Edgecore Switches

Edgecore switches are open networking switches commonly used with TIP OpenWiFi deployments and enterprise networks. The rXg supports both standard Edgecore firmware and OLS (OpenLAN Switch) firmware variants, providing comprehensive configuration management, monitoring, and zero-touch provisioning capabilities.

Supported Models

Model/Series Notes
ECS2100 Series Gigabit access switches (e.g., ECS2100-10P-TIPC)
ECS4100 Series Gigabit PoE access switches
ECS4155 Series Multi-gigabit PoE switches (e.g., ECS4155-30P)
ECS5550 Series 10G aggregation switches (e.g., ECS5550-30X)

Both standard Edgecore firmware and OLS (OpenLAN Switch) firmware are supported. The rXg automatically detects firmware type and adjusts configuration commands accordingly.

Features Supported

Feature Supported Description
Config Sync Yes Automatic configuration synchronization from rXg
Auto Bootstrap Yes Zero-touch onboarding from factory-default state via DHCP discovery
SNMP Monitoring Yes CPU, memory, and port statistics collection
LLDP Neighbor Discovery Yes Automatic detection of connected devices via SNMP
Switch Port Import Yes Automatic import and management of switch ports
802.1X Authentication Yes Port-based network access control via dot1x
MAC Authentication Bypass (MAB) Yes MAC-based authentication for non-802.1X devices
Dynamic VLAN Assignment Yes RADIUS-assigned VLAN based on authentication
DHCP Snooping Yes Protection against rogue DHCP servers with per-port trust
Firmware Management Yes Upload and upgrade firmware via TFTP
PoE Power Priority Yes Configure inline power priority (1-3) per port
STP Protection Yes Edge protection and STP protect settings per port
SPB-m Fabric No Not supported

Prerequisites

Firmware Requirements

  • Standard Edgecore firmware or OLS (OpenLAN Switch) firmware
  • SSH support required for config sync (enabled during bootstrap if not present)

Network Requirements

  • Management IP connectivity to rXg
  • SSH access (TCP port 22) - configured during bootstrap
  • SNMP access (UDP port 161) - configured during bootstrap
  • RADIUS connectivity (UDP ports 1812, 1813) - for 802.1X/MAB
  • TFTP connectivity (UDP port 69) - for firmware upgrades

Onboarding Process

Automatic Onboarding

Edgecore switches support fully automatic onboarding from factory-default state. The rXg detects factory-default switches by checking if NTP/SNTP is disabled (NTP being disabled indicates factory state).

Prerequisites for Auto-Bootstrap:

  1. The switch must be connected to the network and obtain a DHCP address from rXg
  2. A switch record must exist in rXg with the switch's MAC address configured
  3. The target management IP address must be configured in the switch record
  4. Valid SSH credentials must be provided (factory default or pre-configured)

Auto-Bootstrap Process:

  1. Click the Auto Bootstrap action link in the switch record (or it triggers automatically when the switch is detected at a DHCP IP)
  2. The rXg looks up the switch's current DHCP IP address using the configured MAC address
  3. Connection is established via SSH (with fallback to Telnet for older/factory-default switches)
  4. The system detects factory-default state by checking if NTP is disabled
  5. If factory-default, bootstrap configuration is automatically applied:
    • SSH host key generation (can take up to 3 minutes)
    • Management VLAN creation (if not VLAN 1)
    • Static IP address assignment on the management VLAN interface
    • Default gateway configuration
    • SNMP community string configuration
    • SNTP/NTP server configuration (using rXg IP)
    • DNS server configuration (using rXg IP)
    • RADIUS server and dot1x system-auth-control (if RADIUS is configured)
    • SSH server enabled, Telnet disabled
  6. Configuration is saved to startup-config
  7. The switch reconnects on its new management IP address

Connection Methods:

The rXg attempts connection in the following order: 1. SSH with modern algorithms 2. SSH with legacy algorithms (for older firmware) 3. Telnet (as fallback, triggers bootstrap to enable SSH)

Manual Onboarding

For manual configuration, connect to the switch via console or existing network access and apply the bootstrap commands below.

Bootstrap Commands

Generate SSH Host Keys (in enabled mode, before entering configure mode):

ip ssh crypto host-key generate
ip ssh save host-key

Note: SSH key generation can take up to 3 minutes on some models.

Enter Configuration Mode:

configure

Create Management VLAN (if not using VLAN 1):

vlan database
vlan <management-vlan-id>
exit

Configure Management VLAN Interface:

interface vlan <management-vlan-id>
ip address <switch-ip> <subnet-mask>
exit

Configure Default Route:

no ip route *
y
ip route 0.0.0.0 0.0.0.0 <gateway-ip>

Configure NTP and DNS:

sntp client
sntp server <rxg-ip>
ip name-server <rxg-ip>
no ip domain-lookup

Enable SSH and Disable Telnet:

ip ssh server
ip ssh timeout 15
no ip telnet server

Configure RADIUS (if using 802.1X/MAB):

radius-server 1 host <rxg-ip> auth-port 1812 acct-port 1813 timeout 5 retransmit 3 key <radius-secret>
dot1x system-auth-control

Configure SNMP:

For standard firmware: snmp-server community <community-string> ro

For OLS firmware: snmp snmp-server community <community-string> ro

Exit and Save:

exit
copy running-config startup-config
startup1.cfg

Configuration

Connection Settings

Configure the switch in the Network::Wired::Switches scaffold with:

  • Host: Target management IP address
  • MAC Address: Required for auto-bootstrap DHCP lookup
  • Username/Password: SSH credentials
  • Enable Password: If different from login password
  • Management VLAN: VLAN for management traffic (default: 1)
  • Gateway IP: Default gateway for the switch
  • SNMP Community: Community string for monitoring (default: public)

RADIUS / AAA Configuration

When a RADIUS Server Option is active in rXg, the bootstrap process automatically configures:

System-Level Configuration:

radius-server 1 host <rxg-ip> auth-port 1812 acct-port 1813 timeout 5 retransmit 3 key <radius-secret>
dot1x system-auth-control

Port-Level Configuration for MAB:

Ports configured for MAC authentication receive:

interface ethernet <port>
dot1x port-control auto
network-access mode mac-authentication
dot1x operation-mode mac-based-auth
exit

VLAN Configuration

VLANs are automatically managed through Switch Port Profiles:

  • Access ports: Configured with a single untagged (native) VLAN
  • Trunk ports: Configured with tagged VLANs and optional native VLAN
  • VLAN database entries are automatically created/removed as needed

DHCP Snooping Configuration

DHCP snooping is configured through:

  1. Trusted DHCP VLANs on the Switch record - specifies which VLANs have DHCP snooping enabled
  2. DHCP Snooping Trust on Switch Port Profiles - marks uplink ports as trusted

When enabled, the rXg configures:

ip dhcp snooping
ip dhcp snooping vlan <vlan-list>
interface ethernet <trusted-port>
ip dhcp snooping trust

Note: VLAN 1 is automatically included when DHCP snooping is enabled to ensure daisy-chained switches can obtain DHCP addresses during onboarding.

PoE Configuration

PoE power priority can be configured per port through Switch Port Profiles:

  • Priority 1: Critical (highest)
  • Priority 2: High
  • Priority 3: Low (default)

STP Protection

Switch Port Profiles support:

  • Edge Protection: Enables spanning-tree edge port settings
  • STP Protect: Enables BPDU guard and other STP protection features

Monitoring Capabilities

Metric Collection Method Notes
CPU Usage SNMP Collected at configured monitoring interval
Memory Usage SNMP Collected at configured monitoring interval
Port Statistics SNMP Packets in/out, errors, discards
Port Status SNMP Up/down, speed, duplex
LLDP Neighbors SNMP Connected device discovery for automatic port matching
Device Info SSH Serial number, firmware version, MAC address

Firmware Upgrade

Edgecore switches support firmware upgrades via TFTP:

  1. Upload firmware file to rXg via Device Firmwares scaffold
  2. Associate firmware with the switch
  3. Initiate upgrade from the switch record
  4. The rXg:
    • Copies firmware to TFTP directory
    • Connects to switch via SSH
    • Executes interactive copy tftp file command
    • Sets boot image to new firmware
    • Optionally reboots the switch

Firmware Upgrade Commands:

copy tftp file
<tftp-server-ip>
2
<firmware-filename>
<firmware-filename>
boot system opcode:<firmware-filename>
copy running-config startup-config
reload

Troubleshooting

Common Issues

Issue: Switch shows offline in rXg

Symptom: Switch appears offline despite being reachable via ping Cause: SSH connectivity issues or SNMP community mismatch Resolution: - Verify SSH credentials match switch configuration - Check SNMP community string matches - Ensure SSH is enabled on the switch (ip ssh server) - Check firewall rules allow TCP/22 and UDP/161

Issue: Auto-bootstrap fails

Symptom: Switch detected at DHCP IP but bootstrap doesn't complete Cause: SSH key generation timeout or credential issues Resolution: - SSH key generation can take up to 3 minutes - wait for completion - Verify factory default credentials are correct - Check if switch is actually in factory-default state (NTP should be disabled) - Try manual bootstrap via console if SSH fails

Issue: Config sync shows differences but won't apply

Symptom: Config comparison shows changes needed but sync fails Cause: Configuration buffer locked by another session Resolution: - Wait for other CLI sessions to complete - Check for stuck SSH sessions on the switch - Reboot switch if necessary to clear locked sessions

Issue: DHCP snooping blocks legitimate traffic

Symptom: Devices not getting DHCP addresses after enabling snooping Cause: Uplink port not marked as trusted Resolution: - Ensure the Switch Port Profile for uplink ports has "DHCP Snooping Trust" enabled - Verify the path to the DHCP server has all intermediate ports trusted

Issue: Firmware upgrade fails

Symptom: Firmware upload fails or switch doesn't boot new firmware Cause: TFTP connectivity issues or incorrect boot image setting Resolution: - Verify TFTP connectivity from switch to rXg - Check firmware file exists in /space/tftpboot/ - Verify boot image is set correctly with show boot

Diagnostic Commands

show version
show system
show running-config
show interfaces brief
show vlan
show ip dhcp snooping
show ip dhcp snooping binding
show dot1x
show radius statistics
show sntp
show boot
show ip route

Check NTP Status (factory detection): show ntp

Check SSH Status: show ip ssh

Check LLDP Neighbors: show lldp neighbors

Known Limitations

  • SPB-m fabric not supported
  • TFTP is the only supported firmware upload method (HTTP not supported)
  • SSH key generation can take up to 3 minutes on initial bootstrap
  • OLS firmware requires slightly different SNMP configuration syntax

Operational Caveats

  • Factory Detection: The rXg uses NTP/SNTP disabled state to detect factory-default switches. If NTP is manually disabled on a configured switch, it may trigger re-bootstrap.
  • SSH Timeout: SSH server timeout is set to 15 seconds during bootstrap to prevent session exhaustion from failed authentication attempts.
  • Configuration Buffer: Only one session can modify configuration at a time. Config sync will fail if another session has the configuration buffer locked.
  • OLS Firmware: OpenLAN Switch (OLS) firmware is automatically detected and handled. OLS requires the snmp command before configuring SNMP community.
  • Legacy SSH: Older firmware may require legacy SSH algorithms. The rXg automatically falls back to legacy algorithms if modern algorithms fail.
  • Telnet Fallback: For factory-default switches without SSH enabled, the rXg will connect via Telnet, apply bootstrap configuration to enable SSH, then reconnect via SSH.

External References


Cookies help us deliver our services. By using our services, you agree to our use of cookies.