Dell 3548 manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Dell 3548, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Dell 3548 one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Dell 3548. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Dell 3548 should contain:
- informations concerning technical data of Dell 3548
- name of the manufacturer and a year of construction of the Dell 3548 item
- rules of operation, control and maintenance of the Dell 3548 item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Dell 3548 alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Dell 3548, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Dell service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Dell 3548.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Dell 3548 item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    www .dell.com | support.dell.com Dell™ PowerConnect™ 35xx Sy stems User’ s Guide[...]

  • Page 2

    Notes, Cautions, and W arnings NOTE: A NOTE indicates important infor mation that helps you make bett er use of your computer . CAUTION: A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed. WARNING: A W ARNING indicates a potential for property damage, personal injury, or death. ____________________ Inf[...]

  • Page 3

    Contents 3 Contents 1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Sy stem Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 PowerConnect 3524 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 PowerConnect 3524P . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Po[...]

  • Page 4

    4 Contents 2 Hardware Description . . . . . . . . . . . . . . . . . . . . . . . . . . 27 Port Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 PowerConnect 3524 Port Description . . . . . . . . . . . . . . . . . . . 27 The back panel contains an RPS connector , console port, and power connector .. . . . . . . . . . .[...]

  • Page 5

    Contents 5 4 Configuring PowerConnect 3524/P and 3548/P . . . . . . . . . 49 Configuration Procedures . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Booting the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Initial Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Advanced Configuration . .[...]

  • Page 6

    6 Contents Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 Command Mode Overview . . . . . . . . . . . . . . . . . . . . . . . . . 74 User EXEC Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Privileged EXEC Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Global Configuration [...]

  • Page 7

    Contents 7 Configuring Domain Name Sy stems . . . . . . . . . . . . . . . . . . . 154 Defining Default Domains . . . . . . . . . . . . . . . . . . . . . . . . . 157 Mapping Domain Host . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Defining ARP Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 162 Running Cable Diagnostics . . .[...]

  • Page 8

    8 Contents Copying Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Managing Device Files . . . . . . . . . . . . . . . . . . . . . . . . . . 257 Configuring Adva nced Settings . . . . . . . . . . . . . . . . . . . . . . . . 259 Configuring General Settings . . . . . . . . . . . . . . . . . . . . . . . 259 7 Configuring Switc[...]

  • Page 9

    Contents 9 Configuring Multiple Spanning T ree . . . . . . . . . . . . . . . . . . . 343 Defining MSTP Interface Settings . . . . . . . . . . . . . . . . . . . . 347 Configuring VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Defining VLAN Membership . . . . . . . . . . . . . . . . . . . . . . . 352 Defining VLAN Ports Setti[...]

  • Page 10

    10 Contents Viewing the RMON History T able . . . . . . . . . . . . . . . . . . . . . 425 Defining Device RMON Events . . . . . . . . . . . . . . . . . . . . . . 428 Viewing the RMON Events Log . . . . . . . . . . . . . . . . . . . . . . 430 Defining RMON Device Alarms . . . . . . . . . . . . . . . . . . . . . . 431 Viewing Charts . . . . . . . . .[...]

  • Page 11

    Introduction 11 Introduction Dell™ P o werConnect™ 3524/3548 and P owerC onnect 3524P/3548P are stackable, advanced multi-layer devices. P o werConnect units can functio n either as stand-alone, multi-layer , switching devices or stackable devices with up to eight stacking members. This User Guide contains the information needed for installing,[...]

  • Page 12

    12 Introduction PowerConnect 3548 The P owerConnect 3548 provides 48 10/100Mbps ports p lus two SFP ports, and two Copper ports which can be used to forward traffic in a stand-alone devi ce, or as stacking ports when the device is stack ed. The device also provides one RS-232 console port. The P owerConnect 3548 is a stackable device, but also func[...]

  • Page 13

    Introduction 13 Understanding the Stack T opology The P owerConnect 35xx series systems operates in a R ing topology . A stacked Ring topology is wher e all devices in the stack are connected to each other formin g a circle. Each device in the stack accepts data and sends it to the device to which it is attached. Th e packet continues through the s[...]

  • Page 14

    14 Introduction The device units are shipped with a default Unit ID of the stand-alone unit. If t he device is operating as a stand-alone unit, all stacking LEDs are off. Once the user selects a different Unit ID, it is not erased, and remains valid, even if the unit is r eset. Unit ID 1 and Unit ID 2 are r eserv ed for Master enabled units. Unit I[...]

  • Page 15

    Introduction 15 Each port in the stack has a specific Unit ID, port type, and port num ber , which are part of both the configuration commands and the configuration files. Configuration files are managed only from the device Stack Master , including: • Saving to the FLASH • Uploading Configuration files to an external TFTP Server/HTTP Client ?[...]

  • Page 16

    16 Introduction Figure 1-4. PowerConnect 3548/P replaces PowerC onnect 3548/P • If a P owerConnect 3548/P replaces P owerConnect 3524/P , the first 3548/P 24 FE ports r eceive the 3524/P 24 FE port configuration. Th e GE port configurations rema in the same. The r emaining ports receive the default port configuration. Figure 1-5. PowerConnect 352[...]

  • Page 17

    Introduction 17 Figure 1-6. PowerConnect 3548/P port replaces PowerConect 3524/P Port Switching from the Stack Master to the Backup Stack Master The Backup Master replaces the Stack Master if the following events occur: • The Stack Master fails or is removed from the stack. • Links from the Stack Master to the stacking members fails. • A soft[...]

  • Page 18

    18 Introduction •P D A s • Audio and video r emote monitoring F or more information about P ower over Et hernet, see "Managing P ower over Ethernet". Head of Line Blocking Prevention Head of Line (HOL) blocking results in traffic delays and frame loss caused by traffic competing for the same egress port r esources. T o prevent HOL blo[...]

  • Page 19

    Introduction 19 The P owerConnect 35xx series systems enhances auto negotiation by providing port advertisement. P ort advertisement allows the system administrator to configure the port speeds that ar e advertised. F or more information on auto-negotiation, see "Definin g P ort Configuration" or "Defining LAG P arameters." Vo i[...]

  • Page 20

    20 Introduction VLAN-aware MAC-based Switching The device always performs VLAN-aware bridging. Classic bridging(IEEE802.1D) is not performed, where frames ar e forwarded based only on their destination MAC addr ess. However , a similar functionality can be configured for untagged frames . F rames addressed to a destination MAC addr ess that is not [...]

  • Page 21

    Introduction 21 VLAN Supported Features VLAN Support VLANs are collections of switching ports that comprise a single broadcast domain. P ackets ar e classified as belonging to a VLAN based on either the VLAN ta g or based on a combination of the ingress port and packet contents. P ack ets sharing common at tributes can be grouped in the same VLAN. [...]

  • Page 22

    22 Introduction Fast Link STP can take up to 30-60 seconds to conver ge. Durin g this time, STP detects possible loops, allowing time for status changes to propagate and for relevant devices to r espond. 30-60 seconds is considered too long of a response time for many applications. The F ast Link option bypasses this delay , and can be used in netw[...]

  • Page 23

    Introduction 23 BootP and DHCP Clients DHCP enables additional setup para meters to be r eceived from a network server upon system startup. DHCP service is an on-going process. DHCP is an extension to BootP . F or more information on DHCP , see "Def ining DHCP IPv4 Interface P arameters." Quality of Service Features Class Of Service 802.1[...]

  • Page 24

    24 Introduction TF TP T rivial File T ransfer Protocol The device supports boot image, software, an d configuration upload/download via TFTP . Remote Monitoring Remote Monitoring (RMON) is an extension to SNMP , which provides compr ehensive network traffic monitoring capabilities (as opposed to SNMP which allows network device management and monit[...]

  • Page 25

    Introduction 25 802.1ab (LLDP-MED) The Link Layer Discovery P rotocol (LLDP) allows network managers to troubleshoot and enhance network management by discovering and mainta ining network topologies over multi-vendor environments. LLDP discovers network neighbors by standardizing methods for network devices to advertise themselves to other systems [...]

  • Page 26

    26 Introduction SSH Secure Shell (SSH) is a protocol that provides a secur e, remote connection to a device. SSH version 2 is currently supported. The SSH serv er featur e enables an SSH client to establish a secure, encrypted connection with a device. This connection provides func tionality that is similar to an inbound telnet connection. SSH uses[...]

  • Page 27

    Hardware Description 27 Hardware Description Port Description PowerConnect 3524 Port Description The Dell™ P owerConnect™ 3524 device is configured with the following ports: • 24 F ast Ethernet ports — RJ-45 ports designated as 10/100Base- T ports • 2 F iber ports — Designated as 1000Base- X SFP ports • 2 Gigabit ports — Designated [...]

  • Page 28

    28 Hardware Description There ar e two buttons on the front panel. The Stack ID button is used to select the unit number . The second button is the Reset Button which is used to manually reset the device. The Reset button does not extend beyond the unit’s fr ont panel surface, so r eset by pressing it accidentally is prevented. On the front panel[...]

  • Page 29

    Hardware Description 29 The front panel contains 48 RJ-45 ports number 1-48. The upper row of ports is marked by odd numbers 1-47, and the lower row of ports is marked with ev en numbers 2-48. In addition, the front panel also contains ports G1 - G2 which are fiber ports and por ts G3- G4 which ar e copper ports. P orts G3- G4 can either be used as[...]

  • Page 30

    30 Hardware Description Phy sical Dimensions Th e P owerConnect 3524/P and P owerConnect 3548/P devi ces have the following physical dimensions: P oE Model: • Wid th — 440 mm (17.32 inch) • Depth — 387 mm (15.236 inch) • Height — 43.2 mm (1.7 inch) Non-P oE Device: • Wid th — 440 mm (17.32 inch) • Depth — 257 mm (10.118 inch) ?[...]

  • Page 31

    Hardware Description 31 The following figure illustrates the 100 Base- T LEDs. Figure 2-7. RJ-45 1000 BaseT LED The RJ-45 LED indications for P o werConnect 352 4 and P owerConnect 3548 are described in the following table: T able 2-1. PowerConnect 3524 and PowerConnect 3548 RJ-45 100BaseT LED Indications LED Color Description Link/Activity/Speed G[...]

  • Page 32

    32 Hardware Description The RJ-45 LED indications for P o werConnect 3524P and P owerConnect 3548P are described in the following table: Gigabit Port LEDs The following table describes t he Gigabit (stacking port) LEDs: T able 2-2. PowerConnect 3524P and PowerConnect 3548P RJ -45 Copper based 10 0BaseT LED Indications LED Color Description Speed/Li[...]

  • Page 33

    Hardware Description 33 SFP LEDs The SFP ports each have one LED marked as LNK/A CT . On the P owerConnect 3524/P and P owerConnect 3548/P devices, the LEDs are lo cated between ports and ar e round in shape. The following figures illustrate the LEDs on each device. Figure 2-8. SFP Port LEDs The SFP port LED indications are described in the followi[...]

  • Page 34

    34 Hardware Description The following table describes the system LED indications. The Stacking LEDs indicate the unit po sition in the stack. The following figure illustrates the LEDs on the front panel. Figure 2-10. Stacking LEDs T able 2-5. Sy stem LED Indicators LED Color Description P ower Supply (PWR) Gr een Static The switch is turned on. OFF[...]

  • Page 35

    Hardware Description 35 The Stacking LEDs are number ed 1- 8. Each stacking unit has one stacking LED lit, indicating its Unit ID number . If either Stacking LED 1 or 2 is lit, it in dicates that the device is either the Stack Master or Backup Master . T able 2-6. Stacking LED Indications Power Supplies The device has an internal power supply unit [...]

  • Page 36

    36 Hardware Description Figure 2-11. Power Connection When the device is connected to a di fferent power source, the probabil ity of failure in the event of a power outage decreases. Stack ID Button The device front panel contains a Stack ID button us ed to manually select t he Unit ID for the Stack Master and members. The Stack Master and members [...]

  • Page 37

    Hardware Description 37 Reset Button The P owerConnect 3524/P and P owerC onnect 3548/P switches have a rese t button, located on the front panel, for manual reset of the device. If the Master de vice is r eset, the entire stack is r eset. If only a member unit is reset, the r emain stacking members are not reset. The single reset circuit of the sw[...]

  • Page 38

    38 Hardware Description[...]

  • Page 39

    Installing the PowerConnect 3524 /P and PowerConnect 3548/P 39 Installing the PowerConnect 3524/P and PowerConnect 3548/P Site Preparation The Dell™ P owerConnect™ 3524 /P and P owerConnect 3548/P devices can be mounted in a standard 48.26-am (19-inch) equipment rack, pl aced on a tabletop or mounted on a wall. Before installing the unit, verif[...]

  • Page 40

    40 Installing the PowerConnect 3524/P and PowerConnect 3548/P • Rack-mount kit for rack installation or wall mounting kit • Documentation CD • P roduct Information Guide Unpacking the Device NOTE: Before unpacking the device, inspect the package and immediately report any evidence of damage. 1 Place the box on a clean flat surface. 2 Open the[...]

  • Page 41

    Installing the PowerConnect 3524 /P and PowerConnect 3548/P 41 1 Place the supplied rack-mounting bracket on one side of the device, ensuring that the mounting holes on the device line up to the mounting holes on the rack-mounting bracket. The following figure illustrates wher e to mount the brackets. Figure 3-1. Bracket In stallation for Rack Moun[...]

  • Page 42

    42 Installing the PowerConnect 3524/P and PowerConnect 3548/P Installing the Device on a Wall 1 Place the supplied wall-mounting bracket on one side of the device, ensuring that the mounting holes on the device line up to the mounting holes on the rack-mounting bracket. The following figur e illustrates where to mount the brack ets. Figure 3-2. Bra[...]

  • Page 43

    Installing the PowerConnect 3524 /P and PowerConnect 3548/P 43 Figure 3-3. Mounting a Device on a Wall Connecting to a T erminal 1 Connect an RS-232 crossover cable to the ASCII terminal or the serial connector of a desktop system running terminal emulation software. 2 Connect the female DB-9 connector at the other end of the cable to the device se[...]

  • Page 44

    44 Installing the PowerConnect 3524/P and PowerConnect 3548/P Connecting a Device to a Power Supply Connect the supplied AC pow er cable to the A C power connector on the back panel. NOTE: Do not connect the power cable to a grounded AC outlet at this time. C onnect the device to a power source in the steps detailed in "Starting and Configurin[...]

  • Page 45

    Installing the PowerConnect 3524 /P and PowerConnect 3548/P 45 Stacking PowerConnect 35xx Series Sy stems Switches Each P owerConnect 35xx series systems stack conta ins a single Master unit, and may have a Master Backup unit, while the remaining units ar e considered stacking Members. P owerConnect 35xx series systems switches use the RJ-45 Gigabi[...]

  • Page 46

    46 Installing the PowerConnect 3524/P and PowerConnect 3548/P Figure 3-6. Stacking Configura tion and Identification Panel Each stack device has a unique identifying unit ID that defines the unit’s position and function in the stack. If the device is a stand-alone unit, the Stack LED is not illuminated. The default setting is stand-alone. The uni[...]

  • Page 47

    Installing the PowerConnect 3524 /P and PowerConnect 3548/P 47 6 Selection P r ocess — T o advance the stacking ID LED number , continue pressing the Stack ID button. When LED 8 is flashing, pressing the Stack ID button r e sults in the device being co nfigured as a stand-alone. P ressing the Stack ID button again advances the Stack ID to 1. Unit[...]

  • Page 48

    48 Installing the PowerConnect 3524/P and PowerConnect 3548/P 3 Set the data rate to 9600 baud. 4 Set the data format to 8 data bits, 1 stop bit, and no parity . 5 Set flow control to non e. 6 Under P roperties, select VT100 for Emulation mode. 7 Select T erminal keys for F unction, Arrow , and Ctrl keys. Ensur e that the setting is for T erminal k[...]

  • Page 49

    Configuring PowerConnect 3524/P and 3548/P 49 Configuring PowerConnect 3524/P and 3548/P Configuration Procedures After all the device external connections ar e comple ted, a terminal is connected to the device to monitor the boot and other procedures. The or der of installation and configuration procedures is illustrated in the following figure: N[...]

  • Page 50

    50 Configuring PowerConnect 3524/P and 3548/P Booting the Switch When the power is turned on with the local terminal already connec ted, the switch goes through power-on self -test (POST). POST runs every time the device is initialized and checks hardware components to determine if the device is fully operati onal before completely booting. If a cr[...]

  • Page 51

    Configuring PowerConnect 3524/P and 3548/P 51 • Device IP address • Default Gateway IP address The following is displayed: Welcome to Dell Easy Setup Wizard The Setup Wizard guides you through the initial switch configuration, and gets you up and running as quic kly as possible. You can skip the setup wizard, and enter CLI mode to manual ly con[...]

  • Page 52

    52 Configuring PowerConnect 3524/P and 3548/P Enter [Y] to continue the Setup W iza rd. The following is displayed: To setup the SNMP management account you must spe cify the management system IP address and the "community string" or password that the particular management s ystem uses to access th e switch. The wizard automatically assig[...]

  • Page 53

    Configuring PowerConnect 3524/P and 3548/P 53 Wizard Step 3 The following is displayed: Next, an IP address is setup. The IP address is defined on the def ault VLAN (VLAN #1), of which all ports are members. This is the IP address you use to access the CLI, Web interface, or SNMP int erface for the switch .To setup an IP address: Please enter the I[...]

  • Page 54

    54 Configuring PowerConnect 3524/P and 3548/P Enter [Y] to complete the Setup W i zard. The following is displayed: Configuring SNMP ma nagement interface Configuring user account...... Configuring IP and subnet...... Thank you for using Dell Easy Setu p Wizard. You will now enter CLI mode. Wizard Step 6 The CLI prompt is displayed. Advanced Config[...]

  • Page 55

    Configuring PowerConnect 3524/P and 3548/P 55 • Assigning Dynamic IP Addresses (on a VLAN): console# configure console(config)# interface ethernet vlan 1 console(config-if)# ip address dhcp hostname device console(config-if)# exit console(config)# The interface receives the IP addr ess automatically . 3 T o verify the IP address, enter the show i[...]

  • Page 56

    56 Configuring PowerConnect 3524/P and 3548/P Receiving an IP Address From a BOOTP Server The standard BOOTP protocol is supported and enables the device to automatically download its IP host configuration from any standard BOOTP server in the network. In this case, the device acts as a B OOTP client. T o retrieve an IP address from a BOOTP server:[...]

  • Page 57

    Configuring PowerConnect 3524/P and 3548/P 57 Configuring Security Passwords The security passwords can be configur ed for the following services: • T erminal • T elnet • SSH •H T T P •H T T P S NOTE: Passwords are user -defined. NOTE: When creating a user name, the default priority is 1, which allo ws access but not configuration rights.[...]

  • Page 58

    58 Configuring PowerConnect 3524/P and 3548/P console(config-line)# enable authentication default console(config-line)# password bob • When initially logging onto a device through a T elnet session, enter bob at the password prompt. • When changing a device mode to enable, enter bob . Configuring an Initial SSH password T o configure an initial[...]

  • Page 59

    Configuring PowerConnect 3524/P and 3548/P 59 Configuring Login Banners Y ou can define 3 types of login banners: • Message-of -the-Day Banner: Displayed when the user is connected to the device, before the user has logged in. • Login Banner: Displayed after the Message-of -the-Day Banner , and before the user has logged in. • Exec Banner: Di[...]

  • Page 60

    60 Configuring PowerConnect 3524/P and 3548/P Ryan board, based on PPC8247 128 MByte SDRAM. I-Cache 16 KB. D-Cache 16 KB. Cache Enabled. Autoboot in 2 seconds - pr ess RETURN or Esc. to abort and enter prom. 2 When the auto-boot message appears, press <Enter> to get the Startup menu. The Startup menu procedures can be done using the AS CII te[...]

  • Page 61

    Configuring PowerConnect 3524/P and 3548/P 61 Flash size is: 16M 01-Jan-xxxx 01:01:07 %CDB-I- LOADCONFIG: Loading running configuration. 01-Jan-xxxx 01:01:07 %CDB-I- LOADCONFIG: Loading startup configuration. Device configuration: CPLD revision: 1.01 Slot 1 - PowerConnect 3 5xx HW Rev. 1.1 ------------------------------------ -- Unit Standalone -- [...]

  • Page 62

    62 Configuring PowerConnect 3524/P and 3548/P Erase FLASH File - option [2] In some cases, the device configuration must be era sed. If the configuration is erased, all parameters configured via CLI, EWS or SNMP must be r econfigured. T o erase the device configuration: 1 F rom the Startup menu, press [2] within two seconds to erase flash file. The[...]

  • Page 63

    Configuring PowerConnect 3524/P and 3548/P 63 Software Download Through TF TP Server This section contains instructions for downloading device software (syste m and boot images) through a TFTP server . The TFTP server must be confi gured befor e downloading the software. Sy stem Image Download The device boots and runs when deco mpressing the syste[...]

  • Page 64

    64 Configuring PowerConnect 3524/P and 3548/P 5 Enter the copy tftp: //{tftp address}/{file name} image command to copy a new system image to the device. When the new image is do wnloaded, it is saved in the area allocated for the other copy of system image (image-2, as given in the example). The following is an e xample of the information that app[...]

  • Page 65

    Configuring PowerConnect 3524/P and 3548/P 65 Boot Image Download Loading a new boot image from t he TFTP server and programming it into the flash updates the boot image. The boot image is loaded when the device is powered on. A user has no control over the boot image copies. T o download a boot image through the TFTP server: 1 Ensure that an IP ad[...]

  • Page 66

    66 Configuring PowerConnect 3524/P and 3548/P Port Default Settings The general information for config uring the device ports includes the short description of the auto-negotiation mechanism and the de fault settings for switching ports. Auto-Negotiation Auto-negotiation enables automatic detection of spee d, duple x mode and flow control on all sw[...]

  • Page 67

    Configuring PowerConnect 3524/P and 3548/P 67 Switching Port Default Settings The following table gives the port default settings. T able 4-1. Port Default Settings Function Default Setting P ort speed and mode 10/100BaseT copper : auto-negotiation 100 Mbps full duplex 10/100/1000BaseT copper / SFP : auto -negotiation1000 Mbps full duplex P ort for[...]

  • Page 68

    68 Configuring PowerConnect 3524/P and 3548/P[...]

  • Page 69

    Using Dell OpenManage Switch Administrator 69 Using Dell OpenManage Switch Administrator This section provides an introduction to the Dell™ OpenManage™ Switch Administrator user interface. Starting the Application NOTE: Before starting the application the IP address must be defined. Fo r more information, see Initial Configuration. 1 Open a web[...]

  • Page 70

    70 Using Dell OpenManage Switch Administrator Figure 5-1. Switch Admi nistrator Components T able 5-1 lists the interface componen ts with their corresponding numbers. T able 5-1. Interface Components Component Description 1 The tree view contains a list of the d iffer ent device features. The branches in the tree view can be e xpanded to vi ew all[...]

  • Page 71

    Using Dell OpenManage Switch Administrator 71 Device Representation The home page contains a graphical repr esentation of the device front panel. Figure 5-2. Dell PowerConnect™ Device Port Indicators The port coloring indicates if a sp ecific port is currently active. P o rts can be the following colors: T able 5-2. PowerConnect Po rt and Stackin[...]

  • Page 72

    72 Using Dell OpenManage Switch Administrator Using the Switch Administrator Buttons This section describes the button s found on the OpenManage Switch Ad ministrator interface. Interface buttons are divided into the following categories: Information Buttons Information buttons provide access to online support an d online help, as well as informati[...]

  • Page 73

    Using Dell OpenManage Switch Administrator 73 Field Definitions F ields which are user -defined can contain between 1 -159 characters, unless otherwise noted on the OpenManage Switch Administrator web page. All letters or characters can be used, ex cept the following: • •/ •: •* •? •< •> •| Accessing the Device Through the CL[...]

  • Page 74

    74 Using Dell OpenManage Switch Administrator T elnet Connection T elnet is a terminal emulation TCP/I P protocol. RS-232 terminals can be virtually connected to the local device through a TCP/IP protocol network. T elnet is an alternative to a local login terminal where a rem o te lo g in i s re qu i red . The device supports up to four simultaneo[...]

  • Page 75

    Using Dell OpenManage Switch Administrator 75 User EXEC Mode After logging into the device, the EXEC command mo de is enabled. The user -level prompt consists of the host name followed by the angle bracket (>). F or example: console> NOTE: The default host name is console unless it has been modified during initial configuration. The User EXEC[...]

  • Page 76

    76 Using Dell OpenManage Switch Administrator Global Configuration Mode Global Configuration commands apply to system features, rather than a specific protocol or interface. T o access Global Configuration mode, at t he Privileged EXEC Mode prompt, type the configure command and press <Enter>. The Global Configuration mode displays as the dev[...]

  • Page 77

    Configuring Sy stem Information 77 Configuring Sy stem Information This section provides information This page provid es links for defining system parameters including security features, downloading switch softwa r e, and resetting the switch. T o open the System page, Click a link below to access on -line help for the indicated screen. Click Syste[...]

  • Page 78

    78 Configuring Sy stem Information • "Managing Management Security" on page 170 • "Configuring LLDP and MED" on page 205 • "Defining SNMP P arameters" on page 219 • "Managing F iles" on page 246 • "Configuring Advanced Settings" on page 259 Defining General Switch Information The General p[...]

  • Page 79

    Configuring Sy stem Information 79 Figure 6-2. Asset The Asset page contains the following fields: • System Name (0-159 Characters) — Defines the user -defined device name. • System Contact (0-159 Characters) — Indicates the name of the contact person. • System Location (0-159 Characters) — The location where the system is curr ently ru[...]

  • Page 80

    80 Configuring Sy stem Information • Unit No . — Indicates the unit number for which the device asset information is displayed. • Serv ice T ag — The service refer ence number used when servicing the device. • Asset T ag (0-16 Characters) — Indicates the user -defined device reference. • Serial No . — The device serial number . Defi[...]

  • Page 81

    Configuring Sy stem Information 81 The following is an example of defining the device ho st name, system contact and device location as well as setting the time and date of the system clock using the CLI commands: The following is an example of displaying system information for a stand-alone device using the CLI commands: console(config)# hostname [...]

  • Page 82

    82 Configuring Sy stem Information The following is an example of disp laying system information for a st ack ed devices using the CLI commands: Main Power Supply Status: OK Fan 1 Status: NOT OPERATIONAL Fan 2 Status: NOT OPERATIONAL Temperature (Celsius): 30 Temperature Sensor Status: OK console# show system id Unit Serial number Ass et tag Servic[...]

  • Page 83

    Configuring Sy stem Information 83 Unit Main Power Supp ly Redundant Power Supply ---- ----------------- ---------------------- 1O K 2O K 3O K 4O K 5O K O K 6O K O K 7O K O K 8O K O K Unit Fan1 Fan2 Fan3 Fan4 Fan5 ---- ---- ---- ---- ---- ---- 1O K O K 2O K O K 3O K O K 4O K O K 5O K O K O K O K O K 6O K O K O K O K O K 7O K O K O K O K O K 8O K O [...]

  • Page 84

    84 Configuring Sy stem Information Defining Sy stem T ime Settings The T ime Synchronization page contains fields for defining syst em time parameters for both the local hardwar e clock, and the external SNTP clock. If the system time is kept using an e xternal SNTP clock, and the external SNTP clock fails, and the system time r everts to the local[...]

  • Page 85

    Configuring Sy stem Information 85 • Ireland — Last weekend of March until the last weekend of October . • Israel — V aries year-to-year . • Italy — Last weekend of March until the last week end of October . • Japan — Japan does not operate Daylight Saving Time. • Jordan — Last weekend of March until the last week en d of Octobe[...]

  • Page 86

    86 Configuring Sy stem Information F or more information on SNTP , see "Configuring SNTP Settings" on page 104. T o open the Time Synchronization page, click System → General → T ime Synchronization in the tree view . Figure 6-3. T ime Synchronization The T ime Synchronization page contains the following fields: • Clock Source — T[...]

  • Page 87

    Configuring Sy stem Information 87 There ar e two types of daylight settings, either by a specif ic date in a particular ye ar or a recurring setting irrespective of the year . F or a specific setting in a particular year complete the Daylight Savings area, and for a recurring setting, complete the R ecurring area. • Daylight Savings — Enables [...]

  • Page 88

    88 Configuring Sy stem Information • Fr o m — Defines the time that DST begins each ye ar . F or example, DST begins locally every second Sunday in April at 5:00 am. The possible field values are: – Day — The day of the week from which DST beg ins every year . The possible field range is Sunday-Saturday . – We e k — The week within the [...]

  • Page 89

    Configuring Sy stem Information 89 The following steps must be complet ed before setting the summer clock: 1 Configure the summer time. 2 Define the time zone. 3 Set the clock. F or example: T able 6-2. Clock Setting CLI Commands The following is an example of the CLI commands: console(config)# clock summer-time recurring usa console(config)# clock[...]

  • Page 90

    90 Configuring Sy stem Information Viewing Sy stem Health Information The System Health page displays physical device information, includ ing information about the device’s power and ventilation sources. T o open the System Health page, click System → General → Health in the tree view . Figure 6-4. Sy stem Health The System Health page contai[...]

  • Page 91

    Configuring Sy stem Information 91 T able 6-3. Celsius to Fahrenheit Conversion T able Viewing Sy stem Health Inform ation Using the CLI Commands The following table summarizes the equivalent CL I commands for viewing fields displayed on the System Health page. The following is an e xample of the system health CLI command. Celsius Fahrenheit 0 32 5[...]

  • Page 92

    92 Configuring Sy stem Information Managing Power over Ethernet P ower over Ethernet (P oE) provides power to devices over existing LAN cabling, without updating or modifying the network infrastructu re. P ower over Ethernet removes the necessity of placing network devices next to power sources. P owered Devices ar e devices which receive power fr [...]

  • Page 93

    Configuring Sy stem Information 93 Figure 6-5. Power Over Ethernet The P ower Over Ethernet page contains the following sections: • Global • P ort Settings[...]

  • Page 94

    94 Configuring Sy stem Information Global The P o wer over Ethernet Global Settings se ction contains the following fields: • P ower Status — Indicates the inline power source status. – On — Indicates that the pow er supply unit is functioning. – Off — Indicates that the power supply unit is not functioning. – Fa u l t y — Indicates[...]

  • Page 95

    Configuring Sy stem Information 95 – T est — Indicates the power ed device is being teste d. F or example, a power ed device is tested to confirm it is receiving p ower from the power supply . –O t h e r F a u l t — – Unknown — • P ower Prio rity L evel — Determines the port priorit y if the power supply is low . The port power prio[...]

  • Page 96

    96 Configuring Sy stem Information Defining PoE Settings 1 Open the P ower Over Ethernet page. 2 Define the fields. 3 Click Apply Changes . P o E settings are defined, and the device is updated. Displaying PoE Set tings for All Ports 1 Open the P ower Over Ethernet page. 2 Click Show All . The P ower Over Ethernet T able opens. Figure 6-6. Power Ov[...]

  • Page 97

    Configuring Sy stem Information 97 The following is an example of the P oE CLI commands. Console> enable Console# show power inline Unit Power Nominal Power Con sumed Power Usage Threshold 1 On 370 Watts 0 Watts (0%) 95 Disable 2 Off 1 Watts 0 Watts (0%) 95 Disable 3 Off 1 Watts 0 Watts (0%) 95 Disable 4 Off 1 Watts 0 Watts (0%) 95 Disable 5 Off[...]

  • Page 98

    98 Configuring Sy stem Information Viewing V ersion Information The Ve r s i o n s page contains information about the har dwar e and software versions currently running. T o open the V ersions page, click System → General → Ve r s i o n s in the tree view . Figure 6-7. V ersions The Ve r s i o n s page contains the following fields: • Unit N[...]

  • Page 99

    Configuring Sy stem Information 99 Displaying Device V ersions Using the CLI The following table summarizes the equivalent CL I commands for viewing fields displayed in the Ve r s i o n s page. The following is an example of the CLI commands: Managing Stack Members The Stack Management page allows network managers to switch stack control between un[...]

  • Page 100

    100 Configuring Sy stem Information Switching Between Stack Masters 1 Open the Stack Management page. 2 Check the Switch Stack Control from Unit 1 to Unit 2 check box. 3 Click Apply Changes . A confirmation message displays. 4 Click OK . The device is reset. After the device is r eset, a prompt for a user name and password displays. Managing Stacks[...]

  • Page 101

    Configuring Sy stem Information 101 Resetting the Device 1 Open the Res et page. 2 Select a unit in the Rese t Unit Number field. 3 Click Apply Changes. A confirmation message displays. 4 Click OK . The device is reset. After the device is r eset, a prompt for a user name and password is displayed. 5 Enter a user name and password to r econnect to [...]

  • Page 102

    102 Configuring Sy stem Information Time sources ar e established by Stratums. Stratu ms define the accuracy of the reference clock. The higher the stratum (where zero is the highest), t he mor e accurate the clock. The switch receives time from stratum 1 and above. The fo llowing is an example of stratums: • Stratum 0 — Indicates a real time c[...]

  • Page 103

    Configuring Sy stem Information 103 The device retrieves synchronization inf ormation, either by actively r eques ting information or at every poll interval. If Unicast, Anycast and Broadcast polling ar e enabled, the information is r etrieved in this order : • Information from servers defined on the device is preferr ed. If Unicast polling is no[...]

  • Page 104

    104 Configuring Sy stem Information The SNTP Global Settings page contains the following fields: • P oll Interval (60-86400) — Defines the interval (in seconds) at which the SNTP server is polled for Unicast information. By default, the poll interval is 1024 seconds. • Rece ive Broadcast Ser vers Updates — Listens to the SNTP servers for Br[...]

  • Page 105

    Configuring Sy stem Information 105 Defining SNTP Authentication Methods The SNTP Authentication page enables SNTP authentication be tween the device and an SNTP server . The means by which the SNTP server is authenticated is also selected in the SNTP Authentication page. Click System → SNTP → Authentication in the tree view to open the SNTP Au[...]

  • Page 106

    106 Configuring Sy stem Information Adding an SNTP Authentication Key 1 Open the SNTP Authentication page. 2 Click Add . The Add Authentication K ey page opens. Figure 6-12. Add Authentication Key 3 Define the fields. 4 Click Apply Changes . The SNMP authentication key is added, and the device is updated. Displaying the Authentication Key T able 1 [...]

  • Page 107

    Configuring Sy stem Information 107 Deleting the Authentication Key 1 Open the SNTP Authentication page. 2 Click Show All . The Authentication K ey T able opens. 3 Select an Authentication K ey T able entry . 4 Select the Rem ov e check box. 5 Click Apply Changes . The entry is removed, and the device is updated. Defining SNTP Authentication Settin[...]

  • Page 108

    108 Configuring Sy stem Information Figure 6-14. SNTP Servers The SNTP Servers page contains the following fields: • SNTP Server — Select a user -defined SNTP server IP address. Up to eight SNTP servers can be defined. • P oll Interval — P olls the selected SNTP Server for system time information, when enabled. • Encryption K ey ID — In[...]

  • Page 109

    Configuring Sy stem Information 109 • Offset (msec) — Timestamp differ ence between the device loca l clock and the acquired time from the SNTP server . • Delay (msec) — The amount of time it takes to r each the SNTP server . • Re move — Removes a specific SNTP server from the SNTP Servers list. – Checked — Removes the selected SNTP[...]

  • Page 110

    110 Configuring Sy stem Information 3 Define the fields. 4 Click Apply Changes . The SNTP Server is added, and the device is updated. Displaying the SNTP Server T able 1 Open the SNTP Servers page. 2 Click Show All. The SNTP Servers T able opens. Figure 6-16. SNTP Servers T able Modifying an SNTP Server 1 Open the SNTP Servers page. 2 Click Show Al[...]

  • Page 111

    Configuring Sy stem Information 111 Defining SNTP Servers Se ttings Using CLI Commands The following table summarizes the equivalent CL I commands for setting fields displayed in the SNTP Server page. The following is an example of the CLI commands: Defining SNTP Interfaces The SNTP Broadcast Interface T able page contains SNTP interface informatio[...]

  • Page 112

    112 Configuring Sy stem Information The SNTP Broadcast Interface T able page contains the following fields: • Unit No . — Indicates the stacking member on wh ich the SNTP interface is enabled. Interface — Contains an interface list on which SNTP can be enabled: • Receive Servers Updates — Enables or disables SNTP on the specific interface[...]

  • Page 113

    Configuring Sy stem Information 113 The following is an example of the CLI commands for displaying SNTP interfaces: Managing Logs The Log s page contains links to various log pages. T o open the Log s page, click System → Logs in the tree view . This section contians the following topics: • "Defining Global Log P arameters" on page 11[...]

  • Page 114

    114 Configuring Sy stem Information Defining Global Log Parameters The System Logs enable viewing device events in real time, and r ecording the events for later usage. System Logs record and manage events and r eport errors or informational messages. Event messages have a unique format, as per the Sy stem Logs protocol recommended message format f[...]

  • Page 115

    Configuring Sy stem Information 115 The Logs - Global P arameters page contains fields for defining whic h events are r ecorded to which logs. It contains fields for enabling logs globally , and f ields for defining log parameters. The Severity log messages are listed from the highest severity to the lowest. T o open the L ogs - Global P arameters [...]

  • Page 116

    116 Configuring Sy stem Information • Log Management Access Events — Enables or disables generating logs when the device is accessed using a management method. F or example, each time the device is accessed using SSH, a device log is generated. • Severity — Displays the severity logs. The following are th e severity log levels. When a sever[...]

  • Page 117

    Configuring Sy stem Information 117 The following is an example of the CLI commands: T able 6-14. Global Log Parameters CLI Commands CLI Command Description logging on Enables error message logging. logging { ipv4-addr ess | ipv6-addr ess | hostname } [ port port ] [ severity level ] [ facility facility ] [ description text ] Logs messages to a sys[...]

  • Page 118

    118 Configuring Sy stem Information Viewing the RAM Log T able The RAM Log T able contains information about log entries k ept in RAM, including the time the log was entered, the log severity , and a des cription of the log. T o open the RA M L o g T a b l e , click System → Logs → RAM L og in the tree view . Figure 6-20. RAM Log T able The R A[...]

  • Page 119

    Configuring Sy stem Information 119 The following is an example of the CLI commands: console# show logging Logging is enabled. Console Logging: Level info. Console Messages: 0 Dropped. Buffer Logging: Level info. Buffer Messa ges: 124 Logged, 124 Displayed, 200 Max. File Logging: Level error. Fil e Messages: 164 Logged, 126 Dropped. 3 messages were[...]

  • Page 120

    120 Configuring Sy stem Information Viewing the Log File T able The Log F ile T a ble contains information about log entries save d to the Log File in FLASH, including the time the log was entered, the log severity , and a description of the log message. T o open the Log F il e Ta b l e , click System → Log s → Log File in the tr ee view . Figu[...]

  • Page 121

    Configuring Sy stem Information 121 The following is an example of the CLI commands: Viewing the Device Login History The Login History page contains information fo r viewing and monitoring devi ce utilization, including the time the user logged in and the prot ocol used to log on to the device. T o open the L ogin History page, click System → Lo[...]

  • Page 122

    122 Configuring Sy stem Information Figure 6-22. Login History The Login History page contains the following fields: • User Name — Contains a user -defined device user name list. • Login History — Indicates if the Login Hi story logs are enabled. • Login Time — Indicates the time the selected user logged on to the device. • User Name [...]

  • Page 123

    Configuring Sy stem Information 123 Displaying the Device Logi n History Using CLI Commands The following table summarizes the equivalent CLI co mmands for viewing and setting fields displayed in the Login History page. The following is an example of the CLI commands: Modifying Remote Log Server Definitions The Remote Log Server Settings page conta[...]

  • Page 124

    124 Configuring Sy stem Information Figure 6-23. Remote Log Server Settings The Remote Log Server Settings page contains the following fields: • Available Servers — Contains a list of server s to which logs can be sent. • UDP P ort (1-65535) — The UDP port to which the logs are sent for the selected server . The possible range is 1 - 65535.[...]

  • Page 125

    Configuring Sy stem Information 125 • Severity to Include — The following are the available severity levels: – Emergency —The system is not functioning. – Alert — The system needs immediate attention. – Critical — The system is in a critical state. – Error — A system error has occurred. – Wa r n i n g — A system warning has [...]

  • Page 126

    126 Configuring Sy stem Information Defining a New Server: 1 Open the Remote Log Server Settings page. 2 Click Add. The Add a Log Ser ver page opens. Figure 6-24. Add a Log Server The Add a Log Ser ver page contains the additional field: – New Log Ser ver IP Address — Defines the IP address of the new Log Server . 3 Define the fields. 4 Click A[...]

  • Page 127

    Configuring Sy stem Information 127 Displaying the Remote Log Servers T able: 1 Open the Remote Log Server Settings page. 2 Click Show All . The Log Ser vers T able page opens. Figure 6-25. Log Servers T able Removing a Log Server from the Log Servers T able Page: 1 Open the Remote Log Server Settings page. 2 Click Show All . The Log Ser vers T abl[...]

  • Page 128

    128 Configuring Sy stem Information The following is an example of the CLI commands: Defining IP Addressing The IP Addressing page contains links for assigning interfa ce and default gateway IP addresses, and defining ARP and DHCP parameters for the interfaces. T o open the IP Addressing page, click System → IP Addressing in the tree view . This [...]

  • Page 129

    Configuring Sy stem Information 129 • "Defining Default Domains" on page 157 • "Mapping Domain Host" on page 159 • "Defining ARP Settings" on page 162 Configuring the Internet Protocol V ersion 6 (IPv6) The device functions as an IPv6 co mpliant Host, as well as an IPv4 Host (also known as dual stack). This allow[...]

  • Page 130

    130 Configuring Sy stem Information Figure 6-26. IPv4 Default Gateway The IPv4 Default Gateway page contains the following fields: • User Defined — The device’s Gateway IP address. • Active — Indicates if the Gateway is active. • Remove User Defined — Removes the default gateway . The possible field values are: – Checked — Removes[...]

  • Page 131

    Configuring Sy stem Information 131 Defining a Device’ s IPv4 Gate way Using the CLI Commands The following table summarizes t he equivalent CLI commands for setting fields displayed in the Default Gateway page . The following is an example of the CLI commands: Defining IPv4 Interfaces The IPv4 Interface P arameters page contains fields for assig[...]

  • Page 132

    132 Configuring Sy stem Information The IP Interface P arameters page contains the following parameters: • IP Address — The interface IP address. • P refix L ength — The number of bits that comprise the IP address pr efix. • Interface — The interface type for which the IP address is defined. Select Po r t , LAG , or VLAN . • Ty p e ?[...]

  • Page 133

    Configuring Sy stem Information 133 3 Modify the interface type. 4 Click Apply Changes . The parameters are modified, and the device is updated. Deleting IPv4 Addresses 1 Open the IPv4 Interface P arameters page. 2 Click Show All. The Interface P arameters T able page opens. Figure 6-29. IPv4 Inte rface Parameter T able 3 Select an IP address and s[...]

  • Page 134

    134 Configuring Sy stem Information The following is an example of the CLI commands: Defining DHCP IPv4 Interface Parameters The DHCP IPv4 Interface page contains parameters for defining DHCP clients on device interfaces. T o open the DHCP IPv 4 Interface page , click System → IP Addressing → DHCP I Pv4 Interface in the tree view . Figure 6-30.[...]

  • Page 135

    Configuring Sy stem Information 135 The DHCP IP Interface page contains the following fields: • Interface — The DHCP client interface. Clic k the option button next to Po r t , LAG , or VLAN and select the DHCP client interface. • Host Name — The system name as written in a DHCP Serv er log. This field can contain up to 20 characters. • R[...]

  • Page 136

    136 Configuring Sy stem Information Deleting a DHCP IPv4 Interface 1 Open the DHCP IPv4 Interface page. 2 Click Show All . The DHCP IPv4 Interface T able opens. Figure 6-32. DHCP IPv4 Interface T able 3 Select a DHCP client entry . 4 Select the Rem ov e check box. 5 Click Apply Changes . The selected entry is deleted, and the device is updated. Def[...]

  • Page 137

    Configuring Sy stem Information 137 Defining IPv6 Interfaces The system supports IPv6 hosts. The IPv6 Interface page contains fields for defining IPv6 interfaces. T o open the IPv6 Interface page, click System → IP Addressing → IPv6 Interface in the tree view . Figure 6-33. IPv6 Interface • Interface — The IPv6 interface that has been selec[...]

  • Page 138

    138 Configuring Sy stem Information • Autoconfiguration — Specifies whether IPv6 address assignment on an interface is done by stateless autoconfiguration. When enabled, the router solic itation ND procedure is initiated (to discover a router in order to assign an IP addr ess to the inte rface based on prefixes r eceived with RA messages). When[...]

  • Page 139

    Configuring Sy stem Information 139 • IPv6 Address Origin T ype — Defines the type of configurable static IPv6 address for an interface. The possible values are: – Dyanmic — Indicates the IP address was r eceived from RA. – Static — Indicates the IP address was configur ed by the user . – System — Indicates the IP address was genera[...]

  • Page 140

    140 Configuring Sy stem Information Adding an IPv6 Address to the Current Interface 1 Open the IPv6 Interface page. 2 Click Add IPv6 Address . The Add IPv6 Address page opens. Figure 6-35. Add IPv6 Address 3 Complete the fields on the page. 4 Click Apply Changes . The new address is added, and the device is updated. Modifying IPv6 Interface Paramet[...]

  • Page 141

    Configuring Sy stem Information 141 Defining IPv6 Interfaces Using CLI Commands The following table summarizes the equivalent CL I commands for setting fields displayed in the IPv6 Interface page. T able 6-22. IPv6 Interface CLI Commands CLI Command Description ipv6 enable [ no-autoconfig ] Enables IPv6 processing on an interface. ipv6 address auto[...]

  • Page 142

    142 Configuring Sy stem Information The following is an example of the CLI commands: Defining IPv6 Default Gateway The IPv6 Default Gateway P age provides the ability to manually configure the router of all off -link traffic. The default gateway address is an interfac e that serves as an access point to another network. F or IPv6, the configuration[...]

  • Page 143

    Configuring Sy stem Information 143 T o open the IPv6 Default Gateway page, click System → IP Addressing → IPv6 Default Gateway in the tree view . Figure 6-36. IPv6 Default Gateway • Default Gateway IP Address — Displays the Link Local IPv6 address of the default gateway . • Interface — Specifies the outgoing interface through which the[...]

  • Page 144

    144 Configuring Sy stem Information • State — Displays the default gateway st atus. The possible field values are: – Incomplete — Indicates that address r esolution is in progress and the link-layer addr ess of the default gateway has not yet been determined. – Reachable — Indicates that the default gateway is kn own to have been reacha[...]

  • Page 145

    Configuring Sy stem Information 145 Defining IPv6 Default Gateway Pa rameters Using CLI Commands The following table summarizes the equivalent CL I commands for setting fields displayed in the IPv6 Default Gateway page. Defining IPv6 ISA T AP T unnels The IPv6 ISA T AP T unnel P age defines the tunneling process on the device, which encapsulates IP[...]

  • Page 146

    146 Configuring Sy stem Information T o open the IPv6 ISA T AP T unnel page, click System → IP Addressing → IPv6 ISA T AP T unnel in the tree view . Figure 6-38. IPv6 ISA T AP T unnel • ISA T AP Status — Specifies the status of ISA T AP on the device. The possible field values are: – Enable — ISA T AP is enabled on the device. – Disab[...]

  • Page 147

    Configuring Sy stem Information 147 Defining IPv6 ISA T AP T unnel Pa rameters Using CLI Commands The following table summarizes the equivalent CL I commands for setting fields displayed in the IPv6 ISA T AP T unnel page. The following is an example of the CLI commands: T able 6-24. IPv6 Default Gateway CLI Commands CLI Command Description interfac[...]

  • Page 148

    148 Configuring Sy stem Information Defining IPv6 Neighbors The IPv6 Neighbors P age contains information for defining IPv6 Neighbors which is similar to the functionality of the IPv4 Address Resolution P rotocol (ARP) . IPv6 Neighbors enables detecting Link L ocal addresses within the same subnet, and includes a da tabase for maintaining r eachabi[...]

  • Page 149

    Configuring Sy stem Information 149 • Ty p e — Displays the type of the neighbor discovery ca che information entry . The possible field values are: – Static — Shows static neighbor discovery cache entrie s. If an entry for the specified IPv6 address already e xists in the neighbor discovery cache—as learned through the IPv6 neighbor disc[...]

  • Page 150

    150 Configuring Sy stem Information 3 Complete the fields on the page. 4 Click Apply Changes . The new neighbor is added, and the device is updated. Modifying Neighbor Parameters 1 Open the IPv6 Neighbors page. 2 Select an IP address in the IPv6 Address drop-down menu. 3 Modify the requir ed fields. 4 Click Apply Changes . The parameters are modifi[...]

  • Page 151

    Configuring Sy stem Information 151 3 Select the Rem ov e check box in the desired entry . Alternat ively , select the desired value in the Clear Ta b l e field. The possible filed values are: – Static Only — Clears the the IPv6 Neighbor T able static entries. – Dynamic Only — Clears the IPv6 Neighbor T able dynamic entries. – All Dynamic[...]

  • Page 152

    152 Configuring Sy stem Information Viewing the IPv6 Routes T able The IPv6 Routes T able stores information about IPv6 destinati on prefix es and how they are reached, either directly or indir ectly . The r outing table is used to determine the next-hop addr ess and the interface used for forwarding. Each dynamic entry also has an associated inv a[...]

  • Page 153

    Configuring Sy stem Information 153 Viewing IPv6 Routes T able Pa rameters Using CLI Commands The following table summarizes the equivalent CL I commands for setting fields displayed in the IPv6 Routes T able page. The following is an example of the CLI commands: T able 6-26. IPv6 Default Gateway CLI Commands CLI Command Description traceroute { ip[...]

  • Page 154

    154 Configuring Sy stem Information Configuring Domain Name Sy stems Domain Name System (DNS) converts user -defined do main names into IP addresses. Each time a domain name is assigned the DNS service translates the name into a numeric IP address. F or example, www .ipexample.com is translated into 192.87.56.2. DNS serv ers maintain domain name da[...]

  • Page 155

    Configuring Sy stem Information 155 When defining a new DNS server , the following additional parameters are available: • Supported IP F ormat — Specifies the IP format supported by the server . The possible values ar e: – IPv6 — IP version 6 is supported. – IPv4 — IP version 4 is supported. • IPv6 Address T ype — When the server su[...]

  • Page 156

    156 Configuring Sy stem Information Displaying the DNS Servers T able 1 Open the Domain Naming System (DNS) page . 2 Click Show All. The DNS Server T able opens. Figure 6-45. DNS Server T able Removing DNS Server s 1 Open the Domain Naming System (DNS) page . 2 Click Show All. The DNS Server T able page opens. 3 Select a DNS Server T able entry . 4[...]

  • Page 157

    Configuring Sy stem Information 157 Configuring DNS Servers Using the CLI Commands The following table summarizes the CLI comman ds for configuring device system information. The following is an example of the CLI commands: Defining Default Domains The Default Domain Name page provides information for defin ing default DNS domain names. T o open th[...]

  • Page 158

    158 Configuring Sy stem Information The Default Domain Name page contains the following fields: • Default Domain Name (1-158 characters) — Contains a user -defined default domain name. When defined, the default domain name is applied to all unqualified host names. • Ty p e — The IP address type. The possible field values ar e: – Dynamic ?[...]

  • Page 159

    Configuring Sy stem Information 159 Mapping Domain Host The Host Name Mapping page provides parameters for assign ing IP addresses to static host names. On this page, one IP address per host can be assigned. T o open the Host Name Mapping page, click System → IP Addressing → Host Name Mapping in the tree view . Figure 6-47. Host Name Mapping Th[...]

  • Page 160

    160 Configuring Sy stem Information When defining a new host name mapping, the foll owing additional parameters are available: • Supported IP F ormat — Specifies the IP format supported by the host. The possible values are: – IPv6 — IP version 6 is supported. – IPv4 — IP version 4 is supported. • IPv6 Address T ype — When the host s[...]

  • Page 161

    Configuring Sy stem Information 161 Displaying the Hosts Name Mapping T able 1 Open the Host Name Mapping page . 2 Click Show All . The Hosts Name Mapping T able page opens. Figure 6-49. Hosts Name Mapping T able Removing Host Name fr om IP Address Mapping 1 Open the Host Name Mapping page . 2 Click Show All. 3 The Host Mapping T able page opens. 4[...]

  • Page 162

    162 Configuring Sy stem Information The following is an example of the CLI commands: Defining ARP Settings The Address Resolution P rotocol (ARP) converts IP addresses into physical addresses, and maps the IP addr ess to a MAC address. ARP allows a host to communicate with other hosts only when the IP addr ess of its neighbors is known. T o open th[...]

  • Page 163

    Configuring Sy stem Information 163 The ARP Settings page contains the following fields: • Global Settings — Select this option to activate the fields for ARP global settings. • ARP Entry Age Out (1-40000000) — F or all devices, the amount of time (seconds) that passes between ARP requests about an ARP table entry . After this period, the e[...]

  • Page 164

    164 Configuring Sy stem Information Deleting ARP T able Entry 1 Open the ARP Settings page 2 Click Show All. The ARP T able page opens. 3 Select a table entry . 4 Select the Rem ov e check box. 5 Click Apply Changes . The selected ARP T able entry is deleted, and the device is updated. Configuring ARP Using the CLI Commands The following table summ[...]

  • Page 165

    Configuring Sy stem Information 165 Running Cable Diagnostics The Diagnostics page contains links to pages for performi ng virtual cable tests on copper and fiber optic cables. T o open the Diagnostics page, click System → Diagnostics in the tree view . This section contians the following topics: • "Viewing Copper Cable Diagnostics" o[...]

  • Page 166

    166 Configuring Sy stem Information The Integrated Cable T est for Copper Cables page contains the following fields: • Po r t — The port to which the cable is connected. • T est Result — The cable test results. The possible field values ar e: – No Cable — There is no cable connected to the port. – Open Cable — The cable is connected[...]

  • Page 167

    Configuring Sy stem Information 167 In addition to the fields in the Integrated Cable T est for Copper Cables page , the Integrated Cable T est Results T able contains the following field: • Unit No . — The stacking member unit for which the cable is displayed. Performing Copper Cable T ests Using CLI Commands The following table contains the C[...]

  • Page 168

    168 Configuring Sy stem Information Figure 6-53. Optical T ransceiver Diagnostics The Optical T ransceiver Diagnostics page contains the following fields: • Po r t — The port number on wh ich the cable is tested. • T emperature — The temperature (C) at wh ich the cable is operating. • V oltage — The voltage at which the cable is operati[...]

  • Page 169

    Configuring Sy stem Information 169 Figure 6-54. Optical T ransceiver Diagnostics T able In addition to the fields in the Optical T ransceiver Diagnostics page , the Optical T ransceiver Diagnostics Ta b l e contains the following field: • Unit No . — The unit number for which the cable is displayed. • N/A — Not A vailable, N/S - Not Su ppo[...]

  • Page 170

    170 Configuring Sy stem Information Managing Management Security The Management Security page provides access to security pages that contain fields for setting security parameters for device management methods, user authentication databases and servers. T o open the Management Security page , click System → Management Security in the tree view . [...]

  • Page 171

    Configuring Sy stem Information 171 T o open the Access Profiles page, click System → Management Security → Access P rofiles in the tree view . Figure 6-55. Access Profiles The Access P rofiles page contains following fields: • Access P rofile — User -defined Access Profile lists. The A ccess P rofile list contains a default value of Consol[...]

  • Page 172

    172 Configuring Sy stem Information Adding an Access Profile R ules act as filters for determini ng rule priority , the device management method, interface type, source IP address and network mask, and the device mana gement access action. Us ers can be blocked or permitted management access. R ule priority sets the order in which the rules are imp[...]

  • Page 173

    Configuring Sy stem Information 173 • Management Method — The management method for which the access profile is defined. Users with this access profile are denied or permitted access to the device from the selected management method (line). The possible field values are: – All — Assigns all management methods to the rule. – Te l n e t —[...]

  • Page 174

    174 Configuring Sy stem Information 3 Define the Access P rofile Name field. 4 Define the relevant fields. 5 Click Apply Changes . The new Access P rofile is added, and the device is updated. Adding Rules to Access Profile The first rule must be defined to beg inning matching traffic to access profiles. 1 Open the Access P rofile page . 2 Click Add[...]

  • Page 175

    Configuring Sy stem Information 175 Viewing the Profile Rules T able The order in which rules appear in the P rofile Rules T able is important. P ackets ar e matched to the first rule which meets the rule criteria. 1 Open the Access P rofiles page . 2 Click Show All. The P rofile Rules T able page opens. Figure 6-58. Profile Rules T able Removing a[...]

  • Page 176

    176 Configuring Sy stem Information Defining Access Profiles Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Access P rofiles page. T able 6-33. Access Profiles CLI Commands CLI Command Description management access-list name Defines an access-list for management, and enters the acce[...]

  • Page 177

    Configuring Sy stem Information 177 The following is an example of the CLI commands: Defining Authentication Profiles The Authentication P rofiles page contains fields for selectin g the user authentication method on the device. User authentication occurs: •L o c a l l y • Via an e xternal server User authentication can also be set to None . Us[...]

  • Page 178

    178 Configuring Sy stem Information If an error occurs during the authentication, the next selected method is used. T o open the Authentication P rofiles page, click System → Management Security → Authentication P rofiles in the tree view . Figure 6-59. Authentication Profiles The Authentication P rofiles page contains the following fields: •[...]

  • Page 179

    Configuring Sy stem Information 179 Selecting an Authentication Profile: 1 Open the Authentication P rofiles page. 2 Select a profile in the Authentication P rofile Name field. 3 Select the authentication method using the navigati on arrows. The authentication occurs in the order the authentication methods are listed. 4 Click Apply Changes . The us[...]

  • Page 180

    180 Configuring Sy stem Information Displaying the Authentication Profiles T able: 1 Open the Authentication P rofiles page. 2 Click Show All . The Authentication P rofiles T able page opens. Figure 6-61. Authentication Profiles T able Deleting an Authentication Profile: 1 Open the Authentication P rofiles page. 2 Click Show All . The Authenticatio[...]

  • Page 181

    Configuring Sy stem Information 181 The following is an example of the CLI commands: Selecting Authentication Profiles After Authentication P rofiles are defined, the A ut hentication P rofiles can be applied to Management Access methods. F or example, console users can be authenticated by A uthent ication Method List 1, while T elnet users are aut[...]

  • Page 182

    182 Configuring Sy stem Information The Select Authentication page contains the following fields: • Console — Authentication profiles used to authenticate console users. • Te l n e t — Authentication profiles used to authenticate T elnet users. • Secure T elnet (SSH ) — Authentication profiles used to authenticate Secur e Shell (SSH) us[...]

  • Page 183

    Configuring Sy stem Information 183 Assigning Secure HTTP Sessions an Authentication Sequence 1 Open the Select Authentication page. 2 Select an authentication sequence in the Secure HTTP field. 3 Click Apply Changes . Secure HTTP sessions are assign ed an authentication sequence. Assigning Access Authentication Pro files or Sequences Using CLI Com[...]

  • Page 184

    184 Configuring Sy stem Information Managing Passwords P assword management provides increased netwo rk security and improved passwor d control. P asswords for SSH, T elnet, HT TP , HTTPS, and SN MP access are assigned security features, which include: • Defining minimum passwor d lengths • P assword e xpiration • P revents frequent passwor d[...]

  • Page 185

    Configuring Sy stem Information 185 T o open the P assword Management page, click System → Management Security → P assword Management in the tree view . Figure 6-63. Password Management The P assword Management page contains the following fields: • P assword Minimum Length (8-64) — Indicates the minimum password length, when check ed. F or [...]

  • Page 186

    186 Configuring Sy stem Information Password Management Using CLI Commands The following table summarizes the equivalent CL I commands for setting fields displayed in the P assword Management page. The following is an example of the CLI commands: T able 6-36. Password Management Using CLI Commands CLI Command Description password min-length length [...]

  • Page 187

    Configuring Sy stem Information 187 Displaying Active Users The Active Users page displays information about active users on the device. T o open the Active Users page, click System → Management Security → Active Users in the tree view . Figure 6-64. Active Users The Active Users page contains the following fields: • Name — List of user nam[...]

  • Page 188

    188 Configuring Sy stem Information Displaying Active Users Using CLI Commands The following table summarizes the equivalent CLI commands for viewing active users connected to the device. T able 6-37. Active Users CLI Commands The following example shows an e xample of the CLI command: CLI Command Description show users Displays information about a[...]

  • Page 189

    Configuring Sy stem Information 189 Defining the Local User Databases The Local User Database page contains fields for defining users, passwords and access levels. T o open the L ocal User Database page, click System → Management Security → Local User Database in the tree view . Figure 6-65. Local User Database The Local User Database page cont[...]

  • Page 190

    190 Configuring Sy stem Information • Lockout Status — Indicates whether the user currently has access (status Usable ), or whether the user is locked out due to too many failed authentication attempts since the user last logged in successfully (status Loc ke d ). • Reactivate Suspended User — Reactivate the specified user ’s access right[...]

  • Page 191

    Configuring Sy stem Information 191 Displaying the Local User T able : 1 Open the Local User Database page. 2 Click Show All. The Local User T able opens. Figure 6-67. Local User T able Reactivating a Suspended User: 1 Open the Local User Database page. 2 Select a User Name entry . 3 Select the Reactivate Suspended User check box. 4 Click Apply Cha[...]

  • Page 192

    192 Configuring Sy stem Information The following is an example of the CLI commands: Defining Line Passwords The Line P assword page contains fields for defining l ine passwor ds for management methods. T o open the Line P assword page, click System → Management Security → Line P a sswords in the tree view . Figure 6-68. Line Password console(c[...]

  • Page 193

    Configuring Sy stem Information 193 The Line P assword page contains the following fields: • Line P assword/T elnet Line P asswo rd/Secure T elnet Line P assword — P assword settings for Console, T elnet, or Secure T elnet session, respectively . • P assword — The line password for accessing the device. • Confirm P assword — Confirms th[...]

  • Page 194

    194 Configuring Sy stem Information Assigning Line Passwords Using CLI Commands The following table summarizes the equivalent CL I commands for setting fields displayed in the Line Pa s s w o r d page. The following is an example of the CLI commands: Defining Enable Passwords The Enable P assword page sets a local password to control a ccess to Nor[...]

  • Page 195

    Configuring Sy stem Information 195 • Confirm P assword — Confirms the password. The passwor d appears in the ***** format, for security rea s on s . • Aging (1-365) — Indicates the amount of time in days th at elapses before a passwor d is aged out. – Checked — P assword ages out after the specified number of days. – Unchecked — P [...]

  • Page 196

    196 Configuring Sy stem Information Defining T ACACS+ Settings The devices provide T erminal Access Controller Ac cess Control System (T ACACS+) client support. T ACA CS+ provides centralized security for va lidation of users accessing the device. T ACA CS+ provides a centralized user-management system, while still retaining consistency with R ADIU[...]

  • Page 197

    Configuring Sy stem Information 197 The T ACACS+ Settings page contains the following fields: • Host IP Address — Indicates the T ACA CS+ Server IP address. • P riority (0-65535) — Indicates the order in which the T ACA CS+ servers ar e used. The default is 0. • Source IP Address — The device source IP address used fo r the T ACACS+ ses[...]

  • Page 198

    198 Configuring Sy stem Information Figure 6-71. Add T ACACS+ Host 3 Define the fields. 4 Click Apply Changes . The T ACA CS+ server is added, and the device is updated. Displaying the T A CACS+ T able 1 Open the T ACACS+ Settings page. 2 Click Show All . The T ACACS+ T able opens. Figure 6-72. T ACACS+ T able Removing a T ACACS+ Server 1 Open the [...]

  • Page 199

    Configuring Sy stem Information 199 4 Select the Rem ov e check box. 5 Click Apply Changes . The T ACA CS+ server is removed, and the device is updated. Defining T ACACS+ Settings Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the T ACACS+ Settings page. T able 6-41. T ACACS+ CLI Comman[...]

  • Page 200

    200 Configuring Sy stem Information The following is an example of the CLI commands: Configuring RADIUS Settings Remote Authorization Dial-In User Service (R ADIUS) servers provide additional security for networks. Up to four R ADIUS servers can be defined. RADI US servers provide a centralized authentication method for: • T elnet Access • Secu[...]

  • Page 201

    Configuring Sy stem Information 201 Figure 6-73. RADIUS Settings The R ADIUS Settings page contains the following pages: • IP Address — The list of Authentication Server IP addr esses. • P riority (0-65535) — The server priority . The possible values are 0-65535, where 0 is the highest value. This is used to configure the or der in which se[...]

  • Page 202

    202 Configuring Sy stem Information • Dead T ime (0-2000) — Indicates the amount of time (in minut es) that a RADIUS server is bypassed for service requests. The range is 0-2000. • K ey String (0-128 Characters) — The Key string used for authentica ting and encrypting all R ADIUS communications between the device and the R ADIUS server . Th[...]

  • Page 203

    Configuring Sy stem Information 203 Adding a RADIUS Server: 1 Open the R ADIUS Settings page. 2 Click Add . The Add R ADIUS Server page opens. Figure 6-74. Add RADIUS Server 3 Define the fields. 4 Click Apply Changes . The new R ADIUS server is adde d, and the device is updated. Displaying the RADIUS Server List: 1 Open the R ADIUS Settings page. 2[...]

  • Page 204

    204 Configuring Sy stem Information Removing a RADIUS Serv er 1 Open the R ADIUS Settings page. 2 Click Show All . The R ADIUS Ser vers List opens. 3 Select a R ADIUS Ser vers List entry . 4 Select the Rem ov e check box. 5 Click Apply Changes . The R ADIUS server is removed, and the device is updated. Defining RADIUS Servers Using CLI Commands The[...]

  • Page 205

    Configuring Sy stem Information 205 The following is an example of CLI commands: Configuring LLDP and MED The Link Layer Discovery P rotocol (L LDP) allows network managers to troubleshoot and enhance network management by discovering and maintaining network topologies over multi-vendor environments. LLDP discovers network neighbors by standardizin[...]

  • Page 206

    206 Configuring Sy stem Information LLDP Media Endpoint Discovery (LLDP -MED) increases network fle xibility by allowing different IP systems to co-exist on a single network LLDP . P rovides detailed network topology information, including what device are located on the network, and where the devices ar e located. F or example, what IP phone is con[...]

  • Page 207

    Configuring Sy stem Information 207 Defining LLDP Properties The LLDP P roperties page contains fields for configuring LLDP . T o open the LLDP Properties page, click System → LLDP -MED → LLDP P roperties in the tree view . Figure 6-76. LLDP Properties • Enable LLDP — Indicates if LLDP is enabled on the device. The possible field values are[...]

  • Page 208

    208 Configuring Sy stem Information Configuring LLDP Using CLI Commands The following is an example of the CLI commands: Defining LLDP Port Settings The LLDP P ort Settings page allows network administrators to de fine LLDP port settings, including the port number , the LLDP port number , and t he type of port information advertised. The P ort Sett[...]

  • Page 209

    Configuring Sy stem Information 209 Figure 6-77. Port Settings • Po r t — Contains a list of ports on which LLDP is enabled. • State — Indicates the port type on which LLDP is enabled. The possible field values are: – Tx Only — Enables transmitting LLDP packets only . – Rx Only — Enables receiving LLDP pack ets only . – Tx & R[...]

  • Page 210

    210 Configuring Sy stem Information • Tx Optional TL Vs — Contains a list of optional TL Vs advert ised by the port. F or the complete list, see the Avai lable TL Vs field. • Management IP Address — Indicates the management IP addre ss that is advertised from the interface. – Use Default — Specifies the way TL Vs are included: – Check[...]

  • Page 211

    Configuring Sy stem Information 211 Defining LLDP MED Network Policy The MED Network P olicy page contains fields for configuring LLDP . T o open the MED Network P olicy page, click System → LLDP -MED → MED Network P olicy in the tree view . Figure 6-79. MED Network Policy The MED Network P olicy page contains the following fields: • Network [...]

  • Page 212

    212 Configuring Sy stem Information • VLAN T ype — Indicates the VLAN type for which the net work policy is defined. The possible field values are: – T agged — Indicates the network policy is defined for tagged VLANs. – Untagged — Indicates the network policy is defined for untagged VLANs. • User P riority — Defines the priority ass[...]

  • Page 213

    Configuring Sy stem Information 213 Defining LLDP MED Port Settings The MED P ort Settings contains parameters for assigning LLDP network policies to specific ports. T o open the MED P ort Settings page, click System → LLDP -MED → P ort Settings in the tree view . The MED P ort Settings opens. Figure 6-82. MED Port Settings The MED P ort Settin[...]

  • Page 214

    214 Configuring Sy stem Information • Tx Optional TL Vs/Available TL Vs — Contains a list of available TL Vs that can be advertised by the port. The possible field values are: – Network P olicy — Advertises the network po licy attached to the port. – Loc at ion — Advertises the port’s location. – P oE-PSE — Indicates if the connec[...]

  • Page 215

    Configuring Sy stem Information 215 Figure 6-83. Details Advertise Information Page The Details Advertise Information page contains the following fields: • Po r t — The port for which detail ed information is displayed. • Auto-Negotiation Status — The auto-negotiation status of th e port. The possible field values are: – Enabled — Auto-[...]

  • Page 216

    216 Configuring Sy stem Information • Device ID — The device ID advertised, for example, the device MAC addr ess. • Device T ype — The type of device. • LLDP MED Capabilities — The TL V that is advertised by the port. • LLDP MED Device T ype — Indicates whether a sender is a ne twork connectivity device or an endpoint device. • Po[...]

  • Page 217

    Configuring Sy stem Information 217 Displaying the MED Port Settings T able 1 Open the MED P ort Settings page. 2 Click Show All . The MED P ort Settings T able opens. Figure 6-84. MED Port Settings T able Viewing the LLDP Neighbors Information The Neighbors Information page contains information receive d from neighboring device LLDP advertisements[...]

  • Page 218

    218 Configuring Sy stem Information Removing a Port From the T able 1 Open the Neighbors Information page. 2 Check the Rem ov e checkbox of each port to be removed. 3 Click Apply Changes . The ports are r emoved. Clearing the T able 1 Open the Neighbors Information page. 2 Click Clear Neighbors T able . The table is cleared. Viewing the Details of [...]

  • Page 219

    Configuring Sy stem Information 219 F or information on the fields, refer to t he Details Advertise In formation page above. T able 6-45. LLDP Neighbors Information CLI Commands The following is an example of the CLI commands: Switch# show lldp neighbors Defining SNMP Parameters Simple Network Management P rotocol (SNMP) prov ides a method for mana[...]

  • Page 220

    220 Configuring Sy stem Information The switch supports SNMP notification filters based on Object IDs (OID). OIDs are used by the system to manage switch features. SNMP v3 supports the following featur es: • Security • F eature Access Control •T r a p s Authentication or P rivacy Keys ar e modified in the User Security Model (USM) . SNMPv3 ca[...]

  • Page 221

    Configuring Sy stem Information 221 The SNMP Global P arameters page contains the following fields: • Local Engine ID (10-64 Hex Characters) — Indicates the local device engine ID. The field value is a hexadecimal string. Each byte in he xadecimal charact er strings is two hexadecimal digits. Each byte can be separated by a period or a colon. T[...]

  • Page 222

    222 Configuring Sy stem Information Enabling SNMP Notificatio ns Using CLI Commands The following table summarizes the equivalent CLI co mmands for viewing fields displayed in the SNMP Global P arameters page. The following is an example of the CLI commands: T able 6-46. SNMP Notification Commands CLI Command Description snmp-server enable traps En[...]

  • Page 223

    Configuring Sy stem Information 223 Defining SNMP View Settings SNMP Views provide access or block access to device fe atures or feature aspects. F o r example, a view can be defined which states that SNMP group A has read only (R/O) access to Multicast groups, while SNMP group B has read-write (R/W) access to Multicast gr oups. F eature access is [...]

  • Page 224

    224 Configuring Sy stem Information Figure 6-88. SNMPv3 View Settings The SNMPv3 V iew Settings page contains the following fields: • V iew Name — Contains a list of user -defined views. The view name can contain a maximum of 30 alphanumeric characters. • New Object ID Subtree — Indicates the device feature OID included or e xcluded in the [...]

  • Page 225

    Configuring Sy stem Information 225 Adding a View 1 Open the SNMPv3 V i ew Settings page . 2 Click Add . The Add A V iew page opens. Figure 6-89. Add A View 3 Define the field. 4 Click Apply Changes . The SNMP View is added, and the device is updated. Displaying the View T able 1 Open the SNMPv3 V i ew Settings page . 2 Click Show All . The Vi e w [...]

  • Page 226

    226 Configuring Sy stem Information Defining SNMPv3 Views Using CLI Commands The following table summarizes the equivalent CL I commands for defining fields displayed in the SNMPv3 V iew Settings page. The following is an example of CLI commands: T able 6-47. SNMP View CLI Commands CLI Command Description snmp-server view view -name oid-tree { incl[...]

  • Page 227

    Configuring Sy stem Information 227 Defining SNMP Access Control The Access Control page provides information for creating SNMP groups, and assigning SNMP access control privileges to SNMP groups. Groups allow network managers to assign access rights to specific device features, or featur es aspects. T o o pen the Access Control Group page, click S[...]

  • Page 228

    228 Configuring Sy stem Information • Security Level — The security level attached to the group . Security levels apply to SNMPv3 only . The possible field values are: – No Authentication — Neither the Authentication nor the P r ivacy security levels are assigned to the group. – Authentication — Authenticates SNMP messages, and en sur e[...]

  • Page 229

    Configuring Sy stem Information 229 Displaying the Access T able 1 Open the Access Control Group page. 2 Click Show All . The Access T able opens. Figure 6-93. Access T able Removing SNMP Groups 1 Open the Access Control Group page . 2 Click Show All . The Access T able opens. 3 Select a SNMP group. 4 Check the Rem ov e checkbox. 5 Click Apply Chan[...]

  • Page 230

    230 Configuring Sy stem Information Assigning SNMP User Security The SNMPv3 User Security Model (USM) page enables assigning system users to SNMP groups, as well as defining the user authentication method. T o open the SNMPv3 User Security Model (USM) page , click System → SNMP → User Security Model in the tree view . Figure 6-94. SNMPv3 User S[...]

  • Page 231

    Configuring Sy stem Information 231 • Authentication Method — The authentication method used to authenticate users. The possible field values are: – None — No user authentication is used. – MD5 P assword — Indicates that HMAC-MD5-96 passwor d is used for authentication. The user should enter a password. – SHA P assword — Users are a[...]

  • Page 232

    232 Configuring Sy stem Information Adding Users to a Group 1 Open the SNMPv3 User Security Model (USM) page. 2 Click Add . The Add SNMPv3 User Name page opens. Figure 6-95. Add SNMPv3 User Name 3 Define the relevant fields. 4 Click Apply Changes . The user is added to the group, and the device is updated. Displaying the User Security Model T able [...]

  • Page 233

    Configuring Sy stem Information 233 Deleting an User Security Model T able Entry 1 Open the SNMPv3 User Security Model (USM) page. 2 Click Show All . The User Security Model T able opens. 3 Select a User Security Model T able entry . 4 Check the Rem ov e checkbox. 5 Click Apply Changes . The User Security Model T able entry is deleted, and the devi[...]

  • Page 234

    234 Configuring Sy stem Information Defining SNMP Communities Access rights are managed by defining communities on the SNMP Community page. When the community names are changed, access rights ar e also changed. SNMP Communities are defined only for SNMP v1 and SNMP v2. T o open the SNMP Community page, click System → SNMP → Communities in the t[...]

  • Page 235

    Configuring Sy stem Information 235 • Basic — Enables SNMP Basic mode for a selected com munity . The possible field values are: – Access Mode — Defines the access rights of the co mmunity . The possible field values are: Read-Only — Management access is restricted to r ead -only , and changes cannot be made to the community . Read- W rit[...]

  • Page 236

    236 Configuring Sy stem Information Defining a New Community 1 Open the SNMP Community page. 2 Click Add . The Add SNMP Community page opens. Figure 6-98. Add SNMP Community 3 Complete the relevant fields. 4 Click Apply Changes . The new community is saved, and the device is updated.[...]

  • Page 237

    Configuring Sy stem Information 237 Deleting Communities 1 Open the SNMP Community page. 2 Click Show All . The Community T able page opens. Figure 6-99. Community T able 3 Select a community and check the Remove check box. 4 Click Apply Changes . The community entry is deleted, and the device is updated. Configuring Communities Using CLI Commands [...]

  • Page 238

    238 Configuring Sy stem Information Defining SNMP Notification Filters The Notification F ilter page permits filtering traps based on OIDs. Each OID is linked to a device feature or a featur e aspect. The Notification F i lter page also allows network managers to filter notifications. T o open the Notification F ilter page , click System → SNMP ?[...]

  • Page 239

    Configuring Sy stem Information 239 Adding SNMP Filters 1 Open the Notification F ilter page. 2 Click Add . The Add F ilter page opens. Figure 6-101. Add Filter 3 Define the relevant fields. 4 Click Apply Changes . The new filter is added, and the device is updated. Displaying the Filter T able 1 Open the Notification F ilter page. 2 Click Show All[...]

  • Page 240

    240 Configuring Sy stem Information Removing a Filter 1 Open the Notification F ilter page. 2 Click Show All . The F ilter T able opens. 3 Select a F ilter T able entry . 4 Check the Rem ov e checkbox. The filter entry is deleted, and the device is updated. Configuring Notification Filters Using CLI Commands The following table summarizes equivalen[...]

  • Page 241

    Configuring Sy stem Information 241 T o open the Notification Recipients page, click System → SNMP → Notification Recipient in the tr ee view . Figure 6-103. Notification Recipients The Notification Recipients page contains the following fields: • Recipient IP — Indicates the IP address to whom the traps ar e sent. • Notification T ype ?[...]

  • Page 242

    242 Configuring Sy stem Information SNMPv1,2 SNMP versions 1 and 2 are enabled for the select ed r ecipient. Define the following fields for SNMPv1 and SNMPv2: • Community String (1-20 Characters) — Identifies the community string of the trap manager . • Notification V ersion — Determines the trap type. The possible field values are: – SN[...]

  • Page 243

    Configuring Sy stem Information 243 • IPv6 Address T ype — When the recipient supports IPv6 (see pr evious parameter), this specifies the type of static address supported. The possible values ar e: – Link Local — A Link Local address that is non-routable and used for communication on the same network only . – Global — A globally unique [...]

  • Page 244

    244 Configuring Sy stem Information Displaying Notification Recipients T ables 1 Open Notification Recipients page. 2 Click Show All . The Notification Recipients T ables page opens. Figure 6-105. Notification Recipients T ables Deleting Notification Recipients 1 Open Notification Recipients page. 2 Click Show All . The Notification Recipients T ab[...]

  • Page 245

    Configuring Sy stem Information 245 Configuring SNMP Notification Recipients Using CLI Commands The following table summarizes the equivalent CL I commands for viewing fields displayed in the Notification Recipients page. The following is an example of the CLI commands: T able 6-52. SNMP Community CLI Commands CLI Command Description snmp-server ho[...]

  • Page 246

    246 Configuring Sy stem Information Managing Files Use the F ile Management page to manage device software, the image file, and the configuration files. F iles can be downloaded or upload ed via a TFTP server . The managem ent file structure consists of the following files: • Startup Configuration F ile — Contains the commands requir ed to co n[...]

  • Page 247

    Configuring Sy stem Information 247 Downloading Files The F ile Download from Server page contains fields for download ing system image and Configuration files from the TFTP server or HTTP client to the device. T o open the F ile Download from Server page, click System → F ile Management → F ile Download in the tree view . Figure 6-106. File Do[...]

  • Page 248

    248 Configuring Sy stem Information The F ile Download from Server page contains the following fields: • Supported IP F ormat — Specifies the IP format supported by the server . The possible values ar e: – IPv6 — IP version 6 is supported. – IPv4 — IP version 4 is supported. • IPv6 Address T ype — When the server supports IPv6 (see [...]

  • Page 249

    Configuring Sy stem Information 249 Configuration Download • Server IP Address — The TFTP Server IP Address from whic h the configuration files ar e downloaded. • Source F ile Name (1-64 characters) — Indicates the configuration files to be downloaded. • Destination F ile — The destination file to which the config uration file is downlo[...]

  • Page 250

    250 Configuring Sy stem Information Uploading Files The F ile Upload to Server page contains fields for uploading t he software to the TFTP server from the device. The Image file can al so be uploaded from the F ile Upload to Ser ver page. T o open the F i le Upload to Server page, click System → File Management → F ile Upload in the tree view [...]

  • Page 251

    Configuring Sy stem Information 251 The F ile Upload to Server page contains the following fields: • Supported IP F ormat — Specifies the IP format supported by the server . The possible values ar e: – IPv6 — IP version 6 is supported. – IPv4 — IP version 4 is supported. • IPv6 Address T ype — When the server supports IPv6 (see prev[...]

  • Page 252

    252 Configuring Sy stem Information Configuration Upload • TFTP Ser ver IP Address — The TFTP Server IP Addr ess to which the Configuration file is uploaded. • Destination F ile Name (1-64 Characters) — Indicates the Configuration file path to which the file is uploaded. • T ransfer File Name — The software file to which the config urat[...]

  • Page 253

    Configuring Sy stem Information 253 The following is an example of the CLI commands: Activating Image Files The Active Images page allows network managers to select and re set the Image files. The Active Image file for each unit in a stacking config uration can be individually selected. T o open the Active Images page , click System → F ile Manag[...]

  • Page 254

    254 Configuring Sy stem Information The Active Images page contains the following fields: • Unit No . — The unit number for which the Image file is selected. • Active Image — The Image file which is currently active on the unit. • After Reset — The Image file which is active on the unit af ter the device is rese t. The possible field va[...]

  • Page 255

    Configuring Sy stem Information 255 Copying Files F iles can be copied and deleted from the Copy F iles page. T o open the Copy F i les page, click System → F ile Management → Copy F iles in the tree view . Figure 6-109. Copy Files The Copy F iles page contains the following fields: • Copy Master F irmware — Indicates the firmware file to c[...]

  • Page 256

    256 Configuring Sy stem Information Copying Files 1 Open the Copy F iles page. 2 Define the Source and Destination fields. 3 Click Apply Changes . The file is copied, and the device is updated. Restoring Company Factory Default Settings 1 Open the Copy F iles page. 2 Click Restore Configuration F actory Defaults . 3 Click Apply Changes . The compan[...]

  • Page 257

    Configuring Sy stem Information 257 Managing Device Files The F iles on F ile System page provides information about files currently stor ed on t he system, including file names, file sizes, files modifications, and file permissions. The files system permits managing up to five files, with a maximum size of 0.5 MB per file. T o open the Files on F [...]

  • Page 258

    258 Configuring Sy stem Information Managing Files Using CLI Commands The following table summarizes the equivalent CLI commands for mana ging system files. The following is an example of the CLI commands: T able 6-57. Copy Files CLI Commands CLI Command Description dir Display list of files on a flash file system console# dir Directory of flash: F[...]

  • Page 259

    Configuring Sy stem Information 259 Configuring Advanced Settings Use Advanced Settings to set miscellaneous global attributes of the switch. The changes to these attributes are applied only after the switch is r eset. Click a link below to access on-l ine help for the indicated screen. Click System → Advanced Settings in the tree view to open th[...]

  • Page 260

    260 Configuring Sy stem Information Viewing RAM Log Entries Counter Using the CLI Commands The following table summarizes the equivalent CL I commands for setting fields displayed in the General Settings page. The following is an example of the CLI commands: T able 6-58. General S ettings CLI Commands CLI Command Description logging buffered size n[...]

  • Page 261

    Configuring Switch Information 261 Configuring Switch Information This section provides all system operation and general information for configuring network security , ports, Address tables, GARP , VLANs, Spanning T r ee, P ort Aggregation, and Multicast Support. This section contians the following topics: • "Configuring Network Security&quo[...]

  • Page 262

    262 Configuring Switch Information Port Based Authentication P ort based authentication enables authenticating syste m users on a per -port basis via an external server . Only authenticated and approved system users can tran smit and receive data. P orts are authenticated via the R ADIUS server using the Extensible Authenticat ion P rotocol (EAP). [...]

  • Page 263

    Configuring Switch Information 263 • Multiple Session Mode — Enables only the authorized host for multiple-session access to the port. • Guest VLANs — P rovides limited network access authorized to ports. If a port is denied network access via port based authorization, but the Guest VLAN is enabled, the port receives limited network access.[...]

  • Page 264

    264 Configuring Switch Information The P ort Based Authentication page contains the following fields: • P ort Based Authentication State — P ermits port based authenticati on on the device. The possible field values are: – Enable — Enables port based authentication on the device. – Disable — Disables port based authentication on the dev[...]

  • Page 265

    Configuring Switch Information 265 • Dynamic VLAN Assignment — Indicates whether dynamic VLAN as signment is enabled for this port. This feature allows network administ rators to automatically assign users to VLANs during the RADIUS server authentication. When a user is authenticated by the R A DIUS server , the user is automatically joined to [...]

  • Page 266

    266 Configuring Switch Information • Supplicant T imeout (1-65535) — Indicates the amount of time th at lapses before EAP r equests are resent to the supplicant. The field value is in seconds. The field default is 30 seconds. • Max EAP Requests (1-10) — Indicates that total amount of EA P requests sent. If a r esponse is not received after [...]

  • Page 267

    Configuring Switch Information 267 Enabling Port Based Authentic ation Using the CLI Commands The following table summarizes the equivalent CLI commands for enabli ng the port based authentication as displayed in the P o rt Based Authentication table . T able 7-1. Port Authen tication CLI Commands CLI Command Description aaa authenticati on dot1x d[...]

  • Page 268

    268 Configuring Switch Information The following is an example of the CLI commands: Configuring Advanced Port Based Authentication The Multiple Hosts page provides information for defining advanc ed port based authentication settings for specific ports and VLANs. F or more informa tion on Advanced P ort Based Authentication, see Advanced P ort Base[...]

  • Page 269

    Configuring Switch Information 269 The Multiple Hosts page contains the following fields: • Po r t — The port number for which Advanced P o rt Based Authentication is enabled. • Host Authentication — Defines the host authenticati on type. The possible fields are: –S i n g l e — Enables a single authorized host for single-session access [...]

  • Page 270

    270 Configuring Switch Information Displaying the Multiple Hosts T able 1 Open the Multiple Hosts page. 2 Click Show All . The Multiple Hosts T able opens. Figure 7-4. Multiple Hosts T able The Multiple Hosts T able displays the following additional field: • Unit No . — Selects a stacking member . Enabling Multiple Host s Using the CLI Commands[...]

  • Page 271

    Configuring Switch Information 271 Authenticating Users The Authenticated Users pa ge displays user port access lists. The User Access Lists are defined in the Add User Name page. T o open the Authenticated Users page, click Switch → Network Security → Authenticated Users . Figure 7-5. Authenticated Users The Authenticated Users page contains t[...]

  • Page 272

    272 Configuring Switch Information Displaying the Authenticated Users T able 1 Open the Authenticated Users page. 2 Click Show All . The Authenticated Users T able opens. Figure 7-6. Authenticated Users T able Authenticating Users Us ing the CLI Commands The following table summarizes the equivalent CLI co mmands for authenticating users as display[...]

  • Page 273

    Configuring Switch Information 273 Configuring Port Security Network security can be enhanced by limiting access on a specific port only to users with specific MAC addr esses. The MAC addresses can be dynamicall y learned, up to that point, or they can be statically configured. Locked port security monitors both r eceived and learned packets that a[...]

  • Page 274

    274 Configuring Switch Information The P ort Security page contains the following fields: • Interface — The selected interface type on which Locked P ort is enabled. – Po r t — The selected interface type is a port. – LAG — The selected interface type is a LAG. • Current P ort Status — The currently configur ed P ort status. • Set[...]

  • Page 275

    Configuring Switch Information 275 Displaying the Port Security T able 1 Open the P ort Security page. 2 Click Show All. The P ort Security T able opens. Locked P orts are defined in the P ort Security T able. Figure 7-8. Port Security T able The P ort Security T a ble contains the additional following fields: • Unit No . — Specifies the stacki[...]

  • Page 276

    276 Configuring Switch Information Configuring Locked Port Security with CLI Commands The following table summarizes the equivalent CLI co mmands for configuring L ocked P ort security as displayed in the P ort Security page. The following is an example of the CLI commands: ACL Overview Access Control Lists (ACL) allow network managers to de fine c[...]

  • Page 277

    Configuring Switch Information 277 Defining IP based ACLs Access Control Lists (ACL), which are comprised of Access Contro l Entries (A CE), allow network managers to define classification actions and rules for specific ingress ports. P ackets entering an ingr ess port, with an active ACL, ar e either admitted or denied entry and the ingr ess port [...]

  • Page 278

    278 Configuring Switch Information • ACL Name — User -defined ACLs. • New ACE P riority — ACE priority that determines which A CE is matched to a packet based on a first-match basis. • P rotocol — Enables creating an A CE based on a spec ific protocol. The possible field values are: – IP — Internet P rotocol (IP). Specifies the form[...]

  • Page 279

    Configuring Switch Information 279 – IPIP — IP over IP (IPIP). Encapsulates IP pack ets to cr eate tunnels between two routers. This ensure that IPIP tunnel appears as a single int erface, rather than several separate interfaces. IPIP enables tunnel intranets occur the internet, and provides an alternat ive to source routing. – PIM — Matche[...]

  • Page 280

    280 Configuring Switch Information • Match IP P recedence — Indicates matching ip-precedence with the pack et ip-precedence value. IP P recendence enables marking frames that ex ceed CIR threshold. In a congested network, frames containing a higher are discar ded before frames with a lower DP . • Action — Indicates the ACL forwar ding acti [...]

  • Page 281

    Configuring Switch Information 281 3 Define the relevant fields. 4 Click Apply Changes . The IP based protocol is defined, and the device is updated. Displaying the ACEs Associated with IP based ACLs 1 Open the Network Security - IP Based ACL page. 2 Click Show All. The ACEs Associated with IP -ACL opens. Figure 7-11. ACEs Associated with IP-ACL Re[...]

  • Page 282

    282 Configuring Switch Information Configuring IP Based ACLs with CLI Commands The following table summarizes the equi valent CLI commands for configuring I P Based AC Ls . T able 7-5. IP Based ACL CLI Commands CLI Command Description ip access-list access-list-name no ip access-list access-list-name T o define an IPv4 access list and to place the [...]

  • Page 283

    Configuring Switch Information 283 Defining MAC Based Access Control Lists The Network Security - MAC Based A CL page allows a MAC- based ACL to be defined. A CEs can be added only if the ACL is not bound to an interface. T o define MAC Based ACLs, click Switch → Network Security → MA C Based ACL . • Network Security - MA C Based ACL • ACL [...]

  • Page 284

    284 Configuring Switch Information • CoS — Indicates the CoS values by wh ich the packets ar e filtered. • Cos Mask — Indicates the CoS Mask by which the packets ar e filtered. • Ethertype — Indicates the Ethertype packet by which the pack ets are filtered. • Action — Indicates the ACL forwar ding action. P ossible field values are:[...]

  • Page 285

    Configuring Switch Information 285 3 Define the relevant fields. 4 Click Apply Changes . The MAC based protocol is define d, and the device is updated. Displaying the ACEs Associated with MAC based ACLs 1 Open the Network Security - MAC Based A CL page. 2 Click Show All. The ACEs Associated with MA C Based ACL opens. Removing a MAC based ACL 1 Open[...]

  • Page 286

    286 Configuring Switch Information Configuring MAC Based ACLs with CLI Commands The following table summarizes the eq uivalent CLI command s for configuring MAC Based ACLs . Defining ACL Binding When an ACL is bound to an interfa ce, all the A CE rules that have been defined are applied to the selected interface.Whenever an ACL is assigned on a por[...]

  • Page 287

    Configuring Switch Information 287 3 In the Bind ACL to an Interface field, select a port or LAG. 4 Click Apply Changes . The ACL is bound to the interface. Displaying the ACL Bindings T able: 1 Open the Network Security - ACL Binding page. 2 Click Show All. The ACL Bindings T able opens. Figure 7-14. ACL Bindings T able Copying ACL Parameters Betw[...]

  • Page 288

    288 Configuring Switch Information Configuring ACL Bindings with CLI Commands The following table summarizes the eq uivalent CLI command s for configuring AC L Bi n di ng s . The following is an e xample of some of the CLI commands: Configuring DHCP Snooping DHCP Snooping expands network security by provid ing fir ewall security between untrusted i[...]

  • Page 289

    Configuring Switch Information 289 This section contians the following topics: • "Defining DHCP Snooping Global P arameters" on page 289 • "Defining DHCP Snooping on VLANs" on page 291 • "Defining T rusted Interfaces" on page 292 • "Adding Interfaces to the DHCP Snooping Database" on page 294 Defining[...]

  • Page 290

    290 Configuring Switch Information • Save Binding Database to F ile — Indicates if the DHCP Snooping Database is saved to file. The possible field values are: – Enable — Enables saving the database to file. This is the default value. – Disable — Disables saving the database to file. • Save Binding Database Internal — Indicates how o[...]

  • Page 291

    Configuring Switch Information 291 The following is an e xample of some of the CLI commands: Defining DHCP Snooping on VLANs The DHCP Snooping VLAN Settings P age allows network managers to enable DHCP Snooping on VLANs. DHCP snooping separates ports in the VLAN. T o enable DHCP Snooping on VLAN, ensure that DHCP Snooping is enabled on the device. [...]

  • Page 292

    292 Configuring Switch Information Defining DHCP Snooping on VLANS 1 Open the DHCP Snooping VLAN Settings page. 2 Click Add and Re move to add/remove VLAN IDs to or from the Enabled VLAN list. 3 Click Apply Changes . Configuring DHCP Snooping on VLANs with CLI Commands The following table summarizes the eq uivalent CLI commands for configuring DHCP[...]

  • Page 293

    Configuring Switch Information 293 Displaying the T rusted Interfaces T able : 1 Open the T rusted Interfaces page. 2 Click Show All. The T rusted Interfaces T able opens. Figure 7-18. T rusted Interfaces T able Copying T rusted Interfaces Settings Between Interfaces 1 Open the T rusted Interfaces page. 2 Click Show All. The T rusted Interfaces T a[...]

  • Page 294

    294 Configuring Switch Information Configuring DHCP Snooping T ruste d Interfaces with CLI Commands The following table summarizes the eq uivalent CLI command s for configuring DHCP Snooping T rusted Interfaces . Adding Interfaces to the DHCP Snooping Database The DHCP Snooping Binding Database page contains parameters for qu erying and adding IP a[...]

  • Page 295

    Configuring Switch Information 295 Querying the Database 1 Open the Binding Database page. 2 Select the following categories: – MAC Address — Indicates the MAC addr esses reco rded in the DHCP Snooping Database. – IP Address — Indicates the IP addr esses recor ded in the DHCP Snooping Database. – VLAN — Indicates the VLANs recor ded in [...]

  • Page 296

    296 Configuring Switch Information Binding a DHCP Snooping Database 1 Open the Binding Database page. 2 Click Add . The Bind DHCP Snooping page opens. Figure 7-20. Bind DHCP Snooping Page 3 Define the fields. 4 Click Apply Changes . Configuring DHCP Snooping Bind ing Database with CLI Commands The following table summarizes the eq uivalent CLI comm[...]

  • Page 297

    Configuring Switch Information 297 The following is an e xample of some of the CLI commands: Configuring Ports The Po r t s page provides links for configuring port func tionality including advanced features such as storm control and port mirroring, and for performing virtual port tests. T o open the P orts page Select Switch → P orts . This sect[...]

  • Page 298

    298 Configuring Switch Information Figure 7-21. Port Configuration The P ort Configuration page contains the following fields: • Po r t — The port number for which po rt parameters are defined. • Description (0 - 64 Characters) — A brief interface description, such as Ethernet. • Po r t T y p e — The type of port. • Admin Status — E[...]

  • Page 299

    Configuring Switch Information 299 • Reactivate Suspended P ort — Reactivates a port if the port has been disabled through the locked port security option. – Checked — Reactivates the port. – Unchecked — Maintains the port’s operational status. • Operational Status — Indicates the port operational status. P ossible field values ar[...]

  • Page 300

    300 Configuring Switch Information • Current Advertisement — The port advertises its speed to its neighbor port to start the negotiation process. The possible field va lues are those specified in the Admin Advertisement field. • Neighbor Advertisement — Indicates the neighboring port’s advertisement settings. The field values are identica[...]

  • Page 301

    Configuring Switch Information 301 Defining Port Parameters 1 Open the P ort Configuration page. 2 Select a port in the Po r t F ield. 3 Define the available fields in the dialog. 4 Click Apply Changes . The port parameters are saved to the device. Displaying and Modifying Mu ltiple Port Configurations 1 Open the P ort Configuration page. 2 Click S[...]

  • Page 302

    302 Configuring Switch Information Configuring Ports with CLI Commands The following table summarizes the equivalent CLI co mmands for configuring ports as displayed in the P ort Configuration page. T able 7-12. Port Configuration CLI Commands CLI Command Description interface ethernet interface Enters the interface configurat ion mode to configure[...]

  • Page 303

    Configuring Switch Information 303 The following is an example of the CLI commands: console(config)# interface ethernet 1/e3 console(config-if)# description " RD SW#3" console(config-if)# shutdown console(config-if)# no shutdown console(config-if)# speed 100 console(config-if)# duplex full console(config-if)# negotiation console(config-if[...]

  • Page 304

    304 Configuring Switch Information Defining LAG Parameters The P orts - LAG Configuration page contains fields for configuring parameters for configured LAGs. The device supports up to fifteen LAGs per system. F or information about Link Aggregated Groups (LAG) and assigning ports to LAGs, see Aggregating P orts . To o p e n t h e P orts - LAG Conf[...]

  • Page 305

    Configuring Switch Information 305 • LAG T ype — The port types that comprise the LAG. • Admin Status — Enables or disables the selected LAG. – Up — T raffic is enabled through the LAG. – Down — T raffic is disabled through the LAG. • Current Status — Indicates if the LAG is currently operating. • Admin Speed — The configure[...]

  • Page 306

    306 Configuring Switch Information • Current Flow Control — The current Flow Control setting. • P rivate VLAN Edge (PVE) — Indicates the P rivate VLAN Edge (PVE) group to which the LAG is configured. A port defined as PVE is protected by an uplink, so that it is isolated from other ports within the same VLAN. The uplink must be a GE port or[...]

  • Page 307

    Configuring Switch Information 307 3 Define the available fie lds for the relevant LAGs. 4 Click Apply Changes . The LAG parameters are saved to the device. Configuring LAGs with CLI Commands The following table summarizes t he equivalent CLI commands for conf iguring LAGs as displayed in the P orts - LAG Configuration page. T able 7-13. LAG Config[...]

  • Page 308

    308 Configuring Switch Information The following is an example of the CLI commands: Enabling Storm Control A Broadcast Storm is a result of an e xcessive amount of Broadcast messages si multaneously transmitted across a network by a single port. F orwarded messa ge r esponses are heaped onto the network, straining network resources or causing the n[...]

  • Page 309

    Configuring Switch Information 309 The Storm Control page provides fields for enabling and configuring Storm Control. T o open the Storm Control page, click Switch → P orts → Storm Control in the tree view . Figure 7-25. Storm Control The Storm Control page contains the following fields: • Po r t — The port from which storm control is enabl[...]

  • Page 310

    310 Configuring Switch Information Modifying Storm Control Port Parameters 1 Open the Storm Control page. 2 Modify the fields. 3 Click Apply Changes The Storm Control port parameters are saved to the device. Displaying the Port Parameters T able 1 Open the Storm Control page. 2 Click Show All. The Storm Control Settings T able opens. Figure 7-26. S[...]

  • Page 311

    Configuring Switch Information 311 4 Check the Copy to check box to define the interfaces to which the storm control definitions are copied, or click Select All to copy the definitions to all ports. 5 Click Apply Changes . The parameters are copied to the selected ports in the Storm Control Settings T able , and the device is updated. Configuring S[...]

  • Page 312

    312 Configuring Switch Information Defining Port Mirroring Sessions P ort mirroring does the following: • Monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port. • Can be used as a diagnostic tool and/or a debugging featur e. • Enables device performance and monitoring. P [...]

  • Page 313

    Configuring Switch Information 313 T o open the P ort Mirroring page, click Switch → Po r t s → P ort Mirroring in the tree view . When a port is set to be a target port for a po rt-mirroring session, all no rmal operations on it ar e suspended. This includes Spanning T ree and LA CP . Figure 7-27. Port Mirroring The P ort Mirroring page contai[...]

  • Page 314

    314 Configuring Switch Information • Status — Indicates if the port is currently monitor ed ( Active ) or not monitored ( Rea dy ). • Remo ve — Removes the port mirroring session. The possible field values are: – Checked — Removes the selected port mirroring sessions. – Unchecked — Maintains the port mirroring session. Adding a Port[...]

  • Page 315

    Configuring Switch Information 315 The following is an example of the CLI commands: Configuring Address T ables MAC addr esses are stored in either the Static Addr e ss or the Dynamic Address databases. A pack et addressed to a destination stor ed in one of the databases is forwarded immediately to the port. The Dynamic Address T able can be sorted[...]

  • Page 316

    316 Configuring Switch Information Figure 7-29. Static MAC Address The Static MAC Address page contains the following fields: • Interface — The specific port or LAG to whic h the static MAC addr ess is applied. • MAC Address — The MAC addr esses listed in the current static addresses list. • VLAN ID — The VLAN ID attached to the MAC. ?[...]

  • Page 317

    Configuring Switch Information 317 Adding a Static MAC Address 1 Open the Static MAC Address page . 2 Click Add . The Add Static MAC Address page opens. Figure 7-30. Add Static MAC Address 3 Complete the fields. 4 Click Apply Changes . The new static address is added to the Static MAC Address T able , and the device is updated. Modifying a Static A[...]

  • Page 318

    318 Configuring Switch Information 4 Select a table entry . 5 Select the Rem ov e check box. 6 Click Apply Changes . The selected static address is deleted, and the device is updated. Configuring Static Address Pa rameters Using CLI Commands The following table summarizes t he equivalent CLI commands for configuring static address parameters as dis[...]

  • Page 319

    Configuring Switch Information 319 T o open the Dynamic Address T able page, click Switch → Address T ables → Dynamic MA C Address in the tree view . Figure 7-32. Dynamic Address T able The Dynamic Address T able page contain the following fields: • Address Aging (10-3825) — Specifies the amount of time (i n seconds) the MAC Address r emain[...]

  • Page 320

    320 Configuring Switch Information • VLAN ID — The VLAN ID for which the table is queried. • Address T able Sort K ey — Specifies the means by which the Dynamic Address T able is sorted. The address table can be sorted by Addr ess, VLAN or Interface. Redefining the Aging T ime 1 Open the Dynamic Address T able . 2 Define the Address Aging f[...]

  • Page 321

    Configuring Switch Information 321 The following is an example of the CLI commands: Configuring GARP Generic Attribute Registration P rotocol (GARP) is a general-purpose protocol that registers any network connectivity or membership-style in formation. GARP defines a set of devices interested in a given network attribute, such as VLAN or multicast [...]

  • Page 322

    322 Configuring Switch Information Defining GARP T imers The GARP T imers page contains fields for enabling GARP on the device. T o open the GARP Timers page, click Switch → GARP → GARP T imers in the tree view . Figure 7-33. GARP T imers The GARP Timers page contains the following fields: • Interface — Determines if enabled on a port or on[...]

  • Page 323

    Configuring Switch Information 323 Copying Parameters in the GARP T imers T able 1 Open the GARP T imers page. 2 Click Show All . The GARP T imers T able opens. Figure 7-34. GARP T imers T able 3 Select the interface in the Copy P arameters from field from either the Po r t or LAG drop-down menu. The definitions for this interface are copied to the[...]

  • Page 324

    324 Configuring Switch Information Defining GARP T imers Using CLI Commands This table summarizes the equivalent CLI commands for defining GARP timers as displayed in the GARP T imers page. The following is an example of the CLI commands: T able 7-18. GARP T imer CLI Commands CLI Command Description garp timer {join | leave | leaveall} timer_value [...]

  • Page 325

    Configuring Switch Information 325 Configuring the Spanning T ree Protocol Spanning T ree P rotocol (STP) provides tree topograp hy for any bridge arrangement. STP eliminates loops by providing one path between end stations on a network. Loops occur when alternate routes exist between hosts. L oops in an extended network can cause bridges to forwar[...]

  • Page 326

    326 Configuring Switch Information Figure 7-35. Spanning T ree Global Settings The Spanning T ree Global Settings page contains the following fields: • Spanning T ree State — Enables or disables Spanning T ree on th e device. The possible field values ar e: – Enable — Enables Spanning T ree. – Disable — Disables Spanning T ree. • STP [...]

  • Page 327

    Configuring Switch Information 327 • BPDU Handling — Determines how Bridge P rotocol Data Unit (BPDU) packets ar e managed when STP is disabled on the port/ device. BPDUs are used to transmit spanning tr ee information. The possible field values are: – F iltering — F ilters BPDU packets when spanning tr ee is disabled on an interface. This [...]

  • Page 328

    328 Configuring Switch Information • Root P ath Cost — The cost of the path from this bridge to the root. • T opology Changes Counts — Specifies the total amount of STP state changes that have occurred. • Last T opology Change — Indicates the amount of time that has elapsed since the bridge was initialized or reset, and the last topogra[...]

  • Page 329

    Configuring Switch Information 329 The following is an example of the CLI commands: show spanning-tree [ ethernet interface | port- channel port-channel-number ] [ instance instance-id ] Displays spanning tree configuration. show spanning-tree [ detail ] [ active | blockedports ] [ instance instance-id ] Displays detailed spanning tree information [...]

  • Page 330

    330 Configuring Switch Information Name State Prio.Nbr Cost Sts Role PortFast Type ---- ----- ------- ---- --- ---- ------- ---- 1/e2 enabled 128.2 100 DSBL Dsbl No P2p Intr 1/e3 enabled 128.3 100 DSBL Dsbl No P2p Intr 1/e4 enabled 128.4 100 DSBL Dsbl No P2p Intr 1/e5 enabled 128.5 19 FRW Desg Yes P2p Intr 1/e6 enabled 128.6 100 DSBL Dsbl No P2p In[...]

  • Page 331

    Configuring Switch Information 331 Defining STP Port Settings Use the STP P ort Settings page to assign STP properties to individual ports. T o open the STP P ort Settings page, click Switch → Spanning T ree → P ort Settings in the tree view . Figure 7-36. STP Port Settings Name State Prio.Nbr Cost Sts Role PortFast Type ---- ----- ------- ----[...]

  • Page 332

    332 Configuring Switch Information The STP P ort Settings page contains the following fields: • Select a P ort — Specifies the port number on which STP settings are to be to modified. • STP — Enables or disables STP on the port. The possible field values are: – Enable — Indicates that STP is enabled on the port. – Disable — Indicate[...]

  • Page 333

    Configuring Switch Information 333 • P ath Cost (1-200000000) — The port contribution to the root pa th cost. The path cost is adjusted to a higher or lower value, and is used to forward traffic when a path being r erouted. • Default P ath Cost — Indicates if the device uses the default path cost. The possible field values are: – Checked [...]

  • Page 334

    334 Configuring Switch Information Displaying the STP Port T able 1 Open the Spanning T ree P ort Settings page. 2 Click Show All . The STP P ort T able opens. Figure 7-37. STP Port T able Defining STP Port Settin gs Using CLI Commands The following table summarizes the equivalent CLI commands for defining STP port parameters as displayed in the ST[...]

  • Page 335

    Configuring Switch Information 335 The following is an example of the CLI commands: console> enable console# configure Console(config)# inter face ethernet 1/e1 Console(config-if)# spanning-tree disable Console(config-if)# spanning-tree cost 35000 Console(config-if)# s panning-tree port-priority 96 Console(config-if)# sp anning-tree portfast Con[...]

  • Page 336

    336 Configuring Switch Information Defining STP LAG Settings Use the STP LAG Settings page to assign STP aggr egating ports parameters. T o open the STP LAG Settings page, click Switch → Spanning T ree → LAG Settings in the tree view . Figure 7-38. STP LAG Settings The Spanning T ree LAG Settings page contains the following fields: • Select a[...]

  • Page 337

    Configuring Switch Information 337 • Root Guard — P revents devices outside the network core fr om being assigned the spanning tr ee root. – Checked — Root guard is enabled on the port. – Unchecked — Root guard is disabled on the port. • LAG State — Current STP state of a LAG. If enabled, the LAG state determines what forwar ding ac[...]

  • Page 338

    338 Configuring Switch Information • Designated P ort ID — The ID of the selected interface. • Designated Cost — Cost of the port participating in the STP topology . P orts with a lower cost are less likely to be block ed if STP detects loops. • F orward T ransitions — Number of times the LAG State has changed from the Fo r w a r d i n [...]

  • Page 339

    Configuring Switch Information 339 Defining STP LAG Settings Using CLI Commands The following table contains the CLI co mmands for defining STP LAG settings. The following is an example of the CLI commands: Defining Rapid Spanning T ree While the classic spanning tree pr events Layer 2 forwarding loops on a general network topology , convergence ca[...]

  • Page 340

    340 Configuring Switch Information Figure 7-40. Rapid Spanning T ree (RSTP) The Spanning T ree RSTP page contains the following fields: • Interface — P ort or LAG for which you can view and edit RSTP settings. • State — Disables RSTP state of the selected interface. • Rol e —Indicates the port role assigned by the ST P algorithm in orde[...]

  • Page 341

    Configuring Switch Information 341 • F ast Link Operational Status — Indicates if F ast Link is enable d or disabled for the port or LAG. If F ast Link is enabled for an interface, the interf ace is automatically placed in the forwarding state. The possible field values are: – Enable — F ast Link is enabled. – Disable — F ast Link is di[...]

  • Page 342

    342 Configuring Switch Information Displaying the Rapid Spanning T ree (RSTP) T a ble 1 Open the Rapid Spanning T ree (RSTP) page. 2 Click Show All . The Rapid Spanning T ree (RSTP) T able opens. Figure 7-41. Rapid Spanning T ree (RSTP) T able Defining Rapid STP Parame ters Using CLI Commands The following table summarizes the equivalent CLI comman[...]

  • Page 343

    Configuring Switch Information 343 Configuring Multiple Spanning T ree MSTP operation maps VLANs into STP instances. Mu ltiple Spanning T ree pr ovides differing load balancing scenario . F or example, while port A is bloc ked in one STP instance, the same port is placed in the F orwarding State in another STP instance. In addition, packets assigne[...]

  • Page 344

    344 Configuring Switch Information The MSTP Settings page contains the following fields: • Region Name (1-32 Characters) — Indicates user -defined MSTP region name. • Revision (0-65535) — Defines unsigned 16-bit number that identifies the current MST configuration revision. The r evision number is required as part of the MST configuration. [...]

  • Page 345

    Configuring Switch Information 345 Displaying the MSTP VLAN to Instance Mapping T able 1 Open the Spanning T ree MSTP Settings page. 2 Click Show All to open the MSTP VLAN to Instance Mapping T able . Figure 7-43. MSTP VLAN to Instance Mapping T able Defining MST Instance s Using CLI Commands The following table summarizes the equivalent CLI comman[...]

  • Page 346

    346 Configuring Switch Information The following is an example of the CLI commands: spanning-tree mst instance-id cost cost Sets the path cost of the port for MST calculations exit Exits the MST region configuration mode and applies configuration changes. abort Exits the MST region con figuration mode without applying configuration changes. show { [...]

  • Page 347

    Configuring Switch Information 347 Defining MSTP Interface Settings The MSTP Interface Settings page contains parameters assigning MSTP settings to specific interfaces. T o open the MSTP Interface Settings page, click Switch → Spanning T ree → MSTP Interface Settings in the tree view . Figure 7-44. MSTP Interface Settings The MSTP Interface Set[...]

  • Page 348

    348 Configuring Switch Information • Rol e — Indicates the port role assigned by the ST P algorithm in order to provide to STP paths. The possible field values are: – Roo t — P rovides the lowest cost path to forward packets to root device. – Designated — Indicates the port or LAG via which the designated device is attached to the LAN. [...]

  • Page 349

    Configuring Switch Information 349 Viewing the MSTP Interface T able 1 Open the MSTP Interface Settings page. 2 Click Show All . The MSTP Interface T able page opens. Figure 7-45. MSTP Interface T able Defining MSTP Interfaces Using CLI Commands The following table summarizes the equivalent CLI commands for defining MSTP interfaces as displayed in [...]

  • Page 350

    350 Configuring Switch Information The following is an example of the CLI commands: console# show spanning-tre e mst-configuration Gathering informat ion .......... Current MST configuration Name: Gili Revision: 65000 Instance Vlans Mapped State --------- -------------------------- ----------- 0 16-4094 enabled 11 enabled 22 enabled 33 enabled 44 e[...]

  • Page 351

    Configuring Switch Information 351 Configuring VLANs VLANs are logical subgroups with a LAN cr eated via software, rather than defining a hardwar e solution. VLANs combine user stations and network devices into a single unit, regar dless of the physical LAN segment to which they are attached. VLANs allow network traffic to flow mor e efficiently wi[...]

  • Page 352

    352 Configuring Switch Information Defining VLAN Membership The VLAN Membership page contains fields for defining VLAN groups. The device supports the mapping of 4094 VLAN IDs to 256 VLANs. All por ts must have a defined PVID. If no other value is configured the default VLAN PVID is used. VLAN ID #1 is the default VLAN, and cannot be deleted from t[...]

  • Page 353

    Configuring Switch Information 353 • Authentication Not R equired — Indicates whether unauthorized users can access a VLAN. The possible field values are: – Enable — Enables unauthorized users to use a VLAN. – Disable — P revents unauthorized users from using a VLAN. • Remove VLAN — Indicates whether to removes the VLAN from the VLA[...]

  • Page 354

    354 Configuring Switch Information VLAN Port Membership T able The VLAN P ort Membership T able contains a P ort T able for assigning ports to VLANs. P orts are assigned to a VLAN by toggling through the P ort Control settings. P orts can h ave the following values: The VLAN P ort Membership T able displays the ports and the po rts states, as well [...]

  • Page 355

    Configuring Switch Information 355 Defining VLAN Membership Groups Using CLI Commands The following table summarizes the equivalent CL I commands for defining VLAN membership groups as displayed in the VLAN Membership page. The following is an example of the CLI commands: Assigning Ports to VLAN Groups Using CLI Commands The following table summari[...]

  • Page 356

    356 Configuring Switch Information The following is an example of the CLI commands: switchport trunk native vlan vlan-id Defines the port as a member of the specified VLAN, and the VLAN ID as the port default VLAN ID (PVID). switchport general allowed vlan add vlan-list [ tagged | untagged ] Adds or removes VLANs for a port in general mode. switchp[...]

  • Page 357

    Configuring Switch Information 357 Defining VLAN Ports Settings The VLAN P ort Settings page contains fields for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN P ort Settings page. All untagged packets arriving to the device are tagged by the ports PVID. T o open the VLAN P ort Settings page, click[...]

  • Page 358

    358 Configuring Switch Information • Dynamic — Assigns a port to a VLAN based on the host source MAC addr ess connected to the port. – Checked — The port may be regi ster ed in a dynamic VLAN. – Unchecked — The port is not allowed to register in a dynamic VLAN. • PVID (1-4095) — Assigns a VLAN ID to untagged pack ets. The possible v[...]

  • Page 359

    Configuring Switch Information 359 Displaying the VLAN Port T able 1 Open the VLAN P ort Settings page. 2 Click Show All. The VLAN P ort T able opens. Figure 7-49. VLAN Port T able Defining VLAN LAGs Settings The VLAN LAG Settings page provides parameters for managi ng LAGs that ar e part of a VLAN. VLANs can either be composed of individual ports [...]

  • Page 360

    360 Configuring Switch Information The VLAN LAG Settings page contains the following fields: • LAG — The LAG number included in the VLAN. • LAG VLAN Mode — The LAG VLAN mode. P ossible values are: – Customer — The LAG belongs to VLANs. When LAGs are in Customer mode, the added tag provides a VLAN ID to each customer , ensur ing private [...]

  • Page 361

    Configuring Switch Information 361 Displaying the VLAN LAG T able 1 Open the VLAN LAG Settings page. 2 Click Show All . The VLAN LAG T able opens. Figure 7-51. VLAN LAG T able 3 T o change LAG settings, modify the fields for any LAGs in the table. 4 Click Apply Changes . The VLAN LAG parameters are defined, and the device is updated. Assigning LAGs[...]

  • Page 362

    362 Configuring Switch Information The following is an example of the CLI commands: Binding MAC Address to VLANs Binding MAC addr esses to VLANs provides port to VLAN assignment based on MAC addresses. Once a VLAN is assigned a MAC addr ess, and the MAC addre ss is learned on a port, the port joins the bound VLAN. When the MAC addr ess is aged out,[...]

  • Page 363

    Configuring Switch Information 363 T o bind MAC addresses to a VLAN, ensur e the VLAN ports were dynamica lly added, and are not static VLAN ports. T o open the Bind MAC to VLAN page, click Switch → VLAN → Bind MAC to VLAN . Figure 7-52. Bind MAC to VLAN The Bind MAC to VLAN page contains the following fields: • MAC Address — Indicates the [...]

  • Page 364

    364 Configuring Switch Information Removing a MAC to VLAN Binding: 1 Open the Bind MAC to VLAN page. 2 Click Show All . The MAC to VLAN T able opens. 3 Select the desired VLAN, or select All to see bindings for all VLANs. 4 Select the Rem ov e checkbox next to the desir ed bindings. 5 Click Apply Changes . Binding MAC address to VLAN using CLI comm[...]

  • Page 365

    Configuring Switch Information 365 Figure 7-54. Protocol Group • P rotocol V alue — Displays the User -defined protocol value. The options are as follows: – P rotocol V alue — User -defined protocol name. The possible field values are IP , IPX and ARP . – Ethernet-Based P rotocol V alue — The Ethernet protocol group type. • P rotocol [...]

  • Page 366

    366 Configuring Switch Information 3 Complete the fields on the page. 4 Click Apply Changes . The protocol group is assigned , and the device is updated. Assigning VLAN Protocol Group Settings 1 Open the P rotocol Group page. 2 Complete the fields on the page. 3 Click Apply Changes . The VLAN protocol group parameters are defined, and the device is[...]

  • Page 367

    Configuring Switch Information 367 Defining VLAN Protocol Groups Using CLI Commands The following table summarizes the equivalent CL I commands for configuring Protocol Groups. T able 7-30. VLAN Protocol Groups CLI Commands The following example maps ip -arp protocol to group "213": Adding Interfaces to Protocol Groups The P rotocol P ort[...]

  • Page 368

    368 Configuring Switch Information • VLAN ID — Attaches the interface to a user -defined VL AN ID. The VLAN ID is defined on the Create a New VLAN page. P rotocol ports can either be attached to a VLAN ID or a VLAN name. The possible values are 1-4095. VLAN 4095 is the discar d VLAN. • Re move — Indicates whether to re move the selected int[...]

  • Page 369

    Configuring Switch Information 369 Displaying Protocols Assigned to Ports 1 Open the P rotocol P ort page. 2 Click Show All . The P rotocol Based VLAN T able opens. Figure 7-59. Protocol Based VLAN T able Defining Protocol Ports Using CLI Commands The following table summarizes the equivalent CLI command for defining Protocol P orts. T able 7-31. P[...]

  • Page 370

    370 Configuring Switch Information The GVRP Global P arameters page enables GVRP globally . GVRP ca n also be enabled on a per -interface basis. T o open the GVRP Global P arameters page, click Switch → VLAN → GVRP P arameters in the tree view . Figure 7-60. GVRP Global Parameters The GVRP Global P arameters page contains the following fields: [...]

  • Page 371

    Configuring Switch Information 371 • Dynamic VLAN Creation — Indicates if Dynamic VLAN creation is enabled on the interface. The possible field values are: – Enabled — Enables Dynamic VLAN creation on the interface. – Disabled — Disables Dynamic VLAN creation on the interface. • GVRP Registration — Indicates if VLAN registration thr[...]

  • Page 372

    372 Configuring Switch Information Displaying the GVRP Port Parameters T able 1 Open the GVRP Global P arameters page. 2 Click Show All . The GVRP P ort P arameters T able opens. Figure 7-61. GVRP Port Parameters T able In addition to the GVRP Global P arameters screen, the GVRP P ort P arameters T a ble contains the following field: Copy P aramete[...]

  • Page 373

    Configuring Switch Information 373 The following is an example of the CLI commands: show gvrp configuration [ ethernet interface | port- channel port-channel-number ] Displays GVRP configuration information, including timer values, whether GVRP and dynamic VLAN creation is enabled, and wh ich ports ar e running GVRP . show gvrp error -statistics [ [...]

  • Page 374

    374 Configuring Switch Information Configuring V oice VLAN V oice VLAN allows network administ rators enhance V oIP service by c onfiguring ports to carry IP voice traffic from IP phones on a specific VLAN. V o IP traffic has a preconfigur ed OUI prefix in the source MAC addr ess. Network Administrators can configure VLANs on which voice IP traffic[...]

  • Page 375

    Configuring Switch Information 375 Figure 7-62. V oice VLAN Global Parameters • V oice VLAN Status — Indicates if V oice VLAN is enabled on the device. The possible field values are: – Enable — Enables V oice VLAN on the device. – Disable — Disables V oice VLAN on the de vice. This is the default value. • V oice VLAN ID — Defines th[...]

  • Page 376

    376 Configuring Switch Information Defining V oice VLAN Global Pa rameters Using CLI Commands The following table summarizes the equivalent CLI command for defining Voice VLAN global parameters . The following is an e xample of some of the CLI commands: T able 7-33. Voice VLAN Global Parameters CLI Commands CLI Command Description voice vlan id vla[...]

  • Page 377

    Configuring Switch Information 377 Defining V oice VLAN Port Settings The V o ice VLAN P o rt Settings P age contains fields for adding ports or LAGs to voice VLAN. T o open the V oice VLAN P ort Setting page, click Switch → Vo i c e V L A N → P ort Setting in the tree view . Figure 7-63. V oice VLAN Port Setting 00:0F:E2 Huawei-3COM Voice VLAN[...]

  • Page 378

    378 Configuring Switch Information • Interface — Indicates the specific port or and LAG to which the V oice VLAN settings are applied. • V oice VLAN Mode — Defines the V oice VLAN mode. The possible field values are: – None — Disables the selected port/LAG on the V oice VLAN. – Static — Maintains the current V oice VLAN port/L AG se[...]

  • Page 379

    Configuring Switch Information 379 The V oice VLAN P ort Setting T able includes the Membership field which indicates if the V oice VLAN member is a static or dynamic member . The field value Dynamic indicates the VLAN membership was dynamically created through GARP . The field value Static indicates the VLAN membership is user -defined. 3 Select t[...]

  • Page 380

    380 Configuring Switch Information Figure 7-65. V oice VLAN OUI • T elephony OUI(s) — Lists the OUIs currently enabled on the V oice VLAN. The following OUIs are enabled by default. – 00-01-E3 — Siemens AG phone – 00-03-6B — Cisco phone – 00-0F-E2 — H3C Aolynk – 00-60-B9 — Philips and NEC AG phone – 00-D0-1E — Pingtel phone [...]

  • Page 381

    Configuring Switch Information 381 Adding OUIs 1 Open the V oice VLAN OUI page. 2 Click Add . The Add OUI page opens. Figure 7-66. V oice VLAN Add OUI Page 3 F ill in the fields. 4 Click Apply Changes . The OUIs is added. Removing OUIs 1 Open the V oice VLAN OUI page. 2 Check the Rem ov e checkbox next to teach OUI to be r emoved. 3 Click Apply Cha[...]

  • Page 382

    382 Configuring Switch Information Defining V oice VLAN OU Is Using CLI Commands The following table summarizes the equivalent CLI command for defining Voice VLAN OUIs . Aggregating Ports Link Aggregation optimizes port usage by linking a group of ports together to form a single LAG (aggregated group). Aggr egating ports multiplies the bandwidth be[...]

  • Page 383

    Configuring Switch Information 383 P orts in a Link Aggregated group (LAG) can contain di ffer ent media types if the ports are operating at the same speed. Aggregated links can be manuall y or automatically configur ed by enabling Link Aggregation Control P rotocol (LACP) on the r elevant links. This section contians the following topics: • &quo[...]

  • Page 384

    384 Configuring Switch Information • LACP P ort P riority (1-65535) — LACP priority value for the port. • LACP T imeout — Administrative LACP timeout. The possible field values ar e: – Short — Specifies a short timeout value. – Lon g — Specifies a long timeout value. Defining Link Aggregation Global Parameters 1 Open the LACP P aram[...]

  • Page 385

    Configuring Switch Information 385 Configuring LACP Parame ters Using CLI Commands The following table summarizes the equivalent CLI commands for configuring LACP parameters as displayed in the LACP P arameters page. The following is an example of the CLI commands: Defining LAG Membership The device supports fifteen LAGs per system, and eight ports[...]

  • Page 386

    386 Configuring Switch Information Figure 7-69. LAG Membership The LAG Membership page contains the following fields: • LACP — Aggregates the port to a LAG, using LA CP . • LAG — Adds a port to a LAG, and indicates th e specific LAG to which the port belongs. Adding Ports to a LAG or LACP 1 Open the LAG Membership page. 2 In the LAG row (th[...]

  • Page 387

    Configuring Switch Information 387 The following is an example of the CLI commands: Multicast Forwarding Support Multicast forwarding allows a single pack et to be forwarded to multip le destinations. Layer 2 Multicast service is based on Layer 2 device receiving a single pack et addressed to a specific Multicast address. Multicast forwarding cr ea[...]

  • Page 388

    388 Configuring Switch Information P orts requesting to join a specific Mu lticast group issue an IGMP r eport , specifying that Multicast group is accepting members. This results in the cr ea tion of the Multicast filtering database. The Global P arameters page contains fields for enabling IGMP Snooping on the device. T o open the Global P aramete[...]

  • Page 389

    Configuring Switch Information 389 Enabling IGMP Snooping on the device 1 Open the Global P arameters page. 2 Select Enable in the IGMP Snooping Status field. 3 Click Apply Changes . IGMP Snooping is enabled on the device. Enabling Multicast Filte ring and IGMP Snoopi ng Using CLI Commands The following table summarizes the equivalent CLI co mmands[...]

  • Page 390

    390 Configuring Switch Information Figure 7-71. Bridge Multicast Group The Bridge Multicast Group page contains the following fields: • VLAN ID — Identifies a VLAN and contains info rmation about the Multicast group address. • Bridge Multicast Address — Identifies the Multicast group MAC addr ess/IP address. • Re move — Indicates whethe[...]

  • Page 391

    Configuring Switch Information 391 The following table contains the IGMP po rt and LAG members management settings: Adding Bridge Multicast Addresses 1 Open the Bridge Multicast Group page. 2 Click Add . The Add Bridge Multicast Group page opens. Figure 7-72. Add Bridge Multicast Group 3 Define the VLAN ID and New Bridge Multicast Address fields. 4[...]

  • Page 392

    392 Configuring Switch Information Defining Ports to Receive Multicast Service 1 Open the Bridge Multicast Group page. 2 Define the VLAN ID and the Bridge Multicast Address fields. 3 T oggle a port to S to join the port to the selected Multicast group. 4 T oggle a port to F to forbid adding specific Multicas t addresses to a specific port. 5 Click [...]

  • Page 393

    Configuring Switch Information 393 The following is an example of the CLI commands: Console(config-if)# bridge multicast address 0100.5e02.0203 add ethernet 1/e11,1/e12 console(config-if)# end console # show bridge multicast address-table Vlan MAC Address Type Ports ---- ----------- ----- ---------- 1 0100.5e02.0203 static 1/e11, 1/e12 19 0100.5e02[...]

  • Page 394

    394 Configuring Switch Information Assigning Multicast Forward All Parameters The Bridge Multicast F orward All page contains fields for attaching ports or LAGs to a device that is attached to a neighboring Multicast router/switch. Once IGMP Snooping is ena bled, Multicast packets are forwar ded to the appropriate port or VLAN. T o open the Bridge [...]

  • Page 395

    Configuring Switch Information 395 Managing Bridge Multicast Forward A ll Switch/Port Control Settings T able The following table describes the contro ls used to set the port controls. Attaching a Port to a Multicast Router or Switch 1 Open Bridge Multicast F orward All page. 2 Define the VLAN ID field. 3 Select a port in the Po r t s table, and as[...]

  • Page 396

    396 Configuring Switch Information The following is an example of the CLI commands: IGMP Snooping The IGMP Snooping page contains fields for a dding IGMP members. T o open the IGMP Snooping page, click Switch → Multicast Support → IGMP Snooping in the tree view . Figure 7-74. IGMP Snooping Console(config)# i nterface vlan 1 Console(config-if)# [...]

  • Page 397

    Configuring Switch Information 397 • VLAN ID — Specifies the VLAN ID. • IGMP Snooping Status — Enables or disables IGMP snooping on the VLAN. • Auto Learn — Enables or disables Au to Learn on the device. • IGMP Querier Status — Enables or disables the IGMP Qu erier . The IGMP Querier simulates the behavior of a multicast router , al[...]

  • Page 398

    398 Configuring Switch Information Configuring IGMP Snoopi ng with CLI Commands The following table summarizes the equivalent CLI commands for configuring IGMP Snooping on the device: T able 7-43. IGMP Snooping CLI Commands CLI Command Description ip igmp snooping Enables Internet Group Membership P rotocol (IGMP) snooping. ip igmp snooping mrouter[...]

  • Page 399

    Configuring Switch Information 399 The following is an example of the CLI commands: Console> enable Console# config Console (config )# ip igmp snooping Console (config)# interface vlan 1 Console (config-if)# ip igmp snooping mr outer learn-pim-dvmrp Console (config-if)# ip igmp snooping host-time-out 300 Console (config-if)# ip igmp snooping mro[...]

  • Page 400

    400 Configuring Switch Information IGMP Snooping admin: Enabled Hosts and routers IGMP version: 2 IGMP snooping oper mode: Enabled IGMP snooping queri er admin: Enabled IGMP snooping que rier oper: Enabled IGMP snooping que rier address admin: IGMP snooping querier address oper: 172.16.1.1 IGMP snooping queri er version admin: 3 IGMP snooping queri[...]

  • Page 401

    Configuring Switch Information 401 Unregistered Multicast Multicast frames are generally forwar ded to all port s in the VLAN. If IGMP Snoop ing is enabled, the device learns about the existence of Multicast groups and monitors which ports have joined what Multicast group. Multicast groups can also be statica lly enabled. This enables the dev ice t[...]

  • Page 402

    402 Configuring Switch Information Setting the Unregistered Multicas t Status of an Interface 1 Open the Unregistered Multicast page. 2 Select the interface for which Unr egister ed Multicast needs to be set. 3 Select a status in the Status field. 4 Click Apply Changes . Unregister ed Multicast status is set. Displaying the Unregistered Multicast T[...]

  • Page 403

    Configuring Switch Information 403 Configuring Unregistered Multicast with CLI Commands The following table summarizes the equivalent CLI commands for configuring Unregister ed Multicast on the device: The following is an example of the CLI commands: T able 7-44. Unregistered Multicast CLI Commands CLI Command Description bridge multicast unregiste[...]

  • Page 404

    404 Configuring Switch Information[...]

  • Page 405

    Viewing Statistics 405 V iewing Statistics The Statistic pages contains links to device informa tion for interface, GVRP , etherlike, RMON, and device utilization. T o open the Statistics page, click Statistics in the tree view . CLI commands are not available fo r all the Statistics pages. This section contians the following topics: • "View[...]

  • Page 406

    406 Viewing Statistics Figure 8-1. Utilization Summary The Utilization Summary page contains the following fields: • Ref re s h R a te —Indicates the amount of time that passes b efore the interface statistics ar e refr eshed. The possible field values are: • 15 Sec — Indicates that the interface stati stics are r efreshed every 15 seconds.[...]

  • Page 407

    Viewing Statistics 407 Viewing Counter Summary The Counter Summary page contains statistics for port util ization in numeric sums as opposed to percentages. T o open the Counter Summary page, click Statistics/RMON → Ta b l e V i e w s → Counter Summary in the tree view . Figure 8-2. Counter Summary The Counter Summary page contains the followin[...]

  • Page 408

    408 Viewing Statistics • Received Non Unicast P ackets — Number of received non-Unic ast pack ets on the interface. • T ransmit Non Unicast P ackets — Number of transmitted non-Unicast packets from the interface. • Received Errors — Number of received pack ets with errors on the interface. • Global System LAGs — P rovides a counter [...]

  • Page 409

    Viewing Statistics 409 The Interface Statistics page contains the following fields: • Interface — Specifies whether statistics are displayed for a port or LAG. • Ref re s h R a te — Amount of time that passes before the int erface statistics are r efreshed. The possible field values are: • 15 Sec — Indicates that the interface stati sti[...]

  • Page 410

    410 Viewing Statistics Viewing Interface Statistics Using the CLI Commands The following table contains the CLI co mmands for viewing interface statistics. The following is an example of the CLI commands. T able 8-1. Interface Stat istics CLI Commands CLI Command Description show interfaces counters [ ethernet interface | port - channel port-channe[...]

  • Page 411

    Viewing Statistics 411 Viewing Etherlike Statistics The Etherlike Statistics page contains interface errors statistics. T o open the Etherlike Statistics page, click Statistics/RMON → Ta b l e V i e w s → Etherlike Statistics in the tree view . Figure 8-4. Etherlike Statistics The Etherlike Statistics page contains the following fields: • Int[...]

  • Page 412

    412 Viewing Statistics • Single Collision F rames — Number of single collision frame erro rs received on the selected interface. • Late Collisions — Number of late collisions rece ived on the selected interface. • Internal MAC T ransmit Errors — Number of internal MAC transmit errors on the selected interface. • Oversize P ackets — [...]

  • Page 413

    Viewing Statistics 413 The following is an example of the CLI commands. Console# show interfaces cou nters ethernet 1/e1 Port IN Octets InUcastPkt s InMcastPkts InBcastPkts ---- --------- ----------- ----------- ----------- 1/e1 183892 1289 987 8 Port OUT Octets OutUcas tPkts OutMcastPkts OutBcastPkts ---- ---------- ---------- -- ------------ ----[...]

  • Page 414

    414 Viewing Statistics Viewing GVRP Statistics The GVRP Statistics page contains device statistics for GVRP . T o open the page, click Statistics/RMON → Ta b l e V i e w s → GVRP Statistics in the tree view . Figure 8-5. GVRP Statistics The GVRP Statistics page contains the following fields: • Interface — Specifies whether statistics are di[...]

  • Page 415

    Viewing Statistics 415 GVRP Statistics T able • Join Empty — Device GVRP Join Empty statistics. • Empty — Indicates the number of empty GVRP statistics. • Leave Empty — Device GVRP Leave Empty statistics. • Join In — Device GVRP Join In statistics. • Leave In — Device GVRP Leave in statistics. • Leave All — Device GVRP Leave[...]

  • Page 416

    416 Viewing Statistics The following is an example of the CLI commands: console# show gvrp statistics GVRP statistics: ---------------- Legend: rJE : Join Empty Received rJIn : Join In Received rEmp : Empty Received rLIn : Leave In Received rLE : Leave Empty Received rLA : Leave All Received sJE : Join Empty Sent sJIn : Join In Sent sEmp : Empty Se[...]

  • Page 417

    Viewing Statistics 417 Console# show gvrp error-statistics GVRP error statistics: ---------------- Legend: INVPROT : Invalid Protocol Id INVPLEN : Invalid PDU Length INVATYP : Invalid Attribute Type INVALEN : Invalid Attribute Length INVAVAL : Invalid Attribute Value INVEVENT : Invalid Event Port INVPROT INVATYP INVAVAL INVPLEN INVALEN INVEVENT ---[...]

  • Page 418

    418 Viewing Statistics Viewing EAP Statistics The EAP Statistics page contains information about EAP packe ts r eceived on a specific port. F or more information about EAP , see " P ort Based Authentication ". T o open the EAP Statistics page, click Statistics/RMON → T able V iews → EAP Statistics in the tree view . Figure 8-6. EAP St[...]

  • Page 419

    Viewing Statistics 419 • F rames T ransmit — Indicates the number of EAPOL frames transmitted via the port. • Start F rames Receive — Indicates the number of EAPOL St art frames received on the port. • Log off Frames R eceive — Indicates the number of EAPOL Logo ff frames received on the port. • Respond ID F rames Receive — Indicate[...]

  • Page 420

    420 Viewing Statistics The following is an example of the CLI commands: V iewing RMON Statistics Remote Monitoring (RMON) allows network managers to view network information from a remote location. T o open the RMON page, cClick a link below to access on-line help for the indicated screen. lick Statistics/RMON → RMON in the tree view . This secti[...]

  • Page 421

    Viewing Statistics 421 Figure 8-7. RMON Statistics The RMON Statistics page contains the following fields: • Interface — Specifies the port or LAG fo r which statistics are displayed. • Ref re s h R a te — Amount of time that passes befo re the statistics are r efreshed. • Received Bytes (Octets) — Number of bytes received on the select[...]

  • Page 422

    422 Viewing Statistics • CRC & Align Errors — Number of CRC and Align errors that have occurr ed on the interface since the device was last refr eshed. • Undersize P ackets — Number of undersized packets (less th an 64 octets) r eceived on the interface since the device was last refr eshed. • Oversize P ackets — Number of oversized [...]

  • Page 423

    Viewing Statistics 423 The following is an example of the CLI commands: Viewing RMON History Control Statistics The RMON History Control contains information about samples of data taken from ports. F or example, the samples may include interface definit ions or polling periods. T o open the RMON History Control page, click Statistics/RMON → RMON [...]

  • Page 424

    424 Viewing Statistics The RMON History Control page contains the following fields: • History Entry No . — Entry number for the History Control page. • Source Interface — P ort or LAG from which the history samples were tak en. • Owner (0-20 characters) — RMON station or user that requested the RMON information. • Max No . of Samples [...]

  • Page 425

    Viewing Statistics 425 Viewing RMON History Control Using the CLI Commands The following table contains the CLI co mmands for viewing RMON History Control. The following is an example of the CLI commands: Viewing the RMON History T able The RMON History T able contains interface specific statistica l network samplings. Each table entry repr esents [...]

  • Page 426

    426 Viewing Statistics The RMON History T able page contains the following fields: Not all fields are shown in the RMON History T able in the RMON History T able figure. • History Entry No . — Specifies the entry number from the History Control page. • Owner — Indicates the RMON station or user that requested the RMON information. • Sampl[...]

  • Page 427

    Viewing Statistics 427 Viewing RMON History Control Using the CLI Commands The following table contains the CLI commands for viewing RMON history . The following is an example of the CLI command s for displaying RMON ethernet statistics for throughput on index 1: T able 8-7. RMON History Control CLI Commands CLI Command Description show rmon histor[...]

  • Page 428

    428 Viewing Statistics Defining Device RMON Events Use the RMON Events Control page to define RMON events. T o open the RMON Events Control page, click Statistics/RMON → RMON → Events Control in the tree view . Figure 8-10. RMON Events Control The RMON Events Control page contains the following fields: • Event Entry — Indicates the event. ?[...]

  • Page 429

    Viewing Statistics 429 Adding a RMON Event 1 Open the RMON Events Control page. 2 Click Add . The Add an Event Entry page opens. 3 Complete the information in the dialog and click Apply Changes . The Event T able entry is added, and the device is updated. Modifying a RMON Event 1 Open the RMON Events Control page 2 Select an entry in the Event T ab[...]

  • Page 430

    430 Viewing Statistics The following is an example of the CLI commands: Viewing the RMON Events Log The RMON Events Log page contains a list of RMON events. T o open the RMON Events Log page, click Statistics/RMON → RMON → Events Log in the tree view . Figure 8-11. RMON Events Log The RMON Events Log page contains the following fields: • Even[...]

  • Page 431

    Viewing Statistics 431 Defining Device Events Using the CLI Commands The following table contains the CLI commands for defining device events. The following is an example of the CLI commands: Defining RMON Device Alarms Use the RMON Alarms page to set network alarms. Network al arms occur when a network problem, or event, is detected. Rising and fa[...]

  • Page 432

    432 Viewing Statistics Figure 8-12. RMON Alarms The RMON Alarms page contains the following fields: • Alarm Entry — Indicates a specific alarm. • Interface — Indicates the interface for which RMON statistics are displayed. • Counter Name — Indicates the selected MIB variable. • Counter V alue — The value of the selected MIB variable[...]

  • Page 433

    Viewing Statistics 433 • Rising Event — The mechanism in which the alarms are r e ported including a log, a trap, or both. When a log is selected, there is no saving me chanism either in the device or in the management system. However , if the device is not being reset, it remains in the device Log table. If a trap is selected, an SNMP trap is [...]

  • Page 434

    434 Viewing Statistics Modifying an Alarm T able Entry 1 Open the RMON Alarms page. 2 Select an entry in the Alarm Entry drop-down menu. 3 Modify the fields. 4 Click Apply Changes . The entry is modified, and the device is updated. Displaying the Alarm T able 1 Open the RMON Alarms page. 2 Click Show All . The Alarms T able opens. Deleting an Alarm[...]

  • Page 435

    Viewing Statistics 435 The following is an example of the CLI commands: V iewing Charts The Chart page contains links for di splaying statistics in a chart form. T o open the page, click Statistics → Charts in the tree view . This section contians the following topics: • "Viewing P ort Statistics" on page 436 • "Viewing LAG Sta[...]

  • Page 436

    436 Viewing Statistics Viewing Port Statistics Use the P ort Statistics page to open statistics in a chart fo rm for port elem ents. T o open the Po r t Statistics page, click Statistics/RMON → Charts → P ort Statistics in the tree view . Figure 8-14. Port Statistics The P ort Statistics page contains the following fields: • Unit No . — Ind[...]

  • Page 437

    Viewing Statistics 437 Viewing Port Statistics Using the CLI Commands The following table contains the CLI commands for viewing port statistics. Viewing LAG Statistics Use the LAG Statistics page to open statistics in a ch art form for LAGs. T o open the LAG Statistics page, click Statistics/RMON → Charts → LAG Statistics in the tr ee view . Fi[...]

  • Page 438

    438 Viewing Statistics The LAG Statistics page contains the following fields: • Interface Statistics — Selects the interface statistics to display . • Etherlike Statistics — Selects the Etherlike statistics to display . • RMON Statistics — Selects the RMON statistics to display . • GVRP Statistics — Selects the GVRP statistics type [...]

  • Page 439

    Viewing Statistics 439 Viewing the CPU Utilization The CPU Utilization page contains information about the sy stem’s CPU utilizatio n and percentage of CPU r esources consumed by each stacking member . Each stacking member is assigned a color on the graph. T o open the CPU Utilization page, click Statistics/RMON → Charts → CPU Utilization in [...]

  • Page 440

    440 Viewing Statistics Viewing CPU Utilization Using CLI Commands The following table summarizes the equivalent CLI commands for viewing CPU utilization. The following is an example of the CLI commands: Figure 8-17. CPU Utilization CLI Commands CLI Command Description show cpu utilization T o display the CPU utilization. Console# show cpu utilizati[...]

  • Page 441

    Configuring Quality of Service 441 Configuring Quality of Service This section provides information for defining and configuring Quality of Service (QoS) parameters. T o open the Quality of Ser vice page , click Quality of Ser vice in the tree view . This section contians the following topics: • "Quality of Service (QoS) Overview" on pa[...]

  • Page 442

    442 Configuring Quality of Service P ackets arriving untagged ar e assigned a default VPT value, which is set on a per port basis. The assigned VPT is used to map the packet to the egr ess queue. DSCP values can be mapped to priority queues. The fo llowing table contains the default DSCP mapping to egress queue values: DSCP mapping is enabled on a [...]

  • Page 443

    Configuring Quality of Service 443 Configuring QoS Global Settings Quality of Service (QoS) provides the ability to implement QoS and priority queuing within a network. The Global Settings page contains a field for enabling or disabling QoS. It also contains a field for selecting the T rust mode. The T rust mode relies on pr edefined fi elds within[...]

  • Page 444

    444 Configuring Quality of Service Queue Settings • Strict P riority — Indicates the system queues are SP queues, when selected. • WRR — Indicates the system queues are WRR queues, when selected. Enabling Quality of Service: 1 Open the Global Settings page . 2 Select Enable in the Quality of Service field. 3 Click Apply Changes . Class of S[...]

  • Page 445

    Configuring Quality of Service 445 Defining QoS Interface Settings The Interface Settings page contains fields for deactivating the T rust mode, and setting the default CoS value on incoming untagged packets. T o open the Interface Settings page, click Quality of Service → QoS P arameters → Interface Settings in the tree view . Figure 9-2. Inte[...]

  • Page 446

    446 Configuring Quality of Service Assigning QoS Interfaces Using the CLI Commands The following table summarizes the equivalent CLI commands for config uring fields in the Interface Settings page. The following is an example of the CLI commands: Defining Bandwidth Settings The Bandwidth Settings page contains fields for defining the ba ndwidth set[...]

  • Page 447

    Configuring Quality of Service 447 • Interface — Indicates the port or LAG that is being displayed. • Egress Shaping Rate on Selected P ort — Indicates the Egress traffic limit status for the interface. – Checked — The Egress traffic limit is enabled. – Not Checked — The Egress traffic limit is disabled. • Committed Information Ra[...]

  • Page 448

    448 Configuring Quality of Service Assigning Bandwidth Settings Using the CLI Commands The following table summarizes the equivalent CLI commands for config uring fields in the Bandwidth Settings page. Mapping CoS V alues to Queues The CoS to Queue page contains fields for classifying CoS settings to traffic queues. T o open the CoS to Queue page, [...]

  • Page 449

    Configuring Quality of Service 449 The CoS to Queue page contains the following fields: • Class of Service — Specifies the CoS priority tag values, wh ere zero is the lowest and 7 is the highest. • Queue — The queue to which the CoS priority is mappe d. F our traffic priori ty queues are supported. • Restore Defaults — Restores the devi[...]

  • Page 450

    450 Configuring Quality of Service Mapping DSCP V alues to Queues The DSCP to Queue page provides fields for defining egress queue to specific DSCP fields. T o open the DSCP to Queue page, click Quality of Serv ice → QoS Mapping → DSCP to Queue in the tr ee view . Figure 9-6. DSCP to Queue The DSCP to Queue page contains the following fields: ?[...]

  • Page 451

    Configuring Quality of Service 451 Mapping a DSCP V alue and Assigning a Priority Queue 1 Open the DSCP to Queue page. 2 Select a value in the DSCP In column. 3 Define the Queue field. 4 Click Apply Changes . The DSCP is overwritten, and the value is assigned an egress queue. Assigning DSCP V alues Using the CLI Commands The following table summari[...]

  • Page 452

    452 Configuring Quality of Service[...]

  • Page 453

    Glossary 453 Glossary This glossary contains key technical wor ds of interest. A Access Mode Specifies the method by which user access is granted to the system. Access P rofiles Allows network managers to define profiles and rul es for accessing the switch module. Access to management functions can be limited to user gr oups, which are defined by t[...]

  • Page 454

    454 Glossary Auto-negotiation Allows 10/100 Mpbs or 10/100/1000 Mbps Ethernet ports to establish for the following features: • Duplex/ Half Duple x mode • Flow Control • Speed B Back P ressure A mechanism used with Half Duplex mode that enables a port not to receive a message. Backplane The main BUS that carries information in the switch modu[...]

  • Page 455

    Glossary 455 Bridge A device that connect two networks. Bridges are ha r dware specific, however they are protocol independent. Bridges operate at Layer 1 and Layer 2 levels. Broadcast Domain device sets that receive broadcast frames originating from any device within a designated set. Routers bind Broadcast domains, because routers do not forward [...]

  • Page 456

    456 Glossary D DHCP Client A device using DHCP to obtain configurati on parameters, such as a network address. DHCP Snooping DHCP Snooping expands network security by provid ing fir ewall security between untrusted interfaces and DHCP servers. DSCP DiffServe Code P oint (DSCP) . DSCP provides a method of taggi ng IP packets with QoS priority inform[...]

  • Page 457

    Glossary 457 F FFT F ast F orward T able. Provides information about forwar ding routes . If a packet arrives to a device with a known route, the packet is forwar ded via a route list ed in the FFT . If there is not a known route, the CPU forwards the pack et and updates the FFT . FIFO F irst In First Out. A queuing process wher e the first packet [...]

  • Page 458

    458 Glossary I IC Integrated Circuit . Integrated Circuits are small electronic devices composed from semiconductor material. ICMP Internet Control Message P rotocol. Allows gateway or destination host to communicat e with a source host, for example, to r e port a processing error . IEEE Institute of Electrical and Electronics Engineers. An Enginee[...]

  • Page 459

    Glossary 459 ISA T AP Intra-Site Automatic T unnel A ddressing P rotocol . ISA T AP is an automatic overlay tunneling mechanism that uses the underlying IPv4 network as a non- broadcast/multicast access link layer for IPv6. ISA T AP is designed for transporting IPv6 packets within a site where a native IPv6 infrastructur e is not yet available. L L[...]

  • Page 460

    460 Glossary MAC Address Learning MAC Addr ess L earning characterizes a learning brid ge, in which the packet’s source MA C address is recor ded. P ackets destined for that address ar e forw arded only to the bridge interface on which that address is located. P ackets addr e ssed to unknown addresses ar e forwarde d to every bridge interface. MA[...]

  • Page 461

    Glossary 461 NMS Network Management System. An interface that provides a method of managing a system. Node A network connection endpoint or a common junctio n for multiple network lines. Nodes include: • P rocessors • Controllers • W orkstations O OID Or ganizationally Unique Identifiers. Identifiers associated with a V oice VLAN. OUI Object [...]

  • Page 462

    462 Glossary Po r t S p e e d Indicates port speed of the port. P ort speeds include: • Ethernet 10 Mbps • F ast Ethernet 100Mbps • Gigabit Ethernet 1000 Mbps P rotocol A set of rules that governs how device s ex change information across networks. PVE P rotoc ol VLAN Edge. A port can be defined as a Private VLAN Ed ge (PVE) port of an uplink[...]

  • Page 463

    Glossary 463 RSTP Rapid Spanning T ree P rotocol . Detects and uses network topologies that allow a faster convergence of the spanning tree, without cr eating forwarding loops. Running Configuration F ile Contains all startup configuration file commands, as well as all commands ent ered during the curr ent session. After the switch module is powere[...]

  • Page 464

    464 Glossary Subnet Sub-network. Subnets are portions of a network that shar e a common address component. On TCP/IP networks, devices that share a pr efix are part of the sa me subnet. F or example, all devices with a pr efix of 157.100.100.100 are part of the same subnet. Subnet Mask Used to mask all or part of an IP address used in a subnet addr[...]

  • Page 465

    Glossary 465 W WA N W ide Area Networks . Networks that cover a large geographical ar ea. Wildcard Mask Specifies which IP address bits ar e used, and which bits are ignored. A wild switch module mask of 255.255.255.255 indicates that no bit is important. A wildcard of 0.0.0.0 indicates that all the bits ar e important.[...]

  • Page 466

    466 Glossary[...]

  • Page 467

    Device Feature Inter action Information 467 Device Feature Interaction Information The following table contains inform ation about feature interactions Fe a t u r e F eature Notes 802.1x Unauthenticated VL AN 802.1x Unauthenticated VLANs have restricted functionality with: • 802.1X Guest VLAN • Special VLAN 802.1x Unauthenticated VL AN P ort 80[...]

  • Page 468

    468 Device Feature Interaction Information Link Aggregation No feature interaction r estrictions or limitations. However , this feature has several guidelines for configuring Link Aggr egation. F or all the feature guid elines, se e "Defining LAG P arameters". LLDP -MED No feature interaction r estrictions or limitations. Locked P orts ?[...]

  • Page 469

    Device Feature Inter action Information 469 SNTP Authentication No feature interaction r estrictions or limitations. Spanning T ree No feature interaction r estrictions or limitations. Special VL AN No feature interaction restrictions or limitations Static MAC No feature interaction r estrictions or limitations Storm Co ntrol No feature interaction[...]

  • Page 470

    470 Device Feature Interaction Information[...]

  • Page 471

    Index 471 Index Numerics 802.1d, 21 802.1Q, 21, 357, 360 A AC unit, 35 Access mode, 235 Access profiles, 170 ACE, 453 ACL, 276 Address Resolution P rotocol, 162, 453 Address tables, 315 AH, 453 Alert, 114, 116 Anycast, 101-102, 104 ARP , 162-164, 453 Asset, 78, 81, 210, 219 Authentication P rofiles, 180- 181 Authentication profiles, 177 Auto-Negoti[...]

  • Page 472

    472 Index 472 Index F F ailure, 12 Fa n s , 9 0 F ast link, 22, 332, 336 F ile T ransfer Protocol, 457 F iltering, 358, 360, 387 F irmware, 248 Flow Control, 66 FTP , 457 G GARP , 321-322, 324, 457 GARP VLAN Registration P rotocol, 21, 457 Gateway , 129 GBIC, 457 Generic Attribute Registration P rotocol, 321 Generic Attributes Registration P rotoco[...]

  • Page 473

    Index 473 Management Access Methods, 181 Management Information Base, 219, 460 Management methods, 173 Management security , 170 Master Election/T opology Discovery Algorithm, 460 MD5, 102, 460 MDI, 18, 300, 460 MDI/MDIX, 66 MDIX, 18, 300, 460 MDU, 460 Media Endpoint Discovery , 211 Message, 103 Message digest 5, 103, 460 MIB, 219, 460 Multicast, 3[...]

  • Page 474

    474 Index 474 Index Software version, 98 Spanning T ree P rotocol, 325 SPF LEDs, 30 SSH, 182, 463 Stack master , 12-13 Stacking, 12, 34, 36 Stacking discovering, 14 Stacking failover topology , 13 Startup file, 246 Static addresses, 318 Storm control, 308 STP , 21, 325-326, 331, 334, 340 SYSLOG RFC, 114 T T ACA CS+, 178, 196 T elnet, 170, 182 T erm[...]