Command Line Reference
Interface Management Configuration
11 min
interface configuration interface configuration introduction introduction ethernet interfaces are generally used as service interfaces for service transmission and are sometimes also called ports numbering sequence numbering sequence the ethernet interface numbering method of this series of products is ethernetx x represents the interface number, which increases from 1 it should be noted that the naming intervals of different series of interfaces are different for enterprise level products with 100g interfaces, the naming interval of 100g interfaces is 4 taking cx206p 48s mh as an example, the first 100g interface numbered 49 is named ethernet49, the second 100g interface is named ethernet53, and so on basic interface configuration basic interface configuration table 1 basic interface configuration table 1 basic interface configuration true 172,136 9455782312925,352 05442176870747#4283c7 unhandled content type #4283c7 unhandled content type #4283c7 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type maintenance interface maintenance interface table 2 maintenance interface table 2 maintenance interface true 218,310 11125899635215,132 88874100364785#4283c7 unhandled content type #4283c7 unhandled content type #4283c7 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type tunnel stripping tunnel stripping tunnel stripping means that the traffic received from the ingress will be stripped before being forwarded to the egress precautions precautions when tunnel stripping and acl filtering are used at the same time, stripping is performed first and then acl filtering for example, if the original message carries a gre tunnel, after gre stripping is enabled, the inner five element information is matched (the inner vlan does not support filtering) for the ethernet layer that is completed after stripping the tunnel , only the source and destination mac 00 00 00 00 00 00 can be used as the filtering condition tunnel stripping basic configuration tunnel stripping basic configuration tunnel stripping takes effect on the input port of the traffic table 3 tunnel stripping basic configuration table 3 tunnel stripping basic configuration true 168,218 9410430839002,274 05895691609976#4283c7 unhandled content type #4283c7 unhandled content type #4283c7 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type load balancing hash algorithm configuration load balancing hash algorithm configuration custom hash key basic configuration custom hash key basic configuration the custom hash takes effect on the input port of the traffic, and the custom hash key is used when the traffic from this port is forwarded to the output lag 16 custom hash algorithms can be configured table 4 creating hash group table 4 creating hash group true 154,368 9251700680272,138 07482993197274#4283c7 unhandled content type #4283c7 unhandled content type #4283c7 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type hash key description select a key as the load balancing condition symmetric represents symmetric hashing and does not care about the source and destination mac symmetric indicates the symmetric hash of the source mac and the destination mac, ipv4 symmetric applies symmetric hashing to the source and destination ipv4 addresses, ipv6 symmetric applies symmetric hashing to the source and destination ipv4 addresses and l4 symmetric performs a symmetric hash over the source and destination transport layer (layer 4) ports ipv4 symmetric src ip is usually used with ipv4 symmetric dst ip on different ports, as long as the ports fetch the same ip address, it will be loaded to the same output port, and the key is not used with any other key on the same port ipv6 symmetric src ip is usually used in conjunction with ipv6 symmetric dst ip on different ports, as long as the ports fetch the same ip address, it will be loaded onto the same output port, and the key is not used with any other key on the same port note with ipv4 symmetric src ip/ipv4 symmetric dst ip/ipv6 symmetric src ip/ipv6 symmetric src ip turned on for cx102s devices, you can use l3 rules to match the source ip/destination ip/source port/destination port/ip protocol for other devices, l3 and l3v6 rules can be used to match source ip/destination ip/source port/destination port/ip protocol symmetric hash and its corresponding key cannot be configured at the same time, but multiple symmetric hashes can be configured at the same time table 5 binding hash groups table 5 binding hash groups true 184,195 77551020408163,281 2244897959184#4283c7 unhandled content type #4283c7 unhandled content type #4283c7 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type qinq message analysis qinq message analysis qinq message parsing is not enabled during traffic forwarding , the message will only be parsed up to qinq after qinq message parsing is enabled, the traffic will continue to be parsed and can match the five tuple information of the message table 6 qinq message analysis table 6 qinq message analysis true 207,177 22392167810247,276 77607832189756#4283c7 unhandled content type #4283c7 unhandled content type #4283c7 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type unhandled content type unhandled content type unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type #d8e5f5 unhandled content type
