EasyManua.ls Logo

Raisecom ISCOM2600G-HI (A) Series User Manual

Raisecom ISCOM2600G-HI (A) Series
581 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #450 background imageLoading...
Page #450 background image
Raisecom
ISCOM2600G-HI (A) Series Configuration Guide
10 Security
Raisecom Proprietary and Confidential
Copyright © Raisecom Technology Co., Ltd.
419
Step
Command
Description
4
Raisecom#radius backup key
word
Configure the shared key for the backup
RADIUS authentication server.
5
Raisecom#radius backup
encrypt-key
word
Configure the backup RADIUS
authentication server to encrypt data in
cyphertext mode.
6
Raisecom#user login { local-
radius | radius-local
[ server-no-response ] |
radius-user }
Configure users to perform login
authentication through RADIUS.
7
Raisecom#radius nas-ip-
address
ip-address
Configure the NAS IP address of
RADIUS authentication.
8
Raisecom#radius response-
timeout
time
Configure the timeout for response by the
RADIUS authentication server.
9
Raisecom#radius authorization
no-privilege { default
|offline | priority }
Configure the processing policy for
RADIUS authorization failure.
10
Raisecom#enable login
{ local-radius | radius-local
[ server-no-response ] |
radius-user }
Configure the authentication mode for
users to enter the privileged EXEC mode
to RADIUS.
10.4.5 Configuring RADIUS accounting
Configure RADIUS accounting for the ISCOM2600G-HI series switch as below.
Step
Command
Description
1
Raisecom#aaa accounting
login enable
Enable RADIUS accounting.
2
Raisecom#radius [ backup ]
accounting-server
ip-
address
[
account-port
]
[ sourceip
ip-address
]
Assign IP address and UDP port ID for the
RADIUS accounting server. Configure the
backup parameter to assign the backup
RADIUS accounting server.
3
Raisecom#radius [ backup ]
accounting-server key
string
Raisecom#radius [ backup ]
accounting-server encrypt-
key
string
Configure the shared plaintext or ciphertext
key to communicate with the RADIUS
accounting server. The shared key must be
identical to the one configured on the
RADIUS accounting server. Otherwise,
accounting will fail.
4
Raisecom#radius accounting
nas-ip-address
ip-address
Configure the NAS IP address of the
RADIUS accounting server.
5
Raisecom#aaa accounting
fail { offline | online }
Configure the processing policy for
accounting failure.

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the Raisecom ISCOM2600G-HI (A) Series and is the answer not in the manual?

Raisecom ISCOM2600G-HI (A) Series Specifications

General IconGeneral
Switching Capacity56 Gbps
Forwarding Rate41.7 Mpps
MAC Address Table8K
Ports24x 10/100/1000BASE-T
Uplink Ports4x 1000BASE-X SFP
VLAN4K
Power SupplyAC: 100~240V, 50/60Hz
Operating Temperature0°C~45°C
Storage Temperature-40°C to 70°C
Operating Humidity10%~90% (non-condensing)

Summary

Preface

Objectives

Describes features supported by the ISCOM2600G-HI series switch and related configurations.

Versions

Lists the product versions related to this document.

Conventions

Explains symbols, general conventions, and command conventions used in the document.

Basic configurations

CLI

Introduces the Command Line Interface (CLI) as a medium to configure, monitor, and manage the switch.

Accessing device

Details methods for connecting to and accessing the switch, including Console, Telnet, and SSH modes.

File management

Discusses managing system files, including BootROM, system boot files, and configuration files.

Loading and upgrade

Explains how to load and upgrade system software through BootROM or CLI.

Automatically updating version and configurations

Explains how the switch automatically obtains new versions and configurations via DHCP.

Time management

Covers configuring system time, time zone, DST, NTP, and SNTP for accurate time synchronization.

Interface management

Details managing Ethernet interfaces, including attributes, auto-negotiation, and flow control.

Configuring basic information

Covers basic system information configuration, such as device name and language.

Task scheduling

Explains how to schedule tasks for periodic or timed execution of commands.

Watchdog

Discusses configuring the watchdog timer to prevent system program endless loops and improve stability.

Configuring Banner

Explains how to configure login banners to display messages during login or exit.

Ethernet

MAC address table

Covers MAC address table functionality, forwarding modes, classification, and configuration.

VLAN

Covers Virtual Local Area Network (VLAN) concepts, partitions, interface modes, and configuration.

PVLAN

Covers Private VLAN (PVLAN) concepts, types, modes, and configurations for Layer 2 isolation.

QinQ

Covers QinQ (Stacked VLAN) technology, including basic and selective configurations.

VLAN mapping

Covers VLAN mapping concepts, principles, and configuration for replacing private VLAN Tags.

STP/RSTP

Covers Spanning Tree Protocol (STP) and Rapid Spanning Tree Protocol (RSTP) for loop prevention.

MSTP

Covers Multiple Spanning Tree Protocol (MSTP) concepts, regions, instances, and configurations.

MRSTP

Covers Multiple Spanning Tree Protocol (MRSTP) for bridged LANs, including its introduction and configuration.

Loop detection

Covers loop detection mechanisms, loop types, principles, and configuration for network stability.

Interface protection

Covers interface protection for isolating Layer 2/Layer 3 data and enhancing security.

Port mirroring

Covers port mirroring for monitoring network traffic by copying packets to a monitor port.

L2CP

Covers Layer 2 Control Protocol (L2CP) processing modes and profile configuration.

Voice VLAN

Covers Voice VLAN features for prioritizing voice traffic and improving call quality.

GARP

Covers Generic Attribute Registration Protocol (GARP), its messages, timers, and GVRP application.

ISF

Introduction

Introduces ISF as a virtualization technology that connects multiple devices into one.

ISF concepts

Covers basic ISF concepts including operating modes, roles, member IDs, ISF interfaces, merge, and split.

Establishing ISF environment

Outlines the steps for establishing an ISF environment, including planning and physical connection.

Configuring ISF

Discusses ISF configuration modes: preconfiguration and non-preconfiguration.

Preconfiguring ISF in standalone mode

Covers preconfiguring ISF parameters like unit ID, member priority, and interface in standalone mode.

Configuring ISF in ISF mode

Discusses configurations specific to the ISF mode, including domain ID, interfaces, and member ID.

Checking configurations

Lists commands to check ISF configurations, including general info, topology, packets, and MAD status.

Configuration examples

Provides configuration examples for ISF scenarios, including BFD MAD and mode switching.

Ring network protection

G.8032

Covers Ethernet Ring Protection Switching (ERPS) based on G.8032 standard for fault detection and recovery.

ELPS (G.8031)

Covers Ethernet Linear Protection Switching (ELPS) based on G.8031 for protecting Ethernet links.

IP services

IP basis

Covers fundamental IP concepts like interfaces, Layer 3 configuration, and double-tagged packets.

Loopback interface

Covers Loopback interfaces, their types, and configuration for management and routing identification.

ARP

Covers Address Resolution Protocol (ARP), its introduction, modes, static and dynamic entries, and proxy ARP.

NDP

Covers Neighbor Discovery Protocol (NDP) for IPv6, including its introduction and configuration.

Static route

Covers static routes, default routes, and their configurations for network connectivity.

RIP

Covers Routing Information Protocol (RIP), its definition, principles, versions, and configurations.

OSPFv2

Covers Open Shortest Path First (OSPF) protocol for IPv4, including its functions, types, and configurations.

DHCP

DHCP Client

Covers DHCP client functionality, introduction, preparation, and configuration for obtaining IP addresses.

Zero-configuration

Covers the zero-configuration feature for automatic IP address assignment and configuration download.

DHCP Snooping

Covers DHCP Snooping as a security feature to ensure clients obtain IPs from legal DHCP servers.

DHCP Options

Covers DHCP options used for dynamic network configuration and client identification.

DHCP Server

Covers DHCP Server functionality for assigning IP addresses and network configurations to clients.

DHCP Relay

Covers DHCP Relay function to provide service between DHCP clients and servers in different segments.

QoS

Introduction

Introduces Quality of Service (QoS) and its importance in managing network applications and traffic.

Configuring priority

Covers configuring packet priorities, including trust modes and mapping from CoS/DSCP to local priority.

Configuring congestion management

Discusses queue scheduling algorithms like SP, WRR, DRR, and their role in managing network congestion.

Configuring congestion avoidance

Covers congestion avoidance mechanisms like Random Early Detection (RED) to manage network traffic.

Configuring traffic classification and traffic policy

Covers classifying packets and applying traffic policies for differentiated services.

Configuring rate limiting

Covers rate limiting based on interface, VLAN, or traffic policy to control network traffic.

Bandwidth rate limiting

Covers bandwidth guarantee, hierarchical bandwidth guarantee, and color-aware marking.

Configuration examples

Provides configuration examples for QoS features like congestion management and rate limiting.

Multicast

Multicast

Introduces multicast, its comparison with unicast/broadcast, advantages, and applications.

Basic functions of Layer 2 multicast

Covers basic IGMP functions and Layer 2 multicast features like IGMP Snooping and MVR.

IGMP Snooping

Covers IGMP Snooping, a mechanism for managing and controlling multicast groups on Layer 2 devices.

IGMP Querier

Covers IGMP Querier, a proxy mechanism for managing multicast group membership.

IGMP MVR

Covers IGMP Multicast VLAN Registration (MVR) for managing multicast groups across VLANs.

IGMP filtering

Covers IGMP filtering profiles and limiting the maximum number of multicast groups allowed.

Multicast VLAN copy

Covers Multicast VLAN copy, a feature for optimizing multicast data transmission across VLANs.

MLD

Covers Multicast Listener Discovery (MLD) protocol for IPv6 multicast management.

OAM

Introduction

Introduces Operation, Administration, and Maintenance (OAM) and its importance for Ethernet technology.

EFM

Covers Ethernet First Mile (EFM) OAM technology for link connectivity detection and fault monitoring.

CFM (IEEE 802.1ag/ITU-Y.1731)

Covers Connectivity Fault Management (CFM) for end-to-end fault detection and maintenance.

SLA

Covers Service Level Agreement (SLA) for network performance testing and statistics.

BFD

Covers Bidirectional Forwarding Detection (BFD) for rapid fault detection and communication path management.

Security

ACL

Covers Access Control Lists (ACLs) for filtering packets based on various criteria.

Port security MAC

Covers Port Security MAC feature to limit and distinguish users accessing the network based on MAC addresses.

Dynamic ARP inspection

Covers Dynamic ARP Inspection (DAI) for preventing ARP spoofing attacks and securing the network.

RADIUS

Covers RADIUS for centralized authentication, authorization, and accounting of network access.

TACACS+

Covers TACACS+ protocol for network access authentication, authorization, and accounting.

Storm control

Covers storm control mechanisms to prevent broadcast storms caused by excessive traffic.

802.1x

Covers 802.1x authentication for network access control, including its procedure and timers.

IP Source Guard

Covers IP Source Guard for preventing IP source spoofing and ensuring IP address validity.

PPPoE+

Covers PPPoE+ for processing authentication packets and adding user identification for network security.

Configuring CPU protection

Covers CPU protection mechanisms like CPU CAR to limit packet rates and prevent CPU overload.

Configuring anti-ARP attack

Covers measures to prevent ARP attacks, including ARP configuration and rate limiting.

Reliability

Link aggregation

Covers link aggregation technologies like manual, LACP, and mLACP for increased bandwidth and reliability.

Interface backup

Covers interface backup for dual uplink networking, providing redundancy and fast switching.

Link-state tracking

Covers link-state tracking for interface linkage and extending link backup range.

UDLD

Covers UniDirectional Link Detection (UDLD) for monitoring physical connections and detecting faults.

mLACP

Covers Multi-Chassis Link Aggregation Control Protocol (mLACP) for selecting paths for Dual Home Devices.

System management

SNMP

Covers Simple Network Management Protocol (SNMP) for managing network devices and monitoring status.

RMON

Covers Remote Network Monitoring (RMON) for network data monitoring and statistics collection.

LLDP

Covers Link Layer Discovery Protocol (LLDP) for discovering network topology and device information.

Optical module DDM

Covers Optical module Digital Diagnostics Monitoring (DDM) for diagnosing SFP performance parameters.

System log

Covers system logging for recording system information, debugging, and fault diagnosis.

Alarm management

Covers alarm management, including classification, output modes, and related concepts.

Hardware environment monitoring

Covers monitoring hardware environment aspects like temperature, power supply, and fans.

CPU monitoring

Covers CPU monitoring for tracking utilization rate, task status, and detecting potential CPU overload.

Cable diagnosis

Covers cable diagnosis functionality to detect lines, locate faults, and clear issues.

Memory monitoring

Covers memory monitoring for real-time utilization tracking and threshold alarms.

Ping

Covers the Ping utility for testing network connectivity and IP address reachability.

Traceroute

Covers the Traceroute utility for testing network nodes and analyzing network faults.

Performance statistics

Covers performance statistics gathering for interface or service flow analysis.

Appendix

Terms

Lists and defines terms, acronyms, and abbreviations used in the document.

Acronyms and abbreviations

Lists and defines acronyms and abbreviations used throughout the document.

Related product manuals