Step 2
Configure BPDU Guard.
Command

Mode

stp bpdu-guard

Bridge

no stp bpdu-guard

Description
Configures BPDU Guard function on switch.
Disables BPDU Guard function.

However, BPDU Guard can be corrupted by unexpected cause. In this case, the edge
port is blocked immediately and remains at this state until user recovers it. To prevent this
problem, the hiD 6615 S223/S323 switch provides BPDU guard auto-recovery function.
When an edge port is down for BPDU packet which came from other switch, the port is
recovered automatically after configured time.
To configure BPDU Guard auto-recovery, use the following command.
Command

Mode

Configures BPDU Guard auto-recovery on switch.

stp bpdu-guard auto-recovery
stp bpdu-guard auto-recovery-

Configures BPDU Guard auto-recovery-time.

time <10-1000000>
no

stp

bpdu-guard

auto-

bpdu-guard

auto-

Bridge

recovery
no

stp

Description

Disables BPDU Guard auto-recovery function.

recovery-time

To recover a blocked port by manually, use the following command.
Command
stp

bpdu-guard

err-recovery

PORTS

8.3.9.7

Mode
Bridge

Description
Recovers a blocked port by manually.

Self Loop Detection
Although there is no double path in user’s equipment, loop can be caused by network environment and cable condition connected to equipment. To prevent this, the hiD 6615
S223/S323 has self loop detection to perceive that outgoing packet is got back. Through
the self loop detection, you can prevent packet, which comes back because it blocks the
port.

A50010-Y3-C150-2-7619

223

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To enable/disable self loop detection, use the following command.
Command

Mode

self-loop-detect {enable | disable}

Bridge

Description
Enables/disables self loop detection function.

To display a configuration for BPDU, use the following command.
Command

Mode

Shows status of self loop detection and a port where

show self-loop-detect

show

self-loop-detect

{all

|

Enable

loop is happed.

Global

Shows self loop detection status on specified ports:

Bridge

all: all the ports

PORTS}

8.3.9.8

Description

PORTS: selected port

Displaying BPDU Configuration
To display the configuration for BPDU, use the following command.
Command

Mode

Description

show stp mst MSTID-RANGE {all
| PORTS} [detail]

show stp mst MSTID-RANGE all
[detail]

show stp mst MSTID-RANGE
PORTS [detail]

224

Enable
Global

Shows a configuration for BPDU for STP, RSTP and
MSTP.

Bridge

show stp pvst VLAN-RANGE

Shows a configuration for BPDU for PVSTP and

[all | PORTS] [detail]

PVRSTP.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.3.10

UMN:CLI

Sample Configuration
Backup Route
When you design layer 2 network, you must consider backup route for stable STP network. This is to prevent network corruption when just one additional path exits.

Switch B
Switch C

Broken

Aggregation
Switch

Switch A

Switch D
Switch E

PC-A

Fig. 8.26

Example of Layer 2 Network Design in RSTP Environment

In ordinary case, data packets go to Root switch A through the blue path. The black arrows describe the routine path to the Aggregation Switch. And the dot lines are in blocking
state. But if there is a broken between Switch A and Switch B, the data from PC-A should
find another route at Switch D. Switch D can send the data to Switch C and Switch E. Because Switch E has shorter hop count than Switch B, the data may go through the Switch
E and A as the red line. And we can assume Switch E is also failed at the same time. In
this case, since Switch D can has the other route to Switch C, the network can be stable
than just one backup route network.

A50010-Y3-C150-2-7619

225

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

MSTP Configuration
MST Region 2
Instance 1 VLAN 170
Instance 2 VLAN 180~190
Instance 3 VLAN 191~195
Region Name : test
Revision :2

MST Region 1
Instance 1 VLAN 111~120
Instance 2 VLAN 121~130
Instance 3 VLAN 131~140
Region Name : test
Revision :1

MST Region 3
Instance 4 VLAN 150~160
Instance 5 VLAN 161~165
Region Name : sample
Revision :5

Router
MST Region 4
Instance 6 VLAN 200
Region Name : test
Revision :1

VLAN 101 ~ 200

Fig. 8.27

Example of Layer 2 Network Design in MSTP Environment

The following is an example of configuring MSTP in the switch.
SWITCH(bridge)# stp force-version mstp
SWITCH(bridge)# stp mst enable
SWITCH(bridge)# stp mst config-id map 2 1-50
SWITCH(bridge)# stp mst config-id name 1
SWITCH(bridge)# stp mst config-id revision 1
SWITCH(bridge)# stp mst config-id commit
SWITCH(bridge)# show stp mst
Status

enabled

bridge id

8000.00d0cb000183

designated root

8000.00d0cb000183

root port

0

path cost 0

max age

20.00

bridge max age

20.00

hello time

2.00

bridge hello time

2.00

forward delay

15.00

bridge forward delay

15.00

CIST regional root

8000.00d0cb000183

CIST path cost

0

max hops

20

name

TEST

revision

1

instance vlans
-------------------------------------------------------------------CIST
2

51-4094
1-50

-------------------------------------------------------------------SWITCH(bridge)#

226

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.4

UMN:CLI

Virtual Router Redundancy Protocol (VRRP)
Virtual router redundancy protocol (VRRP) is configuring Virtual router (VRRP Group)
consisted of VRRP routers to prevent network failure caused by one dedicated router.
You can configure maximum 255 VRRP routers in VRRP group of hiD 6615 S323. First of
all, decide which router plays a roll as Master Virtual Router. The other routers will be
Backup Virtual Routers. After you give priority to these backup routers, the router serves
for Master Virtual Router when there are some problems in Master Virtual router. When
you configure VRRP, configure all routers in VRRP with unified Group Id and assign unified Associated IP to them. After that, decide Master Virtual Router and Backup Virtual
Router. A router which has the highest priority is supposed to be Master and Backup Virtual Routers also get orders depending on priority.

!

Routing functionalities such as RIP, OSPF, BGP, VRRP and PIM-SM are only available for
hiD 6615 S323. (Unavailable for hiD 6615 S223)

Internet

Virtual Router
Associate IP : 10.0.0.5/24

Backup Router 1
IP : 10.0.0.1/24

Backup Router 2
IP : 10.0.0.2/24

Backup Router 3
IP : 10.0.0.3/24

Default Gateway : 10.0.0.5/24

Fig. 8.28

VRRP Operation

In case routers have same priorities, then a router, which has lower IP address, gets the
precedence. Fig. 8.28 shows an example of configuring three routers which have IP addresses, 10.0.0.1/24, 10.0.0.2/24 and 10.0.0.3/24 for each one as Virtual router by Associated IP, 10.0.0.5/24. If these three routers have same Priority, a router, which has the
smallest IP, address, 10.0.0.1/24 is decided to be Master Router. Also, switches and PCs
connected to the Virtual Router are to have IP address of Virtual Router, 10.0.0.5/24 as
default gateway.

A50010-Y3-C150-2-7619

227

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.4.1

Configuring VRRP
To configure the hiD 6615 S323 as device in Virtual Router, use the following command
on Global Configuration mode. Then you can configure VRRP by opening VRRP Configuration mode.
Command
router vrrp INTERFACE GROUPID

Mode
Global

Description
Configures Virtual Router (VRRP Group).
GROUP-ID: 1-255

To display a configuration of VRRP, use the following command.
Command

Mode
Enable

show vrrp

Global

show vrrp INTERFACE

Bridge
VRRP

Description
Shows current configuration of VRRP.
Shows current configuration of specified interface
VRRP.

To delete the VRRP configuration, use the following command.
Command
no router vrrp <1-255>

8.4.1.1

Mode
Global

Description
Configures Virtual Router (VRRP Group).
1-255: group ID

Associated IP Address
After configuring a virtual router, you need to assign an associated IP address to the virtual router. Assign unified IP address to routers in one group.
To assign an associate IP address to routers to a virtual router or delete a configured associate IP address, use the following command.
Command

Mode

Assigns an associated IP address to a virtual router.

associate A.B.C.D
no associate [A.B.C.D]

228

Description

VRRP

Deletes an assigned associated IP address from a
virtual router.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.4.1.2

UMN:CLI

Access to Associated IP Address
If you configure the function of accessing Associated IP address, you can access to Associated IP address by the commands such as ping.
To configure the function of accessing Associated IP address, use the following command.
Command
vip-access [enable | disable]

8.4.1.3

Mode
VRRP

Description
Configures the function of accessing associated IP
address.

Master Router and Backup Router
The hiD 6615 S323 can be configured as Master Router and Backup Router by comparing Priority and IP address of devices in Virtual Router. First of all, it compares Priority. A
device, which has higher Priority, is to be higher precedence. And when devices have
same Priority, then it compares IP address. A device, which has lower IP address, is to be
higher precedence. If a problem occurs on Master Router and there are more than two
routers, one of them is selected as new Master Router according to their precedence.
To configure Priority of Virtual Router or delete the configuration, use the following commands.
Command
vr-priority <1-254>

Mode
VRRP

no vr-priority

i

Description
Configures Priority of Virtual Router.
Deletes configured Priority of Virtual Router.

Priority of Virtual Backup Router can be configured from 1 to 254.
To set VRRP timers or delete the configuration, use the following command.
Command
vr-timers advertisement <1-10>
no vr-timers advertisement

A50010-Y3-C150-2-7619

Mode

Description
Sets VRRP timers.

VRRP

1-10: advertisement time in the unit of second
Clears a configured VRRP time.

229

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is an example of configuring Master Router and Backup Router by comparing their Priorities: Virtual Routers, Layer 3 SWITCH 1 – 101 and Layer 3 SWITCH 2 –
102. Then, regardless of IP addresses, one that has higher Priority, Layer 3 SWITCH 2
becomes Master Router.

SWTICH1(config)# router vrrp default 1
SWITCH1(config-router)# associate 10.0.0.5
SWITCH1(config-router)# vr-priority 101
SWITCH1(config-router)# exit
SWITCH1(config)# show vrrp
default - virtual router 1
---------------------------------------------state

backup

virtual mac address

00:00:5E:00:01:01

advertisement interval

1 sec

preemption

enabled

priority

101

master down interval

3.624 sec

[1] associate address : 10.0.0.5



SWITCH 2 with higher priority
is configured as Master.

SWTICH2(config)# router vrrp default 1
SWITCH2(config-router)# associate 10.0.0.5
SWITCH1(config-router)# vr-priority 102
SWITCH2(config-router)# exit
SWITCH2(config)# show vrrp
default - virtual router 1
---------------------------------------------state
virtual mac address
advertisement interval

master
00:00:5E:00:01:01
1 sec

preemption

enabled

priority

102

master down interval

3.620 sec

[1] associate address : 10.0.0.5

By default, Priority of the hiD 6615 S323 is configured as “100”. So, unless you configure
specific Priority, this switch becomes Master Router because a device, which has lower IP
address, has higher precedence.
Also, when there are more than two Backup Routers, IP addresses are compared to decide order. The following is an example of configuring Master Router and Backup Router
by comparing IP addresses: Virtual Routers, Layer 3 SWITCH 1 – 10.0.0.1 and Layer 3
SWITCH 2 – 10.0.0.2.

230

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI


SWTICH1(config)# router vrrp default 1
SWITCH1(config-router)# associate 10.0.0.5
SWITCH1(config-router)# exit
SWITCH1(config)# show vrrp
default - virtual router 1
---------------------------------------------state

master

virtual mac address

00:00:5E:00:01:01

advertisement interval

1 sec

preemption

enabled

priority

100

master down interval

3.624 sec

[1] associate address : 10.0.0.5


SWTICH2(config)# router vrrp default 1

In case of same priorities,
SWITCH 1 with lower IP address is configured as Master.

SWITCH2(config-router)# associate 10.0.0.5
SWITCH2(config-router)# exit
SWITCH2(config)# show vrrp
default - virtual router 1
---------------------------------------------state
virtual mac address
advertisement interval

backup
00:00:5E:00:01:01
1 sec

preemption

enabled

priority

100

master down interval
3.620 sec
[1] associate address : 10.0.0.5

8.4.1.4

VRRP Track Function
When the link connected to Master Router of VRRP is off as below, if link of Master
Router is not recognized, the users on the interface are not able to communicate because
the interface is not able to access to Master Router.
In the condition that Link to VRRP's master router is down as the figure shown below, or
the link of Master Router cannot be recognized, the communication would be impossible.
For the hiD 6615 S323, you can configure Master Router to be changed by giving lower
Priority to Master Router when the link of Mater Router is disconnected. This function is
VRRP Track.

A50010-Y3-C150-2-7619

231

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Internet

Virtual Router
Associate IP : 10.0.0.5/24

Master Router 1
IP : 10.0.0.3/24

Backup Router 1
IP : 10.0.0.2/24

Backup Router 2
IP : 10.0.0.1/24

1. Link Down

2. If the interface doesn’t recognize to
be Link down, it is supposed to be
inaccessible to Master Router.
Therefore the users on the interface
are not able to communicate.

Default Gateway : 10.0.0.5/24

Counter
measure

3. If “Link down” happens, by giving low
priority automatically to Master Router,
Master Router will be changed at the
same time with Link down.

Fig. 8.29

VRRP Track

To configure VRRP Track, use the following command.
Command
track interface INTERFACE priority <1-254>

Mode
VRRP

Description
Configures VRRP Track. The Priority becomes lower
as the configured value.

To release VRRP Track configuration, use the following command.
Command
no track interface INTERFACE

8.4.1.5

Mode
VRRP

Description
Disables VRRP Track configuration.

Authentication Password
If anyone knows Group ID and Associated IP address, he can configure another device
as a Virtual Router. To prevent this, user needs to configure a password, named authentication password that can be used only in Virtual Router user configured.

232

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure an authentication password for security of Virtual Router, use the following
command on VRRP configuration mode.
Command

Mode

authentication clear_text
PASSWORD

VRRP

Configures an authentication password.
Deletes a configured authentication password.

no authentication

i

Description

Authentication password can be configured with maximum 7 digits.
The following is an example of configuring Authentication password in Virtual Router as
network and showing it.
SWITCH(config-vrrp)# authentication clear_text network
SWITCH(config-vrrp)# show running-config
Building configuration...
(Omitted)
vrrp default 1
authentication clear_text network
associate 10.0.0.5
no snmp
SWITCH(config-vrrp)#

8.4.1.6

Preempt
Preempt is a function that an added device with the highest Priority user gave is automatically configured as Master Router without rebooting or specific configuration when
you add an other device after Virtual Router is configured.
To configure Preempt, use the following command on VRRP configuration mode.
Command
preempt {enable | disable}

Mode
VRRP

Description
Enables or disables Preempt. (default: enable)

The following is an example of disabling Preempt.
SWITCH(config-vrrp)# preempt disable
SWITCH(config-vrrp)# exit
SWITCH(config)# show vrrp
default - virtual router 1
---------------------------------------------state
virtual mac address
advertisement interval

master
00:00:5E:00:01:01
1 sec

preemption

disabled

priority

100

master down interval
3.624 sec
[1] associate address : 10.0.0.5
SWITCH(config)#

A50010-Y3-C150-2-7619

233

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Also, to make Preempt “enable” as default setting, use the following command on VRRP
configuration mode.
Command
no preempt

8.4.1.7

Mode
VRRP

Description
Deletes the former configuration of Preempt to enable
it.

VRRP Statistics
To display the VRRP statistics that packets have been sent and received, use the following command.
Command

Mode

Description

Enable

show vrrp stat

Global
Bridge

Shows statistics of packets in Virtual Router Group.

VRRP

The following is an example of viewing statistics of packets in Virtual Router Group.
SWITCH(config)# show vrrp stat
VRRP statistics :
VRRP packets rcvd with invalid TTL

0

VRRP packets rcvd with invalid version

0

VRRP packets rcvd with invalid VRID

0

VRRP packets rcvd with invalid size

0

VRRP packets rcvd with invalid checksum

0

VRRP packets rcvd with invalid auth-type
VRRP packets rcvd with interval mismatch

0
0

SWITCH(config)#

To clear the VRRP statistics information, use the following command.
Command

Mode

Description

Enable

clear vrrp stat

Global
Bridge

Clears statistics of packets in Virtual Router Group.

VRRP

8.5

Rate Limit
User can customize port bandwidth according to user’s environment. By this configuration,
you can prevent a certain port to monopolize whole bandwidth so that all ports can use
bandwidth equally. Egress and ingress can be configured both to be same and to be different.
The hiD 6615 S223/S323 can apply the rate limit and support ingress policing and egress
shaping.

234

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.5.1

UMN:CLI

Configuring Rate Limit
To set a port bandwidth, use the following command.
Command

Mode

Description
Sets port bandwidth. If you input egress or ingress, you

rate PORTS RATE [egress | in-

can configure outgoing packet or incoming packet. The

gress]

unit is 64 Kbps.
Bridge

no rate PORTS

Clears rate configuration of a specific port.
Clears rate configuration of a specific port by transmit-

no rate PORTS [egress | ingress]

ting direction.

Unless you input neither egress nor ingress, they are configured to be same. To switch,
egress is incoming packet. To display the configured bandwidth, use the following command.
Command

Mode
Global

show rate

8.5.2

Description
Shows the configured bandwidth.

Sample Configuration
The following is an example of showing the configuration after setting the bandwidth of
64Mbps to port number 1 and 128Mbps to the port number 2.
SWTICH(bridge)# rate 1 64
SWTICH(bridge)# rate 2 128
SWTICH(bridge)# show rate
unit : kbps E : Enhanced
-----------------------------------------------------------------------------Port |

Ingress

|

Egress

| Port |

Ingress

|

Egress

------------------------------------------+----------------------------------1

|

64

|

|

2

|

128

|

128

3

|

N/A

|

N/A

64

|

4

|

N/A

|

N/A

5

|

N/A

|

N/A

|

6

|

N/A

|

N/A

7

|

N/A

|

N/A

|

8

|

N/A

|

N/A

SWTICH(bridge)#

A50010-Y3-C150-2-7619

235

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.6

Flood Guard
Flood-guard limits number of packets, how many packets can be transmitted, in configured bandwidth, whereas Rate limit controls packets through configuring width of bandwidth, which packets pass through. This function prevents receiving packets more than
configured amount without enlarging bandwidth.




Configure Rate Limit on port

Configure Flood-guard to
allow packets as many as ‘n’
per a second
1
2
3

Control
bandwidth

:

:

‘n’ packets
allowed for
a second

n
n+1
n+2

Packets
over thrown
away

Bandwidth

Fig. 8.30

8.6.1

Rate Limit and Flood Guard

Configuring Flood-Guard
To configure the number of packets, which can be transmitted in a second, use the following command.
Command
mac-flood-guard

PORTS

Mode
<1-

2000000>

Description
Limits the number of packets which can be transmitted

Bridge

to the port for 1 second.
Clears the configured Flood Guard.

no mac-flood-guard PORTS

To display a configuration of flood guard, use the following command.
Command
show mac-flood-guard [macs]

236

Mode
Bridge

Description
Shows the configured Flood Guard.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.6.2

UMN:CLI

Sample Configuration
The following is an example of showing the configuration after limiting the number of
packets transmitted to the port number 1 as 10,000.
SWITCH(bridge)# mac-flood-guard 1 10000
SWITCH(bridge)# show mac-flood-guard
--------------------------------Port Rate(fps) | Port Rate(fps)
----------------+---------------1

10000

|

2

Unlimited

3

Unlimited |

4

Unlimited

5

Unlimited |

6

Unlimited

7

Unlimited |

8

Unlimited

9

Unlimited |

10

Unlimited

11

Unlimited |

12

Unlimited

13

Unlimited |

14

Unlimited

15 Unlimited |
(Omitted)

16

Unlimited

SWITCH(bridge)#

8.7

Bandwidth
Routing protocol uses bandwidth information to measure routing distance value. To configure bandwidth of interface, use the following command.
Command
bandwidth BANDWIDTH

i

Mode
Interface

Description
Configures bandwidth of interface, enter the value of
bandwidth.

The bandwidth can be from 1 to 10,000,000 Kbits. This bandwidth is for routing information implement and it does not concern physical bandwidth.
To delete a configured bandwidth, use the following command.
Command
no bandwidth BANDWIDTH

Mode
Interface

Description
Deletes configured bandwidth of interface, enter the
value.

The following is an example of configuration to bandwidth as 1000.
SWITCH(config-if)# bandwidth 1000
SWITCH(config-if)# show running-config interface 1
!
interface default
bandwidth 1m
ip address 10.27.41.181/24
!
SWITCH(config-if)#

A50010-Y3-C150-2-7619

237

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8

Dynamic Host Configuration Protocol (DHCP)
Dynamic host configuration protocol (DHCP) is a TCP/IP standard for simplifying the administrative management of IP address configuration by automating address configuration for network clients. The DHCP standard provides for the use of DHCP servers as a
way to manage dynamic allocation of IP addresses and other related configuration details
to DHCP-enabled clients on the network.
Every device on a TCP/IP network must have a unique IP address in order to access the
network and its resources. The IP address (together with its related subnet mask) identifies both the host computer and the subnet to which it is attached. When you move a
computer to a different subnet, the IP address must be changed. DHCP allows you to dynamically assign an IP address to a client from a DHCP server IP address database on
the local network.
The DHCP provides the following benefits:
Saving Cost
Numerous users can access the IP network with a small amount of IP resources in the
environment that most users do not have to access the IP network at the same time all
day long. This allows the network administrators to save the cost and IP resources.
Efficient IP Management
By deploying DHCP in a network, this entire process is automated and centrally managed.
The DHCP server maintains a pool of IP addresses and leases an address to any DHCPenabled client when it logs on to the network. Because the IP addresses are dynamic
(leased) rather than static (permanently assigned), addresses no longer in use are automatically returned to the pool for reallocation.

IP Packet
(Broadcast)

DHCP Server or Relay Agent

DHCP Packet
(Unicast)

Subnet

※ PC=DHCP Client
Fig. 8.31

238

DHCP Service Structure

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The hiD 6615 S223/S323 flexibly provides the functions as the DHCP server or DHCP relay agent according to your DHCP configuration.
This chapter contains the following sections:
DHCP Server
DHCP Address Allocation with Option 82
DHCP Lease Database
DHCP Relay Agent
DHCP Option 82
DHCP Client
DHCP Snooping
IP Source Guard
DHCP Filtering
Debugging DHCP

•
•
•
•
•
•
•
•
•
•

8.8.1

DHCP Server
This section describes the following DHCP server related features and configurations:
DHCP Pool Creation
DHCP Subnet
Range of IP Address
Default Gateway
IP Lease Time
DNS Server
Manual Binding
Domain Name
DHCP Server Option
Static Mapping
Recognition of DHCP Client
IP Address Validation
Authorized ARP
Prohibition of 1:N IP Address Assignment
Ignoring BOOTP Request
DHCP Packet Statistics
Displaying DHCP Pool Configuration

•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

To activate/deactivate the DHCP function in the system, use the following command.
Command
service dhcp
no service dhcp

i

Mode
Global

Description
Activates the DHCP function in the system.
Deactivates the DHCP function in the system.

Before configuring DHCP server or relay, you need to use the service dhcp command
first to activate the DHCP function in the system.

A50010-Y3-C150-2-7619

239

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.1.1

DHCP Pool Creation
The DHCP pool is a group of IP addresses that will be assigned to DHCP clients by
DHCP server. You can create various DHCP pools that can be configured with a different
network, default gateway and range of IP addresses. This allows the network administrators to effectively handle multiple DHCP environments.
To create a DHCP pool, use the following command.
Command
ip dhcp pool POOL

Mode

Description
Creates a DHCP pool and opens DHCP Pool Configu-

Global

ration mode.
Deletes a created DHCP pool.

no ip dhcp pool POOL

The following is an example of creating the DHCP pool as sample.
SWITCH(config)# service dhcp
SWITCH(config)# ip dhcp pool sample
SWITCH(config-dhcp[sample])#

8.8.1.2

DHCP Subnet
To specify a subnet of the DHCP pool, use the following command.
Command
network A.B.C.D/M

Mode

Description
Specifies a subnet of the DHCP pool.

DHCP Pool

A.B.C.D/M: network address
Deletes a specified subnet.

no network A.B.C.D/M

The following is an example of specifying the subnet as 100.1.1.0/24.
SWITCH(config)# service dhcp
SWITCH(config)# ip dhcp pool sample
SWITCH(config-dhcp[sample])# network 100.1.1.0/24
SWITCH(config-dhcp[sample])#

i
8.8.1.3

You can also specify several subnets in a single DHCP pool.

Range of IP Address
To specify a range of IP addresses that will be assigned to DHCP clients, use the following command.
Command
range A.B.C.D A.B.C.D
no range A.B.C.D A.B.C.D

240

Mode

Description
Specifies a range of IP addresses.

DHCP Pool

A.B.C.D: start/end IP address
Deletes a specified range of IP addresses.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The following is an example for specifying the range of IP addresses.
SWITCH(config)# service dhcp
SWITCH(config)# ip dhcp pool sample
SWITCH(config-dhcp[sample])# network 100.1.1.0/24
SWITCH(config-dhcp[sample])# default-router 100.1.1.254
SWITCH(config-dhcp[sample])# range 100.1.1.1 100.1.1.100
SWITCH(config-dhcp[sample])#

i

You can also specify several inconsecutive ranges of IP addresses in a single DHCP pool,
e.g. 100.1.1.1 to 100.1.1.62 and 100.1.1.129 to 100.1.1.190.

!

When specifying a range of IP address, the start IP address must be prior to the end IP
address.

8.8.1.4

Default Gateway
To specify a default gateway of the DHCP pool, use the following command.
Command

Mode

Description

default-router A.B.C.D1

Specifies a default gateway of the DHCP pool.

[A.B.C.D2] … [A.B.C.D8]

A.B.C.D: default gateway IP address

no default-router A.B.C.D1

DHCP Pool

[A.B.C.D2] … [A.B.C.D8]

no default-router all

Deletes a specified default gateway.
Deletes all the specified default gateways.

The following is an example of specifying the default gateway 100.1.1.254.
SWITCH(config)# service dhcp
SWITCH(config)# ip dhcp pool sample
SWITCH(config-dhcp[sample])# network 100.1.1.0/24
SWITCH(config-dhcp[sample])# default-router 100.1.1.254
SWITCH(config-dhcp[sample])#

8.8.1.5

IP Lease Time
Basically, the DHCP server leases an IP address in the DHCP pool to DHCP clients,
which will be automatically returned to the DHCP pool when it is no longer in use or expired by IP lease time.
To specify IP lease time, use the following command.
Command

Mode

Sets default IP lease time in the unit of

lease-time default <120-2147483637>
lease-time max <120-2147483637>
no lease-time {default | max}

A50010-Y3-C150-2-7619

Description

second. (default: 3600)
DHCP Pool

Sets maximum IP lease time in the unit
of second. (default: 3600)
Deletes specified IP lease time.

241

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is an example of setting default and maximum IP lease time.
SWITCH(config)# service dhcp
SWITCH(config)# ip dhcp pool sample
SWITCH(config-dhcp[sample])# network 100.1.1.0/24
SWITCH(config-dhcp[sample])# default-router 100.1.1.254
SWITCH(config-dhcp[sample])# range 100.1.1.1 100.1.1.100
SWITCH(config-dhcp[sample])# lease-time default 5000
SWITCH(config-dhcp[sample])# lease-time max 10000
SWITCH(config-dhcp[sample])#

8.8.1.6

DNS Server
To specify a DNS server to inform DHCP clients, use the following command.
Command

Mode

Specifies a DNS server. Up to 8 DNS servers are pos-

dns-server A.B.C.D1

sible.

[A.B.C.D2] … [A.B.C.D8]

no dns-server A.B.C.D1

Description

A.B.C.D: DNS server IP address
DHCP Pool
Deletes a specified DNS server.

[A.B.C.D2] … [A.B.C.D8]

Deletes all the specified DNS servers.

no dns-server all

The following is an example of specifying a DNS server.
SWITCH(config)# service dhcp
SWITCH(config)# ip dhcp pool sample
SWITCH(config-dhcp[sample])# network 100.1.1.0/24
SWITCH(config-dhcp[sample])# default-router 100.1.1.254
SWITCH(config-dhcp[sample])# range 100.1.1.1 100.1.1.100
SWITCH(config-dhcp[sample])# lease-time default 5000
SWITCH(config-dhcp[sample])# lease-time max 10000
SWITCH(config-dhcp[sample])# dns-server 200.1.1.1 200.1.1.2 200.1.1.3
SWITCH(config-dhcp[sample])#

i
8.8.1.7

If you want to specify a DNS server for all the DHCP pools, use the dns server command.
For more information, see Section 6.1.9.

Manual Binding
To manually assign a static IP address to a DHCP client who has a specified MAC address, use the following command.
Command

Mode

Assigns a static IP address to a DHCP client.

fixed-address A.B.C.D
MAC-ADDRESS

no fixed-address A.B.C.D

242

Description

DHCP Pool

A.B.C.D: static IP address
MAC-ADDRESS: MAC address
Deletes a specified static IP assignment.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.1.8

UMN:CLI

Domain Name
To set a domain name, use the following command.
Command
domain-name DOMAIN

Mode
DHCP Pool

no domain-name

8.8.1.9

Description
Sets a domain name.
Deletes a specified domain name.

DHCP Server Option
If a DHCP server option is specified, the DHCP server will respond only to DHCP messages that carry the same option information.
To specify a DHCP server option, use the following command.
Command

Mode

Specifies a DHCP option.

option <1-254> [<1-8>]
{ip A.B.C.D | hex HEXSTRING |

text STRING}

1-254: DHCP option code
DHCP Pool

8.8.1.10

1-8: instance number of the option code
ip | hex | text: DHCP option information

no option <1-254> [<1-8>]

!

Description

Deletes a specified DHCP option.

The already-defined DHCP option codes or the DHCP option codes only for the DHCP
client cannot be specified with this command, e.g. option 82.

Static Mapping
The hiD 6615 S223/S323 provides a static mapping function that enables to assign a
static IP address without manually specifying static IP assignment by using a DHCP lease
database in the DHCP database agent.
To perform a static mapping, use the following command.
Command

Mode

Description
Performs a static mapping.

origin file A.B.C.D FILE

DHCP Pool

no origin file

i
8.8.1.11

A.B.C.D: DHCP database agent address
FILE: file name of DHCP lease database
Cancels a static mapping.

For more information of the file naming of a DHCP lease database, see Section 8.8.3.1.

Recognition of DHCP Client
Normally, a DHCP server recognizes DHCP clients with a client ID. However, some
DHCP clients may not have their own client ID. In this case, you can select the recognition method as a hardware address instead of a client ID.

A50010-Y3-C150-2-7619

243

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To select a recognition method of DHCP clients, use the following command.
Command
ip dhcp database-key {client-id |
hardware-address}

8.8.1.12

Mode
Global

Description
Selects a recognition method of DHCP clients

IP Address Validation
Before assigning an IP address to a DHCP client, a DHCP server will validate if the IP
address is used by another DHCP client with a ping or ARP. If the IP address does not respond to a requested ping or ARP, the DHCP server will realize that the IP address is not
used then will assign the IP address to the DHCP client.
To select an IP address validation method, use the following command.
Command
ip dhcp validate {arp | ping}

Mode
Global

Description
Selects an IP address validation method.

You can also set a validation value of how many responses and how long waiting (timeout) for the responses from an IP address for a requested ping or ARP when a DHCP
server validates an IP address.
To set a validation value of how many responses from an IP address for a requested ping
or ARP, use the following command.
Command
ip dhcp {arp | ping} packet <020>

Mode
Global

Description
Sets a validation value of how many responses.
0-20: response value (default: 2)

To set a validation value of timeout for the responses from an IP address for a requested
ping or ARP, use the following command.
Command
ip dhcp {arp | ping} timeout
<100-5000>

8.8.1.13

Mode

Description
Sets a validation value of timeout for the responses in

Global

the unit of millisecond.
100-5000: timeout value (default: 500)

Authorized ARP
The authorized ARP is to limit the leasing of IP addresses to authorized users. This function strengthens security by blocking ARP responses from unauthorized users at the
DHCP server.
To disacrd an ARP response from unauthorized user, use the following command.
Command

Mode

ip dhcp authorized-arp <1202147483637>

no ip dhcp authorized-arp

244

Description
Discards an ARP response from unauthorized user.

Global

120-2147483637: starting time (multiples of 30)
Disables the authorized ARP function.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To display a list of valid or invalid (blocked) IP addresses, use the following command.
Command
show ip dhcp authorized-arp
valid

Mode

Description

Enable

Shows a list of valid IP addresses.

Global

show ip dhcp authorized-arp

Bridge

invalid

Shows a list of invalid (discarded) IP addresses.

To delete a list of invalid (blocked) IP addresses, use the following command.
Command

Mode

clear ip dhcp authorized-arp
invalid

8.8.1.14

Description

Enable
Global

Deletes a list of invalid (discarded) IP addresses.

Bridge

Prohibition of 1:N IP Address Assignment
The DHCP server may assign plural IP addresses to a single DHCP client in case of plural DHCP requests from the DHCP client which has the same hardware address. Some
network devices may need plural IP addresses, but most DHCP clients like personal
computers need only a single IP address. In this case, you can configure the hiD 6615
S223/S323 to prohibit assigning plural IP addresses to a single DHCP client.
To prohibit assigning plural IP addresses to a DHCP client, use the following command.
Command

Mode

ip dhcp check client-hardwareaddress
no

ip

Prohibits assigning plural IP addresses.
Global

dhcp

check

client-

Permits assigning plural IP addresses.

hardware-address

8.8.1.15

Description

Ignoring BOOTP Request
To allow a DHCP server to ignore received bootstrap protocol (BOOTP) request packets,
use the following command.
Command
ip dhcp bootp ignore

Mode
Global

no ip dhcp bootp ignore

8.8.1.16

Description
Ignores BOOTP request packets.
Permits BOOTP request packets.

DHCP Packet Statistics
To display DHCP packet statistics of the DHCP server, use the following command.
Command
show ip dhcp server statistics

Mode
Enable
Global

clear ip dhcp statistics

A50010-Y3-C150-2-7619

Bridge

Description
Shows DHCP packet statistics.
Deletes collected DHCP packet statistics.

245

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following is an example of displaying DHCP packet statistics.
SWITCH(config)# show ip dhcp server statistics
===========================================
Message

Recieved/Error(0/0)

------------------------------------------DHCP DISCOVER

0

DHCP REQUEST

0

DHCP DECLINE

0

DHCP RELEASE
DHCP INFORM

0
0

=========================================
Message

Sent/Error(0/0)

----------------------------------------DHCP OFFER

0

DHCP ACK
DHCP NAK

0
0

SWITCH(config)#

8.8.1.17

Displaying DHCP Pool Configuration
To display a DHCP pool configuration, use the following command.
Command

Mode

Description

show ip dhcp pool [POOL]

Enable

Shows a DHCP pool configuration.

show ip dhcp pool summary

Global

Shows a summary of a DHCP pool configuration.

[POOL]

Bridge

POOL: pool name

The following is an example of displaying a DHCP pool configuration.
SWITCH(config)# show ip dhcp pool summary
[Total -- 1 Pools]
Total

0

0.00 of total

Available 0

0.00 of total

Abandon

0

0.00 of total

Bound

0

0.00 of total

Offered
Fixed

0
0

0.00 of total
0.00 of total

[sample]
Total

0

0.00% of the pool

0.00 of total

Available 0

0.00% of the pool

0.00 of total

Abandon

0

0.00% of the pool

0.00 of total

Bound

0

0.00% of the pool

0.00 of total

Offered
Fixed

0
0

0.00% of the pool
0.00% of the pool

0.00 of total
0.00 of total

SWITCH(config)#

246

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.2

UMN:CLI

DHCP Address Allocation with Option 82
The DHCP server provided by the hiD 6615 S223/S323 can assign dynamic IP addresses
based on DHCP option 82 information sent by the DHCP relay agent.
The information sent via DHCP option 82 will be used to identify which port the
DHCP_REQUEST came in on. The feature introduces a new DHCP class capability,
which is a method to group DHCP clients based on some shared characteristics other
than the subnet in which the clients reside. The DHCP class can be configured with option 82 information and a range of IP addresses.

8.8.2.1

DHCP Class Capability
To enable the DHCP server to use a DHCP class to assign IP addresses, use the following command.
Command

Mode

Enables the DHCP server to use a DHCP class to

ip dhcp use class

Global

assign IP addresses.
Disables the DHCP server to use a DHCP class.

no ip dhcp use class

8.8.2.2

Description

DHCP Class Creation
To create a DHCP class, use the following command.
Command

Mode

Description
Creates a DHCP class and opens DHCP Class Con-

ip dhcp class CLASS

Global

no ip dhcp class [CLASS]

8.8.2.3

figuration mode.
CLASS: DHCP class name
Deletes a created DHCP class.

Relay Agent Information Pattern
To specify option 82 information for IP assignment, use the following command.
Command

Mode

Description

DHCP

Specifies option 82 information for IP

Class

assignment.

relay-information remote-id ip A.B.C.D [circuitid {hex HEXSTRING | index <0-65535> | text
STRING}]

relay-information remote-id hex HEXSTRING
[circuit-id {hex HEXSTRING | index <0-65535> |

text STRING}]
relay-information remote-id text STRING [circuit-id {hex HEXSTRING | index <0-65535> |
text STRING}]

A50010-Y3-C150-2-7619

247

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To delete specified option 82 information for IP assignment, use the following command.
Command

Mode

Description

DHCP

Deletes specified option 82 information

Class

for IP assignment.

no relay-information remote-id ip A.B.C.D [circuit-id {hex HEXSTRING | index <0-65535> |
text STRING}]
no

relay-information

remote-id

hex

HEX-

STRING [circuit-id {hex HEXSTRING | index <065535> | text STRING}]

no relay-information remote-id text STRING
[circuit-id {hex HEXSTRING | index <0-65535> |

text STRING}]

To delete specified option 82 information for IP assignment, use the following command.
Command

Mode

Deletes all specified option 82 informa-

no relay-information remote-id all

DHCP

tion that contains only a remote ID.

Class

Deletes all specified option 82 informa-

no relay-information all

8.8.2.4

Description

tion.

Associating DHCP Class
To associate a DHCP class with a current DHCP pool, use the following command.
Command

Mode

Description
Associates a DHCP class with a DHCP pool and opens
DHCP Pool Class Configuration mode.

class CLASS
DHCP Pool

Releases an associated DHCP class from a current

no class [CLASS]

8.8.2.5

CLASS: DHCP class name

DHCP pool.

Range of IP Address for DHCP Class
To specify a range of IP addresses for a DHCP class, use the following command.
Command
address range A.B.C.D A.B.C.D
no address range A.B.C.D
A.B.C.D

!

248

Mode

Description
Specifies a range of IP addresses.

DHCP Pool
Class

A.B.C.D: start/end IP address
Deletes a specified range of IP addresses.

A range of IP addresses specified with the address range command is valid only for a
current DHCP pool. Even if you associate the DHCP class with another DHCP pool, the
specified range of IP addresses will not be applicable.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.3

8.8.3.1

UMN:CLI

DHCP Lease Database

DHCP Database Agent
The hiD 6615 S223/S323 provides a feature that allows to a DHCP server automatically
saves a DHCP lease database on a DHCP database agent.
The DHCP database agent should be a TFTP server, which stores a DHCP lease database as numerous files in the form of leasedb.MAC-ADDRESS, e.g. leasedb.0A:31:4B:1
A:77:6A. The DHCP lease database contains a leased IP address, hardware address, etc.
To specify a DHCP database agent and enable an automatic DHCP lease database backup, use the following command.
Command

Mode

Description
Specifies a DHCP database agent and back-up interval.

ip dhcp database A.B.C.D INGlobal

TERVAL

A.B.C.D: DHCP database agent address
INTERVAL: 120-2147483637 (unit: second)
Deletes a specified DHCP database agent.

no ip dhcp database

i

Upon entering the ip dhcp database command, the back-up interval will begin.
To display a configuration of the DHCP database agent, use the following command.
Command

Mode

Description

Enable

show ip dhcp database

Global

Shows a configuration of the DHCP database agent.

Bridge

8.8.3.2

Displaying DHCP Lease Status
To display current DHCP lease status, use the following command.
Command

Mode

Description

show ip dhcp lease {all | bound |

Shows current DHCP lease status.

abandon | offer | fixed | free}

all: all IP addresses

[POOL]

Enable
Global

show ip dhcp lease detail
[A.B.C.D]

Bridge

bound: assigned IP address
abandon: illegally assigned IP address
offer: IP address being ready to be assigned
fixed: manually assigned IP address
free: remaining IP address
POOL: pool name

A50010-Y3-C150-2-7619

249

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.3.3

Deleting DHCP Lease Database
To delete a DHCP lease database, use the following command.
Command

Mode

Deletes a DHCP lease database a specified subnet.

clear ip dhcp leasedb A.B.C.D/M
clear ip dhcp leasedb pool

Enable

Deletes a DHCP lease database of a specified DHCP

POOL

Global

pool.
Deletes the entire DHCP lease database.

clear ip dhcp leasedb all

8.8.4

Description

DHCP Relay Agent
A DHCP relay agent is any host that forwards DHCP packets between clients and servers.
The DHCP relay agents are used to forward DHCP requests and replies between clients
and servers when they are not on the same physical subnet. The DHCP relay agent forwarding is distinct from the normal forwarding of an IP router, where IP datagrams are
switched between networks somewhat transparently.
By contrast, DHCP relay agents receive DHCP messages and then generate a new
DHCP message to send out on another interface. The DHCP relay agent sets the gateway address and, if configured, adds the DHCP option 82 information in the packet and
forwards it to the DHCP server. The reply from the server is forwarded back to the client
after removing the DHCP option 82 information.
DHCP Server

Relay Agent 1

Relay Agent 2

Subnet 1

Subnet 2

*PC= DHCP Client

Fig. 8.32

Example of DHCP Relay Agent

To activate/deactivate the DHCP function in the system, use the following command.
Command
service dhcp
no service dhcp

250

Mode
Global

Description
Activates the DHCP function in the system.
Deactivates the DHCP function in the system.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

i
8.8.4.1

UMN:CLI

Before configuring DHCP server or relay, you need to use the service dhcp command
first to activate the DHCP function in the system.

Packet Forwarding Address
A DHCP client sends DHCP_DISCOVER message to a DHCP server. DHCP_DISCOVER
message is broadcasted within the network to which it is attached. If the client is on a
network that does not have any DHCP server, the broadcast is not forwarded because
the switch is configured to not forward broadcast traffic. To solve this problem, you can
configure the interface that is receiving the broadcasts to forward certain classes of
broadcast to a helper address.
To specify a packet forwarding address, use the following command.
Command

Mode

Description
Specifies a packet forwarding address. More than one
address is possible.

ip dhcp helper-address A.B.C.D
Interface

no ip dhcp helper-address

Deletes a specified packet forwarding address.

{A.B.C.D | all}

i

A.B.C.D: DHCP server address

If a packet forwarding address is specified on an interface, the hiD 6615 S223/S323 will
enable a DHCP relay agent.
You can also specify an organizationally unique identifier (OUI) when configuring a packet
forwarding address. The OUI is a 24-bit number assigned to a company or organization
for use in various network hardware products which is a first 24 bits of a MAC address. If
an OUI is specified, a DHCP relay agent will forward DHCP_DISCOVER message to a
specific DHCP server according to a specified OUI.
To specify a packet forwarding address with an OUI, use the following command.
Command

Mode

Description
Specifies a packet forwarding address with an OUI.
More than one address is possible.

ip dhcp oui XX:XX:XX helperaddress A.B.C.D

XX:XX:XX: OUI (first 24 bits of a MAC address in the
Interface

form of hexadecimal)
A.B.C.D: DHCP server address

no ip dhcp oui XX:XX:XX
[helper-address A.B.C.D]

8.8.4.2

Deletes a specified packet forwarding address.

Smart Relay Agent Forwarding
Normally, a DHCP relay agent forwards DHCP_DISCOVER message to a DHCP server
only with a primary IP address on an interface, even if there is more than one IP address
on the interface.
If the smart relay agent forwarding is enabled, a DHCP relay agent will retry sending
DHCP_DISCOVER message with a secondary IP address, in case of no response from
the DHCP server.

A50010-Y3-C150-2-7619

251

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To enable the smart relay agent forwarding, use the following command.
Command
ip dhcp smart-relay
no ip dhcp smart-relay

8.8.5

Mode
Global

Description
Enables a smart relay.
Disables a smart relay.

DHCP Option 82
In some networks, it is necessary to use additional information to further determine which
IP addresses to allocate. By using the DHCP option 82, a DHCP relay agent can include
additional information about itself when forwarding client-originated DHCP packets to a
DHCP server. The DHCP relay agent will automatically add the circuit ID and the remote
ID to the option 82 field in the DHCP packets and forward them to the DHCP server.
The DHCP option 82 resolves the following issues in an environment in which untrusted
hosts access the internet via a circuit based public network:
Broadcast Forwarding
The DHCP option 82 allows a DHCP relay agent to reduce unnecessary broadcast flooding by forwarding the normally broadcasted DHCP response only on the circuit indicated
in the circuit ID.
DHCP Address Exhaustion
In general, a DHCP server may be extended to maintain a DHCP lease database with an
IP address, hardware address and remote ID. The DHCP server should implement policies that restrict the number of IP addresses to be assigned to a single remote ID.
Static Assignment
A DHCP server may use the remote ID to select the IP address to be assigned. It may
permit static assignment of IP addresses to particular remote IDs, and disallow an address request from an unauthorized remote ID.
IP Spoofing
A DHCP client may associate the IP address assigned by a DHCP server in a forwarded
DHCP_ACK message with the circuit to which it was forwarded. The circuit access device
may prevent forwarding of IP packets with source IP addresses, other than, those it has
associated with the receiving circuit. This prevents simple IP spoofing attacks on the central LAN, and IP spoofing of other hosts.
MAC Address Spoofing
By associating a MAC address with a remote ID, a DHCP server can prevent offering an
IP address to an attacker spoofing the same MAC address on a different remote ID.

252

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Client Identifier Spoofing
By using the agent-supplied remote ID option, the untrusted and as-yet unstandardized
client identifier field need not be used by the DHCP server.
Fig. 8.33 shows how the DHCP relay agent with the DHCP option 82 operates.

DHCP Server

2. DHCP Request + Option 82

3. DHCP Response + Option 82

DHCP Relay Agent

1. DHCP Request

4. DHCP Response

DHCP Client

Fig. 8.33

8.8.5.1

DHCP Option 82 Operation

Enabling DHCP Option 82
To enable/disable the DHCP option 82, use the following command.
Command
ip dhcp option82
no ip dhcp option82

8.8.5.2

Mode
Global

Description
Enables the system to add the DHCP option 82 field.
Disables the system to add the DHCP option 82 field.

Option 82 Sub-Option
The DHCP option 82 enables a DHCP relay agent to include information about itself when
forwarding client-originated DHCP packets to a DHCP server. The DHCP server can use
this information to implement security and IP address assignment policies.
There are 2 sub-options for the DHCP option 82 information as follows:
•

Remote ID
This sub-option may be added by DHCP relay agents which terminate switched or
permanent circuits and have mechanisms to identify the remote host of the circuit.
Note that, the remote ID must be globally unique.

•

Circuit ID
This sub-option may be added by DHCP relay agents which terminate switched or
permanent circuits. It encodes an agent-local identifier of the circuit from which a
DHCP client-to-server packet was received. It is intended for use by DHCP relay
agents in forwarding DHCP responses back to the proper circuit.

A50010-Y3-C150-2-7619

253

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To specify a remote ID, use the following command.
Command

Mode

Description

system-remote-id hex HEXSTRING
Option 82

system-remote-id ip A.B.C.D

Specifies a remote ID.
(default: system MAC address)

system-remote-id text STRING

To specify a circuit ID, use the following command.
Command

Mode

Description

system-circuit-id PORTS hex HEXSTRING
system-circuit-id PORTS index <0-65535>

Option 82

Specifies a circuit ID.
(default: port number)

system-circuit-id PORTS text STRING

To delete a specified remote and circuit ID, use the following command.
Command

Mode

no system-remote-id

Option 82

no system-circuit-id PORTS

8.8.5.3

Description
Deletes a specified remote and circuit
ID

Option 82 Reforwarding Policy
A DHCP relay agent may receive a DHCP packet from a DHCP server or another DHCP
relay agent that already contains relay information. You can specify a DHCP option 82 reforwarding policy to be suitable for the network.
To specify a DHCP option 82 reforwarding policy, use the following command.
Command

Mode

Description
Specifies a DHCP option 82 reforwarding policy.

policy {replace | keep}

replace: replaces an existing DHCP option 82 information with a new one.

policy drop {normal | option82 |

Option 82

none}

keep: keeps an existing DHCP option 82 information
(default).
normal: DHCP packet
option82: DHCP option 82 packet
none: no DHCP packet (default)

8.8.5.4

Option 82 Trust Policy
Default Trust Policy
To specify the default trust policy for DHCP packets, use the following command.
Command
trust default {deny | permit}

254

Mode
Option 82

Description
Specifies the default trust policy for a DHCP packet.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

i

UMN:CLI

If you specify the default trust policy as deny, the DHCP packet that carries the information you specifies below will be permitted, and vice versa.
Trusted Remote ID
To specify a trusted remote ID, use the following command.
Command

Mode

Description

trust remote-id hex HEXSTRING
Option 82

trust remote-id ip A.B.C.D

Specifies a trusted remote ID.

trust remote-id text STRING

To delete a specified trusted remote ID, use the following command.
Command

Mode

Description

no trust remote-id hex HEXSTRING
Option 82

no trust remote-id ip A.B.C.D

Deletes a specified trusted remote ID.

no trust remote-id text STRING

Trusted Physical Port
To specify a trusted physical port, use the following command.
Command

Mode

Description
Specifies a trusted physical port.

trust port PORTS

{normal

|

option82 | all}

normal: DHCP packet
Option 82

no trust port {all | PORTS} {nor-

all: DHCP + option 82 packet
Deletes a specified trusted port.

mal | option82 | all}

8.8.5.5

option82: DHCP option 82 packet

Simplified DHCP Option 82
In case of a DHCP option 82 environment, when forwarding DHCP messages to a DHCP
server, a DHCP relay agent normally adds a relay agent information option to the DHCP
messages and replaces a gateway address in the DHCP messages with a relay agent
address.
On the other hand, in case of a simplified DHCP option 82 environment, a DHCP relay
agent adds a relay agent information option to the DHCP messages without replacement
of a gateway address field in the DHCP messages. This allows an enhanced security and
efficient IP assignment in the Layer 2 environment with a relay agent information option.
To enable/disable the simplified DHCP option 82, use the following command.
Command
ip dhcp simplified-opt82
no ip dhcp simplified-option82

A50010-Y3-C150-2-7619

Mode
Interface

Description
Enables the simplified DHCP option 82.
Disables the simplified DHCP option 82.

255

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.6

DHCP Client
An interface of the hiD 6615 S223/S323 can be configured as a DHCP client, which can
obtain an IP address from a DHCP server. The configurable DHCP client functionality allows a DHCP client to use a user-specified client ID, class ID or suggested lease time
when requesting an IP address from a DHCP server. Once configured as a DHCP client,
the hiD 6615 S223/S323 cannot be configured as a DHCP server or relay agent.

8.8.6.1

Enabling DHCP Client
To configure an interface as a DHCP client, use the following command.
Command
ip address dhcp

Mode
Interface

no ip address dhcp

8.8.6.2

Description
Enables a DHCP client on an interface.
Disables a DHCP client.

DHCP Client ID
To specify a client ID, use the following command.
Command

Mode

ip dhcp client client-id hex HEXSTRING
Interface

ip dhcp client client-id text STRING

Specifies a client ID.
Deletes a specified client ID.

no ip dhcp client client-id

8.8.6.3

Description

DHCP Class ID
To specify a class ID, use the following command.
Command

Mode

Specifies a class ID.

ip dhcp client class-id hex HEXSTRING
Interface

ip dhcp client class-id text STRING

(default: system MAC address)
Deletes a specified class ID.

no ip dhcp client class-id

8.8.6.4

Description

Host Name
To specify a host name, use the following command.
Command
ip dhcp client host-name NAME
no ip dhcp client host-name

256

Mode
Interface

Description
Specifies a host name.
Deletes a specified host name.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.6.5

UMN:CLI

IP Lease Time
To specify IP lease time that is requested to a DHCP server, use the following command.
Command

Mode

Specifies IP lease time in the unit of

ip dhcp client lease <120-2147483637>

Interface

second (default: 3600).
Deletes a specified IP lease time.

no ip dhcp client lease

8.8.6.6

Description

Requesting Option
To configure a DHCP client to request an option from a DHCP server, use the following
command.
Command
ip dhcp client request {domainname | dns}

Mode

Description

Interface

Configures a DHCP client to request a specified option.

To configure a DHCP client not to request an option, use the following command.
Command
no ip dhcp client request
{domain-name | dns}

8.8.6.7

Mode
Interface

Description
Configures a DHCP client not to request a specified
option.

Forcing Release or Renewal of DHCP Lease
The hiD 6615 S223/S323 supports two independent operation: immediate release a
DHCP lease for a DHCP client and force DHCP renewal of a lease for a DHCP client.
To force a release or renewal of a DHCP release for a DHCP client, use the following
command.
Command
release dhcp INTERFACE

Mode
Enable

renew dhcp INTERFACE

8.8.6.8

Description
Forces a release of a DHCP lease.
Forces a renewal of a DHCP lease.

Displaying DHCP Client Configuration
To display a DHCP client configuration, use the following command.
Command

Mode

Description

Enable

show ip dhcp client INTERFACE

Global

Shows a configuration of DHCP client.

Interface

A50010-Y3-C150-2-7619

257

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.7

DHCP Snooping
For enhanced security, the hiD 6615 S223/S323 provides the DHCP snooping feature.
The DHCP snooping filters untrusted DHCP messages and maintains a DHCP snooping
binding table. An untrusted message is a message received from outside the network,
and an untrusted interface is an interface configured to receive DHCP messages from
outside the network.
The DHCP snooping basically permits all the trusted messages received from within the
network and filters untrusted messages. In case of untrusted messages, all the binding
entries are recorded in a DHCP snooping binding table. This table contains a hardware
address, IP address, lease time, VLAN ID, interface, etc.
It also gives you a way to differentiate between untrusted interfaces connected to the
end-user and trusted interfaces connected to the DHCP server or another switch.

8.8.7.1

Enabling DHCP Snooping
To enable the DHCP snooping on the system, use the following command
Command
ip dhcp snooping

Mode
Global

no ip dhcp snooping

!

Description
Enables the DHCP snooping on the system.
Disables the DHCP snooping on the system. (default)

Upon entering the ip dhcp snooping command, the DHCP_OFFER and DHCP_ACK
messages from all the ports will be discarded before specifying a trusted port.
To enable the DHCP snooping on a VLAN, use the following command
Command

Mode

Enables the DHCP snooping on a specified VLAN.

ip dhcp snooping vlan VLANS
no ip dhcp snooping vlan

Global

VLANS

!

8.8.7.2

Description

Disables the DHCP snooping on a specified VLAN.

You must enable DHCP snooping on the system before enabling DHCP snooping on a
VLAN.

DHCP Trust State
To define a state of a port as trusted or untrusted, use the following command.
Command

Mode

Defines a state of a specified port as trusted.

ip dhcp snooping trust PORTS
no ip dhcp snooping trust
PORTS

i
258

Description

Global

Defines a state of a specified port as untrusted.

Note that, the DHCP snooping only sees the DHCP_OFFER and DHCP_ACK messages
which are received from untrusted interfaces.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.7.3

UMN:CLI

DHCP Rate Limit
To set the number of DHCP packet per second (pps) that an interface can receive, use
the following command.
Command
ip

dhcp

snooping

Mode
limit-rate

PORTS <1-255>

Sets a rate limit for DHCP packets. (unit: pps)
Global

no ip dhcp snooping limit-rate

Deletes a rate limit for DHCP packets.

PORTS

i

8.8.7.4

Description

Normally, the DHCP rate limit is specified to untrusted interfaces and 15 pps is recommended for a proper value. However, if you want to set a rate limit for trusted interfaces,
keep in mind that trusted interfaces aggregate all DHCP traffic in the switch, and you will
need to adjust the rate limit to a higher value.

DHCP Lease Limit
The number of entry registration in DHCP snooping binding table can be limited. If there
are too many DHCP clients on an interface and they request IP address at the same time,
it may cause IP pool exhaustion.
To set the number of entry registration in DHCP snooping binding table, use the following
command.
Command

Mode

Enables a DHCP lease limit on a specified untrusted

ip dhcp snooping limit-lease
PORTS <1-2147483637>

port.
Global

no ip dhcp snooping limit-lease
PORTS

!

8.8.7.5

Description

1-2147483637: the number of entry registration
Deletes a DHCP lease limit.

You can limit the number of entry registration only for untrusted interfaces, because the
DHCP snooping binding table only contains the information for DHCP messages from untrusted interfaces.

Source MAC Address Verification
The hiD 6615 S223/S323 can verify that the source MAC address in a DHCP packet that
is received on untrusted ports matches the client hardware address in the packet.
To enable the source MAC address verification, use the following command.
Command

Mode

Enables the source MAC address veri-

ip dhcp snooping verify mac-address
Global

no ip dhcp snooping verify mac-address

A50010-Y3-C150-2-7619

Description

fication.
Disables the source MAC address verification.

259

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.7.6

DHCP Snooping Database Agent
When DHCP snooping is enabled, the system uses the DHCP snooping binding database
to store information about untrusted interfaces. Each database entry (binding) has an IP
address, associated MAC address, lease time, interface to which the binding applies and
VLAN to which the interface belongs.
To maintain the binding when reload the system, you must use DHCP snooping database
agent. If the agent is not used, the DHCP snooping binding will be lost when the switch is
rebooted. The mechanism for the database agent saves the binding in a file at a remote
location. Upon reloading, the switch reads the file to build the database for the binding.
The system keeps the current file by writing to the file as the database changes.

Specifying DHCP Snooping Database Agent
To specify a DHCP database agent and enable an automatic DHCP snooping database
back-up, use the following command.
Command

Mode

Description
Specifies a DHCP snooping database agent and back-

ip

dhcp

snooping

up interval.

database

A.B.C.D INTERVAL

Global

A.B.C.D: DHCP snooping database agent address
INTERVAL: 120-2147483637 (unit: second)
Deletes a specified DHCP snooping database agent.

no ip dhcp snooping database

To request snooping binding entries from a DHCP snooping database agent, use the following command.
Command
ip dhcp snooping database renew A.B.C.D

Mode

Description
Requests snooping binding entries from a DHCP

Global

snooping database agent.
A.B.C.D: DHCP snooping database agent address

Specifying DHCP Snooping Binding Entry
The DHCP snooping binding table contains a hardware address, IP address, lease time,
VLAN ID, and port information that correspond to the untrusted interfaces of the system.
To manually specify a DHCP snooping binding entry, use the following command.
Command

Mode

Description
Configures binding on DHCP snooping table.
1-4094: VLAN ID

ip dhcp snooping binding <1-

PORT: port number

4094> PORT A.B.C.D MAC-ADDR
<120-2147483637>

Global

A.B.C.D: IP address
MAC-ADDR: MAC address
120-2147483637: lease time (unit: second)

clear ip dhcp snooping binding
PORT {A.B.C.D | all}

260

Releases configured binding on DHCP snooping table.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

i
8.8.7.7

UMN:CLI

The DHCP snooping database agent should be TFTP server.

Displaying DHCP Snooping Configuration
To display DHCP snooping table, use the following command.
Command

8.8.8

Mode

Description

show ip dhcp snooping

Enable

Shows a DHCP snooping configuration.

show ip dhcp snooping binding

Global

Shows DHCP snooping binding entries.

IP Source Guard
IP source guard is similar to DHCP snooping. This function is used on DHCP snooping
untrusted Layer 2 port. Basically, except for DHCP packets that are allowed by DHCP
snooping process, all IP traffic comes into a port is blocked. If an authorized IP address
from the DHCP server is assigned to a DHCP client, or if a static IP source binding is configured, the IP source guard restricts the IP traffic of client to those source IP addresses
configured in the binding; any IP traffic with a source IP address other than that in the IP
source binding will be filtered out. This filtering limits a host's ability to attack the network
by claiming a neighbor host's IP address.
IP source guard supports the Layer 2 port only, including both access and trunk. For each
untrusted Layer 2 port, there are two levels of IP traffic security filtering:

8.8.8.1

•

Source IP Address Filter
IP traffic is filtered based on its source IP address. Only IP traffic with a source IP
address that matches the IP source binding entry is permitted. An IP source address
filter is changed when a new IP source entry binding is created or deleted on the port,
which will be recalculated and reapplied in the hardware to reflect the IP source binding change. By default, if the IP filter is enabled without any IP source binding on the
port, a default policy that denies all IP traffic is applied to the port. Similarly, when the
IP filter is disabled, any IP source filter policy will be removed from the interface.

•

Source IP and MAC Address Filter
IP traffic is filtered based on its source IP address as well as its MAC address; only IP
traffic with source IP and MAC addresses matching the IP source binding entry are
permitted. When IP source guard is enabled in IP and MAC filtering mode, the DHCP
snooping option 82 must be enabled to ensure that the DHCP protocol works properly.
Without option 82 data, the switch cannot locate the client host port to forward the
DHCP server reply. Instead, the DHCP server reply is dropped, and the client cannot
obtain an IP address.

Enabling IP Source Guard
After configuring DHCP snooping, configure the IP source guard using the provided command. When IP source guard is enabled with this option, IP traffic is filtered based on the
source IP address. The switch forwards IP traffic when the source IP address matches an
entry in the DHCP snooping binding database or a binding in the IP source binding table.

A50010-Y3-C150-2-7619

261

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

!

To enable IP source guard, DHCP snooping needs to be enabled.

To enable IP source guard with a source IP address filtering on a port, use the following
command.
Command

Mode

ip dhcp verify source PORTS

Description
Enables IP source guard with a source IP address

Global

filtering on a port.
Disables IP source guard.

no ip dhcp verify source PORTS

To enable IP source guard with a source IP address and MAC address filtering on a port,
use the following command.
Command
ip

dhcp

verify source

Mode

Enables IP source guard with a source IP address and

port-

security PORTS

Global

no ip dhcp verify source port-

8.8.8.2

MAC address filtering on a port.
Disables IP source guard.

security PORTS

!

Description

You cannot configure IP source guard with the ip dhcp verify source and ip dhcp verify
source port-security commands together.

Static IP Source Binding
The IP source binding table has bindings that are learned by DHCP snooping or manually
specified with the ip dhcp verify source binding command. The switch uses the IP
source binding table only when IP source guard is enabled.
To specify a static IP source binding entry, use the following command.
Command

Mode

Description
Specifies a static IP source binding entry.
1-4094: VLAN ID

ip dhcp verify source binding
<1-4094> PORT A.B.C.D MAC-

PORT: port number
Global

ADDR

A.B.C.D: IP address
MAC-ADDR: MAC address

no ip dhcp verify source binding

Deletes a specified static IP source binding.

{A.B.C.D | all}

8.8.8.3

Displaying IP Source Guard Configuration
To display IP source binding table, use the following command.

262

Command

Mode

show ip dhcp verify source

Enable

binding

Global

Description
Shows IP source binding entries.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.8.9

8.8.9.1

UMN:CLI

DHCP Filtering

DHCP Packet Filtering
For the hiD 6615 S223/S323, it is possible to block the specific client with MAC address.
If the blocked MAC address by administrator requests IP address, the server does not
assign IP. This function is to strength the security of DHCP server.
The following is the function of blocking to assign IP address on a port.
Command

Mode

ip dhcp filter-port PORTS

Global

no ip dhcp filter-port PORTS

Description
Configures a port in order not to assign IP.
Disables DHCP packet filtering.

The following is to designate MAC address which IP address is not assigned.
Command
ip

dhcp

filter-address

ADDR

Mode

Blocks a MAC address in case of requesting IP ad-

MAC-

dress.
Global

no ip dhcp filter-address
MAC-ADDR

8.8.9.2

Description

MAC-ADDR: MAC address
Disables DHCP MAC filtering.

DHCP Server Packet Filtering
Dynamic host configuration protocol (DHCP) makes DHCP server assign IP address to
DHCP clients automatically and manage the IP address. Most ISP operators provide the
service as such a way. At this time, if a DHCP client connects with the equipment that can
be the other DHCP server such as Internet access gateway router, communication failure
might be occurred.
DHCP filtering helps to operate DHCP service by blocking DHCP request which enters
through subscriber’s port and goes out into uplink port or the other subscriber’s port and
DHCP reply which enters to the subscriber’s port.
In the Fig. 8.34, server A has the IP area from 192.168.10.1 to 192.168.10.10. Suppose a
user connects with client 3 that can be DHCP server to A in order to share IP address
from 10.1.1.1 to 10.1.1.10.
Here, if client 1 and client 2 are not blocked from client 3 of DHCP server, client 1 and client 2 will request and receive IP from client 3 so that communication blockage will be occurred. Therefore, the filtering function should be configured between client 1 and client 3,
client 2 and client 3 in order to make client 1 and client 2 receive IP without difficulty from
DHCP server A.

A50010-Y3-C150-2-7619

263

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

DHCP Server A

192.168.10.1~192.1
68.10.10 IP assigned

Client 3 The device that can be a
DHCP server

Request from
client 1, 2 is
transmitted to
client 3

IP assigned by
client 3 not by
DHCP server A

hiX 5430

10.1.1.1 ~
10.1.1.10
IP assigned

To prevent IP assignment
from client 3, DHCP filtering
is needed for the port

Client 1

Fig. 8.34

Client 2

DHCP Server Packet Filtering

To enable the DHCP server packet filtering, use the following command.
Command
dhcp-server-filter PORTS

Mode
Bridge

no dhcp-server-filter PORTS

Description
Enables the DHCP server packet filtering.
Disables the DHCP server packet filtering.

To display a status of the DHCP server packet filtering, use the following command.
Command

Mode

Description

Enable

show dhcp-server-filter

Global

Show a status of the DHCP server packet filtering.

Bridge

8.8.10

Debugging DHCP
To enable/disable a DHCP debugging, use the following command.
Command

Mode

debug dhcp {filter | lease |
packet | service | all}
no debug dhcp {filter | lease |
packet | service | all}

264

Description
Enables a DHCP debugging.

Enable
Disables a DHCP debugging.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.9

UMN:CLI

Ethernet Ring Protection (ERP)
The ERP is a Siemens protection protocol and procedure to protect Ethernet ring topologies. It is a fast failure detection and recovery so that it decreases the time to prevent
Loop under 50ms.
The main characteristics of the ERP are the follows:
• It required no additional underlying protection mechanism within the ring configuration,
the complete functionality is implemented on the interface units of the system and
does not require additional dedicated hardware which may raise network complexity
and costs.
• It is a unique robustness functionality which runs on every network element involved
in the ring configurations. It means each system is active part of the ring protection
mechanism. Therefore, it guarantees a maximum of 50 ms to switch over towards a
new configuration after link or system failures.
• ERP and STP cannot be configured at once.

8.9.1

ERP Operation
Ethernet Ring Protection (ERP) is a concept and protocol optimized for fast failure detection and recovery on Ethernet ring topologies. The Protection of fast failure detection and
recovery occurs on RM Node. An Ethernet ring consists of two or more switches. One of
the nodes on the ring is designated as redundancy manager (RM) and the two ring ports
on the RM node are configured as primary port and secondary port respectively.
The RM blocks the secondary port for all non-control traffic belongs to this ERP domain.
Here, if Line failure occurs, the Nodes detecting Link Failure transmit Link Down message
and Link Failure port becomes Blocking status. When the RM nodes receive this linkdown message, it immediately declares failed state, and opens the logically blocked protected VLANs on the secondary port. Then, Ethernet Ring restarts the communication.
The following is ERP operation when Link Failure occurs.
3. Nodes detecting Link Failure
Transmit Link Down message

3. Nodes detecting Link Failure
Transmit Link Down message

Normal Node

Normal Node
2. Link Failure

S

P
Normal Node

Fig. 8.35

A50010-Y3-C150-2-7619

RM Node
1. Secondary port of RM node is
blocking in Normal state

Ethernet Ring Protocol Operation in Failure State

265

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Normal Node

Normal Node

2. Send Link
Down Message
S

P
Normal Node
2. Send Link
Down Message

Fig. 8.36

RM Node
1. Secondary port of RM node is
changed as unblocking state

Ring Protection

When a Link Failure is recovered, a temporary loop may occur. To rectify this condition,
ERP sends a “link up” message to the RM. The RM will logically block the protected
VLANs on its secondary port and generate a “RM link up” packet to make sure that all
transit nodes are properly reconfigured. This completes fault restoration and the ring is
back in normal state.

2. Nodes detecting Link Failure
send Link Down message
Normal Node

2. Nodes detecting Link Failure
send Link Down message
Normal Node

1. Link Failure recover
blocks the port
recovered from Link
Failure
S

P
Normal Node
Fig. 8.37

266

RM Node

Link Failure Recovery

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Normal Node

Normal Node

3. Unblock the
port recovered
from Link Failure

2. Send RM Link Up message
S

1. Block RM Node of
secondary port

P
Normal Node
Fig. 8.38

8.9.2

2. Send RM Link
Up message

RM Node

Ring Recovery

Loss of Test Packet (LOTP)
ERP recognizes the Link Failure using Loss of Test Packet (LOTP). RM Node regularly
sends RM Test Packet message. If the message is not retransmitted to RM Node through
Ethernet Ring, it means that Loop doesn’t occur. Therefore, RM Node unblocks Secondary port. The condition that RM Test Packet from RM Node doesn’t return is LOTP state.
On the other hand, if RM Test Packet is retransmitted to RM Note through Ethernet Ring,
Loop may occur. In this condition, RM Node blocks Secondary port.

8.9.3

8.9.3.1

Configuring ERP

ERP Domain
To realize ERP, you should fist configure domain for ERP. To configure the domain, use
the following command.
Command
erp domain DOMAIN-ID

Mode

Description
Creates ERP domain.

Bridge

no erp domain {all | DOMAIN-ID}

DOMAIN-ID: control VLAN ID of domain <1-4094>
Deletes ERP domain.

To specify a description for configured domain, use the following command.
Command
erp

description

DESCRIPTION

A50010-Y3-C150-2-7619

DOMAIN-ID

Mode

Description

Bridge

Specifies a description of domain.

267

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.9.3.2

RM Node
To configure RM Node, use the following command.
Command

Mode

erp rmnode DOMAIN-ID

Bridge

no erp rmnode DOMAIN-ID

8.9.3.3

Description
Configures RM node of ERP node mode.
Configures ERP node mode as normal node.

Port of ERP domain
To configure Primary Port and Secondary port of RM Node, use the following command.
Command
erp

port

DOMAIN-ID

Mode
primary

PORT secondary PORT

i
8.9.3.4

Bridge

Description
Configures ports of ERP domain

Primary port and secondary port should be different.

Protected VLAN
To configure Protected VLAN of ERP domain, use the following command.
Command
erp protections DOMAIN-ID VID

Mode
Bridge

Description
Configures protected VLAN of ERP domain
VID: VLAN ID

To delete the configured Protected VLAN, use the following command.
Command
no erp protections VID

8.9.3.5

Mode
Bridge

Description
Deletes protected VLAN of ERP domain.
VID: VLAN ID

Protected Activation
To configure ERP Protected Activation, use the following command.
Command
erp activation DOMAIN-ID

Mode
Bridge

Description
Configures ERP Protected Activation.

To disable ERP Protected Activation, use the following command
Command
no erp activation DOMAIN-ID

268

Mode
Bridge

Description
Disables ERP Protected Activation.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.9.3.6

UMN:CLI

Manual Switch to Secondary
To configure Manual Switch to Secondary, use the following command.
Command

Mode
Bridge

erp ms-s DOMAIN-ID

Description
Configures ERP manual switch to secondary

To disable Manual Switch to Secondary, use the following command.
Command

Mode
Bridge

no erp ms-s DOMAIN-ID

8.9.3.7

Description
Disables ERP manual switch to secondary

Wait-to-Restore Time
To configure Wait-to-Restore Time, use the following command.
Command

Mode

erp wait-to-restore DOMAIN-ID
<1-720>

Bridge

Description
Configures ERP wait-to-restore time
1-720: Wait to restore time in second

To return the configured Wait-to-Restore Time as Default, use the following command.
Command

Mode

no erp wait-to-restore DOMAINID

8.9.3.8

Bridge

Description
Configures ERP wait-to-restore time as default value

Learning Disable Time
To configure ERP Learning Disable Time, use the following command.
Command
erp

learn-dis-time

Mode

DOMAIN-ID

<0-500>

Bridge

Description
Configures ERP learning disable time
0-500: learning disabling time (unit: millisecond)

To return the configured Learning Disable Time as Default, use the following command.

8.9.3.9

Command

Mode

no erp learn-dis-time DOMAIN-ID

Bridge

Description
Configures ERP learning disable time as default value

Test Packet Interval
To configure ERP Test Packet Interval, use the following command.
Command
erp

test-packet-interval

MAIN-ID <10-500>

A50010-Y3-C150-2-7619

Mode
DO-

Bridge

Description
Configures ERP test packet interval
10-500: packet interval (unit: millisecond)

269

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To return ERP Test Packet Interval as Default, use the following command.
Command

Mode

no erp test-packet-interval DOMAIN-ID

8.9.3.10

Description

Bridge

Configures ERP test packet interval as default value

Displaying ERP Configuration
To display a configuration for ERP, use the following command.
Command

Mode

Description

Enable

show erp {all | DOMAIN-ID}

Global

Shows the information of ERP

Bridge

8.10

Stacking
It is possible to manage several switches with one IP address by using stacking. If there’s
a limitation for using IP addresses and there are too many switches which you must manage, you can manage a number of switches with a IP address using this stacking function.
Switch stacking technology available in the industry today provides two main benefits to
customers. The first benefit is the ability to manage a group of switches using a single IP
address. The second benefit is the ability to interconnect two or more switches to create a
distributed fabric, which behaves in the network as a unified system. The hiD 6615
S223/S323 provides the stacking technology’s benefits for the customer.

i

It is possible to configure stacking function for switches from 2 to 16.

The following is an example of the network where stacking is configured.
Switch

Internet

Switch A
Master Switch
Switch

Switch

Switch B
Slave Switch

Switch C
Slave Switch

Fig. 8.39

270

Example of Stacking

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

A switch, which is supposed to manage the other switches in stacking is named as Master switch and the other switches managed by Master switch are named as Slave switch.
Regardless of installed place or connection state, Master switch can check and manage
all Slave switches.
The below steps are provided to configure stacking.

8.10.1

Switch Group
You should configure all the switches configured with stacking function to be in the same
VLAN. To configure the switches as a switch group belongs in the same VLAN, use the
following command.
Command

Mode
Global

stack device NAME

i
8.10.2

Description
Configures device name or VID

For managing the stacking function, the port connecting Master switch and Slave switch
must be in the same VLAN.

Designating Master and Slave Switch
Designate Mater switch using the following command.
Command

Mode
Global

stack master

Description
Designates Master switch

After designating Master switch, register Slave switch for Master switch. To register Slave
switch or delete the registered Slave switch, use the following command.
Command
stack

add

MACADDR

SCRIPTION]

Mode
[DE-

Registers slave switch.
Global

MACADDR: MAC address
Deletes slave switch.

stack del MACADDR

i

Description

To make stacking operate well, it is required to enable the interface of Slave switch. The
switches in different VLANs can not be added to the same switch group.
You should designate Slave switch registered in Master Switch as Slave Switch. To designate Slave switch, use the following command.
Command
stack slave

A50010-Y3-C150-2-7619

Mode
Global

Description
Designates as a slave switch

271

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

8.10.3

Disabling Stacking
To disable stacking, use the following command.
Command

Global

no stack

8.10.4

Description
Disables the stacking function

Displaying Stacking Status
Command
show stack

8.10.5

Mode

Mode
Enable
Global

Description
Shows a configuration of stacking

Accessing to Slave Switch from Master Switch
After configuring all stacking configurations, it is possible to configure and mange by accessing to Slave switch from Master switch.
To access to Slave switch from Mater switch, use the following command in Bridge configuration mode.
Command
rcommand NODE

Mode
Global

Description
Accesses to a slave switch.
NODE: node number

NODE means node ID from configuring stacking in Slave switch. If you input the above
command in Mater switch, Telnet connected to Slave switch is displayed and it is possible
to configure Slave switch using DSH command. If you use the exit command in Telnet,
the connection to Slave switch is down.

8.10.6

Sample Configuration
[Sample Configuration 1] Configuring Stacking
The following is a stacking configuration by designating SWITCH A as a master and
SWITCH B as a slave.
Switch A
Master Switch
Manage with the same
IP address
Switch B
Slave Switch

Step 1
Assign IP address in Interface configuration mode of Switch and enable interface using
“no shutdown” command. In order to enter into Interface configuration mode, you should

272

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

open Interface configuration mode of VLAN to register as a switch group for stacking.
The following is an example of configuring Interface of switch group as 1.
SWITCH_A# configure terminal
SWITCH_A(config)# interface 1
SWITCH_A(interface)# ip address 192.168.10.1/16
SWITCH_A(interface)# no shutdown
SWITCH_A(interface)#

i

If there are several switches, rest of them are managed by a single IP address of Master
switch. Therefore you don’t need to configure IP address in Slave switch.
Step 2
Configure Switch A as Master switch. Configure VLAN to belong in the same switch group
after registering Slave switch, configure it as a Master switch.

SWITCH_A(config)# stack master
SWITCH_A(config)# stack device default
SWITCH_A(config)# stack add 00:d0:cb:22:00:11

Step 3
Configure VLAN in order to belong to the same switch group in Switch B registered by
Master switch as Slave switch and configure as a Slave switch.

SWITCH_B(config)# stack slave
SWITCH_B(config)# stack device default

Step 4
Check the configuration. The information you can check in Master switch and Slave
switch is different as below.

SWITCH_A(config)# show stack
device

: default

node ID : 1
node

MAC address

status

type

name

port

1

00:d0:cb:0a:00:aa

active

SURPASS hiD 6615 S223/S323 SWITCH_A

24

2

00:d0:cb:22:00:11

active

SURPASS hiD 6615 S223/S323 SWITCH_B

24

SWITCH_A(config)#


SWITCH_B(config)# show stack
device

: default

node ID : 2
SWITCH_B(config)#

A50010-Y3-C150-2-7619

273

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

[Sample Configuration 2] Accessing from Master Switch to Slave Switch
The following is an example of accessing to Slave switch from Master switch configured
in [Sample Configuration 1]. If you show the configuration of Slave switch in [Sample
Configuration 1], you can recognize node-number is 2.
SWITCH(bridge)# rcommand 2
Trying 127.1.0.1(23)...
Connected to 127.1.0.1.
Escape character is '^]'.
SWITCH login: admin
Password:
SWITCH#

To disconnect, input as below.
SWITCH# exit
Connection closed by foreign host.
SWITCH(bridge)#

8.11

Broadcast Storm Control
The hiD 6615 S223/S323 supports broadcast storm control for broadcast packets. Broadcast storm is overloading situation of broadcast packets since they need major part of
transmit capacity. Broadcast storm may be often occurred because of difference of versions. For example, when there are mixed 4.3 BSD and 4.2 BSD, or mixed AppleTalk
Phase I and Phase II in TCP/IP, Storm may occur
In addition, when information of routing protocol regularly transmitted from router incorrectly recognized by system, which does not support the protocol, Broadcast Storm may
be occurred.
Broadcast Storm Control is operated by system counts how many Broadcast packets are
there for a second and if there are packets over configured limit, they are discarded.
The hiD 6615 S223/S323 provides not only broadcast storm but also control of multicast
and DLF (Destination Lookup Fail) storm. In order to use control of multicast and DLF
storm, use the following commands. Then all configurations of Broadcast storm control
will be equally applied to all VLANs.
To enable multicast storm control and DLF storm control, use the following command.
Command

Mode

Description
Enables broadcast, multicast, or DLF storm control

storm-control {broadcast | multicast | dlf} RATE [PORTS]

Bridge

respectively in a port with a user defined rate. Rate
value is from 1 to 262142 for FE, and from 1 to
2097150 for GE

i

By default, DLF storm control is enabled and multicast storm control is disabled.
To disable multicast storm control and DLF storm control, use the following commands

274

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Command

Mode

no storm-control {broadcast |
multicast | dlf} [PORTS]

Bridge

Description
Disables broadcast, multicast, or DLF storm control
respectively.

To display a configuration of storm control, use the following command.
Command

Mode

Description

Enable
Global

show storm-control

Displays storm control configuration.

Bridge

8.12

Jumbo-frame Capacity
The packet range that can be capable to accept is from 64 bytes to 1518 bytes. Therefore,
packets not between these ranges will not be taken. However, the hiD 6615 S223/S323
can accept Jumbo-frame larger than 1518 bytes through user’s configuration.
To configure to accept Jumbo-frame larger than 1518 bytes, use the following command.
Command
jumbo-frame

PORTS

Mode
<1518-

9000>

Description
Configures to accept jumbo-frame between specified

Bridge

ranges.
1518-9000: Max packet length

To disable configuration to accept Jumbo-frame, use the following command.
Command

Mode
Bridge

no jumbo-frame PORTS

Description
Disables configuration to accept jumbo-frame on specified port.

To display the configuration of Jumbo-frame, use the following command.
Command

Mode

Description

Enable
Global

show jumbo-frame

Shows a configuration of jumbo frame.

Bridge

Sample Configuration
The following is an example of configuration to accept Jumbo-frame under 2200 bytes in
port 1~10.
SWITCH# configure terminal
SWITCH(config)# bridge
SWITCH(bridge)# jumbo-frame 1-10 2200
SWITCH(bridge)# show jumbo-frame
Name : Current/Default
port01 :

A50010-Y3-C150-2-7619

2200/

1518

275

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

port02 :

2200/

1518

port03 :

2200/

1518

port04 :

2200/

1518

port05 :

2200/

1518

port06 :

2200/

1518

port07 :

2200/

1518

port08 :

2200/

1518

port09 :

2200/

1518

port10 :

2200/

1518

port11 :

1518/

1518

port12 :

1518/

1518

SWITCH(bridge)#

8.13

Blocking Direct Broadcast
RFC 2644 recommends that system blocks broadcast packet of same network bandwidth
with interfaceof equipment, namely Direct broadcast packet. Hereby, SURPASS hiD 6615
supposed to block Direct broadcast packet by default setting. However, you can enable or
disable it in SURPASS hiD 6615. In order to block Direct broadcast packet, use the following command.
Command

Mode

no ip forward direct-broadcast

Global

ip forward direct-broadcast

Description
Enables blocking Direct broadcast packet. (Default)
Disables blocking Direct broadcast packet.

The following is an example of blocking Direct broadcast packet and showing it.
SWITCH(config)# ip forward direct-broadcast
SWITCH(config)# show running-config
Building configuration...
(omitted)
!
ip forward direct-broadcast
!
no snmp
!
SWITCH(config)#

8.14

Maximum Transmission Unit (MTU)
Maximum value for the length of the data payload can be transmitted. User can control
Maximum Transmission Unit (MTU) with below command.
Command
mtu <68-1500>
no mtu

276

Mode
Interface

Description
Configures maximum MTU size.
Returns to the default MTU size.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The following is an example of configuration to mtu size as 100.

SWITCH(config-if)# mtu 100
SWITCH(config-if)# show running-config interface 1
!
interface default
mtu 100
bandwidth 1m
ip address 10.27.41.181/24
SWITCH(config-if)

A50010-Y3-C150-2-7619

277

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9 IP Multicast
Traditional IP network provided unicast transmission a host to send packets to a single
host or broadcast transmission. But multicast provides group transmission a host to send
packets to a group of all hosts. In the multicast environment, multicast packets are delivered to a group by duplicating multicast packets.
Multicasting is divided into Layer 3 multicast routing and Layer 2 IGMP snooping. The hiD
6615 S323 supports PIM-SM/SSM of multicast routing, and V1, V2 and V3 of IGMP
snooping.
Fig. 9.1 shows the example of IGMP snooping configuration network. In Layer 2 network,
the hiD 6615 S223/S323 is configured only for IGMP Snooping.
Layer 3 Network

Layer 2 Network
IGMP Join/Leave
message

Multicast data

Set-top Box

Multicast Server
hiX 5430
Set-top Box

PIM-SM

IGMP Snooping

Fig. 9.1

IGMP Snooping Configuration Network

If the hiD 6615 S323 is installed within Layer 3 network, PIM-SM should be configured.
Below the hiD 6615 S223/S323, there is a switch that performs IGMP snooping function
for subscribers.
Layer 2 Network

Layer 3 Network

Multicast data
IGMP Join/Leave
message

Set-top Box

RP
Multicast Server
hiX 5430
Set-top Box

IGMP Snooping

Fig. 9.2

PIM-SM

PIM-SM Configuration Network

You can configure IGMP Snooping with PIM-SM as Fig. 9.3. If more than one port are on
the same interface and the hiD 6615 S323 is located in Layer 3 boundary, IGMP Snoop-

278

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

ing and PIM-SM should be configured at the same time.
More than one port
on same interface

Layer 3 Network
IGMP Join/Leave
message

Multicast data

Set-top Box

Multicast Server
hiX 5430
Set-top Box

PIM-SM
IGMP Snooping

Fig. 9.3

9.1

IGMP Snooping and PIM-SM Configuration Network

Multicast Routing Information Base
In this chapter, you can configure the common multicast commands for multicast routing
information base.

9.1.1

Enabling Multicast Routing (Required)
To provide multicast service on the hiD 6615 S323, you should use the ip multicastrouting command necessarily. If you disable the multicast routing, the multicast protocol
daemon remains present, but does not perform multicast functions.
Enable the multicast routing function, using the following command.
Command
ip multicast-routing

Mode
Global

no ip multicast-routing

9.1.2

Description
Enables multicast routing function.
Disables multicast routing function. (default)

Limitation of MRIB Routing Entry
You can limit the number of multicast routes that can be added to a switch, and generate
an error message when the limit is exceeded.
To configure the limitation of MRIB routing entry, use the following command.
Command

Mode

Enables multicast routing function.

ip multicast route-limit LIMIT
[THRESHOLD]

no ip multicast route-limit

A50010-Y3-C150-2-7619

Description

LIMIT: 1-214783647 (number of routes)
Global

THRESHOLD: 1-214783647
Disables the limitation configuration of MRIB routing
entry.

279

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.1.3

Clearing MRIB Information
Clearing Total or Partial Group Entry of MRIB
If you use the clear ip mroute command, the MRIB clears the multicast route entries in
its multicast route table, and removes the entries from the multicast forwarder. Each multicast protocol has its own clear multicast route command. The protocol-specific clear
command clears multicast routes from the protocol, and also clears the routes from the
MRIB.
To delete the multicast route entries, use the following command.
Command
clear ip mroute *

Mode
Enable

clear ip mroute GROUP-ADDR

Global

[SRC-IP-ADDRESS]

Bridge

Description
Deletes all multicast routes entries.
Deletes specific multicast routes entries.
GROUP-ADDR: group IP address
SRC-IP-ADDRESS: source IP address

Clearing Statistics of Multicast Routing Table
To delete the multicast route statistics entries from IP multicast routing table, use the following command.
Command

Mode

Description
Deletes all multicast routes statistics

clear ip mroute statistics *
Enable

clear ip mroute statistics GROUP-ADDR [SRCIP-ADDRESS]

Global
Bridge

entries.
Deletes specific multicast routes statistics entries.
GROUP-ADDR: group IP address
SRC-IP-ADDRESS: source IP address

Clearing MFC and Tree Information Base which are produced by PIM-SM
To clear all Multicast Forwarding Cache (MFC) and TIB entries in the PIM-SM protocol
level, use the following command.
Command

Mode

clear ip mroute * pim sparsemode
clear ip mroute GROUP-ADDR
[SRC-IP-ADDRESS] pim sparse-

mode

280

Description
Deletes all MFC and TIB entries in the PIM-SM.

Enable
Global

Deletes specific MFC and TIB entries in the PIM-SM.
GROUP-ADDR: group IP address
SRC-IP-ADDRESS: source IP address

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.1.4

UMN:CLI

Displaying MRIB Information
To display MRIB information, use the following commands
Command

Mode

Description

show ip mroute {dense | sparse}
{count | summary}

show ip mroute GROUP-ADDR
[SRC-IP-ADDRESS]

{dense

|

sparse} {count | summary}
show ip mroute GROUP-ADDR
[SRC-IP-ADDRESS]

GROUP-

ADDR [SRC-IP-ADDRESS]{dense

Enable

Displays multicast routes entries.

Global

GROUP-ADDR: group IP address

Bridge

SRC-IP-ADDRESS: source IP address

| sparse} {count | summary}

show

ip

mroute

GROUP-

ADDR/M {dense | sparse} {count
| summary}

To display the contents of the MRIB VIF table, use this command.
Command
show ip mvif [IFNAME]

9.1.5

Mode
Enable

Description
Displays IP multicast interface.

Multicast Time-To-Live Threshold
Use this command to configure the time-to-live (TTL) threshold of packets being forwarded out of an interface.
Command

Mode

Configures the time-to-live threshold for multicast

ip multicast ttl-threshold
<0-255>

interface

packet
Default: 1
Restores is as a default.

no ip multicast ttl-threshold

9.1.6

Description

MRIB Debug
Use this command to debug events in the multicast RIB.
Command

Mode

Description
Debugs event in the multicast RIB.
all : all Ipv4 multicast debugging
fib-msg: multicast FIB messages

debug nsm mcast {all | fib-msg |
mrt | register | stats | vif}

mrt: multicast routes
Enable

register: multicast PIM register messages
stats: multicast statitics
vif: multicast interface

no debug nsm mcast {all | fibmsg | mrt | register | stats | vif}

A50010-Y3-C150-2-7619

Disables the debug event.

281

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.1.7

Multicast Aging
L2 and L3 Join information about Multicast Group used to apply on the chipset without
Multicast Stream, which makes dissatisfaction for Maximum Multicast Entry. Multicast Aging is to optimize Multicast Entry management using Multicast L2 Aging. When Multicast
Stream comes in, L2 filtering port (igmp snooping, pim snooping) would be written on the
chip. In addition, verify the hitbit about Entry after the Aging time to reset the aging time or
delete Entry to manage the Multicast Entry efficiently.
To configure the multicast againg, use the following command.
Command
ip

mcfdb

aging-time

Mode
<

10-

Configures Aging tiem for Multicast Stream

21474830>

ip

Description

(Default:300sec)

mcfdb

aging-limit

<256-

65535>

Global

no ip mcfdb aging-time

Configures Maximun Multicast Stream for Aging
(Default:5000)
Restores it as a default

no ip mcfdb aging-limit

To delete Muticast Stream Entry that has done the Aging, use the following command.
Command

Mode

Description
Deletes Multicast Stream Entry after Aging per vlan or

clear ip mcfdb {vlan VLAN}
Global

all

clear ip mcfdb vlan VLAN group

Deletes Multicast Stream Entry after Aging per vlan or

A.B.C.D source A.B.C.D

group, source

To display about Againg information, use the following command.
Command

Mode

Description
Displays L2 Aging information

show ip mcfdb

(aging-time, aging-limit information)

show ip mcfdb aging-entry
Displays L2 Aging information

{vlan VID | group A.B.C.D}
[mac-based | detail]

show ip mfib
{vlan VID | group A.B.C.D}
[detail]

282

Enable
Global

Displays L3 Aging Entry information as Input interface

Bridge

(RPF) and Output Interface
Detail: displays input/output Port for each interface
and user for each port

show ip mfib hidden

Displays reserved information and destination user

{reserved | dstuser}

information as a hidden command

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2

UMN:CLI

Internet Group Management Protocol (IGMP)
Internet Group Management Protocol (IGMP) is used by hosts and routers that support
multicasting. All the systems on a network can know which hosts belong to which multicast groups. IGMP is not multicast routing protocol but group management protocol.
Multicast routers can receive thousands of multicast packets from other group. If a router
does not have the information of host membership, it has to broadcast the packets. This
is bandwidth waste. To solve this problem, one group list of members is maintained.
IGMP helps multicast router to create and renew the list.
The hiD 6615 S223/S323 supports IGMP Version 1, 2 and 3.

9.2.1

IGMP Basic Configuration
This chapter explains how to configure basic IGMP features such as IGMP version, IGMP
DB and Debugging method.

9.2.1.1

IGMP Version per Interface
You can configure the IGMP Protocol version on an interface. To configure the IGMP Protocol version, use the following command.
Command

Mode

Description
Selects an IGMP version.

ip igmp version <1-3>

1: version 1
Interface

2: version 2
3: version 3 (default)

no ip igmp version

Returns to the default setting. (version 3)

•

IGMP Version 1
Provides basic Query-Response mechanism that allows the multicast router to determine which multicast groups are active an other processes that enable hosts to join
and leave a multicast group.

•

IGMP Version 2
Extends IGMP features as IGMP leave process, group-specific queries and explicit
maximum query response time. It added support for "low leave latency", that is, a
reduction in the time it takes for a multicast router to learn that there are no longer
any members of a particular group present on an attached network.

•

IGMP Version 3
Version 3 of IGMP adds support for "source filtering", that is, the ability for a system
to report interest in receiving packets ‘only’ from specific source addresses, or from
‘all but’ specific source addresses, sent to a particular multicast address. That information may be used by multicast routing protocols to avoid delivering multicast packets from specific sources to networks where there are no interested receivers

A50010-Y3-C150-2-7619

283

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.1.2

Removing IGMP Entry
To clear IGMP interface entries, use the following command.
Command

Mode

clear ip igmp interface INTER-

Clears IGMP interface entries on an interface.

FACE

clear ip igmp group {* | A.B.C.D

Enable

Deletes IGMP group cache entries.
*: all IGMP group

[INTERFACE]}

9.2.1.3

Description

A.B.C.D: IGMP group address

IGMP Debug
To enable debugging of all IGMP or a specific feature of IGMP, use the following command.
Command

Mode

Description
Enables debugging of IGMP.
all: debug all IGMP
decode: debug IGMP decoding

debug igmp {all | decode | encode | events | fsm | tib}

encode: debug IGMP encoding
Enable

events: debug IGMP events
fsm: debug IGMP Finite State Machine (FSM)
tib: debug IGMP Tree Information Base (TIB)

no debug igmp {all | decode |

Disables the IGMP debugging configuration.

encode | events | fsm | tib}

9.2.1.4

IGMP Robustness Value
To change the Querier Robustness Variable value on an interface, use the following
command.
Command

Mode

ip igmp robustness-variable <27>

no ip igmp robustness-variable

9.2.2

Description
Configures the querier robustness variable value on an

Interface

interface.
Returns to the default value. (default: 2)

IGMP Version 2
IGMP v2 consists of three message type, query, membership report and leave report.
This chapter describes how to configure these IGMP v2 features.

9.2.2.1

IGMP Static Join Setting
If there is no group member on a network segment and you want to transmit multicast
packet to that network segment, you can configure to pull multicast traffic down to a network segment using the ip igmp static-group command. With this command, the switch
does not accept the packets, but forwards them. The outgoing interface appears in the

284

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

IGMP cache, but the switch is not a member. Therefore it can support fast switching.
To configure IGMP static Join, use the following command.
Command

Mode

ip igmp static-group A.B.C.D

Configures IGMP static join setting.

vlan VLAN port PORT reporter

A.B.C.D: group address

A.B.C.D

no ip igmp static-group
[A.B.C.D] [vlan VLAN]

Description

Global
Disables the IGMP static join configuration.

no ip igmp static-group A.B.C.D
vlan VLAN port PORT reporter
A.B.C.D

9.2.2.2

Maximum Number of Groups
Hosts on a subnet serviced by a particular interface have the access to join certain multicast groups. These multicast groups can be controlled by the ip igmp access-group
command.
To control the multicast groups on an interface, use the following command.
Command

Mode

Sets an IGMP access group.

ip igmp access-group {<1-99> |
Interface

WORD}

1-99: access list number
WORD: IP named standard access list
Disables groups on interfaces.

no ip igmp access-group

9.2.2.3

Description

IGMP Query Configuration
Multicast routers send host membership query messages (host query messages) to discover which multicast groups have members on the attached networks of the router.
Hosts respond with IGMP report messages indicating that they wish to receive multicast
packets for specific groups (indicating that the host wants to become a member of the
group). Host query messages are addressed to the all-hosts multicast group, which has
the address 224.0.0.1, and has an IP time-to-live (TTL) value of 1.
The designated router for a LAN is the only router that sends IGMP host query messages.
For IGMP Version 2, the designated querier is the router with the lowest IP address on
the subnet. If the router hears no queries for the timeout period, it becomes the querier.
To configure an IGMP query interval, use the following command.
Command

Mode

Configures the IGMP query interval.

ip igmp query-interval
<1-18000>

no ip igmp query-interval

Description

Interface

1-18000: frequency at which IGMP host query messages are sent (unit: second)
Returns to the default value. (125)

Use this command to configure the timeout period before the router takes over as the

A50010-Y3-C150-2-7619

285

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

querier for the interface after the previous querier has stopped querying.
Command

Mode

Description
Configures the IGMP queier timeout.
60-300: number of seconds that router waits after the

ip igmp querier-timeout
<60-300>

Interface

previous querier has stopped querying before it takes
over as the querier
Returns to the default value. (255)

no ip igmp querier-timeout

IGMP Maximum Response Time
To configure the maximum response time advertised in IGMP queries, use the following
command. If the router is running IGMP v2, you can change this value.
Command
ip

igmp

Mode

Configures the IGMP queier timeout.

query-max-response-

time <1-240>

Description

1-240: Maximum response time (in seconds) adverInterface

no ip igmp query-max-response-

tised in IGMP queries.
Returns to the default value. (10)

time

IGMP v2 Group-specific or IGMP v3 Group-source-specific Query Message
The Last Member Query Count is the number of Group-Specific Queries sent before the
router assumes there are no local members. The Last Member Query Count is also the
number of Group-and-Source-Specific Queries sent before the router assumes there are
no listeners for a particular source.
To configure the last member query count, use the following command.
Command
ip

igmp

Mode

Configures the IGMP last member query count.

last-member-query-

count <2-7>

Description

Interface

no ip igmp last-member-query-

2-7: last member query count value
Returns to the default value. (2)

count

When a router receives an IGMP Version 2 leave group message on an interface, it waits
twice the query interval specified by the ip igmp last-member-query-interval command;
after which, if no receiver has responded, the router drops the group membership on that
interface.
To configure the last member query interval, use the following command
Command
ip

igmp

no ip igmp last-member-query-

286

Description
Configures the IGMP last member query interval.

last-member-query-

interval <1000-25500>

interval

Mode

1000-25500: frequency at which IGMP group-specific
Interface

host query messages are sent. (unit: millisecond)
Returns to the default value. (1000 milliseconds)

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.2.4

UMN:CLI

IGMP v2 Fast Leave
In IGMP version 2, you can minimize the leave latency of IGMP memberships. This command is used when only one receiver host is connected to each interface.
When this command is not configured, the router sends an IGMP group-specific query
message upon receipt of an IGMP Version 2 group leave message. The router stops forwarding traffic for that group only if no host replies to the query within the timeout period.
The timeout period is determined by the ip igmp last-memberquery-interval command
and the IGMP robustness variable, which is defined by the IGMP specification. By default,
the timeout period is 2 seconds.
When the ip igmp immediate-leave command is enabled on an interface, the router
does not send IGMP group specific host queries on receiving an IGMP Version 2 leave
group message from that interface. Instead, the router immediately removes the interface
from the IGMP cache for that group, and informs the multicast routing protocols.
To configure the IGMP v2 fast leave, use the following command.
Command

Mode

Configures the IGMP fast leave function.

ip igmp immediate-leave grouplist {<1-99> | <1300-1999> |
WORD}

1-99: access list number
Interface

1300-1999: access list number (expanded range)
WORD: IP named standard access list
Disables the fast leave configuration.

no ip igmp immediate-leave

9.2.2.5

Description

Displaying the IGMP Configuration
To display the multicast groups and related information, use the following command.
Command

Mode

Description

show ip igmp groups [detail]
show ip igmp groups A.B.C.D
[detail]

show ip igmp groups INTERFACE [detail]

show ip igmp groups INTERFACE A.B.C.D [detail]

show ip igmp interface
show ip igmp interface INTER-

Displays the multicast groups with receivers directly
Enable

connected to the router and learned through IGMP.

Global
Bridge

Displays multicast-related information about an interface.

FACE

A50010-Y3-C150-2-7619

287

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.3

L2 MFIB
Occasionally, unknown multicast traffic is flooded because a MAC address has timed out
or has not been learned by the switch. To guarantee that no multicast traffic is flooded to
the port, use the following command.
Command

Mode

Description

ip unknown-multicast block

Configures the blocking of unknown multicast traffic.

ip unknown-multicast

Configures the blocking of unknown multicast traffic for

port PORTS

block

Global

a specific port.

no ip unknown-multicast block
Returns to the normal forwarding states.

no ip unknown-multicast port
PORTS

9.2.4

9.2.4.1

block

IGMP Snooping Basic Configuration

Enabling IGMP Snooping per VLAN
The hiD 6615 S223/S323 supports 256 Snooping Membership Group Table that are
managed by each VLAN. Snooping supports Enable/Disable by VLAN independently. By
default, IGMP snooping is globally disabled on the switch.
To enable/disable global IGMP, use the following steps.
Step 1
Open Global Configuration mode using the configure terminal command.
Step 2
Execute the ip multicast-routing command.
Step 3
Enable IGMP snooping in all existing VLAN interfaces.
Command
ip igmp snooping

Mode
Global

Description
Enables IGMP snooping globally.

Step 4
Return to Privileged EXEC Enable mode using exit command. To globally disable IGMP
snooping on all VLAN interfaces, use the no ip igmp snooping command. In Global
Configuration mode, follow these steps to enable IGMP snooping on a VLAN interface.
Step 1
Open Global Configuration mode using the configure terminal command.
Step 2
Execute the ip multicast-routing command.

288

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Step 3
Enable IGMP snooping on a VLAN interface.
Command
ip igmp snooping vlan VLANS

Mode
Global

Description
Enables IGMP snooping on a VLAN interface.
VLANS: 1-4094

Step 4
Return to Privileged EXEC Enable mode using the exit command.
To diable IGMP snooping on a VLAN interface, use the no ip igmp snooping vlan
VLANS command for the specified VLAN number.
To display global IGMP, use the following command.
Command
show ip igmp snooping [vlan
VLANS]

9.2.4.2

Mode

Description

Enable
Global

Shows IGMP snooping configuration.

Bridge

Robustness Count for IGMP v2 Snooping
Configure the robustness variable on a VLAN basis, using the following command.
Command

Mode

ip igmp snooping [vlan VLANS] robustnessvariable <1-7>
no ip igmp snooping [vlan VLANS] robustnessvariable

9.2.5

Description
Configures the robustness variable.

Global
Returns to the default value.

IGMP v2 Snooping
Layer 2 switches can use IGMP snooping to constrain the flooding of multicast traffic by
dynamically configuring Layer 2 interfaces so that multicast traffic is forwarded to only
those associated with IP multicast devices. Internet Group Management Protocol (IGMP)
is the internet protocol that helps to inform multicast groups to multicast router. In the multicast network, multicast router sends only IGMP query massage that quest whether receive multicast packet when multicast packet is transmitted. If a switch sends the join
massage to multicast router, multicast router transmits the multicast packet only to that
switch.

A50010-Y3-C150-2-7619

289

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Multicast Packet

hiX 5430
Multicast Router
2. Transmit the Multicast packet to
the port that send join massage

Multicast Join request

1. Request the
Multicast Packet

Multicast Packet

Fig. 9.4

IP Multicasting

IGMP Snooping is a function that finds port, which sends「Join message」to join in
specific multicast group to receive multicast packet or「Leave message」to get out of
the multicast group because it does not need packets.
Only when the switch is connected to multicast router, IGMP Snooping can be enabled.

9.2.5.1

IGMP v2 Snooping Fast Leave
If the Multicast client sends the leave massage to leave out Multicast group, Multicast
router sends IGMP Query massage to the client again, and when the client does not respond, delete the client from the Multicast group.
In IGMP v2, even after Host sent Leave Message, it receives Multicast Traffic until sending Specific Query. In Snooping Fast-Leave Enable mode, it sends no more Multicast
Traffic immediately by deleting from Membership Table when receive Leave Message
without sending Specific Query.
Command

Mode

ip igmp snooping immediateleave
ip igmp snooping vlan VLANS
immediate-leave

290

Description
Configures the fast-leave on the system.

Global
Configures the fast-leave on a VLAN interface.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To disable IGMP snooping fast-leave, use the following command.
Command

Mode

no ip igmp snooping immediateleave

Description
Deletes the fast-leave.

Global

no ip igmp snooping vlan VLAN-

Deletes the fast-leave on a VLAN interface.

ID immediate-leave

To display IGMP snooping Immediate Leave configuration, use the following command.
Command
show ip igmp snooping [vlan
VLANS]

9.2.5.2

Mode
Enable
Global
Bridge

Description
Shows that the IGMP snooping Immediate leave is
enabled.

IGMP v2 Snooping Querier
You can use the hiD 6615 S223/S323 as IGMP querier without multicast router, because
IGMP query daemon has been installed in the hiD 6615 S223/S323. Legacy equipments
used IGMP Querier of PIM but not developed Querier for IGMP Snooping. Because of
this, to operate Querier on IGMP Snooping, IP Address was mandatory and Specific
Query was operated by IGMP Querier.
The hiD 6615 S223/S323 implemented IGMP Snooping Querier and it operates differently
with IGMP Query. IGMP Snooping Querier can send General Query from Snooping
Switch and it should be distinguished with Specific Query. IGMP Snooping Querier also
uses Source IP Address 0.0.0.0, if there is no IP Address on Switch.
Enabling IGMP Snooping Querier
To enable the IGMP Snooping querier, use the following command.
Command

Mode

Description

ip igmp snooping querier ad-

Enables the IGMP snooping querier on the system.

dress A.B.C.D

A.B.C.D: Source address for IGMP v2 snooping querier
Global

ip igmp snooping vlan VLANS

Enables the IGMP snooping querier on a VLAN interface.

querier address A.B.C.D

VLANS: VLAN ID

To disable IGMP querier, use the following command.
Command

Mode

no ip igmp snooping querier
address

Description
Disables the IGMP snooping querier.

Global

no ip igmp snooping vlan VLAN-

Disables the IGMP snooping querier on a VLAN inter-

NAME querier address

face.

A50010-Y3-C150-2-7619

291

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The Query Interval of IGMP v2 Snooping Querier
To configure a query interval of the querier, use the following command.
Command

Mode

Description
Configures the IGMP snooping querier query interval
on the system.

ip igmp snooping querier query-

1-1800: IGMP snooping querier query interval in sec-

interval <1-1800>
Global

onds
Enables the IGMP snooping querier on a VLAN inter-

ip igmp snooping vlan VLANS

face.

querier query-interval <1-1800>

VLANS: VLAN ID

To disable the query interval of the querier, use the following command.
Command

Mode

no ip igmp snooping querier
query-interval
no

ip

igmp

Disables the IGMP snooping querier interval.
Global

snooping

Description

vlan

Disables the IGMP snooping querier interval on a
VLAN interface.

VLANS querier query-interval

The Timeout Value of IGMP v2 Snooping Querier’s General Query
Use this following command to configure the max response time in which the reply for the
IGMP snooping query being sent should be received.
Command

Mode

Description
Configures the IGMP snooping max-response-time

ip igmp snooping querier max-

interval on the system.

response-time <1-25>
Global

1-25: The maximum response time in seconds

ip igmp snooping vlan VLANS

Enables the IGMP snooping max-response-time on a

querier max-response-time <1-

VLAN interface.

25>

VLANS: VLAN ID

To disable the max-response-time, use the following command.
Command

Mode

no ip igmp snooping querier

Disables the IGMP snooping max-response-time inter-

max-response-time

val.

no

ip

igmp

snooping

vlan

VLANS querier max-response-

time

292

Description

Global

Disables the IGMP snooping max-response-time on a
VLAN interface.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To display IGMP query parameter, use the following command.
Command

Mode

show ip igmp snooping [vlan
VLANS] querier [detail]

9.2.5.3

Description

Enable
Global

Verifies that the IGMP snooping querier is enabled.

Bridge

IGMP v2 Snooping Last-Member-Interval
When receive Leave Message from host in IGMP v2, Querier sends Specific Query and
check whether there is Multicast Group Member. Basically, if Membership Report about
First Specific Query does not come, after 1 second, send second Specific Query. If there
is no response also, it deleted from Membership Table. Last-member-interval is the value
to regulate gap between first Specific Query and second Specific Query. By limiting Interval value, IGMP v2 function and fast Leave can be implemented.
To send IGMP Query message and configure the respond time, use the following command.
Command

Mode

Configures the time of registering in multicast group

ip igmp snooping last-memberquery-interval <100-10000>

after sending Join message on the system. (unit: ms)

ip igmp snooping vlan VLANS

Global

last-member-query-interval

Configures the time of registering in multicast group
after sending Join message on a VLAN interface.

<100-10000>

i

Description

If you configure ip igmp snooping fast-leave, it is meaningless to register time as multicast group.
To release the waiting time for respond after sending IGMP Query message, use the following command.
Command
no

ip

igmp

snooping

Mode

Returns to the default time of registering Join message

last-

in multicast group after sending it.

member-query-interval
no

ip

VLANS

interval

A50010-Y3-C150-2-7619

igmp

snooping

Description

vlan

last-member-query-

Global

Returns to the default time of registering Join message
after sending it on a VLAN interface.

293

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.5.4

IGMP v2 Snooping Report Method
When IGMP report suppression is enabled, the switch forwards only one IGMP report per
multicast router query. When report suppression is disabled, all IGMP reports are forwarded to the multicast routers.
Command
ip

igmp

snooping

Mode

Configures the IGMP report suppression on the sys-

report-

suppression

Description

Global

tem.

ip igmp snooping vlan VLANS

Configures the IGMP report suppression on a VLAN

report-suppression

interface.

IGMP report suppression is supported only when the multicast query has IGMP v1 and
IGMP v2 reports. This feature is not supported when the query includes IGMP v3 reports.
To disable IGMP snooping report suppression, use the following command.
Command

Mode

no ip igmp snooping reportsuppression
no

ip

igmp

Deletes the IGMP report suppression on the system.
Global

snooping

Description

vlan

Deletes the IGMP report suppression on a VLAN interface.

VLANS report-suppression

To display the IGMP Report Suppression configuration, use the following command.
Command
show ip igmp snooping [vlan
VLANS]

9.2.5.5

Mode

Description

Enable
Global

Shows that the IGMP report suppression is enabled

Bridge

Mrouter Port
Configuring Mrouter Port per VLAN
You can designate, to which port, the multicast router is connected. If you designate multicast router is connected to where, it is possible to transmit multicast packet or message
only to that port.
To designate the port connected to multicast router, use the following command.
Command

Mode

Description
Designates the port where multicast router is connected to on the system.

ip igmp snooping mrouter port
{PORTS | cpu}

294

Global

PORTS: logical port number ID to use
cpu: identifies the CPU port to use.

ip igmp snooping vlan VLANS

Designates the port where multicast router is con-

mrouter port {PORTS | cpu}

nected to on a VLAN interface.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To disable the port where multicast router is connected, use the following command.
Command

Mode

Description

no ip igmp snooping mrouter

Disables the port where multicast router is connected

port {PORTS | cpu}

on the system

no

ip

igmp

snooping

vlan

Global

VLANS mrouter port {PORTS |

Disables the port where multicast router is connected
on a VLAN interface.

cpu}

Mrouter Port Learning Method
For the hiD 6615 S323, multicast-capable router ports are added to the forwarding table
for every Layer 2 multicast entry. The switch learns such ports through snooping on PIM
packets. The switch snoops on PIM packets on all VLANs.
To configure Mrouter port learning method, use the following commands.
Command

Mode

Description

ip igmp snooping mrouter learn

Configures the mrouter port learning method on the

pim

system.

ip igmp snooping vlan VLANS

Configures the mrouter port learning method on a

mrouter learn pim

Global

VLAN interface.

no ip igmp snooping mrouter

Disables the mrouter port learning method on the sys-

learn pim

tem.

no

ip

igmp

snooping

Disables the mrouter port learning method on a VLAN

vlan

interface.

VLANS mrouter learn pim

Displaying Mrouter Configuration
To display IGMP snooping mrouter configuration, use the following command.

9.2.5.6

Command

Mode

Description

show ip igmp snooping mrouter

Enable

Shows the mrouter configuration on the system.

show ip igmp snooping vlan

Global

Shows the mrouter configuration and detail information

VLANS mrouter

Bridge

on a VLAN interface.

Multicast TCN Flooding
An IGMP snooping-disabled switch does not flood multicast traffic to all ports in a VLAN
when a spanning-tree Topology Change Notification (TCN) is received. A topology can
change in a VLAN and it may invalidate previously learned IGMP snooping information. A
host that was on one port before the topology change may move to another port after the
topology change. The hiD 6615 S223/S323 switch helps to deliver multicast traffic is delivered to all multicast receivers in that VLAN when the topology changes. When the
spanning tree protocol is running in a VLAN, a spanning tree topology change notification
(TCN) is issued by the root switch in the VLAN.

A50010-Y3-C150-2-7619

295

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To flood multicast traffic when TCN packet is received, use the following command.
Command

Mode

Designates the port where multicast router is con-

ip igmp snooping tcn flood
Global

ip

igmp

snooping

tcn

Description

vlan

nected to on the system.
Designates the port where multicast router is connected to on a VLAN interface.

VLANS flood

With the ip igmp snooping tcn flood query count command, you can enable multicast
flooding on a switch for a short period of time following a topology change by configuring
an IGMP query threshold.
Command
ip igmp snooping tcn flood
query count <1-10>

Mode
Global

Description
Configures IGMP snooping TCN flood query count.
1-10: number of IGMP queries

To configure the interval of incoming IGMP General Query, use the following command.
Command
ip igmp snooping tcn flood
query interval <1-1800>

Mode
Global

Description
Configures IGMP snooping TCN flood query Interval.
1-1800: Seconds

With the ip igmp snooping tcn query solicit command, you can direct a non-spanning
tree root switch to issue the same query solicitation.
Command
ip igmp snooping tcn query
solicit [address A.B.C.D]

Mode

Description
Configures the switch to send a query solicitation when

Global

a TCN is detected on the system.
address: query solicitation source IP address

To stop the switch from sending a query solicitation, enter the no ip igmp snooping tcn
query solicit command.
To diable the configured TCN flood settings, use the following commands.
Command

Mode

Disables multicast flooding on the switch.

no ip igmp snooping tcn flood
no ip igmp snooping tcn vlan

Disables multicast flooding on a VLAN interface.

VLANS flood

no ip igmp snooping tcn flood
query count
no ip igmp snooping tcn flood
query interval
no ip igmp snooping tcn query
solicit [address]

296

Description

Global

Returns to the default number of IGMP queries.

Returns to the default interval of IGMP queries.

Stops the switch from sending a query solicitation.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.6

UMN:CLI

IGMP v3 Snooping
This chapter consists of these sections
• IGMP Snooping Version
• Join Host Management
• Immediate Block

9.2.6.1

IGMP Snooping Version
The reports sent to the multicast router are sent based on the version of that interface. A
user can administratively configure the version of the port as 1 or 2. If the user has configured the version specifically, the reports are always sent out with only this version. If
the user has not administratively configured the version value, and a v1 query is received
on an interface, this interface is made a v1 interface, and all reports sent out of this interface are v1 reports. If no v1 query is received on an interface for the v1 router present
timeout period (400 seconds), the interface version goes back to its default value (2).
To configure the version of the IGMP reports sent out of a port, use the following command.
Command

Mode

Description
Configures the version of IGMP report on the system.

ip igmp snooping version <1-3>
Global

1-3: IGMP report version

ip igmp snooping vlan VLANS

Configures the version of IGMP report on a VLAN inter-

version <1-3>

face.

To return to the default version of IGMP report, use the no parameter command.

9.2.6.2

Join Host Management
Explicit host tracking is supported only with IGMP v3 hosts.
With explicit host tracking enabled, the switch is in its proxy-reporting mode. In proxyreporting mode, the switch forwards the first report only for a source-multicast group pair
to the router, and suppresses all other reports for the same pair. With IGMP v3 proxy reporting, the switch does proxy reporting for unsolicited reports and reports that are received in the general query interval. By enabling explicit tracking, the router might not be
able to track all the hosts that are behind a VLAN interface.
With proxy reporting disabled, the switch works in transparent mode, and updates the
IGMP snooping database as it receives reports, then forwards this information to the upstream router. The router can then explicitly track all reporting hosts.
To enable explicit host tracking on a VLAN, use the following command.
Command
ip

igmp

snooping

Mode
explicit-

tracking
ip igmp snooping vlan VLANS
explicit-tracking

A50010-Y3-C150-2-7619

Description
Enables explicit host tracking on the system.

Global
Enables explicit host tracking on a VLAN interface.

297

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To display a configuration, use the following command.

9.2.6.3

Command

Mode

show ip igmp snooping explicit-

Enable

tracking {vlan VLANS | port

Global

PORTS | group A.B.C.D}

Bridge

Description

Shows a configuration.

Immediate Block
For a Layer 2 IGMP v2 host interface to join an IP multicast group, a host sends an IGMP
membership report for the IP multicast group. For a host to leave a multicast group, it can
either ignore the periodic IGMP general queries or it can send an IGMP leave message.
When the switch receives an IGMP leave message from a host, it sends out an IGMP
group-specific query to determine whether any devices connected to that interface are interested in traffic for the specific multicast group. The switch then updates the table entry
for that Layer 2 multicast group so that only those hosts interested in receiving multicast
traffic for the group are listed.
However, IGMP v3 hosts send IGMP v3 membership reports (with the allow group record
mode) to join a specific multicast group. When IGMP v3 hosts send membership reports
(with the block group record) to reject traffic from all sources in the previous source list,
the last host on the port will be removed by immediate-leave.
To configure the Immediate Block, use the following command.
Command

Mode

ip igmp snooping immediateblock
ip igmp snooping vlan VLANS
immediate-block

9.2.7

Description
Enables immediate block on the system.

Global
Enables immediate block on a VLAN interface.

Multicast VLAN Registration (MVR)
Multicast VLAN Registration (MVR) is for applications using wide-scale deployment of
multicast traffic across an Ethernet ring-based service provider network. MVR allows a
subscriber on a port to subscribe or not to a multicast stream on the network-wide multicast VLAN. It allows the single multicast VLAN to be shared in the network with subscribers remaining in separate VLANs. MVR helps to continuously send multicast streams in
the multicast VLAN, but to isolate the streams from the subscriber VLANs for bandwidth
and security reasons.
MVR assumes that subscribers subscribe or not (join and leave) these multicast streams
by sending out IGMP join and leave messages. These messages can originate from an
IGMP version-2-compatible host. Although MVR operates on the underlying mechanism
of IGMP snooping, the two features operate independently of each other. One can be enabled or disabled without affecting the behavior of the other feature. However, if IGMP
snooping and MVR are both enabled, MVR reacts only to join and leave messages from
multicast groups configured under MVR. Join and leave messages from all other multicast groups are managed by IGMP snooping.

298

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.7.1

UMN:CLI

Enabling MVR
To use the MVR, enable the MVR function with the following command.
Command
mvr

Mode
Global

no mvr

9.2.7.2

Description
Enables MVR on the system.
Disables MVR on the system.

MVR Group Address
Statically configure a VLAN interface to receive multicast traffic sent to the multicast
VLAN and the IP multicast address. An interface statically configured as a member of a
group remains a member of the group until statically removed.
Command
mvr vlan VLAN group GROUPADDR

Mode

Description
Configures MVR group address.

Global

GROUP-ADDR: specific group address (ex: a.b.c.d or
a.b.c.d-x.y.z.w)

To delete the statically configured MVR group address, use the following command.
Command
no mvr vlan VLAN group
GROUP-ADDR

9.2.7.3

Mode

Description
Deletes a MVR group address.

Global

GROUP-ADDR: specific group address (ex: a.b.c.d or
a.b.c.d-x.y.z.w)

MVR IP Address
Statically configure a VLAN interface to receive multicast traffic sent to the multicast
VLAN and the IP multicast address. An interface statically configured as a member of a
group remains a member of the group until statically removed.
When a multicast server belongs to different network from user’s network, a multicast
router operates as Layer 3 forwarding for each MVR VLAN. In this case, when an IGMP
packet of a subscriber is transmitted to the multicast server, a source address of the
IGMP packet may not match the network address of MVR VLAN. To handle such a problem, you can replace a source address of an IGMP packet with one of the IP addresses of
MVR VLAN.
To configure a helper address to replace a source address of an IGMP packet, use the
following command.
Command
mvr vlan VLAN helper
IP-ADDRESS

A50010-Y3-C150-2-7619

Mode
Global

Description
Configures MVR group address.
IP ADDRESS: specific IP address

299

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To delete the statically configured MVR group address, use the following command.
Command
no mvr vlan VLAN helper

9.2.7.4

Mode
Global

Description
Deletes a MVR group address.
IP ADDRESS: specific IP address

Send and Receive Port
Statically configure a VLAN interface to receive multicast traffic sent to the multicast
VLAN and the IP multicast address. An interface statically configured as a member of a
group remains a member of the group until statically removed.
Command
mvr port PORTS type {receiver |
source}

Mode
Global

Description
Configures MVR port.
PORTS: port number

•

Source
This configures uplink ports that receive and send multicast data as source ports.
Subscribers cannot be directly connected to source ports. All source ports on a switch
belong to the single multicast VLAN.

•

Receiver
This configures a port as a receiver port if it is a subscriber port and should only receive multicast data. It does not receive data unless it becomes a member of the
multicast group, either statically or by using IGMP leave and join messages. Receiver
ports cannot belong to the multicast VLAN.

To delete the statically configured MVR port, use the following command.
Command
no mvr port PORTS

9.2.7.5

Mode
Global

Description
Deletes a MVR port.

Displaying MVR Configuration
To display an MVR configuration, use the following command.
Command

Mode

Description

show mvr
show mvr port

Enable
Global

Shows a configuration.

show mvr vlan VLANS

9.2.8

IGMP Filtering and Throttling
With the IGMP filtering feature, you can filter multicast joins on a per-port basis by configuring IP multicast profiles and associating them with individual switch ports. An IGMP profile can contain one or more multicast groups and specifies whether access to the group
is permitted or denied. If an IGMP profile denying access to a multicast group is applied
to a switch port, the IGMP join report requesting the stream of IP multicast traffic is

300

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

dropped, and the port is not allowed to receive IP multicast traffic from that group. If the
filtering action permits access to the multicast group, the IGMP report from the port is
forwarded for normal processing.
IGMP filtering controls only group specific query and membership reports, including join
and leave reports. It does not control general IGMP queries. IGMP filtering has no relationship with the function that directs the forwarding of IP multicast traffic.

9.2.8.1

Creating IGMP Profile
You can create or modify the IGMP profile to be used for filtering IGMP join requests from
a port. The system prompt will be changed to SWITCH(config-igmp-profile[N])# from
SWITCH(config)#.
Command
ip igmp profile <1-2147483647>

Mode
Global

Description
Configures IGMP profile.

To delete the created IGMP profile, use the no ip igmp profile <1-2147483647> command on global mode.
To display the IGMP profile, use the following command.
Command

Mode

Description

Enable

show ip igmp profile [<1-2147483647>]

Global

Shows IGMP profile.

Bridge

9.2.8.2

Policy of IGMP Profile
Configure the action to permit or deny access to the IP multicast address using the following command.
Command
{permit | deny}

9.2.8.3

Mode
IGMP
Profile

Description
Configures the action of IGMP profile.

Group Range of IGMP Profile
Configure the group range of IGMP Profile using the following command.
Command

Mode

Description
Configures a group range.

range A.B.C.D [A.B.C.D]
no range A.B.C.D [A.B.C.D]

A50010-Y3-C150-2-7619

IGMP

A.B.C.D: low IP multicast address

Profile

A.B.C.D: high IP multicast address
Deletes a configured group range.

301

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.8.4

Applying IGMP Profile to the Filter Port
To apply the configured IGMP Profile to the filter port, use the following command.
Command
ip igmp filter port PORTS profile
<1-2147483647>

Mode

Description
Configures IGMP profile.

Global

PORTS: port number
1-2147483647: number of configured IGMP profile

To cancel the applying of the profile, use the following command.
Command
no ip igmp filter port PORTS

Mode
Global

Description
Disables an applied IGMP profile.
PORTS: port number

To display the IGMP filter configuration, use the following command.
Command

Mode

Description

Enable

show ip igmp filter [port PORTS]

Global

Shows a configuration.

Bridge

9.2.8.5

Max Number of IGMP Join Group
You can configure the maximum number of IGMP groups that a Layer 2 interface can join.
To configure the maximum number of IGMP groups per port, use the following command.
Command

Mode

Description
Configures the maximum number of IGMP groups.

ip igmp max-groups port PORTS
count <0-2147483647>

Global

PORTS: port number
0-2147483647: maximum number of IGMP groups that
the port can join

To return to the default setting, use the following command.
Command
no ip igmp max-groups port
PORTS count

302

Mode
Global

Description
Returns to the default of no maximum.
PORTS: the number of port

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.2.9

UMN:CLI

Displaying IGMP Snooping Table
To display an IGMP snooping table, use the following command.
Command

Mode

Description

show ip igmp snooping groups
[IP-ADDRESS]

show ip igmp snooping groups
port [PORT| cpu]
show ip igmp snooping groups

Enable
Global

Shows a configuration.

Bridge

vlan VLANS
show ip igmp snooping groups
mac-based

9.3

PIM-SM (Protocol Independent Multicast-Sparse Mode)
IGMP is the protocol to help multicast communication between switch and host, but PIM
is the protocol for multicast communication between router and router. There are two
kinds of PIM, PIM-DM (Protocol Independent Multicast–Dense Mode) and PIM-SM (Protocol Independent Multicast–Sparse Mode), the hiD 6615 S323 supports PIM-SM only.
Protocol of dense mode can send information about data packet and member to interface,
which is not connected to multicast source or receiver, and multicast router saves connection state to all the nodes. In this case, when most hosts are belonged to multicast
group and there is enough bandwidth to support flow of controlling message between
constituent members, these overheads are acceptable, but the other cases are inefficient.
Contrary to dense mode, PIM-SM receives multicast packet only when request comes
from specific host in multicast group. Therefore PIM-SM is proper when constituent members of group are dispersed in wide area or bandwidth used for the whole is small. Sparse
mode is the most useful on WAN and can be used on LAN. For standard of PIM-SM, you
can refer to RFC 2362.
RPT and SPT
RP (Rendezvous Point) works in a central role for PIM-SM. Viewing the below chart, multicast packet is transmitted to D as RP from A as source, through B and C. And D (RP)
transmits multicast packet after receiving join message from E or F. That is, all multicast
packets are transmitted with passing through RP (Rendezvous Point). For instance, even
though F needs multicast packet, the packet is passed through『A→B→C→D→C→F』,
not『A→B→C→F』.
Like this, route made with focusing on RP is RPT (Rendezvous Point Tree) or shared tree.
There is only one RP in one multicast group. RPT has (*, G) entry because receiver can
send a message to RP without knowing source. “G” means multicast group.

A50010-Y3-C150-2-7619

303

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

1. Multicast packet
transmitted to RP

B
2. Ask RP for
multicast packet
E

A

D
2. Ask RP for
multicast packet

RP
(Rendezvous Point)

3. RP transmits multicast
packet for the request
C

F
3. RP transmits multicast
packet for the request

RPT of PIM-SM

Fig. 9.5

Also, routers on packet route automatically optimize route by deleting unnecessary hops
when traffic exceeds certain limit. After route to source and multicast group connected to
the source are constituted, all sources have route to connect to receiver directly.
In the below figure, packets are usually transmitted through『A→B→C→D』, but packets
are transmitted through faster route『A→C→F』when traffic is increased. SPT (ShortestPath Tree) selects the shortest route between source and receiver regardless of RP, it is
called source based tree or short path tree. SPT has (S, G) entry, “S” means source address and “G” means multicast group.
4. Optimized route by deleting unnecessary
A

hops when traffic exceeds certain limit

2. Ask RP for
multicast packet

1. Multicast packet
transmitted to RP
Source

D
B

C
E

RP
(Rendezvous Point)

3. RP transmits multicast
packet for the request

Fig. 9.6

9.3.1

!

304

F

STP of PIM-SM

PIM Common Configuration
Routing functionalities such as RIP, OSPF, BGP and PIM-SM are only available for hiD
6615 S323. (Unavailable for hiD 6615 S223)

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.3.1.1

UMN:CLI

PIM-SM and Passive Mode
You need to open Interface Configuration mode of specified interface for activating PIMSM on Ethernet interface. To open Interface Configuration mode, use the following command.
Command

Mode

interface INTERFACE

Global

Description
Opens Interface Configuration mode of specified interface.

To disable Interface Configuration mode, use the following command.
Command
no interface INTERFACE

Mode
Global

Description
Disables a specified interface.

To activate PIM-SM after opening the Interface Configuration mode, use the following
command.
Command
ip pim sparse-mode [passive]

Mode
Interface

Description
Activates PIM-SM on specified interface.

The ip pim sparse-mode passive command enables passive mode operation for local
members on the interfaces. Passive mode essentially stops PIM transactions on the interface, allowing only IGMP mechanism to be active. To turn off passive mode, use the ip
pim sparse-mode passive or the ip pim sparse-mode command.
To disable PIM-SM, use the following command.

9.3.1.2

Command

Mode

no ip pim sparse-mode [passive]

Interface

Description
Disables PIM-SM from specified interface.

DR Priority
To set the priority for which a router is elected as the designated router (DR), use the following command in interface configuration mode.
Command

Mode

Configures the priority for router.

ip pim dr-priority
<0-4294967294>
no ip pim dr-priority

Description

Interface

0-4294967294: priority value
Returns to the default value 1.

The router with the highest priority value configured on an interface will be elected as the
DR. If this priority value is the same on multiple routers, then the router with the highest
IP address configured on an interface will be elected as the DR. If a router does not advertise a priority value in its hello messages, the router is regarded as having the highest
priority and will be elected as the DR. If there are multiple routers with this priority status,
then the router with the highest IP address configured on an interface will be elected as

A50010-Y3-C150-2-7619

305

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

the DR.

9.3.1.3

Filters of Neighbor in PIM
Enable filtering of neighbors on the interface. When configuring a neighbor filter-PIM-SM
will either not establish adjacency with the neighbor, or terminate adjacency with the existing neighbors-if denied by filtering access list.
To configure the filtering of neighbor in PIM, use the following command.
Command

Mode

Configures the filtering of neighbor in PIM.

ip pim neighbor-filter {<1-99> |
ACCESS-LIST}

1-99: simple access list
Interface

no ip pim neighbor-filter {<1-99>

ACESS-LIST: IP named standard access list
Disables the filtering configuration.

| ACCESS-LIST}

9.3.1.4

Description

PIM Hello Query
To configure a query hold time, use the following command.
Command

Mode

Configures the query hold time.

ip pim query-holdtime
<1-65535>

Description

Interface

1-65535: hello message hold time (unit: second)
Disables the query hold time configuration.

no ip pim query-holdtime

When configuring query hold time, if the configured value is less than the current query
interval, it is refused.
To configure the frequency of hello interval value, use the following command.
Command
ip pim query-interval <1-18724>
no ip pim query-interval

306

Mode

Description
Configures the frequency of hello time.

Interface

1-18724: hello message interval (unit: second)
Disables the hello message interval configuration.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.3.1.5

UMN:CLI

PIM Debug
To activate PIM-SM debugging, use the following command.
Command

Mode

Description
Activates PIM debugging.
all : all PIM debugging
events: PIM events

debug pim {all | events | nexthop

nexthop: PIM-SM nexthop communications

| mib | mfc | nsm | packet [in |

mib: PIM-SM MIBs

out] | state | timer}

mfc: MFC add/delete/update
nsm: PIM-SM network service module communications
packet: incoming and/or outgoing packets
Enable

debug pim timer assert [at]

Enables the PIM-SM assert timers debugging.

debug pim timer bsr [bst | crp]

Enables the PIM-SM BSR timer’s debugging.

debug pim timer hello [ht | nlt |
tht]
debug pim timer joinprune [ jt |
et | ppt | kat | ot ]
debug pim timer register [rst]

9.3.2

state: state transition on all PIM-SM FSMs

Enables the PIM-SM Hello timer’s debugging.

Enables the PIM-SM JoinPrune timer’s debugging.
Enables the PIM-SM register timer’s debugging.

BSR and RP
There are two ways to decide RP as central of PIM-SM on multicast network. One is that
network administrator manually decides RP and the other way is that RP is automatically
decided by exchanging information between multicast routers installed on network. The
information transmitted between multicast routers in the automatic way is called Bootstrap
message and the router, which sends this Bootstrap message, is called BSR (Bootstrap
Router). All PIM routers existing on multicast network can be BSR.
Routers that want to be BSP are named as candidate-BSR and one router, which has the
highest priority, becomes BSR among them. If there are routers, which have same priority,
then one router, which has the highest IP address, becomes BSR. Bootstrap message includes priority to decide BSR, hash-mark to be used in Hash, and RP information. After
deciding BSR, routers, which support RP, transmit candidate-RP message to BSR. Candidate-RP message includes priority, IP address, and multicast group. Then BSR adds
candidate-RP message to Bootstrap message and transmits it to another PIM router.
Through this transmitted Bootstrap message, RP of multicast group is decided.
User’s equipment belonged in PIM-SM network can be candidate-BSR and BSR is decided among them. Candidate-BSR transmits Bootstrap message to decide BSR. You
can configure priority to decide BSR among Bootstrap messages and Hash-mask.

9.3.3

Bootstrap Router (BSR)
The information transmitted between multicast routers in the automatic way is called
Bootstrap message and the router, which sends this Bootstrap message, is called BSR
(Bootstrap Router). All PIM routers existing on multicast network can be BSR. Routers,
which want to be BSP, are named candidate-BSR and one router, which has the highest

A50010-Y3-C150-2-7619

307

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

priority, becomes BSR among them. If there are routers, which have same priority, then
one router, which has the highest IP address, becomes BSR.
It is possible to configure the following messages, which are included in candidate-BSR
message.
Since it is possible to assign several IP addresses in hiD 6615 S323, the switch may have
several IP addresses assigned. User can select one IP address among several IP addresses to be used in switch as candidate-BSR.
When there are same priorities to compare candidate-BSR, IP address is compared
through Hash. User can configure Hash-mask to apply Hash.
If you decide BSR among candidate-BSRs, priority in Bootstrap message is compared to
decide it. The highest priority of candidate-BSR becomes BSR. In order to configure priority of Bootstrap message, use the following command.
To configure candidate-BSR, use the following command.
Command

Mode

Description
Gives the switch the candidate BSR status.

ip pim bsr-candidate
INTERFACE [<0-32>] [<0-255>]

Global

INTERFACE: interface name
0-32: hash mask length for RP selection
0-255: priority for candidate bootstrap switch

To disable assigned IP address in candidate-BSR, use the following command.
Command
no ip pim bsr-candidate

Mode
Global

Description
Disables .the configuration of BSR-candidate.

You can clear all RP sets learned through the PIM Bootstrap Router (BSR) using the following command.
Command
clear ip pim sparse-mode bsr rpset *

9.3.4

Mode
Global

Description
Clears all RP sets.

RP Information
After deciding BSR on multicast network, candidate-RP routers send RP message to BSR.
Candidate-RP message includes priority, IP address, and multicast group. Then, BSR
adds the received candidate-RP information to Bootstrap message and transmit to another PIM router. Through this Bootstrap message, RP of multicast group is decided. All
routers belonged in multicast network can become candidate-RP and routers which generally consist candidate-BSR are supposed to consist candidate-RP. It is possible to configure the following information, which is included in candidate-RP message.

9.3.4.1

Static RP for Certain Group
You can configure several IP addresses on the hiD 6615 S323. Therefore, you need to

308

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

decide which IP address to be used as candidate-RP. This command is used to statically
configure the RP address for multicast groups.
To configure IP address to be used in candidate-RP, use the following command.
Command

Mode

Description
Configures RP address for multicast groups statically.

ip pim rp-address A.B.C.D [<199> | <1300-1999>] [override]

A.B.C.D: IP address
Global

1-99: IP standard access list
1300-1999: IP standard access list (expanded range)
override: override dynamically RP mappings

If RP-address configured through BSR and RP-address configured statically are both
available for a group range, the RP-address configured through BSR is chosen.
If multiple static-RPs are available for a group range, then one with the highest IP
address is chosen.

•
•

To delete configured IP address, use the following command.
Command
no ip pim rp-address A.B.C.D

9.3.4.2

Mode
Global

Description
Deletes configured IP address.

Enabling Transmission of Candidate RP Message
Use this command to give the router the candidate RP status using the IP address of the
specified interface.
Command

Mode

Description
Configures a message for a candidate RP.
INTERFACE: interface name

ip pim rp-candidate INTERFACE
[group-list <1-99>] [interval <1-

Global

16383>] [priority <0-255>]

1-99: IP standard access list
1-16383: advertisement interval (unit: second)
0-255: priority value

To delete configured priority of candidate-RP, use the following command.
Command

Mode

Unconfigures the entire setting of candidate-RP.

no ip pim rp-candidate

Deletes the setting of candidate-RP of specific inter-

no ip pim rp-candidate
Global

INTERFACE

Description

face.

no ip pim rp-candidate
INTERFACE

A50010-Y3-C150-2-7619

group-list <1-99>

309

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.3.4.3

KAT (Keep Alive Time) of RP
You can configure KAT for (S, G) states at RP to monitor PIM Register packets, overriding
the generic KAT timer value.
Command
ip pim rp-register-kat <1-65535>

Mode

Configures Keep Alive Time.
Global

1-65535: time
Disables a KAT configuration.

no ip pim rp-register-kat

9.3.4.4

Description

Ignoring RP Priority
To ignore the RP-SET priority value, and use only the hashing mechanism for RP selection, use the following command. It is used to inter-operate with older Cisco IOS versions.
Command
ip pim ignore-rp-set-priority

Mode
Global

no ip pim ignore-rp-set-priority

9.3.5

9.3.5.1

Description
Ignores the PR-SET priority value.
Deletes the priority ignoring configuration.

PIM-SM Registration

Rate Limit of Register Message
You can configure the rate of register packets sent by the designated router (DR), in units
of packets per second. Enabling this command will limit the load on the DR and RP at the
expense of dropping those register messages that exceed the set limit. Receivers may
experience data packet loss within the first second in which register messages are sent
from bursty sources.
The configured rate is per (S, G) state, not a system wide rate.
Command

Mode

Configures the rate of register packets.

ip pim register-rate-limit
<1-65535>

Global

no ip pim register-rate-limit

9.3.5.2

Description

1-65535: the maximum number of packets that can be
sent per second.
Disables the limit configuration.

Registeration Suppression Time
Use this command to configure the register-suppression time, in seconds, overriding the
default value of 60 seconds. Configuring this value modifies register-suppression time at
the DR, and configuring this value at the RP modifies the RP-keepalive-period value if the
ip pim re-register-kat command is not used.

310

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure the registration suppression time, use the following command.
Command

Mode

Configures the time of registration suppression.

ip pim register-suppression
<1-65535>

Global

1-65535: The register suppression on time in seconds.
Disables the registration suppression time.

no ip pim register-suppression

9.3.5.3

Description

Filters for Register Message from RP
One network may include different multicast groups and routers that are not members of
multicast group. Therefore it can happen that routers, which are members of another
network or not members of multicast group, apply for RP and transmit candidate-RP
message.
To prevent this case, user can block candidate-RP message of another router by making
only candidate-RP in multicast group communicate. In order to block candidate-RP message from routers which are not members, perform the below tasks.

Step 1
Configure filtering out multicast sources.
Command

Mode

Configures multicast source filtering function.

ip pim accept-register list {<100199> | <2000-2699> | ACCESS-

Description

Global

LIST}

100-199: IP extended access-list
2000-2699: IP extended access list (expanded range)
ACCESS-LIST: IP named Standard Access List

Step 2
Allow or deny only the transmitted packets by routers that exchange candidate-RP message.
Command

Mode

Configures multicast source filtering function.

access-list {<100-199> | <20002699>}

{deny

|

permit}

ip

Description

Global

{A.B.C.D | any}

100-199: IP extended access list
2000-2699: IP extended access list (expanded range)
A.B.C.D: address to match

To delete the above configuration, use the following command.
Command
no ip pim accept-register

9.3.5.4

Mode
Global

Description
Releases blocked packet.

Source Address of Register Message
To configure the source IP address of Register packets sent by DR, overriding the default
source IP address, use ip pim register-source command. The configured address must
be a reachable address to be used by the RP to send corresponding Register-Stop mes-

A50010-Y3-C150-2-7619

311

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

sage in response. It is normally the loopback interface address, but can also be other
physical addresses. This address must be advertised by unicast routing protocols on the
DR.
Command

Mode

Configures the source address of register message.

ip pim register-source {A.B.C.D |
Global

INTERFACE}

Description

A.B.C.D: IP address to be used as source
INTERFACE: interface address to be used as source
Disables the registration suppression time.

no ip pim register-source

By default, the IP address of the outgoing interface of the DR leading to the RP is used as
the IP source address of a register message.

9.3.5.5

Reachability for PIM Register Process
To enable the RP reachability verification for PIM Register processing at the DR, use the
following command.
Command

Mode

Enables the RP reachability verification function.

ip pim register-rp-reachability
no

ip

pim

register-rp-reach-

Global

9.3.6

Disables the RP reachability verification function.
(default)

ability

i

Description

This command is disabled by default.

SPT Switchover
This command is used to enable and configure the bandwidth of the switchover from RPT
to SPT for the certain group. If a source sends at a rate greater than or equal to traffic
rate (the kbps value), a PIM join message is triggered toward the source to construct a
source tree. Specifying a group list access list indicates the groups to which the threshold
applies. If the traffic rate from the source drops below the threshold traffic rate, the leaf
router will switch back to the shared tree and send a prune message toward the source.
Command

Mode

Description
Enables the ability for the last-hop PIM router to switch

ip pim spt-threshold

to SPT.

ip pim spt-threshold group-list

Enables the ability for the last-hop PIM router to switch

{<1-99> | <1300-1999> | AC-

to SPT for multicast group addresses specified by the

CESS-LIST}

Global

given access list.

no ip pim spt-threshold
no ip pim spt-threshold grouplist {<1-99> | <1300-1999> | AC-

Disables switching to SPT option.

CESS-LIST}

312

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.3.7

UMN:CLI

PIM Join/Prune Interoperability
To configure the TX interval of PIM/Join/Prune Message, use the following command.
Command

Mode

Configures Join/Prune timer value.

ip pim message-interval
<1-65535>

Global

no ip pim message-interval

9.3.8

9.3.8.1

Description

1-65535: interval (unit: second)
Disables TX interval configuration.

Cisco Router Interoperability

Checksum of Full PIM Register Message
Although source of multicast is not connected to multicast group, multicast communication is possible. In the below picture, First-Hop router directly connected to source can receive packet from source without (S, G) entry about source. The First-Hop router encapsulates the packet in Register message and unicasts to RP of multicast group. RP decapsulates capsule of Register message and transmits it to members of multicast group.

Source
Multicast Packet

First-Hop Router
RP

Encapsulates the packet
in Register message
and unicasts

Decapsulates capsule of
Register message and
transmits it

Fig. 9.7

A50010-Y3-C150-2-7619

In Case Multicast Source not Directly Connected to Multicast Group

313

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

When the Register message is transmitted, the range of Checksum in header conforms to
header part as RFC standard, but whole packet is included in the range of checksum in
case of Cisco router. For compatibility with Cisco router, you should configure the range
of Checksum of Register message as whole packet.
To configure the range of Checksum of Register message as whole packet for compatibility with Cisco router, use the following command.
Command

Mode

Description
Configures the option to calculate the Register check-

ip pim cisco-register-checksum

sum over the whole packet.
Configures the option to calculate the Register check-

ip pim cisco-register-checksum

Global

group-list {<1-99> | <1300-1999>

sum over the whole packet on multicast group specified by the access list.
1-99: simple access-list

| ACCESS-LIST}

1300-1999: simple access list (extended range)
ACCESS-LIST: IP named standard access list

To delete a configured Cisco-compatible checksum option, use the following command.
Command
no

ip

pim

cisco-register-

checksum

i
9.3.8.2

Mode
Global

Description
Deletes a configured value.

This command is disabled by default. And Register Checksum is calculated only over the
header by default.

Candidate RP Message with Cisco BSR
Cisco’s BSR code does not conform to the latest BSR draft, it does not accept candidate
RPs with a group prefix number of zero. To make the hiD 6615 S323 candidate RP work
with a Cisco BSR, use the following command. This command is used to inter-operate
with older Cisco IOS versions.
Command
ip pim crp-cisco-prefix

Mode

Configure the Candidate RP-Message to work with
Global

Cisco BSR
Return to the default setting

no ip pim crp-cisco-prefix

9.3.8.3

Description

Excluding GenID Option
To exclude the GenID option from Hello packets on particular interface for inter-operation
with older Cisco IOS versions, use the following command
Command
ip pim exclude-genid
no ip pim exclude-genid

314

Mode
Interface

Description
Excludes the GenID from hello packets.
Returns to the default setting.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

9.3.9

UMN:CLI

PIM-SSM Group
To define the Source Specific Multicast (SSM) range of IP multicast addresses, use the
following command. When an SSM range of IP multicast addresses is defined by the ip
pim ssm command, no Multicast Source Discovery Protocol (MSDP) Source-Active (SA)
messages will be accepted or originated in the SSM range.
Command

Mode

Defines the SSM range of IP multicast address.

ip pim ssm range {<1-99> | AC-

1-99: simple access list

CESS-LIST}
Global

9.3.10

Description

ACCESS-LIST: IP named standard access list

ip pim ssm default

Configures the SSM by default.

no ip pim ssm

Disables the command.

PIM Snooping
PIM Snooping is used to reduce unnecessary bandwidth by restricting data and multicast
control packets which transmitted between each port. In networks where a Layer 2 switch
interconnects several routers, the switch floods IP multicast packets on all multicast router
ports by default, even if there are no multicast receivers downstream. If PIM Snooping is
enabled, the switch restricts multicast packets for each IP multicast group to only those
multicast router ports that have downstream receivers joined to that group. And the switch
learns which multicast router ports need to receive the multicast traffic within a specific
VLAN by listening to the PIM hello messages, PIM join and prune messages.
To configure PIM Snooping, use the following command.
Command

Mode

Enables PIM Snooping function on the switch.

ip pim snooping
ip pim snooping vlan VLANS

Description

Global

no ip pim snooping

Enables PIM Snooping function on a specific interface.
Disables the PIM Snooping command.

no ip pim snooping vlan VLANS

To delete all L2 PIM snooping multicast groups of a specified port, multicast address or
vlan, use the following command.
Command

Mode

Deletes all PIM snooping groups and source addresses

clear ip pim snooping groups
[A.B.C.D]

clear ip pim snooping groups
[port PORTS]

i

Description

of a specified multicast group address.
Enable
Global
Bridge

Deletes all PIM snooping groups and source addresses
of a specified port.

clear ip pim snooping groups

Deletes all of the multicast router addresses and DR of

[vlan VLANS]

a specified VLAN.

By default, PIM Snooping is disabled. To operate PIM Snooping, IGMP Snooping should
be enabled as well.

A50010-Y3-C150-2-7619

315

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To display the PIM Snooping configuration, use the following command.
Command

Mode

Description
Shows the PIM snooping configuration such as en-

show ip pim snooping

able/disable status and the enabled VLANs.
Shows the multicast router address and DR of a speci-

show ip pim snooping vlan

fied VLAN.

VLANS

show ip pim snooping groups
[A.B.C.D]

Enable
Global

Shows the PIM snooping group, source addresses of a

Bridge

specified VLAN, port or multicast group address.

show ip pim snooping groups

A.B.C.D : Multicast group address

port PORTS

PORTS: Spedify the logical port number to use

show ip pim snooping groups

VLANS: VLAN ID (ex : NAME | X | X-Y)

vlan [VLANS]

9.3.11

Displaying PIM-SM Configuration
To display the information of PIM-SM configuration, use the following command.
Command

Mode

show ip pim bsr-router

Shows Bootstrap router (v2).

show ip pim interface [detail]

Shows PIM interface information.

show

ip

pim

local-members

Shows PIM local membership information.

[INTERFACE]

show ip pim neighbor [detail]
show ip pim mroute [A.B.C.D]

Enable
Global
Bridge

Shows PIM neighbor information.
Shows PIM master router.

show ip pim nexthop

Shows PIM next hops.

show ip pim rp mapping

Shows PIM Rendezvous Point (RP) information.

show ip pim rp-hash A.B.C.D

316

Description

Shows RP to be chosen based on group selected.
A.B.C.D: group address

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

10 IP Routing Protocol
!

10.1

Routing functionalities such as RIP, OSPF, BGP and PIM-SM are only available for hiD
6615 S323. (Unavailable for hiD 6615 S223)

Border Gateway Protocol (BGP)
The Border Gateway Protocol (BGP) is an exterior gateway protocol (EGP) that is used to
exchange routing information among routers in different autonomous systems (AS). BGP
routing information includes the complete route to each destination. BGP uses the routing
information to maintain a database of network reachability information, which it exchanges with other BGP systems. BGP uses the network reachability information to construct a graph of AS connectivity, thus allowing BGP to remove routing loops and en-force
policy decisions at the AS level.
Multiprotocol BGP (MBGP) extensions enable BGP to support IPv6. MBGP defines the
attributes MP_REACH_NLRI and MP_UNREACH_NLRI, which are used to carry IP v6
reachability information. Network layer reachability information (NLRI) update messages
carry IPv6 address prefixes of feasible routes.
BGP allows for policy-based routing. You can use routing policies to choose among multiple paths to a destination and to control the redistribution of routing information.
BGP uses the Transmission Control Protocol (TCP) as its transport protocol, using port
179 for establishing connections. Running over a reliable transport protocol eliminates the
need for BGP to implement update fragmentation, retransmission, acknowledgment, and
sequencing.
The routing protocol software supports BGP version 4. This version of BGP adds support
for classless interdomain routing (CIDR), which eliminates the concept of network classes.
Instead of assuming which bits of an address represent the network by looking at the first
octet, CIDR allows you to explicitly specify the number of bits in the network address,
thus providing a means to decrease the size of the routing tables. BGP version 4 also
supports aggregation of routes, including the aggregation of AS paths
An Autonomous System (AS) is a set of routers that are under a single technical administration and normally use a single interior gateway protocol and a common set of metrics
to propagate routing information within the set of routers. To other ASs, an AS appears to
have a single, coherent interior routing plan and presents a consistent picture of what
destinations are reachable through it.
The two most important consequences are the need for interior routing protocols to reach
one hop beyond the AS boundary, and for BGP sessions to be fully meshed within an AS.
Since the next-hop contains the IP address of a router interface in the next autonomous
system, and this IP address is used to perform routing, the interior routing protocol must
be able to route to this address. This means that interior routing tables must include entries one hop beyond the AS boundary. When a BGP routing update is received from a
neighboring AS, it must be relayed directly to all other BGP speakers in the AS. Do not
expect to relay BGP paths from one router, through another, to a third, all within the same
AS.

A50010-Y3-C150-2-7619

317

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.1.1

10.1.1.1

Basic Configuration

Configuration Type of BGP
When configuring BGP, you can select BGP configuration type between standard BGP
and ZebOS BGP for the hiD 6615 S323.
The standard BGP is one of the general BGP configuration type, which includes the following restrictions.

i

•

Manual transmission of community information
You should send the community information or message to neighbors directly using
the neighbor {A.B.C.D | WORD} send-community command.

•

No synchronization
Standard configuration type does not support a synchronization between IGP and
eBGP. In this type, BGP network disables IGP synchronization in BGP by default.

•

No auto-summary
Standard configuration type does not support auto summary feature. By default, the
system disables the automatic network number summarization.

The ZebOS type requires no specific configuration for sending out BGP community and
extended community attributes. ZebOS type is the default for the hiD 6615 S323.
To select configuration type of the BGP router, use the following command.
Command

Mode

Sets the BGP configuration type between standard and

bgp config-type {standard | zebos}

Global

no bgp config-type

10.1.1.2

Description

ZebOS.
Deletes the recent BGP configuration type and returns
to default.

Enabling BGP Routing
Step 1
To define an AS number and open Router Configuration mode, use the following command.
Command

Mode

router bgp <1-65535>

Global

Description
Assigns AS number to configure BGP routing and
opens Router Configuration mode.
1-65535: AS number

318

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Step 2
To specify a network to operate with BGP, use the following command.
Command

Mode

Adds BGP network to operate.

network A.B.C.D/M
network

A.B.C.D

mask

NET-

Router

MASK

10.1.1.3

Description

A.B.C.D/M: network address with netmask
A.B.C.D: network address
NETMASK: subnet mask

Disabling BGP Routing
Step 1
To delete a specified network to operate with BGP, use the following command.
Command

Mode

Deletes BGP network.

no network A.B.C.D/M
no network A.B.C.D mask NET-

Description

Router

MASK

A.B.C.D/M: network address with netmask
A.B.C.D: network address
NETMASK: subnet Mask

Step 2
Go back to Global Configuration mode using the exit command.
Step 3
To disable BGP routing of the chosen AS, use the following command.
Command

Mode

Description
Deletes assigned AS number to configure BGP routing,

no router bgp <1-65535>

Global

enter the AS number.
1-65535: AS number

10.1.2

Advanced Configuration
The hiD 6615 S323 is possibly configured for the additional configurations related BGP.
The advanced configurations describe in the following sections, are as follows:
•
•
•
•
•

A50010-Y3-C150-2-7619

Summary of Path
Automatic Summarization of Path
Multi-Exit Discriminator (MED)
Choosing Best Path
Graceful Restart

319

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.1.2.1

Summary of Path
Aggregation combines the characteristics of several different routes and advertises a single route. In the example of 2 routes information of 172.16.0.0/24 and 172.16.1.0/24, the
as-set parameter creates an aggregate entry advertising the path for a single route of
172.16.0.0/23, consisting of all elements contained in all paths being summarized. Use
this feature to reduce the size of path information by listing the AS number only once,
even if it was included in multiple paths that were aggregated. And it’s useful when aggregation of information results in incomplete path information.
Using the summary-only parameter transmits the IP prefix only, suppressing the morespecific routes to all neighbors. Using the as-set parameter transmits a single AS path information only, one of AS numbers of each path.
To summarize route’s information for the transmission, use the following command.
Command

Mode

Description
Summarizes the information of routes and transmits it

aggregate-address A.B.C.D/M

to the other routers.

as-set [summary-only]
Router

aggregate-address A.B.C.D/M

A.B.C.D/M: network address
summary-only: transmits IP prefix only.

summary-only [as-set]

as-set: transmits one AS-path information.

To delete the route’s information of specific network address, use the following command.
Command

Mode

Description

no aggregate-address A.B.C.D/M
as-set [summary-only]

Router

Disables the summarization function of routes.

no aggregate-address A.B.C.D/M
summary-only [as-set]

10.1.2.2

Automatic Summarization of Path
Automatic summarization is new feature to expend the route information up to the class of
specified IP address on interface connected directly to BGP router. For example, A class
is fundamentally had “/8” as the subnet mask in case IP address assigned 100.1.1.1 in A
class. It can generate route information of 100.0.0.0/8.
To enable/disable automatic summarization of the route, use the following command.
Command
auto-summary
no auto-summary

!

320

Mode
Router

Description
Enables automatic network summarization of a route.
Disables automatic network summarization of a route.

Please note that, use this feature when you use the basic classes in network.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.1.2.3

UMN:CLI

Multi-Exit Discriminator (MED)
During the best-path selection process, the switch compares weight, local preference and
as-path in turn among the similar parameters of BGP routers. Then, the MED is considered when selecting the best path among many alternative paths.
The hiD 6615 S323, MED comparison is configured only among all paths from the
autonomous system. You can configure the comparison of MEDs among all BGP routers
within autonomous system. In addition, MED is used when comparing of routes from the
neighboring routers placed within different AS.
To find the best route by comparing MED values, use the following command.
Command

Mode

Description
Configures the router to consider the comparison of

bgp always-compare-med
Router

no bgp always-compare-med

MEDs in choosing the best path from among paths.
Chooses the best path regardless of the comparison of
MEDs.

Meanwhile, when the best-path is selected among the neighbor routers within same
Autonomous System, it doesn’t compare MED values of them. However, in case the
paths have same AS-path information, it does compare MED values. If there are two
paths with different AS-path each other, the comparison of MED is unnecessary work.
Other parameter’s path information can be used to find the best path.
To compare MED values in order to choose the best path among lots of alternative paths
included same AS-path value, use the following command.
Command

Mode

Description
Configures the router to compare MEDs in choosing
the best path when paths have same AS-path informa-

bgp deterministic-med
Router

no bgp deterministic-med

i

10.1.2.4

tion.
Configures the router not to compare MEDs even if the
paths have same AS-path.

During the best-path selection process, use the bgp always-compare-med command in
case of comparing MED values regardless of AS-path. Otherwise, use the bgp
deterministic-med command if it compares MED values of lots of paths contained same
AS-path information.

Choosing Best Path
There are a lot of path parameters BGP protocol, which are IP address, AS, MED value
and router ID. Even if two paths look same under the condition of IP address, they are actually different when other parameters are compared with each other.

A50010-Y3-C150-2-7619

321

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To ignore AS-path for selecting the best path, use the following command.
Command

Mode

Ignores the information of AS-path as a factor in the

bgp bestpath as-path ignore
Router

no bgp bestpath as-path ignore

i

Description

algorithm for choosing the best route.
Considers the information of AS-path as a factor in the
algorithm for choosing the best route.

If you would like to configure to select the best route by considering AS-path length of
Confederation, you should configure the router first to ignore AS-path for choosing the
best route using the bgp bestpath as-path ignore command before implementing the
following command.
To consider AS-path length of Confederation during the best-path selection process, use
the following command.
Command

Mode

Considers the information of AS-path length of confed-

bgp bestpath compare-confedaspath
no

bgp

eration as a factor in the algorithm for choosing the best
Router

bestpath

Description

route.
Ignores AS-path length of confederation as a factor in

compare-

the algorithm for choosing the best route.

confed-aspath

When comparing similar routes from more than 2 peers the BGP router does not consider
router ID of the routes. It selects the first received route. The hiD 6615 S323 uses router
ID in the selection process; similar routes are compared and the route with lowest router
ID is selected as the best route. Router ID can be manually set by using the following
command.
To select the best path by comparing router ID, use the following command. However, the
default condition is that BGP receives routes with identical eBGP paths from eBGP peers.
Command

Mode

Selects the best path using the router ID for identical

bgp bestpath compare-routerid
Router

no

bgp

routerid

bestpath

compare-

Description

eBGP paths.
Disables selecting the best path using the router ID.

The hiD 6615 S323 is basically configured not to compare MED values of the path information that exchanges between the Confederation Peers. But just in case, it can be configured to compare MED values of the path information that exchanges between Confederation Peers.

322

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To compare MED values on the exchange of path information between Confederation
Peers, use the following command.
Command

Mode

bgp bestpath med confed [missing-as-worst]

Description
Configures the router to consider the MED in choosing

Router

bgp bestpath med missing-as-

a path from among the paths on the exchange of information between confederation peers.

worst [confed]

To ignore MED values of paths on the exchange of information between confederation
peers, use the following command.
Command

Mode

Description

no bgp bestpath med confed
[missing-as-worst]

Router

no bgp bestpath med missing-

Ignores MEDs of paths on the exchange of their information between confederation peers.

as-worst [confed]

If there are several equal paths, one of them has no MED value. Because this path is
considered as “zero” without MED value, it will be chosen the best path. But the path
would be the worst one if it has no MED value after missing-as-worst is set.

i
10.1.2.5

After missing-as-worst parameter is configured in the system, the path will be recognized as the worst path without MED value.

Graceful Restart
Graceful restart allows a router undergoing a restart to inform its adjacent neighbors and
peers of its condition. The restarting router requests a grace period from the neighbor or
peer, which can then cooperate with the restarting router. With a graceful restart, the restarting router can still forward traffic during the restart period, and convergence in the
network is not disrupted. The restart is not visible to the rest of the network, and the restarting router is not removed from the network topology.
The main benefits of graceful restart are uninterrupted packet forwarding and temporary
suppression of all routing protocol updates. Graceful restart thus allows a router to exchange path information with the neighboring router.
To configure graceful restart specifically for BGP, use the following command.
Command
bgp graceful-restart
no bgp graceful-restart

Mode
Router

Description
Sets to use graceful restart in BGP protocol.
Disables the restart time value setting.

Therefore, 2 options of the time can be used to speed up routing convergence by its peer
in case that BGP doesn’t come back after a restart.

A50010-Y3-C150-2-7619

323

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

•

Restart Time
It’s the waiting time for the restarting of Neighboring router’s BGP process. Restart
time allows BGP process time to restart and implement the internal connection (The
session). However, if it’s not working properly, it is considered as the router stops operating.

•

Stalepath Time
After BGP process of Neighboring router is restarted, it holds the time until BGP up
dates the path information. In case that the information of BGP routes is not updated
until the stalepath time, the switch discards this BGP routes information.

To set restart time or stalepath time on Graceful Restarting algorithm, use the following
command.
Command

Mode

Description
Sets the restart time of Graceful Restart configuration

bgp graceful-restart restart-time

in the unit of second.

<1-3600>
Router

bgp graceful-restart stalepath-

1-3600: restart time (default: 120)
Sets the stalepath-time of Graceful Restart configuration in the unit of second.

time <1-3600>

1-3600: stalepath time (default: 30)

If you don’t use Graceful Restart feature or want to return the default value for restart time
or stalepath time, use the following command.
Command

Mode

no bgp graceful-restart restarttime [<1-3600>]
no

bgp

graceful-restart

Restores the default value for restart time.
Router

sta-

Restores the default value for stalepath time.

lepath-time [<1-3600>]

10.1.3

Description

IP Address Family
The hiD 6615 S323 recently supports both unicast and multicast as address-family. Use
the following command in choosing either unicast or multicast to enter the AddressFamily Configuration mode allowing configuration of address-family specific parameters.
Use the following command in order to enable address family routing process, which
open you in Address-Family Configuration mode.
Command
address-family ipv4 [multicast |
unicast]
exit-address-family

324

Mode
Router
AddressFamily

Description
Opens the Address-Family Configuration mode to configure sessions for IP v4 prefixes.
Exits to Router Configuration mode.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.1.4

UMN:CLI

BGP Neighbor
To assign IP address or peer group name for BGP Neighboring router within specified AS
number, use the following command.
Command

Mode

Description
Configures BGP neighboring router and specify AS
number of BGP Neighbor.

neighbor {NEIGHBOR-IP |
WORD} remote-as <1-65535>

NEIGHBOR-IP: neighbor IP address
Router

WORD: peer group name or neighbor tag
1-65535: remote AS Number

10.1.4.1

no neighbor {NEIGHBOR-IP |

Deletes the configured BGP Neighbor within specified

WORD} remote-as <1-65535>

AS number.

Default Route
The hiD 6615 S323 can be configured that particular neighboring BGP routers or peer
group is assigned by default route as 0.0.0.0. Then, neighboring router or member of peer
group is able to receive the information of default route from the designated routers.
The following command allows neighboring BGP routers or Peer Group to transmit
0.0.0.0 as the default route.
To generate the default route to BGP neighbor or peer group, use the following command.
Command

Mode

Description
Generates the default route to BGP Neighbor.

neighbor {NEIGHBOR-IP |

NEIGHBOR-IP: neighbor IP address

WORD} default-originate [route-

WORD: peer group name or neighbor tag

map NAME]
no neighbor {NEIGHBOR-IP |
WORD} default-originate [route-

map NAME]

10.1.4.2

Router

1-65535: remote AS number
NAME: route map name
Removes the default route for BGP Neighbor or peer
group.

Peer Group
As the number of external BGP group increases, the ability to support a large number of
BGP sessions may become a scaling issue. In principle all members of BGP routers
within a single AS must connect to other neighboring routers. The preferred way to configure a large number of BGP neighbors is to configure a few groups consisting of multiple neighbors per group. Supporting fewer BGP groups generally scales better than supporting a large number of BGP groups. This becomes more evident in the case of dozens
of BGP neighboring groups when compared with a few BGP groups with multiple peers in
each group. If the routers belong to same group, they can be applied by same configuration. This group is called as Peer Group.
After peer relationships have been established, the BGP peers exchange update message to advertise network reachability information. You can arrange BGP routers into
groups of peers.

A50010-Y3-C150-2-7619

325

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To create a BGP Peer Group, use the following command.
Command

Mode

Description
Create a BGP peer group.

neighbor NAME peer-group

Router

NAME: peer group name
Delete the BGP peer group created before.

no neighbor NAME peer-group

To specify neighbor to the created peer group, use the following command.
Command

Mode

Description
Includes BGP neighbor to specified peer group using

neighbor

NEIGHBOR-IP

group NAME

10.1.4.3

IP address.

peerRouter

NEIGHBOR-IP: neighbor IP address
NAME: peer group name

no neighbor NEIGHBOR-IP peer-

Removes BGP neighbor from the specified Peer

group NAME

Group.

Route Map
You can apply the specific route map on neighboring router that the exchange route information between routers or blocking the IP address range is configured on route map.
To make BGP Neighbor router exchange the routing information using Route-map, use
the following command.
Command

Mode

Description
Applies a route map to incoming or outgoing routes on
neighboring router or peer group and exchange the

neighbor {NEIGHBOR-IP |

route information.

GROUP} route-map NAME {in |

out}

NEIGHBOR-IP: neighbor IP address
Router

GROUP: peer group name
NAME: route map name

no neighbor {NEIGHBOR-IP |
GROUP} route-map NAME {in |

Removes the connection with configured route-map.

out}

10.1.4.4

Force Shutdown
The hiD 6615 S323 supports the feature to force to shutdown any active session for the
specified BGP router or peer group and to delete the routing data between them. It shutdowns all connections and deletes the received path information from neighboring router
or peer group.

326

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To disable the exchange information with a specified router or peer group, use the following command.
Command

Mode

Description
Shutdowns any active session for the specified router

neighbor {NEIGHBOR-IP |
WORD} shutdown

no

neighbor

or peer group and delete all related routing data.
Router

{NEIGHBOR-IP-

WORD: peer group name or neighbor tag
Enables the sessions with a previously existing

ADDRESS | WORD} shutdown

10.1.5

NEIGHBOR-IP: neighbor IP address

neighbor or peer group that had been disabled.

BGP Session Reset
When you manage BGP network, you can use the command to reset the session for all
peers occasionally. Because the internal connections are re-established newly after resetting, the route information of the connected routers is restored by default.
You can reset the session in specified condition. The hiD 6615 S323 is available with
several parameters to reset the BGP connections.
The advanced configurations describe in the following sections, are as follows:
Session Reset of All Peers
Session Reset of Peers within Particular AS
Session Reset of Specific Route
Session Reset of External Peer
Session Reset of Peer Group

•
•
•
•
•

10.1.5.1

Session Reset of All Peers
To reset the sessions with all BGP peers, use the following command.
Command
clear ip bgp *

Mode
Global

Description
Resets all sessions with BGP peer groups.

When the route parameters restore to the default value by reset command, you can configure the specific parameters for its initialization. If you would like to reset/clear the outgoing advertised routes only, you should use out parameter. Otherwise, if you’d like to reset/clear the incoming advertised routes only, you should use in parameter.
Meanwhile, if prefix-filter is configured with in option, ORF (Outbound Route Filtering)
and incoming route can be reset. ipv4 option makes BGP peers have narrowed down to
IP address family peers. By using soft option, you can configure the switch to update
route information only when the session is still connected.

A50010-Y3-C150-2-7619

327

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To reset the sessions of all peers and initialize the details of route configurations, use the
following command.
Command

Mode

clear ip bgp * in [prefix-filter]

Description
Resets the session of specific group under * condition.
in: clears incoming advertised routes.
prefix-filter: pushes out prefix-list ORF and does in-

clear ip bgp * ipv4 {unicast |

bound soft reconfiguration.

multicast}in [prefix-filter]

*: the conditional option (peer group name or AS number or IP address)
Resets the session of specific group under * condition.

clear ip bgp out
clear ip bgp * ipv4 {unicast |

Global

*: the conditional option (peer group name or AS number or IP address)
out: clears outgoing advertised routes.

multicast} out

unicast | multicast: address family modifier

clear ip bgp * soft [in | out]

Updates the route information only while the session is
possible for specific group under * condition. Apply the

clear ip bgp * ipv4 {unicast |

route either incoming or outgoing routes.

multicast} soft [in | out]

*: the conditional option (peer group name or AS number or IP address)

10.1.5.2

Session Reset of Peers within Particular AS
To reset the session with all neighbor router which are connected to a particular AC, use
the following command.
Command
clear ip bgp <1-65535>

i

Mode
Global

Description
Resets the session with all members of neighbor
routers which are configured a particular AC number.

See Section 10.1.5.1 when you configure the detail parameters.
To reset the sessions of BGP neighboring routers which are belong to specific AS number
and initialize the details of route configurations, use the following command.
Command

Mode

Description

clear ip bgp <1-65535> in [prefix-

Resets the session of BGP neighboring routers which

filter]

are configured a particular AC number.
in: clears incoming advertised routes.

clear ip bgp <1-65535> ipv4

prefix-filter: pushes out prefix-list ORF and does in-

{unicast | multicast} in [prefix-

filter]
clear ip bgp <1-65535> out

bound soft reconfiguration.
Global

1-65535: AS number
Resets the session of BGP neighboring routers which
are configured a particular AC number.

clear ip bgp <1-65535> ipv4

1-65535: AS number

{unicast | multicast} out

out: clears outgoing advertised routes.
unicast | multicast: address family modifier

328

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Command

Mode

clear ip bgp <1-65535> soft [in |

Updates the route information only while the session is

out]

possible of BGP neighboring routers which are config-

clear ip bgp <1-65535> ipv4

10.1.5.3

Description

Global

ured a particular AC number. Apply the route either

{unicast | multicast} soft [in |

incoming or outgoing routes.

out]

1-65535: AS number

Session Reset of Specific Route
To reset the sessions of BGP neighboring router with specified IP address, use the following command.
Command
clear

ip

bgp

Mode
ROUTE-IP-

ADDRESS

i

Global

Description
Resets the sessions of BGP neighboring router with
specified IP address.

See Section 10.1.5.1 when you configure the detail parameters.
To reset the sessions of BGP neighboring router with specified IP address and initialize
the details of route configurations, use the following command.
Command

Mode

Description

clear ip bgp A.B.C.D in [prefix-

Resets the session of BGP neighboring router con-

filter]

tained specified IP address.
in: clears incoming advertised routes.

clear ip bgp A.B.C.D ipv4 {uni-

prefix-filter: pushes out prefix-list ORF and does in-

cast | multicast} in [prefix-filter]

bound soft reconfiguration.
A.B.C.D: route IP address
Resets the session of BGP neighboring router with

clear ip bgp A.B.C.D out
clear ip bgp A.B.C.D ipv4 {uni-

Global

specified IP address.
A.B.C.D: route IP address
out: clears outgoing advertised routes.

cast | multicast} out

unicast | multicast: address family modifier

clear ip bgp A.B.C.D soft [in |

Updates the route information only while the session is

out]

possible of BGP neighboring router with specified IP
address. Apply the route either incoming or outgoing

clear ip bgp A.B.C.D ipv4 {uni-

routes.

cast | multicast} soft [in | out]

10.1.5.4

A.B.C.D: route IP address

Session Reset of External Peer
You can reset the session of BGP router connected to external AS. To reset a BGP connection for all external peers, use the following command.
Command
clear ip bgp external

A50010-Y3-C150-2-7619

Mode
Global

Description
Resets the session of all external AS peers.

329

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

i

See Section 10.1.5.1 when you configure the detail parameters.
To reset the sessions of BGP router connected to external AS and initialize the details of
route configurations, use the following command.
Command

Mode

Description

clear ip bgp external in [prefix-

Resets the session of BGP router connected to exter-

filter]

nal AS.
in: clears incoming advertised routes.

clear ip bgp external ipv4 {uni-

prefix-filter: pushes out prefix-list ORF and does in-

cast | multicast} in [prefix-filter]

bound soft reconfiguration.
external: clears all external peers.
Resets the session of BGP router connected to exter-

clear ip bgp external out
Global

nal AS.

clear ip bgp external ipv4 {uni-

external: clears all external peers.

cast | multicast} out

out: clears outgoing advertised routes.
unicast | multicast : address family modifier

10.1.5.5

clear ip bgp external soft [in |

Updates the route information only while the session is

out]

possible of BGP router connected to external AS. Apply

clear ip bgp external ipv4 {uni-

the route either incoming or outgoing routes.

cast | multicast} soft [in | out]

external: clears all external peers.

Session Reset of Peer Group
To reset the session for all members of a peer group, use the following command.
Command

Mode

clear ip bgp peer-group GROUP

Global

Description
To reset the session for all configured routers of specified peer group.
GROUP: peer group name

i

See Section 10.1.5.1 when you configure the detail parameters.
To reset the sessions of BGP routers which are members of specified peer group and initialize the details of route configurations, use the following command.
Command

Description

clear ip bgp peer-group GROUP

Resets the session for all members of specified peer

in [prefix-filter]

group.

clear ip bgp peer-group GROUP
ipv4 {unicast | multicast} in [prefix-filter]

330

Mode

Global

in: clears incoming advertised routes.
prefix-filter: pushes out prefix-list ORF and does inbound soft reconfiguration.
GROUP: peer group name

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

UMN:CLI

Mode

Description

clear ip bgp peer-group GROUP

Resets the session for all members of specified peer

out

group.
GROUP: peer group name

clear ip bgp peer-group GROUP

out: clears outgoing advertised routes.

ipv4 {unicast | multicast} out
clear ip bgp peer-group GROUP

unicast | multicast: address family modifier
Global
Resets the route information only while the session is

soft [in | out]

possible for all members of specified peer group. Apply

clear ip bgp peer-group GROUP

the route either incoming or outgoing routes.

ipv4 {unicast | multicast} soft [in

GROUP: peer group name

| out]

10.1.6

Displaying and Managing BGP
BGP network information or configurations provided can be used to determine resource
utilization and enable BGP troubleshooting functions to solve network problems.
To see the configurations involved in BGP routing protocol, use the following command.
Command
show ip bgp summary
show ip bgp [ipv4 {unicast |
multicast}] summary

Mode

Description

Enable

Shows the summarized network status of BGP

Global

neighboring routers.

To show detailed information on BGP neighbor router’s session, use the following command.
Command

Mode

show ip bgp neighbors

Description
Shows general information on BGP neighbor connec-

show ip bgp ipv4 {unicast | mul-

tions of all neighboring routers.

ticast} neighbors
show ip bgp neighbors

Shows information of a specified neighbor router by its

NEIGHBOR-IP

IP address.

show ip bgp ipv4 {unicast | mul-

NEIGHBOR-IP: neighbor router’ s IP address

ticast} neighbors NEIGHBOR-IP
show ip bgp neighbors
NEIGHBOR-IP advertised-routes

show ip bgp ipv4 {unicast | multicast} neighbors NEIGHBOR-IP

Enable
Global

The advertised-routes option displays all the routes
the router has advertised to the neighbor.

advertised-routes
show ip bgp neighbors
NEIGHBOR-IP received prefix-

filter

Displays all received routes from neighbor router, both

show ip bgp ipv4 {unicast | mul-

accepted and rejected.

ticast} neighbors NEIGHBOR-IP
received prefix-filter

A50010-Y3-C150-2-7619

331

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command
show

ip

bgp

Mode
neighbors

The received-routes option displays all received

NEIGHBOR-IP received-routes

routes (both accepted and rejected) from the specified

show ip bgp ipv4 {unicast | mul-

neighbor. To implement this feature, BGP soft recon-

ticast} neighbors NEIGHBOR-IP

ip

bgp

figuration is set.
Enable

received-routes
show

Description

neighbors

NEIGHBOR-IP routes

show ip bgp ipv4 {unicast | multicast} neighbors NEIGHBOR-IP

Global
The routes option displays the available routes only
that are received and accepted.

routes

332

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2

UMN:CLI

Open Shortest Path First (OSPF)
Open shortest path first (OSPF) is an interior gateway protocol developed by the OSPF
working group of Internet Engineering Task Force (IETF). OSPF designed for IP network
supports IP subnetting and marks on information from exterior network. Moreover, it supports packet authorization and transmits/receives routing information through IP multicast.
It is most convenient to operate OSPF on layered network.
OSPF is the most compatible routing protocol in layer network environment. The first setting in OSPF network is planning network organized with router and configures border
router faced with multiple section.
After that, sets up the basic configuration for OSPF router operation and assigns interface
to Area. To make compatible OSPF router configuration for user environment, each router
configuration must be accorded by verification.
This section provides configurations for OSPF routing protocol. Lists are as follows.
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

!

10.2.1

Enabling OSPF
ABR Type Configuration
Compatibility Support
OSPF Interface
Non-Broadcast Network
OSPF Area
Default Metric
Graceful Restart Support
Opaque-LSA Support
Default Route
Finding Period
External Routes to OSPF Network
OSPF Distance
Host Route
Passive Interface
Blocking Routing Information
Summary Routing Information
OSPF Monitoring and Management

Routing functionalities such as RIP, OSPF, BGP and PIM-SM are only available for hiD
6615 S323. (Unavailable for hiD 6615 S223)

Enabling OSPF
To use OSPF routing protocol, it must be activated as other routing protocols. After activation, configures network address and ID which is operated by OSPF.
The following command shows steps of activating OSPF.

A50010-Y3-C150-2-7619

333

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Step1
Open Router Configuration mode from Global Configuration mode.
Command
router ospf [<1-65535>]
no router ospf [<1-65535>]

i
!

Mode
Global

Description
Opens Router Configuration mode with enabling OSPF.
Disables OSPF routing protocol.

In case that more than 2 OSPF processes are operated, a process number should be assigned. Normally, there is one OSPF which is operating in one router.
If OSPF routing protocol is disabled, all related configuration will be lost.
Step2
Configure a network ID of OSPF. Network ID decides IP v4 address of this network.
Command
router-id A.B.C.D

Mode
Router

no router-id A.B.C.D

Description
Assigns a router ID with enabling OSPF.
Deletes a configured router ID.

In case if using router-id command to apply new router ID on OSPF process, OSPF
process must be restarted to apply. Use the clear ip ospf process command to restart
OSPF process.
If there is changing router ID while OSPF process is operating, configuration must be
processed from the first. In this case, the hiD 6615 S323 can change only router ID without changing related configurations.
Command
ospf router-id A.B.C.D

Mode

Description
Changes only a router ID without changing related

Router

configurations.
Deletes a changed router ID.

no ospf router-id A.B.C.D

To transfer above configuration to other routers, Use the clear ip ospf process command to restart OSPF process.
To display configured router-id, use the following command.
Command

Mode

Description

Enable

show router-id

Global

Displays configured router ID

Bridge

334

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Step 3
Use the network command to specify a network to operate with OSPF.
There are two ways to show network information configurations. Firstly, shows IP address
with bitmask like “10.0.0.0/8”. Secondly, shows IP address with wildcard bit information
like “10.0.0.0 0.0.0.255”. The variable option after area must be IP address or OSPF area
ID.
To configure a network, use the following command.
Command
network

A.B.C.D/M

Mode
area

Description

{<0-

4294967295> | A.B.C.D}

Router

network A.B.C.D A.B.C.D area

Specifies a network with OSPF area ID.
0-4294967295: OSPF area ID

{<0-4294967295> | A.B.C.D}

10.2.2

ABR Type Configuration
The hiD 6615 S323 supports 4 types of OSPF ABR which are Cisco type ABR (RFC
3509), IBM type ABR (RFC 3509), IETF Draft type and RFC 2328 type.
To configure ABR type of OSPF, use the following command.
Command

Mode

Description
Selects an ABR type.
cisco: cisco type ABR, RFC 3509 (default)

ospf abr-type {cisco | ibm |
shortcut | standard}

ibm: IBM type ABR, RFC 3509
Router

shortcut: IETF draft type
standard: RFC 2328 type

no ospf abr-type {cisco | ibm |

Deletes a configured ABR type.

shortcut | standard}

10.2.3

Compatibility Support
OSPF protocol in the hiD 6615 S323 uses RFC 2328 which is finding shorten path. However, Compatibility configuration enables the switch to be compatible with a variety of
RFCs that deal with OSPF. Perform the following task to support many different features
within the OSPF protocol.
Use the following command to configure compatibility with RFC 1583.
Command
compatible rfc1583
no compatible rfc1583

10.2.4

Mode
Router

Description
Supports compatibility with RFC 1583.
Disables configured compatibility.

OSPF Interface
OSPF configuration can be changed. Users are not required to alter all of these parameters, but some interface parameters must be consistent across all routers in an attached
network.

A50010-Y3-C150-2-7619

335

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.4.1

Authentication Type
Authentication encodes communications among the routers. This function is for security
of information in OSPF router.
To configure authentication of OSPF router for security, use the following command.
Command
ip

ospf

authentication

Mode
[mes-

sage-digest | null ]

i

Description
Enables authentication on OSPF interface.

Interface

message-digest: MD5 encoding

ip ospf A.B.C.D authentication

null: no encoding

[message-digest | null]

A.B.C.D: IP address for authentication

If there is no choice of authentication type, the code communication will be based on text.
To delete comfigured authentication, use the following command.
Command

Mode

Description

no ip ospf authentication [message-digest | null]

Interface

Deletes configured authentication.

no ip ospf A.B.C.D authentication [message-digest | null]

10.2.4.2

Authentication Key
If authentication enables on OSPF router interface, the password is needed for authentication. The authentication key works as a password. The authentication key must be consistent across all routers in an attached network.
There are two ways of authentication by user selection, one is type based on text, and
another is MD5 type.

!

The authentication key must be consistent across all routers in an attached network.
To configure an authentication key which is based on text encoding, use the following
command.
Command

Mode

Description

ip ospf authentication-key KEY
ip ospf authentication-key KEY
{first | second} [active]
Configures the authentication which is based on text

ip ospf A.B.C.D authenticationkey KEY
ip ospf A.B.C.D authentication-

Interface

encoding.
KEY: maximum 16 alphanumeric characters

key LINE
ip ospf A.B.C.D authenticationkey KEY {first | second} [active]

336

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure an authentication key which is based on MD5 encoding, use the following
command.
Command

Mode

Description

ip ospf message-digest-key <1255> md5 KEY [active]

ip ospf message-digest-key <1255> md5 [active]

ip ospf A.B.C.D message-digestkey <1-255> md5 [active]

Configures the authentication which is based on md5
Interface

type.
1-255: key ID
KEY: maximum 16 alphanumeric characters

ip ospf A.B.C.D message-digestkey <1-255> md5 LINE [active]
ip ospf A.B.C.D message-digestkey <1-255> md5 KEY [active]

To delete a configured authentication key, use the following command.
Command

Mode

Description

no ip ospf authentication-key
KEY

no ip ospf authentication-key
KEY {first | second}

no ip ospf A.B.C.D authentication-key KEY

Interface

Deletes a configured authentication key.

no ip ospf A.B.C.D authentication-key KEY {first | second}
no ip ospf message-digest-key
<1-255>

no ip ospf A.B.C.D messagedigest-key <1-255>

10.2.4.3

Interface Cost
OSPF protocol assigns suitable cost according to the bandwidth on the each interface to
find the shortest route. Cost is used for packet routing, and routers are using the Cost to
communicate.
To configure an interface cost for OSPF, use the following command.
Command
ip ospf cost <1-65535>
ip ospf A.B.C.D cost <1-65535>

A50010-Y3-C150-2-7619

Mode
Interface

Description
Configures an interface cost for OSPF.

337

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To delete a configured interface cost for OSPF, use the following command.
Command
no ip ospf cost

Mode
Interface

Description
Deletes a configured an interface cost for OSPF.

no ip ospf A.B.C.D cost

10.2.4.4

Blocking Transmission of Route Information Database
OSPF routing communicates through the LAS. Each routing information is saved internal
router as a datebase, but user can configure the specific interface to block the transmission of routing information saved in database to other router.
To block the transmission of routing information to other router, use the following command.
Command

Mode

ip ospf database-filter all out
ip ospf A.B.C.D database-filter

Interface

Description
Blocks the transmission of routing information to other
router.

all out

To release a blocked interface, use the following command.
Command

Mode

Description

no ip ospf database-filter
no ip ospf A.B.C.D database-

Interface

Releases a blocked interface.

filter

10.2.4.5

Routing Protocol Interval
Routers on OSPF network exchange various packets, about that packet transmission,
time interval can be configured in several ways
The following lists are sort of time interval which can be configured by user:

338

•

Hello Interval
OSPF router sends Hello packet to notify existence of itself. Hello interval is that
packet transmission interval.

•

Retransmit Interval
When router transmits LSA, it is waiting for approval information come from receiver.
In this time, if there is no answer from receiver for configured time, the router transmits LSA again. Retransmit-interval is configuration of the time interval between
transmission and retransmission.

•

Dead Interval
If there is no hello packet for the configured time. The router perceives other router is
stopped working. Dead interval is configuration of the time interval which perceives
other router is stopped operating.

•

Transmit Delay
When a router transmits LSA, the traffic can be delayed by status of communications.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Transmit delay is considering of the configuration for LSA transmission time.

i

The interval explained as above must be consistent across all routers in an attached network.
To configure a Hello interval, use the following command.
Command

Mode

ip ospf hello-interval <1-65535>

Configures a Hello interval in the unit of second.

ip ospf A.B.C.D hello-interval <165535>

Description

1-65535: interval value (default: 10)
Interface

no ip ospf hello-interval

Sets a Hello interval to the default value.

no ip ospf A.B.C.D hello-interval

To configure a retransmit interval, use the following command.
Command

Mode

Description

ip ospf retransmit-interval <165535>

ip

ospf

Configures a retransmit interval in the unit of second.
A.B.C.D

1-65535: interval value (default: 5)

retransmit-

interval <1-65535>

Interface

no ip ospf retransmit-interval
Sets a retransmit interval to the default value.

no ip ospf A.B.C.D retransmitinterval

To configure a dead interval, use the following command.
Command

Mode

ip ospf dead-interval <1-65535>

Configures a dead interval in the unit of second.

ip ospf A.B.C.D dead-interval <165535>

Description

1-65535: interval value (default: 40)
Interface

no ip ospf dead-interval

Sets a dead interval to the default value.

no ip ospf A.B.C.D dead-interval

To configure a transmit delay, use the following command.
Command

Mode

ip ospf transmit-delay <1-65535>

Configures a transmit delay in the unit of second.

ip ospf A.B.C.D transmit-delay
<1-65535>

Description

1-65535: interval value (default: 1)
Interface

no ip ospf transmit-delay
no ip ospf A.B.C.D transmit-

Sets a transmit delay to the default value.

delay

A50010-Y3-C150-2-7619

339

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.4.6

OSPF Maximum Transmission Unit (MTU)
Router verifies MTU when DD (Database Description) is exchanging among the routers
on OSPF networks. Basically, OSPF network can not be organized if there are different
sizes of MTUs between routers. Therefore MTU value must be consistent. Generally MTU
value is 1500 bytes on Ethernet interface.
To configure MTU on OSPF interface, use the following command.
Command
ip ospf mtu <576-65535>

Mode
Interface

no ip ospf mtu

i

Description
Configures an MTU on OSPF interface.
Deletes a configured MTU on OSPF interface.

Configuration as above makes MTU consistently on same OSPF network; actual MTU
value on interface itself will not be changed.
On the other hands, if there are two routers which have different MTU, it can be participated with OSPF network through the configuration that skips the verification of MTU
value when there is DD exchanging.
To configure the switch to skip the MTU verification in DD process, use the following
command.
Command
ip ospf mtu-ignore

Mode
Interface

ip ospf A.B.C.D mtu-ignore

Description
Configures the switch to skip the MTU verification in
DD process.

To configure the switch not to skip the MTU verification in DD process, use the following
command.
Command
no ip ospf mtu-ignore

Mode
Interface

no ip ospf A.B.C.D mtu-ignore

10.2.4.7

Description
Configures the switch not to skip the MTU verification
in DD process.

OSPF Priority
Routers have each role to exchange the information on OSPF network. DR (Designated
Router) is one of essential role to get and transmit the route information in the same area.
The router having the highest priority becomes DR (Designated Router). If there are
routers which have same priority, the highest router ID will be DR.
Normally, router has priority 1, but it can be changed to make DR through the configuration of priority.
To configure a priority of OSPF router, use the following command.
Command
ip ospf priority <0-255>
ip ospf A.B.C.D priority <0-255>

340

Mode
Interface

Description
Configures a priority of OSPF router.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To delete a configured priority of OSPF router, use the following command.
Command
no ip ospf priority

Mode
Interface

Description
Deletes a configured priority of OSPF router.

no ip ospf A.B.C.D priority

10.2.4.8

OSPF Network Type
There are 4 types of OSPF network. Broadcast network, NBMA (Non-broadcast-multipleaccess) network, Point-to-multipoint network and Point-to-point network.
User can configure OSPF network as a Broadcast network or Non-broadcast network
type. For example, if the network does not support multicasing it can be configured Nonbroadcast type from Broadcast type, and NBMA network as a Frame relay can be broadcast network type.
NBMA type network need virtual circuit to connect routers. But Point-to-multipoint type
uses virtual circuit on part of network to save the management expenses. It does not to
need to configure Neighbor router to connect routers which are not directly connected. It
also saves IP resources and no need to configure the process for destination router. It
supports those benefits for stable network services.
Generally, the routers and Layer 3 switches are using Broadcast type network.
To select an OSPF network type, use the following command.
Command

Mode

Description

ip ospf network {broadcast |
non-broadcast | point-to-multi-

Interface

Selects an OSPF network type.

point | point-to-point}

10.2.5

Non-Broadcast Network
To operate NBMA type network, neighbor router configuration is needed. And IP address,
Priority, Poll-interval configuration as well. Priority is information for designate router selection and it configured [0] as a default. Poll-interval is the waiting time to re-get the hello
packet from dead Neighbor router. It configured 120 seconds as a default.
To configure a router communicated by non-broadcast type, use the following command.
Command

Mode

Description

neighbor A.B.C.D cost <1-65535>
neighbor A.B.C.D priority <0-255>
neighbor A.B.C.D priority <0-255> poll-interval
<1-65535>

Router

Configures a neighbor router of NBMA
type.

neighbor A.B.C.D poll-interval <1-65535>
neighbor A.B.C.D poll-interval <1-65535> priority <0-255>

A50010-Y3-C150-2-7619

341

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To delete a configured router communicated by non-broadcast type, use the following
command.
Command

Mode

Description

no neighbor A.B.C.D cost [<1-65535>]
no neighbor A.B.C.D priority [<0-255>]
no neighbor A.B.C.D priority poll-interval [<1Router

65535>]

Deletes a configured neighbor router of
NBMA type.

no neighbor A.B.C.D poll-interval [<1-65535>]
no neighbor A.B.C.D poll-interval priority [<0255>]

10.2.6

OSPF Area
Router configuration on OSPF network includes Area configuration with each interface,
network. Area has various and special features. It needs to be configured pertinently to
make effective management on whole of OSPF network.
OSPF network defines several router types to manage the Area. ABR (Area Border
Router) is one of the router types to transmit information between Areas.
ASBR (Autonomous System Border Router) is using OSPF on oneside and using other
routing protocol except for OSPF on other interface or Area. ASBR exchanges area information between different routing protocols.
Area types are various. The most principle Area types are Stub Area and NSSA (Not So
Stubby Area).

10.2.6.1

Area Authentication
OSPF routers in specific Area can configure authentication for security of routing information. Encoding uses password based on text or MD5. To set password on interface assigned Area, use the ip ospf authentication-key and ip ospf message-digest-key
commands in interface mode, see Section 10.2.4.1 for more information.
To configure authentication information for encoding, use the following command.
Command

Mode

Configures authentication information which is based

area <0-4294967295> authentication
area <0-4294967295> authenti-

Description

Router

on text encoding in the Area.
Configures authentication information which is based
on MD5 encoding in the Area.

cation message-digest

To delete configured authentication information for encoding, use the following command.
Command
no area <0-4294967295> authentication

342

Mode
Router

Description
Deletes configured authentication information.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.6.2

UMN:CLI

Default Cost of Area
The default cost of Area is configured only in ABR. ABR function is for delivering the
summary default route to stub area or NSSA, in that cases the default cost of area must
be required. However, ABR which does not have stub area or NSSA can not use the following command.
To configure a default cost of Area, use the following command.
Command
area

<0-4294967295>

default-

cost <1-16777215>

Mode

Description

Router

Configures a default cost of Area.

To delete a configured default cost of Area, use the following command.
Command
area

<0-4294967295>

Mode
default-

cost <1-16777215>

!
10.2.6.3

Router

Description
Deletes a configured default cost of Area.

This command is only for ABR which is delivering summary default route to stub or NSSA.

Blocking the Transmission of Routing Information Between Area
ABR transmits routing information between Areas. In case of not to transmit router information to other area, the hiD 6615 S323 can configure it as a blocking.
First of all, use the access-list or prefix-list command to assign LIST-NAME. And use
the following command to block the routing information on LIST-NAME. This configuration
only available in case of OSPF router is ABR.
To block routing information on LIST-NAME, use the following command.
Command

Mode

Description

area <0-4294967295> filter-list
access LIST-NAME {in | out}
area <0-4294967295> filter-list

Router

Blocks routing information on LIST-NAME.

prefix LIST-NAME {in | out}

To delete configured blocking information, use the following command.
Command

Mode

Description

no area <0-4294967295> filterlist access LIST-NAME {in | out}
no area <0-4294967295> filter-

Router

Deletes configured blocking information.

list prefix LIST-NAME {in | out}

!

This command is only available for ABR.

A50010-Y3-C150-2-7619

343

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.6.4

Not So Stubby Area (NSSA)
NSSA (Not So Stubby Area) is stub Area which can transmit the routing information to
Area by ASBR. On the other hand, Stub Area cannot transmit the routing information to
area. To configure NSSA, use the following command.
Command
area <0-4294967295> nssa

Mode
Router

Description
Configures NSSA.

The following options are configurable for NSSA:
•

default-information-originate
This option is configuration for allowing default path of Type-7 in NSSA. It means
routing path without routing information will use the interface which is allowed in default type-7 path. metric is for metric value, metric-type is for type of finding the path.
metric-type 1 uses internal path cost with external path cost as a cost, metric type 2
always uses external cost value only.

•

no-redistribution
This option is configuration in NSSA for restriction to retransmit the routing information which is from outside.

•

no-summary
This option is for restriction to exchange routing information between OSPF areas.

•

translator-role
NSSA-LSA (Link State Advertisement) has three types according to the way of
process type. always changes all NSSA-LSA into Type-5 LSA. candidate changes
NSSA-LSA into Type-5 LSA when it is translator. never does not change NSSA-LSA.

NSSA uses ASBR when it transmits Stub Area or other routing protocol Area into OSPF.
In this case, if other routing protocol has default path, use default-information-originate
command to configure the all of default path is using the assigned ASBR
To configure NSSA with various features, use command with options. area <04294967295> NSSA command has 4 options as default-information-originate, noredistribution, no-summary, translator-role and it can be selected more than 2 options
without order. default-information-originate has metric <0-16777214> and metric-type
<1-2> as an option, translator-role must choose one of candidate, never, always as an
options.
The following is explaining options of command:
•

•
•
•

344

default-information-originate or
default-information-originate metric <0-16777214> or
default-information-originate metric-type <1-2>
no-redistribution
no-summary
translator-role {candidate | never | always}

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure NSSA with one option, use the following command.
Command

Mode

Description

area <0-4294967295> nssa default-informationoriginate
area <0-4294967295> nssa default-informationoriginate metric <0-16777214>
area <0-4294967295> nssa default-information-

Router

Configures NSSA with one option.

originate metric-type <1-2>
area <0-4294967295> nssa no-redistribution
area <0-4294967295> nssa no-summary
Command
area

<0-4294967295>

nssa

Mode
translator-role

{candidate | never | always}

Router

Description
Configures NSSA with one option.

The following example shows how to configure NAAS with more than 2 options:
area <0-4294967295> nssa no-summary no-redistribution
area <0-4294967295> nssa translator-role {candidate | never | always} defaultinformation-originate metric-type <1-2> no-redistribution

•
•

To delete configured NSSA, use the following command.
Command

Mode

Description

Router

Deletes configured NSSA.

no area <0-4294967295> nssa
no

area

<0-4294967295>

nssa

default-

nssa

default-

information-originate
no

area

<0-4294967295>

information-originate metric <0-16777214>
no

area

<0-4294967295>

nssa

default-

information-originate metric-type <1-2>
no

area

<0-4294967295>

nssa

no-

redistribution
no area <0-4294967295> nssa no-summary
no area <0-4294967295> nssa translator-role
{candidate | never | always}

A50010-Y3-C150-2-7619

345

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.6.5

Area Range
In case of OSPF belongs to several Areas, Area routing information can be shown in one
routing path. Like as above, various routing information of Area can be combined and
summarized to transmit to outside.
To summarize and combine the routing information, use the following command.
Command
area

Mode

<0-4294967295>

range

A.B.C.D/M

area

<0-4294967295>

A.B.C.D/M

{advertise

Description

range
|

Router

Configures to use summarized information for assigned
path.

not-

advertise}

Use advertise option to transmit summarized routing information with using summarized
information. And use the not-advertise option to block the transmission of summarized
routing information to outside.
To release the configuration, use the following command.
Command

Mode

Description

no area <0-4294967295> range
A.B.C.D/M

no area <0-4294967295> range
A.B.C.D/M

{advertise

|

Router

Releases the configuration to use summarized information for assigned path

not-

advertise}

10.2.6.6

Shortcut Area
Backbone Area is the default Area among the Areas of OSPF. All traffic should pass the
Backbone Area and OSPF network must be planned for that, but there is some efficiency
way which is not to pass the Backbone Area. That is Shortcut, and it must be configured
for efficient traffic in every ABR type, see Section 10.2.2.
To configure the shortcut option, use the following command.
Command
area <0-4294967295> shortcut
{default | disable | enable}

Mode
Router

Description
Configures the shortcut option.

To releases the configured shortcut option, use the following command.
Command
no area <0-4294967295> shortcut {default | disable | enable}

346

Mode
Router

Description
Releases the configured shortcut option.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.6.7

UMN:CLI

Stub Area
Stub Area is that ABR is connected to Backbone Area. If it is assigned as Stub Area, ABR
will notify the default path to Stub Area and other routing protocol information will not
transmit to Stub Area.
To create Stub Area, use the following command.
Command
area <0-4294967295> stub [nosummary]

Mode
Router

Description
Creates a Stub Area.

If no-summary option adds to Stub Area, other Area OSPF routing information also can
not come to Stub Area, However, it only goes to default route from ABR router. That is Totally Stubby Area.
To delete a created Stub Area, use the following command.
Command
no area <0-4294967295> stub
[no-summary]

10.2.6.8

Mode
Router

Description
Deletes a created Stub Area.

Virtual Link
In OSPF, all areas must be connected to a backbone area. If there is a break in backbone
continuity, or the backbone is purposefully portioned, you can establish a virtual link. The
virtual link must be configured in both routers.
OSPF network regards virtual link routers as Point-to-point router. Therefore, the Hellointerval, Retransmit-interval, Transmit-delay must be consistent across all routers in an attached network.
User can configure Authentication for security, Authentication key for password, and time
period for Hello-interval, Retransmit-interval, Transmit-delay and Dead-interval to operate
virtual link.
The following items describe 7 configurations for virtual link:
•

Authentication
This is configuration for security of routing information. message-digest uses MD5
to encode for authentication, null means not using any of authentication.

•

Authentication-key
Configures the authentication which is based on text encoding.

•

Message-digest-key
Configures the authentication which is based on md5 type.

•

Hello-interval
OSPF router sends Hello packet to notify existence of itself. Hello-interval is that
packet transmission interval.

•

Retransmit-interval
When router transmits LSA, it is waiting for approval information come from receiver.

A50010-Y3-C150-2-7619

347

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

In this time, if there is no answer from receiver for configured time, the router transmits LSA again. Retransmit-interval is configuration of the time interval between
transmission and retransmission
•

Dead-interval
If there is no hello packet for the configured time. The router perceives other router is
stopped working. Dead-interval is configuration of the time interval which perceives
other router is stopped operating.

•

Transmit-delay
When a router transmits LSA, the traffic can be delayed by status of communications.
Transmit-delay is considering of the configuration for LSA transmission time.

Configuration for virtual link can be selected more than 2 options without order. The following is explaining options of command:
•
•
•
•
•
•
•

authentication [message-digest | null]
authentication-key KEY
message-digest-key KEY md5 KEY
hello-interval <1-65535>
retransmit-interval <1-65535>
dead-interval <1-65535>
transmit-delay <1-65535>

To configure a virtual link with one option, use the following command.
Command

Mode

Description

area <0-4294967295> virtual-link A.B.C.D authentication [message-digest | null]
area <0-4294967295> virtual-link A.B.C.D authentication-key KEY
area <0-4294967295> virtual-link A.B.C.D message-digest-key KEY md5 KEY
area <0-4294967295> virtual-link A.B.C.D hellointerval <1-65535>

Router

Configures a virtual link.

area <0-4294967295> virtual-link A.B.C.D retransmit-interval <1-65535>
area <0-4294967295> virtual-link A.B.C.D deadinterval <1-65535>
area

<0-4294967295>

virtual-link

A.B.C.D

transmit-delay <1-65535>

The following example shows how to configure virtual link with more than 2 options:
•
•

348

area <0-4294967295> virtual-link A.B.C.D authentication-key KEY authentication
[message-digest | null]
area <0-4294967295> virtual-link A.B.C.D hello-interval <1-65,535> dead-interval
<1-65535>

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To delete a configured virtual link, use the following command.
Command

Mode

Description

no area <0-4294967295> virtual-link A.B.C.D
authentication [message-digest | null]
no area <0-4294967295> virtual-link A.B.C.D
authentication-key KEY
no area <0-4294967295> virtual-link A.B.C.D
message-digest-key KEY md5 KEY
no area <0-4294967295> virtual-link A.B.C.D
hello-interval <1-65535>

Router

Deletes a configured virtual link.

no area <0-4294967295> virtual-link A.B.C.D
retransmit-interval <1-65535>
no area <0-4294967295> virtual-link A.B.C.D
dead-interval <1-65535>
no area <0-4294967295> virtual-link A.B.C.D
transmit-delay <1-65535>

10.2.7

Default Metric
OSPF finds metric based on interface bandwidth. For example, default metric of T1 link is
64, but default metric of 64K line is 1562. If there are plural lines in the bandwidth, you
can view costs to use line by assigning metric to each line.
To classify costs to use line, use the following command.
Command
auto-cost

Mode

reference-bandwidth

<1-4294967>

Router

Description
Configures default metric in the unit of Mbps.
(default: 100)

To delete the configuration, use the following command.
Command
no

auto-cost

Mode
reference-

bandwidth

10.2.8

Router

Description
Deletes the configuration.

Graceful Restart Support
You need to restart OSPF protocol processor when there is network problem. In this case,
it takes long time to restarts OSPF and there is no packet transmission. Other routers are
also need to delete routing information and register it again. Graceful Restart improves
those inconveniences. Although OSPF is restarting, Graceful Restart makes the transmission of a packet with routing information.

A50010-Y3-C150-2-7619

349

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To configure the Graceful Restart, use the following command.
Command

Mode

capability restart {graceful |
reliable-graceful | signaling}

Router

no capability restart

Description
Configures the Graceful Restart.
Releases the configuration.

The following items are additional options for the Graceful Restart:
•

grace-period
When OSPF restarts, process is keeping status in graceful for the time configured as
grace-period. After the configured time, OSPF operates in normal.

•

helper
This is functions that helps other routers around the restarting router. It makes re
starting router as a working and transmitting to other routers. only-reload is for the
case of OSPF router is restarting, only-upgrade is for the OSPF router which is upgrading software, and max-grace-period works when grace-period from other
routers has less value than it. Configuration for Helper can be selected more than 2
options without order.

To configure the additional options for Graceful Restart, use the following command.
Command

Mode

Description

ospf restart grace-period <1-1800>
ospf restart helper max-grace-period <1-1800>
ospf restart helper max-grace-period <1-1800>
only-reload [only-upgrade]
ospf restart helper max-grace-period <1-1800>
only-upgrade [only-reload]
ospf restart helper only-reload [only-upgrade]
ospf restart helper only-reload only-upgrade
max-grace-period <1-1800>

Global

Configures the additional options for
Graceful Restart.

ospf restart helper only-reload max-graceperiod <1-1800> [only-upgrade]
ospf restart helper only-upgrade [only-reload]
ospf restart helper only-upgrade only-reload
max-grace-period <1-1800>
ospf restart helper only-upgrade max-graceperiod <1-1800> [only-reload]

350

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To release the configuration, use the following command.
Command

Mode

Description

no ospf restart grace-period <1-1800>
ospf restart helper never

Global

Releases the configuration.

no ospf restart helper max-grace-period <11800>

10.2.9

Opaque-LSA Support
Opaque-LSA is LSA Type-9, Type-10, Type-11. The hiD 6615 S323 enables Opaque-LSA
as a default but it can be released by user.
To release the enabled Opaque-LSA management, use the following command.
Command
no capability opaque

Mode
Router

Description
Releases the enabled Opaque-LSA management.

To enable Opaque-LSA management, use the following command.
Command
capability opaque

10.2.10

Mode
Router

Description
Enables Opaque-LSA management.

Default Route
You can configure ASBR (Autonomous System Boundary Router) to transmit default
route to OSPF network. Autonomous System Boundary router transmits route created externally to OSPF network. However, it does not create system default route.
To have autonomous System Boundary router create system default route, use the following command.
Command
default-information originate

Mode
Router

Description
Configures the default route.

The following items are detail options for the Default Route configuration.
•

metric
Configures Metric value of the default route.

•

metric-type
metric-type is for type of finding the path. metric-type 1 uses internal path cost with
external path cost as a cost, metric type 2 always uses external cost value only.

•

always
Transmits the default route to outside.

•

no-summary
Restricts to exchange routing information between OSPF area in NSSA.

A50010-Y3-C150-2-7619

351

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

•

route-map
Transmits specific routing information to assigned route which has MAP-NAME.

The detail options for default route configuration are classified in 4 as above, and those
configurations can be selected more than 2 options without order.
The following is explaining options of command:
•
•
•
•

metric <0-16777214>
metric-type <1-2>
always
route-map MAP-NAME

To configure the default route with an option, use the following command.
Command

Mode

Description

default-information originate
metric <0-16777214>
default-information originate
metric-type <1-2>

Router

Configures the default route with one option.

default-information originate
always
default-information originate
route-map MAP-NAME

The following example shows how to configure default route with more than 2 options:
•
•

default-information originate metric-type <1-2> always
default-information originate route-map MAP-NAME metric <0-16777214>

To delete the configuration, use the following command.
Command

Mode

Description

no default-information originate
no default-information originate
metric <0-16777214>
no default-information originate
metric-type <1-2>

Router

Deletes the configuration.

no default-information originate
always
no default-information originate
route-map MAP-NAME

10.2.11

Finding Period
OSFP start to find the shortest path as soon as got a notification of changing the network
component. You can configure the period to find the path.

352

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure the period of finding, use the following command.
Command
timers

spf

SPF-DELAY

Mode
SPF-

HOLD

Description
Configures the period of finding in the unit of second.

Router

SPF-DELAY: 0-2147483647 (default: 5)
SPF-HOLD: 0-2147483647 (default: 10)

To release the configuration, use the following command.
Command
no timers spf

10.2.12

Mode
Router

Description
Release the configuration.

External Routes to OSPF Network
If other routing protocol redistribute into OSPF network, these routes become OSPF external routes. Other routing protocols are RIP and BGP. And static route, connected route,
kernel route are also external route. Those routing information can distribute into OSPF
network.
There are 4 kinds of additional configuration about external routes to OSPF network.
metric is configures Metric value of the default route, metric-type is for type of finding
the path. metric-type 1 uses internal path cost with external path cost as a cost, metric
type 2 always uses external cost value. route-map is transmission of specific routing information to assigned route which has MAP-NAME, and, tag is using the assign tag number on the specific MAP-NAME.
Those 4 kinds of additional configuration can be selected more than 2 options without order, and it applies to consistent across all external routes in an attached network.
The following is explaining 4 options of command:
metric <0-16777214>
metric-type <1-2>
route-map MAP-NAME
tag <0-4294967295>

•
•
•
•

To configure the external route transmission, use the following command.
Command

Mode

Description

redistribute {bgp | connected |
kernel | rip | static} metric <016777214>

redistribute {bgp | connected |
kernel | rip | static} metric-type
<1-2>

redistribute {bgp | connected |

Router

Configures the external route transmission.

kernel | rip | static} route-map
MAP-NAME

redistribute {bgp | connected |
kernel | rip | static} tag <04294967295>

A50010-Y3-C150-2-7619

353

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

The following example shows how to configure it with more than 2 options:
•
•

redistribute {bgp | connected | kernel | rip | static} metric <0-16777214> tag <04294967295>
redistribute {bgp | connected | kernel | rip | static} tag <0-4294967295> metrictype <1-2>

For efficient transmission of routing information, and to avoid non-matching between metric and OSPF routing protocol, use the default matric command to assign metric about
redistribute route.
To configure the default metric, use the following command.
Command
default-metric <0-16777214>

Mode
Router

Description
Configures the default metric.

To delete the default metric, use the following command.

10.2.13

Command

Mode

no default-metric [<0-16777214>]

Router

Description
Deletes the default metric.

OSPF Distance
An administrative distance is a rating of the trustworthiness of a routing information
source, such as an individual router or a group of routers. Numerically, an administrative
distance is an integer between 0 and 255. In general, the higher the value is, the lower
the trust rating is. An administrative distance of 255 means the routing information source
cannot be trusted at all and should be ignored.
OSPF uses three different administrative distances: intra-area, inter-area, and external.
Routes learned through other domain are external, routes to another area in OSPF domain are inter-area, and routes inside an area are intra-area. The default distance for
each type of route is 110. In order to change any of the OSPF distance values, use the
following commands.
The following is explaining 3 options of command.
•
•
•

external <1-255>
inter-area <1-255>
intra-area <1-255>

To configure the distance with 1 option, use the following command.
Command

Mode

Description

distance ospf external <1-255>
distance ospf inter-area <1-255>

Router

Configures the distance of OSPF route.
(default: 110)

distance ospf intra-area <1-255>

354

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

The following example shows how to configure the distance with more than 2 options:
distance ospf external <1-255> inter-area <1-255>
distance ospf inter-area <1-255> intra-area <1-255>

•
•

To make it as a default, use the following command.
Command

Router

no distance ospf

10.2.14

Mode

Description
Restores it as the default.

Host Route
OSPF regards routing information of specific host as stub link information. Routing information can be assigned to each host which is connected with one router.
To configure the routing information to each host, use the following command.
Command

Mode

host A.B.C.D area A.B.C.D
host A.B.C.D area A.B.C.D cost <0-65535>

Command

Router

Configures the routing information to
each host.

Mode

host A.B.C.D area <1-4294967295>
host A.B.C.D area <1-4294967295> cost <065535>

10.2.15

Description

Router

Description
Configures the routing information to
each host.

Passive Interface
The passive interface which is configured by OSPF network operate as stub area. Therefore passive interface can not exchange the OSPF routing information.
To configure the passive interface, use the following command.
Command
passive-interface INTERFACE
[A.B.C.D]

Mode
Router

Description
Configures the passive interface.

To release the configured as passive interface, use the following command.
Command
no passive-interface INTERFACE
[A.B.C.D]

A50010-Y3-C150-2-7619

Mode
Router

Description
Releases the configured as passive interface.

355

UMN:CLI

10.2.16

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Blocking Routing Information
The hiD 6615 S323 can classify and restrict the routing information. To configure this
function, sort the specific routing information in access-list first, and block the routing information in access-list.
To block the routing information in access-list, use the following command.
Command

Mode

Description

distribute-list ACCESS-LIST out
{bgp | connected | kernel | rip |

Router

Blocks the routing information in access-list

static}

To release the configuration, use the following command.
Command

Mode

Description

distribute-list ACCESS-LIST out
{bgp | connected | kernel | rip |

Router

Releases the configuration.

static}

10.2.17

Summary Routing Information
In case of external routing protocol transmits to OSPF network, more than 2 routing information can be summarized as one. For example, 192.168.1.0/24 and 192.168.2.0/24
can become 192.168.0.0/16 to transmit to OSPF network. This summary reduces the
number of routing information and it improves a stability of OSPF protocol
And you can use no-advertise option command to block the transmission of summarized
routing information to outside. Or assign the specific tag number to configure.
To configure the summary routing information, use the following command.
Command

Mode

Configures the summary routing information.

summary-address A.B.C.D/M
summary-address

10.2.18

Blocks the transmission of summarized routing infor-

A.B.C.D/M

not-advertise

Description

Router

mation to outside

no summary-address A.B.C.D/M

Configures the summary routing information with a

tag <0-4294967295>

specific tag

OSPF Monitoring and Management
You can view all kinds of statistics and database recorded in IP routing table. These information can be used to enhance system utility and solve problem in case of trouble. You
can check network connection and data routes through the transmission.

356

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.18.1

UMN:CLI

Displaying OSPF Protocol Information
You can verify several information about OSPF protocol. To display the information about
OSPF protocol, use the following command.
Command
show ip ospf

Mode
Enable

show ip ospf <0-65535>

Global

Description
Shows the information about OSPF protocol.
Shows the information about a specific process ID in
OSPF protocol.

To display OSPF routing table to ABR and ASBR, use the following command.
Command
show ip ospf border-routers

Mode
Enable
Global

Description
Shows OSPF routing table to ABR and ASBR.

To display the OSPF database, use the following command.
Command

Mode

Description

show ip ospf database {self-originate | maxage}
show ip ospf database adv-router A.B.C.D
show ip ospf database {asbr-summary | external | network | router | summary | nssaexternal | opaque-link | opaque-area | opaqueas}
show ip ospf database {asbr-summary | external | network | router | summary | nssaexternal | opaque-link | opaque-area | opaqueas} self-originate
show ip ospf database {asbr-summary | external | network | router | summary | nssaexternal | opaque-link | opaque-area | opaqueas} adv-router A.B.C.D

Enable
Global

Shows the OSPF database.

show ip ospf database {asbr-summary | external | network | router | summary | nssaexternal | opaque-link | opaque-area | opaqueas} A.B.C.D
show ip ospf database {asbr-summary | external | network | router | summary | nssaexternal | opaque-link | opaque-area | opaqueas} A.B.C.D self-originate
show ip ospf database {asbr-summary | external | network | router | summary | nssaexternalㅣopaque-link | opaque-area | opaqueas} A.B.C.D adv-router A.B.C.D

A50010-Y3-C150-2-7619

357

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To display the interface information of OSPF, use the following command.
Command
show ip ospf interface [INTERFACE]

Mode

Description

Enable

Shows the interface information of

Global

OSPF.

To display the information of neighbor route, use the following command.
Command

Mode

Description

Enable

Shows the information of neighbor

Global

router.

show ip ospf neighbor
show ip ospf neighbor A.B.C.D [detail]
show ip ospf neighbor interface A.B.C.D
show ip ospf neighbor detail [all]
show ip ospf neighbor all

To display the routing information which is registered in routing table, use the following
command.
Command
show ip ospf route

Mode

Description

Enable

Shows the routing information which is registered in

Global

routing table.

To display the information of virtual link, use the following command.
Command
show ip ospf virtual-links

358

Mode
Enable
Global

Description
Shows the information of virtual link.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.2.18.2

UMN:CLI

Displaying Debugging Information
The hiD 6615 S323 uses debug command to find the reason of problem. Use the following command.
Command

Mode

Description
Shows all the debugging information.

debug ospf all

Shows information about OSPF operation such as

debug ospf events [abr | asbr |

OSPF neighbor router, transmitted information, decid-

lsa | nssa | os | router | vlink]

ing destination router, calculating the shortest route,
and so on.

debug ospf ifsm [events | status

Shows the debugging information of OSPF interface.

| timers]

Shows information transmitted by OSPF and calculat-

debug ospf lsa [flooding | generate | refresh]
debug ospf nfsm [events | status

Enable

ing the shortest route.
Shows the debugging information of OSPF Neighbor

| timers]

router.

debug ospf nsm [events | status

Shows the debugging information between OSPF

| timers]

process and NSM (Network Services Module).

debug ospf packet {hello | dd |
Shows the debugging information of each packet.

ls-ack | ls-request | ls-update |
all} [send | recv [detail]]
debug ospf route [ase | ia | in-

Shows the debugging information of OSPF routing.

stall | spf]

To display the debugging information, use the following command.
Command
show debugging ospf

10.2.18.3

Mode
Enable
Global

Description
Shows the debugging information of OSPF.

Limiting Number of Database
The hiD 6615 S323 can limit the Number of Database to process in OSPF. For example,
if a router connected with many of routers, it carries overload to process the database.
Therefore, Limiting the Number of Database reduces the overload on system.
To configure the limiting Number of Database, use the following command.
Command
max-concurrent-dd <1-65535>

Mode
Router

Description
Configures the limiting Number of Database.

To delete the configuration, use the following command.
Command
no max-concurrent-dd
<1-65535>

A50010-Y3-C150-2-7619

Mode
Router

Description
Deletes the configuration.

359

UMN:CLI

10.2.18.4

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Maximum Process of LSA
The hiD 6615 S323 can configures maximum number of LSA to process. LSA is classified
as internal route LSA and external route LSA, maximum number of LSA can configure on
each class.
And also, If process of LSA is over the configured number, you can configure it to stop the
process or send the caution message. When the outer route of LSA is overflowed the assigned value, you can configure it to restart OSPF after the waiting time. If the waiting
time is 0, OSPF keep the process before the administrator reboots the system.
To assign the maximum number of LSA to process in OSPF, use the following command.
Command

Mode

overflow database
<1-4294967294> [hard | soft]

Description
Assigns the number of LSA for internal route.

Router

overflow database external

Assigns the number of LSA for external route.

<0-2147483647> <0-65535>

When there is an overflow, hard configuration will stop the process, and soft configuration will send a caution message.
To release the configuration, use the following command.
Command

Mode

Description
Releases the configuration for OSPF internal route.

no overflow database
no overflow database external
[<0-2147483647>]

Router

Releases the configuration for OSPF external route.

no overflow database external
<0-2147483647> [<0-65535>]

360

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.3

UMN:CLI

Routing Information Protocol (RIP)
Routing Information Protocol (RIP), as it is more commonly used than any other Routing
Protocols, for use in small, homogeneous networks. It is a classical distance-vector routing protocol with using hop count. RIP is formally defined in documents in Request For
Comments (RFC) 1058 and Internet Standard (STD) 56. As IP-based networks became
both more numerous and greater in size, it became apparent to the Internet Engineeing
Task Force (IETF) that RIP needed to be updated. Consequently, the IETF released RFC
1388, RFC 1723 and RFC 2453, which described RIP v2 (the second version of RIP).
RIP v2 uses broadcast User Datagram Protocol (UDP) data packets to exchange routing
information. The hiD 6615 S323 sends routing information and updates it every 30 seconds. This process is termed advertised. If a router does not receive an update from another router for 180 seconds or more, it marks the routes served by the non-updating
router as being unusable. If there is still no update after 120 seconds, the router removes
all routing table entries for the non-updating router.
The metric that RIP uses to rate the value of different routes is hop count. The hop count
is the number of routers that should be traversed through the network to reach the destination. A directly connected network has a metric of zero; an unreachable network has a
metric of 16. This short range of metrics makes RIP an unsuitable routing protocol for
large networks.
A router that is running RIP can receive a default network via an update from another
router that is running RIP, or the router can source (generate) the default network itself
with RIP. In both cases, the default network is advertised through RIP to other RIP
neighbors. RIP sends updates to the interfaces in the specified networks.
If an interface's network is not specified, it will not be advertised in any RIP update. The
hiD 6615 S323 supports RIP version 1 and 2.

!

10.3.1

Routing functionalities such as RIP, OSPF, BGP and PIM-SM are only available for hiD
6615 S323. (Unavailable for hiD 6615 S223)

Enabling RIP
To use RIP protocol, you should enable RIP.
Step 1
To open Router Configuration mode, use the following command on Global Configuration
mode.
Command

Mode

Opens Router Configuration mode and operates RIP

router rip
Global

no router rip

A50010-Y3-C150-2-7619

Description

routing protocol.
Restores all configurations involved in RIP to the default.

361

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Step 2
Configure the network to operate as RIP.
Command
network

{A.B.C.D/M

Mode
|

Establishes the network to operate as RIP.

INTER-

FACE }

no network {A.B.C.D/M | INTERFACE }

Description

A.B.C.D/M: IP prefix (e.g. 35.0.0.0/8)
Router

INTERFACE: interface name
Removes a specified network to operate as RIP.

The command network enables RIP interfaces between certain numbers of a special
network address. For example, if the network for 10.0.0.0/24 is RIP enabled, this would
result in all the addresses from 10.0.0.0 to 10.0.0.255 being enabled for RIP.
By the way, it’s not possible to exchange the RIP routing information if it hasn’t been established RIP network using network command even though interface belongs to RIP
network. RIP packets with RIP routing information is transmitted to port specified with the
network command.
After RIP is enabled, you can configure RIP with the following items:
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•

10.3.2

RIP Neighbor Routers
RIP Version
Creating available Static Route only for RIP
Redistributing Routing Information
Metrics for Redistributed Routes
Administrative Distance
Originating Default Information
Routing Information Filtering
Maximum Number of RIP Routes
RIP Network Timer
Split Horizon
Authentication Key
Restarting RIP
UDP Buffer Size of RIP
Monitoring and Managing RIP

RIP Neighbor Router
Since RIP is broadcast protocol, routers should be connected each other to transmit the
routing information of RIP to non-broadcast network.

To configure neighbor router to transmit RIP information, use the following command on
Router Configuration mode.

362

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

UMN:CLI

Mode

Description
Configures a neighbor router to exchange routing in-

neighbor A.B.C.D

Router

10.3.3

A.B.C.D: neighbor address
Deletes the neighbor router.

no neighbor A.B.C.D

i

formation.

You can block the routing information to specific interface by using the passive-interface
command.

RIP Version
Basically, the hiD 6615 S323 supports RIP version 1 and 2. However, you can configure
to receive either RIP v1 type packets only or RIP v2 type packets only.
To configure RIP version, use the following command.
Command
version {1 | 2}

Mode

Description
Selects one type of RIP packets to transmit either RIP

Router

v1 or RIP v2 type packet
Restores the default of specified RIP version type

no version {1 | 2}

The preceding task controls default RIP version settings. You can override the routers RIP
version by configuring a particular interface to behave differently.
To control which RIP version an interface sends, perform one of the following tasks after
opening Interface Configuration mode.
Command

Mode

Sends RIP v1 type packet only to this interface.

ip rip send version 1
ip rip send version 2

Description

Interface

Sends RIP v2 type packet only to this interface.
Sends RIP v1 and RIP v2 type packets both.

ip rip send version 1 2

To delete the configuration that sends RIP version packet to interface, use the following
command.
Command

Mode

Deletes the configuration of RIP v1 type packet for

no ip rip send version 1

no ip rip send version 2

no ip rip send version 1 2

Description

helping them to be sent to the interface.
Interface

Deletes the configuration of RIP v2 type packet for
helping them to be sent to the interface.
Deletes the configuration of both RIP v1 and v2 type
packets for helping them to be sent to the interface.

Similarly, to control how packets received from an interface are processed, perform one of
the following tasks.

A50010-Y3-C150-2-7619

363

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode

Receives RIP v1 type packet only from the interface.

ip rip receive version 1
ip rip receive version 2

Description

Interface

Receives RIP v2 type packet only from the interface.
Receives both RIP v1 and RIP v2 type packets from

ip rip receive version 1 2

the interface.

To delete the configuration that receives RIP version packet from the interface, use the
following command.
Command

Mode

Deletes the configuration of RIP v1 type packet for

no ip rip receive version 1

no ip rip receive version 2

Description

helping them be received from the interface.
Deletes the configuration of RIP v2 type packet for
Interface

helping them to be received from interface.
Deletes the configuration of both RIP v1 and RIP v2
type packets for helping them to be received from the

no ip rip receive version 1 2

interface.

10.3.4

Creating available Static Route only for RIP
This feature is provided only by Siemens’ route command creates static route available
only for RIP. If you are not familiar with RIP protocol, you would better use redistribute
static command.
Command

Mode

Description
Creates suitable static route within RIP environment
only.

route A.B.C.D/M
Router

no route A.B.C.D/M

10.3.5

A.B.C.D/M: IP prefix
Deletes this static route established by route command.

Redistributing Routing Information
The hiD 6615 S323 can redistribute the routing information from a source route entry into
the RIP tables. For example, you can instruct the router to re-advertise connected, kernel,
or static routes as well as other routes established by routing protocol. This capability applies to all the IP-based routing protocols.

To redistribute routing information from a source route entry into the RIP table, use the
following command.

364

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

UMN:CLI

Mode

Description

redistribute {kernel | connected |
static | ospf | bgp}
redistribute {kernel | connected |
static | ospf | bgp } metric <0-16>
redistribute {kernel | connected |
static | ospf | bgp } route-map

Registers transmitted routing information in another
Router

router’s RIP table.
1-16: metric value
WORD: pointer to route-map entries

WORD

redistribute {kernel | connected |
static | ospf | bgp } metric <0-16>
route-map WORD

To delete the configuration for redistributing routing information in another router’s RIP table, use the following command.
Command

Mode

Description

no redistribute {kernel | connected | static | ospf | bgp}
no redistribute {kernel | connected | static | ospf | bgp } metric <0-16>
no redistribute {kernel | con-

Router

nected | static | ospf | bgp}

Removes the configuration of transmitted routing information in another router’s RIP table.

route-map WORD
no redistribute {kernel | connected | static | ospf | bgp } metric <0-16> route-map WORD

As the needs of the case demand, you may also conditionally restrict the routing information between the two networks using route-map command.
To permit or deny the specific information, open the Route-map Configuration mode using
the following command in Global Configuration mode.
Command
route-map TAG {deny | permit}
<1-65535>

Mode

Description
Creates the route map.

Global

TAG: route map tag
1-65535: sequence number

One or more match and set commands typically follow route-map command. If there are
no match commands, then everything matches. If there are no set commands, nothing is
done. Therefore, you need at least one match or set command.

Use the following command on Route-map Configuration mode to limit the routing information for transmitting to other routers’ RIP table.

A50010-Y3-C150-2-7619

365

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Command

Mode

Description
Transmits the information to specified interface only.

match interface INTERFACE

INTERFACE: interface name
Transmits the information matched with access-list.

match ip address {<1-199> |

1-199: IP access list number

<1300-2699> | NAME}

1300-2699: IP access list number (expanded range)
NAME: IP access list name

match

ip

address

Transmits the information matched with prefix-list.

prefix-list

NAME

Route-map

NAME: IP prefix list name
Transmits information to only neighbor router in access-list.

match ip next-hop {<1-199> |

1-199: IP access list number

<1300-2699> | NAME}

1300-2699: IP access list number (expanded range)
NAME: IP access list name
Transmits information to only neighbor router in prefix-

match ip next-hop prefix-list

list.

NAME

NAME: IP prefix list name

Command

Mode

Transmits information matched with specified metric,

match metric <0-4294967295>

set ip next-hop A.B.C.D

enter the metric value.
Route-map

Configures Neighbor router’s address.
A.B.C.D: IP address of next hop
Sets the metric value for destination routing protocol.

set metric <1-2147483647>

10.3.6

Description

1-2147483647: metric value

Metrics for Redistributed Routes
The metrics of one routing protocol do not necessarily translate into the metrics of another.
For example, the RIP metric is a hop count and the OSPF metric is a combination of five
quantities. In such situations, an artificial metric is assigned to the redistributed route. Because of this unavoidable tampering with dynamic information, carelessly exchanging
routing information between different routing protocols can create routing loops, which
can seriously degrade network operation. To prevent this situation, we configure metrics
To set metrics for redistributed routes, use the following command.
Command

Mode

Description
Configures the equal metric of all routes transmitted by

default-metric <1-16>

routing protocol, enter the value.
Router

no default-metric [<1-16>]

i

366

1-16: default metric value
Removes the equal metric of all routes transmitted by
routing protocol.

The metric of all protocol can be configured from 0 to 4294967295. It can be configured
from 1 to 16 for RIP.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.3.7

UMN:CLI

Administrative Distance
Administrative distance is a measure of the trustworthiness of the source of the routing information.
In large scaled network, Administrative distance is the feature that routers use in order to
select the best path when there are two or more different routes to the same destination
from two different routing protocols. Administrative distance defines the reliability of a
routing protocol. Each routing protocol is prioritized in order of most to least reliable (believable) with the help of an administrative distance value.
Remember that administrative distance has only local significance, and is not advertised
in routing updates. Most routing protocols have metric structures and algorithms that are
not compatible with other protocols. In a network with multiple routing protocols, the exchange of route information and the capability to select the best path across the multiple
protocols are critical. Administrator should set the distance value based on whole routing
networks.
To configure the administrative distance value, use the following command.
Command

Mode

Description
Sets the administrative distance value for routes.
1-255: distance value

distance <1-255> [A.B.C.D/M
[ACCESS-LIST]]

Router

no distance [<1-255>] [A.B.C.D/M

ACCESS-LIST: access list name
Deletes the administrative distance value.

[ACCESS-LIST]]

10.3.8

A.B.C.D/M: IP source prefix

Originating Default Information
You can set an autonomous system boundary router to generate and transmit a default
route into an RIP routing domain. If you specifically set to generate a default routes into
an RIP network, this router becomes an autonomous system (AS) boundary router. However, an AS boundary router does not generate a default route automatically into the RIP
network.
To generate a default route into RIP by the AS boundary router, use the following command on Router Configuration mode.
Command
default-information originate

Mode

Generates a default route into RIP by the AS boundary
Router

no default-information originate

10.3.9

Description

router.
Disables a default route feature.

Routing Information Filtering
You can limit the routing protocol information by performing the following tasks.
•
•

A50010-Y3-C150-2-7619

Block the transmission of routing information to a particular interface. This is to
prevent other systems on an interface from learning about routes dynamically.
Provides a local mechanism for increasing the value of routing metrics.

367

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

10.3.9.1

Filtering Access List and Prefix List
The hiD 6615 S323 switch is able to permit and deny conditions that you can use to filter
inbound or outbound routes by access-list or prefix-list. Use the distribute-list command
to apply the access list to routes received from or forwarded to a neighbor.
User should configure the route information for a set of deny conditions based on matching each access list or prefix list. In addition, this configuration is able to be applied on the
specific interface as well as the whole routes information of switch.
To block the route information based on matching access list or prefix list, use the following command.
Command

Mode

Description

distribute-list ACCESS-LIST {in |

Apply a specific access list or prefix list to incoming or

out} [INTERFACE]

outgoing RIP route updates on interface in order to
Router

distribute-list

prefix

PREFIX-

block the route.
INTERFACE: interface name
ACCESS-LIST: access list name

LIST {in | out} [INTERFACE]

PREFIX-LIST: prefix list name

To remove the filtering access list or prefix-list to incoming or outgoing RIP route
Command

Mode

no distribute-list ACCESS-LIST
{in | out} [INTERFACE]

Removes the application of a specific access list or
Router

no distribute-list prefix PREFIX-

prefix list to incoming or outgoing RIP route updates on
interface in order to block the route.

LIST {in | out} [INTERFACE]

10.3.9.2

Description

Disabling the transmission to Interface
To prevent other routers on a local network from learning about routes dynamically, you
can keep routing update messages from being sent through a router interface. This feature applies to all IP-based routing protocols except for BGP.
Disable the routing information to transmit on this interface of router, use the following
command.
Command

Mode

Description
Disables the transmission of multicast RIP messages
on the interface.

passive-interface INTERFACE
Router

no passive-interface INTERFACE

10.3.9.3

INTERFACE: interface name
Re-enables the transmission of RIP multicast messages on the specified interface.

Offset List
An offset list is the mechanism for increasing incoming and outgoing metrics to routes
learned via RIP. You can limit the offset list with an access list.

368

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To add the value of routing metrics, use the following command.
Command

Mode

Description
Add an offset to incoming or outgoing metrics to routes

offset-list ACCESS-LIST {in | out}
<0-16> [INTERFACE]

learned via RIP.
Router

ACCESS-LIST: access list name
0-16: type number
INTERFACE: interface name

Command
no offset-list ACCESS-LIST {in |
out} <0-16> [INTERFACE]

10.3.10

Mode
Router

Description
Removes an offset list.

Maximum Number of RIP Routes
You can set the maximum number of RIP routes for using on RIP protocol. To set the
maximum number of routes, use the following command.
Command

Mode

Description
Sets the maximum number of routes of RIP.

maximum prefix <1-65535> [1100]

10.3.11

1-65535: maximum number of RIP routes
Router

1-100: percentage of maximum routes to generate a
warning (default: 75)

no maximum prefix <1-65535>

Removes the maximum number of routes of RIP which

[1-100]

are set before.

RIP Network Timer
Routing protocols use several timers that determine such variables as the frequency of
routing updates, the length of time before a route becomes invalid, and other parameters.
You can adjust these timers to tune routing protocol performance to better your internet
needs. The default settings for the timers are as follows.
•

Update
The routing information is updated once every 30 seconds. This is the fundamental
timing parameter of the routing protocol. Every update timer seconds, the RIP process is supposed to send the routing table to all neighboring RIP routers.

•

Timeout
The default is 180 seconds. It’s the interval of time in seconds after which a route is
declared invalid. However, this information will be still written in routing table until the
neighbor routers are notified that this route is removed from the routing table.

•

Garbage
The invalid information of route is deleted on the routing table every 120 seconds.
Once the information of route is classified as “invalid”, it’s eventually removed from
the routing table after 120 seconds.

A50010-Y3-C150-2-7619

369

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

To adjust the timers, use the following command.
Command

Mode

timers basic UPDATE TIMEOUT
GARBAGE

Adjusts RIP network timers.
Router

no timers basic UPDATE TIME-

Restores the default timers.

OUT GARBAGE

10.3.12

Description

Split Horizon
Normally, routers that are connected to broadcast type IP networks and that use distancevector routing protocols employ the split horizon mechanism to reduce the possibility of
routing loops. Split horizon blocks information about routes from being advertised by a
router out any interface from which that information originated. This behavior usually optimizes communications among multiple routers, particularly when links are broken. However, with non-broadcast networks, such as Frame Relay, situations can arise for which
this behavior is less than ideal. For these situations, you might want to disable split horizon.
If the interface is configured with secondary IP address and split horizon is enabled, updates might not be sourced by every secondary address. One routing update is sourced
per network number unless split horizon is disabled.
To enable or disable split horizon mechanism, use the following command in Interface
Configuration mode.
Command
ip rip split-horizon [poisoned]
no rip ip split-horizon [poisoned]

10.3.13

Mode

Description
Enables the split horizon mechanism.

Interface

poisoned: performs poisoned reverse.
Disables the split horizon mechanism.

Authentication Key
RIP v1 does not support authentication. If you are sending and receiving RIP v2 packets,
you can enable RIP authentication on an interface. The key chain determines the set of
keys that can be used on the interface. If a key chain is not configured, plain text authentication can be performed using string command.
The hiD 6615 S323 supports two modes of authentication on an interface for which RIP
authentication is enabled: plain text authentication and MD5 authentication. The default
authentication in every RIP v2 packet is plain text authentication.

i

370

Do not use plain text authentication in RIP packets for security purposes, because the
unencrypted authentication key is sent in every RIP v2 packet. Use plain text
authentication when security is not an issue, for example, to ensure that misconfigured
hosts do not participate in routing.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

To configure RIP authentication, use the following command.
Command

Mode

Description
Enables authentication for RIP v2 packets and to spec-

ip rip authentication key-chain

ify the set of keys that can be used on an interface.

NAME

NAME: name of key chain
Specifies the authentication mode.
Interface

ip rip authentication mode {text |

text: sends a simple text password to neighbors. If a
neighbor does not have the same password, request
and updates from this system are rejected.

md5}

md5: sends an MD5 hash to neighbors. Neighbors
must share the MD5 key to decrypt the message and
encrypt the response.

Command

Mode

Description
Configures RIP authentication string which will be us-

ip

rip

authentication

string

STRING

Interface

ing on interface without Key chain. The string must be
shorter than 16 characters.
STRING: RIP authentication string

To disable RIP authentication, use the following command.
Command

Description

no ip rip authentication key-

Disables authentication keys that can be used on an

chain NAME

interface.

no ip rip authentication mode
{text | md5}

10.3.14

Mode

Interface

Disables specified authentication mode.

no ip rip authentication string

Removes RIP authentication string which will be using

STRING

on interface without Key chain.

Restarting RIP
Occasionally, you should restart RIP system only when the switch is still operating while
you manage and configure RIP. At this time, the switch reports the neighbors that RIP
system is being restarting. It keeps previous route information until the restarting is complete in timer.
To restart RIP system only, use the following command.
Command

Mode

rip restart grace-period
<1-65535>

no rip restart grace-period
[<1-65535>]

10.3.15

Description
Restarts RIP system and set the period.

Global
Removes a configured period.

UDP Buffer Size of RIP
RIP protocol exchanges the routing information between routers using UDP packets. The
hiD 6615 S323 can be configured theses UDP packets buffer size, use the following

A50010-Y3-C150-2-7619

371

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

command.
Command

Mode

recv-buffer size <81962147483647>

no recv-buffer size <8196-

Sets the UDP Buffer size value for using RIP.
Router

8196-2147483647: UDP buffer size value
Restore the default value of UDP buffer size.

2147483647>

10.3.16

Description

Monitoring and Managing RIP
You can display specific router information such as the contents of IP routing tables, and
databases. Information provided can be used to determine resource utilization and solve
network problems. You can also discover the routing path your router’s packets are taking
through the network.
To display RIP information, use the following command.
Command

Mode

Description
Shows RIP information being used in router.

show ip rip
show ip route rip

Enable

Shows a routing table information involved in RIP.

Global

Shows a current status of RIP protocol and its informa-

show ip protocols [rip]

tion.

To quickly diagnose problems, the debug command is useful for customers. To display information on RIP routing transactions or debugging information, use the following command.
Command

Mode

Shows RIP event such as packet transmit and sending

debug rip events

372

Description

and changed RIP information.

debug rip packet [recv | send]

Enable

Shows more detailed information about RIP packet.

debug rip packet [recv | send]

Global

The information includes address of packet transmis-

detail

sion and port number.

show debugging rip

Shows all information configured for RIP debugging.

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

11 System Software Upgrade
For the system enhancement and stability, new system software may be released. Using
this software, the hiD 6615 S223/323 can be upgraded without any hardware change.
You can simply upgrade your system software with the provided upgrade functionality via
the CLI.

11.1

General Upgrade
The hiD 6615 S223/323 supports the dual system software functionality, which you can
select applicable system software stored in the system according to various reasons such
as the system compatibility or stability.
To upgrade the system software of the switch, use the following command.
Command

Mode

Downloads the system software of the switch via FTP

copy {ftp | tftp} os download
{os1 | os2}

Description

or TFTP.
Enable

os1 | os2: the area where the system software is stored

copy {ftp | tftp} os upload {os1 |

Uploads the system software of the switch via FTP or

os2}

TFTP.

!

To upgrade the system software, FTP or TFTP server must be set up first. Using the copy
command, the system will download the new system software from the server.

!

To reflect the downloaded system software, the system must restart using the reload
command. For more information, see Section 4.1.8.
The following is an example of upgrading the system software stored in os1.
SWITCH# copy ftp os download os1
To exit : press Ctrl+D
-------------------------------------IP address or name of remote host (FTP): 10.100.158.144
Download File Name : V5212G.3.18.x
User Name : admin
Password:
Hash mark printing on (1024 bytes/hash mark).
Downloading NOS ....
##############################################################################
##############################################################################
##############################################################################
##############################################################################
##############################################################################
##############################################################################
(Omitted)
##############################################################################
##############################################################################
##############################################################################
##############################################################################

A50010-Y3-C150-2-7619

373

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

##############################################################################
##############################################################################
############################################################
13661792 bytes download OK.
SWITCH# show flash
Flash Information(Bytes)
Area

total

used

free

-------------------------------------------------------------OS1(default)(running)

16777216

13661822

3115394

3.18 #1009

OS2

16777216

13661428

3115788

3.12 #1008

4194304

663552

3530752

CONFIG

-------------------------------------------------------------Total

37748736

27986802

9761934

SWITCH# reload
Do you want to save the system configuration? [y/n]y
Do you want to reload the system? [y/n]y
Broadcast message from admin (ttyp0) (Fri Aug 18 15:15:41 2006 +0000):
The system is going down for reboot NOW!

11.2

Boot Mode Upgrade
In case that you cannot upgrade the system software with the general upgrade procedure,
you can upgrade it with the boot mode upgrade procedure. Before the boot mode upgrade, please keep in mind the following restrictions.

!

•
•
•
•

A terminal must be connected to the system via the console interface. To open the
boot mode, you should press  key when the boot logo is shown up.
The boot mode upgrade supports TFTP only. You must set up TFTP server before
upgrading the system software in the boot mode.
In the boot mode, the only interface you can use is MGMT interface. So the system
must be connected to the network via the MGMT interface.
All you configures in the boot mode is limited to the boot mode only!

To upgrade the system software in the boot mode, perform the following step-by-step instruction.
Step 1
To open the boot mode, press  key when the boot logo is shown up.
************************************************************
*

*

*

Boot Loader Version 4.76

*

*

Siemens AG

*

*

*

************************************************************
Press 's' key to go to Boot Mode:
Boot>

374

0

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Step 2
To enable the MGMT interface to communicate with TFTP server, you need to configure a
proper IP address, subnet mask and gateway on the interface.
To configure an IP address, use the following command.
Command
ip A.B.C.D

Mode
Boot

ip

Description
Configures an IP address.
Shows a currently configured IP address.

To configure a subnet mask, use the following command.
Command
netmask A.B.C.D

Mode
Boot

netmask

Description
Configures a subnet mask. (e.g. 255.255.255.0)
Shows a currently configured subnet mask.

To configure a default gateway, use the following command.
Command
gateway A.B.C.D

Mode
Boot

gateway

Description
Configures a default gateway.
Shows a currently configured default gateway.

To display a configured IP address, subnet mask and gateway, use the following command.
Command

Boot

show

!

Mode

Description
Shows a currently configured IP address, subnet mask
and gateway.

The configured IP address, subnet mask and gateway on the MGMT interface are limited
to the boot mode only!
The following is an example of configuring an IP address, subnet mask and gateway on
the MGMT interface in the boot mode.
Boot> ip 10.27.41.83
Boot> netmask 255.255.255.0
Boot> gateway 10.27.41.254
Boot> show

A50010-Y3-C150-2-7619

IP

= 10.27.41.83

GATEWAY

= 10.27.41.254

NETMASK

= 255.255.255.0

MAC

= 00:d0:cb:00:0d:83

MAC1
Boot>

= ff:ff:ff:ff:ff:ff

375

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Step 3
Download the new system software via TFTP using the following command.
Command

Mode

Description
Downloads the system software.

load {os1 | os2} A.B.C.D FILE-

Boot

NAME

os1 | os2: the area where the system software is stored
A.B.C.D: TFTP server address
FILENAME: system software file name

To verify the system software in the system, use the following command.
Command

Mode
Boot

flashinfo

!

Description
Shows the system software in the system.

To upgrade the system software in the boot mode, TFTP server must be set up first. Using the load command, the system will download the new system software from the
server.
The following is an example of upgrading the system software stored in os1 in the boot
mode.
Boot> load os1 10.27.41.82 V5212G.3.18.x
TFTP from server 10.27.41.82; our IP address is 10.27.41.83
Filename 'V5212G.3.18.x'.
Load address: 0xffffe0
Loading: #####################################################################
#####################################################################
#####################################################################
#####################################################################
#####################################################################
(Omitted)
#####################################################################
#####################################################################
#####################################################################
#####################################################################
#####################################################################
####
done
Bytes transferred = 13661822 (d0767e hex)
Update flash: Are you sure (y/n)? y
Erasing

: 0x01D00000 - 0x01D1FFFF

Programming : 0x01D00000 - 0x01D1FFFF
Verifying

: 0x01D00000 - 0x01D1FFFF

Boot> flashinfo
Flash Information(Bytes)
Area

OS size

Default-OS

Standby-OS

OS Version

------------------------------------------------------------os1
os2

13661806
13661412

*

*

3.18 #1009
3.12 #1008

Boot>

376

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

Step 4
Reboot the system with the new system software using the following command.
Command
reboot [os1 | os2]

Mode
Boot

Description
Reboots the system with specified system software.
os1 | os2: the area where the system software is stored

If the new system software is a current standby OS, just exit the boot mode, then the interrupted system boot will be continued again with the new system software.
To exit the boot mode, use the following command.
Command

Boot

exit

11.3

Mode

Description
Exits the boot mode.

FTP Upgrade
The system software of the hi can be upgraded using FTP. This will allow network or system administrators to remotely upgrade the system with the familiar interface.
To upgrade the system software using FTP, perform the following step-by-step instruction:
Step 1
Connect to the hiD 6615 S223/323 with your FTP client software. To login the system, you
can use the system user ID and password.

!

Note that you must use the command line-based interface FTP client software when upgrading the hiD 6615 S223/323. If you use the graphic-based interface FTP client software, the system cannot recognize the upgraded software.
Step 2
Set the file transfer mode to the binary mode using the following command.
Command

Mode
FTP

bin

Description
Sets the file transfer mode to the binary mode.

Step 3
Enable to print out the hash marks as transferring a file using the following command.
Command

Mode
FTP

hash

Description
Prints out the hash marks as transferring a file.

Step 3
Uploads the new system software using the following command.
Command

Mode

Description
Uploads the system software.

put FILENAME {os1 | os2}

FTP

FILENAME: system software file name
os1 | os2: the area where the system software is stored

A50010-Y3-C150-2-7619

377

UMN:CLI

User Manual
SURPASS hiD 6615 S223/S323 R1.5

Step 4
Exit the FTP client using the following command.
Command

Mode
FTP

exit

!

Description
Exits the FTP client.

To reflect the downloaded system software, the system must restart using the reload
command! For more information, see Section 4.1.8.1.
The following is an example of upgrading the system software of the hiD 6615 S223/323
using the FTP provided by Microsoft Windows XP in the remote place.
Microsoft Windows XP [Version 5.1.2600]
(C) Copyright 1985-2001 Microsoft Corp.
C:\>ftp 10.27.41.91
Connected to 10.27.41.91.
220 FTP Server 1.2.4 (FTPD)
User (10.27.41.91:(none)): admin
331 Password required for admin.
Password:
230 User root logged in.
ftp> bin
200 Type set to I.
ftp> hash
Hash mark printing On

ftp: (2048 bytes/hash mark) .

ftp> put V5212G.3.18.x os1
200 PORT command successful.
150 Opening BINARY mode data connection for os1.
##############################################################################
##############################################################################
##############################################################################
##############################################################################
##############################################################################
##############################################################################
(Omitted)
##############################################################################
##############################################################################
##############################################################################
##############################################################################
##############################################################################
#########################################
226 Transfer complete.
ftp: 13661428 bytes sent in 223.26Seconds 61.19Kbytes/sec.
ftp> bye
221 Goodbye.
C:\>

378

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

UMN:CLI

12 Abbreviations
ACL

Access Control List

ARP

Address Resolution Protocol

BGP

Border Gateway Protocol

CBS

Committed Burst Size

CE

Communauté Européenne

CIDR

Classless Inter Domain Routing

CIR

Committed Information Rate

CLI

Command Line Interface

CoS

Class of Service

CPE

Customer Premises Equipment

CRC

Cyclic Redundancy Check/Code

DA

Destination Address

DHCP

Dynamic Host Configuration Protocol

DSCP

Differentiated Service Code Point

EGP

Exterior Gateway Protocol

EMC

Electro-Magnetic Compatibility

EN

Europäische Norm (European Standard)

ERP

Ethernet Ring Protection

FDB

Filtering Data Base

FE

Fast Ethernet

FTP

File Transfer Protocol

GB

Gigabyte

GE

Gigabit Ethernet

hiD

Access Products in SURPASS Product Family

HW

Hardware

I2C

Inter - Integrated Circuit interface

ID

Identifier

IEC

International Electro technical Commission

IEEE 802

Standards for Local and Metropolitan Area Networks

IEEE 802.1

Glossary, Network Management, MAC Bridges, and Internetworking

IEEE

Institute of Electrical and Electronic Engineers

A50010-Y3-C150-2-7619

379

UMN:CLI

380

User Manual
SURPASS hiD 6615 S223/S323 R1.5

IETF

Internet Engineering Task Force

IGMP

Internet Group Management Protocol

IP

Internet Protocol

IRL

Input Rate Limiter

ISP

Internet Service Provider

ITU

International Telecommunication Union

ITU-T

International Telecommunication Union Telecommunications standardization sector

L2

Layer 2

LACP

Link Aggregation Control Protocol

LAN

Local Area Network

LCT

Local Craft Terminal

LLC

Logical Link Control

LLDP

Link Layer Discover Protocol

LOF

Loss of Frame

LOL

Loss of Link

LOS

Loss of Signal

LPR

Loss of Power

MAC

Medium Access Control

NE

Network Element

OAM

Operation, Administration and Maintenance

OS

Operating System

OSPF

Open Shortest Path First

PC

Personal Computer

PPP

Point to Point Protocol

QoS

Quality of Service

RFC

Request for Comments

RIP

Routing Information Protocol

RSTP

Rapid Spanning Tree Protocol

RTC

Real Time Clock

SA

Source Address

SFP

Small Form Factor Pluggable

SNMP

Simple Network Management Protocol

A50010-Y3-C150-2-7619

User Manual
SURPASS hiD 6615 S223/S323 R1.5

STP

Spanning Tree Protocol

SW

Software

TCP

Transmission Control Protocol

TDM

Time Division Multiplexing

TFTP

Trivial FTP

TMN

Telecommunication Management Network

TOS

Type of Service

UDP

User Datagram Protocol

UMN

User Manual

VID

VLAN ID

VLAN

Virtual Local Area Network

VoD

Video on Demand

VPI

Virtual Path Identifier

VPN

Virtual Private Network

A50010-Y3-C150-2-7619

UMN:CLI

381



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.4
Linearized                      : Yes
XMP Toolkit                     : 3.1-701
Producer                        : Acrobat Distiller 7.0.5 (Windows)
Creator Tool                    : Word용 Acrobat PDFMaker 7.0.7
Modify Date                     : 2006:08:22 22:07:49+09:00
Create Date                     : 2006:08:22 22:02:10+09:00
Metadata Date                   : 2006:08:22 22:07:49+09:00
Format                          : application/pdf
Title                           : SURPASS hiD 6615 S323 R1.5 User Manual
Creator                         : Daniel Kim
Document ID                     : uuid:a64fcf98-ab9b-409a-aeb7-199ec2aa7604
Instance ID                     : uuid:f4264be7-5685-4461-abc6-494b4fb5b7e0
Company                         : (주)다산네트웍스
Page Count                      : 381
Page Layout                     : OneColumn
Author                          : Daniel Kim
EXIF Metadata provided by EXIF.tools

Navigation menu