EasyManua.ls Logo

Raisecom ISCOM2600G-HI (A) Series User Manual

Raisecom ISCOM2600G-HI (A) Series
581 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
Page #1 background imageLoading...
Page #1 background image
ISCOM2600G-HI (A) Series
Configuration Guide
(Rel_01)
www.raisecom.com

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Raisecom ISCOM2600G-HI (A) Series and is the answer not in the manual?

Raisecom ISCOM2600G-HI (A) Series Specifications

General IconGeneral
Switching Capacity56 Gbps
Forwarding Rate41.7 Mpps
MAC Address Table8K
Ports24x 10/100/1000BASE-T
Uplink Ports4x 1000BASE-X SFP
VLAN4K
Power SupplyAC: 100~240V, 50/60Hz
Operating Temperature0°C~45°C
Storage Temperature-40°C to 70°C
Operating Humidity10%~90% (non-condensing)

Summary

Preface

Objectives

Describes features supported by the ISCOM2600G-HI series switch and related configurations.

Versions

Lists the product versions related to this document.

Conventions

Explains symbols, general conventions, and command conventions used in the document.

Basic configurations

CLI

Introduces the Command Line Interface (CLI) as a medium to configure, monitor, and manage the switch.

Accessing device

Details methods for connecting to and accessing the switch, including Console, Telnet, and SSH modes.

File management

Discusses managing system files, including BootROM, system boot files, and configuration files.

Loading and upgrade

Explains how to load and upgrade system software through BootROM or CLI.

Automatically updating version and configurations

Explains how the switch automatically obtains new versions and configurations via DHCP.

Time management

Covers configuring system time, time zone, DST, NTP, and SNTP for accurate time synchronization.

Interface management

Details managing Ethernet interfaces, including attributes, auto-negotiation, and flow control.

Configuring basic information

Covers basic system information configuration, such as device name and language.

Task scheduling

Explains how to schedule tasks for periodic or timed execution of commands.

Watchdog

Discusses configuring the watchdog timer to prevent system program endless loops and improve stability.

Configuring Banner

Explains how to configure login banners to display messages during login or exit.

Ethernet

MAC address table

Covers MAC address table functionality, forwarding modes, classification, and configuration.

VLAN

Covers Virtual Local Area Network (VLAN) concepts, partitions, interface modes, and configuration.

PVLAN

Covers Private VLAN (PVLAN) concepts, types, modes, and configurations for Layer 2 isolation.

QinQ

Covers QinQ (Stacked VLAN) technology, including basic and selective configurations.

VLAN mapping

Covers VLAN mapping concepts, principles, and configuration for replacing private VLAN Tags.

STP/RSTP

Covers Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) for loop prevention.

MSTP

Covers Multiple Spanning Tree Protocol (MSTP) concepts, regions, instances, and configurations.

MRSTP

Covers Multiple Spanning Tree Protocol (MRSTP) for bridged LANs, including its introduction and configuration.

Loop detection

Covers loop detection mechanisms, loop types, principles, and configuration for network stability.

Interface protection

Covers interface protection for isolating Layer 2/Layer 3 data and enhancing security.

Port mirroring

Covers port mirroring for monitoring network traffic by copying packets to a monitor port.

L2CP

Covers Layer 2 Control Protocol (L2CP) processing modes and profile configuration.

Voice VLAN

Covers Voice VLAN features for prioritizing voice traffic and improving call quality.

GARP

Covers Generic Attribute Registration Protocol (GARP), its messages, timers, and GVRP application.

ISF

Introduction

Introduces ISF as a virtualization technology that connects multiple devices into one.

ISF concepts

Covers basic ISF concepts including operating modes, roles, member IDs, ISF interfaces, merge, and split.

Establishing ISF environment

Outlines the steps for establishing an ISF environment, including planning and physical connection.

Configuring ISF

Discusses ISF configuration modes: preconfiguration and non-preconfiguration.

Preconfiguring ISF in standalone mode

Covers preconfiguring ISF parameters like unit ID, member priority, and interface in standalone mode.

Configuring ISF in ISF mode

Discusses configurations specific to the ISF mode, including domain ID, interfaces, and member ID.

Checking configurations

Lists commands to check ISF configurations, including general info, topology, packets, and MAD status.

Configuration examples

Provides configuration examples for ISF scenarios, including BFD MAD and mode switching.

Ring network protection

G.8032

Covers Ethernet Ring Protection Switching (ERPS) based on G.8032 standard for fault detection and recovery.

ELPS (G.8031)

Covers Ethernet Linear Protection Switching (ELPS) based on G.8031 for protecting Ethernet links.

IP services

IP basis

Covers fundamental IP concepts like interfaces, Layer 3 configuration, and double-tagged packets.

Loopback interface

Covers Loopback interfaces, their types, and configuration for management and routing identification.

ARP

Covers Address Resolution Protocol (ARP), its introduction, modes, static and dynamic entries, and proxy ARP.

NDP

Covers Neighbor Discovery Protocol (NDP) for IPv6, including its introduction and configuration.

Static route

Covers static routes, default routes, and their configurations for network connectivity.

RIP

Covers Routing Information Protocol (RIP), its definition, principles, versions, and configurations.

OSPFv2

Covers Open Shortest Path First (OSPF) protocol for IPv4, including its functions, types, and configurations.

DHCP

DHCP Client

Covers DHCP client functionality, introduction, preparation, and configuration for obtaining IP addresses.

Zero-configuration

Covers the zero-configuration feature for automatic IP address assignment and configuration download.

DHCP Snooping

Covers DHCP Snooping as a security feature to ensure clients obtain IPs from legal DHCP servers.

DHCP Options

Covers DHCP options used for dynamic network configuration and client identification.

DHCP Server

Covers DHCP Server functionality for assigning IP addresses and network configurations to clients.

DHCP Relay

Covers DHCP Relay function to provide service between DHCP clients and servers in different segments.

QoS

Introduction

Introduces Quality of Service (QoS) and its importance in managing network applications and traffic.

Configuring priority

Covers configuring packet priorities, including trust modes and mapping from CoS/DSCP to local priority.

Configuring congestion management

Discusses queue scheduling algorithms like SP, WRR, DRR, and their role in managing network congestion.

Configuring congestion avoidance

Covers congestion avoidance mechanisms like Random Early Detection (RED) to manage network traffic.

Configuring traffic classification and traffic policy

Covers classifying packets and applying traffic policies for differentiated services.

Configuring rate limiting

Covers rate limiting based on interface, VLAN, or traffic policy to control network traffic.

Bandwidth rate limiting

Covers bandwidth guarantee, hierarchical bandwidth guarantee, and color-aware marking.

Configuration examples

Provides configuration examples for QoS features like congestion management and rate limiting.

Multicast

Multicast

Introduces multicast, its comparison with unicast/broadcast, advantages, and applications.

Basic functions of Layer 2 multicast

Covers basic IGMP functions and Layer 2 multicast features like IGMP Snooping and MVR.

IGMP Snooping

Covers IGMP Snooping, a mechanism for managing and controlling multicast groups on Layer 2 devices.

IGMP Querier

Covers IGMP Querier, a proxy mechanism for managing multicast group membership.

IGMP MVR

Covers IGMP Multicast VLAN Registration (MVR) for managing multicast groups across VLANs.

IGMP filtering

Covers IGMP filtering profiles and limiting the maximum number of multicast groups allowed.

Multicast VLAN copy

Covers Multicast VLAN copy, a feature for optimizing multicast data transmission across VLANs.

MLD

Covers Multicast Listener Discovery (MLD) protocol for IPv6 multicast management.

OAM

Introduction

Introduces Operation, Administration, and Maintenance (OAM) and its importance for Ethernet technology.

EFM

Covers Ethernet First Mile (EFM) OAM technology for link connectivity detection and fault monitoring.

CFM (IEEE 802.1ag/ITU-Y.1731)

Covers Connectivity Fault Management (CFM) for end-to-end fault detection and maintenance.

SLA

Covers Service Level Agreement (SLA) for network performance testing and statistics.

BFD

Covers Bidirectional Forwarding Detection (BFD) for rapid fault detection and communication path management.

Security

ACL

Covers Access Control Lists (ACLs) for filtering packets based on various criteria.

Port security MAC

Covers Port Security MAC feature to limit and distinguish users accessing the network based on MAC addresses.

Dynamic ARP inspection

Covers Dynamic ARP Inspection (DAI) for preventing ARP spoofing attacks and securing the network.

RADIUS

Covers RADIUS for centralized authentication, authorization, and accounting of network access.

TACACS+

Covers TACACS+ protocol for network access authentication, authorization, and accounting.

Storm control

Covers storm control mechanisms to prevent broadcast storms caused by excessive traffic.

802.1x

Covers 802.1x authentication for network access control, including its procedure and timers.

IP Source Guard

Covers IP Source Guard for preventing IP source spoofing and ensuring IP address validity.

PPPoE+

Covers PPPoE+ for processing authentication packets and adding user identification for network security.

Configuring CPU protection

Covers CPU protection mechanisms like CPU CAR to limit packet rates and prevent CPU overload.

Configuring anti-ARP attack

Covers measures to prevent ARP attacks, including ARP configuration and rate limiting.

Reliability

Link aggregation

Covers link aggregation technologies like manual, LACP, and mLACP for increased bandwidth and reliability.

Interface backup

Covers interface backup for dual uplink networking, providing redundancy and fast switching.

Link-state tracking

Covers link-state tracking for interface linkage and extending link backup range.

UDLD

Covers UniDirectional Link Detection (UDLD) for monitoring physical connections and detecting faults.

mLACP

Covers Multi-Chassis Link Aggregation Control Protocol (mLACP) for selecting paths for Dual Home Devices.

System management

SNMP

Covers Simple Network Management Protocol (SNMP) for managing network devices and monitoring status.

RMON

Covers Remote Network Monitoring (RMON) for network data monitoring and statistics collection.

LLDP

Covers Link Layer Discovery Protocol (LLDP) for discovering network topology and device information.

Optical module DDM

Covers Optical module Digital Diagnostics Monitoring (DDM) for diagnosing SFP performance parameters.

System log

Covers system logging for recording system information, debugging, and fault diagnosis.

Alarm management

Covers alarm management, including classification, output modes, and related concepts.

Hardware environment monitoring

Covers monitoring hardware environment aspects like temperature, power supply, and fans.

CPU monitoring

Covers CPU monitoring for tracking utilization rate, task status, and detecting potential CPU overload.

Cable diagnosis

Covers cable diagnosis functionality to detect lines, locate faults, and clear issues.

Memory monitoring

Covers memory monitoring for real-time utilization tracking and threshold alarms.

Ping

Covers the Ping utility for testing network connectivity and IP address reachability.

Traceroute

Covers the Traceroute utility for testing network nodes and analyzing network faults.

Performance statistics

Covers performance statistics gathering for interface or service flow analysis.

Appendix

Terms

Lists and defines terms, acronyms, and abbreviations used in the document.

Acronyms and abbreviations

Lists and defines acronyms and abbreviations used throughout the document.

Related product manuals