Configuring sFlow on D-Link Switches

sFlow – Traffic analysis protocol, similar to NetFlow.

Enable/disable sFlow on the switch:

enable/disable sflow

Viewing parameters:

show sflow
show sflow flow_sampler
show sflow counter_poller
show sflow analyzer_server

Adding/modifying the sFlow analyzer server:

create/config sflow analyzer_server 1-4 owner NAME timeout 1-2000000(sec)/infinite collectoraddress ADDRESS collectorport udp_PORT maxdatagramsize 300-1400

Example of removing the sFlow analyzer server:

delete sflow analyzer_server 1-4

Creating, modifying, deleting the sFlow polling counters:

create/config sflow counter_poller ports NUMBER/all analyzer_server_id 1-4 interval disable/20-120(sec)
delete sflow counter_poller ports NUMBER/all

Create, modify, delete sFlow sample ports:

create/config sflow flow_sampler ports NUMBER/all analyzer_server_id (1-4) rate value 0-65535 tx_rate value 0-65535 maxheadersize value 18-256
delete sflow flow_sampler ports NUMBER/all

I will give an example of setting:

enable sflow
create sflow analyzer_server 1 owner Linux collectoraddress 192.168.1.5 collectorport 6343
create sflow counter_poller ports 1 analyzer_server_id 1 interval 20
create sflow flow_sampler ports 1:1 analyzer_server_id 1 rate 1000 maxheadersize 128

Configuring HTTP on Cisco

Connect to the Cisco switch and go into elevated privilege mode:

enable

Now go into the configuration mode:

configure terminal

Enable HTTP:

ip http server
ip http authentication local

If necessary, you can disable HTTP and HTTPS as follows:

no ip http server
no ip http secure-server

Add a user if it does not exist:

username NAME privilege 15 secret PASSWORD

If you want to allow HTTP access to only certain IPs, then let’s see what rules there are on the switch:

exit
show access-list
show ip access-lists
configure terminal

If there is no necessary rule, then we will create:

access-list 10 permit 192.168.1.22
access-list 10 permit 192.168.3.10

See my article – Restricting access to the Cisco Catalyst 6500 management

Apply the rule to HTTP:

ip http access-class 10

To cancel it is possible so:

no ip http access-class 10

If you need to specify the maximum number of connection attempts:

ip admission max-login-attempts 5
show ip admission configuration

Leave their configuration mode and save the configuration:

exit
write

See also:
Configuring Cisco devices

Using third-party SFP modules in Cisco switches

Suppose we connected a third-party module to the first SFP port, we’ll look at the information about it:

show idprom int GigabitEthernet 1/1

In my case, on the Cisco Catalyst 6509-E, very many ports with third-party SFP modules after some time they turned off and in the logs information was written that the module was not supported.

Now go into the configuration mode:

enable
config t

And we will make sure that the interfaces are not disabled when third-party SFP modules are enabled by entering the following commands:

service unsupported-transceiver
no errdisable detect cause sfp-config-mismatch
no errdisable detect cause gbic-invalid

After that, everything worked well.

See also:
Configure Cisco Catalyst 6509-E

Configuring TP-Link EP110

On the test I will connect TP-Link EP110 ONT to BDCOM P3310B-2AC EPON OLT.

To configure the TP-Link EP110, you must connect it to the computer with a cable and type in the address bar of the browser http://192.168.1.1, then disable the DHCP server from the menu by unchecking DHCP.

It is also necessary to select the ONT mode as shown in the figure below:
tp-link-ep110

After that, TP-Link EP110 will work and register similarly to other ONTs, such as BDCOM P1501C1, FOXGATE 1001w, etc.

See also:
Configuring the BDCOM P3310 EPON

Addition of ONT Huawei EchoLife HG8110 on Huawei SmartAX MA5683T

On the test, I wrote the profiles and added ONT Huawei EchoLife HG8110 to Huawei SmartAX MA5683T.

The first step is to connect to the Huawei SmartAX MA5683T and go into configuration mode:

enable
config

Create ont-srvprofile:

ont-srvprofile gpon profile-id 14 profile-name "Huawei HG8110"
ont-port pots 1 eth 1
port vlan eth 1 translation 228 user-vlan 228
commit

Create ont-lineprofile:

ont-lineprofile gpon profile-id 14 profile-name "Huawei HG8110"
tcont 4 dba-profile-id 11
gem add 1 eth tcont 4
gem mapping 1 0 vlan 228
commit

We learn the serial number of ONT and the number of the card to which it is connected by typing the command to search for new ONTs:

display ont autofind all

Let’s go into the setup mode of the desired Gpon card (in the port of which the ONT is connected):

interface gpon 0/5

Now add ONT with the serial number:

ont add 3 17 sn-auth "414C434CF23D5EAF" omci ont-lineprofile-id 14 ont-srvprofile-id 14 desc OPISANIE
ont port native-vlan 3 17 eth 1 vlan 228 priority 0

Where number 3 indicates the Gpon port number to which the ONT is connected.

The number 17 means ID ONT and is listed next in order after added in the ONT configuration, the list of occupied IDs can be seen after exiting the Gpon card setup mode and typing the command displaying the entire configuration (for each gpon port, their IDs ONT):

display current-configuration
display current-configuration | include service-port

Let’s exit the Gpon interface configuration mode:

quit

Add a service port that will give the Internet to ONT (the number 425 denotes the port service number and is taken from the free in the configuration):

service-port 425 vlan 228 gpon 0/5/3 ont 17 gemport 1 multi-service user-vlan 228

Save the configuration:

save

The standard IP address of Huawei EchoLife HG8110 is 192.168.100.1, the login is telecomadmin, the password is admintelecom.
In ONT, you do not need to configure anything.

See also:
Configuring Huawei SmartAX MA5683T through the console

Setting up and using Traffic Flow in Mikrotik

Enable Traffic Flow on the Mikrotik router:

ip traffic-flow set enabled=yes cache-entries=4k set active-flow-timeout=30m inactive-flow-timeout=15s interfaces=all

View settings:

ip traffic-flow print

Specify the IP address and port of the computer that will receive the Traffic-Flow packets:

ip traffic-flow target add address=192.168.88.240:1234 disabled=no version=9 v9-template-refresh=20 v9-template-timeout=30m

or

ip traffic-flow target add address=192.168.88.240:1234 disabled=no version=5

View settings:

ip traffic-flow target print

To configure through the GUI, the settings can be found in the menu IP -> Traffic Flow.

For monitoring under Windows, you can install the program ManageEngine NetFlow Analyzer, which will work as a server, receive packets from the specified port and generate graphs and statistics via a web server that can be opened by the browser.

For monitoring under Linux, you can install and configure for example flow-tools.