S5300V1R5C03 Product Description PDF
S5300V1R5C03 Product Description PDF
S5300V1R5C03 Product Description PDF
V100R005C03
Product Description
Issue 01
Date 2010-10-21
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees or
representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute the warranty of any kind, express or implied.
Website: http://www.huawei.com
Email: support@huawei.com
Intended Audience
This document describes the positioning, characteristics, architecture, link features, service
features, application scenarios, operation and maintenance functions, and technical
specifications of the Ethernet Switches .
This document helps you understand the characteristics and features of the Ethernet
Switches .
This document is intended for:
Network planning engineers
Hardware installation engineers
Commissioning engineers
Data configuration engineers
On-site maintenance engineers
Network monitoring engineers
System maintenance engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Indicates a hazard with a high level of risk, which if not
avoided, will result in death or serious injuries.
Symbol Description
Provides additional information to emphasize or
supplement important points of the main text.
Command Conventions
Convention Description
Update History
Updates between document issues are cumulative. Therefore, the latest document version
contains all updates made to previous versions.
Contents
Figures
Figure 2-15 Logical structure of hardware modules of the S5300 ..................................................................... 2-7
Figure 4-1 Connections at the access layer ...................................................................................................... 4-10
Figure 5-2 Application of the S5300 in a layered RRPP ring ............................................................................. 5-3
Figure 5-3 VLAN mapping networking ............................................................................................................. 5-4
Tables
Table 7-3 Attributes of the ESFP (CWDM) optical module ............................................................................... 7-4
Table 7-4 Attributes of XFP optical module (10GE) .......................................................................................... 7-4
Table 7-5 Attributes of the SFP+ (10GE) optical module ................................................................................... 7-5
The S5300 supports the Huawei Group Management Protocol (HGMP). Through HGMP, an
S5300 can manage multiple Layer 2 switches by automatically collecting topology
information and using a uniform management channel.
2 Product Architecture
2.1 Introduction
The S5300 series adopt the integrated hardware platform and have the front-access structure.
The hardware consists of the 19-inch rack mountable chassis, power supply, fan, SCU, and
interface card for upstream services. The width of the S5300 complies with the industry
standards, and the S5300 can be installed in an IEC 297 cabinet or an ETSI cabinet. The
S5300 is always sold with all the cables and accessories needed to its installation on a 19-inch
cabinet.
The S5300 series include the S5300C and S5300TP. The S5300C switches include S5328C-EI,
S5328C-EI-24S, S5352C-EI, S5328C-PWR-EI, S5352C-PWR-EI, S5328C-SI, S5352C-SI,
S5328C-PWR-SI, and S5352C-PWR-SI. The S5300TP switches include S5324TP-SI,
S5348TP-SI, S5324TP-PWR-SI, and S5348TP-PWR-SI.
The chassis of the S5328C-EI-24S is 1 U (1 U = 44.45 mm) high and its dimensions are 442.0
mm x 420.0 mm x 43.6 mm (width x depth x height).
The two power supplies are on the left-rear side of the chassis, and the fan is at the
middle-rear of the chassis.
The S5328C-EI-24S uses either an AC power supply or a DC power supply.
The SCU provides one console port, one MEth port, 24 100/1000BASE-X optical ports,
four 10/100/1000BASE-T combo ports (multiplexed with the last four 100/1000BASE-X
ports), a front card slot, and a rear card slot.
The front card slot supports the 2-port 10GE XFP optical interface card, 4-port GE SFP
optical interface card, 2-port 10GE SFP+ optical interface card, and 4-port 10GE SFP+
optical interface card. The rear card slot supports the extend channel card and stack card.
The chassis of the S5328C-EI and S5328C-PWR-EI is 1 U high and its dimensions are 442.0
mm x 420.0 mm x 43.6 mm (width x depth x height).
The two power supplies are on the left-rear side of the chassis, and the fan is at the
middle-rear of the chassis.
The S5328C-EI uses either an AC power supply or a DC power supply.
The S5328C-PWR-EI uses the AC power supply.
The 24 downlink electrical ports of the S5328C-PWR-EI support PoE power supply.
Each port provides a maximum of 30 W power. The PoE power supply complies with the
IEEE 802.3at. The S5328C-PWR-EI can provide the maximum power for at most 12
ports.
The SCU provides one console port, one MEth port, twenty-four 10/100/1000BASE-T
ports, one front card slot, and one rear card slot.
The front card slot supports the 2-port 10GE XFP optical interface card, 4-port GE SFP
optical interface card, and 4-port 10GE SFP+ optical interface card. The S5328C-EI
supports the 4-port 10GE SFP+ optical interface card in addition to the preceding
interface cards. The rear card slot supports the extend channel card and stack card.
The chassis of the S5328C-SI or S5328C-PWR-SI is 1 U high and its dimensions are 442.0
mm x 420.0 mm x 43.6 mm (width x depth x height).
The two power supplies are on the left-rear side of the chassis, and the fan is at the
middle-rear of the chassis.
The S5328C-SI uses either an AC power supply or a DC power supply.
The S5328C-PWR-SI uses the AC power supply.
The 24 downlink electrical ports of the S5328C-PWR-SI support PoE power supply.
Each port provides a maximum of 30 W power. The PoE power supply complies with the
IEEE 802.3at. The S5328C-PWR-SI can provide the maximum power for at most 12
ports.
The SCU provides one console port, one MEth port, twenty-four 10/100/1000BASE-T
ports, four 100/1000BASE-X combo ports (multiplexed with the last four
10/100/1000BASE-T ports), one front card slot, and one rear card slot.
The front card slot supports the 2-port 10GE XFP optical interface card, 4-port GE SFP
optical interface card, 2-port 10GE SFP+ optical interface card, and 4-port 10GE SFP+
optical interface card. The rear card slot supports the extend channel card and stack card.
The chassis of the S5352C-EI or S5352C-PWR-EI is 1 U high and its dimensions are 442.0
mm x 420.0 mm x 43.6 mm (width x depth x height).
The two power supplies are on the left-rear side of the chassis, and the fan is at the
middle-rear of the chassis.
The S5352C-EI uses either an AC power supply or a DC power supply.
The S5352C-PWR-EI uses the AC power supply.
The 48 downlink electrical ports of the S5352C-PWR-EI support PoE power supply.
Each port provides a maximum of 30 W power. The PoE power supply complies with the
IEEE 802.3at. The S5352C-PWR-EI can provide the maximum port for at most 24 ports.
The SCU provides one console port, one MEth port, fourty-eight 10/100/1000BASE-T
ports, one front card slot, and one rear card slot.
The front card slot supports the 2-port 10GE XFP optical interface card, 4-port GE SFP
optical interface card, and 4-port 10GE SFP+ optical interface card. The rear card slot
supports the extend channel card and stack card.
The chassis of the S5352C-SI or S5352C-PWR-SI is 1 U high and its dimensions are 442.0
mm x 420.0 mm x 43.6 mm (width x depth x height).
The two power supplies are on the left-rear side of the chassis, and the fan is at the
middle-rear of the chassis.
The S5352C-SI uses either an AC power supply or a DC power supply.
The S5352C-PWR-SI uses the AC power supply.
The 48 downlink electrical ports of the S5352C-PWR-SI support PoE power supply.
Each port provides a maximum of 30 W power. The PoE power supply complies with the
IEEE 802.3at. The S5352C-PWR-SI can provide the maximum power for at most 24
ports.
The SCU provides one console port, one MEth port, fourty-eight 10/100/1000BASE-T
ports, one USB port, one front card slot, and one rear card slot.
The front card slot supports the 2-port 10GE XFP optical interface card, 4-port GE SFP
optical interface card, 2-port 10GE SFP+ optical interface card, and 4-port 10GE SFP+
optical interface card. The rear card slot supports the extend channel card and stack card.
The chassis of the S5324TP-SI is 1 U high and its dimensions are 442.0 mm x 220.0 mm x
43.6 mm (width x depth x height).
The S5324TP-SI uses an AC power supply or a DC power supply. It also supports the
RPS DC power supply.
The SCU provides one console port, one MEth port, twenty-four 10/100/1000BASE-T
ports, four 100/1000BASE-X combo ports (multiplexed with the last four
10/100/1000BASE-T ports), and one USB port.
The chassis of the S5348TP-SI is 1 U high and its dimensions are 442.0 mm x 420.0 mm x
43.6 mm (width x depth x height).
Double power supplies are at the left-rear side of the chassis; the fan is at the middle-rear of
the chassis; the RPS DC power supply is at the right-rear side of the chassis.
The S5348TP-SI uses an AC power supply or a DC power supply. It also supports the
RPS DC power supply.
The SCU provides one console port, one MEth port, forty-eight 10/100/1000BASE-T
ports, four 100/1000BASE-X combo ports (multiplexed with the last four
10/100/1000BASE-T ports), and one USB port.
The chassis of the S5324TP-PWR-SI is 1 U high and its dimensions are 442.0 mm x 420.0
mm x 43.6 mm (width x depth x height).
The two power supplies are on the left-rear side of the chassis, and the fan is at the
middle-rear of the chassis.
The S5324TP-PWR-SI uses the AC power supply.
The 24 downlink electrical ports of the S5324TP-PWR-SI support PoE power supply.
Each port provides a maximum of 30 W power. The PoE power supply complies with the
IEEE 802.3at. The S5324TP-PWR-SI can provide the maximum power for at most 12
ports.
The SCU provides one console port, one MEth port, twenty-four 10/100/1000BASE-T
ports, four 100/1000BASE-X combo ports (multiplexed with the last four
10/100/1000BASE-T ports), and one USB port.
The chassis of the S5348TP-PWR-SI is 1 U high and its dimensions are 442.0 mm x 420.0
mm x 43.6 mm (width x depth x height).
The two power supplies are on the left-rear side of the chassis, and the fan is at the
middle-rear of the chassis.
The S5348TP-PWR-SI uses the AC power supply.
The 48 downlink electrical ports of the S5348TP-PWR-SI support PoE power supply.
Each port provides a maximum of 30 W power. The PoE power supply complies with the
IEEE 802.3at. The S5348TP-PWR-SI can provide the maximum power for at most 12
ports.
The SCU provides one console port, one MEth port, forty-eight 10/100/1000BASE-T
ports, four 100/1000BASE-X combo ports (multiplexed with the last four
10/100/1000BASE-T ports), and one USB port.
SCU
Control
Fiber/Cable
unit
Port ……
module
Switch
unit
Power
supply
Hardware modules of the S5300 refer to the interface card, SCU, power supply, and fan.
2.3.1 SCU
2.3.2 Power Supply
2.3.3 Fan
2.3.4 Interface Card
2.3.1 SCU
The SCU is fixed on the S5300. Each S5300has one SCU.
The SCU is responsible for packet switching and device management. It integrates multiple
functional modules, namely, the main control module, switching module, and interface
module.
Functioning as an agent of the user to manage the system and monitor the system
performance according to instructions of the user, and report the running status of the
device to the user
Monitoring and maintaining the interface module and switching module on the SCU.
Switching Module
The switching module, also called the switching fabric, is responsible for packet exchange,
multicast replication, QoS scheduling, and access control on the interface module of the SCU.
The switching module adopts high performance ASIC chips to implement line-speed
forwarding and fast switching of data with different priorities.
Interface Module
The interface module provides Ethernet interfaces for accessing Ethernet services.
2.3.3 Fan
The fans forcibly cool the system.
The S5324TP-PWR-SI, S5348TP-PWR-SI, S5328C-SI, S5352C-SI, S5328C-PWR-SI,
S5352C-PWR-SI, S5328C-PWR-EI, S5352C-PWR-EI, S5328C-EI, S5352C-EI, and
S5328C-EI-24S support the hot pluggable fans. The fans can be replaced on site and
maintained in service.
This plane provides task and memory management, timer, software loading and patching
on the basis of the operating system. In addition, it enhances modular technology to
facilitate system upgrade and customization.
General control plane
This plane is the core of the VRP data communication platform, providing link
management, IP protocol stack, and routing protocol processing, and implementing the
security and QoS functions. It is used to control the data forwarding plane and
implement functions of the device.
Data forwarding plane
This plane forwards data under the control of the general control plane. The VRPv5
supports data forwarding based on software and hardware.
Service control plane
This plane controls and manages services based on users or interfaces. It implements the
authentication, authorization, and accounting for users through DHCP Option 82 and
implements authentication for access interfaces through IEEE 802.1x.
System management plane
This plane provides a graphic user interface and manages the input and output
information for network management and maintenance.
3 Link Features
3.1.3 VLAN
A local area network (LAN) can be divided into several logical LANs. Each logical LAN is a
broadcast domain, which is called a virtual LAN (VLAN). To put it simply, devices on a LAN
are logically grouped into different LAN segments, irrespective of their physical locations. In
this manner, VLANs isolate broadcast domains on a LAN.
Based on IP subnets
VLAN members are defined according to the source IP addresses and the subnet masks
of packets. When an interface of the S5300 receives a packet, the S5300 determines the
VLAN ID of the packet according to the source IP address of the packet and sends the
packet on the corresponding VLAN.
Based on policies
VLAN members are defined according to the MAC+IP or MAC+IP+port binding policy.
When an interface of the S5300 receives a packet, the S5300 determines the VLAN ID
of the packet according to the binding policy and sends the packet on the corresponding
VLAN.
VLAN Aggregation
To implement communication between VLANs on the S5300, you need to configure VLANIF
interfaces and assign an IP address to each VLANIF interfaces. Therefore, this wastes IP
addresses when there are many VLANs. VLAN aggregation can solve this problem.
VLAN aggregation means that multiple VLANs are aggregated into a super-VLAN. The
VLANs that form the super-VLAN is called sub-VLANs.
MUX VLAN
The MUX VLAN function is used to isolate Layer 2 traffic between the interfaces of a VLAN.
For example, on an intranet, a user interface can communicate with a server interface, but the
user interfaces cannot communicate with each other.
This function involves a MUX VLAN and several subordinate VLANs. Subordinate VLANs
are classified into subordinate group VLANs and subordinate separate VLANs. Ports on
subordinate VLANs can communicate with ports on the MUX VLAN. Ports on a subordinate
group VLAN can communicate with each other but cannot communicate with ports on other
subordinate group VLANs. Ports on a subordinate separate VLAN cannot communicate with
each other.
Voice VLAN
A voice VLAN is used to transmit voice data flows. You can create a voice VLAN and add the
interface connected to the voice device to the voice VLAN. Then voice data flows can be
transmitted on the voice VLAN.
You can apply special QoS configuration to the voice data packets transmitted on the voice
VLAN so that voice data packets are transmitted with high priority. The quality of the voice
service is ensured.
VLAN Mapping
VLAN mapping means that the S5300 replaces the outer VLAN tags of data frames to the
specified VLAN tags according to the preset VLAN mapping table so that services are
transmitted according to the network planning of the carrier.
The S5300 supports the mapping from one or more customer VLAN IDs (C-VLANs) to a
service VLAN ID (S-VLAN).
C-VLAN is the VLAN that a user-side interface belongs to. It identifies a user or a type of users.
An S-VLAN is a VLAN defined on the public network by the carrier. The S-VLAN ID identifies a
service.
VLAN Switching
VLAN switching is a forwarding technology based on VLAN tags. A static forwarding path
must be configured on switching nodes on a network to implement VLAN switching. After
receiving packets from certain VLANs, a switch forwards them to corresponding interfaces
according to the VLAN switching table without searching the MAC address table. This
improves the forwarding efficiency and security, and prevents MAC address attacks and
broadcast storms.
The S5300 implements the following functions through VLAN switching:
Adding an outer VLAN tag to packets (stack-vlan)
Translating VLAN tags between interfaces (switch-vlan)
3.1.4 QinQ
The 802.1Q-in-802.1Q (QinQ) protocol is a Layer 2 tunneling protocol based on the IEEE
802.1Q. A frame transmitted on the public network has double 802.1Q tags. One tag identifies
the public network and the other identifies the private network.
Usually, carriers define VLANs on the public network, and users define VLANs on their own
private networks. Therefore, different private networks may use the same VLAN ID. Through
the QinQ function, the S5300 adds public VLAN tags to the packets from private networks.
Then the private VLAN tag becomes the inner VLAN tag. In this way, packets from user
networks are transmitted transparently on the public network, and thus user networks are
separated from the public network.
Currently, the S5300 supports basic QinQ and selective QinQ.
Basic QinQ
Basic QinQ is implemented based on interfaces. All the frames that reach the public
network through an interface are tagged with the same public VLAN ID.
Selective QinQ
Selective QinQ extends the basic QinQ function. It enables an interface to determine the
outer VLAN tag according to the private VLAN tag so that packets from different private
networks are transmitted through different paths. Thus different services can be
identified and service deployment is easier. For example, voice data packets from
different VLANs are tagged with the same outer tag to obtain the same QoS level;
common data services are tagged with another VLAN tag to obtain different QoS level.
3.2 STP/RSTP/MSTP
3.2.1 STP and RSTP
3.2.2 MSTP
3.2.3 MSTP Protection
3.2.4 Partitioned STP and BPDU Tunnel
3.2.2 MSTP
The Multiple Spanning Tree Protocol (MSTP) is developed based on STP and RSTP. MSTP
divides a network into multiple regions. Based on VLAN tags, each region has several
spanning trees that are independent of each other. As a result, the entire network is trimmed to
a tree topology that is free from loops. Broadcast storms are thus prevented on the network.
MSTP associates VLANs with spanning trees so that packets of different VLANs are
transmitted along different spanning trees. This speeds up network convergence and
implements load balancing.
Different from STP and RSTP, MSTP provides multiple backup links to implement load
balancing among VLANs.
Root Protection
The S5300 provides root protection when MSTP is enabled. It retains the role of the root
switch by maintaining the role of the designated port as follows:
When the designated port enabled with root protection receives a BPDU of higher priority, the
port does not change to a non-designated port. Instead, it turns to the Listening state and stops
forwarding packets. If the port does not receive protocol BPDUs of higher priority for a long
time, it restores the Forwarding state. This prevents network flapping.
Loop Protection
After loop protection is enabled on the S5300, it sets the root port to the Blocking state if the
root port does not receive protocol BPDUs from the upstream device. If the port receives
protocol BPDUs again, it becomes the root port and changes to the Forwarding state. If no
protocol BPDU is received, the port remains in the Blocking state and does not forward
packets. In this way, loops are prevented on the network.
BPDU Tunnel
On a partitioned STP network, the S5300 considers the tagged BPDUs as common Layer 2
frames. That is, the S5300 forwards the BPDUs within the VLAN to which the tag belongs
rather than sending them to the MSTP module. After the BPDU tunnel is configured, the
devices on the MAN do not participate in the topology calculation of the partitioned STP
network. Thus, the convergence speed of the network is improved.
To implement the BPDU tunnel function, the access device at the edge of the MAN must be
configured with MSTP Snooping. If the forwarding path is changed because of the topology
change on the partitioned STP network, the device can detect the topology change, and then
notify other devices on the network of the topology change. In this way, the packets are
forwarded according to the new topology.
3.3 RRPP
The Rapid Ring Protection Protocol (RRPP) is a link layer protocol applied to the Ethernet
ring. It can prevent the broadcast storm caused by the loops in the Ethernet ring. The topology
convergence speed on the network running RRPP is much faster than that on the network
running other protocols such as STP. This is because the RRPP packets are forwarded through
hardware.
In addition, the RRPP ring supports link bundle, which is widely used on the high-bandwidth
ring networks.
3.3.1 RRPP Ring Network Composition
3.3.2 How Does RRPP Work
3.3.3 Various Topologies
The protocol packets on a subring are transmitted through the channel between the two
interfaces connecting the primary ring and the subring. The primary ring can be considered as
a node on the subring. This networking is applicable to the convergence of a dual-homing
network. Through this networking, the upstream links are backed up.
3.5 SEP
The Smart Ethernet Protection (SEP) protocol is a ring network protocol applied to the link
layer of an Ethernet network. The SEP protocol works on the basis of SEP segments. An SEP
segment consists of a group of switching devices that are configured with the same SEP
segment ID and control VLAN ID.
Most metropolitan area networks (MANs) and enterprise intranets adopt the ring networking
to ensure high reliability. The services, however, are affected if any node on the ring fails.
Generally, a ring network adopts the Resilient Packet Ring (RPR) or Ethernet ring technology.
The costs of the RPR technology are high because it requires special hardware components.
The Ethernet ring is improved and its costs are low; therefore, more and more MANs and
enterprise intranets adopt the Ethernet ring.
Huawei originates the SEP protocol, which achieves the protective switchover on the open
ring and closed ring and displays the uncertain blocked points or ring network topology.
Compared with other Ethernet ring technologies, SEP has the following advantages:
It can run on a network together with STP, RSTP, MSTP, and RRPP.
4 Service Features
TCP/IP protocol stack, including ICMP, IP, TCP, UDP, socket (TCP/UDP/Raw IP), and
ARP
Static DNS and specified DNS server
FTP server/client, TFTP client, and SSH
Ping, tracert, and Network Quality Analysis (NQA): NQA can detect the status of ICMP,
TCP, UDP, DHCP, FTP, HTTP and SNMP services and test the response time of various
services
DHCP Server, DHCP-Relay, DHCP Client, and DHCP Snooping
BFD, including BFD for OSPF, BFD for ISIS, BFD for BGP, and BFD for PIM
4.2 IPv6
The S5300 provides the IPv6 host function, which protects the investment of customers and
prevents repeat investment during network upgrade.
4.4 Multicast
The Internet Group Management Protocol (IGMP) is a protocol used to manage IP multicast
members in the TCP/IP suite. It sets up and maintains the member relationship between IP
hosts and their directly connected multicast routers.
4.4.1 IGMP Snooping
4.4.2 IGMP Proxy
4.4.3 Prompt Leave of Multicast Member Interfaces
4.4.4 Multicast Traffic Control
4.4.5 Inter-VLAN Multicast Replication
4.4.6 Controllable Multicast
4.5 QoS
The S5300 provides the class-based QoS mechanism and supports the 802.1p priority. It
provides guarantee of low end-to-end delay, jitter, and high bandwidth.
The S5300 classifies traffic according to certain rules and then performs corresponding
actions on the packets such as priority re-marking, traffic policing, congestion management,
congestion avoidance, and rate limit on the interface. In this way, value-added services such
as NGN services, IPTV, and broadband access are provided with better network service.
4.5.1 Traffic Classification
4.5.2 Access Control and Re-marking
4.5.3 Traffic Policing
4.5.4 Congestion Management
4.5.5 Congestion Avoidance
4.5.6 Rate Limit on an Interface
4.5.7 Two-Rate-Three-Color
4.5.8 Aggregate CAR
4.5.7 Two-Rate-Three-Color
The S5300 controls traffic according to the result of traffic classification and discards the
excessive packets. The S5300 supports two-rate-three-color. You can set the following
parameters on the S5300:
Committed Information Rate (CIR), which is the allowed rate at which traffic can pass
through
Committed Burst Size (CBS), which is the maximum size of traffic that can pass through
Peak Information Rate (PIR), which is the peak rate at which traffic can pass through
Peak Burst Size (PBS), which is the peak size of traffic that can pass through
In addition, the S5300 can mark packets red, green, or yellow according to traffic volume, and
map behaviors to the colors, such as forwarding or discarding the packets. The S5300 can also
re-mark packets.
4.6 Security
The S5300 guarantees both device security and service security.
4.6.1 Device Security
4.6.2 Service Security
4.6.3 Security Authentication
AAA
The S5300 supports the Authentication, Authorization, and Accounting (AAA). Using AAA
and hierarchical command protection, the S5300 can authenticate and authorize login users. In
addition, it can authenticate the NMS administrator. AAA effectively prevents unauthorized
users from logging in to the S5300.
The S5300 supports authentication methods such as local authentication, RADIUS
authentication, and HWTACAS+ authentication.
Port Isolation
Port isolation prevents ports on the same S5300 from sending Layer 2 packets to each other.
The S5300 supports unidirectional and bidirectional port isolation. Port isolation ensures
security of user networks and helps to construct low-cost intelligent community networks.
Port isolation also limits unnecessary broadcast packets and thus increases network
throughput.
Packet Filtering
Packet filtering is used to filter out invalid or unwanted packets.
The S5300 filters packets based on user-defined rules. For example, it filters packets by
checking the MAC address, IP address, port number, and VLAN ID of packets. Packet
filtering does not check the session status or analyze the data. By filtering packets, the S5300
can effectively control the packets passing through it.
Customer
Access Aggregation Access Subscriber
Premises
Routers Network Nodes Lines
Networks
AR
AN
AN
AN
AR
4.8 DHCP
DHCP Client and DHCP Server
DHCP adopts the client/server mode, that is, the DHCP client sends request messages to the
DHCP server. Then, the DHCP server returns the configuration according to the policy.
The DHCP server assigns an IP address to the client by using an address pool. When the client
sends a DHCP request to the server, the DHCP server selects a proper address pool based on a
certain algorithm, finds an idle IP address from the pool, and delivers the IP address along
with other related parameters, such as the DNS address and the address lease, to the client.
To dynamically allocate IP addresses to clients, you need to first configure the address pool
range on the DHCP server. Currently, an address pool can be configured with only one
address range and the address range is determined by the mask length.
DHCP Snooping
The S5300 can be deployed between the DHCP server and the DHCP client and it monitors
the DHCP messages between the DHCP server and the DHCP client. The S5300 creates the
IP+MAC+port binding table according to the monitoring result to filter out invalid packets.
The S5300 can also append the Option 82 field to DHCP messages or remove the Option 82
field.
After receiving a Request message from the DHCP client, the S5300 appends the Option
82 field to the Request message. The DHCP server enforces the IP address allocation
policy according to the Option 82 field.
The DHCP server appends the Option 82 field to a Response message. The S5300
analyzes the Option 82 field, determines a forwarding interface, removes the Option 82
field, and then forwards the message to a user.
The Option 82 field contains the user circuit IDs. This can effectively prevent attackers from
modifying the DHCP messages.
DHCP Relay
The DHCP client and the DHCP server send broadcast packets during the allocation of IP
addresses. Therefore, DHCP can be applied only when the DHCP client and DHCP server are
in the same subnet. It is a waste of money to deploy a DHCP server in each network segment.
The DHCP relay is introduced to solve this problem. Through DHCP relay, a DHCP client in a
subnet can communicate with the DHCP server in another subnet and finally obtains an IP
address. In this manner, the DHCP clients on different network segments can use the same
DHCP server. This reduces costs and achieves centralized management.
4.9 Network-Level HA
4.9.1 MSTP Protective Switchover
4.9.2 RRPP Rapid Protective Switchover
4.9.3 Smart Link Dual-Homing Protection
4.9.4 Ethernet OAM
The S5300 provides the root protection function. To retain the role of the root device, you
need to set the role of a designated interface to remain unchanged when the interface receives
a BPDU with higher priority. This prevents incorrect change of the network topology.
The S5300 provides the loop protection function. If the root interface cannot receive any
BPDU from the upstream device, the root interface enters the blocking state and stops
forwarding packets. At the same time, no new root interface is elected. This prevents loops on
the network.
4.10 LLDP
The S5300 supports the Link Layer Discovery Protocol (LLDP) that conforms to IEEE
802.1ab. LLDP is a link layer protocol used for interconnected devices to obtain the
connection information of each other.
Using LLDP, the local NMS can obtain the link layer information of all devices on the local
network and details about the network topology. Thus the NMS can manage a larger area on
the network.
The LLDP-enabled interfaces on the S5300 periodically notify the neighbors of its own status.
If the status of an interface changes, the interface sends status update messages to the directly
connected neighboring device. The neighboring device stores the status update message in the
standard SNMP MIB. Then the NMS can obtain the link layer information of the network
from the MIB to calculate the topology of the entire network.
4.11 NQA
With the development of value-added services, users and carriers demand increasingly high
QoS. After voice over IP and video over IP services are launched, carriers and users all tend to
sign Service Level Agreements (SLAs). To show whether the committed bandwidth meets
users' requirement, network carriers need to know the network performance in time according
to statistical parameters such as the delay, jitter, and packet loss ratio on network devices.
The S5300 supports Network Quality Analysis (NQA). NQA tests the performance of
different protocols running on a network so that carriers can collect the network performance
indexes of networks in real time, such as the total delay of the Hypertext Transfer Protocol
(HTTP) service, delay in the Transmission Control Protocol (TCP) connection, file
transmission speed, and delay in File Transfer Protocol (FTP) connection. By controlling
these indexes, carriers can provide network services of different levels and charge services
differently. NQA is also an effective tool for diagnosing and locating faults on a network.
The command switch functions as the proxy of the external network management station
or server to manage the member switches of a cluster. It has a public IP address and can
manage other switches.
In actual application, the S5300 usually functions as a command switch to manage a large
number of member switches on a residential network in a centralized manner.
Automatically detects new remote devices and adds them to the cluster.
Collects and maintains the network topology information from the member switches in
the cluster.
Provides methods of batch configurations and upgrade for member switches in the
cluster.
HGMP saves IP addresses by managing devices in a cluster.
4.13 Stacking
Stacking means that the switches located in the same place are connected through the stacking
cable or high-speed uplink interfaces, and thus the switches form a reliable switch group. In a
switch group, the S5300s are connected through the stack interfaces. Through stacking, the
user can manage and maintain the switches uniformly; therefore, the stacking reduces the
maintenance cost of the user.
The stacked switches have three roles:
Master switch
The master switch functions as the proxy of the external network management station or
server to manage the member switches of a cluster. It has a public IP address and can
manage other switches.
Backup switch
As the backup of the master switch, the backup switch becomes the master if the master
switch is faulty and takes over the work of the master switch.
Member switch
A member switch only processes service traffic on the network and is managed by the
master switch.
Router
IP/MPLS Core
BRAS BRAS
SwitchA
SwitchB
SwitchC
RRPP
RRPP SwitchD
LANSwitch DSLAM
SwitchE
AMG
Intranet Intranet
Router
IP/MPLS
BRAS BRAS
Core
SwitchA SwitchB
SwitchC
SwitchF
RRPP
RRPP
SwitchK SwitchE SwitchD RRPP SwitchG
RRPP
RRPP Intranet
RRPP
SOHO SwitchH
SwitchJ
Intranet
Residental Commerical
area center
SwitchH, switchG, switchJ, and switchK function as the UPEs, and switchA and switchB
function as the PE-AGGs. The switches form an RRPP Ethernet ring .
A metro Ethernet set up by the S5300s supports multiple RRPP domains. Each RRPP domain
supports a primary ring and multiple subrings, forming a two-layer RRPP ring network. One
layer is the convergence layer and the other is the access layer. The two layers can be either
tangent or intersecting.
The RRPP ring carries the leased line service of enterprises and broadband access services.
The links on the RRPP ring can be bound through GE interfaces to meet the demand for high
bandwidth. The RRPP ring also provides rapid protective switchover of services.
Video
TMG server
PSTN Router I n t e rnet
Access
BRAS convergence BRAS
ISP network network
VLAN1-1000 V50 V350 V850
Switch
User network
VLAN101-500 LAN Switch
AMG
VLAN401-600 DSLAM
VLAN401-700
Intranet
After VLAN mapping is configured, ISPs need to manage only VLAN tags on the MAN, and
different user networks can use same VLAN tags. The S5300 aggregates traffic from user
networks to the ISP network and implements VLAN mapping between user networks and the
ISP network. VLAN mapping implements communication between VLANs and facilitates
service deployment.
When the S5300 receives service packets sent from a user network to the ISP network, it
replaces the C-VLAN tag of the packets with the S-VLAN tag specified by the ISP. For
example:
Replaces C-VLAN 450 of Small Office/Home Office (SOHO) with S-VLAN 850.
Replaces C-VLAN 450 of the residential community with S-VLAN 50.
Replaces C-VLAN 450 of an enterprise intranet with S-VLAN 350.
When receiving service packets sent from the ISP network to an enterprise intranet, the S5300
replaces the S-VLAN tag with the C-VLAN tag of the enterprise intranet.
Video
TMG server
PSTN I n t ernet
Router
BRAS BRAS
With the selective QinQ function, the S5300 can aggregate services and choose different paths
for various services. This achieves the flexible deployment of services.
The three enterprise intranets need to transmit data, voice, and video services. The S5300 adds
another VLAN tag to the tagged packets based on the type of access services, for example:
Add S-VLAN tag VLAN 10 to the data service packets from the user network tagged by
VLAN 100, VLAN 600, or VLAN 800.
Add S-VLAN tag VLAN 30 to the video service packets from the user network tagged
by VLAN 450, VLAN 650, or VLAN 850.
Video
NSM
server
IP/MPLS
Core Router
SwitchB SwitchA
Access
convergence
network
SwitchC
RRPP DSLAM
SwitchD
DSLAM STB
DSLAM
STB BTV
STB
BTV BTV
Video stream
SwitchC and SwitchD function as UPEs and provide the IGMP snooping function. They can
serve as the replication and control point for multicast services at the access layer of the MAN
to meet the demand for large-capacity multicast services. The DSLAM provides the IGMP
proxy function to control the user access to multicast services based on the user authority
configured on the NSM.
SwitchB, SwitchC, and SwitchD form an RRPP Ethernet ring to ensure high quality of the
Broadband Television (BTV) service. The RRPP ring has the following advantages:
The RRPP ring improves availability of the BTV service through the rapid protective
switchover mechanism.
Only one copy of multicast packets needs to be transmitted on the RRPP ring, which
saves bandwidth.
In addition, SwitchA, SwitchB, SwitchC, and SwitchD allow interfaces to join or leave
multicast groups quickly, which implements fast switching of services.
IP/MPLS core
BRAS
SwitchA
SwitchB
SwitchC
RRPP
SwitchD
RRPP SwitchE
DSLAM
LAN Switch
AMG
SwitchF
STB
Intranet
BTV
SOHO Phone
upstream
downstream
SwitchC, switchD, switchE, and switchF function as the UPEs, and switchA and switchB
function as UPE or PE-AGG. The UPE or PE-AGG provides end-to-end QoS guarantee for
the services on the LAN switch and DSLAM.
At the ingress of the access and convergence layer, the S5300 classifies data, voice, and
video services. The S5300 then polices traffic and re-marks the precedence of packets.
The RRPP nodes, including the across-ring nodes, schedule the queues. At the copy node,
the S5300 restores the RRPP level to the 802.1p priority.
At the egress of the access and convergence layer, the S5300 performs queue scheduling
and rate limit.
By mapping 802.1p priorities to different packets, the S5300 provides end-to QoS guarantee
for the entire network.
Residential area A
Access SwitchH Intranet D
SwitchE convergence
network
SwitchA
IP/MPLS Router SwitchD
Router core SwitchB
SwitchC
SwitchJ SwitchF
Intranet C
Residential area B
As shown in the figure, enterprise intranets C and D, and residential communities A and B are
all connected to a MAN. SwitchA, SwitchB, SwitchC, and SwitchD function as UPEs and
connect to the enterprise intranets and residential communities directly. The UPEs are dual
homed to SwitchE, SwitchF, SwitchH, and SwitchJ to improve link reliability.
Each UPE is dual homed to the MAN and forms a partitioned STP network with two
PE-AGGs. For example, SwitchA, SwitchE, and SwitchJ form a partitioned STP
network.
SwitchC and SwitchD at the egress of the intranets are on the same VLAN with SwitchE,
SwitchF, SwitchH, and SwitchJ. BPDUs of intranet C and intranet D are transmitted
transparently on this VLAN.
SwitchA and SwitchB at the ingress of the residential communities are on the same
VLAN with SwitchE, SwitchF, SwitchH, and SwitchJ. BPDUs of community A and
community B are transmitted transparently on this VLAN.
SwitchE, SwitchF, SwitchH, and SwitchJ on the MAN support BPDU tunneling and
MSTP snooping.
The partitioned STP technology enables BPDUs of a user network to be transmitted
transparently on the ISP network so that the user network can calculate a uniform spanning
tree. In this way, users on the same network can communicate with each other even though
they are in different geographical locations. In addition, the user network and ISP network use
independent spanning trees.
NSM
IP/MPLS core
SwitchA
SwitchB SwitchC
STP/RRPP AMG
SwitchD
Phone
DSLAM
SOHO Intranet Commercial
center
Residential
area
Building Building
corridor Residential corridor
area
As shown in the figure, the network is divided into three HGMP domains, which are managed
by SwitchB, SwitchC, and SwitchD respectively. SwitchB, SwitchC, and SwitchD collect and
maintain information about Layer 2 switches in each domain and manage and maintain Layer
2 switches uniformly.
Cluster management enables the network administrator to manage a large number of scattered
Layer 2 switches conveniently and implements fast deployment of Layer 2 switches. In
addition, cluster management saves IP addresses and reduces the OPEX.
Login Modes
The S5300 provides a console port. A user can connect to the console port through the serial
port on a console terminal, and then configure the S5300 locally or remotely.
In addition, the user can telnet to the service interface of the S5300 for configuration and
management.
The S5300 supports multiple authentication modes, including non-authentication, local
authentication, and AAA.
Debugging
The S5300 provides various debugging commands for each software feature. Each debugging
command supports multiple parameters and can be flexibly controlled. The debugging
commands display the detailed information about processes, packet receiving and sending,
and error check during the running of a feature.
Black Box
The S5300 provides the black box function to record information on the feature modules,
tasks, and events. In addition, the black box records the final results, process status, and
function calling track to facilitate fault location.
VCT
A user can run the VCT commands on the switch. According to Time Domain Reflectometry
(TDR) theory, an interface can receive the reflected signal after transmitting the test signal.
Then the user can know the cable status according to the characteristics of the reflected signal.
Mirroring
The S5300 supports interface- or flow-based mirroring.
Port mirroring
The incoming traffic, outgoing traffic, or both incoming and outgoing traffic at an
observed interface is completely copied to an observing interface.
Flow mirroring
The traffic at an observed interface is completely copied to an observing interface.
By connecting a monitoring host to an observing interface on the S5300, a network
administrator can easily observe the packets that pass through the S5300 in real time. The
mirroring result serves as a basis for traffic detection, fault location, and data analysis.
In-Service Patching
The S5300 supports in-service patching to protect services from being affected when a patch
is installed. The software can be restored to the earlier version, and the device data before and
after in-service patching is recorded.
Inband Management
In inband management mode, the network management information is transmitted through the
service channel of the S5300, and no additional communications network is required between
the NMS and the S5300. The network administrator simply needs to connect the NMS to the
adjacent network devices and set the SNMP parameters.
The inband management mode features flexible networking and does not rely on geographical
locations. In addition, it guarantees the channel security better than the outbound management
mode. However, the network management information consumes bandwidth of the service
channel. And if the service channel fails, the NMS cannot manage the S5300 remotely.
Outband Management
In outbound management mode, an independent network needs to be set up between the
S5300 and the NMS so that the network management information is separated from the
service information.
This mode ensures reliable transmission of the network management information and the
NMS can still manage the S5300 when the service channel fails. However, the independent
NMS network is limited by geographical locations.
6.2.2 U2000
The U2000 can display the software version, and save and restore configuration files and VRP
mapping programs. The U2000 also supports in-service patching for the S5300 through CLI.
The U2000 provides the following functions.
Resource Management
The U2000 provides resource management to help you easily manage network resources
including devices, boards, interfaces, and links on a large and complicated network. Through
the U2000, you can query and manage resources of the S5300 and locate abnormal resources
on the network.
View Management
The U2000 provides a unified topology view of all devices on a network to help you obtain
network information directly and conveniently. The U2000 provides a powerful topology
management function. You can browse device information in the system topology view,
protocol topology view, and user-defined view. In addition, the U2000 provides friendly
interfaces for operation and maintenance of the network and devices.
The protocol topology views include the HGMP view and Ethernet view, which cover the
topologies of various networking modes and network layers of the S5300. These views
support automatic topology discovery to reflect changes of the network topology and device
status in real time.
Configuration Management
Configuration management is used to configure the S5300 and it supports management of
devices, interfaces, VLANs, Layer 2 features, software upgrade, and configuration files. the
U2000 provides personalized configuration modes such as end-to-end configuration, batch
configuration, and configuration wizard, and provides default configuration templates.
Fault Management
Fault management is an important and commonly used management method for maintaining
networks. Through the GUI, you can query and monitor the running status and faults of the
S5300 in real time, filter faults, locate faults, confirm faults, and analyze faults. The U2000
can generate alarm sounds or display alarms on the alarm panel. It can be connected to an
alarm box for convenient routine maintenance.
Performance Management
The U2000 can collect performance data, monitor the device performance, and analyze the
collected data. It provides various reports and charts about device performance. In addition,
the U2000 collects statistics about device load and user access so that you can know the QoS
of the network and thus assess and adjust network resource configuration in time.
Performance management serves resource management, and performance data is displayed on
the GUI in iWeb mode.
Security Management
The U2000 provides various measures for security management. Users are authenticated
uniformly on the U2000 and their operation authority is configured based on the minimum
granularity principle. The U2000 authenticates users strictly to ensure system security. It also
provides detailed operation logs for you to query and analyze user operations.
Security management supports user management, access control, user group management, and
operation management.
Item Description
Dimensions (width x depth x S5324TP-SI: 442.0 mm x 220.0 mm x 43.6 mm
height) S5328C-EI-24S: 442.0 mm x 420.0 mm x 43.6 mm
S5328C-PWR-EI: 442.0 mm x 420.0 mm x 43.6 mm
S5328C-SI: 442.0 mm x 420.0 mm x 43.6 mm
S5328C-PWR-SI: 442.0 mm x 420.0 mm x 43.6 mm
S5352C-EI: 442.0 mm x 420.0 mm x 43.6 mm
S5352C-PWR-EI: 442.0 mm x 420.0 mm x 43.6 mm
S5352C-SI: 442.0 mm x 420.0 mm x 43.6 mm
S5352C-PWR-SI: 442.0 mm x 420.0 mm x 43.6 mm
S5348TP-SI: 442.0 mm x 420.0 mm x 43.6 mm
S5324TP-PWR-SI: 442.0 mm x 420.0 mm x 43.6 mm
S5348TP-PWR-SI: 442.0 mm x 420.0 mm x 43.6 mm
Item Description
Maximum power (full S5328C-EI: 60W
configuration) S5352C-EI: 88W
S5328C-EI-24S: 63W
S5328C-SI: 56W
S5352C-SI: 78W
S5324TP-SI: 40W
S5348TP-SI: 64W
S5324TP-PWR-SI: 455 W (Dissipated power: 85 W,
PoE: 370 W)
S5348TP-PWR-SI: 907 W (Dissipated power: 167 W,
PoE: 740 W)
S5328C-PWR-SI: 891 W (Dissipated power: 151 W,
PoE: 740 W)
S5352C-PWR-SI: 917 W (Dissipated power: 177 W,
PoE: 740 W)
S5328C-PWR-EI: 472 W (Dissipated power: 102 W,
PoE: 370 W)
S5352C-PWR-EI: 930 W (Dissipated power: 190 W,
PoE: 740 W)
Weight Full ≤ 8.5 kg
configuration
Empty chassis ≤ 5 kg
DC input Rated voltage –48V DC to –60V DC
voltage
Maximum –36V DC to –72V DC
voltage
AC input Rated voltage 100V AC to 240V AC
voltage
Maximum 90V AC to 264V AC
voltage
Temperature Long-term 0°C to 50°C
operating
temperature
Short-term -5°C to 55°C
operating
temperature
Storage -40°C to 70°C
temperature
Relative humidity 10%RH to 90%RH
Altitude Long-term 0 m to 2000 m
operating
altitude
Item Description
Storage altitude 0 m to 2000 m
Attribu Specification
te
Transmi 0.5 km 10 km 10 km 10 km 40 km 40 km 80 km 100 km
ssion (single- (single-
distance mode mode
bidirect bidirect
ional ional
fiber) fiber)
Center 850 nm 1310 Sendin Sendin 1550 1310 1550 1550
wavelen nm g: 1310 g: 1490 nm nm nm nm
gth nm nm
Receivi Receivi
ng: ng:
1490 1310
nm nm
Transmi -9.5 -9.0 -9.0 -9.0 -5.0 -5.0 -2.0 0 dBm
tting dBm to dBm to dBm to dBm to dBm to dBm to dBm to to 5.0
power -2.5 -3.0 -3.0 -3.0 0 dBm 0 dBm 5.0 dBm
dBm dBm dBm dBm dBm
Receiver -17.0 -20.0 -19.5 -19.5 -22.0 -22.0 -22.0 -30.0
sensitivi dBm dBm dBm dBm dBm dBm dBm dBm
ty
Overloa 0 dBm -3.0 -3.0 -3.0 -3.0 -3.0 -3.0 -9.0
d power dBm dBm dBm dBm dBm dBm dBm
Extincti 9.0 dB 9.0 dB 6.0 dB 6.0 dB 8.5 dB 9.0 dB 9.0 dB 8.0 dB
on ratio
Type of LC LC LC LC LC LC LC LC
the
optical
connect
or
Fiber Multi- Single Single Single Single Single Single Single
type mode mode mode mode mode mode mode mode
Attribu Specification
te
Transmi 80 km 80 km 80 km 80 km 80 km 80 km 80 km 80 km
ssion
distance
Center 1571 1591 1551 1511 1611 1491 1531 1471
wavelen nm nm nm nm nm nm nm nm
gth
Transmi 0 dBm 0 dBm 0 dBm 0 dBm 0 dBm 0 dBm 0 dBm 0 dBm
tting to 5.0 to 5.0 to 5.0 to 5.0 to 5.0 to 5.0 to 5.0 to 5.0
power dBm dBm dBm dBm dBm dBm dBm dBm
Receiver -28.0 -28.0 -28.0 -28.0 -28.0 -28.0 -28.0 -28.0
sensitivi dBm dBm dBm dBm dBm dBm dBm dBm
ty
Overloa -9.0 -9.0 -9.0 -9.0 -9.0 -9.0 -9.0 -9.0
d power dBm dBm dBm dBm dBm dBm dBm dBm
Extincti 8.5 dB 8.5 dB 8.5 dB 8.5 dB 8.5 dB 8.5 dB 8.5 dB 8.5 dB
on ratio
Type of LC LC LC LC LC LC LC LC
the
optical
connect
or
Attribute Specification
Transmission 0.3 km 10 km 40 km 80 km
distance
Center 850 nm 1310 nm 1550 nm 1550 nm
wavelength
Transmitting -7.3 dBm to -6.0 dBm to -1.0 dBm to 2.0 0 dBm to 4.0
power -1.0 dBm -1.0 dBm dBm dBm
Receiver -7.5 dBm -14.4 dBm -15.0 dBm -24.0 dBm
sensitivity
Overload power -1.0 dBm 0.5 dBm -1.0 dBm -7.0 dBm
Extinction ratio 3.0 dB 6.0 dB 8.2 dB 9.0 dB
Type of the LC LC LC LC
optical connector
Fiber type Multi-mode Single mode Single mode Single mode
Attribute Specification
Transmission distance 0.3 km 10 km 40 km
Center wavelength 850 nm 1310 nm 1550 nm
Transmitting power -7.3 dBm to -1.0 -8.2 dBm to 0.5 -4.7 dBm to 4.0
dBm dBm dBm
Receiver sensitivity -11.1 dBm -12.6 dBm -14.1 dBm
Overload power -1.0 dBm 0.5 dBm -1.0 dBm
Extinction ratio 3.0 dB 3.5 dB 3.5 dB
Type of the optical LC LC LC
connector
Fiber type Multi-mode Single mode Single mode
Item Parameter
Processor S5300C-EI: 533 MHz
S5300C-SI: 800 MHz
S5300TP-SI: 800 MHz
Switching capacity S5324: 48Gbit/s
S5328: 88Gbit/s
S5348: 96Gbit/s
S5352: 136Gbit/s
Packet forwarding S5324: 35.71 Mpps
capacity S5328: 65.47 Mpps
S5348: 71.42 Mpps
S5352: 101.19 Mpps
DDR memory 256 MB
Flash Memory 32 MB
Stacking Bandwidth 48 Gbit/s
Attribute Description
Ethernet Ethernet Operating modes, including full duplex, half duplex, and
features auto-negotiation
Operating rates of an Ethernet interface, including 10
Mbit/s, 100 Mbit/s, 1000 Mbit/s, 10 Gbit/s, and
auto-negotiation
Cable type detection (direct or cross-over)
Flow control on interfaces
Jumbo frames
Link aggregation
Load balancing among the links of a trunk
Interface isolation and forwarding restriction on interfaces
Port Security
Suppression of broadcast storms
VLAN Access modes of access, trunk, hybrid, and QinQ
Default VLAN
VLAN mapping.
Selective QinQ
Voice VLAN
VLAN switching
DHCP policy VLAN
MAC Automatic learning and aging of MAC addresses
Static, dynamic, and blackhole MAC address entries
Packet filtering based on source MAC addresses
Limitation on MAC address learning on interfaces
ARP Static and dynamic ARP entries
ARP on a VLAN
Aging of ARP entries
SmartLink SmartLink
SmartLink multi-instance
MonitorLink
LLDP LLDP
NAC NAC
VCT VCT
Attribute Description
Ethernet MSTP STP
loop RSTP
protection
MSTP
BPDU protection, Root protection, and loop protection
Partitioned STP and BPDU tunnels
RRPP RRPP protective switchover
Single RRPP ring, tangent RRPP rings, and intersecting
RRPP rings
Hybrid networking of RRPP rings and other ring networks
IPv4/IPv6 IPv4 features ARP/RARP
forwardin ARP proxy
g
Auto-detection
Unicast Up to 12,000 routes (S53EI) / 2,000 routes (S53SI)
routing Static routes
RIP-1/RIP-2 (2,000 routes)
OSPF v1/v2 (12,000 routes on S53EI)
BGP (12,000 routes on S53EI)
IS-IS (12,000 routes on S53EI)
Routing policies and policy-based routes
uRPF check
VRF
DHCP Client/Server/Relay
DHCP snooping
Multicast IGMPv1/v2/v3 (512 groups on S53EI)
routing IGMP Snooping v1/v2/v3 (up to 1,000 groups)
PIM-DM (2,000 entries on S53EI)
PIM-SM (2,000 unicast routes on S53EI)
PIM-SSM
MBGP
MSDP
Multicast routing policy
RPF
IPv6 features IPv6 protocol stack
IPv6 unicast routing protocols: RIPng and OSPFv3
VRRP6
IPv4/IPv6 transition technologies
Attribute Description
Device BFD Basic BFD functions
reliability BFD for OSPF
BFD for IS-IS
BFD for BGP
BFD for PIM
Others VRRP
Layer 2 Layer 2 IGMP snooping
multicast multicast IGMP proxy
Prompt leave
Multicast traffic control
Inter-VLAN multicast replication
Controllable multicast
Ethernet EFM OAM Neighbor discovery
OAM Link monitoring
Fault notification
Remote loopback
QoS Traffic Traffic classification based on the combination of the L2
classification protocol header, IP quintuple, outgoing interface, and
802.1p field
Traffic classification based on the C-VID and C-PRI of
QinQ packets
Traffic Access control after traffic classification
behaviors Traffic policing based on traffic classification
Re-marking based on traffic classification
Class-based packet queuing
Combination of traffic classification and traffic behaviors
Queue PQ
scheduling DRR
PQ+DRR
WRR
PQ+WRR
Congestion SRED
avoidance
Rate limit on Rate limit on outbound interfaces
outbound
interfaces
Attribute Description
Configura Terminal Configurations through command lines
tion and service Help information in English and Chinese
maintenan
ce
Login through console and Telnet terminals
Information exchange between terminals through the send
function
File system File system
Directory and file management
File upload and download through FTP or TFTP
Debugging Centralized management of logs, alarms, and debugging
and information
maintenance Electronic label
User operation logs
Detailed debugging information for diagnosing network
faults
Network test tools such as traceroute and ping commands
Interface mirroring and flow mirroring
Version Software loading on the entire equipment and online
upgrade software loading
Online upgrade of the BootROM
In-service patching
Security System Hierarchical command line protection to prevent
and security unauthorized users from accessing the S5300
managem SSH v2.0 (up to 16 user levels)
ent
RADIUS authentication and HWTACACS authentication
ACL filtering
DHCP packet filtering (with Option 82)
Defense against control packet attacks
Defense against attacks of source address spoofing, LAND,
SYN flood (TCP SYN), smurf, ping flood (ICMP echo),
Teardrop, and Ping of Death
Network Ping and traceroute
management SNMPv1/v2c/v3
Standard MIB
RMON
Cluster HGMPv2
management S5300 functioning as the command switch
S5300 functioning as the member switch
S5300 joining cluster automatically
Member switches using private IP addresses
Logging in to the member switch through Telnet
√ √
TXT=5697 bytes) (Also STD0041)
(Status: STANDARD)
√ √
on a TCP/UDP Transport: Concepts and
RFC 1001 Methods
Protocol Standard for a NetBIOS Service
√ √
on a TCP/UDP Transport: Detailed
RFC 1002 Specifications
√ √
RFC 1027 Using ARP to Implement Transparent
Subnet Gateways
√ √
RFC 1042 A Standard for the Transmission of IP
Datagrams over IEEE 802 Networks
√ √
PS=534729, PDF=255616 bytes) (Status:
PROPOSED STANDARD)
Structure and identification of
√ √
RFC 1155 management information for
TCP/IP-based internets
√ √
A Simple Network Management Protocol
RFC 1157
(SNMP)
× √
Use of OSI IS-IS for Routing in TCP/IP
RFC 1195
and Dual Environments
√ √
to commonly asked "new Internet user"
RFC 1206 questions.
FYI on Questions and Answers: Answers
√ √
to commonly asked "experienced Internet
RFC 1207 user" questions
√ √
requirements for transatlantic research
RFC 1210 collaboration:
√ √
Problems with the maintenance of large
RFC 1211 mailing lists
√ √
RFC 1213 Network Management of TCP/IP-based
internets: MIB-II.
√ √
Definitions of Managed Objects for Data
RFC 1214 Link Switching using SMIv2.
√ √
RFC 1215 A Convention for Defining Traps for use
with the SNMP
√ √
Gigabit network economics and paradigm
RFC 1216 shifts
√ √
Benchmarking terminology for network
RFC 1242 interconnection devices
× √
OSPF Version 2 Management Information
RFC 1253 Base
× √
Definitions of Managed Objects for the
RFC 1269 Border Gateway Protocol:Version 3
RFC 1305 Network Time Protocol (Version 3)
√ √
Specification, Implementation and
Analysis
√ √
RFC 1315 Management Information Base for Frame
Relay DTEs
× √
and BGP3 Version of the Border Gateway
RFC 1397 Protocol
× √
RFC 1519 an Address Assignment and Aggregation
Strategy
√ √
DHCP Options and BOOTP Vendor
RFC 1533
Extensions Class-identifier
√ √
Interoperation Between DHCP and
RFC 1534 BOOTP
√ √
Common DNS Data File Configuration
RFC 1537 Errors
√ √
Clarifications and Extensions for the
RFC 1542
Bootstrap Protocol
√ √
RFC 1573 Evolution of the Interfaces Group of
MIB-II
√ √
Definitions of Managed Objects for the
RFC 1643
Ethernet-like Interface Types
√ √
Definitions of Managed Objects for the
RFC 1650
Ethernet-like Interface Types using SMIv2
× √
BGP-4 Protocol Document Roadmap and
RFC 1656 Implementation Experience
× √
RIP Version 2 Carrying Additional
RFC 1723
Information
√ √
Introduction to Community-based
RFC 1901
SNMPv2
Structure of Management Information for
√ √
Version 2 of the Simple Network
RFC 1902 Management Protocol (SNMPv2)
Structure of Management Information for
× √
Version 2 of the Simple Network
RFC 1902 Management Protocol (SNMPv2)
Textual Conventions for Version 2 of the
√ √
Simple Network Management Protocol
RFC 1903 (SNMPv2)
Conformance Statements for Version 2 of
√ √
the Simple Network Management Protocol
RFC 1904 (SNMPv2)
√ √
RFC 1905 Simple Network Management Protocol
(SNMPv2)
Transport Mappings for Version 2 of the
√ √
RFC 1906 Simple Network Management Protocol
(SNMPv2)
Management Information Base for
√ √
RFC 1907 Version 2 of the Simple Network
Management Protocol (SNMPv2)
√ √
registration of an Autonomous System
RFC 1930 (AS)
√ √
Benchmarking Methodology for Network
RFC 1944 Interconnect Devices
× √
Autonomous System Confederations for
RFC 1965 BGP
√ √
SNMPv2 Management Information Base
RFC 2011
for the Internet Protocol using SMIv2
SNMPv2 Management Information Base
√ √
RFC 2012 for the Transmission Control Protocol
usingSMIv2
SNMPv2 Management Information Base
√ √
RFC 2013 for the User Datagram Protocol using
SMIv2
√ √
RFC 2021 Remote Network Monitoring Management
Information Base Version 2 using SMIv2
× √
HMAC: Keyed-Hashing for Message
RFC 2104
Authentication
√ √
Remote Authentication Dial In User
RFC 2138
Service (RADIUS)
√ √
Internet Group Management Protocol,
RFC 2236
Version 2
√ √
RFC 2267 Denial of Service Attacks which employ
IP Source Address Spoofing
√ √
Using a Dedicated AS for Sites Homed to
RFC 2270 a Single Provider
√ √
RFC 2274 version 3 of the Simple Network
Management Protocol (SNMPv3)
View-based Access Control Model
√ √
(VACM) for the Simple Network
RFC 2275 Management Protocol (SNMP)
√ √
Benchmarking Terminology for LAN
RFC 2285 Switching Devices
√ √
Recommendations on Queue Management
RFC 2309
and Congestion Avoidance in the Internet.
√ √
RFC 2375 An Architecture for Differentiated
Services
√ √
RFC 2461 Neighbor Discovery for IP Version 6
(IPv6)
RFC 2462 IPv6 Stateless Address Auto configuration √ √
RFC 2463 Internet Control Message Protocol
√ √
(ICMPv6) for the Internet Protocol
Version 6 (IPv6)Specification
√ √
RFC 2464 Transmission of IPv6 Packets over
Ethernet Networks
√ √
RFC 2465 Management Information Base for IP
Version
RFC 2466 MIB for ICMP6 √ √
√ √
RFC 2473 Generic Packet Tunneling in IPv6
Specification
RFC 2474 Definition of the Differentiated Services
√ √
Field (DS Field) in the IPv4 and IPv6
Headers
√ √
Using Performance History Based on 15
RFC 2493 Minute Intervals
√ √
A Framework for Inter-Domain Route
RFC 2519 Aggregation
√ √
Benchmarking Methodology for Network
RFC 2544 Interconnect Devices
√ √
RFC 2570 Internet-standard Network Management
Framework
√ √
An Architecture for Describing SNMP
RFC 2571
Management Frameworks
Message Processing and Dispatching for
√ √
RFC 2572 the Simple Network Management Protocol
(SNMP)
√ √
RFC 2575 (VACM) for the Simple Network
Management Protocol (SNMP)
Coexistence between Version 1, Version
√ √
RFC 2576 2, and Version 3 of the Internet-standard
Network Management Framework
√ √
Structure of Management Information
RFC 2578
Version 2 (SMIv2)
√ √
RFC 2665 Definitions of Managed Objects for the
Ethernet-like Interface Types
√ √
RFC 2668 Definitions of Managed Objects for IEEE
802.3 Medium Attachment Units (MAUs)
√ √
Bridges with Traffic Classes, Multicast
Filtering and Virtual LAN Extensions
√ √
Stateless IP/ICMP Translation Algorithm
RFC 2765 (SIIT)
√ √
Network Address Translation protocol
RFC 2766 Translation (NAT-PT)
× √
Definitions of Managed Objects for the
RFC 2787
Virtual Router Redundancy Protocol
√ √
Remote Network Monitoring Management
RFC 2819
Information Base
Network Ingress Filtering: Defeating
√ √
Denial of Service Attacks which employ
RFC 2827 IP Source Address Spoofing.
√ √
RFC 2895 Remote Network Monitoring MIB
Protocol Identifier Reference
√ √
Domain Behaviors and Rules for their
RFC 3086 Specification
√ √
A Delay Bound alternative revision of
RFC 3248 RFC 2598
√ √
New Terminology and Clarifications for
RFC 3260 Diffserv
× √
RFC 3359 Codepoints in Intermediate System to
Intermediate System
× √
Three-Way Handshake for IS-IS
RFC 3373
Point-to-Point Adjacencies
× √
Internet Group Management Protocol,
RFC 3376
Version 3
√ √
Network Management Protocol (SNMP)
RFC 3411 management frameworks
Message processing and dispatching for
√ √
RFC 3412 Simple Network Management Protocol
(SNMP)
√ √
Simple Network Management Protocol
RFC 3413
(SNMP) Applications
User-based Security Model (USM) for
√ √
RFC 3414 version 3 of the Simple Network
Management Protocol (SNMPv3)
View-based Access control model
√ √
RFC 3415 (VACM) for the Simple Network
Management Protocol (SNMP)
Version 2 of The Protocol Operations for
√ √
RFC 3416 the Simple Network Management Protocol
(SNMP)
√ √
Transport Mappings for the Simple
RFC 3417
Network Management Protocol (SNMP)
Management Information Base (MIB) for
√ √
RFC 3418 the Simple Network Management Protocol
(SNMP)
Anycast Rendevous Point (RP)
mechanism using Protocol Independent
RFC 3446
× √
Multicast (PIM) and Multicast Source
Discovery Protocol (MSDP)
√ √
RFC 3493 Basic Socket Interface Extensions for
IPv6
Configuring Networks and Devices with
√ √
RFC 3512 Simple Network Management Protocol
(SNMP).
× √
Internet Protocol Version 6 (IPv6)
RFC 3513
Addresing Architecture
√ √
Overview of the 2002 IAB Network
RFC 3535 Management Workshop.
RFC 3542 Advanced Sockets API for IPv6 √ √
8-14 Huawei Proprietary and Confidential Issue 01 (2010-10-21)
Copyright © Huawei Technologies Co., Ltd.
Quidway S5300 Series Ethernet Switches
Product Description 8 IEEE and IETF Comply Tables
√ √
(Remote Authentication Dial In User
RFC 3575 Service)
Dynamic Authorization Extensions to
√ √
RFC 3576 Remote Authentication Dial In User
Service (RADIUS)
√ √
Introduction to the Remote Monitoring
RFC 3577 (RMON) Family of MIB Modules
√ √
An Aggregatable Global Unicast Address
RFC 3587 Format
× √
Source Addres Selection for Multicast
RFC 3590
Listener Discovery Protocol
Textual Conventions for MIB Modules
√ √
RFC 3593 Using Performance History Based on 15
Minute Intervals
× √
Multicast Source Discovery Protocol
RFC 3618
(MSDP)
√ √
Definitions of Managed Objects for the
RFC 3635 Ethernet-like Interface Types
√ √
Definitions of Managed Objects for IEEE
RFC 3636 802.3 Medium Attachment Units (MAUs).
× √
Recommendations for Interoperable
RFC 3719
Networks using IS-IS
IANA Guidelines for the Registry of
√ √
Remote Monitoring (RMON) MIB
RFC 3737 modules
RFC 3748 Extensible Authentication Protocol (EAP) √ √
× √
Virtual Router Redundancy Protocol
RFC 3768 (VRRP)
× √
Recommendations for Interoperable IP
RFC 3787
Networks using IS-IS
Multiprotocol Label Switching (MPLS)
√ √
Traffic Engineering (TE) Management
RFC 3812 Information Base (MIB)
× √
Embedding the Rendezvous Point (RP)
RFC 3956 Address in an IPv6 Multicast Address
Protocol Independent Multicast - Dense
× √
RFC 3973 Mode (PIM-DM): Protocol Specification
(Revised)
√ √
RFC 4001 Textual Conventions for Internet Network
Addresses
A Differentiated Service Two-Rate,
√ √
Three-Color Marker with Efficient
RFC 4115 Handling of in-Profile Traffic
√ √
Bridges with Traffic Classes, Multicast
Filtering, and Virtual LAN Extensions
× √
Network (VPN) Management nformation
RFC 4382 Base
Management Information Base for
× √
Intermediate System to Intermediate
RFC 4444 System (IS-IS)
× √
BGP Route Reflection: An Alternative to
RFC 4456 Full Mesh Internal BGP (IBGP)
Considerations for Internet Group
Management Protocol (IGMP) and
RFC 4541
√ √
Multicast Listener Discovery (MLD)
Snooping Switches
RFC 4560 Definitions of Managed Objects for
√ √
Remote Ping, Traceroute, and Lookup
Operations
× √
RFC 4601 Mode (PIM-SM): Protocol Specification
(Revised)
× √
RFC 4905 Encapsulation Methods for Transport of
Layer 2 Frames over MPLS Networks
× √
Autonomous System Confederations for
RFC 5065 BGP
√ √
Deprecation of Type 0 Routing Headers in
RFC 5095 IPv6
draft-grant-tacacs-02 TACACS + √ √
× √
draft-holbrook-idmr-i Using IGMPv3 and MLDv2 For
gmpv3-ssm-08.txt Source-Specific Multicast
× √
draft-ietf-bfd-generic- Generic Application of BFD
03
× √
draft-ietf-bfd-generic- Generic Application of BFD
04
× √
draft-ietf-bfd-generic- Generic Application of BFD
05
× √
draft-ietf-bfd-multiho
BFD for Multihop Paths
p-06
× √
draft-ietf-bfd-multiho BFD for Multihop Paths
p-07
× √
draft-ietf-bfd-multiho BFD for Multihop Paths
p-08
× √
draft-ietf-bfd-v4v6-1h
BFD for IPv4 and IPv6 (Single Hop)
op-04
× √
draft-ietf-bfd-v4v6-1h
BFD for IPv4 and IPv6 (Single Hop)
op-05
× √
draft-ietf-bfd-v4v6-1h BFD for IPv4 and IPv6 (Single Hop)
op-07
× √
draft-ietf-bfd-v4v6-1h BFD for IPv4 and IPv6 (Single Hop)
op-08
× √
draft-ietf-bfd-v4v6-1h BFD for IPv4 and IPv6 (Single Hop)
op-09
× √
draft-ietf-bfd-v4v6-1h BFD for IPv4 and IPv6 (Single Hop)
op-10
× √
draft-ietf-isis-wg-mib-
Management Information Base for IS-IS
20
× √
draft-ietf-isis-wg-mult M-ISIS: Multi Topology (MT) Routing in
i-topology-11.txt IS-IS
√ √
draft-ietf-magma- Considerations for IGMP and MLD
snoop-11 Snooping Switches
draft-ietf-magma-snoo Considerations for Internet Group
p-12.txt Management Protocol (IGMP)and
√ √
Multicast Listener Discovery (MLD)
Snooping Switches
√ √
draft-ietf-ngtrans-isata Intra-Site Automatic Tunnel Addressing
p-20.txt Protocol(ISATAP)
× √
draft-ietf-ospf-restart-
OSPF Restart Signaling
01
× √
draft-ietf-pim-dm-new Protocol Independent Multicast - Dense
-v2-02.txt Mode (PIM-DM)
× √
draft-ietf-pim-ipv6-03 Protocol Independent Multicast Routing
in the Internet Protocol Version 6 (IPv6)
× √
draft-ietf-pim-sm-bsr- Bootstrap Router (BSR) Mechanism for
09.txt PIM Sparse Mode
× √
draft-ietf-pim-sm-v2- Protocol Independent Multicast - Sparse
new-12.txt Mode (PIM-SM) .
× √
draft-ietf-pim-v2-dm- Protocol Independent Multicast Version 2
03 Dense Mode Specification
draft-ietf-ssm-arch-01 Source-Specific Multicast for IP × √
draft-ietf-ssm-arch-02 Source-Specific Multicast for IP × √
× √
draft-ietf-ssm-overvie Source-Specific Multicast for IP
w-04
× √
draft-ietf-ssm-overvie An Overview of Source-Specific Multicast
w-05 (SSM)
× √
draft-ietf-ssm-overvie
Source-Specific Multicast for IP
w-xx
√ √
draft-irtf-secsh-filexfe
r-14.txt SFTP
× √
draft-rosen-vpn-mcast Multicast in MPLS/BGP VPNs
-08
× √
draft-rosen-vpn-mcast
Multicast in MPLS/BGP VPNs, Option 2
-08.txt
√ √
draft-tcpm-tcpsecure-
00.txt
√ √
draft-ylonen-ssh-proto
SSH protocol
col-00
DSL Evolution – Architecture
√ √
DSL Forum Requirements for the Support of
QoS-Enabled IP Services
√ √
Chuck Forsberg, "XMODEM/YMODEM
Xmodem
Protocol Reference"