Table of Contents

Advertisement

Quick Links

Dell™ PowerConnect™
54xx Systems
User Guide
w w w . d e l l . c o m | s u p p o r t . d e l l . c o m

Advertisement

Table of Contents
loading

Summary of Contents for Dell PowerConnect 54 Series

  • Page 1 Dell™ PowerConnect™ 54xx Systems User Guide w w w . d e l l . c o m | s u p p o r t . d e l l . c o m...
  • Page 2 Trademarks used in this text: Dell, Dell OpenManage, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, PowerConnect, PowerApp, PowerVault, Axim, DellNet, and Latitude are trademarks of Dell Inc. Microsoft and Windows are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries.
  • Page 3: Table Of Contents

    Contents Introduction ....... . . PowerConnect 54xx Series Systems ..... . Features .
  • Page 4 Installing the PowerConnect Device ....Installation Precautions ......Site Requirements .
  • Page 5 ......Software Download Through TFTP Server ....Using Dell OpenManage Switch Administrator ..Understanding the Interface .
  • Page 6 Viewing System Health Information ....Viewing the Versions Page ......Resetting the Device .
  • Page 7 Configuring LLDP and LLDP-MED ..... . . Defining LLDP Properties ......Configuring LLDP Using CLI Commands .
  • Page 8 Defining Advanced Settings ......Configuring General Device Tuning Parameters ... . . Optimizing iSCSI .
  • Page 9 Configuring Multiple Spanning Tree ....Defining MSTP Interface Settings ....Configuring VLANs .
  • Page 10 Viewing Charts ....... . . Viewing Port Statistics ......Viewing LAG Statistics .
  • Page 11: Introduction

    Introduction NOTICE: Before proceeding, read the release notes for this product. The release notes can be downloaded from support.dell.com. This User Guide contains the information needed for installing, configuring and maintaining the PowerConnect device. PowerConnect 54xx Series Systems The PowerConnect 54xx series systems have two versions: 5424 has 24 Gigabit Ethernet ports, and 5448 has 48 Gigabit Ethernet ports.
  • Page 12: Features

    Features This section describes the device user-configured features. For a complete list of all updated device features, refer to the latest software version Release Notes. General Features Head of Line Blocking Head of Line (HOL) blocking results in traffic delays and frame loss caused by traffic competing for the same egress port resources.
  • Page 13: Mac Address Supported Features

    iSCSI Optimization iSCSI is a communication protocol used for sending data between file servers and storage disks. The file servers are called initiators and the disks are called targets. You can optimize iSCSI flow by setting Quality of Service frame priority parameters in the device. The device can also intercept iSCSI frames and provide information about iSCSI communications (called sessions).
  • Page 14: Layer 2 Features

    VLAN-aware MAC-based Switching Packets arriving from an unknown source address are sent to the microprocessor, where the source addresses are added to the Hardware Table. Packets addressed to or from this address are more efficiently forwarded using the Hardware Table. MAC Multicast Support Multicast service is a limited broadcast service, which allows one-to-many and many-to-many connections for information distribution.
  • Page 15: Vlan Supported Features

    VLAN Supported Features VLAN Support VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified as belonging to a VLAN based on either the VLAN tag or based on a combination of the ingress port and packet contents.
  • Page 16: Spanning Tree Protocol Features

    Spanning Tree Protocol Features Spanning Tree Protocol (STP) 802.1d Spanning tree is a standard Layer 2 switch requirement that allows bridges to automatically prevent and resolve L2 forwarding loops. Switches exchange configuration messages using specifically formatted frames and selectively enable and disable forwarding on ports. For more information, see "Configuring the Spanning Tree Protocol"...
  • Page 17: Layer 3 Features

    • Improved bandwidth granularity • High bandwidth server connectivity LAG is composed of ports with the same speed, set to full-duplex operation. For more information, see "Defining LAG Membership" on page 327. Link Aggregation and LACP LACP uses peer exchanges across links to determine, on an ongoing basis, the aggregation capability of various links, and continuously provides the maximum level of aggregation capability achievable between a given pair of systems.
  • Page 18: Device Management Features

    Device Management Features SNMP Alarms and Trap Logs The system logs events with severity codes and timestamps. Events are sent as Simple Network Management Protocol (SNMP) traps to a Trap Recipient List. For more information on SNMP Alarms and Traps, see "Configuring LLDP and LLDP-MED" on page 159. SNMP Version 1 and Version 2 Simple Network Management Protocol (SNMP) over the UDP/IP protocol.
  • Page 19: Security Features

    Command Line Interface Command Line Interface (CLI) syntax and semantics conform as much as possible to common industry practice. CLI is composed of mandatory and optional elements. The CLI interpreter provides command and keyword completion to assist user and shorten typing. Syslog Syslog is a protocol that allows event notifications to be sent to a set of remote servers, where they can be stored, examined and acted upon.
  • Page 20: Locked Port Support

    Port Based Authentication (802.1x) Port based authentication enables authenticating system users on a per-port basis via an external server. Only authenticated and approved system users can transmit and receive data. Ports are authenticated via the Remote Authentication Dial In User Service (RADIUS) server using the Extensible Authentication Protocol (EAP).
  • Page 21: Additional Cli Documentation

    DHCP Snooping DHCP Snooping expands network security by providing firewall security between untrusted interfaces and DHCP servers. By enabling DHCP Snooping network administrators can differentiate between trusted interfaces connected to end-users or DHCP Servers and untrusted interfaces located beyond the network firewall.
  • Page 22 Introduction...
  • Page 23: Hardware Description

    Hardware Description Device Port Configurations PowerConnect 54xx Series Systems Front Panel Port Description The PowerConnect 54xx series systems are configured with the following ports: • 24/48 Copper ports — RJ-45 ports designated as 10/100/1000 BaseT Gigabit Ethernet ports • 4 Fiber ports — Designated as Gigabit ports •...
  • Page 24: Powerconnect Back Panel Port Description

    Figure 2-2. Device Back Panel On the device back panel are two power supply connectors and an RS-232 Console port. For general use there is an AC Power Supply connector which is connectable to either 110V or 220V power supplies. The DC Power Supply connector is to connect a Redundant Power Supply (RPS) to be activated automatically in the event of an AC power supply outage.
  • Page 25: Physical Dimensions

    Physical Dimensions The device has the following physical dimensions: • Height — 44 mm (1.73 inch) • Width — 440 mm (17.32 inch) • Depth — 255 mm (10.03 inch) LED Definitions The front panel contains light emitting diodes (LED) that indicate the status of links, power supplies, fans, and system diagnostics.
  • Page 26: System Leds

    SFP LEDs The SFP ports each have one LED marked as LNK. Figure 2-5. SFP Port LED The SFP port LED indications are described in the following table: Table 2-2. SFP Port LED Indications Color Description Green Static The port is currently up. Green Flashing The port is currently transmitting or receiving data.
  • Page 27: Hardware Components

    Table 2-3. System LED Indications Color Description Fan (FAN) Green Static The device fans are operating normally. Red Static One or more fans are not operating. Redundant Power Supply (RPS) Green Static The redundant power supply is currently operating. Red Static The redundant power supply is not operating.
  • Page 28: Reset Button

    DC Power Supply Unit An external DC power supply unit is used as a redundant power supply unit. Operation is possible with power supplied from this unit only. RPS600 connector type is used. No configuration is required. LED indicator is on the front panel and indicates whether DC unit is connected. When the device is connected to a different power source, the probability of failure in the event of a power outage decreases.
  • Page 29: Installing The Powerconnect Device

    CAUTION Before performing any of the following procedures, read and follow the safety instructions located System Information Guide in the included in the Dell Documentation. CAUTION Observe the following points before performing the procedures in this section: • Ensure that the rack or cabinet housing the device is adequately secured to prevent it from becoming unstable and/or falling over.
  • Page 30: Site Requirements

    Site Requirements The device can be mounted in a standard 19-inch rack or placed on a tabletop. Before installing the device, verify that the location chosen for installation meets the site requirements. • General — Ensure that the power supply is correctly installed. •...
  • Page 31: Mounting The Device

    Mounting the Device Overview The power connectors for the device are positioned on the back panel. Connecting a DC Redundant Power Supply (UPS) is optional, but is recommended. The UPS DC connector is located on the back panel of the device.
  • Page 32: Installing The Device Without A Rack

    4 Insert the unit into the 19-inch rack ensuring the rack-mounting holes on the device line up to the mounting hole on the rack. 5 Secure the unit to the rack with the rack screws (not provided). Fasten the lower pair of screws before the upper pair of screws.
  • Page 33: Connecting A Device To A Power Supply

    NOTICE: When using HyperTerminal with Microsoft® Windows 2000,ensure that Windows® 2000 Service Pack 2 or later is installed. With Windows 2000 Service Pack 2, the arrow keys function properly in HyperTerminal’s VT100 emulation. Go to www.microsoft.com for information on Windows 2000 service packs. 3 Connect the female connector of the RS-232 crossover cable directly to the device Console port, and tighten the captive retaining screws.
  • Page 34: Port Connections, Cables, And Pinout Information

    Figure 3-3. Connecting to Device Power Connector Power Connect Rear View Back Panel Confirm that the device is connected and operating correctly by examining the LEDs on the front panel. Port Connections, Cables, and Pinout Information This section explains the device’s physical interfaces, and provides information about port connections. Connector types, ports and cables are summarized in Ports, Connectors, and Cables.
  • Page 35: Port Default Settings

    Table 3-1. Ports, Connectors and Cables Connector Port/Interface Cable RJ-45 10/100/1000BaseT Port Cat.5 The RJ-45pin number allocation for the 10/100/1000BaseT ports is listed in the table following. Table 3-2. RJ-45 Pin Number Allocation for 10/100/1000BaseT Ethernet Port Pin No Function TxRx 1+ TxRx 1- TxRx 2+...
  • Page 36: Mdi/Mdix

    MDI/MDIX The device supports auto-detection of straight through and crossed cables on all switching 10/100/1000BaseT ports. The feature is part of the Auto-negotiation and is enabled when Auto-negotiation is enabled. When the MDI/MDIX (Media Dependent Interface with Crossover) is enabled, the automatic correction of errors in cable selection is possible, making the distinction between a straight through cable and a crossover cable irrelevant.
  • Page 37: Starting And Configuring The Device

    For initial configuration, the standard device configuration is performed. NOTE: Before proceeding, read the release notes for this product. The release notes can be downloaded from www.support.dell.com. Figure 4-1. Installation and Configuration Flow Hardware Connect Device and...
  • Page 38: Configure The Terminal

    Configure the Terminal To configure the device, the terminal must be running terminal emulation software. Ensure that the terminal emulation software is set as follows: 1 Select the appropriate serial port (serial port 1 or serial port 2) to connect to the console. 2 Set the data rate to 9600 baud.
  • Page 39 4 As the device boots, the bootup test first counts the device memory availability and then continues to boot. The following screen is an example of the displayed POST: ------ Performing the Power-On Self Test (POST) ------ UART Channel Loopback Test......PASS Testing the System SDRAM......PASS Boot1 Checksum Test.......PASS Boot2 Checksum Test.......PASS...
  • Page 40 ********************************************************************* *** Running Ver. 1.0.0.10 Date 12-Jul-xxxx Time 16:51:25 *** ********************************************************************* HW version is 1 Base Mac address is: 00:15:77:12:34:56 Dram size is: 64M bytes Dram first block size is: 47104K bytes Dram first PTR is: 0x1200000 Flash size is: 16M 01-Jan-xxxx 01:01:07 %CDB-I-LOADCONFIG: Loading running configuration.
  • Page 41: Initial Configuration

    "Software Download" on page 51. Initial Configuration NOTE: Before proceeding, read the release notes for this product. Download the release notes from the Dell Support website at support.dell.com. NOTE: The initial configuration assumes the following: The PowerConnect device was never configured before and is in the same state as when you received it.
  • Page 42 You can exit the Setup Wizard at any time by entering [ctrl+z]. Wizard Step 1 The following is displayed: The system is not setup for SNMP management by default. To manage the switch using SNMP (required for Dell Network Manager) you can • Setup the initial SNMP version 2 account now.
  • Page 43 [Privilege Level 15] to this account. You can use Dell Network Manager or CLI to change this setting, and to add additional management systems. For more information on adding management systems, see the user documentation.
  • Page 44 Wizard Step 3 The following is displayed: Next, an IP address is setup. The IP address is defined on the default VLAN (VLAN #1), of which all ports are members. This is the IP address you use to access the CLI, Web interface, or SNMP interface for the switch.To setup an IP address: Please enter the IP address of the device (A.B.C.D):[1.1.1.1]...
  • Page 45: Advanced Configuration

    Enter [Y] to complete the Setup Wizard. The following is displayed: Configuring SNMP management interface Configuring user account..Configuring IP and subnet..Thank you for using Dell Easy Setup Wizard. You will now enter CLI mode. Wizard Step 6 The CLI prompt is displayed.
  • Page 46 console# configure console(config)# interface ethernet vlan 1 console(config-if)# ip address dhcp hostname device console(config-if)# exit console(config)# 3 To verify the IP address, enter the show ip interface command at the system prompt as shown in the following example. Console# show ip interface Gateway IP Address Activity status ---------------------...
  • Page 47: Receiving An Ip Address From A Bootp Server

    Receiving an IP Address From a BOOTP Server The standard BOOTP protocol is supported and enables the device to automatically download its IP host configuration from any standard BOOTP server in the network. In this case, the device acts as a BOOTP client.
  • Page 48: Configuring Security Passwords

    Configuring Security Passwords The security passwords can be configured for the following services: • Terminal • Telnet • • HTTP • HTTPS NOTE: Passwords are user-defined. NOTE: When creating a user name, the default priority is 1, which allows access but not configuration rights. A priority of 15 must be set to enable access and configuration rights to the device.
  • Page 49: Configuring An Initial Ssh Password

    Configuring an Initial SSH Password To configure an initial SSH password, enter the following commands: console(config)# aaa authentication login default line console(config)# aaa authentication enable default line console(config)# line ssh console(config-line)# login authentication default console(config-line)# enable authentication default console(config-line)# password jones. •...
  • Page 50: Startup Procedures

    Startup Procedures Startup Menu Procedures The procedures called from the Startup menu cover software download, flash handling and password recovery. The diagnostics procedures are for use by technical support personnel only and are not disclosed in the document. The Startup menu can be entered when booting the device – a user input must be entered immediately after the POST test.
  • Page 51: Software Download

    2 When the auto-boot message appears, press <Enter> to get the Startup menu. The Startup menu procedures can be done using the ASCII terminal or Windows HyperTerminal. Download Software Erase Flash File Password Recovery Procedure Enter Diagnostic Mode Set Terminal Baud-Rate Back Enter your choice or press 'ESC' to exit The following sections describe the available Startup menu options.
  • Page 52: Password Recovery

    2 Press Y . The following message is displayed. Write Flash file name (Up to 8 characters, Enter for none.):config File config (if present) will be erased after system initialization ======== Press Enter To Continue ======== 3 Enter config as the name of the flash file. The configuration is erased and the device reboots. 4 Repeat the device initial configuration.
  • Page 53 4 Enter show bootvar to verify which system image is currently active. The following is an example of the information that appears: console# sh bootvar Images currently available on the Flash Image-1 active (selected for next boot) Image-2 not active console# 5 Enter copy tftp://{tftp address}/{file name} image to copy a new system image to the device.
  • Page 54 Boot Image Download Loading a new boot image from the TFTP server and programming it into the flash updates the boot image. The boot image is loaded when the device is powered on. A user has no control over the boot image copies. To download a boot image through the TFTP server: 1 Ensure that an IP address is configured on one of the device ports and pings can be sent to a TFTP server.
  • Page 55: Using Dell Openmanage Switch Administrator

    Using Dell OpenManage Switch Administrator This section provides an introduction to the user interface. Understanding the Interface The home page contains the following views: • Tree View — Located on the left side of the home page, the tree view provides an expandable view of the features and their components.
  • Page 56: Device Representation

    The components list contains a list of the feature components. Components can also be viewed by expanding a feature in the tree view. The information buttons provide access to information about the device and access to Dell Support. For more information, see "Information Buttons." Device Representation The PowerConnect home page contains a graphical device representation of the front panel.
  • Page 57: Using The Switch Administrator Buttons

    For example, if the IP Addressing page is open, the help topic for that page opens when Help is clicked. About Contains the version and build number and Dell copyright information. Log Out Logs out of the application and closes the browser window.
  • Page 58: Device Management Buttons

    The device is not configured with a default password, and can be configured without entering a password. For information about recovering a lost password, see “Password Recovery." NOTE: Passwords are both case sensitive and alpha-numeric. 4 Click OK. The Dell PowerConnect OpenManage™ Switch Administrator home page opens. Using Dell OpenManage Switch Administrator...
  • Page 59: Accessing The Device Through The Cli

    To start a Telnet session: 1 Select Start > Run. The Run window opens. 2 In the Run window, type Telnet <IP address> in the Open field. 3 Click OK to begin the Telnet session. Using Dell OpenManage Switch Administrator...
  • Page 60: Using The Cli

    The user EXEC commands permit connecting to remote devices, changing terminal settings on a temporary basis, performing basic tests, and listing system information. To list the user EXEC commands, enter a question mark at the command prompt. Using Dell OpenManage Switch Administrator...
  • Page 61: Privileged Exec Mode

    #. console(config)# To list the Global Configuration commands, enter a question mark at the command prompt. To return from Global Configuration mode to Privileged EXEC mode, type the exit command or use the <Ctrl><Z> command. Using Dell OpenManage Switch Administrator...
  • Page 62: Interface Configuration Mode

    Management Access List The Management Access List mode contains commands to define management access-lists. The Global Configuration mode command management access-list is used to enter the Management Access List Configuration mode. Using Dell OpenManage Switch Administrator...
  • Page 63: Cli Examples

    Console(config)# crypto key pubkey-chain ssh Console(config-pubkey-chain)# CLI Examples CLI commands are provided as configuration examples. For a full description of the CLI commands, including examples, refer to the "CLI Reference Guide" included on the Documentation CD. Using Dell OpenManage Switch Administrator...
  • Page 64 Using Dell OpenManage Switch Administrator...
  • Page 65: Configuring System Information

    Configuring System Information This section provides information for defining system parameters including security features, downloading device software, and resetting the device. To open the System page, click System in the tree view. Figure 6-1. System Defining General Device Information The General page contains links to pages for configuring device parameters. Viewing Device Information The Asset page contains parameters for configuring general device information, including the system name, location, and contact, the system MAC Address, System Object ID, date, time, and System Up...
  • Page 66 Figure 6-2. Asset • System Name (0-160 Characters) — Defines the user-defined device name. • System Contact (0-160 Characters) — Specifies the name of the contact person. • System Location (0-160 Characters) — Specifies the location where the system is currently running. •...
  • Page 67 Defining System Information: 1 Open the Asset page. 2 Define the relevant fields. 3 Click Apply Changes. The system parameters are defined, and the device is updated. Initiating a Telnet Session: 1 Open the Asset page. 2 Click Telnet. A Telnet session is initiated. Configuring Device Information Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing and setting fields displayed in the Asset page.
  • Page 68 The following is an example of the CLI commands: Console (config)# hostname dell Console (config)# snmp-server contact Dell_Tech_Supp Console (config)# snmp-server location New_York Console (config)# exit Console # exit Console (config)# asset-tag 1qwepot Console> clock set 13:32:00 7 Dec 2004 Console>...
  • Page 69: Defining System Time Settings

    Defining System Time Settings The Time Synchronization page contains fields for defining system time parameters for both the local hardware clock, and the external SNTP clock. If the system time is kept using an external SNTP clock, and the external SNTP clock fails, the system time reverts to the local hardware clock. Daylight Savings Time can be enabled on the device.
  • Page 70 • Lebanon — Last weekend of March until the last weekend of October. • Lithuania — Last weekend of March until the last weekend of October. • Luxembourg — Last weekend of March until the last weekend of October. • Macedonia —...
  • Page 71 Figure 6-3. Time Synchronization • Clock Source — The source used to set the system clock. The possible field values are: – SNTP — Specifies that the system time is set via an SNTP server. For more information, see "Configuring SNTP Settings" on page 79. –...
  • Page 72 • Daylight Savings — Enables the Daylight Savings Time (DST) on the device based on the devices location. The possible field values are: USA — The device switches to DST at 2 a.m. on the second Sunday of March, and reverts to standard time at 2 a.m.
  • Page 73 • To — Defines the recurring time that DST ends each year. For example, DST ends locally every fourth Friday in October at 5:00 am. The possible field values are: – Day — The day of the week at which DST ends every year. The possible field range is Sunday- Saturday.
  • Page 74 Defining Clock Settings Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Time Synchronization page. Table 6-2. Clock Setting CLI Commands Description clock source {sntp} Configures an external time source for the system clock.
  • Page 75: Viewing System Health Information

    Viewing System Health Information The System Health page shows physical device hardware information. To open the System Health page, → → click System General Health in the tree view. Figure 6-4. System Health • Power Supply Status — The main power supply state. The possible field values are: –...
  • Page 76: Viewing The Versions Page

    DELL Switch# show system System Description: Ethernet Routing Switch System Up Time (days,hour:min:sec): 0,00:04:17 System Contact: System Name: DELL Switch System Location: R&D System MAC Address: 00:10:b5:f4:00:01 Sys Object ID: 1.3.6.1.4.1.674.10895.3000 Type: PowerConnect 5400 Power Supply Status ------------- -------- Main...
  • Page 77 Figure 6-5. Versions • Software Version — The current software version running on the device. • Boot Version — The current Boot version running on the device. • Hardware Version — The current hardware versions running on the device. Displaying Device Versions Using the CLI The following table summarizes the equivalent CLI commands for viewing fields displayed in the Versions page.
  • Page 78: Resetting The Device

    Resetting the Device The Reset page enables the device to be reset from a remote location. Save all changes to the Running Configuration file before resetting the device. This prevents the current device configuration from being lost. For more information about saving Configuration files, see "Managing Files" on page 196 To open the Reset page, click System →...
  • Page 79: Configuring Sntp Settings

    The following is an example of the CLI command: Console >reload This command will reset the whole system and disconnect your current session. Do you want to continue (y/n) [n] ? Configuring SNTP Settings The device supports the Simple Network Time Protocol (SNTP). SNTP assures accurate network device clock time synchronization up to the millisecond.
  • Page 80: Defining Sntp Global Parameters

    Polling for Anycast information is used when the server IP address is unknown. The first anycast server to return a response is used to set the time value. Time levels T3 and T4 are used to determine the server time. Using Anycast time information for synchronizing switch time is preferred to using Broadcast time information.
  • Page 81 • Receive Anycast Servers Updates — Polls the SNTP server for Anycast server time information, when enabled. If both the Receive Anycast Servers Update, and the Receive Broadcast Servers Update fields are enabled, the system time is set according the Anycast server time information. •...
  • Page 82: Defining Sntp Authentication Methods

    Defining SNTP Authentication Methods The SNTP Authentication page enables SNTP authentication between the device and an SNTP server. The means by which the SNTP server is authenticated is also selected in the SNTP Authentication page. Click System → SNTP→ Authentication in the tree view to open the SNTP Authentication page. Figure 6-8.
  • Page 83 Adding an SNTP Authentication Key 1 Open the SNTP Authentication page. 2 Click Add. The Add Authentication Key page opens: Figure 6-9. Add Authentication Key 3 Define the fields. 4 Click Apply Changes. The SNTP Authentication Key is added, and the device is updated. Displaying the Authentication Key Table 1 Open the SNTP Authentication page.
  • Page 84: Defining Sntp Servers

    4 Select the Remove check box. 5 Click Apply Changes. The entry is removed, and the device is updated. Defining SNTP Authentication Settings Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the SNTP Authentication page.
  • Page 85 Figure 6-11. SNTP Servers • SNTP Server — Enter a user-defined SNTP server IP addresses or hostname. Up to eight SNTP servers can be defined. This field can contain 1 - 158 characters. • Poll Interval — Enables polling the selected SNTP Server for system time information, when enabled. •...
  • Page 86 • Remove — Removes a specific SNTP server from the SNTP Server list, when selected. Adding an SNTP Server 1 Open the SNTP Servers page. 2 Click Add. The Add SNTP Server page opens: Figure 6-12. Add SNTP Server 3 Define the fields. 4 Click Apply Changes.
  • Page 87 Figure 6-13. SNTP Servers Table Modifying an SNTP Server 1 Open the SNTP Servers page. 2 Click Show All. The SNTP Servers Table opens. 3 Select an SNTP Server entry. 4 Modify the relevant fields. 5 Click Apply Changes. The SNTP Server information is updated. Deleting the SNTP Server 1 Open the SNTP Servers page.
  • Page 88: Defining Sntp Interfaces

    The following is an example of the CLI commands: console> enable console# configure Console(config)# sntp server 100.1.1.1 poll key 10 Console# show sntp status Clock is synchronized, stratum 4, reference is 176.1.1.8 Reference time is AFE2525E.70597B34 (00:10:22.438 PDT Jul 5 1993) Unicast servers: Server Preference...
  • Page 89 The SNTP Broadcast Interface Table contains the following fields: • Interface — Contains an interface list on which SNTP can be enabled. • Receive Servers Updates — Whether SNTP server updates are enabled for this interface. • Remove — Removes SNTP from a specific interface, when selected. Adding an SNTP Interface 1 Open the SNTP Broadcast Interface Table page.
  • Page 90 Defining SNTP Interface Settings Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the SNTP Broadcast Interface Table. Table 6-10. SNTP Broadcast CLI Commands CLI Command Description nables the Simple Network Time Protocol sntp client enable (SNTP) client on an interface.
  • Page 91: Managing Logs

    Provides device information. Debug Provides detailed information about the log. If a Debug error occurs, contact Dell Online Technical Support The Global Log Parameters page contains fields for defining which events are recorded to which logs. It contains fields for enabling logs globally, and parameters for defining log parameters. The Severity log messages are listed from the highest severity to the lowest.
  • Page 92 Figure 6-15. Global Log Parameters • Logging — Enables device global logs for Cache, File, and Server Logs. Console logs are enabled by default. • Severity — The following are the available severity logs: – Emergency — The highest warning level. If the device is down or not functioning properly, an emergency log message is saved to the specified logging location.
  • Page 93 Enabling Logs: 1 Open the Global Log Parameters page. 2 Select Enable in the Logging drop-down list. 3 Select the log type and log severity in the Global Log Parameters check boxes. 4 Click Apply Changes. The log settings are saved, and the device is updated. Enabling Logs Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Global Log Parameters page.
  • Page 94: Displaying Ram Log Table

    Displaying RAM Log Table The RAM Log Table contains information about log entries kept in RAM, including the time the log was → → entered, the log severity, and a description of the log. To open the RAM Log Table, click System Logs RAM Log in the tree view.
  • Page 95 The following is an example of the CLI commands: console# show logging Logging is enabled. Console Logging: Level info. Console Messages: 0 Dropped. Buffer Logging: Level info. Buffer Messages: 26 Logged, 26 Displayed, 200 Max. File Logging: Level error. File Messages: 157 Logged, 26 Dropped. 1 messages were not logged 01-Jan-2000 01:03:42 :%INIT-I-Startup: Cold Startup 01-Jan-2000 01:01:36 :%LINK-W-Down:...
  • Page 96: Displaying The Log File Table

    Displaying the Log File Table The Log File Table contains information about log entries saved to the Log File in FLASH, including the time the log was entered, the log severity, and a description of the log message. To open the Log File Table, click System →...
  • Page 97 The following is an example of the CLI commands: Console # show logging file Logging is enabled. Console Logging: Level info. Console Messages: 0 Dropped. Buffer Logging: Level info. Buffer Messages: 62 Logged, 62 Displayed, 200 Max. File Logging: Level debug. File Messages: 11 Logged, 51 Dropped.
  • Page 98: Viewing The Device Login History

    Viewing the Device Login History The Login History page contains information for viewing and monitoring device utilization, including the time the user logged in and the protocol used to log on to the device. To open the Login History page, click System→ Logs→ Login History in the tree view. Figure 6-18.
  • Page 99 Displaying the Device Login History Using CLI Commands The following table summarizes the equivalent CLI commands for viewing and setting fields displayed in the Login History page. Table 6-14. Log File Table CLI Commands CLI Command Description show users login-history Displays password management history information.
  • Page 100: Configuring The Remote Log Server Settings Page

    Configuring the Remote Log Server Settings Page The Remote Log Server Settings page contains fields for viewing and configuring the available Log Servers. In addition, new log servers can be defined, and the log severity sent to each sever. To open the Remote Log Server Settings page, click System →...
  • Page 101 • Severity to Include — The following are the available severity levels: – Emergency —The system is not functioning. – Alert — The system needs immediate attention. – Critical — The system is in a critical state. – Error — A system error has occurred. –...
  • Page 102 Defining a New Server: 1 Open the Remote Log Server Settings page. 2 Click Add. The Add a Log Server page opens: Figure 6-20. Add a Log Server New Log Server IP Address — Defines the IP address of the new Log Server. 3 Define the fields.
  • Page 103 The Remote Log Servers Table page opens: Figure 6-21. Remote Log Servers Table Removing a Log Server from the Log Server Table Page: 1 Open the Remote Log Server Settings page. 2 Click Show All. The Remote Log Servers Table page opens. 3 Select a Remote Log Servers Table entry.
  • Page 104: Defining Device Ip Addresses

    The following is an example of the CLI commands: console> enable console# configure console (config) # logging 10.1.1.1 severity critical Console# show logging Logging is enabled. Console Logging: Level debug. Console Messages: 5 Dropped. Buffer Logging: Level debug. Buffer Messages: 16 Logged, 16 Displayed, 200 Max.
  • Page 105 The Default Gateway page contains the following fields: • User Defined Default Gateway — Displays the default gateway IP address. • Active Default Gateway — Displays the currently configured Default Gateway. • Remove User Defined — Removes Gateway devices from the Default Gateway drop-down list, when selected.
  • Page 106: Defining Ip Interfaces

    Defining Gateway Devices Using the CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Default Gateway page. Table 6-16. Default Gateway CLI Commands CLI Command Description ip default-gateway ip- Defines a default gateway. address no ip default-gateway Removes a default gateway.
  • Page 107 • IP Address — The interface IP address. • Prefix Length — The number of bits that comprise the source IP address prefix, or the network mask of the source IP address. • Interface — The interface type for which the IP address is defined. Select Port, LAG, or VLAN. •...
  • Page 108 Deleting IP Addresses 1 Open the IP Interface Parameters page. 2 Click Show All. The Interface Parameters Table opens: Figure 6-24. IP Interface Parameter Table 3 Select an IP address and select the Remove check box. 4 Click Apply Changes. The selected IP address is deleted, and the device is updated.
  • Page 109: Defining Dhcp Ip Interface Parameters

    The following is an example of the CLI commands: Console (config)# interface vlan 1 Console (config-if)# ip address 131.108.1.27 255.255.255.0 Console (config-if)# no ip address 131.108.1.27 Console (config-if)# exit console# show ip interface vlan 1 Output Gateway IP Address Activity status --------------------- ------------------ 192.168.1.1 Active...
  • Page 110 • Interface — The specific interface connected to the device. Click the option button next to Port, LAG, or VLAN and select the interface connected to the device. • Host Name — The system name. This field can contain up to 20 characters. •...
  • Page 111: Configuring Domain Name Systems

    The following is an example of the CLI command: console> enable console# config console (config#) interface ethernet g1 console (config-if)# ip address dhcp 10.0.0.1 /8 Configuring Domain Name Systems Domain Name System (DNS) converts user-defined domain names into IP addresses. Each time a domain name is assigned the DNS service translates the name into a numeric IP address.
  • Page 112 • Set DNS Server Active — Activates the DNS server selected in the DNS Server field. • Remove DNS Server — When selected, removes DNS Servers. Adding a DNS Server 1 Open the Domain Naming System (DNS) page. 2 Click Add. The Add DNS Server page opens: Figure 6-27.
  • Page 113: Defining Default Domains

    3 The DNS Server Table opens. 4 Select a DNS Server Table entry. 5 Select the Remove check box. 6 Click Apply Changes. The selected DNS server is deleted, and the device is updated. Configuring DNS Servers Using the CLI Commands The following table summarizes the CLI commands for configuring device system information.
  • Page 114 Displays the default domain name, list of name server hosts, the static and the cached list of host names and addresses. The following is an example of the CLI commands: console> enable console# configure console (config)# ip domain-name www.dell.com Configuring System Information...
  • Page 115: Mapping Domain Host

    Mapping Domain Host The Host Name Mapping page provides parameters for assigning static host names IP addresses. The Host Name Mapping page provides up to eight IP addresses per host. To open the Host Name Mapping page, click System → IP Addressing → Host Name Mapping. Figure 6-30.
  • Page 116 Adding Host Domain Names 1 Open the Host Name Mapping page. 2 Click Add. The Add Host Name Mapping page opens: Figure 6-31. Add Host Name Mapping 3 Define the relevant fields. 4 Click Apply Changes. The IP address is mapped to the Host Name, and the switch device is updated. Displaying the Hosts Name Mapping Table 1 Open the Host Name Mapping page.
  • Page 117: Configuring Arp

    5 Check the Remove checkbox. 6 Click Apply Changes. The Host Mapping Table entry is deleted, and the switch device is updated. Mapping IP address to Domain Host Names Using the CLI Commands The following table summarizes the equivalent CLI commands for mapping Domain Host names to IP addresses.
  • Page 118 Figure 6-33. ARP Settings • Global Settings — Select this option to activate the fields for ARP global settings. • ARP Entry Age Out (1-40000000) — For all devices, the amount of time (seconds) that passes between ARP requests about an ARP table entry. After this period, the entry is deleted from the table. The range is 1 - 4000000, where zero indicates that entries are never cleared from the cache.
  • Page 119 • Status — The ARP Table entry status. Possible field values are: – Dynamic — The ARP entry is learned dynamically. – Static — The ARP entry is a static entry. • Remove ARP Entry — When selected, removes an ARP entry. Adding a Static ARP Table Entry: 1 Open the ARP Settings page.
  • Page 120 Deleting ARP Table Entry 1 Open the ARP Settings page 2 Click Show All. The ARP Table page opens. 3 Select a table entry. 4 Select the Remove check box. 5 Click Apply Changes. The selected ARP Table entry is deleted, and the device is updated. Configuring ARP Using the CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the ARP Settings page.
  • Page 121: Running Cable Diagnostics

    The following is an example of the CLI commands: Console(config)# arp 198.133.219.232 00-00-0c-40-0f-bc Console (config)# exit Console# arp timeout 12000 Console# show arp ARP timeout: 80000 Seconds Interface IP address HW address Status --------- ---------- ---------- ------ 10.7.1.102 00:10:B5:04:DB:4B Dynamic 10.7.1.135 00:50:22:00:2A:A4 Static...
  • Page 122 Figure 6-36. Integrated Cable Test for Copper Cables • Port — The port to which the cable is connected. • Test Result — The cable test results. Possible values are: – No Cable — There is no cable connected to the port. –...
  • Page 123 Displaying Virtual Cable Test Results Table 1 Open the Integrated Cable Test for Copper Cables page. 2 Click Show All. The Virtual Cable Test Results Table opens. Performing Copper Cable Tests Using CLI Commands The following table summarizes the equivalent CLI commands for performing copper cable tests. Table 6-23.
  • Page 124: Viewing Optical Transceiver Diagnostics

    Viewing Optical Transceiver Diagnostics The Optical Transceiver Diagnostics page contains fields for performing tests on Fiber Optic cables. Optical transceiver diagnostics can be performed only when the link is present. To open the Optical Transceiver Diagnostics page, click System→ Diagnostics→ Optical Transceiver Diagnostics in the tree view.
  • Page 125 Displaying Optical Transceiver Diagnostics Test Results Table 1 Open the Optical Transceiver Diagnostics page. 2 Click Show All. The test is run and the Virtual Cable Test Results Table opens. The Optical Transceiver Diagnostics Table contains the following columns: • Temp —...
  • Page 126 The following is an example of the CLI command: console> enable Console# show fiber-ports optical-transceiver Power Port Temp Voltage Current Output Input (Volt) (mA) (mWatt) (mWatt) Fault Copper Temp – Internally measured transceiver temperature. Voltage - Internally measured supply voltage. Current –...
  • Page 127: Managing Device Security

    Managing Device Security The Management Security page provides access to security pages that contain fields for setting security parameters for ports, device management methods, user, and server security. To open the Management Security page, click System→Management Security in the tree view. Defining Access Profiles The Access Profiles page contains fields for defining profiles and rules for accessing the device.
  • Page 128: Adding An Access Profile

    • Access Profile — User-defined Access Profile lists. The Access Profile list contains a default value of Console List, to which user-defined access profiles are added. Selecting Console Only as the Access Profile name disconnects the session, and enables accessing the device from the console only. •...
  • Page 129 • Access Profile Name (1-32 Characters) — User-defined name for the access profile. • Rule Priority (1-65535) — The rule priority. When the packet is matched to a rule, user groups are either granted or denied device management access. The rule order is set by defining a rule number within the Profile Rules Table.
  • Page 130 Figure 6-40. Add An Access Profile Rule 3 Complete the fields. 4 Click Apply Changes. The rule is added to the access profile, and the device is updated. Viewing the Profile Rules Table: The order in which rules appear in the Profile Rules Table is important. Packets are matched to the first rule which meets the rule criteria.
  • Page 131 Removing a Rule 1 Open the Access Profiles page. 2 Click Show All. The Profile Rules Table opens. 3 Select a rule. 4 Select the Remove check box. 5 Click Apply Changes. The selected rule is deleted, and the device is updated. Defining Access Profiles Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Access Profiles page.
  • Page 132 The following is an example of the CLI commands: Console (config)# management access-list mlist Console (config-macl)# permit ethernet g1 Console (config-macl)# permit ethernet g9 Console (config-macl)# deny ethernet g2 Console (config-macl)# deny ethernet g10 Console (config-macl)# exit Console (config)# management access-class mlist Console (config)# exit Console# show management access-list mlist...
  • Page 133: Defining Authentication Profiles

    Defining Authentication Profiles The Authentication Profiles page contains fields for selecting the user authentication method on the device. User authentication occurs: • Locally • Via an external server User authentication can also be set to None. User authentication occurs in the order the methods are selected. For example, if both the Local and RADIUS options are selected, the user is authenticated first locally.
  • Page 134 • Optional Methods — User authentication methods. Possible options are: – None — No user authentication occurs. – Local — User authentication occurs at the device level. The device checks the user name and password for authentication. – RADIUS — User authentication occurs at the RADIUS server. For more information, see "Configuring RADIUS Global Parameters."...
  • Page 135 Displaying the Show All Authentication Profiles Page: 1 Open the Authentication Profiles page. 2 Click Show All. The Authentication Profile page opens: Figure 6-44. Authentication Profiles Deleting an Authentication Profiles: 1 Open the Authentication Profiles page. 2 Click Show All. The Authentication Profile page opens.
  • Page 136: Assigning Authentication Profiles

    Assigning Authentication Profiles After Authentication Profiles are defined, the Authentication Profiles can be applied to Management Access methods. For example, console users can be authenticated by Authentication Method Lists 1, while Telnet users are authenticated by Authentication Method List 2. To open the Select Authentication page, click System →...
  • Page 137 • Console — Authentication profiles used to authenticate console users. • Telnet — Authentication profiles used to authenticate Telnet users. • Secure Telnet (SSH) — Authentication profiles used to authenticate Secure Shell (SSH) users. SSH provides clients with secure and encrypted remote connections to a device. •...
  • Page 138 Assigning HTTP Sessions an Authentication Sequence 1 Open the Select Authentication page. 2 Select an authentication sequence in the HTTP field. 3 Click Apply Changes. HTTP sessions are assigned an authentication sequence. Assigning Secure HTTP Sessions an Authentication Sequence 1 Open the Select Authentication page. 2 Select an authentication sequence in the Secure HTTP field.
  • Page 139 The following is an example of the CLI commands: Console (config-line)# enable authentication default Console (config-line)# login authentication default Console (config-line)# exit Console (config)# ip http authentication radius local Console (config)# ip https authentication radius local Console (config)# exit Console# show authentication methods Login Authentication Method Lists --------------------------------- Default: Radius, Local, Line...
  • Page 140: Managing Passwords

    Managing Passwords Password management provides increased network security and improved password control. Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP access are assigned security features, which include: • Defining minimum password lengths • Password expiration • Prevents frequent password reuse •...
  • Page 141 The Password Management page contains the following fields: • Password Minimum Length (8-64) — Indicates the minimum password length, when checked. For example, the administrator can define that all passwords must have a minimum of 10 characters. • Consecutive Passwords Before Re-use — Indicates the amount of times a password is changed, before the password can be reused.
  • Page 142 The following is an example of the CLI commands: console # show passwords configuration Minimal length: 0 History: Disabled History hold time: no limit Lockout control: disabled Enable Passwords Level Password Password Lockout Aging Expiry date ----- -------- ----------- ------- Line Passwords Line Password...
  • Page 143: Viewing Active Users

    Viewing Active Users The Active Users page contains information about who is currently logged in to the device. Figure 6-47. Active Users • Name — The user’s login name. • Protocol — The protocol being used to access the device. •...
  • Page 144 Figure 6-48. Local User Database The Local User Database page contains the following fields: • User Name — List of users. • Access Level — User access level. The lowest user access level is 1 and 15 is the highest user access level.
  • Page 145 Assigning Access Rights to a User: 1 Open the Local User Database page. 2 Select a user in the User Name field. 3 Define the fields. 4 Click Apply Changes. The user access rights and passwords are defined, and the device is updated. Defining a New User: 1 Open the Local User Database page.
  • Page 146 Figure 6-50. Local User Table Reactivating a Suspended User: 1 Open the Local User Database page. 2 Click Show All. The Local User Table opens. 3 Select a User Name entry. 4 Select the Reactivate Suspended User check box. 5 Click Apply Changes. The user access rights are reactivated, and the device is updated.
  • Page 147: Defining Line Passwords

    The following is an example of the CLI commands: console(config)# username bob password lee level 15 console# set username bob active Defining Line Passwords The Line Password page contains fields for defining line passwords for management methods. To open the Line Password page, click System →...
  • Page 148 The Line Password page contains the following fields: • Line Password for Console/Telnet/Secure Telnet — The line password for accessing the device via a Console, Telnet, or Secure Telnet session. • Confirm Password for Console/Telnet/Secure Telnet — Confirms the new line password. The password appears in the ***** format.
  • Page 149: Defining Enable Passwords

    Indicates a password on a line. [encrypted] The following is an example of the CLI commands: console(config-line)# password dell Defining Enable Passwords The Enable Password page sets a local password to control access to Normal and Privilege levels. To open the Enable Password page, click System →...
  • Page 150: Defining Tacacs+ Settings

    • Expiry Date — Indicates the expiration date of the enable password. • Lockout Status — Specifies the number of failed authentication attempts since the user last logged in successfully, when the Enable Login Attempts checkbox is selected in the Password Management page. Specifies LOCKOUT, when the user account is locked.
  • Page 151 Figure 6-53. TACACS+ Settings • Host IP Address — Specifies the TACACS+ Server IP address. • Priority (0-65535) — Specifies the order in which the TACACS+ servers are used. The default is 0. • Source IP Address — The device source IP address used for the TACACS+ session between the device and the TACACS+ server.
  • Page 152 • Single Connection — Maintains a single open connection between the device and the TACACS+ server when selected The TACACS+ default parameters are user-defined defaults. The default settings are applied to newly defined TACACS+ servers. If default values are not defined, the system defaults are applied to the new TACACS+ new servers.
  • Page 153 Figure 6-55. TACACS+ Table Removing a TACACS+ Server 1 Open the TACACS+ Settings page. 2 Click Show All. The TACACS+ Table opens. 3 Select a TACACS+ Table entry. 4 Select the Remove check box. 5 Click Apply Changes. The TACACS+ server is removed, and the device is updated. Defining TACACS+ Settings Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the TACACS+ Settings page.
  • Page 154 The following is an example of the CLI commands: Console# show tacacs Router Configuration ----------- --------- ----- ---------- ---------- --------- --------- IP address Status Port Single TimeOut Source IP Priority Connection ----------- --------- ----- ---------- ---------- --------- --------- 12.1.1.2 12.1.1.1 Connected Global values -----------------...
  • Page 155: Configuring Radius Global Parameters

    Configuring RADIUS Global Parameters Remote Authorization Dial-In User Service (RADIUS) servers provide additional security for networks. RADIUS servers provide a centralized authentication method for: • Telnet Access • Web Access • Console to Device Access To open the RADIUS Settings page, click System → Management Security → RADIUS in the tree view. Figure 6-56.
  • Page 156 • Number of Retries (1-10) — Specifies the number of transmitted requests sent to RADIUS server before a failure occurs. The possible field values are 1 - 10. Three is the default value. • Timeout for Reply (1-30) — Specifies the amount of the time in seconds the device waits for an answer from the RADIUS server before retrying the query, or switching to the next server.
  • Page 157 Figure 6-57. Add RADIUS Server Page 3 Define the fields. 4 Click Apply Changes. The new RADIUS server is added, and the device is updated. Displaying the RADIUS Server List: 1 Open the RADIUS Settings page. 2 Click Show All. The Show all RADIUS Servers page opens: Figure 6-58.
  • Page 158 3 Modify the relevant fields. 4 Click Apply Changes. The RADIUS Server settings are modified, and the device is updated. Deleting a RADIUS Server for the RADIUS Servers List: 1 Open the RADIUS Settings page. 2 Click Show All. The RADIUS Servers List page opens. 3 Select a RADIUS Server in the RADIUS Servers List.
  • Page 159: Configuring Lldp And Lldp-Med

    The following is an example of the CLI commands: Console (config)# radius-server timeout 5 Console (config)# radius-server retransmit 5 Console (config)# radius-server deadtime 10 Console (config)# radius-server key dell-server Console (config)# radius-server host 196.210.100.1 auth-port 1645 timeout 20 Console# show radius-servers...
  • Page 160: Defining Lldp Properties

    The advertising device transmits multiple advertisement message sets in a single LAN packet. The multiple advertisement sets are sent in the packet Type Length Value (TLV) field. LLDP devices must support chassis and port ID advertisement, as well as system name, system ID, system description, and system capability advertisements.
  • Page 161 Figure 6-59. LLDP Properties • Enable LLDP — Indicates if LLDP is enabled on the device. The possible field values are: – Checked — Indicates that LLDP is enabled on the device. – Unchecked — Indicates that LLDP is disabled on the device. This is the default value. •...
  • Page 162: Configuring Lldp Using Cli Commands

    Configuring LLDP Using CLI Commands Table 6-34. LLDP Properties CLI Commands CLI Command Description Enables enable Link Layer Discovery lldp enable (global) Protocol. Specifies the time that the receiving lldp hold-multiplier number device should hold a Link Layer Discovery Protocol (LLDP) packet before discarding it.
  • Page 163 Figure 6-60. Port Settings • Port — Contains a list of ports on which LLDP is enabled. – State — Indicates the port type on which LLDP is enabled. The possible field values are: – Tx Only — Enables transmitting LLDP packets only. –...
  • Page 164 • Use Default — Indicates that information included in the TLVs is per the device defaults. The possible field values are: – Checked — Enables sending the device default LLDP advertisements. – Unchecked — Indicates that the device LLDP advertisement settings are disabled, and LLDP advertisement settings are user defined.
  • Page 165: Defining Lldp Med Network Policy

    Defining LLDP MED Network Policy The MED Network Policy page contains fields for configuring LLDP. To open the MED Network Policy page, click System → LLDP-MED → MED Network Policy in the tree view. Figure 6-62. MED Network Policy The MED Network Policy page contains the following fields: •...
  • Page 166 • VLAN Type — Indicates the VLAN type for which the network policy is defined. The possible field values are: – Tagged — Indicates the network policy is defined for tagged VLANs. – Untagged — Indicates the network policy is defined for untagged VLANs. •...
  • Page 167: Defining Lldp Med Port Settings

    Figure 6-64. MED Network Policy Table Defining LLDP MED Port Settings The MED Port Settings contains parameters for assigning LLDP network policies to specific ports. To open the MED Port Settings page, click System → LLDP-MED → Port Settings in the tree view. The MED Port Settings opens: Figure 6-65.
  • Page 168 The MED Port Settings page contains the following fields: • Port — Displays the port on which LLDP-MED is enabled or disabled. • Enable LLDP-MED — Indicates if LLDP-MED is enabled on the selected port. The possible field values are: Checked —...
  • Page 169 The Details Advertise Information page opens: Figure 6-67. Details Advertise Information Page The Details Advertise Information page contains the following fields: • Port — The port for which detailed information is played. • Auto-Negotiation Status — The auto-negotiation status of the port. The possible field values are: –...
  • Page 170: Viewing The Lldp Neighbors Information

    • MAU Type — Indicates the media attachment unit type. The MAU performs physical layer functions, including digital data conversion from the Ethernet interfaces’ collision detection and bit injection into the network. • System Name — The system name for the port. •...
  • Page 171 Figure 6-68. Neighbors Information • Port — Displays the neighboring port number. • Device ID — Displays the neighboring device ID. • System Name — Displays the neighboring system time. • Port ID — Displays the neighboring port ID • Capabilities —...
  • Page 172 Figure 6-69. Details Neighbors Information For information on the fields, refer to the Details Advertise Information page above. Table 6-36. LLDP Neighbors Information CLI Commands CLI Command Description Displays information about neighboring show lldp neighbors devices discovered using Link Layer interface Discovery Protocol (LLDP) Configuring System Information...
  • Page 173: Defining Snmp Parameters

    The following is an example of the CLI commands: Switch# show lldp neighbors Port Device ID Port Hold System Time Capabilities Name ts-7800-2 0060.704C.73FE ts-7800-2 0060.704C.73FD 0060.704C.73F C B, R ts-7900-1 ts-7900-2 0060.704C.73FB Defining SNMP Parameters Simple Network Management Protocol (SNMP) provides a method for managing network devices. Devices supporting SNMP run a local software (agent).
  • Page 174: Enabling Snmp Notifications

    Figure 6-70. Global Parameters • Local Engine ID (10 - 64 Hex Characters) — Indicates the local device engine ID. The field value is a hexadecimal string. Each byte in hexadecimal character strings is two hexadecimal digits. Each byte can be separated by a period or a colon.
  • Page 175: Enabling Snmp Notifications Using Cli Commands

    Enabling SNMP Notifications Using CLI Commands The following table summarizes the equivalent CLI commands for viewing fields displayed in the SNMP Global Parameters page. Table 6-37. SNMP Notification Commands CLI Command Description Enables the router to send Simple Network Management Protocol traps. snmp-server enable traps Enables the router to send Simple Network Management Protocol traps when...
  • Page 176: Defining Snmp View Settings

    Version 3 notifications Target Type Username Security Filter Retries Address Level Port name -------- ---- --------- -------- ---- ------ --- ------- System Contact: Robert System Location: Marketing Defining SNMP View Settings SNMP Views provides access or blocks access to device features or feature aspects. For example, a view can be defined which states that SNMP group A has read only (R/O) access to Multicast groups, while SNMP group B has read-write (R/W) access to Multicast groups.
  • Page 177: Adding A View

    – Default — Displays the default user-defined view. – DefaultSuper — Displays the default super user-defined view. • New Object ID Subtree — Indicates the device feature OID included or excluded in the selected SNMP view. • Selected from List — Select the device feature OID by using the Up and Down buttons to scroll through a list of all device OIDs.
  • Page 178: Defining Snmp Views Using Cli Commands

    Figure 6-73. View Table Defining SNMP Views Using CLI Commands The following table summarizes the equivalent CLI commands for defining fields displayed in the SNMPv3 View Settings page. Figure 6-74. SNMP View CLI Commands CLI Command Description Creates or updates a view entry. snmp-server view view-name oid-tree {included | excluded} Displays the configuration of views.
  • Page 179: Defining Snmp Access Control

    Defining SNMP Access Control The Access Control Add Group page provides information for creating SNMP groups, and assigning SNMP access control privileges to SNMP groups. Groups allow network managers to assign access rights to specific device features, or features aspects. To open the Access Control Group page, click System→ SNMP →...
  • Page 180: Defining Snmp Groups

    • Operation — Defines the group access rights. The possible field values are: – Read — The management access is restricted to read-only, and changes cannot be made to the assigned SNMP view. – Write — The management access is read-write and changes can be made to the assigned SNMP view. –...
  • Page 181: Removing Snmp Groups

    The Access Table opens: Removing SNMP Groups Open the Access Control Group page. Click Show All. The Access Table opens. Select an SNMP group. Check the Remove checkbox. The SNMP group is deleted, and the device is updated. Click Apply Changes. Defining SNMP Access Control Using CLI Commands The following table summarizes the equivalent CLI commands for defining fields displayed in the Access Control Group page.
  • Page 182 Figure 6-78. User Security Model • User Name — Contains a list of user-defined user names. The field range is up to 30 alphanumeric characters. • Engine ID — Indicates either the local or remote SNMP entity, to which the user is connected. Changing or removing the local SNMP Engine ID deletes the SNMPv3 User Database.
  • Page 183: Adding Users To A Group

    • Authentication Key (MD5-16; SHA-20 hexa chars) — Defines the HMAC-MD5-96 or HMAC-SHA- 96 authentication level. The authentication and privacy keys are entered to define the authentication key. If only authentication is required, 16 bytes are defined for MD5. If both privacy and authentication are required, 32 bytes are defined for MD5.
  • Page 184: Deleting An User Security Model Table Entry

    Figure 6-80. User Security Model Table Deleting an User Security Model Table Entry 1 Open the SNMPv3 User Security Model (USM) page. 2 Click Show All. The User Security Model Table opens. 3 Select a User Security Model Table entry. 4 Check the Remove checkbox.
  • Page 185: Defining Communities

    Defining Communities Access rights are managed by defining communities in the Community Table. When the community names are changed, access rights are also changed. To open the SNMP Community page, click System → SNMP → Community in the tree view. Figure 6-81.
  • Page 186 Check View to create a new view, or select an existing view Name. A view defines the objects available to the community. • Advanced — Selects an advanced SNMP view. • Group Name — Name of previously defined groups. The group defines the objects available to the community.
  • Page 187 Figure 6-83. Community Table Deleting Communities 1 Open the Community Table page. 2 Click Show All. The Community Table opens. 3 Select a community from the Community Table. 4 Select the Remove check box. 5 Click Apply Changes. The selected community entry is deleted, and the device is updated. Configuring Communities Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Community Table page.
  • Page 188 The following is an example of the CLI commands: console(config)# snmp-server community public_1 su 1.1.1.1 console(config)# snmp-server community public_2 rw 2.2.2.2 console(config)# snmp-server community public_3 ro 3.3.3.3 console(config)# snmp-server host 1.1.1.1 public_1 1 console(config)# snmp-server host 2.2.2.2 public_2 2 console(config)# console# show snmp Community-String Community-Access...
  • Page 189: Defining Notification Filters

    Defining Notification Filters The Notification Filter page permits filtering traps based on OIDs. Each OID is linked to a device feature or a feature aspect. The Notification Filter page also allows network managers to filter notifications. To open the Notification Filter page, click System →...
  • Page 190: Displaying The Filter Table

    Figure 6-85. Add Filter 3 Define the relevant fields. 4 Click Apply Changes. The new filter is added, and the device is updated. Displaying the Filter Table 1 Open the Notification Filter page. 2 Click Show All. The Filter Table opens: Figure 6-86.
  • Page 191: Defining Snmp Notification Recipients

    Configuring Notification Filters Using CLI Commands The following table summarizes equivalent CLI commands for defining fields displayed in the Notification Filters page. Table 6-40. SNMP Notification Filter CLI Commands CLI Command Description Creates or updates an SNMP notification filter. snmp-server filter filter-name oid-tree {included | excluded} Displays the configuration of SNMP notification...
  • Page 192 Figure 6-87. Notification Recipients • Recipient IP — Indicates the IP address to whom the traps are sent. – Notification Type — The notification sent. The possible field values are: – Traps — Traps are sent. – Informs — Informs are sent. •...
  • Page 193: Adding A New Trap Recipients

    • User Name — The user to whom SNMP notifications are sent. • Security Level — Defines the means by which the packet is authenticated. The possible field values are: – No Authentication — The packet is neither authenticated nor encrypted. –...
  • Page 194: Displaying Notification Recipients Tables

    Displaying Notification Recipients Tables 1 Open Notification Recipients page. 2 Click Show All. The Notification Recipients Tables page opens: Figure 6-88. Notification Recipients Tables Deleting Notification Recipients 1 Open Notification Recipients page. 2 Click Show All. The Notification Recipients Tables page opens. 3 Select a notification recipient in either the SNMPV1,2 Notification Recipient or SNMPv3 Notification Recipient Tables.
  • Page 195 Table 6-41. SNMP Notification Recipients CLI Commands CLI Command Description Creates or updates a notification recipient receiving snmp-server host {ipaddress | notifications in SNMP version 1 or 2. hostname} community-string [traps | informs] [1 | 2] [udp-port port] [filter filtername] [timeout seconds] [retries retries] Creates or updates a notification recipient receiving snmp-server v3-host {ip-address |...
  • Page 196: Managing Files

    Managing Files The File Management page contains fields for managing device software, the Image Files, and the Configuration Files. Files can be downloaded from a TFTP server. File Management Overview The configuration file structure consists of the following configuration files: •...
  • Page 197 Figure 6-89. File Download From Server • Firmware Download — The Firmware file is downloaded. If Firmware Download is selected, the Configuration Download fields are grayed out. • Configuration Download — The Configuration file is downloaded. If Configuration Download is selected, the Firmware Download fields are grayed out.
  • Page 198 Active Image • Active Image — The Image file that is currently active. • Active Image After Reset — The Image file that is active after the device is reset. Configuration Download • Server IP Address — The Server IP Address from which the configuration files •...
  • Page 199: Uploading Files

    The following is an example of the CLI commands: console# copy running-config tftp://11.1.1.2/pp.txt Accessing file 'file1' on 172.16.101.101. Loading file1 from 172.16.101.101: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! [OK] Copy took 0:01:11 [hh:mm:ss] Uploading Files The File Upload to Server page contains fields for uploading the software from the device to the TFTP server.
  • Page 200 • Firmware Upload — Indicates that the upload is for firmware. If Firmware Upload is selected, the Configuration Upload fields are grayed out. • Configuration Upload — Indicates that the upload is for configuration files. If Configuration Upload is selected, the Firmware Upload fields are grayed out. •...
  • Page 201: Copying Files

    Uploading Files Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the File Upload to Server page. Table 6-43. File Upload CLI Commands CLI Command Description copy source-url destination- Copies any file from a source to a destination. url [snmp] The following is an example of the CLI commands: console# copy image tftp://10.6.6.64/uploaded.ros...
  • Page 202 Figure 6-91. Copy Files • Copy Configuration — When selected, copies the configuration to the destination file as specified. – Source — Indicates the type of file to be copied to the destination file. Select either the Running Configuration or Startup Configuration. –...
  • Page 203 Copying and Deleting Files Using CLI Commands The following table summarizes the equivalent CLI commands for setting fields displayed in the Copy Files page. Table 6-44. Copy Files CLI Commands CLI Command Description copy source-url destination- Copies any file from a source to a destination. url [snmp] delete startup-config Deletes the startup-config file.
  • Page 204: Managing Device Files

    Managing Device Files The Files on File System page provides information about files currently stored on the system, including file names, file sizes, files modifications, and file permissions. The files system permits managing up to five files and a total file size of 3MB. To open the Files on File System page, click System→ File Management→...
  • Page 205: Defining Advanced Settings

    Managing Files Using CLI Commands The following table summarizes the equivalent CLI commands for managing system files. Table 6-45. Copy Files CLI Commands CLI Command Description Display list of files on a flash file system The following is an example of the CLI commands: console# dir Directory of flash: File Name...
  • Page 206: Configuring General Device Tuning Parameters

    Configuring General Device Tuning Parameters The General Settings page provides information for defining general device parameters. To open the → → General Settings page, click System Advanced Settings General in the tree view. Figure 6-93. General Settings • Attribute — The general setting attribute. •...
  • Page 207: Optimizing Iscsi

    Optimizing iSCSI iSCSI is a communication protocol used for sending data between file servers and storage disks. The file servers are called initiators and the disks are called targets. You can optimize iSCSI flow by setting Quality of Service frame priority parameters in the device. The device can also intercept iSCSI frames and provide information about iSCSI communications (called sessions).
  • Page 208: Defining Iscsi Global Parameters Using Cli Commands

    Configuring iSCSI Global Parameters: 1 Open the iSCSI Optimization Global Parameters page. 2 Edit the relevant fields. 3 Click Apply Changes. Defining iSCSI Global Parameters Using CLI Commands The following table summarizes the equivalent CLI commands for defining fields displayed in the iSCSI Global Parameters page.
  • Page 209 The following is an example of the CLI commands: Console# show iscsi Target: iqn.1993-11.com.disk-vendor:diskarrays.sn.45678 -------------------------------------------------------------- Session 1: --------- Initiator: iqn.1992-04.com.os-vendor.plan9:cdrom.12. storage:sys1.xyz Time started: 23-Jul-2002 10:04:50 Time for aging out: 10 min ISID: 11 Initiator Initiator Target Target IP address TCP port IP address IP port ----------...
  • Page 210: Managing Iscsi Targets

    Managing iSCSI Targets The iSCSI Targets Table contains information about iSCSI targets in the network. You can add and remove targets in the table. To open the iSCSI Targets Table, click System → iSCSI Optimization → iSCSI Targets in the tree view. Figure 6-96.
  • Page 211: Defining Iscsi Targets Using Cli Commands

    3 Fill in the parameters. 4 Click Apply Changes. Removing Targets 1 Open the iSCSI Targets Table. 2 In the table, check the Remove checkbox next to each target to be removed. 3 Click Apply Changes. Defining iSCSI Targets Using CLI Commands The following table summarizes the equivalent CLI commands for defining fields displayed in the iSCSI Targets Table.
  • Page 212 Figure 6-99. iSCSI Sessions For each session, the following information is shown: • Target Name — The name of the target. • Initiator Name — The name of the initiator. • ISID — The iSCSI session ID. When you click Details, the following additional information is shown for the session: •...
  • Page 213: Defining Iscsi Sessions Using Cli Commands

    Defining iSCSI Sessions Using CLI Commands The following table summarizes the equivalent CLI commands for defining fields displayed in the iSCSI Sessions page. Figure 6-100. iSCSI Sessions CLI Commands CLI Command Description To display the iSCSI sessions, use the show iscsi sessions show iscsi sessions privileged EXEC command.
  • Page 214 Configuring System Information...
  • Page 215: Configuring Device Information

    Configuring Device Information This section provides all system operation and general information for configuring network security, ports, Address tables, GARP, VLANs, Spanning Tree, Port Aggregation, and Multicast Support. Configuring Network Security The device enables network security through both Access Control Lists and Locked Ports. To open the Network Security page select Switch →...
  • Page 216 Advanced Port Based Authentication also enables user based authentication. Specific VLANs in the device are always available, even if specific ports attached to the VLAN are unauthorized. For example, Voice over IP does not require authentication, while data traffic requires authentication. VLANs for which authorization is not required can be defined.
  • Page 217 Figure 7-1. Port Based Authentication • Port Based Authentication State — Permits port based authentication on the device. The possible field values are: – Enable — Enables port based authentication on the device. – Disable — Disables port based authentication on the device. •...
  • Page 218 • Guest VLAN — Specifies whether the Guest VLAN is enabled on the device. The possible field values are: – Enable — Enables using a Guest VLAN for unauthorized ports. If a Guest VLAN is enabled, the unauthorized port automatically joins the VLAN selected in the VLAN List field. –...
  • Page 219 Figure 7-2. Port Based Authentication Table Termination Cause — The reason for which the port authentication was terminated. Copy To Checkbox — Copies port parameters from one port to the selected ports. Select All — Selects all ports in the Port Based Authentication Table. Copying Parameters in the Port Based Authentication Table 1 Open the Port Based Authentication page.
  • Page 220 Enabling Port Based Authentication Using the CLI Commands The following table summarizes the equivalent CLI commands for enabling the port based authentication as displayed in the Port Based Authentication page. Table 7-1. Port Authentication CLI Commands CLI Command Description aaa authentication dot1x default Specifies one or more authentication, authorization, and accounting (AAA) method1 [method2.] methods for use on interfaces running IEEE 802.1X.
  • Page 221: Configuring Advanced Port Based Authentication

    Configuring Advanced Port Based Authentication The Multiple Hosts page provides information for defining advanced port based authentication settings for specific ports. To open the Multiple Hosts, click Switch →Network Security → Multiple Hosts. Figure 7-3. Multiple Hosts • Port — The port number for which Advanced Port Based Authentication is enabled. •...
  • Page 222: Authenticating Users

    • Status — The host status. The possible field values are: – Unauthorized — Clients (supplicants) have full port access. – Authorized — Cents (supplicants) have limited port access. • Number of Violations — The number of packets that arrived on the interface in single-host mode, from a host whose MAC address is not the client (supplicant) MAC address.
  • Page 223 Figure 7-5. Authenticated Users • User Name — List of users authorized via the RADIUS Server. • Port — The port number(s) used for authentication - per user name. • Session Time — The amount of time the user was logged on to the device. The field format is Day:Hour:Minute:Seconds, for example, 3 days: 2 hours: 4 minutes: 39 seconds.
  • Page 224: Configuring Port Security

    Authenticating Users Using the CLI Commands The following table summarizes the equivalent CLI commands for authenticating users as displayed in the Add User Name page. Table 7-3. Add User Name CLI Commands CLI Command Description show dot1x users [username Displays 802.1X users for the device. username] The following is an example of the CLI commands: console# show dot1x users...
  • Page 225 Figure 7-7. Port Security • Interface — The selected interface type on which Locked Port is enabled. – Port — The selected interface type is a port. – LAG — The selected interface type is a LAG. • Current Port Status — The currently configured Port status. •...
  • Page 226 – Shutdown — Discards the packet from any unlearned source and locks the port. Port remained locked until they are activated, or the device is reset. • Trap — Enables traps being sent when a packet is received on a locked port. •...
  • Page 227: Acl Overview

    The following table summarizes the equivalent CLI commands for configuring Locked Port security as displayed in the Port Security page. Table 7-4. Port Security CLI Commands CLI Command Description shutdown Disables interfaces. set interface active {ethernet Reactivates an interface that is shutdown due to interface | port-channel port- port security reasons.
  • Page 228 For example, a network administrator defines an ACL rule that states, port number 20 can receive TCP packets, however, if a UDP packet is received, the packet is dropped. ACLs are composed of access control entries (ACEs) that are made of the filters that determine traffic classifications.
  • Page 229 • Protocol — Enables creating an ACE based on a specific protocol. The possible field values are: – IP — Internet Protocol (IP). Specifies the format of packets and their addressing method. IP addresses packets and forwards the packets to the correct port. –...
  • Page 230 – L2TP — Matches the packet to Internet Protocol (L2IP). – ISIS — Intermediate System - Intermediate System (ISIS). Distributes IP routing information throughout a single Autonomous System in IP networks – Protocol ID To Match — Adds user-defined protocols by which packets are matched to the ACE. Each protocol has a specific protocol number which is unique.
  • Page 231 Adding ACEs to IP based ACLs 1 Open the Network Security - IP Based ACL page. 2 Select an ACL. 3 Edit the relevant fields. 4 Click Apply Changes. Adding IP based ACLs 1 Open the IP Based ACL page.: 2 Click Add.
  • Page 232 Figure 7-11. ACEs Associated with IP-ACL Removing an IP based ACL 1 Open the Network Security - IP Based ACL page. 2 Click Show All. The ACEs Associated with IP-ACL Table opens. 3 Check the Remove ACL checkbox. 4 Click Apply Changes. Removing an IP based ACE 1 Open the Network Security - IP Based ACL page.
  • Page 233: Defining Mac Based Access Control Lists

    (continued) Table 7-5. IP Based ACL CLI Commands CLI Command Description permit {any| protocol} {any|{source source-wildcard}} To set conditions to allow a packet to {any|{destination destination-wildcard}} [dscp number | ip- pass a named IP access list, use the precedence number] [fragments] permit command in access list configuration mode.
  • Page 234 Figure 7-12. Network Security - MAC Based ACL • ACL Name — Displays the user-defined MAC based ACLs. • New ACE Priority — Indicates the ACE priority, which determines which ACE is matched to a packet on a first-match basis. The possible field values are 1-2147483647. •...
  • Page 235 • Cos Mask — Indicates the CoS Mask by which the packets are filtered. • Ethertype — Indicates the Ethertype packet by which the packets are filtered. • Action — Indicates the ACL forwarding action. Possible field values are: – Permit —...
  • Page 236 3 Define the relevant fields. 4 Click Apply Changes. The MAC based protocol is defined, and the device is updated. Displaying the ACEs Associated with MAC based ACLs 1 Open the Network Security - MAC Based ACL page. 2 Click Show All. The ACEs Associated with MAC Based ACL opens: Removing a MAC based ACL 1 Open the Network Security - MAC Based ACL page.
  • Page 237: Defining Acl Binding

    Configuring MAC Based ACLs with CLI Commands The following table summarizes the equivalent CLI commands for configuring MAC Based ACLs . Table 7-6. MAC Based ACL CLI Commands CLI Command Description mac access-list access-list-name To define a Layer 2 access list and to place the device in MAC access list configuration mode, use the mac no mac access-list access-list-name access-list command in global configuration mode.
  • Page 238 To bind ACLs to interfaces: 1 Open the Network Security - ACL Bindings page, click Switch → Network Security → ACL Bindings. Figure 7-14. Network Security - ACL Binding 2 In the Select an ACL field, select an IP Based or MAC Based ACL. 3 In the Bind ACL to an Interface field, select a port or LAG.
  • Page 239 Figure 7-15. ACL Bindings Table Copying ACL Parameters Between Interfaces 1 Open the Network Security - ACL Binding page. 2 Click Show All. The ACL Bindings Table opens. 3 In the Copy Parameters from field, select a Port or LAG from which you want to copy ACL settings. 4 In the table, check the Copy to checkbox for each entry to which you want to copy the settings.
  • Page 240: Configuring Dhcp Snooping

    The following is an example of some of the CLI commands: Switch# show access-lists IP access list ACL1 permit 234 172.30.40.1 0.0.0.0 any permit 234 172.30.8.8 0.0.0.0 any Configuring DHCP Snooping DHCP Snooping expands network security by providing firewall security between untrusted interfaces and DHCP servers.
  • Page 241 Figure 7-16. Global Parameters • DHCP Snooping Status — Indicates if DHCP Snooping is enabled on the device. The possible field values are: – Enable — Enables DHCP Snooping on the device. – Disable — Disables DHCP Snooping on the device. This is the default value. •...
  • Page 242 Configuring DHCP Snooping Global Parameters with CLI Commands The following table summarizes the equivalent CLI commands for configuring DHCP Snooping global parameters DHCP Snooping Global Parameters Table 7-8. CLI Commands CLI Command Description ip dhcp snooping Use the ip dhcp snooping global configuration command to globally enable DHCP snooping.
  • Page 243: Defining Dhcp Snooping On Vlans

    The following is an example of some of the CLI commands: Console# show ip dhcp snooping DHCP snooping is enabled DHCP snooping is configured on following VLANs: 2, 7-18 DHCP snooping database: enabled Option 82 on untrusted port is allowed Verification of hwaddr field is enabled Interface Trusted...
  • Page 244: Defining Trusted Interfaces

    Defining DHCP Snooping on VLANS 1 Open the DHCP Snooping VLAN Settings page. 2 Click Add and Remove to add/remove VLAN IDs to or from the Enabled VLAN list. 3 Click Apply Changes. Configuring DHCP Snooping on VLANs with CLI Commands The following table summarizes the equivalent CLI commands for configuring DHCP Snooping on VLANs .
  • Page 245 Displaying the Trusted Interfaces Table: 1 Open the Trusted Interfaces page. 2 Click Show All. The Trusted Interfaces Table opens: Figure 7-19. Trusted Interfaces Table Copying Trusted Interfaces Settings Between Interfaces 1 Open the Trusted Interfaces page. 2 Click Show All. The Trusted Interfaces Table opens. 3 In the Unit and Copy from fields, select a Port or LAG from which you want to copy settings.
  • Page 246: Adding Interfaces To The Dhcp Snooping Database

    Configuring DHCP Snooping Trusted Interfaces with CLI Commands The following table summarizes the equivalent CLI commands for configuring DHCP Snooping Trusted Interfaces DHCP Snooping Trusted Interfaces Table 7-10. CLI Commands CLI Command Description ip dhcp snooping trust Use the ip dhcp snooping trust interface configuration command to configure a no ip dhcp snooping trust port as trusted for DHCP snooping...
  • Page 247 Querying the Database 1 Open the Binding Database page. 2 Select the following categories: • MAC Address — Indicates the MAC addresses recorded in the DHCP Snooping Database. • IP Address — Indicates the IP addresses recorded in the DHCP Snooping Database. •...
  • Page 248 Figure 7-21. Bind DHCP Snooping Page 3 Define the fields. 4 Click Apply Changes. Configuring DHCP Snooping Binding Database with CLI Commands The following table summarizes the equivalent CLI commands for configuring DHCP Snooping Binding Database DHCP Snooping Binding Database Table 7-11.
  • Page 249: Configuring Ports

    The following is an example of some of the CLI commands: Console# show ip dhcp snooping binding Update frequency: 1200 Total number of binding: 2 Mac Address IP Address Lease (sec) Type VLAN Interface ----------- ----------- ----------- -------- -------- ------- 0060.704C.73FF 10.1.8.1 7983...
  • Page 250: Defining Port Parameters

    Defining Port Parameters The Port Configuration page contains fields for defining port parameters. To open the Port Configuration page, click Switch → Ports → Port Configuration in the tree view. Figure 7-22. Port Configuration • Port — The port number for which port parameters are defined. •...
  • Page 251 • Re-Activate Suspended Port — Reactivates a port if the port has been suspended through the locked port security option. • Operational Status — The port operational status. Possible field values are: – Suspended — The port is currently active, and is currently not receiving or transmitting traffic. –...
  • Page 252 – MDI (Media Dependent Interface) — Used for end stations. – MDIX (Media Dependent Interface with Crossover) — Used for hubs and switches. • Current MDI/MDIX— The currently configured device MDI/MDIX settings. • LAG — Specifies if the port is part of a LAG. •...
  • Page 253 Configuring Ports with CLI Commands The following table summarizes the equivalent CLI commands for configuring ports as displayed in the Ports Configuration Table page. Table 7-12. Port Configuration CLI Commands CLI Command Description interface ethernet interface Enters the interface configuration mode to configure an ethernet type interface.
  • Page 254 The following is an example of the CLI commands: Console (config)# interface ethernet g5 Console (config-if)# description RD SW#3 Console (config-if)# shutdown Console (config-if)# no shutdown Console (config-if)# speed 100 Console (config-if)# duplex full Console (config-if)# negotiation Console (config-if)# back-pressure Console (config-if)# flowcontrol on Console (config-if)# mdix auto Console (config-if)# exit...
  • Page 255 Console# show interfaces status Port Type Duplex Speed Flow Link Back Mdix Control State Pressure Mode ---- ----- ------ ------ ---- ------ ----- ------ ---- Full Auto Enable Full Down Disable Full 1000 Disable Type Duplex Speed Flow Back Link Control Pressure State...
  • Page 256: Configuring Load Balancing

    Figure 7-24. LAG Configuration The LAG Configuration page contains the following fields: • Load Balance — Indicates the load balancing type enabled on the LAG. The possible field values are: – Layer 2 — Enables load balancing based on static and dynamic MAC addresses. –...
  • Page 257 • LAG Type — The port types that comprise the LAG. • Admin Status — Enables or disables traffic forwarding through the selected LAG. • Current LAG Status — Indicates if the LAG is currently operating. • Re-Activate Suspended LAG — Reactivates a suspended LAG. •...
  • Page 258 Displaying the LAG Configuration Table: 1 Open the LAG Configuration page. 2 Click Show All. The LAG Configuration Table opens: Figure 7-25. LAG Configuration Table Configuring LAGs with CLI Commands The following table summarizes the equivalent CLI commands for configuring LAGs as displayed in the LAG Configuration page.
  • Page 259 (continued) Table 7-13. LAG Configuration CLI Commands CLI Command Description speed bps Configures the speed of a given ethernet interface when not using auto negotiation. Sets the line for automatic baud rate detection. autobaud Enables auto negotiation operation for the negotiation speed and duplex parameters of a given interface.
  • Page 260 The following is an example of the CLI commands: console(config-if)# channel-group 1 mode on console(config-if)# exit console(config)# interface range e g21-24 console(config-if)# channel-group 1 mode on console(config-if)# ex console(config)# interface ethernet g5 console(config-if)# channel-group 2 mode on console(config-if)# exit console(config)# exit console# show interfaces port-channel Channel Ports...
  • Page 261: Enabling Storm Control

    Figure 7-26. Storm Control • Port — The port from which storm control is enabled. • Broadcast Control — Enables or disables forwarding broadcast packet types on the device. • Mode — Specifies the Broadcast mode currently enabled on the device. The possible field value are: –...
  • Page 262 Figure 7-27. Storm Control Table Configuring Storm Control with CLI Commands The following table summarizes the equivalent CLI commands for configuring Storm Control as displayed on the Storm Control page. Table 7-14. Storm Control CLI Commands CLI Command Description port storm-control include-multicast Enables the device to count Multicast packets together with broadcast packets.
  • Page 263 Defining Port Mirroring Sessions Port mirroring monitors and mirrors network traffic by forwarding copies of incoming and outgoing packets from one port to a monitoring port. Port mirroring is configured by selecting a specific port to copy all packets, and different ports from which the packets copied.
  • Page 264: Defining Port Mirroring Sessions

    Figure 7-28. Port Mirroring • Destination Port — The port number to which port traffic is copied. • Source Port — Defines the port number from which port traffic is mirrored. • Type — Indicates if the source port is RX, TX, or both RX and TX. •...
  • Page 265 Deleting a Copy Port from a Port Mirroring Session 1 Open the Port Mirroring page. 2 Select the Remove check box. 3 Click Apply Changes. The selected port mirroring session is deleted, and the device is updated. Configuring a Port Mirroring Session Using CLI Commands The following table summarizes the equivalent CLI commands for configuring a Port Mirroring session as displayed in the Port Mirroring page.
  • Page 266: Configuring Address Tables

    Configuring Address Tables MAC addresses are stored in either the Static Address or the Dynamic Address databases. A packet addressed to a destination stored in one of the databases is forwarded immediately to the port. The Static and Dynamic Address Tables can be sorted by interface, VLAN, and interface type. MAC addresses are dynamically learned as packets from sources arrive at the device.
  • Page 267 • Status — MAC address status. Possible values are: – Secure — Guarantees that a locked port MAC address is not deleted. – Permanent — The MAC address is permanent. – Delete on Reset — The MAC address is deleted when the device is reset. –...
  • Page 268 Configuring Static Address Parameters Using CLI Commands The following table summarizes the equivalent CLI commands for configuring static address parameters as displayed in the Static MAC Address page. Table 7-16. Static Address CLI Commands CLI Command Description bridge address mac-address {ethernet Adds a static MAC-layer station source interface | port-channel port-channel- address to the bridge table.
  • Page 269 Viewing Dynamic Addresses The Dynamic Address Table contains fields for querying information in the dynamic address table, including the interface type, MAC addresses, VLAN, and table sorting. Packets forwarded to an address stored in the address table are forwarded directly to those ports. The Dynamic Address Table also contains information about the aging time before a dynamic MAC address is erased, and includes parameters for querying and viewing the Dynamic Address list.
  • Page 270: Viewing Dynamic Addresses

    • Interface — Specifies the interface for which the table is queried. There are two interface types from which to select. – Port — Specifies the port numbers for which the table is queried. – LAG — Specifies the LAG for which the table is queried. •...
  • Page 271 Querying and Sorting Dynamic Addresses Using CLI Commands The following table summarizes the equivalent CLI commands for querying and sorting dynamic addresses as displayed in the Dynamic Address Table. Table 7-17. Query and Sort CLI Commands CLI Command Description bridge aging-time seconds Sets the address table aging time. Displays classes of dynamically created show bridge address-table entries in the bridge-forwarding database.
  • Page 272: Configuring Garp

    Configuring GARP Generic Attribute Registration Protocol (GARP) is a general-purpose protocol that registers any network connectivity or membership-style information. GARP defines a set of devices interested in a given network attribute, such as VLAN or Multicast address. When configuring GARP, ensure the following: •...
  • Page 273 • GARP Leave All Timer (10 - 2147483640) — Time lapse, in milliseconds, that all devices wait before leaving the GARP state. The leave all time must be greater than the leave time The possible field value is 0-2147483640. The default value is 10000 msec. Defining GARP Timers 1 Open the GARP Timers page.
  • Page 274 The following is an example of the CLI commands: console(config)# interface ethernet g1 console(config-if)# garp timer leave 900 console(config-if)# end console# show gvrp configuration ethernet g1 GVRP Feature is currently Disabled on the device. Maximum VLANs: 223 Port(s) GVRP- Registration Dynamic VLAN Timers (milliseconds)
  • Page 275: Configuring The Spanning Tree Protocol

    Defining STP Global Settings The STP Global Settings page contains parameters for enabling and configuring STP operation on the device. To open the STP Global Settings page, click Switch→ Spanning Tree → Global Settings in the tree view. Figure 7-32. STP Global Settings •...
  • Page 276 • BPDU Handling — Determines how BPDU packets are managed when STP is disabled on the port/ device. BPDUs are used to transmit spanning tree information. The possible field values are: – Filtering — Filters BPDU packets when spanning tree is disabled on an interface. –...
  • Page 277 Defining STP Global Parameters 1 Open the STP Global Settings page. 2 Select the port that needs to be enabled from the Select a Port drop-down menu. 3 Select Enable in the Spanning Tree State field. 4 Select the STP mode in the STP Operation Mode field, and define the bridge settings. 5 Click Apply Changes.
  • Page 278 The following is an example of the CLI commands: console(config)# spanning-tree console(config)# spanning-tree mode rstp console(config)# spanning-tree priority 12288 console(config)# spanning-tree hello-time 5 console(config)# spanning-tree max-age 15 console(config)# spanning-tree forward-time 25 console(config)# exit console# show spanning-tree Spanning tree enabled mode RSTP Default port cost method: short Root ID Priority...
  • Page 279 Defining STP Port Settings The STP Port Settings page contains fields for assigning STP properties to individual ports. To open the STP Port Settings page, click Switch→ Spanning Tree→ Port Settings in the tree view. Figure 7-33. STP Port Settings •...
  • Page 280: Defining Stp Port Settings

    • Port State — The current port STP state. If enabled, the port state determines what forwarding action is taken on traffic. Possible port states are: – Disabled — The port link is currently down. – Blocking — The port is currently blocked and cannot be used to forward traffic or learn MAC addresses.
  • Page 281 • Priority (0-240, in steps of 16) — The priority value of the port. The priority value influences the port choice when a bridge has two ports connected in a loop. The priority value is between 0-240. The priority value is provided in increments of 16. •...
  • Page 282 Defining STP Port Settings Using CLI Commands The following table summarizes the equivalent CLI commands for defining STP port parameters as displayed in the STP Port Settings page. Table 7-20. STP Port Settings CLI Commands CLI Command Description spanning-tree disable Disables spanning tree on a specific port.
  • Page 283 The following is an example of the CLI commands: console(config)# interface ethernet g5 console(config-if)# spanning-tree disable console(config-if)# spanning-tree cost 35000 console(config-if)# spanning-tree port-priority 96 console(config-if)# exit console(config)# exit console# show spanning-tree ethernet g5 Port g5 disabled Role: disabled State: disabled Port cost: 35000 Port id: 96.5...
  • Page 284 Defining STP LAG Settings The STP LAG Settings page contains fields for assigning STP aggregating port parameters. To open the STP LAG Settings page, click Switch→ Spanning Tree→ LAG Settings in the tree view. Figure 7-34. STP LAG Settings • Select a LAG —...
  • Page 285: Defining Stp Lag Settings

    • LAG State — Current STP state of a LAG. If enabled, the LAG state determines what forwarding action is taken on traffic. If the bridge discovers a malfunctioning LAG, the LAG is placed in the Broken state. Possible LAG states are: –...
  • Page 286 Modifying the LAG STP Parameters 1 Open the STP LAG Settings page. 2 Select a LAG from the Select a LAG drop-down menu. 3 Modify the fields as desired. 4 Click Apply Changes. The STP LAG parameters are modified, and the device is updated. Defining STP LAG Settings Using CLI Commands The following table summarizes the equivalent CLI commands for defining STP LAG settings.
  • Page 287: Configuring Rapid Spanning Tree

    RSTP has the following different port states: • Disabled • Learning • Discarding • Forwarding Rapid Spanning Tree is enabled on the STP Global Settings page. To open the Rapid Spanning Tree (RSTP) page, click Switch→ Spanning Tree→ Rapid Spanning Tree in the tree view. Figure 7-35.
  • Page 288 • Mode — Displays the STP mode by which STP is enabled on the device. The possible field values are: – Classic STP — Enables Classic STP on the device. This is the default value. – Rapid STP — Enables Rapid STP on the device. •...
  • Page 289 Defining Rapid STP Parameters Using CLI Commands The following table summarizes the equivalent CLI commands for defining Rapid STP parameters as displayed in the Rapid Spanning Tree (RSTP) page. Table 7-22. RSTP Settings CLI Command CLI Command Description spanning-tree link-type {point-to-point | shared} Overrides the default link-type setting.
  • Page 290: Configuring Multiple Spanning Tree

    Figure 7-36. MSTP Settings • Region Name (1-32 Characters) — Indicates user-defined MSTP region name. • Revision (0-65535) — Defines unsigned 16-bit number that identifies the current MST configuration revision. The revision number is required as part of the MST configuration. The possible field range is 0- 65535.
  • Page 291 • Instance ID — Defines the MSTP instance. The field range is 0-15. • Included VLANs — Maps the selected VLANs to the selected instance. Each VLAN belongs to one instance. • Bridge Priority (0-61440, in steps of 4096) — Specifies the selected spanning tree instance device priority.
  • Page 292 Defining MST Instances Using CLI Commands The following table summarizes the equivalent CLI commands for defining MST instance groups as displayed in the MSTP Settings page. Table 7-23. MSTP Instances CLI Commands CLI Command Description Enters MST Configuration mode. spanning-tree mst configuration Maps VLANs to the MST instance.
  • Page 293 Defining MSTP Interface Settings The MSTP Interface Settings page contains parameters assigning MSTP settings to specific interfaces. To open the MSTP Interface Settings page, click Switch → Spanning Tree → MSTP Interface Settings in the tree view. Figure 7-38. MSTP Interface Settings •...
  • Page 294: Defining Mstp Interface Settings

    – Alternate — Provides an alternate path to the root device from the root interface. – Backup — Provides a backup path to the designated port path toward the Spanning Tree leaves. Backup ports occur only when two ports are connected in a loop by a point-to-point link. Backup ports also occur when a LAN has two or more connections connected to a shared segment.
  • Page 295: Configuring Vlans

    Figure 7-39. MSTP Interface Table Configuring VLANs VLANs are logical subgroups of a Local Area Network (LAN) created via software rather than defining a hardware solution. VLANs combine user stations and network devices into a single domain regardless of the physical LAN segment to which they are attached.
  • Page 296 Defining VLAN Members The VLAN Membership page contains fields for defining VLAN groups. The device supports the mapping of 4094 VLAN IDs to 256 VLANs. All ports must have a defined PVID. If no other value is configured the default VLAN PVID is used. VLAN number 1 is the default VLAN, and cannot be deleted from the system. →...
  • Page 297 Adding New VLANs 1 Open the VLAN Membership page. 2 Click Add. The Create New VLAN page opens. Figure 7-41. Create New VLAN 3 Enter the VLAN ID and name. 4 Click Apply Changes. The new VLAN is added, and the device is updated. Modifying VLAN Membership Groups 1 Open the VLAN Membership page.
  • Page 298 Defining VLAN Membership Groups Using CLI Commands The following table summarizes the equivalent CLI commands for defining VLAN membership groups as displayed in the VLAN Membership page. Table 7-24. VLAN Membership Group CLI Commands CLI Command Description Enters the interface configuration (VLAN) mode. vlan database vlan {vlan-range} Creates a VLAN.
  • Page 299 Assigning Ports to a VLAN Group 1 Open the VLAN Membership page. 2 Click the VLAN ID or VLAN Name option button and select a VLAN from the drop-down menu. 3 Select a port in the Port Membership Table, and assign the port a value. 4 Click Apply Changes.
  • Page 300 The following is an example of the CLI commands: Console (config)# vlan database Console (config-vlan)# vlan 23-25 Console (config-vlan)# exit Console (config)# interface vlan 23 Console (config-if)# name Marketing Console (config-if)# exit Console (config)# interface ethernet g8 Console (config-if)# switchport mode access Console (config-if)# switchport access vlan 23 Console (config-if)# exit Console (config)# interface ethernet g9...
  • Page 301 The following table summarizes the equivalent CLI commands for configuring QinQ. Table 7-27. QinQ CLI Commands CLI Command Console>enable Console#config Console (config)# Console (config)# vlan database Console (config-vlan)# vlan 100 Console (config-vlan)# exit Console (config)# interface ethernet e5 Console (config-if)# switchport mode customer Console (config-if)# switchport customer vlan 100 Console (config-if)# exit Console (config)# interface ethernet e10...
  • Page 302 Vlan Name Egress Port rule Membership Type ---- ----------------- -------- -------------- ------ ------ Untagged Static Forbidden VLANS: Vlan Name ---- ----------------------- Classification rules: Protocol based VLANs: Group ID Vlan ID -------- ------------------ Mac based VLANs: Group ID Vlan ID -------- ------------------ Subnet based VLANs: Group ID...
  • Page 303 Defining VLAN Ports Settings The VLAN Port Settings page contains fields for managing ports that are part of a VLAN. The port default VLAN ID (PVID) is configured on the VLAN Port Settings page. All untagged packets arriving to the device are tagged by the ports PVID.
  • Page 304: Defining Vlan Ports Settings

    • Frame Type — Packet type accepted on the port. Possible values are: – Admit Tag Only — Only tagged packets are accepted on the port. – Admit All — Both tagged and untagged packets are accepted on the port. •...
  • Page 305 Assigning Ports to VLAN Groups Using CLI Commands The following table summarizes the equivalent CLI commands for assigning ports to VLAN groups. Table 7-28. VLAN Port CLI Commands CLI Command Description switchport mode {customer Configures a port VLAN membership mode. |access | trunk | general} switchport trunk native vlan Defines the port as a member of the specified...
  • Page 306 Defining VLAN LAG Settings The VLAN LAG Setting page provides parameters for managing LAGs that are part of a VLAN. VLANs can either be composed of individual ports or of LAGs. Untagged packets entering the device are tagged with the LAGs ID specified by the PVID. To open the VLAN LAG Setting page, click Switch→ VLAN→ LAG Settings in the tree view.
  • Page 307: Defining Vlan Lag Settings

    • Ingress Filtering — Enables or disables Ingress filtering by the LAG. Ingress filtering discards packets that are destined to VLANs of which the specific port is not a member. • Current Reserve VLAN — The VLAN currently designated as the reserved VLAN. •...
  • Page 308 The following is an example of the CLI commands: console(config)# interface port-channel 1 console(config-if)# switchport mode access console(config-if)# switchport access vlan 2 console(config-if)# exit console(config)# interface port-channel 2 console(config-if)# switchport mode general console(config-if)# switchport general allowed vlan add 2-3 tagged console(config-if)# switchport general pvid 2 console(config-if)# switchport general acceptable-frame-type tagged-only...
  • Page 309 Defining VLAN Protocol Groups • The Protocol Group page provides parameters for configuring frame types to specific protocol groups. To open the Protocol Group page, click Switch→ VLAN→ Protocol Group in the tree view. Figure 7-45. Protocol Group • Frame Type — The packet type. Possible field values are Ethernet, RFC1042, and LLC Other. •...
  • Page 310: Defining Vlan Protocol Groups

    Assigning VLAN Protocol Group Settings 1 Open the Protocol Group page. 2 Complete the fields on the page. 3 Click Apply Changes. The VLAN protocol group parameters are defined, and the device is updated. Removing Protocols From the Protocol Group Table 1 Open the Protocol Group page.
  • Page 311 Adding Protocol Ports The Protocol Port page adds interfaces to Protocol groups. To open the Protocol Port page, click Switch→ VLAN→ Protocol Port in the tree view. Figure 7-46. Protocol Port • Interface — Port or LAG number added to a protocol group. •...
  • Page 312: Adding Protocol Ports

    Defining Protocol Ports Using CLI Commands The following table summarizes the equivalent CLI command for defining Protocol Ports. Table 7-31. Protocol Port CLI Commands CLI Command Description switchport general map Sets a protocol-based classification rule. protocols-group group vlan vlan-id The following example sets a protocol-based classification rule of protocol group 1 to VLAN 8: Console (config-if)# switchport general map protocols-group 1 vlan 8 Configuring GVRP...
  • Page 313 Figure 7-47. GVRP Parameters • GVRP Global Status — Enables or disables GVRP on the device. GVRP is disabled by default. • Interface — The port or LAG for which GVRP is enabled. • GVRP State — Enables or disables GVRP on an interface. •...
  • Page 314 Configuring GVRP Using CLI Commands The following table summarizes the equivalent CLI commands for configuring GVRP as displayed in the GVRP Global Parameters page. Table 7-32. GVRP Global Parameters CLI Commands CLI Command Description gvrp enable (global) Enables GVRP globally. gvrp enable (interface) Enables GVRP on an interface.
  • Page 315 The following is an example of the CLI commands: console(config)# gvrp enable console(config)# interface ethernet g1 console(config-if)# gvrp enable console(config-if)# gvrp vlan-creation-forbid console(config-if)# gvrp registration-forbid console(config-if)# end console# show gvrp configuration GVRP Feature is currently Enabled on the device. Maximum VLANs: 223 Port(s) GVRP- Registration...
  • Page 316: Configuring Voice Vlans

    There are two operational modes for IP Phones: • IP phones are configured with VLAN-mode as enabled, ensuring that tagged packets are used for all communications. • If the IP phone’s VLAN-mode is disabled, the phone uses untagged packets. The phone uses untagged packets while retrieving the initial IP address through DHCP.
  • Page 317 • Class of Service — Enables adding a CoS tag to untagged packets received on the voice VLAN. The possible field values are 0-7, where zero is the lowest priority, and seven is the highest priority. • Remark CoS — Reassigns the CoS tag value to packets received on the voice VLAN. The possible field values are 0-7, where zero is the lowest priority, and seven is the highest priority.
  • Page 318 The following is an example of some of the CLI commands: Switch# show voice vlan Aging timeout: 1440 minutes OUI table MAC Address - Prefix Description 00:E0:BB 3COM 00:03:6B Cisco 00:E0:75 Veritel 00:D0:1E Pingtel 00:01:E3 Siemens 00:60:B9 NEC/Philips 00:0F:E2 Huawei-3COM Voice VLAN VLAN ID: 8 CoS: 6 Remark: Yes...
  • Page 319: Defining Voice Vlan Port Settings

    Figure 7-49. Voice VLAN Port Setting • Interface — Indicates the specific port or and LAG to which the Voice VLAN settings are applied. • Voice VLAN Mode — Defines the Voice VLAN mode. The possible field values are: – None —...
  • Page 320: Defining Ouis

    Displaying the Port Setting Table 1 Open the Voice VLAN Port Settings page. 2 Click Show All. The Port Setting Table opens. Figure 7-50. Voice VLAN Port Setting Table The Voice VLAN Port Setting Table includes the Membership field which indicates if the Voice VLAN member is a static or dynamic member.
  • Page 321 • Telephony OUI(s) — Lists the OUIs currently enabled on the Voice VLAN. The following OUIs are enabled by default: – 00:E0:BB — 3COM – 00:03:6B — Cisco – 00:E0:75 — Polycom/Veritel – 00:D0:1E — Pingtel – 00:01:E3 — Simense –...
  • Page 322 Adding OUIs 1 Open the Voice VLAN OUI page. 2 Click Add. The Add OUI page opens. Figure 7-52. Voice VLAN Add OUI Page 3 Fill in the fields. 4 Click Apply Changes. The OUIs is added. Removing OUIs 1 Open the Voice VLAN OUI page. 2 Check the Remove checkbox next to teach OUI to be removed.
  • Page 323: Aggregating Ports

    Aggregating Ports Port Aggregation optimizes port usage by linking a group of ports together to form a single Link Aggregated Group (LAG). Port Aggregation multiplies the bandwidth between the devices, increases port flexibility, and provides link redundancy. The device supports up to eight LAGs per system, and eight ports per LAG per device.
  • Page 324 Defining LACP Parameters The LACP Parameters page contains fields for configuring LACP LAGs. Aggregate ports can be linked into link-aggregation port-groups. Each group is comprised of ports with the same speed. Aggregated Links can be manually setup or automatically established by enabling Link Aggregation Control Protocol (LACP) on the relevant links.
  • Page 325 Defining Link Aggregation Port Parameters 1 Open the LACP Parameters page. 2 Complete the fields in the Port Parameters area. 3 Click Apply Changes. The parameters are defined, and the device is updated. Displaying the LACP Parameters Table 1 Open the LACP Parameters page. 2 Click Show All.
  • Page 326 Defining LAG Membership The LAG Membership page contains fields for assigning ports to LAGs. LAGs can include up to 8 ports.When a port is added to a LAG, the port acquires the LAG’s properties. If the port cannot be configured with the LAG properties, a trap is generated and the port operates with its default settings. The LAG Membership page contains fields for assigning ports to LAGs.
  • Page 327: Defining Lag Membership

    Assigning Ports to LAGs Using CLI Commands The following table summarizes the equivalent CLI commands for assigning ports to LAGs as displayed in the LAG Membership page. Table 7-37. LAG Membership CLI Commands CLI Command Description interface port-channel port- Enters the interface configuration mode of a channel-number specific port-channel.
  • Page 328: Multicast Forwarding Support

    Defining Multicast Global Parameters Layer 2 switching forwards Multicast packets to all relevant VLAN ports by default, treating the packet as a Multicast transmission. While this is functional, in the sense that all relevant ports/nodes receive a copy of the frame, it is potentially wasteful as ports/nodes may receive irrelevant frames only needed by a subset of the ports of that VLAN.
  • Page 329 Enabling IGMP Snooping on the Device 1 Open the Multicast Global Parameters page. 2 Select Enable in the IGMP Snooping Status field. 3 Click Apply Changes. IGMP Snooping is enabled on the device. Enabling Multicast Forwarding and IGMP Snooping Using CLI Commands The following table summarizes the equivalent CLI commands for enabling Multicast forwarding and IGMP Snooping as displayed on the Multicast Global Parameters page.
  • Page 330 Adding Bridge Multicast Address Members The Bridge Multicast Group page displays the ports and LAGs attached to the Multicast service group in the Ports and LAGs tables. The Port and LAG tables also reflect the manner in which the port or LAGs joined the Multicast group.
  • Page 331: Adding Bridge Multicast Address Members

    The following table contains the IGMP port and LAG members management settings: Adding Bridge Multicast Addresses The port/LAG has joined the Multicast group dynamically in the Current Row. Attaches the port to the Multicast group as static member in the Static Row. The port/LAG has joined the Multicast group statically in the Current Row.
  • Page 332 Defining Ports to Receive Multicast Service 1 Open the Bridge Multicast Group page. 2 Define the VLAN ID and the Bridge Multicast Address fields. 3 Toggle a port to S to join the port to the selected Multicast group. 4 Toggle a port to F to forbid adding specific Multicast addresses to a specific port. 5 Click Apply Changes.
  • Page 333 The following is an example of the CLI commands: Console> enable Console# config console(config)#vlan database console(config-if)#vlan 8 console(config-if)#exit console(config)#interface range ethernet g1-9 console(config-if)# switchport mode general console(config-if)# switchport general allow vlan add 8 console(config)#interface vlan 8 console (config-if)# exit Console(config-if)# bridge multicast address 0100.5e02.0203 add ethernet g1,g2 Console(config-if)# exit Console(config)# exit...
  • Page 334 Console # show bridge multicast address-table format ip Vlan IP Address Type Ports ---- ----------- ----- ---------- 224-239.130|2.2.3 static g1, g2 224-239.130|2.2.8 static g1-8 224-239.130|2.2.8 dynamic g9-11 Forbidden ports for multicast addresses: Vlan IP Address Ports ---- ----------- ---------- 224-239.130|2.2.3 224-239.130|2.2.8 Assigning Multicast Forward All Parameters The Bridge Multicast Forward All page contains fields for attaching ports or LAGs to a device that is...
  • Page 335: Assigning Multicast Forward All Parameters

    Figure 7-58. Bridge Multicast Forward All • VLAN ID — Identifies a VLAN. • Ports — Ports that can be added to a Multicast service. • LAGs — LAGs that can be added to a Multicast service. The Bridge Multicast Forward All Router/Port Control Settings Table contains the settings for managing router and port settings.
  • Page 336 Attaching a Port to a Multicast Router or Switch 1 Open Bridge Multicast Forward All page. 2 Define the VLAN ID field. 3 Select a port in the Ports table, and assign the port a value. 4 Click Apply Changes. The port is attached to the Multicast router or switch.
  • Page 337 The following is an example of the CLI commands: console(config)#vlan database console(config-if)#vlan 8 console(config-vlan)#exit console(config)#interface range ethernet g1-9 console(config-if)# switchport mode general console(config-if)# switchport general allow vlan add 8 Console(config-if)# exit console(config)#interface vlan 8 Console(config-if)# bridge multicast address 0100.5e02.0203 add ethernet g1-9 Console(config-if)# exit Console (config)# interface VLAN 1 Console (config-if)# bridge multicast forward-all add ethernet...
  • Page 338 IGMP Snooping The IGMP Snooping page contains fields for adding IGMP members. To open the IGMP Snooping page, click Switch→ Multicast Support→ IGMP Snooping in the tree view. Figure 7-59. IGMP Snooping • VLAN ID — Specifies the VLAN ID. •...
  • Page 339: Igmp Snooping

    Enabling IGMP Snooping on the Device 1 Open the IGMP Snooping page. 2 Select the VLAN ID for the device on which IGMP snooping needs to be enabled. 3 Select Enable in the IGMP Snooping Status field. 4 Complete the fields on the page. 5 Click Apply Changes.
  • Page 340 (continued) Table 7-42. IGMP Snooping CLI Commands CLI Command Description ip igmp snooping querier enable Enables Internet Group Management Protocol (IGMP) querier on a specific VLAN. Use the no form of this command to disable. no ip igmp snooping querier enable ip igmp snooping querier address Defines the source IP address that the IGMP Snooping querier ip-address...
  • Page 341 The following is an example of the CLI commands: Console> enable Console# config Console (config)# ip igmp snooping Console (config)# interface vlan 1 Console (config-if)# ip igmp snooping mrouter learn-pim-dvmrp Console (config-if)# ip igmp snooping host-time-out 300 Console (config-if)# ip igmp snooping mrouter-time-out 200 Console (config-if)# exit Console (config)# interface vlan 1 Console (config-if)# ip igmp snooping leave-time-out 60...
  • Page 342 IGMP Snooping admin: Enabled Hosts and routers IGMP version: 2 IGMP snooping oper mode: Enabled IGMP snooping querier admin: Enabled IGMP snooping querier oper: Enabled IGMP snooping querier address admin: IGMP snooping querier address oper: 172.16.1.1 IGMP snooping querier version admin: 3 IGMP snooping querier version oper: 2 IGMP host timeout is 300 sec IGMP Immediate leave is disabled.
  • Page 343 Configuring Device Information...
  • Page 344 Configuring Device Information...
  • Page 345: Viewing Statistics

    Viewing Statistics The Statistic pages contains links to device information for interface, GVRP, etherlike, RMON, and device utilization. CLI commands are not available for all the Statistics pages. Viewing Tables The Table Views page contains links for displaying statistics in a chart form. To open the page, click Statistics→...
  • Page 346: Viewing Counter Summary

    • % Interface Utilization — Network interface utilization percentage based on the duplex mode of the interface. The range of this reading is from 0 to 200%. The maximum reading of 200% for a full duplex connection indicates that 100% of bandwidth of incoming and outgoing connections is used by the traffic travelling through the interface.
  • Page 347: Viewing Interface Statistics

    • Transmit Unicast Packets — Number of transmitted Unicast packets from the interface. • Transmit Non Unicast Packets — Number of transmitted non-Unicast packets from the interface. • Received Errors — The number of error packets received on the interface. •...
  • Page 348 Receive Statistics • Total Bytes (Octets) — Number of octets received on the selected interface. • Unicast Packets — Number of Unicast packets received on the selected interface. • Multicast Packets — Number of Multicast packets received on the selected interface. •...
  • Page 349: Viewing Etherlike Statistics

    The following is an example of the CLI commands. Console> enable Console# show interfaces counters Port InOctets InUcastPkts InMcastPkts InBcastPkts ------- ------------- ---------------- ---------------- ------------ 183892 1289 123899 1788 Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts ------- ------------- ---------------- ---------------- ------------ 9188 8789 InOctets InUcastPkts...
  • Page 350 Figure 8-4. Etherlike Statistics • Interface — Specifies whether statistics are displayed for a port or LAG. • Refresh Rate — Amount of time that passes before the interface statistics are refreshed. • Frame Check Sequence (FCS) Errors — Number of FCS errors received on the selected interface. •...
  • Page 351 Displaying Etherlike Statistics for an Interface 1 Open the Etherlike Statistics page. 2 Select an interface in the Interface field. The interface’s Etherlike statistics are displayed. Resetting Etherlike Statistics 1 Open the Etherlike Statistics page. 2 Click Reset All Counters. The Ethernetlike statistics are reset.
  • Page 352 The following is an example of the CLI commands. Console> enable Console# show interfaces counters ethernet g1 Port InOctets InUcastPkts InMcastPkts InBcastPkts ------- ------------- ---------------- ---------------- ------------ 183892 1289 Port OutOctets OutUcastPkts OutMcastPkts OutBcastPkts ------- ------------- ---------------- ---------------- ------------ 9188 FCS Errors: 8 Single Collision Frames: 0 Multiple Collision Frames: 0...
  • Page 353: Viewing Gvrp Statistics

    Viewing GVRP Statistics The GVRP Statistics page contains device statistics for GVRP. To open the page, click Statistics/RMON→ Table Views→ GVRP Statistics in the tree view. Figure 8-5. GVRP Statistics • Interface — Specifies whether statistics are displayed for a port or LAG. •...
  • Page 354 • Invalid Protocol ID — Device GVRP Invalid Protocol ID statistics. • Invalid Attribute Type — Device GVRP Invalid Attribute ID statistics. • Invalid Attribute Value — Device GVRP Invalid Attribute Value statistics. • Invalid Attribute Length — Device GVRP Invalid Attribute Length statistics. •...
  • Page 355 The following is an example of the CLI commands: Console# show gvrp statistics GVRP statistics: ---------------- : Join Empty Received rJIn : Join In Received rEmp : Empty Received rLIn : Leave In Received : Leave Empty Received : Leave All Received : Join Empty Sent sJIn : Join In Sent sEmp : Empty Sent...
  • Page 356: Viewing Eap Statistics

    Console# show gvrp error-statistics GVRP error statistics: ---------------------- Legend: INVPROT : Invalid Protocol Id INVPLEN : Invalid PDU Length INVATYP : Invalid Attribute Type INVALEN : Invalid Attribute Length INVAVAL : Invalid Attribute Value INVEVENT : Invalid Event Port INVPROT INVATYP INVAVAL INVALEN...
  • Page 357 Figure 8-6. EAP Statistics • Port — The port which is polled for statistics. • Refresh Rate — Amount of time that passes before the interface statistics are refreshed. • Frames Receive — The number of valid EAPOL frames received on the port. •...
  • Page 358 • Last Frame Version — The protocol version number attached to the most recently received EAPOL frame. • Last Frame Source — The source MAC address attached to the most recently received EAPOL frame. Displaying EAP statistics for a Port 1 Open the EAP Statistics page.
  • Page 359 The following is an example of the CLI commands: Switch# show dot1x statistics ethernet g1 EapolFramesRx: 11 EapolFramesTx: 12 EapolStartFramesRx: 1 EapolLogoffFramesRx: 1 EapolRespIdFramesRx: 3 EapolRespFramesRx: 6 EapolReqIdFramesTx: 3 EapolReqFramesTx: 6 InvalidEapolFramesRx: 0 EapLengthErrorFramesRx: 0 LastEapolFrameVersion: 1 LastEapolFrameSource: 0008.3b79.8787 Viewing Statistics...
  • Page 360: Viewing Rmon Statistics

    Viewing RMON Statistics Remote Monitoring (RMON) contains links for viewing network information from a remote location. To open the RMON page, click Statistics/RMON→ RMON in the tree view. Viewing RMON Statistics Group The RMON Statistics Group page contains fields for viewing information about device utilization and errors that occurred on the device.
  • Page 361 • Interface — Specifies the port or LAG for which statistics are displayed. • Refresh Rate — Amount of time that passes before the statistics are refreshed. • Drop Events — Number of dropped events that have occurred on the interface since the device was last refreshed.
  • Page 362: Viewing Rmon History Control Statistics

    Viewing RMON Statistics Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing RMON statistics. Table 8-5. RMON Statistics CLI Commands CLI Command Description show rmon statistics ethernet Displays RMON Ethernet statistics. interface port-channel port- channel-number The following is an example of the CLI commands: console>...
  • Page 363 Figure 8-8. RMON History Control • History Entry No. — Entry number for the History Control Table page. • Source Interface — Port or LAG from which the history samples were taken. • Owner (0-20 characters) — RMON station or user that requested the RMON information. •...
  • Page 364: Viewing The Rmon History Table

    Modifying a History Control Table Entry 1 Open the RMON History Control page. 2 Select an entry in the History Entry No. field. 3 Modify the fields as required. 4 Click Apply Changes. The table entry is modified, and the device is updated. Deleting a History Control Table Entry 1 Open the RMON History Control page.
  • Page 365 Figure 8-9. RMON History Table • Sample No. — The specific sample the information in the table reflects. • Drop Events — The number of dropped packets due to lack of network resources during the sampling interval. This may not represent the exact number of dropped packets, but rather the number of times dropped packets were detected.
  • Page 366: Defining Device Rmon Events

    Viewing Statistics for a Specific History Entry 1 Open the RMON History Table. 2 Select an entry in the History Table No. field. The entry statistics display in the RMON History Table. Viewing RMON History Control Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing RMON history.
  • Page 367 Figure 8-10. RMON Events Control • Event Entry — The event. • Community — Community to which the event belongs. • Description — User-defined event description. • Type — Describes the event type. Possible values are: – Log — Event type is a log entry. –...
  • Page 368 Adding an RMON Event 1 Open the RMON Events Control page. 2 Click Add. The Add an Event Entry page opens. 3 Complete the information in the dialog and click Apply Changes. The Event Table entry is added, and the device is updated. Modifying an RMON Event 1 Open the RMON Events Control page 2 Select an entry in the Event Table.
  • Page 369: Viewing The Rmon Events Log

    The following is an example of the CLI commands: console> enable console# config console (config)# rmon event 1 log console (config)# exit Console# show rmon events Index Description Type Community Owner Last time sent ----- ----------- -------- --------- ------- -------------------- Errors Jan 18 2002 23:58:17 High...
  • Page 370 Defining Device Events Using the CLI Commands The following table summarizes the equivalent CLI commands for defining device events. Table 8-9. Device Event Definition CLI Commands CLI Command Description show rmon log event Displays the RMON logging table. The following is an example of the CLI commands: console>...
  • Page 371: Defining Rmon Device Alarms

    Defining RMON Device Alarms The RMON Alarms page contains fields for setting network alarms. Network alarms occur when a network problem, or event, is detected. Rising and falling thresholds generate events. To open the RMON Alarms page, click Statistics/RMON→ RMON→ Alarms in the tree view. Figure 8-12.
  • Page 372 • Rising Threshold — The rising counter value that triggers the rising threshold alarm. The rising threshold is presented on top of the graph bars. Each monitored variable is designated a color. • Rising /Falling Event — The mechanism in which the alarms are reported — LOG, TRAP, or a combination of both.
  • Page 373 Modifying an Alarm Table Entry 1 Open the RMON Alarms page. 2 Select an entry in the Alarm Entry drop-down menu. 3 Modify the fields in the dialog as required. 4 Click Apply Changes. The entry is modified, and the device is updated. Displaying the Alarm Table 1 Open the RMON Alarms page.
  • Page 374: Viewing Charts

    The following is an example of the CLI commands: console> enable console# config Console (config)# rmon alarm 1000 dell 360000 1000000 1000000 10 20 Console# show rmon alarm-table Index Owner ------ ------------------- -------------- 1.3.6.1.2.1.2.2.1.1 1.3.6.1.2.1.2.2.1.1 Manager 1.3.6.1.2.1.2.2.1.1 Viewing Charts The Chart page contains links for displaying statistics in a chart form. To open the page, click Statistics→...
  • Page 375 Figure 8-14. Port Statistics • Interface Statistics — Selects the type of interface statistics to open. • Etherlike Statistics — Selects the type of Etherlike statistics to open. • RMON Statistics — Selects the type of RMON statistics to open. •...
  • Page 376: Viewing Lag Statistics

    Table 8-11. Port Statistic CLI Commands CLI Command Description show gvrp statistics ethernet interface Displays GVRP statistics. port-channel port-channel-number show gvrp error-statistics ethernet Displays GVRP error statistics. interface port-channel port-channel- number Console# show interfaces description ethernet g1 Port Description ---- ------------------ Management_port R&D_port...
  • Page 377 Figure 8-15. LAG Statistics • Interface Statistics — Selects the type of interface statistics to open. • Etherlike Statistics — Selects the type of Etherlike statistics to open. • RMON Statistics — Selects the type of RMON statistics to open. •...
  • Page 378 Viewing LAG Statistics Using the CLI Commands The following table summarizes the equivalent CLI commands for viewing LAG statistics. Table 8-12. LAG Statistic CLI Commands CLI Command Description show interfaces counters ethernet interface port- Displays traffic seen by the physical interface. channel port-channel-number show rmon statistics ethernet interface...
  • Page 379: Viewing The Cpu Utilization

    Viewing the CPU Utilization The CPU Utilization page contains information about the system’s CPU utilization and percentage of CPU resources consumed by each stacking member. Each stacking member is assigned a color on the graph. To open the CPU Utilization page, click Statistics/RMON→ Charts→ CPU Utilization in the tree view. Figure 8-16.
  • Page 380: Viewing Cpu Utilization Using Cli Commands

    • Refresh Rate — Amount of time that passes before the statistics are refreshed. Viewing CPU Utilization Using CLI Commands The following table summarizes the equivalent CLI commands for viewing CPU utilization. Figure 8-17. CPU Utilization CLI Commands CLI Command Description To display the CPU utilization.
  • Page 381 Viewing Statistics...
  • Page 382 Viewing Statistics...
  • Page 383: Configuring Quality Of Service

    Configuring Quality of Service This section provides information for defining and configuring Quality of Service (QoS) parameters. To open the Click Quality of Service in the tree view. Quality of Service (QoS) provides the ability to implement QoS and priority queuing within a network. QoS improves network traffic flow based on policies, frame counters and context.
  • Page 384 Packets arriving untagged are assigned a default VPT that is set on a per port basis. The assigned VPT is used to map the packet to the output queue and as the egress VPT. DSCP values can be mapped to priority queues. The following table contains the default DSCP mapping to forwarding queue values: Table 9-2.
  • Page 385: Defining Cos Global Parameters

    The scheduling scheme is enabled system-wide. Queues assigned to the strict priority policy are automatically assigned to the highest priority queue By default all values are set as Strict Priority. When changing to WRR mode the default weight value is one. Queue weight values can be assigned in any order using WRR. WRR val- ues can be assigned system-wide.
  • Page 386: Defining Qos Interface Settings

    Enabling Trust: 1 Open the CoS Settings page. 2 Select Trust in the Trust Mode field. 3 Click Apply Changes. Trust is enabled on the device. Enabling Trust Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the CoS Settings page.
  • Page 387 Figure 9-2. Interface Settings • Interface — The specific port or LAG to configure: • Disable "Trust" Mode on Interface — Disables Trust Mode on the specified interface. This setting overrides the Trust Mode configured on the device globally. • Set Default CoS For Incoming Traffic To —...
  • Page 388: Defining Bandwidth Settings

    The QoS Interface Settings Table page opens: Figure 9-3. QoS Interface Settings Table Assigning CoS Interfaces Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the Interface Settings page. Table 9-4. CoS Interface CLI Commands CLI Command Description qos trust...
  • Page 389 Figure 9-4. Bandwidth Settings • Interface — Indicates the port or LAG that is being displayed. • Egress Shaping Rate on Selected Port — Indicates the Egress traffic limit status for the interface. – Checked — The Egress traffic limit is enabled. –...
  • Page 390 Displaying the Bandwidth Settings Table: 1 Open the Bandwidth Settings page. 2 Click Show All. The Bandwidth Settings Table opens. Figure 9-5. Bandwidth Settings Table Assigning Bandwidth Settings Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the Bandwidth Settings page.
  • Page 391: Defining Queue Settings

    Defining Queue Settings The QoS Queue Settings page contains fields for configuring the scheduling method by which the queues are maintained. To open the QoS Queue Settings page click Quality of Service→ CoS Global Parameters→ Queue Settings in the tree view. Figure 9-6.
  • Page 392 Assigning Queue Setting Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the QoS Queue Settings page. Table 9-6. Queue Settings CLI Commands CLI Command Description wrr-queue bandwidth weight1 Assigns Weighted Round Robin weight2 .
  • Page 393 Console (config)# wrr-queue bandwidth 10 20 30 40 Console (config)# exit Console # exit Console> show qos interface ethernet g1 queueing Ethernet g1 wrr bandwidth weights and EF priority: weights Priority ----- -------- ----- ---------- Disable Disable Disable Disable Cos queue map: Cos qid Configuring Quality of Service...
  • Page 394: Mapping Cos Values To Queues

    Mapping CoS Values to Queues The CoS to Queue Mapping Table page contains fields for classifying CoS settings to traffic queues. To open the CoS to Queue Mapping Table page, click Quality of Service→ CoS Global Parameters→ CoS to Queue in the tree view. Figure 9-7.
  • Page 395: Mapping Dscp Values To Queues

    Assigning CoS Values to Queues Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the CoS to Queue Mapping Table page. Table 9-7. CoS to Queue Settings CLI Commands CLI Command Description wrr-queue cos-map queue-id Maps assigned CoS values to the egress cos1..cos8 queues.
  • Page 396 Figure 9-8. DSCP to Queue • DSCP In — The values of the DSCP field within the incoming packet. • Queue — The queue to which packets with the specific DSCP value is assigned. The values are 1-8, where one is the lowest value and eight is the highest. Mapping a DSCP value and assigning priority queue: 1 Open the DSCP to Queue page.
  • Page 397 Restoring default values: 1 Open the DSCP to Queue page. 2 Check the Restore Defaults checkbox. 3 Click Apply Changes. The default values are restored. Assigning DSCP Values Using the CLI Commands The following table summarizes the equivalent CLI commands for configuring fields in the DSCP to Queue page.
  • Page 398 Configuring Quality of Service...
  • Page 399: Device Specifications

    Device Specifications This appendix includes the information needed for running the device. Port and Cable Specifications This section describes the port specifications. Port Specifications The following table describes the device port types, as well as, a description of the port types. Table 10-1.
  • Page 400: Operating Conditions

    Operating Conditions This section details operating conditions including operating temperatures and humidity. Table 10-2. Operating Conditions Feature Specification Operating Temperature 0 to 45 C / 32 to 113 F Operating Humidity 10% - 90% (non-condensing) Physical Device Specifications This section details operating conditions including operating temperatures and humidity. Table 10-3.
  • Page 401: Feature Specifications

    Feature Specifications VLAN • VLAN support for Tagging and Port Based as per IEEE 802.1Q • Up to 4094 VLANs Supported • Reserved VLANs for internal system use • Dynamic VLANs with GVRP support • Protocol based VLANs Quality of Service •...
  • Page 402: Additional Switching Features

    Additional Switching Features • Link Aggregation with support for up to 8 Aggregated Links per device and up to 8 Ports per aggregated link (IEEE 802.3ad) • LACP Support • Supports Jumbo Frames up to 10K • Broadcast Storm Control •...
  • Page 403: Glossary

    Glossary This glossary contains key technical words of interest. ASIC Access Mode Application Specific Integrated Circuit. A custom chip designed for a specific application. Specifies the method by which user access is granted to the system. Asset Tag Access Profiles Specifies the user-defined device reference.
  • Page 404 Contains a backup copy of the device configuration. BPDU The Backup file changes when the Running Bridge Protocol Data Unit. Provide bridging Configuration file or the Startup file is copied to the information in a message format. BPDUs are sent Backup file.
  • Page 405 Class of Service DiffServe Code Point (DSCP). DSCP provides a method of tagging IP packets with QoS priority Class of Service (CoS). Class of Service is the 802.1p information. priority scheme. CoS provides a method for tagging packets with priority information. A CoS value Domain between 0-7 is added to the Layer II header of A group of computers and devices on a network that...
  • Page 406 GARP Embedded Web Server. Provides device management via a standard web browser. Embedded Web Servers General Attributes Registration Protocol. Registers are used in addition to or in place of a CLI or NMS. client stations into a Multicast domain. Gigabit Ethernet Gigabit Ethernet transmits at 1000 Mbps, and is compatible with existing 10/100 Mbps Ethernet Fast Forward Table.
  • Page 407 ICMP IP Address Internet Control Message Protocol. Allows gateway Internet Protocol Address. A unique address assigned or destination host to communicate with a source host, to a network device with two or more interconnected for example, to report a processing error. LANs or WANs.
  • Page 408 Layer 2 MAC Address Learning Data Link Layer or MAC Layer. Contains the physical MAC Address Learning characterizes a learning address of a client or server station. Layer 2 bridge, in which the packet’s source MAC address is processing is faster than Layer 3 processing because recorded.
  • Page 409 Management Information Base. MIBs contain Protocol Data Unit. A data unit specified in a layer information describing specific aspects of network protocol consisting of protocol control information components. and layer user data. Multicast PING Transmits copies of a single packet to multiple ports. Packet Internet Groper.
  • Page 410 Running Configuration File Contains all Startup file commands, as well as all commands entered during the current session. After Quality of Service. QoS allows network managers to the device is powered down or rebooted, all decide how and what network traffic is forwarded commands stored in the Running Configuration file according to priorities, application types, and source are lost.
  • Page 411 Spanning Tree Protocol TCP/IP Prevents loops in network traffic. The Spanning Tree Protocol (STP) provides tree topography for any Transmissions Control Protocol. Enables two hosts to arrangement of bridges. STP provides one path communicate and exchange data streams. TCP between end stations on a network, eliminating loops. guarantees packet delivery, and guarantees packets are transmitted and received in the order their sent.
  • Page 412 VLAN Virtual Local Area Networks. Logical subgroups with a Local Area Network (LAN) created via software rather than defining a hardware solution. Wide Area Networks. Networks that cover a large geographical area. Wildcard Mask Specifies which IP address bits are used, and which bits are ignored.
  • Page 413: Index

    Index Numerics BGP, 404 Default settings, 202 BootP, 404 Defining device 802.1d, 16 information, 65 BPDU, 291, 404 802.1Q, 15, 304, 307 Device installation, 31-32 Bridge Protocol Data Unit, 404 Device representation, 56 Buttons, 58 Device view, 55-56 AC unit, 27 DHCP, 17 Access mode, 185 Dimensions, 25...
  • Page 414 Ethernet, 310 IPX, 407 Extensible Authentication iSCSI, 207 Hardware version, 77 Protocol, 20, 215 ISIS, 407 Height, 25 HMP, 406 HOL, 406 HTTP, 127 Fans, 28 Jumbo frames, 407 HTTPS, 127 Fast Link, 16 Fast link, 280 File Transfer Protocol, 406 L2TP, 407 Filtering, 305, 308, 328 ICMP, 407...
  • Page 415 Network Control Quality of Service, 383, 410 Protocols, 289 Queue, 391 MAC Address, 408 Network Management MAC address, 267 System., 409 MAC addresse, 267 Network security, 215 MAC addresses, 224 Notice, 92, 101 RADIUS, 134, 155-158, 166, MAN, 408 168, 410 Management Access Lists, 127 RAM logs, 92 Management Access...
  • Page 416 Transport Control Protocol, 17 Tree view, 55 Secure Shell, 137 Warning, 92, 101 Trivial File Transfer Security, 127, 215 Web management system Protocol, 411 icons, 57 SFP, 26 Trunk Configuration Page, 257 Weighted Round Robin, 391 Simple Network Management Trust, 386 Protocol, 18, 173, 410 Width, 25 Simple Network Time...

This manual is also suitable for:

Powerconnect 5424Power connect 5448

Table of Contents