Command Line Reference
Interface Management Configuration
11 min
interface configuration interface configuration introduction introduction ethernet interfaces are generally used as service interfaces for service transmission and are sometimes also called ports numbering sequence numbering sequence the ethernet interface numbering method of this series of products is ethernetx x represents the interface number, which increases from 1 it should be noted that the naming intervals of different series of interfaces are different for enterprise level products with 100g interfaces, the naming interval of 100g interfaces is 4 taking cx206p 48s mh as an example, the first 100g interface numbered 49 is named ethernet49, the second 100g interface is named ethernet53, and so on basic interface configuration basic interface configuration table 1 basic interface configuration table 1 basic interface configuration operation command description enter the system configuration view configure enter the interface view interface ethernet id set interface description description string set interface speed speed {1000|10000|25000} different types of interfaces support different configuration parameters please execute the speed ? command in the relevant interface view to view specific options enable interface no shutdown by default, the ethernet interface is in the enabled state execute the shutdown command to disable the interface service function and set the interface physical state to down note the power supply of the poe power supply interface is not affected by this command modify interface fec mode fec {rs|fc} by default, the fec mode is disabled the fec modes at both ends of the link must be consistent otherwise, the interface will not be up enable the poe power supply function of the interface poe enable by default, the poe power supply function of the interface is disabled the poe enable command disables the poe power supply on the interface configuring interface loopback loopback the physical interface loops back, and the port becomes up after the loopback the traffic output from the loopback port will re enter the loopback port tunnel stripping decape {gre|vxlan|erspan|cfp|gtp u|pppoe|mpls|ipinip} strip the tunnel of the traffic coming from the port and select the type of tunnel to strip port delayed start startup delay (1 600) set the delay in seconds before the port starts port splitting breakout {4x25g|4x10g|4x1g} split a port into four 25g/10g/1g channels enable the ptp function on the port ptp enable enable port ptp maintenance interface maintenance interface table 2 maintenance interface table 2 maintenance interface operation command description view interface description show interface description view interface poe supply information show interface poe \[detail] view interface status show interface status view interface module information show interface transceiver eeprom dom \[ ethernet id ] view interface statistics show counters interface \[ ethernet id ] clear interface statistics clear counters interface tunnel stripping tunnel stripping tunnel stripping means that the traffic received from the ingress will be stripped before being forwarded to the egress precautions precautions when tunnel stripping and acl filtering are used at the same time, stripping is performed first and then acl filtering for example, if the original message carries a gre tunnel, after gre stripping is enabled, the inner five element information is matched (the inner vlan does not support filtering) for the ethernet layer that is completed after stripping the tunnel , only the source and destination mac 00 00 00 00 00 00 can be used as the filtering condition tunnel stripping basic configuration tunnel stripping basic configuration tunnel stripping takes effect on the input port of the traffic table 3 tunnel stripping basic configuration table 3 tunnel stripping basic configuration operation command description enter system configuration view configure enter interface view interface ethernet id tunnel stripping decape {gre|vxlan|erspan|cfp|gtp u|pppoe|mpls|ipinip} strip the tunnel of the traffic coming from the port and select the type of tunnel to strip load balancing hash algorithm configuration load balancing hash algorithm configuration custom hash key basic configuration custom hash key basic configuration the custom hash takes effect on the input port of the traffic, and the custom hash key is used when the traffic from this port is forwarded to the output lag 16 custom hash algorithms can be configured table 4 creating hash group table 4 creating hash group operation command description enter system configuration view configure creating a custom hash hash mode alias name create a custom hash group and name it add a hash key to a custom hash group hash key {src ip|dst ip|src mac|dst mac|src port|dst port|mac symmetric|ipv4 symmetric|ipv6 symmetric|l4 symmetric|ipv4 symmetric src ip|ipv4 symmetric dst ip|ipv6 symmetric src ip|ipv6 symmetric dst ip} hash key description select a key as the load balancing condition symmetric represents symmetric hashing and does not care about the source and destination mac symmetric indicates the symmetric hash of the source mac and the destination mac, ipv4 symmetric applies symmetric hashing to the source and destination ipv4 addresses, ipv6 symmetric applies symmetric hashing to the source and destination ipv4 addresses and l4 symmetric performs a symmetric hash over the source and destination transport layer (layer 4) ports ipv4 symmetric src ip is usually used with ipv4 symmetric dst ip on different ports, as long as the ports fetch the same ip address, it will be loaded to the same output port, and the key is not used with any other key on the same port ipv6 symmetric src ip is usually used in conjunction with ipv6 symmetric dst ip on different ports, as long as the ports fetch the same ip address, it will be loaded onto the same output port, and the key is not used with any other key on the same port note with ipv4 symmetric src ip/ipv4 symmetric dst ip/ipv6 symmetric src ip/ipv6 symmetric src ip turned on for cx102s devices, you can use l3 rules to match the source ip/destination ip/source port/destination port for other devices, l3 and l3v6 rules can be used to match source ip/destination ip/source port/destination port symmetric hash and its corresponding key cannot be configured at the same time, but multiple symmetric hashes can be configured at the same time table 5 binding hash groups table 5 binding hash groups operation command description enter system configuration view configure enter interface view interface ethernet id enter the entry to be bound applying a custom hash group hash mode alias name bind the hash mode to the input port qinq message analysis qinq message analysis qinq message parsing is not enabled during traffic forwarding , the message will only be parsed up to qinq after qinq message parsing is enabled, the traffic will continue to be parsed and can match the five tuple information of the message table 6 qinq message analysis table 6 qinq message analysis operation command description enter system configuration view configure enter interface view interface ethernet id enter the traffic input port where the qinq message is to be parsed configure the protocol number of qinq packets qinq protocol ether type ether type eg 0x88a8 0x9100 enable qinq message parsing qinq enable enable qinq message parsing on the port
