Smc-networks SMC TigerAccess SMC7824M/FSW Manual de usuario

Busca en linea o descarga Manual de usuario para Accesorios De Computador Smc-networks SMC TigerAccess SMC7824M/FSW. SMC Networks SMC TigerAccess SMC7824M/FSW User Manual Manual de usuario

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 748
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 0
TigerAccess
10/100
Fast Ethernet Switch
24 100BASE-BX Single-Fiber Ports
2 10/100/1000BASE-T ports shared with SFP slots
2 module slots for shared 1000BASE-T port / SFP slot
Non-blocking switching architecture
Spanning Tree Protocol, RSTP and MSTP
Up to 12 LACP or static 8-port trunks
Layer 2/3/4 CoS support through eight priority queues
Layer 3/4 traffic priority with IP Precedence and IP DSCP
Full support for VLANs with GVRP
IGMP multicast filtering and snooping
Support for jumbo frames up to 9 KB
Manageable via console, Web, SNMP/RMON
Security features: ACL, RADIUS, 802.1X
Management Guide
SMC7824M/FSW
Vista de pagina 0
1 2 3 4 5 6 ... 747 748

Indice de contenidos

Pagina 1 - TigerAccess

TigerAccess™ 10/100Fast Ethernet Switch◆ 24 100BASE-BX Single-Fiber Ports◆ 2 10/100/1000BASE-T ports shared with SFP slots◆ 2 module slots for shared

Pagina 2

TABLE OF CONTENTSxCreating Trunk Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8Statically Configuring a Trun

Pagina 3 - Management Guide

BASIC MANAGEMENT TASKS4-26Web – Click System, Line, Telnet. Specify the connection parameters for Telnet access, then click Apply.Figure 4-15 Configu

Pagina 4 - Trademarks:

CONFIGURING EVENT LOGGING4-27Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events tha

Pagina 5

BASIC MANAGEMENT TASKS4-28• RAM Level – Limits log messages saved to the switch’s temporary RAM memory for all levels up to the specified level. For e

Pagina 6

CONFIGURING EVENT LOGGING4-29CLI – Enable system logging and then specify the level of messages to be logged to RAM and flash memory. Use the show log

Pagina 7

BASIC MANAGEMENT TASKS4-30• Host IP Address – Specifies a new server IP address to add to the Host IP List.Web – Click System, Logs, Remote Logs. To a

Pagina 8

CONFIGURING EVENT LOGGING4-31CLI – Enter the syslog server host IP address, choose the facility type and set the logging trap.Displaying Log MessagesU

Pagina 9

BASIC MANAGEMENT TASKS4-32CLI – This example shows the event message stored in RAM.Sending Simple Mail Transfer Protocol AlertsTo alert system adminis

Pagina 10

CONFIGURING EVENT LOGGING4-33Web – Click System, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. To add

Pagina 11

BASIC MANAGEMENT TASKS4-34CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and speci

Pagina 12

SETTING THE SYSTEM CLOCK4-35CLI – Use the reload command to restart the switch.Note: When restarting the system, it will always run the Power-On Self-

Pagina 13

TABLE OF CONTENTSxiConfiguring Private VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-25Enabling Private VLANs . . . . .

Pagina 14

BASIC MANAGEMENT TASKS4-36• SNTP Server – Sets the IP address for up to three time servers. The switch attempts to update the time from the first serv

Pagina 15

SETTING THE SYSTEM CLOCK4-37Setting the Time ZoneSNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time

Pagina 16

BASIC MANAGEMENT TASKS4-38

Pagina 17

5-1CHAPTER 5SIMPLE NETWORKMANAGEMENT PROTOCOLSimple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing

Pagina 18

SIMPLE NETWORK MANAGEMENT PROTOCOL5-2Access to the switch using from clients using SNMPv3 provides additional security features that cover message int

Pagina 19

5-3Note: The predefined default groups and view can be deleted from the system. You can then define customized groups and views for the SNMP clients t

Pagina 20

SIMPLE NETWORK MANAGEMENT PROTOCOL5-4Enabling the SNMP AgentEnables SNMPv3 service for all management clients (i.e., versions 1, 2c, 3). Command Attri

Pagina 21

SETTING COMMUNITY ACCESS STRINGS5-5• Community String – A community string that acts like a password and permits access to the SNMP protocol. Default

Pagina 22

SIMPLE NETWORK MANAGEMENT PROTOCOL5-6Specifying Trap Managers and Trap TypesTraps indicating status changes are issued by the switch to specified trap

Pagina 23

SPECIFYING TRAP MANAGERS AND TRAP TYPES5-7To send an inform to a SNMPv3 host, complete these steps:1. Enable the SNMP agent (page 5-4).2. Enable trap

Pagina 24

TABLE OF CONTENTSxiiDisplaying Port Members of Multicast Groups . . . . . . . . . . . 15-19Assigning Static Multicast Groups to Interfaces . . . . .

Pagina 25

SIMPLE NETWORK MANAGEMENT PROTOCOL5-8• Trap Inform – Notifications are sent as inform messages. Note that this option is only available for version 2c

Pagina 26

SPECIFYING TRAP MANAGERS AND TRAP TYPES5-9Web – Click SNMP, Configuration. Enter the IP address and community string for each management station that

Pagina 27

SIMPLE NETWORK MANAGEMENT PROTOCOL5-10Configuring SNMPv3 Management AccessTo configure SNMPv3 management access to the switch, follow these steps:1. I

Pagina 28

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-11Web – Click SNMP, SNMPv3, Engine ID. Enter an ID of up to 64 hexadecimal characters and then click Save.Figure

Pagina 29

SIMPLE NETWORK MANAGEMENT PROTOCOL5-12Web – Click SNMP, SNMPv3, Remote Engine ID. Enter an ID of up to 64 hexadecimal characters and then click Save.F

Pagina 30

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-13- AuthPriv – SNMP communications use both authentication and encryption (only available for the SNMPv3 securit

Pagina 31

SIMPLE NETWORK MANAGEMENT PROTOCOL5-14Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and ass

Pagina 32

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-15CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring Remot

Pagina 33

SIMPLE NETWORK MANAGEMENT PROTOCOL5-16• Security Model – The user security model; SNMP v1, v2c or v3. (Default: v1)• Security Level – The security lev

Pagina 34

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-17Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a nam

Pagina 35 - NTRODUCTION

TABLE OF CONTENTSxiiiprompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-6end . . . . . .

Pagina 36

SIMPLE NETWORK MANAGEMENT PROTOCOL5-18CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring SNMPv3

Pagina 37

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-19• Notify View – The configured view for notifications. (Range: 1-64 characters)Table 5-2 Supported Notificati

Pagina 38 - ESCRIPTION

SIMPLE NETWORK MANAGEMENT PROTOCOL5-20linkDown*1.3.6.1.6.3.1.1.5.3 A linkDown trap signifies that the SNMP entity, acting in an agent role, has detect

Pagina 39

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-21RMON Events (V2)risingAlarm 1.3.6.1.2.1.16.0.1 The SNMP trap that is generated when an alarm entry crosses its

Pagina 40

SIMPLE NETWORK MANAGEMENT PROTOCOL5-22swThermalRising Notification1.3.6.1.4.1.202.20.64.90.2.1.0.58 This trap is sent when the temperature exceeds the

Pagina 41

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-23Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, as

Pagina 42 - System Defaults

SIMPLE NETWORK MANAGEMENT PROTOCOL5-24CLI – Use the snmp-server group command to configure a new group, specifying the security model and level, and r

Pagina 43

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-25Web – Click SNMP, SNMPv3, Views. Click New to configure a new view. In the New View page, define a name and sp

Pagina 44

SIMPLE NETWORK MANAGEMENT PROTOCOL5-26CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces

Pagina 45

6-1CHAPTER 6USER AUTHENTICATIONYou can configure this switch to authenticate users logging into the system for management access using local or remote

Pagina 46

TABLE OF CONTENTSxivspeed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-32stopbits . . . . . . . . .

Pagina 47

USER AUTHENTICATION6-2Command Attributes• Account List – Displays the current list of user accounts and associated access levels. (Defaults: admin, an

Pagina 48 - ONNECTING

CONFIGURING LOCAL/REMOTE LOGON AUTHENTICATION6-3CLI – Assign a user name to access-level 15 (i.e., administrator), then specify the password.Configuri

Pagina 49

USER AUTHENTICATION6-4Command Usage• By default, management access is always checked against the authentication database stored on the local switch. I

Pagina 50 - Basic Configuration

CONFIGURING LOCAL/REMOTE LOGON AUTHENTICATION6-5• RADIUS Settings- Global – Provides globally applicable RADIUS settings.- ServerIndex – Specifies one

Pagina 51 - Setting Passwords

USER AUTHENTICATION6-6Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authenticati

Pagina 52 - Manual Configuration

CONFIGURING HTTPS6-7Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket Laye

Pagina 53 - Dynamic Configuration

USER AUTHENTICATION6-8• The following web browsers and operating systems currently support HTTPS:• To specify a secure-site certificate, see “Replacin

Pagina 54

CONFIGURING HTTPS6-9Replacing the Default Secure-site CertificateWhen you log onto the web interface using HTTPS (for secure access), a Secure Sockets

Pagina 55

USER AUTHENTICATION6-10Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of th

Pagina 56 - Trap Receivers

CONFIGURING THE SECURE SHELL6-11To use the SSH server, complete these steps:1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a

Pagina 57

TABLE OF CONTENTSxvsnmp-server engine-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-10show snmp engine-id . . . .

Pagina 58 - Managing System Files

USER AUTHENTICATION6-126. Authentication – One of the following authentication methods is employed:Password Authentication (for SSH v1.5 or V2 Clients

Pagina 59 - Saving Configuration Settings

CONFIGURING THE SECURE SHELL6-13Authenticating SSH v2 Clientsa. The client first queries the switch to determine if DSA public key authentication usin

Pagina 60

USER AUTHENTICATION6-14• Host-Key Type – The key type used to generate the host key pair (i.e., public and private keys). (Range: RSA, DSA, Both: Defa

Pagina 61

CONFIGURING THE SECURE SHELL6-15Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to sa

Pagina 62

USER AUTHENTICATION6-16CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and then d

Pagina 63

CONFIGURING THE SECURE SHELL6-17• SSH Authentication Retries – Specifies the number of authentication attempts that a client is allowed before authent

Pagina 64

USER AUTHENTICATION6-18CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that the a

Pagina 65 - AVIGATING

CONFIGURING 802.1X PORT AUTHENTICATION6-19Configuring 802.1X Port Authentication Network switches can provide open and easy access to network resource

Pagina 66 - Button Action

USER AUTHENTICATION6-20Transport Layer Security). PEAP will be supported in future releases. The client responds to the appropriate method with its cr

Pagina 67 - Table 3-2 Switch Main Menu

CONFIGURING 802.1X PORT AUTHENTICATION6-21Displaying 802.1X Global SettingsThe 802.1X protocol provides port authentication. Command Attributes 802.1X

Pagina 68

TABLE OF CONTENTSxviip ssh timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-25ip ssh authentication-retries .

Pagina 69

USER AUTHENTICATION6-22Configuring 802.1X Global SettingsThe 802.1X protocol provides port authentication. The 802.1X protocol must be enabled globall

Pagina 70

CONFIGURING 802.1X PORT AUTHENTICATION6-23Configuring Port Settings for 802.1XWhen 802.1X is enabled, you need to configure the parameters for the aut

Pagina 71

USER AUTHENTICATION6-24• Re-authentication Period – Sets the time period after which a connected client must be re-authenticated. (Range: 1-65535 seco

Pagina 72

CONFIGURING 802.1X PORT AUTHENTICATION6-25CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displaye

Pagina 73

USER AUTHENTICATION6-26Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Backend State Machine

Pagina 74

CONFIGURING 802.1X PORT AUTHENTICATION6-27Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to u

Pagina 75

USER AUTHENTICATION6-28Filtering IP Addresses for Management AccessYou can create a list of up to 16 IP addresses or IP address groups that are allowe

Pagina 76

FILTERING IP ADDRESSES FOR MANAGEMENT ACCESS6-29• End IP Address – The end address of a range.Web – Click Security, IP Filter. Enter the IP addresses

Pagina 77

USER AUTHENTICATION6-30

Pagina 78

7-1CHAPTER 7CLIENT SECURITYThis switch supports many methods of segregating traffic for clients attached to each of the data ports, and for ensuring t

Pagina 79

TABLE OF CONTENTSxviiip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-14ip dhcp snooping verify mac-address . .

Pagina 80

CLIENT SECURITY7-2• DHCP Snooping5 – Filters IP traffic on unsecure ports for which the source address cannot be identified via DHCP snooping nor stat

Pagina 81

CONFIGURING PORT SECURITY7-3• The default maximum number of MAC addresses allowed on a secure port is zero. You must configure a maximum address count

Pagina 82

CLIENT SECURITY7-4Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox in the

Pagina 83

8-1CHAPTER 8ACCESS CONTROL LISTSAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port n

Pagina 84

ACCESS CONTROL LISTS8-2The following filtering modes are supported: • Standard IP ACL mode (STD-ACL) filters packets based on the source IP address. •

Pagina 85 - APABILITIES

CONFIGURING ACCESS CONTROL LISTS8-3• Egress MAC ACLs only work for destination-mac-known packets, not for multicast, broadcast, or destination-mac-unk

Pagina 86

ACCESS CONTROL LISTS8-4Web – Click Security, ACL, Configuration. Enter an ACL name in the Name field, select the list type (IP Standard, IP Extended,

Pagina 87

CONFIGURING ACCESS CONTROL LISTS8-5Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,”

Pagina 88 - Using DHCP/BOOTP

ACCESS CONTROL LISTS8-6• Source/Destination IP Address – Source or destination IP address.• Source/Destination Subnet Mask – Subnet mask for source or

Pagina 89

CONFIGURING ACCESS CONTROL LISTS8-7Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the addres

Pagina 90

TABLE OF CONTENTSxviiiflowcontrol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24-7media-type . .

Pagina 91

ACCESS CONTROL LISTS8-83. Permit all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Configuring a MAC ACLComman

Pagina 92

CONFIGURING ACCESS CONTROL LISTS8-9Command UsageEgress MAC ACLs only work for destination-mac-known packets, not for multicast, broadcast, or destinat

Pagina 93 - ESTORING

ACCESS CONTROL LISTS8-10Configuring ACL MasksYou must specify masks that control the order in which ACL rules are checked. ACL rules matching the firs

Pagina 94

CONFIGURING ACCESS CONTROL LISTS8-11Specifying the Mask TypeUse the ACL Mask Configuration page to edit the mask for the Ingress IP ACL, Egress IP ACL

Pagina 95

ACCESS CONTROL LISTS8-12Configuring an IP ACL MaskThis mask defines the fields to check in the IP header. Command Usage• Masks that include an entry f

Pagina 96

CONFIGURING ACCESS CONTROL LISTS8-13Web – Configure the mask to match the required rules in the IP ingress or egress ACLs. Set the mask to check for a

Pagina 97 - 1. CLI only

ACCESS CONTROL LISTS8-14CLI – This shows that the entries in the mask override the precedence in which the rules are entered into the ACL. In the foll

Pagina 98

CONFIGURING ACCESS CONTROL LISTS8-15Web – Configure the mask to match the required rules in the MAC ingress or egress ACLs. Set the mask to check for

Pagina 99 - 2. CLI only

ACCESS CONTROL LISTS8-16CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rules

Pagina 100 - ANAGEMENT

BINDING A PORT TO AN ACCESS CONTROL LIST8-17• When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Oth

Pagina 101 - Command Attributes

TABLE OF CONTENTSxixspanning-tree mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29-4spanning-tree forward-time

Pagina 102

ACCESS CONTROL LISTS8-18CLI – This examples assigns an IP and MAC ingress ACL to port 1, and an IP ingress ACL to port 2.Console(config)#interface eth

Pagina 103

9-1CHAPTER 9PORT CONFIGURATIONDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the current connectio

Pagina 104

PORT CONFIGURATION9-2Web – Click Port, Port Information or Trunk Information.Figure 9-1 Port - Port InformationField Attributes (CLI)Basic informatio

Pagina 105 - Displaying Log Messages

DISPLAYING CONNECTION STATUS9-3- 100full - Supports 100 Mbps full-duplex operation - 1000full - Supports 1000 Mbps full-duplex operation - Sym - Trans

Pagina 106

PORT CONFIGURATION9-4CLI – This example shows the connection status for Port 5.Configuring Interface Connections You can use the Port Configuration or

Pagina 107 - ONFIGURING

CONFIGURING INTERFACE CONNECTIONS9-5Note: 100BASE-BX ports are fixed at 100 Mbps, full-duplex. The 1000BASE-T standard does not support forced mode. A

Pagina 108 - Resetting the System

PORT CONFIGURATION9-6-SFP-Forced - Always uses the SFP port (even if module is not installed).-SFP-Preferred-Auto - Uses SFP port if both combination

Pagina 109

CONFIGURING INTERFACE CONNECTIONS9-7CLI – Select the interface, and then enter the required settings.Console(config)#interface ethernet 1/13 24-2Conso

Pagina 110

PORT CONFIGURATION9-8Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers

Pagina 111

CREATING TRUNK GROUPS9-9• The ports at both ends of a trunk must be configured in an identical manner, including communication mode (i.e., speed, dupl

Pagina 113

TABLE OF CONTENTSxxinterface vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30-9switchport mode . . . . . . . .

Pagina 114

PORT CONFIGURATION9-10Command Attributes• Member List (Current) – Shows configured trunks (Trunk ID, Unit, Port).• New – Includes entry fields for cr

Pagina 115

CREATING TRUNK GROUPS9-11CLI – This example creates trunk 1 with ports 9 and 10. Just connect these ports to two static trunk ports on another switch

Pagina 116

PORT CONFIGURATION9-12• A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID. • If more than eight

Pagina 117 - OMMUNITY

CREATING TRUNK GROUPS9-13CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another sw

Pagina 118 - Command Usage

PORT CONFIGURATION9-14Note: If the port channel admin key (lacp admin key, page 25-8) is not set (through the CLI) when a channel group is formed (i.e

Pagina 119

CREATING TRUNK GROUPS9-15Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can o

Pagina 120

PORT CONFIGURATION9-16CLI – The following example configures LACP parameters for ports 1-10. Ports 1-8 are used as active members of the LAG, ports 9

Pagina 121

CREATING TRUNK GROUPS9-17Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters Inf

Pagina 122

PORT CONFIGURATION9-18CLI – The following example displays LACP counters for port channel 1.Displaying LACP Settings and Status for the Local SideYou

Pagina 123

CREATING TRUNK GROUPS9-19Admin State, Oper StateAdministrative or operational values of the actor’s state parameters:• Expired – The actor’s receive m

Pagina 124

TABLE OF CONTENTSxximap ip precedence (Interface Configuration) . . . . . . . . . . . . . 31-13map ip dscp (Global Configuration) . . . . . . . . .

Pagina 125

PORT CONFIGURATION9-20Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 9-7 LA

Pagina 126

CREATING TRUNK GROUPS9-21Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for t

Pagina 127

PORT CONFIGURATION9-22Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information.Figure 9-8 L

Pagina 128

SETTING BROADCAST STORM THRESHOLDS9-23Setting Broadcast Storm ThresholdsBroadcast storms may occur when a device on your network is malfunctioning, or

Pagina 129

PORT CONFIGURATION9-24Web – Click Port, Port Broadcast Control or Trunk Broadcast Control. Check the Enabled box for any interface, set the threshold,

Pagina 130

CONFIGURING PORT MIRRORING9-25Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can t

Pagina 131

PORT CONFIGURATION9-26Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port, the

Pagina 132

CONFIGURING RATE LIMITS9-27Command AttributeRate Limit – Sets the output rate limit for an interface. Default Status – DisabledDefault Rate – Fast Eth

Pagina 133

PORT CONFIGURATION9-28Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like MIBs,

Pagina 134

SHOWING PORT STATISTICS9-29Received Unknown PacketsThe number of packets received via the interface which were discarded because of an unknown or unsu

Pagina 135

TABLE OF CONTENTSxxiiMulticast VLAN Registration Commands . . . . . . . . . . . . . . . . . . . . . 33-15mvr (Global Configuration) . . . . . . . .

Pagina 136

PORT CONFIGURATION9-30FCS Errors A count of frames received on a particular interface that are an integral number of octets in length but do not pass

Pagina 137

SHOWING PORT STATISTICS9-31RMON StatisticsDrop Events The total number of events in which packets were dropped due to lack of resources.Jabbers The to

Pagina 138

PORT CONFIGURATION9-32Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the bo

Pagina 139 - UTHENTICATION

SHOWING PORT STATISTICS9-33Figure 9-12 Port Statistics

Pagina 140

PORT CONFIGURATION9-34CLI – This example shows statistics for port 12.Console#show interfaces counters ethernet 1/12 24-14Ethernet 1/12 Iftable stats:

Pagina 141 - Authentication

10-1CHAPTER 10ADDRESS TABLE SETTINGSSwitches store the addresses for all known devices. This information is used to pass traffic directly between the

Pagina 142

ADDRESS TABLE SETTINGS10-2Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address.

Pagina 143

DISPLAYING THE ADDRESS TABLE10-3Displaying the Address TableThe Dynamic Address Table contains the MAC addresses learned by monitoring the source addr

Pagina 144

ADDRESS TABLE SETTINGS10-4Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN checkb

Pagina 145

CHANGING THE AGING TIME10-5Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attributes• Aging Statu

Pagina 146

TABLE OF CONTENTSxxiiiSection IV AppendicesA Software Specifications . . . . . . . . . . . . . . . . . . . . . . . . A-1Software Features . . . . .

Pagina 147

ADDRESS TABLE SETTINGS10-6

Pagina 148

11-1CHAPTER 11SPANNING TREE ALGORITHMThe Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links be

Pagina 149

SPANNING TREE ALGORITHM11-2Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transm

Pagina 150

11-3maintain connectivity among each of the assigned VLAN groups. MSTP then builds a Internal Spanning Tree (IST) for the Region containing all common

Pagina 151 - Field Attributes

SPANNING TREE ALGORITHM11-4MSTP connects all bridges and LAN segments with a single Common and Internal Spanning Tree (CIST). The CIST is formed as a

Pagina 152

DISPLAYING GLOBAL SETTINGS11-5make it return to a discarding state; otherwise, temporary data loops might result.• Designated Root – The priority and

Pagina 153 - Generate

SPANNING TREE ALGORITHM11-6configuration messages at regular intervals. If the root port ages out STA information (provided in the last configuration

Pagina 154

DISPLAYING GLOBAL SETTINGS11-7CLI – This command displays global STA settings, followed by settings for each port. Note: The current root port and cur

Pagina 155

SPANNING TREE ALGORITHM11-8Configuring Global SettingsGlobal settings apply to the entire switch.Command Usage• Spanning Tree Protocol11Uses RSTP for

Pagina 156

CONFIGURING GLOBAL SETTINGS11-9- Be careful when switching between spanning tree modes. Changing modes stops all spanning-tree instances for the previ

Pagina 157 - 802.1X P

TABLE OF CONTENTSxxiv

Pagina 158

SPANNING TREE ALGORITHM11-10reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals. An

Pagina 159

CONFIGURING GLOBAL SETTINGS11-11Configuration Settings for MSTP • Max Instance Numbers – The maximum number of MSTP instances to which this switch can

Pagina 160

SPANNING TREE ALGORITHM11-12Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 11-2 STA Global Con

Pagina 161

DISPLAYING INTERFACE SETTINGS11-13CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MSTP parame

Pagina 162

SPANNING TREE ALGORITHM11-14- If two ports of a switch are connected to the same segment and there is no other STA device attached to this segment, th

Pagina 163

DISPLAYING INTERFACE SETTINGS11-15• Trunk Member – Indicates if a port is a member of a trunk. (STA Port Information only)These additional parameters

Pagina 164 - Displaying 802.1X Statistics

SPANNING TREE ALGORITHM11-16loops. Where more than one port is assigned the highest priority, the port with the lowest numeric identifier will be enab

Pagina 165

CONFIGURING INTERFACE SETTINGS11-17CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RSTP and MS

Pagina 166

SPANNING TREE ALGORITHM11-18- Discarding - Port receives STA configuration messages, but does not forward packets.- Learning - Port has transmitted co

Pagina 167 - DDRESSES

CONFIGURING INTERFACE SETTINGS11-19When the short path cost method is selected and the default path cost recommended by the IEEE 8021w standard exceed

Pagina 168

xxvTABLESTable 1-1 Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Table 1-2 System Defaults . . . . . .

Pagina 169

SPANNING TREE ALGORITHM11-20such as workstations or servers, retains the current forwarding database to reduce the amount of frame flooding required t

Pagina 170

CONFIGURING MULTIPLE SPANNING TREES11-21Configuring Multiple Spanning Trees MSTP generates a unique spanning tree for each instance. This provides mul

Pagina 171

SPANNING TREE ALGORITHM11-22• VLANs in MST Instance – VLANs assigned this instance.• MST ID – Instance identifier to configure. (Range: 0-4094; Defaul

Pagina 172 - Console(config-if)#

CONFIGURING MULTIPLE SPANNING TREES11-23CLI – This displays STA settings for instance 1, followed by settings for each port. Console#show spanning-tre

Pagina 173

SPANNING TREE ALGORITHM11-24CLI – This example sets the priority for MSTI 1, and adds VLANs 1-5 to this MSTI. Displaying Interface Settings for MSTPTh

Pagina 174

DISPLAYING INTERFACE SETTINGS FOR MSTP11-25CLI – This displays STA settings for instance 0, followed by settings for each port. The settings for insta

Pagina 175

SPANNING TREE ALGORITHM11-26Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance using the MSTP Por

Pagina 176

CONFIGURING INTERFACE SETTINGS FOR MSTP11-27• Admin MST Path Cost – This parameter is used by the MSTP to determine the best path between devices. The

Pagina 177

SPANNING TREE ALGORITHM11-28CLI – This example sets the MSTP attributes for port 4. Console(config)#interface ethernet 1/4 24-2Console(config-if)#span

Pagina 178

12-1CHAPTER 12VLAN CONFIGURATIONIEEE 802.1Q VLANsIn large networks, routers are used to isolate broadcast traffic for each subnet into separate domain

Pagina 179

TABLESxxviTable 19-11 show logging flash/ram - display description . . . . . . . . . . 19-43Table 19-12 show logging trap - display description . .

Pagina 180

VLAN CONFIGURATION12-2• Distributed VLAN learning across multiple switches using explicit or implicit tagging and GVRP protocol• Port overlapping, all

Pagina 181

IEEE 802.1Q VLANS12-3VLAN Classification – When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, the

Pagina 182

VLAN CONFIGURATION12-4To implement GVRP in a network, first add the host devices to the required VLANs (using the operating system or other applicatio

Pagina 183 - Specifying the Mask Type

IEEE 802.1Q VLANS12-5forwarding a frame from this switch along a path that does not contain any VLAN-aware devices (including the destination host), t

Pagina 184 - Configuring an IP ACL Mask

VLAN CONFIGURATION12-6Displaying Basic VLAN InformationThe VLAN Basic Information page displays basic information on the VLAN type supported by the sw

Pagina 185

IEEE 802.1Q VLANS12-7Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN and whether or not the port supports V

Pagina 186 - Configuring a MAC ACL Mask

VLAN CONFIGURATION12-8Command Attributes (CLI)• VLAN – ID of configured VLAN (1-4093, no leading zeroes).• Type – Shows how this VLAN was added to the

Pagina 187

IEEE 802.1Q VLANS12-9• VLAN ID – ID of configured VLAN (1-4093).• VLAN Name – Name of the VLAN (1 to 32 characters).• Status (Web) – Enables or disabl

Pagina 188

VLAN CONFIGURATION12-10CLI – This example creates a new VLAN.Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port me

Pagina 189

IEEE 802.1Q VLANS12-11• Status – Enables or disables the specified VLAN. - Enable: VLAN is operational.- Disable: VLAN is suspended; i.e., does not pa

Pagina 190

TABLESxxviiTable 26-1 Mirror Port Commands . . . . . . . . . . . . . . . . . . . . . . . . . . 26-1Table 27-1 Rate Limit Commands . . . . . . . .

Pagina 191 - Field Attributes (Web)

VLAN CONFIGURATION12-12Web – Click VLAN, 802.1Q VLAN, Static Table. Select a VLAN ID from the scroll-down list. Modify the VLAN name and status if req

Pagina 192 - Configuration:

IEEE 802.1Q VLANS12-13Adding Static Members to VLANs (Port Index)Use the VLAN Static Membership by Port menu to assign VLAN groups to the selected int

Pagina 193 - Current status:

VLAN CONFIGURATION12-14Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN ide

Pagina 194

IEEE 802.1Q VLANS12-15- If ingress filtering is disabled and a port receives frames tagged for VLANs for which it is not a member, these frames will b

Pagina 195 - ONNECTIONS

VLAN CONFIGURATION12-16belonging to the port’s default VLAN (i.e., associated with the PVID) are also transmitted as tagged frames. - Hybrid – Specifi

Pagina 196 - ONFIGURATION

CONFIGURING IEEE 802.1Q TUNNELING12-17CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP,

Pagina 197

VLAN CONFIGURATION12-18IDs. QinQ tunneling expands VLAN space by using a VLAN-in-VLAN hierarchy, preserving the customer’s original tagged packets, an

Pagina 198

CONFIGURING IEEE 802.1Q TUNNELING12-19Layer 2 Flow for Packets Coming into a Tunnel PortA QinQ tunnel port may receive either tagged or untagged packe

Pagina 199

VLAN CONFIGURATION12-203. After packet classification through the switching process, the packet is written to memory with one tag (an outer tag) or wi

Pagina 200

CONFIGURING IEEE 802.1Q TUNNELING12-214. After successful source and destination lookup, the packet is double tagged. The switch uses the TPID of 0x81

Pagina 201

TABLESxxviii

Pagina 202

VLAN CONFIGURATION12-22- Tunnel ports do not support IP Access Control Lists. - Layer 3 Quality of Service (QoS) and other QoS features containing Lay

Pagina 203 - Configuring LACP Parameters

CONFIGURING IEEE 802.1Q TUNNELING12-23Adding an Interface to a QinQ TunnelFollow the guidelines in the preceding section to set up a QinQ tunnel on th

Pagina 204

VLAN CONFIGURATION12-24Web – Click VLAN, 802.1Q VLAN, Port Configuration or Trunk Configuration. Set the mode for the tunnel port to Dot1q-Tunnel, and

Pagina 205

CONFIGURING PRIVATE VLANS12-25Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN.

Pagina 206

VLAN CONFIGURATION12-26Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports desi

Pagina 207 - Displaying LACP Port Counters

CONFIGURING PROTOCOL-BASED VLANS12-27Configuring Protocol-Based VLANs The network devices required to support multiple protocols cannot be easily grou

Pagina 208

VLAN CONFIGURATION12-28• Frame Type16 – Frame type used by this protocol. (Options: Ethernet, RFC_1042, LLC_other) • Protocol Type – The only option f

Pagina 209

CONFIGURING PROTOCOL-BASED VLANS12-29Membership by Port menu (page 13), these interfaces will admit traffic of any protocol type into the associated V

Pagina 210

VLAN CONFIGURATION12-30CLI – The following maps the traffic entering Port 1 which matches the protocol type specified in protocol group 1 to VLAN 3. C

Pagina 211

13-1CHAPTER 13CLASS OF SERVICEClass of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the

Pagina 212

xxixFIGURESFigure 3-1 Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Figure 3-2 Front Panel Indicators .

Pagina 213

CLASS OF SERVICE13-2• If the output port is an untagged member of the associated VLAN, these frames are stripped of all VLAN tags prior to transmissio

Pagina 214

LAYER 2 QUEUE SETTINGS13-3CLI – This example assigns a default priority of 5 to port 3.Mapping CoS Values to Egress QueuesThis switch processes Class

Pagina 215 - Configuring Port Mirroring

CLASS OF SERVICE13-4The priority levels recommended in the IEEE 802.1p standard for various network applications are shown in the following table. How

Pagina 216 - Configuring Rate Limits

LAYER 2 QUEUE SETTINGS13-5Web – Click Priority, Traffic Classes. Assign priorities to the traffic classes (i.e., output queues), then click Apply.Figu

Pagina 217 - Command Attribute

CLASS OF SERVICE13-6Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traffic in a higher

Pagina 218 - Showing Port Statistics

LAYER 2 QUEUE SETTINGS13-7Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determine the fre

Pagina 219 - TATISTICS

CLASS OF SERVICE13-8CLI – The following example shows how to assign WRR weights to each of the priority queues.Layer 3/4 Priority SettingsMapping Laye

Pagina 220

LAYER 3/4 PRIORITY SETTINGS13-9Selecting IP Precedence/DSCP PriorityThe switch allows you to choose between using IP Precedence or DSCP priority. Sele

Pagina 221

CLASS OF SERVICE13-10Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different p

Pagina 222

LAYER 3/4 PRIORITY SETTINGS13-11Web – Click Priority, IP Precedence Priority. Select an entry from the IP Precedence Priority Table, enter a value in

Pagina 223 - Figure 9-12 Port Statistics

38 TeslaIrvine, CA 92618Phone: (949) 679-8000TigerAccess™ 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsDecember

Pagina 224

FIGURESxxxFigure 6-4 SSH Host-Key Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-15Figure 6-5 SSH Server Settings . . . . . . . .

Pagina 225

CLASS OF SERVICE13-12Mapping DSCP PriorityThe DSCP is six bits wide, allowing coding for up to 64 different forwarding behaviors. The DSCP replaces th

Pagina 226 - Figure 10-1 Static Addresses

LAYER 3/4 PRIORITY SETTINGS13-13Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Val

Pagina 227

CLASS OF SERVICE13-14Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port number (i.e., TCP/U

Pagina 228

LAYER 3/4 PRIORITY SETTINGS13-15Click Priority, IP Port Priority. Enter the port number for a network application in the IP Port Number box and the ne

Pagina 229

CLASS OF SERVICE13-16

Pagina 230

14-1CHAPTER 14QUALITY OF SERVICEThe commands described in this section are used to configure Quality of Service (QoS) classification criteria and serv

Pagina 231 - LGORITHM

QUALITY OF SERVICE14-2Notes: 1. You can configure up to 16 rules per Class Map. You can also include multiple classes in a Policy Map.2. You should cr

Pagina 232

CONFIGURING QUALITY OF SERVICE PARAMETERS14-3Configuring a Class MapA class map is used for matching packets to a specified class.Command Usage • To c

Pagina 233 - Region R

QUALITY OF SERVICE14-4Settings” page. Enter the criteria used to classify ingress traffic on this page.• Remove Class – Removes the selected class.Cla

Pagina 234

CONFIGURING QUALITY OF SERVICE PARAMETERS14-5Web – Click QoS, DiffServ, then click Add Class to create a new class, or Edit Rules to change the rules

Pagina 235 - ISPLAYING

FIGURESxxxiFigure 11-7 MSTP Port Configuration . . . . . . . . . . . . . . . . . . . . . . . 11-28Figure 12-1 Globally Enabling GVRP . . . . . . . .

Pagina 236

QUALITY OF SERVICE14-6CLI - This example creates a class map call “rd-class,” and sets it to match packets marked for DSCP service value 3.Creating Qo

Pagina 237

CONFIGURING QUALITY OF SERVICE PARAMETERS14-7• After using the policy map to define packet classification, service tagging, and bandwidth policing, it

Pagina 238

QUALITY OF SERVICE14-8• Meter – The maximum throughput and burst rate.- Rate (kbps) – Rate in kilobits per second.- Burst (byte) – Burst in bytes.• Ex

Pagina 239

CONFIGURING QUALITY OF SERVICE PARAMETERS14-9Web – Click QoS, DiffServ, Policy Map to display the list of existing policy maps. To add a new policy ma

Pagina 240

QUALITY OF SERVICE14-10CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps,

Pagina 241

CONFIGURING QUALITY OF SERVICE PARAMETERS14-11Web – Click QoS, DiffServ, Service Policy Settings. Check Enabled and choose a Policy Map for a port fro

Pagina 242

QUALITY OF SERVICE14-12

Pagina 243

15-1CHAPTER 15MULTICAST FILTERINGMulticasting is used to support real-time applications such as videoconferencing or streaming audio. A multicast serv

Pagina 244

MULTICAST FILTERING15-2those ports only. It then propagates the service request up to any neighboring multicast switch/router to ensure that it will c

Pagina 245

LAYER 2 IGMP (SNOOPING AND QUERY)15-3Only IGMPv3 hosts can request service from a specific multicast source. When downstream hosts request service fro

Pagina 246

FIGURESxxxiiFigure 16-3 DNS Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7

Pagina 247

MULTICAST FILTERING15-4Static IGMP Host Interface – For multicast applications that you need to control more carefully, you can manually assign a mult

Pagina 248

LAYER 2 IGMP (SNOOPING AND QUERY)15-5Note: Multicast routers use this information, along with a multicast routing protocol such as DVMRP or PIM, to su

Pagina 249

MULTICAST FILTERING15-6Web – Click IGMP Snooping, IGMP Configuration. Adjust the IGMP settings as required, and then click Apply. (The default setting

Pagina 250

LAYER 2 IGMP (SNOOPING AND QUERY)15-7Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch us

Pagina 251

MULTICAST FILTERING15-8CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router.Specifying Static

Pagina 252

LAYER 2 IGMP (SNOOPING AND QUERY)15-9CLI – This example configures port 1 as a multicast router port within VLAN 1.Displaying Port Members of Multicas

Pagina 253

MULTICAST FILTERING15-10Web – Click IGMP Snooping, IP Multicast Registration Table. Select a VLAN ID and the IP address for a multicast service from t

Pagina 254

LAYER 2 IGMP (SNOOPING AND QUERY)15-11Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and

Pagina 255

MULTICAST FILTERING15-12Web – Click IGMP Snooping, IGMP Member Port Table. Specify the interface attached to a multicast service (via an IGMP-enabled

Pagina 256

MULTICAST VLAN REGISTRATION15-13distribution tree for a normal multicast VLAN. This makes it possible to support common multicast services over a wide

Pagina 257

SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also describes

Pagina 258

MULTICAST FILTERING15-144. For multicast streams that will run for a long term and be associated with a stable set of hosts, you can statically bind t

Pagina 259

MULTICAST VLAN REGISTRATION15-15Web – Click MVR, Configuration. Enable MVR globally on the switch, select the MVR VLAN, add the multicast groups that

Pagina 260 - VU: VLAN Unaware

MULTICAST FILTERING15-16• MVR Status – Shows the MVR status. MVR status for source ports is “ACTIVE” if MVR is globally enabled on the switch. MVR sta

Pagina 261 - IEEE 802.1Q VLAN

MULTICAST VLAN REGISTRATION15-17Configuring MVR Interface StatusEach interface that participates in the MVR VLAN must be configured as an MVR source p

Pagina 262

MULTICAST FILTERING15-18- Non-MVR – An interface that does not participate in the MVR VLAN. (This is the default type.)• Immediate Leave – Configures

Pagina 263

MULTICAST VLAN REGISTRATION15-19Displaying Port Members of Multicast GroupsYou can display the multicast groups assigned to the MVR VLAN either throug

Pagina 264

MULTICAST FILTERING15-20Assigning Static Multicast Groups to InterfacesFor multicast streams that will run for a long term and be associated with a st

Pagina 265 - Command Attributes (Web)

MULTICAST VLAN REGISTRATION15-21Web – Click MVR, Group Member Configuration. Select a port or trunk from the “Interface” field, and click Query to dis

Pagina 267

16-1CHAPTER 16DOMAIN NAME SERVICEThe Domain Naming System (DNS) service on this switch allows host names to be mapped to IP addresses using static tab

Pagina 268

GETTING STARTED

Pagina 269

DOMAIN NAME SERVICE16-2• When more than one name server is specified, the servers are queried in the specified sequence until a response is received,

Pagina 270

CONFIGURING GENERAL DNS SERVICE PARAMETERS16-3Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify on

Pagina 271

DOMAIN NAME SERVICE16-4CLI - This example sets a default domain name and a domain list. However, remember that if a domain list is specified, the defa

Pagina 272

CONFIGURING STATIC DNS HOST TO ADDRESSENTRIES16-5Field Attributes• Host Name – Name of a host device that is mapped to one or more IP addresses. (Rang

Pagina 273

DOMAIN NAME SERVICE16-6CLI - This example maps two address to a host name, and then configures an alias host name for the same addresses.Displaying th

Pagina 274

DISPLAYING THE DNS CACHE16-7Web – Select DNS, Cache.Figure 16-3 DNS CacheCLI - This example displays all the resource records learned from the design

Pagina 275 - IEEE 802.1Q T

DOMAIN NAME SERVICE16-8

Pagina 276

SECTION IIICOMMAND LINE INTERFACEThis section provides a detailed description of the Command Line Interface, along with examples for all of the comman

Pagina 277

COMMAND LINE INTERFACEIP Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35-1

Pagina 278

17-1CHAPTER 17OVERVIEW OF COMMANDLINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAcce

Pagina 279

1-1CHAPTER 1INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to config

Pagina 280

OVERVIEW OF COMMAND LINE INTERFACE17-2After connecting to the system through the console port, the login screen displays:Telnet ConnectionTelnet opera

Pagina 281

ENTERING COMMANDS17-3After you configure the switch with an IP address, you can open a Telnet session by performing these steps:1. From the remote hos

Pagina 282

OVERVIEW OF COMMAND LINE INTERFACE17-4You can enter commands as follows:• To enter a simple command, enter the command keyword. • To enter multiple co

Pagina 283 - Configuring Private VLANs

ENTERING COMMANDS17-5Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the current com

Pagina 284

OVERVIEW OF COMMAND LINE INTERFACE17-6The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a

Pagina 285

ENTERING COMMANDS17-7Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display inform

Pagina 286

OVERVIEW OF COMMAND LINE INTERFACE17-8Privileged Exec mode from within Normal Exec mode, by entering the enable command, followed by the privileged le

Pagina 287

ENTERING COMMANDS17-9• Interface Configuration - These commands modify the port configuration such as speed-duplex and negotiation. • Line Configurati

Pagina 288

OVERVIEW OF COMMAND LINE INTERFACE17-10To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end c

Pagina 289

ENTERING COMMANDS17-11Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enoug

Pagina 290

KEY FEATURES1-2Rate Limiting Input and output rate limiting per portInput rate limiting per port per CoS valuePort Mirroring Single session, one sourc

Pagina 291 - Queue 20134567

OVERVIEW OF COMMAND LINE INTERFACE17-12Command GroupsThe system commands can be broken down into the functional groups shown below.Table 17-4 Command

Pagina 292

COMMAND GROUPS17-13The access mode shown in the following tables is indicated by these abbreviations: ACL (Access Control List Configuration)CM (Class

Pagina 293 - Figure 13-2 Traffic Classes

OVERVIEW OF COMMAND LINE INTERFACE17-14

Pagina 294

18-1CHAPTER 18GENERAL COMMANDSThese commands are used to control the command access mode, configuration mode, and other basic functions.Table 18-1 Ge

Pagina 295

GENERAL COMMANDS18-2enableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, and certain commands dis

Pagina 296 - Layer 3/4 Priority Settings

DISABLE18-3disableThis command returns to Normal Exec mode from privileged mode. In normal access mode, you can only display basic information on the

Pagina 297

GENERAL COMMANDS18-4Example Related Commands end (18-6)show historyThis command shows the contents of the command history buffer.Default Setting NoneC

Pagina 298

RELOAD18-5The ! command repeats commands from the Execution command history buffer when you are in Normal Exec or Privileged Exec Mode, and commands f

Pagina 299

GENERAL COMMANDS18-6promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno promptstring -

Pagina 300

EXIT18-7exitThis command returns to the previous configuration mode or exits the configuration program.Default Setting NoneCommand Mode AnyExample Thi

Pagina 301

INTRODUCTION1-3Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates th

Pagina 302 - Mapping IP Port Priority

GENERAL COMMANDS18-8Example This example shows how to quit a CLI session:Console#quitPress ENTER to start sessionUser Access VerificationUsername:

Pagina 303

19-1CHAPTER 19SYSTEM MANAGEMENTCOMMANDSThese commands are used to control system logs, passwords, user names, management options, and display or confi

Pagina 304

SYSTEM MANAGEMENT COMMANDS19-2Device Designation CommandsThis section describes commands used to configure information that uniquely identifies the sw

Pagina 305

SYSTEM STATUS COMMANDS19-3System Status CommandsThis section describes commands used to display system information.show startup-configThis command dis

Pagina 306

SYSTEM MANAGEMENT COMMANDS19-4mode command, and corresponding commands. This command displays the following information:- MAC address for the switch-

Pagina 307

SYSTEM STATUS COMMANDS19-5Related Commandsshow running-config (19-5)show running-configThis command displays the configuration information currently i

Pagina 308

SYSTEM MANAGEMENT COMMANDS19-6- VLAN configuration settings for each interface- Multiple spanning tree instances (name and interfaces)- IP address - L

Pagina 309 - ARAMETERS

SYSTEM STATUS COMMANDS19-7Related Commandsshow startup-config (19-3)show systemThis command displays system information.Default Setting NoneCommand Mo

Pagina 310

SYSTEM MANAGEMENT COMMANDS19-8Exampleshow usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet

Pagina 311

SYSTEM STATUS COMMANDS19-9Command Usage The session used to execute this command is indicated by a “*” symbol next to the Line (i.e., session) index n

Pagina 312

DESCRIPTION OF SOFTWARE FEATURES1-4Access Control Lists – ACLs provide packet filtering for IP frames (based on address, protocol, TCP/UDP port number

Pagina 313

SYSTEM MANAGEMENT COMMANDS19-10Example System Mode CommandsThis section describes command used to configure the switch to operate in normal mode or Qi

Pagina 314

SYSTEM MODE COMMANDS19-11Default Setting No system mode is set; the switch functions in normal operating mode.Command Mode Global ConfigurationCommand

Pagina 315

SYSTEM MANAGEMENT COMMANDS19-12System MTU CommandsThis section describes commands used to configure the Ethernet frame size on the switch.jumbo frameT

Pagina 316

SYSTEM MTU COMMANDS19-13• To use jumbo frames, both the source and destination end nodes (such as a computer or server) must support this feature. Als

Pagina 317 - ULTICAST

SYSTEM MANAGEMENT COMMANDS19-14Command Usage • Gigabit Ethernet ports are not affected by the system mtu FE-size command. Fast Ethernet ports are not

Pagina 318

FILE MANAGEMENT COMMANDS19-15When downloading runtime code, the destination file name can be specified to replace the current image, or the file can b

Pagina 319

SYSTEM MANAGEMENT COMMANDS19-16copy This command moves (upload/download) a code image or configuration file between the switch’s flash memory and a

Pagina 320

FILE MANAGEMENT COMMANDS19-17or 31 characters for files on the switch. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”)• Due to the size limit of the

Pagina 321

SYSTEM MANAGEMENT COMMANDS19-18The following example shows how to upload the configuration settings to a file on the TFTP server:The following example

Pagina 322

FILE MANAGEMENT COMMANDS19-19This example shows how to copy a public-key used by SSH from an TFTP server. Note that public key authentication via SSH

Pagina 323

INTRODUCTION1-5Storm Control – Broadcast and multicast storm suppression prevents traffic from overwhelming the network. When enabled on a port, the l

Pagina 324

SYSTEM MANAGEMENT COMMANDS19-20Related Commandsdir (19-20)delete public-key (21-28)dirThis command displays a list of files in flash memory.Syntax dir

Pagina 325

FILE MANAGEMENT COMMANDS19-21Example The following example shows how to display all file information:whichbootThis command displays which files were b

Pagina 326

SYSTEM MANAGEMENT COMMANDS19-22boot systemThis command specifies the file or image used to start up the system.Syntax boot system {boot-rom| config |

Pagina 327

LINE COMMANDS19-23Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial port. Th

Pagina 328 - Multicast VLAN Registration

SYSTEM MANAGEMENT COMMANDS19-24lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Sy

Pagina 329 - EGISTRATION

LINE COMMANDS19-25loginThis command enables password checking at login. Use the no form to disable password checking and allow connections without a p

Pagina 330

SYSTEM MANAGEMENT COMMANDS19-26Example Related Commandsusername (21-2)password (19-26)passwordThis command specifies the password for a line. Use the

Pagina 331

LINE COMMANDS19-27configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.Example Related Commandslo

Pagina 332

SYSTEM MANAGEMENT COMMANDS19-28Example To set the timeout to two minutes, enter this command:exec-timeoutThis command sets the interval that the syste

Pagina 333

LINE COMMANDS19-29password-threshThis command sets the password intrusion threshold which limits the number of failed logon attempts. Use the no form

Pagina 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Pagina 335

DESCRIPTION OF SOFTWARE FEATURES1-6this protocol will choose a single path and disable all others to ensure that only one route exists between any two

Pagina 336

SYSTEM MANAGEMENT COMMANDS19-30silent-timeThis command sets the amount of time the management console is inaccessible after the number of unsuccessful

Pagina 337

LINE COMMANDS19-31Default Setting 8 data bits per characterCommand Mode Line Configuration Command Usage The databits command can be used to mask the

Pagina 338

SYSTEM MANAGEMENT COMMANDS19-32Command Usage Communication protocols provided by devices such as terminals and modems often require a specific parity

Pagina 339

LINE COMMANDS19-33Example To specify 57600 bps, enter this command:stopbitsThis command sets the number of the stop bits transmitted per byte. Use the

Pagina 340

SYSTEM MANAGEMENT COMMANDS19-34Command Usage Specifying session identifier “0” will disconnect the console connection. Specifying any other identifier

Pagina 341

LINE COMMANDS19-35Example To show all lines, enter this command:Console#show line Console configuration: Password threshold: 3 times Interactive ti

Pagina 342

SYSTEM MANAGEMENT COMMANDS19-36Event Logging CommandsThis section describes commands used to configure event logging on the switch.logging onThis comm

Pagina 343

EVENT LOGGING COMMANDS19-37command to control the type of error messages that are stored in memory. You can use the logging trap command to control th

Pagina 344

SYSTEM MANAGEMENT COMMANDS19-38Default Setting Flash: errors (level 3 - 0)RAM: warnings (level 7 - 0)Command Mode Global ConfigurationCommand Usage Th

Pagina 345 - Figure 16-3 DNS Cache

EVENT LOGGING COMMANDS19-39Command Mode Global ConfigurationCommand Usage Use this command more than once to build up a list of host IP addresses.The

Pagina 346

INTRODUCTION1-7• Use private VLANs to restrict traffic to pass only between data ports and the uplink ports, thereby isolating adjacent ports within t

Pagina 347

SYSTEM MANAGEMENT COMMANDS19-40logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved

Pagina 348

EVENT LOGGING COMMANDS19-41clear logThis command clears messages from the log buffer.Syntax clear log [flash | ram]• flash - Event history stored in f

Pagina 349 - Console Connection

SYSTEM MANAGEMENT COMMANDS19-42show loggingThis command displays the configuration settings for logging messages to local switch memory, to an SMTP ev

Pagina 350

EVENT LOGGING COMMANDS19-43ExampleThe following example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., de

Pagina 351 - Entering Commands

SYSTEM MANAGEMENT COMMANDS19-44Related Commandsshow logging sendmail (19-49)show logThis command displays the log messages stored in local memory.Synt

Pagina 352

SMTP ALERT COMMANDS19-45SMTP Alert CommandsThese commands configure SMTP event handling, and forwarding of alert messages to the specified SMTP server

Pagina 353 - Showing Commands

SYSTEM MANAGEMENT COMMANDS19-46• To send email alerts, the switch first opens a connection, sends all the email alerts waiting in the queue one by one

Pagina 354

SMTP ALERT COMMANDS19-47logging sendmail source-emailThis command sets the email address used for the “From” field in alert messages. Syntaxlogging se

Pagina 355 - Exec Commands

SYSTEM MANAGEMENT COMMANDS19-48Command Usage You can specify up to five recipients for alert messages. However, you must enter a separate command to s

Pagina 356

SMTP ALERT COMMANDS19-49show logging sendmailThis command displays the settings for the SMTP event handler.Command Mode Normal Exec, Privileged ExecEx

Pagina 357 - Console(config)#

SYSTEM DEFAULTS1-8to be transmitted across a single network-wide multicast VLAN shared by hosts residing in other standard or private VLAN groups, whi

Pagina 358 - Privileged Exec mode

SYSTEM MANAGEMENT COMMANDS19-50Time CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Maintain

Pagina 359 - Command Line Processing

TIME COMMANDS19-51Command Usage • The time acquired from time servers is used to record accurate dates and times for log events. Without SNTP, the swi

Pagina 360 - Command Groups

SYSTEM MANAGEMENT COMMANDS19-52Command Mode Global ConfigurationCommand Usage This command specifies time servers from which the switch will poll for

Pagina 361

TIME COMMANDS19-53Related Commandssntp client (19-50)show sntpThis command displays the current time and configuration settings for the SNTP client, a

Pagina 362

SYSTEM MANAGEMENT COMMANDS19-54clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours min

Pagina 363 - Table 18-1 General Commands

TIME COMMANDS19-55calendar setThis command sets the system clock. It may be used if there is no time server on your network, or if you have not config

Pagina 364 - Console#

SYSTEM MANAGEMENT COMMANDS19-56Example Console#show calendar 15:12:34 February 1 2002Console#

Pagina 365 - Console>

20-1CHAPTER 20SNMP COMMANDSControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the

Pagina 366

SNMP COMMANDS20-2snmp-serverThis command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c, 3). Use the no form

Pagina 367 - Console#reload

SHOW SNMP20-3Command Usage This command provides information on the community access strings, counter information for SNMP input and output protocol d

Pagina 368 - Console(config-if)#end

INTRODUCTION1-9Authentication Privileged Exec Level Username “admin”Password “admin”Normal Exec Level Username “guest”Password “guest”Enable Privilege

Pagina 369 - Username:

SNMP COMMANDS20-4snmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the specified commun

Pagina 370 - Example

SNMP-SERVER CONTACT20-5snmp-server contactThis command sets the system contact string. Use the no form to remove the system contact information.Syntax

Pagina 371

SNMP COMMANDS20-6Command Mode Global ConfigurationExample Related Commandssnmp-server contact (20-5)snmp-server host This command specifies the recipi

Pagina 372 - Device Designation Commands

SNMP-SERVER HOST20-7community command prior to using the snmp-server host command. (Maximum length: 32 characters)• version - Specifies whether to sen

Pagina 373 - System Status Commands

SNMP COMMANDS20-8• Notifications are issued by the switch as trap messages by default. The recipient of a trap message does not send a response to the

Pagina 374

SNMP-SERVER ENABLE TRAPS20-9user command. Otherwise, the authentication password and/or privacy password will not exist, and the switch will not autho

Pagina 375

SNMP COMMANDS20-10notifications are enabled. If you enter the command with a keyword, only the notification type related to that keyword is enabled. •

Pagina 376

SNMP-SERVER ENGINE-ID20-11Command Mode Global ConfigurationCommand Usage • An SNMP engine is an independent SNMP agent that resides either on this swi

Pagina 377

SNMP COMMANDS20-12show snmp engine-idThis command shows the SNMP engine ID.Command Mode Privileged ExecExampleThis example shows the default engine ID

Pagina 378

SNMP-SERVER VIEW20-13snmp-server viewThis command adds an SNMP view which controls user access to the MIB. Use the no form to remove an SNMP view.Synt

Pagina 379

SYSTEM DEFAULTS1-10Port Configuration Admin Status EnabledAuto-negotiation EnabledFlow Control DisabledRate Limiting Input and output limits DisabledI

Pagina 380 - System Mode Commands

SNMP COMMANDS20-14This view includes the MIB-2 interfaces table, and the mask selects all index entries.show snmp viewThis command shows information o

Pagina 381

SNMP-SERVER GROUP20-15snmp-server groupThis command adds an SNMP group, mapping SNMP users to SNMP views. Use the no form to remove an SNMP group.Synt

Pagina 382 - System MTU Commands

SNMP COMMANDS20-16• When privacy is selected, the DES 56-bit algorithm is used for data encryption.• For additional information on the notification me

Pagina 383 - Console(config)#jumbo frame

SHOW SNMP GROUP20-17Group Name: publicSecurity Model: v2cRead View: defaultviewWrite View: noneNotify View: noneStorage Type: volatileRow Status: acti

Pagina 384 - File Management Commands

SNMP COMMANDS20-18snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read, Write, or Notify View. Use

Pagina 385

SNMP-SERVER USER20-19Command Usage • The SNMP engine ID is used to compute the authentication/privacy digests from the password. You should therefore

Pagina 386

SNMP COMMANDS20-20show snmp userThis command shows information on SNMP users.Command Mode Privileged ExecExample Console#show snmp userEngineId: 80000

Pagina 387

21-1CHAPTER 21USER AUTHENTICATIONCOMMANDSYou can configure this switch to authenticate users logging into the system for management access using local

Pagina 388

USER AUTHENTICATION COMMANDS21-2User Account CommandsThe basic commands required for management access are listed in this section. This switch also in

Pagina 389

USER ACCOUNT COMMANDS21-3• password password - The authentication password for the user. (Maximum length: 8 characters plain text, 32 encrypted, case

Pagina 390

INTRODUCTION1-11Traffic PrioritizationIngress Port Priority 0Queue Mode WRRWeighted Round Robin Queue: 0 1 2 3 4 5 6 7Weight: 1 2 4 6

Pagina 391

USER AUTHENTICATION COMMANDS21-4enable passwordAfter initially logging onto the system, you should set the Privileged Exec password. Remember to recor

Pagina 392

AUTHENTICATION SEQUENCE21-5Related Commandsenable (18-2)authentication enable (21-7)Authentication SequenceThree authentication methods can be specifi

Pagina 393 - Line Commands

USER AUTHENTICATION COMMANDS21-6Command Usage • RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a conne

Pagina 394

AUTHENTICATION SEQUENCE21-7authentication enableThis command defines the authentication method and precedence to use when changing from Exec command m

Pagina 395

USER AUTHENTICATION COMMANDS21-8Example Related Commandsenable password - sets the password for changing command modes (21-4)RADIUS ClientRemote Authe

Pagina 396

RADIUS CLIENT21-9radius-server hostThis command specifies primary and backup RADIUS servers and authentication parameters that apply to each server. U

Pagina 397 - Console(config-line)#

USER AUTHENTICATION COMMANDS21-10radius-server portThis command sets the RADIUS server network port. Use the no form to restore the default.Syntax rad

Pagina 398

RADIUS CLIENT21-11Example radius-server retransmitThis command sets the number of retries. Use the no form to restore the default.Syntax radius-server

Pagina 399

USER AUTHENTICATION COMMANDS21-12Command Mode Global ConfigurationExample show radius-serverThis command displays the current settings for the RADIUS

Pagina 400

TACACS+ CLIENT21-13TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses software runn

Pagina 401

SYSTEM DEFAULTS1-12

Pagina 402

USER AUTHENTICATION COMMANDS21-14tacacs-server portThis command specifies the TACACS+ server network port. Use the no form to restore the default.Synt

Pagina 403

WEB SERVER COMMANDS21-15Example show tacacs-serverThis command displays the current settings for the TACACS+ server.Default Setting NoneCommand Mode P

Pagina 404

USER AUTHENTICATION COMMANDS21-16ip http portThis command specifies the TCP port number used by the web browser interface. Use the no form to use the

Pagina 405

WEB SERVER COMMANDS21-17Example Related Commandsip http port (21-16)ip http secure-serverThis command enables the secure hypertext transfer protocol (

Pagina 406 - Event Logging Commands

USER AUTHENTICATION COMMANDS21-18• The client and server establish a secure encrypted connection.A padlock icon should appear in the status bar for In

Pagina 407 - Table 19-10 Logging Levels

WEB SERVER COMMANDS21-19Default Setting 443Command Mode Global ConfigurationCommand Usage • You cannot configure the HTTP and HTTPS servers to use the

Pagina 408

USER AUTHENTICATION COMMANDS21-20Telnet Server CommandsThis section describes commands used to configure Telnet management access to the switch.ip tel

Pagina 409

SECURE SHELL COMMANDS21-21Secure Shell CommandsThis section describes the commands used to configure the SSH server. Note that you also need to instal

Pagina 410

USER AUTHENTICATION COMMANDS21-22Configuration GuidelinesThe SSH server on this switch supports both password and public key authentication. If passwo

Pagina 411 - Console#clear log

SECURE SHELL COMMANDS21-231024 35 1341081685609893921040944920155425347631641921872958921143173880 055536161631051775940838686311092912322268285192543

Pagina 412

2-1CHAPTER 2INITIAL CONFIGURATIONConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent offer

Pagina 413

USER AUTHENTICATION COMMANDS21-24c. If a match is found, the switch uses its secret key to generate a random 256-bit string as a challenge, encrypts t

Pagina 414

SECURE SHELL COMMANDS21-25Default Setting DisabledCommand Mode Global ConfigurationCommand Usage • The SSH server supports up to four client sessions.

Pagina 415 - SMTP Alert Commands

USER AUTHENTICATION COMMANDS21-26Default Setting 10 secondsCommand Mode Global ConfigurationCommand Usage The timeout specifies the interval the switc

Pagina 416

SECURE SHELL COMMANDS21-27Example Related Commandsshow ip ssh (21-31)ip ssh server-key sizeThis command sets the SSH server key size. Use the no form

Pagina 417

USER AUTHENTICATION COMMANDS21-28delete public-keyThis command deletes the specified user’s public key.Syntax delete public-key username [dsa | rsa]•u

Pagina 418

SECURE SHELL COMMANDS21-29• This command stores the host key pair in memory (i.e., RAM). Use the ip ssh save host-key command to save the host key pai

Pagina 419 - Normal Exec, Privileged Exec

USER AUTHENTICATION COMMANDS21-30• The SSH server must be disabled before you can execute this command.Example Related Commandsip ssh crypto host-key

Pagina 420 - Time Commands

SECURE SHELL COMMANDS21-31show ip sshThis command displays the connection settings used when authenticating client access to the SSH server.Command Mo

Pagina 421

USER AUTHENTICATION COMMANDS21-32show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user

Pagina 422

SECURE SHELL COMMANDS21-33Command Mode Privileged ExecCommand Usage • If no parameters are entered, all keys are displayed. If the user keyword is ent

Pagina 423

CONNECTING TO THE SWITCH2-2The switch’s web interface, CLI configuration program, and SNMP agent allow you to perform the following management functio

Pagina 424

USER AUTHENTICATION COMMANDS21-34802.1X Port AuthenticationThe switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorize

Pagina 425

802.1X PORT AUTHENTICATION21-35dot1x system-auth-controlThis command enables IEEE 802.1X port authentication globally on the switch. Use the no form t

Pagina 426

USER AUTHENTICATION COMMANDS21-36dot1x max-reqThis command sets the maximum number of times the switch port will retransmit an EAP request/identity pa

Pagina 427 - Table 20-1 SNMP Commands

802.1X PORT AUTHENTICATION21-37Defaultforce-authorizedCommand ModeInterface ConfigurationExampledot1x operation-modeThis command allows single or mult

Pagina 428 - Console(config)#snmp-server

USER AUTHENTICATION COMMANDS21-38• In “multi-host” mode, only one host connected to a port needs to pass authentication for all other hosts to be gran

Pagina 429

802.1X PORT AUTHENTICATION21-39dot1x re-authenticationThis command enables periodic re-authentication for a specified port. Use the no form to disable

Pagina 430

USER AUTHENTICATION COMMANDS21-40Default60 secondsCommand ModeInterface ConfigurationExampledot1x timeout re-authperiodThis command sets the time peri

Pagina 431

802.1X PORT AUTHENTICATION21-41dot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication sessio

Pagina 432

USER AUTHENTICATION COMMANDS21-42Command UsageThis command displays the following information:• Global 802.1X Parameters – Shows whether or not 802.1X

Pagina 433

802.1X PORT AUTHENTICATION21-43- Port-control – Shows the dot1x mode on a port as auto, force-authorized, or force-unauthorized (page 21-36).- Supplic

Pagina 434

INITIAL CONFIGURATION2-3To connect a terminal to the console port, complete the following steps: 1. Connect the console cable to the serial port on a

Pagina 435

USER AUTHENTICATION COMMANDS21-44ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status

Pagina 436

MANAGEMENT IP FILTER COMMANDS21-45Management IP Filter CommandsThis section describes commands used to configure IP management access to the switch.ma

Pagina 437

USER AUTHENTICATION COMMANDS21-46Command Usage • If anyone tries to access a management interface on the switch from an invalid address, the switch wi

Pagina 438 - Privileged Exec

MANAGEMENT IP FILTER COMMANDS21-47Command Mode Privileged ExecExampleConsole#show management all-clientManagement Ip Filter HTTP-Client: Start IP ad

Pagina 439

USER AUTHENTICATION COMMANDS21-48

Pagina 440

22-1CHAPTER 22CLIENT SECURITYCOMMANDSThis switch supports many methods of segregating traffic for clients attached to each of the data ports, and for

Pagina 441 - 24. Maps to the defaultview

CLIENT SECURITY COMMANDS22-2Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switch s

Pagina 442

PORT SECURITY COMMANDS22-3port securityThis command enables or configures port security. Use the no form without any keywords to disable port security

Pagina 443

CLIENT SECURITY COMMANDS22-4Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has

Pagina 444

IP SOURCE GUARD COMMANDS22-5the IP address of a neighbor to access the network. This section describes commands used to configure IP Source Guard.ip s

Pagina 445

vLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Pagina 446

BASIC CONFIGURATION2-4Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a val

Pagina 447

CLIENT SECURITY COMMANDS22-6Command Usage • Source guard is used to filter traffic on an unsecure port which receives messages from outside the networ

Pagina 448 - User Account Commands

IP SOURCE GUARD COMMANDS22-7static DHCP snooping binding or dynamic DHCP snooping binding, the packet will be forwarded.- If IP source guard if enable

Pagina 449

CLIENT SECURITY COMMANDS22-8Command ModeGlobal ConfigurationCommand Usage • Table entries include a MAC address, IP address, lease time, entry type (S

Pagina 450

IP SOURCE GUARD COMMANDS22-9show ip source-guardThis command shows whether source guard is enabled or disabled on each interface.Command Mode Privileg

Pagina 451 - Authentication Sequence

CLIENT SECURITY COMMANDS22-10DHCP Snooping CommandsDHCP snooping allows a switch to protect a network from rogue DHCP servers or other devices which s

Pagina 452

DHCP SNOOPING COMMANDS22-11ip dhcp snoopingThis command enables DHCP snooping globally. Use the no form to restore the default setting.Syntax [no] ip

Pagina 453

CLIENT SECURITY COMMANDS22-12- If DHCP snooping is enabled globally, and also enabled on the VLAN where the DHCP packet is received, all DHCP packets

Pagina 454 - RADIUS Client

DHCP SNOOPING COMMANDS22-13binding table when it receives an ACK message from a DHCP server. Also, when the switch sends out DHCP client packets for i

Pagina 455 - RADIUS C

CLIENT SECURITY COMMANDS22-14• When the DHCP snooping is globally disabled, DHCP snooping can still be configured for specific VLANs, but the changes

Pagina 456

DHCP SNOOPING COMMANDS22-15• unit - Stack unit. (Range: 1) • port - Port number. (Range: 1-28)• lease-time - The time after which an entry is removed

Pagina 457

INITIAL CONFIGURATION2-5Access to both CLI levels are controlled by user names and passwords. The switch has a default user name and password for each

Pagina 458

CLIENT SECURITY COMMANDS22-16• When the lease time for a dynamic or static DHCP binding entry expires, it is removed from the binding table.ExampleThi

Pagina 459 - TACACS+ Client

DHCP SNOOPING COMMANDS22-17Related Commands ip dhcp snooping (22-11)ip dhcp snooping vlan (22-13)ip dhcp snooping trust (22-17)ip dhcp snooping databa

Pagina 460

CLIENT SECURITY COMMANDS22-18Command Usage • An untrusted interface is an interface that is configured to receive messages from outside the network or

Pagina 461 - Web Server Commands

DHCP SNOOPING COMMANDS22-19Exampleshow ip dhcp snooping bindingThis command shows the DHCP snooping binding table entries.Command Mode Privileged Exec

Pagina 462

CLIENT SECURITY COMMANDS22-20

Pagina 463

23-1CHAPTER 23ACCESS CONTROL LISTCOMMANDSAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protoc

Pagina 464

ACCESS CONTROL LIST COMMANDS23-2IP ACLsThe commands in this section configure ACLs based on IP addresses, TCP/UDP port number, protocol type, and TCP

Pagina 465

IP ACLS23-3access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the no form to remov

Pagina 466 - Telnet Server Commands

ACCESS CONTROL LIST COMMANDS23-4permit, deny (Standard ACL) This command adds a rule to a Standard IP ACL. The rule sets a filter condition for packet

Pagina 467 - Secure Shell Commands

IP ACLS23-5permit, deny (Extended ACL) This command adds a rule to an Extended IP ACL. The rule sets a filter condition for packets with specific sour

Pagina 468

BASIC CONFIGURATION2-64. Type “username admin password 0 password,” for the Privileged Exec level, where password is your new password. Press <Ente

Pagina 469

ACCESS CONTROL LIST COMMANDS23-6• control-flags – Decimal number (representing a bit string) that specifies flag bits in byte 14 of the TCP header. (R

Pagina 470

IP ACLS23-7ExampleThis example accepts any incoming packets if the source address is within subnet 10.7.1.x. For example, if the rule is matched; i.e.

Pagina 471 - Console(config)#ip ssh server

ACCESS CONTROL LIST COMMANDS23-8Example Related Commandspermit, deny 23-4ip access-group (23-14)access-list ip mask-precedence This command changes to

Pagina 472

IP ACLS23-9Example Related Commandsmask (IP ACL) (23-9)ip access-group (23-14)mask (IP ACL)This command defines a mask for IP ACLs. This mask defines

Pagina 473

ACCESS CONTROL LIST COMMANDS23-10Default SettingNoneCommand ModeIP MaskCommand Usage• Packets crossing a port are checked against all the rules in the

Pagina 474

IP ACLS23-11This shows that the entries in the mask override the precedence in which the rules are entered into the ACL. In the following example, pac

Pagina 475

ACCESS CONTROL LIST COMMANDS23-12This shows how to create an extended ACL with an egress mask to drop packets leaving network 171.69.198.0 when the La

Pagina 476

IP ACLS23-13This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other packets. It then sets th

Pagina 477 - Console#show ssh

ACCESS CONTROL LIST COMMANDS23-14Command ModePrivileged ExecExample Related Commandsmask (IP ACL) (23-9)ip access-group This command binds a port to a

Pagina 478

MAC ACLS23-15Related Commandsshow ip access-list (23-7)show ip access-groupThis command shows the ports assigned to IP ACLs.Command ModePrivileged Exe

Pagina 479

INITIAL CONFIGURATION2-7Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Pagina 480 - 802.1X Port Authentication

ACCESS CONTROL LIST COMMANDS23-16access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove

Pagina 481 - 802.1X P

MAC ACLS23-17Related Commandspermit, deny (23-17)mac access-group (23-23)show mac access-list (23-19)permit, deny (MAC ACL)This command adds a rule to

Pagina 482

ACCESS CONTROL LIST COMMANDS23-18• tagged-eth2 – Tagged Ethernet II packets.• untagged-eth2 – Untagged Ethernet II packets.• tagged-802.3 – Tagged Eth

Pagina 483

MAC ACLS23-19Example This rule permits packets from any source MAC address to the destination address 00-e0-29-94-34-de where the Ethernet type is 080

Pagina 484

ACCESS CONTROL LIST COMMANDS23-20access-list mac mask-precedence This command changes to MAC Mask mode used to configure access control masks. Use the

Pagina 485

MAC ACLS23-21mask (MAC ACL)This command defines a mask for MAC ACLs. This mask defines the fields to check in the packet header. Use the no form to re

Pagina 486

ACCESS CONTROL LIST COMMANDS23-22ExampleThis example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of

Pagina 487

MAC ACLS23-23show access-list mac mask-precedence This command shows the ingress or egress rule masks for MAC ACLs.Syntaxshow access-list mac mask-pre

Pagina 488

ACCESS CONTROL LIST COMMANDS23-24• If a port is already bound to an ACL and you bind it to a different ACL, the switch will replace the old binding wi

Pagina 489

ACL INFORMATION23-25show access-listThis command shows all IPv4 ACLs and associated rules.Command ModePrivileged ExecCommand UsageOnce the ACL is boun

Pagina 490

BASIC CONFIGURATION2-8To automatically configure the switch by communicating with BOOTP or DHCP address allocation servers on the network, complete th

Pagina 491 - Management IP Filter Commands

ACCESS CONTROL LIST COMMANDS23-26

Pagina 492

24-1CHAPTER 24INTERFACE COMMANDSThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN. Tab

Pagina 493

INTERFACE COMMANDS24-2interfaceThis command configures an interface type and enter interface configuration mode. Use the no form to remove a trunk.Syn

Pagina 494

DESCRIPTION24-3descriptionThis command adds a description to an interface. Use the no form to remove the description.Syntax description stringno descr

Pagina 495

INTERFACE COMMANDS24-4Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex setting

Pagina 496 - Port Security Commands

NEGOTIATION24-5negotiationThis command enables autonegotiation for a given interface. Use the no form to disable autonegotiation.Syntax [no] negotiati

Pagina 497

INTERFACE COMMANDS24-6capabilitiesThis command advertises the port capabilities of a given interface during autonegotiation. Use the no form with para

Pagina 498 - IP Source Guard Commands

FLOWCONTROL24-7Example The following example configures Ethernet port 5 capabilities to 100half and 100full.Related Commands negotiation (24-5)speed-d

Pagina 499

INTERFACE COMMANDS24-8To enable flow control under auto-negotiation, “flowcontrol” must be included in the capabilities list for any port• Avoid using

Pagina 500

SHUTDOWN24-9ExampleThis forces the switch to use the built-in RJ-45 port for the combination port 28.shutdown This command disables an interface. To r

Pagina 501

INITIAL CONFIGURATION2-9Enabling SNMP Management Access The switch can be configured to accept management commands from Simple Network Management Prot

Pagina 502

INTERFACE COMMANDS24-10switchport packet-rateThis command configures broadcast and multicast storm control. Use the no form to restore the default set

Pagina 503

SWITCHPORT BLOCK24-11switchport block This command prevents flooding of unknown unicast or multicast packets to an interface. Use the no form to resto

Pagina 504 - DHCP Snooping Commands

INTERFACE COMMANDS24-12clear countersThis command clears statistics on an interface.Syntax clear counters interfaceinterface • ethernet unit/port- uni

Pagina 505

SHOW INTERFACES STATUS24-13show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface

Pagina 506

INTERFACE COMMANDS24-14Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interfac

Pagina 507

SHOW INTERFACES COUNTERS24-15Command Mode Normal Exec, Privileged ExecCommand Usage If no interface is specified, information on all interfaces is dis

Pagina 508

INTERFACE COMMANDS24-16show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax sh

Pagina 509

SHOW INTERFACES SWITCHPORT24-17Table 24-2 show interfaces switchport - display descriptionField DescriptionBroadcast threshold Shows if broadcast sto

Pagina 510

INTERFACE COMMANDS24-18

Pagina 511

25-1CHAPTER 25LINK AGGREGATIONCOMMANDSPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network conn

Pagina 512

BASIC CONFIGURATION2-10To prevent unauthorized access to the switch from SNMP version 1 or 2c clients, it is recommended that you change the default c

Pagina 513

LINK AGGREGATION COMMANDS25-2Guidelines for Creating TrunksGeneral Guidelines –• Finish configuring port trunks before you connect the corresponding n

Pagina 514

CHANNEL-GROUP25-3• If the port channel admin key (lacp admin key - Port Channel) is not set when a channel group is formed (i.e., it has the null valu

Pagina 515

LINK AGGREGATION COMMANDS25-4Example The following example creates trunk 1 and then adds port 11:lacpThis command enables 802.3ad Link Aggregation Con

Pagina 516 - Table 23-2 IP ACL Commands

LACP25-5ExampleThe following shows LACP enabled on ports 46-48. Because LACP has also been enabled on the ports at the other end of the links, the sho

Pagina 517 - Console(config-std-acl)#

LINK AGGREGATION COMMANDS25-6lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default se

Pagina 518

LACP ADMIN-KEY (ETHERNET INTERFACE)25-7lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no fo

Pagina 519

LINK AGGREGATION COMMANDS25-8lacp admin-key (Port Channel)This command configures a port channel's LACP administration key string. Use the no for

Pagina 520

LACP PORT-PRIORITY25-9lacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax lacp {actor

Pagina 521

LINK AGGREGATION COMMANDS25-10show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sys-i

Pagina 522 - permit host 10.1.1.21

SHOW LACP25-11Table 25-2 show lacp counters - display descriptionField DescriptionLACPDUs Sent Number of valid LACPDUs transmitted from this channel

Pagina 523 - Console(config-ip-mask-acl)#

INITIAL CONFIGURATION2-11Then press <Enter>. For a more detailed description of these parameters, see “snmp-server host” on page 20-6. The follo

Pagina 524

LINK AGGREGATION COMMANDS25-12LACPDUs InternalNumber of seconds before invalidating received LACPDU information.LACP System PriorityLACP system priori

Pagina 525

SHOW LACP25-13Console#show lacp 1 neighborsPort channel 1 neighbors-------------------------------------------------------------------Eth 1/1---------

Pagina 526

LINK AGGREGATION COMMANDS25-14Console#show lacp sysidPort Channel System Priority System MAC Address-------------------------------------------

Pagina 527

26-1CHAPTER 26MIRROR PORT COMMANDSThis section describes how to mirror traffic from a source port to a target port. port monitorThis command configure

Pagina 528

MIRROR PORT COMMANDS26-2Command Usage • You can mirror traffic from any source port to a destination port for real-time analysis. You can then attach

Pagina 529 - MAC ACLs

SHOW PORT MONITOR26-3Command Usage This command displays the currently configured source port, destination port, and mirror mode (i.e., RX, TX, RX/TX)

Pagina 531

27-1CHAPTER 27RATE LIMIT COMMANDSThis function allows the network manager to control the maximum rate for traffic transmitted or received on an interf

Pagina 532

RATE LIMIT COMMANDS27-2rate-limitThis command defines the rate limit for a specific interface. Use this command without specifying a rate to restore t

Pagina 533

RATE-LIMIT COS27-3rate-limit cosThis command defines the output rate limit for an interface based on specified CoS priorities. Use the no form to rest

Pagina 534 - Console(config-mac-mask-acl)#

MANAGING SYSTEM FILES2-12Managing System FilesThe switch’s flash memory supports three types of system files that can be managed by the CLI program, w

Pagina 535

RATE LIMIT COMMANDS27-4ExampleThis example sets the maximum output rate for CoS traffic of priority level 0 to 50 Mbps on Port 1. Table 27-2 Mapping

Pagina 536

SHOW RATE-LIMIT COS27-5show rate-limit cosThis command displays the output rate limit for CoS priorities.Command Mode Privileged ExecCommand Usage If

Pagina 537 - MAC egress mask ACL:

RATE LIMIT COMMANDS27-6

Pagina 538 - PE 23-25

28-1CHAPTER 28ADDRESS TABLE COMMANDSThese commands are used to configure the address table for filtering specified addresses, displaying current entri

Pagina 539 - NFORMATION

ADDRESS TABLE COMMANDS28-2mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an add

Pagina 540

CLEAR MAC-ADDRESS-TABLE DYNAMIC28-3• A static address cannot be learned on another port until the address is removed with the no form of this command.

Pagina 541

ADDRESS TABLE COMMANDS28-4show mac-address-tableThis command shows classes of entries in the bridge-forwarding database.Syntax show mac-address-table

Pagina 542

MAC-ADDRESS-TABLE AGING-TIME28-5• The maximum number of address entries is 8191.Examplemac-address-table aging-timeThis command sets the aging time fo

Pagina 543 - DESCRIPTION

ADDRESS TABLE COMMANDS28-6show mac-address-table aging-timeThis command shows the aging time for entries in the address table.Default Setting NoneComm

Pagina 544

29-1CHAPTER 29SPANNING TREE COMMANDSThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and comma

Pagina 545 - NEGOTIATION

INITIAL CONFIGURATION2-13In the system flash memory, one file of each type must be set as the start-up file. During a system boot, the diagnostic and

Pagina 546

SPANNING TREE COMMANDS29-2revision Configures the revision number for the multiple spanning treeMST 29-14max-hops Configures the maximum number of hop

Pagina 547 - FLOWCONTROL

SPANNING-TREE29-3spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Syntax [no] span

Pagina 548

SPANNING TREE COMMANDS29-4spanning-tree modeThis command selects the spanning tree mode for this switch. Use the no form to restore the default.Syntax

Pagina 549 - SHUTDOWN

SPANNING-TREE FORWARD-TIME29-5restarts the migration delay timer and begins using RSTP BPDUs on that port.• Multiple Spanning Tree Protocol- To allow

Pagina 550

SPANNING TREE COMMANDS29-6Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discar

Pagina 551 - SWITCHPORT

SPANNING-TREE MAX-AGE29-7Related Commandsspanning-tree forward-time (29-5)spanning-tree max-age (29-7)spanning-tree max-ageThis command configures the

Pagina 552

SPANNING TREE COMMANDS29-8Related Commandsspanning-tree forward-time (29-5)spanning-tree hello-time (29-6)spanning-tree priorityThis command configure

Pagina 553 - INTERFACES

SPANNING-TREE PATHCOST METHOD29-9spanning-tree pathcost methodThis command configures the path cost method used for Rapid Spanning Tree and Multiple S

Pagina 554

SPANNING TREE COMMANDS29-10spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP/M

Pagina 555 - COUNTERS

MST VLAN29-11Related Commands mst vlan (29-11)mst priority (29-12)name (29-13)revision (29-14)max-hops (29-14)mst vlanThis command adds VLANs to a spa

Pagina 556

viWARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE PRODUCT IN

Pagina 557

MANAGING SYSTEM FILES2-14To save the current configuration settings, enter the following command:1. From the Privileged Exec mode prompt, type “copy r

Pagina 558

SPANNING TREE COMMANDS29-12instance (on each bridge) with the same set of VLANs. Also, note that RSTP treats each MSTI region as a single node, connec

Pagina 559 - GGREGATION

NAME29-13Example nameThis command configures the name for the multiple spanning tree region in which this switch is located. Use the no form to clear

Pagina 560

SPANNING TREE COMMANDS29-14revisionThis command configures the revision number for this multiple spanning tree configuration of this switch. Use the n

Pagina 561

SPANNING-TREE SPANNING-DISABLED29-15Default Setting 20Command Mode MST ConfigurationCommand Usage An MSTI region is treated as a single node by the ST

Pagina 562

SPANNING TREE COMMANDS29-16Example This example disables the spanning tree algorithm for port 5.spanning-tree costThis command configures the spanning

Pagina 563

SPANNING-TREE COST29-17Default Setting By default, the system automatically detects the speed and duplex mode used on each port, and configures the pa

Pagina 564

SPANNING TREE COMMANDS29-18spanning-tree port-priorityThis command configures the priority for the specified interface. Use the no form to restore the

Pagina 565

SPANNING-TREE PORTFAST29-19Default Setting DisabledCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage • You can enable this op

Pagina 566

SPANNING TREE COMMANDS29-20Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command is used to enable/disable the fas

Pagina 567 - PRIORITY

SPANNING-TREE LINK-TYPE29-21spanning-tree link-typeThis command configures the link type for Rapid Spanning Tree and Multiple Spanning Tree. Use the n

Pagina 568

SECTION IISWITCH MANAGEMENTThis section describes the basic switch features, along with a detailed description of how to configure each feature via a

Pagina 569

SPANNING TREE COMMANDS29-22spanning-tree mst costThis command configures the path cost on a spanning instance in the Multiple Spanning Tree. Use the n

Pagina 570

SPANNING-TREE MST PORT-PRIORITY29-23should be assigned to interfaces attached to faster media, and higher values assigned to interfaces with slower me

Pagina 571

SPANNING TREE COMMANDS29-24Where more than one interface is assigned the highest priority, the interface with lowest numeric identifier will be enable

Pagina 572

SHOW SPANNING-TREE29-25Example show spanning-treeThis command shows the configuration for the common spanning tree (CST) or for an instance within the

Pagina 573 - Command Function Mode Page

SPANNING TREE COMMANDS29-26description of the items displayed for specific interfaces, see “Displaying Interface Settings” on page 11-13.ExampleConsol

Pagina 574

SHOW SPANNING-TREE MST CONFIGURATION29-27show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Comman

Pagina 575

SPANNING TREE COMMANDS29-28

Pagina 576

30-1CHAPTER 30VLAN COMMANDSA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same p

Pagina 577

VLAN COMMANDS30-2GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN information in order to

Pagina 578

GVRP AND BRIDGE EXTENSION COMMANDS30-3Command Usage GVRP defines a way for switches to exchange VLAN information in order to register VLAN members on

Pagina 579

SWITCH MANAGEMENT

Pagina 580 - 0 to 50 Mbps on Port 1

VLAN COMMANDS30-4switchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchport gvrpDefault Setting Disable

Pagina 581

GVRP AND BRIDGE EXTENSION COMMANDS30-5garp timerThis command sets the values for the join, leave and leaveall timers. Use the no form to restore the t

Pagina 582

VLAN COMMANDS30-6Example Related Commandsshow garp timer (30-6)show garp timerThis command shows the GARP timers for the selected interface.Syntax sho

Pagina 583

EDITING VLAN GROUPS30-7Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in this mode will take effect immediately.

Pagina 584

VLAN COMMANDS30-8vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [name vlan-n

Pagina 585

CONFIGURING VLAN INTERFACES30-9Related Commands show vlan (30-16)Configuring VLAN Interfacesinterface vlanThis command enters interface configuration

Pagina 586

VLAN COMMANDS30-10Default Setting NoneCommand Mode Global ConfigurationExample The following example shows how to set the interface configuration mode

Pagina 587

CONFIGURING VLAN INTERFACES30-11Example The following shows how to set the configuration mode to port 1, and then set the switchport mode to hybrid:Re

Pagina 588 - Aging time: 300 sec

VLAN COMMANDS30-12Related Commandsswitchport mode (30-10)switchport ingress-filtering This command enables ingress filtering for an interface. Use the

Pagina 589

CONFIGURING VLAN INTERFACES30-13switchport native vlanThis command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore

Pagina 590

3-1CHAPTER 3CONFIGURING THE SWITCHUsing the Web InterfaceThis switch provides an embedded HTTP web agent. Using a web browser you can configure the sw

Pagina 591 - SPANNING

VLAN COMMANDS30-14switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Pagina 592 -

CONFIGURING VLAN INTERFACES30-15• If a VLAN on the forbidden list for an interface is manually added to that interface, the VLAN is automatically remo

Pagina 593

VLAN COMMANDS30-16Example The following example shows how to prevent port 1 from being added to VLAN 3:Displaying VLAN InformationThis section describ

Pagina 594

CONFIGURING PRIVATE VLANS30-17Example The following example shows how to display information for VLAN 1:Configuring Private VLANsPrivate VLANs provide

Pagina 595

VLAN COMMANDS30-18Command Mode Global ConfigurationCommand Usage• A private VLAN provides port-based security and isolation between ports within the V

Pagina 596

CONFIGURING PROTOCOL-BASED VLANS30-19Configuring Protocol-based VLANsThe network devices required to support multiple protocols cannot be easily group

Pagina 597 - PATHCOST

VLAN COMMANDS30-203. Then map the protocol for each interface to the appropriate VLAN using the protocol-vlan protocol-group command (Interface Config

Pagina 598 - Console(config-mstp)#

CONFIGURING PROTOCOL-BASED VLANS30-21protocol-vlan protocol-group (Configuring Interfaces)This command maps a protocol group to a VLAN for the current

Pagina 599

VLAN COMMANDS30-22Example The following example maps the traffic entering Port 1 which matches the protocol type specified in protocol group 1 to VLAN

Pagina 600

CONFIGURING PROTOCOL-BASED VLANS30-23show interfaces protocol-vlan protocol-groupThis command shows the mapping from protocol groups to VLANs for the

Pagina 601

CONFIGURING THE SWITCH3-2Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is

Pagina 602

VLAN COMMANDS30-24Configuring IEEE 802.1Q TunnelingQinQ tunneling uses a single Service Provider VLAN (SPVLAN) for customers who have multiple VLANs.

Pagina 603 - DISABLED

CONFIGURING IEEE 802.1Q TUNNELING30-25ethertype to identify 802.1Q tagged frames. The standard ethertype value is 0x8100. (See switchport dot1q-ethert

Pagina 604

VLAN COMMANDS30-26ExampleRelated Commandsshow dot1q-tunnel (page 30-26)show interfaces switchport (24-16)show dot1q-tunnelThis command displays infor

Pagina 605

CONFIGURING IEEE 802.1Q TUNNELING30-27switchport dot1q-ethertypeThis command sets the Tag Protocol Identifier (TPID) value of a tunnel port. Use the n

Pagina 606

VLAN COMMANDS30-28

Pagina 607 - PORTFAST

31-1CHAPTER 31CLASS OF SERVICECOMMANDSThe commands described in this section allow you to specify which data packets have greater precedence when traf

Pagina 608

CLASS OF SERVICE COMMANDS31-2Priority Commands (Layer 2)This section describes commands used to configure Layer 2 traffic priority on the switch.Table

Pagina 609

PRIORITY COMMANDS (LAYER 2)31-3queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (C

Pagina 610

CLASS OF SERVICE COMMANDS31-4Related Commandsqueue bandwidth (31-6)show queue mode (31-4)show queue modeThis command shows the current queue mode.Defa

Pagina 611

PRIORITY COMMANDS (LAYER 2)31-5Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priori

Pagina 612

NAVIGATING THE WEB BROWSER INTERFACE3-3Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and pa

Pagina 613

CLASS OF SERVICE COMMANDS31-6queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queu

Pagina 614

PRIORITY COMMANDS (LAYER 2)31-7queue cos-mapThis command assigns class of service (CoS) values to the priority queues (i.e., hardware output queues 0

Pagina 615

CLASS OF SERVICE COMMANDS31-8Example The following example shows how to change the CoS assignments to a one-to-one mapping:Related Commands show queue

Pagina 616

PRIORITY COMMANDS (LAYER 2)31-9show queue cos-mapThis command shows the class of service priority map.Syntax show queue cos-map [interface]interface •

Pagina 617 - Table 30-1 VLAN Commands

CLASS OF SERVICE COMMANDS31-10Default Setting The original priority value in the VLAN tag of a tagged packet, or a VLAN priority tag inserted by anoth

Pagina 618

PRIORITY COMMANDS (LAYER 3 AND 4)31-11Priority Commands (Layer 3 and 4)This section describes commands used to configure Layer 3 and Layer 4 traffic p

Pagina 619 - XTENSION

CLASS OF SERVICE COMMANDS31-12Command Usage The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priority.

Pagina 620

PRIORITY COMMANDS (LAYER 3 AND 4)31-13map ip precedence (Global Configuration)This command enables IP precedence mapping (i.e., IP Type of Service). U

Pagina 621

CLASS OF SERVICE COMMANDS31-14Default Setting The list below shows the default priority mapping.Command Mode Interface Configuration (Ethernet, Port C

Pagina 622

PRIORITY COMMANDS (LAYER 3 AND 4)31-15Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport

Pagina 623 - Editing VLAN Groups

CONFIGURING THE SWITCH3-4Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made

Pagina 624 - Console(config-vlan)#

CLASS OF SERVICE COMMANDS31-16Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • The precedence for priority mapping is IP P

Pagina 625 - Configuring VLAN Interfaces

PRIORITY COMMANDS (LAYER 3 AND 4)31-17Example The following shows that HTTP traffic has been mapped to CoS value 0:Related Commands map ip port (Globa

Pagina 626

CLASS OF SERVICE COMMANDS31-18Example Related Commands map ip precedence (Global Configuration) (31-13)map ip precedence (Interface Configuration) (31

Pagina 627 - NTERFACES

PRIORITY COMMANDS (LAYER 3 AND 4)31-19Example Related Commands map ip dscp (Global Configuration) (31-14)map ip dscp (Interface Configuration) (31-15)

Pagina 628

CLASS OF SERVICE COMMANDS31-20

Pagina 629

32-1CHAPTER 32QUALITY OF SERVICECOMMANDSThe commands described in this section are used to configure Differentiated Services (DiffServ) classification

Pagina 630

QUALITY OF SERVICE COMMANDS32-2To create a service policy for a specific category of ingress traffic, follow these steps:1. Use the class-map command

Pagina 631

CLASS-MAP32-3Notes: 1. You can configure up to 16 rules per Class Map. You can also include multiple classes in a Policy Map.2. You should create a Cl

Pagina 632 - Displaying VLAN Information

QUALITY OF SERVICE COMMANDS32-4• The class map is used with a policy map (page 32-6) to create a service policy (page 32-10) for a specific interface

Pagina 633

MATCH32-5Command Usage •First enter the class-map command to designate a class map and enter the Class Map configuration mode. Then use the match comm

Pagina 634

NAVIGATING THE WEB BROWSER INTERFACE3-5Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all

Pagina 635

QUALITY OF SERVICE COMMANDS32-6policy-mapThis command creates a policy map that can be attached to multiple interfaces, and enters Policy Map configur

Pagina 636

CLASS32-7classThis command defines a traffic classification upon which a policy can act, and enters Policy Map Class configuration mode. Use the no fo

Pagina 637

QUALITY OF SERVICE COMMANDS32-8Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd_

Pagina 638

POLICE32-9Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd_class,” uses the set

Pagina 639

QUALITY OF SERVICE COMMANDS32-10burst-byte field, and the average rate tokens are removed from the bucket is by specified by the rate-bps option. Exam

Pagina 640

SHOW CLASS-MAP32-11• You must first define a class map, then define a policy map, and finally use the service-policy command to bind the policy map to

Pagina 641

QUALITY OF SERVICE COMMANDS32-12show policy-map This command displays the QoS policy maps which define classification criteria for incoming traffic, a

Pagina 642

SHOW POLICY-MAP INTERFACE32-13show policy-map interfaceThis command displays the service policy assigned to the specified interface.Syntax show policy

Pagina 643

QUALITY OF SERVICE COMMANDS32-14

Pagina 644

33-1CHAPTER 33MULTICAST FILTERINGCOMMANDSThis switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts that want to recei

Pagina 645 - Table 31-1 Priority Commands

CONFIGURING THE SWITCH3-6Remote Logs Configures the logging of messages to a remote logging process4-29SMTP Sends an SMTP client message to a partici

Pagina 646

MULTICAST FILTERING COMMANDS33-2IGMP Snooping CommandsThis section describes commands used to configure IGMP snooping on the switch. ip igmp snoopingT

Pagina 647

IGMP SNOOPING COMMANDS33-3Command Mode Global ConfigurationExample The following example enables IGMP snooping.ip igmp snooping vlan staticThis comman

Pagina 648 - Wrr status: Enabled

MULTICAST FILTERING COMMANDS33-4ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Synt

Pagina 649

IGMP SNOOPING COMMANDS33-5ip igmp snooping leave-proxyThis command suppresses leave messages unless received from the last member port in the group. U

Pagina 650 - Console(config)#int eth 1/5

MULTICAST FILTERING COMMANDS33-6• IGMP version 1 hosts do not respond to multicast group-specific queries. If a version 1 host is known by the switch

Pagina 651

IGMP SNOOPING COMMANDS33-7• This command is only effective if IGMP snooping is enabled, and IGMPv2 or IGMPv3 snooping is used. Example The following s

Pagina 652

MULTICAST FILTERING COMMANDS33-8show mac-address-table multicast This command shows known multicast addresses.Syntax show mac-address-table multicast

Pagina 653 - Information of Eth 1/1

IGMP QUERY COMMANDS33-9IGMP Query CommandsThis section describes commands used to configure Layer 2 IGMP query on the switch. ip igmp snooping querier

Pagina 654

MULTICAST FILTERING COMMANDS33-10Exampleip igmp snooping query-countThis command configures the query count. Use the no form to restore the default.Sy

Pagina 655

IGMP QUERY COMMANDS33-11ip igmp snooping query-intervalThis command configures the query interval. Use the no form to restore the default.Syntax ip ig

Pagina 656 - Console(config)#map ip port

NAVIGATING THE WEB BROWSER INTERFACE3-7Port Security Configures per port security, including status, response for security breach, and maximum allowed

Pagina 657

MULTICAST FILTERING COMMANDS33-12Command Usage• The switch must be using IGMPv2 or v3 snooping for this command to take effect. • This command defines

Pagina 658 - CoS Value 01234567

STATIC MULTICAST ROUTING COMMANDS33-13Command Usage The switch must use IGMPv2 or v3 snooping for this command to take effect.Example The following sh

Pagina 659 - Console(config)#map ip dscp

MULTICAST FILTERING COMMANDS33-14Default Setting No static multicast router ports are configured. Command Mode Global ConfigurationCommand Usage Depen

Pagina 660

MULTICAST VLAN REGISTRATION COMMANDS33-15Example The following shows that port 11 in VLAN 1 is attached to a multicast router:Multicast VLAN Registrat

Pagina 661

MULTICAST FILTERING COMMANDS33-16mvr (Global Configuration)This command enables Multicast VLAN Registration (MVR) globally on the switch, statically c

Pagina 662

MULTICAST VLAN REGISTRATION COMMANDS33-17• IGMP snooping must be enabled to a allow a subscriber to dynamically join or leave an MVR group (see ip igm

Pagina 663 - Related Commands

MULTICAST FILTERING COMMANDS33-18Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • A port which is not configured as an MVR

Pagina 664

MULTICAST VLAN REGISTRATION COMMANDS33-19page 33-2). Note that only IGMP version 2 or 3 hosts can issue multicast join or leave messages.Example The f

Pagina 665

MULTICAST FILTERING COMMANDS33-20Command Mode Privileged ExecCommand Usage Enter this command without any keywords to display the global settings for

Pagina 666

MULTICAST VLAN REGISTRATION COMMANDS33-21The following displays information about the interfaces attached to the MVR VLAN:Console#show mvr interfacePo

Pagina 667

viiTABLE OF CONTENTSSection I Getting Started1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1Key Features . .

Pagina 668

CONFIGURING THE SWITCH3-8Port Neighbors Information Displays settings and operational state for the remote side9-21Port Broadcast Control Sets the bro

Pagina 669

MULTICAST FILTERING COMMANDS33-22The following shows information about the interfaces associated with multicast groups assigned to the MVR VLAN:Consol

Pagina 670 - Console(config-pmap-c)#

34-1CHAPTER 34DOMAIN NAME SERVICECOMMANDSThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entries

Pagina 671

DOMAIN NAME SERVICE COMMANDS34-2ip hostThis command creates a static entry in the DNS table that maps a host name to an IP address. Use the no form to

Pagina 672

CLEAR HOST34-3Example This example maps two address to a host name.clear hostThis command deletes entries from the DNS table.Syntax clear host {name |

Pagina 673

DOMAIN NAME SERVICE COMMANDS34-4ip domain-nameThis command defines the default domain name appended to incomplete host names (i.e., host names passed

Pagina 674

IP DOMAIN-LIST34-5ip domain-listThis command defines a list of domain names that can be appended to incomplete host names (i.e., host names passed fro

Pagina 675

DOMAIN NAME SERVICE COMMANDS34-6ExampleThis example adds two domain names to the current list and then displays the list.Related Commands ip domain-na

Pagina 676

IP DOMAIN-LOOKUP34-7ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (34-4)ip d

Pagina 677 - INTERFACE

DOMAIN NAME SERVICE COMMANDS34-8ExampleThis example enables DNS and then displays the configuration.Related Commands ip domain-name (34-4)ip name-serv

Pagina 678

SHOW DNS34-9show dnsThis command displays the configuration of the DNS service.Command Mode Privileged ExecExampleshow dns cacheThis command displays

Pagina 679

NAVIGATING THE WEB BROWSER INTERFACE3-9MSTP VLAN Configuration Configures priority and VLANs for a spanning tree instance11-21 Port Information Displ

Pagina 680

DOMAIN NAME SERVICE COMMANDS34-10clear dns cacheThis command clears all entries in the DNS cache.Command Mode Privileged ExecExampleTYPE This field in

Pagina 681

35-1CHAPTER 35IP INTERFACE COMMANDSAn IP address may be used for management access to the switch over your network. An IP address is obtained via DHCP

Pagina 682

IP INTERFACE COMMANDS35-2ip address This command sets the IP address for the currently selected VLAN interface. Use the no form to remove the current

Pagina 683

BASIC IP CONFIGURATION35-3Notes: 1. Only one VLAN interface can be assigned an IP address (the default is VLAN 1). This defines the management VLAN, t

Pagina 684

IP INTERFACE COMMANDS35-4• An default gateway can only be successfully set when a network interface that directly connects to the gateway has been con

Pagina 685

BASIC IP CONFIGURATION35-5Example In the following example, the device is reassigned the same address.Related Commands ip address (35-2)show ip interf

Pagina 686

IP INTERFACE COMMANDS35-6Example Related Commands ip default-gateway (35-3)show arpUse this command to display entries in the Address Resolution Proto

Pagina 687 - IGMP Query Commands

BASIC IP CONFIGURATION35-7pingThis command sends ICMP echo request packets to another node on the network.Syntax ping host [count count][size size]• h

Pagina 688

IP INTERFACE COMMANDS35-8Example Related Commands interface (24-2)Console#ping 10.1.0.9Type ESC to abort.PING to 10.1.0.9, by 5 32-byte payload ICMP p

Pagina 689

SECTION IVAPPENDICESThis section provides additional information on the following topics. Software Specifications . . . . . . . . . . . . . . . . .

Pagina 690

CONFIGURING THE SWITCH3-10Priority 13-1Default Port Priority Sets the default priority for each port 13-1Default Trunk Priority Sets the default prior

Pagina 691

APPENDICES

Pagina 692

A-1APPENDIX ASOFTWARE SPECIFICATIONSSoftware FeaturesAuthenticationLocal, RADIUS, TACACS+, Port (802.1X), HTTPS, SSH, Port SecurityAccess Control List

Pagina 693

SOFTWARE SPECIFICATIONSA-2Rate LimitsInput LimitOutput limitRange (configured per port)Port TrunkingStatic trunks (Cisco EtherChannel compliant)Dynami

Pagina 694

MANAGEMENT FEATURESA-3Management FeaturesIn-Band ManagementTelnet, web-based HTTP or HTTPS, SNMP manager, or Secure ShellOut-of-Band ManagementRS-232

Pagina 695

SOFTWARE SPECIFICATIONSA-4IGMPv2 (RFC 2236)IPv4 IGMP (RFC 3228)RADIUS+ (RFC 2618)RMON (RFC 2819 groups 1,2,3,9)SNMP (RFC 1157)SNMPv2c (RFC 2571)SNMPv3

Pagina 696

MANAGEMENT INFORMATION BASESA-5RADIUS Authentication Client MIB (RFC 2621)RMON MIB (RFC 2819)RMON II Probe Configuration Group (RFC 2021, partial impl

Pagina 697

SOFTWARE SPECIFICATIONSA-6

Pagina 698

B-1APPENDIX BTROUBLESHOOTINGProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet, we

Pagina 699 - MVR VLAN:

TROUBLESHOOTINGB-2Cannot connect using Secure Shell• If you cannot connect using SSH, you may have exceeded the maximum number of concurrent Telnet/SS

Pagina 700

USING SYSTEM LOGSB-3Using System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually cau

Pagina 701 - Table 34-1 DNS Commands

NAVIGATING THE WEB BROWSER INTERFACE3-11Static Multicast Router Port ConfigurationAssigns ports that are attached to a neighboring multicast router15-

Pagina 702

TROUBLESHOOTINGB-4

Pagina 703

Glossary-1GLOSSARYAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Pagina 704

GLOSSARYGlossary-2marked for different kinds of forwarding. The DSCP bits are mapped to the Class of Service categories, and then into the output queu

Pagina 705

GLOSSARYGlossary-3Generic Multicast Registration Protocol (GMRP)GMRP allows network devices to register end stations with multicast groups. GMRP requi

Pagina 706

GLOSSARYGlossary-4IEEE 802.3acDefines frame extensions for VLAN tagging.IEEE 802.3xDefines Ethernet frame start/stop requests and timers used for flow

Pagina 707

GLOSSARYGlossary-5IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different priority lev

Pagina 708

GLOSSARYGlossary-6Multicast SwitchingA process whereby the switch filters incoming multicast frames for services for which no attached host has regist

Pagina 709 - Field Description

GLOSSARYGlossary-7Port MirroringA method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON

Pagina 710

GLOSSARYGlossary-8Rapid Spanning Tree Protocol (RSTP)RSTP reduces the convergence time for network topology changes to about 10% of that required by t

Pagina 711 - Basic IP Configuration

GLOSSARYGlossary-9Terminal Access Controller Access Control System Plus (TACACS+)TACACS+ is a logon authentication protocol that uses software running

Pagina 712

CONFIGURING THE SWITCH3-12

Pagina 713

GLOSSARYGlossary-10XModemA protocol used to transfer files between devices. Data is grouped in 128-byte blocks and error-corrected.

Pagina 714

Index-1Numerics802.1Q tunnel 12-17, 30-24description 12-17interface configuration 12-23, 30-25–30-27mode selection 12-23TPID 12-16, 12-23, 30-27802.1X

Pagina 715

INDEXIndex-2name server list 16-1, 34-6static entries 16-4Domain Name Service See DNSdownloading software 4-16, 19-16DSCPenabling 13-9, 31-14mapping

Pagina 716

INDEXIndex-3Link Aggregation Control Protocol See LACPlink type, STA 11-16, 11-19, 29-21loggingsyslog traps 19-40to syslog servers 19-38log-in, Web i

Pagina 717

INDEXIndex-4rate limitssetting input and output limits 27-2setting output limits based on priorities 27-3rate limits, setting 9-26remote logging 19-40

Pagina 718

INDEXIndex-5user account 6-1user password 6-1, 21-2, 21-4VVLANs 12-1–12-26, 30-1–30-18802.1Q tunnel mode 12-23adding static members 12-10, 12-13, 30-1

Pagina 721 - PECIFICATIONS

38 TeslaIrvine, CA 92618Phone: (949) 679-8000FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOU; (949)

Pagina 722

4-1CHAPTER 4BASIC MANAGEMENT TASKSThis chapter describes the basic functions required to set up management access to the switch, display or upgrade op

Pagina 723 - Standards

BASIC MANAGEMENT TASKS4-2• Web Secure Server Port – Shows the TCP port used by the HTTPS interface.• Telnet Server – Shows if management access via Te

Pagina 724 - Management Information Bases

DISPLAYING SYSTEM INFORMATION4-3CLI – Specify the hostname, location and contact information.Console(config)#hostname R&D 5 19-2Console(config)#sn

Pagina 725

BASIC MANAGEMENT TASKS4-4Configuring the Switch for Normal Operation or Tunneling ModeThe system can be configured to operate in normal mode or IEEE 8

Pagina 726

CONFIGURING THE MAXIMUM FRAME SIZE4-5CLI – This example sets the switch to operate in QinQ mode.Configuring the Maximum Frame SizeThe maximum transfer

Pagina 727 - ROUBLESHOOTING

TABLE OF CONTENTSviiiMain Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-54 Basic Management Tasks . .

Pagina 728

BASIC MANAGEMENT TASKS4-6Command Attributes• System MTU (1500-1548) – Specifies the MTU size for Fast Ethernet ports. (Range: 1500-1548 bytes)• Jumbo

Pagina 729 - Using System Logs

CONFIGURING SUPPORT FOR JUMBO FRAMES4-7Configuring Support for Jumbo FramesThe switch provides more efficient throughput for large sequential data tra

Pagina 730

BASIC MANAGEMENT TASKS4-8Displaying Switch Hardware/Software Versions Use the Switch Information page to display hardware/firmware version numbers for

Pagina 731 - Glossary-1

DISPLAYING SWITCH HARDWARE/SOFTWARE VERSIONS4-9Web – Click System, Switch Information.Figure 4-5 Switch InformationCLI – Use the following command to

Pagina 732 - Glossary-2

BASIC MANAGEMENT TASKS4-10Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filter

Pagina 733 - Glossary-3

DISPLAYING BRIDGE EXTENSION CAPABILITIES4-11Web – Click System, Bridge Extension.Figure 4-6 Displaying Bridge Extension ConfigurationCLI – Enter the

Pagina 734 - Glossary-4

BASIC MANAGEMENT TASKS4-12Setting the Switch’s IP AddressThis section describes how to configure an IP interface for management access over the networ

Pagina 735 - Glossary-5

SETTING THE SWITCH’S IP ADDRESS4-13• MAC Address – The physical layer address for this switch.Manual ConfigurationWeb – Click System, System, IP Confi

Pagina 736 - Glossary-6

BASIC MANAGEMENT TASKS4-14Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the stack to be dynamically configured by t

Pagina 737 - Glossary-7

MANAGING FIRMWARE4-15Renewing DCHP – DHCP may lease addresses to clients indefinitely or for a specific period of time. If the address expires or the

Pagina 738 - Glossary-8

TABLE OF CONTENTSixConfiguring Remote SNMPv3 Users . . . . . . . . . . . . . . . . . . . . . 5-15Configuring SNMPv3 Groups . . . . . . . . . . . . .

Pagina 739 - Glossary-9

BASIC MANAGEMENT TASKS4-16• File Name – The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period

Pagina 740 - Glossary-10

MANAGING FIRMWARE4-17If you download to a new destination file, go to the File Management, Set Start-Up menu, mark the operation code file used at sta

Pagina 741 - Numerics

BASIC MANAGEMENT TASKS4-18CLI – To download new firmware form a TFTP server, enter the IP address of the TFTP server, select “config” as the file type

Pagina 742

SAVING OR RESTORING CONFIGURATION SETTINGS4-19- running-config to startup-config – Copies the running config to the startup config.- running-config to

Pagina 743

BASIC MANAGEMENT TASKS4-20Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set i

Pagina 744

SAVING OR RESTORING CONFIGURATION SETTINGS4-21If you download to a new file name using “tftp to startup-config” or “tftp to file,” the file is automat

Pagina 745

BASIC MANAGEMENT TASKS4-22Console Port SettingsYou can access the onboard configuration program by attaching a VT100 compatible device to the switch’s

Pagina 746

CONSOLE PORT SETTINGS4-23device connected to the serial port. (Range: 9600, 19200, 38400, 57600, or 115200 baud, Auto; Default: Auto)• Stop Bits – Set

Pagina 747

BASIC MANAGEMENT TASKS4-24CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the curr

Pagina 748

TELNET SETTINGS4-25• Login Timeout – Sets the interval that the system waits for a user to log into the CLI. If a login attempt is not detected within

Comentarios a estos manuales

Sin comentarios