User's Manual
Table Of Contents
- Chapter 1 INTRODUCTION
- Chapter 2 INSTALLATION
- Chapter 3 Switch Management
- Chapter 4 Basic Switch Configuration
- Chapter 5 File System Operations
- Chapter 6 Cluster Configuration
- Chapter 7 Port Configuration
- Chapter 8 Port Isolation Function Configuration
- Chapter 9 Port Loopback Detection Function Configuration
- Chapter 10 ULDP Function Configuration
- Chapter 11 LLDP Function Operation Configuration
- Chapter 12 Port Channel Configuration
- Chapter 13 Jumbo Configuration
- Chapter 14 EFM OAM Configuration
- Chapter 15 VLAN Configuration
- Chapter 16 MAC Table Configuration
- Chapter 17 MSTP Configuration
- Chapter 18 QoS Configuration
- Chapter 19 Flow-based Redirection
- Chapter 20 Egress QoS Configuration
- Chapter 21 Flexible Q-in-Q Configuration
- Chapter 22 Layer 3 Forward Configuration
- Chapter 23 ARP Scanning Prevention Function Configuration
- Chapter 24 Prevent ARP, ND Spoofing Configuration
- Chapter 25 ARP GUARD Configuration
- Chapter 26 ARP Local Proxy Configuration
- Chapter 27 Gratuitous ARP Configuration
- Chapter 28 Keepalive Gateway Configuration
- Chapter 29 DHCP Configuration
- Chapter 30 DHCPv6 Configuration
- Chapter 31 DHCP option 82 Configuration
- Chapter 32 DHCPv6 option37, 38
- Chapter 33 DHCP Snooping Configuration
- Chapter 34 Routing Protocol Overview
- Chapter 35 Static Route
- Chapter 36 RIP
- Chapter 37 RIPng
- Chapter 38 OSPF
- Chapter 39 OSPFv3
- Chapter 40 BGP
- 40.1 Introduction to BGP
- 40.2 BGP Configuration Task List
- 40.3 Configuration Examples of BGP
- 40.3.1 Examples 1: configure BGP neighbor
- 40.3.2 Examples 2: configure BGP aggregation
- 40.3.3 Examples 3: configure BGP community attributes
- 40.3.4 Examples 4: configure BGP confederation
- 40.3.5 Examples 5: configure BGP route reflector
- 40.3.6 Examples 6: configure MED of BGP
- 40.3.7 Examples 7: example of BGP VPN
- 40.4 BGP Troubleshooting
- Chapter 41 MBGP4+
- Chapter 42 Black Hole Routing Manual
- Chapter 43 GRE Tunnel Configuration
- Chapter 44 ECMP Configuration
- Chapter 45 BFD
- Chapter 46 BGP GR
- Chapter 47 OSPF GR
- Chapter 48 IPv4 Multicast Protocol
- 48.1 IPv4 Multicast Protocol Overview
- 48.2 PIM-DM
- 48.3 PIM-SM
- 48.4 MSDP Configuration
- 48.4.1 Introduction to MSDP
- 48.4.2 Brief Introduction to MSDP Configuration Tasks
- 48.4.3 Configuration of MSDP Basic Function
- 48.4.4 Configuration of MSDP Entities
- 48.4.5 Configuration of Delivery of MSDP Packet
- 48.4.6 Configuration of Parameters of SA-cache
- 48.4.7 MSDP Configuration Examples
- 48.4.8 MSDP Troubleshooting
- 48.5 ANYCAST RP Configuration
- 48.6 PIM-SSM
- 48.7 DVMRP
- 48.8 DCSCM
- 48.9 IGMP
- 48.10 IGMP Snooping
- 48.11 IGMP Proxy Configuration
- Chapter 49 IPv6 Multicast Protocol
- Chapter 50 Multicast VLAN
- Chapter 51 ACL Configuration
- Chapter 52 802.1x Configuration
- 52.1 Introduction to 802.1x
- 52.2 802.1x Configuration Task List
- 52.3 802.1x Application Example
- 52.4 802.1x Troubleshooting
- Chapter 53 The Number Limitation Function of Port, MAC in VLAN and IP Configuration
- 53.1 Introduction to the Number Limitation Function of Port, MAC in VLAN and IP
- 53.2 The Number Limitation Function of Port, MAC in VLAN and IP Configuration Task Sequence
- 53.3 The Number Limitation Function of Port, MAC in VLAN and IP Typical Examples
- 53.4 The Number Limitation Function of Port, MAC in VLAN and IP Troubleshooting Help
- Chapter 54 Operational Configuration of AM Function
- Chapter 55 TACACS+ Configuration
- Chapter 56 RADIUS Configuration
- Chapter 57 SSL Configuration
- Chapter 58 IPv6 Security RA Configuration
- Chapter 59 VLAN-ACL Configuration
- Chapter 60 MAB Configuration
- Chapter 61 PPPoE Intermediate Agent Configuration
- Chapter 62 SAVI Configuration
- Chapter 63 Web Portal Configuration
- Chapter 64 VRRP Configuration
- Chapter 65 IPv6 VRRPv3 Configuration
- Chapter 66 MRPP Configuration
- Chapter 67 ULPP Configuration
- Chapter 68 ULSM Configuration
- Chapter 69 Mirror Configuration
- Chapter 70 RSPAN Configuration
- Chapter 71 sFlow Configuration
- Chapter 72 SNTP Configuration
- Chapter 73 NTP Function Configuration
- Chapter 74 DNSv4/v6 Configuration
- Chapter 75 Summer Time Configuration
- Chapter 76 Monitor and Debug
- Chapter 77 Reload Switch after Specified Time
- Chapter 78 Debugging and Diagnosis for Packets Received and Sent by CPU
- Chapter 79 VSF
- Chapter 80 PoE Configuration
- Chapter 81 SWITCH OPERATION
- Chapter 82 TROUBLESHOOTING
- Chapter 83 APPENDIX A
- Chapter 84 GLOSSARY
Configuration Guide of SGS-6341-Series
1-4
15.3
DOT1Q-TUNNEL CONFIGURATION ................................................................................................... 15-21
15.3.1 Introduction to Dot1q-tunnel .............................................................................................. 15-21
15.3.2 Dot1q-tunnel Configuration ............................................................................................... 15-22
15.3.3 Typical Applications of the Dot1q-tunnel ........................................................................... 15-22
15.3.4 Dot1q-tunnel Troubleshooting ........................................................................................... 15-23
15.4 VLAN-TRANSLATION CONFIGURATION ............................................................................................ 15-24
15.4.1 Introduction to VLAN-translation ....................................................................................... 15-24
15.4.2 VLAN-translation Configuration ........................................................................................ 15-24
15.4.3 Typical application of VLAN-translation ............................................................................ 15-25
15.4.4 VLAN-translation Troubleshooting .................................................................................... 15-26
15.5 DYNAMIC VLAN CONFIGURATION ................................................................................................... 15-26
15.5.1 Introduction to Dynamic VLAN .......................................................................................... 15-26
15.5.2 Dynamic VLAN Configuration ........................................................................................... 15-27
15.5.3 Typical Application of the Dynamic VLAN ......................................................................... 15-28
15.5.4 Dynamic VLAN Troubleshooting ....................................................................................... 15-30
15.6 VOICE VLAN CONFIGURATION ....................................................................................................... 15-30
15.6.1 Introduction to Voice VLAN ............................................................................................... 15-30
15.6.2 Voice VLAN Configuration ................................................................................................. 15-31
15.6.3 Typical Applications of the Voice VLAN ............................................................................ 15-32
15.6.4 Voice VLAN Troubleshooting ............................................................................................ 15-33
CHAPTER 16 MAC TABLE CONFIGURATION ...........................................................16-34
16.1 INTRODUCTION TO MAC TABLE ...................................................................................................... 16-34
16.1.1 Obtaining MAC Table ........................................................................................................ 16-34
16.1.2 Forward or Filter ................................................................................................................ 16-35
16.2 MAC ADDRESS TABLE CONFIGURATION TASK LIST .......................................................................... 16-36
16.3 TYPICAL CONFIGURATION EXAMPLES ............................................................................................. 16-37
16.4 MAC TABLE TROUBLESHOOTING ................................................................................................... 16-38
16.5 MAC ADDRESS FUNCTION EXTENSION ........................................................................................... 16-38
16.5.1 MAC Address Binding ....................................................................................................... 16-38
CHAPTER 17 MSTP CONFIGURATION ........................................................................17-1
17.1 INTRODUCTION TO MSTP ................................................................................................................. 17-1
17.1.1 MSTP Region ...................................................................................................................... 17-1
17.1.2 Port Roles............................................................................................................................ 17-3
17.1.3 MSTP Load Balance ........................................................................................................... 17-3
17.2 MSTP CONFIGURATION TASK LIST ................................................................................................... 17-3
17.3 MSTP EXAMPLE .............................................................................................................................. 17-8
17.4 MSTP TROUBLESHOOTING ............................................................................................................ 17-12
CHAPTER 18 QOS CONFIGURATION ..........................................................................18-1
18.1 INTRODUCTION TO QOS ................................................................................................................... 18-1