ISCOM2600G (A) Series Command Reference (Rel - 04)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 956

www.raisecom.

com

ISCOM2600G (A) Series


Command Reference
(Rel_04)
Raisecom Technology Co., Ltd. provides customers with comprehensive technical support and services. For any
assistance, please contact our local office or company headquarters.
Website: http://www.raisecom.com
Tel: 8610-82883305
Fax: 8610-82883056
Email: export@raisecom.com
Address: Raisecom Building, No. 11, East Area, No. 10 Block, East Xibeiwang Road, Haidian District, Beijing,
P.R.China
Postal code: 100094

-----------------------------------------------------------------------------------------------------------------------------------------

Notice
Copyright 2016
Raisecom
All rights reserved.
No part of this publication may be excerpted, reproduced, translated or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in Writing from Raisecom
Technology Co., Ltd.

is the trademark of Raisecom Technology Co., Ltd.


All other trademarks and trade names mentioned in this document are the property of their respective holders.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Raisecom
ISCOM2600G (A) Series Command Reference Preface

Preface

Objectives
This document describes commands supported by the ISCOM2600G series switch in aspects
of function, format, parameters, default conditions, command mode, usage guidelines, related
commands, as well as provided examples. The index of this document lists all commands in
an alphabetical order, which facilitates learning commands quickly.
This document helps you master related commands and facilitates you in configuring the
ISCOM2600G series switch according to provided examples.

Versions
The following table lists the product versions related to this document.

Product name Software version Hardware version


ISCOM2600G series switch V3.10 A

Conventions
Symbol conventions
The symbols that may be found in this document are defined as follows.

Symbol Description
Indicate a hazard with a medium or low level of risk which, if
not avoided, could result in minor or moderate injury.

Indicate a potentially hazardous situation that, if not avoided,


could cause equipment damage, data loss, and performance
degradation, or unexpected results.
Provide additional information to emphasize or supplement
important points of the main text.

Raisecom Proprietary and Confidential


i
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Preface

Symbol Description
Indicate a tip that may help you solve a problem or save time.

General conventions
Convention Description
Times New Roman Normal paragraphs are in Times New Roman.
Arial Paragraphs in Warning, Caution, Notes, and Tip are in Arial.
Boldface Buttons and navigation path are in Boldface.
Italic Book titles are in italics.
Lucida Console Terminal display is in Lucida Console.

Book Antiqua Heading 1, Heading 2, Heading 3, and Block are in Book


Antiqua.

Command conventions
Convention Description
Boldface The keywords of a command line are in boldface.
Italic Command arguments are in italics.
[] Items (keywords or arguments) in square brackets [ ] are
optional.
{ x | y | ... } Alternative items are grouped in braces and separated by
vertical bars. Only one is selected.
[ x | y | ... ] Optional alternative items are grouped in square brackets and
separated by vertical bars. One or none is selected.
{ x | y | ... } * Alternative items are grouped in braces and separated by
vertical bars. A minimum of one or a maximum of all can be
selected.
[ x | y | ... ] * Optional alternative items are grouped in square brackets and
separated by vertical bars. A minimum of none or a maximum
of all can be selected.

Raisecom Proprietary and Confidential


ii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Preface

User level conventions


Level Description
0-4 Visit level, users can execute commands of diagnosing
internet, clearing statistics, and displaying history records, etc.
5-10 Monitor level, users can execute command such as maintaining
the system.
11-14 Configuration level, users can execute commands such as
configuring VLAN and IP routing.
15 Management level, users can execute command such as
running the system.

Conventions on interface type and range value


Format Description
interface-type Interface type, with the values listed as below:
vlan: VLAN interface
loopback: loopback interface
tunnel: tunnel interface
gigaethernet: 1000 Mbit/s physical interface
tengigaethenet: 10 Gbit/s physical interface
fastethernet: out-of-band NMS interface
port-channel: LAG interface, sub-interface

interface-number Interface ID, the range of the value varies based on different
model and interface type, which is shown as below:
vlan: 1-4094
loopback: 1-16
tunnel: 1/1/1-1/1/1024
gigaethernet unit/slot/port: 1/1/1-1/1/24 (1000 Mbit/s
physical interface)
tengigaethernet unit/slot/port.sub-interface: 1/1/25-1/1/28
(10 Gbit/s physical interface)
fastethernet: 1/0/1
port-channel: 1-16

Change history
Updates between document versions are cumulative. Therefore, the latest document version
contains all updates made to previous versions.

Raisecom Proprietary and Confidential


iii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Preface

Issue 04 (2016-05-12)
Fourth commercial release
Added contents about POE.

Issue 03 (2016-02-18)
Third commercial release
Upgraded software version to V3.10

Issue 02 (2015-11-05)
Second commercial release
Optimized the document.
Fixed known bugs.

Issue 01 (2015-08-15)
Initial commercial release

Raisecom Proprietary and Confidential


iv
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

Contents

1 Basic configuration ....................................................................................................................... 1


1.1 BootROM ......................................................................................................................................................... 1
1.1.1 t ............................................................................................................................................................... 1
1.1.2 m ............................................................................................................................................................. 3
1.1.3 b .............................................................................................................................................................. 4
1.1.4 s ............................................................................................................................................................... 5
1.1.5 e............................................................................................................................................................... 6
1.1.6 r ............................................................................................................................................................... 7
1.1.7 p .............................................................................................................................................................. 9
1.1.8 ?/h.......................................................................................................................................................... 10
1.2 Basic commands............................................................................................................................................. 11
1.2.1 clear....................................................................................................................................................... 11
1.2.2 config .................................................................................................................................................... 12
1.2.3 command-log enable ............................................................................................................................. 13
1.2.4 enable .................................................................................................................................................... 15
1.2.5 enable password .................................................................................................................................... 16
1.2.6 end......................................................................................................................................................... 17
1.2.7 exit ........................................................................................................................................................ 18
1.2.8 help........................................................................................................................................................ 19
1.2.9 history ................................................................................................................................................... 21
1.2.10 hostname ............................................................................................................................................. 22
1.2.11 language .............................................................................................................................................. 23
1.2.12 list........................................................................................................................................................ 24
1.2.13 logout .................................................................................................................................................. 25
1.2.14 quit ...................................................................................................................................................... 26
1.2.15 reboot .................................................................................................................................................. 27
1.2.16 show terminal ...................................................................................................................................... 28
1.2.17 show reboot info ................................................................................................................................. 30
1.2.18 terminal page-break enable ................................................................................................................. 31
1.2.19 terminal history ................................................................................................................................... 32
1.2.20 terminal time-out ................................................................................................................................. 33
1.2.21 write .................................................................................................................................................... 34

Raisecom Proprietary and Confidential


v
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

1.3 Accessing devices........................................................................................................................................... 35


1.3.1 generate ssh-key .................................................................................................................................... 35
1.3.2 show ssh2 public-key ............................................................................................................................ 37
1.3.3 show ssh2 { server | session } ............................................................................................................... 38
1.3.4 show telnet-server ................................................................................................................................. 40
1.3.5 show user .............................................................................................................................................. 41
1.3.6 ssh2 server ............................................................................................................................................. 43
1.3.7 ssh2 server authentication { password | rsa-key } ................................................................................. 44
1.3.8 ssh2 server authentication public-key ................................................................................................... 45
1.3.9 ssh2 server authentication-retries .......................................................................................................... 46
1.3.10 ssh2 server authentication-timeout ...................................................................................................... 48
1.3.11 ssh2 server port ................................................................................................................................... 49
1.3.12 ssh access-list ...................................................................................................................................... 50
1.3.13 ssh2 server close session ..................................................................................................................... 51
1.3.14 ssh2 server max-session ...................................................................................................................... 52
1.3.15 ssh2 server version .............................................................................................................................. 53
1.3.16 telnet.................................................................................................................................................... 54
1.3.17 telnet-server accept ............................................................................................................................. 56
1.3.18 telnet-server accept port ...................................................................................................................... 57
1.3.19 telnet-server close terminal-telnet ....................................................................................................... 58
1.3.20 telnet-server max-session .................................................................................................................... 59
1.3.21 user { allow-exec | disallow-exec } ..................................................................................................... 60
1.3.22 user name ............................................................................................................................................ 62
1.3.23 user login ............................................................................................................................................. 63
1.3.24 user login server-no-response.............................................................................................................. 65
1.3.25 user service-type ................................................................................................................................. 66
1.4 File management ............................................................................................................................................ 67
1.4.1 erase ...................................................................................................................................................... 67
1.4.2 dir .......................................................................................................................................................... 68
1.4.3 show running-config ............................................................................................................................. 70
1.4.4 show startup-config ............................................................................................................................... 71
1.4.5 show multisystem.................................................................................................................................. 73
1.4.6 boot sequence ........................................................................................................................................ 73
1.4.7 copy....................................................................................................................................................... 75
1.5 Backup and upgrade ....................................................................................................................................... 76
1.5.1 download ............................................................................................................................................... 76
1.5.2 show version ......................................................................................................................................... 78
1.5.3 upload.................................................................................................................................................... 79
1.6 Automatically updating versions and configurations ..................................................................................... 81
1.6.1 clear buffer_config ................................................................................................................................ 81
1.6.2 auto_config enable ................................................................................................................................ 82
1.6.3 auto_save enable ................................................................................................................................... 83

Raisecom Proprietary and Confidential


vi
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

1.6.4 auto_load time ....................................................................................................................................... 84


1.6.5 show auto_config .................................................................................................................................. 85
1.6.6 show buffer_config ............................................................................................................................... 87
1.7 Interface management .................................................................................................................................... 88
1.7.1 description ............................................................................................................................................. 88
1.7.2 show interface ....................................................................................................................................... 89
1.7.3 shutdown ............................................................................................................................................... 92
1.7.4 interface fastethernet ............................................................................................................................. 93
1.7.5 interface gigaethernet ............................................................................................................................ 94
1.7.6 interface tengigaethernet ....................................................................................................................... 95
1.7.7 interface vlan ......................................................................................................................................... 96
1.7.8 interface tunnel ...................................................................................................................................... 97
1.7.9 interface port-channel ........................................................................................................................... 98
1.7.10 interface loopback ............................................................................................................................... 99
1.7.11 port-type .............................................................................................................................................. 99
1.7.12 duplex................................................................................................................................................ 101
1.7.13 l2protocol peer stp............................................................................................................................. 102
1.7.14 flowcontrol on ................................................................................................................................... 103
1.7.15 medium-priority ................................................................................................................................ 104
1.7.16 mdi .................................................................................................................................................... 105
1.7.17 media-type......................................................................................................................................... 107
1.7.18 speed ................................................................................................................................................. 108
1.7.19 mtu .................................................................................................................................................... 109
1.7.20 tpid .................................................................................................................................................... 111
1.7.21 jumboframe ....................................................................................................................................... 112
1.7.22 vibration-suppress ............................................................................................................................. 113
1.7.23 show l2protocol peer stp port ............................................................................................................ 114
1.7.24 statistics enable ................................................................................................................................. 115
1.7.25 clear interface statistics ..................................................................................................................... 117
1.7.26 show combo configuration ................................................................................................................ 118
1.7.27 console open...................................................................................................................................... 119
1.7.28 login-trap enable ............................................................................................................................... 120
1.8 Time management ........................................................................................................................................ 122
1.8.1 clock display ....................................................................................................................................... 122
1.8.2 clock set .............................................................................................................................................. 123
1.8.3 clock summer-time enable .................................................................................................................. 124
1.8.4 clock summer-time recurring .............................................................................................................. 125
1.8.5 clock timezone .................................................................................................................................... 127
1.8.6 ntp peer ............................................................................................................................................... 128
1.8.7 ntp server............................................................................................................................................. 130
1.8.8 ntp refclock-master ............................................................................................................................. 131
1.8.9 show clock .......................................................................................................................................... 133

Raisecom Proprietary and Confidential


vii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

1.8.10 show ntp associations ........................................................................................................................ 134


1.8.11 show ntp status .................................................................................................................................. 136
1.8.12 show sntp .......................................................................................................................................... 137
1.8.13 sntp server ......................................................................................................................................... 138
1.9 Task schedule ............................................................................................................................................... 139
1.9.1 schedule-list ........................................................................................................................................ 139
1.9.2 command-string schedule-list ............................................................................................................. 141
1.9.3 show schedule-list ............................................................................................................................... 142
1.10 Banner ........................................................................................................................................................ 143
1.10.1 banner enable .................................................................................................................................... 143
1.10.2 banner login ...................................................................................................................................... 144
1.10.3 clear banner login .............................................................................................................................. 146
1.10.4 show banner login ............................................................................................................................. 147
1.11 Watchdog .................................................................................................................................................... 148
1.11.1 watchdog enable ................................................................................................................................ 148
1.11.2 show watchdog .................................................................................................................................. 149

2 Ethernet ....................................................................................................................................... 151


2.1 MAC............................................................................................................................................................. 151
2.1.1 clear mac-address ................................................................................................................................ 151
2.1.2 clear mac-address dynamic ................................................................................................................. 152
2.1.3 mac-address aging-time ...................................................................................................................... 154
2.1.4 mac-address blackhole ........................................................................................................................ 155
2.1.5 mac-address move-restrain enable ...................................................................................................... 156
2.1.6 mac-address learning enable ............................................................................................................... 157
2.1.7 mac-address threshold ......................................................................................................................... 159
2.1.8 mac-address multicast drop-unknown ................................................................................................. 160
2.1.9 mac-address static ............................................................................................................................... 162
2.1.10 search mac-address ........................................................................................................................... 163
2.1.11 show mac-address aging-time ........................................................................................................... 165
2.1.12 show mac-address count ................................................................................................................... 166
2.1.13 show mac-address learning ............................................................................................................... 167
2.1.14 show mac-address threshold ............................................................................................................. 168
2.1.15 show mac-address multicast .............................................................................................................. 170
2.1.16 show mac-address ............................................................................................................................. 172
2.2 VLAN ........................................................................................................................................................... 173
2.2.1 create vlan ........................................................................................................................................... 173
2.2.2 name .................................................................................................................................................... 175
2.2.3 show vlan ............................................................................................................................................ 176
2.2.4 show switchport interface ................................................................................................................... 177
2.2.5 switchport access vlan ......................................................................................................................... 179
2.2.6 switchport access egress-allowed vlan ................................................................................................ 181

Raisecom Proprietary and Confidential


viii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

2.2.7 switchport mode .................................................................................................................................. 182


2.2.8 switchport trunk allowed vlan ............................................................................................................. 183
2.2.9 switchport trunk native vlan ................................................................................................................ 185
2.2.10 switchport trunk untagged vlan ......................................................................................................... 186
2.2.11 vlan .................................................................................................................................................... 188
2.3 QinQ ............................................................................................................................................................. 189
2.3.1 dot1q-tunnel ........................................................................................................................................ 189
2.3.2 tpid ...................................................................................................................................................... 190
2.3.3 switchport reject-frame ....................................................................................................................... 191
2.3.4 switchport vlan-mapping cvlan add-outer ........................................................................................... 192
2.3.5 switchport vlan-mapping ethertype add-outer ..................................................................................... 194
2.3.6 switchport vlan-mapping-miss discard................................................................................................ 196
2.3.7 switchport qinq dot1q-tunnel default-cvlan ........................................................................................ 197
2.3.8 switchport vlan-mapping both add-outer ............................................................................................ 198
2.3.9 show vlan-mapping both interface ...................................................................................................... 200
2.3.10 show vlan-mapping interface ............................................................................................................ 201
2.3.11 show dot1q-tunnel ............................................................................................................................. 203
2.4 VLAN mapping ............................................................................................................................................ 205
2.4.1 switchport vlan-mapping translate ...................................................................................................... 205
2.4.2 switchport vlan-mapping ingress outer inner translate ........................................................................ 206
2.4.3 switchport vlan-mapping egress outer inner translate ......................................................................... 208
2.4.4 switchport vlan-mapping both add-outer translate outer .................................................................. 210
2.5 STP ............................................................................................................................................................... 211
2.5.1 instance vlan........................................................................................................................................ 211
2.5.2 name .................................................................................................................................................... 212
2.5.3 revision-level....................................................................................................................................... 214
2.5.4 show spanning-tree ............................................................................................................................. 215
2.5.5 show spanning-tree interface............................................................................................................... 219
2.5.6 show spanning-tree region-configuration............................................................................................ 221
2.5.7 show spanning-tree region-operation .................................................................................................. 223
2.5.8 spanning-tree bridge-diameter ............................................................................................................ 224
2.5.9 spanning-tree clear statistics ............................................................................................................... 225
2.5.10 spanning-tree enable ......................................................................................................................... 226
2.5.11 spanning-tree edged-port ................................................................................................................... 228
2.5.12 spanning-tree edged-port bpdu-filter ................................................................................................. 229
2.5.13 spanning-tree extern-path-cost .......................................................................................................... 230
2.5.14 spanning-tree forward-delay ............................................................................................................. 231
2.5.15 spanning-tree hello-time ................................................................................................................... 233
2.5.16 spanning-tree inter-path-cost ............................................................................................................. 234
2.5.17 spanning-tree link-type ..................................................................................................................... 236
2.5.18 spanning-tree loopguard .................................................................................................................... 237
2.5.19 spanning-tree bpduguard ................................................................................................................... 238

Raisecom Proprietary and Confidential


ix
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

2.5.20 spanning-tree max-age ...................................................................................................................... 240


2.5.21 spanning-tree max-hops .................................................................................................................... 241
2.5.22 spanning-tree mode ........................................................................................................................... 242
2.5.23 spanning-tree priority ........................................................................................................................ 243
2.5.24 spanning-tree region-configuration ................................................................................................... 245
2.5.25 spanning-tree root ............................................................................................................................. 246
2.5.26 spanning-tree rootguard .................................................................................................................... 247
2.5.27 spanning-tree transit-limit ................................................................................................................. 249
2.6 Loop detection .............................................................................................................................................. 250
2.6.1 clear loopback-detection statistic ........................................................................................................ 250
2.6.2 loopback-detection .............................................................................................................................. 251
2.6.3 loopback-detection manual restore ..................................................................................................... 253
2.6.4 show loopback-detection..................................................................................................................... 254
2.7 Interface protection ...................................................................................................................................... 256
2.7.1 show switchport protect ...................................................................................................................... 256
2.7.2 switchport protect................................................................................................................................ 257
2.8 Port mirroring ............................................................................................................................................... 258
2.8.1 mirror-group ........................................................................................................................................ 258
2.8.2 mirror-group monitor-port................................................................................................................... 260
2.8.3 mirror-group source-port ..................................................................................................................... 261
2.8.4 show mirror-group .............................................................................................................................. 262
2.8.5 mirror-group source-cpu ..................................................................................................................... 263
2.9 L2CP ............................................................................................................................................................ 265
2.9.1 l2cp-process profile ............................................................................................................................. 265
2.9.2 l2cp-process tunnel destination-address .............................................................................................. 266
2.9.3 l2cp-process protocol action ............................................................................................................... 267
2.9.4 name .................................................................................................................................................... 269
2.9.5 tunnel vlan ........................................................................................................................................... 270
2.9.6 tunnel interface .................................................................................................................................... 271
2.9.7 clear l2cp-process tunnel statistics ...................................................................................................... 273
2.9.8 tunnel tunnel-type ............................................................................................................................... 274
2.9.9 show l2cp-process ............................................................................................................................... 275
2.9.10 show l2cp-process profile ................................................................................................................. 276
2.9.11 show l2cp-process tunnel statistics.................................................................................................... 278

3 Ring network protection .......................................................................................................... 280


3.1 G.8032 .......................................................................................................................................................... 280
3.1.1 clear ethernet ring-protection command ............................................................................................. 280
3.1.2 clear ethernet ring-protection statistics ............................................................................................... 281
3.1.3 ethernet ring-protection ....................................................................................................................... 282
3.1.4 ethernet ring-protection force-switch .................................................................................................. 285
3.1.5 ethernet ring-protection guard-time .................................................................................................... 286

Raisecom Proprietary and Confidential


x
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

3.1.6 ethernet ring-protection holdoff-time .................................................................................................. 287


3.1.7 ethernet ring-protection manual-switch .............................................................................................. 288
3.1.8 ethernet ring-protection name ............................................................................................................. 290
3.1.9 ethernet ring-protection propagate enable ........................................................................................... 291
3.1.10 ethernet ring-protection raps-vc ........................................................................................................ 292
3.1.11 ethernet ring-protection version ........................................................................................................ 293
3.1.12 ethernet ring-protection wtr-time ...................................................................................................... 295
3.1.13 show ethernet ring-protection ........................................................................................................... 296
3.1.14 show ethernet ring-protection statistic .............................................................................................. 298
3.1.15 show ethernet ring-protection status ................................................................................................. 299

4 IP service ..................................................................................................................................... 301


4.1 ARP .............................................................................................................................................................. 301
4.1.1 arp ....................................................................................................................................................... 301
4.1.2 arp aging-time ..................................................................................................................................... 302
4.1.3 arp learning enable .............................................................................................................................. 303
4.1.4 arp max-learning-num ......................................................................................................................... 305
4.1.5 arp mode ............................................................................................................................................. 306
4.1.6 clear arp............................................................................................................................................... 307
4.1.7 gratuitous-arp-learning ........................................................................................................................ 308
4.1.8 show arp .............................................................................................................................................. 309
4.2 IP basic configuration ................................................................................................................................... 311
4.2.1 ip address ............................................................................................................................................ 311
4.2.2 ipv6 address ........................................................................................................................................ 312
4.2.3 show ip interface brief......................................................................................................................... 313
4.2.4 show ipv6 interface brief..................................................................................................................... 314
4.3 Static routes .................................................................................................................................................. 316
4.3.1 ip route ................................................................................................................................................ 316
4.3.2 ip route static distance ......................................................................................................................... 317
4.3.3 show ip route ....................................................................................................................................... 318
4.4 NDP.............................................................................................................................................................. 320
4.4.1 clear ipv6 neighbors ............................................................................................................................ 320
4.4.2 ipv6 neighbors ..................................................................................................................................... 321
4.4.3 ipv6 nd dad attempts ........................................................................................................................... 323
4.4.4 ipv6 neighbors max-learning-num ...................................................................................................... 324
4.4.5 show ipv6 neighbors ........................................................................................................................... 325
4.4.6 show ipv6 interface prefix ................................................................................................................... 327
4.4.7 show ipv6 interface nd ........................................................................................................................ 329

5 PoE................................................................................................................................................ 332
5.1.1 poe enable ........................................................................................................................................... 332
5.1.2 poe force-power .................................................................................................................................. 333
5.1.3 poe legacy enable ................................................................................................................................ 334

Raisecom Proprietary and Confidential


xi
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

5.1.4 poe max-power .................................................................................................................................... 336


5.1.5 poe priority .......................................................................................................................................... 337
5.1.6 poe pse power-threshold ..................................................................................................................... 338
5.1.7 poe pse trap enable .............................................................................................................................. 339
5.1.8 poe temperature-protection enable ...................................................................................................... 340
5.1.9 poe power-management ...................................................................................................................... 342
5.1.10 show poe ........................................................................................................................................... 343
5.1.11 show poe pse ..................................................................................................................................... 345

6 DHCP ........................................................................................................................................... 348


6.1 DHCP Client ................................................................................................................................................ 348
6.1.1 ip address dhcp .................................................................................................................................... 348
6.1.2 ip dhcp client ....................................................................................................................................... 349
6.1.3 ip dhcp client renew ............................................................................................................................ 351
6.1.4 ipv6 address dhcp ................................................................................................................................ 352
6.1.5 ipv6 dhcp client rapid-commit ............................................................................................................ 353
6.1.6 ipv6 dhcp client renew ........................................................................................................................ 354
6.1.7 show ip dhcp client ............................................................................................................................. 355
6.1.8 show ipv6 dhcp client ......................................................................................................................... 357
6.2 DHCP Snooping ........................................................................................................................................... 358
6.2.1 ip dhcp snooping ................................................................................................................................. 358
6.2.2 ip dhcp snooping(interface) ................................................................................................................ 359
6.2.3 ip dhcp snooping trust ......................................................................................................................... 361
6.2.4 ip dhcp snooping information option .................................................................................................. 362
6.2.5 ip dhcp snooping option ...................................................................................................................... 363
6.2.6 ipv6 dhcp snooping ............................................................................................................................. 364
6.2.7 ipv6 dhcp snooping interface .............................................................................................................. 366
6.2.8 ipv6 dhcp snooping option .................................................................................................................. 367
6.2.9 ipv6 dhcp snooping trust ..................................................................................................................... 368
6.2.10 show ip dhcp snooping ...................................................................................................................... 369
6.2.11 show ip dhcp snooping binding ......................................................................................................... 371
6.2.12 show ipv6 dhcp snooping .................................................................................................................. 372
6.2.13 show ipv6 dhcp snooping binding ..................................................................................................... 374
6.3 DHCP Option ............................................................................................................................................... 375
6.3.1 ip dhcp information option attach-string ............................................................................................. 375
6.3.2 ip dhcp information option circuit-id .................................................................................................. 376
6.3.3 ip dhcp information option circuit-id mac-format ............................................................................... 377
6.3.4 ip dhcp information option remote-id ................................................................................................. 378
6.3.5 ipv4 dhcp option ................................................................................................................................. 380
6.3.6 ipv4 dhcp option client-id ................................................................................................................... 381
6.3.7 ipv6 dhcp option ................................................................................................................................. 382
6.3.8 ipv6 dhcp option interface-id .............................................................................................................. 384

Raisecom Proprietary and Confidential


xii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

6.3.9 ipv6 dhcp option remote-id{ascii|hex} ............................................................................................... 385


6.3.10 ipv6 dhcp option remote-id mac-format............................................................................................ 386
6.3.11 show ip dhcp information option ...................................................................................................... 388
6.4 DHCP Server ................................................................................................................................................ 389
6.4.1 address mask ....................................................................................................................................... 389
6.4.2 ip dhcp lease ........................................................................................................................................ 390
6.4.3 ip dhcp server ...................................................................................................................................... 392
6.4.4 ip { dhcp | oam } server pool .............................................................................................................. 393
6.4.5 ip dhcp static-bind ............................................................................................................................... 394
6.4.6 lease expired........................................................................................................................................ 395
6.4.7 dns-server ............................................................................................................................................ 397
6.4.8 gateway ............................................................................................................................................... 398
6.4.9 option 60 ............................................................................................................................................. 399
6.4.10 ip dhcp relay relay-ip ........................................................................................................................ 400
6.4.11 show ip dhcp server ........................................................................................................................... 402
6.4.12 show ip dhcp server lease .................................................................................................................. 403
6.4.13 show ip dhcp server statistics ............................................................................................................ 404
6.4.14 show ip dhcp static-bind ................................................................................................................... 405
6.4.15 show ip server pool ........................................................................................................................... 406
6.4.16 tftp-server .......................................................................................................................................... 407
6.4.17 trap server-ip ..................................................................................................................................... 409
6.4.18 option 43 ........................................................................................................................................... 410
6.5 DHCP relay .................................................................................................................................................. 411
6.5.1 ip dhcp relay ........................................................................................................................................ 411
6.5.2 ip dhcp relay information option ......................................................................................................... 413
6.5.3 ip dhcp relay information option vlan-list ........................................................................................... 414
6.5.4 ip dhcp relay information trusted ........................................................................................................ 415
6.5.5 ip dhcp relay information policy ......................................................................................................... 416
6.5.6 ip dhcp relay target-ip ......................................................................................................................... 417
6.5.7 ip dhcp relay relay-ip .......................................................................................................................... 418
6.5.8 show ip dhcp relay .............................................................................................................................. 420
6.5.9 show ip dhcp relay information ........................................................................................................... 421

7 QoS ............................................................................................................................................... 423


7.1 Basic functions ............................................................................................................................................. 423
7.1.1 description ........................................................................................................................................... 423
7.1.2 show mls qos interface ........................................................................................................................ 425
7.2 Trust priority................................................................................................................................................. 426
7.2.1 mls qos trust ........................................................................................................................................ 426
7.2.2 mls qos priority ................................................................................................................................... 428
7.3 Priority mapping........................................................................................................................................... 429
7.3.1 mls qos mapping cos-remark .............................................................................................................. 429

Raisecom Proprietary and Confidential


xiii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

7.3.2 mls qos cos-remark-mapping enable ................................................................................................... 430


7.3.3 mls qos mapping cos-to-local-priority ................................................................................................ 431
7.3.4 mls qos mapping dscp-mutation.......................................................................................................... 432
7.3.5 mls qos mapping dscp-to-local-priority .............................................................................................. 434
7.3.6 cos to local-priority ............................................................................................................................. 435
7.3.7 dscp to local-priority ........................................................................................................................... 436
7.3.8 dscp to new-dscp ................................................................................................................................. 438
7.3.9 local-priority to cos ............................................................................................................................. 439
7.3.10 mls qos cos-remark ........................................................................................................................... 440
7.3.11 mls qos cos-to-local-priority ............................................................................................................. 441
7.3.12 mls qos dscp-mutation ...................................................................................................................... 442
7.3.13 dscp to new-dscp ............................................................................................................................... 443
7.3.14 mls qos dscp-to-local-priority ........................................................................................................... 445
7.3.15 show mls qos mapping cos-remark ................................................................................................... 446
7.3.16 show mls qos mapping cos-to-local-priority ..................................................................................... 447
7.3.17 show mls qos mapping dscp-mutation .............................................................................................. 448
7.3.18 show mls qos mapping dscp-to-local-priority ................................................................................... 450
7.4 Bandwidth guarantee .................................................................................................................................... 451
7.4.1 mls qos queue shaping ........................................................................................................................ 451
7.4.2 show mls qos queue interface ............................................................................................................. 453
7.4.3 clear mls qos queue statistics interface ............................................................................................... 454
7.4.4 show mls qos queue statistics interface ............................................................................................... 455
7.4.5 show mls qos queue shaping interface ................................................................................................ 456
7.5 Congestion management .............................................................................................................................. 457
7.5.1 mls qos queue scheduler drr ................................................................................................................ 457
7.5.2 mls qos queue scheduler wrr ............................................................................................................... 459
7.5.3 mls qos queue scheduler sp ................................................................................................................. 460
7.5.4 mls qos sred profile ............................................................................................................................. 461
7.5.5 sred start-drop-threshold end-drop-threshold ...................................................................................... 462
7.5.6 show mls qos sred profile.................................................................................................................... 464
7.6 Traffic policy ................................................................................................................................................ 465
7.6.1 class-map(global configuration mode) ................................................................................................ 465
7.6.2 match ................................................................................................................................................... 467
7.6.3 show class-map ................................................................................................................................... 468
7.6.4 mls qos policer-profile ........................................................................................................................ 470
7.6.5 drop-color............................................................................................................................................ 471
7.6.6 set-cos ................................................................................................................................................. 472
7.6.7 set-dscp ............................................................................................................................................... 473
7.6.8 set-pri .................................................................................................................................................. 475
7.6.9 recolor ................................................................................................................................................. 476
7.6.10 cir cbs ................................................................................................................................................ 477
7.6.11 show mls qos policer ......................................................................................................................... 479

Raisecom Proprietary and Confidential


xiv
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

7.6.12 policy-map ........................................................................................................................................ 480


7.6.13 class-map (PMAP configuration mode) ............................................................................................ 481
7.6.14 description (cmap/pmap) ................................................................................................................... 483
7.6.15 police................................................................................................................................................. 484
7.6.16 show policy-map ............................................................................................................................... 485
7.6.17 set ...................................................................................................................................................... 487
7.6.18 redirect-to .......................................................................................................................................... 488
7.6.19 copy-to-mirror ................................................................................................................................... 490
7.6.20 forward-to-cpu .................................................................................................................................. 491
7.6.21 statistics enable ................................................................................................................................. 493
7.6.22 service-policy .................................................................................................................................... 494
7.6.23 clear service-policy statistics............................................................................................................. 495
7.6.24 show service-policy........................................................................................................................... 496
7.6.25 show service-policy statistics ............................................................................................................ 498
7.6.26 show class-map ................................................................................................................................. 499
7.6.27 show mls qos policer ......................................................................................................................... 500
7.7 Rate limiting ................................................................................................................................................. 502
7.7.1 rate-limit.............................................................................................................................................. 502
7.7.2 show rate-limit interface ..................................................................................................................... 503

8 Multicast ..................................................................................................................................... 505


8.1 Layer 2 multicast basis ................................................................................................................................. 505
8.1.1 clear igmp statistics ............................................................................................................................. 505
8.1.2 igmp immediate-leave ......................................................................................................................... 506
8.1.3 igmp mrouter ....................................................................................................................................... 507
8.1.4 igmp ring ............................................................................................................................................. 509
8.1.5 no igmp member ................................................................................................................................. 510
8.1.6 igmp version........................................................................................................................................ 511
8.1.7 show igmp immediate-leave ............................................................................................................... 512
8.1.8 show igmp mrouter ............................................................................................................................. 514
8.1.9 show igmp statistics ............................................................................................................................ 515
8.2 IGMP Snooping............................................................................................................................................ 516
8.2.1 igmp snooping ..................................................................................................................................... 516
8.2.2 igmp snooping member-timeout ......................................................................................................... 517
8.2.3 show igmp snooping ........................................................................................................................... 519
8.2.4 show igmp snooping member ............................................................................................................. 520
8.2.5 show igmp snooping vlan ................................................................................................................... 522
8.3 IGMP MVR .................................................................................................................................................. 523
8.3.1 igmp mvr ............................................................................................................................................. 523
8.3.2 igmp mvr mcast-vlan .......................................................................................................................... 524
8.3.3 show igmp mvr ................................................................................................................................... 526
8.3.4 show igmp mvr ................................................................................................................................... 527

Raisecom Proprietary and Confidential


xv
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

8.3.5 show igmp mvr members .................................................................................................................... 528


8.3.6 show igmp mvr vlan-group ................................................................................................................. 529
8.4 IGMP filtering .............................................................................................................................................. 531
8.4.1 igmp filter ........................................................................................................................................... 531
8.4.2 igmp filter max-groups........................................................................................................................ 532
8.4.3 igmp filter max-groups action ............................................................................................................. 534
8.4.4 igmp filter profile (global configuration) ............................................................................................ 535
8.4.5 igmp filter profile (interface configuration) ........................................................................................ 537
8.4.6 permit | deny........................................................................................................................................ 539
8.4.7 range.................................................................................................................................................... 540
8.4.8 show igmp filter .................................................................................................................................. 542
8.4.9 show igmp filter profile....................................................................................................................... 545

9 OAM ............................................................................................................................................ 547


9.1 EFM ............................................................................................................................................................. 547
9.1.1 clear oam config .................................................................................................................................. 547
9.1.2 clear oam event ................................................................................................................................... 548
9.1.3 clear oam statistics .............................................................................................................................. 549
9.1.4 oam { active | passive } ....................................................................................................................... 550
9.1.5 oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-symbol-period } ....... 551
9.1.6 oam enable .......................................................................................................................................... 554
9.1.7 oam event trap enable ......................................................................................................................... 555
9.1.8 oam loopback ...................................................................................................................................... 557
9.1.9 oam loopback timeout ......................................................................................................................... 558
9.1.10 oam loopback retry............................................................................................................................ 559
9.1.11 oam notify enable .............................................................................................................................. 560
9.1.12 oam peer event trap enable ................................................................................................................ 562
9.1.13 oam remote-loopback ........................................................................................................................ 563
9.1.14 oam send-period timeout ................................................................................................................... 565
9.1.15 show oam .......................................................................................................................................... 566
9.1.16 show oam event ................................................................................................................................. 567
9.1.17 show oam loopback ........................................................................................................................... 569
9.1.18 show oam notify ................................................................................................................................ 570
9.1.19 show oam peer .................................................................................................................................. 572
9.1.20 show oam peer event ......................................................................................................................... 573
9.1.21 show oam peer link-statistic .............................................................................................................. 574
9.1.22 show oam peer oam-info ................................................................................................................... 575
9.1.23 show oam statistics............................................................................................................................ 576
9.1.24 show oam trap ................................................................................................................................... 578

10 Reliability ................................................................................................................................. 579


10.1 Link aggregation ........................................................................................................................................ 579
10.1.1 port-channel ...................................................................................................................................... 579

Raisecom Proprietary and Confidential


xvi
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

10.1.2 clear lacp statistics ............................................................................................................................ 581


10.1.3 interface port-channel ....................................................................................................................... 582
10.1.4 lacp mode .......................................................................................................................................... 583
10.1.5 lacp port-priority ............................................................................................................................... 584
10.1.6 lacp priority preempt enable.............................................................................................................. 585
10.1.7 lacp system-priority........................................................................................................................... 586
10.1.8 lacp timeout ....................................................................................................................................... 588
10.1.9 load-sharing mode ............................................................................................................................. 589
10.1.10 master-port ...................................................................................................................................... 590
10.1.11 { max-active | min-active } links ..................................................................................................... 592
10.1.12 mode................................................................................................................................................ 593
10.1.13 restore-mode ................................................................................................................................... 595
10.1.14 show lacp ........................................................................................................................................ 596
10.1.15 show port-channel ........................................................................................................................... 600
10.2 Interface backup ......................................................................................................................................... 601
10.2.1 show switchport backup .................................................................................................................... 601
10.2.2 switchport backup force-switch ........................................................................................................ 603
10.2.3 switchport backup ............................................................................................................................. 605
10.2.4 switchport backup restore-delay ....................................................................................................... 606
10.2.5 switchport backup restore-mode ....................................................................................................... 607
10.3 Link-state tracking...................................................................................................................................... 609
10.3.1 link-state-tracking group ................................................................................................................... 609
10.3.2 link-state-tracking group { downstream | upstream }........................................................................ 610
10.3.3 show link-state-tracking group .......................................................................................................... 612

11 Security...................................................................................................................................... 614
11.1 Secure MAC ............................................................................................................................................... 614
11.1.1 clear port-security.............................................................................................................................. 614
11.1.2 no port-security shutdown ................................................................................................................. 615
11.1.3 port-security recovery-time ............................................................................................................... 616
11.1.4 port-security aging-time .................................................................................................................... 618
11.1.5 switchport port-security aging-type................................................................................................... 619
11.1.6 show port-security mac-address ........................................................................................................ 620
11.1.7 show port-security ............................................................................................................................. 622
11.1.8 switchport port-security .................................................................................................................... 624
11.1.9 switchport port-security mac-address ................................................................................................ 625
11.1.10 switchport port-security mac-address sticky ................................................................................... 626
11.1.11 switchport port-security mac-address sticky vlan............................................................................ 628
11.1.12 switchport port-security maximum ................................................................................................. 629
11.1.13 switchport port-security trap enable ................................................................................................ 630
11.1.14 switchport port-security violation ................................................................................................... 632
11.2 ACL ............................................................................................................................................................ 633

Raisecom Proprietary and Confidential


xvii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

11.2.1 access-list .......................................................................................................................................... 633


11.2.2 rule (standard IP ACL configuration mode) ...................................................................................... 635
11.2.3 rule (extended IP ACLconfiguration mode) ...................................................................................... 636
11.2.4 rule (MAC ACL configuration mode) ............................................................................................... 639
11.2.5 rule (User ACLconfiguration mode) ................................................................................................. 641
11.2.6 rule (IPv6 ACLconfiguration mode) ................................................................................................. 642
11.2.7 rule (Advanced ACLconfiguration mode) ......................................................................................... 644
11.2.8 show acl resource .............................................................................................................................. 646
11.2.9 filter access-list.................................................................................................................................. 647
11.2.10 clear filter statistics interface ........................................................................................................... 649
11.2.11 show filter interface ......................................................................................................................... 650
11.2.12 show access-list ............................................................................................................................... 652
11.3 Dynamic ARP inspection............................................................................................................................ 653
11.3.1 ip arp-inspection binding ................................................................................................................... 653
11.3.2 ip arp-inspection dhcp-snooping ....................................................................................................... 655
11.3.3 ip arp-inspection static-config ........................................................................................................... 656
11.3.4 ip arp-inspection trust ........................................................................................................................ 657
11.3.5 ip arp-inspection vlan ........................................................................................................................ 658
11.3.6 ip arp-rate-limit enable ...................................................................................................................... 660
11.3.7 ip arp-rate-limit rate .......................................................................................................................... 661
11.3.8 ip arp-rate-limit recover enable ......................................................................................................... 662
11.3.9 ip arp-rate-limit recover time ............................................................................................................ 663
11.3.10 show ip arp-inspection .................................................................................................................... 664
11.3.11 show ip arp-inspection binding ....................................................................................................... 666
11.3.12 show ip arp-rate-limit ...................................................................................................................... 668
11.4 RADIUS/TACACS+ .................................................................................................................................. 670
11.4.1 aaa accounting fail ............................................................................................................................. 670
11.4.2 aaa accounting login enable .............................................................................................................. 671
11.4.3 aaa accounting update ....................................................................................................................... 672
11.4.4 aaa command authorize enable.......................................................................................................... 673
11.4.5 clear tacacs statistics ......................................................................................................................... 674
11.4.6 enable login ....................................................................................................................................... 675
11.4.7 radius ................................................................................................................................................. 677
11.4.8 radius accounting-server ................................................................................................................... 678
11.4.9 radius accounting-server key ............................................................................................................. 679
11.4.10 radius-key ........................................................................................................................................ 681
11.4.11 show aaa .......................................................................................................................................... 682
11.4.12 show radius-server .......................................................................................................................... 683
11.4.13 show tacacs-server .......................................................................................................................... 684
11.4.14 show user......................................................................................................................................... 686
11.4.15 tacacs accounting-server ................................................................................................................. 688
11.4.16 tacacs-server .................................................................................................................................... 689

Raisecom Proprietary and Confidential


xviii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

11.4.17 tacacs-server key ............................................................................................................................. 691


11.4.18 user login ......................................................................................................................................... 692
11.5 802.1x ......................................................................................................................................................... 693
11.5.1 clear dot1x statistics .......................................................................................................................... 693
11.5.2 dot1x enable ...................................................................................................................................... 695
11.5.3 dot1x authentication-method ............................................................................................................. 696
11.5.4 dot1x auth-control ............................................................................................................................. 697
11.5.5 dot1x auth-method ............................................................................................................................ 699
11.5.6 dot1x reauthentication ....................................................................................................................... 700
11.5.7 dot1x timer reauth-period .................................................................................................................. 701
11.5.8 dot1x timer tx-period......................................................................................................................... 702
11.5.9 dot1x timer supp-timeout .................................................................................................................. 703
11.5.10 dot1x timer server-timeout .............................................................................................................. 704
11.5.11 dot1x timer quiet-period .................................................................................................................. 706
11.5.12 show dot1x ...................................................................................................................................... 707
11.5.13 show dot1x statistics ....................................................................................................................... 709
11.5.14 show dot1x user............................................................................................................................... 711
11.6 PPPoE+ ...................................................................................................................................................... 712
11.6.1 clear pppoeagent statistic .................................................................................................................. 712
11.6.2 pppoeagent enable ............................................................................................................................. 713
11.6.3 pppoeagent circuit-id ......................................................................................................................... 715
11.6.4 pppoeagent circuit-id { attach-string | format | hex } ........................................................................ 716
11.6.5 pppoeagent circuit-id mac-format ..................................................................................................... 717
11.6.6 pppoeagent circuit-id mode ............................................................................................................... 719
11.6.7 pppoeagent remote-id format ............................................................................................................ 720
11.6.8 pppoeagent remote-id ........................................................................................................................ 722
11.6.9 pppoeagent trust ................................................................................................................................ 723
11.6.10 pppoeagent vendor-specific-tag overwrite enable ........................................................................... 724
11.6.11 show pppoeagent ............................................................................................................................. 725
11.6.12 show pppoeagent statistic ................................................................................................................ 727
11.7 Storm control .............................................................................................................................................. 729
11.7.1 dlf-forwarding enable ........................................................................................................................ 729
11.7.2 storm-control ..................................................................................................................................... 730
11.7.3 show storm-control............................................................................................................................ 731
11.7.4 show dlf-forwarding .......................................................................................................................... 733
11.8 IP source guard ........................................................................................................................................... 734
11.8.1 ip source binding ............................................................................................................................... 734
11.8.2 ip source binding auto-update ........................................................................................................... 735
11.8.3 ip source binding dhcp-snooping static ............................................................................................. 736
11.8.4 ip verify source .................................................................................................................................. 738
11.8.5 ip verify source dhcp-snooping ......................................................................................................... 739
11.8.6 ip verify source trust .......................................................................................................................... 740

Raisecom Proprietary and Confidential


xix
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

11.8.7 ipv6 source binding ........................................................................................................................... 741


11.8.8 ipv6 verify source .............................................................................................................................. 743
11.8.9 ipv6 verify source dhcp-snooping ..................................................................................................... 744
11.8.10 ipv6 verify source trust .................................................................................................................... 745
11.8.11 show ip source binding .................................................................................................................... 746
11.8.12 show ip verify source ...................................................................................................................... 748
11.8.13 show ipv6 source binding ................................................................................................................ 749
11.8.14 show ipv6 verify source .................................................................................................................. 751
11.9 CPU protection ........................................................................................................................................... 752
11.9.1 clear cpu-protect car statistics ........................................................................................................... 752
11.9.2 cpu-protect car................................................................................................................................... 754
11.9.3 show cpu-protect car statistics ........................................................................................................... 755

12 System management and maintenance............................................................................... 757


12.1 LLDP .......................................................................................................................................................... 757
12.1.1 clear lldp global statistic ................................................................................................................... 757
12.1.2 clear lldp statistic .............................................................................................................................. 758
12.1.3 clear lldp remote-table ...................................................................................................................... 759
12.1.4 lldp enable ......................................................................................................................................... 760
12.1.5 lldp message-transmission delay ....................................................................................................... 762
12.1.6 lldp message-transmission hold-multiplier ....................................................................................... 763
12.1.7 lldp message-transmission interval ................................................................................................... 764
12.1.8 lldp restart-delay ............................................................................................................................... 765
12.1.9 lldp trap-interval................................................................................................................................ 766
12.1.10 show lldp local config ..................................................................................................................... 768
12.1.11 show lldp local system-data ............................................................................................................ 769
12.1.12 show lldp remote ............................................................................................................................. 770
12.1.13 show lldp statistic ............................................................................................................................ 772
12.1.14 snmp-server lldp-trap enable ........................................................................................................... 773
12.2 SNMP ......................................................................................................................................................... 774
12.2.1 show snmp access ............................................................................................................................. 774
12.2.2 show snmp community ..................................................................................................................... 776
12.2.3 show snmp config ............................................................................................................................. 777
12.2.4 show snmp group .............................................................................................................................. 778
12.2.5 show snmp host ................................................................................................................................. 779
12.2.6 show snmp statistics .......................................................................................................................... 780
12.2.7 show snmp user ................................................................................................................................. 782
12.2.8 show snmp view ................................................................................................................................ 783
12.2.9 show snmp server-auth ...................................................................................................................... 784
12.2.10 snmp-server access .......................................................................................................................... 786
12.2.11 snmp-server community .................................................................................................................. 788
12.2.12 snmp-server contact ........................................................................................................................ 789

Raisecom Proprietary and Confidential


xx
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

12.2.13 snmp-server enable traps ................................................................................................................. 790


12.2.14 snmp-server group user ................................................................................................................... 791
12.2.15 snmp-server host ............................................................................................................................. 792
12.2.16 snmp-server location ....................................................................................................................... 794
12.2.17 snmp-server user ............................................................................................................................. 795
12.2.18 snmp-server view ............................................................................................................................ 797
12.2.19 snmp-server server-auth .................................................................................................................. 799
12.2.20 snmp-server server-auth enable ....................................................................................................... 800
12.3 Optical module DDM ................................................................................................................................. 801
12.3.1 show transceiver ................................................................................................................................ 801
12.3.2 show transceiver ddm........................................................................................................................ 802
12.3.3 show transceiver history .................................................................................................................... 804
12.3.4 show transceiver information ............................................................................................................ 806
12.3.5 show transceiver threshold-violations ............................................................................................... 808
12.3.6 snmp-server trap transceiver enable .................................................................................................. 809
12.3.7 transceiver ddm enable ...................................................................................................................... 810
12.3.8 transceiver trap enable ...................................................................................................................... 812
12.4 System log .................................................................................................................................................. 813
12.4.1 clear logging buffer ........................................................................................................................... 813
12.4.2 clear logging statistics ....................................................................................................................... 814
12.4.3 logging buginf ................................................................................................................................... 815
12.4.4 logging buffered ................................................................................................................................ 816
12.4.5 logging buffered size ......................................................................................................................... 818
12.4.6 logging console ................................................................................................................................. 819
12.4.7 logging discriminator ........................................................................................................................ 821
12.4.8 logging facility .................................................................................................................................. 823
12.4.9 logging file ........................................................................................................................................ 824
12.4.10 logging history ................................................................................................................................ 826
12.4.11 logging history size ......................................................................................................................... 827
12.4.12 logging host ..................................................................................................................................... 828
12.4.13 logging monitor ............................................................................................................................... 830
12.4.14 logging on ....................................................................................................................................... 832
12.4.15 logging rate-limit............................................................................................................................. 833
12.4.16 logging sequence-number ............................................................................................................... 834
12.4.17 logging time-stamp ......................................................................................................................... 835
12.4.18 logging trap ..................................................................................................................................... 836
12.4.19 show logging ................................................................................................................................... 838
12.5 Alarm management .................................................................................................................................... 841
12.5.1 alarm active delay ............................................................................................................................. 841
12.5.2 alarm active storage-mode ................................................................................................................ 842
12.5.3 alarm auto-report ............................................................................................................................... 843
12.5.4 alarm clear ......................................................................................................................................... 845

Raisecom Proprietary and Confidential


xxi
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

12.5.5 alarm clear delay ............................................................................................................................... 847


12.5.6 alarm correlation inhibit .................................................................................................................... 848
12.5.7 alarm inhibit ...................................................................................................................................... 849
12.5.8 alarm inverse ..................................................................................................................................... 850
12.5.9 alarm monitor .................................................................................................................................... 852
12.5.10 alarm syslog .................................................................................................................................... 853
12.5.11 show alarm active ............................................................................................................................ 855
12.5.12 show alarm cleared.......................................................................................................................... 856
12.5.13 show alarm log ................................................................................................................................ 857
12.5.14 show alarm management ................................................................................................................. 858
12.5.15 show alarm management statistics .................................................................................................. 859
12.6 CPU monitoring ......................................................................................................................................... 861
12.6.1 cpu falling-threshold ......................................................................................................................... 861
12.6.2 cpu rising-threshold........................................................................................................................... 862
12.6.3 show cpu-utilization .......................................................................................................................... 863
12.6.4 show process ..................................................................................................................................... 865
12.6.5 show process cpu .............................................................................................................................. 869
12.6.6 snmp-server traps enable ................................................................................................................... 871
12.7 Fault detection ............................................................................................................................................ 872
12.7.1 ping ................................................................................................................................................... 872
12.7.2 traceroute........................................................................................................................................... 874
12.7.3 Traceroute ipv6 ................................................................................................................................. 877
12.8 KeepAlive .................................................................................................................................................. 879
12.8.1 snmp-server keepalive-trap ............................................................................................................... 879
12.8.2 snmp-server keepalive-trap interval .................................................................................................. 880
12.8.3 show keepalive .................................................................................................................................. 881
12.9 RMON ........................................................................................................................................................ 882
12.9.1 clear rmon ......................................................................................................................................... 882
12.9.2 rmon alarm ........................................................................................................................................ 883
12.9.3 rmon event ........................................................................................................................................ 885
12.9.4 rmon history ...................................................................................................................................... 887
12.9.5 rmon statistic ..................................................................................................................................... 888
12.9.6 show rmon ......................................................................................................................................... 890
12.10 Cable diagnostics ..................................................................................................................................... 892
12.10.1 test cable-diagnostics port-list ......................................................................................................... 892
12.10.2 show cable-diagnostics ................................................................................................................... 893
12.11 Hardware environment monitoring .......................................................................................................... 894
12.11.1 alarm temperature............................................................................................................................ 894
12.11.2 alarm voltage ................................................................................................................................... 896
12.11.3 clear alarm ....................................................................................................................................... 897
12.11.4 logging alarm .................................................................................................................................. 898
12.11.5 show alarm ...................................................................................................................................... 900

Raisecom Proprietary and Confidential


xxii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference Contents

12.11.6 show alarm current .......................................................................................................................... 901


12.11.7 show alarm history .......................................................................................................................... 902
12.11.8 show environment ........................................................................................................................... 903
12.11.9 snmp-server alarm-trap ................................................................................................................... 905
12.12 Memory monitoring ................................................................................................................................. 906
12.12.1 memory utilization threshold .......................................................................................................... 906
12.12.2 memory utilization enable ............................................................................................................... 907
12.12.3 show memory .................................................................................................................................. 908
12.13 Performance statistics ............................................................................................................................... 911
12.13.1 clear performance statistics history ................................................................................................. 911
12.13.2 performance statistics buckets......................................................................................................... 911
12.13.3 performance statistics vlan .............................................................................................................. 913
12.13.4 show performance statistics ............................................................................................................ 914

13 Index .......................................................................................................................................... 917

Raisecom Proprietary and Confidential


xxiii
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1 Basic configuration

1.1 BootROM
1.1.1 t

Function
To upgrade the system software to the device, use this command.

Format
t

Parameters
N/A

Default conditions
N/A

Command mode
Bootrom

User level
N/A

Usage guidelines
Scenario
When upgrading the device using Bootrom, you have to download the system software from
the FTP or TFTP server through the Bootrom command and save the software in the device.
The device supports dual system, so you need to choose to override which old system files
with the new ones while using this command.

Raisecom Proprietary and Confidential


1
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Prerequisite

After starting the device, you can press Space to enter the Bootrom command mode at the
prompt of the "Press space into Bootstrap menu".
The FTP or TFTP server should be well configured, including:
Configure the directory in which downloaded files will be saved.
Configure the IP address of the server and ensure that the server and the device are in the
same network segment.
Connect the server to the SNMP interface first and then start downloading. Because only
that interface can be initialized in the Bootrom command mode.
Follow-up procedure
N/A
Precaution
Use it with caution.

Examples
This example shows how to download system softwares from the TFTP server.
[Raisecom]:t
ipaddr: 192.168.5.100
serverip: 192.168.5.1
filename: uImage

Current system partiton info:


Partition number Name Size
----------------------------------------------------
1 iscom2600_image 16320072
2 None 0

Please input system partition number for upgrading(1-2):1

The following table describes fields in the command output.

Field Description
ipaddr IP address of the device
serverip IP address of the TFTP server
Partition number Partition number
name File name of the new system
Size Size

Related commands
b
R

Raisecom Proprietary and Confidential


2
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.1.2 m

Function
To upgrade Boot software to the device, use this command.

Format
m

Parameters
N/A

Default conditions
N/A

Command mode
BootROM

User level
N/A

Usage guidelines
Scenario
You can use this command to rapidly load Boot software and start the device.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu" and execute related configurations. You can use this
command to start the device and enter the system after completion of configurations.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to download Boot files to the device.
[Raisecom]:m
ipaddr: 192.168.5.100
serverip: 192.168.5.1
filename: uImage mboot.bin

Raisecom Proprietary and Confidential


3
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

press y to confirm: y

Related commands
N/A

1.1.3 b

Function
To read and load system files from the device, use this command.

Format
b

Parameters
N/A

Default conditions
N/A

Command mode
BootROM mode

User level
N/A

Usage guidelines
Scenario
After configuring the BootROM module, you can use this command to rapidly load system
files and start the device.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu" and execute related configurations. You can use this
command to start the device and enter the system after completion of configurations.
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


4
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to rapidly start the device.
[Raisecom]:b
Loading ISCOM2600.0.20130104 (System index 1)...
Decompress start...

CRC Checking...OK

Loading image... 4895962


Decompress success

Entering....

Adding 26966 symbols for standalone.


Init Switch Hardware....Done!
Init Switch Core Software....
Init Clock-Sub-Card....Done!
Init Clock-Sub-Card Configure....Done!

Related commands
N/A

1.1.4 s

Function
To configure the sequence of system files which are to be loaded while starting the device,
use this command.

Format
S

Parameters
N/A

Default conditions
N/A

Command mode
BootROM

User level
N/A

Raisecom Proprietary and Confidential


5
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Usage guidelines
Scenario
You can use this command to configure the sequence of system files which are to be loaded
while starting the device.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu".
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the sequence of system files which are to be loaded
while starting the device.
[Raisecom]:s
Current system partiton info:
Partition number Name Size
----------------------------------------------------
1 iscom2600_image 16320072
2 None 0

Current boot sequence: 1,2


Please input new boot sequence: 2-1
Saving Environment to SPI Flash...
Erasing SPI flash...Writing to SPI flash...done

Related commands
N/A

1.1.5 e

Function
To clear environment variables, use this command.

Format
E

Parameters
N/A

Raisecom Proprietary and Confidential


6
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Default conditions
N/A

Command mode
BootROM

User level
N/A

Usage guidelines
Scenario
You can use this command to delete the configured variables and this action will take effect
after the device is rebooted.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu".
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear environment variables.
[Raisecom]:e
press y to confirm: y

Done
Please reboot to apply these changes!

Related commands
N/A

1.1.6 r

Function
To reboot the device, use this command.

Format
r

Raisecom Proprietary and Confidential


7
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
N/A

Default conditions
N/A

Command mode
BootROM mode

User level
N/A

Usage guideline
Scenario
After configuring the BootROM module, you can use this command to reboot the device.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu" and execute related configurations. You can use this
command to reboot the device after completion of configurations.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to reboot the device in the BootROM mode.
[Raisecom]:r
resetting ...

BOOTROM starting ..
Bootrom Version 1.8 (based upon U-Boot 2012.10) Aug 12 2015 - 17:11:26
*** Warning - bad CRC, using default environment
Saving Environment to SPI Flash...
Erasing SPI flash...Writing to SPI flash...done
Press space key to enter boot menu: 0
Saving Environment to SPI Flash...
Erasing SPI flash...Writing to SPI flash...done
Booting system1
Saving Environment to SPI Flash...
Erasing SPI flash...Writing to SPI flash...done
Starting kernel ...

Raisecom Proprietary and Confidential


8
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
N/A

1.1.7 p

Function
To configure the password of BootROM, use this command.

Format
p

Parameters
N/A

Default conditions
N/A

Command mode
BootROM mode

User level
N/A

Usage guidelines
Scenario
You must input the password to execute BootROM after configuring the BootROM module.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu" and execute related configurations. You can use this
command to reboot the device after completion of configurations.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the password in BootROM command mode.
[Raisecom]:p

Raisecom Proprietary and Confidential


9
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

No password!

Please input new password: ******

Please input new password again: ******


Saving Environment to SPI Flash...
SF: Detected MX66L51235F with page size 256 Bytes, erase size 64 KiB,
total 64 MiB
Erasing SPI flash...Writing to SPI flash...done

Password setting OK!......

Related commands
e

1.1.8 ?/h

Function
To show information about system files, use this command.

Format
?/h

Parameters
N/A

Default conditions
N/A

Command mode
BootROM mode

User level
N/A

Usage guidelines
Scenario
You can use this command to check names of all system files, used space, free space, etc.
Prerequisite
After starting the device, you can press Space to enter BootROM mode at the prompt of the
"Press space into Bootstrap menu"
Follow-up procedure

Raisecom Proprietary and Confidential


10
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

N/A
Precaution
N/A

Examples
This example shows how to show information about system files.
[Raisecom]:?

t: Update system from tftp.


m: Update boot from tftp.
b: Boot system from flash.
e: Erase bootline para.
s: Select system image to boot.
p: Password setting.
r: Reboot.
?/h: Help menu.

Related commands
N/A

1.2 Basic commands


1.2.1 clear

Function
To clear all information displayed on the terminal screen, use this command.

Format
clear

Parameters
N/A

Default conditions
N/A

Command mode
Any command

Raisecom Proprietary and Confidential


11
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

User level
0

Usage guidelines
Scenario
You will be prevented from executing configurations when the information displayed on the
screen is too much. In this case, you can use this command to clear it. It can be used to clear
the information displayed on the screen only instead of clearing the previous configurations.
After clearing the displayed information, you can continue to enter commands from the first
line on the screen.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear the information displayed on the screen in global
configuration mode.
Raisecom#config
Raisecom(config)#clear

Related commands
N/A

1.2.2 config

Function
To enter global configuration mode, use this command.

Format
config [ terminal ]

Parameters
Parameter Description
terminal Configuration terminal

Raisecom Proprietary and Confidential


12
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Default conditions
N/A

Command mode
Privileged EXEC

User level
0

Usage guidelines
Scenario
When configuring the device, you can use this command to enter global configuration mode
to execute commands.
Prerequisite
N/A
Follow-up procedure
After entering global configuration mode, you can use related commands to configure
the device.
You can enter "?" to view commands supported in global configuration mode.
You can use the list command to view details of all commands in global configuration
mode.
Precaution
N/A

Examples
This example shows how to enter global configuration mode.
Raisecom>enable
Password:
Raisecom#config
Raisecom(config)#

Related commands
N/A

1.2.3 command-log enable

Function
To enable command log, use this command. To disable this function, use the disable form of
this command.

Raisecom Proprietary and Confidential


13
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Format
command-log { enable | disable }

Parameters
Parameter Description
enable Enable command log.
disable Disable command log.

Default conditions
The command log is enabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure command log for recording commands entered by all
users instead of those by the current users.
Prerequisite
N/A
Follow-up procedure
You can use the show command-log command to check the history commands.
Precaution
N/A

Examples
This example shows how to enable command log.
Raisecom#config
Raisecom(config)#command-log enable
Set successfully.

Related commands
N/A

Raisecom Proprietary and Confidential


14
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.2.4 enable

Function
To configure the user privilege, use this command.

Format
enable [ privilege ]

Parameters
Parameter Description
privilege User privilege, an integer, ranging from 1 to 15

Default conditions
N/A

Command mode
Privileged EXEC

User level
0

Usage guidelines
Scenario
You can use this command to configure the user privilege. By default, the user privilege is
configured to 15 when no basic parameter is specified.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When upgrading privileges, you need to input the login password of the user with privilege of
15.

Examples
This example shows how to configure the user privilege to 11.
Raisecom#enable 11
Current privilege:11

Raisecom Proprietary and Confidential


15
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
N/A

1.2.5 enable password

Function
To modify the password for entering privileged EXEC mode, use this command. To return to
the default condition, use the no form of this command.

Format
enable password
no enable password

Parameters
N/A

Default conditions
The password for entering privileged EXEC mode is raisecom.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
When you wish to modify the password for entering privileged EXEC mode, you can use this
command.
It supports the password to be null, which means that you press Enter for two successive
times while modifying the password. When you log in to the device again, you can use the
enable command and press Enter to log in to privileged EXEC mode.
Prerequisite
Only after you use the enable command to enter privileged EXEC mode can you modify the
password.
Follow-up procedure
You can use the no enable password command to return the password to the default
configuration.
Precaution

Raisecom Proprietary and Confidential


16
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

The entered password must be a ciphertext password and you have to enter the password
twice with consistent spellings. Otherwise, configurations fail.
The new password takes effect when you enter privileged EXEC mode again.

Examples
This example shows how to modify the password for entering privileged EXEC mode.
Raisecom#enable password
please input password:******
please input password again:******
Set successfully.

Related commands
password

1.2.6 end

Function
To return to privileged EXEC mode, use this command.

Format
end

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN configuration

User level
0

Usage guidelines
Scenario
You can use this command to return to privileged EXEC mode after completing
configurations in a certain command mode.
Prerequisite
N/A

Raisecom Proprietary and Confidential


17
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to return to privileged EXEC mode from physical layer interface
configuration mode.
Raisecom(config-gigaethernet1/1/1)#end
Raisecom#

This example shows how to return to privileged EXEC mode from VLAN configuration
mode.
Raisecom(config-vlan1)#end
Raisecom#

Related commands
exit
quit

1.2.7 exit

Function
To return to the latest configuration mode, use this command.

Format
exit

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
0

Raisecom Proprietary and Confidential


18
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Usage guidelines
Scenario
You can use this command to return to the latest configuration mode after completion of
configurations in a specified configuration mode. This command is similar to the quit
command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you use this command in user EXEC mode or privileged EXEC mode, you will be logged
out.

Examples
This example shows how to return to the latest configuration mode respectively after entering
global configuration mode and physical layer interface configuration mode in a row.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#exit
Raisecom(config)#exit
Raisecom#

Related commands
quit
end

1.2.8 help

Function
To show system help information, use this command.

Format
help

Parameters
N/A

Default conditions
N/A

Raisecom Proprietary and Confidential


19
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Command mode
Any configuration except user EXEC

User level
0

Usage guidelines
Scenario
You can use this command to view descriptions of system help.
Two types of help information are provided by the system software:
When you wish to obtain all parameters and related descriptions of a specified command,
enter this command followed by a space and a "?". For example, by entering "show ?",
all parameters in the show command are listed.
When you wish to obtain all parameters prefixed with certain characters of a specified
command, enter this command followed by related characters and a "?". For example, by
entering "show m?", all parameters starting with "m" in the show command are listed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show system help.
Raisecom#help
Raisecom software provides advanced help. Anytime when you need help,
please press '?' at the command line.

If nothing matches, the help list will be empty. You must backspace
your command until the available options are shown when entering
a '?'.
Two styles of help are provided by Raisecom:
1. Full help is available when entering a command followed by a
space and a '?'. Help of this style show all arguments and their
meanings to you. For example, by entering 'show ?', all arguments
of 'show' command are listed.
2. Partial help is provided when an argument's prefix immediately
followed by a '?' is entered. Help of this style show you all the
command's arguments that match the input prefix. For example, by
entering 'show m?', the arguments begin with 'm' are listed.

Raisecom Proprietary and Confidential


20
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
N/A

1.2.9 history

Function
To show history commands, use this command.

Format
history

Parameters
N/A

Default conditions
The latest 20 history commands can be displayed.

Command mode
Any configuration except user EXEC

User level
0

Usage guidelines
Scenario
You can use this command to show commands used by the current user since login.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show the history commands.
Raisecom#history
logout
enable

Raisecom Proprietary and Confidential


21
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

config
exit

Related commands
N/A

1.2.10 hostname

Function
To configure the device name, use this command. To return to the default configuration, use
the no form of this command.

Format
hostname name
no hostname

Parameters
Parameter Description
name Device name, a string of 1 to 32 characters

Default conditions
The device name is Raisecom.

Command mode
Privileged EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to configure the device name to A.
Raisecom#hostname A
Set successfully.

Related commands
N/A

Raisecom Proprietary and Confidential


22
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.2.11 language

Function
To show descriptions of command lines in English or Chinese, use this command.

Format
language { chinese | english }

Parameters
Parameter Description

chinese Show descriptions of command lines in Chinese.


english Show descriptions of command lines in English.

Default conditions
The CLI is in English.

Command mode
Any command

User level
0

Usage guidelines
Scenario
While using help information, you can use this command to switch the description into
English or Chinese to facilitate users in understanding.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show the description of command lines in Chinese.
Raisecom#language chinese

Raisecom Proprietary and Confidential


23
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

This example shows how to show the description of command lines in English.
Raisecom#language english
Set successfully

Related commands
N/A

1.2.12 list

Function
To show all commands in the current command mode in form of a list, use this command.

Format
list

Parameters
N/A

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
Scenario
While configuring the device, if you are not sure about the command word or format which is
to be input, you can use this command to show all executable commands in the current mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


24
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to show all executable commands in user EXEC mode.
Raisecom>list
The current view mode number:2

visitor(priority:0-4) command:
Num PRI Command
1 0 clear
2 0 enable
3 0 exit
4 0 help
5 0 history
6 0 language (english | chinese)
7 0 list
8 0 quit

monitor(priority:5-10) command:
Num PRI Command
9 5 terminal history <1-20>
10 5 terminal time-out <0-65535>

operator(priority:11-14) command:
Num PRI Command

administrator(priority:15) command:
Num PRI Command

Related commands
N/A

1.2.13 logout

Function
To log out, use this command.

Format
logout

Parameters
N/A

Default conditions
N/A

Command mode
Privileged EXEC

Raisecom Proprietary and Confidential


25
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

User level
0

Usage guidelines
Scenario
You can use this command to log out after completion of configurations.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to log out.
Raisecom#logout
Login:

Related commands
N/A

1.2.14 quit

Function
To return to the latest configuration mode, use this command.

Format
quit

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


26
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

User level
0

Usage guidelines
Scenario
You can use this command to return to the latest command mode after completion of
configurations in certain command mode. It is the same as the exit command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You will log out if you use this command in user EXEC mode and privileged EXEC mode.

Examples
This example shows how to return to the latest configuration mode respectively after entering
global configuration mode and physical layer interface configuration mode in a row.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#quit
Raisecom(config)#quit
Raisecom#

Related commands
exit
end

1.2.15 reboot

Function
To reboot the device, use this command.

Format
reboot [ now ]

Parameters
Parameter Description

now Reboot the device immediately without the verification of users.

Raisecom Proprietary and Confidential


27
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Default conditions
N/A

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use this command to reboot the device.
Prerequisite
N/A
Follow-up procedure
You need to input yes for confirmation if the input command is without now.
Precaution
Use it with caution. Rebooting the device will interrupt services. It is recommended that you
use the write command to save the existing configurations before rebooting the device.

Examples
This example shows how to reboot the device.
Raisecom#reboot
Please input 'yes' to confirm:yes
Rebooting ...

Related commands
N/A

1.2.16 show terminal

Function
To check the login connection of terminal users, use this command.

Format
show terminal

Raisecom Proprietary and Confidential


28
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
N/A

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
N/A

Examples
This example shows how to check the login connection of terminal users.
Raisecom#show terminal
Terminal State Time-out User IP
-------------------------------------------------------------------------
console active 600sec Not Login LOCAL
*telnet-1 active 600sec raisecom 172.16.70.190
telnet-2 inactive - - -
telnet-3 inactive - - -
telnet-4 inactive - - -
telnet-5 inactive - - -
telnet-6 inactive - - -
telnet-7 inactive - - -
telnet-8 inactive - - -
telnet-9 inactive - - -
telnet-10 inactive - - -
ssh-1 inactive - - -
ssh-2 inactive - - -
ssh-3 inactive - - -
ssh-4 inactive - - -
ssh-5 inactive - - -

The following table describes fields in the command output.

Field Description
Terminal Terminal
State State
Time-out Timeout, in units of second
User Login user

Raisecom Proprietary and Confidential


29
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Field Description
IP IP address

Related commands
N/A

1.2.17 show reboot info

Function
To show information about delayed reboot, use this command.

Format
show reboot info

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
After configuring delayed reboot, you can use this command to show information about
delayed reboot and the remaining time of delayed reboot.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


30
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to show information about delayed reboot.
Raisecom#show reboot info
Set time: 100 min
Remain time: 50 min

Related commands
N/A

1.2.18 terminal page-break enable

Function
To enable page-break, use this command. To disable this function, use the disable form of this
command.

Format
terminal page-break { enable | disable }

Parameters
Parameter Description
enable Enable page-break.
disable Disable page-break.

Default conditions
The page-break is enabled.

Command mode
Privileged EXEC

User level
5

Usage guidelines
Scenario
While you are using some commands, there is much echo information which cannot be
displayed on one page, such as the list command. However, after enabling the page-break,
you can press Space to control the echo information check. If the function is disabled, you
can roll to display all information.
Prerequisite

Raisecom Proprietary and Confidential


31
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable page-break.
Raisecom#terminal page-break enable
Set successfully

This example shows how to disable page-break.


Raisecom#terminal page-break disable
Set successfully

Related commands
N/A

1.2.19 terminal history

Function
To configure the number of history commands to be saved in the system, use this command.

Format
terminal history number

Parameters
Parameter Description
number Number of commands, an integer, ranging from 1 to 20

Default conditions
The system will save the latest 20 commands in the buffer memory.

Command mode
Privileged EXEC

User level
5

Raisecom Proprietary and Confidential


32
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Usage guidelines
Scenario
You can use this command to configure the number of history commands to be saved in the
system.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the number of history commands to be saved in the
system to be 10.
Raisecom#terminal history 10
Set successfully.

Related commands
N/A

1.2.20 terminal time-out

Function
To configure the logout waiting time of terminal timeout, use this command.

Format
terminal time-out second

Parameters
Parameter Description
second Logout waiting time of terminal timeout, an integer, ranging from 0 to
6553, in units of second

Default conditions
The logout waiting time of terminal timeout is 600s.

Command mode
Privileged EXEC

Raisecom Proprietary and Confidential


33
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

User level
5

Usage guidelines
Scenario
You can use this command to configure the logout waiting time of terminal timeout. For the
sake of safety, the system terminal will automatically log out if you do not operate on the
system for a long time. But you still need to input your password when you log in next time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure logout waiting time of terminal timeout to 1000s.
Raisecom#terminal time-out 1000
Set successfully.

Related commands
show terminal

1.2.21 write

Function
To write current configurations into the memory of the device, use this command.

Format
write[ backup-config ]

Parameters
Parameter Description

backup-config Save current configurations for backup.

Default conditions
N/A

Raisecom Proprietary and Confidential


34
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
After completion of configurations, you need to save them to the device to override the
original ones. The new configurations can take effect after the device is rebooted. The device,
when rebooted, will continue to execute original configurations if the new configurations are
not saved to it.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Use it with caution. When you use this command, new configurations may override original
ones. And there may be errors in new configurations which may lead to the malfunction of the
device.

Examples
This example shows how to save current configurations.
Raisecom#write
Saving current configuration..
Save current configuration successfully.

Related commands
reboot

1.3 Accessing devices


1.3.1 generate ssh-key

Function
To generate a SSH key pair, use this command.

Format
generate ssh-key [ length ]

Raisecom Proprietary and Confidential


35
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
length Key pair length of the SSH server, an integer, ranging from 512 to 2048, in
units of bit

Default conditions
The key pair length of the SSH server is 512 bits.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
You can use this command to generate SSH key pairs for encrypting communication data
while logging in to the SSH server. The key pairs, after being generated, will be automatically
saved to the Flash of the device. The longer the key pairs are, the safer the server will be.
Correspondently, the longer the generating time is, the lower the authentication efficiency will
be.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
After key pairs are generated, they will occupy the CPU which may cause the outrage of
services. Therefore, we recommend you to generate the length of key pairs according to your
actual need.

Examples
This example shows how to generate key pairs of the SSH server.
Raisecom#config
Raisecom(config)#generate ssh-key
Generate and save rsa key done!

Related commands
show ssh2 { server | session }

Raisecom Proprietary and Confidential


36
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.3.2 show ssh2 public-key

Function
To show the SSH public key, use this command.

Format
show ssh2 public-key [ authentication ]

Parameters
Parameter Description

authentication Show the SSH public key.


Show the public key of the SSH server and the host if the parameter
is not configured.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the SSH public key.
Raisecom#show ssh2 public-key authentication
RSA public key :---- BEGIN SSH2 PUBLIC KEY ----
Comment: "rsa-key"
AAAAB3NzaC1yc2EAAAADAQABAAAAgnstYB4ratus5c5RcHu/2/Avc0bkeYv4
fjUM9s9oyMyoOvnrKH2FJl/Z/whG214SN0GQacYRkoZukQ8WeFCMdbu1rbJQ
SAQG7F9NA8ql7ipcIMUXP96sjXjML9hYVwJ2tJyfxihHF8MkF0ewT+r8pfJW
/yruqWKgwBWTqrE/gWHLaqE=
Fingerprint: md5 70:16:00:30:08:e3:80:40:1f:a2:ee:41:a3:69:ec:91
---- END SSH2 PUBLIC KEY ----

Related commands
N/A

Raisecom Proprietary and Confidential


37
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.3.3 show ssh2 { server | session }

Function
To show configurations and sessions of the SSH server, use this command.

Format
show ssh2 { server | session }

Parameters
Parameter Description

server Show configurations of the SSH server.


session Show sessions of the SSH server.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of the SSH server.
Raisecom#show ssh2 server
SSH server information:
---------------------------------------------------------------------
State: Enable
Version: ssh-2
Authentication method(default:local user-password ): local user-password
Authentication timeout(default 600): 600s
Authentication retries(default 20): 20
Max client count(default 5): 5
Current client count: 0
Current channel count: 0
Listen port on (default 22): 22

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


38
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Field Description
State Enabled state of the SSH
Version SSH version
Authentication method(default:local Authentication mode (default: local user
user-password ) password
Authentication timeout(default 600) Authentication timeout (600s by default)
Authentication retries(default 20) Number of authentication retries (20 times by
default)
Max client count(default 5) Maximum number of clients (5 by default)
Current client count Current number of clients
Current channel count Current number of Channels
Listen port on (default 22) Listening port number (22 by default)

This example shows how to show SSH sessions.


Raisecom#show ssh2 session
ID Ver Cipher(IN/OUT) Auth-Type Con-Time State
UserId Ip
-------------------------------------------------------------------------
--------------------------
1 -- --/-- -- -- Closed -- --
2 -- --/-- -- -- Closed -- --
3 -- --/-- -- -- Closed -- --
4 -- --/-- -- -- Closed -- --
5 -- --/-- -- -- Closed --

The following table describes fields in the command output.

Field Description
ID ID
Ver SSH version
Cipher(IN/OUT) Encryption (in/out)
Con-Time Period for establishing connections
State SSH connection status
UserId User name
Ip IP address of SSH Clients

Related commands
N/A

Raisecom Proprietary and Confidential


39
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.3.4 show telnet-server

Function
To show configurations of Telnet Server, use this command.

Format
show telnet-server

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to show configurations of Telnet Server.
Raisecom#show telnet-server
Accept port-list: gigaethernet1/1/1
gigaethernet1/1/2 gigaethernet1/1/3
gigaethernet1/1/4 gigaethernet1/1/5 gigaethernet1/1/6
gigaethernet1/1/7 gigaethernet1/1/8 gigaethernet1/1/9
gigaethernet1/1/10 gigaethernet1/1/11 gigaethernet1/1/12
gigaethernet1/1/13 gigaethernet1/1/14 gigaethernet1/1/15
gigaethernet1/1/16 gigaethernet1/1/17 gigaethernet1/1/18
gigaethernet1/1/19 gigaethernet1/1/20 gigaethernet1/1/21
gigaethernet1/1/22 gigaethernet1/1/23 gigaethernet1/1/24
gigaethernet1/1/25 gigaethernet1/1/26 gigaethernet1/1/27
gigaethernet1/1/28
Using session-list: --

The following table describes fields in the command output.

Field Description
Accept port-list SSHv2 session lists allowed

Raisecom Proprietary and Confidential


40
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Field Description
Using session-list Session lists in use

Related commands
N/A

1.3.5 show user

Function
To show user information of the device, use this command.

Format
show user { active | table }

Parameters
Parameter Description
active Show information about login users.
table Show user information lists.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
15

Usage guidelines
N/A

Examples
This example shows how to show information about login users.
Raisecom#show user active
Username : raisecom
Priority : 15
Server IP : --
Terminal IP : 0.0.0.0
Login Type : telnet-1

Raisecom Proprietary and Confidential


41
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Login Time : 2106-02-06,21:09:39


Current Login : Y

The following table describes fields in the command output.

Field Description
Username User name
Priority User priority, with the value ranging from 0 to 15
The bigger the value is, the higher the level is, the higher the
privileges will be, and the more the commands which can be used.
Server IP Server IP address
Terminal IP Terminal IP address
Login Type Login modes
telnet
console
SSH2

Login Time Login time


Current Login Current login status

This example shows how to show user information lists.


Raisecom#show user table
Username Priority Server
--------------------------------------------
raisecom 15 Local
raisecom2 15 Local
raisecom3 7 Local

The following table describes fields in the command output.

Field Description
Username User name
Priority User priority, with the value ranging from 0 to 15
The bigger the value is, the higher the level is, the higher the privileges will
be, and the more the commands which can be used.
Server Login authentication modes
Local: login by the password and user name saved in the local server.
Radius: login by the password and user name saved in the RADIUS server.
Tacacs: login by the password and user name saved in the TACACS+

server.

Related commands
user name
user { allow-exec | disallow-exec }

Raisecom Proprietary and Confidential


42
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.3.6 ssh2 server

Function
To enable the SSHv2 server, use this command. To disable this function, use the no form of
this command.

Format
ssh2 server
no ssh2 server

Parameters
N/A

Default conditions
SSH server is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The SSHv2 is a network security protocol which can protect the network security by
encrypting network data. It can provide safe remote login and other safe services in an unsafe
network environment.
Users need to enable the SSHv2 server function before configuring the SSHv2
Prerequisite
The local SSHv2 key pair is generated through the generate ssh-key command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable the SSH server.
Raisecom#config

Raisecom Proprietary and Confidential


43
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Raisecom(config)#ssh2 server
Set successfully.

Related commands
show ssh2 { server | session }

1.3.7 ssh2 server authentication { password | rsa-key }

Function
To configure the SSHv2 authentication mode, use this command.

Format
ssh2 server authentication { password | rsa-key }

Parameters
Parameter Description
password Use local user name and password to authenticate SSH Clients.
rsa-key Use "host key pairs + local user name and password" to authenticate
SSH Clients.

Default conditions
The device uses local user name and password to authenticate SSH Clients.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
When the device works in password authentication mode, it will authenticate clients by
the user name and password specified through the user command.
When the device works in rsa-key authentication mode, it will authenticate clients by the
user name and password specified through the user command and the secret key.
Prerequisite
When the device is in rsa-key authentication mode, it needs to generate host public key
through terminal emulator. You need to use the ssh2 server authentication public-key
command to record the host public key to the device.
Follow-up procedure

Raisecom Proprietary and Confidential


44
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

N/A
Precaution
N/A

Examples
This example shows how to configure the login authentication mode of SSH users to rsa-key.
Raisecom#config
Raisecom(config)#ssh2 server authentication rsa-key
Set successfully.

Related commands
show ssh2 { server | session }

1.3.8 ssh2 server authentication public-key

Function
To save the host public key of SSHv2 client for logging in to authentication key to the device
when the rsa-key authentication mode is in use, use this command.

Format
ssh2 server authentication public-key-name public-key [ public key ]

Parameters
Parameter Description
public-key-name Public key name
public key Public key contents

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


45
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

When the device works in rsa-key authentication mode, you need to record the public key of
Client to the device. The Client sends packets which are encrypted with private keys of the
host to the device. After the device receives the packets, it will use the public key to decrypt
them. If the packets are successfully decrypted, the Client will pass the authentication.
Otherwise, it fails the authentication.
Prerequisite
You need to generate the key pairs (including host public key and private key) for login
authentication at the SSH Clients and save the host private key in the SSH Clients.
Follow-up procedure
You need to open the public key generated at the SSH Client (with "pub" as the suffix) and
copy the public key to the terminal emulation program. You can save the public key by
"Ctrl+S" and cancel the current input by "Ctrl+Z".
Precaution
N/A

Examples
This example shows how to save the host public key A1 of SSH Client login key to the device.
Raisecom#config
Raisecom(config)#ssh2 server authentication A1 public-key

(Ctrl+s) for save input and return


(Ctrl+z) for discard input and return.
-------------------------------------------------------------
AAAAB3NzaC1yc2EAAAADAQABAAAAgQDIFrA7cM3nHtUZlC0jw6eFZRAuM10BWxvN
L1jgVd62jWk8NJ5WwJvI1sNua63UVDQpPGfnNxPbCabzpKfWiQw65JKlJj4OXu3c
bdupH5hDyK0cRyBDgcW4ThRBl3+dHW+hiYUwz90sGh7ng8LSdyQlr8MuJcpFBB89
a02Exw5cnw==
Raisecom(config)#

Related commands
show ssh2 public-key

1.3.9 ssh2 server authentication-retries

Function
To configure the number of failures allowed in the SSHv2 authentication, use this command.
To return to the default condition, use the no form of this command.

Format
ssh2 server authentication-retries counts
no ssh2 server authentication-retries

Raisecom Proprietary and Confidential


46
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
counts Number of failures allowed in SSH authentication, an integer, ranging
from 1 to 100

Default conditions
The number of failures allowed in the SSH authentication is 20.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
To defend the authentication exhaustion attacks from the SSH Clients, the device refuses to
continue the authentication and disconnects with the Client when the number of failures
exceeds the threshold.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the number of failures in the SSH authentication to 3.
Raisecom#config
Raisecom(config)#ssh2 server authentication-retries 3
Set successfully.

Related commands
show ssh2 { server | session }

Raisecom Proprietary and Confidential


47
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.3.10 ssh2 server authentication-timeout

Function
To configure SSH authentication timeout, use this command. To return to the default
condition, use the no form of this command.

Format
ssh2 server authentication-timeout second
no ssh2 server authentication-timeout

Parameters
Parameter Description
second SSH authentication timeout, an integer, ranging from 100 to 65535, in
units of second

Default conditions
The SSH authentication timeout is 600s.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
To defend the authentication exhaustion attacks from the SSH Clients, the device refuses to
continue the authentication and disconnect with the client when the authentication timeout
exceeds this threshold.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the SSH authentication timeout to 300s.

Raisecom Proprietary and Confidential


48
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Raisecom#config
Raisecom(config)#ssh2 server authentication-timeout 300
Set successfully.

Related commands
show ssh2 { server | session }

1.3.11 ssh2 server port

Function
To configure the listening port number, use this command. To return to the default condition,
use the no form of this command.

Format
ssh2 server port port-id
no ssh2 server port

Parameters
Parameter Description
port-id SSH listening port number, an integer, ranging from 1 to 65535

Default conditions
The SSH listening port number is 22.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
To avoid conflicts with port numbers of other protocols, users can use the SSH listening port
number specified by the command. After configuring the SSH listening port number, the
device will monitor the SSH packets based on the port number specified by the user.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


49
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Precaution
When you are configuring the SSH listening port number, the parameters you input will not
come into effect until the reboot of the SSH server.
It is recommended that the SSH listening port should not be the famous ones to avoid
affecting other services.

Examples
This example shows how to configure the listening port number of the SSH server to 2000.
Raisecom#config
Raisecom(config)#ssh2 server port 2000
Set successfully.

Related commands
show ssh2 { server | session }

1.3.12 ssh access-list

Function
To configure the SSH ACL number, use this command. To return to the default condition, use
the no form of this command.

Format
ssh access-list { ip access-list number | ipv6 access-list number }
no ssh access-list

Parameters
Parameter Description
ip access-list IPv4 standard ACL number, an integer, ranging from 1000 to 1999
number
ipv6 access-list IPv6 ACL number, an integer, ranging from 6000 to 6999
number

Default conditions
The listening port number is 22.

Command mode
Global configuration

User level
15

Raisecom Proprietary and Confidential


50
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Usage guidelines
Scenario
You can use this command to configure the IPv4 or IPv6 ACL number.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the SSH ACL number to 1200.
Raisecom#config
Raisecom(config)#ssh access-lis
t 1200
Set successfully.

Related commands
show ssh2 { server | session }

1.3.13 ssh2 server close session

Function
To disable the specified SSH2 session, use this command.

Format
ssh2 server close session session-number

Parameters
Parameter Description
session-number SSH2 session ID, an integer, ranging from 1 to 10

Default conditions
N/A

Command mode
Global configuration

Raisecom Proprietary and Confidential


51
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

User level
11

Usage guidelines
Scenario
You can use this command to disconnect the SSH2 server with the client of corresponding
session number. Then the client of the corresponding session number will not interact with
SSH2 server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure to disconnect the specified SSH2 session 1.
Raisecom#config
Raisecom(config)#ssh2 server close session 1
Set successfully.

Related commands
show ssh2 session

1.3.14 ssh2 server max-session

Function
To configure the maximum number of SSH2 sessions, use this command.

Format
ssh2 server max-session session-number

Parameters
Parameter Description
session-number Maximum number of sessions, an integer, ranging from 0 to 10

Default conditions
N/A

Raisecom Proprietary and Confidential


52
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the maximum SSH2 sessions which can be
established by the server. When the number of actual sessions reaches to the maximum, new
sessions cannot be established.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the maximum number of SSH2 sessions supported by
the device to 5.
Raisecom#config
Raisecom(config)#ssh2 server max-session 5
Set successfully.

Related commands
show ssh2 server

1.3.15 ssh2 server version

Function
To configure the version of SSH2, use this command.

Format
ssh2 server version { both | v1 | v2 }

Raisecom Proprietary and Confidential


53
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
both Support V1 and V2.
v1 Support V1.
v2 Support V2.

Default conditions
The device supports SSH2 V1 and V2.

Command mode
Global configuration

User level
15

Usage guidelines
N/A

Examples
This example shows how to configure the version of SSH2 as V2.
Raisecom#config
Raisecom(config)#ssh2 server version v2
Set successfully.

Related commands
N/A

1.3.16 telnet

Function
To configure this device as Telnet Client to remotely log in to other devices, use this
command.

Format
telnet ip-address [ port port-id ]

Raisecom Proprietary and Confidential


54
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
ip-address IP address of the remote destination device, in dotted decimal notation,
such as 10.10.1.1
port TCP port number
port-id TCP port number corresponding to Telnet service which is provided by the
remote destination device, an integer, ranging from 1 to 65535

Default conditions
N/A

Command mode
Privileged EXEC

User level
11

Usage guidelines
Scenario
Telnet involves in two types: the Telnet Client and the Telnet Server.
Telnet Client: it means that you can use the device as a Client. The user can establish a
connection with the device through the terminal emulation program or Telnet Client on the PC
and then use this command to remotely log in to other devices to implement management and
control.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You need to configure route reachable between local and remote devices if they are in
different network segments.

Examples
This example shows how to remotely log in to the device with the IP address of 10.0.0.1.
Raisecom#telnet 10.0.0.1

Related commands
N/A

Raisecom Proprietary and Confidential


55
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.3.17 telnet-server accept

Function
To configure interfaces to support Telnet, use this command. To disable this function, use the
no form of this command.

Format
telnet-server accept interface-type interface-number
no telnet-server accept interface-type interface-number

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
All interfaces support Telnet.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure an interface to the one through which the client is
allowed to communicate with the Telnet server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


56
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to configure interfaces that support Telnet as 1000 Mbit/s interface
1/1/1 to 1000 Mbit/s interface 1/1/3.
Raisecom#config
Raisecom(config)#telnet-server accept gigaethernet 1/1/1-3
Set successfully.

Related commands
show telnet-server

1.3.18 telnet-server accept port

Function
To configure interfaces that support Telnet, use this command. To disable this function, use
the no form of this command.

Format
telnet-server accept interface-type interface-number
no telnet-server accept interface-type interface-number

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure an interface through which the customer can
communicate with the Telnet server.

Raisecom Proprietary and Confidential


57
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The number of Telnet sessions must be within the maximum value; otherwise, new sessions
cannot be established.

Examples
This example shows how to configure interface 1/1/1 to support Telnet.
Raisecom#config
Raisecom(config)#telnet-server accept gigaethernet 1/1/1
Set successfully.

Related commands
show telnet-server

1.3.19 telnet-server close terminal-telnet

Function
To disconnect the specified Telnet connections, use this command.

Format
telnet-server close terminal-telnet session-number

Parameters
Parameter Description
session-number Session number, an integer, ranging from 1 to 5

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


58
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Usage guidelines
Scenario
You can use this command to disconnect the Telnet connection of the corresponding session
number in global configuration, and then the user of the corresponding number cannot keep
communicating with the Telnet server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure to disconnect specified Telnet connections.
Raisecom#config
Raisecom(config)#telnet-server close terminal-telnet 1
Set successfully.

Related commands
show telnet-server

1.3.20 telnet-server max-session

Function
To configure the maximum number of Telnet connections, use this command.

Format
telnet-server max-session session-number

Parameters
Parameter Description
session-number Maximum number of connections, an integer, ranging from 0 to 10

Default conditions
The maximum number of Telnet connections supported by the device is 10.

Command mode
Global configuration

Raisecom Proprietary and Confidential


59
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the maximum number of Telnet connections. If the
number of actual connections to be established exceeds this ceiling, new Telnet connections
will not be established.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the maximum number of Telnet connections supported
by the device to be 4.
Raisecom#config
Raisecom(config)#telnet-server max-session 4
Set successfully.

Related commands
show telnet server

1.3.21 user { allow-exec | disallow-exec }

Function
To configure rules for users to execute commands of different priorities, use this command.
To disable this function, use the no form of this command.

Format
user user-name { allow-exec | disallow-exec } first-keyword [ second-keyword ]
no user user-name { allow-exec | disallow-exec } first-keyword [ second-keyword ]

Parameters
Parameter Description
user-name User name, a string of 1 to 16 characters

Raisecom Proprietary and Confidential


60
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameter Description
allow-exec Allow users to execute commands with priorities higher than theirs.
disallow-exec Disallow users execute commands with priorities lower than theirs.
first-keyword First keyword of the command
second-keyword Second keyword of the command

Default conditions
N/A

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
Generally, users are not allowed to execute commands with priorities superior to their own.
They are only allowed to execute commands with same priority or lower priority. However,
using this command can break the limits. Users are allowed to execute some commands with
priorities higher than theirs and are forbidden to execute some commands with priorities
lower than theirs.
Prerequisite
Specified users are created through the user name command.
Follow-up procedure
N/A
Precaution
This command cannot be applied to administrators with privilege 15. Otherwise,
configurations fail.
Specified users must exist, otherwise, configurations fail.

Examples
This example shows how to allow raisecom1 to execute commands with priorities higher than
its own and the first keyword of write.
Raisecom#user raisecom1 allow-exec write
Set successfully

This example shows how to forbid raisecom1 to execute commands with priorities lower than
its own and the first keyword of show.

Raisecom Proprietary and Confidential


61
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Raisecom#user raisecom1 disallow-exec show


Set successfully

This example shows how to disable the above mentioned rules.


Raisecom#no user raisecom1 disallow-exec show
Set successfully

Related commands
show user

1.3.22 user name

Function
To add users, configure the initial login password for new users or modify users' privilege, use
this command. To delete users, use the no form of this command.

Format
user name user-name password password
user name user-name privilege privilege
no username user-name

Parameters
Parameter Description
user-name User name, a string of 1 to 16 characters
password password Login password, a string of 1 to 16 characters
privilege privilege User privilege, an integer, ranging from 1 to 15

Default conditions
The privilege of new users is 15.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use the user name username password password command to add new users and
configure the initial login password. The privilege of users is the default value.

Raisecom Proprietary and Confidential


62
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

When you need to modify the privilege, you can use the user name username privilege
privilege command.
Prerequisite
N/A
Follow-up procedure
You can use the password command to modify the login password.
Precaution
Reserve at least one user with privilege 15 among device users. Only users with privilege 15
can use this command.
Users cannot modify the privilege of users in login status.

Examples
This example shows how to add a new user with the name of raisecom1 and login password
of Raisecom1.
Raisecom#user name raisecom1 password raisecom1
Set successfully

This example shows how to modify the privilege of the user with the name of raisecom1 to 1.
Raisecom#user name raisecom1 privilege 1
Set successfully

This example shows how to delete the user with the name of raisecom1.
Raisecom#no username raisecom1
Set successfully

Related commands
show user

1.3.23 user login

Function
To configure the user login authentication mode, use this command.

Format
user login { local-radius | local-user | radius-local | radius-user | local-tacacs | tacacs-local
| tacacs-user }

Parameters
Parameter Description
local-radius When local authentication coexist with RADIUS authentication, use
local authentication in preference to RADIUS.

Raisecom Proprietary and Confidential


63
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameter Description
local-user Use local authentication.
radius-local When local authentication coexist with RADIUS authentication
concurrently, use RADIUS authentication in preference to local
authentication.
radius-user Use RADIUS authentication.
local-tacacs When local authentication coexist with TACACS+ authentication, use
local authentication in preference to TACACS+ authentication.
tacacs-local When local authentication coexist with TACACS+ authentication, use
TACACS+ authentication in preference to local authentication.
tacacs-user Use TACACS+ authentication.

Default conditions
The user login mode is local-user.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
Only after being authenticated and authorized can users log in to the network and have the
right to access the network, and obtain network resources. All these authentications and
authorizations will be saved in the remote RADIUS server, remote TACACS server, and
Network Access Server (NAS), namely, local device. You can use this command to configure
the authentication mode for user login.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The newly configured login mode will take effect next time.
While using Radius and Tacas+ servers, make sure that the device and the server are well
connected and the login information is already saved in the server. Otherwise, users cannot
log in to the device.

Raisecom Proprietary and Confidential


64
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to configure user login mode as local-radius.
Raisecom#user login local-radius
Set User Login Method successfully.

Related commands
enable login

1.3.24 user login server-no-response

Function
To configure user login mode, use this command.

Format
user login { radius-local | tacacs-local } server-no-response

Parameters
Parameter Description
radius-local When local authentication coexist with RADIUS authentication
concurrently, use RADIUS authentication in preference to local
authentication.
tacacs-local When local authentication coexist with TACACS+ authentication, use
TACACS+ authentication in preference to local authentication.

Default conditions
N/A

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use this command to configure user login authentication mode when there is no
response from the remote server. Only when no response is received from the remote server
can the authentication mode be switched to Local.
Prerequisite

Raisecom Proprietary and Confidential


65
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

N/A
Follow-up procedure
N/A
Precaution
The newly configured authentication mode will take effect next time.

Examples
This example shows how to configure the user login authentication mode as RADIUS.
Raisecom#user login radius-local server-no-response
Set User Login Method successfully.

Related commands
N/A

1.3.25 user service-type

Function
To configure service type of users, use this command. To disable this function, use the no
form of this command.

Format
user user-name service-type { lan-access | ssh | telnet | web | console | all }
no user user-name service-type { lan-access | ssh | telnet | web | console | all }

Parameters
Parameter Description
user-name User name, a string of 1 to 16 characters
lan-access LAN access
ssh SSH session
telnet Telnet session
web Web connection
console Console connection
all All service types

Default conditions
The service type of the newly added local user is "--" and the service type of the default user
raisecom is all.

Raisecom Proprietary and Confidential


66
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You have to configure the service type for newly added local users. Only when users support
the service can they be authenticated.
Prerequisite
Specified users are created through the user name command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the service type of user raisecom1 as telnet.
Raisecom#user raisecom1 service-type telnet
Set successfully.

Related commands
user name
show user

1.4 File management


1.4.1 erase

Function
To delete specified files saved in the device, use this command.

Format
erase [ file-name ]

Raisecom Proprietary and Confidential


67
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
file-name File name
If you do not configure the parameter, the startup_config.conf will be
deleted by default.

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Usage guidelines
Scenario
You can use this command to delete specified files saved in the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Use it with caution. The device may not work normally and service may be interrupted if you
delete files.

Examples
This example shows how to delete the files with the name of text in the device.
Raisecom#erase text
Erase file successfully.

Related commands
N/A

1.4.2 dir

Function
To show information about files saved in the Flash of the device, use this command.

Raisecom Proprietary and Confidential


68
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Format
dir

Parameters
N/A

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show the name, size, and creation time of system files saved in
the system.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show information about files saved in the Flash of the device.
Raisecom#dir
TYPE SIZE(B) FILENAME
--------------------------------------
file 1618 startup_config.conf
file 2155 syslog.txt
file 5824 alarmClearedFile.b
file 796 trace.txt
file 200 alarmActiveFile.b

Related commands
N/A

Raisecom Proprietary and Confidential


69
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.4.3 show running-config

Function
To show the current configurations of the system, use this command.

Format
show running-config

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show system configurations.
Raisecom#show running-config
System current configuration:
!command in view_mode
!command in config_mode first-step
ip routing
!command in aclmap_mode
!command in enable_mode
watchdog disable
!command in service_mode
!command in evc mode
!command in aggregation_mode
!command in port_mode
interface gigaethernet 1/1/1
oam active
!command in vlan configuration mode
!command in dhcp-pool mode
!command in dhcp6-pool mode
!command in ip interface mode
interface ip 0

Raisecom Proprietary and Confidential


70
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

ip vlan 100
ip address 1.1.1.1 255.0.0.0
!command in loopback interface mode
!command in traffic policer mode
!command in cmap_mode
!command in pmap_mode
!command in pmap_vlan_mode
!command in pmap_cos_mode
!command in keychain_mode
!command in qos mapping mode
mls qos mapping cos-remark 1
!command in wred mode
!command in tdm port mode
!command in config_mode
management-port ip address 192.168.27.93 255.255.255.0
sla private-tlv enable
!command in clkmgmt_mode
!command in cespw mode

Related commands
N/A

1.4.4 show startup-config

Function
To show configurations about system startup, use this command.

Format
show startup-config

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Raisecom Proprietary and Confidential


71
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to show configurations about system startup.
Raisecom#show startup-config
Current start up configuration :
!Software Version 2.0.03.20130124
!command in view_mode
!command in config_mode first-step
ip routing
mpls-tp cfm md-level enable
!command in aclmap_mode
!command in enable_mode
watchdog disable
!command in service_mode
!command in vlan_group_mode
!command in evc mode
!command in aggregation_mode
!command in port_mode
interface gigaethernet 1/1/1
oam active
oam enable
!command in vlan configuration mode
!command in dhcp-pool mode
!command in dhcp6-pool mode
!command in ip interface mode
interface ip 0
ip vlan 100
ip address 1.1.1.1 255.0.0.0
!command in loopback interface mode
!command in traffic policer mode
!command in cmap_mode
!command in pmap_mode
!command in pmap_vlan_mode
!command in pmap_cos_mode
!command in keychain_mode
!command in qos mapping mode
mls qos mapping cos-remark 1
!command in wred mode
!command in tdm port mode
!command in config_mode
management-port ip address 192.168.27.93 255.255.255.0
sla private-tlv enable
alarm inverse tdm 1/4,6 auto
alarm inverse tdm 2/1,3,5 auto
alarm inverse tdm 1/2-3,7-8 manual
alarm inverse tdm 2/2,4,6-7 manual
!command in clkmgmt_mode
!command in cespw mode
!NEVER change the NOTATION
!end

Related commands
N/A

Raisecom Proprietary and Confidential


72
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.4.5 show multisystem

Function
To show information about system startup files, use this command.

Format
show multisystem

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the current startup files.
Raisecom#show multisystem
Priority Name Version Size
----------------------------------------------------------
1* system1.z SYSTEM_3.00.22 16439440
2 system2.z SYSTEM_3.00.22 1643944

Related commands
N/A

1.4.6 boot sequence

Function
To configure the boot sequence for system files, use this command.

Raisecom Proprietary and Confidential


73
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Format
boot sequence

Parameters
N/A

Default conditions
N/A

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use this command to configure boot files.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure booting system1.z first among all the boot files.
Raisecom#boot sequence
Please select the system file which boot priority is 1:
1*system1.z 1.1.1
Please input <1-1>:1

Set successfully.

Related commands
N/A

Raisecom Proprietary and Confidential


74
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.4.7 copy

Function
To copy configuration files, use this command.

Format
copy { backup-config startup-config | startup-config {backup-config| running-config } }

Parameters
Parameter Description

startup-config System master configuration file.


backup-config System backup configuration file
running-config Current running configuration file

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Usage guidelines
Scenario
You can use the command to copy between master configuration file and backup
configuration file.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to copy the backup configuration to the master configuration file.
Raisecom#copy backup-config startup-config

Raisecom Proprietary and Confidential


75
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Operation successfully.

Related commands
N/A

1.5 Backup and upgrade


1.5.1 download

Function
To download system files from the server or upgrade other relevant files to the device, use
this command.

Format
download system-boot { ftp ip-address user-name password file-name | tftp ip-address file-
name } { system1.z | system2.z }
download { bootstrap | file | license | dhcplease | patch | startup-config | backup-config }
tftp ip-address file-name [ dir ]
download { bootstrap | file | license | dhcplease | patch | startup-config | backup-config }
ftp ip-address user-name password file-name [ dir ]

Parameters
Parameter Description
bootstrap Download bootstrap files.
file Download files.
license Download License files.
dhcplease Download DHCP leases files.
patch Download patch files.
system-boot Download system files.
startup-config Download the loading master configuration file during system startup.
backup-config Download the loading backup configuration file during system startup.
tftp Download files using TFTP.
ftp Download files using FTP.
ip-address IP address of the server
user-name User name of the FTP server
password Password of the FTP server

Raisecom Proprietary and Confidential


76
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameter Description
file-name Downloaded file name
dir Path of files

Default conditions
N/A

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use this command to download the relevant files to the device while the system is
being upgraded.
Prerequisite
The FTP or TFTP server should be pre-configured.
The FTP or TFTP server should be well connected to the device through network.
Follow-up procedure
N/A
Precaution
Use it with caution. The outage of the device and interruption of services may occur if you
download new system softwares. It is recommended that you should back up the original files
through the upload command before downloading new files.

Examples
This example shows how to download configuration files from the TFTP server with the IP
address of 10.0.0.1 by TFTP during system startup.
Raisecom#download startup-config tftp 10.0.0.1 config
Waiting...Start
Downloading 1K
Success

Related commands
show multi-system
show version

Raisecom Proprietary and Confidential


77
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.5.2 show version

Function
To show the version of the system, use this command.

Format
show version

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the version of the system.
Raisecom#show version
Product Version: ISCOM2600-4GF P200R003C00
Software Version: 5.2.1_20131112
RITP Version: 5.2
Bootstrap Version: BOOTSTRAP_5.1.4_20130822
FPGA Version: FPGA_ra.23.59.1.9.0.20131104
Hardware Version: 1.4

System MacAddress: 000E.5E45.4545


Serial number: 123
ISCOM2600-4GF with
128 M bytes DRAM
32 M bytes Flash Memory

System uptime is 0 days, 0 hours, 10 minutes

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


78
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Field Description
Product Version Product version
Software Vesion Software version
Bootstrap Version System bootstrap version
FPGA Version FPGA version
Hardware Version Hardware version
System MacAddress System MAC address
Serial number Serial number
DRAM System memory capacity
Flash Memory Flash memory capacity

Related commands
N/A

1.5.3 upload

Function
To upload files to the backup server, use this command.

Format
upload system-boot { ftp ip-address user-name password file-name | tftp ip-address file-
name } { system1.z | system2.z }
upload { bootstrap | logging-file | license | dhcplease | paf | command-log | patch |
startup-config | backup-config } tftp ip-address file-name [ dir ]
upload { bootstrap | logging-file | license | dhcplease | paf | command-log | patch |
startup-config | backup-config } ftp ip-address user-name password file-name [ dir ]

Parameters
Parameter Description
bootstrap Upload bootstrap files.
logging-file Upload login files.
license Upload License files.
dhcplease Upload DHCP leases files.
paf Upload paf files.
system-boot Upload system files.
startup-config Upload master configuration files during system startup.

Raisecom Proprietary and Confidential


79
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameter Description
backup-config Upload backup configuration files during system startup.
tftp Upload files by TFTP.
ftp Upload files by FTP.
ip-address IP address of the server
user-name User name of the FTP server
password Password of the FTP server
file-name The name of the downloaded files
dir File path

Default conditions
N/A

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
To back up system files, you can use this command to upload relevant files to the backup
server.
Prerequisite
You need to pre-configure the FTP server or TFTP server and ensure that the connection
between the server and the device is normal.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to upload the system start-up configuration file to the TFTP server
with the IP address of 10.0.0.1.
Raisecom#upload startup-config tftp 10.0.0.1 config
Waiting...Start
Uploading 1K/1K

Raisecom Proprietary and Confidential


80
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Success

Related commands
N/A

1.6 Automatically updating versions and configurations


1.6.1 clear buffer_config

Function
To clear the configuration files in the buffer, use this command.

Format
clear buffer_config

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
You can use this command to clear the configuration files in the buffer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


81
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to clear the configuration files in the buffer.
Raisecom#config
Raisecom(config)#clear buffer_config
Set successfully.

Related commands
show buffer_config

1.6.2 auto_config enable

Function
To enable automatically updating versions and configurations, use this command. To disable
this function, use the disable form of this command.

Format
auto_config { enable | disable }

Parameters
Parameters Description
enable Enable automatically updating versions and configurations
disable Disable automatically updating versions and configurations

Default conditions
Enabled

Command mode
VLAN interface configuration

User level
15

Usage guidelines
Scenario
You can use this command to start the process of DHCP Client applying for an IP address,
system software upgrade, automatic update of configurations.
Prerequisite
You need to pre-configure the FTP server or TFTP server and ensure that the connection
between the server and the device is normal before downloading.

Raisecom Proprietary and Confidential


82
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Follow-up procedure
N/A
Precaution
Use it with caution. The outage of the device and interruption of services may occur if you
download new system softwares. We recommend you backing up the original files through
the upload command before downloading new files.

Examples
This example shows how to disable automatically updating versions and configurations.
Raisecom#config
Raisecom(config)#vlan 1
Raisecom(config-vlan1)#auto_config disable
Set successfully.

Related commands
show auto-config

1.6.3 auto_save enable

Function
To enable automatically saving the configuration, use this command. To disable this function,
use the disable form of this command.

Format
auto_save { enable | disable }

Parameters
Parameters Description
enable Enable automatically updating versions and configurations
disable Disable automatically updating versions and configurations

Default conditions
Disabled

Command mode
Global configuration

User level
15

Raisecom Proprietary and Confidential


83
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Usage guidelines
Scenario
You can obtain the IP address of the TFTP server through DHCP and load configuration files
which will be automatically saved after being loaded.
Prerequisite
You need to pre-configure the FTP server or TFTP server and ensure that the connection
between the server and the device is normal.
Follow-up procedure
N/A
Precaution
Use it with caution. The outage of the device and interruption of services may occur if you
download new system softwares. We recommend you backing up the original files through
the upload command before downloading new files.

Examples
This example shows how to enable automatically saving the configuration.
Raisecom#config
Raisecom(config)#auto_save enable
Set successfully.

Related commands
show auto-config

1.6.4 auto_load time

Function
To enable successfully load configuration files and configure auto-save time, use this
command.To disable this function, use the no form of this command.

Format
auto_load time hour minute second
no auto_load time hour minute second

Parameters
Parameters Description
hour Hour, an integer, ranging from 0 to 23
minute Minute, an integer, ranging from 0 to 59
second Second, an integer, ranging from 0 to 59

Raisecom Proprietary and Confidential


84
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Default conditions
Current configurations are saved upon the configuration files are successfully loaded.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
You can obtain the IP address of the TFTP server through DHCP and load configuration files
which will be automatically saved after being loaded.
Prerequisite
You need to pre-configure the FTP server or TFTP server and ensure that the connection
between the server and the device is normal.
Follow-up procedure
N/A
Precaution
Use it with caution. The outage of the device and interruption of services may occur if you
download new system softwares. It is recommended that you should back up the original files
through the upload command before downloading new files.

Example
This example shows how to configure the auto-save time to 3 hours, 15 minutes, and 20
seconds.
Raisecom#config
Raisecom(config)#auto_load time 3 15 20
Set successfully.

Related commands
show auto-config

1.6.5 show auto_config

Function
To show information about versions and configurations updated automatically, use this
command.

Raisecom Proprietary and Confidential


85
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Format
show auto_config

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
15

Usage guidelines
Scenario
You can use this command to show information about versions and configurations updated
automatically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show information about versions and configurations updated
automatically.
Raisecom#show auto_config
Index 0 Auto config:disable
Auto save:enable
Config-saving time:0:0:0
System update state :Idle
Config update state:Idle
System upgrade result:successful
Cfg update result:successful
System file name:
Configuration file name:

Raisecom Proprietary and Confidential


86
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
auto_config enable

1.6.6 show buffer_config

Function
To show the configuration files in the buffer, use this command.

Format
show buffer_config

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
15

Usage guidelines
Scenario
You can use this command to show the the configuration files in the buffer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show the configuration files in the buffer.
Raisecom#show buffer_config
Configuration file name:
Configuration: (null

Raisecom Proprietary and Confidential


87
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
clear buffer_config

1.7 Interface management


1.7.1 description

Function
To configure description of the interface, use this command. To disable this function, use the
no form of this command.

Format
description string
no description

Parameters
Parameter Description
string Description, a string of 1 to 64 characters

Default conditions
The interface is not configured with description information.

Command mode
Physical interface configuration/VLAN interface configuration/Loopback interface
configuration/Tunnel interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
You can use this command to add description of the interface for remarking and describing
the interface.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


88
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Precaution
N/A

Examples
This example shows how to configure the description of loopback interface 1 as test.
Raisecom#config
Raisecom(config)#interface loopback 1
Raisecom(config-loopback1)#description test
Set successfully.

Related commands
show interface

1.7.2 show interface

Function
To show information about the interface, use this command.

Format
show interface [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type:
vlan: logical interface, VLAN interface
loopback: logical interface, loopback interface
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
fastethernet: physical interface, 100 Mbit/s interface

interface-number Interface ID, the value vary with different models and interface
types:
vlan: 1 to 4094
loopback: 1 to 16
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
fastethernet: 1/0/1
ten gigaethernet: 1/1/25 to 1/1/28

Default conditions
N/A

Raisecom Proprietary and Confidential


89
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations about 1000 Mbit/s interface 1.
Raisecom#show interface gigaethernet 1/1/1
loopback1 is UP, administrative status is UP
Internet Address is 0.0.0.0/0
MTU 16436 bytes, BW 0 Kbit, DLY 0 usec

gigaethernet1/1/1 is DOWN, administrative status is UP


Hardware is gigaethernet, MAC address is 000E.5E11.2233
Internet Address is 0.0.0.0/0
JUMBOFRAME 12288 bytes, BW 0 Kbit, DLY 0 usec
Interface mode: --, port vid: 1
MAU Type is 1000BASE-T, duplex ---(illegal), speed ---(illegal), Flow-
control Rcv/Snd:off/off
MDI Admin auto, Oper normal
last 60 sec input rate 0 bits/sec,0 packets/sec
last 60 sec output rate 0 bits/sec,0 packets/sec
input(swc):0 bytes,0 unicast,0 multicast,0 broadcast,0 drop,0 errors
input(hwc):0 bytes,0 unicast,0 multicast,0 broadcast,0 pause
0 drop,0 crcerr,0 undersize,0 oversize,0 fragments,0
jabbers,0 collisions
output(swc):0 bytes,0 unicast,0 multicast,0 broadcast,0 drop,0 errors
output(hwc):0 bytes,0 unicast,0 multicast,0 broadcast,0 pause
0 error,0 discard,0 abort,0 deferred,0 collisions,0
nocarrier,0 macerr

The following table describes fields in the command output.

Field Description
Admin status Interface configuration status
Hardware Interface hardware status
MAC MAC address of the interface
Internet Address IP address of the interface
Route Port Routed interface
TPID Interface TPID
MTU Maximum transmission unit on the interface

Raisecom Proprietary and Confidential


90
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Field Description
Duplex Duplex mode
Speed Speed
Flowcontrol Flow control status
Input Statistics Received statistics
InOctets Number of bytes received
InUcastPkts Number of unicast packets received
InMulticastPkts Number of multicast packets received
InBroadcastPkts Number of broadcast packets received
Error Statistics (Both Input Error statistics received and sent
And Output)
DiscardEvents(Pkts) Number of dropped packets
CRCAlignErrors(Pkts) Number of error packets
UndersizePkts Number of undersized packets
OversizePkts Number of oversized packets
Fragments(Pkts) Number of fragmented packets
Jabbers(Pkts) Number of Jabber packets
Collisions(Pkts) Number of collision packets
TooLongPkts(Pkts) Number of oversized packets
Output Statistics Tx normal packet statistics
OutOctets Total bytes of Tx data. The unit is Byte.
OutUcastPkts Number of Tx unicast packets
OutMulticastPkts Number of multicast packets sent
OutBroadcastPkts Number of broadcast packets sent
Output Error Statistics Error statistics sent
OutputError(Pkts) Number of error packets
OutputDiscard(Pkts) Number of dropped packets
Abort(Pkts) Number of packets lost
Deferred(Pkts) Number of delayed packets
LateCollisions(Pkts) Number of late collision packets
NoCarrier(Pkts) Number of packets without carrier
LostCarrier(Pkts) Number of packets with carrier loss

Raisecom Proprietary and Confidential


91
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Field Description
MacTransmitError(Pkts) MAC transmission error packets

Related commands
show interface

1.7.3 shutdown

Function
To disable the physical interface, use this command. To enable the interface, use no form of
this command.

Format
shutdown
no shutdown

Parameters
N/A

Default conditions
The interface is on.

Command mode
Physical interface configuration/VLAN interface configuration/Loopback interface
configuration/Tunnel interface configuration/Aggregation group configuration

User level
5

Usage guidelines
Scenario
The interface cannot receive and send packets after being disabled.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


92
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to disable 1000 Mbit/s interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#shutdown
Set successfully.

Related commands
show interface

1.7.4 interface fastethernet

Function
To enter 100 Mbit/s SNMP physical interface configuration mode, use this command.

Format
interface fastethernet interface-number

Parameters
Parameter Description
interface-number In form of unit/slot/port, with the value of unit being 1,
The Slot is the number of slot which houses the interface,
an integer, with the value being 0
The port is the interface ID, an integer, with the value of 1

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration

User level
11

Usage guidelines
N/A

Raisecom Proprietary and Confidential


93
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to enter SNMP interface configuration mode in global configuration
mode.
Raisecom#config
Raisecom(config)#interface fastethernet 1/0/1
Raisecom(config-fastethernet1/0/1)#

Related commands
N/A

1.7.5 interface gigaethernet

Function
To enter 1000 Mbit/s physical interface configuration mode, use this command.

Format
interface gigaethernet interface-number

Parameters
Parameter Description
interface-number In form of unit/slot/port
The value varies with interface type.

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration

User level
11

Usage guidelines
N/A

Examples
This example shows how to enter 1000 Mbit/s interface 1.
Raisecom#config

Raisecom Proprietary and Confidential


94
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Raisecom(config)#interface gigaethernet 1/1/1


Raisecom(config-gigaethernet1/1/1)#

Related commands
N/A

1.7.6 interface tengigaethernet

Function
To enter 10 Gbit/s interface configuration mode, use this command.

Format
interface tengigaethernet interface-number

Parameters
Parameter Description
interface-number In form of unit/slot/port
The value varies with interface type.

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration

Usage guidelines
N/A

Examples
This example shows how to enter 10 Gbit/s interface 1.
Raisecom#config
Raisecom(config)#interface tengigaethernet 1/3/1
Raisecom(config-tengigaethernet1/3/1)#

Related commands
N/A

Raisecom Proprietary and Confidential


95
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.7.7 interface vlan

Function
To enter VLAN interface configuration mode, use this command.

Format
interface vlan vlan-id

Parameters
Parameter Description
vlan-id VLAN ID, an integer, ranging from 1 to 4094

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration

User level
11

Usage guidelines
Scenario
You can use this command to enter VLAN interface configuration mode.
Prerequisite
VLAN is created through the vlan command or create vlan command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to create VLAN and enter VLAN interface 1 configuration mode.
Raisecom#config
Raisecom(config)#create vlan 1 active
Raisecom(config)#interface vlan 1

Raisecom Proprietary and Confidential


96
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Raisecom(config-vlan1)#

Related commands
show interface

1.7.8 interface tunnel

Function
To enter or to create and enter tunnel interface configuration mode, use this command.

Format
interface tunnel interface-number

Parameters
Parameter Description
The Slot is the number of slot which houses the interface,
interface-number
an integer, with the value being 1
The port is the interface ID, an integer, with value ranging

from 1 to 128

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration

User level
11

Usage guidelines
N/A

Examples
This example shows how to enter Tunnel interface 1.
Raisecom#config
Raisecom(config)#interface tunnel 1/1/1
Raisecom(config-tunnel1/1/1)#

Raisecom Proprietary and Confidential


97
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
show interface

1.7.9 interface port-channel

Function
To enter or to create and enter aggregation group interface configuration mode, use this
command.

Format
interface port-channel channel-number

Parameters
Parameter Description
port-channel channel-number Aggregation group interface ID, an integer, ranging
from 1 to 32

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration

User level
11

Usage guidelines
N/A

Examples
This example shows how to enter aggregation group configuration mode of aggregation group
1.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-gigaethernet-channel1)#

Related commands
N/A

Raisecom Proprietary and Confidential


98
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.7.10 interface loopback

Function
To enter or to create and enter loopback interface configuration mode, use this command.

Format
interface loopback interface-number

Parameters
Parameter Description
interface-number Loopback interface ID, an integer, ranging from 1

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration

User level
11

Usage guidelines
N/A

Examples
This example shows how to enter loopback interface1.
Raisecom#config
Raisecom(config)#interface loopback 1
Raisecom(config-loopback1)#

Related commands
show interface

1.7.11 port-type

Function
To configure SFP interface connection mode, use this command.

Raisecom Proprietary and Confidential


99
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Format
port-type { 1000base_t1 | 1000base_t2 | 1000base_x | 100base_fx | 100base_tx |
10Gbase_r }

Parameters
Parameter Description

1000base_t1 1000 Mbit/s electrical mode (auto-negotiation only)


1000base_t2 1000 Mbit/s electrical mode (only support 1000 Mbit/s and full
duplex mode)
1000base_x 1000 Mbit/s optical mode
100base_fx 100 Mbit/s optical mode
100base_tx 100 Mbit/s electrical mode
10Gbase_r 10 Gbit/s optical mode

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
15

Usage guidelines
N/A

Examples
This example shows how to configure interface 1/1/25 as 1000 Mbit/s optical interface.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/25
Raisecom(config-gigaethernet1/1/25)#port-type 1000base_x
Set successfully.

Related commands
show interface

Raisecom Proprietary and Confidential


100
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.7.12 duplex

Function
To configure the duplex mode for the interface, use this command.

Format
duplex { auto | full | half }

Parameters
Parameter Description

full Forced full duplex mode


half Forced half duplex mode
atuo Automatic negotiation

Default conditions
The duplex mode of electrical interfaces and 1000 Mbit/s optical interfaces is auto-
negotiation.
The duplex mode of 100 Mbit/s optical interfaces is full duplex.

Command mode
Physical layer interface configuration mode

User level
5

Usage guidelines
Scenario
The working mode of the Ethernet physical layer is divided into half duplex and full duplex.
In half duplex mode, the interface can only receive or send data. However, in full duplex
mode, the interface can receive and send data concurrently at any time. Auto-negotiation
means that the device at the ends of the physical links can automatically choose duplex modes
through information exchanging. Once negotiated, they can use the same duplex mode to
transmit data.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


101
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

The 100 Mbit/s and 1000 Mbit/s optical interfaces cannot be configured to half duplex mode.

Examples
This example shows how to configure the duplex mode on interface 1/9 to half duplex mode.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/9
Raisecom(config-gigaethernet1/1/9)#duplex half
Set successfully.

Related commands
show interface port
speed

1.7.13 l2protocol peer stp

Function
To enable L2 protocol Peer STP, use this command. To disable the function, use the no form
of this command.

Format
l2protocol peer stp
no l2protocol peer stp

Parameters
N/A

Default conditions
The L2protocol Peer STP is disabled.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
To interwork with the device which sends STP packets with the destination MAC address of
0180.C200.0008, you need to configure L2Protocol Peer STP. When you enable the function,
the BPDU destination MAC address sent by the STP will be 0180.C200.0008. Otherwise, it
will be 0180.C200.0000.

Raisecom Proprietary and Confidential


102
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable L2protocol Peer STP on interface 1/1/9.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/9
Raisecom(config-gigaethernet1/1/9)#l2protocol peer stp
Set successfully.

Related commands
show l2protocol peer stp port

1.7.14 flowcontrol on

Function
To enable or disable 802.3x flow control on the interface, use this command.

Format
flowcontrol { receive | send } { off | on }

Parameters
Parameter Description

receive Receive flow control.


send Send flow control.
off Disable flow control.
on Enable flow control.

Default conditions
The flow control on all interfaces is disabled.

Command mode
Physical layer interface configuration mode

Raisecom Proprietary and Confidential


103
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

User level
11

Usage guidelines
Scenario
IEEE 802.3x is a method for controlling traffic on the full duplex Ethernet data link layer.
After the flow control is enabled by this command, the local end will send Pause frames to the
remote ends if network congestions occur for deferring data transmission.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable the flow control over data to be received on the interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#flowcontrol receive on
Set successfully.

Related commands
show interface

1.7.15 medium-priority

Function
To configure priority for Combo interface (which means to choose optical interface over
electrical interface or vice versa), use this command.

Format
medium-priority { copper | fiber }

Parameters
Parameter Description
copper Electrical interface
fiber Optical interface

Raisecom Proprietary and Confidential


104
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Default conditions
Electrical interface is preferred.

Command mode
Physical layer interface configuration mode

User level
15

Usage guidelines
Scenario
You can use this command to configure the priority for Combo interface to choose optical
interface or electrical interface as the preferential mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure Combo interface 1/1/25 to be in electrical mode in
preference to the other mode.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/25
Raisecom(config-gigaethernet1/1/25)#medium-priority fiber
Set successfully.

Related commands
show combo configuration

1.7.16 mdi

Function
To configure MDI/MDIX on electrical interfaces, use this command.

Format
mdi { xover | auto | normal }

Raisecom Proprietary and Confidential


105
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
xover Crossover mode
auto Auto MDI/MDIX mode
normal Normal straight-through mode

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
15

Usage guidelines
Scenario
Ethernet cables are classified into two categories: straight-through cables and cross-over
cables. The straight-through cable is connected to the Medium Dependent Interface (MDI)
while the cross-over cable is connected to the Medium Dependent Interface cross-over (MDI-
X).
MDI provides a physical and circuit connection between the terminal device and the relaying
devices. MDIX is used for connection between same devices (the terminal device and the
terminal device). Hosts and routers support MDI while hubs and switches support MDI-X. In
general, the straight-through cable is used to connect two different devices while the cross-
over cable is used to connect two same devices.
With the Auto MDI, you can connect two devices regardless of whether straight-through
cables or cross-over cables are used. We recommend you to choose this mode for its
applicability. When you must choose from a straight-through cable or a crossover cable to
connect devices, you can choose the normal mode or the across mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The command takes effect only on the condition that the ISCOM2600G switch uses 10BASE-
T, 100BASE-TX, and 1000BASE-T electrical interface module.
MDI wiring configurations will affect the operating status of interface and MDI wirings. If
MDI configurations are mismatched, the interface may be in Link Down status.

Raisecom Proprietary and Confidential


106
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to configure using cross mode on interface 1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#mdi xover
Set successfully.

Related commands
show interface port

1.7.17 media-type

Function
To configure the electrical/optical mode on Combo interface, use this command.

Format
media-type { auto | fiber | copper }

Parameters
Parameter Description

auto Automatic selection mode


fiber Mandatorily use optical interface.
copper Mandatorily use electrical interface.

Default conditions
The optical/electrical mode on Combo interface is auto.

Command mode
Physical layer interface configuration mode

User level
15

Usage guidelines
Scenario
Combo interface can automatically and mandatorily choose transmission media. If the
interface is configured with automatic selection mode, and the optical cable and electrical
cable are well connected, it will select one from the two to serve as transmission media. In
this case, if the current transmission media fails, the interface will automatically choose the
other transmission media to continue transmitting data. However, if the interface is configured

Raisecom Proprietary and Confidential


107
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

with mandatory selection of optical interface or electrical interface, it will only use the
transmission media selected to transmit data.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure using optical interface on interface 1/1/25.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/25
Raisecom(config-gigaethernet1/1/25)#media-type fiber
Set successfully.

Related commands
show combo configuration

1.7.18 speed

Function
To configure the rate on the physical interface, use this command.

Format
speed { auto | 10 | 100 | 1000 | 10000 }

Parameters
Parameter Description
auto Auto-negotiation
10 Mandatorily 10 Mbit/s
100 Mandatorily 100 Mbit/s
1000 Mandatorily 1000 Mbit/s
10000 Mandatorily 10000 Mbit/s

Default conditions
The rate on electrical interfaces and 1000 Mbit/s optical interfaces is auto negotiable.
The rate on 100 Mbit/s optical interfaces is 100 Mbit/s.

Raisecom Proprietary and Confidential


108
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Command mode
Physical layer interface configuration mode

User level
5

Usage guidelines
Scenario
When the rate on the interfaces of two connected devices is not in conformity, the
communication between the two devices may be disconnected. However, you can use this
command to configure the interface rate to match them.
Auto-negotiation means that the device at the ends of the physical link automatically choose
rate through information exchanges, once negotiated, the devices will transmit data at the
same rate.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The rate on 100 Mbit/s electrical interfaces can not be configured as 1000 Mbit/s.
The rate on 100 Mbit/s optical interfaces can be only configured as 100 Mbit/s.

Examples
This example shows how to configure the rate on interface 1 as 10 Mbit/s.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#speed 10
Set successfully.

Related commands
duplex
show interface port

1.7.19 mtu

Function
To configure the Maximum Transmission Unit (MTU) on the interface, which means the
interface will fragment IP packets once the length of them exceeds the MTU, use this
command. To disable this function, use the no form of this command.

Raisecom Proprietary and Confidential


109
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Format
mtu max-frame-length
no mtu

Parameters
Parameter Description
max-frame-length Maximum frame length, an integer, ranging from 46 to 9600, in
units of B

Default conditions
The MTU on the interface is 1500.

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the MTU on the physical layer interface or
aggregation group interface. The MTU on the peer interface should be taken into
consideration while interfaces are transmitting packets mutually.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the MTU on 1000 Mbit/s interface 1 to 1800 B.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mtu 1800
Set successfully.

Raisecom Proprietary and Confidential


110
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
show interface

1.7.20 tpid

Function
To configure the Tag Protocol Identifier (TPID) on the interface, use this command.

Format
tpid { 8100 | 9100 | 88a8 }

Parameters
Parameter Description
8100 Configure the TPID value to 0x8100.
9100 Configure the TPID value to 0x9100.
88a8 Configure the TPID value to 0x88a8.

Default conditions
The TPID on the interface is 0x8100.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the TPID on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


111
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to configure the TPID on 1000 Mbit/s interface 1 to 0x88a8.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet 1/1/1)#tpid 88a8
Set successfully.

Related commands
show interface

1.7.21 jumboframe

Function
To configure the maximum length of frame allowed on the interface, use this command.

Format
jumboframe frame-size

Parameters
Parameter Description
frame-size Maximum length of frame, an integer, ranging from 1522 to
13312 bytes, with the length being 13312 bytes by default

Default conditions
N/A

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
Jumbo Frame is a standard MTU size frame format defined by vendors, which is used for
solving the problem of the transmission efficiency of fast Ethernet. The definition of frame
size is vendor-dependent. Therefore, you need to adjust the maximum length of frame while
connecting the device to devices from other vendors to ensure communication between them.
Prerequisite
N/A

Raisecom Proprietary and Confidential


112
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the maximum length of frame allowed on 1000 Mbit/s
interface 1 to 2046 bytes.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#jumboframe 2046
Set successfully.

Related commands
show interface

1.7.22 vibration-suppress

Function
To configure the suppression period for interface vibration, use this command.

Format
vibration-suppress peroid second

Parameters
Parameter Description
peroid second Suppression period, an integer, ranging from 1 to 600s

Default conditions
The suppression period is 3s.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


113
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

In the network application, interfaces will be in Up and Down status alternately caused by
various reasons such as physical interface interference and configuration errors in link layer,
which may lead to the repeated vibration of routing protocols, thus leading to the crash of
some devices and unavailability of network.
You can use this command to configure the suppression period for interface vibration to
reduce the frequency of Up and Down alternation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the suppression period for interface vibration to 60s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#vibration-suppress peroid 60
Set successfully.

Related commands
show interface

1.7.23 show l2protocol peer stp port

Function
To show L2protocol Peer STP status on the interface, use this command.

Format
show l2protocol peer stp interface-type interface-number

Parameters
Parameter Description

interface-type Interface type

interface-number Interface ID
The form and value depend on the interface type.

Raisecom Proprietary and Confidential


114
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
You can use this command to show L2protocol Peer STP status:
When L2protocol Peer STP is enabled, the destination MAC address for sending STP
BPDU is 0180.C200.0008.
When L2protocol Peer STP is disabled, the destination MAC address for sending STP
BPDU is 0180.C200.0000.

Examples
This example shows how to show L2protocol Peer STP status on interface 1/1/1.
Raisecom#show l2protocol peer stp gigaethernet1/1/1 1
PORT ID STP dst mac change state
--------------------------------------------------
gigaethernet1 disable

The following table describes fields in the command output.

Field Description
Port ID Physical interface ID
STP dst mac change L2protocol Peer STP status
state enable: enabled
disable: disabled

Related commands
N/A

1.7.24 statistics enable

Function
To enable interface statistics, use this command. To disable this function, use the no form of
this command.

Format
statistics { enable | disable }

Raisecom Proprietary and Confidential


115
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
enable Enable interface statistics.
disable Disable interface statistics.

Default conditions
The statistics of physical interface is enabled while the statistics of logical interface is
disabled.

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to enable statistics of logical interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable statistics of VLAN subinterfaces.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#statistics enable
Set successfully.

Related commands
show interface

Raisecom Proprietary and Confidential


116
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.7.25 clear interface statistics

Function
To clear interface statistics, use this command.

Format
clear interface statistics

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration/VLAN interface
configuration/Loopback interface configuration/Tunnel interface configuration/Aggregation
group configuration

User level
11

Usage guidelines
Scenario
You can use this command to clear interface statistics.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
History records cannot be recovered once statistics is cleared. Use it with caution.

Examples
This example shows how to clear Ethernet interface statistics.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#clear interface statistics
Set successfully.

Raisecom Proprietary and Confidential


117
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
show interface

1.7.26 show combo configuration

Function
To show configurations on the Combo interface, use this command.

Format
show combo configuration interface-type interface-number

Parameters
Parameter Description

interface-type Interface type

interface-number Interface ID
The form and value depend on the interface type.

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations on Combo interface 1/1/25.
Raisecom#show combo configuration gigaethernet1/1/25
f:Fiber
c:copper
Combo priority: Fiber
Media-type Mode: Auto
Port Status speed/duplex mdi flowcontrol(R/S)
--------------------------------------------------------------
gigaethernet1/1/25(f) inactive 1000/full -- off/off
gigaethernet1/1/25(c) active 100/full auto on/on

Raisecom Proprietary and Confidential


118
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

The following table describes fields in the command output.

Field Description
f:Fiber Optical interface
c:copper Electrical interface
Combo priority Optical/electrical priority on Combo interface
Fiber: prefer optical interface
Copper: prefer electrical interface
Media-type Mode Optical/electrical selection mode
Copper-forced: mandatorily use electrical interface
Fiber-forced: mandatorily use optical interface
Auto: automatically choose modes

Port Interface ID
Status Status of physical interface
Only one type of the Combo interface is in active status.
active: in active status
inactive: in inactive status
speed/duplex Speed on Combo interface and duplex mode
mdi MDI/MDIX mode when the Combo interface is an
electrical interface
flowcontrol(R/S) Flow control status of Combo interface (receive/send)

Related commands
N/A

1.7.27 console open

Function
To enable the Console interface, use this command. To disable this function, use the close
form of this command.

Format
console { close | open }

Parameters
Parameter Description
close Disable the Console interface.
open Enable the Console interface.

Raisecom Proprietary and Confidential


119
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Default conditions
The Console interface is disabled.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
You can use this command to enable or disable the Console interface in non-Console sessions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You cannot disable Console interface in console sessions.
The Console interface will be unavailable once it is disabled through the console close
command. Use it with caution.

Examples
This example shows how to enable the Console interface.
Raisecom#config
Raisecom(config)#console open
Set successfully.

Related commands
N/A

1.7.28 login-trap enable

Function
To enable users to send trap during login or logout, use this command. To disable this
function, use the no form of this command.

Format
login-trap { enable | disable }

Raisecom Proprietary and Confidential


120
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
enable Enable users to send Trap during login or logout.
disable Disable users to send Trap during login or logout.

Default conditions
Disabled

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
You can use this command to control the device to send or not send Trap during login or
logout.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the device to send Trap during user login.
Raisecom#config
Raisecom(config)#login-trap enable
Set successfully.

Related commands
N/A

Raisecom Proprietary and Confidential


121
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.8 Time management


1.8.1 clock display

Function
Configure the system clock display mode, use this command.

Format
clock display { default | utc }

Parameters
Parameter Description
default Default mode
utc UTC mode

Default conditions
The system clock display mode is default.

Command mode
Privileged EXEC

User level
11

Usage guidelines
Scenario
You can use this command to configure the system clock display mode.
The Universal Time Coordinated (UTC) is the Greenwich Mean Time (GMT).
Default mode: 2014-04-09,12:14:50.099
UTC mode: 09.04.2014-12:24:52-CCT
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


122
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to configure the system display mode as UTC mode.
Raisecom#clock display utc
Set Successfully

Related commands
show clock

1.8.2 clock set

Function
To configure the system time and date, use this command.

Format
clock set hour minute second year month day

Parameters
Parameter Description
hour Hour, an integer, ranging from 0 to 23
minute Minute, an integer, ranging from 0 to 59
second Second, an integer, ranging from 0 to 59
year Year, an integer, ranging from 2000 to 2099
month Month, an integer, ranging from 1 to 12
day Day, an integer, ranging from 1 to 31

Default conditions
The system time is "1970-01-01,08:00:00".

Command mode
Privileged EXEC

User level
11

Usage guidelines
Scenario
You can use this command to configure the system time for the device. Configurations will be
invalid once the device is powered off.

Raisecom Proprietary and Confidential


123
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the current system time to 1/12013 08:00:00.
Raisecom#clock set 8 0 0 2013 1 1
Set successfully

Related commands
show clock

1.8.3 clock summer-time enable

Function
To enable Daylight Saving Time (DST), use this command. To disable this function, use the
disable form of this command.

Format
clock summer-time { enable | disable }

Parameters
Parameter Description
enable Enable DST.
disable Disable DST.

Default conditions
DST is disabled.

Command mode
Privileged EXEC

User level
11

Raisecom Proprietary and Confidential


124
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Usage guidelines
Scenario
DST is a convention established by people for saving resources. It is earlier in summer than in
winter at sunrise. To reduce evening usage of incandescent lighting and save energy, clocks
are adjusted forward.
Prerequisite
N/A
Follow-up procedure
You can use the clock summer-time recurring command to configure related parameters of
DST.
Precaution
When DST is enabled, all synchronized time obtained through SNTP will be translated into
local DST.

Examples
This example shows how to enable DST.
Raisecom#clock summer-time enable
Set successfully

This example shows how to disable DST.


Raisecom#clock summer-time disable
Set successfully

Related commands
show clock summer-time recurring

1.8.4 clock summer-time recurring

Function
To configure the start time, end time and time offset of DST, use this command.

Format
clock summer-time recurring { start-week | last } { sun | mon | tue | wed | thu | fri | sat }
start-month hour minute { end-week | last } { sun | mon | tue | wed | thu | fri | sat } end-
month- hour minute offset

Parameters
Parameter Description
start-week Week when DST begins, an integer, ranging from 1 to 4
last DST begins or ends in the last week of a month.

Raisecom Proprietary and Confidential


125
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameter Description
sun DST begins or ends on Sunday of a week.
mon DST begins or ends on Monday of a week.
tue DST begins or ends on Tuesday of a week.
wed DST begins or ends on Wednesday of a week.
thu DST begins or ends on Thursday of a week.
fri DST begins or ends on Friday of a week.
sat DST begins or ends on Saturday of a week.
start-month Month when DST begins, an integer, ranging from 1 to 12
hour Hour when DST begins or ends, an integer, ranging from 0 to 23
minute Minute when DST begins or ends, an integer, ranging from 0 to 59
end-week Week of the month when DST ends, an integer, ranging from 1 to 4
end-month Month when DST ends, an integer, ranging from 1 to 12
offset Time offset of DST, an integer, ranging from 1 to 1440, in units of second

Default conditions
N/A

Command mode
Privileged EXEC

User level
11

Usage guidelines
Scenario
After DST is enabled, the system time will be adjusted forward according to the configured
time offset when DST begins. When DST ends, the system time will automatically returns to
the Coordinated Universal Time (UTC).
Prerequisite
The DST is enabled through the clock summer-time enable command.
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


126
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to configure DST to begin at 02:00 am, the second Sunday of April,
and end at 02:00 am, the second Sunday of September. During this period, the clock is
adjusted forward an hour.
Raisecom#clock summer-time recurring 2 sun 4 2 0 2 sun 9 2 0 60
Set successfully

Related commands
clock summer-time enable
show clock summer-time recurring

1.8.5 clock timezone

Function
To configure the time zone of the system time, use this command. To return to the default
condition, use the no form of this command.

Format
clock timezone { + | - } hour minute timezone-name
no clock timezone

Parameters
Parameter Description
+ Time zones in the Eastern Hemisphere
- Time zones in the Western Hemisphere
hour Time zone offset hour, an integer, ranging from 0 to 11
minute Time zone offset minute, an integer, ranging from 0 to 59
timezone-name Time zone name, a string of 1 to 7 characters

Default conditions
The system time is GMT + 8:00.

Command mode
Privileged EXEC

User level
11

Raisecom Proprietary and Confidential


127
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Usage guidelines
Scenario
You can use this command to configure the time zone of the system time. The time offset of
both the Eastern and Western Hemispheres is based on the Greenwich Mean Time (GMT).
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the system time being in the time zone of Western
Hemisphere and how to set the time offset to 05:40:00.
Raisecom#clock timezone - 5 40 CCT
Set successfully

This example shows how to return the system time zone to the default condition.
Raisecom#no clock timezone
Set successfully

Related commands
show clock

1.8.6 ntp peer

Function
To configure the IP address of the device's peer (regard the device as a main peer) in the peer
working mode, use this command. To delete this configuration, use the no form of this
command.

Format
ntp peer ip-address [ version version-number ]
no ntp peer ip-address

Parameters
Parameter Description
ip-address IP address of the remote peer, in dotted decimal notation, such as
10.10.1.1

Raisecom Proprietary and Confidential


128
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameter Description
version NTP version
The default value is v3 if the parameter is not configured.
version-number Version number, the value is v1, v2 or v3

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
This device supports two NTP working modes: peer mode and Client/Server mode
The peer is divided into initiative peer and passive peer in the peer mode, the two can
synchronize mutually, and the peer with small number of layers synchronizes with the peer
with large number of layers.
You just need to configure the NTP command at the initiative peer and are of no need to
configure it at the passive peer in the peer mode. If you wish to configure this device as
initiative peer (such as A) and configure the end-to-end and peer-to-peer IP address (such as
B), you can use this command. The initiative peer (A) will send synchronous request packets,
it will be synchronized to A if the layer number of A is less than that of B after the opposite
end (B) receives it.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The same device cannot be configured as an initiative peer by this command and concurrently
as a master clock server using the ntp refclock-master command.
One device can only be configured with the IP address of one master peer, if configured more,
the last IP address takes effect.

Examples
This example shows how to configure the end-to-end and peer-to-peer IP address as 10.0.0.1.
Raisecom#config

Raisecom Proprietary and Confidential


129
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Raisecom(config)#ntp peer 10.0.0.1


Set successfully.

This example shows how to delete the configuration.


Raisecom(config)#no ntp peer 10.0.0.1
Set successfully.

Related commands
show ntp associations

1.8.7 ntp server

Function
To configure the IP address of the remote server in Client/server mode, use this command. To
disable this function, use the no form of this command.

Format
ntp server ip-address [ version version-number ]
no ntp server ip-address

Parameters
Parameter Description
ip-address IP address of the remote server, in dotted decimal notation, such as
10.10.1.1
version Version of the NTP
The default version is v3 if the parameter is not configured.
version-number Version number, value is v1, v2 or v3

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The device supports two NTP work modes: Client/server mode and peer mode.

Raisecom Proprietary and Confidential


130
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

In Client/server mode, only the Client is synchronized to the server instead of vice versa. In
this mode, you just need to configure the Client (configure the master clock on the server end).
After completion of configurations, the Client will send synchronization request packets to
the remote server. When the remote server receives the request packets, it will automatically
work in the server mode and send response packets. When the Client receives response
packets, it will filter and choose clocks, and synchronize the clock to the server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you already used the ntp refclock-master command to configure the device as the NTP
master clock, configurations through this command will fail. This is because the same device
cannot be configured as the NTP master clock to serve as a server and meanwhile configured
as a Client to configure the IP address for the remote server concurrently. You can use the no
ntp refclock-master command to delete the NTP main clock before using this command.

Examples
This example shows how to configure the IP address of the NTP server as 10.0.0.1.
Raisecom#config
Raisecom(config)#ntp server 10.0.0.1
Set successfully.

Related commands
show ntp associations

1.8.8 ntp refclock-master

Function
To configure the device as the NTP master clock (reference clock source) and serve as a
server in the Client/server mode, use this command. To disable this function, use the no form
of this command.

Format
ntp refclock-master [ ip-address ] [ stratum ]
no ntp refclock-master

Raisecom Proprietary and Confidential


131
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
ip-address IP address of the local reference clock, in dotted decimal notation,
with IP address ranging from 127.127.1.0 to 127.127.1.2
Take the local clock as the NTP master clock. The defaulted value
should be local clock 127.127.1.0 if the parameter is not configured.
stratum The layer of the tree-type NTP network topology in which the device
is, ranging from 2 to 15
The lower the layer is, the more accurate the clock is. The default
value is 8 if the parameter is not configured.

Default conditions
The device is not the NTP reference clock source.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the device as the NTP master clock and to serve as a
clock server. The Client in Clinet/server mode can be synchronized to the master clock but the
master clock cannot be synchronized to the Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The layer where the master clock is in must be lower than that of the Client which is to
be synchronized. Otherwise, the master clock cannot synchronize the Client. It is not
recommended that you modify the default value of the layer unless required.
If you have already used the ntp peer or ntp server command, configurations will fail.
You can use the no ntp peer or no ntp server command to delete the configuration
before reconfiguring the NTP master clock.

Examples
This example shows how to configure the device as the NTP master clock.
Raisecom#config

Raisecom Proprietary and Confidential


132
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Raisecom(config)#ntp refclock-master
Set successfully.

This example shows how to delete the configuration.


Raisecom(config)#no ntp refclock-master
Set successfully.

Related commands
show ntp status

1.8.9 show clock

Function
To show system time, use this command.

Format
show clock [ summer-time-recurring ]

Parameters
Parameter Description
summer-time-recurring Show configurations about DST.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the current system time.
Raisecom#show clock
clock display mode: default
Current system time: 1970-01-01,08:00:00
Timezone offset: -02:33-e

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


133
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Field Description
clock display mode Clock display mode
Current system time Current system time, in units of millisecond
Timezone offset Time zone offset, the time in the following example is
Beijing time

This example shows how to show configurations about the DST.


Raisecom#show clock summer-time-recurring
Clock display mode: default
Current system time: 1970-01-01,08:00:00
Timezone offset: +08:00-CCT
Summer time recurring: Enable
Summer time start: April week 2 Sunday 02:00
Summer time end: September week 2 Sunday 02:00
Summer time Offset: 60 min

The following table describes fields in the command output.

Field Description
Summer time recurring DST functional status, it is enabled in the example.
Summer time start Time when the DST begins
Summer time end Time when the DST ends
Summer time Offset DST time offset

Related commands
N/A

1.8.10 show ntp associations

Function
To show configurations about NTP Server or NTP Peer, use this command.

Format
show ntp associations [ detail ]

Parameters
Parameter Description

detail Show details.

Default conditions
N/A

Raisecom Proprietary and Confidential


134
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the connection information about the device
Raisecom#show ntp associations
Server(ip) refid stratum poll when delay offset
dispersion mode reach
(u)10.0.0.1 0.0.0.0 16 6 28 0.000000 0.000000
16.000000 0 0
(null) refid stratum poll when delay offset
dispersion mode reach
(u)10.0.0.2 0.0.0.0 16 6 18 0.000000 0.000000
16.000000 0 0

The following table describes fields in the command output.

Field Description
Server(ip) IP address of clock synchronization source
refid Synchronize the synchronous clock source of the clock source.
stratum Layer of synchronization source
poll Polling period, namely, the maximum interval between two neighbor
messages, in units of second
when The period since the clock was synchronized till now, accurate to second.
delay Internet delay
offset Clock offset
dispersion Clock dispersion, that is, the maximum time error between local clock and
the reference clock.
mode Remote server mode
reach Response indicator

Related commands
ntp peer
ntp server

Raisecom Proprietary and Confidential


135
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.8.11 show ntp status

Function
To show the NTP status, use this command.

Format
show ntp status

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the NTP status.
Raisecom#show ntp status
Clock status : unsynchronized
NTP peer : 0.0.0.0
NTP version : 3
NTP mode : ntpSlave
Leap : 3
Poll : 6
Stratum : 16
Precision : 2**-20
Reference clock : 0.0.0.0
Reference time : 00000000.00000000(Thu 1970-01-01,08:00:00)
Current time : 00ac1301.00000000(Mon 1970-05-11,20:30:57)
Root delay : 0.000000
Root dispersion : 0.000000

Related commands
ntp refclock-master

Raisecom Proprietary and Confidential


136
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

1.8.12 show sntp

Function
To show SNTP configurations, use this command.

Format
show sntp

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show SNTP configurations.
Raisecom#show sntp
SNTP server address:1.1.1.1
SNTP Server Stratum Version Synchronize Time.
---------------------------------------------------------

The following table describes fields in the command output.

Field Description
SNTP server address Address of the ISNTP server
SNTP Server SNTP server
Stratum Reference layer
Version Version
Synchronize Time Synchronize time.

Raisecom Proprietary and Confidential


137
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Related commands
N/A

1.8.13 sntp server

Function
To configure the IP address for the SNTP server in SNTP Client mode, use this command. To
disable this function, use the no form of this command.

Format
sntp server ip-address
no ntp server ip-address

Parameters
Parameter Description
ip-address IP address of the SNTP server, in dotted decimal notation, such as
10.10.1.1

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The Simple Network Time Protocol (SNTP) is the simplified one of the Network Time
Protocol (NTP) in RFC1361. Compared with NTP, SNTP only supports server/Client mode.
You can use this command to configure the IP address of the SNTP server for devices
working in the Client mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


138
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

N/A

Examples
This example shows how to configure the IP address of the SNTP server as 10.0.0.1.
Raisecom#config
Raisecom(config)#sntp server 10.0.0.1
Set successfully.

Related commands
show sntp

1.9 Task schedule


1.9.1 schedule-list

Function
To create the table item for the schedule list and execute certain command using schedule list
periodically, use this command.

Format
schedule-list list-number start date-time { mm-dd-yyyy hh:mm:ss [ every { day | week }
stop mm-dd-yyyy hh:mm:ss ] | every days-interval time-interval [ stop mm-dd-yyyy
hh:mm:ss ] }
schedule-list list-number start up-time days-after-startup hh:mm:ss [ every days-interval
time-interval [ stop days-after-startup hh:mm:ss ] ]
no schedule-list list-number [ command { command-number | all } ]

Parameters
Parameter Description
list-number Schedule number, an integer, ranging from 0 to 99
start Time when schedule begins, start executing certain command.
stop Time when schedule ends, stop executing certain command.
date-time Absolute time, start or end scheduling when the system time is the same
as the configured time.
up-time Relative time, start timing after the system is booted and start or end
scheduling after a period of configured time.
mm-dd-yyyy Date of absolute time in a format of month-day-year, such as 01-02-
2011.

Raisecom Proprietary and Confidential


139
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameter Description
hh:mm:ss Time of absolute time in a format of hour-minute-second, such as
23:01:10.
days-after- Relative period, an integer, ranging from 0 to 365, in units of day, it
startup means that after how long you can start or end scheduling since the
system is booted.
every Schedule period, the frequency of scheduling
day Once a day
week Once a week
days-interval Interval, an integer, ranging from 0 to 365, in units of day, the frequency
of scheduling
time-interval Time interval, in form of hh:mm:ss, perform scheduling every how many
days and hours
command Delete schedule information of specified commands from the schedule
list. It means this command is not used for scheduling.
If you do not choose this parameter, the entire schedule list will be
deleted.
command- Command number, an integer, ranging from 0 to 99
number
all Delete the schedule information of all commands from the schedule list.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to create a schedule list which defines the start time, end time, and
the schedule period for executing certain commands. If a command quotes from a schedule
list, the command will work periodically and automatically.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


140
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Precaution
N/A

Examples
This example shows how to create schedule list 1 which uses absolute time with the start time
of 01:00:00, 01-01-2011, the period of once a day, and the end time of 01:00:00, 01-01-2012.
Raisecom#config
Raisecom(config)#schedule-list 1 start date-time 01-01-2011 01:00:00
every day stop 01-01-2012 01:00:00
Set successfully.

Related commands
show schedule-list

1.9.2 command-string schedule-list

Function
To bind the command line which needs to be periodically executed and also supports the
schedule list with the schedule list, use this command.

Format
command-string schedule-list list-number

Parameters
Parameter Description
command-string Command line character string
list-number Schedule list number, an integer, ranging from 0 to 99

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
N/A

Raisecom Proprietary and Confidential


141
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to bind the mls qos enable command to schedule list 2.
Raisecom#config
Raisecom(config)#mls qos enable schedule-list 2
Set successfully.

Related commands
schedule-list

1.9.3 show schedule-list

Function
To show information about the schedule list, use this command.

Format
show schedule-list [ list-number ]

Parameters
Parameter Description
list-number Schedule list number, an integer, ranging from 0 to 99

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the schedule list.
Raisecom#show schedule-list 1
Schedule list information
---------------------------------------------------------
Schedule list : 1
TypeReal time

Raisecom Proprietary and Confidential


142
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Start Time from : feb-4-2009 3:6:8


Period: No
Stop Time: No
Attached Command Number : 1
Command next execute Time : feb-4-2009 3:6:8
Attached commands info:
No. Cnt. Mode command str
0 0 config mls qos enable

The following table describes fields in the command output.

Field Description
Schedule list Schedule list number
Start Time from Time when schedule starts
Period Schedule period
Stop Time Time when schedule ends
Attached Command Number of commands associated with the schedule list,
Number namely, the number of commands that use the schedule list
Command next execute Time for executing next schedule
Time
Attached commands info Attached command information
No. Number
Cnt. Schedule times
Mode Command mode
command str Command string

Related commands
schedule-list

1.10 Banner
1.10.1 banner enable

Function
To enable Banner information display, use this command. To disable this function, use the no
form of this command.

Format
banner { enable | disable }

Raisecom Proprietary and Confidential


143
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Parameters
Parameter Description
enable Enable Banner information display.
disable Disable Banner information display.

Default conditions
The Banner information display is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After Banner information display is enabled, the system interface will display the pre-
configured Banner information when a user log in or log out.
Prerequisite
The Banner content is configured through the banner login word message word command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable Banner information display.
Raisecom#config
Raisecom(config)#banner enable
Set successfully

Related commands
show banner login

1.10.2 banner login

Function
To configure Banner content, use this command.

Raisecom Proprietary and Confidential


144
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Format
banner login word

Enter text message followed by the character 'word' to finish. User can stop configuration by
inputting 'Ctrl+C'
message word

Parameters
Parameter Description
word Start and end marks of Banner, in form of characters, with the length of 1

The start mark and the end mark must use the same character.
message Banner content, a string of 1 to 2560 characters

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Banner is a prompt, such as notices and disclaimers, displayed on the system interface when
users log in to or log out the device.
When users log in to or log out from the device, the pre-configured Banner will display on the
system interface. You can use this command to configure Banner content.
Prerequisite
N/A
Follow-up procedure
You can use the banner enable command to enable Banner information display.
Precaution
If the message to be shown through the show running-config or show startup-config
command contains a space, carriage return, or line break, use "" to embrace it.
If you wish to end configuring parameters of message, you can use "Ctrl+C".

Raisecom Proprietary and Confidential


145
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Examples
This example shows how to configure the content of the Banner as: Welcome To Raisecom,
and the word parameter is @.
Raisecom#config
Raisecom(config)#banner login @
Enter text message followed by the character @ to finish.User can stop
configuration by inputing Ctrl+c;
Welcome To Raisecom @
Set successfully.

Related commands
show banner login

1.10.3 clear banner login

Function
To clear Banner contents, use this command.

Format
clear banner login

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to clear the pre-configured Banner content.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


146
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Precaution
N/A

Examples
This example shows how to clear Banner content.
Raisecom#config
Raisecom(config)#clear banner login
Raisecom(config)#

Related commands
show banner login

1.10.4 show banner login

Function
To show the enabled status and contents of Banner, use this command.

Format
show banner login

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to show the enabled status and Banner content.
Raisecom#config
Raisecom(config)#show banner login
login: Enable

Raisecom Proprietary and Confidential


147
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

Show the input information of user


-----------------------------------------------------------
Wellcome To Raisecom
-----------------------------------------------------------

Related commands
banner enable
banner login
clear banner login

1.11 Watchdog
1.11.1 watchdog enable

Function
To enable Watchdog, use this command. To disable this function, use the disable form of this
command.

Format
watchdog { enable | disable }

Parameters
Parameter Description
enable Enable Watchdog.
disable Disable Watchdog.

Default conditions
Watchdog is enabled.

Command mode
Privileged EXEC

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


148
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

The Watchdog can prevent the program from infinite circulation which can result in endless
loop. It can be used in solving the timeout issue of receiving and sending packets, thus
protecting data and circuit.
Task suspension, infinite circulation, or without kicking the dog within a period will hamper
the running of the device. However, when the device is enabled with Watchdog, the system
will automatically reboot to avoid infinite circulation and improve system stability.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable Watchdog.
Raisecom#watchdog enable
Set successfully.

Related commands
show watchdog

1.11.2 show watchdog

Function
To show Watchdog status, use this command.

Format
show watchdog

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


149
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 1 Basic configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to show Watchdog status.
Raisecom#show watchdog
Watchdog function: Enable!

The following table describes fields in the command output.

Field Description
Watchdog function Watchdog status
Enable: Watchdog is enabled.
Disable: Watchdog is disabled.

Related commands
N/A

Raisecom Proprietary and Confidential


150
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

2 Ethernet

2.1 MAC
2.1.1 clear mac-address

Function
To clear entries in the MAC address table, use this command.

Format
clear mac-address{ all | blackhole | static }

Parameters
Parameter Description
all Clear all MAC address entries.
blackhole Clear blackhole MAC address entries.
dynamic Clear dynamic MAC address entries.
static Clear static MAC address entries.
vlan vlan-id Clear the MAC address entry from the specified VLAN.
The vlan-id is an integer ranging from 1 to 4094.

Default conditions
N/A

Command mode
Global configuration

Raisecom Proprietary and Confidential


151
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

User level
11

Usage guidelines
Scenario
You can use this command to clear all MAC address entries of specified type.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear information about related MAC address entries and they
cannot be recovered. Use it with caution.

Examples
This example shows how to clear all MAC address entries.
Raisecom#config
Raisecom(config)#clear mac-address all
Set successfully.

Related commands
N/A

2.1.2 clear mac-address dynamic

Function
To clear dynamic MAC address entries, use this command.

Format
clear mac-address dynamic { port-channel channel-number.sub-Interface ID | gigaethernet
interface-number | tengigaethernet interface-number | vlan vlan-id | mac-address}

Parameters
Parameter Description
port-channel channel- LAG interface ID, an integer, ranging from 1 to 8
number.sub-interface ID The sub-interface ID refers to sub-interface ID which is
an integer ranging from 1 to 4094.
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094

Raisecom Proprietary and Confidential


152
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
gigaethernet 1000 Mbit/s interface
ten interface gigaethernet 10 Gbit/s interface
mac-address Unicast MAC address, in dotted hexadecimal notation,
such as "000E.5E12.3456"

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to clear MAC address entries of specified type when maintaining
the MAC address table.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Deleting effective MAC address entries by mistake will affect the packet forwarding
performance. Use it with caution.

Examples
This example shows how to clear MAC address entries in VLAN 1.
Raisecom#config
Raisecom(config)#clear mac-address dynamic vlan 1
Set successfully.

Related commands
show mac-address

Raisecom Proprietary and Confidential


153
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

2.1.3 mac-address aging-time

Function
To configure the aging time of MAC address entries, use this command. To return to the
default condition, use the no form of this command.

Format
mac-address aging-time second
no mac-address aging-time

Parameters
Parameter Description
second Aging time, an integer, the value ranging from 0 to 1000000 or
10 to 1000000s among which 0 means no aging.

Default conditions
The aging time is 300s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The aging mechanism is for updating the MAC address table to solve the issue of its limited
capacity. When the MAC address table learns and creates a dynamic entry, the aging timer
starts timing; if the MAC address table does not receive the dynamic entry within the aging
time, the entry will be deleted; otherwise, the aging timer will restart timing.
To fully utilize the address forwarding table, we can use the aging mechanism to update the
MAC address table. However, the aging mechanism of the MAC address table only takes
effect when dynamic entries are involved.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Static MAC address entries will not be aged.

Raisecom Proprietary and Confidential


154
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Examples
This example shows how to configure the aging time of the MAC address to 600s.
Raisecom#config
Raisecom(config)#mac-address aging-time 600
Set successfully.

Related commands
show running-config

2.1.4 mac-address blackhole

Function
To create VLAN-based blackhole MAC address entries, use this command. To disable this
function, use the no form of this command.

Format
mac-address blackhole mac-address vlan vlan-id
no mac-address blackhole mac-address vlan vlan-id

Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
The blackhole MAC address entry can be regarded as a special static MAC address entry,
which does not have the aging time and needs to be added or deleted manually. When the
destination MAC address or source MAC address of the packet matches with the blackhole
MAC address table, the packet will be discarded. The blackhole MAC address entry is used
for preventing illegal users from sending or receiving packets, thus ensuring network security.

Raisecom Proprietary and Confidential


155
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When the MAC address is configured as a blackhole MAC address entry, packets with this
kind of source MAC address or destination MAC address will be discarded. Use it with
caution.

Examples
This example shows how to create a VLAN-based blackhole MAC address entry with the
MAC address of 000e.5e12.3456 and the attached VLAN of VLAN 3.
Raisecom#config
Raisecom(config)#mac-address blackhole 000e.5e12.3456 vlan 3
Set successfully.

Related commands
show mac-address blackhole

2.1.5 mac-address move-restrain enable

Function
To enable suppression on MAC address flapping globally, use this command. To disable this
function, use the disable form of this command.

Format
mac-address move-restrain { enable | disable }

Parameters
Parameter Description
enable Enable suppression on MAC address flapping globally.
disable Disable suppression on MAC address flapping globally.

Default conditions
The suppression on MAC address flapping globally is disabled.

Command mode
Global configuration

Raisecom Proprietary and Confidential


156
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

User level
11

Usage guidelines
Scenario
After suppression on MAC address flapping globally is enabled, interface 2 will not relearn
the MAC address if certain "MAC address + VLAN" is learned first on interface 1 and the
"source MAC address + VLAN" of the packet received on interface 2 is the same as the
"MAC address + VLAN" learned first on interface 1, which means that the original entries in
the MAC address table will not be covered. After receiving that kind of packets, interface 2
will report them to the CPU and discard them instead of forwarding them. If suppression on
MAC address flapping globally is disabled, MAC address flapping will occur and will not be
supressed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure enabling suppression on MAC address flapping
globally.
Raisecom#config
Raisecom(config)#mac-address move-restrain enable
Set successfully.

Related commands
N/A

2.1.6 mac-address learning enable

Function
To enable MAC address learning, use this command. To disable this function, use the disable
form of this command.

Format
mac-address learning { enable | disable }

Raisecom Proprietary and Confidential


157
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameter Description
enable Enable MAC address learning on the physical interface.
disable Disable MAC address learning on the physical interface.

Default conditions
The MAC address learning is enabled.

Command mode
VLAN configuration/Physical layer interface configuration/Aggregation group interface
configuration

User level
11

Usage guidelines
Scenario
Generally, dynamic MAC address entries are created and maintained by MAC address
learning.
When there are packets entering the interface, the device will look up to the MAC address
table for the interface associated with the destination MAC address of the packets, forward
packets out the associated interface, associate the source MAC address with the interface ID
and VLAN ID of the ingress interface, and record them to the MAC address table.
When packets on other interfaces are destined for that learned MAC address, the device can
forward the packets directly to the corresponding interface according to the MAC address
table. If the device does not find the corresponding interface for the packets with this
destination MAC address in the MAC address table, it will forward the packets out all
interfaces except the receiving interface and record the source MAC address to the MAC
address table.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable MAC address learning based on interface GE 1/1/1.
Raisecom#config

Raisecom Proprietary and Confidential


158
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Raisecom(config)#interface gigaethernet 1/1/1


Raisecom(config-gigaethernet1/1/1)#mac-address learning enable
Set successfully.

This example shows how to enable MAC address learning based on VLAN 2.
Raisecom#config
Raisecom(config)#vlan 2
Raisecom(config-vlan)#mac-address learning enable
Set successfully.

Related commands
show mac-address learning
show mac-address learning interface

2.1.7 mac-address threshold

Function
To configure the threshold of dynamic MAC address learning, use this command. To disable
this function, use the no form of this command.

Format
mac-address threshold threshold-value
no mac-address threshold

Parameters
Parameter Description
threshold threshold-value Threshold of dynamic MAC address learning, an integer,
ranging from 1 to 16383

Default conditions
N/A

Command mode
Physical interface configuration/Aggregation group interface configuration/VLAN
configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


159
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

You can use this command to configure dynamic MAC address learning threshold which is
based on the interface and VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure MAC address learning threshold to 200 based on
interface GE 1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mac-address threshold 200
Set successfully.

This example shows how to configure dynamic MAC address learning threshold to 300 based
on interface VLAN 2.
Raisecom#config
Raisecom(config)#vlan 2
Raisecom(config-vlan)#mac-address threshold 300 vlan 2
Set successfully.

Related commands
show mac-address threshold

2.1.8 mac-address multicast drop-unknown

Function
To configure an action for the MAC address table to drop unknown multicast packets, use this
command. To disable this function, use the no form of this command.

Format
mac-address multicast drop-unknown { reserved-address | vlan vlan-list }
no mac-address multicast drop-unknown { reserved-address | vlan vlan-list }

Parameters
Parameter Description

reserved-address Contain reserved address.

Raisecom Proprietary and Confidential


160
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
vlan vlan-list Forward unregistered multicast packets within VLAN.
The vlan-list is an integer ranging from 1 to 4094.
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".

Default conditions
The action is reserved-address.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to discard unknown multicast packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the action of discarding unknown multicast packets as
reserved-address.
Raisecom#config
Raisecom(config)#mac-address multicast drop-unknown reserved-address
Set successfully.

Related commands
show mac-address multicast

Raisecom Proprietary and Confidential


161
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

2.1.9 mac-address static

Function
To create static MAC address entries, use this command. To delete this configuration, use the
no form of this command.

Format
mac-address static
unicast mac-address vlan vlan-id interface-type interface-number
no mac-address static
unicast mac-address vlan vlan-id

Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
vlan-id VLAN ID, an integer, ranging from 1 to 4094
unicast Unicast address
interface-type Egress interface ID, an integer, ranging from 1 to the maximum
interface-number interface ID

Default conditions
The static MAC address is not configured.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
When the device automatically establishes a dynamic MAC address through source MAC
address learning, it cannot tell whether packets are from legal users or hackers, thus bringing
hidden danger. If hackers disguise the source MAC address of attack packets as the MAC
address of legal users and send the attack packets to the device through other interfaces, the
device will learn wrong MAC address entries and forward the packets (which should be
forwarded to users) to hackers.

Raisecom Proprietary and Confidential


162
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

To enhance the interface security, users can manually add static MAC address entries to the
MAC address table and bind the device with the interface, thus preventing hackers from
stealing data illegally.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to create static MAC entries with unicast MAC address
0001.0001.0001, attached VLAN 1, and egress interface 1/1/1.
Raisecom#config
Raisecom(config)#mac-address static unicast 0001.0001.0001 vlan 1
gigaethernet1/1/1
Set successfully.

Related commands
show mac-address static

2.1.10 search mac-address

Function
To show MAC address entries, use this command.

Format
search mac-address mac-address { all | dynamic | static } [ interface-type interface-number ]
[ vlan vlan-id ]

Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
all Show all types of MAC address.
dynamic Show dynamic MAC address.
static Show static MAC address.

Raisecom Proprietary and Confidential


163
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
interface-type interface- Interface ID
number The interface-type refers to interface type.
The interface-number refers to three-dimensional
interface ID.
vlan Show MAC address entries of specified VLAN.
vlan-id VLAN ID, an integer, ranging from 1 to 4094

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to show MAC address entries, if found, information about "MAC
address, interface, VLAN, and flag." will be displayed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show information about the entry with MAC address of
F04D.A22D.7805 in the MAC address table.
Raisecom#config
Raisecom#search mac-address F04D.A22D.7805 all
Mac Address Port Vlan Flags
---------------------------------------------------
F04D.A22D.7805 port 1 1 dynamic

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


164
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Field Description
Mac Address MAC address showed
Port Interface ID
Vlan VLAN ID
Flags Type of MAC address entries
dynamic: dynamic entries with aging time
static: static entries without aging time

Related commands
N/A

2.1.11 show mac-address aging-time

Function
To show the aging time of the MAC address, use this command.

Format
show mac-address aging-time

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the aging time of the MAC address.
Raisecom#show mac-address aging-time
Aging time: 300 seconds

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


165
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Field Description
Aging time Aging time of the MAC address

Related commands
mac-address aging-time

2.1.12 show mac-address count

Function
To show the number of MAC address entries, use this command.

Format
show mac-address count [ vlan vlan-id ] [ interface-type interface-number ]

Parameters
Parameter Description
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the number of MAC address entries of VLAN 2.
Raisecom#show mac-address count vlan 2
Dynamic MAC address count of VLAN 2: 0
Static MAC address count of VLAN 2: 3

Raisecom Proprietary and Confidential


166
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Blackhole MAC address count of VLAN 2: 0


Other MAC address count of VLAN 2: 0
Total MAC address count of VLAN 2: 3

The following table describes fields in the command output.

Field Description
Dynamic MAC address count of VLAN 2 Number of dynamic MAC addresses of
VLAN 2
Static MAC address count of VLAN 2 Number of static MAC addresses of
VLAN 2
Blackhole MAC address count of VLAN 2 Number of blackhole MAC addresses of
VLAN 2
Other MAC address count of VLAN 2 Number of other MAC addresses of
VLAN 2
Total MAC address count of VLAN 2 Total number of MAC addresses of VLAN
2

Related commands
mac-address static

2.1.13 show mac-address learning

Function
To show the enabled state of MAC address automatic learning, use this command.

Format
show mac-address learning vlan-list
show mac-address learning [ interface-type interface-number ]

Parameters
Parameter Description
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "2,3,4"; it also supports a range,
such as "2-4".
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Raisecom Proprietary and Confidential


167
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Command mode
Any configuration except user EXEC

Command level
5

Usage guidelines
N/A

Examples
This example shows how to show the enabled state of MAC address learning on interfaces.
Raisecom#show mac-address learning

port mac-learning-status
-----------------------------------------------
gigaethernet1/1/1 enable
gigaethernet1/1/2 enable
gigaethernet1/1/3 enable
gigaethernet1/1/4 enable
gigaethernet1/1/5 enable
gigaethernet1/1/6 enable
gigaethernet1/1/7 enable
gigaethernet1/1/8 enable
gigaethernet1/1/9 enable

Related commands
N/A

2.1.14 show mac-address threshold

Function
To show configurations about the limit on the number of MAC address learning, use this
command.

Format
show mac-address threshold { interface-type interface-number | vlan-list }

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Raisecom Proprietary and Confidential


168
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
vlan-list VLAN ID, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations about the threshold on the number of MAC
address learning.
Raisecom#show mac-address threshold

port macthresholdvlan macthreshold

--------------------------------------------------------

gigaethernet1/1/1 N/A N/A

gigaethernet1/1/2 N/A N/A

gigaethernet1/1/3 N/A N/A

gigaethernet1/1/4 N/A N/A

gigaethernet1/1/5 N/A N/A

gigaethernet1/1/6 N/A N/A

gigaethernet1/1/7 N/A N/A

gigaethernet1/1/8 N/A N/A

gigaethernet1/1/9 N/A N/A

The following table describes fields in the command output.

Field Description
port Interface type and interface ID

Raisecom Proprietary and Confidential


169
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Field Description
thredshold Threshold on the number of MAC address learning

Related commands
N/A

2.1.15 show mac-address multicast

Function
To show multicast MAC address entries, use this command.

Format
show mac-address multicast [ vlan vlan-id ] [ count ]

Parameters
Parameter Description
vlan Show MAC address entries of the specified VLAN.
vlan-id VLAN ID, an integer, ranging from 1 to 4094
count Show statistics.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use the following commands to show multicast MAC address entries:
Use the show mac-address-table multicast command to show multicast MAC address
entries of all VLANs.
Use the show mac-address-table multicast vlan vlan-id command to show multicast
MAC address entries of the specified VLAN.
Use the show mac-address-table multicast count command to show statistics of
multicast MAC address entries of all VLANs.

Raisecom Proprietary and Confidential


170
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Use the show mac-address-table multicast vlan vlan-id count command to show
statistics of multicast MAC address entries of the specified VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to multicast MAC address entries.
Raisecom#show mac-address multicast
Multicast filter mode: flood-all.
Vlan Group Address Ports[Static](Hardware)
-------------------------------------------------------
3 0100.5E05.0600 port 1 [port 1]

The following table describes fields in the command output.

Field Description
Multicast filter mode Action taken for filtering multicast packets according to
the MAC address table
Filter-all: discard unregistered multicast packets
Flood-all: flood unregistered multicast packets
Vlan Attached VLAN
Group Address Multicast address
Ports[Static] (Hardware) Egress interface

This example shows how to show statistics of multicast MAC address entries.
Raisecom#show mac-address multicast count
Filter mode for unknown multicast: flood all
Current multicast address entries for all vlans: 0
Max count of multicast address entries supported by hardware:102

The following table describes fields in the command output.

Field Description
Filter mode for unknownn multicast Action taken for filtering multicast packets
according to the MAC address table
Filter-all: discard unregistered multicast packets
Flood-all: flood unregistered multicast packets
Current multicast address entries for Number of current multicast address entries
all vlans

Raisecom Proprietary and Confidential


171
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Field Description
Max count of multicast address Maximum number of multicast addresses
entries supported by hardware supported by hardware

Related commands
N/A

2.1.16 show mac-address

Function
To show MAC address entries, use this command.

Format
show mac-address { all | static | dynamic } [ vlan vlan-id ] [ interface-type interface-
number ]

Parameters
Parameter Description
all Show all MAC address entries.
static Show static MAC address entries.
dynamic Show dynamic MAC address entries.
blackhole Show blackhole MAC address entries.
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
mac-address mac-address MAC address, in dotted hexadecimal notation, such as
"000E.5E12.3456"

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


172
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Usage guidelines
N/A

Examples
This example shows how to show static MAC address entries of VLAN 2.
Raisecom#show mac-address static vlan 2
Port Vlan Static Mac Address Priority Mac-policy None-Rate-Limit
----------------------------------------------------------------
Tu2 2 000E.5E12.3410 -- Disable --
Lo2 2 000E.5E12.3411 -- Disable --
Lo2 2 000E.5E12.3458 -- Disable --

The following table describes fields in the command output.

Field Description
Port Interface ID
Vlan VLAN
Static Mac Address Static MAC address
Priority Priority
Mac-policy MAC address policy
None-Rate-Limit Non rate-limiting policy

Related commands
mac-address static

2.2 VLAN
2.2.1 create vlan

Function
To create VLAN, use this command. To delete VLAN, use the no form of this command.

Format
create vlan vlan-list active
no vlan { all | vlan-list }

Raisecom Proprietary and Confidential


173
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameter Description
vlan vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "2,3,4"; it also supports a
range, such as "2-4".
active VLAN is in an active status, which allows packets to pass.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The Virtual Local Area Network (VLAN) is a network integrating all hosts with same
properties, which shares same features with the common physical LAN.
Different hosts in the VLAN can be located at different physical locations, which can break
the limitations of traditional LAN. Different VLANs are independent and isolated from each
other, which can prevent the dissemination of broadcast storm and is conducive to the
network safety management. The internetworking between VLANs can be only realized
through switching boards or routers. You can use this command to create the static VLAN and
concurrently configure the VLAN status and priority.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to create and activate VLAN 4.
Raisecom#config
Raisecom(config)#create vlan 4 active
Set successfully

Raisecom Proprietary and Confidential


174
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Related commands
show vlan

2.2.2 name

Function
To configure the VLAN name, use this command. To return to the default condition, use the
no form of this command.

Format
name vlan-name
no name

Parameters
Parameter Description
vlan-name VLAN name, a string of 1 to 32 characters

Default conditions
The VLAN name is in form of character string "VLAN plus 4-bit VLAN ID". For example,
the default name of VLAN 10 is "VLAN0010"; the default name of VLAN 4094 is
"VLAN4094".

Command mode
VLAN configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the VLAN name to show its specific meaning to
facilitate you in distinguishing and understanding it. For example, the VLAN name of certain
human resource department can be configured as "HR".
Prerequisite
VLAN is created by using the create vlan command.
Use the vlan command to enter VLAN configuration mode.
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


175
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

N/A

Examples
This example shows how to configure the name of VLAN 10 as "HR".
Raisecom#config
Raisecom(config)#create vlan 10 active
Raisecom(config)#vlan 10
Raisecom(config-vlan)#name HR
Set successfully

This example shows how to restore the name of VLAN 10 to the default condition.
Raisecom(config-vlan)#no name
Set successfully

Related commands
show vlan

2.2.3 show vlan

Function
To show configurations and status of all VLANS or the specified VLAN, use this command.

Format
show vlan [ vlan-list | static | dynamic ] detail

Parameters
Parameter Description
vlan-list VLAN ID list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
static Show the static VLAN.
dynamic Show GVRP dynamic VLAN.
detail Show details.

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


176
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configuration and status of VLAN 2.
Raisecom#show vlan 2
Switch Mode: --
VLAN Name State Status Priority Member-Ports
2 VLAN0002 active static

The following table describes fields in the command output.

Field Description
VLAN VLAN ID
Name Name
State State
Status Property
Priority Priority
Member-Ports Member interfaces

Related commands
create vlan
state

2.2.4 show switchport interface

Function
Show switching configurations on the interface, use this command.

Format
show switchport interface interface-type interface-number

Parameters
Parameter Description
interface-type Interface type

Raisecom Proprietary and Confidential


177
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show switching configurations of the 1000 Mbit/s interface (rack
1/slot 3/interface 1).
Raisecom#show switchport interface gigaethernet 1/1/1
Interface: gigaethernet1/1/1
Switch Mode: router
Reject frame type: none
Administrative Mode: access
Operational Mode: access
Access Mode VLAN: 0
Administrative Access Egress VLANs:
Operational Access Egress VLANs:
Trunk Native Mode VLAN: 0
Administrative Trunk Allowed VLANs:
Operational Trunk Allowed VLANs:
Administrative Trunk Untagged VLANs:
Operational Trunk Untagged VLANs:
Administrative private-vlan host-association:
Administrative private-vlan mapping:
Operational private-vlan: --

The following table describes fields in the command output.

Field Description
Interface Interface
Switch Mode Switching mode
Reject frame type Packets which are forbidden in the egress
direction

Raisecom Proprietary and Confidential


178
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Field Description
Administrative Mode Administrative mode
Operational Mode Operational mode
Access Mode VLAN Interface Access VLAN
Administrative Access Egress VLANs Egress VLAN list that are allowed to pass in
Access mode of administrative status
Operational Access Egress VLANs Egress VLAN list that are allowed to pass in
Access mode of operating status
Trunk Native Mode VLAN Native VLAN of Trunk interface
Administrative Trunk Allowed VLANs VLAN that are allowed to pass in Trunk mode
of administrative status
Operational Trunk Allowed VLANs VLAN that are allowed to pass in Trunk mode
of operating status
Administrative Trunk Untagged VLANs Untagged VLAN list that are allowed to pass
in Trunk mode of administrative status
Operational Trunk Untagged VLANs Untagged VLAN list that are allowed to pass
in Trunk mode of operating status
Administrative private-vlan host- Master/slave VLAN association in PVLAN of
association administrative status
Administrative private-vlan mapping Master/slave VLAN mapping in PVLAN of
administrative status
Operational private-vlan Master/slave VLAN in PVLAN of operational
status

Related commands
N/A

2.2.5 switchport access vlan

Function
To configure the interface as Access VLAN, use this command. To return to the default
condition, use the no form of this command.

Format
switchport access vlan vlan-id
no switchport access vlan

Raisecom Proprietary and Confidential


179
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameter Description
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
The Access interface tags default VLAN Tags for Untagged packets and
accepts Tagged packets whose tags are the same as that of the default
VLAN but refuses Tagged packets whose tags are different from that of
the default VLAN.

Default conditions
All interfaces are Access VLAN 1.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
When the interface is configured to Access, you need to use this command to configure
interface Access VLAN. When the VLAN Tag of the packet is the same as that of the Access
VLAN, it will be allowed to pass.
Prerequisite
You can use the portswitch command to switch the interface from the Layer 3 physical
interface mode to Layer 2 physical interface mode.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface GE 1/1/1 as Access interface and configure
the Access VLAN to VLAN 100.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport access vlan 100
Set successfully.

Related commands
show switchport interface

Raisecom Proprietary and Confidential


180
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

switchport mode

2.2.6 switchport access egress-allowed vlan

Function
To configure the VLAN list allowed to pass through Access interface, use this command. To
return to the default condition, use the no form of this command.

Format
switchport access egress-allowed vlan { all | vlan-list } [ confirm ]
switchport access egress-allowed vlan { add | remove } vlan-list
no switchport access egress-allowed vlan

Parameters
Parameter Description
all Access interface allows all VLANs to pass.
vlan-list VLAN list allowed to pass through Access interface, an integer,
ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
confirm Confirmed
add Add VLANs which are allowed to pass through the interface to
the old VLAN list.
remove Delete VLANs which are allowed to pass through the interface
from the old VLAN list.

Default conditions
N/A

Command mode
Physical interface configuration/Aggregation group interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the VLAN list allowed to pass through the interface
in Access mode. The VLAN allowed to pass through the interface in Access mode are all

Raisecom Proprietary and Confidential


181
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Untagged VLAN. This configuration is only effective to static VLAN but ineffective to
cluster VLANs and GVRP dynamic VLAN.
Prerequisite
The interface is configured as Access mode through the switchport mode access command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface GE 1/1/1 as Access interface and configure it
to allow VLAN 100 and VLAN 200 to pass.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport access egress-allowed vlan
100,200
Please input 'y' to confirm set allowed vlan: y
Set successfully.

Related commands
show switchport interface
switchport mode

2.2.7 switchport mode

Function
To configure the current interface to Access mode or Trunk mode, use this command. To
return to the default condition, use the no form of this command.

Format
switchport mode { access | trunk | private-vlan }
no switchport mode

Parameters
Parameter Description
access Configure the interface to Access mode.
trunk Configure the interface to Trunk mode.
private-vlan Configure the interface as a private VLAN.

Raisecom Proprietary and Confidential


182
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
All interfaces are in Access mode.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure interface modes.
Prerequisite
You can use the portswitch command to switch the interface from the Layer 3 physical
interface mode to Layer 2 physical interface mode.

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface GE 1/1/1 to Access mode.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport mode access
Set successfully.

Related commands
show switchport interface

2.2.8 switchport trunk allowed vlan

Function
To configure VLAN lists allowed on the Trunk interface, use this command. To return to the
default condition, use the no form of this command.

Format
switchport trunk allowed vlan { all | vlan-list } [ confirm ]

Raisecom Proprietary and Confidential


183
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

switchport trunk allowed vlan { add | remove } vlan-list


no switchport trunk allowed vlan

Parameters
Parameter Description
all All VLANs are allowed.
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
confirm Confirmed
add Add VLANs allowed on the Trunk interface to the old VLAN
list.
remove Delete VLANs allowed on the Trunk interface from the old
VLAN list.

Default conditions
VLAN 1 is allowed to pass.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure VLAN lists allowed by the interface in Trunk mode,
namely, Trunk allowed list. Trunk allowed list is a reference for the Trunk interface on how to
handling packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


184
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Examples
This example shows how to configure interface GE 1/1/1 as Trunk interface which allows
VLAN 100 and VLAN 200 to pass.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport trunk allowed vlan 100,200
Please input 'y' to confirm set allowed vlan:[y]y
Set successfully.

Related commands
show switchport interface

2.2.9 switchport trunk native vlan

Function
To configure the Native VLAN of the Trunk interface, use this command. To return to the
default condition, use the no form of this command.

Format
switchport trunk native vlan vlan-id
no switchport trunk native vlan

Parameters
Parameter Description
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094

Default conditions
The Native VLAN of Trunk interface is VLAN 1, it means only VLAN 1 is allowed to pass.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the Native VLAN of the Trunk interface. Native
VLAN is a reference for the Trunk interface on how to handling packets.

Raisecom Proprietary and Confidential


185
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

By default, the Native VLAN is VLAN 0. And this default Native VLAN is called default
VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface GE 1/1/1 as Trunk interface and VLAN 100
as Native VLAN.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport trunk native vlan 100
Set successfully.

Related commands
show switchport interface

2.2.10 switchport trunk untagged vlan

Function
To configure Untagged VLAN lists allowed on the interface in Trunk mode, use this
command. To return to the default condition, use the no form of this command.

Format
switchport trunk untagged vlan { all | vlan-list } [ confirm ]
switchport trunk untagged vlan { add | remove } vlan-list
no switchport trunk untagged vlan

Parameters
Parameter Description
all The VLAN Tag of Tagged packets sent by all Trunk interfaces are stripped
and the packets turn into untagged frames.
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range, such as
"1-3".
confirm Confirmed

Raisecom Proprietary and Confidential


186
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
add Add VLAN whose Tag needs to be stripped to the old VLAN list.
remove Delete VLAN whose Tag needs to be stripped from the old
VLAN list.

Default conditions
No Tags of VLANs are stripped except that of Native VLAN.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the Untagged VLAN list allowed on the Trunk
interface, namely, the Trunk untagged list. The Trunk untagged list is a reference for the
Trunk interface on how to handle packets. For details, see the switchport mode command.
You can also configure this command even when the interface is not in Trunk mode.
Prerequisite
You can use the portswitch command to switch the interface from the Layer 3 physical
interface mode to Layer 2 physical interface mode.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure Untagged VLAN lists allowed on interface GE 1/1/1 in
Trunk mode to VLAN 100 and VLAN200.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport trunk untagged vlan 100,200
Please input 'y' to confirm set allowed vlan:[y]y
Set successfully.

Related commands
show switchport interface

Raisecom Proprietary and Confidential


187
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

2.2.11 vlan

Function
To enter VLAN configuration mode and create VLAN automatically if it is not created, use
this command. To delete the specified VLAN, use the no form of this command.

Format
vlan vlan-id
no vlan { all | vlan-id }

Parameters
Parameter Description
vlan-id VLAN ID, an integer, ranging from 1 to 4094
all All VLANs (except the default VLAN)

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to enter VLAN configuration mode and configure a VLAN. If the
VLAN is not created, it will be created automatically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enter the configuration mode of VLAN 100.

Raisecom Proprietary and Confidential


188
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Raisecom#config
Raisecom(config)#vlan 100
Raisecom(config-vlan)#

Related commands
show vlan state

2.3 QinQ
2.3.1 dot1q-tunnel

Function
To enable basic QinQ on the interface, use this command. To disable this function on the
interface, use the no form of this command.

Format
dot1q-tunnel
no dot1q-tunnel

Parameters
N/A

Default conditions
Disabled

Command mode
Interface configuration

User level
11

Usage guidelines
Scenario
Basic QinQ is a simple Layer 2 VPN tunnel technology. It encapsulates outer VLAN Tag in
the private packets at the access side of the carrier, making the packets with double VLAN
Tag traverse the carrier backbone network. In the public network, packets are transmitted
according to their outer VLAN Tag while the private network VLAN Tag is transmitted as
part of the packet.
Prerequisite
N/A

Raisecom Proprietary and Confidential


189
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable basic QinQ on the interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#dot1q-tunnel
Set successfully.

Related commands
show switchport qinq

2.3.2 tpid

Function
To configure the TPID for the outer VLAN Tag, use this command. To return to the default
condition, use the no form of this command.

Format
tpid tpid
no tpid

Parameters
Parameter Description
tpid TPID value, in dotted hexadecimal notation, an integer, ranging from
0x0600 to 0xFFFF

Default conditions
The TPID of the outer VLAN Tag is 0x8100 which means that the packet is 802.1q protocol
packet.

Command mode
Physical layer interface configuration mode

User level
11

Raisecom Proprietary and Confidential


190
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Usage guidelines
Scenario
To interwork devices from different vendors, the protocol type of the outer VLAN Tag on the
QinQ interface should be recognizable by the device connected to the QinQ interface.
The TPID value is generally configured on the network-side interface, which is for specifying
the TPID value adopted by carriers.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the TPID value of the outer VLAN Tag to 0x1000.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)# tpid 9100
Set successfully.

Related commands
N/A

2.3.3 switchport reject-frame

Function
To configure the packet type which is forbidden by the interface, use this command. To
disable this function, use the no form of this command.

Format
switchport reject-frame { tagged | untagged }
no switchport reject-frame

Parameters
Parameter Description

tagged Packets with Tags


untagged Packets without Tags

Raisecom Proprietary and Confidential


191
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
After the command is configured, the responding packets will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When the interface is enabled with QinQ, all packets will be treated as Untagged packets. If
you configure the function of discarding Untagged packets at the same time, the Tagged
packets will be discarded either.

Examples
You can use this command to configure the interface to forbid forwarding packets with Tag.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport reject-frame tagged
Set successfully.

Related commands
show interface switchport

2.3.4 switchport vlan-mapping cvlan add-outer

Function
To configure the selective QinQ based on the user VLAN and add the outer VLAN to the
packet according to its inner VLAN, use this command. To disable this function, use the no
form of this command.

Raisecom Proprietary and Confidential


192
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Format
switchport vlan-mapping cvlan { custom-vlan-list | custom-vlan-id }[ cos cos-value ] add-
outer outer-vlan-id
no switchport vlan-mapping cvlan [ custom-vlan-list ]

Parameters
Parameter Description
cvlan custom-vlan-list User VLAN ID list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also
supports a range, such as "1-3".
add-outer outer-vlan-id Added outer VLAN ID, an integer, ranging from 1 to
4094
cos cos-value CoS value corresponding to the inner Tag, an integer,
ranging from 0 to 7

Default conditions
The selective QinQ on the interface is disabled.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
The selective QinQ is an enhanced application of basic QinQ, which can be used to add
different outer VLAN Tags to packets received on the same interface according to their inner
VLAN Tags.
Compared with the selective QinQ, the basic QinQ has limitations, for example, it tags
packets received on the same interface with the same VLAN Tags.
You can use the following commands to achieve different goals:
Use the switchport vlan-mapping cvlan custom-vlan-list add-outer outer-vlan-id
command to configure the selective QinQ to add the outer VLAN ID to the packet
according to its inner VLAN.
Use the switchport vlan-mapping cvlan custom-vlan-id [ cos cos-value ] add-outer
outer-vlan-id [ cos cos-value ] command to configure the selective QinQ to add the outer
VLAN ID to the packet according to its inner VLAN and modify the CoS value of both
the inner and outer VLAN.
Use the switchport vlan-mapping cvlan custom-vlan-id add-outer outer-vlan-id
[ translate custom-vlan-id ] command to configure the selective QinQ to add the outer

Raisecom Proprietary and Confidential


193
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

VLAN ID to the packet according to its inner VLAN and convert the packet's inner
VLAN ID.
Use the switchport vlan-mapping cvlan custom-vlan-id add-outer outer-vlan-id
[ remove ] command to configure the selective QinQ to add the outer VLAN ID to the
packet according to its inner VLAN and delete the packet's inner VLAN.
Use the switchport vlan-mapping cvlan custom-vlan-id [ cos cos-value ] add-outer
outer-vlan-id [ cos cos-value ] [ remove ] command to configure the selective QinQ to
add the outer VLAN ID to the packet according to its inner VLAN, configure the CoS
value of the inner and outer VLAN, and delete the inner VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not configure the QinQ and VLAN mapping concurrently on the interface.
The cos cos-value command and the translate custom-vlan-id command cannot be configured
concurrently, and so are the cos cos-value command and the remove command.

Examples
This example shows how to add outer VLAN Tag 77 to the packet with inner VLAN Tag 7
and configure the value of CoS to 3 on interface 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping cvlan 7 add-
outer 77 cos 3
Set successfully.

Related commands
show switchport vlan-mapping add-outer

2.3.5 switchport vlan-mapping ethertype add-outer

Function
To configure adding the TAG VLAN mapping rule based on the selective QinQ of EtherType,
use this command. To disable this function, use the no form of this command.

Format
switchport vlan-mapping ethertype { arp | eapol | flowcontro l ip | ipv6 | loopback | mpls
| mpls-mcast | pppoe | pppoedisc | user-define protocol id | x25 | x75 }add-outer outer-
vlan-id
no switchport vlan-mapping ethertype { arp | eapol | flowcontro l ip | ipv6 | loopback |
mpls | mpls-mcast | pppoe | pppoedisc | user-define protocol id | x25 | x75 }

Raisecom Proprietary and Confidential


194
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameters Description
arp Address resolution protocol
eapol EAPOL PAE/802.1x protocol
flowcontrol 802.3x flow control protocol
ip Internet protocol
ipv6 IP version 6
loopback Loop protocol
mpls MPLS unicast protocol
mpls-mcast MPLS multicast protocol
pppoe PPPOE session protocol
pppoedisc PPPOE discovery protocol
x25 X.25 Layer 3 protocol
x75 X.75 interconnection protocol
user-define User-defined protocol number
protocol id
add-outer outer- Added outer layer VLAN ID, an integer, ranging from 1 to 4049
vlan-id

Default conditions
The selective QinQ on the interface is disabled.

Command mode
Physical interface configuration

User level
11

Usage guidelines
Scenario
In physical interface configuration mode, you can use this command to configure adding the
TAG VLAN mapping rule based on the selective QinQ of EtherType.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


195
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

N/A
Precaution
The number of VLAN mapping rules cannot exceed the threshold. As for the same interface,
if the VLAN list in VLAN mapping rules conflicts with the existed VLAN mapping rules,
configurations will fail; if the VLAN added according to VLAN mapping rules is repetitive,
then the newly configured VLAN mapping rule will override the old one.

Examples
This example shows how to configure the selective QinQ based on EtherType with a mapping
rule of map the internal ARP to VLAN 2.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping ethertype arp
add-outer 2
Set successfully.

Related commands
show interface switchport

2.3.6 switchport vlan-mapping-miss discard

Function
To configure discarding Tagged packets which do not match with the selective QinQ or
VLAN mapping rules on the interface, use this command. To disable this function, use the no
form of this command.

Format
switchport vlan-mapping-miss discard
no switchport vlan-mapping-miss

Parameters
N/A

Default conditions
N/A

Command mode
Physical layer interface configuration/Aggregation group configuration

User level
11

Raisecom Proprietary and Confidential


196
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Usage guidelines
Scenario
You can use this command to configure the interface to filter Tagged packets according to the
selective QinQ or VLAN mapping rules to control packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If not configured with the selective QinQ or VLAN mapping rules, the interface will discard
all Tagged packets upon being configured with this feature.

Examples
This example shows how to configure the interface to discard Tagged packets which do not
match with the selective QinQ or VLAN mapping rules.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)# switchport qinq dot1q-tunnel default-
cvlan 2
Set successfully.

Related commands
show switchport vlan-mapping translate

2.3.7 switchport qinq dot1q-tunnel default-cvlan

Function
To enable basic QinQ on the interface, add double TAG, and specify CVLAN and SVLAN to
use PVID, use this command. To disable this function, use the no form of this command.

Format
switchport qinq dot1q-tunnel default-cvlan vlan-id
no switchport qinq dot1q-tunnel default-cvlan vlan-id

Parameters
Parameter Description
vlan-id User VLAN ID, an integer, ranging from 1 to 4094

Raisecom Proprietary and Confidential


197
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
N/A

Command mode
Physical layer interface configuration/Aggregation group configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure the default user VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure VLAN 2 as the default user VLAN.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)# switchport qinq default-cvlan 2
Set successfully.

Related commands
show switchport vlan-mapping translate

2.3.8 switchport vlan-mapping both add-outer

Function
To configure the rules of adding outer VALN bidirectionally, use this command. To disable
this function, use the no form of this command.

Format
switchport vlan-mapping both{ priority-tagged | cvlan custom-vlan-list | custom-vlan-
id }add-outer outer-vlan-id {remove | translate vlan-id }
switchport vlan-mapping both { untag | inner inner -vlan-id }add-outer outer-vlan-id

Raisecom Proprietary and Confidential


198
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

no switchport vlan-mapping both { priority-tagged | cvlan custom-vlan-list | custom-vlan-


id }
no switchport vlan-mapping both untag | inner inner -vlan-id }

Parameters
Parameter Description
cvlan custom-vlan- User VLAN ID list, an integer, ranging from 1 to 4094.
list It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
add-outer outer- Add outer VLAN ID, an integer, ranging from 1 to 4094
vlan-id
remove Remove inner Tag.
Translate vlan-id Modify VLAN ID of inner Tag, an integer, ranging from 1 to 4094
inner -vlan-id Inner VLAN ID, an integer, ranging from 1 to 4094
untag Without tags

Default conditions
Disabled

Command mode
Physical layer interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
The bidirectional selective QinQ is an enhanced application of basic QinQ, which can be used
to add different outer VLAN Tags to packets received on the same interface according to their
inner VLAN Tags.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.

Raisecom Proprietary and Confidential


199
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Examples
This example shows how to add outer VLAN Tag 77 to user VLAN Tag packets 7 on GE1/1/1
interface and modify inner Tag as follows.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping cvlan 7 add-
outer 77 translate 3
Set successfully.

2.3.9 show vlan-mapping both interface

Function
To show bidirectional QinQ configurations on the interface, use this command.

Format
show vlan-mapping both interface interface-type interface-number

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show VLAN mapping rules on interface 1/1/2.
Raisecom# show vlan-mapping both interface gigaethernet 1/1/1
Both Direction VLAN QinQ mapping rule:
Interface : GE1/1/2
Default cvlan: --
--------------------------------

Raisecom Proprietary and Confidential


200
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Hardware-IngressID: 0
Hardware-EgressID: 0
Original Outer VLANs: --
Original Outer COS: --
Original Inner VLANs: --
Original Inner COS: --
Vlan mapping Mode: C-UNTAG-S-ADD
New Outer-VID: 1
New Outer-COS: --
New Inner-VID: --
New Inner-COS: --
---------------------------

The following table describes fields in the command output.

Field Description
Interface Interface ID
Default cvlan Default port cvlan
Hardware-IngressID Ingress hardware ID
Hardware-EgressID Egress hardware ID
Original Outer VLANs Original Outer VLANs
Original Outer COS Original Outer COS
Original Inner VLANs Original Inner VLANs
Vlan mapping Mode Translation action
New Outer-VID Translated outer VID
New Outer-COS Translated outer COS
New Inner-VID Translated inner VID
New Inner-COS Translated inner COS

Related commands
N/A

2.3.10 show vlan-mapping interface

Function
To show QinQ configurations on the interface, use this command.

Format
show vlan-mapping interface interface-type interface-number{ add-outer | egress translate
| ingress translate }

Raisecom Proprietary and Confidential


201
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
add-outer Add outer Tag.
egress translate Egress translation
ingress translate Ingress translation

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show QinQ ingress rules on interface 1/1/2.
Raisecom# show vlan-mapping interface gigaethernet 1/1/8 ingress
translate
Based outer-inner VLAN QinQ mapping rule:
-----------------------------------------
Interface : gigaethernet1/1/8
Hardware-ID: 2
Original Outer VLANs: 10
Original Outer COS: --
Original Inner VLANs: --
Original Inner COS: --
Outer-tag Mode: Translate
New Outer-VID: 20
New Outer-COS: --
Inner-tag Mode: --
New Inner-VID: --

New Inner-COS: --
The following table describes fields in the command output.

Raisecom Proprietary and Confidential


202
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Field Description
Interface Interface ID
Hardware-ID Hardware-ID
Original Outer VLANs Original Outer VLAN
Original Outer COS Original Outer CoS
Original Inner VLAN Original inner VLAN
Original Inner COS Original Inner CoS
New VLAN Outer-VID Translated outer VLAN
New Inner-VID Translated inner VLAN
New Inner-VID Translated inner VLAN
New Inner-COS Translated inner CoS

Related commands
N/A

2.3.11 show dot1q-tunnel

Function
To show configurations of basic QinQ on the interface, use this command.

Format
show dot1q-tunnel

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


203
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

You can use this command to show configurations of basic QinQ on the interface, including
outer Tag TPID and basic QinQ status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show basic QinQ configuration.
Raisecom#show dot1q-tunnel
Interface QinQ Status Outer TPID on port Cos override Vlan-map-miss
drop
-------------------------------------------------------------------------
---
PC1 -- 0x8100 -- --
PC2 -- 0x8100 -- --
GE1/1/1 -- 0x8100 -- --
GE1/1/2 -- 0x8100 -- --
GE1/1/3 -- 0x8100 -- --
GE1/1/4 -- 0x8100 -- --
GE1/1/5 -- 0x8100 -- --
GE1/1/6 -- 0x8100 -- --
GE1/1/7 -- 0x8100 -- --
GE1/1/8 -- 0x8100 -- --
GE1/1/9 -- 0x8100 -- --
GE1/1/10 -- 0x8100 -- --
GE1/1/11 -- 0x8100 -- --
GE1/1/12 -- 0x8100 -- --
GE1/1/13 -- 0x8100 -- --
GE1/1/14 -- 0x8100 -- --
GE1/1/15 -- 0x8100 -- --
GE1/1/16 -- 0x8100 -- --
GE1/1/17 -- 0x8100 -- --
GE1/1/18 -- 0x8100 -- --
GE1/1/19 -- 0x8100 -- --
GE1/1/20 -- 0x8100 -- --
GE1/1/21 -- 0x8100 -- --
GE1/1/22 -- 0x8100 -- --
GE1/1/23 -- 0x8100 -- --
GE1/1/24 -- 0x8100 -- --
TGE1/1/25 -- 0x8100 -- --
TGE1/1/26 -- 0x8100 -- --
TGE1/1/27 -- 0x8100 -- --
TGE1/1/28 -- 0x8100 -- --
Notice: Only 2 TPID values can be used as outer TPID on ports(Except
0x8100 and 0x9100),
Already used 0 TPID values: --, left:2 TPID value can be use.

Raisecom Proprietary and Confidential


204
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

The following table describes fields in the command output.

Field Description
Interface Interface ID
QinQ Status Basic QinQ status
Dot1q-tunnel: basic QinQ is enabled.
--: neither basic QinQ nor double Tag is enabled.
Outer TPID on por Outer tag TPID on the port
Cos override Override the COS value.
Vlan-map-miss drop VLAN map miss drop

Related commands
N/A

2.4 VLAN mapping


2.4.1 switchport vlan-mapping translate

Function
To configure VLAN mapping rules based on outer Tag and only translating outer VLAN, use
this command. To disable this function, use the no form of this command.

Format
switchport vlan-mapping {egress |ingress } outer-vlan-id translate outer-new-vlan-id
no switchport vlan-mapping {egress |ingress } translate outer-new-vlan-id

Parameters
Parameter Description
outer-vlan-id Outer VLAN ID, an integer, ranging from 1 to 4094
egress In egress direction
ingress In ingress direction
outer-new-vlan-id Translated outer VLAN ID, an integer, ranging from 1 to 4094

Default conditions
N/A

Raisecom Proprietary and Confidential


205
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Command mode
Physical layer interface configuration/Aggregation group configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure VLAN mapping rules based on outer VLAN rules.
The device judges whether the VLAN is the outer VLAN by the first VLAN Tag of the packet.
If the TPID is the same as the user-defined TPID, the VLAN will be regarded as the outer
VLAN and will be translated according to the specified rules. Otherwise, the device will
ignore it.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.

Examples
This example shows how to configure VLAN mapping rules in the ingress direction of
interface 1 and translate the VLAN ID of the outer VLAN to 3 based on VLAN ID 2.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping ingress outer
2 translate 3
Set successfully.

Related commands
show switchport vlan-mapping translate

2.4.2 switchport vlan-mapping ingress outer inner translate

Function
To configure VLAN mapping rules in the ingress direction based on double Tag, namely, to
translate the VLAN based on the inner VLAN and outer VLAN and concurrently translate the
inner VLAN and outer VLAN, use this command. To disable this function, use the no form of
this command.

Raisecom Proprietary and Confidential


206
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Format
switchport vlan-mapping ingress outer {all | outer-vlan-id } inner {all | inner-vlan-id }
translate outer outer-new-vlan-id
no switchport vlan-mapping [ inner inner -vlan-id ]

Parameters
Parameter Description
all All VLAN IDs
outer-vlan-id Outer VLAN ID, an integer, ranging from 1 to 4094
inner -vlan-id Inner VLAN ID, an integer, ranging from 1 to 4094
outer-new-vlan-id Translated outer VLAN ID, an integer, ranging from 1 to 4094
inner-new-vlan-id Translated inner VLAN ID, an integer, ranging from 1 to 4094

Default conditions
N/A

Command mode
Physical layer interface configuration/Aggregation group configuration

User level
15

Usage guidelines
Scenario
You can use the show command to show information about VLAN mapping rules on the
interface. If you do not specify the inner VLAN list as all, the interface will replace the
VLAN ID in the outer TAG of the packets (with 2 TAGs and the VLAN ID in the inner or
outer layer of the TAG complies with the VLAN mapping rule) with the specified VLAN. If
you specify the inner VLAN list as all, the interface will replace the VLAN ID in the outer
TAG of the packets (the VLAN ID in the outer TAG complies with the VLAN mapping rule),
including packets with just one TAG but complies with the mapping rule, with the specified
VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can use this command to configure VLAN mapping rules. The number of VLAN
mapping rules shall not exceed the threshold. As for the same interface, if the VLAN list in

Raisecom Proprietary and Confidential


207
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

VLAN mapping rules conflicts with existed VLAN mapping rules, configurations will fail; if
the VLAN added according to VLAN mapping rules is repetitive, then the newly configured
VLAN mapping rule will override the old one.
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.

Examples
This example shows how to configure VLAN mapping rules in the ingress direction of
interface 1 and translate outer VLAN ID 2 to VLAN ID 3 and inner VLAN ID 3 to inner
VLAN ID 4.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping ingress outer
2 inner 3 translate 3 4
Set successfully.

Related commands
show switchport vlan-mapping translate

2.4.3 switchport vlan-mapping egress outer inner translate

Function
To configure VLAN mapping rules in the egress direction based on double Tag, namely, to
translate the VLAN based on the inner VLAN and outer VLAN and concurrently translate the
inner VLAN and outer VLAN, use this command. To disable this function, use the no form of
this command.

Format
switchport vlan-mapping egress outer {all | outer-vlan-id } {inner inner-vlan-id| outer
outer-vlan-id }{ translate vlan-id | remove | tagged | unchanged }{ inner |
outer }{translate vlan-id | remove | tagged }]
no switchport vlan-mapping egress outer {all | vlan-id}} [inner vlan-id]

Parameters
Parameter Description
all All VLAN IDs
outer-vlan-id Outer VLAN ID, an integer, ranging from 1 to 4094
inner -vlan-id Inner VLAN ID, an integer, ranging from 1 to 4094
outer-new-vlan-id Translated outer VLAN ID, an integer, ranging from 1 to 4094
inner-new-vlan-id Translated inner VLAN ID, an integer, ranging from 1 to 4094
remove Remove the outer TAG.

Raisecom Proprietary and Confidential


208
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
tagged Reserve the outer TAG.

unchanged Unchanged
translate Translated

Default conditions
N/A

Command mode
Physical layer interface configuration/Aggregation group configuration

User level
15

Usage guidelines
Scenario
You can use the show command to show information about VLAN mapping rules on the
interface. If you do not specify the inner VLAN list as all, the interface will replace the
VLAN ID in the outer TAG of the packets (with 2 TAGs and the VLAN ID in the inner or
outer layer of the TAG complies with the VLAN mapping rule) with the specified VLAN. If
you specify the inner VLAN list as all, the interface will replace the VLAN ID in the outer
TAG of the packets (the VLAN ID in the outer TAG complies with the VLAN mapping rule),
including packets with just one TAG but complies with the mapping rule, with the specified
VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can use this command to configure VLAN mapping rules. The number of VLAN
mapping rules shall not exceed the threshold. As for the same interface, if the VLAN list in
VLAN mapping rules conflicts with existed VLAN mapping rules, configurations will fail; if
the VLAN added according to VLAN mapping rules is repetitive, then the newly configured
VLAN mapping rule will override the old one.
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.

Examples
This example shows how to configure VLAN mapping rules in the ingress direction of
interface 1 and translate outer VLAN ID 2 to VLAN ID 3 and inner VLAN ID 3 to inner
VLAN ID 4.

Raisecom Proprietary and Confidential


209
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping ingress outer
2 inner 3 translate 3 4
Set successfully.

Related commands
show switchport vlan-mapping translate

2.4.4 switchport vlan-mapping both add-outer translate outer

Function
To configure bidirectional VLAN mapping rules based on inner or outer VLANs, use this
command. To disable this function, use the no form of this command.

Format
switchport vlan-mapping both add-outer vlan-id [ inner inner -vlan-id ] translate outer
vlan-id [ inner inner -vlan-id ]
no switchport vlan-mapping both add-outer vlan-id

Parameters
Parameters Description
inner vlan-id Inner VLAN ID, an integer, ranging from 1 to 4049
outer outer-vlan-id Outer VLAN ID, an integer, ranging from 1 to 4049

Default conditions
N/A

Command mode
Physical layer interface configuration/Aggregation group configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure 1:1 bidirectional VLAN mapping rules.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


210
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

N/A
Precaution
Do not configure QinQ and VLAN mapping rules on the same interface concurrently.

Examples
This example shows how to.configure bidirectional VLAN mapping and translate outer
VLAN 50 into outer VLAN 100
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport vlan-mapping both outer 50
translate outer 100
Set successfully.

Related commands
show switchport vlan-mapping translate

2.5 STP
2.5.1 instance vlan

Function
To configure the mapping between the MSTI (MST instance) and the VLAN, use this
command. To delete the mapping, use the no form of this command.

Format
instance instance-id vlan vlan-list
no instance instance-id [ vlan vlan-list ]

Parameters
Parameter Description
instance-id MSTI number, an integer, ranging from 0 to 4095
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
While using the no form of this command, the MSTI will be deleted if
the parameter is not configured; If the parameter is configured, certain
VLAN corresponding to the MSTI will be deleted.

Default conditions
N/A

Raisecom Proprietary and Confidential


211
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Command mode
MST region configuration

User level
11

Usage guidelines
Scenario
One switched network can be classified into multiple MST regions with each containing
multiple independent MSTIs. One VLAN is corresponded to one MSTI but one MSTI can be
corresponded to multiple VLANs. You can use this command to configure the mapping
between the MSTI and the VLAN. If the configured MSTI does not exist, the device will
create one automatically and meanwhile map it to the VLAN; if there is a MSTI, the VLAN
will be directly mapped to it.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to map VLAN 10 and VLANs 100-200 to MSTI 1.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#instance 1 vlan 10,100-200
Set successfully.

This example shows how to delete VLANs 100-150 from MSTI 1.


Raisecom(config-region)#no instance 1 vlan 100-150
Set successfully.

Related commands
show spanning-tree region-configuretion

2.5.2 name

Function
To configure the MST region name, use this command. To delete the name, use the no form of
this command.

Raisecom Proprietary and Confidential


212
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Format
name name
no name

Parameters
Parameter Description
name MST region name, a string of 1 to 32 characters

Default conditions
N/A

Command mode
MST region configuration

User level
11

Usage guidelines
Scenario
One network can be classified into multiple MST regions. You can use this command to
configure MST region names for distinguishing MST regions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the MST region name as mst1.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#name mst1
Set successfully.

This example shows how to delete the MST region name.


Raisecom(config-region)#no name
Set successfully.

Raisecom Proprietary and Confidential


213
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Related commands
show spanning-tree region-configuration

2.5.3 revision-level

Function
To configure the revision level of the MST region, use this command. To return to the default
condition, use the no form of this command.

Format
revision-level level
no revision-level

Parameters
Parameter Description
level Revision level, an integer, ranging from 0 to 65535

Default conditions
The revision level of the MST region is 0.

Command mode
MST region configuration

User level
11

Usage guidelines
Scenario
One network can be classified into multiple MST regions. You can use this command to
configure the revision level of MST regions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


214
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Examples
This example shows how to configure the revision level of the MST region to 20.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#revision-level 20
Set successfully.

This example shows how to return to the default condition.


Raisecom(config-region)#no revision-level
Set successfully.

Related commands
show spanning-tree region-configuration

2.5.4 show spanning-tree

Function
To show information about the Multiple Spanning Tree Instance (MSTI), use this command.

Format
show spanning-tree [ instance instance-id ] [ detail ]

Parameters
Parameter Description
Show information about the specified MSTI if the parameter is
instance
configured.
Show information about all MSTIs if the parameter is not configured.

instance-id MSTI number, an integer, ranging from 0 to 4095


Show details about the MSTI if the parameter is configured.
detail
Show basic information about the MSTI if the parameter is not
configured.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


215
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Usage guidelines
N/A

Examples
This example shows how to show basic information about the MSTP.
Raisecom#show spanning-tree
Spanning-tree admin state: enable
Spanning-tree protocol mode: MSTP
MST ID: 0
-----------------------------------------------------------
BridgeId: Mac 000E.5E00.0001 Priority 32768
RegionalRoot: Mac 000E.5E00.0001 Priority 32768 InternalRootCost 0
Root: Mac 000E.5E00.0001 Priority 32768 RootCost 0
Operational: HelloTime 2 ForwardDelay 15 MaxAge 20
Configured: HelloTime 2 ForwardDelay 15 MaxAge 20 TransmitLimit 3
MaxHops 20 Diameter 7
Port PortState PortRole PathCost PortPriority LinkType
TrunkPort
-------------------------------------------------------------------------
1 discarding disabled 200000 128 point-to-point no
2 discarding disabled 200000 128 point-to-point no

23 discarding disabled 200000 128 point-to-point no
24 forwarding designated 200000 128 point-to-point no

The following table describes fields in the command output.

Parameter Description
Spanning-tree admin state STP state
Enable: enabled
Disable: disabled

Spanning-tree protocol mode STP mode


STP: STP is in use.
MSTP: MSTP is in use.

MST ID: MST region number


BridgeId: Mac MAC address of the device
BridgeId:Priority Device priority
Root: Mac MAC address of the root device
Root:Priority Priority of the root device
Root:RootCost Root path cost
RegionalRoot: Mac MAC address of the regional root device
RegionalRoot: Priority Priority of the regional root device
RegionalRoot:InternalRootCost Internal path cost
Operational Operational reference value

Raisecom Proprietary and Confidential


216
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
Configured Configured reference value
HelloTime Time interval for sending BPDU
ForwardDelay Forward latency
MaxAge The maximum age of BPDU configurations
TransmitLimit The maximum number of packets allowed to send
within the Hello Time
MaxHops The maximum number of hops within the MST region
Diameter Configure the diameter for the switched network,
namely, the maximum number of hops between any
two terminal devices.
PortId Interface ID
PortState Interface status
Disable: the interface is blocked and cannot
participate in packets forwarding.
Discarding: when the topology is stable, the blocked

interface only receives BPDU packets.


Forwarding: the interface forwards user traffic and

also receives and sends BPDU packets.


Learning: the interface is learning the MAC address

table, but it only receives and sends BPDU packets


instead of forwarding user traffic.
PortRole Interface role
Disable: not configured
Root Port: root interface
Designated: specified interface

PathCost Path cost


PortPriority Interface priority
LinkType Link type
point-to-point: the link connected to that interface is a
point-to-point link
share: the link connected to the interface is a shared

link
TrunkPort LAG interfaces
yes: the interface is a LAG interface
no: the interface is a non-LAG interface

This example shows how to show information about MSTI 1.


Raisecom#show spanning-tree instance 1
Spanning-tree admin state: enable
Spanning-tree protocol mode: MSTP
MST ID: 1
-----------------------------------------------------------

Raisecom Proprietary and Confidential


217
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

BridgeId: Mac 000E.5E03.7DEB Priority 32768


PortId PortState PortRole PathCost PortPriority LinkType TrunkPort
-------------------------------------------------------------------------

The following table describes fields in the command output.

Parameter Description
Spanning-tree STP state
Enable: enabled
admin state
Disable: disabled

Spanning-tree STP mode


STP: compatible STP mode
protocol mode
MSTP: MSTP mode

MST ID MST region number


BridgeId MAC MAC address of the device
BridgeId Priority Device priority
PortId Interface ID
PortState Interface status
Disable: the interface is blocked and cannot participate in packets
forwarding.
Discarding: when the topology is stable, the blocked interface only

receives BPDU packets.


Forwarding: the interface forward user traffic and also receives and

sends BPDU packets.


Learning: the interface is learning the MAC address table, but it

only receives and sends BPDU packets instead of forwarding user


traffic.
PortRole Interface role
Disable: not configured
Root Port: root interface
Designated: specified interface

PathCost Path cost


PortPriority Interface priority
LinkType Link type
point-to-point: the link connected to that interface is a point-to-point
link
share: the link connected to the interface is a shared link

TrunkPort LAG interfaces


yes: the interface is a LAG interface
no: the interface is a non-LAG interface

This example shows how to show details about MSTI 1.


Raisecom#show spanning-tree instance 1 detail
MSTP Admin State: Enable
Protocol Mode: MSTP

Raisecom Proprietary and Confidential


218
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

MST ID: 1
-----------------------------------------------------------
BridgeId: Mac 000E.5E03.7DEB Priority 32768
Port 1
No spanning-tree infomation available in port 1 for instance 1
Port 2
No spanning-tree infomation available in port 2 for instance 1
Port 3
No spanning-tree infomation available in port 3 for instance 1

Port 24
No spanning-tree infomation available in port 24 for instance 1

Related commands
N/A

2.5.5 show spanning-tree interface

Function
To show interface information in MSTI, use this command.

Format
show spanning-tree [ instance instance-id ] interface-type interface-number [ detail ]

Parameters
Parameter Description
Show information about the specified interface in MSTI if the
instance
parameter is configured.
Show information about all interfaces in MSTI if the parameter is

not configured.
instance-id MSTI number, an integer, ranging from 0 to 4095
port-list Interface list, an integer, ranging from 1 to 28
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Show details about the interface in MSTI if the parameter is
detail
configured.
Show basic information about the interface in MSTI if the

parameter is not configured.

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


219
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about interface 1 in MSTI 1.
Raisecom#show spanning-tree instance 1 port-list 1
port1
PortEnable: admin: enable oper: enable
Rootguard: disable
Loopguard: disable
ExternPathCost:200000
EdgedPort: admin: auto oper: no BPDU Filter: disable
LinkType: admin: auto oper: point-to-point
Partner MSTP Mode: mstp
Bpdus send: 0 (TCN<0> Config<0> RST<0> MST<0>)
Bpdus received:0 (TCN<0> Config<0> RST<0> MST<0>)
Instance PortState PortRole PortCost(admin/oper) PortPriority
----------------------------------------------------------

The following table describes fields in the command output.

Parameter Description
port1 Interface ID
PortEnable The MSTP enabled status on the interface
Enable: enabled
Disable: disabled
admin Administrative status
oper Operational status
Rootguard Root interface protection status
Enable: enabled
Disable: disabled
Loopguard Loop interface protection status
Enable: enabled
Disable: disabled
ExternPathCost External path cost
EdgedPort Whether the interface is edge interface or not
auto: automatically detect whether it is an edge interface
force-true: forced to be an edge interface
force-false: forced to be a non-edge interface

Raisecom Proprietary and Confidential


220
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
LinkType The interface-connected link type
auto: automatically detect the type of the link connected with
the interface
point-to-point: point-to-point links
share: shared links

Partner STP Mode Peer STP mode


Bpdus send BPDU packets sent
Bpdus received BPDU packets received
Instance MSTI number
PortState Interface status
Disable: the interface is blocked and cannot participate in
packets forwarding.
Discarding: when the topology is stable, the blocked interface

only receives BPDU packets.


Forwarding: the interface forward user traffic and also

receives and sends BPDU packets.


Learning: the interface is learning the MAC address table, but

it only receives and sends BPDU packets instead of


forwarding user traffic.
PortRole Interface role
Disable: not configured
Root Port: root interface
Designated: specified interface

PortCost(admin/oper) Interface path


PortPriority MSTP interface priority

Related commands
N/A

2.5.6 show spanning-tree region-configuration

Function
To show configurations about the Multiple Spanning Tree (MST) region, use this command.

Format
show spanning-tree region-configuration

Parameters
N/A

Raisecom Proprietary and Confidential


221
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
N/A

Command mode
MST region configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations about the MST region.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#show spanning-tree region-configuration
Configurate Information:
-----------------------------------Name:
Revision level: 0
Instances configurate: 1
Digest: Instance Vlans Mapped
-------- ------------------------------
0 1-4094

Operational Information:
-----------------------------------
Name:
Revision level: 0
Instances running: 1
Digest: 0XAC36177F50283CD4B83821D8AB26DE62
Instance Vlans Mapped
-------- ------------------------------
0 1-4094

The following table describes fields in the command output.

Parameter Description
Configured Region configurations
Operational Region operational status
Name Region name
Revision level Region revision level
Instances configured Number of MSTIs configured
Instances running Number of the running MSTIs

Raisecom Proprietary and Confidential


222
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
Digest Digest of the mapping between the MSTI and the VLAN
Instance MSTI number
Vlans Mapped VLANs mapped

Related commands
N/A

2.5.7 show spanning-tree region-operation

Function
To show the operational information about the MST region, use this command.

Format
show spanning-tree region-operation

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the operational information about the MST region.
Raisecom#show spanning-tree region-operation
Operational Information:
-----------------------------------------------
Name:
Revision level: 0
Instances running: 2
Digest: 0x870555C957F1B44530B7D56FD4716ADF

Raisecom Proprietary and Confidential


223
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Instance Vlans Mapped


-------- ----------------------
0 1-9,11-4094
1 10

The following table describes fields in the command output.

Parameter Description
Operational Operational information of the region
Name Region name
Revision level Region revision level
Instances running Number of the running MSTIs
Digest Digest of the mapping between the MSTI and the VLAN
Instance MSTI number
Vlans Mapped VLANs mapped

Related commands
N/A

2.5.8 spanning-tree bridge-diameter

Function
To configure the diameter for the switched network, namely, the maximum number of hops
between any two terminal devices in the network, use this command. To return to the default
condition, use the no form of this command.

Format
spanning-tree bridge-diameter max-number
no spanning-tree bridge-diameter

Parameters
Parameter Description
max-number Network diameter, an integer, ranging from 2 to 7

Default conditions
N/A

Command mode
Global configuration

Raisecom Proprietary and Confidential


224
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

User level
11

Usage guidelines
Scenario
Any two terminal devices in the switched network are connected to each other through
specified links which are formed by a series of devices. The network diameter is the
maximum number of hops between any two terminals. The longer the diameter is, the larger
the network scale will be.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the network diameter to 5.
Raisecom#config
Raisecom(config)#spanning-tree bridge-diameter 5
Set successfully.

This example shows how to return to the default condition.


Raisecom(config)#no spanning-tree bridge-diameter
Set successfully.

Related commands
show spanning-tree

2.5.9 spanning-tree clear statistics

Function
To clear the MSTP statistics on the interface, use this command.

Format
spanning-tree clear statistics

Parameters
N/A

Raisecom Proprietary and Confidential


225
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
N/A

Examples
This example shows how to clear the MSTP statistics on interface 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree clear statistics
Set successfully.

Related commands
N/A

2.5.10 spanning-tree enable

Function
To enable the Spanning Tree Protocol (STP) globally or on the interface, use this command.
To disable this function, use the disable form of this command.

Format
spanning-tree { enable | disable }

Parameters
Parameter Description

enable Enable the STP.


disable Disable the STP.

Default conditions
The STP is enabled.

Raisecom Proprietary and Confidential


226
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Command mode
Global configuration/Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
STP is used for Layer 2 network loop detection, which has two features: first, it can block
redundant links in Layer 2 networks by pruning the network into tree shape, thus eliminating
loops and suppressing broadcast storm; second, it can back up links.
In global configuration mode, you can use this command to enable/disable the STP over
devices. In physical layer configuration mode, you can use this command to enable/disable
the STP on interfaces.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable the global STP.
Raisecom#config
Raisecom(config)#spanning-tree enable
Set successfully.

This example shows how to disable the global STP.


Raisecom(config)#spanning-tree disable
Set successfully.

This example shows how to enable the STP on interface 1.


Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree enable
Set successfully.

This example shows how to disable the STP on interface 1.


Raisecom(config-gigaethernet1/1/1)#spanning-tree disable
Set successfully.

Related commands
show spanning-tree

Raisecom Proprietary and Confidential


227
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

2.5.11 spanning-tree edged-port

Function
To configure the interface as an edge interface, use this command.

Format
spanning-tree edged-port { auto | force-true | force-false }

Parameters
Parameter Description

auto Automatically detect whether it is an edge interface


force-true Forced to be an edge interface
force-false Forced to be a non-edge interface

Default conditions
All interfaces will detect whether they are edge interfaces.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
The edge interface refers to the interface which is directly connected to the user. When the
network topology changes, no temporary loops will occur on the edge interface, therefore, if
you configure the interface as the edge interface, it can rapidly enter the forwarding state.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface 1 to an edge interface.

Raisecom Proprietary and Confidential


228
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree edged-port force-true
Set successfully.

Related commands
show spanning-tree port

2.5.12 spanning-tree edged-port bpdu-filter

Function
To configure the BPDU filter, use this command. To disable this function, use the disable
form of this command.

Format
spanning-tree edged-port bpdu-filter { enable | disable }

Parameters
Parameter Description
enable Enable the BPDU filter on the edge interface.
disable Disable the BPDU filter on the edge interface.
all All interfaces

Default conditions
The BPDU filter is disabled.

Command mode
Physical layer interface configuration mode

User level
15

Usage guidelines
Scenario
The edge interface refers to the interface which is directly connected to the user. After the
edge interface is enabled with BPDU filtering, it will directly discard BPDU packets upon
receiving them and will not send BPDU packets either.
Prerequisite
N/A

Raisecom Proprietary and Confidential


229
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure BPDU filtering.
Raisecom#config
Raisecom(config)interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#spanning-tree edged-port bpdu-filter
enable
Set successfully.

Related commands
show spanning-tree port

2.5.13 spanning-tree extern-path-cost

Function
To configure external path cost, use this command. To return to the default condition, use the
no form of this command.

Format
spanning-tree extern-path-cost cost
no spanning-tree extern-path-cost

Parameters
Parameter Description
cost Path cost value, an integer, ranging from 0 to 200000000

Default conditions
The external path cost is 0.

Command mode
Physical layer interface configuration mode

User level
11

Raisecom Proprietary and Confidential


230
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Usage guidelines
Scenario
The external path cost refers to the accumulative path cost from the attached MST regional
root of the device to the CIST root. The external path cost reserved on all devices in the MST
region is the same. If the CIST root device is within the MST region, the external path cost
reserved on all devices within the region is 0.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the external path cost on interface 1 to 10.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree extern-path-cost 10
Set successfully.

This example shows how to return to the default condition.


Raisecom(config-gigaethernet1/1/1)#no spanning-tree extern-path-cost
Set successfully.

Related commands
show spanning-tree

2.5.14 spanning-tree forward-delay

Function
To configure the Spanning Tree Protocol (STP) forward-delay period, use this command. To
return to the default condition, use the no form of this command.

Format
spanning-tree forward-delay period
no spanning-tree forward-delay

Raisecom Proprietary and Confidential


231
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameter Description
period Forward-delay period, an integer, ranging from 4 to 30, in units of
second

Default conditions
The STP forward-delay period is 15s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The STP should be recalculated when the network topology changes. However, a certain
period is needed for the new configurations to be propagated through the whole network. If
the newly elected root interface and the specified interface forward data immediately,
temporary loops may occur. Therefore, interfaces need to experience an intermediate state
(learning state) before retransmitting data. After waiting for some time (the forward-delay
period) in the learning state, the interface will transition to the forwarding state. You can use
this command to configure the forward-delay period to ensure that all configurations are
propagated through the whole network. When the network topology does not change a lot,
you can properly shorten the forward-delay time. Otherwise, extend the time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The forward-delay time will be automatically calculated while configuring the network
diameter, max-age, or hello-time. If you do not wish to use the automatically calculated delay
time, you need to pre-configure the network diameter, max-age, or hello-time and then
configure the forward-delay time. Otherwise, the user-defined forward-delay value will be
modified.

Examples
You can use this command to configure the STP forward-delay time to 10s.
Raisecom#config
Raisecom(config)#spanning-tree forward-delay 10
Set successfully.

Raisecom Proprietary and Confidential


232
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

This example shows how to return to the default condition.


Raisecom(config)#no spanning-tree forward-delay
Set successfully.

Related commands
spanning-tree max-age
spanning-tree priority
show spanning-tree

2.5.15 spanning-tree hello-time

Function
To configure the STP Hello Time, namely, the interval for sending the Bridge Protocol Data
Units (BPDUs), use this command. To return to the default condition, use the no form of this
command.

Format
spanning-tree hello-time period
no spanning-tree hello-time

Parameters
Parameter Description
period Interval for sending BPDUs, an integer, ranging from 1 to 10, in units of
second

Default conditions
The STP Hello Time is 2s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The Hello Time is used in the STP for sending configurations periodically to maintain the
stability of the spanning tree and detect loop faults. If the device does not receive BPDU
packets within a period, the STP will recalculate the spanning tree. When the device becomes
a root device, you can use this command to configure the Hello Time to send BPDUs at

Raisecom Proprietary and Confidential


233
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

regular intervals, while the non-root devices will adopt the Hello Time configured on the root
device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can adjust the Hello Time according to the network condition. When there is a high
probability of BPDU packets loss, you can properly shorten the period of Hello Time to
guarantee greater STP robustness. While if you extend the period of Hello Time, the STP will
occupy less CPU resources. Therefore, the rational Hello Time ensures that the device
discovers network faults in time with no need of occupying too much network resources.
While configuring the network diameter, the value of the Hello Time will be automatically
restored to the default value. Therefore, you should configure the network diameter first
followed by the Hello Time in case the value of the Hello Time to be modified.

Examples
This example shows how to configure the STP Hello Time to 3s.
Raisecom#config
Raisecom(config)#spanning-tree hello-time 3
Set successfully.

This example shows how to return to the default condition.


Raisecom(config)#no spanning-tree hello-time
Set successfully.

Related commands
spanning-tree forward-delay
spanning-tree max-age
show spanning-tree

2.5.16 spanning-tree inter-path-cost

Function
To configure the internal path cost on the interface, use this command. To return to the default
condition, use the no form of this command.

Format
spanning-tree [ instance instance-id ] inter-path-cost cost
no spanning-tree [ instance instance-id ] inter-path-cost

Raisecom Proprietary and Confidential


234
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameter Description
instance-id MSTI number, an integer, ranging from 0 to 4095
cost Cost, an integer, ranging from 0 to 200000000

Default conditions
The internal path cost on the interface is 0.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
The IST Master is the closest one to the common root within the domain. The internal path
cost is the accumulative path cost from the interface to the IST Master. You can use this
command to configure the value of the internal path cost.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the internal path cost on interface 1 in MSTI 1 to 10.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree instance 1 inter-path-
cost 10
Set successfully.

This example shows how to return to the default condition.


Raisecom(config-gigaethernet1/1/1)#no spanning-tree instance 1 inter-
path-cost
Set successfully.

Raisecom Proprietary and Confidential


235
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Related commands
show spanning-tree

2.5.17 spanning-tree link-type

Function
To configure the link type of the specified interface, use this command.

Format
spanning-tree link-type { auto | point-to-point | shared }

Parameters
Parameter Description
auto Automatically detect whether the link connected to the interface is a
point-to-point link.
point-to-point The link connected to the current interface is a point-to-point link.
shared The link connected to the current interface is a shared link.

Default conditions
The link type is configured as auto. The device configures the link types on the interface
according to the duplex state. The full duplex interface is deemed as the point-to-point link
while the half duplex interface is deemed as the shared link.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
There are two types of links of the specified interface: point-to-point and shared links.
In the point-to-point link, the specified interface just shakes hands once with the network
bridge in the downlink direction and then immediately transitions to the forwarding state.
In the shared link connecting over 3 network bridges, the bridge in the downlink direction
will not respond to the handshake request sent by the specified interface in the uplink
direction. The specified interface can enter forwarding state after waiting for a period twice of
the Forward Delay time. Compared with the network with point-to-point links, the network
with shared links needs a longer time to be converged.
Prerequisite

Raisecom Proprietary and Confidential


236
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

N/A
Follow-up procedure
N/A
Precaution
If the interface is configured as point-to-point link, but it is a shared link actually, then
temporary loops may occur. It is recommended to configure the type to auto, which means to
let the system automatically discovers the link type of the interface.

Examples
This example shows how to configure the link type on interface 1 as point-to-point.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree link-type point-to-point
Set successfully.

Related commands
show spanning-tree

2.5.18 spanning-tree loopguard

Function
To enable loop guard, use this command. To disable this function, use the disable form of this
command.

Format
spanning-tree loopguard { enable | disable }

Parameters
Parameter Description
enable Enable loop guard.
disable Disable loop guard.

Default conditions
Disabled

Command mode
Physical layer interface configuration mode

User level
11

Raisecom Proprietary and Confidential


237
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Usage guidelines
Scenario
The spanning tree has two functions: loop avoidance and link backup. By blocking redundant
links, it can prevent loops. While when some links fail, it can release the redundant links, thus
protecting the network. STP will send BPDU packets periodically, if the interface does not
receive the BPDU packets within a certain period, it may deem that the link fails, then the
STP will be recalculated by the STP algorithm to release the blocked links. However, in the
actual application, the link failure may not be caused by the failure of receiving BPDU
packets. Therefore, if the STP releases redundant links at this time, it may cause link failure.
However, when the interface is enabled with loop guard, it will maintain as it is when it
cannot receive BPDU packets within a certain period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The loop guard and the link backup cannot coexist, which means loop guard avoids loops at
the cost of losing link backup.

Examples
This example shows how to enable loop guard on interface 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree loopguard enable
Set successfully.

This example shows how to disable loop guard on the interface.


Raisecom(config-gigaethernet1/1/1)#spanning-tree loopguard disable
Set successfully.

Related commands
show spanning-tree port

2.5.19 spanning-tree bpduguard

Function
To enable BPDU guard on an edge interface, use this command. To disable this function, use
the disable form of this command.

Format
spanning-tree bpduguard { enable | disable }

Raisecom Proprietary and Confidential


238
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameter Description
enable Enable BPDU guard on the interface.
disable Disable BPDU guard on the interface.

Default conditions
Disabled

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
You can use this command to enable edge interfaces with BPDU guard.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If BUDU Guard is enabled, the switch will disable edge interfaces after they have received
BPDU packets and inform the NMS. The disabled interfaces can be only recovered manually
by the network administrator.

Examples
This example shows how to enable BPDU guard on interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#spanning-tree bpduguard enable
Set successfully.

This example shows how to disable BPDU guard on the interface.


Raisecom(config-gigaethernet1/1/1)#spanning-tree bpduguard disable
Set successfully.

Related commands
show spanning-tree port

Raisecom Proprietary and Confidential


239
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

2.5.20 spanning-tree max-age

Function
To configure the maximum living time of the BPDU on the device, use this command. To
return to the default condition, use the no form of this command.

Format
spanning-tree max-age period
no spanning-tree max-age

Parameters
Parameter Description
period Time value, an integer, ranging from 6 to 40, in units of second

Default conditions
The STP max-age is 20s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The BPDU configuration message is for calculating and maintaining the spanning tree. The
message has a maximum living time on the device, once the time expires, the spanning tree
will be recalculated. If the living time is configured too short, the spanning tree will be
calculated frequently. While if it is configured too long, the STP will be unable to adapt to the
topology change.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Configuring the network diameter or Hello Time will trigger the automatic calculation of
max-age. Therefore, if you wish to use self-defined max-age, you need to configure the
network diameter and Hello Time first followed by the max-age. Otherwise, the value of max-
age will be modified.

Raisecom Proprietary and Confidential


240
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Examples
This example shows how to configure the STP max-age to 30s.
Raisecom#config
Raisecom(config)#spanning-tree max-age 30
Set successfully.

This example shows how to return to the default condition.


Raisecom(config)#no spanning-tree max-age
Set successfully.

Related commands
spanning-tree hello-time
show spanning-tree

2.5.21 spanning-tree max-hops

Function
To configure the maximum number of hops within the MST region, use this command. To
return to the default condition, use the no form of this command.

Format
spanning-tree max-hops hops
no sapnning-tree max-hops

Parameters
Parameter Description
hops Maximum number of hops, an integer, ranging from 1 to 40

Default conditions
The maximum number of hops within the MST region is 20.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


241
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

The scale of the MST region depends on the number of hops in the MST region. The
maximum number of hops configured in the region root will be regarded as the maximum
number of hops in the MST region. Starting from the spanning tree root switch in the MST
region, the number of hops will be reduced by 1 each time the BPDU messages pass a device.
If the number of hops of the message is 0, then the message will be discarded, which makes
the devices beyond the maximum number of hops unable to participate in the spanning tree
calculation, thus limiting the scale of the MST region.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the maximum number of hops within the MST region
to10.
Raisecom#config
Raisecom(config)#spanning-tree max-hops 10
Set successfully.

This example shows how to return to the default condition.


Raisecom(config)#no spanning-tree max-hops
Set successfully.

Related commands
N/A

2.5.22 spanning-tree mode

Function
To configure the operation mode, use this command.

Format
spanning-tree mode { stp | mstp | rstp }

Parameters
Parameter Description
STP The device is working in the global STP-compatible mode.
MSTP The device is working in the global MSTP mode.
RSTP The device is working in the global RSTP mode.

Raisecom Proprietary and Confidential


242
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
The STP operation mode is MSTP.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure STP working modes: STP-compatible mode and
MSTP mode. In the STP-compatible mode, the spanning tree does not support the fast
conversion from the Alternate interface (the backup interface of the root interface) to root
interface and the expedited forwarding on the interface. It just receives STP BPDU and TCN
BPDU packets and will drop RST BPDU or MST BPDU packets. If the peer interface of this
device runs STP, it will transition from the MSTP mode to the STP-compatible mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the protocol operation mode as STP.
Raisecom#config
Raisecom(config)#spanning-tree mode stp
Set successfully.

Related commands
show spanning-tree

2.5.23 spanning-tree priority

Function
To configure the system priority or interface priority, use this command. To return to the
default condition, use the no form of this command.

Raisecom Proprietary and Confidential


243
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Format
spanning-tree [ instance instance-id ] priority priority
no spanning-tree [ instance instance-id ] priority

Parameters
Parameter Description
instance Configure the priority for the specified MSTI system or for the interface
if the parameter is configured. Otherwise, the default configuration is
MSTI 0, which is the priority of the IST system or interface.
instance-id MSTI number, an integer, ranging from 0 to 4095
priority Priority
The value of system priority ranges from 0 to 61440 in increments of
4096, such as 0, 4096, 8192.
The value of interface priority ranges from 0 to 240 in increments of 16,
such as 0, 16, 32

Default conditions
The system priority is 32768 and the interface priority is 128.

Command mode
Global configuration/Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
By comparing the priority vector information while nodes are exchanging BPDU packets, the
STP calculates the spanning tree. While electing the root switch, it needs to compare the
system ID. While the system ID has 64 bits among which the high-order 16 bits is the system
priority and the rest is the MAC address. You can use this command to configure the system
priority in global configuration mode, the smaller the value is, the higher the priority is, and
the more likely the node will become the root switch. While electing the root interface and
specified interface, it needs to compare the interface ID. While the interface ID has 16 bits
among which the high-order 8 bits is the interface priority and the rest is the interface ID. You
can use this command to configure the interface priority in interface mode, the smaller the
value is, the higher the priority is, the more likely the interface will become the root interface
or specified interface.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


244
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

N/A
Precaution
N/A

Examples
This example shows how to configure the system priority in MSTP instance 1 to 8192.
Raisecom#config
Raisecom(config)#spanning-tree instance 1 priority 8192
Set successfully.

This example shows how to configure the priority on interface 1 in MSTP instance 1 to 64.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree priority 64
Set successfully.

Related commands
show spanning-tree port
spanning-tree root primary
spanning-tree root secondary

2.5.24 spanning-tree region-configuration

Function
To enter MST region configuration mode and configure the region information, use this
command.

Format
spanning-tree region-configuration

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


245
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Usage guidelines
Scenario
One switched network can be classified into multiple MST regions. You can use this
command to configure a MST region, including information such as region name, VLAN
mapping list, MST region revision level, through which the device can be classified into a
specified MST region.
Prerequisite
N/A
Follow-up procedure
You can use the name command to configure the region name.
You can use the instance vlan command to configure the mapping between the MSTI
and the VLAN.
You can use the revision-level command to configure the MST region revision level.
Precaution
N/A

Examples
This example shows how to enter region configuration mode.
Raisecom#config
Raisecom(config)#spanning-tree region-configuration
Raisecom(config-region)#

Related commands
N/A

2.5.25 spanning-tree root

Function
To configure a device as the primary root device or backup root device, use this command.

Format
spanning-tree root { primary | secondary }

Parameters
Parameter Description

primary Configure the device as the primary root device.


secondary Configure the device as the backup root device.

Raisecom Proprietary and Confidential


246
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
In one MSTI, you can just configure one root device but you can configure many backup root
devices.
When the switch fails or is turned off. The backup root switch can replace the root switch to
become the MSTI root switch. If you configure many backup root devices, the one with the
lowest MAC address will become the root device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the device as the MSTI primary device.
Raisecom#config
Raisecom(config)#spanning-tree root primary
Set successfully.

Related commands
N/A

2.5.26 spanning-tree rootguard

Function
To enable RootGuard on the interface, use this command. To disable this function, use the
disable form of this command.

Raisecom Proprietary and Confidential


247
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Format
spanning-tree rootguard { enable | disable }

Parameters
Parameter Description
enable Enable RootGuard on the interface.
disable Disable RootGuard on the interface.

Default conditions
The RootGuard on the interface is disabled.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
In the STP, the spanning tree will be recalculated when the switch receives packets with
higher priority, which affects the connectivity of the network and consumes the CPU
resources. In the network enabled with the MSTP feature, if someone sends BPDU packets
with higher priority, the network will repeatedly calculates the spanning tree, which results in
network instability. In general, the switch priorities are preconfigured during network
planning, namely, the closer the switch to the edge, the lower its priority is. Therefore,
interfaces in the downlink direction will not receive packets with priority higher than that of
the switch unless someone is sending attack packets maliciously. If so, you can use this
command to enable those interfaces with RootGuard feature. After being enabled with
RootGuard feature, they will reject packets with priority higher than that of the switch and be
blocked for a while to prevent links in upper layers from being damaged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable RootGuard on interface 1.

Raisecom Proprietary and Confidential


248
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Raiseocm#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#spanning-tree rootguard enable
Set successfully.

This example shows how to disable RootGuard on the interface.


Raisecom(config-gigaethernet1/1/1)#spanning-tree rootguard disable
Set successfully.

Related commands
show spanning-tree port

2.5.27 spanning-tree transit-limit

Function
To configure the maximum number of BPDU packets allowed to send by the interface within
the Hello Time, use this command. To return to the default condition, use the no form of this
command.

Format
spanning-tree transit-limit max-num
no spanning-tree transit-limit

Parameters
Parameter Description
max-num Maximum number of packets, an integer, ranging from 1 to 10

Default conditions
The interface can only send 3 BPDU packets at most within the Hello Time.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Hello Time is used for sending BPDUs at regular intervals to maintain the stability of the
spanning tree. If the device cannot receive BPDUs within a period, it will recalculate the
spanning tree. You can use this command to configure the maximum number of BPDUs
within the Hello Time. The bigger the value is, the more the BPDUs will be sent within the

Raisecom Proprietary and Confidential


249
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Hello Time, and the more bandwidth resources will be occupied. Therefore, configuring the
value properly can prevent the bandwidth from being occupied by BPDUs when the network
topology changes.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the maximum number of BPDU packets sent by the
interface within the Hello Time to 10.
Raisecom#config
Raisecom(config)#spanning-tree transmit-limit 10
Set successflly.

This example shows how to return to the default condition.


Raisecom(config)#no spanning-tree transmit-limit
Set successfully.

Related commands
show spanning-tree

2.6 Loop detection


2.6.1 clear loopback-detection statistic

Function
To clear statistics of loop detection, use this command.

Format
clear loopback-detection statistic [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Raisecom Proprietary and Confidential


250
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
N/A

Examples
This example shows how to clear statistics of loop detection.
Raisecom#config
Raisecom(config)#clear loopback-detection statistic
Set successfully.

Related commands
N/A

2.6.2 loopback-detection

Function
To configure packet VLAN, period for sending packets, recovery time, and loop action (the
interface is automatically enabled with loopback detection after those configurations), use this
command. To disable this function, use the no form of this command.

Format
loopback-detection[[detect-vlanlist vlanlist ] [ pkt-vlan { untag | vlan-id } ] [ hello-time
second ] [ restore-time second ] [ action { block | trap-only | shutdown } ] [ log-interval
log-interval time]
no loopback-detection

Parameters
Parameter Description
untag Specify packets to not carry Tag.
vlan-list VLAN list, an integer, ranging from 1 to 4049.
Support multiple VLAN input form, such as., 2, 3, 4 and 2-
4.

Raisecom Proprietary and Confidential


251
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
vlan-id VLAN ID, an integer, ranging from 1 to 4094
hello-time second Loop detection period, an integer, ranging from 1 to 3600, in
units of second
restore-time second Loop recovery time, an integer, ranging from 1 to 18000, in units
of second
block Send alarms and block the interface upon detection of a loop.
trap-only Send alarms only upon detection of a loop.
shutdown Send alarms and shut down the interface upon detection of a
loop.
log-interval time Log time interval, an integer, ranging from 0 to 1440, in units of
minute, 0 represents no periodic report.

Default conditions
The loop detection feature on the interface is disabled but it will automatically be enabled
after the interface is configured with this feature. By default, the pkt-vlan is untag; the hello-
time is 1s; the restore-time is 5 times of the hello-time; the action is block.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
Loop detection means that the interface detects whether there are loops by periodically
sending Hello packets. The period of sending Hello packets is also the period of loop
detection.
The period and recovery time should be configured properly. If the period is too long, loops
cannot be detected in time. However, the interface will send Hell packets too frequently if the
period is too short, which increases the burden of internet and the device.
Loops occur when the following two conditions are met:
The device receives packets from itself and the ID of the sending interface is smaller or
equal to that of the receiving interface.
The device receives packets from other devices and the source MAC address of the
packet is smaller than that of the local device.
After detecting the loop, the interface will act based on the following actions:
trap-only: send alarms only
block: send alarms and block the interface

Raisecom Proprietary and Confidential


252
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

shutdown: directly shut down the interface


Restore-time will take effect after the loop is detected (it has no effect on shutdown action). If
the restore-time expires and the above conditions cannot be met, then it is deemed that loops
are cleared. Then the interface will be recovered to the normal status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The loop detection period should be the same over the whole network topology.
Otherwise, there may be errors in terms of coordination between devices, which may
affect the performance of the device.
Loop detection feature cannot be used repeatedly.
Relevant configuration parameters will be invalid after the loop detection feature is
disabled.

Examples
This example shows how to configure the VLAN ID of loop detection packets to 5, detection
period to 3s, reply time to 15s, and loop action as block.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#loopback-detection pkt-vlan 5 hello-
time 3 restore-time 15 action block
Set successfully.

Related commands
show loopback-detection

2.6.3 loopback-detection manual restore

Function
To manually open the interface which is blocked for detecting loops, use this command.

Format
loopback-detection manual restore

Parameters
N/A

Default conditions
N/A

Raisecom Proprietary and Confidential


253
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Command mode
Physical interface configuration/Aggregation group interface configuration

User level
11

Usage guidelines
Scenario
When the device detects loops, it will block certain interface. You can use this command to
manually open the blocked interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to manually open blocked interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#loopback-detection manual restore
Set successfully.

Related commands
show loopback-detection

2.6.4 show loopback-detection

Function
To show information about loop detection, use this command.

Format
show loopback-detection [ statistics ] [ interface-type interface-number ] [ detail ]

Parameters
Parameter Description
statistics Show statistics of loop detection.

Raisecom Proprietary and Confidential


254
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
detail Show details.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about loop detection.
Raisecom#show loopback-detection gigaethernet 1/1/1
Interface pktVlan hellotime restoretime loop-act Status loop-srcMAC loop-
srcPort
---------------------------------------------------------------
GE1/1/1 5 3 15 block no 0000.0000.0000
(null)

The following table describes fields in the command output.

Field Description
Interface Interface ID
pktVlan Packet VLAN ID
hellotime Loop detection period
restoretime Loop recovery time
loop-act Loop action
Status Loop status
loop-srcMAC Loop source MAC address
If no loop is detected, it will show 0000.0000.0000.

Raisecom Proprietary and Confidential


255
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Field Description
loop-srcPort Loop source interface
If no loops are detected or the name of the packet-sending
ifindex interface cannot be found, it will display null.

Related commands
N/A

2.7 Interface protection


2.7.1 show switchport protect

Function
To show protection configurations on the interface, use this command.

Format
show switchport protect

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show protection configurations on the interface.

Raisecom#show switchport protect


Port Protected State
--------------------------

Raisecom Proprietary and Confidential


256
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

GE1/1/1 disable
GE1/1/2 disable
GE1/1/3 disable
GE1/1/4 disable
GE1/2/1 disable
GE1/2/2 disable
GE1/2/3 disable
GE1/2/4 disable
GE1/2/5 disable
GE1/2/6 disable
GE1/2/7 disable
GE1/2/8 disable
GE1/2/9 disable
GE1/2/10 disable
GE1/2/11 disable
GE1/2/12 disable

The following table describes fields in the command output.

Field Description
Port Interface
Protected State Protection status
enable: enabled
disable: disabled

Related commands
N/A

2.7.2 switchport protect

Function
To enable interface protection, use this command. To disable this function, use the no form of
this command.

Format
switchport protect
no switchport protect

Parameters
N/A

Default conditions
Protection on all interfaces is disabled.

Raisecom Proprietary and Confidential


257
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
Through interface protection, you can add the interface which needs to be controlled to an
interface protection group, which can implement the isolation of Layer 2 and Layer 3 data
among interfaces within the same interface protection group. This not only enhances the
network security but also provides users with flexible networking solutions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable protection on interface GE 1/1/1.

Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#switchport protect
Set successfully.

Related commands
show switchport protect

2.8 Port mirroring


2.8.1 mirror-group

Function
To enable port mirroring group, use this command. To disable this function, use the no form
of this command.

Raisecom Proprietary and Confidential


258
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Format
mirror-group group-id
no mirror-group group-id

Parameters
Parameter Description
group-id Mirror group ID, an integer, ranging from 1 to 4

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
Port mirroring refers to copy packets from the specified source port to the specified
monitoring port without affecting the normal packet forwarding. You can monitor the traffic
status on certain interface and analyse the network condition.
Prerequisite
N/A
Follow-up procedure
You can use the mirror-group monitor-port command and the mirror-group source-port
command to configure the monitoring port and mirroring port.
Precaution
N/A

Examples
This example shows how to create port mirroring group.
Raisecom#config
Raisecom(config)#mirror-group 1
Set Successfully.

Related commands
mirror-group monitor-port

Raisecom Proprietary and Confidential


259
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

mirror-group source-port
show mirror-group

2.8.2 mirror-group monitor-port

Function
To configure the monitoring port with mirroring feature, use this command. To return to the
default condition, use the no form of this command.

Format
mirror-group group-id monitor-port
no mirror-group monitor-port

Parameters
Parameter Description
group-id Mirroring group ID, an integer, ranging from 1 to 4

Default conditions
N/A

Command mode
Physical interface configuration/Aggregation group interface configuration

User level
15

Usage guidelines
Scenario
You can copy the packets on the mirroring port according to the configured rule to the
monitoring port to monitoring the network performance.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
There can be many mirroring ports but only one monitoring port. The mirroring port and
the monitoring port cannot be the same one.

Raisecom Proprietary and Confidential


260
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

The monitoring port can be the monitoring port and service port concurrently. It is not
recommended to use the monitoring port as the service port.

Examples
This example shows how to configure interface 1/1/2 as the monitoring port.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#mirror-group 1 monitor-port
Set Successfully.

Related commands
mirror-group source-port
show mirror-group

2.8.3 mirror-group source-port

Function
To configure the mirroring port and mirroring rules, use this command. To delete them, use
the no form of this command.

Format
mirror-group group-id source-port [ ingress | egress ]
no mirror-group source-port

Parameters
Parameter Description
group-id Mirroring group ID, an integer, ranging from 1 to 4
ingress Mirror packets received by the source port.
egress Mirror packets sent from the source interface.

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
15

Raisecom Proprietary and Confidential


261
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Usage guidelines
Scenario
After the mirroring feature is enabled, the packets on the mirroring port in the ingress/egress
direction will be copied to the monitoring interface. When the mirroring port and mirroring
rules are configured, the device can mirror the packets on the interface in the ingress/egress
direction and can also mirror the packets from the specified ingress interface to the specified
egress interface. When the direction of the packets on the interface is not specified, the device
will mirror packets on the interface in the ingress and egress direction concurrently.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
There can be many mirroring ports but only one monitoring port. The mirroring port and the
monitoring port cannot be the same one.

Examples
This example shows how to configure interface 1/1/1 as the mirroring port and mirroring
incoming packets.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mirror-group 1 source-port ingress
Set Successfully.

Related commands
show mirror-group
mirror-group monitor-port

2.8.4 show mirror-group

Function
To show basic information about mirroring, use this command.

Format
show mirror-group [ group-id ]

Parameters
Parameter Description
group-id Mirror group ID, an integer, ranging from 1 to 4

Raisecom Proprietary and Confidential


262
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show basic information about mirroring.
Raisecom#show mirror-group
Mirror Group 1:
Monitor port:
gigaethernet 1/1/1
Source port:
gigaethernet 1/1/2: ingress
gigaethernet 1/1/3: egress

The following table describes fields in the command output.

Field Description
Mirror Group Mirrorring group number
Monitor port Monitoring port ID
Source port Mirrorring port ID

Related commands
mirror-group monitor-port
mirror-group source-port

2.8.5 mirror-group source-cpu

Function
To configure mirrorring all CPU packets, use this command. To delete the mirroring rules, use
the no form of this command.

Format
mirror-group group-id source-cpu [ ingress | egress ]

Raisecom Proprietary and Confidential


263
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

no mirror-group source-cpu

Parameters
Parameter Description
group-id Mirroring group ID, an integer, ranging from 1 to 4
ingress (Optional) mirror packets received by the source port.
It mirrors packets from both ingress and egress directions when this
parameter is not configured.
egress (Optional) mirror packets sent from the source interface.
It mirrors packets from both ingress and egress directions when this
parameter is not configured.

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
After mirroring takes effect, all CPU packets will be copied to the monitor port.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to mirror CPU ingress packets.
Raisecom#config
Raisecom(config)#mirror-group 1 source-cpu ingress
Set Successfully.

Raisecom Proprietary and Confidential


264
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Related commands
show mirror-group

2.9 L2CP
2.9.1 l2cp-process profile

Function
To create a profile when there is no profile and enter profile mode or to enter profile mode
directly when there is a profile, use this command. To disable this function, use the no form of
this command.

Format
l2cp-process profile profile-number
no l2cp profile [profile-number]

Parameters
Parameter Description
profile-number L2CP profile ID, an integer, ranging from 1 to 16

Default conditions
The L2CP profile is not applied to the interface. All L2CP packets will be handled as data
packets, which means that they will be forwarded transparently.

Command mode
Physical interface configuration/Global configuration

User level
15

Usage guidelines
Scenario
You can use this command to apply the established L2CP profile to the interface.
Prerequisite
The L2CP profile is created through the l2cp-profile command.
Follow-up procedure

Raisecom Proprietary and Confidential


265
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

After the global L2CP is enabled by the l2cp enable command, the profile on the interface
will take effect.
Precaution
The same interface can only use one L2CP profile at one time.

Examples
This example shows how to apply profile 1 to interface 2.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/1
Raisecom(config-gigaethernet1/1/1)#l2cp profile 1
Set successfully.

Related commands
show l2cp-process
show l2cp-process profile

2.9.2 l2cp-process tunnel destination-address

Function
To configure the destination MAC address of transparently transmitted packets, use this
command. To disable this function, use the no form of this command.

Format
l2cp-process tunnel destination-address mac-address
no l2cp-process tunnel destination-address

Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
Specify packets with destination MAC addresses in the range from
0180.c200.0004 to 0180.c200.0006, 0180.c200.0008 to
0180.c200.000d, 0180.c200.000f or 0180.c200.0020 (including
0180.c200.0020 to 0180.c200.002f)

Default conditions
N/A

Command mode
Global configuration

Raisecom Proprietary and Confidential


266
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

User level
11

Usage guidelines
Scenario
You can use this command to configure the destination MAC address of transparently
transmitted packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The destination MAC address of transparently transmitted packets must be a multicast
address.

Examples
This example shows how to configure the MAC address of transparent packets to
0180.c200.0004.
Raisecom#config
Raisecom(config)#l2cp-process tunnel destination-address 0180.c200.0004
Set successfully.

Related commands
show l2cp-process

2.9.3 l2cp-process protocol action

Function
To configure L2CP packets processing action, use this command. To disable this function, use
the no form of this command.

Format
l2cp-process protocol { oam | stp | dot1x | lacp | lldp | cdp | vtp | pvst |all } action { tunnel
| drop | peer }
no l2cp-process protocol { oam | stp | dot1x | lacp | lldp | cdp | vtp | pvst |all }

Parameters
Parameter Description
oam OAM packets

Raisecom Proprietary and Confidential


267
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameter Description
stp STP packets
dot1x Dot1x packets
lacp LACP packets
lldp LLDP packets
cdp CDP packets
vtp VTP packets
pvst PVST packets
all All L2CP packets
tunnel Tunnel transmits packets and gathers statistics.
drop Discard packets.
peer Submit to CPU and make statistics.

Default conditions
The default actions oam, stp, dot1x, lacp, lldp, and cdp of profile 1 belong to peer type and
the type of other protocols is drop. The default actions oam and lldp of profile 2 is peer type
and the type of other protocols is tunnel. The default oam of other created profiles is peer and
the type of others is tunnel.

Command mode
l2cp-profile configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure the action for processing L2CP packets, among the
parameters of Layer 2 control packets:
Lldp includes LLDP and PTP.
Stp includes STP, RSTP, and MSTP.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


268
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

You can use this command to configure processing action for slow protocol packets as a
whole and you can also configure processing action for the sub-protocol types of slow
protocol packets respectively. The action of the configured sub-protocol will be executed as a
priority. The slow protocol packets which are not configured with sub-protocol types will be
executed according to the processing action for slow protocol packets.
When you do not configure the action of slow protocols but only configure the processing
action of sub-protocol types, the statistics of packets will be gathered separately. When you
just configure the action of slow protocols but not the processing action of sub-protocol types,
the statistics of packets will be gathered uniformly. If you configure them concurrently, then
statistics of packets which match the sub-protocol type will be gathered alone and for
statistics of those mismatching the sun-protocol type will be gathered uniformly.

Examples
This example shows how to configure sending all packets in profile 1 to the CPU.
Raisecom#config
Raisecom(config)#l2cp-process profile 1
Raisecom(config-l2cp-profile)#l2cp-process protocol all action peer
Set successfully.

Related commands
show l2cp-process tunnel statistics

2.9.4 name

Function
To configure the L2CP profile name, use this command. To disable this function, use the no
form of this command.

Format
name string
no name

Parameters
Parameter Description
string Description of L2CP profile, a character string starts with letter or number,
with length ranging from 0 to 32

Default conditions
L2CP profile name is null.

Command mode
l2cp-profile configuration

Raisecom Proprietary and Confidential


269
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

User level
11

Usage guidelines
Scenario
You can describe the profile information after creating it.
Prerequisite
The L2CP profile is created through the l2cp profile command.
Follow-up procedure
You can use the show l2cp-profile command to show the description of L2CP profile.
Precaution
The description of the L2CP profile must be in form of character string which starts with
letters or numbers.

Examples
This example shows how to create L2CP profile epl.
Raisecom#config
Raisecom(config)#l2cp-profile 1
Raisecom(config-l2cpprofile)#name epl
Set successfully.

Related commands
show l2cp-process profile

2.9.5 tunnel vlan

Function
To configure specified VLANs of transparent transmission, use this command. To disable this
function, use the no form of this command.

Format
tunnel vlan vlan-id
no tunnel vlan vlan-id

Parameters
Parameter Description
vlan-id VLAN ID, an integer, ranging from 1 to 4094

Raisecom Proprietary and Confidential


270
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Default conditions
The VLAN is not specified.

Command mode
l2cp-profile configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure specified VLANs of transparent transmission.
Prerequisite
The L2CP profile is created through the l2cp-profile command.
Follow-up procedure
N/A
Precaution
You can use this command in profile mode. However, do not modify the specified VLAN
when the interface is using the profile.

Examples
This example shows how to configure the specified VLAN to VLAN 20.
Raisecom#config
Raisecom(config)#l2cp-profile 1
Raisecom(config-l2cp-profile)#tunnel vlan 20
Set successfully.

Related commands
show l2cp-process profile

2.9.6 tunnel interface

Function
To configure the specified egress interface of transparent transmission, use this command. To
disable this function, use the no form of this command.

Format
tunnel interface-type interface-number
no tunnel vlan port

Raisecom Proprietary and Confidential


271
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Parameters
Parameter Description
interface-type Interface types:
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface

interface-number Interface ID, with the value varying with the device models and
interface types:
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28

Default conditions
The outbound interface is not specified.

Command mode
l2cp-profile configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the specified interface of transparent transmission.
Prerequisite
The L2CP profile is created through the l2cp-profile command.
Follow-up procedure
N/A
Precaution
In profile mode, you can use this command. However, when the profile is in use, you are not
allowed to modify the specified VLAN.

Examples
This example shows how to configure outbound interface 1/1/2.
Raisecom#config
Raisecom(config)#l2cp-profile 1
Raisecom(config-l2cp-profile)#tunnel gigaethernet 1/1/2
Set successfully.

Raisecom Proprietary and Confidential


272
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Related commands
show l2cp-process profile

2.9.7 clear l2cp-process tunnel statistics

Function
To clear statistics of L2CP packets on the interface, use this command.

Format
clear l2cp-process tunnel statistics [interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface types:
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface

interface-number Interface ID, with the value varying with the device models and
interface types:
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
N/A

Examples
This example shows how to clear packets statistics on all interfaces.
Raisecom#config
Raisecom(config)#clear l2cp-process tunnel statistics
Set successfully.

Raisecom Proprietary and Confidential


273
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Related commands
show l2cp-process tunnel statistic

2.9.8 tunnel tunnel-type

Function
To configure the tunnel type of transparent transmission, use this command. To disable this
function, use the no form of this command.

Format
tunnel tunnel-type mac
no tunnel tunnel-type

Parameters
N/A

Default conditions
In flooding state

Command mode
l2cp-profile configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure the tunnel type of transparent transmission as mac.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can use this command in profile mode. However, do not modify the specified VLAN
while the interface is using the profile.

Examples
This example shows how to enable global L2CP.

Raisecom Proprietary and Confidential


274
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Raisecom#config
Raisecom(config)#l2cp-profile 1
Raisecom(config-l2cp-profile)#tunnel tunnel-type mac
Set successfully.

Related commands
show l2cp-process profile

2.9.9 show l2cp-process

Function
To show L2CP configurations, use this command.

Format
show l2cp-process [interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface types:
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface

interface-number Interface ID, with the value varying with the device models and
interface types:
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
10

Usage guidelines
N/A

Examples
This example shows how to show L2CP configurations.

Raisecom Proprietary and Confidential


275
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Raisecom#show l2cp-process profile


L2CP running informatiom
Port ProfileID BpduType mac-address l2cp-process
-------------------------------------------------------------------------
-----
PC1 -- -- -- --
PC2 -- -- -- --
GE1/1/1 -- -- -- --
GE1/1/2 -- -- -- --
GE1/1/3 -- -- -- --
GE1/1/4 -- -- -- --
GE1/1/5 -- -- -- --
GE1/1/6 -- -- -- --
GE1/1/7 -- -- -- --
GE1/1/8 -- -- -- --
GE1/1/9 -- -- -- --

The following table describes fields in the command output.

Field Description
Port Interface ID
ProfileID L2CP profile number
BpduType Protocol type
Mac-address MAC address
L2cp-process L2CP action

Related commands
N/A

2.9.10 show l2cp-process profile

Function
To show L2CP profile configurations, use this command.

Format
show l2cp-process profile [ profile-number ]

Parameters
Parameter Description
profile-number L2CP profile ID, an integer, ranging from 1 to 16

Default conditions
N/A

Raisecom Proprietary and Confidential


276
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Command mode
Any configuration except user EXEC

User level
10

Usage guidelines
N/A

Examples
This example shows how to show L2CP profile configurations.
Raisecom#show l2cp-process profile 1
Destination MAC Address for Encapsulated Packets: 010E.5E00.0003
ProfileId: 1
Name:
BpduType Mac-address l2cp-process Mac-vlan EgressPort tunneltype
-------------------------------------------------------------------------
-------------
stp 0180.C200.0000 tunnel -- -- none
dot1x 0180.C200.0003 peer -- -- none
lacp 0180.C200.0002 peer -- -- none
oam 0180.C200.0002 peer -- -- none
cdp 0100.0CCC.CCCC drop -- -- none
vtp 0100.0CCC.CCCC drop -- -- none
pvst 0100.0CCC.CCCD drop -- -- none
lldp 0180.C200.000E peer -- -- none
elmi 0180.C200.0007 peer -- -- none
udld 0100.0CCC.CCCC drop -- -- none
pagp 0100.0CCC.CCCC drop -- -- none

The following table describes fields in the command output.

Field Description
Profile L2CP profile number
name L2CP profile name
Bpudtype Protocol type
Mac-address MAC address
L2cp-process L2CP action
Mac-Vlan Specified VLAN
EgressPort Specified egress interface

tunneltype Tunnel type

Raisecom Proprietary and Confidential


277
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

Related commands
N/A

2.9.11 show l2cp-process tunnel statistics

Function
To show statistics of L2CP packets, use this command.

Format
show l2cp-process [ tunnel statistics ] [ interface-type interface-number]

Parameters
Parameter Description
interface-type Interface types:
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface

interface-number Interface ID, with the value varying with the device models and
interface types:
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
10

Usage guidelines
N/A

Examples
This example shows how to show statistics of L2CP packets on the interface.
Raisecom#show l2cp-process tunnel statistics
tunnel statistics informatiom
Port BpduType Encapsulation Decapsulation Drop
Counter Counter Counter

Raisecom Proprietary and Confidential


278
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 2 Ethernet

-------------------------------------------------------------------------
-----
PC1 stp 0 0 0
dot1x 0 0 0
lacp 0 0 0
oam 0 0 0
cdp 0 0 0
vtp 0 0 0
pvst 0 0 0
lldp 0 0 0
elmi 0 0 0
udld 0 0 0
pagp 0 0 0
PC2 stp 0 0 0
dot1x 0 0 0
lacp 0 0 0
oam 0 0 0
cdp 0 0 0
vtp 0 0 0
pvst 0 0 0

The following table describes fields in the command output.

Field Description
Port Interface ID
BpduType Protocol type
Encapsulation Encapsulation packets
Decapsulation Decapsulation packets
Discard Discard packets.

Related commands
N/A

Raisecom Proprietary and Confidential


279
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

3 Ring network protection

3.1 G.8032
3.1.1 clear ethernet ring-protection command

Function
To disable Ethernet Ring Protection Swithing (FS, MS, WTR timer timeout, and WTB timer
timeout) command, use this command.

Format
clear ethernet ring-protection ring-id command

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to disable Ethernet Ring Protection Switching (FS, MS, WTR
timer timeout, and WTB timer timeout) command.

Raisecom Proprietary and Confidential


280
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will disable the ERPS command. Use it with caution.

Examples
This example shows how to clear ERPS on protection ring 1.
Raisecom#config
Raisecom(config)#clear ethernet ring-protection 1 command
Set successfully.

Related commands
N/A

3.1.2 clear ethernet ring-protection statistics

Function
To clear ring protection statistics, use this command.

Format
clear ethernet ring-protection ring-id statistics

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


281
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Usage guidelines
N/A

Examples
This example shows how to clear statistics of protection ring 1.
Raisecom#config
Raisecom(config)#clear ethernet ring-protection 1 statistics
Set successfully.

Related commands
N/A

3.1.3 ethernet ring-protection

Function
To create G.8032 protection ring or sub-ring, use this command. To delete the ring, use the no
form of this command.

Format
ethernet ring-protection ring-id east { interface-type interface-number | port-channel port-
channel-number } west { interface-type interface-number | port-channel port-channel-
number } [ node-type { rpl-owner | rpl-neighbour } rpl { east | west } ] [ not-revertive ]
[ protocol-vlan vlan-id ] [ block-vlanlist vlan-list ]
ethernet ring-protection ring-id { east | west } { interface-type interface-number | port-
channel port-channel-number } [ node-type { rpl-owner | rpl-neighbour } ] [ not-
revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlan-list ]
no ethernet ring-protection ring-id

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
east Eastbound interface
west Westbound interface
interface-type Interface ID
interface-number The interface-type means interface type.
The interface-number refers to the three dimensional interface
ID.
port-channel port- LAG ID, an integer, ranging from 1 to 32
channel-number

Raisecom Proprietary and Confidential


282
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Parameter Description
rpl-owner The node type is RPL Owner
Located at one end of RPS. It is in interface blocking state when
the link is normal. When fault occurs, it will transition to active
state automatically.
rpl-neighbour Located at one end of RPS
Node type is Neighbor.
It is in interface blocking state when the link is normal.
not-revertive The protection ring transitions to non-revertive mode.
When the link is recovering from fault, the traffic will be
switched from the protection link to the working link if the
device is in revertive mode; the traffic will not be switched if
the device is in non-revertive mode; if the parameter is not
configured, the device is in revertive mode by default.
protocol-vlan Protocol VLAN, used for transmitting ERPS packets
vlan-id VLAN ID, an integer, ranging from 1 to 4094
block-vlanlist Blocked VLAN lists
vlan-list VLAN ID list, an integer, ranging from 1 to 4094,
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
G.8032, by defining different roles for the nodes on the ring, blocks loop to avoid broadcast
storm under normal condition. When faults occur on the links or nodes, it can immediately
switch the traffic to the backup link, thus implementing loop avoidance, protection switching
(with switching time less than 50ms which meets the requirement of carrier-grade
networking), and automatic recovery. It supports single ring, tangent ring, and intersecting
ring networking.
Prerequisite
N/A

Raisecom Proprietary and Confidential


283
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Follow-up procedure
N/A
Precaution
Only one device is allowed to be configured as RPL Owner and one as RPL Neighbor on the
ring. Other devices can be only configured as forwarding nodes.
The ethernet ring-protection ring-id east { interface-type interface-number | port-
channel port-channel-number } west { interface-type interface-number | port-channel
port-channel-number } node-type { rpl-owner | rpl-neighbour } rpl { east | west }
[ not-revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlanlist ] command is for
configuring the RPL Owner or RPL Neighbour. Therefore, you need to use therpl { east|
west } command to specify the interface on which the RPL is.
The ethernet ring-protection ring-id east { interface-type interface-number | port-
channel port-channel-number } west { interface-type interface-number | port-channel
port-channel-number } [ not-revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist
vlanlist ] is for configuring common forwarding nodes on the ring. Therefore, it is of no
need to specify RPL interface.
The tangent ring is formed by two separate single rings and is created the same as ordinary
single ring. The intersecting ring is divided into the master ring and sub ring. The way of
creating the master ring is the same as that of the sub ring and the way of creating the non-
intersecting nodes in the intersecting ring is the same as that of the single ring. The ways to
create the intersecting nodes in the sub ring are as follow:
Use the ethernet ring-protection ring-id { east | west } { interface-type interface-
number | port-channel port-channel-number } node-type { rpl-owner | rpl-neighbour }
[ not-revertive ] [ protocol-vlan vlan-id ] [ block-vlanlist vlanlist ] command to
configure the intersecting node in the sub ring as RPL Owner or RPL Neighbor. One
interface on the intersecting node in the intersecting node belongs to the master ring.
Therefore, you can just configure to switch traffic to the eastbound interface or
westbound interface. As a result, you don't need to use the rpl { east| west } command to
specify the RPL interface.
The ethernet ring-protection ring-id { east | west } { interface-type interface-number |
port-channel port-channel-number } [ not-revertive ] [ protocol-vlan vlan-id ] [ block-
vlanlist vlanlist ] is used for configuring the intersecting node in the sub link as the
common forwarding node. One interface on the intersecting node in the intersecting node
belongs to the master ring. Therefore, you can just configure to switch traffic to the
eastbound interface or westbound interface.
While configuring the intersecting ring, you need to configure the master ring first and
then the sub ring. Otherwise, the sub ring cannot find the master ring interface, which
will result in the failure of establish sub-ring virtual path.
The sub ring ID must be bigger than that of the master ring.

Examples
This example shows how to create G.8032 protection ring 1 and configure it as the
RPLOwner node.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 east gigaethernet 1/1/1 west
gigaethernet 1/1/2 node-type rpl-owner rpl east
Set successfully.

Raisecom Proprietary and Confidential


284
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Related commands
show ethernet ring-protection

3.1.4 ethernet ring-protection force-switch

Function
To forcedly switch the traffic to the eastbound or westbound interface, use this command.

Format
ethernet ring-protection ring-id FS { east | west }

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
east Block eastbound interface and forcedly switch traffic to the
westbound interface.
west Block westbound interface and forcedly switch traffic to the
eastbound interface.

Default conditions
When faults occur on the working link, the traffic will be automatically switched to the
protection link.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When no fault occurs in the network but you wish to make some adjustments, you can use
this command to forcedly switch the traffic to the eastbound or westbound interface.
Prerequisite
Protection ring is created through the ethernet ring-protection command. Otherwise,
configurations fail.
Follow-up procedure
You can use the clear ethernet ring-protection command to disable the function after the
completion of adjustments.

Raisecom Proprietary and Confidential


285
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Precaution
N/A

Examples
This example shows how to configure protection ring 1, block eastbound interface, and
forcedly switch the traffic to the westbound interface.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 FS east
Set successfully.

Related commands
show ethernet ring-protection

3.1.5 ethernet ring-protection guard-time

Function
To configure ring guard timer, use this command. To return to the default condition, use the
no form of this command.

Format
ethernet ring-protection ring-id guard-time guard-time
no ethernet ring-protection ring-id guard-time

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
guard-time Value of guard timer, an integer, ranging from 20 to 2000, in units of
ms

Default conditions
The value of the Guard timer is 500ms.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


286
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

If the node recovers immediately from faults in a large-scale ring network, it may receive the
fault notification sent by itself from neighboring nodes and be Down again. However, after
the guard timer is configured, the node with faults will not process APS packets within a
period.
Prerequisite
The protection ring should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the Guard timer on protection ring 1 to 1000ms.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 guard-time 1000
Set successfully.

Related commands
show ethernet ring-protection

3.1.6 ethernet ring-protection holdoff-time

Function
To configure ring Holdoff timer, use this command. To return to the default condition, use the
no form of this command.

Format
ethernet ring-protection ring-id holdoff-time holdoff-time
no ethernet ring-protection ring-id holdoff-time

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
holdoff-time Value of Holdoff timer, an integer, ranging from 0 to 100, in units of
100ms

Default conditions
The value of HOLDOFF timer is 0ms.

Raisecom Proprietary and Confidential


287
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After the Holdoff timer is configured, the system will delay to report faults when the working
link fails, which means that the traffic will be switched to the protection link after a delayed
period, thus avoiding frequent switching caused by working link oscillation.
Prerequisite
Protection ring is created through the ethernet ring-protection command. Otherwise,
configurations fail.
Follow-up procedure
N/A
Precaution
If the value of the Holdoff timer is configured too big, it will affect the 50ms switching
performance. Therefore, it is recommended to use the default value "0".

Examples
This example shows how to configure the Holdoff timer on protection ring 1 to 100ms.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 holdoff-time 1
Set successfully.

Related commands
show ethernet ring-protection

3.1.7 ethernet ring-protection manual-switch

Function
To configure to manually switch traffic to the eastbound interface or westbound interface on
the ring, use this command.

Format
ethernet ring-protection ring-id MS { east | west }

Raisecom Proprietary and Confidential


288
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
east Block eastbound interface and forcedly switch traffic to the
westbound interface.
west Block westbound interface and forcedly switch traffic to the
eastbound interface.

Default conditions
The traffic will be automatically switched to the protection link while the working link fails.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the link is working well, but you wish to switch the service to another link, you can use
this command to do it manually.
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
After the completion of network adjustment, you need to use the clear ethernet ring-
protection command command to disable the command in time.
Precaution
The priority of manual switches is lower than that of forced switches and automatic protection
switching.

Examples
This example shows how to configure G.8032 protection ring 1 to block westbound interface
and manually switch the traffic to the eastbound interface.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 MS west
Set successfully.

Raisecom Proprietary and Confidential


289
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Related commands
show ethernet ring-protection

3.1.8 ethernet ring-protection name

Function
To configure the protection ring name, use this command. To delete the name, use the no form
of this command.

Format
ethernet ring-protection ring-id name string
no ethernet ring-protection ring-id name

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
string Protection ring name, a string of 1 to 32 characters

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the name of the protection ring for identification
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


290
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Examples
This example shows how to configure the name of protection ring 1 as Raisecom.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 name Raisecom
Set successfully.

Related commands
show ethernet ring-protection

3.1.9 ethernet ring-protection propagate enable

Function
To enable ring protection Propagate feature on the intersecting node, use this command. To
disable this function, use the disable form of this command.

Format
ethernet ring-protection ring-id propagate { enable | disable }

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
enable Enable Propagate on the ring.
disable Disable Propagate on the ring.

Default conditions
The Propagate on the ring is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The data in the sub ring will be forwarded through the master ring. Therefore, there will be a
MAC address table on the device in the master ring. When the sub ring fails, the master ring
can be immediately informed through Propagate to refresh the MAC address table, thus
avoiding traffic loss.

Raisecom Proprietary and Confidential


291
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable Propagate on the intersecting node in sub ring 1.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 propagate enable
Set successfully.

Related commands
show ethernet ring-protection

3.1.10 ethernet ring-protection raps-vc

Function
To configure the mode of sub-ring virtual channel, use this command. To return to the default
condition, use the no form of this command.

Format
ethernet ring-protection ring-id raps-vc { with | without }
no ethernet ring-protection ring-id raps-vc

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
with Adopt with mode.
without Adopt without mode.

Default conditions
It adopts with mode.

Command mode
Global configuration

Raisecom Proprietary and Confidential


292
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

User level
11

Usage guidelines
Scenario
The mode of the sub-ring virtual path should be configured on the intersecting node. The links
between the intersecting nodes belong to the master ring. Therefore, the transmission modes
of the protocol packets in the sub ring are different from that of the master ring, as listed
below.
with: protocol packets in the sub ring are forwarded through the master ring.
without: protocol packets in the sub ring are forwarded through the sub-ring protocol
VLAN.
Prerequisite
Protection ring is created through the ethernet ring-protection command. Otherwise,
configurations fail.
Follow-up procedure
N/A
Precaution
The sub-ring virtual path mode of the two intersecting nodes must be configured the same.

Examples
This example shows how to configure the mode of sub-ring 1 virtual path as without.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 raps-vc without
Set successfully.

Related commands
show ethernet ring-protection

3.1.11 ethernet ring-protection version

Function
To configure the protocol type, use this command.

Format
ethernet ring-protection ring-id version { 1 | 2 }

Raisecom Proprietary and Confidential


293
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
1 Protocol version1
2 Protocol version2

Default conditions
Protocol version 2 is in use.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to enable all nodes on the same ring with the same version of
protocols. Otherwise, they cannot communicate with each other normally.
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
Version 1 distinguishes rings from each other through protocol VLAN. Therefore, different
rings should be configured with different protocol VLANs. It is recommended to configure
different rings with different protocol VLANs even though you use protocol version 2.

Examples
This example shows how to configure the version of protocol on protection ring 1 to 2.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 version 2
Set successfully.

Related commands
show ethernet ring-protection

Raisecom Proprietary and Confidential


294
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

3.1.12 ethernet ring-protection wtr-time

Function
To configure WTR timer on the ring, use this command. To return to the default condition,
use the no form of this command.

Format
ethernet ring-protection ring-id wtr-time wtr-time
no ethernet ring-protection ring-id wtr-time

Parameters
Parameter Description
ring-id Ethernet ring ID, an integer, ranging from 1 to 255
wtr-time Value of WTR timer, an integer, ranging from 1 to 12, in units of second

Default conditions
The value of WTR timer is 5min.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
In revertive mode, the traffic will be switched to the working link when the WTR timer
timeout expires. You can use this command to adjust the WTR value to avoid frequent link
switching.
Prerequisite
The ring protection should be created through the ethernet ring-protection command.
Otherwise, configurations fail.
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


295
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Examples
This example shows how to configure WTR timers on protection ring 1 to 10min.
Raisecom#config
Raisecom(config)#ethernet ring-protection 1 wtr-time 10
Set successfully.

Related commands
show ethernet ring-protection

3.1.13 show ethernet ring-protection

Function
To show configurations of G.8032 ring protection, use this command.

Format
show ethernet ring-protection

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to show configurations of ring protection.
Raisecom#show ethernet ring-protection
Id/Name Role Proto-Vlan Proto-Ver Revertive-Mode Status FS/MS RAPS-VC
East(Rpl/State) West(Rpl/State) Guard(ms) Wtr(m)
Wtb(s) Holdoff(100ms) Pro Trap
-------------------------------------------------------------------------
Raisecom Owner 1 V2 Revert Force-switch East/East With

Raisecom Proprietary and Confidential


296
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

GE1/1/1 8190-8191(Y/Block) GE1/1/2 8190-8191(N/Block) 500 5


6 1 enable enable

The following table describes fields in the command output.

Field Description
Id/Name Protection ring ID/name
Role RPL node type
Owner: master node
Neighbour: neighboring nodes
Transfer: transmitting node

Proto-Vlan Protocol VLAN


Proto-Ver Protocol version
Revertive-Mode Revertive mode
Revertive: revertive mode
Non-revertive: non-revertive mode
Status State
Idle: idle
Protection: protecting
Manual-Switch: manual switch
Force-Switch: forced switch
Pending: in the pending recovery state

FS/MS Whether configured with Force-Switch/Manual-Switch


Y(N)/Y(N)
with: protocol packets in the sub ring are forwarded
RAPS-VC
through the master ring.
without: protocol packets in the sub ring are forwarded

through the sub-ring protocol VLAN.


East(Rpl/State) Eastbound
Rpl: whether it is RPL link
Y: Yes
N: No
State: interface status
Block: in blocking state
Forward: in forwarding state
West(Rpl/State) Westbound Rpl: whether it is RPL link
Y: Yes
N: No
State: interface status
Block: in blocking state
Forward: in forwarding state
Guard(ms) Value of Guard timer
Wtr(m) Value of WTR timer
Wtb(s) Value of WTB timer

Raisecom Proprietary and Confidential


297
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Field Description
Holdoff(100ms) Value of Holdoff timer
Pro Propagate status
enable: enabled
disable: disabled
Trap Failure Trap status
enable: enabled
disable: disabled

Related commands
N/A

3.1.14 show ethernet ring-protection statistic

Function
To show statistics of ring protection, use this command.

Format
show ethernet ring-protection statistic

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to show ring protection statistics.
Raisecom#show ethernet ring-protection statistics
Id/Name Direction State Link-State Last-Occur(ago) ApsTx ApsRx sc
------------------------------------------------------------------------

Raisecom Proprietary and Confidential


298
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

Raisecom East Block SF 0 days,1:53:10:760 0 0 1


2 East Block SF 0 days,9: 3:50:510 0 0 1

The following table describes fields in the command output.

Field Description
Id/Name Protection ring ID/name
Show the name of the protection ring if it is configured with
name. Otherwise, check the ID.
Direction Link direction
East: eastbound
West: westbound
State Interface state
Block: in blocking state
Forward: in forwarding state

Link-State Link state


OK: normal
SF: abnormal
Last-Occur(ago) Latest time when the event occurred
ApsTx Number of APS packets sent
ApsRx Number of APS packets received
sc Switching times which increase from 0

Related commands
N/A

3.1.15 show ethernet ring-protection status

Function
To show protection ring status, use this command.

Format
show ethernet ring-protection status

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


299
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 3 Ring network protection

User level
11

Usage guidelines
N/A

Examples
This example shows how to show protection ring status.
Raisecom#show ethernet ring-protection status
Id/Name Bridge-State Last Occur(ago) East-State West-State sc
Traffic-vlanlist
-------------------------------------------------------------------------
Raisecom Force-switch 0 days,1:59:57:480 Block N/A 1
1-4094
2 Protection 0 days,9:10:37:230 Block N/A 0
1-4094

The following table describes fields in the command output.

Field Description
Id/Name Protection ring ID/name
Bridge-State Bridge state
Idle: idle
Protection: protecting
Manual-Switch: manual switch
Force-Switch: forced switch
Pending: in the pending recovery state

Last Occur(ago) Latest time when the event occurred


East-State Eastbound interface status
Block: in blocking state
Forward: in forwarding state
West-State Westbound interface status
Block: in blocking state
Forward: in forwarding state
sc Switching times which increase from 0
Traffic-vlanlist Traffic VLAN list

Related commands
N/A

Raisecom Proprietary and Confidential


300
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

4 IP service

4.1 ARP
4.1.1 arp

Function
To configure the static ARP, use this command. To delete one entry of ARP, use the no form
of this command.

Format
arp ip-address mac-address
no arp ip-address

Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
mac-address MAC address, in dotted hexadecimal notation, such as
000E.5E12.3456

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


301
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Usage guidelines
Scenario
You can use this command to configure the static ARP.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure static ARP with the IP address of 192.168.27.26 and
the corresponding MAC address of 000e.5e12.3456.
Raisecom#config
Raisecom(config)#arp 192.168.27.26 000e.5e12.3456
Set successfully.

Related commands
show arp

4.1.2 arp aging-time

Function
To configure the aging time of dynamic ARP entries, use this command. To return to the
default condition, use the no form of this command.

Format
arp aging-time time
no arp aging-time

Parameters
Parameter Description
time Aging time, an integer, ranging from 60 to 2147483, in units of
second

Default conditions
The aging time of dynamic ARP entries is 1200 seconds.

Raisecom Proprietary and Confidential


302
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the aging time of dynamic ARP entries.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the aging time of dynamic ARP entries to 1500 seconds.
Raisecom#config
Raisecom(config)#arp aging-time 1500
Set successfully.

Related commands
show arp

4.1.3 arp learning enable

Function
To enable the interface with the function of dynamically learning the ARP, use this command.
To disable this function, use the disable form of this command.

Format
arp learning { enable | disable }

Parameters
Parameter Description
enable Enable the interface with the function of dynamically
learning the ARP.

Raisecom Proprietary and Confidential


303
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Parameter Description
disable Disable the function of dynamically learning the ARP on
the interface.

Default conditions
The function of dynamically learning ARP on the interface is enabled.

Command mode
Physical interface configuration/Aggregation group interface configuration

User level
11

Usage guidelines
Scenario
When the dynamic ARP learning is disabled on the interface:
The interface will respond to the ARP Request packet with the ARP Reply packet but
will not learn ARP.
You need to configure static ARP if you wish the interface to communicate with other
devices/interfaces normally.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to disable dynamic ARP learning on the interface within VLAN 1.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#arp learning disable
Set successfully.

Related commands
show arp

Raisecom Proprietary and Confidential


304
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

4.1.4 arp max-learning-num

Function
To configure the maximum number of ARPs to be dynamically learned on the interface, use
this command.

Format
arp max-learning-num number

Parameters
Parameter Description
number Maximum number, an integer, ranging from 1 to 768

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the maximum number of ARPs to be dynamically
learned on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the maximum number of ARPs to be dynamically
learned on the interface within VLAN 1 to 100.
Raisecom#config
Raisecom(config)#arp max-learning-num 100

Raisecom Proprietary and Confidential


305
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Set successfully.

Related commands
show run

4.1.5 arp mode

Function
To configure the ARP mode, use this command.

Format
arp mode { learn-all | learn-reply-only }

Parameters
Parameter Description
learn-all Learn MAC addresses contained in the reply packets of all
hosts.
learn-reply-only Learn the MAC address contained in the reply packet from
the requested host.

Default conditions
Learning MAC addresses contained in the reply packets of all hosts is enabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the ARP mode.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


306
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Examples
This example shows how to configure the ARP mode to learning MAC addresses contained in
the reply packets of all hosts.
Raisecom#config
Raisecom(config)#arp mode learn-all
Set successfully.

Related commands
show arp

4.1.6 clear arp

Function
To clear all ARP entries, use this command.

Format
clear arp [ip-address | interface interface-type interface-number ]

Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
interface Clear ARP entries on the interface.
interface-type The interface-type means interface type.
interface-number The interface-number refers to interface ID.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to shorten the aging time of invalid ARP entries while maintaining
the ARP list.
Prerequisite

Raisecom Proprietary and Confidential


307
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

N/A
Follow-up procedure
N/A
Precaution
Clearing entries will affect the packets forwarding performance when there are a huge amount
of dynamic ARP entries. We recommend you to use the command of clearing a single entry.

Examples
This example shows how to clear ARP entries.
Raisecom#config
Raisecom(config)#clear arp
Set successfully.

Related commands
show arp

4.1.7 gratuitous-arp-learning

Function
To enable gratuitous ARP learning on the interface, use this command. To disable this
function, use the disable form of this command.

Format
gratuitous-arp-learning { enable | disable }

Parameters
Parameter Description
enable Enable gratuitous ARP learning on the interface.
disable Disable gratuitous ARP learning on the interface.

Default conditions
The gratuitous ARP learning on the interface is enabled.

Command mode
Physical interface configuration/VLAN interface configuration

User level
11

Raisecom Proprietary and Confidential


308
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Usage guidelines
Scenario
When the dynamic ARP learning on the interface is disabled, the interface just checks address
conflicts but does not learn ARP packets while it receives gratuitous ARP.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to disable gratuitous ARP learning on the interface within VLAN1.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#gratuitous-arp-learning disable
Set successfully.

Related commands
show run

4.1.8 show arp

Function
To show information about ARP, use this command.

Format
show arp [ ip-address | interface vlan vlan-id | static ]

Parameters
Parameter Description
ip-address Show ARP information about the IP address.
static Show static ARP.
interface vlan vlan-id Show ARP information on the VLAN interface.

Default conditions
N/A

Raisecom Proprietary and Confidential


309
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show global ARP.
Raisecom#show arp
ARP aging-time: 1200 seconds(default: 1200s)
ARP mode: Learn all
ARP table:
Total: 0 Static: 0 Dynamic: 0

IP Address Mac Address Interface Type


Age(s) status
-------------------------------------------------------------------------

172.16.131.108 0000.0000.0000 vlan131 dynamic


24 FAILED

172.16.127.111 BC30.5BCB.5C7A vlan127 dynamic


99 REACHABLE

The following table describes fields in the command output.

Field Description
ARP aging-time Aging time of the dynamic ARP
ARP mode ARP mode
ARP table Statistics of ARP entries
Total Total
Static Number of static ARPs
Dynamic Number of dynamic ARPs
IP Address IP address
Mac Address MAC address
Interface Interface
Type ARP type
Age(s) ARP timing
Status Status

Raisecom Proprietary and Confidential


310
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Related commands
N/A

4.2 IP basic configuration


4.2.1 ip address

Function
To configure the IP address of the VLAN interface, use this command. To delete the IP
address, use the no form of this command.

Format
ip address ip-address [ ip-mask ] [ sub ]
no ip address ip-address [ sub ]

Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.0.0.1
ip-mask Mask of IP address, in dotted decimal notation, such as
255.0.0.0
sub Sub-IP address

Default conditions
The interface is not configured with IP address.

Command mode
VLAN interface configuration/Loopback interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the IP address of the interface which supports Layer3
physical configuration mode for transmitting and receiving IP packets.
Prerequisite
N/A

Raisecom Proprietary and Confidential


311
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure loopback interface 1 with the IP address of
192.168.11.101 and mask of 255.255.0.0.
Raisecom#config
Raisecom(config)#interface loopback 1
Raisecom(config-loopback1)#ip address 192.168.11.101 255.255.0.0
Set successfully.

Related commands
show interface

4.2.2 ipv6 address

Function
To configure the IPv6 address of the interface, use this command. To delete the default
gateway, use the no form of this command.

Format
ipv6 address ipv6-address/prefix-length [ sub ]
no ipv6 address ipv6-address

Parameters
Parameter Description
ipv6-address/prefix-length IPv6 address with prefix length, in form of A:B::C:D/M
sub Sub-IPv6 address

Default conditions
N/A

Command mode
VLAN interface configuration/Loopback interface configuration

User level
11

Raisecom Proprietary and Confidential


312
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Usage guidelines
Scenario
In interface configuration mode, you can use this command to configure the IPv6 address of
the device and associate it with a VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The number of VLANs associated with each interface shall be no more than 1024.

Examples
This example shows how to configure the IPv6 address of VLAN1 to 1030:0::48AA:1A2B,
with the prefix length of 60.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ipv6 address 1030:0::48AA:1A2B/60
Set successfully

Related commands
show ipv6 interface

4.2.3 show ip interface brief

Function
To show configurations of the IP address, use this command.

Format
show ip interface brief

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


313
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

User level
15

Usage guidelines
N/A

Examples
This example shows how to show configurations of the IP address.
Raisecom#show ip interface brief
VRF IF Address NetMask
Catagory
-------------------------------------------------------------------------
------------------------------
Default-IP-Routing-Table fastethernet1/0/1 192.168.0.1
255.255.255.0 primary

The following table describes fields in the command output.

Parameter Description
VRF VRF name
IF IP interface ID
Address IP address
NetMask Network mask
Source Type
Catagory Primary and subordinate IP address
primary: primary IP address
sub: subordinate IP address

Related commands
N/A

4.2.4 show ipv6 interface brief

Function
To show configurations of the TPv6 address, use this command.

Format
show ipv6 interface brief

Parameters
N/A

Raisecom Proprietary and Confidential


314
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
15

Usage guidelines
N/A

Examples
This example shows how to show configurations of the IPv6 address.
Raisecom#show ipv6 interface brief
IF Source Type Address
------------------------------------------------------------
0 negotiate link-local FE80::20E:5EFF:FE00:16/64
1 negotiate link-local FE80::20E:5EFF:FE00:16/64
2 negotiate link-local FE80::20E:5EFF:FE00:16/64
3 negotiate link-local FE80::20E:5EFF:FE00:16/64

The following table describes fields in the command output.

Field Description
IF IP interface ID
Source Source
assigned: IP address configured statically
negotiate: address obtained from the protocol stack
dhcp: IP address obtained from the DHCP server

Type Type
global-unicast: global unicast address
link-local: link local address
Address IPv6 address

Related commands
N/A

Raisecom Proprietary and Confidential


315
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

4.3 Static routes


4.3.1 ip route

Function
To create a static route, use this command. To delete the static route, use the no form of this
command.

Format
ip route ip-address { masklength | ip-mask } next-hop-ip-address
no ip route ip-address{ masklength | ip-mask } next-hop-ip-address

Parameters
Parameter Description
ip-address Destination IP address, in dotted decimal notation, such as 10.0.0.1
Delete the IP static route if the parameter is configured in no form.
Delete all static routes if the parameter is not configured.
masklength Mask length, an integer, ranging from 0 to 32
ip-mask Mask length, in dotted decimal notation, such as 255.255.255.255
next-hop-ip- Next-hop IP address, in dotted decimal notation, such as 10.0.0.1
address

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the network topology is simply, you can create static routes manually to realize the
communication between devices.
The static route will not be affected by the topology change. It remains the same when the
topology changes.
Prerequisite

Raisecom Proprietary and Confidential


316
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

N/A
Follow-up procedure
N/A
Precaution
The next hop of the route must be directly connected to the device while using this
command to create a static route. Otherwise, configurations fail.
The mask must match with the IP address. Otherwise, configurations fail.

Examples
This example shows how to add a route with destination IP address being 10.0.0.1 and the IP
address of the next hop being10.0.1.2.
Raisecom#config
Raisecom(config)#ip route 10.0.0.1 255.0.0.0 10.0.1.2
Set successfully.

This example shows how to delete all statics routes.


Raisecom(config)#no ip route 192.168.3.0 255.255.255.0
Set successfully.

Related commands
show ip route

4.3.2 ip route static distance

Function
To configure the default administrative distance of the static route, use this command. To
disable this function, use the no form of this command.

Format
ip route static distance distance
no ip route static distance

Parameters
Parameter Description
distance Administrative distance, an integer, ranging from 1 to 255

Default conditions
The administrative distance is 1.

Raisecom Proprietary and Confidential


317
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
While configuring static routes, the priority of the administrative distance from high to low is:
the specified administrative distance while configuring static routes and the default
administrative distance configured.
Using this command to modify the default administrative distance of the static route will not
affect the configured static route. If you save the configuration, the administrative distance of
the static route maintains the same after the device is rebooted.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the default administrative distance of the static route to
2.
Raisecom#config
Raisecom(config)#ip route static distance 2
Set successfully.

Related commands
show ip route

4.3.3 show ip route

Function
To show information about the IPv4 routing table, use this command.

Format
show ip route [ detail ]

Raisecom Proprietary and Confidential


318
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Parameters
Parameter Description
detail Show details about the IPv4 routing table

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to show details about the IPv4 routing table.
Raisecom#show ip route detail
Routing Tables: Default-IP-Routing-Table
Destination: 192.168.0.0/24
Protocol: connected Process ID: 0
Distance: 0 Metric: 0
NextHop: 192.168.0.1 Neighbour: 0.0.0.0
RelayNextHop: 0.0.0.0 Interface: FE1/0/1
Label: 0 TunnelID:
State: Active Fib Age: 2d07h36m
Tag: 0 XC Index: 0

Destination: 192.168.0.1/32
Protocol: connected Process ID: 0
Distance: 0 Metric: 0
NextHop: 192.168.0.1 Neighbour: 0.0.0.0
RelayNextHop: 0.0.0.0 Interface: FE1/0/1
Label: 0 TunnelID:
State: Active Fib Age: 2d07h36m
Tag: 0 XC Index: 0

The following table describes fields in the command output.

Field Description
Destination Destination IP address/mask length
Proto Protocol type
Process ID Process ID

Raisecom Proprietary and Confidential


319
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Field Description
Distance Administrative distance
Metric Metric value
Nexthop Next-hop IP address
Neighbour Neighbor
RelayNextHop Recursive to the next hop
Interface Interface ID
Label Label
TunnelID Tunnel ID
State State
Age Time-to-leave
Tag Tag
XC Index XC index

Related commands
N/A

4.4 NDP
4.4.1 clear ipv6 neighbors

Function
To clear information of all IPv6 neighbors, use this command.

Format
clear ipv6 neighbors

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

Raisecom Proprietary and Confidential


320
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

User level
11

Usage guidelines
Scenario
You can use this command to clear information of all IPv6 neighbors.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear information of all IPv6 neighbors and the information
cannot be recovered. Use it with caution.

Examples
This example shows how to clear the NDP neighbor information of the IPv6.
Raisecom#config
Raisecom(config)#clear ipv6 neighbors
Set successfully

Related commands
show ipv6 neighbors

4.4.2 ipv6 neighbors

Function
To configure static neighbor entries, use this command. To disable this function, use the no
form of this command.

Format
ipv6 neighbor ipv6-address mac-address interface-type interface-number
no ipv6 neighbor ipv6-address

Parameters
Parameter Description
ipv6-address IPv6 unicast address, in colon hexadecimal notation

Raisecom Proprietary and Confidential


321
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Parameter Description
mac-address MAC address, in dotted hexadecimal notation
It shall not be a multicast MAC address or an address with all bytes
being 0
interface-type Interface type:
vlan: logical interface, VLAN interface
loopback: logical interface, loopback interface
port-channel: logical interface, LAG interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
fastethernet: physical interface,100 Mbit/s Ethernet interface

interface-number Interface ID, the value varies with different models and interface
types:
vlan: 1 to 4094
loopback: 1 to 16
port-channel: 1 to 8; 1.x to 8.x (x = 1 to 4094)
gigaethernet: 1/1/1 to 1/1/24
fastethernet: 1/0/1
ten gigaethernet: 1/1/25 to 1/1/28

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure static neighbor table entries, and add the mapping
between IPv6 address and MAC address (which will not be aged) to the address mapping
table. You cannot use the no ipv6 neighbor ipv6-address command to clear dynamic
neighbor entries.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


322
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Examples
This example shows how to configure a static neighbor entry with IPv6 address and MAC
address of VLAN 1 being 2001::3 and 000E.5E12.3456 respectively.
Raisecom#config
Raisecom(config)#ipv6 neighbor 2001::3 000E.5E12.3456 vlan 1
Set successfully

Related commands
show ipv6 neighbors

4.4.3 ipv6 nd dad attempts

Function
To configure times for sending NS while checking whether the address is occupied, use this
command. To return to the default condition, use the no form of this command.

Format
ipv6 nd dad attempts value
no ipv6 nd dad attempts

Parameters
Parameter Description
value Times for sending NS, an integer, ranging from 0 to 600 where 0
means forbidding checking whether the address is occupied

Default conditions
The time is 1.

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
When obtaining an IPv6 address, the device uses the function to make sure whether the
address is occupied by other devices.

Raisecom Proprietary and Confidential


323
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

You can use this command to configure times for sending NS while the device is checking
whether the address is occupied by other devices. After sending the NS for specified times,
the device will be sure that the address is usable if it receives no response.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure times of sending NS while VLAN 1 interface IP 1 is
checking whether the address is occupied by other devices to 5.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ipv6 nd dad attempts 5
Set successfully

Related commands
show ipv6 interface nd

4.4.4 ipv6 neighbors max-learning-num

Function
To configure the maximum number of NDPs allowed to be learned on the VLAN interface,
use this command. To return to the default condition, use the no form of this command.

Format
ipv6 neighbors max-learning-num number
no ipv6 neighbors max-learning-num

Parameters
Parameter Description
number The maximum number of NDPs, an integer, ranging from 1 to 1024

Default conditions
The maximum number of NDP allowed to be learned on the VLAN interface is 512.

Raisecom Proprietary and Confidential


324
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
The switch can obtain the link layer address of neighboring nodes through NS and NA
messages and include the address in the neighbor information table. However, if the size of
the dynamically obtained neighbor information table is too large, the forwarding performance
of the device may decrease.
You can use this command to configure the maximum number of NDPs allowed to be learned
on the interface. When then number of dynamic neighbors learned on the VLAN interface
exceeds the maximum, the VLAN interface will stop learning neighbour information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the maximum number of NDPs allowed to be learned
on interface IP 2 within VLAN 1 to 4.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ipv6 neighbors max-learning-num 4
Set successfully

Related commands
show ipv6 interface nd

4.4.5 show ipv6 neighbors

Function
To show IPv6 neighbors configuration, use this command.

Format
show ipv6 neighbors [ ipv6-address | vlan vlan-id | static ]

Raisecom Proprietary and Confidential


325
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Parameters
Parameter Description
ipv6-address Show neighbors configuration of specified IPv6 address, in
colon hexadecimal notation
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
static Show static IPv6 neighbors configuration

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use the following commands to show IPv6 neighbors configuration.
Use the show ipv6 neighbors command to show all neighbors configurations, including
information obtained dynamically and configured statically.
Use the show ipv6 neighbors ipv6-address command to show neighbors information of
specified IPv6.
Use the show ipv6 neighbors ip if-number command to show neighbors information on
specified Layer 3 interface.
Use the show ipv6 neighbors static command to show neighbors information
configured statically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show information about all IPv6 neighbors.
Raisecom#show ipv6 neighbors
Aging time of dynamic neighbors(s): 1200

Raisecom Proprietary and Confidential


326
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

IPv6 Address Mac Address Interface State Type Age


-----------------------------------------------------------------------
2001::2 0089.0056.0012 0 reachable static --

Total: 1
Static: 1
Dynamic:0

The following table describes fields in the command output.

Field Description
Aging time of dynamic Aging time of dynamic neighbor (s), system default
neighbors(s) configuration
IPv6 Address IPv6 address of the neighbor
Mac Address MAC address of the neighbor
Interface Layer 3 interface which is connected to the neighbor device
State State of neighbors
Type Type of neighbor information
static: in static status
dynamic: in dynamic status
Age Age
When the Type display information is static, it shows "--".
When the Type display information is dynamic, it shows the
time since packets were sent to neighbors the latest time till
now.
Total Total amount of neighbor information
Static Amount of static neighbor information
Dynamic Amount of dynamic neighbor information

Related commands
N/A

4.4.6 show ipv6 interface prefix

Function
To show information about IPv6 prefix, use this command.

Format
show ipv6 interface prefix [ interface-type interface-number ]

Raisecom Proprietary and Confidential


327
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Parameters
Parameter Description
interface-type Interface types:
vlan: logical interface, VLAN interface
loopback: logical interface, loopback interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface
interface-number Interface ID, the value varies with different models and interface
types:
vlan: 1 to 4094
loopback: 1 to 16
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show information about IPv6 prefix, including prefix length,
prefix sources, prefix on-link flag, prefix automatic configuration flag, prefix preferred time,
and prefix lifetime.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show information about IPv6 prefix of IP 0.
Raisecom#show ipv6 interface prefix ip 0

Raisecom Proprietary and Confidential


328
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Interface Prefix PrefixLen Origin OnLinkFlag AutoFlag


PreferredLifetime ValidLifetime
-------------------------------------------------------------------------
-------------------------------------------
0 FE80:: 64 wellknown off-link non-auto
infinite infinite

The following table describes fields in the command output.

Field Description
Interface Interface ID
Prefix Prefix information
PrefixLen Prefix length
Origin Origin
OnLinkFlag Onlink flag displays the status of the prefix
on-link: directly connected and reachable
off-link: indirectly connected and reachable
AutoFla Automatic configuration flag
PreferredLifetime Preferred time, namely, the preferred life time of the
prefix for stateless address configuration
ValidLifetime Valid lifetime of the prefix

Related commands
N/A

4.4.7 show ipv6 interface nd

Function
To show information about ND configured on the interface, use this command.

Format
show ipv6 interface nd [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type:
vlan: logical interface, VLAN interface
loopback: logical interface, loopback interface
tengigaethernet: physical interface, 10 Gbit/s interface
gigaethernet: physical interface, 1000 Mbit/s interface

Raisecom Proprietary and Confidential


329
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Parameter Description
interface-number Interface ID, the value varies with different models and interface
types:
vlan: 1 to 4094
loopback: 1 to 16
gigaethernet: 1/1/1 to 1/1/24
ten gigaethernet: 1/1/25 to 1/1/28

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show ND configurations on Layer 3 interfaces, including
Layer3 interface ID, times of sending NS, and the maximum number of neighbors.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure ND configurations on Layer 3 interface IP 0.
Raisecom#show ipv6 interface nd ip 0
Interface NS number MaxNbr Number
-----------------------------------------------
0 7 5

The following table describes fields in the command output.

Field Description
Interface Layer three interface ID

Raisecom Proprietary and Confidential


330
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 4 IP service

Field Description
NS number Times of sending NS
MaxNbr Number Maximum number of neighbors

Related commands
ipv6 nd dad attempts
ipv6 neighbors max-learning-num

Raisecom Proprietary and Confidential


331
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

5 PoE

This chapter is only supported by models of PoE type.

5.1.1 poe enable

Function
To enable PoE on the interface, use this command. To disable this function, use the disable
form of this command.

Format
poe { enable | disable }

Parameters
Parameter Description
enable Enable PoE on the interface.
disable Disable PoE on the interface.

Default conditions
Enabled

Command mode
Physical interface configuration

User level
11

Raisecom Proprietary and Confidential


332
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Usage guidelines
Scenario
You can use this command to configure PoE on the interface.
Enable PoE on the interface after which the interface can supply power and transmit data
concurrently.
Disable PoE on the interface after which the interface stops supplying power.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable PoE on interface 1/1/3.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/3
Raisecom(config-gigaethernet1/1/3)#poe enable
Set successfully.

Related commands
show poe port-list

5.1.2 poe force-power

Function
To configure force-power on the interface, use this command. To disable this function, use the
no form of this command.

Format
poe force-power
no poe force-power

Parameters
N/A

Default conditions
Disabled

Raisecom Proprietary and Confidential


333
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Command mode
Physical interface configuration

User level
11

Usage guidelines
Scenario
When the normal power supply is not enough for the device to run normally, you can enable
the force-power.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When using the PoE switch to supply power for the remote PD, we recommend using the
standard PD, pre-standard PD, or Cisco PD. If you use other non-standard PDs, it may
damage the PD if you enable the force-power. Therefore, contact Raisecom technical support
for confirmation before using the PD.

Examples
This example shows how to enable force-power on interface 1/1/3.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/3
Raisecom(config-gigaethernet1/1/3)#poe porce-power
Set successfully.

Related commands
show poe port-list

5.1.3 poe legacy enable

Function
To enable the PSE with a feature of identifying the non-standard PD, use this command.

Format
poe legacy { enable | disable }

Raisecom Proprietary and Confidential


334
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Parameters
Parameter Description
enable Enable the PSE with a feature of identifying the non-standard PD.
disable Disable the PSE from identifying the non-standard PD.

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The PSE is connected downstream to the non-standard PDs.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When using a non-standard PD, we recommend confirming parameters, such as the power
supply, voltage, and current, of the non-standard PD. In this case, you can configure the
proper maximum output power on the PSE to avoid damaging the PD.

Examples
This example shows how to enable a PSE with the feature of identifying the non-standard PD.
Raisecom#config
Raisecom(config)#poe legacy enable
Set successfully.

Related commands
show poe pse

Raisecom Proprietary and Confidential


335
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

5.1.4 poe max-power

Function
Configure the maximum output power of the interface, use this command. To disable this
function, use the no form of this command.

Format
poe max-power max-power-value
no poe max-power

Parameters
Parameter Description
max-power-value Maximum output power, an integer, ranging from 4000 to
30000, in units of mW

Default conditions
The maximum output power is 30000 mW.

Command mode
Physical interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the maximum output power of the interface.
After the maximum output power of the interface is configured, the configured value is
the maximum output power that can be provided by the PD connected to that interface.
After the interface PoE is enabled, only the power within the range can be provided to
the connected PD.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


336
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Examples
This example shows how to configure the PoE maximum output power on interface 1/1/3 to
6050 mW.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/3
Raisecom(config-gigaethernet1/1/3)#poe max-power 6050
Actual power: 6050, Set successfully.

Related commands
show poe port-list

5.1.5 poe priority

Function
To configure the power supply priority on the interface, use this command. To return to the
default condition, use the no form of this command.

Format
poe priority { critical | high | low }
no poe priority

Parameters
Parameter Description
critical Critical priority
high High priority
low Low priority

Default conditions
Low priority

Command mode
Physical interface configuration

User level
11

Usage guidelines
Scenario
The PoE interface priority should be used in conjunction with the PoE power supply mode.

Raisecom Proprietary and Confidential


337
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Automatic mode: when the switch supplies power nearly to the fullest extent, it powers the
device in the following sequence: PD connected to the critical interface > PD connected to
the high interface > PD connected to the low interface. If the PoE interface is with the same
priority, then the one with a smaller ID will be powered first.
Manual mode: when the switch supplies power nearly to the fullest extent, it will not supply
power according to the sequence of PD access instead of priority.
Prerequisite
N/A

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the PoE power supply priority on interface 1/1/3 to
high.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/3
Raisecom(config-gigaethernet1/1/3)#poe priority high
Set successfully.

Related commands
show poe port-list

5.1.6 poe pse power-threshold

Function
To configure the PSE power threshold ratio, use this command.

Format
poe pse power-thredshold percent

Parameters
Parameter Description
percent Threshold ratio, an integer, ranging from 1 to 99, indicating 1%
to 99%

Default conditions
99%

Raisecom Proprietary and Confidential


338
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the power utilization rate of the PSE exceeds or is below the configured threshold, the
system will send Trap messages.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the PSE power supply threshold ratio to 60%.
Raisecom#config
Raisecom(config)#poe pse power-thredshold 60
Set successfully.

Related commands
show poe pse

5.1.7 poe pse trap enable

Function
To enable global Trap, use this command. To disable this function, use the disable form of
this command.

Format
poe pse trap { enable | disable }

Parameters
Parameter Description
enable Enable global Trap.

Raisecom Proprietary and Confidential


339
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Parameter Description
disable Disable global Trap.

Default conditions
Enabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the global Trap is enabled, the device will send Trap messages to the NMS in the case
of overtemperature, PSE power crossing the threshold, or changes of PoE interface power
supply status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable global Trap.
Raisecom#config
Raisecom(config)#poe pse trap enable
Set successfully.

Related commands
show poe pse

5.1.8 poe temperature-protection enable

Function
To enable temperature-protection of the switch, use this command. To disable this function,
use the disable form of this command.

Raisecom Proprietary and Confidential


340
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Format
poe temperature-protection { enable | disable }

Parameters
Parameter Description
enable Enable temperature-protection of the switch.
disable Disable temperature-protection of the switch.

Default conditions
Enabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure temperature protection of the switch.
When the temperature within the switch exceeds 65C, the PoE on the interface is
disabled. The device sends Trap messages to the NMS.
When the temperature within the switch is below 60 C, the temperature-protection of
the switch is removed. The interface is enabled with PoE and the device sends Trap
messages to the NMS.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable temperature-protection of the switch.
Raisecom#config
Raisecom(config)#poe temperature-protection enable
Set successfully.

Raisecom Proprietary and Confidential


341
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Related commands
show poe pse

5.1.9 poe power-management

Function
To configure the power management mode of the switch, use this command.

Format
poe power-management { auto | manual }

Parameters
Parameter Description
auto Automatic control
manual Manual control

Default conditions
auto

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the power management mode of the switch.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the power management mode of the switch to manual.

Raisecom Proprietary and Confidential


342
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Raisecom#config
Raisecom(config)#poe power-management manual
Set successfully.

Related commands
show poe port-list

5.1.10 show poe

Function
To show the power status of a specified interface, use this command.

Format
show poe interface-type interface-number [ detail ]

Parameters
Parameter Description

interface-type interface- Interface ID, an integer, ranging from 1 to the maximum PoE
number interface ID

detail Show detailed information about the power status.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the power status of interface GE1/1/3.
Raisecom#show poe gigaethernet1/1/3
Port: gigaethernet1/1/3
-------------------------------------------------
POE administrator status: Enable
POE force-power status: Disable

Raisecom Proprietary and Confidential


343
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

POE operation status: Enable


DetectStatus Max Power(mW) Output Power(mW) Output Current(mA) Output
Voltage(V)
-------------------------------------------------------------------------
-----------
Searching 30000 0 0 0

The following table describes fields in the command output.

Field Description
Port Interface
PoE administrator status Interface PoE management status
POE force-power status Interface PoE force-power status
PoE operation status Interface PoE operation status
PoE protect status Interface PoE protection status
DetectStatus Power detection status
Max Power Maximum power, in units of mW
Output Power Output power, in units of mW
Output Current Output current, in units of mA
Output Voltage Output voltage, in units of V

This example shows how to show the detailed power information of interface 1/1/3.
Raisecom#show poe gigaethernet1/1/3 detail
Port: gigaethernet1/1/3
-------------------------------------------------
POE administrator status: Enable
POE force-power status: Disable
POE operation status: Enable
Power detection status:Searching
POE Power Pairs mode:Signal
PD power classification:Class0
POE power Priority:Low
POE power max:30000 (mW)
POE power output:0 (mW)
POE power average:0 (mW)
POE power peak:0 (mW)
POE current output:0 (mA)
POE voltage output:0 (V)

The following table describes fields in the command output.

Field Description
Port Interface
PoE administrator status Interface PoE management status
POE force-power status Interface PoE force-power status

Raisecom Proprietary and Confidential


344
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

Field Description
PoE operation status Interface PoE operation status
Power detection status Power detection status
PoE Power Pairs mode PoE interface power pairs mode
PD power classification PD power classification
PoE power Priority PoE power priority
PoE power max PoE interface maximum power, in units of mW
PoE power output PoE interface current output power, in units of mW
PoE power average PoE interface average power, in units of mW
PoE power peak PoE interface peak power, in units of mW
PoE current output PoE interface output current, in units of mA
PoE voltage output PoE interface output voltage, in units of V
PoE protect status PoE interface protection status

Related commands
N/A

5.1.11 show poe pse

Function
To show configurations and realtime running information about the PSE, use this command.

Format
show poe pse [ detail ]

Parameters
Parameter Description
detail Show the detailed configurations about the PSE.

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


345
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations and realtime running information about the
PSE.
Raisecom#show poe pse
PSE ID: 1
PSE operation status: ON
PSE legacy detection: Enable
Switch temperature-protection:Enable
Power Mode Wattage Rating(W) Output Power(W) Peak Power(mW)
Average Power(mW)
-------------------------------------------------------------------------
----
Auto 120 0 0 0

The following table describes fields in the command output.

Field Description
PSE ID For distinguishing PSE.
PSE operation status PSE operation status
PSE legacy detection Enable/Disable the feature of PSE to detect non-
standard PDs.
Switch temperature-protection Enable/Disable switch temperature-protection.
Power Mode Power management mode
Wattage Rating Rated power, in units of mW
Output Power Current power, in units of mW
Peak Power Peak power, in units of mW
Average Power Average power, in units of mW

This example shows how to show configurations and the realtime running information about
the PSE.
Raisecom#show poe pse detail
PSE ID: 1
PSE legacy detection:Enable
PSE power mode:Auto
PSE operation status:ON
PSE wattage rating:120 (W)
PSE power current:0 (W)
PSE power peak:0 (mW)

Raisecom Proprietary and Confidential


346
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 5 PoE

PSE power average:0 (mW)


PSE power-threshold ratio:99 (%)
PSE trap:Enable
Switch temperature-protection:Enable
Switch temperature status:Normal

The following table describes fields in the command output.

Field Description
PSE ID Interface PoE management status
PSE legacy detection Enable/Disable the feature of PSE to detect non-
standard PDs.
PSE power mode PSE power management mode
PSE operation status PSE operation status
PSE wattage rating PSE rated power, in units of mW
PSE power current PSE current power, in units of mW
PSE power peak PSE power peak value, in units of mW
PSE power average PSE average power, in units of mW
PSE power-threshold ratio PSE power threshold ratio
PSE trap Enable/Disable PSE trap.
Switch temperature-protection Enable/Disable temperature-protection of the switch.
Switch temperature status Switch temperature status

Related commands
N/A

Raisecom Proprietary and Confidential


347
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6 DHCP

6.1 DHCP Client


6.1.1 ip address dhcp

Function
To enable the DHCP Client, use this command. To release the IP address obtained from the
DHCP server and meanwhile disable the DHCP Client, use the no form of this command.

Format
ip address dhcp [ server-ip ip-address ]
no ip address dhcp

Parameters
Parameter Description
server-ip IP address of the specified DHCP server
Only the specified server assigns IP address if the parameter is
configured.
ip-address IP address, in dotted decimal notation, such as 10.0.0.1

Default conditions
The DHCP Client is disabled.

Command mode
VLAN interface configuration

User level
11

Raisecom Proprietary and Confidential


348
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Usage guidelines
Scenario
Assigning IP address dynamically facilitates users in intensively managing and configuring IP
address, and improving IP utilization. When DHCP Client is enabled through this command,
the device will obtain the IP address assigned by the DHCP server automatically.
You can use the no ip address dhcp command to release the IP address and meanwhile
disable DHCP Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The IP address obtained from the DHCP server and the IP address configured manually can
override each other.
If the VLAN has obtained an IP address from the DHCP server, it will renew the IP address
automatically.
The DHCP Client and DHCP Relay/DHCP Snooping are mutually exclusive, which means
they cannot be enabled concurrently on the same device. However, the DHCP Relay and
DHCP Snooping can be enabled concurrently on the save device.

Examples
This example shows how to enable DHCP Client on VLAN interface 1 with the IP address of
the DHCP Server being 10.0.0.1.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ip address dhcp server-ip 10.0.0.1
Set successfully.

Related commands
show ip dhcp client

6.1.2 ip dhcp client

Function
To configure DHCP Client property, use this command. To return to the default condition, use
the no form of this command.

Format
ip dhcp client { hostname host-name | class-id class-id | client-id client-id }
no ip dhcp client { hostname | class-id | client-id }

Raisecom Proprietary and Confidential


349
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Parameters
Parameter Description
host-name Hostname, a string of 1 to 64 characters
class-id Class-ID, a string of 1 to 64 characters
client-id Client-ID, a string of 1 to 64 characters

Default conditions
The HostName is Raisecom; Class-ID is Raisecom-ROS; Client-ID is Raisecom-SYSMAC-
IF0; ROS is the platform version of ROS; SYSMAC is the MAC address of the device.

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the Hostname, Class-ID, and Client-ID of the DHCP
Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Do not use this command if the device is in the stage of IP address application, renewal, or
release.

Examples
This example shows how to configure the Hostname of the DHCP Client to myhost.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#ip dhcp client hostname myhost
Set successfully.

Related commands
show ip dhcp client

Raisecom Proprietary and Confidential


350
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.1.3 ip dhcp client renew

Function
To renew the IP address obtained from the DHCP Client manually, use this command.

Format
ip dhcp client renew

Parameters
N/A

Default conditions
The DHCP Client will renew the IP address automatically.

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
The IP address obtained from the DHCP Client has a period of validity. You have to renew
the IP address if you wish to keep using it. Generally the device will renew it automatically,
but you can renew it manually through this command.
Prerequisite
You need to use the ip address dhcp command to enable DHCP Client and obtain the IP
address.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to renew an IP address manually through DHCP.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan)#ip dhcp client renew
Set successfully.

Raisecom Proprietary and Confidential


351
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Related commands
N/A

6.1.4 ipv6 address dhcp

Function
To enable the DHCPv6 Client, use this command. To release the IP address obtained from
DHCPv6 server and disable the DHCP Client, use the no form of this command

Format
ipv6 address dhcp [ server-ip ipv6-address ]
no ipv6 address dhcp

Parameters
Parameter Description
server-ip IP address of the specified DHCP server
Only the specified server assigns IP addresses if the parameter is
configured.
ip-address IP address, in colon hexadecimal notation, such as 3001::1

Default conditions
DHCPv6 Client is disabled.

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
Assigning IPv6 address dynamically facilitates users in intensively managing and configuring
IP address, and improving IPv6 utilization rate. When DHCP Client is enabled through this
command, the device will obtain the IP address assigned by the DHCP server automatically.
You can use the no ip address dhcp command to release the IPv6 address meanwhile disable
DHCP Client.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


352
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

N/A
Precaution
Before using this command, you should confirm that the VLAN interface is UP, namely, the
VLAN interface is associated with the Active VLAN and the interface connected to the server
joins the VLAN. Otherwise, interface will fail to obtain IP address through DHCPv6. When
an IP address of DHCPv6 server is specified by the command, it only obtains IP address
assigned by specified DHCPv6 Server. Currently, it only supports configuring the IP address
of the Server as link-local address, only when the specified address is link-local can
configurations be obtained from the specified server; otherwise, the specified server will be
invalid and configurations can be obtained from any server.
The IP address obtained from the DHCPv6 server and the IP address configured manually can
override each other
If you manually configure the IP address after the IP address is successfully obtained from the
DHCPv6, then the manually configured IP address will override the IP address obtained from
the DHCPv6 and vice versa.

Examples
This example shows how to enable DHCP Client on VLAN1 interface with the IP address of
DHCP Server of 2000::3.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#ipv6 address dhcp server-ip 2000::3
Set successfully.

Related commands
show ipv6 dhcp client

6.1.5 ipv6 dhcp client rapid-commit

Function
To enable DHCPv6 Client to apply for fast interaction, use this command. To return to the
default condition, use the no form of this command.

Format
ipv6 dhcp client rapid-commit
no ipv6 dhcp client rapid-commit

Parameters
N/A

Default conditions
Disabled

Raisecom Proprietary and Confidential


353
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
This command is used for the DHCPv6 Client to obtain information from the Server through
fast interaction. When Client is configured with fast interaction, server will decide wether to
adopt fast interaction or not upon receiving the sent Solicit packets with this Optiom. If
Server supports fast interaction, it will respond Reply packets and interact with Client in two
steps, if not, the Server will repond offer packets and interact with Client in four steps.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command is valid only when VLAN1 interface obtains an IP address through DHCPv6.

Examples
This example shows how to configure Client to obtain configurations through fast interaction.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-valn1)#ipv6 dhcp client rapid-commit
Set successfully.

Related commands
show ipv6 dhcp client

6.1.6 ipv6 dhcp client renew

Function
If you have successfully applied for an IP address through DHCPv6, use this command to
renew.

Format
ipv6 dhcp client renew

Raisecom Proprietary and Confidential


354
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Parameters
N/A

Default conditions
DHCPv6 Client renews automatically

Command mode
VLAN interface configuration

User level
11

Usage guidelines
Scenario
On VLAN1 interface, if you have successfully applied for an IP address through DHCPv6,
use this command to renew. If you do not take the initiative to execute this command,
DHCPv6 Client will automatically renew.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command is valid only when VLAN1 interface obtains an IP address through DHCPv6.

Examples
This example shows how to renew VLAN1 interface.
Raisecom#config
Raisecom(config)#interface vlan 1
Raisecom(config-vlan1)#ipv6 dhcp client renew
Set successfully.

Related commands
show ipv6 dhcp client

6.1.7 show ip dhcp client

Function
To show configurations of the DHCP Client, use this command.

Raisecom Proprietary and Confidential


355
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Format
show ip dhcp client

Parameters
N/A

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of the DHCP Client.
Raisecom#show ip dhcp client
Hostname: Raisecom
Class-ID: Raisecom-ROS
client-ID: Raisecom-000e5e000000-IF0
DHCP Client is requesting for a lease.
Assigned IP Addr: 0.0.0.0
Subnet mask: 0.0.0.0
Default Gateway: --
Client lease Starts: Jan-01-1970 08:00:00
Client lease Ends: Jan-01-1970 08:00:00
Client lease duration: 0(sec)
DHCP Server: 0.0.0.0
Tftp server name: --
Tftp server IP Addr: --
Startup_config filename: --
NTP server IP Addr: --
Root path: --

The following table describes fields in the command output.

Field Description
Hostname DHCP Client property (Hostname)
Class-ID DHCP Client property (Class-ID)
Client-ID DHCP Client property (Client-ID)

Raisecom Proprietary and Confidential


356
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Field Description
Assigned IP Addr IP address assigned by the DHCP server
Subnet mask Subnet mask
Default Gateway Default gateway
Client lease Starts Time when the lease starts since the device obtained the IP
address
Client lease Ends Time when the lease ends since the device obtained the IP
address
Client lease duration The duration of the lease since the device obtained the IP
address
DHCP Server IP address of the DHCP server
Devices obtain the IP address only from that DHCP server.
Tftp server name TFTP server name
Tftp server IP Addr IP address of the TFTP server
Startup_config filename Startup configuration file name
NTP server IP Addr IP address of the NTP server
Root path Root path

Related commands
N/A

6.1.8 show ipv6 dhcp client

Function
To show configurations about DHCPv6, use this command.

Format
show ipv6 dhcp client

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


357
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations about DHCP client.
Raisecom#show ipv6 dhcp client
DHCPv6 Client DUID : 00030006000e5e462745
DHCPv6 Client info in ip0
DHCPv6 Client Enable : enable
Link State : up
Specified Dhcpv6 Server : --
DHCPv6 Client Mode : stateful
Client Rapid-commit : enable
IAID : 17367040
Dhcpv6 client status : bound/idle
Assigned IPv6 Addr : 2000::7720:96B6
Preferred Lifetime(s) : 20
Valid Lifetime(s) : 40
DHCPv6 Server IP : FE80::20E:5EFF:FE47:151A
DHCPv6 Server DUID : 00030006000e5e47151a
Client Lifetime Starts : 2011-09-20,11:02:00
Remaining Time To Renew(s) : 0
Remaining Time To Expire(s): 30
DNS Servers : 2000::FF
SNTP Servers : 2000::200

Related commands
N/A

6.2 DHCP Snooping


6.2.1 ip dhcp snooping

Function
To enable global DHCP Snooping, use this command. To disable this function, use the no
form of this command.

Format
ip dhcp snooping
no ip dhcp snooping

Raisecom Proprietary and Confidential


358
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Parameters
N/A

Default conditions
Global DHCP Snooping is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Attackers use ARP, IP, DHCP packets to attack servers and Clients though phishing the IP and
MAC address. DHCP Snooping can prevent servers and Clients from being attacked.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The DHCP Client, DHCP Server, and DHCP Relay/DHCP Snooping are mutually exclusive,
namely, they cannot be enabled concurrently on the same device. However, the DHCP Relay
and DHCP Snooping can be enabled concurrently on the same device.

Examples
This example shows how to enable global DHCP Snooping.
Raisecom#config
Raisecom(config)#ip dhcp snooping
Set successfully.

Related commands
show ip dhcp snooping

6.2.2 ip dhcp snooping(interface)

Function
To enable DHCP Snooping on the interface, use this command. To disable this function, use
the no form of this command.

Raisecom Proprietary and Confidential


359
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Format
ip dhcp snooping
no ip dhcp snooping

Parameters
N/A

Default conditions
DHCP Snooping on interface is enabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to enable DHCP Snooping on the interface.
Prerequisite
Global DHCP Snooping is enabled through the ip dhcp Snooping command. Otherwise,
DHCP Snooping is useless even though it is enabled.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable DHCP Snooping on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet 1/1/2)# ip dhcp snooping
Set successfully.

Related commands
show ip dhcp snooping

Raisecom Proprietary and Confidential


360
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.2.3 ip dhcp snooping trust

Function
To configure the interface to DHCP Snooping trusted interface, use this command. To
configure the interface to an untrusted interface, use the no form of this command.

Format
ip dhcp snooping trust
no ip dhcp snooping trust

Parameters
N/A

Default conditions
The interface is in an untrusted status.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
DHCP Snooping supports trusted or untrusted interfaces. The device will drop DHCP-ACK,
DHCP-NAK, DHCP-OFFER packets from untrusted interfaces and normally forward the
above packets received from trusted interfaces, thus ensuring that the DHCP clients have
access to the right IP address.
The trusted interface is for connecting the DHCP server while the untrusted interface is for
connecting users or network, thus avoiding cheating by pseudo servers.
Prerequisite
Global DHCP Snooping is enabled through the ip dhcp Snooping command.
DHCP Snooping is enabled on the interface through the ip dhcp Snooping port-list
command.
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


361
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Examples
This example shows how to configure interface 1/1/2 as DHCP Snooping trusted interface
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet 1/1/2)#ip dhcp snooping trust
Set successfully.

Related commands
show ip dhcp snooping

6.2.4 ip dhcp snooping information option

Function
To enable DHCP Snooping to support Option82, use this command. To disable this function,
use the no form of this command.

Format
ip dhcp snooping information option
no ip dhcp snooping information option

Parameters
N/A

Default conditions
Option82 is not supported.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Option 82 records information about DHCP Clients, and the information will be inserted to
DHCP packets by the device enabled with DHCP Snooping. The DHCP server will not
interpret that field, but it will bring back the Option 82 information in DHCP response packets
as it is. While the device enabled with DHCP Snooping receives the DHCP packets carrying
Option 82 information inserted by local device, it will compare whether the Option 82 field
includes Option 82 information inserted by the local device, if it contains, the Option 82
information inserted by local device will be deprived.

Raisecom Proprietary and Confidential


362
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

The device will obtain the exact user access information by Option 82. If the ARP, IP packets
received are not in conformity with the information, they will be discarded to prevent the
device from being attacked.
Prerequisite
The global DHCP Snooping is enabled through the ip dhcp Snooping command.
The DHCP Snooping on the interface is enabled through the ip dhcp Snooping port-list
command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable DHCP Snooping to support Option82.
Raisecom#config
Raisecom(config)#ip dhcp snooping information option
Set successfully.

Related commands
show ip dhcp snooping

6.2.5 ip dhcp snooping option

Function
To enable DHCP Snooping to support customized Option or Option 61, use this command. To
disable this function, use the no form of this command.

Format
ip dhcp snooping option { option-id | client-id }
no ip dhcp snooping option { option-id | client-id }

Parameters
Parameter Description
option-id The ID of customized Option supported, an integer, ranging from 1 to 254
client-id Support Option61, Option61 to record information about Clients ID.

Default conditions
N/A

Raisecom Proprietary and Confidential


363
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Option 61 records identification information about the DHCP Client and the information will
be inserted to DHCP packets by the device enabled with DHCP Snooping. DHCP server will
not interpret that field, but it will bring back the Option 61 information in DHCP response
packets as it is. While the device enabled with Snooping receives the DHCP packets carrying
Option 61 information inserted by local device, it will compare whether the Option 61 field
includes Option 61 information inserted by the local device, if it contains, the Option 61
information inserted by local device will be deprived.
The device will obtain the exact user access information by Option 61. If the ARP, IP packets
received are not in conformity with the information, they will be discarded to prevent the
device from being attacked.
Prerequisite
Global DHCP Snooping is enabled through the ip dhcp Snooping command.
DHCP Snooping on the interface is enabled through the ip dhcp Snooping port-list
command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable DHCP Snooping to support Option 61.
Raisecom#config
Raisecom(config)#ip dhcp snooping option client-id
Set successfully.

Related commands
show ip dhcp snooping

6.2.6 ipv6 dhcp snooping

Function
To enable global DHCP Snooping based on IPv6, use this command. To disable this function,
use the no form of this command.

Raisecom Proprietary and Confidential


364
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Format
ipv6 dhcp snooping
no ipv6 dhcp snooping

Parameters
N/A

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Attackers use ARP, IP, DHCP packets to attack servers and Clients though phishing the IP
address and MAC address. DHCP Snooping can prevent servers and Clients from being
attacked. You can use this command to enable global DHCP Snooping.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable global DHCP Snooping based on IPv6.
Raisecom#config
Raisecom(config)#ipv6 dhcp snooping
Set successfully.

Related commands
show ipv6 dhcp snooping

Raisecom Proprietary and Confidential


365
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.2.7 ipv6 dhcp snooping interface

Function
To enable interface-based IPv6 DHCP Snooping, use this command. To disable this function,
use the no form of this command.

Format
ipv6 dhcp snooping interface-type interface-number
no ipv6 dhcp snooping interface-type interface-number

Parameters
Parameter Description
interface-type Enable DHCP Snooping on the specified interface.
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface list.

Default conditions
Enabled

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
This example shows how to enable interface-based IPv6 DHCP Snooping.
Prerequisite
Enable global DHCP Snooping based on IPv6 using the ipv6 dhcp snooping command in
global configuration mode. Otherwise, DHCP Snooping on the interface will not take effect
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable DHCP Snooping based on IPv6 on interface 1/1/2.

Raisecom Proprietary and Confidential


366
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Raisecom#config
Raisecom(config)#ipv6 dhcp snooping gigaethernet 1/1/2
Set successfully.

Related commands
show ipv6 dhcp snooping

6.2.8 ipv6 dhcp snooping option

Function
To enable DHCPv6 Snooping to support customized Option or Option 18, use this command.
To disable this function, use the no form of this command.

Format
ipv6 dhcp snooping option { number | interface-id }
no ipv6 dhcp snooping option { number | interface-id }

Parameters
Parameter Description
number The ID of customized Option supported, an integer, ranging from 1 to
254
interface-id Enable DHCP Snooping to support Option 18.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Option18 is a field of relay router which is used for recording user access information.
You can use the ipv6 dhcp snooping option interface-id command to enable DHCP
Snooping to support Option18.
Prerequisite
Use the ipv6 dhcp snooping command to enable global DHCP Snooping based on IPv6.

Raisecom Proprietary and Confidential


367
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Use the ipv6 dhcp snooping port-list command to enable DHCP Snooping based on the
interface.
Follow-up procedure
N/A
Precaution
Only when DHCP Snooping is enabled on the interface and globally can the function of
Option 1 take effect.

Examples
This example shows how to enable DHCP Snooping to support Option 18.
Raisecom#config
Raisecom(config)#ipv6 dhcp snooping option interface-id
Set successfully.

Related commands
show ipv6 dhcp snooping

6.2.9 ipv6 dhcp snooping trust

Function
To configure the interface as the DHCP Snooping trusted interface based on IPv6, use this
command. To configure the interface as an untrusted interface, use the no form of this
command.

Format
ipv6 dhcp snooping trust
no ipv6 dhcp snooping trust

Parameters
N/A

Default conditions
The interface is in an untrusted state.

Command mode
Physical layer interface configuration mode

User level
11

Raisecom Proprietary and Confidential


368
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Usage guidelines
Scenario
DHCP Snooping supports trusted or untrusted interfaces. The device will drop DHCP
response packets from untrusted interfaces and normally forward the DHCP packets received
from trusted interfaces, thus ensuring that customers have access to the right IP address.
You can use this command to configure interface type. The trusted interface is used to
connecting the DHCP server while the untrusted interface is for connecting users or network,
thus avoiding being cheated by pseudo servers.
Prerequisite
DHCP Snooping based on IPv6 is enabled through the ipv6 dhcp snooping command.
DHCP Snooping on the interface based on IPv6 is enabled through the ipv6 dhcp
snooping port-list.
Follow-up procedure
N/A
Precaution
Only when DHCP Snooping is enabled on the interface and globally can the configured
trusted status of the interface take effect.

Examples
This example shows how to configure interface 1 as the DHCP Snooping trusted interface
based on IPv6.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet 1/1/2)#ipv6 dhcp snooping trust
Set successfully.

Related commands
show ipv6 dhcp snooping

6.2.10 show ip dhcp snooping

Function
To show configurations of DHCP Snooping, use this command.

Format
show ip dhcp snooping

Parameters
N/A

Raisecom Proprietary and Confidential


369
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of DHCP Snooping.
Raisecom#show ip dhcp snooping
DHCP Snooping: Disabled
Port vlan Enabled Status Trusted Status
Option82 Vlanlist
-------------------------------------------------------------------------
------------------------
gigaethernet1/1/1 -- enabled no 1-
4094
gigaethernet1/1/2 -- enabled no 1-
4094
gigaethernet1/1/3 -- enabled no 1-
4094
gigaethernet1/1/4 -- enabled no 1-
4094
gigaethernet1/1/5 -- enabled no 1-
4094
gigaethernet1/1/6 -- enabled no 1-
4094
gigaethernet1/1/7 -- enabled no 1-
4094
gigaethernet1/1/8 -- enabled no

The following table describes fields in the command output.

Field Description
DHCP Snooping Status of DHCP Snooping
Enabled: enabled
Disabled: disabled
DHCP Option 61 Status of DHCP Option 61
Enabled: enabled
Disabled: disabled

Raisecom Proprietary and Confidential


370
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Field Description
DHCP Option 82 Status of DHCP Option 82
Enabled: enabled
Disabled: disabled
Port Interface ID

Enabled Status Status of DHCP Snooping on the interface


Enabled: enabled
Disabled: disabled
Trusted Status Trusted status on the interface
yes: trusted
no: untrusted
Option82 Vlanlist Option 82 VLAN list

Related commands
N/A

6.2.11 show ip dhcp snooping binding

Function
To show information about DHCP Snooping binding table, use this command.

Format
show ip dhcp snooping binding

Parameters
N/A

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
N/A

Raisecom Proprietary and Confidential


371
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Examples
This example shows how to show DHCP Snooping binding table.
Raisecom#show ip dhcp snooping binding
Current Binding: 1
History Max Binding: 1
Ip Address Mac Address Lease(sec) Type VLAN Port
--------------------------------------------------------------------
20.168.0.3 000E.5E00.91E0 1650 dhcp-snooping 1 P1

The following table describes fields in the command output.

Field Description
Current Binding Number of current bindings in the binding table
History Max Binding Historical maximum bindings
Ip Address Bind the IP address.
Mac Address Bind the MAC address.
Lease(sec) Lease time
Type Binding type
dhcp-Snooping: dynamic binding
static-config: static binding

VLAN Bind the VLAN.


Port Bind the interface.

Related commands
N/A

6.2.12 show ipv6 dhcp snooping

Function
To show DHCP Snooping configurations based on IPv6, use this command.

Format
show ipv6 dhcp snooping

Parameters
N/A

Default conditions
N/A

Raisecom Proprietary and Confidential


372
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Command mode
Any command

User level
5

Usage guidelines
N/A

Examples
This example shows how to show DHCP Snooping configurations based on IPv6.
Raisecom#show ipv6 dhcp snooping
DHCP Snooping: Enabled
Port Enabled Status Trusted Status
--------------------------------------------------
P1 enabled no
P2 enabled no
P3 enabled no

The following table describes fields in the command output.

Field Description
DHCP Snooping Status of DHCP Snooping
Enabled: enabled
Disabled: disabled
DHCP Option 61 Status of DHCP Option 61
Enabled: enabled
Disabled: disabled
DHCP Option 82 Status of DHCP Option 82
Enabled: enabled
Disabled: disabled
Port Interface ID
Enabled Status Status of DHCP Snooping on the interface
Enabled: enabled
Disabled: disabled
Trusted Status Trusted status on the interface
yes: trusted
no: untrusted
Option82 Vlanlist Option 82 VLAN list

Related commands
N/A

Raisecom Proprietary and Confidential


373
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.2.13 show ipv6 dhcp snooping binding

Function
To show information about DHCP Snooping binding table based on IPv6, use this command.

Format
show ipv6 dhcp snooping binding

Parameters
N/A

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about DHCP Snooping binding table based on
IPv6.
Raisecom#show ipv6 dhcp snooping binding
Current Binding: 0
History Max Binding: 0
IPv6 Address DUID Lease(sec) Type VLAN Port
----------------------------------------------------------------

Related commands
N/A

Raisecom Proprietary and Confidential


374
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.3 DHCP Option


6.3.1 ip dhcp information option attach-string

Function
To configure the attached string in Option82 of DHCP packets, use this command. To return
to the default condition, use the no form of this command.

Format
ip dhcp information option attach-string attach-string
no ip dhcp information option attach-string

Parameters
Parameter Description
attach-string Attached string, a string of 1 to 32 characters, in units of byte

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Information about the attached string in Option 82 can be customized by users themselves.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the attached string in Option 82 as Raisecom.

Raisecom Proprietary and Confidential


375
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Raisecom#config
Raisecom(config)#ip dhcp information option attach-string raisecom
Set successfully.

Related commands
show ip dhcp information option

6.3.2 ip dhcp information option circuit-id

Function
To configure the circuit ID sub-option in Option82 of DHCP packets, use this command. To
return to the default condition, use the no form of this command.

Format
ip dhcp information option circuit-id circuit-id [ prefix-mode ]
no ip dhcp information option circuit-id

Parameters
Parameter Description
circuit-id Circuit ID, a string, with a length ranging from 1 to 64
prefix-mode Prefix mode

Default conditions
The circuit ID option is N/A.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
The Circuit ID Option 82 suboption is for specifying the interface ID, attached VLAN, and
additional information of the request packets received by the device enabled with DHCP
Relay or DHCP Snooping from the DHCP clients, namely, the information about the interface
(which receives request packets from the DHCP clients) on the device enabled with DHCP
Relay or DHCP Snooping.
Prerequisite
N/A

Raisecom Proprietary and Confidential


376
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the circuit ID in Option 82 on the interface as 10.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip dhcp information option circuit-id
10
Set successfully.

Related commands
show ip dhcp information option

6.3.3 ip dhcp information option circuit-id mac-format

Function
To configure the MAC address format of the circuit ID in Option 82 of DHCP packets, use
this command. To return to the default condition, use the no form of this command.

Format
ip dhcp information option circuit-id mac-format string
no ip dhcp information option circuit-id mac-format

Parameters
Parameter Description
string MAC address format, a string, support the following types:
hhhhhhhhhhhh
hhhh.hhhh.hhhh
hhhh-hhhh-hhhh
hhhh:hhhh:hhhh
hh.hh.hh.hh.hh.hh
hh-hh-hh-hh-hh-hh
hh:hh:hh:hh:hh:hh

Default conditions
The format is hhhhhhhhhhhh.

Raisecom Proprietary and Confidential


377
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After configuring the Circuit ID to support variables, the parameter %m or %r will be
converted into the MAC address when the device is generating the Circuit ID automatically.
You can use this command to configure the format of the MAC address.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the MAC address format of the circuit ID in Option 82
of DHCP packets as hhhh.hhhh.hhhh.
Raisecom#config
Raisecom(config)#ip dhcp information option circuit-id mac-format
hhhh.hhhh.hhhh
Set successfully.

Related commands
show ip dhcp information option

6.3.4 ip dhcp information option remote-id

Function
To configure remote-ID suboption in Option 82 of DHCP packets, use this command.

Format
ip dhcp information option remote-id { client-mac | client-mac-string | hostname | string
string | switch-mac | switch-mac-string }

Raisecom Proprietary and Confidential


378
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Parameters
Parameter Description
client-mac The remote ID value is the MAC address of the user device, sent in
binary form
client-mac-string The remote ID value is the MAC address of the user device, sent a
string
hostname The remote ID value is the host name, sent a string
string Value of user-defined remote ID, with the length no more than 64
bytes, sent a string
switch-mac The remote ID value is the MAC address of the device, sent in
binary form
switch-mac- The remote ID value is the MAC address of the device, sent a string
string

Default conditions
The remote ID mode is switch-mac.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the remote ID mode in Option 82 of DHCP packets.
Generally, it is the interface MAC address (DHCP relay), the bridge MAC address of the
device (device with DHCP Snooping), or the customized character string of the device with
DHCP Relay or DHCP Snooping which receives request packets from the DHCP clients.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


379
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Examples
This example shows how to configure the remote ID mode in Option 82 to switch-mac-
string.
Raisecom#config
Raisecom(config)#ip dhcp information option remote-id switch-mac-string
Set successfully.

Related commands
show ip dhcp information option

6.3.5 ipv4 dhcp option

Function
To configure customized Option based on IPv4, use this command. To disable this function,
use the no form of this command.

Format
ipv4 dhcp option option-id { ascii ascii-string | hex hex-string | ip-address ip-address }
no ipv4 ipv4 dhcp option option-id

Parameters
Parameter Description
option-id Relay agent option, an integer, ranging from 1 to 254
ascii-string A string, in units of byte, sent in form of ASCII code
hex-string A string, sent in form of hexadecimal code
The device will add 0 to the head of the character string if the
bytes of the character string are odd numbered.
ip-address In dotted decimal notation, sent in form of IP address

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration mode

User level
11

Raisecom Proprietary and Confidential


380
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Usage guidelines
Scenario
Customized Option, which is a relay agent option, can be customized by users. You can use it
on the device with enabled DHCP Relay/DHCP Snooping.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable DHCP Snooping to support the IPv4-based customized
Option.
Raisecom#config
Raisecom(config)#ipv4 dhcp option 100 ip-address 10.0.0.1
Set successfully.

Related commands
show ip dhcp information option

6.3.6 ipv4 dhcp option client-id

Function
To configure information about Option 61 fields based on IPv4, use this command. To disable
this function, use the no form of this command.

Format
ipv4 dhcp option client-id{ ascii ascii-string | hex hex-string | ip-address ip-address }
no ipv4 dhcp option client-id

Parameters
Parameter Description
ascii-string A string, in units of byte, sent in form of ASCII code
hex-string A string, sent in form of hexadecimal code
ip-address In dotted decimal notation, sent in form of IP address

Raisecom Proprietary and Confidential


381
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
Option 61 is an ID option of DHCP Clients for specifying DHCP Clients information.
Option 61 is a relay agent option which can be used on the device enabled with DHCP
Snooping.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure information about Option61 fields based on IPv4.
Raisecom#config
Raisecom(config)#ipv4 dhcp option client-id ip-address 10.0.0.1
Set successfully.

Related commands
show ip dhcp information option

6.3.7 ipv6 dhcp option

Function
To configure customized Option based on IPv6, use this command. To disable this function,
use the no form of this command.

Format
ipv6 dhcp option number { ascii ascii-string | hex hex-string | ipv6-address ipv6-address }
no ipv6 dhcp option number

Raisecom Proprietary and Confidential


382
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Parameters
Parameter Description
number Relay agent option, an integer, ranging from 1 to 254
Specify the number which supports customized Option.
ascii-string A string, in units of byte, sent in form of ASCII code
hex-string A string, sent in form of hexadecimal code
ipv6-address In colon hexadecimal notation, sent in form of IP address

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
You can use this command to configure the customized Option based on IPv6.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the customized Option based on IPv6.
Raisecom#config
Raisecom(config)#ipv6 dhcp option 10 ascii raisecom
Set successfully.

Related commands
show ip dhcp information option

Raisecom Proprietary and Confidential


383
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.3.8 ipv6 dhcp option interface-id

Function
To configure IPv6-based customized Option18, use this command. To disable this function,
use the no form of this command.

Format
ipv6 dhcp option interface-id { ascii ascii-string | hex hex-string | ipv6-address ipv6-
address }
no ipv6 dhcp option interface-id

Parameters
Parameter Description
ascii-string A string, in units of byte, sent in form of ASCII code
hex-string A string, sent in form of hexadecimal code
ipv6-address In colon hexadecimal notation, sent in form of IP address

Default conditions
N/A

Command mode
Global configuration/Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
You can use this command to configure the customized Option18 based on IPv6.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


384
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Examples
This example shows how to configure Option18 based on IPv6.
Raisecom#config
Raisecom(config)#ipv6 dhcp option interface-id ascii raisecom
Set successfully.

Related commands
show ip dhcp information option

6.3.9 ipv6 dhcp option remote-id{ascii|hex}

Function
To configure the attached string in Option 37 of DHCPv6 packets, use this command. To
return to the default condition, use the no form of this command.

Format
ipv6 dhcp option remote-id { ascii | hex } string
no ipv6 dhcp option remote-id

Parameters
Parameters Description
ascii a string
hex In hexadecimal notation
string Attached string, a string of 1 to 32 characters, in units of byte,support
the following parameters:
%h: hostname
%s: slot
%v: svlan
%c: cvlan
%p: port
%m: local mac
%r: remote mac
%i: ip address
%u: unit

Default conditions
The attached string is N/A.

Raisecom Proprietary and Confidential


385
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Information about the attached string in Option 37 can be customized by users themselves.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the attached string in Option 37 as Raisecom.
Raisecom#config
Raisecom(config)# ipv6 dhcp option remote-id ascii raisecom
Set successfully.

Related commands
ipv6 dhcp option

6.3.10 ipv6 dhcp option remote-id mac-format

Function
To configure the variable parameter MAC address format of the Circuit ID in Option 37 of
DHCPv6 packets, use this command. To return to the default condition, use the no form of
this command.

Format
ipv6 dhcp option remote-id mac-format string
no ipv6 dhcp option remote-id mac-format

Raisecom Proprietary and Confidential


386
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Parameters
Parameters Description
string MAC address format, a string, support the following types:
hhhhhhhhhhhh
hhhh.hhhh.hhhh
hhhh-hhhh-hhhh
hhhh:hhhh:hhhh
hh.hh.hh.hh.hh.hh
hh-hh-hh-hh-hh-hh
hh:hh:hh:hh:hh:hh

Default conditions
The format is hhhhhhhhhhhh.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After configuring the Circuit ID to support variables, the parameter %m, %r will be converted
into the MAC address when the device is generating the Circuit ID automatically. You can use
this command to configure the format of the MAC address.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the variable parameter MAC address format of the
circuit ID in Option 37 of DHCPv6 packets to hhhh.hhhh.hhhh.
Raisecom#configRaisecom(config)#ipv6 dhcp option circuit-id mac-format hhhh.hhhh.hhhh
Set successfully.

Raisecom Proprietary and Confidential


387
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Related commands
ipv6 dhcp option

6.3.11 show ip dhcp information option

Function
To show configurations of DHCP Option, use this command.

Format
show ip dhcp information option

Parameters
N/A

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of DHCP Option.
Raisecom#show ip dhcp information option
raisecom(config)#show ip dhcp information op
DHCP Option Config Information
Circuit-ID: default
Remote-ID Mode: switch-mac
ipv4Global
ipv4Port
P1:
P2:
P3:

ipv6Global
code: 10 content : raisecom
code: 18 content : raisecom
ipv6Port

Raisecom Proprietary and Confidential


388
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

P1:
P2:
P3:

The following table describes fields in the command output.

Field Description
DHCP Option Config Information DHCP Option configuration
Circuit-ID Circuit ID
Remote-ID Mode Remote ID mode
ipv4Global IPv4 global configuration
ipv4Port IPv4 interface
ipv6Global IPv6 global configuration
ipv6Port IPv6 interface

Related commands
N/A

6.4 DHCP Server


6.4.1 address mask

Function
To configure the IP address pool of the DHCPv4 server, use this command.

Format
address start-ip-address end-ip-address mask { mask | mask-length }

Parameters
Parameter Description
start-ip-address The start IP address of address pool, in dotted decimal notation,
such as 10.10.10.1
end-ip-address The end IP address of address pool, in dotted decimal notation,
such as 10.10.10.1
mask Mask of IP address, in dotted decimal notation, such as 255.0.0.0
mask-length Mask length of IP address, an integer, ranging from 1 to 30

Raisecom Proprietary and Confidential


389
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Default conditions
N/A

Command mode
Address pool configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, the DHCPv4 Client can apply to the server for
IP address.
This command is used for configuring address pool for the DHCPv4 server. Then the
DHCPv4 server assigns the IP address in the address pool to the DHCPv4 Client.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the range of the address pool to be from 172.31.0.1 to
172.31.0.10 in address pool configuration mode and with the mask of 255.255.255.0.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#address 172.31.0.1 172.31.0.10 mask 255.255.255.0
Set successfully.

Related commands
ip dhcp server pool
show ip dhcp server pool

6.4.2 ip dhcp lease

Function
To save the DHCPv4 lease information to the Flash, use this command. To delete the
information, use the erase form of this command.

Raisecom Proprietary and Confidential


390
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Format
ip dhcp lease save
ip dhcp lease erase

Parameters
Parameter Description
save Save DHCPv4 lease information.
erase Delete DHCPv4 lease information.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, the DHCPv4 Client can apply to the server for
IP address and use the address within the negotiated lease period.
You can use this command to save the lease information to the Flash for future view.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to save the DHCPv4 lease information to the Flash.
Raisecom#config
Raisecom(config)#ip dhcp lease save
Set successfully.

Raisecom Proprietary and Confidential


391
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Related commands
N/A

6.4.3 ip dhcp server

Function
To enable the DHCPv4 Server feature, use this command. To disable this function, use the no
form of this command.

Format
ip dhcp server
no ip dhcp server

Parameters
N/A

Default conditions
Disabled

Command mode
Interface configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
If you wish to make relevant configurations about DHCPv4 Server on the device, you have to
use this command to enable the DHCPv4 Server feature first.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If DHCPv4 Relay, DHCPv4 Client, or DHCPv4 Snooping is enabled, you shouldn't enable
DHCPv4 Server, otherwise, configurations fail.

Raisecom Proprietary and Confidential


392
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Examples
This example shows how to enable DHCPv4 Server on the interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/4/1
Raisecom(config-gigaethernet1/4/1)#ip dhcp server
Set successfully.

Related commands
show ip dhcp server

6.4.4 ip { dhcp | oam } server pool

Function
To create an address pool and define its property for interfaces to assign addresses, use this
command. To disable this function, use the no form of this command.

Format
ip { dhcp | oam } server pool pool-name
no ip { dhcp | oam } server pool

Parameters
Parameter Description
dhcp DHCP-based address pool
oam OAM-based address pool
pool pool-name IP address pool
The pool-name is a string of 1 to 255 characters.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


393
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

You can use this command to configure the IP address pool and define its property to DHCP
or OAM to facilitate interfaces in assigning addresses to remote devices.
Prerequisite
The DHCPv4 Server feature is enabled through the ip dhcp server command in Layer 3
interface configuration mode.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to create IP address pool.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool
Raisecom(dhcp-pool)#

Related commands
ip dhcp server
ip dhcp server pool
show ip dhcp server pool

6.4.5 ip dhcp static-bind

Function
To configure DHCPv4 static lease, use this command. To disable this function, use the no
form of this command.

Format
ip dhcp static-bind ip-address mac-address pool-name
no ip dhcp static-bind ip-address mac-address

Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1
mac-address MAC address, in dotted hexadecimal notation, such as
"000E.5E12.3456"
It shall not be a multicast address, broadcast address, or an address with
all bytes being 0.
pool-name IP address pool, a string of 1 to 255 characters

Raisecom Proprietary and Confidential


394
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
To avoid frequent changes of IP addresses of some DHCP Clients, you can use this command
to bind them with static IP addresses.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure DHCPv4 static lease.
Raisecom#config
Raisecom(config)#ip dhcp static-bind 10.0.0.1 000e.5e12.3456 pool
Set successfully.

Related commands
show ip dhcp static-bind

6.4.6 lease expired

Function
To configure the lease period of IPv4 address in address pool configuration mode, use this
command. To return to the default configuration, use the no form of this command.

Format
lease expired { minute | infinite }

Raisecom Proprietary and Confidential


395
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

no lease expired

Parameters
Parameter Description
minute Lease time, an integer, ranging from 1 to 10080s
infinite Infinite lease time

Default conditions
The lease period of the device is 30min in the IP address pool configuration mode.

Command mode
Address pool configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
You can use this command to configure the IP address lease time of the device's address pool.
Prerequisite
The IP address pool of the DHCPv4 server is created through the ip dhcp server pool
command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the lease time of IP address pool 1 of the DHCPv4
server to 600min.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#lease expired 600
Set successfully.

Related commands
ip dhcp server pool

Raisecom Proprietary and Confidential


396
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.4.7 dns-server

Function
To configure the DNS server address of the IPv4 address pool, use this command. To disable
this function, use the no form of this command.

Format
dns-server ip-address [ secondary ]
no dns-server [ secondary ]

Parameters
Parameter Description
ip-address IPv4 address, in dotted decimal notation, such as 10.10.10.1
secondary Specify the address for a backup DNS server.

Default conditions
N/A

Command mode
Address pool configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
This command is for configuring the DNS server address in the IP address pool. The DHCP
Clients will resolve the domain name through the DNS server while accessing the internet.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


397
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Examples
This example shows how to configure the IP address of the DNS server to 192.168.100.1 in
address pool configuration mode.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#dns-server 192.168.100.1
Set successfully.

Related commands
gateway
ip dhcp server pool

6.4.8 gateway

Function
To configure the gateway address of the IP address pool, use this command. To disable this
function, use the no form of this command.

Format
gateway ip-address
no gateway

Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1

Default conditions
N/A

Command mode
Address pool configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.

Raisecom Proprietary and Confidential


398
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

This command is used for configuring the gateway address of the IP address pool. The
DHCPv4 can access other networks through the gateway.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the gateway address of the IP address pool to
192.168.1.1 in address pool configuration mode.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#gateway 192.168.1.1
Set successfully.

Related commands
dns-server
dns-server secondary

6.4.9 option 60

Function
To configure Option60 fields of the DHCPv4 server, use this command. To disable this
function, use the no form of this command.

Format
option 60 string
no option 60

Parameters
Parameter Description
string Value of Option60 fields, a string of 1 to 16 characters

Default conditions
N/A

Raisecom Proprietary and Confidential


399
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Command mode
Address pool configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
When using it in zero configuration scenario, you need to ensure that values of Option60
fields of the devices at both ends are matchable.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure Option60 binding information as "Raisecom"+VLAN 1.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(config-pool)#option 60 Raisecom001
set seccessfully

Related commands
N/A

6.4.10 ip dhcp relay relay-ip

Function
To configure the trusted DHCP Relay and the server will discard packets from untrusted
DHCP Relay, use this command. To disable this function, use the no form of this command.

Format
ip dhcp relay target-ip ip-address
no ip dhcp relay target-ip ip-address

Raisecom Proprietary and Confidential


400
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Parameters
Parameter Description
ip-address Destination IP address, in dotted decimal notation

Default conditions
The destination IP address of packets is not configured.

Command mode
VLAN interface configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure the destination address for forwarding DHCP packets.
The system will take it as the address of the Server or the next Relay.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the trusted Relay address on interface 2 within the
VLAN to 192.168.12.34.
Raisecom#config
Raisecom(config)#interface vlan 2
Raisecom(config-vlan2)#ip dhcp relay relay-ip 192.168.12.34
Set successfully.

Related commands
show ip dhcp relay

Raisecom Proprietary and Confidential


401
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.4.11 show ip dhcp server

Function
To show configurations about the DHCPv4 server, use this command.

Format
show ip dhcp server

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations about the DHCPv4 server.
Raisecom##show ip dhcp server

Interface Status
------------------------------
gigaethernet 1/1/1 Enable

The following table describes fields in the command output.

Field Description
Interface Layer 3 interface ID
Status Enabled status of the DHCPv4 server on Layer 3 interface

Related commands
N/A

Raisecom Proprietary and Confidential


402
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.4.12 show ip dhcp server lease

Function
To show the IP address assigned by the DHCPv4 server or the information about the DHCPv4
Clients, use this command.

Format
show ip dhcp server lease

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the IP address assigned by the DHCPv4 server or the
information about the DHCPv4 clients.
Raisecom#show ip dhcp server lease
IP Address Hardware Address Lease Expiration IP Interface
--------------------------------------------------------------------
172.16.1.11 00:a0:98:02:32:de Feb-01-2012 11:40:00 1
172.16.3.254 02:c7:f8:00:04:22 Jul-01-2012 23:00:00 1
Lease count: 2

The following table describes fields in the command output.

Field Description
IP Address IP address assigned
Hardware Address MAC address of the DHCPv4 client
Lease Expiration Lease expiration time
IP Interface Layer 3 interface address

Raisecom Proprietary and Confidential


403
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Related commands
N/A

6.4.13 show ip dhcp server statistics

Function
To show packets statistics of the DHCPv4 server, use this command.

Format
show ip dhcp server statistics

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show packets statistics of the DHCPv4 server.
Raisecom#show ip dhcp server statistics
Bootp msg count : 0
Discover msg count : 0
Request msg count : 0
Release msg count : 0
Offer msg count : 0
Ack msg count : 0
Nak msg count : 0
Decline msg count : 0
Inform msg count : 0
Unknown msg count : 0
Total msg count : 0

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


404
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Field Description
Bootp msg count Number of Bootp packets
Discover msg count Number of Discover packets
Request msg count Number of Request packets
Release msg count Number of Release packets
Offer msg count Number of Offer packets
Ack msg count Number of Ack packets
Nak msg count Number of Nak packets
Decline msg count Number of Decline packets
Inform msg count Number of Inform packets
Unknownn msg count Number of unknown packets
Total msg count Number of total packets

Related commands
N/A

6.4.14 show ip dhcp static-bind

Function
To show information about DHCPv4 static lease, use this command.

Format
show ip dhcp static-bind

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


405
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Usage guidelines
N/A

Examples
This example shows how to show information about DHCPv4 static lease, use this command.
Raisecom#show ip dhcp static-bind
IP address Mac address Pool name
------------------------------------------------
10.0.0.1 000E.5E12.3456 pool

The following table describes fields in the command output.

Field Description
IP address IP address
Mac address MAC address
Pool name Name of the address pool

Related commands
N/A

6.4.15 show ip server pool

Function
To show configurations about the address pool of the DHCPv4 server, use this command.

Format
show ip server pool

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


406
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Usage guidelines
N/A

Examples
This example shows how to show configurations about the address pool of the DHCPv4
server.
Raisecom##show ip server pool
Pool Name: : 123
pool type : DHCP
Address Range : 0.0.0.0~0.0.0.0
Address Mask : 0.0.0.0
Gateway : 0.0.0.0
DNS Server: : 0.0.0.0
Secondary DNS : 0.0.0.0
Tftp Server : 0.0.0.0
Lease time : 30 minutes
Trap Server: : 0.0.0.0
option60 :
Pool Name: : ra
pool type : DHCP
Address Range : 0.0.0.0~0.0.0.0
Address Mask : 0.0.0.0
Gateway : 0.0.0.0
DNS Server: : 0.0.0.0
Secondary DNS : 0.0.0.0
Tftp Server : 0.0.0.0
Lease time : 30 minutes
Trap Server: : 0.0.0.0
option60 :
Pool Name: : 1
pool type : DHCP
Address Range : 0.0.0.0~0.0.0.0
Address Mask : 0.0.0.0
Gateway : 0.0.0.0
DNS Server: : 0.0.0.0
Secondary DNS : 0.0.0.0
Tftp Server : 0.0.0.0
Lease time : 30 minutes
Trap Server: : 0.0.0.0

Related commands
N/A

6.4.16 tftp-server

Function
To configure the address for TFTP Server, use this command. To disable this function, use the
no form of this command.

Raisecom Proprietary and Confidential


407
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Format
tftp-server ip-address
no tftp-server

Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1

Default conditions
N/A

Command mode
Address pool configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
This command is used for configuring the TFTP server address. DHCPv4 clients can obtain
startup files through TFTP Server while accessing the internet.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the IP address of TFTP Server in address pool
configuration mode to 192.168.1.201.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#tftp-server 192.168.1.201
Set successfully.

Raisecom Proprietary and Confidential


408
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Related commands
show ip server pool

6.4.17 trap server-ip

Function
To configure the Trap server address, use this command. To disable this function, use the no
form of this command.

Format
trap server-ip ip-address
no trap server-ip

Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.10.10.1

Default conditions
N/A

Command mode
Address pool configuration

User level
11

Usage guidelines
Scenario
When the device serves as the DHCPv4 server, DHCPv4 Clients can apply to it for IP
addresses.
This command is for configuring the address for Trap server. Through Option 60, the server
will send the SNMP Host to the Client. When the remote device with zero configuration
obtains the address, it will send a Trap to the NMS notifying the discovery of the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


409
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

N/A

Examples
This example shows how to configure the IP address of the Trap server in address pool
configuration mode to 192.168.1.201.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(dhcp-pool)#trap server-ip 192.168.1.201
Set successfully.

Related commands
show ip server pool

6.4.18 option 43

Function
To configure the Option 43 field of the DHCPv4 Server, use this command. To disable this
function, use the no form of this command.

Format
option 43 [ sub-option Sub option code ] {hex | ascii } string
no option 43 [ sub-option Sub option code ]

Parameters
Parameter Description
sub option code Sub-option ID, an integer, ranging from 1 to 254
hex In dotted hexadecimal notation
ascii A string
string Option 43 field, a string, ranging from 1 to 16

Default conditions
N/A

Command mode
Address pool configuration

User level
11

Raisecom Proprietary and Confidential


410
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Usage guidelines
Scenario
When a Layer 3 network is between the AC and AP, the AP cannot discover the AC through
Layer 2 broadcast. In this case, you can configure the Option 43 of the DHCP Server. The AP
can obtain the IP address of the AC through the Option 43 carried by the DHCP response
packet, thus communicating with the AC.
Additionally, if there are multiple ACs at the same Layer 3 network, different APs needs to
communicate with the corresponding ACs. In this case, Option 43 supports configuring the IP
addresses of multiple ACs concurrently. Different APs, according to their observed sub-option
IDs, can acquire the IP addresses of the corresponding ACs, thus implementing
communication.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
In the address pool mode, the DHCPv4 Server configures the Option 43 for the address pool.
When you execute a command, the sub-option will be considered as 0 if not configured. Sub-
options 1254 do not conflict with each other. Multiple sub-options can exist concurrently
(except sub-option 0). If you configure a command without sub-option and then configure
another command with sub-option 1254, then the previous command without sub-option will
be deleted. If you configure a command with one or more sub-option 1254 and then
configure a command without sub-option, then the previous configuration with sub-option
will be deleted.

Examples
This example shows how to configure the Option 43 message to Raisecom.
Raisecom#config
Raisecom(config)#ip dhcp server pool pool1
Raisecom(config-pool)#option 43 ascii Raisecom
set seccessfully

Related commands
N/A

6.5 DHCP relay


6.5.1 ip dhcp relay

Function
To enable DHCP Relay, use this command. To disable this function, use the no form of this
command.

Raisecom Proprietary and Confidential


411
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Format
ip dhcp relay
no ip dhcp relay

Parameters
N/A

Default conditions
Disabled

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure global DHCP Relay.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable DHCP Relay.
Raisecom#config
Raisecom(config)#ip dhcp relay
Set successfully.

Related commands
show ip dhcp relay

Raisecom Proprietary and Confidential


412
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.5.2 ip dhcp relay information option

Function
To enable DHCP Relay to support Option 82, use this command. To disable this function, use
the no form of this command.

Format
ip dhcp relay information option
no ip dhcp relay information option

Parameters
N/A

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
This function takes effect only when the global DHCP Relay is enabled and the corresponding
interfaces are enabled with the function of supporting the corresponding VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable DHCP Relay to support Option 82.
Raisecom#config
Raisecom(config)#ip dhcp relay information option
Set successfully.

Raisecom Proprietary and Confidential


413
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Related commands
show ip dhcp relay information

6.5.3 ip dhcp relay information option vlan-list

Function
To configure the VLAN list of Option 82 supported by DHCP Relay, use this command. To
disable this function, use the no form of this command.

Format
ip dhcp relay information option vlan-list vlan-list
no ip dhcp relay information option vlan-list vlan-list

Parameters
Parameter Description
vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".

Default conditions
The supported VLAN list is from 1 to 4094.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
You can use this command to enable DHCP Relay on the interface to support Option 82
VLAN lists.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


414
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Examples
This example shows how to configure the VLAN of Option 82 supported by DHCP Relay to
VLAN 3 on 1000 Mbit/s interface 1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-port)#ip dhcp relay information option vlan-list 3
Set successfully

Related commands
show ip dhcp relay information

6.5.4 ip dhcp relay information trusted

Function
To configure DHCP Relay trusted interface, use this command. To configure untrusted
interface, use the no form of this command.

Format
ip dhcp relay information trusted
no ip dhcp relay information trusted

Parameters
N/A

Default conditions
Interface is Untrusteded.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
DHCP Relay allows configuring the interface to trusted or untrusted. The device will discard
DHCP packets from untrusted interfaces.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


415
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

N/A
Precaution
N/A

Examples
This example shows how to configure interface 1000 Mbit/s interface 1/1/1 as DHCP Relay
trusted interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#ip dhcp relay information trusted
Set successfully

Related commands
show ip dhcp relay information

6.5.5 ip dhcp relay information policy

Function
To configure the policy for DHCP Relay to process DHCP request packets with Option 82.

Format
ip dhcp relay information policy { drop | keep | replace }

Parameters
Parameter Description
drop Discard Option 82 packets.
keep Directly forward Option 82 packets.
replace Replace the Option 82 field and then transmit the packet.

Default conditions
The processing policy is replace.

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


416
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Usage guidelines
Scenario
You can use this command to specify the policy for DHCP Relay to process DHCP request
packets with Option 82.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The configured policies take effect only on the condition that the DHCP Relay supports
Option82.

Examples
This example shows how to configure policy for DHCP Relay to process DHCP request
packets with Option 82 to keep.
Raisecom#config
Raisecom(config)#ip dhcp relay information policy keep
Set successfully.

Related commands
show ip dhcp relay information

6.5.6 ip dhcp relay target-ip

Function
To configure the destination IP address for forwarding DHCP packets, use this command. To
disable this function, use the no form of this command.

Format
ip dhcp relay target-ip ip-address
no ip dhcp relay target-ip ip-address

Parameters
Parameter Description
ip-address Destination IP address, in dotted decimal notation

Default conditions
Not configured

Raisecom Proprietary and Confidential


417
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Command mode
VLAN interface configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure the destination IP address for forwarding DHCP
packets. The system will take it as the address of the Server or next Relay.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the Relay destination IP address on interface 2 within
the VLAN to 192.168.12.34.
Raisecom#config
Raisecom(config)#interface vlan 2
Raisecom(config-vlan2)#ip dhcp relay target-ip 192.168.12.34
Set successfully.

Related commands
show ip dhcp relay

6.5.7 ip dhcp relay relay-ip

Function
To configure relay IP address which is used to add Agent IP field in the DHCP request
message, use this command. To delete the device, use the no form of this command.

Format
ip dhcp relay relay-ip ip-address
no ip dhcp relay relay-ip ip-address

Raisecom Proprietary and Confidential


418
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Parameters
Parameters Description
ip-address Relay IP address, in dotted decimal notation

Default conditions
Not configured

Command mode
VLAN interface configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure relay address, the system will use this address as relay
address and add Agent IP field of DHCP packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the relay address on VLAN interface 2 to
192.168.12.56.
Raisecom#config
Raisecom(config)#interface vlan 2
Raisecom(config-vlan2)#ip dhcp relay relay-ip 192.168.12.56
Set successfully.

Related commands
show ip dhcp relay

Raisecom Proprietary and Confidential


419
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

6.5.8 show ip dhcp relay

Function
To show configurations about DHCP Relay, use this command.

Format
show ip dhcp relay

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations about DHCP Relay.
Raisecom#show ip dhcp relay
DHCP Relay Global Status: Disable
Interface Status Relay Address Target Address
-----------------------------------------------------------------
vlan1 Enable 1.2.3.4 1.2.3.4

The following table describes fields in the command output.

Field Description
DHCP Relay Global Status DHCP Relay global status
Enabled: enabled
Disabled: disabled
Interface IP Interface ID
Status DHCP Relay functional status on the IP interface
Enabled: enabled
Disabled: disabled

Raisecom Proprietary and Confidential


420
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

Field Description
Target Address Destination IP address

Related commands
N/A

6.5.9 show ip dhcp relay information

Function
To show information about DHCP Relay, use this command.

Format
show ip dhcp relay information

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about DHCP Relay.
Raisecom#show ip dhcp relay information
Option 82: Enabled
Policy: Replace
Port Trusted Status Option82 Vlanlist
---------------------------------------------------
gigaethernet 1/1/1no 1
gigaethernet 1/1/2yes 1-4094
gigaethernet 1/1/3no 1-4094
gigaethernet 1/1/4no 1-4094
gigaethernet 1/1/5no 1-4094

Raisecom Proprietary and Confidential


421
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 6 DHCP

The following table describes fields in the command output.

Field Description
Option 82 DHCP Relay status
Enabled: DHCP Relay is enabled
Disabled: DHCP Relay is disabled
Policy Policy for DHCP Relay to process DHCP request packets with Option
82
drop: discard Option 82 packets
keep: directly forward Option 82 packets
replace: replace Option 82 field and then transmit the packet

Port Interface ID
Trusted Status DHCP Relay status on the interface
yes: trusted interface
no: untrusted interface
Option82 vlanlist VLAN lists which support Option 82

Related commands
N/A

Raisecom Proprietary and Confidential


422
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7 QoS

7.1 Basic functions


7.1.1 description

Function
To configure the description of the profile, use this command. To delete the description, use
the no form of this command.

Format
description statement
no description

Parameters
Parameter Description
statement Description, a string of 1 to 255 characters

Default conditions
N/A

Command mode
CMAP configuration/PMAP configuration/cos-remark configuration/cos-to-pri
configuration/dscp-mutation configuration/dscp-to-pri configuration/exp-to-pri
configuration/pri-to-exp configuration/wred configuration

User level
11

Raisecom Proprietary and Confidential


423
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Usage guidelines
Scenario
While creating traffic classification, traffic policy, or various priority mapping profiles, you
can use this command to describe them to facilitate users in understanding their meaning.
Prerequisite
Use the relevant commands to create description objects and enter the corresponding
configuration mode.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure description of the COS remarking profile 5 to video.
Raisecom#config
Raisecom(config)#mls qos mapping cos-remark 5
Raisecom(cos-remark)#description video
Set successfully.

This example shows how to configure description of the CoS-to-local priority (color) profile 5
to video.
Raisecom#config
Raisecom(config)#mls qos mapping cos-to-local-priority 5
Raisecom(cos-to-pri)#description video
Set successfully.

This example shows how to configure the description of DSCP remarking profile 5 to video.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-mutation 5
Raisecom(dscp-mutation)#description video
Set successfully.

This example shows how to configure description of the DSCP-to-local priority (color)
profile 5 to video.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-to-local-priority 5
Raisecom(dscp-to-pri)#description video
Set successfully.

Related commands
show mls qos mapping cos-remark
show mls qos mapping cos-to-local-priority
show mls qos mapping dscp-mutation

Raisecom Proprietary and Confidential


424
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

show mls qos mapping dscp-to-local-priority


show mls qos sred profile

7.1.2 show mls qos interface

Function
To show QoS information on the interface, use this command.

Format
show mls qos interface [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show QoS information on 1000 Mbit/s interface 1.
Raisecom#show mls qos interface gigaethernet 1/1/1
Interface TrustMode Priority Cos-PriProfile Dscp-PriProfile Dscp-Mutation
Cos-Remark
-------------------------------------------------------------------------
gigaethernet1/1/1 dscp 5 0 0 0 0

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


425
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Field Description
Interface Interface
TrustMode Trust mode
Priority Interface priority
Cos-PriProfile Mapping from CoS to local priority
Dscp-PriProfile Mapping from DSCP to local priority
Dscp-Mutation DSCP remarking
Cos-Remark CoS remarking

Related commands
N/A

7.2 Trust priority


7.2.1 mls qos trust

Function
To configure the priority type of interface trust, use this command. To return to the default
condition, use the no form of this command.

Format
mls qos trust { cos | dscp | port-priority }
no mls qos trust

Parameters
Parameter Description
cos CoS priority in the header of the 802.1Q packet
dscp DHCP priority in the header of the IP packet
port-priority Priority trusted by the interface

Default conditions
COS priority is trusted by Layer 2 interfaces.

Command mode
Physical layer interface configuration mode

Raisecom Proprietary and Confidential


426
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

User level
15

Usage guidelines
Scenario
While using QoS, the device needs to recognize the priority carried by the packet. You can
use this command to configure the priority trusted by the interface.
CoS priority adopts the first 3 bits in VLAN Tag TCI field. If you configure the CoS priority
trusted by the interface:
If the packets are Tagged, the interface trusts their CoS priority and generate local
priority for queue scheduling.
If the packets are Untagged, the device will adopt interface priority and generate local
priority for queue scheduling.
DSCP priority adopts the first 6 bits in the service type field of IP packets. You can use this
command to configure the priority trusted by the interface. If you configure the DSCP priority
trusted by the interface:
If the packets are IP packets, the interface will trust their DSCP priority and generate
local priority for queue scheduling.
If the packets are non-IP packets, the device will adopt interface priority and generate
local priority for queue scheduling.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure DSCP priority trusted by 1000 Mbit/s interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos trust dscp
Set successfully.

Related commands
show mls qos interface

Raisecom Proprietary and Confidential


427
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.2.2 mls qos priority

Function
To configure the interface priority, use this command.

Format
mls qos priority priority

Parameters
Parameter Description
priority Interface priority, an integer, ranging from 0 to 7

Default conditions
The priority is 6.

Command mode
Physical layer interface configuration mode

User level
15

Usage guidelines
Scenario
You can use this command to configure the priority of physical interfaces and packets. The
bigger the value is, the higher the priority is.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the priority of interface 1/1/3 to 2.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/3
Raisecom(config-gigaethernet1/1/3)#mls qos priority 2
Set successfully.

Raisecom Proprietary and Confidential


428
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Related commands
show mls qos interface

7.3 Priority mapping


7.3.1 mls qos mapping cos-remark

Function
To create the CoS remarking profile and enter cos-remark configuration mode, use this
command. To delete the profile, use the no form of this command.

Format
mls qos mapping cos-remark profile-id
no mls qos mapping cos-remark profile-id

Parameters
Parameter Description
profile-id Profile number, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
By creating the CoS remarking profile, you can configure the mapping from local priority to
CoS. Therefore, the downstream devices can manage QoS of the packets according to the
mapped CoS priority.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


429
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Precaution
If you wish to delete a profile, you need to delete the application relationship between the
profile and the interface in interface configuration mode. If you do not delete the application
relationship between the profile and the interface, then the newly created profile with the
same profile ID will be directly applied to the corresponding interface. The mapping is in
default condition.

Examples
This example shows how to configure CoS remarking profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping cos-remark 1
Raisecom(cos-remark)#

Related commands
show mls qos mapping cos-remark

7.3.2 mls qos cos-remark-mapping enable

Function
To enable mapping from local priority to CoS, use this command. To disable this function, use
the disable form of this command.

Format
mls qos cos-remark-mapping { enable | disable }

Parameters
Parameter Description
enable Enable mapping from local priority to CoS.
disable Disable mapping from local priority to CoS.

Default conditions
Enabled

Command mode
Physical layer interface configuration mode

User level
11

Raisecom Proprietary and Confidential


430
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Usage guidelines
Scenario
Only when mapping from the local priority to CoS is enabled by this command can the CoS
remarking profile applied to the interface take effect.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable mapping from local priority to CoS on interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos cos-remark-mapping enable
Set successfully.

Related commands
show mls qos interface

7.3.3 mls qos mapping cos-to-local-priority

Function
To create the CoS-to-local priority (color) profile and enter cos-to-pri configuration mode, use
this command. To delete the profile, use the no form of this command.

Format
mls qos mapping cos-to-local-priority profile-id
no mls qos mapping cos-to-local-priority profile-id

Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Raisecom Proprietary and Confidential


431
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
By creating the CoS-to-local priority (color) profile, you can modify the mapping between
CoS and local priority, add packets to different queues, and schedule these packets on the
egress interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you wish to delete a profile, you need to delete the application relationship between the
profile and the interface in interface configuration mode. If you do not delete the application
relationship between the profile and the interface, then the newly created profile with the
same profile ID will be directly applied to the corresponding interface. The mapping is in
default condition.

Examples
This example shows how to create CoS-to-local priority (color) profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping cos-to-local-priority 1
Raisecom(cos-to-pri)#

Related commands
show mls qos mapping cos-to-local-priority

7.3.4 mls qos mapping dscp-mutation

Function
To create DSCP remarking profile and enter dscp-mutation configuration mode, use this
command. To delete the profile, use the no form of this command.

Format
mls qos mapping dscp-mutation profile-id
no mls qos mapping dscp-mutation profile-id

Raisecom Proprietary and Confidential


432
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
By creating the DSCP remarking profile, you can modify the mapping between the old and
new DSCP priority. Therefore, the downstream devices can manage QoS of the packets
according to the remarked DSCP priority.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you wish to delete a profile, you need to delete the application relationship between the
profile and the interface in interface configuration mode. If you do not delete the application
relationship between the profile and the interface, then the newly created profile with the
same profile ID will be directly applied to the corresponding interface. The mapping is in
default condition.

Examples
This example shows how to configure DSCP remarking profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-mutation 1
Raisecom(dscp-mutation)#

Related commands
show mls qos mapping dscp-mutation

Raisecom Proprietary and Confidential


433
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.3.5 mls qos mapping dscp-to-local-priority

Function
To create the DSCP-to-local priority (color) profile and enter dscp-to-pri configuration mode,
use this command. To delete this configuration, use the no form of this command.

Format
mls qos mapping dscp-to-local-priority profile-id
no mls qos mapping dscp-to-local-priority profile-id

Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
By creating the DSCP-to-local priority (color) profile, you can modify the mapping between
DSCP and local priority, add packets into different queues, and schedule these packets on the
egress interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If you wish to delete a profile, you need to delete the application relationship between the
profile and the interface in interface configuration mode. If you do not delete the application
relationship between the profile and the interface, then the newly created profile with the
same profile ID will be directly applied to the corresponding interface. The mapping is in
default condition.

Raisecom Proprietary and Confidential


434
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Examples
This example shows how to create DSCP-to-local priority (color) profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-to-local-priority 1
Raisecom(dscp-to-pri)#

Related commands
show mls qos mapping dscp-to-local-priority

7.3.6 cos to local-priority

Function
To configure the mapping from CoS to local priority (color), use this command.

Format
cos cos-value to local-priority localpri-value [ color { green | red | yellow } ]

Parameters
Parameter Description
cos cos-value CoS priority
The cos-value is an integer ranging from 0 to 7.
local-priority Local priority
localpri-value The localpri-value is an integer ranging from 0 to 7.
green Specify the green.
red Specify the red.
yellow Specify the yellow.

Default conditions
The mapping from CoS to local priority or to the color is as follows:

CoS 0 1 2 3 4 5 6 7

Local 0/green 1/green 2/green 3/green 4/green 5/green 6/green 7/green

Command mode
cos-to-pri configuration

User level
11

Raisecom Proprietary and Confidential


435
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Usage guidelines
Scenario
You can use this command to modify the mapping information from CoS to local priority
(color), map a specified CoS value of an ingress packet to a local priority value, and then
schedule the ingress packet.
Prerequisite
Use the mls qos mapping cos-to-local-priority command to create the CoS-to-local priority
(color) profile and enter cos-to-pri configuration mode.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to map CoS 2 of CoS-to-local priority (color) profile 1 to local
priority 3 and how to specify the color to red.
Raisecom#config
Raisecom(config)#mls qos mapping cos-to-local-priority 1
Raisecom(cos-to-pri)#cos 2 to local-priority 3 color red
Set successfully.

Related commands
show mls qos mapping cos-to-local-priority

7.3.7 dscp to local-priority

Function
To configure the mapping from DSCP to local priority (color), use this command.

Format
dscp dscp-value to local-priority localpri-value [ color { green | red | yellow } ]

Parameters
Parameter Description
dscp-value DSCP value, an integer, ranging from 0 to 63
localpri-value Local priority, an integer, ranging from 0 to 7
green Specify the green.
red Specify the red.

Raisecom Proprietary and Confidential


436
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameter Description
yellow Specify the yellow.

Default conditions
The mapping between DSCP to local priority or to the color is as follows:

DSCP 0 to 7 8 to 15 16 to 24 to 32 to 40 to 48 to 56 to
23 31 39 47 55 63
Local 0/green 1/green 2/green 3/green 4/green 5/green 6/green 7/green

Command mode
dscp-to-pri configuration

User level
11

Usage guidelines
Scenario
You can use this command to modify the mapping information about the DSCP-to-local
priority (color) profile, map a specified DSCP value of an ingress packet to a local priority
value, and then schedule the ingress packet.
Prerequisite
Use the mls qos mapping dscp-to-local-priority command to create the DSCP-to-local
priority (color) profile and enter dscp-to-pri configuration mode.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to map DSCP 2 of DSCP-to-local priority (color) profile 1 to local
priority 3 and how to specify the color to red.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-to-local-priority 1
Raisecom(dscp-to-pri)#dscp 2 to local-priority 3 color red
Set successfully.

Related commands
show mls qos mapping dscp-to-local-priority

Raisecom Proprietary and Confidential


437
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.3.8 dscp to new-dscp

Function
To remark the DSCP priority of specified packets, use this command.

Format
dscp dscp-value to new-dscp dscp-value

Parameters
Parameter Description
dscp-value DSCP value, an integer, ranging from 0 to 63

Default conditions
N/A

Command mode
dscp-mutation configuration

User level
11

Usage guidelines
Scenario
After the DSCP priority of packets is remarked, the current device will schedule the ingress
packets according to the remarked DSCP priority.
Prerequisite
Use the mls qos mapping dscp-mutation command to create DSCP remarking profile and
enter dscp-mutation configuration mode.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to remark DSCP priority 2 to 20 in DSCP remarking profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-mutation 1
Raisecom(dscp-mutation)#dscp 2 to new-dscp 20

Raisecom Proprietary and Confidential


438
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Set successfully.

Related commands
show mls qos mapping dscp-mutation

7.3.9 local-priority to cos

Function
To configure the mapping from local priority to CoS priority, use this command.

Format
local-priority localpri-value to cos cos-value

Parameters
Parameter Description
localpri-value Local priority, an integer, ranging from 0 to 7
cos-value CoS priority, an integer, ranging from 0 to 7

Default conditions
N/A

Command mode
cos-remark configuration

User level
11

Usage guidelines
Scenario
After the mapping between local priority and CoS is configured, the downstream devices can
manage QoS of the packets according to the mapped CoS priority.
Prerequisite
You must use the mls qos mapping cos-remark command to create CoS remarking profile
and enter cos-remark configuration mode.
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


439
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Examples
This example shows how to modify the local priority 2 to CoS priority 3 in CoS remarking
profile 1.
Raisecom#config
Raisecom(config)#mls qos mapping cos-remark 1
Raisecom(cos-remark)#local-priority 2 to cos 3
Set successfully.

Related commands
show mls qos mapping cos-remark

7.3.10 mls qos cos-remark

Function
To apply the CoS remarking profile to the interface, use this command. To disable this
function, use the no form of this command.

Format
mls qos cos-remark profile-id
no mls qos cos-remark

Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
You can use this command to apply the CoS remarking profile to the egress interface.
Therefore, the downstream devices can manage CoS of the packets according to the remarked
CoS priority.
Prerequisite

Raisecom Proprietary and Confidential


440
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

You must use the mls qos mapping cos-remark command to create the CoS remarking
profile.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to apply CoS remarking profile 1 to interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/1)#mls qos cos-remark 1
Set successfully.

Related commands
show mls qos interface

7.3.11 mls qos cos-to-local-priority

Function
To apply the CoS-to-local priority (color) profile to an interface, use this command. To
disable this function, use the no form of this command.

Format
mls qos cos-to-local-priority profile-id
no mls qos cos-to-local-priority

Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Physical interface configuration/VLAN interface configuration

User level
11

Raisecom Proprietary and Confidential


441
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Usage guidelines
Scenario
After the CoS-to-local priority (color) profile is applied to the interface, the device will assign
local priority to and color the packets entered through that interface according to the CoS
priority of packets and mapping.
Prerequisite
You must use the mls qos mapping cos-to-local-priority command to create the CoS-to-
local priority (color) profile.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to apply CoS-to-local priority (color) profile 1 to interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos cos-to-local-priority 1
Set successfully.

Related commands
show mls qos interface

7.3.12 mls qos dscp-mutation

Function
To apply the DSCP remarking profile to an interface, use this command. To disable this
function, use the no form of this command.

Format
mls qos dscp-mutation profile-id
no mls qos dscp-mutation

Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Raisecom Proprietary and Confidential


442
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Command mode
Physical interface configuration/VLAN interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to apply the DSCP remarking profile to the ingress interface,
which facilitates the device in scheduling the packets according to the remarked DSCP
priority.
Prerequisite
You must use the mls qos mapping dscp-mutation command to create the DSCP remarking
profile.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to apply DSCP remarking profile 1 to interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos dscp-mutation 1
Set successfully.

Related commands
show mls qos interface

7.3.13 dscp to new-dscp

Function
To modify information about the DSCP translation profile, use this command.

Format
dscp dscp-value to new-dscp dscp-value

Raisecom Proprietary and Confidential


443
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameters
Parameter Description
dscp-value DSCP value, an integer, ranging from 0 to 63

Default conditions
N/A

Command mode
dscp-mutation configuration

User level
11

Usage guidelines
Scenario
You can use this command to modify information about the DSCP translation profile, re-
configure DSCP values for packets so that packets are classified based on new DSCP values.
Prerequisite
You must use the mls qos mapping dscp-mutation command to create the DSCP translation
profile.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to modify the priority 2 of DSCP translation profile 5 to 6.
Raisecom#config
Raisecom(config)#mls qos mapping dscp-mutation 5
Raisecom(dscp-mutation)#dscp 2 to new-dscp 6
Set successfully.

Related commands
show mls qos mapping dscp-mutation

Raisecom Proprietary and Confidential


444
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.3.14 mls qos dscp-to-local-priority

Function
To apply the DSCP-to-local priority (color) profile to an interface, use this command. To
disable this function, use the no form of this command.

Format
mls qos dscp-to-local-priority profile-id
no mls qos dscp-to-local-priority

Parameters
Parameter Description
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
After the DSCP-to-local priority (color) profile is applied to an interface, the device will
assign local priority to and color the packets which enter from the interface according to their
DSCP priority and the mapping for management and scheduling.
Prerequisite
You must use the mls qos mapping dscp-to-local-priority command to create the DSCP-to-
local priority (color) profile.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to apply DSCP-to-local priority (color) profile 1 to interface 1.

Raisecom Proprietary and Confidential


445
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos dscp-to-local-priority 1
Set successfully.

Related commands
show mls qos interface

7.3.15 show mls qos mapping cos-remark

Function
To show information about the CoS remarking profile, use this command.

Format
show mls qos mapping cos-remark [ default | profile-id ]

Parameters
Parameter Description
default Show default configurations.
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Privileged EXEC/Global configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to show CoS remarking profile 1.
Raisecom#config
Raisecom(config)#show mls qos mapping cos-remark 1
cos-remark
Index Description Ref Localpriority:0 1 2 3 4 5 6 7
-------------------------------------------------------------------------
1 8 cos: 0 1 2 3 4 5 6 7

Raisecom Proprietary and Confidential


446
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

The following table describes fields in the command output.

Field Description
cos-remark CoS remark mapping
Index Index
Description Description
Ref Reference
Localpriority Local priority
cos CoS priority

Related commands
N/A

7.3.16 show mls qos mapping cos-to-local-priority

Function
To show information about the CoS-to-local priority (color) profile, use this command.

Format
show mls qos mapping cos-to-local-priority [ default | profile-id ]

Parameters
Parameter Description
default Show default configurations.
profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Privileged EXEC/Global configuration

User level
5

Usage guidelines
N/A

Raisecom Proprietary and Confidential


447
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Examples
This example shows how to show information about the CoS-to-local priority (color) profile 7.
Raisecom#config
Raisecom(config)#show mls qos mapping cos-to-local-priority 7
G:GREEN
Y:Yellow
R:RED
cos-to-localpriority(color)
Index Description Ref CoS: 0 1 2 3 4 5 6 7
-------------------------------------------------------------------------
1 8 localpri(color):0(G) 1(G) 2(G) 3(G) 4(G) 5(G) 6(G) 7(G)

The following table describes fields in the command output.

Field Description
G:GREEN G: green packets
Y:Yellow Y: yellow packets
R:RED R: red packets
cos-to-localpriority(color) Mapping from CoS to Local priority (color)
Index Index
Description Description
Ref Reference
CoS CoS priority
localpri(color) Local priority (color)

Related commands
N/A

7.3.17 show mls qos mapping dscp-mutation

Function
To show information about the DSCP remarking profile, use this command.

Format
show mls qos mapping dscp-mutation [ default | profile-id ]

Parameters
Parameter Description
default Show default configurations.
profile-id Profile ID, an integer, ranging from 1 to 7

Raisecom Proprietary and Confidential


448
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Default conditions
N/A

Command mode
Privileged EXEC/Global configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the DSCP remarking profile 1.
Raisecom#config
Raisecom(config)#show mls qos mapping dscp-mutation 1
d1:Dscp before mutation
d2:Dscp after mutation
Dscp-Mutation-Index :1
Dscp-Mutation-Description :
Dscp-Mutation-Ref :8
d1:d2
-------------------------------------------------------------------------
0 :0 1 :1 2 :2 3 :3 4 :4 5 :5 6 :6 7 :7
8 :8 9 :9 10:10 11:11 12:12 13:13 14:14 15:16
16:16 17:17 18:18 19:19 20:20 21:21 22:22 23:23
24:24 25:25 26:26 27:27 28:28 29:29 30:30 31:31
32:32 33:33 34:34 35:35 36:36 37:37 38:38 39:39
40:40 41:41 42:42 43:43 44:44 45:45 46:46 47:47
48:48 49:49 50:50 51:51 52:52 53:53 54:54 55:55
56:56 57:57 58:58 59:59 60:60 61:61 62:62 63:63

The following table describes fields in the command output.

Field Description
d1:Dscp before mutation DSCP before mutation
d2:Dscp after mutation DSCP after mutation
Dscp-Mutation-Index ID of DSCP mutation
Dscp-Mutation-Description Description of DSCP mutation
Dscp-Mutation-Ref Reference of DSCP mutation

Related commands
N/A

Raisecom Proprietary and Confidential


449
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.3.18 show mls qos mapping dscp-to-local-priority

Function
To show information about the DSCP-to-local priority (color) profile, use this command.

Format
show mls qos mapping dscp-to-local-priority [ default | profile-id ]

Parameters
Parameter Description

default Show default configurations.


profile-id Profile ID, an integer, ranging from 1 to 7

Default conditions
N/A

Command mode
Privileged EXEC/Global configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about DSCP-to-local priority (color) profile 1.
Raisecom#config
Raisecom(config)#show mls qos mapping dscp-to-local-priority 1
d1:Dscp before mapping
d2:Local priority after mapping
G:GREEN
Y:Yellow
R:RED
Dscp-Map-Index :1
Dscp-Map-Description :
Dscp-Map-Reference :8
d1:d2(color)
-------------------------------------------------------------------------
0 :0 (G) 1 :0 (G) 2 :0 (G) 3 :0 (G) 4 :0 (G) 5 :0 (G) 6 :0 (G)
7 :0 (G)

Raisecom Proprietary and Confidential


450
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

8 :1 (G) 9 :1 (G) 10:1 (G) 11:1 (G) 12:1 (G) 13:1 (G) 14:1 (G)
15:1 (G)
16:2 (G) 17:2 (G) 18:2 (G) 19:2 (G) 20:2 (G) 21:2 (G) 22:2 (G)
23:2 (G)
24:3 (G) 25:3 (G) 26:3 (G) 27:3 (G) 28:3 (G) 29:3 (G) 30:3 (G)
31:3 (G)
32:4 (G) 33:4 (G) 34:4 (G) 35:4 (G) 36:4 (G) 37:4 (G) 38:4 (G)
39:4 (G)
40:5 (G) 41:5 (G) 42:5 (G) 43:5 (G) 44:5 (G) 45:5 (G) 46:5 (G)
47:5 (G)
48:6 (G) 49:6 (G) 50:6 (G) 51:6 (G) 52:6 (G) 53:6 (G) 54:6 (G)
55:6 (G)
56:7 (G) 57:7 (G) 58:7 (G) 59:7 (G) 60:7 (G) 61:7 (G) 62:7 (G)
63:7 (G)

The following table describes fields in the command output.

Field Description
d1:Dscp before mutation DSCP before mutation
d2: Local priority after mapping DSCP after mutation
G:GREEN G: green packets
Y:Yellow Y: yellow packets
R:RED R: red packets
Dscp-Mutation-Index ID of DSCP mutation
Dscp-Mutation-Description Description of DSCP mutation
Dscp-Mutation-Ref Reference of DSCP mutation

Related commands
N/A

7.4 Bandwidth guarantee


7.4.1 mls qos queue shaping

Function
To configure the bandwidth guarantee for the interface queue, use this command. To disable
this function, use the no form of this command.

Format
mls qos queue queue-id shaping cir cir pir pir
no mls qos queue queue-id shaping

Raisecom Proprietary and Confidential


451
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameters
Parameter Description
queue-id Queue ID, an integer, ranging from 1 to 8
cir cir CIR
The cir is an integer ranging from 0 to 1000000, in units of Kbit/s
pir pir PIR
The pir is an integer ranging from 0 to 1000000, in units of Kbit/s

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
You can use this command to configure the bandwidth guarantee for interface queue.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to set the CIR and PIR of interface 1/1/1 to 20 Kbit/s and 200 Kbit/s
respectively.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos queue 2 shaping 20 200
Set successfully.

Related commands
show mls qos queue shaping interface

Raisecom Proprietary and Confidential


452
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.4.2 show mls qos queue interface

Function
To show information about the interface queue, use this command.

Format
show mls qos queue interface interface-type interface-number

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show queue configurations of 1000 Mbit/s interface 1.
Raisecom#show mls qos queue interface gigaethernet 1/1/1
gigaethernet1/1/1
Queue Weight(SP)
-------------------------
1 0
2 0
3 0
4 0
5 0
6 0
7 0
8 0

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


453
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Field Description
Queue Queue
Weight(SP) Weight

Related commands
mls qos queue

7.4.3 clear mls qos queue statistics interface

Function
To clear the statistics of packets made by the queue on the interface, use this command.

Format
clear mls qos queue statistics interface interface-type interface-number [ queueid queue-id ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
queueid queue-id Queue ID, an integer, ranging from 0 to 7

Default conditions
N/A

Command mode
Global configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to clear statistics of packets made by the queue on interface 1/1/2.
Raisecom#config

Raisecom Proprietary and Confidential


454
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Raisecom(config)#clear mls qos queue statistics interface gigaethernet


1/1/2
Set successfully.

Related commands
show mls qos queue statistics interface

7.4.4 show mls qos queue statistics interface

Function
To show statistics of queue on the interface, use this command.

Format
show mls qos queue statistics interface interface-type interface-number

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
10

Usage guidelines
N/A

Examples
This example shows how to show statistics of the queue on 1000 Mbit/s interface 1/1/2.
Raisecom#show mls qos queue statistics interface gigaethernet 1/1/2
Port :gigaethernet1/1/1
QueueId PassPkts(Pkts) PassBytes(Bytes) DropPkts(Pkts) DropBytes(Bytes)
-------------------------------------------------------------------------
1 0 0 0 0
2 0 0 0 0

Raisecom Proprietary and Confidential


455
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

3 0 0 0 0
4 0 0 0 0
5 0 0 0 0
6 0 0 0 0
7 0 0 0 0
8 0 0 0 0

The following table describes fields in the command output.

Field Description
Port Interface ID
QueueId Queue ID
PassPkts Number of packets past
PassBytes Number of bytes past
DiscardPkts Number of packets dropped
DiscardBytes Number of bytes dropped

Related commands
clear mls qos queue statistics interface

7.4.5 show mls qos queue shaping interface

Function
To show information about queue shaping on the interface, use this command.

Format
show mls qos queue shaping interface interface-type interface-number

Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type.
The interface-number means interface list number.
It supports a range input, such as "1-3".

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


456
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the queue shaping on 1000 Mbit/s
interface 1/1/1.
Raisecom#show mls qos queue shaping interface gigaetnernet 1/1/1
Port Queue CIR(KBps) CBS(KB) EIR(KBps) EBS(KB)
------------------------------------------------------------------
GE1/1/1 1 1000 200 2000 40

The following table describes fields in the command output.

Field Description
port Interface ID
Queue Queue
CIR(KBps) Committed information rate
CBS(KB) Committed burst size
EIR(KBps) Excess information rate
EBS(KB) Excess burst size

Related commands
N/A

7.5 Congestion management


7.5.1 mls qos queue scheduler drr

Function
To assign weight to the interface queue when the queue scheduling mode is DRR, use this
command. To return to the default condition, use the no form of this command.

Format
mls qos queue scheduler drr weight1 weight2 weight3weight8
no mls qos queue scheduler

Raisecom Proprietary and Confidential


457
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameters
Parameter Description
weight1 to weight 8 Weight value, an integer, ranging from 0 to 127 among which 0
represents SP queue.

Default conditions
The weight is 8.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
You can use this command to assign weight to the queue while configuring queue scheduling
policy of DRR type.
Prerequisite
Queue scheduling policy is configured as DRR through the mls qos queue scheduler drr
command
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to use DRR scheduling policy to assign the weight value of
1:1:1:1:1:1:1:1 to the queue on interface 1 in slot 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos queue scheduler drr 1 1 1 1 1
1 1 1
Set successfully.

Related commands
show mls qos queue interface

Raisecom Proprietary and Confidential


458
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.5.2 mls qos queue scheduler wrr

Function
To assign weight to the interface queue when the queue scheduling mode is WRR, use this
command. To return to the default condition, use the no form of this command.

Format
mls qos queue scheduler wrr weigh1 weight2 weight3weight8
no mls qos queue scheduler wrr

Parameters
Parameter Description
weight1 to weight8 Weight value, an integer, ranging from 0 to 127 among which 0
represents SP queue.

Default conditions
The weight is 64.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
You can use this command to assign weight to the queue while configuring queue scheduling
policy of WRR type.
Prerequisite
Queue scheduling policy is configured as WRR through the mls qos queue scheduler wrr
command.
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


459
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Examples
This example shows how to use WRR scheduling policy to assign the weight value of
1:1:1:1:1:1:1:1 to the queue on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet1/1/2
Raisecom(config-gigaethernet1/1/2)#mls qos queue scheduler wrr 1 1 1 1 1
1 1 1
Set successfully.

Related commands
show mls qos queue interface

7.5.3 mls qos queue scheduler sp

Function
To configure the queue scheduling mode as SP, use this command. To return to the default
condition, use the no form of this command.

Format
mls qos queue scheduler sp [schedule-list schedule-number]
no mls qos queue scheduler

Parameters
Parameter Description
schedule-number Task scheduling list, an integer, ranging from 0 to 99

Default conditions
The scheduling mode is SP.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
Queue scheduling policies can be classified into SP, DRR, and WRR. You can execute this
command to configure queue scheduling policy.

Raisecom Proprietary and Confidential


460
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Deficit Round Robin (DRR): on the basis of scheduling packets in a polling manner
according to the priority, the device schedules packets according to the weight of the
queue.
Strict Priority (SP): the device strictly schedules packets in a descending order of priority.
Packets with lower priority cannot be scheduled until packets with higher priority are
scheduled.
Weighted Round Robin (WRR): on the basis of scheduling packets in a polling manner
according to the priority, the queue with higher priority will gain more resources, while
the queue with lower priority will gain little resources. In this way, the problem of SP
scheduling, namely, packets with lower priority wait for a long time to be served, is
solved.
Prerequisite
N/A
Follow-up procedure
Use the mls qos queue wrr command to assign weigh to the queue while using WRR
policy.
Use the mls qos queue drr command to assign weigh to the queue while using DRR
policy.
Precaution
N/A

Examples
This example shows how to configure the scheduling method for interface 1 in slot 1 as SP.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#mls qos queue scheduler SP
Set successfully.

Related commands
show mls qos interface

7.5.4 mls qos sred profile

Function
To create SRED profile and enter SRED profile configuration mode, use this command. To
delete the profile, use the no form of this command.

Format
mls qos sred profile profile-id
no mls qos sred profile { all | profile-list }

Raisecom Proprietary and Confidential


461
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameters
Parameter Description
profile-id SRED profile ID, an integer, ranging from 1 to 8
all Delete all profiles.
profile-list SRED profile list, an integer, ranging from 1 to 8
It supports specific values, such as "1,2,3".
It also supports a range, such as "1-3".

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
N/A

Examples
This example shows how to create SERD profile 1.
Raisecom#config
Raisecom(config)#mls qos sred profile 1
Raisecom(sred)#

Related commands
show mls qos sred profile

7.5.5 sred start-drop-threshold end-drop-threshold

Function
To configure SRED profile information, use this command. To disable this function, use the
no form of this command.

Format
sred [ color { red | yellow } ] start-drop-threshold start-drop value drop-probability drop
probability value
no sred [ color { green | red | yellow } ]

Raisecom Proprietary and Confidential


462
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameters
Parameter Description
red Red packets
yellow Yellow packets
start-drop value Start-drop threshold percentage, ranging from 0 to 100
drop probability Discard probability, an integer, ranging from 0 to 7
value

Default conditions
N/A

Command mode
SRED profile configuration

User level
11

Usage guidelines
Scenario
SRED will randomly discard packets to avoid TCP global synchronization, when the network
is congested.
By modifying information about the SRED profile, you can configure processing modes for
red or yellow packets. For packets in yellow, the drop rate is configured lower and start-drop
threshold and end-drop threshold are higher. While for packets in red, the drop rate is
configured higher and start-drop threshold and end-drop threshold are lower.
Prerequisite
The SRED profile is created through the mls qos sred profile command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to set the start-drop threshold and drop rate of SRED profile 1 to 20
and 5 respectively.
Raisecom#config
Raisecom(config)#mls qos sred profile 1
Raisecom(sred)#sred start-drop-threshold 20 drop-probability 5
Set successfully.

Raisecom Proprietary and Confidential


463
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Related commands
show mls qos sred profile

7.5.6 show mls qos sred profile

Function
To show information about SRED profile, use this command.

Format
show mls qos sred profile [ profile-list ]

Parameters
Parameter Description
profile-list SRED profile list, an integer, ranging from 1 to 8
It supports specific values, such as "1,2,3".
It also supports a range, such as "1-3".

Default conditions
N/A

Command mode
Global configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about SERD profile 1.
Raisecom#config
Raisecom(config)#show mls qos sred profile 1
YSDT: Yellow Start Drop Threshold
YDP : Yellow Drop Probability
RSDT: Red Start Drop Threshold
RDP : Red Drop Probability
Index Description Ref YSDT YDP RSDT RDP
-------------------------------------------------------------------------
-----------------
1 0 100 0(100%) 100 0(100%)

Raisecom Proprietary and Confidential


464
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

The following table describes fields in the command output.

Field Description
YSDT:Yellow Start Discard Threshold Start-drop threshold of packets in yellow
YDP :Yellow Discard Probability Discard rate of packets in yellow
RSDT:Green Start Discard Threshold Start-drop threshold of packets in red
RDP :Green Discard Probability Discard rate of packets in red
Index Index
Description Description
Ref Reference

Related commands
N/A

7.6 Traffic policy


7.6.1 class-map(global configuration mode)

Function
To create traffic classification and enter cmap configuration mode, use this command. To
disable this function, use the no form of this command.

Format
class-map class-map [ match-all | match-any ]
no class-map class-map

Parameters
Parameter Description
class-map Name of traffic classification, a string of 1 to 16 characters
match-all Specify match type to satisfy all defined classification rules.
match-any Specify match type to satisfy one defined or more defined
classification rules.

Default conditions
N/A

Raisecom Proprietary and Confidential


465
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Traffic classification refers to recognizing packets of certain types according to configured
rules, thus classifying packets with same features into one type. QoS provides it with different
levels of service according to different classification.
While creating traffic classification, you must specify match type. That is, to specify match-
all or match-any.
match-all: means executing "and", that is, various match statements are running "and"
operation. Only the traffic satisfies all match statements can it be matched successfully.
It there are conflicts, the match statement fails.
match-any: means executing "or", traffic will be matched successfully if it satisfies one
match statement.
The packets created by this command should share certain same features.
Prerequisite
Global QoS is enabled.
Follow-up procedure
You can use the description command to describe traffic classification.
You can use the match command to define rules for traffic classification.
Precaution
If the match-all parameter is configured in traffic classification, all classification rules must
be met. Conflicts among classification rules should be avoided, otherwise, the configuration
will fail.
If the traffic classification has been used by traffic policy and applied to the interface, it can
not be deleted.

Examples
This example shows how to create traffic classification class 1 with match type of match-all.
Raisecom#config
Raisecom(config)#class-map class1 match-all
Set successfully.
Raisecom(config-cmap)#

Related commands
show class-map

Raisecom Proprietary and Confidential


466
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.6.2 match

Function
To define the ACL of traffic classification type, use this command. To disable the
configuration, use the no form of this command.

Format
match access-list{ access-list | name}
match cos cos-value
match inner-vlan vlan-id
match vlan vlan-id
match dscp dscp-value
no match access-list{ access-list | name }
no match cos cos-value
no match inner-vlan
no match vlan vlan-id
no match dscp dscp-value

Parameters
Parameter Description
access-list Number of ACL list, in form of integer
When the value ranges from 1000 to 1999, it means basic IP ACL.
When the value ranges from 2000 to 2999, it means extended IP ACL.
When the value ranges from 3000 to 3999, it means MAC ACL.
When the value ranges from 5000 to 5999, it means MAP ACL.
When the value ranges from 6000 to 6999, it means IPv6 ACL.
When the value ranges from 7000 to 7999, it means IPv6 extended ACL.

name ACL name


cos cos- Classify packets based on CoS values.
value The cos-value indicates the CoS value. It is an integer ranging from 0 to 7.
inner-vlan Classify packets based on inner and outer VLANs.
inner-vlan- The inner-vlan-value indicates the inner VLAN ID. It is an integer ranging
value from 1 to 4094.
dscp dscp- Classify packets based on DSCP values.
value The dscp-value indicates the DSCP value. It is an integer ranging from 0 to
63.
vlan vlan-id Classify packets based on VLANs.
The vlan-id indicates VLAN ID. It is an integer ranging from 1 to 4094.

Raisecom Proprietary and Confidential


467
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Default conditions
N/A

Command mode
CMAP configuration

User level
11

Usage guidelines
Scenario
After creating traffic classification, you can use this command to define ACL rules for traffic
classification for recognizing various packets.
Prerequisite
The class-map command is used for creating traffic classification.
The rule command is used for configuring ACL match rules which should be more than
0.
Follow-up procedure
N/A
Precaution
The ACL must be defined and its type is configured to permit.
If traffic classification is applied to an interface, you cannot use the match command to
modify classification rules.

Examples
This example shows how to configure basic IP ACL 1001 for traffic classification class 1.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match access-list 1001
Set successfully.

Related commands
show class-map

7.6.3 show class-map

Function
To show information about traffic classification, use this command.

Raisecom Proprietary and Confidential


468
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Format
show class-map [ class-map-name ]

Parameters
Parameter Description
class-map-name Name of traffic classification, a string of 1 to 16 characters

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about traffic classification class1.
Raisecom#show class-map class1
Class-Map class1 (id 0)(ref 0)
Description this-is-a-test-class-map
Match acl 1001

The following table describes fields in the command output.

Field Description
Class Map Name of traffic classification
Description Description
Match Matchable classification rules

Related commands
class-map
description
match

Raisecom Proprietary and Confidential


469
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.6.4 mls qos policer-profile

Function
To create traffic policing profile and enter traffic policing profile configuration mode, use this
command. To delete the profile, use the no form of this command.

Format
mls qos policer-profile policer-name [ single ] [ aggregate ] [ hierarchy ]
no mls qos policer-profile [ policer-name ]

Parameters
Parameter Description
policer-name Name of traffic policing profile, a string of 1 to 16 characters
single Specify the traffic regulation mode as single.
aggregate Specify the traffic regulation mode as aggregate token bucket.
hierarchy Specify the traffic regulation mode as hierarchy token bucket.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to create traffic policing profile and enter traffic policing profile
configuration mode.
Specify the mode when you create the traffic policing profile for the first time. The single
means that the profile will work together with certain type of traffic in the traffic classification
to limit the rate of the packets.
You can specify actions for traffic regulation in traffic policing profile configuration mode,
such as drop-color, set-cos, set-dscp, set-pri, and recolor. One traffic policing profile can be
configured with one or more actions among which drop conflicts with other actions.
Prerequisite
N/A

Raisecom Proprietary and Confidential


470
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Follow-up procedure
N/A
Precaution
When using the no mls qos policer-profile [ policer-name ] command to delete traffic
policing profile, you can delete the failures if the specified traffic policing profile is quoted.

Examples
This example shows how to create traffic policing profile tb with the mode of single.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#

Related commands
show mls qos policer

7.6.5 drop-color

Function
To configure to drop packets in specified color in traffic policing profile configuration mode,
use this command. To disable this function, use the no form of this command.

Format
drop-color red
no drop-color red

Parameters
Parameter Description
red Discard packets in red.

Default conditions
N/A

Command mode
Traffic regulation profile configuration

User level
11

Raisecom Proprietary and Confidential


471
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Usage guidelines
Scenario
You can use this command to configure to drop packets in specified color of traffic policing
profile. If the traffic policing profile is quoted, configurations will fail.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.

Examples
This example shows how to configure single traffic policing profile tb to discard red packets.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#drop-color red
Set successfully.

Related commands
show mls qos policer

7.6.6 set-cos

Function
To configure the mapping from packet colors to CoS values, use this command. To disable
this function, use the no form of this command.

Format
set-cos { green cos | red cos }
no set-cos { green | red }

Parameters
Parameter Description
green cos Specify the CoS value mapped to green packets. It is an integer
ranging from 0 to 7.
red cos Specify the CoS value mapped to red packets. It is an integer ranging
from 0 to 7.

Raisecom Proprietary and Confidential


472
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Default conditions
N/A

Command mode
Traffic regulation profile configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the mapping from packets in specified color to CoS.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color-aware pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.

Examples
This example shows how to configure the single traffic policing profile to specify mapping
packets in red to CoS priority 2.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#set-cos red 2
Set successfully.

Related commands
show mls qos policer

7.6.7 set-dscp

Function
To configure the mapping from packet color to DSCP priority, use this command. To disable
this function, use the no form of this command.

Raisecom Proprietary and Confidential


473
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Format
set-dscp { green green-value | red red-value }
no set- dscp { green | red }

Parameters
Parameter Description
green green-value Specify the DSCP value mapped to green packets. It is an integer
ranging from 0 to 63.
red red-value Specify the DSCP value mapped to red packets. It is an integer
ranging from 0 to 63.

Default conditions
N/A

Command mode
Traffic regulation profile configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure mapping packets in specified color to DSCP.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.

Examples
This example shows how to configure the single traffic policing profile to specify mapping
packets in red to DSCP 2.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#set-dscp red 2
Set successfully.

Raisecom Proprietary and Confidential


474
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Related commands
show mls qos policer

7.6.8 set-pri

Function
To configure the mapping from packet color and local priorities, use this command. To
disable this function, use the no form of this command.

Format
set-pri { green green-value | red red-value }
no set- pri { green | red }

Parameters
Parameter Description
green green-value Specify the local priority mapped to green packets. It is an integer
ranging from 0 to 7.
red red-value Specify the local priority mapped to red packets. It is an integer
ranging from 0 to 7.

Default conditions
N/A

Command mode
Traffic regulation profile configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the mapping from packets in specified color to local
priority.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color-aware pattern to aware.
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


475
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Precaution
Configurations will fail if the traffic policing profile is quoted.

Examples
This example shows how to configure the single traffic policing profile to specify mapping
packets in red to local priority 2.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#set-pri red 2
Set successfully.

Related commands
show mls qos policer

7.6.9 recolor

Function
To recolor packets, use this command. To disable this function, use the no form of this
command.

Format
recolor { green-recolor red | red-recolor green }
no recolor { green | red }

Parameters
Parameter Description
green-recolor Recolor green packets.
red-recolor Recolor red packets.
red Recolor packets with red.
green Recolor packets with green.

Default conditions
N/A

Command mode
Traffic regulation profile configuration

User level
11

Raisecom Proprietary and Confidential


476
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Usage guidelines
Scenario
You can use this command to recolor packets in specified color.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
enter traffic policing profile configuration mode.
You must use the color-mode command to configure color-aware pattern to aware.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policing profile is quoted.

Examples
This example shows how to configure the single traffic policing profile to specify recoloring
packets in green.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#recolor green-recolor red
Set successfully.

Related commands
show mls qos policer

7.6.10 cir cbs

Function
To configure rate-limiting parameter on the traffic policing profile, use this command.

Format
cir cir cbs cbs [ ebs ebs ]
cir cir cbs cbs eir eir ebs ebs [ coupling ]
cir cir cbs cbs pir pir pbs pbs

Parameters
Parameter Description
cir cir Committed information rate
The cir is an integer ranging from 0 to 1048576, in units of Kbit/s.

Raisecom Proprietary and Confidential


477
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameter Description
cbs cbs Committed burst size
The cbs is an integer ranging from 0 to 16384, in units of Kbytes.
eir eir Excess information rate
The eir is an integer ranging from 0 to 1048576, in units of Kbit/s.
ebs ebs Excess burst size
The ebs is an integer ranging from 0 to 16384, in units of Kbytes.
coupling Bucket coupling, configure different types of traffic policing profiles with
rate limit parameters. Traffic with speed exceeding cir instead of eir will
not be discarded randomly. Instead, they will be sent until their speed is
slower than cir.
pir pir Peak information rate
The pir is an integer ranging from 0 to 1048576, in units of Kbit/s.
pbs pbs Peak burst size
The pbs is an integer ranging from 0 to 16384, in units of Kbytes.

Default conditions
N/A

Command mode
Traffic regulation profile configuration

User level
11

Usage guidelines
Scenario
You can configure rate-limiting parameters according to the actual needs. And the algorithm
of the traffic policing profile varies with the commands.
When the command line is cir cir cbs cbs, use Flow algorithm.
When the command line is cir cir cbs cbs ebs ebs, use RFC2697 algorithm.
When the command line is cir cir cbs cbs pir pir pbs pbs, use RFC2698 algorithm.
When the command line is cir cir cbs cbs eir eir ebs ebs, use RFC4115 algorithm.
When the command line is cir cir cbs cbs eir eir ebs ebs coupling, use MEF10.1
algorithm.
Prerequisite
You must use the mls qos policer-profile command to create traffic policing profile and
specify its mode before configuring this command.
Follow-up procedure

Raisecom Proprietary and Confidential


478
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

N/A
Precaution
N/A

Examples
This example shows how to configure single traffic policing profile tb, specify its CIR to 20
kbit/s, CBS to 10 Kbytes, PIR to 200 kbit/s, and and PBS to 200 Kbytes.
Raisecom#config
Raisecom(config)#mls qos policer-profile tb single
Raisecom(traffic-policer)#cir 20 cbs 10 pir 200 pbs 200
Set successfully.

Related commands
show mls qos policer

7.6.11 show mls qos policer

Function
To show rate limiting rules, use this command.

Format
show mls qos policer [ policer-name ]

Parameters
Parameter Description
policer-name Policer name, a string of 1 to 16 characters

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Usage guidelines
N/A

Raisecom Proprietary and Confidential


479
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Examples
This example shows how to show rate limiting rule tb.
Raisecom#show mls qos policer tb
single-policer: tb mode:2698 color:aware
cir: 20 kbps cbs: 10 kB pir: 200 kbps pbs: 200 kB

green recolor red


red drop

The following table describes fields in the command output.

Field Description
single-policer Name of traffic policing profile
mode Mode of traffic policing profile
color Color-aware pattern of traffic policing profile
cir Committed information rate
cbs Committed burst size
green reclor Recolor green packets.
red drop Discard red packets.

Related commands
N/A

7.6.12 policy-map

Function
To create traffic policy and enter PMAP configuration mode, use this command. To delete the
traffic policy, use the no form of this command.

Format
policy-map policy-map-name
no policy-map policy-map-name

Parameters
Parameter Description
policy-map-name Name of traffic policy, a string of 1 to 16 characters

Default conditions
N/A

Raisecom Proprietary and Confidential


480
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
QoS is implemented by traffic policy. The traffic policy means to binding traffic classification
with traffic action, thus processing different kinds of packets according to different processing
modes.
Prerequisite
Traffic classification is created through the class-map(global configuration mode)
command.
Classification rule is defined through the match command.
Follow-up procedure
Use the class-map(PMAP configuration mode) to add traffic classification to traffic
policy.
Use the show policy-map command to show information about traffic policy.
Precaution
One traffic policy includes one or more traffic classifications.

Examples
This example shows how to create traffic policy1.
Raisecom#config
Raisecom(config)#policy-map policy1
Set successfully
Raisecom(config-pmap)#

Related commands
show policy-map

7.6.13 class-map (PMAP configuration mode)

Function
To add traffic classification to the traffic policy and enter traffic policy configuration mode
binding traffic classification, use this command. To delete the traffic classification in the
policy, use the no form of this command

Raisecom Proprietary and Confidential


481
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Format
class-map class-map-name
no class-map class-map-name

Parameters
Parameter Description
name Name of traffic classification, a string of 1 to 16 characters

Default conditions
N/A

Command mode
PMAP configuration

User level
11

Usage guidelines
Scenario
The traffic policy is an integrated QoS policy formed by associating traffic policy with traffic
behaviour. You can use this command to add traffic classification to the traffic policy.
Prerequisite
Traffic policies are created through the policy-map command.
Traffic classification is created through the class-map (config) command in slot
configuration mode and rules for traffic classification should be defined through the
match command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to add traffic classification class1 to traffic policy1.
Raisecom#config
Raisecom(config)policy-map policy1
Raisecom(config-pmap)#class-map class1
Set successfully.
Raisecom(config-pmap-c)#

Raisecom Proprietary and Confidential


482
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Related commands
show policy-map

7.6.14 description (cmap/pmap)

Function
To describe traffic classification or traffic policy, use this command. To disable this function,
use the no form of this command.

Format
description string
no description

Parameters
Parameter Description
string Description, a string of 1 to 255 characters

Default conditions
N/A

Command mode
Traffic classification configuration/traffic policy configuration

User level
11

Usage guidelines
Scenario
While creating traffic classification or traffic policy, you can use this command to describe
traffic classification or traffic policy, thus facilitating users in understanding the meaning of
traffic classification or traffic policy.
Prerequisite
Traffic classification is created through the class-map command.
Traffic policy is created through the policy-map command.
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


483
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Examples
This example shows how to describe traffic classification class1 with description of this-is-a-
test-class-map.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#description this-is-a-test-class-map
Set successfully.

This example shows how to describe traffic policy1 with description of this-is-a-test-policy-
map.
Raisecom#config
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#description this-is-a-test-policy-map
Set successfully.

Related commands
show class-map
show policy-map

7.6.15 police

Function
To introduce a traffic policing profile (policer) to the traffic policy, use this command. To
delete the profile, use the no form of this command.

Format
police policer-name
no police policer-name

Parameters
Parameter Description
policer-name Policer name, a string of 1 to 16 characters

Default conditions
N/A

Command mode
Traffic policy configuration mode binding traffic classification

Raisecom Proprietary and Confidential


484
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

User level
11

Usage guidelines
Scenario
You need to define the traffic classification and traffic action (such as traffic remarking,
redirection, and rate limit on traffic) in the traffic policy. You can use this command to
introduce rate limit on traffic as the traffic action to the traffic policy.
Prerequisite
Traffic classification is created through the class-map (global configuration mode)
command.
Classification rule is defined through the match command.
The traffic policing profile is created through the mls qos policer-profile command.
Use the policy-map command to create the traffic policy and use the class-map (PMAP
configuration mode) to add traffic classification to the traffic policy.
Follow-up procedure
You can use the service-policy command to apply the policy to interface.
Precaution
N/A

Examples
This example shows how to use the traffic policing profile with the name of policer 1 in
policy 1 and under class 1.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match access-list 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#police policer1
Set successfully.

Related commands
show policy-map

7.6.16 show policy-map

Function
To show information about traffic policy, use this command.

Raisecom Proprietary and Confidential


485
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Format
show policy-map [ policy-map-name ] [ class class-map-name ]

Parameters
Parameter Description
policy-map policy- Name of traffic policy
map-name The policy-map-name is a string of 1 to 16 characters.
class-map class- Name of traffic classification
map-name The class-map-name is a string of 1 to 16 characters.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about traffic policy.
Raisecom#show policy-map
Policy Map policy1
Class-map class1
police tb

The following table describes fields in the command output.

Field Description
Policy Map Name of traffic policy
Class-map Name of traffic classification
police Name of traffic policing profile

Related commands
N/A

Raisecom Proprietary and Confidential


486
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.6.17 set

Function
To configure re-marking for the traffic, use this command. To disable this function, use the no
form of this command.

Format
set { cos cos-value | dscp dscp-value | local-priority value }
no set { cos | ip dscp | local-priority }

Parameters
Parameter Description
cos cos-value New CoS priority
The cos-value is an integer ranging from 0 to 7.
dscp dscp-value New DSCP
The dscp-value is an integer ranging from 0 to 63.
local-priority value New Local priority
The value is an integer ranging from 0 to 7.

Default conditions
N/A

Command mode
Traffic policy configuration mode binding traffic classification

User level
11

Usage guidelines
Scenario
You need to define the traffic classification and traffic action (such as traffic re-marking,
redirection, and rate limit on traffic) in the traffic policy, you can use this command to
configure the traffic remarking.
Remarking means to modifying the priority and VLAN ID of the packets. Different packets
use different priority fields, for example, IP packets use IP priority and DSCP priority while
802.1Q packets use CoS priority with VLAN Tags.
Prerequisite
Traffic classification is created through the class-map(global configuration mode)
command.

Raisecom Proprietary and Confidential


487
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Traffic classification is defined through the match command.


Traffic policy is created through the policy-map command and traffic classification is
added to policy through the class-map(PMAP) command.
Follow-up procedure
N/A
Precaution
If traffic policy is in use, configurations fail.
The value of set in traffic classification can only be configured as one type and the last
configuration takes effect.
Reconfiguring local priority on the egress interface is not supported.

Examples
This example shows how to change the CoS value to 5 in the traffic policy1 and under traffic
classification class1.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match acl 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#set cos 5
Set successfully.

Related commands
show policy-map

7.6.18 redirect-to

Function
To configure the traffic redirection, use this command. To disable this function, use the no
form of this command.

Format
redirect-to interface-type interface-number
no redirect-to port

Parameters
Parameter Description
interface-type Interface type

Raisecom Proprietary and Confidential


488
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameter Description
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Traffic policy configuration mode binding traffic classification

User level
11

Usage guidelines
Scenario
You need to define the traffic classification and traffic action (such as traffic re-marking,
redirection, and rate limit on traffic) in the traffic policy. You can use this command to
configure the traffic redirection.
Redirection means that packets will not be forwarded according to the original destination
address. Instead, they will be redirected to the specified egress interface and be forwarded out.
If the next hop is unavailable, the system will forward the packets according to the original
destination address.
Prerequisite
Traffic classification is created through the class-map (global configuration mode)
command.
Classification rule is defined through the match command.
Traffic policy is created through the policy-map command and traffic classification is
added to the policy through the class-map (PMAP configuration mode) command.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policy is used.
The redirected interface must be a physical interface.
The egress interface does not support that configuration.

Examples
This example shows how to redirect traffic to 1000 Mbit/s interface 1/1/2 in the traffic policy1
and under the traffic classification class1.
Raisecom#config
Raisecom(config)#class-map class1

Raisecom Proprietary and Confidential


489
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Raisecom(config-cmap)#match acl 1001


Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#redirect-to gigaethernet 1/1/2
Set successfully.

Related commands
show policy-map

7.6.19 copy-to-mirror

Function
To configure copying traffic to the mirroring group, use this command. To disable this
function, use the no form of this command.

Format
copy-to-mirror group-id
no copy-to-mirror

Parameters
Parameter Description
group-id Mirroring group ID, an integer, ranging from 1 to 4

Default conditions
N/A

Command mode
Traffic policy configuration mode binding with traffic classification

User level
11

Usage guidelines
Scenario
After the traffic policy is used and enabled, traffic which match with traffic classification
rules with be copied to the mirror group.
Prerequisite

Raisecom Proprietary and Confidential


490
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Traffic classification is created through the class-map (global configuration mode)


command.
Classification rules are defined through the match command.
Traffic policy is created through the policy-map command and the traffic classification
is added to the policy through the class-map (PMAP configuration mode) command.
The mirror group is configured through the mirror monitor-port command.
The mirroring feature is enabled through the mirror enable command.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policy is used.
Configurations will fail if redirection to the group is configured.

Examples
This example shows how to configure traffic mirroring.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match acl 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#copy-to-mirror 1
Set successfully

Related commands
show policy-map

7.6.20 forward-to-cpu

Function
To configure forwarding the traffic to CPU, use this command. To disable this function, use
the no form of this command.

Format
forward-to-cpu
no forward-to-cpu

Parameters
N/A

Raisecom Proprietary and Confidential


491
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Default conditions
N/A

Command mode
Traffic policing profile mode binding with traffic classification

User level
11

Usage guidelines
Scenario
You can use this command to configure forwarding the traffic directly to the CPU.
Prerequisite
Traffic classification is created through the class-map (global configuration mode)
command.
Classification rules are defined through the match command.
Traffic policy is created through the policy-map command and the traffic classification
is added to the policy through the class-map (PMAP configuration mode) command.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policy is used.

Examples
This example shows how to configure forwarding the traffic to the CPU in policy 1 and under
class 1.
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match acl 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#forward-to-cpu
Set successfully.

Related commands
show policy-map

Raisecom Proprietary and Confidential


492
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.6.21 statistics enable

Function
To enable traffic statistics, use this command. To disable this function, use the disable form of
this command.

Format
statistics { enable | disable }

Parameters
Parameter Description
enable Enable traffic statistics.
disable Disable traffic statistics.

Default conditions
Disabled

Command mode
Traffic policing profile mode binding with traffic classification

User level
11

Usage guidelines
Scenario
You can use this command to configure whether to gather statistics of traffic classification.
Prerequisite
Traffic classification is created through the class-map (global configuration mode)
command.
Classification rules are defined through the match command.
Traffic policy is created through the policy-map command and the traffic classification
is added to the policy through the class-map (PMAP configuration mode) command.
Follow-up procedure
N/A
Precaution
Configurations will fail if the traffic policy is used.

Raisecom Proprietary and Confidential


493
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Examples
This example shows how to enable traffic statistics in policy 1 and under class 1
Raisecom#config
Raisecom(config)#class-map class1
Raisecom(config-cmap)#match acl 1001
Set successfully
Raisecom(config-cmap)#exit
Raisecom(config)#policy-map policy1
Raisecom(config-pmap)#class-map class1
Raisecom(config-pmap-c)#statistics enable
Set successfully.

Related commands
show policy-map

7.6.22 service-policy

Function
To apply traffic policy to the interface, use this command. To disable this function, use the no
form of this command.

Format
service-policy ingress policy-map-name
no service-policy ingress policy-map-name

Parameters
Parameter Description
ingress Apply traffic to the ingress direction of interface.
policy-map-name Name of traffic policy, a string of 1 to 16 characters

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


494
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

After traffic classification and policy being defined, the policy should be applied to interface,
thus it can take effect and ensure QoS. You can use this command to apply the traffic policy to
the interface.
Prerequisite
Traffic classification is defined through the class-map(global configuration mode) and
match command.
Traffic policy is created through the policy-map command and traffic classification is
added to policy through the class-map(PMAP configuration mode) command.
Traffic action is defined through the police or rediect-to port command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to apply traffic policy1 to 1000 Mbit/s interface 1 in the ingress
direction.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#service-policy ingress policy1
Set successfully.

Related commands
show service-policy interface

7.6.23 clear service-policy statistics

Function
To clear traffic policy statistics, use this command.

Format
clear service-policy statistics interface interface-type interface-number ingress

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
ingress Clear traffic policy statistics on the interface in the ingress direction.

Raisecom Proprietary and Confidential


495
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to clear traffic statistics.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear statistics of traffic policy. Use it with caution.

Examples
This example shows how to clear traffic policy statistics on 1000 Mbit/s interface 1/1/1 in the
ingress direction.
Raisecom#config
Raisecom(config)#clear service-policy statistics interface gigaethernet
1/1/1 ingress
Set successfully.

Related commands
show service-policy statistics interface

7.6.24 show service-policy

Function
Show information about the applied traffic policies, use this command.

Format
show service-policy interface
show service-policy interface interface-type interface-number [ ingress ]

Raisecom Proprietary and Confidential


496
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
ingress Clear traffic policy statistics on the interface in the ingress
direction.

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the applied policies.
Raisecom#show service-policy interface
Interface Direction PolicyMap
----------------------------------------------------
vlan1 ingress policy1

The following table describes fields in the command output.

Field Description
Interface Interface ID
Direction Direction
PolicyMap Traffic policy profile

Related commands
N/A

Raisecom Proprietary and Confidential


497
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.6.25 show service-policy statistics

Function
To show statistics of the applied traffic policies, use this command.

Format
show service-policy statistics interface interface-type interface-number ingress [ class-map
class-map-name ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
ingress Clear traffic policy statistics on the interface in the
ingress direction.
class-map class-map-name Name of traffic classification, a string of 1 to 16
characters

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show statistics of traffic policy on interface 1/1/1.
Raisecom#show service-policy statistics interface gigaethernet 1/1/1
ingress
Interface Direction PolicyMap ClassMap InPkt
InByte OutPkt OutByte
------------------------------------------------------------------------
class1 0 0 0 0

Raisecom Proprietary and Confidential


498
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

The following table describes fields in the command output.

Field Description
Interface Interface ID
Direction Direction
PolicyMap Traffic policy profile
ClassMap Traffic classification profile
InPkt Number of packets received
InByte Number of bytes received
OutPkt Number of packets sent
OutByte Number of bytes sent

Related commands
N/A

7.6.26 show class-map

Function
To show information about traffic classification, use this command.

Format
show class-map [ class-map ]

Parameters
Parameter Description
class-map Name of traffic classification, a string of 1 to 16 characters

Default conditions
N/A

Command mode
Any command

User level
5

Raisecom Proprietary and Confidential


499
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Usage guidelines
N/A

Examples
This example shows how to show information about traffic classification.
Raisecom#show class-map
Class Map match-any usera (id 0)
Match vlan 2

Class Map match-all name (id 1)


Match none

Class Map match-all classmap001 (id 2)


Description this-is-a-test-class-map
Match ip-access-list 2

The following table describes fields in the command output.

Field Description
Class Map Traffic classification, type and name
Description Description
Match Classification rules

Related commands
N/A

7.6.27 show mls qos policer

Function
To show information about the token bucket (traffic shaping), use this command.

Format
show mls qos policer [ policer-name ]

Parameters
Parameter Description
policer-name Show specified information about token bucket. a string of 1 to 16
characters
aggregate-policer Specify showing information about aggregate policer.
class-policer Specify showing information about class policer.

Raisecom Proprietary and Confidential


500
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Parameter Description
hierarchy-policer Specify showing information about hierarchical policer.
single-policer Specify showing information about single policer.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can this this command to show the type, mode, color mode, rate, action type and action
value of traffic regulation. Among which the show mls qos policer [ policer-name ]
command is for showing specified information about token bucket.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show information about token bucket jk.
Raisecom#show mls qos policer jk
single-policer: jk mode:4115 color:blind
cir: 20 kbps, cbs: 10 kB, eir: 20 kbps, ebs: 20 kB

green reclor red


red drop
Not used by any policy map

Related commands
N/A

Raisecom Proprietary and Confidential


501
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

7.7 Rate limiting


7.7.1 rate-limit

Function
To configure bandwidth rate limiting on the interface, use this command. To disable this
function, use the no form of this command.

Format
rate-limit { egress | ingress } cir cir-value cbs cbs-value
no rate-limit { egress | ingress }

Parameters
Parameter Description
egress Limit in the egress direction
ingress Limit in the ingress direction
cir cir-value Committed information rate
The cir-value is an integer ranging from 1 to 10000000, in units of
Kbit/s.
cbs cbs-value Committed burst size
The cbs-value is an integer ranging from 1 to 512, in units of Kbytes.

Default conditions
N/A

Command mode
Physical layer interface configuration mode

Usage guidelines
Scenario
You can use this command to configure bandwidth rate limiting on the interface. Rate limiting
on the interface means limiting the rate on the interface according to configured rate. When
the rate limit in the ingress direction is configured successfully, it will prompt the actual
effective rate limit value and burst value.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


502
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Precaution
N/A

Examples
This example shows how to configure the committed information rate in the egress direction
of 1000 Mbit/s interface 1 to 100kbit/s and the committed burst size to 20 Kbytes.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#rate-limit egress cir 100 cbs 20
Set successfully

Related commands
show rate-limit interface

7.7.2 show rate-limit interface

Function
To show information about rate limiting on the interface, use this command.

Format
show rate-limit interface [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Privileged EXEC/Global configuration

Usage guidelines
N/A

Examples
This example shows how to show information about rate limiting in the egress direction of
1000 Mbit/s interface 1/1/2.

Raisecom Proprietary and Confidential


503
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 7 QoS

Raisecom#show rate-limit interface gigaethernet 1/1/2


Interface Direction Cir(kbps) Cbs(kb)
CirOper(kbps) CbsOper(kb)
-------------------------------------------------------------------------
-----------------------------------------------------
gigaethernet1/1/1 200 200 300 20

The following table describes fields in the command output.

Field Description
Interface Interface ID
direction Direction
Cir(kbps) Committed information rate
Cbs(kB) Committed burst size
CirOper(kbps) Committed information rate configured

CbsOper(kb) Committed burst size configured

Related commands
rate-limit

Raisecom Proprietary and Confidential


504
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

8 Multicast

8.1 Layer 2 multicast basis


8.1.1 clear igmp statistics

Function
To clear statistics of IGMP, use this command.

Format
clear igmp statistics [ interface-type interface-number ]

Parameters
Parameter Description
interface-type interface-number IGMP statistics on the specified interface
The interface-type means interface type.
The interface-number means interface ID.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
N/A

Raisecom Proprietary and Confidential


505
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Examples
This example shows how to clear IGMP statistics on interface 1 in slot 1.
Raisecom#config
Raisecom(config)#clear igmp statistics gigaethernet 1/1/1
Set successfully.

Related commands
N/A

8.1.2 igmp immediate-leave

Function
To enable IGMP immediate-leave, use this command. To disable this function, use the no
form of this command.

Format
igmp immediate-leave interface-type interface-number vlan vlan-list
no igmp immediate-leave interface-type interface-number vlan vlan-list

Parameters
Parameter Description
interface-type Specify immediate-leave interface.
interface-number The interface-type means interface type.
The interface-number means interface ID.
vlan vlan-list VLAN list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


506
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

When the multicast member leaves the group, it will send Leave message. Generally, when
the device receives that message, it will send query packets out the interface which received
the Leave message. If there are responses from that interface, it means that there is still traffic
transmitting on the interface. Thus the multicast forwarding table will not delete the
corresponding entry of the interface. However, if there is no response from that interface, the
multicast forwarding entry will be deleted. Therefore, we can see that it takes a while for
multicast members to leave the group.
After this command is enabled, the multicast members can leave immediately. Namely, the
device deletes the multicast forwarding entry corresponded to the interface without querying
upon receiving the Leave message.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
We recommend enabling immediate leave when the receiving interface is just connected to
one user. If the receiving interface is connected to more users, the device may immediately
delete the multicast forwarding entry without querying upon receiving the Leave message,
which may prevent other users from receiving multicast data.

Examples
This example shows how to enable immediate-leave on interface 1 in slot 1.
Raisecom#config
Raisecom(config)#igmp immediate-leave gigaethernet 1/1/1
Set successfully.

Related commands
show igmp immediate-leave

8.1.3 igmp mrouter

Function
To create multicast router interface in the specified VLAN, use this command. To delete this
configuration, use the no form of this command.

Format
igmp mrouter vlan vlan-id interface-type interface-number
no igmp mrouter vlan vlan-id interface-type interface-number

Raisecom Proprietary and Confidential


507
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Parameters
Parameter Description
vlan vlan-id VLAN to which the specified multicast router interface attached, with
vlan-id as an integer, ranging from 1 to 4094
interface-type Specified multicast router interface
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface ID.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The interface which connects the device with the multicast router is called multicast router
interface. The multicast router interface forwards Report and Leave packets to the multicast
router and receives the multicast data from the multicast router.
The routes (the multicast routing protocol should be enabled on the multicast router, learned
through IGMP query packets) can be learned to the router interface. The router interface can
also be configured manually to enable the downstream multicast reports and leave packets be
forwarded to the router interface.
The router interface learned dynamically has aging time while the router interface configured
manually will not be aged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface 1 in slot 1 to multicast router interface with
attached VLAN 10.
Raisecom#config

Raisecom Proprietary and Confidential


508
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Raisecom(config)#igmp mrouter vlan 10 gigaethernet 1/1/1


Set successfully.

Related commands
show igmp mrouter

8.1.4 igmp ring

Function
To enable IGMP forwarding on the interface, use this command. To disable this function, use
the no form of this command.

Format
igmp ring interface-type interface-number
no igmp ring interface-type interface-number

Parameters
Parameter Description
interface-type Enable IGMP forwarding on the specified interface.
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface ID.
It supports a range, such as "1-3".

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to enable IGMP forwarding on the interface in Ethernet ring to
stabilize multicast services, implement multicast backup on the ring, and prevent multicast
service fault caused by link failures.
After the IGMP forwarding on the interface in Ethernet ring is enabled, the switch will add all
interfaces on the ring to the multicast forwarding table or renew their aging time if the
interfaces on the ring receive Report packets. If the interface that receives Report packets

Raisecom Proprietary and Confidential


509
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

does not belong to the ring, then the switch will only add this interface to the multicast
forwarding table or renew its aging time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
IGMP forwarding on the ring cannot be enabled concurrently with immediate leave.

Examples
This example shows how to enable IGMP forwarding on interface 1-2 in slot 1.
Raisecom#config
Raisecom(config)#igmp ring gigaethernet 1/1/1-2
Set successfully.

Related commands
show igmp snooping
show igmp mvr

8.1.5 no igmp member

Function
To delete specified multicast forwarding table entries, use this command.

Format
no igmp member interface-type interface-number

Parameters
Parameter Description
interface-type Delete multicast forwarding table entries on the specified interface.
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface ID.

Default conditions
N/A

Command mode
Global configuration

Raisecom Proprietary and Confidential


510
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

User level
11

Usage guidelines
Scenario
Layer 2 multicast protocol forwards multicast data based on layer 2 multicast forwarding
table.
When the switch receives multicast data, it will forward them to the corresponding interface
according to the multicast forwarding table. When certain multicast forwarding entry is
deleted, the multicast date will not be forwarded to the corresponding interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to delete the multicast forwarding entry on interface 1 in slot 1.
Raisecom#config
Raisecom(config)#no igmp member gigaethernet 1/1/1
Set successfully.

Related commands
show igmp mvr member
show igmp snooping member

8.1.6 igmp version

Function
To configure versions of IGMP, use this command.

Format
igmp version {2 |3}

Raisecom Proprietary and Confidential


511
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Parameters
Parameter Description
2|3 IGMP version
2 refers to version 2.
3 refers to version 3.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure IGMP versions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the version of IGMP to 3.
Raisecom#config
Raisecom(config)#igmp version 3
Set successfully.

Related commands
N/A

8.1.7 show igmp immediate-leave

Function
To show configurations of IGMP immediate-leave, use this command.

Raisecom Proprietary and Confidential


512
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Format
show igmp immediate-leave [ interface-type interface-number ]

Parameters
Parameter Description
interface-type interface-number Show information about immediate-leave on the
specified interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to show configurations of IGMP immediate-leave.
Raisecom#show igmp immediate-leave
Port Status Vlan
------------------------------------------
gigaethernet 1/1/1 disable --
gigaethernet 1/1/2 disable --

fastethernet 1/8/2 disable --
fastethernet 1/8/3 disable --
fastethernet 1/8/4 disable --
port-channel 1 disable --
port-channel 2 disable --
port-channel 3 disable --

port-channel 31 disable --
port-channel 32 disable --

The following table describes fields in the command output.

Field Description
Port Interface ID

Raisecom Proprietary and Confidential


513
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Field Description
Status Interface immediate-leave status
enable: enabled
disable: disabled
Vlan VLAN with immediate-leave on

Related commands
N/A

8.1.8 show igmp mrouter

Function
To show information about IGMP multicast router interface, use this command.

Format
show igmp mrouter

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about IGMP multicast router interface.
Raisecom#show igmp mrouter
vlan Port Age Type
-----------------------------------------------
4 fastethernet 1/3/1 -- static

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


514
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Field Description
vlan VLAN ID
Port Interface ID
Age Aging time
Type Multicast router interface type
static: static router interface
dynamic: dynamic router interface

Related commands
N/A

8.1.9 show igmp statistics

Function
To show statistics of IGMP, use this command.

Format
show igmp statistics [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Show IGMP statistics on the specified interface.
interface-number The interface-type refers to the interface type.
The interface-number refers to the interface ID.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to show IGMP statistics on interface 1 in slot 1.

Raisecom Proprietary and Confidential


515
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Raisecom#show igmp statistics gigaethernet 1/1/1


Type receive filter_drop snoop_deal mvr_deal vlan-copy_deal
-------------------------------------------------------------------------
Query 0 0 0 0 0
Report 0 0 0 0 0
Leave 0 0 0 0 0
Replace Count: 0

The following table describes fields in the command output.

Field Description
Type Packet type
Query: query packets
Report: report packets
Leave: leave packets

receive Number of various types of packets received


filter_drop Number of dropped packets
snoop_deal Number of packets processed by IGMP Snooping
mvr_deal Number of packets processed by IGMP MVR
vlan-copy_deal Number of packets processed by Multicast VLAN copying
Replace Count Times of replacements

Related commands
N/A

8.2 IGMP Snooping


8.2.1 igmp snooping

Function
To enable global IGMP Snooping, use this command. To disable this function, use the no
form of this command.

Format
igmp snooping
no igmp snooping

Parameters
N/A

Raisecom Proprietary and Confidential


516
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
IGMP Snooping is a solution to Layer 2 multicast. When the device enabled with IGMP
Snooping receives the IGMP information transmitting between host of multicast members and
multicast routers, the IGMP Snooping module will analyse the information and establish and
maintain Layer 2 multicast forwarding table according to the information.
You need to use this command to enable or disable IGMP Snooping in global configuration
mode. Only when global IGMP Snooping is enabled can the IGMP Snooping under VLAN be
configured effectively. If global IGMP Snooping is disabled, IGMP Snooping under VLAN
will be disabled too.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable global IGMP Snooping.
Raisecom#config
Raisecom(config)#igmp snooping
Set successfully.

Related commands
show igmp snooping

8.2.2 igmp snooping member-timeout

Function
To configure the aging time of IGMP members, use this command. To disable this function,
use the no form of this command.

Raisecom Proprietary and Confidential


517
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Format
igmp snooping member-timeout { seconds | infinite }
no igmp snooping member-timeout { seconds | infinite }

Parameters
Parameter Description
seconds Timeout, in units of second, an integer, ranging from 5 to 3600
infinite Never aged

Default conditions
The aging time of IGMP members is 300s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
IGMP Snooping is a solution to Layer 2 multicast. When the device enabled with IGMP
Snooping receives the IGMP information transmitting between host of multicast members and
multicast routers, the IGMP Snooping module will analyse the information and establish and
maintain Layer 2 multicast forwarding table according to the information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the aging time of IGMP members to 500s.
Raisecom(config)#igmp snooping member-timeout 500
Set successfully.

Related commands
show igmp snooping

Raisecom Proprietary and Confidential


518
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

8.2.3 show igmp snooping

Function
To show relevant configurations of IGMP Snooping, use this command.

Format
show igmp snooping

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show relevant configurations of IGMP Snooping.
Raisecom#show gimp snooping
igmp snooping :Enable
igmp snooping active vlan :10-11
igmp aging time(s) :300
igmp ring :--

The following table describes fields in the command output.

Field Description
igmp snooping IGMP Snooping status
Enable: enabled
Disable: disabled
igmp snooping active vlan VLAN enabled with IGMP Snooping
igmp aging time(s) Aging time of multicast forwarding table entries
igmp ring Enable the interface with IGMP forwarding.

Raisecom Proprietary and Confidential


519
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Related commands
N/A

8.2.4 show igmp snooping member

Function
To show information about members in IGMP Snooping multicast group, use this command.

Format
show igmp snooping member [ interface-type interface-number | vlan vlan-id ]

Parameters
Parameter Description
interface-type Show information about IGMP Snooping multicast members on
interface-number the specified interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.
vlan vlan-id Show information about IGMP Snooping multicast members on
the specified VLAN.
with vlan-id as an integer, ranging from 1 to 4094

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about members in IGMP Snooping multicast
group.
Raisecom#show igmp snooping member
*: ring port
Port Vlan GroupID Live-time
-------------------------------------------------------
gigaethernet 1/1/1 5 234.0.0.2 15

Raisecom Proprietary and Confidential


520
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

gigaethernet 1/1/2 5 234.0.0.3 25


port-channel 3 6 224.0.0.4 30

The following table describes fields in the command output.

Field Description
Port Interface ID
Vlan VLAN ID
GroupID Multicast group address
Live-time Time-to-leave

This example shows how to show information about members in IGMP Snooping multicast
group in VLAN 10.
Raisecom#show igmp snooping member vlan 10
Port GroupID Live-time
---------------------------------------------
gigaethernet 1/1/1 234.0.0.6 25

The following table describes fields in the command output.

Field Description
Port Interface ID
GroupID Multicast group address
Live-time Time-to-leave

This example shows how to show information about members in IGMP Snooping multicast
group on interface 1.
Raisecom#show igmp snooping member port 1
Vlan GroupID Live-time
----------------------------------------
60 224.0.0.4 30

The following table describes fields in the command output.

Field Description
Vlan VLAN ID
GroupID Multicast group address
Live-time Time-to-leave

Related commands
N/A

Raisecom Proprietary and Confidential


521
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

8.2.5 show igmp snooping vlan

Function
To show relevant configurations of IGMP Snooping in the specified VLAN, use this
command.

Format
show igmp snooping vlan vlan-id

Parameters
Parameter Description
vlan vlan-id Show configurations of IGMP Snooping in the specified VLAN.
With vlan-id as an integer, ranging from 1 to 4094

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of IGMP Snooping in VLAN 10.
Raisecom#show igmp snooping vlan 10
igmp snooping :Enable

The following table describes fields in the command output.

Field Description
igmp snooping IGMP Snooping status
Enable: enabled
Disable: disabled

Related commands
N/A

Raisecom Proprietary and Confidential


522
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

8.3 IGMP MVR


8.3.1 igmp mvr

Function
To enable global IGMP MVR, use this command. To disable this function, use the no form of
this command.

Format
igmp mvr
no igmp mvr

Parameters
N/A

Default conditions
Disabled

Command mode
Global configuration/Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
In carrier's network based on Ethernet ring, the IGMP MVR is generally used for deploying
multicast. IGMP MVR allows devices sharing one multicast VLAN at the network side and
using their respective user VLAN at the user side. MVR can not only send multicast flow in
the multicast VLAN but also separate user VLAN, thus saving bandwidth and improving data
security.
If you execute other configurations of the MVR before enabling global IGMP MVR, all
previous relevant configurations of IGMP MVR take effect immediately upon executing the
igmp mvr command.
Only when the global IGMP MVR and IGMP MVR on the interface are enabled can the
device processes multicast protocol packets. If the global IGMP MVR is disabled, the IGMP
MVR on the interface will lose efficacy either.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


523
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

N/A
Precaution
N/A

Examples
This example shows how to enable global IGMP MVR.
Raisecom#config
Raisecom(config)#igmp mvr
Set successfully.

Related commands
show igmp mvr

8.3.2 igmp mvr mcast-vlan

Function
To configure the group address of IGMP MVR multicast VLAN, use this command. To delete
the group address, use the no form of this command.

Format
igmp mvr mcast-vlan vlan-id group { start-ip-address [ end-ip-address ] | any }
no igmp mvr mcast-vlan vlan-id group { start-ip-address [ end-ip-address ] | any }

Parameters
Parameter Description
vlan-id Multicast VLAN, VLAN to which the multicast routing interface is
attached, an integer, ranging from 1 to 4094
group Configure the multicast source group address contained in multicast
VLAN.
start-ip-address Start IP multicast address, in dotted decimal notation, ranging from
224.0.0.1 to 239.255.255.255
end-ip-address End IP multicast address, in dotted decimal notation, ranging from
224.0.0.1 to 239.255.255.255
any Any multicast address

Default conditions
There is no multicast VLAN and multicast group address.

Raisecom Proprietary and Confidential


524
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Multicast VLAN means the attached VLAN of multicast router interface. One multicast
VLAN may contain multiple multicast source addresses, which form a group of addresses.
The multicast address learned by the switch must be from the group address of certain
multicast VLAN. Otherwise, the switch will not process the multicast IGMP packets.
After bundling the multicast VLAN with any multicast group, all multicast groups which are
not bundled with multicast VLAN will be bundled with the multicast VLAN.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the source group address of VLAN 10 ranging from
224.0.1.1 to 224.0.1.10.
Raisecom#config
Raisecom(config)#igmp mvr mcast-vlan 10 group 224.0.1.1 224.0.1.10
Set successfully.

This example shows how to configure the group address of multicast VLAN 5 to be bundled
with any multicast address.
Raisecom(config)#igmp mvr mcast-vlan 5 group any
Set successfully.

This example shows how to delete the group address of multicast VLAN 10.
Raisecom(config)#no igmp mvr mcast-vlan 10 group 224.0.1.1
Set successfully.

Related commands
show igmp mvr vlan-group

Raisecom Proprietary and Confidential


525
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

8.3.3 show igmp mvr

Function
To show relevant configurations of IGMP MVR, use this command.

Format
show igmp mvr

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of global MVR.
Raisecom#show igmp mvr
igmp mvr running :Enable
igmp mvr port :--
igmp mvr multicast vlan(ref) :--
igmp aging time(s) :300
igmp ring :--

The following table describes fields in the command output.

Field Description
igmp mvr running IGMP MVR status
Enable: enabled
Disable: disabled
igmp mvr port Interface with IGMP MVR on

Raisecom Proprietary and Confidential


526
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Field Description
igmp mvr multicast vlan(ref) IGMP MVR multicast VLAN
The displayed information is the multicast VLAN created
by the system.
The content in the bracket shows the number of multicast
address in the group address.
igmp aging time(s) Aging time of multicast forwarding-table entries
igmp ring Enable interface with IGMP forwarding.

Related commands
N/A

8.3.4 show igmp mvr

Function
To show configurations of IGMP MVR on the specified interface, use this command.

Format
show igmp mvr { interface | interface-type interface-number }

Parameters
Parameter Description
interface Show relevant configurations of IGMP MVR on all
interfaces.
interface-type interface- Show relevant configurations of IGMP MVR on the
number specified interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


527
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Usage guidelines
N/A

Examples
This example shows how to show configurations of MVR on interface 1 in slot 1.
Raisecom#show igmp mvr gigaethernet 1/1/1
Running :Disable
Status :Up

The following table describes fields in the command output.

Field Description
Running IGMP MVR status
Enable: enabled
Disable: disabled
Status Interface status
Up: opened
Down: closed

Related commands
N/A

8.3.5 show igmp mvr members

Function
To show information about IGMP MVR multicast members, use this command.

Format
show igmp mvr members { interface-type interface-number | user-vlan vlan-id }

Parameters
Parameter Description
interface-type Show information about IGMP MVR multicast members on the
interface-number specified interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.
user-vlan vlan-id Show information about IGMP MVR multicast members on the
specified user VLAN.
With vlan-id as an integer, ranging from 1 to 4094

Default conditions
N/A

Raisecom Proprietary and Confidential


528
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about IGMP MVR multicast members.
Raisecom#show igmp mvr members
R-Ring port D-Dynamic S-Static
Port User-vlan Group Mcast-vlan Live-time(s) Flag
-----------------------------------------------------------

GE1/1/6 1 225.1.2.3 4 -- S
The following table describes fields in the command output.

Field Description
Port Interface ID, namely, the interface enabled with IGMP MVR
User-vlan User VLAN
GroupID Multicast group address
Mcast-vlan Multicast VLAN, VLAN to which the multicast routing interface
is attached
Live-time Time-to-leave
Flag Flag

Related commands
N/A

8.3.6 show igmp mvr vlan-group

Function
To show the multicast VLAN of IGMP MVR and the bundled group address, use this
command.

Format
show igmp mvr vlan-group [ mcast-vlan vlan-id ]

Raisecom Proprietary and Confidential


529
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Parameters
Parameter Description
mcast-vlan vlan- Show information about IGMP MVR group address of the specified
id multicast VLAN.
With vlan-id as an integer, ranging from 1 to 4094

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show the multicast VLAN of IGMP MVR and the bundled group
address.
Raisecom#show igmp mvr vlan-group
Mcast-vlan Start-group End-group
-------------------------------------------
6 -- any
4 234.1.1.8 234.1.1.8

The following table describes fields in the command output.

Field Description
Mcast-vlan Multicast VLAN, VLAN to which the multicast routing
interface is attached
Start-group Starting multicast group address
End-group Ending multicast group address

This example shows how to show IGMP MVR group address of VLAN 4.
Raisecom#show igmp mvr vlan-group mcast-vlan 4
Mcast-vlan Start-group End-group
-------------------------------------------
4 234.1.1.8 234.1.1.8

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


530
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Field Description
Mcast-vlan Multicast VLAN, VLAN to which the multicast routing
interface is attached
Start-group Starting multicast group address
End-group Ending multicast group address

Related commands
N/A

8.4 IGMP filtering


8.4.1 igmp filter

Function
To enable global IGMP filtering, use this command. To disable this function, use the no form
of this command.

Format
igmp filter
no igmp filter

Parameters
N/A

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the administer wishes to impose restrictions on multicast users, he/she generally uses
IGMP filtering to enable or disable users to access specified multicast source.

Raisecom Proprietary and Confidential


531
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable global IGMP filtering.
Raisecom#config
Raisecom(config)#igmp filter
Set successfully.

Related commands
show igmp filter

8.4.2 igmp filter max-groups

Function
To configure the maximum number of multicast groups allowed to be added to the interface
or interface+VLAN, use this command. To return to the default condition, use the no form of
this command.

Format
igmp filter max-groups group-number [ vlan vlan-list ]
no igmp filter max-groups [ vlan vlan-list ]

Parameters
Parameter Description
group-number Maximum number of groups, an integer, ranging from 1 to 1024
vlan vlan-list Specified VLAN, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Configure the maximum number of multicast groups allowed to be
added to "Interface+Specified VLAN" if the parameter is configured.
Configure the maximum number of multicast groups allowed to be
added to the interface if the parameter is not configured.

Default conditions
N/A

Raisecom Proprietary and Confidential


532
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
The administrator can limit users' access to multicast source by configuring the maximum
number of multicast groups allowed to be added to the interface or interface+VLAN combing
the rules on limiting the maximum number of IGMP multicast groups.
Rules on limiting the maximum number of IGMP multicast groups:
If you configure limit only on the interface, all VLANs on that interface will be limited
too.
If you configure limit on interface+VLAN, only the specified VLAN on the interface
will be limited.
If you configure limit on the interface and "the same interface+VLAN" concurrently:
If one of them reaches the maximum value, the corresponding action (drop | replace)
for reaching the maximum will be taken.
If the number of groups be added to on the interface and the interface+VLAN reaches
to the maximum value concurrently, use drop as a priority, namely, as long as "drop"
is taken for one of them, then no more multicast groups will be allowed by the
interface or interface+VLAN. If both of them adopt "replace", then the groups on
interface+VLAN will be replaced, namely, the multicast group with the shortest
living time on the same interface and same VLAN will be replaced.
Use the no igmp filter max-groups command to restore the limit on the maximum multicast
groups on the interface to the default condition. Use the no igmp filter max-groups vlan
command to restore the limit on the maximum multicast groups on the interface+VLAN to
the default condition.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface 1 in slot 1 to allow up to 10 multicast groups
to pass.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#igmp filter max-groups 10

Raisecom Proprietary and Confidential


533
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Set successfully.

This example shows how to configure interface 1+VLAN in slot 1 to allow up to 10 multicast
groups to pass.
Raisecom(config-gigaethernet1/1/1)#igmp filter max-groups 10 vlan 10
Set successfully.

Related commands
show igmp filter

8.4.3 igmp filter max-groups action

Function
To configure the action while the number of multicast groups on the interface or
interface+VLAN reaches to the maximum, use this command. To return to the default
condition, use the no form of this command.

Format
igmp filter max-groups action { drop | replace } [ vlan vlan-list ]
no igmp filter max-group [ vlan vlan-list ]

Parameters
Parameter Description
drop New multicast groups are not allowed to be added to the interface or
interface+VLAN.
replace The shortest Time-to-leave multicast group which overrides the new
multicast group.
vlan vlan-list Specified VLAN, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Configure the processing action when the number of multicast groups
reaches to the maximum on the "Interface+Specified VLAN" if the
parameter is configured.
Configure the processing action when the number of multicast groups
reaches to the maximum on the interface if the parameter is
configured.

Default conditions
The action is "drop" when the number of multicast groups on the interface and
interface+VLAN reaches to the maximum.

Command mode
Physical interface configuration/Aggregation group configuration

Raisecom Proprietary and Confidential


534
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

User level
11

Usage guidelines
Scenario
The administrator can limit users' access to multicast source by configuring the maximum
number of multicast groups allowed to be added to the interface or interface+VLAN combing
the rules on limiting the maximum number of IGMP multicast groups.
After the multicast feature is enabled, the interface will take responding measures for the new
multicast groups according to the actions if the number of multicast groups to be added to
interface+VLAN reaches to the maximum number.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the action to be drop when the number of multicast
groups on interface 1 in slot 1 reaches to the maximum.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#igmp filter max-groups action drop
Set successfully.

This example shows how to configure the action to be drop when the number of multicast
groups on interface 1+VLAN 10 in slot 1 reaches to the maximum.
Raisecom(config-gigaethernet1/1/1)#igmp filter max-groups action drop
vlan 10
Set successfully.

Related commands
show igmp filter

8.4.4 igmp filter profile (global configuration)

Function
To create IGMP filter profile, use this command. To delete the profile, use the no form of this
command.

Raisecom Proprietary and Confidential


535
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Format
igmp filter profile profile-number
no igmp filter profile profile-number

Parameters
Parameter Description
profile-number Filter profile number, an integer, ranging from 1 to 100

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
While enabling the IGMP filtering feature, you need to create the filter profile and then
configure filter actions and objects in it, thus limiting users' access to the multicast source.
This command is only used for creating the filter profile while the filter action and object are
configured by the permit | deny and range commands.
After the filter profile is created, the filter action is "deny" and the range of the address is not
configured either. Namely, the initially created filter profile let all multicast addresses pass.
Prerequisite
N/A
Follow-up procedure
Use the range command to configure allowing or forbidding users to access multicast source.
Use the permit | deny command to configure the filter action.
Precaution
N/A

Examples
This example shows how to create filter profile 1.
Raisecom#config
Raisecom(config)#igmp filter profile 1
Raisecom(config-igmp-profile)#

Raisecom Proprietary and Confidential


536
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Related commands
show igmp filter profile

8.4.5 igmp filter profile (interface configuration)

Function
To apply the IGMP filter profile to the interface or interface+VLAN, use this command. To
delete the profile, use the no form of this command.

Format
igmp filter profile profile-number [ vlan vlan-list ]
no igmp filter profile [ vlan vlan-list ]

Parameters
Parameter Description
profile-number Filter profile number, an integer, ranging from 1 to 100
vlan vlan-list Specified VLAN
The vlan-list is an integer, ranging from 1 to 4094.
It supports specific values, such as "1,2,3"; it also supports a range,
such as "1-3".
Apply the IGMP filter profile to the interface+VLAN if the parameter
is configured.
Apply the IGMP filter profile to the interface if the parameter is
unconfigured.

Default conditions
The IGMP filter profile is not in use.

Command mode
Physical interface configuration/Aggregation group configuration

User level
11

Usage guidelines
Scenario
Applying the IGMP filter profile to the interface or interface+VLAN can help limiting user's
access to some multicast sources.
IGMP filtering rules:

Raisecom Proprietary and Confidential


537
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

If filtering rules are only configured on the interface, then all VLANs on the interface
will be limited.
If filtering rules are configured on the interface+VLAN, then only the specified VLAN
on the interface is limited.
If filtering rules are configured on the interface and interface+VLAN concurrently, the
deny action will be taken as a priority if the filtering rule on the interface conflicts with
that on the interface+VLAN, which means that as long as the action on either of them is
deny, no multicast groups are allowed.
For example, the action of profile 1 is "permit" and the address range 1 is 224.0.0.1. Apply it
to the interface+VLAN. For example, configure igmp filter profile 1 vlan 2 on Gigaethernet
1/1/1 and leave it as it is (all packets can pass it by default):
Packets with VLAN 2 address of 224.0.0.1 received on 1000 Mbit/s interface 1/1/1 will
pass while other packets (for example 224.0.0.2) will be dropped.
All packets with other VLANs (for example VLAN 3) received on 1000 Mbit/s interface
1/1/1 will pass.
Use the no igmp filter profile command to restore the multicast filtering limit to the default
condition. Use the no igmp filter profile vlan command to restore the multicast filtering limit
on interface+VLAN to the default condition.
Prerequisite
The IGMP filter profile is created through the igmp filter profile (global configuration)
command. Configurations will fail if there is no profile.
Follow-up procedure
N/A
Precaution
One interface can be just configured with one IGMP filter profile. If you configure more
IGMP filter rules on one interface, only the last one will take effect.

Examples
This example shows how to apply IGMP filter profile 1 to interface 1 in slot 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#igmp filter profile 1
Set successfully.

This example shows how to apply the IGMP filtering rule to interface 1+VLAN 10 in slot 1.
Raisecom(config-gigaethernet1/1/1)#igmp filter profile 1 vlan 10
Set successfully.

Related commands
show igmp filter profile

Raisecom Proprietary and Confidential


538
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

8.4.6 permit | deny

Function
To configure the action of IGMP filter profile (permit means users accept the data from the
filtered multicast address and deny means users refuse the data from the filtered multicast
address), use this command.

Format
permit
deny

Parameters
N/A

Default conditions
The action of the filter profile is deny.

Command mode
Profile configuration

User level
11

Usage guidelines
Scenario
IGMP filtering in nature means that the administrator controls the device to enable or disable
the multicast data of the multicast source, thus restricting user access. You can use this
command to configure the IGMP filtering actions, namely, to accept or refuse multicast data.
The process of configuring IGMP filtering is to create filter profile first, then configure the
range of filter address, and finally configure the filter actions.
Prerequisite
IGMP filtering is enabled through the ip igmp filter command.
The filter profile is created through the igmp filter profile.
The range of the multicast address which needs to be filtered by IGMP is configured through
the range command.
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


539
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

N/A

Examples
This example shows how to configure the action of IGMP rule profile1 to permit.
Raisecom#config
Raisecom(config)#igmp filter profile 1
Raisecom(config-igmp-profile)#permit
Set successfully.

Related commands
show igmp filter profile

8.4.7 range

Function
To configure the range of multicast addresses which needs to be filtered by IGMP, use this
command. To delete the range of addresses, use the no form of this command.

Format
range range-id start-ip-address [ end-ip-address ]
no range range-id

Parameters
Parameter Description
range-id Index number of the specified multicast address range, an integer,
ranging from 1 to 100
start-ip-address Start IP address of the multicast address range, in dotted decimal
notation, within the range of multicast address, ranging from
224.0.0.1 to 239.255.255.255
end-ip-address End IP address of the multicast address range, in dotted decimal
notation, within the range of multicast address, ranging from
224.0.0.1 to 239.255.255.255,
Filter one multicast address instead of a range of addresses if the
parameter is configured, namely, the start-ip-address.

Default conditions
The range of filtered address is all multicast addresses.

Command mode
Profile configuration

Raisecom Proprietary and Confidential


540
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

User level
11

Usage guidelines
Scenario
IGMP filtering in nature means that the administrator controls the device to enable or disable
the multicast data of the multicast source, thus restricting user access. You can use this
command to configure the IGMP filtering actions, namely, to accept or refuse multicast data.
The process of configuring IGMP filtering is to create filter profile first, then configure the
range of filter address, and finally configure the filter actions.
Prerequisite
The IGMP filtering is enabled through the ip igmp filter command.
The IGMP filtering profile is created through the ip igmp profile command.
Follow-up procedure
You can use the permit | deny command to configure filter actions.
Precaution
N/A

Examples
This example shows how to create the rule of address range index 1 to filter the data with the
multicast address ranging from 224.0.1.1 to 224.0.10.1 in rule1.
Raisecom#config
Raisecom(config)#igmp filter profile 1
Raisecom(config-igmp-profile)#range 1 224.0.1.1 224.0.10.1
Set successfully.

This example shows how to create the rule of address range index 2 to filter the data with the
multicast address being 224.0.1.1.
Raisecom(config)#igmp filter profile 2
Raisecom(config-igmp-profile)#range 2 224.0.1.1
Set successfully.

This example shows how to delete multicast address range 1 in rule 1.


Raisecom(config-igmp-profile)#no range 1
Set successfully.

Related commands
show igmp filter profile

Raisecom Proprietary and Confidential


541
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

8.4.8 show igmp filter

Function
To show configurations of IGMP filtering, use this command.

Format
show igmp filter [ interface | interface-type interface-number [ vlan vlan-id ] ]

Parameters
Parameter Description

interface Show configurations of IGMP filtering on all interfaces.


interface-type interface- Show configurations of IGMP filtering on the specified
number interface.
The interface-type refers to the interface type.
The interface-number refers to the interface ID.
vlan vlan-id Show configurations of IGMP filtering on the specified
"Interface+VLAN", with vlan-id as an integer, ranging from 1
to 4094

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use the show igmp filter command to show global configurations of IGMP filtering,
including the enabled status of multicast filtering, the maximum number of filter profiles, and
the number of currently created profiles.
You can use the show igmp filter interface | interface-type interface-number command to
show the IGMP filtering configurations on the interface, including the filter rules applied to
the interface, the maximum number of multicasts, and the number of current multicast groups
and the action taken when the number of multicast groups reaches to the maximum.
You can use the show igmp filter interface-type interface-number vlan vlan-id command to
show IGMP filtering configurations on interface+VLAN, including the filter rules applied to
the interface, the maximum number of multicasts, and the number of current multicast groups
and the action taken when the number of multicast groups reaches to the maximum.

Raisecom Proprietary and Confidential


542
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show configurations of global IGMP filtering.
Raisecom#show igmp filter
igmp filter: disable
max profiles: 100
current profiles: 4

The following table describes fields in the command output.

Field Description
igmp filter Global IGMP filtering status
enable: enabled
disable: disabled
max profiles Maximum filter profile number
current profiles The current filter profile number

This example shows how to show configurations of IGMP filtering on all interfaces.
Raisecom#show igmp filter interface
gigaethernet 1/1/1 0 0 0 drop
gigaethernet 1/1/2 0 0 0 drop
gigaethernet 1/2/1 0 0 0 drop

fastethernet 1/8/2 0 0 0 drop
fastethernet 1/8/3 0 0 0 drop
fastethernet 1/8/4 0 0 0 drop
port-channel 1 0 0 0 drop
port-channel 2 0 0 0 drop
port-channel 3 0 0 0 drop

port-channel 31 0 0 0 drop
port-channel 32 0 0 0 drop

The following table describes fields in the command output.

Field Description
interface Interface ID
Filter Filter profile number
Max Groups Maximum number of multicast groups allowed

Raisecom Proprietary and Confidential


543
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Field Description
Current Groups Number of the multicast added currently
Action Action taken when the number of multicast groups reaches to
the maximum
drop: forbid new multicast groups to be added to the interface
or interface+VLAN
replace: replace the old multicast group with the shortest living
time with the new multicast group

This example shows how to show configurations of IGMP on interface 1 in slot 1.


Raisecom#show igmp filter gigaethernet 1/1/1
igmp profile: 22
max group: 0
current group: 0
action: drop

The following table describes fields in the command output.

Field Description
igmp profile Filter profile number
max group Maximum number of multicast groups allowed
current group Number of the multicast added currently
action Action taken when the number of multicast groups reaches to
the maximum
drop: forbid new multicast groups to be added to the interface
or interface+VLAN
replace: replace the old multicast group with the shortest living
time with the new multicast group

This example shows how to show IGMP filtering configurations on interface 1+VLAN 3 in
slot 1.
Raisecom#show igmp filter gigaethernet 1/1/1 vlan 3
Port VLAN Filter Max Groups Current Groups Action
---------------------------------------------------------------------
gigaethernet 1/1/1 3 0 0 0 drop

The following table describes fields in the command output.

Field Description
Port Interface ID
VLAN VLAN ID
Filter Range of multicast address needs filtering
Max Groups Maximum number of multicast groups allowed
Current Groups Number of the multicast added currently

Raisecom Proprietary and Confidential


544
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

Field Description
Action Action taken when the number of multicast groups reaches to
the maximum
drop: forbid new multicast groups to be added to the interface
or interface+VLAN
replace: replace the old multicast group with the shortest living
time with the new multicast group

Related commands
N/A

8.4.9 show igmp filter profile

Function
To show configurations of the IGMP filter profile, use this command.

Format
show igmp filter profile [ profile-number ]

Parameters
Parameter Description
profile-number Show configurations of the specified filter profile.
An integer, ranging from 1 to 100

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of the IGMP filter profile.
Raisecom#show igmp filter profile

Raisecom Proprietary and Confidential


545
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 8 Multicast

----------------------------------------------------
IGMP profile: 10
action: deny
------------------------------------------
IGMP profile: 11
action: permit
------------------------------------------
IGMP profile: 22
action: permit
range 2: 224.0.0.1
range 3: 224.0.0.10
------------------------------------------
IGMP profile: 100
action: permit
range 2: 224.0.0.1 - 224.0.0.3
------------------------------------------

The following table describes fields in the command output.

Field Description
IGMP profile Filter profile number
action Action of IGMP filter profile
permit: allow users to receive data from the filtered multicast
address
deny: forbid users to receive data from the filtered multicast

address
range Range of multicast address needs filtering

This example shows how to show configurations of IGMP filter profile 100.
Raisecom#show igmp filter profile 100
----------------------------------------------------
IGMP profile: 100
action: permit
range 2: 224.0.0.1 - 224.0.0.3
------------------------------------------

The following table describes fields in the command output.

Field Description
IGMP profile Filter profile number
action Action of IGMP filter profile
permit: allow users to receive data from the filtered multicast
address
deny: forbid users to receive data from the filtered multicast

address
range Range of multicast address needs filtering

Related commands
N/A

Raisecom Proprietary and Confidential


546
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

9 OAM

9.1 EFM
9.1.1 clear oam config

Function
To clear OAM configurations, use this command.

Format
clear oam config

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
5

Usage guidelines
Scenario
When proceeding to a new round of configurations, you can use this command to clear
configurations of OAM links.
Prerequisite

Raisecom Proprietary and Confidential


547
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear OAM configurations.
Raisecom#config
Raisecom(config)#clear oam config
Set successfully.

Related commands
show oam

9.1.2 clear oam event

Function
To clear OAM events, use this command.

Format
clear oam event

Parameters
N/A

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
When proceeding to a new round of configurations, you can use this command to clear
information about the events on OAM links.

Raisecom Proprietary and Confidential


548
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Prerequisite
The interface is configured to Layer 2 physical interface mode through the portswich
command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear events on OAM links.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#clear oam event
Set successfully.

Related commands
show oam event

9.1.3 clear oam statistics

Function
To clear OAM statistics, use this command.

Format
clear oam statistics

Parameters
N/A

Default conditions
N/A

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


549
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

When proceeding to a new round of configurations, you can use this command to clear
statistics of OAM links
Prerequisite
The interface is configured to Layer 2 physical interface mode through the portswich
command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear OAM statistics.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#clear oam statistics
Set successfully.

Related commands
show oam statistics

9.1.4 oam { active | passive }

Function
To configure the working modes of EFM OAM, use this command.

Format
oam { active | passive }

Parameters
Parameter Description
active Active mode
An interface sends OAM Protocol Data Unit (PDU) initiating peer
discovery or remote loopback.
passive Passive mode
An interface waits for receiving the peer OAM PDU.

Default conditions
Passive mode

Raisecom Proprietary and Confidential


550
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
EFM OAM has two work modes: active mode and passive mode.
When you use this command to configure the OAM working modes, all links enabled
with OAM feature will be reset and wait for 5 seconds to enter OAM discovery process.
While using EFM OAM, at least one interface at the ends of the link should be in active
mode, otherwise, the OAM link cannot enter running state, thus unable to implement
link management and monitoring.
When working in the active mode, the OAM link will initiate the discovery process.
When working in the passive mode, the OAM link will wait for the discovery process
initiated by its peer. It does not support initiating a remote loopback command and
variable obtaining request.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure OAM working mode to active.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam active
Set successfully.

Related commands
show oam

9.1.5 oam { errored-frame | errored-frame-period | errored-frame-


seconds | errored-symbol-period }

Function
To configure the monitoring window and threshold of OAM link events, use this command.
To return to the default condition, use the no form of this command.

Raisecom Proprietary and Confidential


551
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Format
oam { errored-frame window framewindow threshold framethreshold | errored-frame-
period window frameperiodwindow threshold frameperiodthreshold | errored-frame-
seconds window framesecswindow threshold framesecsthreshold | errored-symbol-period
window symperiodwindow threshold symperiodthreshold }
no oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-
symbol-period }

Parameters
Parameter Description
errored-frame Errored frame event
It will produce error event when number of error frames exceeds
the threshold in monitoring window.
framewindow Errored frame event window, an integer, ranging from 1 to 60, in
units of second
framethreshold Errored frame threshold, an integer, ranging from 1 to 65535
errored-frame- Errored frame period event, generates when the number of error
period frames exceeds the threshold in a period
frameperiodwindow Errored frame period event window, an integer, ranging from 1 to
600, in units of 100ms
frameperiodthreshold Errored frame period event threshold, an integer, ranging from 1
to 65535
errored-frame- Errored frame second event, generates when the number of error
seconds frames in M seconds exceeds the threshold.
framesecswindow Errored frame second event window, an integer, ranging from 10
to 900, in units of second
framesecsthreshold Errored frame second event threshold, an integer, ranging from 1
to 65535
errored-symbol- Errored symbol period event, generates when the number of error
period symbols received in a period (monitor window) exceeds the
threshold.
symperiodwindow Errored symbol period event window, an integer, ranging from 1
to 60, in units of second
symperiodthreshold Errored symbol period event threshold, ranging from 1 to 65535,
an integer

Default conditions
The monitoring windows of errored-frame, errored-frame-period, errored-frame-seconds,
errored-symbol-period of event are configured to 1 second, 1000 milliseconds, 60 seconds,
and 1 second respectively. The threshold is set to 1.

Raisecom Proprietary and Confidential


552
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
EFM OAM has the link monitoring function, which can detect errors in the link and generate
OAM link events. OAM link events include errored frame events, errored frame period events,
errored frame second events, and errored symbol period events.
Errored frame event: the number of error frames exceeds the threshold in a time unit.
Errored frame period event: the number of error frames exceeds the threshold in a period
(specified N frames).
Errored frame second event: the number of error frames in a certain period exceeds the
threshold. 1s is regarded as a time period, if one error frame or more error frames are
generated in 1s, then this 1s time period will be called one error frame second.
Errored symbol period event: the number of error symbols received in a period (monitor
window) exceeds the threshold.
You can use this command to configure the monitor window and threshold for the link events
to the specified value or the default value. When the no command is executed, the OAM will
clear the current statistics on the link and then gather statistics according to the newly
configured window and threshold.
Prerequisite
OAM link event notification is enabled through the oam notify enable command.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure error frame event window to 20s and the threshold
to 100.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam errored-frame window 20 threshold
100
Set successfully.
This example shows how to configure the error period event window to 20s and the
threshold to 100.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1

Raisecom Proprietary and Confidential


553
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Raisecom(config-gigaethernet1/1/1)#oam errored-frame-period window 20


threshold 100
Set successfully.
This example shows how to configure the error frame second window to 200s and the
threshold to 100.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam errored-frame-seconds window 200
threshold 100
Set successfully.
This example shows how to configure error symbol period window to 20s and the
threshold to 100.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam errored-symbol-period window 20
threshold 100
Set successfully.

Related commands
show oam notify

9.1.6 oam enable

Function
To enable EFM OAM on the link, use this command. To disable this function, use the disable
form of this command.

Format
oam { enable | disable }

Parameters
Parameter Description
enable Enable EFM OAM on the link.
disable Disable EFM OAM on the link.

Default conditions
Disabled

Command mode
Physical layer interface configuration mode

User level
0

Raisecom Proprietary and Confidential


554
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Usage guidelines
Scenario
Ethernet in the First Mile (EFM) is a point-to-point link-level Ethernet OAM technology, generally applied to two
directly-connected devices.
EFM OAM features peer discovery, link monitoring, fault reporting, and remote loopback.
You can use this command to enable or disable link OAM.
Prerequisite
The interface is configured to Layer 2 physical interface mode through the portswich
command.
Follow-up procedure
N/A
Precaution
If some OAM configurations have been made before the link is enabled, then those
configurations will take effect immediately upon enabling the link with the OAM.
After enabling OAM, the interface at the end of the link can immediately enter OAM
discovery process if it is Up.
While using EFM OAM, at least one interface at the ends of the link should be in active
mode, otherwise, the OAM link cannot enter running state, thus unable to implement
link management and monitoring.

Examples
This example shows how to enable EFM OAM.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam enable
Set successfully.

Related commands
show oam

9.1.7 oam event trap enable

Function
To enable OAM link event Trap, use this command. To disable this function, use the disable
form of this command.

Format
oam event trap { enable | disable }

Raisecom Proprietary and Confidential


555
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Parameters
Parameter Description
enable Enable OAM event Trap.
disable Disable OAM event Trap.

Default conditions
Disabled

Command mode
Physical interface configuration

User level
11

Usage guidelines
Scenario
EFM OAM has the link monitoring function, which can detect errors in the link and generate
OAM link events. OAM link events include errored frame events, errored frame period events,
errored frame second events, and errored symbol period events. After being enabled with
OAM event Trap, the device will inform the NMS through SNMP Trap when it detects link
events.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable local OAM link event Trap.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam event trap enable
Set successfully.

Related commands
show oam trap

Raisecom Proprietary and Confidential


556
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

9.1.8 oam loopback

Function
To configure whether the physical interface makes a response after receiving the remote
loopback command, use this command.

Format
oam loopback { ignore | process }

Parameters
Parameter Description
ignore The interface does not make a response after receiving the remote
loopback command.
process The interface makes a response after receiving the remote loopback
command.

Default conditions
The interface does not make a response after receiving the remote loopback command.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
EFM OAM provides a link-layer remote loopback mechanism, which is used to detect and
locate link faults. At two ends of a link, the interface in active mode initiates a remote
loopback command, and you can execute this command to configure whether the peer
responds or does not respond to the remote loopback command.
You can use this command to enable or disable the OAM to respond to the OAM remote
loopback.
Responding to the remote loopback: when the interface receives the responding to
remote loopback command, the OAM will configure the link to enter loopback state.
Not responding to the remote loopback: when the interface does not receive the
responding to remote loopback command, the OAM will do nothing, and the
corresponding link will still be in normal forwarding state.
Prerequisite
N/A

Raisecom Proprietary and Confidential


557
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Follow-up procedure
N/A
Precaution
When the link is in loopback status, it should respond to the remote loopback command.

Examples
This example shows how to configure the link to respond to the remote loopback command.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam loopback process
Set successfully.

Related commands
show oam loopback

9.1.9 oam loopback timeout

Function
To configure the remote loopback timeout period on the physical interface, use this command.

Format
oam loopback timeout time

Parameters
Parameter Description
timeout time Timeout, an integer, ranging from 1 to 10, in units of second

Default conditions
The timeout is 3s.

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


558
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

OAM provides link-layer remote loopback mechanism, which can be used for locating link
faults, performance, and quality test. When the device is in link loopback state, it will send all
packets (except the OAM packets) received back to its peer device.
After the remote loopback is enabled, the device will re-initiate remote loopback request if it
did not receive the response from its peer within the configured timeout period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the loopback timeout period to 5s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam loopback timeout 5
Set successfully.

Related commands
show oam loopback

9.1.10 oam loopback retry

Function
To configure the times of retry of remote loopback timeout on the physical interface, use this
command.

Format
oam loopback retry times

Parameters
Parameter Description
retry times Times of retry, an integer, ranging from 1 to 10

Default conditions
It is 2 times,

Raisecom Proprietary and Confidential


559
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Command mode
Physical interface configuration

User level
11

Usage guidelines
Scenario
OAM provides link-layer remote loopback mechanism, which can be used for locating link
faults, performance, and quality test. When the device is in link loopback state, it will send all
packets (except the OAM packets) received back to its peer device.
After the remote loopback is enabled, the device will re-initiate remote loopback request if it
did not receive the response from its peer within the configured timeout period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the times of retry of loopback timeout to 3.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam loopback retry 3
Set successfully.

Related commands
show oam loopback

9.1.11 oam notify enable

Function
To enable the interface to notify the peer interface when detecting faults or OAM link events,
use this command. To disable this function, use the disable form of this command.

Format
oam notify { critical-event | dying-gasp | errored-frame | errored-frame-period | errored-
frame-seconds | errored-symbol-period } { enable | disable }

Raisecom Proprietary and Confidential


560
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Parameters
Parameter Description
critical-event When detecting critical faults such as abnormal temperature
and voltage, the interface notifies the peer.
dying-gasp When detecting power failure, the interface notifies the
peer.
errored-frame When detecting errored frame events, the interface notifies
the peer.
errored-frame-period When detecting errored frame period events, the interface
notifies the peer.
errored-frame-seconds When detecting errored frame second events, the interface
notifies the peer.
errored-symbol-period When detecting errored symbol period events, the interface
notifies the peer.
enable Enable notification of faults and OAM link events.
disable Disable notification of faults and OAM link events.

Default conditions
Enabled

Command mode
Physical interface configuration

User level
11

Usage guidelines
Scenario
When the interface receives the fault information and OAM link events, you can use this
command to enable or disable informing the information to the peer interface.
If the link allows errored symbol period summary, errored frame period, errored frame,
and errored frame second event Trap, OAM will record the corresponding events to the
device when it detects the corresponding events and the link OAM is enabled, and
meanwhile the OAM passive end will inform the peer OAM active end of the events
through OAM packets. Otherwise, the OAM just records the events to the local device.
If the link allows power failure indication and critical event notification, OAM will
record the corresponding events to the device when it detects the corresponding events
and the link OAM is enabled, and meanwhile the OAM passive end will inform the peer
OAM active end of the events through the flag bit of OAM packets. Otherwise, the
OAM just records the events to the local device.
Prerequisite

Raisecom Proprietary and Confidential


561
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

N/A
Follow-up procedure
Use the oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-
symbol-period } command to configure the monitor window and threshold of OAM link
events.
Precaution
N/A

Examples
This example shows how to disable Trap of link error frame events.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam notify errored-frame disable
Set successfully.

Related commands
show oam notify

9.1.12 oam peer event trap enable

Function
To enable Trap of peer OAM link events, use this command. To disable this function, use the
disable form of this command.

Format
oam peer event trap { enable | disable }

Parameters
Parameter Description
enable Enable Trap of peer OAM link events.
disable Disable Trap of peer OAM link events.

Default conditions
Disabled

Command mode
Physical layer interface configuration mode

User level
11

Raisecom Proprietary and Confidential


562
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Usage guidelines
Scenario
EFM OAM can monitor the link, discover link faults, and generate OAM link events. OAM
link events include error frame event, error frame period event, error second event, and error
symbol period event. When the Trap of peer OAM link event is enabled, the device will report
it to the NMS through SNMP Trap while it receives the Trap.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable Trap of peer OAM link events.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam peer event trap enable
Set successfully.

Related commands
show oam trap

9.1.13 oam remote-loopback

Function
To enable the physical interface to initiate the remote loopback, use this command. To disable
this function, use the no form of this command.

Format
oam remote-loopback
no oam remote-loopback

Parameters
N/A

Default conditions
N/A

Raisecom Proprietary and Confidential


563
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Command mode
Physical layer interface configuration mode

User level
11

Usage guidelines
Scenario
With the link-layer remote loopback mechanism, OAM can detect and locate link faults.
At two ends of a link, the device in active mode initiates EFM remote loopback and the
device in passive mode responds to EFM remote loopback. While in link loopback status, the
device forwards all packets except OAM packets to the peer device to form a loopback.
You can use this command to enable or disable the device in active mode to initiate the
remote loopback.
Prerequisite
EFM OAM is enabled through the oam enable command.
You must use the oam active command to configure active mode on an interface.
Otherwise, configuration is unsuccessful.
OAM link is connected and the oam loopback command can be used on the OAM peer
device to enable the feature of responding to the remote loopback.
Follow-up procedure
N/A
Precaution
Configurations will succeed only when the interface is in EFM OAM active mode.
Remote loopback can be implemented only when the OAM connection is created.
Other packets will be sent back except the OAM packets.
The device only processes OAM packets on the loopback interface, other packets will be
sent back.
The loopback interface is forbidden to forward packets to other interfaces and vice versa.

Examples
This example shows how to enable OAM remote loopback on the link.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#oam remote-loopback
Set successfully.

Related commands
show oam loopback

Raisecom Proprietary and Confidential


564
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

9.1.14 oam send-period timeout

Function
To configure the sending period and timeout of OAM PDU, use this command. To return to
the default condition, use the no form of this command.

Format
oam send-period period-number timeout time
no oam send-period timeout

Parameters
Parameter Description
send-period period- Period of sending OAM PDU, an integer, ranging from 1 to
number 100, in units of 100ms
timeout time Timeout, an integer, ranging from 1 to 50, in units of
second

Default conditions
The sending period of OAM PDUs 1s (namely, the period-number is 10 100ms =1s) and the
link timeout is 5s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After both interfaces of a link establish connection through peer discovery, they need to
periodically send OAM PDUs to each other to maintain the link. This period is the sending
period of OAM PDU. If the interface at one end does not receive the OAM PDU sent by its
peer within the timeout, it will deem that the link is disconnected.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


565
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Examples
This example shows how to configure the sending period of OAM PDU to 2s (20 100ms)
and the timeout to 10s.
Raisecom#config
Raisecom(config)#oam send-period 20 timeout 10
Set successfully

Related commands
show oam

9.1.15 show oam

Function
To show basic configurations of OAM, use this command.

Format
show oam [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show basic information about link OAM on the interface.
Raisecom#show oam gigaethernet 1/1/1

Raisecom Proprietary and Confidential


566
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Port: gigaethernet1/1/1
Mode: Passive
Administrate state: Disable
Operation state: Disable
Max OAMPDU size: 1518
Send period: 1000 ms
Link timeout : 5 s
Config revision: 2
Supported functions: Loopback, Event, Variable

The following table describes fields in the command output.

Field Description
port Interface
Mode OAM working modes
Administrate state Administrative state

Operation state Operational state

Max OAMPDU size Maximum length of OAM PDU


Send period Sending period of OAM PDU
Link timeout Link timeout
Config revision Configuration version
Supported functions Supported functions
Loopback: remote loopback is supported
Event: event notification is supported
Variable: obtaining variables is supported

Related commands
oam { active | passive }
oam send-period timeout

9.1.16 show oam event

Function
To show OAM link events, use this command.

Format
show oam event [ interface-type interface-number ] [ critical ]

Parameters
Parameter Description
interface-type Interface type

Raisecom Proprietary and Confidential


567
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Parameter Description
interface-number Interface ID
The form and value range depend on the interface type.
critical Critical events

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show records of critical OAM link events on the interface.
Raisecom#show oam event gigaethernet 1/1/1 critical
Port: gigaethernet1/1/1
TimeStamp: 0 days, 0 hours, 9 minutes
Type:linkFault
RunningTotal: 2
EventTotal: 2

The following table describes fields in the command output.

Field Description
port Interface
TimeStamp Timestamp
Type Type
RunningTotal Total number of errors
EventTotal Total number of events

Related commands
oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-symbol-
period }

Raisecom Proprietary and Confidential


568
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

9.1.17 show oam loopback

Function
To show configurations of OAM remote loopback, use this command.

Format
show oam loopback [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of OAM remote loopback on the interface.
Raisecom#show oam loopback gigaethernet 1/1/1
Port: gigaethernet1/1/1
Loopback status: No
Loopback react: Process
OAM loopback timeout: 3s
OAM loopback retry times : 2

The following table describes fields in the command output.

Field Description
port Interface
Loopback status Loopback status

Raisecom Proprietary and Confidential


569
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Field Description
Loopback react Loopback responses
OAM loopback timeout Remote loopback timeout
OAM loopback retry times Times of retry of remote loopback timeout

Related commands
oam loopback
oam remote-loopback
oam loopback timeout
oam loopback retry

9.1.18 show oam notify

Function
To show configurations of OAM events notification, use this command.

Format
show oam notify [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Raisecom Proprietary and Confidential


570
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Examples
This example shows how to show configurations of OAM events notification on the interface.
Raisecom#show oam notify gigaethernet 1/1/1
Port: gigaethernet1/1/1

Errored symbol period: Enable


Errored symbol period window: 1s
Errored symbol period threshold: 1

Errored frame period: Enable


Errored frame period window: 199*100ms
Errored frame period threshold: 20

Errored frame: Enable


Errored frame window: 1s
Errored frame threshold: 1

Errored frame seconds summary: Enable


Errored frame seconds summary window: 60s
Errored frame seconds summary threshold: 1

Dying gasp: Enable


Critical event: Enable

The following table describes fields in the command output.

Field Description
port Interface
Errored Symbol period Statistics of errored Symbol period
Errored symbol period window Errored symbol period window
Errored symbol period threshold Errored symbol period threshold
Errored frame period Errored frame period
Errored frame period window Errored frame period window
Errored frame period threshold Errored frame period threshold
Errored frame Errored frame
Errored frame window Errored frame window
Errored frame threshold Errored frame threshold
Errored frame seconds summary Statistics of errored frame seconds
Errored frame seconds summary window Errored frame seconds summary window
Errored frame seconds summary threshold Errored frame seconds summary threshold
Dying gasp Power failure
Critical event Critical event

Raisecom Proprietary and Confidential


571
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Related commands
oam notify
oam { errored-frame | errored-frame-period | errored-frame-seconds | errored-symbol-
period }

9.1.19 show oam peer

Function
To show information about OAM peer, use this command.

Format
show oam peer [ interface-type interface-number ]

Parameters
Parameter Description
peer Peer
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about OAM peer on the interface.
Raisecom#show oam peer gigaethernet 1/1/1
Port: gigaethernet1/1/1

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


572
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Field Description
Port gigaethernet1/1/1

Related commands
N/A

9.1.20 show oam peer event

Function
To show information about OAM peer events, use this command.

Format
show oam peer event [ interface-type interface-number ] [ critical ]

Parameters
Parameter Description
peer Peer
event Event
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
critical Critical event

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about OAM peer events on the interface.

Raisecom Proprietary and Confidential


573
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Raisecom#show oam peer event gigaethernet 1/1/1


Port: gigaethernet1/1/1

The following table describes fields in the command output.

Field Description
Port Interface

Related commands
N/A

9.1.21 show oam peer link-statistic

Function
To show statistics of the peer OAM link, use this command.

Format
show oam peer link-statistic [ interface-type interface-number ]

Parameters
Parameter Description
peer Peer
link-statistic Link statistics
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Raisecom Proprietary and Confidential


574
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Examples
This example shows how to show statistics of the peer OAM link.
Raisecom#show oam peer link-statistic gigaethernet 1/1/1
Port: gigaethernet1/1/1
Oam is Passive

The following table describes fields in the command output.

Field Description
Port Interface
Oam is OAM state

Related commands
N/A

9.1.22 show oam peer oam-info

Function
To show information about the peer OAM entity, use this command.

Format
show oam peer oam-info [ interface-type interface-number ]

Parameters
Parameter Description
peer peer
oam-info OAM information
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


575
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

Usage guidelines
N/A

Examples
This example shows how to show information about peer OAM on the interface.
Raisecom#show oam peer oam-info gigaethernet 1/1/1
port: gigaethernet 1/1/1
Oam is Passive

The following table describes fields in the command output.

Field Description
Port Interface
Oam is OAM state

Related commands
N/A

9.1.23 show oam statistics

Function
To show OAM statistics, use this command.

Format
show oam statistics [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


576
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

User level
5

Usage guidelines
N/A

Examples
This example shows how to show OAM statistics on the interface.
Raisecom#show oam statistics gigaethernet 1/1/1
Port: gigaethernet1/1/1
Tx Rx
---------------------------------------------------
Information : 0 0
Event notification : 0 0
Loopback control : 0 0
Variable request : 0 0
Variable response : 0 0
Organization specific : 0 0
Unsupported codes : 0 0
Duplicate event notification : 0 0

The following table describes fields in the command output.

Field Description
port Interface
Tx Number of Tx frames
Rx Number of Rx frames
Information Detailed information
Event notification Event notification
Loopback control Loopback control
Variable request Variable request
Variable response Variable response
Organization specific Organization specific information
Unsupported codes Unsupported codes
Duplicate event notification Duplicate event notification

Related commands
clear oam statistics

Raisecom Proprietary and Confidential


577
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 9 OAM

9.1.24 show oam trap

Function
This example shows how to show information about OAM Trap.

Format
show oam trap [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show link OAM Trap information on interface GE 1.
Raisecom#show oam trap gigaethernet 1/1/1
Port: gigaethernet1/1/1
Event trap: Enable
Peer event trap: Enable
Discovery trap total: 0
Discovery trap timestamp: 0 days, 0 hours, 0 minutes
Lost trap total: 0
Lost trap timestamp: 0 days, 0 hours, 0 minutes

The following table describes fields in the command output.

Field Description
Port Interface ID

Raisecom Proprietary and Confidential


578
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Field Description
Event trap Event trap
Peer event trap Peer event trap
Discovery trap total Times of trap discovery
Discovery trap timestamp Timestamp of trap recovery
Lost trap total Times of trap loss
Lost trap timestamp Timestamp of trap loss

Related commands
oam event trap enable
oam peer event trap enable

10 Reliability

10.1 Link aggregation


10.1.1 port-channel

Function
To add a physical interface to the link aggregation group, use this command. To disable this
function, use the no form of this command.

Format
port-channel channel-number
no port-channel

Raisecom Proprietary and Confidential


579
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Parameters
Parameter Description
channel-number Interface aggregation group ID, an integer, ranging from 1 to 32

Default conditions
The physical interface does not join any link aggregation group.

Command mode
Physical interface configuration

User level
15

Usage guidelines
Scenario
You can use this command to add Layer 2 physical interfaces to the specified link aggregation
group. Each physical interface can only join one aggregation group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Remove an interface from the former link aggregation group before add it to the new
group.
When the user number of the link aggregation interface reaches its maximum, no more
interfaces can be added to the group.
When a link aggregation group is deleted, the interfaces will be automatically removed
from the group.

Examples
This example shows how to add 1000 Mbit/s interface 1/1/1 to interface aggregation group 2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#port-channel 2
Set successfully.

Related commands
show port-channel

Raisecom Proprietary and Confidential


580
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

10.1.2 clear lacp statistics

Function
To clear statistics of LACP, use this command.

Format
clear lacp statistics [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to clear statistics of LACP packets. If the interface list is not
specified, this command will clear statistics of LACP packets on all interfaces.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear all statistics of LACP packets. Use it with caution.

Examples
This example shows how to clear statistics of LACP on all interfaces.
Raisecom#config

Raisecom Proprietary and Confidential


581
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Raisecom(config)#clear lacp statistics


Set successfully.

Related commands
show lacp

10.1.3 interface port-channel

Function
To enter Aggregation group configuration, use this command.

Format
interface port-channel channel-number

Parameters
Parameter Description
port-channel channel-number Aggregation group interface ID, an integer, ranging
from 1 to 32

Default conditions
N/A

Command mode
Global configuration

User level
1

Usage guidelines
N/A

Examples
This example shows how to enter the configuration mode of aggregation group 1.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#

Related commands
N/A

Raisecom Proprietary and Confidential


582
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

10.1.4 lacp mode

Function
To configure the LACP mode on the interface while using static LACP link aggregation, use
this command.

Format
lacp mode { active | passive }

Parameters
Parameter Description
active The interface periodically sends LACP packets to the peer for
negotiation.
passive The interface does not send any LACP packets, but receives and
responds to the LACP packets sent by the peer.

Default conditions
LACP mode on the interface is active.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the LACP mode on the interface. Interconnected
interfaces send and respond to LACP packets to ensure that the negotiation is under the same
standard, including the interface rate, duplex mode, and the VLAN attached.
When the LACP mode on the interface is active, the interface will send LACPDU
packets periodically.
When the LACP mode on the interface is passive, the interface will not send any LACP
packet, but receive and respond to the LACP packets sent by the peer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


583
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

N/A

Examples
This example shows how to configure the LACP mode to passive on 1000 Mbit/s interface
1/1/1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#lacp mode passive
Set successfully.

Related commands
show lacp

10.1.5 lacp port-priority

Function
To configure the LACP priority of the interface while using static LACP, use this command.
To return to the default condition, use the no form of this command.

Format
lacp port-priority port-priority
no lacp port-priority

Parameters
Parameter Description
port-priority LACP priority of the interface, an integer, ranging from 0 to 65534
Smaller value means higher priority. Interface of higher priority are
more likely to become an active interface.

Default conditions
LACP priority on the interface is 32768.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


584
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Interfaces within a link aggregation group include active interfaces and inactive interfaces.
Active interface is used for transmitting data. Inactive interface is used for backing up links
and cannot transmit data. If one active interface is shut down, the inactive interface with
higher priority will turn into active interface to transmit data instead.
In the static LACP link aggregation mode, whether the interface is active or not depends on its
LACP priority. Interface of higher the priority is more likely to become an active interface.
You can use this command to configure the LACP priority of the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the LACP priority on 1000 Mbit/s interface 1/1/1 to 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#lacp port-priority 1
Set successfully.

Related commands
show lacp

10.1.6 lacp priority preempt enable

Function
To enable LACP priority preempt, use this command. To disable the function, use the disable
form of this command.

Format
lacp priority preempt { enable | disable }

Parameters
Parameter Description
enable Enable priority preempt.
disable Disable priority preempt.

Default conditions
Priority preempt is not enabled

Raisecom Proprietary and Confidential


585
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Command mode
Link Aggregation group configuration

User level
11

Usage guidelines
Scenario
With LACP priority preempt enabled and the maximum active Interface ID of the group being
1, interface of higher priority will switch from Standby mode to Active mode when it recovers
from the failure. Interface of lower priority will switch from Active mode to Standby mode.
For example, the maximum active Interface ID of the link aggregation group 1 is 1. The group
has 2 member interfaces of Port 1 and Port 2. The priority of Port 1 is higher than Port 2. Port
1 is in Standby mode due to failure and Port 2 is in Active mode. With LACP priority preempt
enabled, Port 1 will switch to Active mode when it is recovered from failure and Port 2 will
switch back to Standby mode; if LACP priority preempt is disabled, the status of Port 1 and
Port 2 will remain unchanged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable LACP priority preempt for link aggregation group 1.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#lacp priority preempt enable
Set successfully.

Related commands
show lacp

10.1.7 lacp system-priority

Function
To configure the LACP priority of the device while using static LACP, use this command. To
return to the default condition, use the no form of this command.

Raisecom Proprietary and Confidential


586
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Format
lacp system-priority system-priority
no lacp system-priority

Parameters
Parameter Description
system-priority LACP priority, an integer, ranging from 0 to 65535
Smaller value means higher priority. Interface of higher priority are
more likely to become an active interface.

Default conditions
LACP priority on the interface is 32768.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
In static LACP mode, peer devices should use the same active interface to establish the link
aggregation group. You can specify the active end and inactive end to ensure the consistency
of the active interface. After the active interface on the active side is determined, choose the
same active interface for the inactive side.
LACP priority of the device is used to identify the priority of the two devices over the link.
Device of higher priority will be set as the active end.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the LACP priority of the device to 1.
Raisecom#config
Raisecom(config)#lacp system-priority 1
Set successfully.

Raisecom Proprietary and Confidential


587
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Related commands
show lacp

10.1.8 lacp timeout

Function
To configure the LACP timeout mode, use this command.

Format
lacp timeout { fast | slow }

Parameters
Parameter Description
fast Fast mode
The interval of sending packets is 1s and the period of timeout is 3s.
slow Slow mode
The interval of sending packets is 30s and the period of timeout is 90s.

Default conditions
The LACP timeout mode is slow.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can select the mode based on actual demand. Generally, fast mode requires good LACP
link status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


588
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Examples
This example shows how to configure the LACP timeout to fast mode.
Raisecom#config
Raisecom(config)#lacp timeout fast
Set successfully.

Related commands
show lacp

10.1.9 load-sharing mode

Function
To configure the traffic load sharing mod, use this command. To return to the default
condition, use the no form of this command.

Format
load-sharing mode { dst-ip | dst-mac | src-dst-ip | src-dst-mac | src-ip | src-mac }
no load-sharing

Parameters
Parameter Description
dst-ip Select the forwarding interface based on the destination IP address,
ensuring packets with the same destination IP address being
forwarded through the same interface.
dst-mac Select the forwarding interface based on the destination MAC
address, ensuring packets with the same destination MAC address
being forwarded through the same interface.
src-dst-ip Select the forwarding port based on the result of logical XOR of
source and destination IP addresses, ensuring packets with the same
result being forwarded through the same interface.
src-dst-mac Select the forwarding port based on the result of logical XOR of
source and destination MAC addresses ensuring packets with the
same result being forwarded through the same interface.
src-ip Select the forwarding interface based on the source IP address,
ensuring packets with the same source IP address being forwarded
through the same interface.
src-mac Select the forwarding interface based on the source MAC address,
ensuring packets with the same source MAC address being forwarded
through the same interface.

Raisecom Proprietary and Confidential


589
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Default conditions
The load sharing mode is src-dst-mac.

Command mode
Aggregation group configuration

User level
11

Usage guidelines
Scenario
Link aggregation uses a load-sharing mode to select a forwarding interface, ensuring packets
with the same attributes (such as IP addresses of the same source and MAC addresses of the
same source) being forwarded through the same interface, therefore prevent packets disorder
in the receiving end. Based on certain algorithm, link aggregation can balance the traffic in
different links, provide redundancy protection, and expand the bandwidth of the single link.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the load sharing mode to src-ip.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#load-sharing mode src-ip
Set successfully.

Related commands
show port-channel

10.1.10 master-port

Function
To configure the interface as master-port while using the Active-Standby mode, use this
command.

Raisecom Proprietary and Confidential


590
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Format
master-port interface-type interface-number
no master-port

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Aggregation group configuration

User level
11

Usage guidelines
Scenario
The Active-Standby mode means that an aggregation group contains two member interfaces,
including a master interface and a backup interface, with one in Active mode and the other in
Shutdown mode.
In Active-Standby mode, use this command to configure the master interface. Generally the
master interface is in Active mode.
Prerequisite
Use the mode { lacp-static | manual } backup command to configure the aggregation group
to Active-Standby mode by.
Follow-up procedure
N/A
Precaution
Use the port-channel command to add the master interface to the aggregation group, or the
Active-Standby mode will not take effect.

Examples
This example shows how to configure 1000 Mbit/s interface 1/1/1 as the master interface of
aggregation group 1.

Raisecom Proprietary and Confidential


591
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#master-port gigaethernet 1
Set successfully.

Related commands
show port-channel

10.1.11 { max-active | min-active } links

Function
To configure the maximum or minimum number of active links in the link aggregation group,
use this command. To return to the default condition, use the no form of this command.

Format
{ max-active | min-active } links number
no { max-active | min-active } links

Parameters
Parameter Description
max-active Maximum number of active interfaces
min-active Minimum number of active interfaces
number Threshold of the active interface, an integer, ranging from 1 to 8

Default conditions
The minimum number of active links in the link aggregation is 1. The maximum number of
active links in the link aggregation is 8.

Command mode
Aggregation group configuration

User level
11

Usage guidelines
Scenario
By configure a maximum number of active interfaces in a link aggregation group, you can
ensure the reliability of data transmission. By configuring a minimum number, you can
prevent traffic congestion caused by inadequate active interfaces.

Raisecom Proprietary and Confidential


592
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Maximum number of active interfaces: When the number of active interface reaches its
maximum, no more active interfaces can be added to the aggregation group.
Minimum number of active interfaces: When the number of active interface reaches its
minimum, the aggregation interface will switch to down mode and all the member
interfaces will stop data forwarding.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of the active interface in an aggregation group should be greater or
equal to the minimum number.

Examples
This example shows how to configure the maximum number of active interface in
aggregation group 1 to 3 and the minimum number to 2.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#max-active links 3
Set successfully.
Raisecom(config-aggregator)#min-active links 2
Set successfully.

Related commands
show port-channe

10.1.12 mode

Function
To configure the working mode of the link aggregation group, use this command.

Format
mode { lacp | manual } [ backup ]

Parameters
Parameter Description
lacp Static LACP aggregation mode
manual Manual aggregation mode
backup Active-Standby link aggregation mode

Raisecom Proprietary and Confidential


593
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Default conditions
By default, the link aggregation group works in manual aggregation mode.

Command mode
Aggregation group configuration

User level
11

Usage guidelines
Scenario
Link aggregation works in 3 modes: manual mode, static LACP mode and Active-Standby
mode. In Active-Standby mode, an aggregation group contains two member interfaces with
one in Active mode and the other in Shutdown mode for backup. Based on different link
aggregation methods, Active-Standby mode can be further divided into manual Active-
Standby mode and static LACP Active-Standby mode.
The ISCOM2600 series support manual mode, static LACP mode, manual Active-Standby
mode, and static Active-Standby mode. You should configure the aggregation mode for the
device manually. Each aggregation group should contain at least 1 interface. Descriptions of
each mode are as follows:
Manual aggregation mode: all interfaces forwards data and share loads. This mode is
applicable to 2 connected devices, where 1 device does not support LACP.
Static LACP aggregation mode: the active end and interface are chosen based on LACP.
The active interface is used to forward data while the inactive interface is used to back
up links. This mode is applicable to 2 connected devices, where both devices support
LACP.
Manual Active-Standby link aggregation mode: the aggregation group contains two
interfaces with one in Active mode and the other in Shutdown mode for backup. This
mode is applicable to 2 connected devices, where 1 device does not support LACP.
Static LACP Active-Standby link aggregation mode: The aggregation group contains two
interfaces with one in Active mode and the other in Shutdown mode for backup. This
mode is applicable to 2 connected devices, where both devices support LACP.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the link aggregation group to static LACP aggregation
mode.

Raisecom Proprietary and Confidential


594
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-gigaethernet-channel1)#mode lacp
Set successfully.

Related commands
show port-channel

10.1.13 restore-mode

Function
To configure the restore mode and the restore delay of the link aggregation group in Active-
Standby mode, use this command.

Format
restore-mode { non-revertive | revertive [ restore-delay second ] }

Parameters
Parameter Description
non-revertive Non-revertive mode
revertive Revertive mode
restore-delay second Restore delay, an integer, ranging from 0 to 65535s

Default conditions
The restore-mode of the link aggregation group is non-revertive mode.

Command mode
Aggregation group configuration

User level
11

Usage guidelines
Scenario
When a link recovers from a fault, the system does not immediately restore the data to the
master link, but stays in fault status for a period. You can adjust the value of the Restore-delay
time to prevent frequent switching of link status, therefore avoid flow oscillation due to
continuous switch between active and inactive links.
Non-revertive mode differs from revertive mode in that a link will not switch the traffic from
backup link to the active link after it recovers from a fault.

Raisecom Proprietary and Confidential


595
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the link aggregation group to non-revertive mode.
Raisecom#config
Raisecom(config)#interface port-channel 1
Raisecom(config-aggregator)#restore-mode non-revertive
Set successfully.

Related commands
show port-channel

10.1.14 show lacp

Function
To show LACP information, use this command.

Format
show lacp { internal [ detail ] | neighbor [ detail ] | statistics [ interface-type interface-
number ] | sys-id }

Parameters
Parameter Description
internal Show LACP information on the local interface.
neighbor Show LACP information on the neighbor interface connecting to the
local interface.
detail Show detailed LACP information.
statistics Show statistics of LACP.
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
sys-id Show the link aggregation ID used by the LACP, composed of the
LACP priority and the MAC address of the device.

Raisecom Proprietary and Confidential


596
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show LACP information on the local interface.
Raisecom#show lacp internal
Flags:
S- Device is requesting Slow LACPDUs F- Device is requesting Fast LACPDUs
A- Device in Active mode P- Device in Passive mode MP- MLACP Peer Port

Interface State Flag Port-Priority Admin-key Oper-key Port-State


---------------------------------------------------------------------
Client3 Standby SP 1 1 1 4

The following table describes fields in the command output.

Field Description
Interface Interface ID
State Interface status
Active: the interface is in active status, forwarding data
Standby: the interface is in inactive status, backing up links
Down: the interface is in shutdown status
Flag Flag
S: the speed for sending LACPPDUs is slow; the period for
sending LACPPDUs is long.
F: the speed for sending LACPPDUs is fast; the period for
sending LACPPDUs is short.
A: the interface works in LACP active mode, actively sending
LACPPDUs to the peer periodically.
P: the interface works in LACP passive mode, passively receiving
LACPPDUs sent by the peer.
MP: peer port of the MLACP
Port-Priority Interface priority

Raisecom Proprietary and Confidential


597
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Field Description
Admin-key Administration KEY automatically generated by the LACP
It defines the capability of other interfaces in a link aggregation
group, using the physical features of an interface, such as speed,
duplex mode.
Oper-key Operation key, produced by LACP automatically.
Port-State Interface status
Interface status is represented by 8 bits. Bit 0 is the lowest bit.
Bit 0: LACP mode of an interface. 1 refers to an active interface
while 0 refers to a passive interface.
Bit 1: LACP timeout. 1 refers to a short timeout with 30s while 0
refers to a long timeout with 90s.
Bit 2: whether an interface can be aggregated. 1 refers to a
positive result while 0 refers to a negative result.
Bit 3: whether an interface is successfully added to a link
aggregation group. 1 refers to a positive result while 0 refers to a
negative result.
Bit 4: the enabling status for an interface to receive frames. 1
refers enabled while 0 refers to disabled.
Bit 5: the enabling status for an interface to forwarding frames. 1
refers enabled while 0 refers to disabled.
Bit 6: whether an interface uses the default value. 1 refers to a
positive result while 0 refers to a negative result.
Bit 7: whether the interface is in a timeout status. 1 refers to a
positive result while 0 refers to a negative result.
This example shows how to show LACP information on the neighbour interface.
Raisecom#show lacp neighbor
Flags:
S- Device is requesting Slow LACPDUs F- Device is requesting Fast LACPDUs
A- Device in Active mode P- Device in Passive mode MP- MLACP Peer Port

Inter Flag Port-Priority Age Device-ID Oper-key Partner-Port Port-State


---------------------------------------------------------------------
Client3 SP 0 0s 0000.0000.0000 0 0 0

The following table describes fields in the command output.

Field Description
Interface Interface ID
Flag Flag
S: the speed for sending LACPPDUs is slow; the period for
sending LACPPDUs is long.
F: the speed for sending LACPPDUs is fast; the period for
sending LACPPDUs is short.
A: the interface works in LACP active mode, actively sending
LACPPDUs to the peer periodically.
P: the interface works in LACP passive mode, passively
receiving LACPPDUs sent by the peer.

Raisecom Proprietary and Confidential


598
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Field Description
Port-Priority Interface priority
Age The time since an interface receives the last LACPPDU sent by
the peer
Device-ID MAC address of the peer
Oper-key Operation key, produced by LACP automatically
Partner-Port Peer interface
Port-State Interface status
Interface status is represented by 8 bits. Bit 0 is the lowest bit.
Bit 0: LACP mode of an interface. 1 refers to an active
interface while 0 refers to a passive interface.
Bit 1: LACP timeout. 1 refers to a short timeout with 30s while
0 refers to a long timeout with 90s.
Bit 2: whether an interface can be aggregated. 1 refers to a
positive result while 0 refers to a negative result.
Bit 3: whether an interface is successfully added to a link
aggregation group. 1 refers to a positive result while 0 refers to
a negative result.
Bit 4: the enabling status for an interface to receive frames. 1
refers enabled while 0 refers to disabled.
Bit 5: the enabling status for an interface to forwarding frames.
1 refers enabled while 0 refers to disabled.
Bit 6: whether an interface uses the default value. 1 refers to a
positive result while 0 refers to a negative result.
Bit 7: whether the interface is in a timeout status. 1 refers to a
positive result while 0 refers to a negative result.
This example shows how to show statistics of LACP.
Raisecom#show lacp statistics gigaethernet 1/1/3
LACPDUs Marker Marker-Response LACPDUS(RX)
Interface Send Receive Send Receive Send Receive Unknown Illegal
----------------------------------------------------------------------
Client3 2 0 0 0 0 0 0 0

The following table describes fields in the command output.

Field Description
Interface Interface ID
Send: number of LACPPDUs sent
LACPDUS
Receive: number of LACPPDUs received
Send: number of marker packets sent
Marker
Receive: number of marker packets received
Send: number of marker-response packets sent
Marker-Response
Receive: number of marker-response packets received
Unknown: number of unknown LACPPDUs
LACPDUS (RX)
Illegal: number of illegal LACPPDUs
This example shows how to show system LACP information.

Raisecom Proprietary and Confidential


599
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Raisecom#show lacp sys-id


Link aggregation status:Enable
LACP LAG ID: 32768, 000E.5E00.0005

The following table describes fields in the command output.

Field Description
Link aggregation status Link aggregation status:
Enable: enabled
Disable: disabled
LACP LAG ID LACP LAG ID, composed of the LACP priority and the
MAC address of the device

Related commands
N/A

10.1.15 show port-channel

Function
To show information about link aggregation, use this command.

Format
show port-channel

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about link aggregation.

Raisecom Proprietary and Confidential


600
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Raisecom#show port-channel
Group 1 information:
Mode: Lacp Load-sharing mode: src-dst-mac
MinLinks: 1 Max-links: 1
UpLinks: 0 Priority-Preemptive: Disable
Member Port:
Efficient Port:
Group 2 information:
Mode: Manual Load-sharing mode: src-dst-mac
MinLinks: 1 Max-links: 3
UpLinks: 0 Priority-Preemptive: Disable
Member Port:
Efficient Port:

The following table describes fields in the command output.

Field Description
Mode Link aggregation mode
Static: static LACP mode
Manual: manual link aggregation mode
MinLinks Lower threshold of the link aggregation group number
MaxLinks Upper threshold of the link aggregation group number
UpLinks Number of UP links
Priority-Preemptive Priority preemption
Enable: enabled
Disable: disabled
Member Port Member interface list
Show all member interfaces added to the aggregation group.
Efficient Port Efficient interface list
Show all efficient interfaces (active interfaces) in the link
aggregation group.

Related commands
N/A

10.2 Interface backup


10.2.1 show switchport backup

Function
To show information about interface backup, use this command.

Raisecom Proprietary and Confidential


601
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Format
show switchport backup

Parameters
N/A

Default conditions
N/A

Command mode
Any command

User level
5

Usage guidelines
Scenario
You can use this command to show information about interface backup, including restore
delay, restore mode and interface backup group information. The interface backup group
information contains master interface ID, backup interface ID, master and backup interface
status (Up/Down/Standby), and VLAN list.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show information about interface backup.
Raisecom#show switchport backup
Restore delay: 15s
Restore mode: port-up
Active Port(State) Backup Port(State) Vlanlist
-----------------------------------------------------------------
3 (Up) 5(Standby) 1-100
6 (Down) 7(Up) 1-100

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


602
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Field Description
Restore delay Backup recovery delay, ranging from 0 to 180s
Restore mode Backup recovery mode
port-up: interface connecting mode. A link recovers from a
fault when the interface is in Up status.
neighbor-discover: neighbour discovery mode. A link

recovers from a fault after the interface discovers a neighbour


through neighbour discovery mode (RNDP).
disable: interface backup is disabled.

Active Port (State) Master interface ID (master interface status)


Up: forwarding status
Down: shutdown status
Standby: standby status
Backup Port (State) Backup interface ID (backup interface status)
Up: forwarding status
Down: shutdown status
Standby: standby status
Vlanlist VLAN list, ranging from 1 to 4094

Related commands
N/A

10.2.2 switchport backup force-switch

Function
To configure force switch, use this command. To cancel this configuration, use the no form of
this command.

Format
switchport backup { interface-type interface-number | port-channel port-channel-id }
force-switch
no switchport backup { interface-type interface-number | port-channel port-channel-id }
force-switch

Parameters
Parameter Description
port-id Interface ID, an integer, ranging from 1 to the maximum Interface
ID
port-channel-id Aggregation group ID, an integer, ranging from 1 to 32

Raisecom Proprietary and Confidential


603
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Default conditions
N/A

Command mode
Physical interface configuration mode/Aggregation group configuration

User level
11

Usage guidelines
Scenario
This command is used in the physical interface configuration mode of the master interface. In
addition, this command is used to forcibly switch data to the backup link regardless of the
backup link status.
After this command is successfully executed, the master link is blocked and data is forcibly
switched to the backup link for transportation. If the device is in backup recovery status when
you are configuring forced switch, it is just cancelling the backup of recovery timer.
You can use the no switchport backup interface-type backup-interface-number force-switch
command to cancel the force switch and re-select a forwarding status based on the link status.
The selection principles are shown as follows:
If the Up/Down statuses of the two interfaces are identical, the active interface is
preferred.
If the Up/Down statuses of the two interfaces are different, the interface in Up status is
preferred.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If multiple backup interface pairs are configured on the active interface, you must enter the
backup Interface ID to which the data is forcibly switched. Otherwise, configurations fail.

Examples
There is an interface backup group on the ISCOM2600G. Port 1 is the master interface and
Port 2 is the backup interface, the data is transmitted on the master link.
This example shows how to switch data from the working link to the link where Port 2 is.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport backup port 2 force-switch
Set successfully.

Raisecom Proprietary and Confidential


604
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Related commands
show switchport backup

10.2.3 switchport backup

Function
To configure the interface backup group, use this command. To delete the backup interface,
use the no form of this command.

Format
switchport backup { interface-type interface-number | port-channel port-channel-id }
vlanlist vlan-list
no switchport backup { port port-id | port-channel port-channel-id }

Parameters
Parameter Description
port-id Interface ID, an integer, ranging from 1 to the maximum Interface ID
port-channel-id Aggregation group ID, an integer, ranging from 1 to 32
vlan-list VLAN list, an integer, ranging from 1 to 4094
Support multi-VLAN input form such as "1, 2, and 3" and VLAN
range enter form such as "1-3".
If you do not specify VLAN list for the interface backup group,
VLNA ID ranges from 1 to 4094 by default.

Default conditions
There is no interface backup group.

Command mode
Physical interface configuration/aggregation configuration

User level
11

Usage guidelines
Scenario
This command is used to create the interface backup group for interface backup, helping
realize basic link redundancy.
There are 2 member interfaces in the interface backup group: active interface and backup
interface. The active interface is the one in the physical interface configuration mode. The
backup interface refers to the one specified by the command. These two interfaces provide

Raisecom Proprietary and Confidential


605
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

interface backup in s specified VLAN list. One interface is in forwarding (Up) status and the
other one is in standby status.
The active interface and the backup interface can either be physical interfaces or be link
aggregation groups.
If you set a link aggregation group to the member interface of the interface backup group, you
must set the member interface with smallest Interface ID in the link aggregation group to the
member interface of the interface backup group. When the interface is in up status, all
member interfaces in the link aggregation group are in up status. If the interface is in down
status, so do all member interfaces in the link aggregation group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
In the same VLAN, an/a interface/ link aggregation group cannot be set to the member
interface of two or more interface backup groups.
In an interface backup group, an interface cannot be set to the active interface and the
backup interface simultaneously.
STP and interface backup are exclusive.

Examples
This example shows how to set the active interface to Port 1 and how to set the backup
interface to Port 2 in VLANs 1-100.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport backup port 2 vlanlist 1-
100
Set successfully.

Related commands
show switchport backup

10.2.4 switchport backup restore-delay

Function
To configure restore delay, use this command. To return to the default setting, use the no form
of this command.

Format
switchport backup restore-delay second
no switchport backup restore-delay

Raisecom Proprietary and Confidential


606
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Parameters
Parameter Description
second Restore delay, an integer, ranging from 0 to 300s

Default conditions
The restore delay is set to 15s .

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When a link recovers from a fault, the system does not restore the data to the master link.
Instead, it keeps the fault status for a period by adjusting the value of Restore-delay timer.
This helps prevent frequent switching of link status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the restore delay to 35s.
Raisecom#config
Raisecom(config)#switchport backup restore-delay 35
Set successfully.

Related commands
show switchport backup

10.2.5 switchport backup restore-mode

Function
To configure the restore mode of interface backup, use this command.

Raisecom Proprietary and Confidential


607
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Format
switchport backup restore-mode { disable | port-up }

Parameters
Parameter Description
disable Interface backup recovery is disabled.
port-up Interface connection mode
A link recovers from a fault when the interface is in Up status.

Default conditions
The recovery mode is interface connecting mode.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
To configure the restore mode of interface backup, use this command.
disable: all interface backup groups are detected. If some interface backup group is in
backup restore status, interface backup is disabled.
port-up: when the backup interface is in up status and the active interface changes from
down status to up status, the backup restore timer is enabled. When the timer expires and
no Down event is generated, the active interface status is set to Forwarding and the
backup interface status is set to Discarding. If an interface is in down status during this
process, the timer is canceled. The Up interface is set to forwarding and the Down
interface is set to discarding.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to set the restore mode to port-up.

Raisecom Proprietary and Confidential


608
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Raisecom#config
Raisecom(config)#switchport backup restore-mode port-up
Set successfully.

Related commands
show switchport backup

10.3 Link-state tracking


10.3.1 link-state-tracking group

Function
To create a link-state group and enable link-state tracking, use this command. To disable the
function, use the no form of this command.

Format
link-state-tracking group group-number
no link-state-tracking group group-number

Parameters
Parameter Description
group-number link-state group number, an integer, ranging from 1 to 10

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the upstream failed, the system will inform the downstream devices so that they can
switch traffic to the standby line to prevent traffic lost.
If no link-state group is created, you can use this command to create one and enable it. If the
link-state group has already existed, you can use this command to enable it without creating a
new one. In addition, configurations of the existing link-state group will not be changed.

Raisecom Proprietary and Confidential


609
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
When you use the no link-state-tracking group group-number command to disable link-state
tracking, link-state group with no interface connected will be deleted.

Examples
This example shows how to create and enable link-state group 1.
Raisecom#config
Raisecom(config)#link-state-tracking group 1
Set successfully.

Related commands
show link-state-tracking group

10.3.2 link-state-tracking group { downstream | upstream }

Function
To configure the uplink and downlink interface of the link-state group, use this command. To
delete the interface from the link-state group, use the no form of this command.

Format
link-state-tracking group group-number { downstream | upstream }
no link-state-tracking group

Parameters
Parameter Description
group-number Link-state group number, an integer, ranging from 1 to 10
downstream Configure the interface as downlink interface.
Downlink interface is connected with the downlink. If the uplink
fails, all downlink interfaces will shut down to inform the downlinks
to switch.
upstream Configure the interface as upstream interface.
The upstream interface is connected with the uplink to monitor the
uplink. In addition, there can be multiple uplink and downlink
interfaces in a link-state group.

Raisecom Proprietary and Confidential


610
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Default conditions
There is no upstream or downstream interface in the link-state group.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
The link-state group consists of downstream interfaces and upstream interfaces. There can be
multiple upstream and downstream interfaces in a link-state group. After you configure a link-
state group, upstream interfaces are monitored in real time.
In general, the downlink cannot learn the fault when the uplink fails. Therefore, services may
be interrupted. With link-state tracking, the system informs the downstream devices when the
uplink fails. The upstream interface of a link-state group is used to monitor the fault generated
on the uplink. The downstream devices switch traffic into a standby line to prevent losing
traffic.
You can use the no link-state-tracking group command to delete an interface from the link-
state group. When you delete an interface, if there is no interface in the link-state group and
the link-state group is not enabled, the group will be deleted too.
Prerequisite
You must use the link-state-tracking group command to create a link-state group. Otherwise,
configurations will fail.
Follow-up procedure
You can use the show link-state-tracking group command to show uplink interfaces and
downlink interfaces in a link-state group.
Precaution
An interface can either be configured as an uplink interface or a downlink interface. Only the
last configuration will take effect.

Examples
This example shows how to set interface 1 of slot 3 to uplink interface and how to set
interface 2 of slot 3 to downlink interface in link-state group 1.
Raisecom#config
Raisecom(config)#interface fastethernet 1/3/1
Raisecom(config-gigaethernet1/1/1)#link-state-tracking group 1 upstream
Raisecom(config-gigaethernet1/1/1)#exit
Raisecom(config)#interface fastethernet 1/3/2
Raisecom(config-gigaethernet1/1/1)#link-state-tracking group 1 downstream
Set successfully.

Raisecom Proprietary and Confidential


611
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

Related commands
show link-state-tracking group

10.3.3 show link-state-tracking group

Function
To show link-state tracking configurations, use this command.

Format
show link-state-tracking group group-number [ detail ]

Parameters
Parameter Description
group-number Link-state group ID, an integer, ranging from 1 to 10
detail Detailed information

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show information about the link-state group, including the link-
state group number, link-state group enabling status, link-state tracking status, downstream
and upstream interface statuses.
If you do not specify a link-state group number, information about all link-state groups will be
showed.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


612
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 10 Reliability

This command cannot be used to show link-state groups that are created but not enabled, and
failure groups that have no interfaces connected to them.

Examples
This example shows how to show information about link-state group 1.
Raisecom#show link-state-tracking group 1
Link State Tracking Group: 1 (Enable)
Status: Normal
Upstream Interfaces:
fastethernet1/3/2(Up) fastethernet1/3/3(Up)
Downstream Interfaces:
fastethernet1/3/1(Up)

The following table describes fields in the command output.

Field Description
Link State Tracking Link-state group number/status
Group Enable: enabled.
Disable: disabled.
Status Link-state tracking status
Normal: no link-state tracking occurred.
Link-state tracking: link-state tracking occurred.
Upstream Interfaces Upstream Interface ID/status
Up: the link is active.
Down: the link is shut down.
Downstream Downstream Interface ID/status
Interfaces Up: the link is active.
Down: the link is shut down.

Related commands
N/A

Raisecom Proprietary and Confidential


613
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11 Security

11.1 Secure MAC


11.1.1 clear port-security

Function
To clear certain type of secure MAC address on specified interface, use this command.

Format
clear port-security { all | configured | dynamic | sticky }

Parameters
Parameter Description
all All secure MAC addresses
configured Static secure MAC addresses
dynamic Dynamic secure MAC addresses
sticky Sticky secure MAC addresses

Default conditions
N/A

Command mode
Physical layer interface configuration

User level
11

Raisecom Proprietary and Confidential


614
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
You can use this command to clear certain type of secure MAC address on specified interface.
After this command is executed, packets with specified secure MAC address will not be
forwarded the first time they are sent to the specified interface because the secure MAC
address of the specified interface has already been cleared.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear the Sticky secure MAC address on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#clear port-security sticky
Set successfully.

Related commands
show port-security mac-address

11.1.2 no port-security shutdown

Function
To re-enable the interface that is shut down due to violation of secure MAC addresses, use
this command.

Format
no port-security shutdown

Parameters
N/A

Default conditions
N/A

Raisecom Proprietary and Confidential


615
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
While configuring the violation mode of secure MAC to shutdown mode, the device will send
a trap and Syslog prompt and the interface is shut down.
You can use this command to re-enable the interface that is shut down due to violation of
secure MAC addresses. When an interface is re-enabled, the previously-configured violation
mode still takes effect.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to res-enable the interface 1/1/2 that is shut down due to violation of
secure MAC addresses.
Raisecom#config
Raisecom(config)#interfacegigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#no port-security shutdown
Set successfully.

Related commands
show port-security
switchport port-security violation

11.1.3 port-security recovery-time

Function
To configure the security MAC recovery time on the interface, use this command. To return to
the default condition, use the no form of this command.

Format
port-security recovery-time second

Raisecom Proprietary and Confidential


616
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

no port-security recovery-time

Parameters
Parameter Description
second Recovery time, an integer, ranging from 30 to 86400s

Default conditions
The recovery time of port security MAC is 0s, showing as "Disable".

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the recovery time for interface that is shut down due
to violation of secure MAC addresses. The interface will be turned on automatically when the
recovery time expires.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the recovery time of the port security MAC to 30s.
Raisecom#config
Raisecom(config)#port-security recovery-time 30
Set successfully.

Related commands
show port-security

Raisecom Proprietary and Confidential


617
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.1.4 port-security aging-time

Function
To configure the aging time for secure MAC address, use this command. To return to the
default condition, use the no form of this command.

Format
port-security aging-time period
no port-security aging-time

Parameters
Parameter Description
period Aging time, an integer, ranging from 0 to 1440s

Default conditions
The aging time of the secure MAC address is 30s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the aging time for the MAC secure address on the
interface, the secure MAC address on the interface will be aged when the aging time expires.
If the aging time is 0, all the secure MAC address will not be aged when the aging time
expires.
If the aging time is not 0, the static secure MAC address and Sticky secure MAC address
will not be aged but the dynamic secure MAC address will be aged when the aging time
expires.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


618
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

When you use the show port-security mac-address [ port-list port-list ] command to show
the aging time of the secure MAC address:
If the aging time is 0, the aging time will show as "--".
If the aging time is not set to 0 and if the aging time is shorter than 1min, the aging time
will show as "<1".
The aging time for static security MAC address and Sticky secure MAC address will
always be shown as "--".

Examples
This example shows how to configure the aging time of secure MAC address to 10min.
Raisecom#config
Raisecom(config)#port-security aging-time 10
Set successfully.

Related commands
show port-security mac-address

11.1.5 switchport port-security aging-type

Function
To configure aging time for the secure MAC address, use this command. To return to the
default condition, use the no form of this command.

Format
switchport port-security aging-type { absolute | inactivity }

Parameters
Parameter Description

absolute Be aged after absolute period.


inactivity Be aged when there is no traffic on the interface.

Default conditions
The aging mode of the secure MAC address is absolute.

Command mode
Physical layer interface configuration

User level
11

Raisecom Proprietary and Confidential


619
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
The secure MAC address aging contains 2 modes:
Absolute mode: The secure MAC address will be aged immediately when the specified
aging time expires.
Inactivity mode: The secure MAC address will be aged if there is no traffic produced
during the specified time period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the secure MAC address aging mode on interface 1/1/2
to inactivity.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security aging-type
inactivity
Set successfully.

Related commands
show port-security

11.1.6 show port-security mac-address

Function
To show secure MAC address on the interface, use this command.

Format
show port-security mac-address [interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Raisecom Proprietary and Confidential


620
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
Scenario
You can use this command to show information about port security MAC including VLAN ID,
secure MAC address, secure MAC address type, interface ID, and aging time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show secure MAC address on interface 1.
Raisecom#show port-security mac-address gigaethernet 1/1/2
VLAN Security-MAC-Address Flag Port Age(min)
--------------------------------------------------------------------
1 0000.0000.0001 dynamic 1 1

The following table describes fields in the command output.

Parameter Description
Security-MAC-Address Secure MAC address on the interface
Flag Flag of secure MAC address on the interface
Static: static secure MAC address
Dynamic: dynamic secure MAC address
Sticky: Sticky secure MAC address
Port Interface ID

Raisecom Proprietary and Confidential


621
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
Age(min) Remnant aging time for secure MAC address on the interface.
If the aging time is 0, the aging time will be shown as "--".
If the aging time is not 0 and is shorter than 1 min, the aging
time will be shown as "<1".
The aging time for static secure MAC address and Sticky
secure MAC address is always shown as "--".
VLAN VLAN ID

Related commands
N/A

11.1.7 show port-security

Function
To show configurations and learning of the port security MAC, use this command.

Format
show port-security [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
Scenario
You can use this command to show configurations and learning of the port security MAC
including the interface ID, security MAC status, maximum number of secure MAC addresses,

Raisecom Proprietary and Confidential


622
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

current number of secure MAC addresses, the maximum number of secure MAC address in
history, violation number, violation handling mode and status of dynamic learning Trap.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show configurations and learning of the security MAC on
interface 1/1/2.
Raisecom#show port-security gigaethernet 1/1/2
Port security aging time:30 (mins)
Port security recovery time:Disable (s)
port status Max-Num Cur-Num His-MaxNum vio-Count
vio-action Dynamic-Trap Aging-Type
-------------------------------------------------------------------------
-----------------------------------------
gigaethernet1/1/1 Disable 1024 0 0 0
protect Disable Absolute

The following table describes fields in the command output.

Field Description
Port security aging Aging time of the secure MAC address on the interface
time
port Interface ID
status Port security MAC status
enable: enabled
disable: disabled
Max-Num Maximum number of secure MAC addresses allowed by the
interface, ranging from 0 to 100
Cur-Num Number of current secure MAC addresses, ranging from 0 to 100
His-Num Maximum number of secure MAC addresses in history, ranging
from 0 to 65535
vio-Count Number of violations on the interface, ranging from 0 to 65535
vio-action Handling mode of violations on the interface
Protect: protect the interface
Restrict: restrict packets
Shutdown: shut down the interface

Raisecom Proprietary and Confidential


623
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Field Description
Dynamic-Trap Status of dynamic learning Trap on the interface
enable: enabled
disable: disabled
Aging-Type Aging mode

Related commands
N/A

11.1.8 switchport port-security

Function
To enable port security MAC, use this command. To disable the function, use the no form of
this command.

Format
switchport port-security
no switchport port-security

Parameters
N/A

Default conditions
Port security MAC is disabled.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
Port security MAC is mainly used for devices at user side in edge network to ensure the date
security of an interface. Port security MAC controls packets based on their source MAC
addresses. It helps prevent illegal users or too many users from accessing to the network
through some interface of a device.
Prerequisite
N/A

Raisecom Proprietary and Confidential


624
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Follow-up procedure
N/A
Precaution
We do not recommend you to enable port security MAC on member interfaces in the
aggregation group.
We do not recommend you to enable MAC address management to configuring static
MAC address while port security MAC is enabled.
Security MAC and Dot1x are mutually exclusive and thus cannot be configured both.
Port security MAC and VLAN-based MAC address number limiting are mutually
exclusive.

Examples
This example shows how to enable security MAC on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security
Set successfully.

Related commands
show port-security

11.1.9 switchport port-security mac-address

Function
To configure static security MAC addresses, use this command. To delete the MAC address,
use the no form of this command.

Format
switchport port-security mac-address mac-address vlan vlan-id
no switchport port-security mac-address mac-address vlan vlan-id

Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
vlan-id VLAN ID, an integer, ranging from 1 to 4094

Default conditions
N/A

Raisecom Proprietary and Confidential


625
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure static secure MAC addresses. Static secure MAC
addresses are configured manually on the secure interface. It will take effect when port
security MAC is enabled and will not be aged.
If an interface only allows specified users to access the network, you can manually configure
static secure MAC addresses for them. If the interface allows a specified user to access the
network permanently and does not put restriction on other users, you can configure the
number of learned secure MAC addresses and write the static secure MAC address of the
specified user to the interface. Therefore, other users of dynamic secure MAC addresses can
access the network.
Prerequisite
N/A
Follow-up procedure
You can use the switchport port-security command to enable port security MAC.
Precaution
N/A

Examples
This example shows how to configure the static secure MAC address on interface 1 to
0000.0000.0001, and how to relate the static secure MAC address to VLAN 1.
Raisecom#config
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#switchport port-security mac-address
0000.0000.0001 vlan 1
Set successfully.

Related commands
show port-security mac-address

11.1.10 switchport port-security mac-address sticky

Function
To enable Sticky learning on the interface, use this command. To disable this function, use the
no form of this command.

Raisecom Proprietary and Confidential


626
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
switchport port-security mac-address sticky
no switchport port-security mac-address sticky

Parameters
N/A

Default conditions
Sticky learning on the interface is disabled.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure Sticky learning on the secure interface. When the
function is enabled, Sticky secure MAC addresses will take effect and will not be aged. All
secure MAC addresses will be converted to Sticky secure MAC addresses. When the function
is disabled, all Sticky secure MAC addresses will be converted to dynamic secure MAC
addresses.
Dynamic secure MAC addresses are acquired through learning. You can configure all learned
MAC addresses within the maximum number to secure MAC addresses. These secure MAC
addresses can be aged and can be converted to Sticky secure MAC address to make them not
aged.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable Sticky learning on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security mac-address
sticky

Raisecom Proprietary and Confidential


627
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Set successfully.

Related commands
show port-security mac-address

11.1.11 switchport port-security mac-address sticky vlan

Function
To configure Sticky secure MAC addresses, use this command. To disable this function, use
the no form of this command.

Format
switchport port-security mac-address sticky mac-address vlan vlan-id
no switchport port-security mac-address sticky mac-address vlan vlan-id

Parameters
Parameter Description
mac-address MAC address, in dotted hexadecimal notation
vlan-id VLAN ID, an integer, ranging from 1 to 4094

Default conditions
N/A

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure Sticky secure MAC addresses on the interface. Sticky
secure MAC addresses are configured manually on the secure interface or converted through
dynamic secure MAC addresses.
Sticky MAC addressed need to work with Sticky learning:
When Sticky learning is enabled, Sticky secure MAC addresses take effect and will not
be aged. The device supports loading Sticky secure MAC addresses when being booted.
When Sticky learning is disabled, Sticky security MAC addresses will be invalid and
only saved to the system.

Raisecom Proprietary and Confidential


628
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Prerequisite
N/A
Follow-up procedure
You can use switchport port-security mac-address sticky command to enable Sticky
security learning.
Precaution
N/A

Examples
This example shows how to configure Sticky secure MAC on interface 1/1/2 to
0000.0000.00001 and how to associate interface 1 with VLAN 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security mac-address
sticky 0000.0000.0001 vlan 1
Set successfully.

Related commands
show port-security mac-address

11.1.12 switchport port-security maximum

Function
To configure the maximum number of secure MAC addresses for the secure interface, use this
command. To return to the default condition, use the no form of this command.

Format
switchport port-security maximum maximum
no switchport port-security maximum

Parameters
Parameter Description
maximum Maximum number of secure MAC addresses, an integer, ranging from 1 to
1024

Default conditions
The maximum number of secure MAC addresses is 1.

Command mode
Physical layer interface configuration

Raisecom Proprietary and Confidential


629
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

User level
11

Usage guidelines
Scenario
You can use this command to configure the maximum number of secure MAC addresses for
the secure interface. When port security MAC is enabled, the number of secure MAC
addresses on the interface will not exceed the maximum number. If the maximum number is
exceeded, configurations will fail. The device will adopt a violation mode to deal with packets
with unknown source MAC addresses.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number is only used to restrict the number of security MAC addresses. It will
not affect the number of static MAC addresses configured by the MAC management module.
The static MAC addresses will still working normally based on "interface + VLAN".
When the maximum number is exceeded, configurations will fail.

Examples
This example shows how to configure the maximum allowed number of secure MAC
addresses on interface 1/1/2 to 10.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security maximum 10
Set successfully.

Related commands
show port-security

11.1.13 switchport port-security trap enable

Function
To enable port security MAC learning trap, use this command. To disable this function, use
the disable form of this command.

Format
switchport port-security trap { enable | disable }

Raisecom Proprietary and Confidential


630
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameters
Parameter Description
enable Enable port security MAC learning Trap
disable Disable port security MAC learning Trap

Default conditions
Port security MAC learning Trap is disabled.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
When port security MAC learning Trap is enabled, the secure interface will send a trap to the
NMS every time it learns a dynamic secure MAC address. The secure interface will not send
trap to the NMS when you manually configure a secure MAC address. The trap includes the
following information:
Learned secure MAC addresses
Related VLANs
Related Interfaces
Related secure MAC address type
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable security MAC learning Trap on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security trap enable
Set successfully.

Raisecom Proprietary and Confidential


631
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Related commands
show port-security

11.1.14 switchport port-security violation

Function
To configure port security violation action mode, use this command. To return to the default
condition, use the no form of this command.

Format
switchport port-security violation { protect | restrict | shutdown }
no switchport port-security violation

Parameters
Parameter Description
protect Protect the interface.
The secure port will discard packets from unauthorized users.
restrict Restrict packets.
The secure port will discard packets from unauthorized users, print Syslog
at console, and send a trap to the NMS.
shutdown Shut down the interface.
The secure port will discard packets from unauthorized users, print Syslog
information at console, send a trap to the NMS, and shut down the
interface.

Default conditions
The port security violation action mode is protect.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure port security violation action mode. The secure
interface will respond to the unauthorized accesses according to the violation action mode
configured.

Raisecom Proprietary and Confidential


632
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

When the maximum number of secure MAC addresses is exceeded, packets from unknown
MAC sources will be considered as a violation. The secure interface will respond to the
violation according to the configured violation action modes, as listed below:
Protect mode (protect): configure the violation action mode to "no learning, no
forwarding, no sending to the CPU" mode. The interface will discard packets from
unknown MAC sources and forward packets with secure MAC addresses only.
Restrict mode (restrict): configure the violation action mode to "no learning, no
forwarding, sending to the CPU" mode. The interface will send a trap and Syslog
information. The interface will forward packets with secure MAC addresses only.
Shutdown mode (shutdown): configure the violation action mode to "no learning, no
forwarding, sending to the CPU" mode. After sending a trap and Syslog information, the
interface will be shut down.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the violation actin mode of interface 1/1/2 to restrict.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#switchport port-security violation
restrict
Set successfully.

Related commands
show port-security

11.2 ACL
11.2.1 access-list

Function
To create and configure the ACL (Access Control List), use this command. To delete the ACL,
use the no form of this command.

Format
access-list acl-number [ name acl-name ]
no access-list { acl-number | name acl-name }

Raisecom Proprietary and Confidential


633
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameters
Parameter Description
acl-number Access control list number, an integer
Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration

mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter User ACL configuration mode.
Ranging from 6000 to 6999, enter IPv6 ACL configuration mode.
Ranging from 7000 to 7999, enter advanced ACL configuration mode.

name acl- ACL name, a string of 1 to 32 characters bytes.


name

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
N/A

Examples
This example shows how to create standard IP ACL and enter standard IP ACL configuration
mode.
Raisecom#config
Raisecom(config)#access-list 1001
Raisecom(config-acl-ip-std)#

This example shows how to create extended IP ACL and enter extend IP ACL configuration
mode.
Raisecom#config
Raisecom(config)#access-list 2001
Raisecom(config-acl-ip-ext)#

This example shows how to create User ACL and enter User ACL configuration mode.
Raisecom#config
Raisecom(config)#access-list 5001
Raisecom(config-acl-udf)#

Raisecom Proprietary and Confidential


634
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Related commands
show access-list

11.2.2 rule (standard IP ACL configuration mode)

Function
To configure standard IP ACL rules, use this command. To delete standard IP ACL rules, use
the no form of this command.

Format
rule [ rule-id ] { deny | permit } { source-ip-address source-ip-mask | any }
no rule rule-id

Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
source-ip-address Source IP address of the packet, in dotted decimal notation, such as
10.10.10.1
source-ip-mask Source IP mask of the packet, in dotted decimal notation, such as
255.255.255.0
any Match with any IP address.

Default conditions
N/A

Command mode
Basic IP ACL configuration

User level
11

Usage guidelines
Scenario
You can use this command to define the ACL rule.
Prerequisite
N/A

Raisecom Proprietary and Confidential


635
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.

Examples
This example shows how to configure rule 1001 in standard IP ACL configuration mode to
allow device with IP address of 192.168.27.27 to access.
Raisecom#config
Raisecom(config)#access-list 1001
Raisecom(config-acl-ip-std)#rule permit 192.168.27.27 255.255.255.0
Set successfully.

Related commands
show access-list

11.2.3 rule (extended IP ACLconfiguration mode)

Function
To configure extended IP ACL rules, use this command. To delete extended IP ACL rules, use
the no form of this command.

Format
rule [ rule-id ] { deny | permit } { protocol-id | icmp | igmp | ip } { source-ip-address
source-ip-mask | any } { destination-ip-address destination-ip-mask | any } [ dscp dscp-
value ] [ ttl ttl-value ] [ fragment ] [ precedence precedence-value ] [ tos tos-value ]
rule [ rule-id ] { deny | permit } { tcp | udp } { source-ip-address source-ip-mask | any }
[ source-port ] [ range minimum source port maximum source port ] { destination-ip-address
destination-ip-mask | any } [ destination-port ] [ ack ack-value ] [ dscp dscp-value ] [ fin fin-
value ] [ fragment ] [ precedence precedence-value ] [ psh psh-value ] [ range minimum
source port maximum source port ] [ rst rst-value ] [ syn syn-value ] [ tos tos-value ] [ urg
urg-value ] [ ttl ttl-value ]
no rule rule-id

Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.

Raisecom Proprietary and Confidential


636
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
protocol-id Protocol ID, an integer, ranging from 0 to 255
icmp ICMP
igmp IGMP
ip IP
source-ip-address Source IP address of the packet, in dotted decimal notation, such
as 10.10.10.1
source-ip-mask Source IP mask of the packet, in dotted decimal notation, such as
255.255.255.0
any Match with any IP address.
destination-ip-address Destination IP address of the packet, in dotted decimal notation,
such as 10.10.10.1
destination-ip-mask Destination IP mask of the packet, in dotted decimal notation,
such as 255.255.255.0
ack ack-value Match ACK bit, an integer, ranging from 0 to 1
fin fin-value Match FIN bit, an integer, ranging from 0 to 1
psh psh-value Match PSH bit, an integer, ranging from 0 to 1
rst rst-value Match RST bit, an integer, ranging from 0 to 1
syn syn-value Match SYN bit, an integer, ranging from 0 to 1
urg urg-value Match URG bit, an integer, ranging from 0 to 1
dscp dscp-value DSCP priority, an integer, ranging from 0 to 63
ttl ttl-value Packet lifetime, an integer, ranging from 1 to 255
icmp-type icmp-type- ICMP type, an integer, ranging from 0 to 255
value
precedence Priority used to match the packet, an integer, ranging from 0 to 7
precedence-value
tos tos-value TOS used to match the packet, an integer, ranging from 0 to 15
fragment fragment
tcp TCP
udp UDP
source-port Source port of the packet, an integer, ranging from 1 to 65535
destination-port Destination of the port, an integer, ranging from 1 to 65535

Raisecom Proprietary and Confidential


637
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
range minimum Source port batch configuration mode, used to configure the
source port maximum minimum and maximum number of source ports.
source port Minimum number of source ports, an integer, ranging from 1
to 65535
Maximum number of source ports, an integer, ranging from 1
to 65535

Default conditions
N/A

Command mode
Extended IP ACL configuration

User level
11

Usage guidelines
Scenario
You can use this command to define ACL rules.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.

Examples
This example shows how to configure rule 2001 in extended IP ACL mode to allow device of
192.168.27.27 to access device of 192.168.27.28 through ICMP.
Raisecom#config
Raisecom(config)#access-list 2001
Raisecom(config-acl-ipv4-advanced)#rule permit icmp 192.168.27.27
255.255.255.0 192.168.27.28 255.255.255.0
Set successfully.

This example shows how to configure rule 2002 in extended IP ALC mode to allow source
port 10000 of 192.168.27.27 to access destination port 10000 of 192.168.27.28 through TCP.
Raisecom#config

Raisecom Proprietary and Confidential


638
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Raisecom(config)#access-list 2002
Raisecom(config-acl-ipv4-advanced)#rule permit tcp 192.168.27.27
255.255.255.0 10000 192.168.27.28 255.255.255.0 10000
Set successfully.

Related commands
show access-list

11.2.4 rule (MAC ACL configuration mode)

Function
To configure MAC ACL rules, use this command. To delete MAC ACL rules, use the no form
of this command.

Format
rule [ rule-id ] { deny | permit } { source-mac-address source-mac-mask | any }
{ destination-mac-address destination-mac-mask | any } [ ethertype { ethertype [ ethertype-
mask ] | ip | arp } ] [ svlan svlanid ] [ cos cos-value ] [ cvlan cvlanid ] [ inner-cos inner-cos ]
no rule rule-id

Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
source-mac-address Source MAC address of physical frame, in dotted hexadecimal
notation, such as 000E.5E12.3456
source-mac-mask Source MAC mask of physical frame, in dotted hexadecimal
notation, such as FFFF.FFFF.FFFF
any Match any MAC address
destination-mac- Destination MAC address of physical frame, in dotted
address hexadecimal notation, such as 000E.5E12.3456
destination-mac-mask Destination MAC mask of physical frame, in dotted hexadecimal
notation, such as FFFF.FFFF.FFFF
ethertype ethertype Ethernet frame type, in hexadecimal notation, ranging from
0x0000 to 0xFFFF
ethertype-mask Ethernet frame type mask, in hexadecimal notation, ranging
from 0x0000 to 0xFFFF
ip IP
arp ARP

Raisecom Proprietary and Confidential


639
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
svlan svlanid SVLAN ID, an integer, ranging from 1 to 4094
cos cos-value CoS priority of SVLAN, an integer, ranging from 0 to 7
cvlan cvlanid CVLAN ID, an integer, ranging from 1 to 4094
inner-cos inner-cos CoS priority of CVLAN, an integer, ranging from 0 to 7

Default conditions
N/A

Command mode
MAC ACL configuration

User level
11

Usage guidelines
Scenario
You can use this command to define ACL rule.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.

Examples
This example shows how to configure rule 3001 in MAC ACL configuration mode to allow
device of 000E.5E12.3456 to access device of 000E.5E34.5678 through IP.
Raisecom#config
Raisecom(config)#access-list 3001
Raisecom(config-acl-mac)#rule 1 permit 000E.5E12.3456 FFFF.FFFF.FFFF
000E.5E34.5678 FFFF.FFFF.FFFF ethertype ip
Set successfully.

Related commands
show access-list

Raisecom Proprietary and Confidential


640
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.2.5 rule (User ACLconfiguration mode)

Function
To configure user ACL rules, use this command. To delete user ACL rules, use the no form of
this command.

Format
rule [ rule-id ] { deny | permit } { ipv4 | layer2 } rule-string rule-mask offset
no rule rule-id

Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.
ipv4 Offset starts from IPv4 packet head+20 bytes
layer2 Offset starts from protocol field
rule-string User-defined string, in hexadecimal notation, with even
characters
rule-mask User-defined string mask, in hexadecimal notation, with even
characters
offset Beginning field of the user-defined string, starts from the
physical frame, an integer, ranging from 22 to 37

Default conditions
N/A

Command mode
User ACL configuration

User level
11

Usage guidelines
Scenario
You can use this command to define ACL rules.
Prerequisite

Raisecom Proprietary and Confidential


641
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.

Examples
This example shows how to configure rule 5001 in user ACL configuration mode to allow
offset starts from protocol field. Packet with User-defined string being 2D, mask being FF and
offset being 22 is allowed to access.
Raisecom#config
Raisecom(config)#access-list 5001
Raisecom(config-acl-udf)#rule 1 permit layer2 2D FF 22
Set successfully.

Related commands
show access-list

11.2.6 rule (IPv6 ACLconfiguration mode)

Function
To configure IPv6 ACL rules, use this command. To delete IPv6 ACL rules, use the no form
of this command.

Format
rule [ rule-id ] { deny | permit } { protocol-id | ipv6 | icmpv6 } { source-ipv6-address/prefix
| any } { destination- ipv6-address/prefix | any } [ dscp dscp-value ] [ fragment ] [flow-label
flow label-value ]
rule [ rule-id ] { deny | permit } { tcp | udp } { source-ipv6-address/prefix source-ip-mask |
any } { destination- ipv6-address/prefix | any } [ destination-port ] [ ack ack-value ] [ dscp
dscp-value ] [ fin fin-value ] [ fragment ] [flow-label flow label-value ] [ psh psh-value ]
[ rst rst-value ] [ syn syn-value ] [ urg urg-value ]
no rule rule-id

Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.

Raisecom Proprietary and Confidential


642
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
protocol-id Protocol ID, an integer, ranging from 0 to 255
ipv6 IPv6
icmpv6 ICMPv6
source-ipv6- Source IPv6 address and prefix length of the packet, in colon
address/prefix hexadecimal notation
any Match any IP address.
destination- ipv6- Destination IPv6 address of the packet, in colon hexadecimal
address/prefix notation
ack ack-value Match ACK bit, an integer, ranging from 0 to 1
fin fin-value Match FIN bit, an integer, ranging from 0 to 1
psh psh-value Match PSH bit, an integer, ranging from 0 to 1
rst rst-value Match RST bit, an integer, ranging from 0 to 1
syn syn-value Match SYN bit, an integer, ranging from 0 to 1
urg urg-value Match URG bit, an integer, ranging from 0 to 1
dscp dscp-value DSCP priority, an integer, ranging from 0 to 63
flow-label flow label- Flow label, an integer, ranging from 0 to 1048575
value
fragment fragment
tcp TCP
udp UDP
source-port Source port of the packet, an integer, ranging from 1 to 65535
destination-port Destination port of the packet, an integer, ranging from 1 to
65535

Default conditions
N/A

Command mode
IPv6 ACL configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


643
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

You can use this command to define ACL rules.


Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.

Examples
This example shows how to configure rule 6001 in IPv6 ACL configuration mode to allow
device with IPv6 address of 1030:0::48AA:1A2B/60 to access all IPv6 address.
Raisecom#config
Raisecom(config)#access-list 6001
Raisecom(config-acl-ipv6)# rule 1 permit ipv6 1030:0::48AA:1A2B/60 any
Set successfully.

Related commands
show access-list

11.2.7 rule (Advanced ACLconfiguration mode)

Function
To configure Advanced ACL rules, use this command.

Format
rule [ rule-id ] { deny | permit } { source-mac-address source-mac-mask | any }
{ destination-mac-address destination-mac-mask | any } [ svlan svlanid ] [ cos cos-value ]
[ cvlan cvlanid ] [ inner-cos inner-cos ] { source-ip-address source-ip-mask | any }
{ destination-ip-address destination-ip-mask | any }[ dscp dscp-value ] [ ttl ttl-value ]
[ fragment ] [ precedence precedence-value ] [ tos tos-value ]
no rule rule-id

Parameters
Parameter Description
rule-id Rule ID, an integer, ranging from 1 to 65535
deny Deny access when the rule is matched.
permit Allow access when the rule is matched.

Raisecom Proprietary and Confidential


644
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
source-mac-address Source MAC address of physical frame, in dotted hexadecimal
notation, such as 000E.5E12.3456
source-mac-mask Source MAC address mask of physical frame, in dotted
hexadecimal notation, such as FFFF.FFFF.FFFF
any Match any MAC address
destination-mac- Destination MAC address of physical frame, in dotted
address hexadecimal notation, such as 000E.5E12.3456
destination-mac-mask Destination MAC address mask of physical frame, in dotted
hexadecimal notation, such as FFFF.FFFF.FFFF
svlan svlanid SVLAN ID, an integer, ranging from 1 to 4094
cos cos-value SVLAN CoS priority, an integer, ranging from 0 to 7
cvlan cvlanid CVLAN ID, an integer, ranging from 1 to 4094
inner-cos inner-cos CVLAN CoS priority, an integer, ranging from 0 to 7
source-ip-address Source IP address of the packet, in dotted decimal notation such
as 10.10.10.1
source-ip-mask Source IP address mask of the packet, in dotted decimal
notation, such as 255.255.255.0
dscp dscp-value DSCP priority, an integer, ranging from 0 to 63
ttl ttl-value Packet lifetime, an integer, ranging from 1 to 255
precedence Priority used to match packet, an integer, ranging from 0 to 7
precedence-value
tos tos-value TOS priority used to match packet, an integer, ranging from 0 to
15
fragment Fragment

Default conditions
N/A

Command mode
Advanced ACL configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


645
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

You can use this command to define ACL rules.


Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The maximum number of rules for each list is 32. 1000 lists can have 3200 rules in total.
Any rule should not contradict with other configured rules.
If the ACL is currently in use, relevant rules cannot be edited.

Examples
This example shows how to configure rule 7001 in advanced ACL configuration mode to
allow device with IP address of 192.168.1.2 and MAC address of 000E.5E12.3456 to access
device with IP address of 192.168.1.5 and MAC address of 000E.5E34.5678.
Raisecom#config
Raisecom(config)#access-list 7001
Raisecom(config-acl-advanced)#rule 1 permit 000E.5E12.3456 FFFF.FFFF.FFFF
000E.5E34.5678 FFFF.FFFF.FFFF 192.168.1.2 255.255.255.0 192.168.1.5
255.255.255.0
Set successfully.

Related commands
show access-list

11.2.8 show acl resource

Function
To show ACL resource information, use this command.

Format
show acl resource { egress | ingress } interface-type interface-number

Parameters
Parameter Description
interface-type Enable DHCP Snooping on specified interface.
interface-number The interface-type means interface type.
The interface-number means interface list.
egress Egress
ingress Ingress

Raisecom Proprietary and Confidential


646
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show ACL resource.
Raisecom#show acl resource egress interface gigaethernet 1/1/2
Free Resource Number:0
Resource Reserved Configured Remaining
Type Number Number Number
------------------------------------------------
MAC 0 0 0
IP 0 0 0
IPv6 0 0 0
Advanced 0 0 0

The following table describes fields in the command output.

Field Description
Free Resource Number Number of free resource
Resource Type Resource type
Reserved Number Number of reserved resource
Configured Number Number of configured resource
Remaining Number Number of remaining resource

Related commands
N/A

11.2.9 filter access-list

Function
To apply ACL to the interface, use this command. To disable this function, use the no form of
this command.

Raisecom Proprietary and Confidential


647
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
filter ingress access-list acl-number [ statistics ]
no filter ingress access-list acl-number

Parameters
Parameter Description
ingress Apply ACL to the ingress direction.
access-list Access control list number, an integer
acl-number Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration

mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter user ACL configuration mode.
Ranging from 6000 to 6999, enter IPv6 ACL configuration mode.
Ranging from 7000 to 7999, enter advanced ACL configuration mode.

statistics Enable ACL statistics.

Default conditions
N/A

Command mode
Physical interface configuration mode/Aggregation group interface configuration/VLAN
interface configuration mode.

User level
15

Usage guidelines
Scenario
To bring the defined ACL rules into effect, apply the rule to the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
ACL rules cannot be changed after applied to the interface. To change ACL rules, use the
no form of the command to delete the configurations.
The number of ACL rules should be greater than 0.

Raisecom Proprietary and Confidential


648
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to apply ACL rule 1001 to the ingress direction of interface 1.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#filter ingress access-list 1001
Set successfully.

Related commands
show access-list

11.2.10 clear filter statistics interface

Function
To clear statistics of ACL, use this command.

Format
clear filter statistics interface interface-type interface-number ingress [ access-list acl-
number ]

Parameters
Parameter Description
interface-type Interface type
interface- Interface ID
number The form and value range depend on the interface type.
ingress Clear statistics on ingress direction.
access-list acl- Access control list number, an integer
number Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration

mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter user ACL configuration mode.

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


649
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
You can use this command to clear statistics of ACL.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear ACL statistics on gigabit interface 1.
Raisecom#config
Raisecom(config)#clear filter statistics interface gigaethernet 1/1/1
ingress
Set successfully.

Related commands
show access-list

11.2.11 show filter interface

Function
To show filter information, use this command.

Format
show filter interface
show filter interface interface-type interface-number ingress
show filter statistics interface interface-type interface-number ingress access-list acl-
number

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
statistics statistics

Raisecom Proprietary and Confidential


650
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
ingress Clear statistics on ingress direction.
access-list acl- Access control list number, an integer
number Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration

mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter user ACL configuration mode.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
11

Usage guidelines
N/A

Examples
This example shows how to show filter information on gigabit interface 1.
Raisecom#show filter interface gigaethernet 1/1/1
Interface Direction Acl-Num
-----------------------------------------
gigaethernet1/1/1 ingress 1001

The following table describes fields in the command output.

Field Description
Interface Interface
Direction Direction
Acl-Num ACL number
RuleId Filter rule ID

This example shows how to show statistics of the filter.


Raisecom#show filter statistics interface gigaethernet 1/1/1 ingress
access-list 1001
Interface Direction Acl-Num RuleId Access Bytes Pkts
-------------------------------------------------------------------------
------

Raisecom Proprietary and Confidential


651
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

GE1/1/1 ingress 1001 10 permit 0 0

The following table describes fields in the command output.

Field Description
Interface Interface
Direction Direction
Acl-Num ACL number
RuleId Filter rule ID
Access Type
Bytes Byte
Pkts Packet

Related commands
N/A

11.2.12 show access-list

Function
To show Access-List, use this command.

Format
show access-list [acl-number | name acl-name ]

Parameters
Parameter Description
acl-number Access control list number, an integer
Ranging from 1000 to 1999, enter standard IP ACL configuration
mode.
Ranging from 2000 to 2999, enter extended IP ACL configuration

mode.
Ranging from 3000 to 3999, enter MAC ACL configuration mode.
Ranging from 5000 to 5999, enter user ACL configuration mode.

name acl-name Access control list name, a string of 1 to 32 characters bytes

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


652
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

User level
5

Usage guidelines
N/A

Examples
You can use this command to show Access-List information.
Raisecom(config)#show access-list
Acl RuleCount InUse Type Name
-------------------------------------------------------------------------
------
1000 1 Yes IPv4-Std --
1001 0 No IPv4-Std --
2000 0 No IPv4-Ext --
2001 0 No IPv4-Ext --
2002 0 No IPv4-Ext --
3000 0 No Mac --
5000 0 No Udf --
6000 1 No IPv6 -a6-
7000 1 No Advanced --

The following table describes fields in the command output.

Field Description
ACL ACL number
RuleCount Number of rules
InUse Application
Type Type
Name Name

Related commands
N/A

11.3 Dynamic ARP inspection


11.3.1 ip arp-inspection binding

Function
To configure the static APR table rule, use this command. To disable this function, use the no
form of this command.

Raisecom Proprietary and Confidential


653
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
ip arp-inspection binding ip-address [ mac-address ] [ vlan vlan-id ] interface-type
interface-number
no ip arp-inspection binding { ip-address | all [interface-type interface-number ] }

Parameters
Parameter Description
ip-address Binding IP address, in dotted decimal notation, such as 10.0.0.1
mac-address Binding MAC address, in dotted hexadecimal notation, such as
000E.5E12.3456
vlan vlan-id Binding VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface- Interface ID
number The form and value range depend on the interface type.
all All binding interfaces

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the static ARP binding table rule. The binding IP
address and the binding interface are required. You cannot configure two static binding rules
for one IP address. If you configure a new dynamic binding rule for an IP address that already
had a dynamic binding rule, the new one will replace the formal one.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Enable static APR binding on the device, or the configured static binding rule will not take
effect.

Raisecom Proprietary and Confidential


654
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to configure the static binding rule of interface 1/1/2 with IP address
of 10.0.0.1 and VLAN 10 associated.
Raisecom#config
Raisecom(config)#ip arp-inspection binding 10.0.0.1 vlan 10 gigaethernet
1/1/2
Set successfully

Related commands
show ip arp-inspection

11.3.2 ip arp-inspection dhcp-snooping

Function
To enable ARP binding, use this command. To disable this function, use the no form of this
command.

Format
ip arp-inspection dhcp-snooping
no ip arp-inspection dhcp-snooping

Parameters
N/A

Default conditions
Dynamic ARP binding is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use dynamic ARP inspection to separate unsecure APR packets and prevent ARP
spoofing attack.
Dynamic binding works with DHCP Snooping to form dynamic binding relations. When
dynamic DHCP Snooping is enabled, the contents in the DHCP Snooping binding table will
be learned to the dynamic ARP binding table. Changes in DHCP Snooping entries will be
synchronized to dynamic binding entries.

Raisecom Proprietary and Confidential


655
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Prerequisite
You can used the ip dhcp snooping command to enable DHCP Snooping
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable ARP binding.
Raisecom#config
Raisecom(config)#ip arp-inspection dhcp-snooping
Set successfully

Related commands
ip dhcp snooping
show ip arp-inspection

11.3.3 ip arp-inspection static-config

Function
To enable static ARP binding, use this command. To disable this function, use the no form of
this command.

Format
ip arp-inspection static-config
no ip arp-inspection static-config

Parameters
N/A

Default conditions
Static ARP binding is disabled.

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


656
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
You can use dynamic ARP inspection to prevent ARP spoofing attack and separate unsecure
APR packets. Whether ARP packets be trusted or not depends on the trust status of the
interface and whether the packets meet the requirements is decided by the binding table.
You can manually configure static binding. When static ARP binding is enabled, static ARP
inspection binding rules configured on the device will take effect immediately.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable static ARP binding.
Raisecom#config
Raisecom(config)#ip arp-inspection static-config
Set successfully

Related commands
ip arp-inspection binding
show ip arp-inspection

11.3.4 ip arp-inspection trust

Function
To configure the interface to dynamic ARP inspection trusted interface, use this command. To
configure the interface to untrusted interface, use the no form of this command.

Format
ip arp-inspection trust
no ip arp-inspection trust

Parameters
N/A

Default conditions
The interface is untrusted interface and do not trust ARP packets.

Raisecom Proprietary and Confidential


657
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
When static or dynamic ARP binding is enabled:
Trusted interface will stop ARP inspection and allow all ARP packets to pass.
Untrusted interface will provide the interface with ARP protection. Packets that meet the
requirements of the binding table rules are allowed to pass. Packets do not meet the
requirements will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface 1/1/2 to dynamic ARP inspection trusted
interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip arp-inspection trust
Set successfully

Related commands
show ip arp-inspection

11.3.5 ip arp-inspection vlan

Function
To configure dynamic ARP inspection protection VLAN, use this command. To disable this
function, use the no form of this command.

Format
ip arp-inspection vlan vlan-list

Raisecom Proprietary and Confidential


658
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

no ip arp-inspection vlan [ vlan-list ]

Parameters
Parameter Description
vlan vlan-list Protection VLAN ID list, an integer, ranging from 1 to 4094
Support multiple VLAN input, such as "1, 2, and 3".
Support VLAN range input, such as "1-3".

Default conditions
Dynamic ARP inspection protection, protecting all VLANs

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure dynamic ARP inspection to protect specified VLAN.
When the command is executed, untrusted interface VLAN will be protected. APR packets
that meet the requirements of the binding table rules will be allowed to pass, other packets
will be discarded.
Use the no ip arp-inspection vlan command to delete certain or all protection VLAN
configurations. ARP protection for VLAN will be stopped.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
All VLANs protection is based on interface configuration, with each interface automatically
generates 1 ACL. In part VLAN protection, each interface will generate 1 ACL for each
protected VLAN. For this reason, redundant protection VLAN list is not recommended.

Examples
This example shows how to configure ARP protection VLAN to VLAN 1 to VLAN 3.
Raisecom#config
Raisecom(config)#ip arp-inspection vlan 1-3
Set successfully

Raisecom Proprietary and Confidential


659
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Related commands
show ip arp-inspection

11.3.6 ip arp-rate-limit enable

Function
To enable rate limiting on ARP packets on the interface, use this command. To disable this
function, use the disable form of this command.

Format
ip arp-rate-limit { enable | disable }

Parameters
Parameter Description

enable Enable rate limiting on ARP packets on the interface.


disable Disable rate limiting on ARP packets on the interface.

Default conditions
The rate limiting on ARP packets on the interface is disabled.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use rate limiting on ARP packets to prevent mass ARP packets attack. If the attacker
sends too much ARP packets to the interface of the device, a CPU overload may occur. This
may affect the normal operation of the system or even cause device breakdown.
You can enable rate limiting on ARP packets to configure the maximum number of ARP
packets received per second on the interface. If the number exceeds the threshold, the device
will regard the interface as under attack and will discard all ARP packets on the interface to
avoid further attack.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


660
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Precaution
N/A

Examples
This example shows how to how to enable rate limiting on ARP packets on interface 1/1/2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip arp-rate-limit enable
Set successfully

Related commands
show ip arp-rate-limit

11.3.7 ip arp-rate-limit rate

Function
To configure the threshold of rate limiting on ARP packets, use this command. To return to
the default condition, use the no form of this command.

Format
ip arp-rate-limit rate rate-value
no ip arp-rate-limit rate

Parameters
Parameter Description
rate-value Threshold, an integer, ranging from 1 to 1000 packet/s

Default conditions
The threshold of the ARP packets is 100 packet/s.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can configure the threshold of rate limiting on ARP packets to configure the maximum
number of ARP packets received per second on the interface. If the number exceeds the

Raisecom Proprietary and Confidential


661
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

threshold, the device will regard the interface as under attack and will discard all ARP packets
on the interface to prevent further attack.
Prerequisite
Use the ip arp rate limit enable command to enable ARP packets rate limiting.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the threshold of rate limiting on ARP packets of
interface 1/1/2 to 200 packet/s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip arp-rate-limit rate 200
Set successfully

Related commands
show ip arp-rate-limit

11.3.8 ip arp-rate-limit recover enable

Function
To enable ARP packets rate limiting automatic recovery on the interface, use this command.
To disable this function, use the disable form of this command.

Format
ip arp-rate-limit recover { enable | disable }

Parameters
Parameter Description

enable Enable ARP packets rate limiting automatic recovery.


disable Disable ARP packets rate limiting automatic recovery.

Default conditions
ARP packets rate limiting automatic recovery on the interface is disabled.

Command mode
Global configuration

Raisecom Proprietary and Confidential


662
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

User level
11

Usage guidelines
Scenario
You can enable this function to enable ARP packets rate limiting automatic recovery on the
interface. When the automatic recovery time expires, the interface will recover to its original
status and allow ARP packets to pass.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable ARP packets rate limiting automatic recovery on the
interface.
Raisecom#config
Raisecom(config)#ip arp-rate-limit recover enable
Set successfully

Related commands
show ip arp-rate-limit

11.3.9 ip arp-rate-limit recover time

Function
To configure the automatic recovery time, use this command. To return to the default
condition, use the no form of this command.

Format
ip arp-rate-limit recover time time
no ip arp-rate-limit recover time

Parameters
Parameter Description
time Automatic recovery time, an integer, ranging from 10 to 3600 s

Raisecom Proprietary and Confidential


663
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
The automatic recovery time is 30s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the automatic recovery time on the interface.
When the automatic recovery time expires, the attacked interface will recover to its normal
status and allow ARP packets to pass.
Prerequisite
Use the ip arp-rate-limit recover enable command to enable automatic recovery on the
interface.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the automatic recovery time to 100s.
Raisecom#config
Raisecom(config)#ip arp-rate-limit recover time 100
Set successfully

Related commands
ip arp-rate-limit recover enable
show ip arp-rate-limit

11.3.10 show ip arp-inspection

Function
To show dynamic ARP inspection configurations, use this command.

Raisecom Proprietary and Confidential


664
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
show ip arp-inspection

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show dynamic ARP inspection configurations, including static
ARP binding status, dynamic DHCP Snooping binding status, protected VLAN of dynamic
ARP inspection, number of binding rules, ACLs, remnant ACLs and trusted ARP packets
configurations on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show status of ARP binding table rules and trusted ARP packets.
Raisecom#show ip arp-inspection
Static Config ARP Inspection: Disable
DHCP Snooping ARP Inspection: Disable
ARP Inspection Vlan: All
Bind Rule Num : 0
Vlan Acl Num : 0
Remained Acl Num : 512

Port Trust
--------------------------
P1 yes

Raisecom Proprietary and Confidential


665
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

P2 no
P3 no
P4 no

The following table describes fields in the command output.

Field Description
Static Config ARP Inspection Static ARP inspection status
Enable: enabled
Disable: disabled
DHCP Snooping ARP Inspection Dynamic ARP inspection status
Enable: enabled
Disable: disabled
ARP Inspection Vlan ARP inspection protection VLAN
Bind Rule Num Number of ARP binding entries
Vlan Acl Num Number of VLAN ACL entries
Remained Acl Num Number of remnant ACL entries
Port Interface ID
Trust Trust status
Yes: trusted interface
No: untrusted interface

Related commands
N/A

11.3.11 show ip arp-inspection binding

Function
To show the ARP binding table information, use this command.

Format
show ip arp-inspection binding [ interface-type interface-number ]

Parameters
Parameter Description
port port-id Interface ID, an integer, ranging from 1 to the maximum Interface ID

Default conditions
N/A

Raisecom Proprietary and Confidential


666
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show the ARP binding table information, including all the rules
in the dynamic ARP inspection table, the number of current rules and the maximum number
of the rules in history.
You can use this command to show dynamic ARP inspection binding table rules on specified
interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show ARP binding table information.
Raisecom#show ip arp-inspection binding
Ip Address Mac Address VLAN Port Type Inhw
---------------------------------------------------------------------
10.0.0.1 -- 10 port1 static no

Current Rules Num: 1


History Max Rules Num: 1

The following table describes fields in the command output.

Field Description
Ip Address IP address
Mac Address MAC address
VLAN VLAN ID
Port Interface ID
Type Type
Static: static binding
DHCP-snooping: dynamic binding

Raisecom Proprietary and Confidential


667
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Field Description
Inhw Whether write to the hardware
yes: write to the hardware
no: not write to the hardware
Current Rules Num Number of current rules
History Max Rules Num Number of maximum rules in history

Related commands
N/A

11.3.12 show ip arp-rate-limit

Function
To show the Configurations of rate limiting on ARP packets, use this command.

Format
show ip arp-rate-limit

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show Configurations of rate limiting on ARP packets, including
global automatic recovery status, automatic recovery time, ARP rate limiting status, ARP
limiting rate and ARP limiting rate status.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


668
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

N/A
Precaution
N/A

Examples
This example shows how to show Configurations of rate limiting on ARP packets.
Raisecom#show ip arp-rate-limit
arp rate limit auto recover: disable
arp rate limit auto recover time: 30 second
Port Enable-Status Rate(Num/Sec) Overload
--------------------------------------------------
1 Enabled 100 Yes
2 Disabled 100 No
3 Disabled 100 No
4 Disabled 100 No
5 Disabled 100 No
6 Disabled 100 No

28 Disabled 100 No

The following table describes fields in the command output.

Field Description
arp rate limit auto recover ARP rate limiting automatic recovery status
Enable: enabled
Disable: disabled
arp rate limit auto recover time ARP rate limiting automatic recovery time
Port Interface ID
Enable-Status ARP packets rate limiting status
Enabled: enabled
Disabled: disabled
Rate(Num/Sec) Rate (packet/s)
Overload Overload status
Yes: overload
No: not overload

Related commands
N/A

Raisecom Proprietary and Confidential


669
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.4 RADIUS/TACACS+
11.4.1 aaa accounting fail

Function
To configure processing modes for accounting failure, use this command.

Format
aaa accounting fail { online | offline }

Parameters
Parameter Description
online Allow login.
offline Disallow login.

Default conditions
The processing mode for accounting failure is online.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use this command to configure processing modes for accounting failure.
Online: you are allowed to log in to the device when successfully authenticated but
failed to connect to the RADIUS/TACACS+ sever.
Offline: you are not allowed to login in to the device when successfully authenticated but
failed to connect to the RADIUS/TACACS+ sever.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This configuration only applies to users who configure processing modes before
authenticating through the RADIUS/TACACS+ server.

Raisecom Proprietary and Confidential


670
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to configure the processing mode of accounting failure to offline.
Raisecom#aaa accounting fail offline
Set successfully.

Related commands
show radius-server
show tacacs-server

11.4.2 aaa accounting login enable

Function
To enable RADIUS/TACACS+ accounting, use this command. To disable this function, use
the disable form of this command.

Format
aaa accounting login { enable | disable }

Parameters
Parameter Description
enable Enable RAUIUS/TACACS+ accounting.
disable Disable RADIUS/TACACS+ accounting.

Default conditions
RADIUS/TACACS+ accounting is disabled.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use this command to enable or disable the RADIUS/TACACS+ accounting. When
you log in to the device, the RADIUS/TACACS+ server will send a Start packet to start
accounting. During the login, the server will keep sending Update packets to update
accounting. When you log out of the device, the server will send a Stop packet to stop
accounting. The packets will contain the login and logout time. Through sending packets, the
RADIUS/TACACS server can record the access time and operation of each user.

Raisecom Proprietary and Confidential


671
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable RADIUS/TACACS+ accounting.
Raisecom#aaa accounting login enable
Set successfully.

Related commands
show radius-server
show tacacs-server

11.4.3 aaa accounting update

Function
To configure a period for sending accounting update packets, use this command. To return to
the default condition, use the no form of this command.

Format
aaa accounting update minute
no aaa accounting update

Parameters
Parameter Description
update minute Period, an integer, ranging from 0 to 300min

Default conditions
The period is 0, which means no update packet is sent.

Command mode
Privileged EXEC

User level
15

Raisecom Proprietary and Confidential


672
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
You can use this command to configure the period for sending accounting update packets.
With the value being 0: the client will send a start packet to the server when the user logs
in to the device and a stop packet when the user logs out of the device. The client will
not send any update packet.
With the value not being 0: Except for the start packet and the stop packet, the server
will also send update packets periodically.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the period for sending accounting update packets to 10
minutes.
Raisecom#aaa accounting update 10
Set successfully.

Related commands
show radius-server
show tacacs-server

11.4.4 aaa command authorize enable

Function
To enable RADIUS authentication through command line, use this command. To disable this
function, use the disable form of this command.

Format
aaa command authorize{ enable | disable }

Parameters
Parameter Description
enable Enable RADIUS authentication through command line.
disable Disable RADIUS authentication through command line.

Raisecom Proprietary and Confidential


673
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
RADIUS authentication through command line is disabled.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use this command to enable/disable RADIUS authentication through command line.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable RADIUS authentication through command line.
Raisecom#aaa command authorize enable
Set successfully.

Related commands
N/A

11.4.5 clear tacacs statistics

Function
To clear statistics of TACACS, use this command.

Format
clear tacacs statistics

Parameters
N/A

Raisecom Proprietary and Confidential


674
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
N/A

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
You can use this command to clear statistics of TACACS.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear all statistics of TACACS. Use it with caution.

Examples
This example shows how to clear statistics of TACACS.
Raisecom#clear tacacs statistics
Set successfully.

Related commands
N/A

11.4.6 enable login

Function
To configure authentication mode for enter privileged EXEC mode through common mode,
use this command.

Format
enable login { local-tacacs | tacacs-local | tacacs-user }

Raisecom Proprietary and Confidential


675
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameters
Parameter Description
local-tacacs When local authentication coexists with TACACS+ authentication, use
local authentication.
tacacs-local When local authentication coexists with TACACS+ authentication, use
TACACS+ authentication.
tacacs-user Use TACACS+ authentication.

Default conditions
The authentication mode for entering privileged EXEC mode from common mode is local
authentication.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
After being authenticated and authorized, privileged users can log in to the network, and
obtain network resources. All the authentication and authorization information will be stored
in the remote RADIUS server, the remote TACACS+ server, or the local device. You can use
this command to configure the authentication mode for privileged user.
Prerequisite
Ensure the authentication server already has information of the privileged user (user name and
password), or you cannot log in to the device.
Follow-up procedure
N/A
Precaution
The newly-configured login mode will take effect next time you log in to the device.
To use Radius/TACACS+ authentication, ensure that the server and the device are
properly connected and the server already has your information, or you cannot log in to
the device.

Examples
This example shows how to enter privileged EXEC mode through local authentication.
Raisecom#enable login local-tacacs
Set User Login Method successfully

Raisecom Proprietary and Confidential


676
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Related commands
show user

11.4.7 radius

Function
To configure the IP address and interface ID for the RADIUS authentication server, use this
command. To return to the default condition, use the no form of this command.

Format
radius [ backup ] ip-address [ auth-port port-id ] [ vpn-instance vrf-name ] [ sourceip ip-
address ]
no radius [ backup ]

Parameters
Parameter Description
Select backup: configure the IP address for the backup RADIUS
backup
authentication server.
Not select backup: configure the IP address for the working

RADIUS authentication server.


ip-address IP address, in dotted decimal notation, such as 10.10.10.1
sourceip ip-address Source IP address, in dotted decimal notation, such as 10.10.10.1

Default conditions
The IP address for the RADIUS authentication server is not configured. The authentication
interface ID is 1812.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
AAA stands for authentication, authorization, and accounting. AAA supports several
protocols including RADIUS. Generally, the working RADIUS server is used. When the
working server fails to response, the backup server will be used. You can use this command to
configure the IP address and the interface ID for the RADIUS authentication server.
Prerequisite

Raisecom Proprietary and Confidential


677
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the IP address for the RADIUS authentication server
to 10.0.0.1 and interface ID to 1000.
Raisecom#radius 10.0.0.1 auth-port 1000
Set successfully.

Related commands
show radius-server

11.4.8 radius accounting-server

Function
To configure the IP address and interface ID for the RADIUS accounting server, use this
command. To return to the default condition, use the no form of this command.

Format
radius [ backup ] accounting-server ip-address [ account-port ] [ sourceip ip-address ]
no radius [ backup ] accounting-server

Parameters
Parameter Description
Select backup: configure the IP address for the backup
backup
RADIUS accounting server.
Not select backup: configure the IP address for the working

RADIUS accounting server.


accounting-server ip- IP address of the RADIUS accounting server, in dotted
address decimal notation, such as 10.10.10.1
account-port UDP ID of the RADIUS accounting server, an integer,
ranging from 1 to 65535
sourceip ip-address Source IP address, in dotted decimal notation, such as
10.10.10.1

Default conditions
The IP address for the RADIUS accounting server is 0.0.0.0. The interface ID is 1813.

Raisecom Proprietary and Confidential


678
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
AAA stands for authentication, authorization, and accounting. AAA supports several
protocols including RADIUS. Generally, the working RADIUS server is used. When the
working server fails to response, the backup server will be used.
The RADIUS server will start accounting when you successfully log in to the device. You can
use this command to configure the IP address and interface ID for the RADIUS accounting
server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the IP address for the RADIUS accounting server to
10.10.10.1, and interface ID to 1000.
Raisecom#radius accounting-server 10.10.10.1 1000
Set successfully.

Related commands
show radius-server

11.4.9 radius accounting-server key

Function
To configure the shared key of the RADIUS accounting server, use this command. To return
to the default condition, use the no form of this command.

Format
radius accounting-server key string
no radius accounting-server key

Raisecom Proprietary and Confidential


679
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameters
Parameter Description
key string Key string, a string of 1 to 200 characters

Default conditions
The shared key of the RADIUS accounting server is null.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
Generally, users are connected to the Network Access Server (NAS) and NAS is connected to
the RADIUS server or the TACACS+ server. The device functions as a NAS. It is responsible
for passing authentication and accounting information to the RADIUS server, using the
RADIUS protocol. Authenticates users can acquire authorities to access network or utilize
network resources. To prevent users' passwords from being snooped when they are
transmitted across insecure network, the NAS and the RADIUS server use a shared key to
communicate. You can use this command to configure the shared key of the RADIUS
accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the shared key of RADIUS accounting server to
Raisecom.
Raisecom#radius accounting-server key raisecom
Set successfully.

Related commands
show radius-server

Raisecom Proprietary and Confidential


680
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.4.10 radius-key

Function
To configure the shared key of RADIUS authentication server, use this command. To return to
the default condition, use the no form of this command.

Format
radius-key string
no radius-key

Parameters
Parameter Description
string Key string, a string of 1 to 200 characters

Default conditions
The shared key of the RADIUS authentication server is null.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
Generally, users are connected to the Network Access Server (NAS) and NAS is connected to
the RADIUS server or the TACACS+ server. The device functions as a NAS. It is responsible
for passing authentication and accounting information to the RADIUS server, using the
RADIUS protocol. Authenticates users can acquire authorities to access network or utilize
network resources. To prevent users' passwords from being snooped when they are
transmitted across insecure network, the NAS and the RADIUS server use a shared key to
communicate. You can use this command to configure the shared key of the RADIUS
accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


681
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to configure the shared key of the RADIUS authentication server to
raisecom.
Raisecom#radius-key raisecom
Set successfully.

Related commands
show radius-server

11.4.11 show aaa

Function
To show RADIUS/TACACS+ accounting information, use this command.

Format
show aaa

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
15

Usage guidelines
Scenario
You can use this command to show RADIUS/TACACS+ accounting information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


682
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to show RADIUS accounting information.
Raisecom#show aaa
Accounting login : enable
Update interval(m) : 0
Accounting fail policy : online
dot1x user login method: radius

The following table describes fields in the command output.

Field Description
Accounting login RADIUS accounting status
Update interval(m) Update period
Accounting fail policy Processing mode for accounting failure
dot1x user login method Dot1x user authentication mode

Related commands
radius key
aaa accounting login
aaa accounting update
aaa accounting fail

11.4.12 show radius-server

Function
To show configurations of the RADIUS server, use this command.

Format
show radius-server

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


683
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

User level
15

Usage guidelines
N/A

Examples
This example shows how to show RADIUS server configurations
Raisecom#show radius-server
Authentication server IP: 0.0.0.0 port:1812
Backup authentication server IP:0.0.0.0 port:1812
Authentication server key:
Accounting server IP: 0.0.0.0 port:1813
Backup accounting server IP: 0.0.0.0 port:1813
Accounting server key:
Accounting login: disable
Update interval(min.): 0
Accounting fail policy: online

The following table describes fields in the command output.

Field Description
Authentication server IP IP address of the authentication server
Backup authentication server IP IP address of the backup authentication server
Authentication server key Shared key of the authentication server
Accounting server IP IP address of the accounting server
Backup accounting server IP IP address of the backup accounting server
Accounting server key Shared key of the accounting server
Accounting login Accounting status
Update interval Update period
Accounting fail policy Processing mode for accounting failure

Related commands
N/A

11.4.13 show tacacs-server

Function
To show configurations of the TACACS+ server, use this command.

Raisecom Proprietary and Confidential


684
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
show tacacs-server

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
15

Usage guidelines
N/A

Examples
This example shows how to show configurations of the TACACS+.
Raisecom#show tacacs-server
Server Address: --
Backup server Address: 10.0.0.1
Sever Shared Key: raisecom
Accounting server Address: --
Backup Accounting server Address: --
Total Packet Sent: 0
Total Packet Recv: 0
Num of Error Packets: 0

The following table describes fields in the command output.

Field Description
Server Address Server address
Backup Server Address Backup server address
Sever Shared Key Shared key of the server
Accounting server Address Accounting server address
Backup Accounting server Address Backup accounting server address
Total Packet Sent Total number of sent packets
Total Packet Recv Total number of received packets

Raisecom Proprietary and Confidential


685
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Field Description
Num of Error Packets Number of error packets

Related commands
N/A

11.4.14 show user

Function
To show user information on the device, use this command.

Format
show user { active | table }

Parameters
Parameter Description
active Show information about logged-in users.
table Show user information table.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show logged-in user information.
Raisecom#show user active
Username : raisecom
Priority : 15
Server IP : --
Terminal IP : 0.0.0.0
Login Type : telnet-1

Raisecom Proprietary and Confidential


686
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Login Time : 2106-02-06,21:09:39


Current Login : Y

The following table describes fields in the command output.

Field Description
Username User name
Priority Priority
User of higher priority value has greater privileges and can use more
command lines.
Server IP IP address of the server
Terminal IP IP address of the terminal
Login Type User login type:
Telnet
Console
Ssh

Login Time Login time


Current Login Current login status

This example shows how to show detailed information of the user information table.
Raisecom#show user table detail
User Login :local-user
Enable Login:local-user
Enable Authen:bypass

Username:1
Priority:5
Server :Local
Login :telnet
Status :online

Username:raisecom
Priority:15
Server :Local
Login :--
Status :offline

The following table describes fields in the command output.

Field Description
User Login Authentication mode for user login
Enable Login Login mode to enter privileged EXEC mode
Enable Authen Authentication mode to enter privileged EXEC mode
Username User name

Raisecom Proprietary and Confidential


687
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Field Description
Priority User priority, ranging from 0 to 15
User of higher priority value has greater privileges and can use
more command lines.
Server User login authentication mode
Local: authenticate through local user name and password.
Radius: authentication through user name and password on the
RADIUS server
TACACS+: authentication through user name and password on

the TACACS+ server


Login User login type
Telnet
Console
Ssh

Status User login status


Online
Offline

Related commands
N/A

11.4.15 tacacs accounting-server

Function
To configure the IP address for the TACACS+ accounting server, use this command. To return
to the default condition, use the no form of this command.

Format
tacacs [ backup ] accounting-server ip-address
no tacacs [ backup ] accounting-server

Parameters
Parameter Description
Select backup: Configure the IP address for the backup
backup
TACACS+ accounting server.
Not select backup: Configure the IP address for the working

TACACS+ accounting server.


accounting-server ip- IP address, in dotted decimal notation, such as 10.10.10.1
address

Default conditions
The IP address of the TACACS+ accounting server is null.

Raisecom Proprietary and Confidential


688
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
AAA stands for authentication, authorization, and accounting. AAA supports several
protocols including TACACS+.
Generally, the working TACACS+ server is used. When the working server fails to response,
the backup server will be used. The TACACS+ server will start accounting when you
successfully log in to the device. You can use this command to configure the IP address for
the working or backup TACACS+ accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the IP address for the TACACS+ accounting server to
10.0.0.1.
Raisecom#tacacs accounting-server 10.0.0.1
Set successfully.

Related commands
show tacacs-server

11.4.16 tacacs-server

Function
To configure the IP address for the TACACS+ authenticating server, use this command. To
return to the default condition, use the no form of this command.

Format
tacacs-server [ backup ] ip-address
no tacacs-server [ backup ]

Raisecom Proprietary and Confidential


689
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameters
Parameter Description
Select backup: configure the IP address for the backup TACACS+
backup
authenticating server.
Not select backup: configure the IP address for the working

TACACS+ authenticating server.


ip-address IP address, in dotted decimal notation, such as 10.10.10.1

Default conditions
The IP address of the TACACS+ authenticating server is null.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
AAA stands for authentication, authorization, and accounting. AAA supports several
protocols including TACACS+.
Generally, the working TACACS+ server is used. When the working server fails to response,
the backup server will be used. The TACACS+ server will start accounting when you
successfully log in to the device. You can use this command to configure the IP address for
the working or backup TACACS+ accounting server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the IP address of the TACACS+ authenticating server
to 10.0.0.1
Raisecom#tacacs-server backup 10.0.0.1
Set successfully.

Raisecom Proprietary and Confidential


690
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Related commands
show tacacs-server

11.4.17 tacacs-server key

Function
To configure the shared key of the TACACS+ server, use this command. To return to the
default condition, use the no form of this command.

Format
tacacs-server key string
no tacacs-server key

Parameters
Parameter Description
key string Key string, a string of 1 to 200 characters

Default conditions
The shared key of the TACACS+ server is null.

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
Generally, users are connected to the Network Access Server (NAS) and NAS is connected to
the RADIUS server or the TACACS+ server. The device functions as a NAS. It is responsible
for passing authentication and accounting information to the TACACS+ server, using the
TACACS+ protocol. Authenticated users can acquire authorities to access network or utilize
network resources. To prevent users' passwords from being snooped when they are
transmitted across insecure network, the NAS and the TACACS+ server use a shared key to
communicate. You can use this command to configure the shared key of the TACACS+
accounting server.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


691
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Precaution
The TACACS+ authentication server and accounting server shares the same key.

Examples
This example shows how to configure the shared key of the TACACS+ server to raisecom.
Raisecom#tacacs-server key raisecom
Set successfully.

Related commands
show tacacs-server

11.4.18 user login

Function
To configure the authentication mode of user login, use this command.

Format
user login { local-radius | local-user | radius-local [ server-no-response ] | radius-user |
local-tacacs | tacacs-local [ server-no-response ] | tacacs-user }

Parameters
Parameter Description
local-radius When local authentication coexists with RADIUS authentication, use
local authentication.
local-user Use local authentication.
radius-local When local authentication coexists with RADIUS authentication, use
RADIUS authentication.
server-no- Use local authentication only when the RADIUS/TACACS+ server
response has no response.
radius-user Use RADIUS authentication.
local-tacacs When local authentication coexists with TACACS+ authentication,
use local authentication.
tacacs-local When local authentication coexists with TACACS+ authentication,
use TACACS+ authentication.
tacacs-user Use TACACS+ authentication.

Default conditions
The user login mode is local-user.

Raisecom Proprietary and Confidential


692
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Privileged EXEC

User level
15

Usage guidelines
Scenario
After being authenticated and authorized, privileged users can log in to the network, and
obtain network resources. All the authentication and authorization information will be stored
in the remote RADIUS server, the remote TACACS+ server, and Network Access Server
(NAS), namely local device. You can use this command to configure the authentication mode
for privileged user.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The newly-configured login mode will take effect next time you log in to the device.
To use Radius/TACACS+ authentication, ensure that the server and the device are
properly connected and the server already has your information, or you cannot log in to
the device.

Examples
This example shows how to the login mode to local-radius.
Raisecom#user login local-radius
Set User Login Method successfully.

Related commands
N/A

11.5 802.1x
11.5.1 clear dot1x statistics

Function
To clear statistics of the 802.1x packets on the interface, use this command.

Raisecom Proprietary and Confidential


693
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
clear dot1x interface-type interface-number statistics

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to clear statistics of 802.1x packets on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Executing this command will clear all statistics of 802.1x packets. Use it with caution.

Examples
This example shows how to clear statistics of 802.1x packets on the interface.
Raisecom#config
Raisecom(config)#clear dot1x port-list 1 statistics
Set successfully.

Related commands
show dot1x statistics

Raisecom Proprietary and Confidential


694
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.5.2 dot1x enable

Function
To enable global 802.1x or interface 802.1x, use this command. To disable this function, use
the disable form of this command.

Format
dot1x { enable | disable }

Parameters
Parameter Description
enable Enable 802.1x.
disable Disable 802.1x.

Default conditions
Global 802.1x and interface 802.1x are disabled.

Command mode
Global configuration/Physical layer interface configuration

User level
11

Usage guidelines
Scenario
The 802.1x is an access control protocol based on physical interface. You can use this
command to enable or disable the 802.1x. Interface 802.1x management will only take effect
when both global 802.1x and interface 802.1x are both enabled.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
We do not recommend enabling the 802.1x on aggregated interface or non-Access
interface.
Configure this command on the interface connected to the user.

Raisecom Proprietary and Confidential


695
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to enable global 802.1x and 802.1x on the interface.
Raisecom#config
Raisecom(config)#dot1x enable
Set successfully.
Raisecom(config)#interface port 1
Raisecom(config-gigaethernet1/1/1)#dot1x enable
Set successfully.

Related commands
show dot1x

11.5.3 dot1x authentication-method

Function
To configure the 802.1x authentication mode, use this command. To return to the default
condition, use the no form of this command.

Format
dot1x authentication-method { chap | pap | eap }
no dot1x authentication-method

Parameters
Parameter Description
chap A three-way handshaking Protocol that only transmits user name
through the network. It does not transmit password during
authentication and thus is more secure and reliable.
pap A two-way handshaking protocol that transmits the password in clear
text
eap The switch will directly send authorization information of 802.1x users
to the RADIUS server in form of EAP packets without converting them
into standard RADIUS packets. To configure this mode, the RADIUS
server must support EAP.

Default conditions
The authentication mode is chap.

Command mode
Global configuration

Raisecom Proprietary and Confidential


696
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

User level
11

Usage guidelines
Scenario
You can use EAP mode for authentication if the RADIUS server supports EAP. EAP is
compatible with the standard 802.1x and thus can be used as the relay protocol for
authentication. You can use CHAP or PAP mode if the RADIUS server does not support EAP.
In CHAP mode, the RADIUS server transmits the user information in ciphertext. In PAP
mode, the server transmits the user information in clear text which is less secured. The PAP
mode is compatible with some of the traditional RADIUS server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the 802.1x authentication mode to CHAP.
Raisecom#config
Raisecom(config)#dot1x authentication-method chap
Set successfully.

Related commands
show dot1x

11.5.4 dot1x auth-control

Function
To configure the access control mode of the interface, use this command.

Format
dot1x auth-control { authorized-force | unauthorized-force | auto }

Parameters
Parameter Description
authorized-force Forced-authorized mode. The interface is in authorized status.
Users can access the network without authentication.

Raisecom Proprietary and Confidential


697
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
unauthorized-force Forced-unauthorized mode. The interface is in unauthorized
status. User authentication is not allowed. Users cannot access
the network.
auto Automatic-recognition mode. User authentication is allowed.
User can access the network after authentication.

Default conditions
The access control mode of the interface is auto.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the access control mode of the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the access control mode to authorized-force.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x auth-control authorized-force
Set successfully.

Related commands
show dot1x

Raisecom Proprietary and Confidential


698
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.5.5 dot1x auth-method

Function
To configure the access authentication mode on the interface, use this command.

Format
dot1x auth-method { macbased | portbased }

Parameters
Parameter Description

macbased MAC-based mode. Users cannot access the network through one account
on the same interface. Only the last user authenticated by the interface
can access the network.
portbased Port-based mode. When the first user successfully authenticated, other
users can access the network without authentication.

Default conditions
The authentication mode on the interface is port-based.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the access authentication mode on the interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the authentication mode on the interface to macbased.

Raisecom Proprietary and Confidential


699
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x auth-method macbased
Set successfully.

Related commands
show dot1x

11.5.6 dot1x reauthentication

Function
To enable re-authentication, use this command. To disable this function, use the disable form
of this command.

Format
dot1x reauthentication { enable | disable }

Parameters
Parameter Description
enable Enable re-authentication.
disable Disable re-authentication.

Default conditions
Re-authentication is disabled.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to enable or disable re-authentication on the interface. When re-
authentication is enabled, the device will re-authenticate users periodically.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


700
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Precaution
N/A

Examples
This example shows how to enable re-authentication on the interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x reauthentication enalbe
Set successfully.

Related commands
show dot1x

11.5.7 dot1x timer reauth-period

Function
To configure the re-authentication timeout period, use this command. To return to the default
condition, use the no form of this command.

Format
dot1x timer reauth-period second
no dot1x timer reauth-period

Parameters
Parameter Description
second Re-authentication timeout period, an integer, ranging from 1 to 65535s

Default conditions
The re-authentication timeout period is 3600s.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the re-authentication timeout period when re-
authentication on the interface is enabled. The device will re-authenticate users periodically.

Raisecom Proprietary and Confidential


701
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the re-authentication timeout period to 1000s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer reauth-period 1000
Set successfully.

Related commands
show dot1x

11.5.8 dot1x timer tx-period

Function
To configure the Request/Identity packet timeout period, use this command. To return to the
default condition, use the no form of this command.

Format
dot1x timer tx-period second
no dot1x timer tx-period

Parameters
Parameter Description
second Request/Identity packet timeout period, an integer, ranging from 10 to 120s

Default conditions
The Request/Identity packet timeout period is 30s.

Command mode
Physical layer interface configuration

User level
11

Raisecom Proprietary and Confidential


702
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
You can use this command to configure the Request/Identity packet timeout period. The
device sends Request/Identity packets to acquire user names. The timer starts after the device
sends the packet. If the device fails to receive the response packet from the user in the
configured period, it will send the Request/Identity packet again.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the Request/Identity packet timeout period to 30s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer tx-period 30
Set successfully.

Related commands
show dot1x

11.5.9 dot1x timer supp-timeout

Function
To configure the Request/MD5 Challenge packet timeout period, use this command. To return
to the default condition, use the no form of this command.

Format
dot1x timer supp-timeout second
no dot1x timer supp-timeout

Parameters
Parameter Description
second Request/MD5 Challenge packet timeout period, an integer, ranging from
10 to 120s

Raisecom Proprietary and Confidential


703
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
The Request/MD5 Challenge packet timeout period is 30s.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the Request/MD5 Challenge packet timeout period.
The device sends Request/MD5 Challenge packets to transmit ciphertext. The timer starts
after the device sends the packet. If the device fails to receive the response packet from the
user in configured period, it will send the Request/MD5 Challenge packet again.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the Request/MD5 Challenge packet timeout period to
100s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer supp-timeout 100
Set successfully.

Related commands
show dot1x

11.5.10 dot1x timer server-timeout

Function
To configure the RADIUS server timeout period, use this command. To return to the default
condition, use the no form of this command.

Raisecom Proprietary and Confidential


704
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
dot1x timer server-timeout second
no dot1x timer server-timeout

Parameters
Parameter Description
second RADIUS server timeout period, an integer, ranging from 100 to 300s

Default conditions
The RADIUS server timeout period is 100s.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the RADIUS server timeout period. The timer starts
after the server sends the packet. If the device doesn't receive the response packet from the
user in configured period, it will send the packet again.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The period should be greater than the product of the number of attempts configured on the
RADIUS client and the wait time of each attempt.

Examples
This example shows how to configure the RADIUS server timeout period to 200s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer server-timeout 200
Set successfully

Raisecom Proprietary and Confidential


705
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Related commands
show dot1x

11.5.11 dot1x timer quiet-period

Function
To configure the interface quiet period, use this command. To return to the default condition,
use the no form of this command.

Format
dot1x timer quiet-period second
no dot1x timer quiet-period

Parameters
Parameter Description
second Interface quiet period an integer, ranging from 10 to 120s

Default conditions
The interface quiet period is 60s.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the interface quite period. When a user fails to be
authenticated, the interface will not respond to new authentication packets. The interface will
restart user authentication when the configured quite period expires.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


706
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to configure the interface quite period to 100s.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#dot1x timer quiet-period 100
Set successfully

Related commands
show dot1x

11.5.12 show dot1x

Function
To show the 802.1x information on the interface, use this command.

Format
show dot1x interface-type interface-number

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the 802.1x on the interface.
Raisecom#show dot1x gigaethernet1/1/1

Raisecom Proprietary and Confidential


707
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

802.1x Global Admin State: enable


Port gigaethernet1/1/1
--------------------------------------------------------
802.1X Port Admin State: Enable
PAE: Authenticator
PortMethod: Macbased
PortControl: ForceAuthorized
PortStatus: Authorized
Authenticator PAE State: Initialize
Backend Authenticator State: Initialize
ReAuthentication: Enable
QuietPeriod: 100(s)
ServerTimeout: 200(s)
SuppTimeout: 100(s)
ReAuthPeriod: 1000(s)
TxPeriod: 30(s)

The following table describes fields in the command output.

Field Description
802.1x Global Admin State Global 802.1x status
Enable: enabled
Disable: disabled
802.1x Port Admin State Interface 802.1x status
Enable: enabled
Disable: disabled
PAE PAE type, all for Authenticators
PortMethod Interface authentication methods
Macbased: MAC address-based authentication
Portbased: interface-based authentication
PortControl Interface authentication modes
Authorized-force: forced interface authentication
mode
Unauthorized-force: forced interface

unauthorized mode
Auto: protocol authentication mode

PortStatus Interface authentication status


Authorized
Unauthorized
Authenticator PAE State Authenticator PAE Status
Initialize: in initialized status
Disconnected: in disconnected status
Connecting: in connecting status
Authenticating: in authenticating staus
Authenticated: in authenticated status
Aborting: in aborting status
Hold: in holding status
ForceAuth: in forced authentication status
ForceUnauth: in forced un-authentication status
Restart: in restart status

Raisecom Proprietary and Confidential


708
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Field Description
Backend Authenticator State Backend Authenticator Status
Request: in request status
Response: in respond status
Success: in success status
Fail: in failed status
Timeout: in timeout status
Idle: in idling status
Initialize: in initialized status
Ignore: in ignoring status

ReAuthentication Re-authentication timer


QuietPeriod Quite timer
ServerTimeout RADIUS server timeout timer
SuppTimeout Request/MD5 Challenge timeout timer
ReAuthPeriod Request/Challenge re-authentication timer
TxPeriod Request/Challenge re-send timer

Related commands
N/A

11.5.13 show dot1x statistics

Function
To show statistics of 802.1x on the interface, use this command.

Format
show dot1x interface-type interface-number statistics

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


709
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

User level
5

Usage guidelines
N/A

Examples
This example shows how to show statistics of 802.1x on the interface.
Raisecom#show dot1x port-list 1 statistics
Port gigaethernet1/1/2
--------------------------------------------------------
RxTotal: 0
TxTotal: 0
RxStart: 0
RxLogoff: 0
RxResp: 0
TxReq: 0
TxReqID: 0
RxRespID: 0
RxInvalid: 0
RxLenErr: 0
LastRxVersion: 0
LastRxSrcMAC: 0000.0000.0000

The following table describes fields in the command output.

Field Description
RxTotal Number of total EAPOL packets received
TxTotal Number of total EAPOL packets sent
RxStart Number of total EAPOL-Start packets received
RxLogoff Number of EAPOL-Logoff packets received
RxResp Number of EAP Response packets received
TxReq Number of EAP Request packets sent
TxReqID Number of EAP Req/Id packets sent
RxRespID Number of EAP Req/Id packets received
RxInvalid Number of invalid EAPOL packets received
RxLenErr Number of packets received with error length
LastRxVersion Version of the EAPOL packet last received
LastRxSrcMAC MAC address of the EAPOL packet last received

Raisecom Proprietary and Confidential


710
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Related commands
N/A

11.5.14 show dot1x user

Function
To show information about the authentication user, use this command.

Format
show dot1x interface-type interface-number user

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the authentication user.
Raisecom#show dot1x gigaethernet1/1/1 user
Port gigaethernet1/1/1
--------------------------------------------------------
User Name : --
Mac Address : --
Upstream Ratelimite : 0 kbps
Downstream Ratelimite: 0 kbps
Native vlan : 0
Member Vlan list : --
Untag Vlan list : --

Raisecom Proprietary and Confidential


711
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

The following table describes fields in the command output.

Field Description
User Name User name
Mac Address Client MAC address
Upstream Ratelimite Restricted upstream rate
Downstream Ratelimite Restricted downstream rate
Native vlan Default VLAN
Member Vlan list Member VLAN list
Untag Vlan list Untagged VLAN list

Related commands
N/A

11.6 PPPoE+
11.6.1 clear pppoeagent statistic

Function
To clear statistics of PPPoE+ on the interface, use this command.

Format
clear pppoeagent statistic

Parameter
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


712
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
When PPPoE+ is enabled, the device will calculate the number of received PADI packets,
sent PADI packets, received PADR packets, and sent PADR packets. You can use the clear
pppoeagent statistic [ port-list port-list ] command to cleat all statistics of PPPoE+. The
packet calculator will be cleared.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear statistics of PPPoE+ on the interface.
Raisecom#config
Raisecom(config)#clear pppoeagent statistic
Set successfully.

Related commands
show pppoeagent statistic

11.6.2 pppoeagent enable

Function
To enable PPPoE+, use this command. To disable this function, use the disable form of this
command.

Format
pppoeagent { enable | disable }

Parameters
Parameter Description
enable Enable PPPoE+.
disable Disable PPPoE+.

Default conditions
Global PPPoE+ on the device is disabled. Interface PPPoE+ is disabled.

Raisecom Proprietary and Confidential


713
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Global configuration/Physical layer interface configuration

User level
11

Usage guidelines
Scenario
PPPoE is widely applied to the authentication dial process of broadband accessing. The
authentication packet sent by the PPPoE client only contains basic user information therefore
may cause account overlap and account theft. By adding access device information into the
packet, PPPoE+ combines user account with the access device to prevent account overlap or
account theft, safeguarding the interests of the user and the carrier.
When global PPPoE+ and interfacePPPoE+ are enabled, device information will be added to
the PPPoE+ packets that send to the interface before they are sent to the trust interface. In
short, PPPoE+ adds device information to PPPoE to provide the server with sufficient
information for user authentication.
Enable global PPPoE+in global configuration mode and interface PPPoE+ in physical level
interface configuration mode. Interface PPPoE+ only takes effect when both configurations
are enabled.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
To enable interface PPPoE+ that connected to the client, you should configure the interface
that connected to the server to trust interface.

Examples
This example shows how to enable global PPPoE+.
Raisecom#config
Raisecom(config)#pppoeagent enable
Set successfully.

This example shows how to enable interface PPPoE+.


Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent enable
Set successfully.

Related commands
show pppoeagent

Raisecom Proprietary and Confidential


714
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.6.3 pppoeagent circuit-id

Function
To configure the circuit ID on the interface to user-defined string, use this command. To
return to the default condition, use the no form of this command.

Format
pppoeagent circuit-id string
no pppoeagent circuit-id

Parameters
Parameter Description
string Content of the circuit ID, a string of 1 to 63 characters
Circuit ID that includes spacing should be enclosed in double-quotes.

Default conditions
The circuit ID is in form of VLAN ID/Interface ID/Attached string.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the circuit ID on specified interface to user-defined
string
There are 2 circuit ID padding modes:
In ONU mode, the form of the circuit ID is fixed. In Switch mode, you can configure the
circuit ID on the interface to user-defined string. You can use this command to configure
the filling content of the circuit ID in switch mode.
In switch mode, circuit ID is in two forms: default form and user-defined form. The
default form is "Interface ID/VLAN ID/Added string". The default content of the
attached string is the hostname of the device. The user-defined form is the string input by
the users.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


715
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

N/A
Precaution
N/A

Examples
This example shows how to configure the circuit ID on the interface to raisecom.

Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent circuit-id raisecom
Set successfully.

Related commands
show pppoeagent

11.6.4 pppoeagent circuit-id { attach-string | format | hex }

Function
To configure the attached string in the circuit ID on the switch, use this command. To return
to the default condition, use the no form of this command.

Format
pppoeagent circuit-id { attach-string | format | hex } string
no pppoeagent circuit-id { attach-string | format | hex }

Parameters
Parameter Description
attach-string Any fixed string
format Variable parameters
hex In hexadecimal notion
string Attached string, with the length ranging from 1 to 55 bytes.
If the string contains spacing, enclose the string in double-quotes.

Default conditions
The attached string in Circuit ID is the host name of the device.

Command mode
Global configuration

Raisecom Proprietary and Confidential


716
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

User level
11

Usage guidelines
Scenario
By default, the circuit ID is in form of Interface ID/VLAN ID/attached string. The content of
the attached string is the host name of the device. You can configure it to user-defined string.
You can use this command to configure the attached string of the circuit ID.
The device supports the following variable parameters:
%h: hostname
%s: slot
%v: svlan
%c: cvlan
%p: port
%m: local mac
%r: remote mac
%i: ip address
%u: unit
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the attached string of the circuit ID to user01.
Raisecom#config
Raisecom(config)#pppoeagent circuit-id attach-string user01
Set successfully.

Related commands
show pppoeagent

11.6.5 pppoeagent circuit-id mac-format

Function
To configure the circuit ID of the switch to the variable parameter of MAC address, use this
command. To return to the default condition, use the no form of this command.

Raisecom Proprietary and Confidential


717
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
pppoeagent circuit-id mac-format string
no pppoeagent circuit-id mac-format

Parameters
Parameter Description
mac-format MAC address form, a string, supporting the following 7 forms:
string hhhhhhhhhhhh
hhhh.hhhh.hhhh
hhhh-hhhh-hhhh
hhhh:hhhh:hhhh
hh.hh.hh.hh.hh.hh
hh-hh-hh-hh-hh-hh
hh:hh:hh:hh:hh:hh

Default conditions
The variable parameter of MAC address in Circuit ID is in form of hhhhhhhhhhhh.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After configuring the circuit ID to support variable parameters, the device will transform
parameter %m and %r to the MAC address. You can use this command to configure the form
of the MAC address.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the variable parameter of MAC address in the circuit
ID of the switch to hhhh.hhhh.hhhh.
Raisecom#config

Raisecom Proprietary and Confidential


718
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Raisecom(config)#pppoeagent circuit-id mac-format hhhh.hhhh.hhhh


Set successfully.

Related commands
show pppoeagent

11.6.6 pppoeagent circuit-id mode

Function
To configure the padding mode of the circuit ID on the interface, use this command.

Format
pppoeagent circuit-id mode { onu | switch }

Parameters
Parameter Description
onu ONU mode
switch Switch mode

Default conditions
The circuit ID padding mode of the interface is Switch mode.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The circuit ID padding mode of the interface is Switch mode. Only when the interface is used
as ONU will the Circuit ID padding mode be ONU mode.
Circuit ID padding information is in fixed form in ONU mode and cannot be configured.
Only in Switch mode can you configure the filling information.
"Interface ID/VLAN/Hostname" stands for the VLAN ID, interface ID and host name.

Raisecom Proprietary and Confidential


719
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Table 11-1 Circuit ID


Mode Description Form
Switch mode By default, the attached string is Interface ID/VLAN ID/host name
not configured. The user-defined
circuit ID is not specified.
The attached string is Interface ID/VLAN ID/Attached
configured. The user-defined string
circuit ID is not specified.
The user-defined circuit ID is Self-defined circuit ID
specified.
ONU mode Not configurable. 0 0/0/0:0.0 0/0/0/0/0/0/MAC
0/0/Port:eth/4096.CVLAN LN

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the padding mode of the circuit ID to ONU mode.
Raisecom#config
Raisecom(config)#pppoeagent circuit-id mode onu
Set successfully.

Related commands
show pppoeagent

11.6.7 pppoeagent remote-id format

Function
To configure the padding mode of the remote ID on specified interface, use this command.

Format
pppoeagent remote-id format { ascii | binary }

Raisecom Proprietary and Confidential


720
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameters
Parameter Description
ascii Remote ID in ASCII format
binary Remote ID in binary format

Default conditions
The remote ID on the interface is in binary format.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the padding mode of the remote ID on specified
interface. If the remote ID is in binary format, fill in the MAC address directly. If the remote
ID is in ASCII format, transform the MAC address into a string before filling it into the
remote ID.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the padding mode of the remote ID to ASCII.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent remote-id format ascii
Set successfully.

Related commands
show pppoeagent

Raisecom Proprietary and Confidential


721
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.6.8 pppoeagent remote-id

Function
To configure the MAC address filled in the remote ID, use this command.

Format
pppoeagent remote-id { client-mac | switch-mac }

Parameters
Parameter Description

client-mac Pad the remote ID with the client MAC address.


switch-mac Pad the remote ID with the switch MAC address.

Default conditions
By default, the MAC address filled in remote ID is the switch MAC address.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
The MAC address filled in the remote ID can be the switch MAC address or the PPPoE client
MAC address. You can use this command to configure the MAC address filled in the remote
ID.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the MAC address filled in the remote ID to client MAC
address.

Raisecom Proprietary and Confidential


722
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent remote-id client-mac
Set successfully.

Related commands
show pppoeagent

11.6.9 pppoeagent trust

Function
To configure the interface to trust interface, use this command. To return to the default
condition, use the no form of this command.

Format
pppoeagent trust
no pppoeagent trust

Parameters
N/A

Default conditions
The interface is untrusted interface.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
PPPoE+ only deals with PADI packets and PADR packets of PPPoE. After enabling global
PPPoE+ and interface PPPoE, the device will attach access device information to the PPPoE
packets before sending them through the trust interface. You should configure the trust
interface to send PPPoE+ packets received on the trust interface.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


723
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Precaution
You cannot configure the interface to trust interface when only interface PPPoE+ is
enabled.
When PPPoE+ is enabled on interface connected to the client, the interface connected to
the server should be configured to trust interface.

Examples
This example shows how to configure the interface to trust interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent trust
Set successfully.

Related commands
show pppoeagent

11.6.10 pppoeagent vendor-specific-tag overwrite enable

Function
To enable tag overwriting on specified interface, use this command. To disable this function,
use the disable form of this command.

Format
pppoeagent vendor-specific-tag overwrite { enable | disable }

Parameters
Parameter Description
enable Enable tag overwriting on specified interface.
disable Disable tag overwriting on specified interface

Default conditions
Tag overwriting on the interface is disabled.

Command mode
Physical layer interface configuration

User level
11

Raisecom Proprietary and Confidential


724
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
Tag overwriting is used to overwrite the original tag of packets. After tag overwriting is
enabled, the original tag of the PPPoE packets will be overwritten. If the PPPoE packet does
not carry any tag, new tag will be attached.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable tag overwriting on specified interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#pppoeagent vendor-specific-tag
overwrite enable
Set successfully.

Related commands
show pppoeagent

11.6.11 show pppoeagent

Function
To show configurations of PPPoE+, use this command.

Format
show pppoeagent

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


725
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

User level
5

Usage guidelines
Scenario
You can use this command to show configurations of PPPoE+, including the attached string,
interface enabling status, tag overwriting enabling status, Remote ID, Remote ID formatting
mode and the content of the Circuit ID.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show configurations of PPPoE+.
Raisecom#show pppoeagent
Global PPPoE+ status: enable
Attach-string: %default%
Circuit ID padding mode: switch
Port State Overwrite Remote-ID Format-rules Circuit-ID
----------------------------------------------------------------
P1 enable disable switch-mac binary %default%
P2 trust disable switch-mac binary %default%
P3 disable disable switch-mac binary %default%
P4 disable disable switch-mac binary %default%

**In switch mode, Circuit-ID's default string is: Port\Vlan\Attach-string.


**In onu mode, Circuit-ID's default string is: 0 0/0/0:0.0
0/0/0/0/0/0/MAC 0/0/Port:eth/4096.CVLAN LN.
**Attach-string's default string is the hostname.

The following table describes fields in the command output.

Field Description
Global PPPoE+ status Global PPPoE+ status
Enable: enabled
Disable: disabled
Attach-string Attached string
Circuit ID Circuit ID padding mode
Switch: Switch mode
ONU: ONU mode

Raisecom Proprietary and Confidential


726
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Field Description
Port Interface ID
State Status
Enable: enabled
Disable: disabled
Trust: trust interface

Overwrite TAG overwriting status


Enable: enabled
Disable: disabled
Remote-ID MAC address in remote-ID
Client-mac: Client MAC address
Switch-mac: Switch MAC address
Format-rules Remote-ID format
ASCII: ASCII format
Binary: binary format
Circuit-ID User-defined string of the circuit ID
For ONU mode or non-user-defined string, the circuit ID
will be shown as "%default%".

Related commands
N/A

11.6.12 show pppoeagent statistic

Function
To show statistics of PPPoE+, use this command.

Format
show pppoeagent statistic

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


727
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
You can use this command to show statistics of PPPoE+ on the interface, including the
number of received PADI packets, sent PADI packets, received PADR packets, and sent
PADR packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to shoe statistics of PPPoE+ on the interface.
Raisecom#show pppoeagent statistic
Port PADI-Recv PADI-Send PADR-Recv PADR-Send
-------------------------------------------------------
P1 0 0 0 0
P2 0 0 0 0
P3 0 0 0 0
P4 0 0 0 0

The following table describes fields in the command output.

Field Description
Port Interface ID
PADI-Recv Number of received PADI packets, ranging from 0 to 4294967295
PADI-Send Number of sent PADI packets, ranging from 0 to 4294967295
PADR-Recv Number of received PADR packets, ranging from 0 to 4294967295
PADR-Send Number of sent PADR packets, ranging from 0 to 4294967295

Related commands
clear pppoeagent statistic

Raisecom Proprietary and Confidential


728
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.7 Storm control


11.7.1 dlf-forwarding enable

Function
To enable unknown unicast packets forwarding, use this command. To disable this function,
use the disable form of this command.

Format
dlf-forwarding { enable | disable }

Parameters
Parameter Description
enable Enable DLF packets forwarding.
disable Disable DLF packets forwarding.

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the device receives an unknown unicast packet, it cannot identify the egress interface
based on the destination MAC address of the unicast packet. The device will send the unicast
packet to all interfaces besides the one that should receive this packet. It may cause broadcast
storm, affecting the network speed. You can use this command to enable or disable DLF
forwarding after which the interface will forward or discard the DLF packets.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


729
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to enable unknown unicast packets forwarding.
Raisecom#config
Raisecom(config)#dlf-forwarding enable
Set successfully.

Related commands
show dlf-forwarding

11.7.2 storm-control

Function
To enable storm control and configure the rate limiting threshold, use this command. To
disable this function, use the no form of this command.

Format
storm-control { broadcast | unknown-multicast | dlf | all } { bps value | pps value }
no storm-control { broadcast | unknown-multicast | dlf | all } { bps value | pps value }

Parameters
Parameter Description
broadcast Execute storm control over broadcast traffic.
unknown-multicast Execute storm control over unknown multicast traffic.
dlf Execute storm control over unknown unicast traffic.
all Execute storm control over broadcast, multicast, and unicast
traffic.
pps value Number of packets allowed to pass per second, an integer,
ranging from 64 to 100000, in increments of 64
bps value Packet rate allowed to pass per second, an integer, ranging
from 1 to 262134, in units of kbits

Default conditions
The rate limiting mode is BPS and the packet rate allowed to pass per second is 64 kbit/s.

Command mode
Interface configuration

User level
11

Raisecom Proprietary and Confidential


730
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
When the device receives an unknown unicast packet, it cannot identify the egress interface
based on the destination MAC address of the unicast packet. The device will send the unicast
packet to all interfaces besides the one that should receive this packet. It may cause broadcast
storm, affecting the network speed. You can use this command to enable storm control to
prevent the above-mentioned conditions.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Only one control mode can be used at the same time of storm control. You have to use the no
command first to disable one mode before you configure another mode.

Examples
This example shows how to enable storm control over broadcast traffic under VLAN2.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/1
Raisecom(config-gigaethernet1/1/1)#storm-control broadcast enable
Set successfully.

Related commands
show storm-control

11.7.3 show storm-control

Function
To show configurations of storm control, use this command.

Format
show storm-control [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Raisecom Proprietary and Confidential


731
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of storm control.
Raisecom#show storm-control
Interface Packet-Type Threshold Unit
--------------------------------------------------------------
gigaethernet1/1/1 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
gigaethernet1/1/2 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
gigaethernet1/1/3 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
gigaethernet1/1/4 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------
gigaethernet1/1/5 Broadcast 64 kbps
Multicast 0 --
Unicast 0 --
--------------------------------------------------------------

Descriptions of each field are as follows:

Field Description
Interface Interface ID
Packet-Type Packet type
Broadcast: broadcast traffic
Multicast: multicast traffic
Unicast: unknown unicast traffic

Raisecom Proprietary and Confidential


732
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Field Description
Threshold Threshold
Unit With the unit of kbit/s

Related commands
N/A

11.7.4 show dlf-forwarding

Function
To show DLF forwarding, use this command.

Format
show dlf-forwarding

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to show DLF forwarding.
Raisecom#show dlf-forwarding
DLF-forwarding: Enable

Related commands
N/A

Raisecom Proprietary and Confidential


733
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.8 IP source guard


11.8.1 ip source binding

Function
To configure static binding relations, use this command. To disable this function, use the
disable form of this command.

Format
ip source binding ip-address { mac-address | vlan vlan-id | interface-type interface-number }
no ip source binding ip-address

Parameters
Parameter Description
ip-address IP address, in dotted decimal notation, such as 10.0.0.1
mac-address MAC address, in dotted hexadecimal notation, such as
000E.5E12.3456
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Static binding controls the interface by manually configuring the binding information to
produce binding entries. It is applicable to the situation when the number of hosts is small or
you only want to bind a certain host.
You can use this command to configure static binding relations, including Port+IP,
Port+IP+MAC, Port+IP+VLAN, and Port+IP+MAC+VLAN. The newly configured static

Raisecom Proprietary and Confidential


734
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

binding relation of an IP will override the existing dynamic binding relation of the same IP.
The existing static binding relation will not be override.
You can use the no ip source binding ip-address command to delete the static binding
relation. The dynamic binding relation will recover automatically when the static binding
relation is deleted.
Prerequisite
You can use the ip verify source command to enable static binding.
Follow-up procedure
N/A
Precaution
Enable global static binding before configuring static binding relations. Binding relations
will not take effect when global static binding is disabled.
The overridden dynamic binding relations will recover when static binding relations are
deleted.

Examples
This example shows how to configure the static binding relation of the IP address of 1.2.3.4 to
interface 1/1/2.
Raisecom#config
Raisecom(config)#ip source binding 1.2.3.4 gigaethernet 1/1/2
Set successfully.

Related commands
show ip source binding

11.8.2 ip source binding auto-update

Function
To enable automatic dynamic-static entry conversion, use this command. To disable this
function, use the no form of this command.

Format
ip source binding auto-update
no ip source binding auto-update

Parameters
N/A

Default conditions
Automatic dynamic-static entry conversion is disabled.

Raisecom Proprietary and Confidential


735
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to automatically convert the dynamic binding relations studies
from DHCP Snooping to static binding relations. Dynamic relations studies before this
function is enabled will not be converted.
After this function is disabled, the dynamic binding relation learned from DHCP Snooping
will not be converted.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable automatic dynamic-static entry conversion.
Raisecom#config
Raisecom(config)#ip source binding auto-update
Set successfully.

Related commands
show ip source binding

11.8.3 ip source binding dhcp-snooping static

Function
To convert dynamic binding relation to static binding relation, use this command.

Format
ip source binding dhcp-snooping static

Parameters
N/A

Raisecom Proprietary and Confidential


736
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to convert dynamic binding relation to static binding relation.
When you delete the static binding relation, the overridden dynamic binding relation of the
same IP address will be recovered.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Binding relations configured will not take effect when global static binding is disabled.
Enable global binding before configure the static binding relation.
You do not need to delete the dynamic binding relation, the newly configure static entry
will directly override the dynamic entry of the same IP address.
You cannot delete dynamic entries manually. Dynamic entry will not override static entry.
When a static entry is deleted, the dynamic entry of the same IP address will be
recovered.

Examples
This example shows how to convert dynamic binding relation to static binding relation.
Raisecom#config
Raisecom(config)#ip source binding dhcp-snooping static
Set successfully.

Related commands
show ip verify source

Raisecom Proprietary and Confidential


737
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.8.4 ip verify source

Function
To enable static binding, use this command. To disable this function, use the no form of this
command.

Format
ip verify source
no ip verify source

Parameters
N/A

Default conditions
Static binding is disabled on the device.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When global IP Source Guard static binding is enabled, IP packets in trust interface, IP
packets and DHCP packets in untrusted binding table will be forwarded. Other IP packets will
be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Binding relations configured will not take effect when global static binding is disabled.
Enable global binding before configure the static binding relation.

Examples
This example shows how to enable static binding.
Raisecom#config
Raisecom(config)#ip verify source

Raisecom Proprietary and Confidential


738
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Set successfully.

Related commands
show ip verify source

11.8.5 ip verify source dhcp-snooping

Function
To enable dynamic binding, use this command. To disable this function, use the no form of
this command.

Format
ip verify source dhcp-snooping
no ip verify source dhcp-snooping

Parameters
N/A

Default conditions
Dynamic binding is disabled on the device.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When global IP Source Guard dynamic binding is enabled, IP packets and DHCP packets in
DHCP Snooping binding entry will be forwarded. Other IP packets will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Dynamic binding relations will not take effect when global dynamic binding is disabled.

Raisecom Proprietary and Confidential


739
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to enable dynamic binding.
Raisecom#config
Raisecom(config)#ip verify source dhcp-snooping
Set successfully.

Related commands
show ip verify source

11.8.6 ip verify source trust

Function
To configure the interface to trust interface, use this command. To return to the default
condition, use the no form of this command.

Format
ip verify source trust
no ip verify source trust

Parameters
N/A

Default conditions
All the interfaces are untrusted interfaces.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
When an interface is configured as trust interface, all the packets on the interface will be
forward normally. When global static/dynamic binding is enabled on untrusted interface, only
DHCP packets and packets conformed to binding relations will be forwarded normally, other
packets will be discarded.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


740
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

N/A
Precaution
N/A

Examples
This example shows how to configure interface 1 to trust interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ip verify source trust
Set successfully.

Related commands
show ip verify source

11.8.7 ipv6 source binding

Function
To configure IPv6 static binding relations, use this command. To disable this function, use the
no form of this command.

Format
ipv6 source binding ipv6-address { mac-address | vlan vlan-id | interface-type interface-
number }
no ipv6 source binding ipv6-address

Parameters
Parameter Description
ipv6-address IPv6 address, in colon hexadecimal notation, such as 3001::1
mac-address MAC address, in dotted hexadecimal notation, such as
000E.5E12.3456
vlan vlan-id VLAN ID, an integer, ranging from 1 to 4094
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Raisecom Proprietary and Confidential


741
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Static binding controls the interface by manually configuring the binding information to
produce binding entries. It is applicable to the situation when the number of hosts is small or
you only want to bind a certain host.
You can use this command to configure static binding relations, including Port+IPv6,
Port+IPv6+MAC, Port+IPv6+VLAN, and Port+IPv6+MAC+VLAN. The newly configured
static binding relation of an IP will override the existing dynamic binding relation of the same
IP. The existing static binding relation will not be override.
You can use the no ipv6 source binding ipv6-address command to delete the static binding
relation. The dynamic binding relation will recover automatically when the static binding
relation is deleted.
Prerequisite
You can use ipv6 verify source command to enable static binding.
Follow-up procedure
N/A
Precaution
Static binding relations configured will not take effect when global static binding is
disabled. Enable global static binding before configure the static binding relation.
When a static entry is deleted, the dynamic entry of the same IP address will be
recovered.

Examples
This example shows how to configure the static binding relation of the IPv6 address of
3001::1 to interface gigaethernet1/1/1.
Raisecom#config
Raisecom(config)#ipv6 source binding 3001::1 gigaethernet1/1/1
Set successfully.

Related commands
show ipv6 source binding

Raisecom Proprietary and Confidential


742
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

11.8.8 ipv6 verify source

Function
To enable IPv6 static binding, use this command. To disable this function, use the no form of
this command.

Format
ipv6 verify source
no ipv6 verify source

Parameters
N/A

Default conditions
Static binding is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When global IP Source Guard static binding is enabled, all IPv6 packets on trust interface,
IPv6 packets and DHCP packets in untrusted interface binding entry will be forwarded
normally. Other IP packets will be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
Static binding relations configured will not take effect when global static binding is
disabled.
Enable global static binding before configure the static binding relation.

Examples
This example shows how to configure static binding.

Raisecom Proprietary and Confidential


743
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Raisecom#config
Raisecom(config)#ipv6 verify source
Set successfully.

Related commands
show ipv6 verify source

11.8.9 ipv6 verify source dhcp-snooping

Function
To enable IPv6 dynamic binding, use this command. To disable this function, use the no form
of this command.

Format
ipv6 verify source dhcp-snooping
no ipv6 verify source dhcp-snooping

Parameters
N/A

Default conditions
Dynamic binding on the device is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When IP Source Guard dynamic binding is enabled globally, all IPv6 packets and DHCP
packets in DHCP Snooping binding entry will be forwarded normally. Other IP packets will
be discarded.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution

Raisecom Proprietary and Confidential


744
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Dynamic binding relations will not take effect when global dynamic binding is disabled.

Examples
This example shows how to enable dynamic binding.
Raisecom#config
Raisecom(config)#ipv6 verify source dhcp-snooping
Set successfully.

Related commands
show ipv6 verify source

11.8.10 ipv6 verify source trust

Function
To configure IPv6 interface to trust interface, use this command. To return to the default
condition, use the no form of this command.

Format
ipv6 verify source trust
no ipv6 verify source trust

Parameters
N/A

Default conditions
All interfaces are untrusted interfaces.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
When an interface is configured as trust interface, all the packets on the interface will be
forward normally. When global static/dynamic binding is enabled on untrusted interface, only
DHCP packets and packets that conform to binding relations will be forwarded normally,
other packets will be discarded.
Prerequisite

Raisecom Proprietary and Confidential


745
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure interface 1 to trust interface.
Raisecom#config
Raisecom(config)#interface gigaethernet 1/1/2
Raisecom(config-gigaethernet1/1/2)#ipv6 verify source trust
Set successfully.

Related commands
show ipv6 verify source

11.8.11 show ip source binding

Function
To show IP Source Guard binding information, use this command.

Format
show ip source binding [interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


746
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Usage guidelines
Scenario
You can use this command to show IP Source Guard binding information, including the
maximum number of binding entries in history, number of current binding entries, IP address,
MAC address, VLAN ID, interface ID, binding type, and status of whether it is written in the
hardware.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show binding information.
Raisecom#show ip source binding
History Max Entry Num: 5
Current Entry Num: 4
Ip Address Mac Address VLAN Port Type Inhw
-----------------------------------------------------------------------
192.168.0.1 000e.5e12.3451 10 gigaethernet1/1/1 static yes
192.168.11.19 000e.5e11.1729 29 gigaethernet1/1/2 static yes
192.168.11.23 -- -- gigaethernet1/1/3 static yes
192.168.11.33 -- 16 gigaethernet1/1/4 static yes

The following table describes fields in the command output.

Field Description
History Max Entry Num Maximum number of binding entries in history
Current Entry Num Number of current binding entries
Ip Address IP address
Mac Address MAC address
VLAN VLAN ID
Port Interface ID
Type Binding type
Static: static binding
Dynamic: dynamic binding
Inhw Write to hardware or not
Yes: write to hardware
No: not write to hardware

Raisecom Proprietary and Confidential


747
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Related commands
N/A

11.8.12 show ip verify source

Function
To show global binding status and interface trusting status, use this command.

Format
show ip verify source

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show global binding status and interface trusting status,
including static binding status, dynamic binding status, interface ID, and trusting status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show global binding status and interface trusting status.

Raisecom#show ip verify source


Static Bind: Disable

Raisecom Proprietary and Confidential


748
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Dhcp-Snooping Bind: Disable


Port Trust
--------------------
gigaethernet1/1/1 no
gigaethernet1/1/2 no
gigaethernet1/1/3 no
gigaethernet1/1/4 no
gigaethernet1/1/5 no
gigaethernet1/1/6 no
gigaethernet1/1/7 no
gigaethernet1/1/8 no
gigaethernet1/1/9 no
gigaethernet1/1/10 no

The following table describes fields in the command output.

Field Description
Static Bind Static binding status
Enable: enabled
Disable: disabled
Dhcp-Snooping Bind Dynamic binding status
Enable: enabled
Disable: disabled
Port Interface ID
Trust Trusting status
Yes: trust
No: not trust

Related commands
N/A

11.8.13 show ipv6 source binding

Function
To show IPv6 Source Guard binding information, use this command.

Format
show ipv6 source binding [interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Raisecom Proprietary and Confidential


749
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show IP Source Guard binding information, including the
maximum number of binding entries in history, number of current binding entries, IPv6
address, MAC address, VLAN ID, interface ID, binding type, and status of whether it is
written in the hardware.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show binding information.
Raisecom#show ipv6 source binding
History Max Entry Num: 1
Current Entry Num: 1
Ip Address Mac Address VLAN Port Type Inhw
-----------------------------------------------------------------------
300::1 000e.5e12.3451 10 gigaethernet1/1/1 static yes

The following table describes fields in the command output.

Field Description
History Max Entry Num Maximum number of binding entries in history
Current Entry Num Number of current binding entries
Ip Address IP address
Mac Address MAC address
VLAN VLAN ID
Port Interface ID

Raisecom Proprietary and Confidential


750
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Field Description
Type Binding type
Static: static binding
Dynamic: dynamic binding
Inhw Write to hardware or not
Yes: write to hardware
No: not write to hardware

Related commands
N/A

11.8.14 show ipv6 verify source

Function
To show IPv6 global binding status and interface trusting status, use this command.

Format
show ipv6 verify source

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show global binding status and interface trusting status,
including static binding status, dynamic binding status, interface ID, and trusting status.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


751
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Precaution
N/A

Examples
This example shows how to show global binding status and interface trusting status.
Raisecom#show ipv6 verify source
Static Bind: Disable
Dhcp-Snooping Bind: Disable
Port Trust
--------------------
gigaethernet1/1/1 no
gigaethernet1/1/2 no
gigaethernet1/1/3 no
gigaethernet1/1/4 no
gigaethernet1/1/5 no

The following table describes fields in the command output.

Field Description
Static Bind Static binding status
Enable: enabled
Disable: disabled
Dhcp-Snooping Bind Dynamic binding status
Enable: enabled
Disable: disabled
Port Interface ID
Trust Trusting status
Yes: trust
No: not trust

Related commands
N/A

11.9 CPU protection


11.9.1 clear cpu-protect car statistics

Function
To clear statistics of global and interface CPU CAR (Committed Access Rate), use this
command.

Raisecom Proprietary and Confidential


752
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Format
clear cpu-protect car { arp | dhcp | global | icmp | igmp } statistics

Parameters
Parameter Description
clear Clear
cpu-protect CPU protection
car Committed access rate
arp ARP packets
dhcp DHCP packets
global Global information
icmp ICMP packets
igmp IGMP packets
statistics Statistics

Default conditions
N/A

Command mode
Physical layer interface configuration

User level
15

Usage guidelines
Scenario
You can use this command to clear statistics of global or interface CPU CAR to starting a new
round of calculation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear all statistics of global or interface CPU CAR. Use it with caution.

Raisecom Proprietary and Confidential


753
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Examples
This example shows how to clear statistics of global CPU CAR.
Raisecom#config
Raisecom(config)#clear cpu-protect car global statistics
Set successfully

Related commands
show cpu-protect car statistics

11.9.2 cpu-protect car

Function
To configure CIR (Committed Information Rate) and CBS (Committed Burst Size) of global
CPU packet protection, use this command. To return to the default condition, use the no form
of this command.

Format
cpu-protect car { arp | dhcp | global | icmp | igmp } kbps cir cir cbs cbs
no cpu-protect car { arp | dhcp | global | icmp | igmp }

Parameters
Parameter Description
cpu-protect CPU protection
car Committed access rate
arp ARP packets
dhcp DHCP packets
global Global information
icmp ICMP packets
igmp IGMP packets
kbps With the unit of Kbit/s
cir cir Committed information rate, an integer, ranging from 1 to 10000 pps
cbs cbs Committed burst size, an integer, ranging from 1 to 10000 Kbytes

Default conditions
The CIR is 500pps. The CBS is 500 Kbytes.

Raisecom Proprietary and Confidential


754
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
You can use this command to configure the CIR and CBS of global CPU packet protection.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the CIR and CBS of global CPU protection to 400 and
600.
Raisecom#config
Raisecom(config)#cpu-protect car global kbps cir 400 cbs 600
Set successfully

Related commands
show cpu-protect car statistics

11.9.3 show cpu-protect car statistics

Function
To show statistics of global or interface CPU CAR, use this command.

Format
show cpu-protect car statistics

Parameters
Parameter Description
cpu-protect CPU protection
car Committed access rate

Raisecom Proprietary and Confidential


755
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 11 Security

Parameter Description
statistics Statistics

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show statistics of CPU CAR on interface 1.
Raisecom#show cpu-protect car statistics
PortName Cir(pps) Cbs(KB) pass packet(pkt) drop packet(pkt) pass
byte(byte) drop byte(byte)
-------------------------------------------------------------------------
GE1/4/1 8 1 0 0 0

The following table describes fields in the command output.

Field Description
PortName Interface ID
Cir (pps) Committed information rate
Cbs (KB) Committed bust size
pass packet (pkt) Number of passed packets
drop packet (pkt) Number of discarded packets
pass byte (byte) Number of passed bytes
drop byte (byte) Number of discarded bytes

Related commands
clear cpu-protect car statistics

Raisecom Proprietary and Confidential


756
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12 System management and


maintenance

12.1 LLDP
12.1.1 clear lldp global statistic

Function
To clear statistics of Link Layer Discovery Protocol (LLDP) global, use this command.

Format
clear lldp global statistic

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to clear statistics of LLDP global when starting a new calculation.
Prerequisite

Raisecom Proprietary and Confidential


757
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Follow-up procedure
N/A
Precaution
This command will clear all statistics of global LLDP. Use it with caution.

Examples
This example shows how to clear statistics of LLDP global.
Raisecom#config
Raisecom(config)#clear lldp global statistic
Set successfully.

Related commands
show lldp statistic

12.1.2 clear lldp statistic

Function
To clear statistics of LLDP on specified interface, use this command.

Format
clear lldp statistic [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


758
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
You can use this command to clear statistics of LLDP on specified interface when starting a
new round of calculation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear statistics of LLDP on specified interface. Use it with caution.

Examples
This example shows how to clear statistics of LLDP on interface GE 1/1/1.
Raisecom#config
Raisecom(config)#clear lldp statistic gigaethernet 1/1/1
Set successfully.

Related commands
show lldp statistic

12.1.3 clear lldp remote-table

Function
To clear statistics of LLDP neighbour on specified information, use this command.

Format
clear lldp remote-table [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Raisecom Proprietary and Confidential


759
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to clear statistics of LLDP neighbour on specified information
when starting a new round of calculation.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
This command will clear statistics of LLDP neighbour on specified information. Use it with
caution.

Examples
This example shows how to clear statistics of neighbour on interface GE 1/1/1.
Raisecom#config
Raisecom(config)#clear lldp remote-table gigaethernet 1/1/1
Set successfully.

Related commands
show lldp remote

12.1.4 lldp enable

Function
To enable global LLDP or interface LLDP, use this command. To disable this function, use the
disable form of this command.

Format
lldp { enable | disable }

Raisecom Proprietary and Confidential


760
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
enable Enable LLDP.
disable Disable LLDP.

Default conditions
Global LLDP is disabled. LLDP on all interfaces are enabled.

Command mode
Global configuration/Physical layer interface configuration/Aggregation group interface
configuration

User level
11

Usage guidelines
Scenario
LLDP is used to discover the physical interfaces of a device and interfaces that are connected
to other devices. It helps you to quickly locate network fault. With LLDP, when the network
expands, the NView NNM can quickly master Layer 2 network topology information and
topology changes.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable global LLDP.
Raisecom#config
Raisecom(config)#lldp enable
Set successfully.

Related commands
show lldp local config

Raisecom Proprietary and Confidential


761
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.1.5 lldp message-transmission delay

Function
To configure the delay time for LLDP packets, use this command. To return to the default
condition, use the no form of this command.

Format
lldp message-transmission delay second
no lldp message-transmission delay

Parameters
Parameter Description
second Delay time, an integer, ranging from 1 to 8192 s

Default conditions
The delay time of LLDP packets is 2s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the network status changes, the device will sent LLDP packets to neighbour nodes and
enable the delay timer. During the delay time, if the device status changes again, the device
will not send LLDP packets until the delay time expires.
When the network status changes frequently, you can reduce the frequency for sending LLDP
packets by setting a long delay time.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
We recommend you to configure the interval for sending LLDP packets first. The
interval and the delay time are in inverse relationship. The delay time must be shorter
than or equal to a quarter of the interval. Otherwise, configurations will fail.

Raisecom Proprietary and Confidential


762
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

The delay time must be shorter than the aging time.

Examples
This example shows how to configure the delay time of LLDP packets to 5s.
Raisecom#config
Raisecom(config)#lldp message-transmission delay 5
Set successfully.

Related commands
show lldp local config

12.1.6 lldp message-transmission hold-multiplier

Function
To configure a neighbour aging coefficient for LLDP packets, use this command. To return to
the default condition, use the no form of this command.

Format
lldp message-transmission hold-multiplier coefficient
no lldp message-transmission hold-multiplier

Parameters
Parameter Description
coefficient Neighbor aging coefficient, an integer, ranging from 2 to 10

Default conditions
The neighbour aging coefficient for LLDP packets is 4.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
LLDP packets sent by the device are saved on the neighbour node for a certain time. If the
aging time expires, the neighbour node will delete the LLDP packets. You can use this
command to configure the aging coefficient for LLDP packets.
Prerequisite

Raisecom Proprietary and Confidential


763
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Follow-up procedure
N/A
Precaution
Aging time is the product of the aging coefficient and the interval.

Examples
This example shows how to configure the LLDP neighbour aging time to 10.
Raisecom#config
Raisecom(config)#lldp message-transmission hold-multiplier 10
Set successfully.

Related commands
show lldp local config

12.1.7 lldp message-transmission interval

Function
To configure the interval for sending LLDP packets, use this command. To return to the
default condition, use the no form of this command.

Format
lldp message-transmission interval second
no lldp message-transmission interval

Parameters
Parameter Description
second Interval for sending LLDP packets, an integer, ranging from 5 to 32768s

Default conditions
The interval for sending LLDP packets is 30s.

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


764
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
When its status is stable, the device sends LLDP packets periodically to the neighbour node.
Configure a properly value for the interval. If the interval is over long, the device cannot
inform the neighbour node immediately. If the interval is over short, mass LLDP packets will
be sent to the neighbour node, which may increase system load and waste network resources.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The interval and the delay time are in inverse relationship. The delay time must be 3 times
greater than or equal to the aging time.

Examples
This example shows how to configure the interval for sending LLDP packets to 50s.
Raisecom#config
Raisecom(config)#lldp message-transmission interval 50
Set successfully.

Related commands
show lldp local config

12.1.8 lldp restart-delay

Function
To configure the LLDP restart delay time, use this command. To return to the default
condition, use the no form of this command.

Format
lldp restart-delay second
no lldp restart-delay

Parameters
Parameter Description
second Restart delay time, an integer, ranging from 1 to 10s

Default conditions
The LLDP restart delay time is 2s.

Raisecom Proprietary and Confidential


765
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When LLDP is enabled on an interface, you can use this command to configure the restart
delay time. The device notifies the changes to the neighbour node after a period, preventing
topology vibration of the neighbour node caused by the changes of LLDP status.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the LLDP restart delay time to 10s.
Raisecom#config
Raisecom(config)#lldp restart-delay 10
Set successfully.

Related commands
show lldp local config

12.1.9 lldp trap-interval

Function
To configure the LLDP trap interval timer, use this command. To return to the default
condition, use the no form of this command.

Format
lldp trap-interval second
no lldp trap-interval

Raisecom Proprietary and Confidential


766
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
second LLDP trap interval, an integer, ranging from 5 to 3600s

Default conditions
The LLDP trap interval is 5s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After you use this command to configure a LLDP Trap interval, each interface, where LLDP
is enabled, sends neighbour information to the NView NNM based on the interval. If the
neighbour information changes frequently, you can configure a long LLDP Trap interval to
prevent the topology vibration caused by mass neighbour information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the LLDP trap interval to 10s.
Raisecom#config
Raisecom(config)#lldp trap-interval 10
Set successfully.

Related commands
show lldp local config
snmp-server lldp-trap enable

Raisecom Proprietary and Confidential


767
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.1.10 show lldp local config

Function
To show local configurations of LLDP, use this command.

Format
show lldp local config

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show local configurations of LLDP.
Raisecom#show lldp local config
System configuration:
------------------------------------------------------------------
LLDP enable status: enable (default is disabled)
LldpMsgTxInterval: 30 (default is 30s)
LldpMsgTxHoldMultiplier: 4 (default is 4)
LldpReinitDelay: 2 (default is 2s)
LldpTxDelay: 2 (default is 2s)
LldpNotificationInterval: 5 (default is 5s)
LldpNotificationEnable: enable (default is enabled)
------------------------------------------------------------------
Port Status
--------------------------------------------------------
PC2 enable
Ga1/1/1 enable
Ga1/1/2 enable

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


768
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
LLDP enable status Global LLDP status
LldpMsgTxInterval LLDP interval timer
LldpMsgTxHoldMultiplier LLDP neighbor aging coefficient
LldpReinitDelay LLDP restart timer
LldpTxDelay LLDP delay timer
LldpNotificationInterval LLDP trap timer
LldpNotificationEnable LLDP trap status

Related commands
N/A

12.1.11 show lldp local system-data

Function
To show local information of the LLDP system, use this command.

Format
show lldp local system-data [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Raisecom Proprietary and Confidential


769
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Examples
This example shows how to show local information of the LLDP system.
Raisecom#show lldp local system-data
System information:
-------------------------------------------------------------------------
-------------
ChassisIdSubtype: macAddress
ChassisId: 000E.5E12.3456
SysName: Raisecom
SysDesc: ROS
SysCapSupported: Repeater/Hub,Bridge/Switch
SysCapEnabled: Repeater/Hub,Bridge/Switch
Port SubType PortID Description
-------------------------------------------------------------------------
-------------
PC2 ifName port-channel2 N/A
Ga1/1/1 ifName gigaethernet1/1/1 gigaethernet1/1/1
Ga1/1/2 ifName gigaethernet1/1/2 gigaethernet1/1/2

The following table describes fields in the command output.

Field Description
ChassisIdSubtype Chassis ID sub-type
ChassisId Chassis ID
SysName System ID
SysDesc System description
SysCapSupported Supported system capacities
SysCapEnabled Enabled system capacities
Port Interface name
SubType Interface ID
PortID Interface ID
Description Description

Related commands
N/A

12.1.12 show lldp remote

Function
To show LLDP neighbour information, use this command.

Raisecom Proprietary and Confidential


770
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Format
show lldp remote [ interface-type interface-number ] [ detail ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
detail Detailed information

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show LLDP neighbour information on all interfaces.
Raisecom#show lldp remote
Port ChassisId PortId SysName MgtAddress ExpiredTime
-------------------------------------------------------------------------

The following table describes fields in the command output.

Field Description
Port Interface
ChassisId Chassis ID
PortID Interface ID
SysName System name
MgtAddress Management address
ExpiredTime Aging time

This example shows how to show the detailed information on all interfaces.

Raisecom Proprietary and Confidential


771
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom#show lldp remote detail


port-channel2 has 0 remotes:
gigaethernet1/1/1 has 0 remotes:
gigaethernet1/1/2 has 0 remotes:

Related commands
N/A

12.1.13 show lldp statistic

Function
To show statistics of the LLDP system, use this command.

Format
show lldp statistic [ interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show statistics of the LLDP system on all interfaces.
Raisecom#show lldp statistic
System remote table statistics:
-------------------------------------------------------------------------
Last change time: 1970-01-01,08:00:00
Inserts: 0 Deletes: 0

Raisecom Proprietary and Confidential


772
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

AgesOut: 0 Drops: 0
Port TxFrames RxFrames ErrFrames DropFrames UnknownTlvs AgeoutFrames
-------------------------------------------------------------------------
PC2 0 0 0 0 0 0
Ga1/1/1 0 0 0 0 0 0
Ga1/1/2 0 0 0 0 0 0

The following table describes fields in the command output.

Field Description
Last change time Last change time of the table
Inserts Number of inserted neighbors
Deletes Number of deleted neighbors
AgesOut Number of aging neighbors
Drops Number of discarded neighbors
Port Number of interfaces
TxFrames Number of sent packets
RxFrames Number of received packets
ErrFrames Number of error packets
DropFrames Number of discarded packets
UnknownTlvs Number of unknown TLV packets
AgeoutFrames Number of aging packets

Related commands
N/A

12.1.14 snmp-server lldp-trap enable

Function
To enable LLDP Trap, use this command. To disable this function, use the no form of this
command.

Format
snmp-server lldp-trap { enable | disable }

Parameters
Parameter Description
enable Enable LLDP trap.
disable Disable LLDP trap.

Raisecom Proprietary and Confidential


773
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
LLDP Trap is enabled.

Command mode
Debug configuration

User level
11

Usage guidelines
Scenario
When remote MIB contents change, the device must report this information (an LLDP trap) to
the NView NNM. You can use this command to enable LLDP trap.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable LLDP trap.
Raisecom#debug-hide 0906
Raisecom(debug)#snmp-server lldp-trap disable
Set successfully.

Related commands
lldp trap-interval
show lldp local config

12.2 SNMP
12.2.1 show snmp access

Function
To show SNMP group access information, use this command.

Raisecom Proprietary and Confidential


774
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Format
show snmp access

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show SNMP group access information.
Raisecom#show snmp access
Index: 0
Group: group1
Security Model: usm
Security Level: authnopriv
Context Prefix: --
Context Match: exact
Read View: view1
Write View: --
Notify View: internet

The following table describes fields in the command output.

Field Description
Index Index
Group SNMP group name
Security Model Security model
Usm: use SNMPv3 model
Security Level Security level
Authpriv: SNMP packet authentication and encryption
noauthnopriv: no authentication and encryption for SNMP packets
Context Prefix Context name

Raisecom Proprietary and Confidential


775
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
Context Match Context match mode
Read View View that can be read
Write View View that can be write
Notify View View that can be notified

Related commands
N/A

12.2.2 show snmp community

Function
To show SNMP community information, use this command.

Format
show snmp community

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show SNMP community information.
Raisecom#show snmp community
Index Community Name View Name Permission
----------------------------------------------------------
1 public internet ro
2 private internet rw

Raisecom Proprietary and Confidential


776
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

3 guest mib2 ro
4 raisecom internet rw

The following table describes fields in the command output.

Field Description
Index Index
Community Name Character string of the community
View Name SNMP view name
Permission Access privilege
Ro: read Agent data only
Rw: read and write Agent data

Related commands
N/A

12.2.3 show snmp config

Function
To show SNMP basic configurations, use this command.

Format
show snmp config

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show SNMP basic configurations.

Raisecom Proprietary and Confidential


777
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom#show snmp config


Contact information: service@Raisecom.com
Device location : world china raisecom
SNMP trap status: Disable
SNMP engine ID: 800022B603000E5E551222

The following table describes fields in the command output.

Field Description
Contact information Contact information
Device location Location information of the device
SNMP trap status SNMP trap status
Enable: enable SNMP trap
Disable: disable SNMP trap
SNMP engine ID SNMP engine ID

Related commands
N/A

12.2.4 show snmp group

Function
To show SNMP group user information, use this command.

Format
show snmp group

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Raisecom Proprietary and Confidential


778
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Examples
This example shows how to show SNMP group user information.
Raisecom#show snmp group
Index GroupName UserName SecModel
----------------------------------------------------------
0 initialnone none usm
1 initial md5nopriv usm
2 initial shanopriv usm

The following table describes fields in the command output.

Field Description
Index Index
GroupName SNMP group name
UserName User name
SecModel Security model:
Usm: use SNMPv3 model

Related commands
N/A

12.2.5 show snmp host

Function
To show destination host information, use this command.

Format
show snmp host

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


779
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
N/A

Examples
This example shows how to show SNMP destination host information.
Raisecom#show snmp host
Index: 0
IP family: IPv4
IP address: 10.0.0.1
Port: 162
User Name: raisecom
SNMP Version: v3
Security Level: authnopriv
TagList: bridge config interface rmon snmp ospf

The following table describes fields in the command output.

Field Description
Index Index
IP family IP address version
IP address IP address of the destination host that receives the trap
Port ID of receiving interface
User Name User name
SNMP Version SNMP version
v1: SNMPv1
v2c: SNMPv2c
v3: SNMPv3
Security Level Security level
Authpriv: authenticate and encrypt SNMP packets
Noauthnopriv: do not authenticate or encrypt SNMP packets

Related commands
N/A

12.2.6 show snmp statistics

Function
To show statistics of SNMP, use this command.

Format
show snmp statistics

Raisecom Proprietary and Confidential


780
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show statistics of SNMP.
Raisecom#show snmp statistics
SNMP packets input:6352
Unsupported SNMP version SNMP PDUs: 0
Unknown SNMP community name SNMP PDUs: 0
SNMP community not allowed operation SNMP PDUs: 0
ASN.1 or BER errors SNMP PDUs: 0
SNMP silently dropped SNMP PDUs: 0
SNMP proxy droped SNMP PDUs: 0
Unsupported security level SNMP PDUs: 0
Not in time window SNMP PDUs: 0
Unknown user name SNMP PDUs: 0
Unknown engine ID SNMP PDUs: 0
Wrong Digests SNMP PDUs: 0
Decryption Errors SNMP PDUs: 0

The following table describes fields in the command output.

Field Description
SNMP packets input Number of received SNMP
Unsupported SNMP version SNMP Number of unsupported SNMP PDUs
PDUs
Unknown SNMP community name Number of SNMP PDUs with unknown
SNMP PDUs community names
SNMP community not allowed Number of SNMP PDUs that the community
operation SNMP PDUs disallows to operate
ASN.1 or BER errors SNMP PDUs Number of SNMP PDUs that have ASN.1 or
BER errors

Raisecom Proprietary and Confidential


781
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
SNMP silently dropped SNMP PDUs Number of SNMP PDUs discarded by the
SNMP
SNMP proxy droped SNMP PDUs Number of SNMP PDUs that are discarded by
the SNMP proxy
Unsupported security level SNMP Number of SNMP PDUs that do not support
PDUs security levels
Not in time window SNMP PDUs Number of timeout SNMP PDUs
Unknown user name SNMP PDUs Number of SNMP PDUs with unknown user
names
Unknown engine ID SNMP PDUs Number of SNMP PDUs with unknown SNMP
engine IDs
Wrong Digests SNMP PDUs Number of SNMP PDUs with wrong digests
Decryption Errors SNMP PDUs Number of SNMP PDUs with decryption errors

Related commands
N/A

12.2.7 show snmp user

Function
To show SNMP user information, use this command.

Format
show snmp user

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


782
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
N/A

Examples
This example shows how to show SNMP user information.
Raisecom#show snmp user
Index: 1
User Name: user1
Security Name: user1
EngineID: 800022b603000e5e551222
Authentication: MD5
Privacy: NoPriv

The following table describes fields in the command output.

Field Description
Index Index
User Name User name
Security Name Security name
EngineID SNMP engine ID
Authentication Authentication protocol
NoAuth: do not authenticate SNMP packets
MD5: use MD5 Hash Function to authenticate SNMP packets
SHA: use SHA-1 Hash Function to authenticate SNMP packets
Privacy Encryption protocol
NoPriv: do not encrypt SNMP packets
DES: encrypt SNMP packets with DES

Related commands
N/A

12.2.8 show snmp view

Function
To show SNMP view information, use this command.

Format
show snmp view

Parameters
N/A

Raisecom Proprietary and Confidential


783
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show SNMP view information.
Raisecom#show snmp view
Index: 0
View Name: mib1
OID Tree: 1.3.6.1.2.1
Mask: --
Type: included

The following table describes fields in the command output.

Field Description
Index Index
View Name View name
OID Tree OID of the subtree corresponding to the view
Mask Mask of the subtree
Type Type
Included: the MIB variables of the view are included in the subtree.
Exclude: the MIB variables of the view are excluded from the subtree.

Related commands
N/A

12.2.9 show snmp server-auth

Function
To show IP authentication configurations of the SNMP server, use this command.

Raisecom Proprietary and Confidential


784
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Format
show snmp server-auth

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show IP authentication configurations of the SNMP server and
the IP address information.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show IP authentication configurations of the SNMP server.
Raisecom#show snmp server-auth
SERVERIP: disable
Index IP Address
----------------------
0 1.2.3.4

The following table describes fields in the command output.

Field Description
SERVERIP IP authentication status of the SNMP server
Enable: enabled
Disable: disabled

Raisecom Proprietary and Confidential


785
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
Index Index ID, not correspond to the IP address, arranged in ascending
order of the IP address
IP address IP address of the SNMP server

Related commands
N/A

12.2.10 snmp-server access

Function
To define SNMP group operation, use this command. To delete the SNMP group operations,
use the no form of this command.

Format
snmp-server access group-name [ read view-name ] [ write view-name ] [ notify view-name ]
[ context context-name { exact | prefix } ] usm { noauthnopriv | authnopriv | authpriv }
no snmp-server access group-name [ context context-name] usm { noauthnopriv |
authnopriv | authpriv }

Parameters
Parameter Description
group-name SNMP group name. A maximum of 32 characters are
supported.
read Users in a SNMP group can only read data from the Agent.
write Users in a SNMP group can write data into the Agent.
notify Users in a SNMP group can use Trap.
view-name View name. A maximum of 32 characters are supported.
context context-name Specify the context name or prefix
exact String and the context name are total matched.
prefix String and the first characters of the context name are
matched.
usm Adopt the SNMPv3 security model.
noauthnopriv Do not authenticate or encrypt SNMP packets. It is applicable
to the SNMPv3 security model.
authpriv Authenticate but not encrypt SNMP packets. It is applicable
to the SNMPv3 security model.

Raisecom Proprietary and Confidential


786
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
authnopriv Authenticate and encrypt SNMP packets. It is applicable to
the SNMPv3 security model.

Default conditions
The security model is usm; the security level is nonauthnopriv; the Context Match is exact;
the readable view name is system; the notification name is internet.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
After using this command to configure a SNMP group, only users (NMS) of the SNMP group
can access the device (Agent).
Prerequisite
N/A
Follow-up procedure
You can use the show snmp access command to SNMP group information.
Precaution
When you adopt the SNMPv1 or SNMPv2c security models, the security level is
automatically set to noauthnopriv.

Examples
This example shows how to define operations for SNMP group guestgroup: using the
SNMPv3 security model, setting the security level to authnopriv, and setting the name of the
readable view to mib2.
Raisecom#config
Raisecom(config)#snmp-server access guestgroup read mib2 usm authnopriv
Set successfully.

Related commands
show snmp access

Raisecom Proprietary and Confidential


787
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.2.11 snmp-server community

Function
To configure the community, use this command. To delete the community, use the no form of
this command.

Format
snmp-server community string [ view view-name ] { ro | rw }
no snmp-server community string

Parameters
Parameter Description
string Community name, a string of less than or equal to 32 characters
view view-name MIB view name, a tring of less than or equal to 32 characters
If you do not select this parameter, the default name of an accessible
view is internet.
ro The community can only read data from the Agent.
rw The community can read data from and write data into the Agent.

Default conditions
There are two communities.
Community public: be able to access view internet; only read data from the Agent.
Community private: be able to access view internet; can read data from and write data
into the Agent.

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
SNMPv1 and SNMPv2c adopt community authentication mechanism. By configuring the
community on the Agent (the device), you can control the access authority of the Network
Management Station (NMS). If the SNMP packet sent by the NMS is not matched with the
community string defined in the Agent, the SNMP packet will be discarded, which means the
NMS cannot access to the Agent.
Prerequisite

Raisecom Proprietary and Confidential


788
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Follow-up procedure
You can use the show snmp community command to show community information.
Precaution
N/A

Examples
This example shows how to configure the community to guest, accessing view to mib1 with
read-only privilege.
Raisecom#config
Raisecom(config)#snmp-server community guest view mib1 ro
Set successfully.

Related commands
N/A

12.2.12 snmp-server contact

Function
To configure contact information of NMS, use this command. To return to the default
condition, use the no form of this command.

Format
snmp-server contact string
no snmp-server contact

Parameters
Parameter Description
string Character string, such as E-mail

Default conditions
The contact information is support@raisecom.com.

Command mode
Global configuration

User level
15

Raisecom Proprietary and Confidential


789
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
You can use this command to configure contact information of NMS. You can contact
technical engineers when the device needs maintenance.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure contact information of NMS to service@raisecom.com.
Raisecom#config
Raisecom(config)#snmp-server contact service@raisecom.com
Set successfully.

Related commands
N/A

12.2.13 snmp-server enable traps

Function
To enable SNMP trap, use this command. To disable this function, use the no form of this
command.

Format
snmp-server enable traps
no snmp-server enable traps

Parameters
N/A

Default conditions
SNMP Trap is enabled.

Command mode
Global configuration

Raisecom Proprietary and Confidential


790
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

User level
11

Usage guidelines
Scenario
You can use SNMP trap to send traps to the NMS when the device runs abnormally. This
function will keep you informed of the operation status of the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable SNMP trap on the device.
Raisecom#config
Raisecom(config)#snmp-server enable traps
Set successfully.

Related commands
N/A

12.2.14 snmp-server group user

Function
To add users in SNMP group, use this command. To delete the users, use the no form of this
command.

Format
snmp-server group group-name user user-name usm
no snmp-server group user user-name usm

Parameters
Parameter Description
group-name SNMP group name. A maximum of 32 characters are supported.
user-name User name. A maximum of 32 characters are supported.
usm Adopt SNMPv3 security model, supporting authentication and encryption.

Raisecom Proprietary and Confidential


791
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
Only users in the SNMP group can access to the Agent. Different groups have different access
authorities. You can use this command to add users to a SNMP group. A newly-added user
shares the access authorities of the SNMP group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to add user guestuser1 to SNMP group guestgroup and how to
configure the user guestuser1 to SNMPv3 security model.
Raisecom#config
Raisecom(config)#snmp-server group guestgroup user guestuser1 usm
Set successfully.

Related commands
N/A

12.2.15 snmp-server host

Function
To configure the IP address of the destination host that receives traps, use this command. To
return to the default condition, use the no form of this command.

Format
snmp-server host ip-address version { 1 | 2c } community-string [ udpport port-id ]

Raisecom Proprietary and Confidential


792
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

snmp-server host ip-address version 3 { noauthnopriv | authnopriv | authpriv } user-


name [ udpport port-id ]
no snmp-server host ip-address

Parameters
Parameter Description
ip-address IP address of the destination host, in dotted decimal notation
1 | 2c | 3 SNMP version
v1sm: adopt SNMPv1.
v2csm: adopt SNMPv2c.
usm: adopt SNMPv3.
community- Community name
string SNMPv1 and SNMPv2c use the community to authenticate SNMP
packets. If the community of the NMS is inconsistent with the one on the
Agent, the NMS cannot receive the trap.
udpport UDP port number of the destination host for receiving traps
If you do not select this parameter, the default port number is set to 162.
port-id Port number, an integer, ranging from 1 to 65535
authnopriv Authenticate but not encrypt SNMP packets.
authpriv Neither authenticate nor encrypt SNMP packets.
noauthnopriv User names in the SNMP group
SNMPv3 uses the user name to authenticate SNMP packets. If the user
name of the NMS is inconsistent with the one on the Agent, the NMS
cannot receive the trap.
user-name Community name
The SNMPv1 and SNMPv2c use the community to authenticate SNMP
packets. If the community of the NMS is inconsistent with the one on the
Agent, the NMS cannot receive the trap.

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


793
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
After SNMP trap is enabled on the device, it will send traps to the NMS if the device works
improperly. You can use this command to configure the IP address of the destination NMS and
verify the IP address through authentication methods.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to set the IP address of a host that receives traps to 10.0.0.1, the
security model to SNMPv3, the user name to raisecom, and the privilege to authenticating but
not encrypting SNMP packets.
Raisecom#config
Raisecom(config)#snmp-server host 10.0.0.1 version 3 authnopriv raisecom
Set successfully.

Related commands
N/A

12.2.16 snmp-server location

Function
To configure location information of the device, use this command. To return to the default
condition, use the no form of this command.

Format
snmp-server location location-string
no snmp-server location

Parameters
Parameter Description
location-string Location information, such as raisecom beijing china

Default conditions
The location information is world china raisecom.

Raisecom Proprietary and Confidential


794
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure location information of the device. The location
information facilitates the NMS to locate and maintain the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure location information of the device to raisecom.
Raisecom#config
Raisecom(config)#snmp-server location raisecom
Set successfully.

Related commands
N/A

12.2.17 snmp-server user

Function
To create a user for the SNMP group, use this command. To delete the user, use the no form
of this command.

Format
snmp-server user user-name [ remote engine-id ]
snmp-server user user-name [ remote engine-id ] authentication{ md5 | sha }
authpassword privkey privkey
snmp-server user user-name [ remote engine-id ] authkey { md5 | sha } keyword privkey
privkey
no snmp-server user user-name [ remote engine-id ]

Raisecom Proprietary and Confidential


795
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
user-name SNMP group name. A maximum of 32 characters are supported.
remote Specify the remote SNMP engine ID.
engine-id SNMP engine ID related to a user name
It must be named with even bytes.
authentication Authentication mode of the user
md5 Configure an authentication mode for the user. Use the MD5 Hash
Function to authenticate SNMP packets.
sha Configure an authentication mode for the user. Use the SHA-1 Hash
Function to authenticate SNMP packets.
keyword Authentication key
Work with the Hash Function to generate a verification code for
authentication.
authkey Modify the user's key.
privkey Encrypt information
privkey Encrypt key

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
You can use this command to create a user and configure the authentication mode for the user
in a SNMP group. The NMS cannot access to the Agent unless its user and key information
are identical to the ones on the Agent. This command is valid for SNMPv3. SNMPv2 and
SNMPv2c uses the community instead of SNMP group and users.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


796
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Precaution
N/A

Examples
This example shows how to create user user1, to configure user1 to md5 authentication mode,
to configure the authentication key to raisecom, and to configure user1 not encrypting SNMP
packets.
Raisecom#config
Raisecom(config)#snmp-server user user1 authentication md5 raisecom
Set successfully.

Related commands
N/A

12.2.18 snmp-server view

Function
To create SNMP view, use this command. To delete the view, use the no form of this
command.

Format
snmp-server view view-name oid-tree [ mask ] { included | excluded }
no snmp-server view view-name oid-tree

Parameters
Parameter Description
view-name View name. A maximum of 32 characters are supported.
oid-tree OID of the subtree cprrespondent to the view
mask Mask of the subtree
The mask is set to 0 or 1. A maximum of 16 characters are supported,
such as 1.1.1.1.0.1.
If some bit is set to 0, it indicates the value of the MIB variable of a
view may not be identical to the one of the OID.
If some bit is set to 1, it indicates the value of the MIB variable of a

view must be identical to the one of the OID.


For example, the OID of a MIB subtree in a view is set to 1.3.6.1.2.1.
The mask is set to 1.1.1.1.0.1. The first four bits and the last bit of the
MIB variable must be identical to the ones of the subtree, that is,
1.3.6.1.x.1. The fifth x may be any number from 0 to 9. That is, the
MIB variable of this view may be set to 1.3.6.1.0.1,
1.3.6.1.1.1 1.3.6.1.9.1.
If you do not select this parameter, the default mask is null.

Raisecom Proprietary and Confidential


797
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
included MIB variables of the view are included in the subtree.
excluded MIB variables of the view are excluded from the subtree.

Default conditions
There are view system and view internet.
View system: the subtree is 1.3.6.1.2.1.1; the mask is null, and the type is include.
View internet: the subtree is 1.3.6; the mask is null, and the type is include.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
SNMP is a collection of MIB variables. It defines MIB variables that can be accessed. SNMP
view is used for SNMPv3 only. SNMP view is not defined in SNMPv1 and SNMPv2.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to create view mib1 and configure the MIB variables of the view to
all variables in subtree 1.3.6.1.2.1 and mask 1.1.1.1.0.1.
Raisecom#config
Raisecom(config)#snmp-server view mib1 1.3.6.1.2.1 1.1.1.1.0.1 included
Set successfully.

Related commands
N/A

Raisecom Proprietary and Confidential


798
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.2.19 snmp-server server-auth

Function
To configure the IP authentication address for the SNMP server, use this command. To disable
this function, use the no form of this command.

Format
snmp-server server-auth ip-address
no snmp-server server-auth ip-address

Parameters
Parameter Description
ip-address IP address of the SNMP server, in dotted decimal notion

Default conditions
The IP authentication address of the SNMP server is not configured.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the IP authentication address for the SNMP server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
You can configure up to 100 IP authentication addresses for the SNMP server.

Examples
This example shows how to configure the IP authentication address for the SNMP server to
192.168.1.100.
Raisecom#config

Raisecom Proprietary and Confidential


799
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom(config)#snmp-server server-auth 192.168.1.100


Set successfully.

Related commands
show snmp server-auth

12.2.20 snmp-server server-auth enable

Function
To enable IP authentication of the SNMP server, use this command. To disable this function,
use the disable form of this command.

Format
snmp-server server-auth { enable | disable }

Parameters
Parameter Description

enable Enable IP authentication of the SNMP server.


disable Disable IP authentication of the SNMP server.

Default conditions
IP authentication of the SNMP server is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to enable IP authentication of the SNMP server.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


800
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Examples
This example shows how to enable IP authentication of the SNMP server.
Raisecom#config
Raisecom(config)#snmp-server server-auth enable
Set successfully.

Related commands
show snmp server-auth

12.3 Optical module DDM


12.3.1 show transceiver

Function
To show status of global switch and interface switch of optical module Digital Diagnostics
Monitoring (DDM), use this command.

Format
show transceiver

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show status of global switch and interface switch of optical module DDM.
Raisecom#show transceiver

Raisecom Proprietary and Confidential


801
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Globe config status:


Digitaldiagnotic: Disable
Trap: Disable
PasswordCheck : Disable

Port config status:


Port Ddm Trap PasswordCheck
----------------------------------------------------------
FE1/3/1 Enable Enable Enable

The following table describes fields in the command output.

Field Description
Digitaldiagnotic Optical module DDM status
Enable: enabled
Disable: disabled
Trap Optical module DDM Trap status
Enable: enabled
Disable: disabled
PasswordCheck Password check status
Enable: enabled
Disable: disabled

Related commands
N/A

12.3.2 show transceiver ddm

Function
To show information about optical module DDM, use this command.

Format
show transceiver ddm interface-type interface-number [ detail ]

Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type
The interface-number refers to three dimensional Interface ID,
supporting port range padding mode such as "1-3".
detail Display detailed information, including alarm types and threshold

Default conditions
N/A

Raisecom Proprietary and Confidential


802
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about optical module DDM on interface 1 of
slot3.
Raisecom#show transceiver ddm fastethernet 1/3/1
If device is externally calibrated, only calibrated values are printed.
++ : high alarm, + : high warning, - : low warning, -- : low alarm,
* :normal
Tx: transmit, Rx: receive,mA: milliamperes.

Port: fastethernet 1/3/1


ParaName Unit Value Status
-------------------------------------------------------------------
Temperature Celsius 52.7180 *
Tx bias Current mA 10.1920 *
Optical Tx Power dBm -5.8000 *
Optical Rx Power dBm -7.3750 *
Supply Voltage Volts 3.3360 *

The following table describes fields in the command output.

Field Description
high alarm High alarm
high warning High warning
low warning Low warning
low alarm Low alarm
normal Normal
Temperature Temperature
Tx bias Current Current
Optical Tx Powe Sent optical power
Optical Rx Power Receive optical power
Supply Voltage Voltage

This example shows how to show detailed information about optical module DDM on
interface 1 of slot3.

Raisecom Proprietary and Confidential


803
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom#show transceiver ddm fastethernet 1/3/1 detail


Transceiver digitaldiagnotic: Enable
Transceiver trap: Disable

++ : high alarm, + : high warning, - : low warning, -- : low alarm.


The threshold values are calibrated

Port: fastethernet 1/3/1


ParaName Unit Value Status
------------------------------------------------------------
Temperature Celsius 52.5620 *
High Alarm Threshold: 80.0000
High Warn Threshold : 75.0000
Low Warn Threshold : 0.0000
Low Alarm Threshold : -5.0000
Tx bias Current mA 10.1360 *
High Alarm Threshold: 100.0000
High Warn Threshold : 80.0000
Low Warn Threshold : 0.0000
Low Alarm Threshold : 0.0000
Optical Tx Power dBm -5.8170 *
High Alarm Threshold: -2.4950
High Warn Threshold : -2.9930
Low Warn Threshold : -10.4960
Low Alarm Threshold : -10.9960
Optical Rx Power dBm -7.3750 *
High Alarm Threshold: -1.9920
High Warn Threshold : -2.9930
Low Warn Threshold : -21.9380
Low Alarm Threshold : -22.9240
Supply Voltage Volts 3.3360 *
High Alarm Threshold: 3.6000
High Warn Threshold : 3.5000
Low Warn Threshold : 3.1000
Low Alarm Threshold : 3.0000

Related commands
N/A

12.3.3 show transceiver history

Function
To show historical information about optical module DDM, use this command.

Format
show transceiver interface-type interface-number history [ 15m | 24h ]

Raisecom Proprietary and Confidential


804
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type
The interface-number refers to three dimensional Interface ID,
supporting port range padding mode such as "1-3".
15m Optical module DDM information during 15 minutes
24h Optical module DDM information during 24 hours

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show historical information about optical module DDM on
interface 1 of slot3 with an interval of 15 minutes.
Raisecom#show transceiver fastethernet 1/3/1 history 15m
Temperature : Celsius
Tx bias Current : mA
Optical Tx Power: dBm
Optical Rx Power: dBm
Supply Voltage : Volts
----------------------------------------------------------------------
Period type: 15 minute
Port parameterName periodNumber max min mean
fastethernet 1/3/1 Temperature 1 52.9680 52.5310 52.7150
fastethernet 1/3/1 Temperature 2 53.0620 52.6250 52.8400
fastethernet 1/3/1 Temperature 3 52.9680 52.4680 52.7450
fastethernet 1/3/1 Temperature 4 53.0930 52.6560 52.8670
fastethernet 1/3/1 Tx bias Current 1 10.1840 10.1280 10.1580
fastethernet 1/3/1 Tx bias Current 2 10.2000 10.1200 10.1700
fastethernet 1/3/1 Tx bias Current 3 10.2000 10.1280 10.1610
fastethernet 1/3/1 Tx bias Current 4 10.2080 10.1440 10.1710
fastethernet 1/3/1 Optical Tx Power 1 -5.7670 -5.8670 -5.7980
fastethernet 1/3/1 Supply Voltage 1 3.3380 3.3310 3.3340
fastethernet 1/3/1 Supply Voltage 2 3.3390 3.3310 3.3340

Raisecom Proprietary and Confidential


805
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

fastethernet 1/3/1 Supply Voltage 3 3.3400 3.3310 3.3340


fastethernet 1/3/1 Supply Voltage 4 3.3390 3.3320 3.3350
Period type: 24 hours
Port parameterName periodNumber max min mean

The following table describes fields in the command output.

Field Description
Temperature Temperature
Tx bias Current Current
Optical Tx Powe Sent optical power
Optical Rx Power Received optical power
Supply Voltage Voltage
port Interface ID
parameterName Parameter name
periodNumber Interval
max Maximum value
min Minimum value
mean Mean

Related commands
N/A

12.3.4 show transceiver information

Function
To show basic information about the optical module, use this command.

Format
show transceiver information interface-type interface-number

Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type
The interface-number refers to three dimensional Interface ID,
supporting port range padding mode such as "1-3".

Raisecom Proprietary and Confidential


806
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show basic information about the optical module on interface 1 of
slot 3.
Raisecom#show transceiver information fastethernet 1/3/1
Interface FE1/3/1 basic information:
--------------------------------------------
Transceiver Type : SFP
Vendor Name : Raisecom
Vendor Part Number : USFP-Gb/S1-D-03R
*Vendor Serial Number : B1811602286
*Vendor Version : 1.0
Digital diagnostic function : support
Calibration type : internal
RSSI : not support
Media type : single_modeKm
Transfer Distance(meter) : 15000
Connector type : fiber_jack
Wavelength(nm) : 1310
Min data rate(Gb/s) : --
Max data rate(Gb/s) : --
Wavelength tolerance(nm) : --
*Compatibility type : 1000_BASE_LX
*Max power dissipation : --
*CDR : not support
TX Ref Clock : not required
Laser type : 850 nm VCSEL
Wavelength control : not support
Cooled laser : no
Tunable laser : no
Detector type : PIN
*line loopback : not support
*XFI loopback : not support
VPS : not support
Tx_Dis control : not support
Standby control : not support
VPS inner low power : not support
VPS outer low power : support

Raisecom Proprietary and Confidential


807
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

FEC : support
CMU : support

Related commands
N/A

12.3.5 show transceiver threshold-violations

Function
To show information about the optical module of last known threshold violation, use this
command.

Format
show transceiver threshold-violations interface-type interface-number

Parameters
Parameter Description
interface-type Interface list
interface-number The interface-type means interface type
The interface-number refers to three dimensional Interface ID,
supporting port range padding mode such as "1-3".

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the optical module on interface 1 of slot
3 of last known threshold violation.
Raisecom#show transceiver threshold-violations fastethernet 1/3/1
DDDD: days, HH: hours, MM: minutes, SS: seconds

Time since Last Known

Raisecom Proprietary and Confidential


808
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Threshold Violation Type(s) of Last Known


Port (DDDD:HH:MM:SS) Threshold Violation(s)
-----------------------------------------------------------
fastethernet 1/3/1 NA NA

The following table describes fields in the command output.

Field Description
DDDD Day
HH Hour
MM Minute
SS Second
Port Interface ID
Time since Last Known threshold Time since last known threshold violation
Violation(DDDD:HH:MM:SS)
Type(s) of Last Known Threshold Type of last known threshold violation
Violation(s)

Related commands
N/A

12.3.6 snmp-server trap transceiver enable

Function
To enable global optical module trap, use this command. To disable this function, use the
disable form of this command.

Format
snmp-server trap transceiver { enable | disable }

Parameters
Parameter Description
enable Enable global optical module trap.
When the system detects abnormally in optical module parameters, it
generates a trap.
disable Disable global optical module trap.

Default conditions
Global optical module trap is disabled.

Raisecom Proprietary and Confidential


809
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The optical module has five parameters: transceiver temperature, interior supply voltage, sent
bias current, sent optical power, and received optical power. Each parameter has a threshold.
After optical module DDM is enabled, OOM will monitor these parameters. If any threshold
is exceeded, a trap is generated.
Prerequisite
You can use transceiver ddm command to enable optical module trap.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to disable global optical module trap.
Raisecom#config
Raisecom(config)#snmp-server trap transceiver disable
Set successfully.

Related commands
show transceiver

12.3.7 transceiver ddm enable

Function
To enable optical module DDM, use this command. To disable this function, use the disable
form of this command.

Format
transceiver ddm { enable | disable }

Raisecom Proprietary and Confidential


810
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
enable Enable optical module DDM.
disable Disable optical module DDM

Default conditions
Global optical module DDM is disabled. Interface optical module DDM is enabled.

Command mode
Global configuration/Physical layer interface configuration

User level
11

Usage guidelines
Scenario
Optical module DDM provides a method for monitoring optical module performance
parameters. You can predict its lifetime, isolate system faults, and verify its compatibility in
the installation site by analysing the monitored data.
In global configuration mode, you can use the transceiver ddm enable command to enable
global optical module DDM.
In physical layer interface configuration mode, you can use the transceiver ddm enable
command to enable optical module DDM on an interface.
The optical module will perform digital diagnostics only when global and interface optical
module DDM are both enabled.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable global optical module DDM.
Raisecom#config
Raisecom(config)#transceiver ddm enable
Set successfully.

Raisecom Proprietary and Confidential


811
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
show transceiver

12.3.8 transceiver trap enable

Function
To enable optical module trap on the interface, use this command. To disable this function,
use the disable form of this command.

Format
transceiver trap { enable | disable }

Parameters
Parameter Description

enable Enable optical module trap on the interface.


When the system detects anomaly in optical module parameters, it
generates a trap.
disable Disable optical module trap on the interface.

Default conditions
Optical module trap on the interface is enabled.

Command mode
Physical layer interface configuration

User level
11

Usage guidelines
Scenario
The optical module has five parameters: transceiver temperature, interior supply voltage, sent
bias current, sent optical power, and received optical power. Each parameter has a threshold.
After optical module DDM is enabled, OOM will monitor these parameters. If any threshold
is exceeded, a trap is generated.
Prerequisite
You can use the transceiver ddm command to enable optical module DDM.
You can use the snmp-server trap transceiver enable command to enable global optical
module trap.
Follow-up procedure

Raisecom Proprietary and Confidential


812
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Precaution
N/A

Examples
This example shows how to enable optical module trap on interface 1 of slot 3.
Raisecom#config
Raisecom(config)#interface fastethernet 1/3/1
Raisecom(config-gigaethernet1/1/1)#transceiver trap enable
Set successfully.

Related commands
show transceiver

12.4 System log


12.4.1 clear logging buffer

Function
To clear logs of the log buffer, use this command.

Format
clear logging buffer

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
N/A

Raisecom Proprietary and Confidential


813
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Examples
This example shows how to clear logs of the log buffer.
Raisecom#config
Raisecom(config)#clear logging buffer
Set successfully.

Related commands
show logging buffer

12.4.2 clear logging statistics

Function
To clear statistics of log, use this command.

Format
clear logging statistics

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
N/A

Examples
This example shows how to clear statistics of log.
Raisecom#config
Raisecom(config)#clear logging statistics
Set successfully.

Related commands
N/A

Raisecom Proprietary and Confidential


814
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.4.3 logging buginf

Function
To configure sending Level 7 (debug-level) logs, use this command.

Format
logging buginf [ high | normal | low | none ]

Parameters
Parameter Description

high Send debugging information with highest level only.


normal Send debugging information with normal and high levels.
low Send all debugging information.
none Do not send debugging information.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Level 7 debugging information is divided into 4 types: debugging information with high,
normal, low or none priority. The processing modes for these types are different.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the debugging information to high level.

Raisecom Proprietary and Confidential


815
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom#config
Raisecom(config)#logging buginf high
Set successfully.

Related commands
N/A

12.4.4 logging buffered

Function
To output logs to the log buffer, use this command. To disable this function, use the no form
of this command.

Format
logging buffered [ log-level | alerts | critical | debugging | emergencies | errors |
informational | notifications | warnings | distriminator distriminator-number ]
no logging buffered

Parameters
Parameter Description
log-level Severity level of logs, an integer ranging from 0 to 7
It has the same function with the following 8 parameters. The
difference is that severity level is shown in number, but the
following 8 parameters are shown in characters.
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect services but need attention.
warnings Level 4, warning
May cause service fault and need attention.
notifications Level 5, normal
Provide key operation information when the device works
properly.
informational Level 6, notification event
Provide general operation information when the device works
properly.

Raisecom Proprietary and Confidential


816
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
debugging Level 7, debugging information
Provide general operation information when the device works
properly. Need no attention.
discriminator Establish a connection with the discriminator. Output
discriminated logs to the log buffer.
distriminator-number Discriminator number, an integer, ranging from 1 to 5

Default conditions
Output informational-level logs to the log buffer.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to output specified logs to the log buffer. In addition, you can use
this command to output logs of level lower than the specified log.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to output errors-level logs to the log buffer.
Raisecom#config
Raisecom(config)#logging buffered errors
Set successfully.

This example shows how to disable logs from being output to the log buffer.
Raisecom(config)#no logging buffered
Set successfully.

Raisecom Proprietary and Confidential


817
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
show logging buffer

12.4.5 logging buffered size

Function
To configure the log buffer size, use this command. To return to the default condition, use the
no form of this command.

Format
logging buffered size size
no logging buffered size

Parameters
Parameter Description
size Buffer size, an integer, ranging from 4 to 256 Kbytes

Default conditions
The buffer size is 4 Kbytes.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the log buffer size.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
If the log buffer size changes, all logs in it will be deleted.

Raisecom Proprietary and Confidential


818
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Examples
This example shows how to configure the log buffer size to 10 Kbytes.
Raisecom#config
Raisecom(config)#logging buffered size 10
Set successfully.

Related commands
show logging buffer

12.4.6 logging console

Function
To output logs to the console, use this command. To disable this function, use the no form of
this command.

Format
logging console [ log-level | alerts | critical | debugging | emergencies | errors |
informational | notifications | warnings | distriminator distriminator-number ]
no logging console [ distriminator ]

Parameters
Parameter Description
log-level Severity level of logs, an integer, ranging from 0 to 7. It has the same
function with the following 8 parameters. The difference is that
severity level is shown in number, but the following 8 parameters are
shown in characters.
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect services but need attention.
warnings Level 4, warning
May cause service fault and need attention.
notifications Level 5, normal
Provide key operation information when the device works properly.

Raisecom Proprietary and Confidential


819
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
informational Level 6, notification event
Provide general operation information when the device works
properly.
debugging Level 7, debugging information
Provide general operation information when the device works
properly. Need no attention.
discriminator Establish a connection with the discriminator. Output discriminated
logs to the log buffer.

Default conditions
Output information-level logs and logs of lower level to the console.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to output specified logs to the console. In addition, you can use
this command to output logs of level lower than the specified log.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to output errors-level logs to the console.
Raisecom#config
Raisecom(config)#logging console errors
Set successfully.

This example shows how to disable logs from being output to the console.
Raiscom(config)#no logging console
Set successfully.

Raisecom Proprietary and Confidential


820
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
show logging

12.4.7 logging discriminator

Function
To configure a log discriminator, use this command. To delete the discriminator, use the no
form of this command.

Format
logging discriminator distriminator-number { facility | mnemonics | msg-body } { drops |
includes } key
logging discriminator distriminator-number { facility | mnemonics | msg-body } none
no logging discriminator distriminator-number

Parameters
Parameter Description
distriminator-number Discriminator number, an integer, ranging from 1 to 5
facility Discriminate a log based on its module name.
mnemonics Discriminate a log based on its name.
msg-body Discriminate a log based on its body text.
drops Drop logs that contain keywords and allow logs that do not
contain keywords.
includes Drop logs that do not contain keywords and allow logs that
contain keywords.
none Do not discriminate selected fields.
key Keyword, a string of characters
facility: the length of the key ranges from 1 to 20
characters.
mnemonics: the length of the key ranges from 1 to 30
characters.
msg-body: the length of the key ranges from 1 to 64
characters.
Logs that contain these keywords will be selected.

Default conditions
N/A

Raisecom Proprietary and Confidential


821
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Discriminators are divided into facility, mnemonics and msg-body discriminators. They
discriminate logs based on different fields.
faclility: filter a log based on its module name.
mnemonics: filter a log based on its name
msg-body: filter a log based on its body text.
If the log contains these keywords, it will be selected and filtered.
A discriminator can set multiple filtering rules on many fields of a log. The log is
discriminated in the order of facility, mnemonics, and msg-body.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The logs are discriminated in a form of untotally-matched mode. If the keyword is contained
in the logs, the logs will be selected.
The keyword is case sensitive.

Examples
This example shows how to configure discriminator 1 to discard logs that contain the
keyword test.
Raisecom#config
Raisecom(config)#logging discriminator 1 mnemonics drops test
Set successfully.

Related commands
N/A

Raisecom Proprietary and Confidential


822
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.4.8 logging facility

Function
To configure the facility field of logs sent to the log host, use this command. To return to the
default condition, use the no form of this command.

Format
logging [ host ip-address ] facility { alert | audit | | auth | clock | cron | daemon | ftp | kern |
local0 | local1 | local2 | local3 | local4 | local5 | local6 | local7 | lpr | mail | news | ntp |
sercurity | syslog | user | uucp }
no logging facility

Parameters
Parameter Description
host ip-address IP address of the host, in dotted decimal notion
alert Logs generated by system alarms
audit Logs generated when audited
auth Logs generated when authenticated
clock Information about clock management process
cron cron/at tool information
daemon Information about system guard process
ftp Information about FTP process
kern Logs generated by kernel
local0-7 Locally-generated logs
lpr Logs generated by Line Printer system
mail Logs generated by mail system
news Logs generated by USENET network news system
ntp Logs generated by network time sub-system
security Logs generated when authorized
syslog Logs generated by system log
user Logs generated by user process
uucp UUCP system information

Default conditions
The facility field is local7.

Raisecom Proprietary and Confidential


823
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure the facility field of all the logs sent to the log host.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to set the facility field to auth.
Raisecom#config
Raisecom(config)#logging facility auth
Set successfully.

Related commands
N/A

12.4.9 logging file

Function
To output logs to the log file, use this command. To disable this function, use the no form of
this command.

Format
logging file [ discriminator distriminator-number ]
no logging file [ discriminator ]

Raisecom Proprietary and Confidential


824
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
distriminator Establish a connection with the discriminator. Output
discriminated logs to the log file.
distriminator-number Discriminator number, an integer, ranging from 1 to 5

Default conditions
N/A

Command mode
Global configuration

User level
15

Usage guidelines
Scenario
Key status and operation information of the device is recorded to the logs. Logs are output to
the terminal, log file, log host, console, and log buffer.
To output logs that are equal to or lower than the specified level to the terminal, use this
command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to output logs to the log file.
Raisecom#config
Raisecom(config)#logging file
Set successfully.

Related commands
show logging file

Raisecom Proprietary and Confidential


825
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.4.10 logging history

Function
To output logs to the log history table, use this command. To disable this function, use the no
form of this command.

Format
logging history
no logging history

Parameters
N/A

Default conditions
Logs cannot be output to the log history table.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to output logs to the log history table.
Prerequisite
N/A
Follow-up procedure
You can use the logging history size command to configure the log history table size.
Precaution
N/A

Examples
This example shows how to output logs to the log history table.
Raisecom#config
Raisecom(config)#logging history
Set successfully.

Raisecom Proprietary and Confidential


826
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
show logging history

12.4.11 logging history size

Function
To configure the log history table size, use this command. To return to the default condition,
use the no form of this command.

Format
logging history size size
no logging history size

Parameters
Parameter Description
size Log history size, an integer, ranging from 1 to 500

Default conditions
Log history size is 1.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The log history size refers to number of logs saved in the history table. You can use this
command to configure the log history size.
Prerequisite
N/A
Follow-up procedure
You can use the logging history command to output logs to the log history table.
Precaution
If the log history table size changes, logs in it will be deleted.

Raisecom Proprietary and Confidential


827
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Examples
This example shows how to configure the log history table size to 100.
Raisecom#config
Raisecom(config)#logging history size 100
Set successfully.

Related commands
show logging history

12.4.12 logging host

Function
To output logs to the log host, use this command. To return to the default condition, use the no
form of this command.

Format
logging host ip-address [ log-level | alerts | critical | debugging | emergencies | errors |
informational | notifications | warnings | distriminator distriminator-number ]
no logging host ip-address

Parameters
Parameter Description
ip-address IP address of the log host, in dotted decimal notation, such as
10.0.0.1
log-level Severity level of logs, an integer ranging from 0 to 7. It has the
same function with the following 8 parameters. The difference is
that severity level is shown in number, but the following 8
parameters are shown in characters.
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect services but need attention.
warnings Level 4, warning
May cause service fault and need attention.

Raisecom Proprietary and Confidential


828
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
notifications Level 5, normal
Provide key operation information when the device works
properly.
informational Level 6, notification event
Provide general operation information when the device works
properly.
debugging Level 7, debugging information
Provide general operation information when the device works
properly. Need no attention.
distriminator Establish a connection with the discriminator. Output
discriminated logs to the log host.
distriminator-number Discriminator number, an integer, ranging from 1 to 5.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Key status and operation information of the device is recorded to the logs. Logs are output to
the terminal, log file, log host, console, and log buffer.
To output logs that are equal to or lower than the specified level to the terminal, use this
command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


829
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Examples
This example shows how to output alerts-level logs and logs that have a lower level, to the log
host with the IP address of 10.0.0.1.
Raisecom#config
Raisecom(config)#logging host 10.0.0.1 alerts
Set successfully.

Related commands
N/A

12.4.13 logging monitor

Function
To output logs to the terminal (terminal that connected to the device through Telnet), use this
command. To disable this function, use the no form of this command.

Format
logging monitor [ log-level | alerts | critical | debugging | emergencies | errors |
informational | notifications | warnings | distriminator distriminator-number ]
no logging monitor [ distriminator ]

Parameters
Parameter Description
log-level Severity level of logs, an integer ranging from 0 to 7. It has the
same function with the following 8 parameters. The difference is
that severity level is shown in number, but the following 8
parameters are shown in characters.
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect services but need attention.
warnings Level 4, warning
May cause service fault and need attention.
notifications Level 5, normal
Provide key operation information when the device works
properly.

Raisecom Proprietary and Confidential


830
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
informational Level 6, notification event.
Provide general operation information when the device works
properly.
debugging Level 7, debugging information.
Provide general operation information when the device works
properly. Need no attention.
distriminator Establish a connection with the discriminator. Output discriminated
logs to the terminal.
distriminator-number Discriminator number, an integer, ranging from 1 to 5.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Key status and operation information of the device is recorded to the logs. Logs are output to
the terminal, log file, log host, console, and log buffer.
To output logs that are equal to or lower than the specified level to the terminal, use this
command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to output warnings-level logs and logs with lower level to the
terminal.
Raisecom#config
Raisecom(config)#logging monitor warnings
Set successfully.

Raisecom Proprietary and Confidential


831
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
N/A

12.4.14 logging on

Function
To enable log, use this command. To disable the function, use the no form of this command.

Format
logging on
no logging on

Parameters
N/A

Default conditions
Log is enabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
User's operation and the anomaly of the device are saved in the log. It provides a significant
evident for maintaining and diagnosing the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable log.
Raisecom#config

Raisecom Proprietary and Confidential


832
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom(config)#logging on
Set successfully.

Related commands
show logging

12.4.15 logging rate-limit

Function
To configure the rate for processing logs, use this command. To return to the default condition,
use the no form of this command.

Format
logging rate-limit log-num
no logging rate-limit

Parameters
Parameter Description
log-num Number of logs processed per second, an integer, ranging from 1 to 10000

Default conditions
The rate for processing logs is 0, which means there is no rate restriction.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The system need to process a log after it is generated. If the rate for generating logs is over
great, a lot of system resources will be consumed. You can use this command to configure the
rate for processing logs. When the generating rate exceeds the configured value, logs will be
discarded.
Prerequisite
N/A
Follow-up procedure
N/A

Raisecom Proprietary and Confidential


833
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Precaution
N/A

Examples
This example shows how to configure the rate for processing logs to 100.
Raisecom#config
Raisecom(config)#logging rate-limit 100
Set successfully.

Related commands
show logging

12.4.16 logging sequence-number

Function
To use the sequence number field of a log, use this command. To disable this function, use the
no form of this command.

Format
logging sequence-number
no logging sequence-number

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When you view a log, you can view the sequence number field of the log. The sequence
number begins with 000001 and is added by 1 each time the system receives a log.
Prerequisite
N/A

Raisecom Proprietary and Confidential


834
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Follow-up procedure
N/A
Precaution
The sequence number is meaningful only when logs are output to the console, terminal, log
file, and log buffer. The sequence number is meaningless when logs are output to log host and
log history table.

Examples
This example shows how to use the sequence number field of a log.
Raisecom#config
Raisecom(config)#logging sequence-number
Set successfully.

Related commands
N/A

12.4.17 logging time-stamp

Function
To configure the timestamp option of a log, use this command.

Format
logging time-stamp { debug | log } { datetime | uptime | none }

Parameters
Parameter Description
debug Configure the timestamp for Level 7 logs.
log Configure the timestamp for Level 0-Level 6 logs.
datetime The timestamp is an absolute time, a given time, that is, the system time.
uptime The timestamp is a relative time, a period, that is, the period after the
device is booted.
none There is no timestamp.

Default conditions
N/A

Command mode
Global configuration

Raisecom Proprietary and Confidential


835
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

User level
11

Usage guidelines
Scenario
You can use this command to configure the timestamp option of a log.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the timestamp option of Level 7 log to uptime.
Raisecom#config
Raisecom(config)#logging time-stamp log uptime
Set successfully.

Related commands
show logging

12.4.18 logging trap

Function
To translate logs in the history table into trap, use this command. To disable this function, use
the no form of this command.

Format
logging trap [ log-level | alerts | critical | debugging | emergencies | errors | informational |
notifications | warnings | distriminator distriminator-number ]
no logging trap [ distriminator ]

Parameters
Parameter Description
log-level Severity level of logs, an integer ranging from 0 to 7. It has the
same function with the following 8 parameters. The difference is
that severity level is shown in number, but the following 8
parameters are shown in characters.

Raisecom Proprietary and Confidential


836
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
emergencies Level 0, emergency
System cannot be used and need to be rebooted.
alerts Level 1, alert
Must take actions immediately.
critical Level 2, critical
Must take actions or analyze reasons.
errors Level 3, error
Do not affect serviced but need attention.
warnings Level 4, warning
May cause service fault and need attention.
notifications Level 5, normal
Provide key operation information when the device works
properly.
informational Level 6, notification event
Provide general operation information when the device works
properly.
debugging Level 7, debugging information
Provide general operation information when the device works
properly. Need no attention.
distriminator Establish a connection with the discriminator. Output
discriminated logs to the log history table.
distriminator-number Discriminator number, an integer, ranging from 1 to 5.

Default conditions
Translate warnings-level logs in the log history table into Trap.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After enabling outputting logs to the log history table, if a log is output to the log history table,
the system will translated the log with lower or equal level to the specified level into trap. If
outputting logs to the log history table is disabled, no log will be translated into trap.

Raisecom Proprietary and Confidential


837
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Prerequisite
You must use the logging history command to output logs to the log history table. Otherwise,
logs cannot be translated into trap.
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to translated errors-level logs into trap.
Raisecom#config
Raisecom(config)#logging trap errors
Set successfully.

Related commands
show logging

12.4.19 show logging

Function
To show log information, use this command.

Format
show logging [ buffer | discriminator | file | history ]

Parameters
Parameter Description
buffer Show information about the log buffer.
discriminator Show information about the discriminator.
file Show information about the log file.
history Show information about the log history table.

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


838
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

User level
5

Usage guidelines
N/A

Examples
This example shows how to show log information.
Raisecom#show logging
Syslog logging: enable
Dropped Log messages: 0
Dropped debug messages: 0
Rate-limited: 0 messages per second
Squence number display: disable
Debug level time stamp: none
Log level time stamp: datetime
Log buffer size: 4kB
Debug level: Low
Syslog history logging: enable
Syslog history table size:10
Dest Status Level LoggedMsgs DroppedMsgs Discriminator
-----------------------------------------------------------------------
buffer disable informational(6) 1 2 0
console enable warnings(5) 0 0 0
trap enable warnings(5) 0 0 0
file disable 0 0 0
Log host information:
Max number of log server: 10
Current log server number: 0
Target Address Level Facility Sent Drop Discriminator
-------------------------------------------------------------------

The following table describes fields in the command output.

Field Description
Syslog logging Status of log
Enable: enabled
Disable: disabled
Dropped Log messages Number of discarded logs
Dropped debug messages Number of discarded debugging packets
Rate-limited Rate for processing logs
Enable: view sequence number of a log.
Squence number display
Disable: do not view sequence number of a log.
Debug level time stamp Timestamp of Level 0-Level 6 logs
Datetime: absolute time
Uptime: relative time
None: no timestamp

Raisecom Proprietary and Confidential


839
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
Log level time stamp Timestamp of Level 7 logs
Datetime: absolute time
Uptime: relative time
None: no timestamp

Log buffer size Log buffer size


Debug level Debugging level
Syslog history logging Status of log history table
Enable: enabled
Disable: disabled
Syslog history table size Log history table size
Dest Destination of output logs
buffer: log buffer
console: console
file: log file
history: log history table
host: log host
monitor: Telnet terminal
trap: NView NNM

Status Status:
Enable: enabled
Disable: disabled
Level Severity level
mergencies: level 0, emergency
alerts: level 1, alert
critical: level 2, critical
errors: level 3, error
warnings: level 4, warning
notifications: level 5, normal
informational: level 6, notification
debugging: level 7, debugging information

LoggedMsgs Number of recorded messages


DroppedMsgs Number of discarded messages
Discriminator Connected discriminator
Log host information: Information about the log host
Max number of log server Maximum number of log hosts
Current log server number Current number of log hosts
Target Address IP address of the log host
Level Severity level
Facility Module that generates logs
Sent Number of sent logs

Raisecom Proprietary and Confidential


840
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
Drop Number of received logs

Related commands
N/A

12.5 Alarm management


12.5.1 alarm active delay

Function
To configure the alarm delay time, use this command.

Format
alarm active delay second [ schedule-list list-number ]
no alarm active delay [ schedule-list list-number ]

Parameters
Parameter Description
second Delay time, an integer, ranging from 0 to 600s
schedule-list list-number Schedule list, an integer, ranging from 0 to 99

Default conditions
The alarm delay time of the device is 0s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Alarm delay refers to that an alarm is saved on the device or reported to the NView NNM a
certain period after it is generated, rather than immediately after it is generated. The delay
time recorded on the device is same with that on the NView NNM. By configuring the delay
time for generating an alarm, you can configure the device to delay reporting the alarm to the
NView NNM after it is generated.

Raisecom Proprietary and Confidential


841
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the alarm delay time to 10s.
Raisecom#config
Raisecom(config)#alarm active delay 10
Set successfully.

Related commands
show alarm management

12.5.2 alarm active storage-mode

Function
To configure alarm storage mode, use this command.

Format
alarm active storage-mode { loop | stop }

Parameters
Parameter Description

loop Specify the alarm storage mode to loop.


stop Specify the alarm storage mode to stop.

Default conditions
The alarm storage mode is stop.

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


842
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
When the alarm buffer is full, the device will process newly-generated alarms in the following
two modes:
stop: the device will discard newly-generated alarms without recording it.
loop: the device will replace the old alarms with newly-generated ones.
You can use this command to configure an alarm storage mode for newly-generated alarms
when enough alarms are saved in the alarm buffer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure alarm storage mode to loop.
Raisecom#config
Raisecom(config)#alarm active storage-mode loop
Set successfully.

Related commands
show alarm management

12.5.3 alarm auto-report

Function
To enable alarm auto-report, use this command. To disable this function, use the disable form
of this command.

Format
alarm auto-report all { enable | disable }
alarm auto-report alarm-restype alarm-restype-value { enable | disable }
alarm auto-report type alarm-type { enable | disable }
alarm auto-report type alarm-type alarm-restype alarm-restype-value { enable | disable }

Raisecom Proprietary and Confidential


843
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
all All alarms
type alarm-type Alarm type, a string
The value is set to alarm names, such as aiblightparameterhigh
alarm-restype Alarm source type, a string
The value is set to names of alarm source types, such as port-channel
alarm-restype- Alarm source value, an integer, related to the alarm source type
value
enable Enable alarm auto-report.
disable Disable alarm auto-report.

Default conditions
Alarm auto-report is enabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
With alarm auto-report, the system will send the alarms to the NView NNM when an alarm is
generated. Therefore, the NView NNM does not need to automatically query or synchronize
alarms.
You can enable alarm auto-report to report certain alarm type, the specified alarm source or
the specified type of the specified alarm source.
You can use the alarm auto-report all { enable | disable } command to enable or
disable alarm auto-report for all alarms.
You can use the alarm auto-report alarm-restype alarm-restype-value { enable |
disable } to enable or disable alarm auto-report for alarms with specified alarm source.
You can use the alarm auto-report type alarm-type { enable | disable } command to
enable or disable alarm auto-report for alarms with specified alarm type.
You can use the alarm auto-report type alarm-type alarm-restype alarm-restype-value
{ enable | disable } command to enable or disable alarm auto-report for alarms with
specified alarm source or specified alarm type.
Prerequisite
N/A

Raisecom Proprietary and Confidential


844
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to disable alarm auto-report for alarm type of failed authentication.
Raisecom(config)#alarm auto-report type system_authfailur disable
Set successfully.

Related commands
show alarm management

12.5.4 alarm clear

Function
To clear current alarms, use this command.

Format
alarm clear all
alarm clear index index
alarm clear alarm-restype alarm-restype-value
alarm clear type alarm-type
alarm clear type alarm-type alarm-restype alarm-restype-value

Parameters
Parameter Description
all Clear all current alarms.
index index Specified alarm index, an integer, ranging from 1 to 4294967295
type alarm-type Alarm type, a string
The value is set to alarm names, such as ais, blightparameterhigh,
criticalevent.
alarm-restype Alarm source type, a string
The value is set to names of alarm source types, such as
boardindex, fanindex, port-channel.
alarm-restype-value Alarm source, an integer, related to the alarm source type

Raisecom Proprietary and Confidential


845
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
Clearing current alarms refers to deleting current alarms from the current alarm list. Deleted
alarms will be saved to the historical alarm list.
You can use the alarm clear all command to clear all current alarms.
You can use the alarm clear index index command to clear current alarms with specified
alarm index.
You can use the alarm clear alarm-restype alarm-restype-value command to clear
current alarm with specified alarm source.
You can use the alarm clear type alarm-type command to clear current alarm with
specified alarm type.
You can use the alarm clear type alarm-type alarm-restype alarm-restype-value
command to clear current alarms with specified alarm type and alarm source.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear all current alarms.
Raisecom#config
Raisecom(config)#alarm clear all
Set successfully.

Related commands
show alarm management

Raisecom Proprietary and Confidential


846
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.5.5 alarm clear delay

Function
To configure alarm clear delay time, use this command.

Format
alarm clear delay second
no alarm clear delay

Parameters
Parameter Description
delay second Alarm delay time, an integer, ranging from 0 to 600s

Default conditions
The alarm clear delay time is 0s.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After configuring the delay time for clearing an alarm, the alarm will be cleared a certain time
after the fault is cleared.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the alarm delay time to 10s.
Raisecom#config
Raisecom(config)#alarm active delay 10

Raisecom Proprietary and Confidential


847
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Set successfully.

Related commands
show alarm management

12.5.6 alarm correlation inhibit

Function
Enable alarm correlation inhibit, use this command. To disable this function, use the disable
form of this command.

Format
alarm correlation-inhibit { enable | disable }

Parameters
Parameter Description

enable Enable alarm correlation inhibition.


disable Disable alarm correlation inhibition.

Default conditions
Alarm correlation inhibition is enabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When alarm correlation inhibition is enabled, the device will only record the root alarms but
not attached alarms. For example, alarm B is caused by alarm A. When alarm correlation
inhibition is enabled, alarm B is inhibited and cannot be saved to the alarm buffer or log
buffer. By enabling alarm correlation inhibition, you can effectively reduce the number of
alarms.
When alarm correlation inhibition is disabled, both the root alarm and attached alarms are
saved on the device.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


848
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Precaution
N/A

Examples
This example shows how to enable alarm correlation inhibit.
Raisecom#config
Raisecom(config)#alarm correlation-inhibit enable
Set successfully.

Related commands
show alarm management

12.5.7 alarm inhibit

Function
Enable alarm inhibit, use this command. To disable this function, use the disable form of this
command.

Format
alarm inhibit { enable | disable }

Parameters
Parameter Description
enable Enable alarm inhibit.
disable Disable alarm inhibit

Default conditions
Alarm inhibit is enabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


849
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

You can use this command to inhibit repeated alarm report. For example, if fault alarm
LinkDown is triggered before fault clear alarm LinkUp on port A, the former one will be
cleared from the current alarm table and removed to the history alarm table. The alarm
LinkUp will be sent to the NView NNM.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable alarm inhibit.
Raisecom#config
Raisecom(config)#alarm inhibit enable
Set successfully.

Related commands
show alarm management

12.5.8 alarm inverse

Function
To configure alarm inverse mode, use this command.

Format
alarm inverse interface-type interface-number { auto | manual | none }Parameters

Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.
auto Automatic inverse mode
manual Manual inverse mode
none Non-inverse mode

Default conditions
The alarm inverse mode is non-inverse mode.

Raisecom Proprietary and Confidential


850
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
With alarm inverse, the device will report inverse information when recording an alarm. It
means the device will send a trap to the NView NNM when no alarm is generated, vice versa.
At present, the device only supports configuring alarm inverse modes on interface, including:
Non-inverse mode
The device reports alarms as usual.
Manual inverse mode
In this mode, the auto-report status is opposite to the actual status. When there is an alarm, the
system will not report the alarm and vice versa. Before the alarm inverse status is recovered to
the non-inverse mode, this mode will be sustained regardless of alarm status changes.
Automatic inverse mode
When you set the alarm inverse mode to automatic inverse mode:
If there is no alarm on the interface to be inversed, the configuration fails.
If there are alarms on the interface to be inverted, the configuration will take effect and
the auto-report status will change to the opposite one. After an alarm is reported to the
NView NNM, alarm-inverse will be disabled on the interface and the interface enters
non-inverse mode. In non-inverse mode, the device will report newly-generated alarms
properly.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure alarm inverse mode on interface GE 1/1/1 to automatic
inverse mode.
Raisecom#config
Raisecom(config)#alarm inverse gigaehernet 1/1/1 auto
Set successfully.

Raisecom Proprietary and Confidential


851
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
show alarm management

12.5.9 alarm monitor

Function
To enable alarm monitoring, use this command. To disable this function, use the disable form
of this command.

Format
alarm monitor all { enable | disable }
alarm monitor alarm-restype alarm-restype-value { enable | disable }
alarm monitor type alarm-type { enable | disable }
alarm monitor type alarm-type alarm-restype alarm-restype-value { enable | disable }

Parameters
Parameter Description
all All alarms
type alarm-type Alarm type, a string
The value is set to alarm names, such as blightparameterhigh.
alarm-restype Alarm source type, a string
The value is set to names of alarm source types, such as port-
channel.
alarm-restype-value Alarm source value, an integer, related to the alarm source type
enable Enable alarm monitoring.
disable Disable alarm monitoring.

Default conditions
Alarm monitoring is enabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


852
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Alarm monitoring processes alarms generated by modules:


When alarm monitoring is enabled, the alarm module receives alarms generated by other
modules and then processes them based on configured actions, such as saving them to
the alarm buffer or the system log.
When alarm monitoring is disabled, the alarm module discards alarms generated by other
modules. These alarms are not saved on the ISCOM RAX711.
You can enable alarm monitoring to monitor certain alarm type, the specified alarm source or
the specified type of the specified alarm source.
You can use the alarm monitor all { enable | disable } command to enable or disable
alarm monitoring for all alarms.
You can use the alarm monitor alarm-restype alarm-restype-value { enable | disable }
command to enable or disable alarm monitoring for alarms with specified alarm source.
You can use the alarm monitor type alarm-type { enable | disable } command to
enable or disable alarm monitoring for alarms with specified alarm type.
You can use the alarm monitor type alarm-type alarm-restype alarm-restype-value
{ enable | disable } command to enable or disable alarm monitoring for alarms with
specified alarm source and alarm type.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to disable alarm monitoring on interface GE 1/1/1.
Raisecom#config
Raisecom(config)#alarm monitor gigaethernet 1/1/1 disable
Set successfully.

Related commands
show alarm management

12.5.10 alarm syslog

Function
To enable alarm Syslog output, use this command. To disable this function, use the disable
form of this command.

Format
alarm syslog { enable | disable }

Raisecom Proprietary and Confidential


853
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
enable Enable alarm Syslog output.
disable Disable alarm Syslog output.

Default conditions
Alarm Syslog output is disabled.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When alarms are saved in the alarm buffer, system logs will be generated and saved in the log
buffer.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable alarm Syslog output.
Raisecom#config
Raisecom(config)#alarm syslog enable
Set successfully.

Related commands
show alarm log
show alarm management

Raisecom Proprietary and Confidential


854
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.5.11 show alarm active

Function
To show information about the current alarm list, use this command.

Format
show alarm active [ module_name ]

Parameters
Parameter Description
module_name Alarms of module with specified features, a string.
The value is set to names of modules that support alarm, such as
aps, cfm, system

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information of the current alarm list.
Raisecom#show alarm active
#1 2015-1-1 8:4:3 AlarmModulName:hw_monitor.
TrapName:alarmInformationTrap. Desc
ription: power-abnormal
#6 2015-1-1 8:5:10 AlarmModulName:hw_monitor.
TrapName:alarmInformationTrap. Des
cription: high-volt
#261 2015-1-3 5:40:29 AlarmModulName:hw_monitor.
TrapName:alarmInformationTrap.
Description: high-temperature
Alarm active total number: 3

Raisecom Proprietary and Confidential


855
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
N/A

12.5.12 show alarm cleared

Function
To show information about the history alarm list, use this command.

Format
show alarm cleared [ module_name | severity severity ]

Parameters
Parameter Description
module_name Alarms of module with specified features, a string
The value is set to names of modules that support alarm, such as aps,
cfm, and system.
severity severity Alarms with a specified level
The severity is an integer, ranging from 1 to 4 or 1 to 6

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information about the history alarm list.
Raisecom#show alarm cleared
AlarmModulName:dms 1971-8-4 10:10:8 Index:9. Severity:1.
TrapName:rcUdDeviceTmptAbnormalTrap. Resource: slot 1. Description: The
device temperature is abnormal.
AlarmModulName:dms 1971-8-4 10:10:35 Index:11. Severity:1.
TrapName:rcUdDeviceTmptAbnormalTrap. Resource: slot 1. Description: The
device temperature is abnormal.

Raisecom Proprietary and Confidential


856
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

AlarmModulName:dms 1971-8-4 10:10:38 Index:13. Severity:1.


TrapName:rcUdDeviceTmptAbnormalTrap. Resource: slot 1. Description: The
device temperature is abnormal.
AlarmModulName:dms 1971-8-4 10:10:44 Index:15. Severity:1.
TrapName:rcUdDeviceTmptAbnormalTrap. Resource: slot 1. Description: The
device temperature is abnormal.

Related commands
N/A

12.5.13 show alarm log

Function
To show alarm statistics of the system log, use this command.

Format
show alarm log

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show alarm statistics of the system log.
Raisecom#show alarm log
Alarm log limit:200
Alarm log num:300
Alarm log bumped:100
----------------------------- -------------------------------------------
Module mplstp log num: 300
Module mplstp log bumped:100
#2012-12-25 13:45:33 mplstp/mplsXcDown: mplsXCOperStatus.1.1.1:1

Raisecom Proprietary and Confidential


857
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

The following table describes fields in the command output.

Field Description
Alarm log limit Threshold of alarm logs
Alarm log num Number of generated alarm logs
Alarm log bumped Number of discarded alarm logs
Module Alarm module

Related commands
N/A

12.5.14 show alarm management

Function
To show alarm type configurations, use this command.

Format
show alarm management [ alarm_type ]

Parameters
Parameter Description
alarm_type Alarm type, a string
The value is set to names of modules that support alarm, such as
blightparameterhigh.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show alarm type configurations.

Raisecom Proprietary and Confidential


858
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom#show alarm management


Alarm active delay(second): 0
Alarm clear delay (second):0
Alarm active storage-mode : loop
Alarm inhibit: enable
Alarm syslog: enable

----------------------------- -------------------------------------------
AlarmListName GroupName Port Inverse Auto-report Monitor
erps link-changed NA NA enable enable

The following table describes fields in the command output.

Field Description
Alarm active delay Delay time for generating an alarm
Alarm clear delay Delay time for clearing an alarm
Alarm active storage-mode Alarm storage mode
Alarm inhibit Alarm inhibition
Alarm syslog Alarm Syslog output
AlarmListName Alarm list name, related to the module name
GroupName Alarm event name
Port Interface ID
Inverse Alarm inverse mode
Auto-report Alarm auto-report status
Monitor Alarm monitoring status

Related commands
N/A

12.5.15 show alarm management statistics

Function
To show statistics of the alarm management module, use this command.

Format
show alarm management statistics

Parameters
N/A

Raisecom Proprietary and Confidential


859
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show statistics of the alarm management module.
Raisecom#show alarm management statistics
Alarm Active Overflow: 0
Alarm Active LastChanged: 9336459
------------------------------------------------------------------------
AlarmListName ActiveCurrent ActiveTotal LastRaise LastClear
system 0 0 0 0
load_cfg 0 0 0 0
snmp 0 0 0 0
syslog 0 0 0 0
portlib 2 12 9336459 8235147
mpls 0 0 0 0
ping 0 0 0 0
traceroute 0 0 0 0
rmon 0 0 0 0
ptp 0 0 0 0
cfm 0 0 0 0
sla 0 0 0 0
oam 0 0 0 0
rtdp 0 0 0 0
lldp 0 0 0 0

The following table describes fields in the command output.

Field Description
Alarm Active Overflow Current alarm overflow
Alarm Active LastChanged Last change time of the current alarm list
AlarmListName Alarm list name, related to the module name
ActiveCurrent Total number of current alarms
ActiveTotal Total number of generated alarms

Raisecom Proprietary and Confidential


860
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
LastRaise Time for generating an alarm
LastClear Time for clearing an alarm

Related commands
N/A

12.6 CPU monitoring


12.6.1 cpu falling-threshold

Function
To configure CPU alarm falling threshold, use this command. To return to the default setting,
use the no form of this command.

Format
cpu falling-threshold value
no cpu falling-threshold

Parameters
Parameter Description
value Falling threshold, an integer, ranging from 0 to 98%

Default conditions
The falling threshold is 1%.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
After you enable or disable CPU threshold alarm sending trap, the system sends a trap when
the CPU utilization is higher than the rising threshold or is lower than the falling threshold
during a specified period.

Raisecom Proprietary and Confidential


861
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The falling threshold must be smaller than the rising threshold.

Examples
This example shows how to configure the CPU falling threshold to 20%.
Raisecom#config
Raisecom(config)#cpu falling-threshold 20
Set successfully.

Related commands
show cpu-utilization

12.6.2 cpu rising-threshold

Function
To configure the CPU alarm rising threshold and sampling period, use this command. To
return to the default setting, use the no form of this command.

Format
cpu rising-threshold rising-threshold-value
no cpu rising-threshold

Parameters
Parameter Description
rising-threshold-value Rising threshold, an integer, ranging from 1 to 100%

Default conditions
The rising threshold is 100%.

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


862
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
After you enable or disable CPU threshold alarm sending trap, the system sends a trap when
the CPU utilization is higher than the rising threshold or is lower than the falling threshold
during a specified period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
The lower threshold must be smaller than the upper threshold.

Examples
This example shows how to configure the rising threshold to 80%.
Raisecom#config
Raisecom(config)#cpu rising-threshold 80
Set successfully.

Related commands
show cpu-utilization

12.6.3 show cpu-utilization

Function
To show CPU utilization, use this command.

Format
show cpu-utilization [ dynamic | history { 10min | 1min | 2hour | 5sec } ]

Parameters
Parameter Description
dynamic Dynamic CPU utilization
history CPU utilization history in certain period
10min CPU utilization in 10 minutes
1min CPU utilization in 1minute
2hour CPU utilization in 2 hours
5sec CPU utilization in 5 seconds

Raisecom Proprietary and Confidential


863
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use the show cpu-utilization command to show CPU utilization, including CPU
threshold trap enabling status, CPU utilization thresholds, and CPU utilization in certain
period.
You can use the show cpu-utilization dynamic command to show dynamic CPU
utilization.
You can use the show cpu-utilization history { 10min | 1min | 2hour | 5sec } command
to show CPU utilization history in certain period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show dynamic CPU utilization.
Raisecom#show cpu-utilization dynamic
CPU threshold trap enable: Disable
Rising threshold: 100
Fallingthreshold: 1
Trap transfer observation interval(second): 60

Dynamic statistics period: 1 second


Last 1 second CPU utilization: 7%
Last 5 seconds CPU utilization: 8%
Total CPU utilization: 17%
Please press <Ctrl+C> to stop.

The following table describes fields in the command output.

Raisecom Proprietary and Confidential


864
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
CPU threshold trap enable CPU utilization threshold enabling status
Rising threshold Rising threshold
Fallingthreshold Fallingthreshold
Trap transfer observation interval(second) Period for trap sampling
Dynamic statistics period Dynamic statistics period
Last 1 second CPU utilization CPU utilization in last 1 second
Last 5 seconds CPU utilization CPU utilization in last 5 seconds
Total CPU utilization Total CPU utilization

This example shows how to show CPU utilization history in last 1 minute.
Raisecom#show cpu-utilization history 1min
Cpu utilization history table size:60
CPU-utilization:
6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6%
6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 7% 7% 6%
7% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6% 6%
7% 7% 7% 7% 7% 7% 6% 6% 6% 6% 6% 6% 6% 6% 6%

Related commands
N/A

12.6.4 show process

Function
To show status information of each task, use this command.

Format
show process [ cpu | sorted { normal-priority | process-name }]

Parameters
Parameter Description
cpu CPU utilization of each task
sorted Sort outputs.
normal-priority Sort outputs based on the normal priority.
process-name Sort outputs based on the task name.

Raisecom Proprietary and Confidential


865
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use the show process cpu command to show CPU utilization information.
You can use the show process [ sorted { normal-priority | process-name } ] command
to show task status, including task priority and stack utilization.
You can use the show process taskname command to show detailed operating status of a
specified task. The task name must be a complete task name saved on the device.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show status information of each task.
Raisecom#show process
Number of processes: 89
Last 5 seconds CPU utilization: 7%
Last 1 minute CPU utilization: 5%
Last 10 minutes CPU utilization: 6%

READY | Task is not waiting for any resource other than the CPU.
PEND | Task is blocked due to the unavailability of some resource.
DELAY | Task is asleep for some duration.
SUSPEND | Task is unavailable for execution (but not suspended, delayed,
or pended).
DELAY+S | Task is both delayed and suspended.
PEND+S | Task is both pended and suspended.
PEND+T | Task is pended with a timeout..
PEND+S+T| Task is pended with a timeout, and also suspended.
state+I | Task has inherited priority (+I may be appended to any string
above).
DEAD | Task no longer exists.

Raisecom Proprietary and Confidential


866
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

PNo Priority Status PC ErrorNo Stack ProcessName


(Nor/Cur) (Size /Use /Max)
---------------------------------------------------------------------
1 151/151 PEND145f94 0 3072 /304 /1008 tArlShadow
2 161/161 DELAY 14c260 0 2048 /600 /1112 tcfmAgin
3 96/96 DELAY 14c260 0 8192 /360 /2552 tFanMoni
4 0/0 PEND143e6c 0 8192 /496 /752DGTASK

The following table describes fields in the command output.

Field Description
Number of processes Total number of tasks
Last 5 seconds CPU utilization CPU utilization within last 5 seconds
Last 1 minute CPU utilization CPU utilization within last 1 minutes
Last 10 minutes CPU utilization CPU utilization within last 10 minutes
READY The task is not waiting for any resource other than
the CPU.
PEND The task is blocked due to the unavailability of some
resource.
DELAY The task is asleep for some duration.
SUSPEND The task is unavailable for execution.
DELAY+S The task is both delayed and suspended.
PEND+S The task is both pended and suspended.
PEND+T Task is pended with a timeout.
PEND+S+T The task is pended with a timeout, and also
suspended.
state+I The task has an inherited priority.
DEAD The task does not exist anymore.
PNo Task number
Priority(Nor/Cur) Priority (normal/current)
Status Task status
PC Program counter
ErrorNo Error code
Stack(Size /Use /Max) Stack (size/usage/maximum)
ProcessName Task name

This example shows how to show detailed status information of tasks monitored by the CPU.
Raisecom#show process CpuMon

Raisecom Proprietary and Confidential


867
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Process ID: 243bbc8


Process name: CpuMon
Create time: 0h:0m:26s
Entry: 5912bc
Status: DELAY
Error number: 0
Program counter: 14c260
Delay(ticks): 16
Total invoked times: 13934
Semaphore waiting for:0
CPU use time(Sec.uSec): 13.035121
Normal priority/Current priority: 0/0
Stack size/Stack use/Max stack use: 4096/312/552
Stack begin/Stack pointer/Stack end:243bbc8/243ba90/243abc8

Statistics for Period:


Period CPURunTime Invoked CPU-Utilization
(Sec.uSec)
----------------------------------------------------
5seconds 0.004657 5 0 %
1minute 0.053956 57 0 %
10minutes 0.520949 552 0 %

The following table describes fields in the command output.

Field Description
Process ID Task ID
Process name Task name
Create time Creation time
Entry Task entry
Status Task status
Error number Error code
Program counter Program counter
Delay Task delay
Total invoked times Total number of starts
Semaphore waiting for Number of signals that are waiting for
CPU use time(Sec.uSec) Total CPU running time (s/s)
Normal priority/Current priority Normal priority/current priority
Stack size/Stack use/Max stack Stack size/Stack usage/Maximum stack usage
use
Stack begin/Stack pointer/Stack Stack begin position/Stack pointer position/Stack end
end position
Period Statistics period
CPURunTime CPU running time

Raisecom Proprietary and Confidential


868
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
Invoked Number of startup
CPU-Utilization CPU utilization
5seconds CPU utilization within last 5 seconds
1minute CPU utilization within last 1 minute
10minutes CPU utilization within last 10 minutes

This example shows how to show detailed status information of alarm tasks.
Raisecom#show process alarm
Process ID: 282ea98
Process name: alarm
Create time: 0h:0m:27s
Entry: 5912bc
Status: DELAY
Error number: 0
Program counter: 14c260
Delay(ticks): 6
Total invoked times: 27757
Semaphore waiting for:0
CPU use time(Sec.uSec): 1.231692
Normal priority/Current priority: 100/100
Stack size/Stack use/Max stack use: 24576/312/1256
Stack begin/Stack pointer/Stack end:282ea98/282e960/2828a98

Statistics for Period:


Period CPURunTime Invoked CPU-Utilization
(Sec.uSec)
----------------------------------------------------
5seconds 0.000995 38 0 %
1minute 0.007229 223 0 %
10minutes 0.052227 1162 0 %

Related commands
N/A

12.6.5 show process cpu

Function
To show CPU utilization of each task, use this command.

Format
show process cpu [ sorted [ 10min | 1min | 5sec | invoked ] ]

Raisecom Proprietary and Confidential


869
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
sorted Sort outputs.
10min Sort outputs based on CPU utilization within 10 minutes.
1min Sort outputs based on CPU utilization within 1 minute.
5sec Sort outputs based on CPU utilization within 5 seconds.
invoked Sort outputs based on start orders of tasks.

Default conditions
Sort outputs based on the CPU running time.

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
N/A

Examples
This example shows how to show CPU utilization of each task.
Raisecom#show process cpu
Last 5 seconds CPU utilization: 7%
Last 1 minute CPU utilization: 5%
Last 10 minutes CPU utilization: 6%
Last 2 hours CPU utilization: 6%

PNo CPURunTime Invoked CPUUtilization ProcessName


(Sec.uSec) ( 5sec/ 1 min /10 mins)
-------------------------------------------------------------------------
22 841.550426 378586 3.27%/ 3.13%/ 3.04% tHdMon
13 162.837179 1305214 0.76%/ 0.60%/ 0.58% portlink
6 143.690879 2265384 0.71%/ 0.74%/ 0.57% IBCQ
7 109.444865 5815641 0.34%/ 0.39%/ 0.39% RPCQ
62 107.577876 28856 0.39%/ 0.39%/ 0.38% tPowerMo
76 72.196845 379711 0.44%/ 0.27%/ 0.26% bcmRX
...

The following table describes fields in the command output.

Field Description
Number of processes Total number of tasks

Raisecom Proprietary and Confidential


870
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Field Description
Last 5 seconds CPU utilization CPU utilization within last 5 seconds
Last 1 minute CPU utilization CPU utilization within last 1 minute
Last 10 minutes CPU utilization CPU utilization within last 10 minutes
Last 2 hours CPU utilization CPU utilization within last 2 hours
PNo Task number
CPURunTime(Sec.uSec) CPU running time
Invoked Total number of starts
CPUUtilization CPU utilization
ProcessName Task name

Related commands
N/A

12.6.6 snmp-server traps enable

Function
To enable CPU threshold alarm sending trap, use this command. To disable this function, use
the disable form of this command.

Format
snmp-server traps { enable | disable } cpu-threshold

Parameters
Parameter Description
enable Enable CPU threshold alarm sending trap.
disable Disable CPU threshold alarm sending trap.

Default conditions
CPU threshold alarm sending trap is disabled.

Command mode
Global configuration

User level
5

Raisecom Proprietary and Confidential


871
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
After you enable or disable CPU threshold alarm sending trap, the system sends a trap when
the CPU utilization is higher than the rising threshold or is lower than the falling threshold
during a specified period.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable CPU threshold alarm sending trap.
Raisecom#config
Raisecom(config)#snmp-server traps enable cpu-threshold
Set successfully.

Related commands
show cpu-utilization

12.7 Fault detection


12.7.1 ping

Function
To test the network connectivity between the local and the destination, use this command.

Format
ping ip-address [ count count ] [ size size ] [ source ip-address ] [ waittime period ]
ping ipv6 ipv6-address [ count count ] [ size size ] [ waittime period ]

Parameters
Parameter Description
ip-address Destination IP address
count Specify numbers of detection packets for exiting Ping program.
count Number of detection packets, an integer, ranging from 1 to 65535

Raisecom Proprietary and Confidential


872
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
size Specify the size of the detection packet.
size Size of the detection packet, an integer, ranging from 0 to 4096, in
units of Byte
waittime Specify the wait time for Ping program. If no response is received
when the wait time expires, it is believed the destination is
unreachable.
period Timeout, an integer, ranging from 1 to 60, in units of second
ipv6-address IPv6 address, in colon hexadecimal notation
source ip- Specify source IP address.
address

Default conditions
The number of Ping detection packets is configured to 5. The size of a Ping detection packet
is configured to 8 Bytes. The timeout is configured to 3s.

Command mode
Privileged EXEC

User level
1

Usage guidelines
Scenario
Ping program is used to test the connectivity between the source address and the destination
address. The local device sends an ICMP ECHO-REQUEST packet to the destination address.
It the network connectivity is normal, the destination host sends an ICMP ECHO-REPLY
packet to the source host. If the source host does not receive the ICMP ECHO-REPLY packet
sent by the destination host, it is believed the network connectivity is abnormal.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to Ping 10.0.0.1 and how to configure other parameters to default
values. (In this example, the result is positive.)

Raisecom Proprietary and Confidential


873
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom#ping 10.0.0.1
Type CTRL+C to abort
Sending 5, 8-byte ICMP Echos to 10.0.0.1, timeout is 3 seconds:
Reply from 10.0.0.1: time<1ms
Reply from 10.0.0.1: time<1ms
Reply from 10.0.0.1: time<1ms
Reply from 10.0.0.1: time<1ms
Reply from 10.0.0.1: time<1ms
---- PING Statistics----
5 packets transmitted, 5 packets received,
Success rate is 100 percent(5/5),
round-trip (ms) min/avg/max = 0/0/0.

This example shows how to Ping 10.0.0.2, how to configure the number of detection packets
to 3, how to configure the size of a detection packet to 20 Bytes, and how to configure the
timeout to 5s. (In this example, the result is positive.)
Raisecom#ping 10.0.0.2 count 3 size 20 waittime 5
Type CTRL+C to abort
Sending 3, 28-byte ICMP Echos to 10.0.0.2, timeout is 5 seconds:
Reply from 10.0.0.2: time<1ms
Reply from 10.0.0.2: time<1ms
Reply from 10.0.0.2: time<1ms
---- PING Statistics----
3 packets transmitted, 3 packets received,
Success rate is 100 percent(3/3),
round-trip (ms) min/avg/max = 0/0/0.

This example shows how to Ping 10.0.0.3 and how to configure other parameters to default
values. (In this example, the result is negative.)
Raisecom#ping 10.0.0.3
Type CTRL+C to abort.
Sending 5, 8-byte ICMP Echos to 10.0.0.3 , timeout is 3 seconds:
Request timed out.
Request timed out.
Request timed out.
Request timed out.
Request timed out.

no answer from 10.0.0.3

Related commands
traceroute

12.7.2 traceroute

Function
To acquire information about the path from the source address to the destination address, use
this command. This command is used to locate network faults.

Raisecom Proprietary and Confidential


874
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Format
traceroute ip-address [ firstttl first-ttl ] [ maxttl max-ttl ] [ port port-number ] [ waittime
period ] [ count times ] [ size size ]

Parameters
Parameter Description
ip-address IP address of the destination host/network
firstttl First TTL
first-ttl Value of the first TTL, an integer, ranging from 1 to 255
maxttl Maximum TTL
When this value is exceeded, the destination is unreachable.
max-ttl Value of the maximum TTL, an integer, ranging from 1 to 255
port Interface ID of the UDP packet
port-number Interface ID, an integer, ranging from 1 to 65535
waittime Specify the timeout for Traceroute program. If no response is received
when the timeout expires, the destination is unreachable.
period Timeout, an integer, ranging from 1 to 60, in units of second
count Configure numbers of detection packets sent during a hop.
times Number of detection packets, an integer, ranging from 1 to 10
size Specify the size of detection packets.
size Size of detection packets, an integer, ranging from 0 to 4096, in units
of Byte

Default conditions
The first TTL value is configured to 1. The maximum TTL value is configured to 30. The
interface ID is configured to 33433. The timeout is configured to 3. The number of detection
packets is configured to 3.

Command mode
Privileged EXEC

User level
1

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


875
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Traceroute program sends a set of packets with TTL 1. Because the TTL expires, the first hop
sends back an ICMP error message informing that this set of packets cannot be sent. Then the
set of packets will be resent with TTL 2, and then the second hop sends back the packets
because the TTL expires. This continues until the destination host receives the packets. The
device will record the source address of each ICMP TTL timeout message for offering the
path through which the packets arrived at the destination.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to trace 10.0.0.1 and how to configure other parameters to default
values. (In this example, the result is positive.)
Raisecom#traceroute 10.0.0.1
Tracing the route to 10.0.0.1:
Type ctrl+c to abort
1 10.0.0.1 <1ms <1ms <1ms
Trace complete.

The following table describes fields in the command output.

Field Description
10.0.0.1 Indicate the gateway through which the packet passes.
<1ms Indicate that the route to the destination is reachable.

This example shows how to traceroute 10.0.0.2, how to configure the maximum TTL to 3,
how to configure the number of detection packets during a hop to 2. (In this example, the
result is negative.)
Raisecom#traceroute 10.0.0.2 maxttl 3 count 2
Tracing the route to 10.0.0.2:
Type ctrl+c to abort
1 * *
2 * *
3 * *
Trace complete.

The following table describes fields in the command output.

Field Description
* Indicate that the route to the destination is unreachable.

Raisecom Proprietary and Confidential


876
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
ping

12.7.3 Traceroute ipv6

Function
To acquire information about the path from the source address to the destination address of
IPv6 packets, use this command. This command is used to locate network faults.

Format
traceroute ipv6 ipv6-address [ firstttl first-ttl ] [ maxttl max-ttl ] [ port port-number ]
[ waittime period ] [ count times ] [ size size ]

Parameters
Parameter Description
ipv6-address IPv6 address, in colon hexadecimal notation, such as 3001::1
firstttl First TTL
first-ttl Value of the first TTL, an integer, ranging from 1 to 255
maxttl Maximum TTL
When this value is exceeded, the destination is unreachable.
max-ttl Value of the maximum TTL, an integer, ranging from 1 to 255
port Interface ID of the UDP packet
port-number Interface ID, an integer, ranging from 1 to 65535
waittime Specify the timeout for Traceroute program. If no response is received
when the timeout expires, the destination is unreachable.
period Timeout, an integer, ranging from 1 to 60, in units of second
count Configure numbers of detection packets sent during a hop.
times Number of detection packets, an integer, ranging from 1 to 10
size Specify the size of detection packets.
size Size of detection packets, an integer, ranging from 0 to 4096, in units of
Byte

Default conditions
The first TTL value is configured to 1. The maximum TTL value is configured to 30. The
interface ID is configured to 33433. The timeout is configured to 3. The number of detection
packets is configured to 3.

Raisecom Proprietary and Confidential


877
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Privileged EXEC

User level
1

Usage guidelines
Scenario
Traceroute program sends a set of packets with TTL 1. Because the TTL expires, the first hop
sends back an ICMP error message informing that this set of packets cannot be sent. Then the
set of packets will be resent with TTL 2, and then the second hop sends back the packets
because the TTL expires. This continues until the destination host receives the packets. The
device will record the source address of each ICMP TTL timeout message for offering the
path through which the packets arrived at the destination.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to trace IPv6 3000::1 and how to configure other parameters to
default values. (In this example, the result is positive.)
Raisecom#traceroute 3000::1
Tracing the route to 3000::1
Type ctrl+c to abort
1 3000::1 <1ms <1ms <1ms
Trace complete.

The following table describes fields in the command output.

Field Description
3000::1 Indicate the gateway through which the packet passes.
<1ms Indicate that the route to the destination is reachable.

Related commands
ping

Raisecom Proprietary and Confidential


878
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.8 KeepAlive
12.8.1 snmp-server keepalive-trap

Function
Enable sending KeepAlive Trap packets periodically, use this command. Use the disable form
of this command to disable KeepAlive Trap or use the pause form of this command to pause
KeepAlive Trap.

Format
snmp-server keepalive-trap { enable | disable | pause }

Parameters
Parameter Description

enable Enable sending KeepAlive Trap packets periodically. Allow


loading this command.
disable Disable sending KeepAlive Trap packets periodically.
pause Pause sending KeepAlive Trap packets periodically. Disallow
loading this command.

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The NView NNM can find the device in a short time based on the KeepAlive Trap packets
sent by the device.
After you use this command to enable KeepAlive Trap, the device sends KeepAlive Trap
packets to the destination host that contains bridge module Trap if global Trap is enabled. If
global Trap is disabled, the device does not send KeepAlive trap after you enable KeepAlive
Trap.
After the KeepAlive Trap is disabled by this command, the device stops sending KeepAlive
Trap.
Prerequisite

Raisecom Proprietary and Confidential


879
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Follow-up procedure
Use the show keepalive command to display the status of KeepAlive Trap.
Precaution
N/A

Examples
This example shows how to enable KeepAlive Trap.
Raisecom#config
Raisecom(config)#snmp-server keepalive-trap enable
Set successfully.

Related commands
show keepalive

12.8.2 snmp-server keepalive-trap interval

Function
To configure an interval for sending KeepAlive Trap packets, use this command. To return to
the default condition, use the no form of this command.

Format
snmp-server keepalive-trap interval period
no snmp-server keepalive-trap interval

Parameters
Parameter Description
period Interval for sending KeepAlive Trap packets, ranging from 120 to
28800, in units of second

Default conditions
The interval for sending KeepAlive Trap packets is configured to 300s

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


880
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
After you use this command to configure an interval for sending KeepAlive Trap packets, the
interface, where KeepAlive Trap is enabled, will send KeepAlive Trap packets to the NMS
based on the interval.
To prevent multiple devices sending KeepAlive Trap packets based on the same interval, the
KeepAlive Trap packets are randomly sent during the interval + 5s.
Prerequisite
The KeepAlive Trap is enabled by the snmp-server keepalive-trap enable command.
Follow-up procedure
Use the show keepalive command to show the interval for sending KeepAlive Trap packets.
Precaution
N/A

Examples
This example shows how to set the interval for sending KeepAlive Trap packets to 500s.
Raisecom#config
Raisecom(config)#snmp-server keepalive-trap interval 500
Set successfully.

Related commands
show keepalive

12.8.3 show keepalive

Function
To show configurations of KeepAlive and statistics of transmitted packets, use this command.

Format
show keepalive

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


881
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

User level
5

Usage guidelines
N/A

Examples
This example shows how to show configurations of KeepAlive.
Raisecom#show keepalive
Keepalive Admin State:Disable
Keepalive trap interval:300 s
Keepalive trap count:0

The following table describes fields in the command output.

Field Description
Keepalive Admin State Status of KeepAlive administration
Keepalive trap interval Interval for sending KeepAlive Trap packets
Keepalive trap count Number of Tx KeepAlive Trap packets

Related commands
N/A

12.9 RMON
12.9.1 clear rmon

Function
To restore configurations of Remote Network Monitoring (RMON) to the default setting, use
this command.

Format
clear rmon

Parameters
N/A

Default conditions
N/A

Raisecom Proprietary and Confidential


882
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Global configuration

User level
11

Usage guidelines
N/A

Examples
This example shows how to restore configurations of RMON to the default setting.
Raisecom#config
Raisecom(config)#clear rmon
Set successfully.

Related commands
N/A

12.9.2 rmon alarm

Function
To add a RMON alarm to an alarm group, use this command. To delete the RMON alarm, use
the no form of this command.

Format
rmon alarm alarm-id mibvar [ interval period ] { absolute | delta } rising-threshold rising-
num [ rising-event ] falling-threshold falling-num [ falling-event ] [ owner owner-name]
no rmon alarm alarm-id

Parameters
Parameter Description
alarm-id Alarm index, an integer, ranging from 1 to 65535
mibvar MIB variables (MIB OIDs) that need to be remotely monitored.
interval Sampling interval of MIB variables. It is used to monitor MIB
changes periodically.
If you do not select this parameter, the value is configured to 2s by
default.
period Interval, an integer, ranging from 2 to 3600, in units of second

Raisecom Proprietary and Confidential


883
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
absolute Show the absolute change of MIB variables. It is a method for
generating alarms.
Compare the changed MIB variable value to the configured threshold,
if the value is smaller than the minimum value or greater than the
maximum value, an alarm is generated.
delta Show the relative change of MIB variables. It is a method for
generating alarms.
If the delta increases, compare the delta to the maximum value, if the
delta is greater than the maximum value, an alarm is generated. If the
delta decreases, compare the delta to the minimum value, if the delta
is greater than the minimum value, an alarm is generated.
rising-threshold Maximum threshold
falling- Minimum threshold
threshold
rising-num Maximum value, an integer, ranging from 0 to 2147483647
falling-num Minimum value, an integer, ranging from 0 to 2147483647
falling-event Number of the event triggered when the value exceeds the minimum
value, an integer, ranging from 1 to 65535
owner Descriptions about the creator of the RMON alarm
owner-name Description string

Default conditions
There is no RMON alarm.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
RMON alarm management monitors specified MIB variables based on configured sampling
interval. When the value of monitored data exceeds the threshold, a related alarm is generated.
In general, alarm events are written into the system log or the device sends a trap to the NMS.
You can use this command to add a RMON alarm to or delete a RMON alarm from an alarm
group.
Prerequisite
N/A

Raisecom Proprietary and Confidential


884
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Follow-up procedure
N/A
Precaution
The MIB variable must be in dotted decimal notation and be valid. Otherwise, it cannot be
monitored.

Examples
This example shows how to add RMON alarm 1, how to set the OID of a monitored MIB
variable to 1.3.6.1.2.1.2.2.1.20.1, how to set the sampling interval to 20s, how to generate
alarm event 1 if the changed value exceeds the maximum value 10000, how to generate alarm
event 2 if the changed value is smaller than the minimum value 500, and how to configure the
creator to raisecom.
Raisecom#config
Raisecom(config)#rmon alarm 1 1.3.6.1.2.1.2.2.1.20.1 interval 20 absolute
rising-threshold 10000 1 falling-threshold 500 2 owner raisecom
Set successfully.

This example shows how to delete RMON alarm 1.


Raisecom(config)#no rmon alarm 1
Set successfully.

Related commands
show rmon

12.9.3 rmon event

Function
To add a RMON event to an event group, use this command. To delete the RMON event, use
the no form of this command.

Format
rmon event event-id [ log ] [ trap ] [ description string ] [ owner owner-name ]
no rmon event event-id

Parameters
Parameter Description
event-id Event number, an integer, ranging from 1 to 65535
log Write the event to the system log.
trap Send a trap to the NView NNM.
description Event descriptions
string Description, a string of 1 to 127 characters

Raisecom Proprietary and Confidential


885
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameter Description
owner Descriptions about the event creator
If you do not select this parameter, the descriptions are configured to
monitor event by default.
owner-name Description string

Default conditions
There is no event in an event group.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
The event group provides alarms generated by the RMON agent. When an event occurs, the
device can write it into the system log or send a trap to the NMS.
You can use this command to add an event to an event group.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to add RMON event 1 to an event group, how to configure the
processing mode to sending Trap only, and how to configure the event creator to raisecom.
Raisecom#config
Raisecom(config)#rmon event 1 trap owner raisecom
Set successfully.

Related commands
show rmon events

Raisecom Proprietary and Confidential


886
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.9.4 rmon history

Function
To enable history group on an interface, use this command. To disable the history group, use
the no form of this command.

Format
rmon history interface-type interface-number [ shortinterval short-period ] [ longinterval
long-period ] [ buckets buckets-number ] [ owner owner-name ]
no rmon history interface-type interface-number

Parameters
Parameter Description
interface-type Enable history group on the specified interface.
interface-number The interface-type indicates interface type.
The interface-number indicates three dimensional interface list ID.
It supports a range, such as "1-3".
shortinterval Short sampling interval
Collect the network status statistics every a short period.
short-period Short period, an integer, ranging from 1 to 600, in units of second
longinterval Long sampling interval
Collect the network status statistics every a long period.
long-period Long period, an integer, ranging from 600 to 3600, in units of second
buckets History group data storage queue
buckets-number Queue size, an integer, ranging from 10 to 1000
owner Descriptions about the creator of the history group
owner-name Description string

Default conditions
There is no history group. By default, the shortinterval is configured to 30s; the longinterval
is configured to 1800s; the buckets is configured to 10; the string is configured to
monitorHistory.

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


887
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
The history group collects and store network status statistics periodically. You can use this
command to enable history group on a specified interface. You can configure an interface for
querying network status and configure the size of a data storage queue.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples

This example shows how to enable history group on Fastethernet 1/3/1, how to configure the
querying interval to 60s, how to configure the data storage queue size to 50, and how to
configure the description string to raisecom.
Raisecom#config
Raisecom(config)#rmon history fastethernet 1/3/1 shortinterval 60 buckets
50 owner raisecom
Set successfully.

Related commands
show rmon history

12.9.5 rmon statistic

Function
To enable statistics group on an interface, use this command. To disable statistics group, use
the no form of this command.

Format
rmon statistics interface-type interface-number [ owner owner-name ]
no rmon statistics interface-type interface-number

Raisecom Proprietary and Confidential


888
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
interface-type Enable statistics group on a specified interface.
interface-number The interface-type indicates interface type.
The interface-number indicates three dimensional interface list ID.
It supports a range, such as "1-3".
owner Descriptions about the creator of the statistics group
owner-name Description string

Default conditions
Statistics group is enabled on all interfaces. By default, the owner parameter is configured to
monitoretherstats.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
RMON is a standard to monitor network data through the Agent and the NMS. It is used to
resolve the restriction of SNMP in a distributed network.
According to functions, RMON is divided into 9 groups. Statistics group is used to collect
basic statistics in each subnet. It is used to gather statistics of traffic and packet distribution at
certain network segment. In addition, it is used to gather statistics on number of error frames
and collision times.
You can use this command to enable statistics group on a specified interface.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable statistics group on Fastethernet 1/3/1 and how to configure
the creator name to raisecom.

Raisecom Proprietary and Confidential


889
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Raisecom#config
Raisecom(config)#rmon statistics fastethernet 1/3/1 owner raisecom
Set successfully.

Related commands
show rmon statistics

12.9.6 show rmon

Function
To show information about the RMON module, use this command.

Format
show rmon [ alarms | events ]
show rmon statistics [ interface-type interface-number ]
show rmon history interface-type interface-number

Parameters
Parameter Description
alarms Show information about the RMON alarm group.
events Show information about the RMON event group.
statistics Show information about the RMON statistics group.
history Show information about the RMON history group.
interface-type Show information about the RMON on a specified interface.
interface-number The interface-type indicates interface type.
The interface-number indicates three dimensional interface list ID.
It supports a range, such as "1-3".

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Raisecom Proprietary and Confidential


890
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
N/A

Examples
This example shows how to show information about RMON module.
Raisecom#show rmon
Alarm group information:
Alarm 1 is active, owned by test
Monitors 1.3.6.1.2.1.2.2.1.5.1 every 100 seconds
Taking absolute samples, last value was 0
Rising threshold is 1000, assigned to event 1
Falling threshold is 10, assigned to event 2
On startup enable rising and falling alarm

Event group information:


Event 1 is active, owned by monitorEvent
Event generated at 0:0:0
Send TRAP when event is fired.

Statistics group information:


Physical port 2 is active, and owned by monitorEtherStats
Which has received
0 octets, 0 packets,
0 broadcast, 0 multicast packets,
0 undersized, 0 oversized packets,
0 fragments, 0 jabbers,
0 CRC alignment errors, 0 collisions.
# of dropped packet events (due to lack of resources): 0
# of packets received of length (in octets):
64: 0, 65-127: 0, 128-255: 0,
256-511: 0, 512-1023: 0, 1024-1518:0

Physical port 3 is active, and owned by monitorEtherStats


Which has received
58003 octets, 900 packets,
5 broadcast, 895 multicast packets,
0 undersized, 0 oversized packets,
0 fragments, 0 jabbers,
0 CRC alignment errors, 0 collisions.
# of dropped packet events (due to lack of resources): 0
# of packets received of length (in octets):
64: 839, 65-127: 60, 128-255: 0,
256-511: 1, 512-1023: 0, 1024-1518:0

L3 Interface 0 is active, and owned by monitorEtherStats


Which has received
0 octets, 0 packets,
0 broadcast, 0 multicast packets,
0 undersized, 0 oversized packets,
0 fragments, 0 jabbers,
0 CRC alignment errors, 0 collisions.
# of dropped packet events (due to lack of resources): 0
# of packets received of length (in octets):

Raisecom Proprietary and Confidential


891
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

64: 0, 65-127: 0, 128-255: 0,


256-511: 0, 512-1023: 0, 1024-1518:0

Related commands
N/A

12.10 Cable diagnostics


12.10.1 test cable-diagnostics port-list

Function
To enable cable diagnostics of the interface circuit, use this command.

Format
test cable-diagnostics interface-type interface-number

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Privileged EXEC

User level
11

Usage guidelines
Scenario
You can use this command to enable cable diagnostics of the interface circuit.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


892
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Precaution
The interface rate and duplex mode are not changed before and after cable diagnostics.
When Combo interface initiates cable diagnostics, the interface should be forced to serve
as an electrical interface.

Examples
You can use this command to enable cable diagnostics on interface 1/1/1.
Raisecom#test cable-diagnostics gigaethernet1/1/1
Test on port port-list 1 will affect link state and traffic.
Test will take a few seconds to run on these ports.
Use 'show cable-diagnostics' to read the test results.

Related commands
show cable-diagnostics

12.10.2 show cable-diagnostics

Function
To show information about cable diagnostics of interface circuit, use this command.

Format
show cable-diagnostics [interface-type interface-number ]

Parameters
Parameter Description
interface-type Interface type
interface-number Interface ID
The form and value range depend on the interface type.

Default conditions
N/A

Command mode
Privileged EXEC

User level
5

Raisecom Proprietary and Confidential


893
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
N/A

Examples
This example shows how to show information about cable diagnostics of on interface 1/1/1
circuit.
Raisecom#show cable-diagnostics gigaethernet1/1/1
Port: gigaethernet1/1/1 Attribute:Issued
Time:01/01/2010 08:38:25
Pair Status Length(m)
----------------------------------------------------
TX1 Open 0 0
RX1 Open 0 0
TX2 Open 0 0
RX2 Open 0 0

The following table describes fields in the command output.

Field Description
Port Interface ID
Attribute Attribute
Time Time
Pair Wiring pair
Status Status
Length(m) Length (m)

Related commands
N/A

12.11 Hardware environment monitoring


12.11.1 alarm temperature

Function
To enable temperature alarm and configure temperature alarm thresholds or temperature alarm
output modes, use this command. To disable this function, use the no form of this command.

Format
alarm temperature { high high-value | low low-value | notifies | syslog }
no alarm temperature { high | low | notifies | syslog }

Raisecom Proprietary and Confidential


894
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
high high-value High temperature threshold, an integer, ranging from -40 to 125 C
low low-value Low temperature threshold, an integer, ranging from -40 to 125 C
notifies Output temperature alarms in a form of Trap.
syslog Output temperature alarms in a form of Syslog.

Default conditions
The high temperature threshold is configured to 60 C and the low temperature is configured
to 20 C. Temperature alarms are output in a form of Trap or Syslog.

Command mode
Global configuration

Usage guidelines
Scenario
Temperature alarm must be enabled when the device works. It helps prevent the device from
working improperly caused by over high temperature.
You can use this command to configure temperature thresholds. When the device temperature
is higher than the high temperature threshold or is lower than the low temperature threshold,
an alarm is generated. You can use the no form of this command to restore the temperature
thresholds to the default setting.
You can use this command to configure temperature alarm output modes which are Trap and
Syslog. You can use the no form of this command to disable certain temperature alarm output
mode.
Prerequisite
N/A
Follow-up procedure
Use the show alarm command to display configurations of temperature alarms.
Precaution
N/A

Examples
This example shows how to configure the low temperature threshold to 10 C and the high
temperature threshold to 70 C.
Raisecom#config
Raisecom(config)#alarm temperature low 10
Set successfully.
Raisecom(config)#alarm temperature high 70

Raisecom Proprietary and Confidential


895
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Set successfully.

Related commands
show alarm

12.11.2 alarm voltage

Function
To enable voltage alarm and configure voltage alarm thresholds or voltage alarm output
modes, use this command. To disable this function, use the no form of this command.

Format
alarm voltage { high high-value | low low-value | notifies | syslog }
no alarm voltage { high | low | notifies | syslog }

Parameters
Parameter Description
high high-value High voltage threshold, an integer, ranging from 3450 to 3600 mV
low low-value Low voltage threshold, an integer, ranging from 3000 to 3300 mV
notifies Output voltage alarms in a form of Trap.
syslog Output voltage alarms in a form of Syslog.

Default conditions
The high voltage threshold is configured to 3450 mV and the low voltage is configured to
3150 mV. Voltage alarms are output in a form of Trap or Syslog

Command mode
Global configuration

Usage guidelines
Scenario
Voltage alarm must be enabled when the device works. It helps prevent the device from
working improperly caused by voltage anomaly.
You can use this command to configure voltage thresholds. When the device voltage is higher
than the high voltage threshold or is lower than the low voltage threshold, an alarm is
generated. You can use the no form of this command to restore the voltage thresholds to the
default setting.
You can use this command to configure voltage alarm output modes which are Trap and
Syslog. You can use the no form of this command to disable certain voltage alarm output
mode.

Raisecom Proprietary and Confidential


896
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Prerequisite
N/A
Follow-up procedure
Use the show alarm command to display configurations of voltage alarms.
Precaution
N/A

Examples
This example shows how to set the low voltage threshold to 3100 mV and the high voltage
threshold to 3500 mV.
Raisecom#config
Raisecom(config)#alarm voltage low 3100
Set successfully.
Raisecom(config)#alarm voltage high 3500
Set successfully.

Related commands
show alarm

12.11.3 clear alarm

Function
To clear current alarms, use this command.

Format
clear alarm

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Raisecom Proprietary and Confidential


897
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Usage guidelines
Scenario
You can use this command to clear current alarms.
You can use this command to delete alarms from the current alarm list. And then a clearall
alarm is generated in the history alarm. If alarm global Trap output is enabled, this clearall
alarm is output in a form of Trap. If alarm global Syslog output is enabled, this clearall alarm
is output in a form of Syslog.
For alarms deleted from the current alarm list, the system does not process them when alarms
recover. In addition, these alarms are not re-displayed in the current alarm list.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to clear current alarms.
Raisecom#config
Raisecom(config)#clear alarm
Set successfully.

Related commands
show alarm current
show alarm history

12.11.4 logging alarm

Function
To enable global hardware monitoring alarm Syslog output, use this command. To disable this
function, use the no form of this command.

Format
logging alarm
no logging alarm

Parameters
N/A

Raisecom Proprietary and Confidential


898
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
When the hardware environment is in anomaly, an alarm is generated. Therefore, you can take
actions immediately to prevent a failure. The monitored alarms contains dying Gasp alarms,
temperature alarms, voltage alarms, and interface status alarms.
Each alarm can be output in multiple forms:
Save alarms to the hardware monitoring alarm list.
Send Traps.
Saved to the system log.
You can use this command to enable global hardware monitoring alarm Syslog output.
When global hardware monitoring alarm Syslog output is enabled, an alarm cannot be
generated to the system log unless the Syslog output of the monitored alarm is enabled
concurrently.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable global hardware monitoring alarm Syslog output.
Raisecom#config
Raisecom(config)#logging alarm
Set successfully.

Related commands
show alarm

Raisecom Proprietary and Confidential


899
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.11.5 show alarm

Function
To show configurations of global hardware monitoring alarms, use this command.

Format
show alarm

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to display hardware monitoring information, including:
Status of global hardware monitoring alarm sending Trap switch
Status of global hardware monitoring alarm sending Syslog switch
Temperature threshold and temperature alarm output modes
Voltage threshold and voltage alarm output modes
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show configurations of global hardware monitoring alarms.
Raisecom#show alarm
Traps alarm: Disabled

Raisecom Proprietary and Confidential


900
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Logging alarm: Enabled

Temperature
High threshold(Celsius):60
Low threshold(Celsius): 20
Notifies: Enabled
Syslog: Enabled
Voltage
High threshold: 3450mV
Low threshold: 3150mV
Notifies: Disabled
Syslog: Disabled

Related commands
N/A

12.11.6 show alarm current

Function
To show current hardware monitoring alarms, use this command.

Format
show alarm current

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to display existing hardware monitoring alarms.
Prerequisite
N/A
Follow-up procedure

Raisecom Proprietary and Confidential


901
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Precaution
N/A

Examples
This example shows how to show current hardware monitoring alarms.
Raisecom#show alarm current
Alarm totals: 2

source type Description time


-------------------------------------------------------------------------
Device high-temperature High temperature 54 Celsius alarm JAN-01-2000
08:12:20

Related commands
N/A

12.11.7 show alarm history

Function
To show historical hardware monitoring alarms, use this command.

Format
show alarm history

Parameters
N/A

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
You can use this command to show historical hardware monitoring alarms.

Raisecom Proprietary and Confidential


902
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to show historical hardware monitoring alarms.
Raisecom#show alarm history
Alarm totals: 1

source status type Description time


-------------------------------------------------------------------------
Device cleared high-temperatureHigh temperature 54 Celsius alarm JAN-
01-2000 08:12:20

Related commands
N/A

12.11.8 show environment

Function
To show information related to the hardware environment, including information about the
power supply, temperature, and voltage, as well as alarms, use this command.

Format
show environment [ temperature | voltage ]

Parameters
Parameter Description
temperature Show temperature information.
voltage Show voltage information.

Default conditions
N/A

Command mode
Any configuration except user EXEC

Raisecom Proprietary and Confidential


903
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

User level
5

Usage guidelines
N/A

Examples
This example shows how to show information related to the hardware environment.
Raisecom#show environment
Temperature:
High alarm times: 0
Low alarm times: 0
Units Celsius Fahrenheit
-----------------------------------
Current 41 105
Min 29 84
Max 41 105
Voltage:
Reference Current Min Max High Alarms Low Alarms
--------------------------------------------------------------------

3300mV 3334 3334 3334 0 0


The following table describes fields in the command output.

Field Description
Temperature Temperature alarm
High alarm times Times of high temperature alarms
Low alarm times Times of low temperature alarms
Units Temperature type
Current: current temperature
Min: lowest temperature
Max: highest temperature

Celsius Temperature (C)


Fahrenheit Temperature (F)
Voltage Voltage alarm
Reference Reference voltage
Current Current voltage
Min Lowest voltage
Max Highest voltage
High Alarms Times of high voltage alarms
Low Alarms Times of low voltage alarms

Raisecom Proprietary and Confidential


904
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
N/A

12.11.9 snmp-server alarm-trap

Function
To enable global hardware monitoring alarm Trap output, use this command. To disable global
hardware monitoring alarm Trap output, use the disable form of this command.

Format
snmp-server alarm-trap { enable | disable }

Parameters
Parameter Description

enable Enable global hardware monitoring alarm Trap output.


disable Disable global hardware monitoring alarm Trap output.

Default conditions
Disabled

Command mode
Global configuration

User level
11

Usage guidelines
When the hardware environment is in anomaly, an alarm is generated. Therefore, you can take
actions immediately to prevent a failure. The monitored alarms contains dying Gasp alarms,
temperature alarms, voltage alarms, and interface status alarms.
Each alarm can be output in multiple forms:
Save alarms to the hardware monitoring alarm list.
Send Traps.
Saved to the system log.
You can use this command to enable global hardware monitoring alarm Trap output.
When global hardware monitoring alarm Trap output is enabled, the Trap cannot be sent
unless the Trap output of the monitored alarm is enabled concurrently.
Prerequisite

Raisecom Proprietary and Confidential


905
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

N/A
Follow-up procedure
N/A
Precaution
When you send alarms to the NMS in a form of Trap, you must configure the IP address of the
NMS on the device.

Examples
This example shows how to enable global hardware monitoring alarm Trap output.
Raisecom#config
Raisecom(config)#snmp-server alarm-trap enable
Set successfully.

Related commands
N/A

12.12 Memory monitoring


12.12.1 memory utilization threshold

Function
To configure the maximum threshold of memory utilization, use this command.

Format
memory utilization threshold threshold-value

Parameters
Parameter Description
threshold-value Maximum threshold of memory utilization, an integer, ranging from 50
to 95, indicating 50% to 95%

Default conditions
The memory alarm threshold is 70 indicating 70%.

Command mode
Privileged EXEC

Raisecom Proprietary and Confidential


906
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

User level
11

Usage guidelines
Scenario
After memory threshold alarm sending Trap is enabled, during sampling interval (a specified
period), the system sends a Trap automatically when the memory utilization rate is over the
configured maximum threshold.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the maximum threshold to 80%.
Raisecom#config
Raisecom(config)#memory utilization threshold 80
Set success.

Related commands
show memory utilization threshold

12.12.2 memory utilization enable

Function
To enable memory utilization monitoring, use this command. To disable the function, use the
disable form of this command.

Format
memory utilization monitor { enable | disable }

Parameters
Parameter Description
enable Enable memory utilization monitoring.
disable Disable memory utilization monitoring.

Raisecom Proprietary and Confidential


907
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Default conditions
Enabled

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to enable memory utilization monitoring. Then users will be
informed through a Trap when the device runs out of memory.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable memory monitoring.
Raisecom#config
Raisecom(config)#memory utilization monitor enable
Set successfully

Related commands
show memory

12.12.3 show memory

Function
To show memory utilization, use this command.

Format
show memory [ module { value | bufferpool | diff }| utilization threshold ]

Raisecom Proprietary and Confidential


908
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Parameters
Parameter Description
module Specified module
value Value of module ID, an integer, ranging from 1 to 511
bufferpool Changes of memory pool
diff Changes of memory
utilization threshold Show configurations of memory utilization threshold.

Default conditions
N/A

Command mode
Any configuration except user EXEC

User level
5

Usage guidelines
Scenario
Use the show memory command to show memory information, including number of bytes
and blocks, number of bytes and blocks of the remaining memory, and the current memory
utilization rate.
Use the show memory command to show memory information of the card in place.
Use the show memory module value command to show the memory utilization information
of the specified module.
Use the show memory module bufferpool command to show statistics of every block
memory pool.
Use the show memory module diff command to show the added memory information
between two commands.
Use the show memory utilization threshold command to show the maximum threshold of
memory utilization.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Raisecom Proprietary and Confidential


909
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Examples
This example shows how to show the status of memory utilization rate.
Raisecom#show memory
status bytes blocks avg block max block
-------- -------------- ---------- ---------- ----------
current
free 155929984 6 25988330 155919800
alloc 49280832 32893 1498 -
internal 632 3 210 -
cumulative
alloc 3091111192 26190192 118 -
peak
alloc 51335408 - - -

The Memory utilization: 24.01%

This example shows how to show configurations of maximum alarm threshold.


Raisecom#show memory utilization threshold
memory utilization switch : Enable
memory utilization threshold : 80

The following table describes fields in the command output.

Field Description
status Memory status
blocks Number of Memory blocks
avg block Average size of each block
max block Size of the maximum block
current Current utilization status of the memory
free Number of bytes of free memory
alloc Number of bytes of the memory in use
internal Memory utilization status inside the system
cumulative Accumulative memory utilization status
peak Peak value of the historical memory utilization
The Memory utilization Memory utilization rate
memory utilization switch Enabled status of memory utilization threshold
monitoring
memory utilization threshold Maximum alarm threshold of memory utilization

Related commands
N/A

Raisecom Proprietary and Confidential


910
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

12.13 Performance statistics


12.13.1 clear performance statistics history

Function
To clear global performance statistics history, use this command.

Format
clear performance statistics history

Parameters
N/A

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
N/A

Examples
This example shows how to clear global performance statistics history.
Raisecom#config
Raisecom(config)#clear performance statistics history
Set successfully.

Related commands
show performance statistics

12.13.2 performance statistics buckets

Function
To configure performance statistics longinterval/shortinterval buckets, use this command. To
return to the default conditons use the no form of this command.

Raisecom Proprietary and Confidential


911
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Format
performance statistics longinterval buckets longbuckets-number
performance statistics shortinterval buckets shortbuckets-number
no performance statistics longinterval buckets
no performance statistics shortinterval buckets

Parameters
Parameters Description
longbuckets-number Buckets value, an integer, ranging from 3 to 100, in units of stripe
shortbuckets- Buckets value, an integer, ranging from 10 to 100, in units of
number stripe

Default conditions
Performance statistics longbuckets value is 16, shortbuckets value is 3.

Command mode
Global configuration

User level
11

Usage guidelines
Scenario
You can use this command to configure performance statistics longinterval/shortinterval
buckets. The over configured records will override the original ones.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to configure the shortinterval buckets of performance statistics to 10.
Raisecom#config
Raisecom(config)# performance statistics shortinterval buckets 10
Set successfully.

Raisecom Proprietary and Confidential


912
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Related commands
show performance statistics

12.13.3 performance statistics vlan

Function
To enable performance statistics based on interface, use this command. To disable this
function, use the disable form of this command

Format
performance statistics interface-type interface-number vlan vlan-list [ cos cos-value ]
{ enable | disable }

Parameters
Parameters Description
interface-type Interface number
interface-number The interface-type indicates interface type.
The interface-number indicates three-dimensional interface
number.
vlan-list VLAN ID list, an integer, ranging from 1 to 4049
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".
cos-value CoS value, an integer, ranging from 0 to 7.
enable Enable performance statistics based on interface.
disable Disable performance statistics based on interface.

Default conditions
N/A

Command mode
Global configuration

User level
11

Usage guidelines
Scenario

Raisecom Proprietary and Confidential


913
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

To show the number of egress/ingress bytes and packets on the interface, you can enable
performance statistics file saving feature based on interface and show them through the show
performance statistics command.
Prerequisite
N/A
Follow-up procedure
N/A
Precaution
N/A

Examples
This example shows how to enable performance statistics based on interface
Raisecom#config
Raisecom(config)#performance statistics gigaethernet 1/1/3 vlan 1 cos 1
enable
Set successfully.

Related commands
show performance statistics

12.13.4 show performance statistics

Function
To show performance statistics, use this command.

Format
show performance statistics vlan vlan-list { current | history } ]

Parameters
Parameter Description
current Current history of performance statistics
history Performance statistics of history group
vlan Statistics based on VLAN
vlan-list VLAN ID list, an integer, ranging from 1 to 4094
It supports specific values, such as "1,2,3"; it also supports a
range, such as "1-3".

Default conditions
N/A

Raisecom Proprietary and Confidential


914
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

Command mode
Any configuration

User level
5

Usage guidelines
N/A

Examples
This example shows how to show current history of global performance statistics.
Raisecom#show performance statistics
Performance statistics shortinterval buckets: 16
Performance statistics longinterval buckets: 3
Performance statistics file Status: Disable

The following table describes fields in the command output.

Fields Description
Performance statistics shortinterval buckets Performance statistics shortinterval
buckets
Performance statistics longinterval buckets Performance statistics longinterval buckets
Performance statistics file Status Performance statistics file status

This example shows how to show current history of performance statistics based on VLAN1.
Raisecom#show performance statistics vlan 1 current
Short interval
Vlan: 1 Cos: 0
--------------------------
UpOctets: 0
UpFrames: 0
UpDiscards: 0
DownOctets: 0
DownFrames: 0
DownDiscards: 0

Long interval
Vlan: 1 Cos: 0
--------------------------
UpOctets: 0
......
DownDiscards: 0

Short interval
Vlan: 1 Cos: 1
--------------------------
UpOctets: 0

Raisecom Proprietary and Confidential


915
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 12 System management and maintenance

......
DownDiscards: 0

The following table describes fields in the command output.

Field Description
UpOctets Number of uplink bytes
UpFrames Number of uplink packets
UpDiscards Number of discarded uplink packets
DownOctets Number of downlink bytes
DownFrames Number of downlink packets
DownDiscards Number of discarded downlink packets

Related commands
N/A

Raisecom Proprietary and Confidential


916
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

13 Index

alarm voltage ................. 896


?/h ....................................10 arp .................................. 301
{ max-active | min-active } arp aging-time ............... 302
links................................592
arp learning enable ........ 303

arp max-learning-num ... 305
aaa accounting fail .........670
arp mode ........................ 306
aaa accounting login enable
.......................................671 auto_config enable .......... 82

aaa accounting update ....672 auto_config save enable .. 83

aaa command authorize auto_load time ................. 84


enable .............................673
access-list .......................633 b ......................................... 4
address mask ..................389 banner enable ................. 143
alarm active delay ..841, 847 banner login ................... 144
alarm active storage-mode boot sequence .................. 73
.......................................842

alarm auto-report ...........843
cir cbs ............................ 477
alarm clear .....................845
class-map(global
alarm inhibit ...........848, 849 configuration mode) ...... 465
alarm inverse ..................850 class-map(PMAP
alarm monitor.................852 configuration mdoe) ...... 481

alarm syslog ...................853 clear ................................. 11

alarm temperature ..........894 clear alarm ..................... 897


clear arp ......................... 307

Raisecom Proprietary and Confidential


917
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

clear banner login ..........146 clear port-security .......... 614


clear buffer_config...........81 clear pppoeagent statistic
....................................... 712
clear cpu-protect car
statistics..........................752 clear rmon ...................... 882
clear dot1x statistics.......693 clear service-policy
statistics ......................... 495
clear ethernet ring-
protection command ......280 clear tacacs statistics...... 674
clear ethernet ring- clock display .................. 122
protection statistics ........281
clock set ......................... 123
clear filter statistics
interface .........................649 clock summer-time enable
....................................... 124
clear igmp statistics........505
clock summer-time
clear interface statistics .. 117 recurring ........................ 125
clear ipv6 neighbors .......320 clock timezone............... 127
clear l2cp-process tunnel command-log enable ....... 13
statistics..........................273
command-string schedule-
clear lacp statistics .........581 list .................................. 141
clear lldp global statistic 757 config ............................... 12
clear lldp remote-table ...759 console open .................. 119
clear lldp statistic ...........758 copy ................................. 75
clear logging buffer ........813 copy-to-mirror ............... 490
clear logging statistics....814 cos to local-priority ....... 435
clear loopback-detection cpu rising-threshold ...... 861,
statistic ...........................250 862
clear mac-address...........151 cpu-protect car ............... 754
clear mac-address dynamic create vlan ..................... 173
.......................................152

clear mls qos queue
description ............... 88, 423
statistics interface...........454
clear oam config ............547 description (cmap/pmap)
....................................... 483
clear oam event ..............548
dir .................................... 68
clear oam statistics .........549
dlf-forwarding enable .... 729
clear performance statistics
history ............................ 911 dns-server ...................... 397

Raisecom Proprietary and Confidential


918
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

dot1q-tunnel ...................189 ethernet ring-protection


holdoff-time ................... 287
dot1x auth-control..........697
ethernet ring-protection
dot1x authentication- manual-switch ............... 288
method ...........................696
ethernet ring-protection
dot1x auth-method .........699 name .............................. 290
dot1x enable ...................695 ethernet ring-protection
dot1x reauthentication ...700 propagate enable ............ 291

dot1x timer quiet-period 706 ethernet ring-protection


raps-vc ........................... 292
dot1x timer reauth-period
.......................................701 ethernet ring-protection
version ........................... 293
dot1x timer server-timeout
.......................................704 ethernet ring-protection wtr-
time ................................ 295
dot1x timer supp-timeout
.......................................703 exit ................................... 18

dot1x timer tx-period .....702

download..........................76 filter access-list .............. 647

drop-color ......................471 flowcontrol on ............... 103

dscp to local-priority ......436 forward-to-cpu ............... 491

dscp to new-dscp....438, 443

duplex ............................101 gateway.......................... 398

generate ssh-key .............. 35

e..........................................6 gratuitous-arp-learning .. 308

enable ...............................15

enable login ....................675 help .................................. 19

enable password ...............16 history .............................. 21

end....................................17 hostname.......................... 22

erase .................................67

ethernet ring-protection .282 igmp filter ...................... 531

ethernet ring-protection igmp filter max-groups .. 532


force-switch ...................285 igmp filter max-groups
ethernet ring-protection action ............................. 534
guard-time ......................286 igmp filter profile (interface
configuration) ................ 537

Raisecom Proprietary and Confidential


919
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

igmp filter profile(global ip arp-rate-limit rate ...... 661


configuration) ................535
ip arp-rate-limit recover
igmp immediate-leave ...506 enable ............................ 662
igmp mrouter .................507 ip arp-rate-limit recover
time ................................ 663
igmp mvr ........................523
ip dhcp client ................. 349
igmp mvr mcast-vlan .....524
ip dhcp client renew ...... 351
igmp ring........................509
ip dhcp information option
igmp snooping ...............516 attach-string ................... 375
igmp snooping member- ip dhcp information option
timeout ...........................517 circuit-id ........................ 376
igmp version .................. 511 ip dhcp information option
instance vlan .................. 211 circuit-id mac-format ..... 377

interface fastethernet ........93 ip dhcp information option


remote-id ....................... 378
interface gigaethernet.......94
ip dhcp lease .................. 390
interface loopback ............99
ip dhcp relay .................. 411
interface port-channel .....98,
582 ip dhcp relay information
option ............................. 413
interface tengigaethernet ..95
ip dhcp relay information
interface tunnel ................97 option vlan-list............... 414
interface vlan ...................96 ip dhcp relay information
ip { dhcp | oam } server policy ............................. 416
pool ................................393 ip dhcp relay information
ip address ....................... 311 trusted ............................ 415

ip address dhcp ..............348 ip dhcp relay relay-ip .... 400,


418
ip arp-inspection binding
.......................................653 ip dhcp relay target-ip.... 417

ip arp-inspection dhcp- ip dhcp server ................ 392


snooping.........................655 ip dhcp snooping ........... 358
ip arp-inspection static- ip dhcp snooping
config .............................656 information option ......... 362
ip arp-inspection trust ....657 ip dhcp snooping
ip arp-inspection vlan ....658 interface(interface) ........ 359

ip arp-rate-limit enable ..660 ip dhcp snooping option 363

Raisecom Proprietary and Confidential


920
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

ip dhcp snooping trust ....361 ipv6 nd dad attempts ..... 323


ip dhcp static-bind..........394 ipv6 neighbors ............... 321
ip route ...........................316 ipv6 neighbors max-
learning-num ................. 324
ip route static distance ...317
ipv6 source binding ....... 741
ip source binding............734
ipv6 verify source .......... 743
ip source binding auto-
update.............................735 ipv6 verify source dhcp-
snooping ........................ 744
ip source binding dhcp-
snooping static ...............736 ipv6 verify source trust .. 745
ip verify source ..............738

ip verify source dhcp- jumboframe ................... 112


snooping.........................739

ip verify source trust ......740
l2cp-process profile ....... 265
ipv4 dhcp option ............380
l2cp-process protocol action
ipv4 dhcp option client-id ....................................... 267
.......................................381
l2cp-process tunnel
ipv6 address ...................312 destination-address ........ 266
ipv6 address dhcp ..........352 l2protocol peer stp ......... 102
ipv6 dhcp client rapid- lacp mode ...................... 583
commit ...........................353
lacp port-priority ........... 584
ipv6 dhcp client renew ...354
lacp priority preempt enable
ipv6 dhcp information ....................................... 585
option circuit-id mac-format
lacp system-priority ....... 586
.......................................386
lacp timeout ................... 588
ipv6 dhcp option ............382
language .......................... 23
ipv6 dhcp option
interface-id .....................384 lease expired .................. 395
ipv6 dhcp option remote-id link-state-tracking group 609
ascii|hex ...................385
link-state-tracking group
ipv6 dhcp snooping ........364 { downstream | upstream }
....................................... 610
ipv6 dhcp snooping
interface .........................366 list .................................... 24
ipv6 dhcp snooping option lldp enable ..................... 760
.......................................367
lldp message-transmission
ipv6 dhcp snooping trust 368 delay .............................. 762

Raisecom Proprietary and Confidential


921
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

lldp message-transmission
hold-multiplier ...............763
m ........................................ 3
lldp message-transmission
interval ...........................764 mac-address aging-time. 154
mac-address blackhole .. 155
lldp restart-delay ............765
mac-address learning enable
lldp trap-interval ............766
....................................... 157
load-sharing mode .........589
mac-address move-restrain
local-priority to cos ........439 enable ............................ 156
logging alarm .................898 mac-address multicast drop-
unknown ........................ 160
logging buffered .............816
mac-address static ......... 162
logging buffered size .....818
mac-address threshold ... 159
logging buginf ................815
master-port..................... 590
logging console ..............819
match ............................. 467
logging discriminator .....821
mdi ................................. 105
logging facility ...............823
media-type ..................... 107
logging file .....................824
medium-priority ............ 104
logging history ...............826
memory utilization enable
logging history size ........827 ....................................... 907
logging host ...................828 memory utilization
logging monitor .............830 threshold ........................ 906

logging on ......................832 mirror-group .................. 258

logging rate-limit ...........833 mirror-group monitor-port


....................................... 260
logging sequence-number
.......................................834 mirror-group source-cpu 263

logging time-stamp ........835 mirror-group source-port-


list .................................. 261
logging trap ....................836
mls qos cos-remark ........ 440
login-trap enable ............120
mls qos cos-remark-
logout ...............................25 mapping enable ............. 430
loopback-detection .........251 mls qos cos-to-local-priority
loopback-detection manual ....................................... 441
restore ............................253 mls qos dscp-mutation ... 442

Raisecom Proprietary and Confidential


922
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

mls qos dscp-to-local- oam { errored-frame |


priority ...........................445 errored-frame-period |
errored-frame-seconds |
mls qos mapping cos- errored-symbol-period } 551
remark ............................429
oam enable ..................... 554
mls qos mapping cos-to-
local-priority ..................431 oam event trap enable .... 555
mls qos mapping dscp- oam loopback ................ 557
mutation .........................432
oam loopback retry ........ 559
mls qos mapping dscp-to-
local-priority ..................434 oam loopback timeout ... 558

mls qos policer-profile ...470 oam notify enable .......... 560

mls qos priority ..............428 oam peer event trap enable


....................................... 562
mls qos queue scheduler drr
.......................................457 oam remote-loopback .... 563

mls qos queue scheduler sp oam send-period timeout


.......................................460 ....................................... 565

mls qos queue scheduler wrr option 43 ........................ 410


.......................................459 option 60 ........................ 399
mls qos queue shaping ...451
mls qos sred profile ........461 p ......................................... 9
mls qos trust ...................426 performance statistics
buckets ........................... 911
mode ..............................593
performance statistics vlan
mtu .................................109
....................................... 913

permit | deny .................. 539
name...............175, 212, 269
ping ................................ 872
no igmp member ............510
poe enable ...................... 332
no port-security shutdown
.......................................615 poe force-power............. 333

ntp peer ..........................128 poe legacy enable .......... 334

ntp refclock-master ........131 poe max-power .............. 336

ntp server .......................130 poe power-management 342


poe priority .................... 337

oam { active | passive } .550 poe pse power-threshold 338


poe pse trap enable ........ 339

Raisecom Proprietary and Confidential


923
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

poe temperature-protection rate-limit ........................ 502


enable .............................340
reboot ............................... 27
police..............................484
recolor ............................ 476
policy-map .....................480
redirect-to ...................... 488
port-channel ...................579
restore-mode .................. 595
port-security aging-time.618
revision-level ................. 214
port-security recovery-time
.......................................616 rmon alarm .................... 883

port-type ...........................99 rmon event ..................... 885

pppoeagent circuit-id .....715 rmon history .................. 887

pppoeagent circuit-id rmon statistic ................. 888


{ attach-string | format | hex } rule (Advanced
.......................................716 ACLconfiguration mode)
pppoeagent circuit-id mac- ....................................... 644
format.............................717 rule (extended IP ACL
pppoeagent circuit-id mode configuration mode) ...... 636
.......................................719 rule (IPv6 ACL
pppoeagent enable .........713 configuration mode) ...... 642

pppoeagent remote-id ....722 rule (MAC ACL


configuration mode) ...... 639
pppoeagent remote-id
format.............................720 rule (standard IP ACL
configuration mode) ...... 635
pppoeagent trust .............723
rule (User ACL
pppoeagent vendor-specific- configuration mode) ...... 641
tag overwrite enable .......724


s ......................................... 5
quit ...................................26
schedule-list ................... 139

search mac-address ........ 163
r ..........................................7
service-policy ................ 494
radius..............................677
set .................................. 487
radius accounting-server 678
set-cos ............................ 472
radius accounting-server
key..................................679 set-dscp .......................... 473

radius-key ......................681 set-pri ............................. 475

range ..............................540 show aaa ........................ 682

Raisecom Proprietary and Confidential


924
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

show access-list .............652 show ethernet ring-


protection statistic ......... 298
show acl resource ...........646
show ethernet ring-
show alarm .....................900 protection status............. 299
show alarm active ..........855 show filter interface ....... 650
show alarm cleared ........856 show igmp filter ............ 542
show alarm current ........901 show igmp filter profile . 545
show alarm history.........902 show igmp immediate-leave
show alarm log...............857 ....................................... 512

show alarm management show igmp mrouter ........ 514


.......................................858 show igmp mvr ...... 526, 527
show alarm management show igmp mvr members
statistics..........................859 ....................................... 528
show arp .........................309 show igmp mvr vlan-group
show auto_config .............85 ....................................... 529

show banner login ..........147 show igmp snooping...... 519

show buffer_config ..........87 show igmp snooping


member .......................... 520
show cable-diagnostics ..893
show igmp snooping vlan
show class-map ......468, 499 ....................................... 522
show clock .....................133 show igmp statistics ...... 515
show combo configuration show interface ................. 89
....................................... 118
show ip arp-inspection .. 664
show cpu-protect car
statistics..........................755 show ip arp-inspection
binding ........................... 666
show cpu-utilization.......863
show ip arp-rate-limit .... 668
show dlf-forwarding ......733
show ip dhcp client ........ 355
show dot1q-tunnel .........203
show ip dhcp information
show dot1x .....................707 option ............................. 388
show dot1x statistics ......709 show ip dhcp relay......... 420
show dot1x user ............. 711 show ip dhcp relay
show environment ..........903 information .................... 421

show ethernet ring- show ip dhcp server ....... 402


protection .......................296 show ip dhcp server lease
....................................... 403

Raisecom Proprietary and Confidential


925
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

show ip dhcp server show link-state-tracking


statistics..........................404 group.............................. 612
show ip dhcp snooping ..369 show lldp local config ... 768
show ip dhcp snooping show lldp local system-data
binding ...........................371 ....................................... 769
show ip dhcp static-bind 405 show lldp remote ........... 770
show ip interface brief ...313 show lldp statistic .......... 772
show ip route..................318 show logging ................. 838
show ip server pool ........406 show loopback-detection
....................................... 254
show ip source binding ..746
show mac-address ......... 172
show ip verify source .....748
show mac-address aging-
show ipv6 dhcp client ....357 time ................................ 165
show ipv6 dhcp snooping show mac-address count 166
.......................................372
show mac-address learning
show ipv6 dhcp snooping ....................................... 167
binding ...........................374
show mac-address multicast
show ipv6 interface brief ....................................... 170
.......................................314
show mac-address threshold
show ipv6 interface nd ...329 ....................................... 168
show ipv6 interface prefix show memory ................ 908
.......................................327
show mirror ................... 262
show ipv6 neighbors ......325
show mls qos interface .. 425
show ipv6 source binding
.......................................749 show mls qos mapping cos-
remark ............................ 446
show ipv6 verify source .751
show mls qos mapping cos-
show keepalive...............881 to-local-priority ............. 447
show l2cp-process ..........275 show mls qos mapping
show l2cp-process profile dscp-mutation ................ 448
.......................................276 show mls qos mapping
show l2cp-process tunnel dscp-to-local-priority ..... 450
statistics..........................278 show mls qos policer ..... 500
show l2protocol peer stp show mls qos policer ..... 479
port ................................. 114
show mls qos queue
show lacp .......................596 interface ......................... 453

Raisecom Proprietary and Confidential


926
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

show mls qos queue shaping show process cpu ........... 869
interface .........................456
show radius-server......... 683
show mls qos queue
statistics interface...........455 show rate-limit interface 503

show mls qos sred profile show reboot info .............. 30


.......................................464 show rmon ..................... 890
show multisystem ............73 show running-config ....... 70
show ntp associations ....134 show schedule-list ......... 142
show ntp status...............136 show service-policy ....... 496
show oam .......................566 show service-policy
show oam event .............567 statistics ......................... 498

show oam loopback .......569 show snmp access .......... 774

show oam notify ............570 show snmp community.. 776

show oam peer ...............572 show snmp config.......... 777

show oam peer event .....573 show snmp group .......... 778

show oam peer link-statistic show snmp host ............. 779


.......................................574 show snmp server-auth .. 784
show oam peer oam-info575 show snmp statistics ...... 780
show oam statistics ........576 show snmp user ............. 782
show oam trap ................578 show snmp view ............ 783
show performance statistics show sntp ....................... 137
.......................................914
show spanning-tree ........ 215
show poe ........................343
show spanning-tree
show poe pse ..................345 interface ......................... 219
show policy-map ............485 show spanning-tree region-
show port-channel ..........600 configuration ................. 221

show port-security .........622 show spanning-tree region-


operation ........................ 223
show port-security mac-
address ...........................620 show ssh2 { server | session }
......................................... 38
show pppoeagent ...........725
show ssh2 public-key ...... 37
show pppoeagent statistic
.......................................727 show startup-config ......... 71

show process ..................865 show storm-control ........ 731


show switchport backup 601

Raisecom Proprietary and Confidential


927
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

show switchport interface snmp-server lldp-trap enable


.......................................177 ....................................... 773
show switchport protect .256 snmp-server location ..... 794
show tacacs-server .........684 snmp-server server-auth 799
show telnet-server ............40 snmp-server server-auth
enable ............................ 800
show terminal...................28
snmp-server trap transceiver
show transceiver ............801 enable ............................ 809
show transceiver ddm ....802 snmp-server traps enable
show transceiver history 804 ....................................... 871

show transceiver snmp-server user ........... 795


information ....................806 snmp-server view .......... 797
show transceiver threshold sntp server ..................... 138
violations........................808
spanning-tree bpduguard238
show user .................41, 686
spanning-tree bridge-
show version ....................78 diameter ......................... 224
show vlan .......................176 spanning-tree clear statistics
show vlan-mapping both ....................................... 225
interface .........................200 spanning-tree edged-port
show vlan-mapping ....................................... 228
interface .........................201 spanning-tree edged-port
show watchdog ..............149 bpdu-filter ...................... 229

shutdown ..........................92 spanning-tree enable ...... 226


snmp-server access ........786 spanning-tree extern-path-
cost ................................ 230
snmp-server alarm-trap ..905
spanning-tree forward-delay
snmp-server community 788 ....................................... 231
snmp-server contact .......789 spanning-tree hello-time 233
snmp-server enable traps spanning-tree inter-path-
.......................................790 cost ................................ 234
snmp-server group user..791 spanning-tree link-type .. 236
snmp-server host ............792 spanning-tree loopguard 237
snmp-server keepalive-trap spanning-tree max-age .. 240
.......................................879
spanning-tree max-hops 241
snmp-server keepalive-trap
interval ...........................880 spanning-tree mode ....... 242

Raisecom Proprietary and Confidential


928
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

spanning-tree priority.....243 switchport backup restore-


mode .............................. 607
spanning-tree region-
configuration ..................245 switchport mode ............ 182
spanning-tree root ..........246 switchport port-security. 624
spanning-tree rootguard .247 switchport port-security
aging-type ...................... 619
spanning-tree transit-limit
.......................................249 switchport port-security
mac-address ................... 625
speed ..............................108
switchport port-security
sred start-drop-threshold mac-address sticky ........ 626
end-drop-threshold .........462
switchport port-security
ssh access-list ...................50 mac-address sticky vlan 628
ssh2 server .......................43 switchport port-security
ssh2 server authentication maximum ....................... 629
{ password | rsa-key } ......44 switchport port-security trap
ssh2 server authentication enable ............................ 630
public-key ........................45 switchport port-security
ssh2 server authentication- violation ......................... 632
retries ...............................46 switchport protect .......... 257
ssh2 server authentication- switchport qinq dot1q-
timeout .............................48 tunnel default-cvlan ....... 197
ssh2 server close session ..51 switchport reject-frame . 191
ssh2 server max-session ...52 switchport trunk allowed
ssh2 server port ................49 vlan ................................ 183

ssh2 server version ...........53 switchport trunk native vlan


....................................... 185
statistics enable ...... 115, 493
switchport trunk untagged
storm-control..................730 vlan ................................ 186
switchport access egress- switchport vlan-mapping
allowed vlan ...................181 both add-outer ............... 198
switchport access vlan ...179 switchport vlan-mapping
switchport backup ..........605 both add-outer translate
outer .............................. 210
switchport backup force-
switch .............................603 switchport vlan-mapping
cvlan add-outer .............. 192
switchport backup restore-
delay...............................606 switchport vlan-mapping
ethertype add-outer ........ 194

Raisecom Proprietary and Confidential


929
Copyright Raisecom Technology Co., Ltd.
Raisecom
ISCOM2600G (A) Series Command Reference 13 Index

switchport vlan-mapping tpid ................................. 111


ingress outer inner translate
...............................206, 208 traceroute ....................... 874

switchport vlan-mapping traceroute ipv6 ............... 877


outer translate.................205 transceiver ddm enable .. 810
switchport vlan-mapping- transceiver trap enable ... 812
miss discard ...................196
trap server-ip.................. 409

tunnel interface .............. 271
t ..........................................1
tunnel tunnel-type .......... 274
tacacs accounting-server 688
tunnel vlan ..................... 270
tacacs-server ..................689

tacacs-server key............691
upload .............................. 79
telnet ................................54
user { allow-exec | disallow-
telnet-server accept ..........56 exec } ............................... 60
telnet-server accept port ...57 user login ................. 63, 692
telnet-server close terminal- user login server-no-
telnet ................................58 response ........................... 65
telnet-server max-session.59 user name ......................... 62
terminal history ................32 user service-type .............. 66
terminal page-break enable
.........................................31
vibration-suppress ......... 113
terminal time-out .............33
vlan ................................ 188
test cable-diagnostics port-
list ..................................892

tftp-server .......................407 watchdog enable ............ 148

tpid .................................190 write ................................. 34

Raisecom Proprietary and Confidential


930
Copyright Raisecom Technology Co., Ltd.
Address: Raisecom Building, No. 11, East Area, No. 10 Block, East Xibeiwang Road, Haidian
District, Beijing, P.R.China Postal code: 100094 Tel: +86-10-82883305
Fax: 8610-82883056 http://www.raisecom.com Email: export@raisecom.com

You might also like