EasyManua.ls Logo

ELTEX MES1000 User Manual

ELTEX MES1000
231 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #102 background imageLoading...
Page #102 background image
102 MES1000, MES2000 Ethernet Switches
for service information transmission and entering the ring
configuration mode.
no erps vlan vlan_id
Remove ERPS ring with vlan_id identifier.
Ring configuration mode commands
Command line request in ring configuration mode appears as follows:
console(config-erps)#
Table 5.97 ERPS ring configuration mode commands
Command
Value/Default value
Action
protected vlan add
vlan_range
vlan_range:(2..4094, all)
Add VLAN range into the secure VLAN list.
protected vlan remove
vlan_range
vlan_range:(2..4094, all)
Remove VLAN range from the secure VLAN list.
port {west | east}
{gigabitethernet gi_port |
fastethernet fa_port }
gi_port: (1..3/0/1..28);
fa_port: (1..3/0/1..24).
Select the west(east) switch port, included in the ring.
no port {west | east}
-
Remove the west(east) switch port, included in the ring.
rpl {west | east} {owner |
neighbor}
-/no rpl
Select RPL switch port an its role.
no rpl
Remove RPL switch port.
level level
level: (0..7)/1
Configure R-APS message level. Required for message
transmission through CFM MEP.
no level
Set the default value.
ring enable
-
Enable ring operation.
no ring enable
Disable ring operation.
version version
version: (1..2)/2
Select compatibility mode for other G.8032 protocol versions.
no version
Set the default value.
revertive
-/revertive
Select the ring operation mode.
no revertive
Set the default value.
sub-ring vlan vlan_id
Vlan_id:(1..4094)
Define the sub-ring for the current ring.
no sub-ring vlan
Remove the sub-ring.
timer guard value
value:(10-2000) ms,
divisible by 10/500 ms
Set the timer that blocks obsolete R-APS messages.
no timer guard
Set the default value.
timer holdoff value
value:(0-10000) ms,
divisible by 100 with
accuracy 5 ms/0 ms
Set the delay timer for response of the switch to state
changes. Instead of response, the timer is activated, when it
expires, the switch will provide information on its state.
Designed for reducing the packet flood during the port
flapping.
no timer holdoff
Set the default value.
timer wtr value
value:(1-12) minutes/5
minutes
Set timer, that will be launched on RPL Owner switch in
revertive mode. Designed to prevent the frequent secure
switching caused by failure alarms.
no timer wtr
Set the default value.
switch forced {west | east}
-/no
Force the launch of the secure ring switching; the specified
port is blocked.
no switch forced
Disable the forced ring switching.
switch manual {west | east}
-/no
Manual blocking of the specified west(east) port and
east(west) unblocking.
no switch manual
Disable manual blocking.
abort
-
Undo changes made since entry into the ring configuration
mode.
EXEC mode commands
Command line request in EXEC mode appears as follows:
console#

Table of Contents

Question and Answer IconNeed help?

Do you have a question about the ELTEX MES1000 and is the answer not in the manual?

ELTEX MES1000 Specifications

General IconGeneral
ModelMES1000
LayerL2
VLANNot supported
TypeUnmanaged
Power SupplyExternal 5V DC
Operating Temperature0°C to +40°C
Storage Temperature-40°C to +70°C
Humidity10 to 90% (non-condensing)

Summary

2 PRODUCT DESCRIPTION

2.2 Device Functions

Lists and describes the basic, MAC address processing, and second-layer OSI functions of the switches.

3 INSTALLATION AND CONNECTION

4 DEVICE STARTUP, INITIAL CONFIGURATION

4.3 Configuration procedure

Outlines the necessary information and steps for initial device configuration.

5 DEVICE MANAGEMENT COMMAND LINE INTERFACE

5.2 Basic commands

Lists and describes fundamental commands available in EXEC and Privileged EXEC modes.

5.10 Interface configuration

Covers configuration of Ethernet interfaces, port channels, and VLAN interfaces.

5.27 Security functions

Explains security functions, including port security, port-based authentication (802.1x), DHCP snooping, ARP inspection, and MAC address notification.

5.31 ACL Configuration (Access Control Lists)

Explains Access Control Lists for filtering traffic based on IP, MAC addresses, and TCP/UDP ports.

6 SERVICE MENU, CHANGE OF SOFTWARE

Related product manuals