SGS-6341-Series User Manual
Table Of Contents
- Chapter 1 INTRODUCTION
- Chapter 2 INSTALLATION
- Chapter 3 Switch Management
- Chapter 4 Basic Switch Configuration
- Chapter 5 File System Operations
- Chapter 6 Cluster Configuration
- Chapter 7 Port Configuration
- Chapter 8 Port Isolation Function Configuration
- Chapter 9 Port Loopback Detection Function Configuration
- Chapter 10 ULDP Function Configuration
- Chapter 11 LLDP Function Operation Configuration
- Chapter 12 Port Channel Configuration
- Chapter 13 MTU Configuration
- Chapter 14 EFM OAM Configuration
- Chapter 15 PORT SECURITY
- Chapter 16 DDM Configuration
- Chapter 17 LLDP-MED
- Chapter 18 bpdu-tunnel Configuration
- Chapter 19 EEE Energy-saving Configuration
- Chapter 20 VLAN Configuration
- Chapter 21 MAC Table Configuration
- Chapter 22 MSTP Configuration
- Chapter 23 QoS Configuration
- Chapter 24 Flow-based Redirection
- Chapter 25 Flexible Q-in-Q Configuration
- Chapter 26 Layer 3 Management Configuration
- Chapter 27 ARP Scanning Prevention Function Configuration
- Chapter 28 Prevent ARP Spoofing Configuration
- Chapter 29 ARP GUARD Configuration
- Chapter 30 Gratuitous ARP Configuration
- Chapter 31 DHCP Configuration
- Chapter 32 DHCPv6 Configuration
- Chapter 33 DHCP Option 82 Configuration
- Chapter 34 DHCP Option 60 and option 43
- Chapter 35 DHCPv6 Options 37, 38
- Chapter 36 DHCP Snooping Configuration
- Chapter 37 DHCP Snooping Option 82 Configuration
- Chapter 38 IPv4 Multicast Protocol
- Chapter 39 IPv6 Multicast Protocol
- Chapter 40 Multicast VLAN
- Chapter 41 ACL Configuration
- Chapter 42 802.1x Configuration
- 42.1 Introduction to 802.1x
- 42.2 802.1x Configuration Task List
- 42.3 802.1x Application Example
- 42.4 802.1x Troubleshooting
- Chapter 43 The Number Limitation Function of MAC and IP in Port, VLAN Configuration
- Chapter 44 Operational Configuration of AM Function
- Chapter 45 Security Feature Configuration
- 45.1 Introduction to Security Feature
- 45.2 Security Feature Configuration
- 45.2.1 Prevent IP Spoofing Function Configuration Task Sequence
- 45.2.2 Prevent TCP Unauthorized Label Attack Function Configuration Task Sequence
- 45.2.3 Anti Port Cheat Function Configuration Task Sequence
- 45.2.4 Prevent TCP Fragment Attack Function Configuration Task Sequence
- 45.2.5 Prevent ICMP Fragment Attack Function Configuration Task Sequence
- 45.3 Security Feature Example
- Chapter 46 TACACS+ Configuration
- Chapter 47 RADIUS Configuration
- Chapter 48 SSL Configuration
- Chapter 49 IPv6 Security RA Configuration
- Chapter 50 MAB Configuration
- Chapter 51 PPPoE Intermediate Agent Configuration
- Chapter 52 Web Portal Configuration
- Chapter 53 VLAN-ACL Configuration
- Chapter 54 SAVI Configuration
- Chapter 55 MRPP Configuration
- Chapter 56 ULPP Configuration
- Chapter 57 ULSM Configuration
- Chapter 58 Mirror Configuration
- Chapter 59 sFlow Configuration
- Chapter 60 RSPAN Configuration
- Chapter 61 ERSPAN
- Chapter 62 SNTP Configuration
- Chapter 63 NTP Function Configuration
- Chapter 64 Summer Time Configuration
- Chapter 65 DNSv4/v6 Configuration
- Chapter 66 Monitor and Debug
- Chapter 67 Reload Switch after Specified Time
- Chapter 68 Debugging and Diagnosis for Packets Received and Sent by CPU
- Chapter 69 Dying Gasp Configuration
- Chapter 70 PoE Configuration
network. This proces
s is referred to as “flooding”. In this way, firsthand information is sent
throughout the network to provide accurate map for creating and updating routes in the
network. Link-state routing protocols use cost instead of hops to decide the route. Cost is
assigned automatically or manually. According to the algorithm in link-state protocol, cost can
be used to calculate the hop number for packets to pass, link bandwidth, and current load of
the link. The administrator can even add weight for better assessment of the link-state.
1) When a link-state Layer 3 switch enters a link-state interconnected network, it sends a
HELLO packet to get to know its neighbors and establish neighborhood.
2) The neighbors respond with information about the links they are connecting and the
related costs.
3) The originate Layer 3 switch uses this information to build its own routing table
4) Then, as part of the regular update, Layer 3 switch send link-state advertisement (LSA)
packets to its neighboring Layer 3 switches. The LSA include links and related costs of
that Layer 3 switch.
5) Each neighboring Layer 3 switch copies the LSA packet and passes it to the next
neighbor (i.e. flooding).
6) Since routing database is not recalculated before Layer 3 switch forwards LSA flooding,
the converging time is greatly reduced.
One major advantage of link-state routing protocols is the fact that infinite counting is
impossible, this is because of the way link-state routing protocols build up their routing table.
The second advantage is that converging in a link-state interconnected network is very fast,
once the routing topology changes, updates will be flooded throughout the network very soon.
Those advantages release some Layer 3 switch resources, as the process ability and
bandwidth used by bad route information are minor.
The features of OSPF protocol include the following: OSPF supports networks of various
scales, several hundreds of Layer 3 switches can be supported in an OSPF network. Routing
topology changes can be quickly found and updating LSAs can be sent immediately, so that
routes converge quickly. Link-state information is used in shortest path algorithm for route
calculation, eliminating loop route. OSPF divides the autonomous system into areas, reducing
database size, bandwidth occupation and calculation load. (According to the position of Layer
3 switches in the autonomous system, they can be grouped as internal area switches, area
border switches, AS border switches and backbone switches). OSPF supports load balance
and multiple routes to the same destination of equal costs. OSPF supports 4 level routing
mechanisms (process routing according to the order of intra-area path, inter-area path, type 1
external path and type 2 external path). OSPF supports IP subnet and redistribution of routes
from the other routing protocols, and interface-based packet verification. OSPF supports
sending packets in multicast.
Each OSPF Layer 3 switch maintains a database describing the topology of the whole
autonomous system. Each Layer 3 switch gathers the local status information, such as
available interface, reachable neighbors, and sends link-state advertisement (sending out
26-27
User’s Manual of SGS-6341 series