Community Strings (for SNMP version 1 and 2c clients) 2-10
Trap Receivers 2-11
Configuring Access for SNMP Version 3 Clients 2-12
Managing System Files 2-12
Saving Configuration Settings 2-13
Section II: Switch Management
Chapter 3: Configuring the Switch 3-1
Using the Web Interface 3-1
Navigating the Web Browser Interface 3-2
Home Page 3-2
Configuration Options 3-3
Panel Display 3-3
Main Menu 3-4
Chapter 4: Basic System Settings 4-1
Displaying System Information 4-1
Displaying Switch Hardware/Software Versions 4-3
Displaying Bridge Extension Capabilities 4-5
Configuring Support for Jumbo Frames 4-6
Renumbering the Stack 4-7
Resetting the System 4-7
v
Contents
Chapter 5: Setting an IP Address 5-1
Setting the Switch’s IP Address (IP Version 4) 5-1
Manual Configuration 5-2
Using DHCP/BOOTP 5-3
Setting the Switch’s IP Address (IP Version 6) 5-4
Configuring an IPv6 Address 5-4
Configuring an IPv6 General Network Prefix 5-10
Configuring the Neighbor Detection Protocol and Static Entries 5-11
Chapter 6: Managing System Files 6-1
Managing Firmware 6-1
Downloading System Software from a Server 6-2
Saving or Restoring Configuration Settings 6-4
Downloading Configuration Settings from a Server 6-5
Chapter 7: Console Port Settings 7-1
Chapter 8: Telnet Settings 8-1
Chapter 9: Configuring Event Logging 9-1
System Log Configuration 9-1
Remote Log Configuration 9-2
Displaying Log Messages 9-4
Sending Simple Mail Transfer Protocol Alerts 9-4
SNMP Overview 11-1
Enabling the SNMP Agent 11-2
Setting Community Access Strings 11-3
Specifying Trap Managers and Trap Types 11-4
Configuring SNMPv3 Management Access 11-6
Setting a Local Engine ID 11-7
Specifying a Remote Engine ID 11-7
Configuring SNMPv3 Users 11-8
Configuring Remote SNMPv3 Users 11-10
Configuring SNMPv3 Groups 11-12
Setting SNMPv3 Views 11-16
Replacing the Default Secure-site Certificate 12-6
Configuring the Secure Shell 12-8
Generating the Host Key Pair 12-10
vi
Contents
Configuring the SSH Server 12-12
Filtering IP Addresses for Management Access 12-13
Chapter 13: Configuring Port Security 13-1
Chapter 14: Configuring 802.1X Port Authentication 14-1
Displaying 802.1X Global Settings 14-2
Configuring 802.1X Global Settings 14-3
Configuring Port Settings for 802.1X 14-3
Displaying 802.1X Statistics 14-6
Chapter 15: Access Control Lists 15-1
Overview 15-1
Setting an ACL Name and Type 15-1
Configuring a Standard IPv4 ACL 15-2
Configuring an Extended IPv4 ACL 15-3
Configuring a MAC ACL 15-6
Configuring a Standard IPv6 ACL 15-7
Configuring an Extended IPv6 ACL 15-8
Binding a Port to an Access Control List 15-11
Chapter 16: Port Configuration 16-1
Displaying Connection Status 16-1
Configuring Interface Connections 16-4
Showing Port Statistics 16-6
Chapter 17: Creating Trunk Groups 17-1
Statically Configuring a Trunk 17-2
Setting a Load-Balance Mode for Trunks 17-3
Enabling LACP on Selected Ports 17-5
Configuring LACP Parameters 17-7
Displaying LACP Port Counters 17-9
Displaying LACP Settings and Status for the Local Side 17-11
Displaying LACP Settings and Status for the Remote Side 17-13
Chapter 18: Broadcast Storm Control 18-1
Setting Broadcast Storm Thresholds 18-1
Chapter 19: Configuring Port Mirroring 19-1
Chapter 20: Configuring Rate Limits 20-1
Chapter 21: Address Table Settings 21-1
Setting Static Addresses 21-1
Displaying the Address Table 21-2
Changing the Aging Time 21-4
Chapter 22: Spanning Tree Algorithm Configuration 22-1
Overview 22-1
Displaying Global Settings 22-3
vii
Contents
Configuring Global Settings 22-6
Displaying Interface Settings 22-10
Configuring Interface Settings 22-13
Configuring Multiple Spanning Trees 22-15
Displaying Interface Settings for MSTP 22-18
Configuring Interface Settings for MSTP 22-19
Chapter 23: VLAN Configuration 23-1
Assigning Ports to VLANs 23-1
Enabling or Disabling GVRP (Global Setting) 23-4
Displaying Basic VLAN Information 23-4
Displaying Current VLANs 23-5
Creating VLANs 23-6
Adding Static Members to VLANs (VLAN Index) 23-7
Adding Static Members to VLANs (Port Index) 23-9
Configuring VLAN Behavior for Interfaces 23-10
Configuring IEEE 802.1Q Tunneling 23-12
Enabling QinQ Tunneling on the Switch 23-16
Adding an Interface to a QinQ Tunnel 23-17
Chapter 24: Configuring Private VLANs 24-1
Enabling Private VLANs 24-1
Configuring Uplink and Downlink Ports 24-2
Chapter 25: Configuring Protocol-Based VLANs 25-1
Configuring Protocol Groups 25-1
Mapping Protocols to VLANs 25-2
Chapter 26: Class of Service Configuration 26-1
Layer 2 Queue Settings 26-1
Setting the Default Priority for Interfaces 26-1
Mapping CoS Values to Egress Queues 26-3
Selecting the Queue Mode 26-4
Setting the Service Weight for Traffic Classes 26-5
Layer 3/4 Priority Settings 26-7
Mapping Layer 3/4 Priorities to CoS Values 26-7
Selecting IP Precedence/DSCP Priority 26-7
Mapping IP Precedence 26-8
Mapping DSCP Priority 26-9
Mapping IP Port Priority 26-11
Chapter 27: Quality of Service 27-1
Configuring Quality of Service Parameters 27-1
Configuring a Class Map 27-2
Creating QoS Policies 27-4
Attaching a Policy Map to Ingress Queues 27-7
viii
Contents
Chapter 28: Multicast Filtering 28-1
Layer 2 IGMP (Snooping and Query) 28-1
Configuring IGMP Snooping and Query Parameters 28-2
Displaying Interfaces Attached to a Multicast Router 28-4
Specifying Static Interfaces for a Multicast Router 28-5
Displaying Port Members of Multicast Services 28-6
Assigning Ports to Multicast Services 28-7
Chapter 29: Configuring Domain Name Service 29-1
Configuring General DNS Service Parameters 29-1
Configuring Static DNS Host to Address Entries 29-3
Displaying the DNS Cache 29-5
Chapter 30: Switch Clustering 30-1
Cluster Configuration 30-1
Cluster Member Configuration 30-2
Cluster Member Information 30-3
Cluster Candidate Information 30-4
Section III: Command Line Interface
Chapter 31: Using the Command Line Interface 31-1
Accessing the CLI 31-1
Console Connection 31-1
Telnet Connection 31-1
Entering Commands 31-3
Keywords and Arguments 31-3
Minimum Abbreviation 31-3
Command Completion 31-3
Getting Help on Commands 31-3
Showing Commands 31-4
Partial Keyword Lookup 31-5
Negating the Effect of Commands 31-5
Using Command History 31-5
Understanding Command Modes 31-6
Exec Commands 31-6
Configuration Commands 31-7
Command Line Processing 31-9
Chapter 32: CLI Command Groups 32-1
Chapter 33: General Commands 33-1
enable 33-1
disable 33-2
configure 33-2
show history 33-3
prompt 33-4
ix
Contents
end 33-4
exit 33-4
quit 33-5
Chapter 34: System Management Commands 34-1
hostname 34-1
reload 34-2
switch renumber 34-2
jumbo frame 34-3
show startup-config 34-3
show running-config 34-5
show system 34-7
show users 34-7
show version 34-8
Chapter 35: File Management Commands 35-1
copy 35-2
delete 35-4
dir 35-5
whichboot 35-6
boot system 35-7
Chapter 36: Line Commands 36-1
line 36-1
login 36-2
password 36-3
timeout login response 36-4
exec-timeout 36-4
password-thresh 36-5
silent-time 36-6
databits 36-6
parity 36-7
speed 36-8
stopbits 36-8
disconnect 36-9
show line 36-9
Chapter 37: Event Logging Commands 37-1
logging on 37-1
logging history 37-2
logging host 37-3
logging facility 37-3
logging trap 37-4
clear log 37-5
show logging 37-5
show log 37-7
sntp client 39-1
sntp server 39-2
sntp poll 39-3
show sntp 39-3
clock timezone 39-4
calendar set 39-5
show calendar 39-5
Chapter 40: SNMP Commands 40-1
snmp-server 40-2
show snmp 40-2
snmp-server community 40-3
snmp-server contact 40-4
snmp-server location 40-4
snmp-server host 40-5
snmp-server enable traps 40-7
snmp-server engine-id 40-8
show snmp engine-id 40-9
snmp-server view 40-10
show snmp view 40-11
snmp-server group 40-11
show snmp group 40-13
snmp-server user 40-14
show snmp user 40-15
radius-server timeout 41-8
show radius-server 41-8
TACACS+ Client 41-9
tacacs-server host 41-9
tacacs-server port 41-9
tacacs-server key 41-10
show tacacs-server 41-10
Web Server Commands 41-11
ip http port 41-11
ip http server 41-11
ip http secure-server 41-12
ip http secure-port 41-13
Telnet Server Commands 41-14
ip telnet server 41-14
Secure Shell Commands 41-15
ip ssh server 41-17
ip ssh timeout 41-18
ip ssh authentication-retries 41-19
ip ssh server-key size 41-19
delete public-key 41-20
ip ssh crypto host-key generate 41-20
ip ssh crypto zeroize 41-21
ip ssh save host-key 41-21
show ip ssh 41-22
show ssh 41-22
show public-key 41-23
access-list ip 44-2
permit, deny (Standard IPv4 ACL) 44-2
permit, deny (Extended IPv4 ACL) 44-3
show ip access-list 44-5
ip access-group 44-6
show ip access-group 44-6
protocol-vlan protocol-group (Configuring Groups) 54-1
protocol-vlan protocol-group (Configuring Interfaces) 54-2
show protocol-vlan protocol-group 54-3
show interfaces protocol-vlan protocol-group 54-4
Chapter 55: Class of Service Commands 55-1
Priority Commands (Layer 2) 55-1
queue mode 55-2
switchport priority default 55-3
queue bandwidth 55-4
queue cos-map 55-4
show queue mode 55-5
show queue bandwidth 55-6
show queue cos-map 55-6
xv
Contents
Priority Commands (Layer 3 and 4) 55-7
map ip port (Global Configuration) 55-7
map ip port (Interface Configuration) 55-8
map ip precedence (Global Configuration) 55-8
map ip precedence (Interface Configuration) 55-9
map ip dscp (Global Configuration) 55-10
map ip dscp (Interface Configuration) 55-10
show map ip port 55-11
show map ip precedence 55-12
show map ip dscp 55-13
Chapter 56: Quality of Service Commands 56-1
class-map 56-2
match 56-3
policy-map 56-4
class 56-4
set 56-5
police 56-6
service-policy 56-7
show class-map 56-8
show policy-map 56-8
show policy-map interface 56-9
Chapter 57: Multicast Filtering Commands 57-1
IGMP Snooping Commands 57-1
ip igmp snooping 57-1
ip igmp snooping vlan static 57-2
ip igmp snooping version 57-2
show ip igmp snooping 57-3
show mac-address-table multicast 57-3
IGMP Query Commands 57-4
ip igmp snooping querier 57-4
ip igmp snooping query-count 57-5
ip igmp snooping query-interval 57-5
ip igmp snooping query-max-response-time 57-6
ip igmp snooping router-port-expire-time 57-7
Static Multicast Routing Commands 57-8
ip igmp snooping vlan mrouter 57-8
show ip igmp snooping mrouter 57-9
Chapter 58: Domain Name Service Commands 58-1
ip host 58-1
clear host 58-2
ip domain-name 58-3
ip domain-list 58-3
ip name-server 58-4
xvi
Contents
ip domain-lookup 58-5
show hosts 58-6
show dns 58-7
show dns cache 58-7
clear dns cache 58-8
Chapter 59: IPv4 Interface Commands 59-1
ip address 59-1
ip default-gateway 59-2
ip dhcp restart 59-3
show ip interface 59-4
show ip redirects 59-4
ping 59-5
Chapter 60: IPv6 Interface Commands 60-1
ipv6 enable 60-2
ipv6 general-prefix 60-3
show ipv6 general-prefix 60-4
ipv6 address 60-4
ipv6 address autoconfig 60-6
ipv6 address eui-64 60-7
ipv6 address link-local 60-9
show ipv6 interface 60-10
ipv6 default-gateway 60-12
show ipv6 default-gateway 60-12
ipv6 mtu 60-13
show ipv6 mtu 60-14
show ipv6 traffic 60-14
clear ipv6 traffic 60-20
ping ipv6 60-21
ipv6 neighbor 60-22
ipv6 nd dad attempts 60-23
ipv6 nd ns interval 60-25
show ipv6 neighbors 60-26
clear ipv6 neighbors 60-27
Chapter 61: Switch Cluster Commands 61-1
cluster 61-1
cluster commander 61-2
cluster ip-pool 61-2
cluster member 61-3
rcommand 61-4
show cluster 61-4
show cluster members 61-5
show cluster candidates 61-5
xvii
Contents
Section IV: Appendices
Appendix A: Software Specifications A-1
Software Features A-1
Management Features A-2
Standards A-2
Management Information Bases A-3
Appendix B: Troubleshooting B-1
Problems Accessing the Management Interface B-1
Using System Logs B-2
Figure 3-1Home Page 3-2
Figure 3-2Front Panel Indicators 3-3
Figure 4-1System Information 4-2
Figure 4-2Switch Information 4-4
Figure 4-3Displaying Bridge Extension Configuration 4-5
Figure 4-4Configuring Support for Jumbo Frames 4-6
Figure 4-5Renumbering the Stack 4-7
Figure 4-6Resetting the System 4-7
Figure 5-1IPv4 Interface Configuration - Manual 5-2
Figure 5-2IPv4 Interface Configuration - DHCP 5-3
Figure 5-3IPv6 Interface Configuration 5-9
Figure 5-4IPv6 General Prefix Configuration 5-11
Figure 5-5IPv6 Neighbor Detection and Neighbor Cache 5-14
Figure 6-1Copy Firmware 6-2
Figure 6-2Setting the Startup Code 6-2
Figure 6-3Deleting Files 6-3
Figure 6-4Downloading Configuration Settings for Start-Up 6-5
Figure 6-5Setting the Startup Configuration Settings 6-5
Figure 7-1Configuring the Console Port 7-2
Figure 8-1Configuring the Telnet Interface 8-2
Figure 9-1System Logs 9-2
Figure 9-2Remote Logs 9-3
Figure 9-3Displaying Logs 9-4
Figure 9-4Enabling and Configuring SMTP Alerts 9-5
Figure 10-1SNTP Configuration 10-1
Figure 10-2Clock Time Zone 10-2
Figure 11-1Enabling the SNMP Agent 11-2
Figure 11-2Configuring SNMP Community Strings 11-3
Figure 11-3Configuring SNMP Trap Managers 11-6
Figure 11-4Setting the SNMPv3 Engine ID 11-7
Figure 11-5Setting an Engine ID 11-8
Figure 11-6Configuring SNMPv3 Users 11-9
Figure 11-7Configuring Remote SNMPv3 Users 11-11
Figure 11-8Configuring SNMPv3 Groups 11-15
Figure 11-9Configuring SNMPv3 Views 11-16
Figure 12-1User Accounts 12-2
Figure 12-2Authentication Server Settings 12-4
Figure 12-3HTTPS Settings 12-6
Figure 12-4Copy HTTPS Certificate 12-7
Figure 12-5SSH Host-Key Settings 12-11
Figure 12-6SSH Server Settings 12-12
xxiii
Figures
Figure 12-7IP Filter 12-14
Figure 13-1Port Security 13-2
Figure 14-1802.1X Global Information 14-2
Figure 14-2802.1X Global Configuration 14-3
Figure 14-3802.1X Port Configuration 14-4
Figure 14-4802.1X Port Statistics 14-7
Figure 15-1Selecting ACL Type 15-2
Figure 15-2ACL Configuration - Standard IPv4 15-3
Figure 15-3ACL Configuration - Extended IPv4 15-5
Figure 15-4ACL Configuration - MAC 15-7
Figure 15-5ACL Configuration - Standard IPv6 15-8
Figure 15-6ACL Configuration - Extended IPv6 15-10
Figure 15-7ACL Port Binding 15-11
Figure 16-1Port - Port Information 16-1
Figure 16-2Port - Port Configuration 16-5
Figure 16-3Port Statistics 16-9
Figure 17-1Static Trunk Configuration 17-2
Figure 17-2Trunk Load Balance Mode 17-4
Figure 17-3LACP Trunk Configuration 17-6
Figure 17-4LACP - Aggregation Port 17-8
Figure 17-5LACP - Port Counters Information 17-10
Figure 17-6LACP - Port Internal Information 17-12
Figure 17-7LACP - Port Neighbors Information 17-13
Figure 18-1Port Broadcast Control 18-1
Figure 19-1Mirror Port Configuration 19-2
Figure 20-1Rate Limit Configuration 20-1
Figure 21-1Static Addresses 21-1
Figure 21-2Dynamic Addresses 21-3
Figure 21-3Address Aging 21-4
Figure 22-1STA Information 22-5
Figure 22-2STA Global Configuration 22-9
Figure 22-3STA Port Information 22-12
Figure 22-4STA Port Configuration 22-15
Figure 22-5MSTP VLAN Configuration 22-16
Figure 22-6MSTP Port Information 22-18
Figure 22-7MSTP Port Configuration 22-20
Figure 23-1Globally Enabling GVRP 23-4
Figure 23-2VLAN Basic Information 23-4
Figure 23-3VLAN Current Table 23-5
Figure 23-4VLAN Static List - Creating VLANs 23-7
Figure 23-5VLAN Static Table - Adding Static Members 23-8
Figure 23-6VLAN Static Membership by Port 23-9
Figure 23-7VLAN Port Configuration 23-11
Figure 23-1802.1Q Tunnel Status 23-16
Figure 23-1Tunnel Port Configuration 23-18
xxiv
Figures
Figure 24-1Private VLAN Status 24-1
Figure 24-2Private VLAN Link Status 24-2
Figure 25-1Protocol VLAN Configuration 25-2
Figure 25-2Protocol VLAN Port Configuration 25-3
Figure 26-1Default Port Priority 26-2
Figure 26-2Traffic Classes 26-4
Figure 26-3Queue Mode 26-5
Figure 26-4Queue Scheduling 26-6
Figure 26-5IP Precedence/DSCP Priority Status 26-7
Figure 26-6IP Precedence Priority 26-8
Figure 26-7IP DSCP Priority 26-10
Figure 26-8IP Port Priority Status 26-11
Figure 26-9IP Port Priority 26-11
Figure 27-1Configuring Class Maps 27-3
Figure 27-2Configuring Policy Maps 27-6
Figure 27-3Service Policy Settings 27-7
Figure 28-1IGMP Configuration 28-3
Figure 28-2Multicast Router Port Information 28-4
Figure 28-3Static Multicast Router Port Configuration 28-5
Figure 28-4IP Multicast Registration Table 28-6
Figure 28-5IGMP Member Port Table 28-7
Figure 29-1DNS General Configuration 29-2
Figure 29-2DNS Static Host Table 29-4
Figure 29-3DNS Cache 29-5
Figure 30-1Cluster Configuration 30-2
Figure 30-2Cluster Member Configuration 30-3
Figure 30-3Cluster Member Information 30-3
Figure 30-4Cluster Candidate Information 30-4
xxv
Figures
xxvi
Section I: Getting Started
This section provides an overview of the switch, and introduces some basic
concepts about network switches. It also describes the basic settings required to
access the management interface.
This switch provides a broad range of features for Layer 2 switching. It includes a
management agent that allows you to configure the features listed in this manual.
The default configuration can be used for most of the features provided by this
switch. However, there are many options that you should configure to maximize the
switch’s performance for your particular network environment.
Key Features
Table 1-1 Key Features
FeatureDescription
Configuration Backup
and Restore
AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+
Access Control ListsSupports up to 32 ACLs, 96 MAC rules, 96 IP rules, and 96 IPv6 rules
DHCP ClientSupported
DNS Proxy service
Port ConfigurationSpeed and duplex mode and flow control
Rate LimitingInput and output rate limiting per port
Port MirroringOne or more ports mirrored to single analysis port
Port TrunkingSupports up to 24 trunks using either static or dynamic trunking (LACP)
Broadcast Storm
Control
Address TableUp to 8K MAC addresses in the forwarding table, 1024 static MAC addresses
IP Version 4 and 6Supports IPv4 and IPv6 addressing, management, and QoS
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward
Switching
Spanning Tree
Algorithm
Virtual LANsUp to 256 using IEEE 802.1Q, port-based, protocol-based, private VLANs, and
Backup to TFTP server
Web – HTTPS
Telnet – SSH
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Port – IEEE 802.1X, MAC address filtering
Supported
Supported to ensure wire-speed switching while eliminating bad frames
Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and Multiple
Spanning Trees (MSTP)
802.1Q tunneling (QinQ)
1-1
Introduction
1
Table 1-1 Key Features (Continued)
FeatureDescription
Traffic PrioritizationDefault port priority, traffic class map, queue scheduling, IP Precedence, or
Qualify of ServiceSupports Differentiated Services (DiffServ)
Multicast FilteringSupports IGMP snooping and query
Switch ClusteringSupports up to 36 member switches in a cluster
Differentiated Services Code Point (DSCP), and TCP/UDP Port
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Untagged (port-based), tagged, and protocol-based VLANs,
plus support for automatic GVRP VLAN registration provide traffic security and
efficient use of network bandwidth. CoS priority queueing ensures the minimum
delay for moving real-time multimedia data across the network. While multicast
filtering provides support for real-time network applications. Some of the
management features are briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based authentication is also supported via the IEEE 802.1X protocol. This
protocol uses Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then uses the EAP between the switch
and the authentication server to verify the client’s right to access the network via an
authentication server (i.e., RADIUS server).
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection,
SNMP Version 3, IP address filtering for SNMP/web/Telnet management access,
and MAC address filtering for port access.
Access Control Lists – ACLs provide packet filtering for IP frames (based on
address, protocol, TCP/UDP port number or TCP control code) or any frames
(based on MAC address or Ethernet type). ACLs can by used to improve
performance by blocking unnecessary network traffic or to implement security
controls by restricting access to specific network resources or protocols.
1-2
Loading...
+ 558 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.