An Alcatel service agreement brings your company the assurance of 7x24 no-excuses technical
support. You’ll also receive regular software updates to maintain and maximize your Alcatel
product’s features and functionality and on-site hardware replacement through our global network
of highly qualified service delivery partners. Additionally, with 24-hour-a-day access to Alcatel’s
Service and Support web page, you’ll be able to vi ew and update any case (open or clos ed) that you
have reported to Alcatel’s technical support, open a new case or access helpful release notes,
technical bulletins, and manuals. For more information on Alcatel’s Service Programs, see our web
page at www.ind.alcatel.com, call us at 1-800-995-2696, or email us at support@ind.alcatel.com.
This Manual documents Alcatel 6200 hardware and software.
The functionality described in this Manual is subject to change without notice.
Copyright
reproduced in whole or in part without the express written permission of Alcatel Internetworking, Inc.
Alcatel
OmniSwitch
SwitchExpert
are trademarks of their respective companies.
2007 by Alcatel Internetworking, Inc. All rights reserved. This document may not be
®
and the Alcatel logo are registered trademarks of Compagnie Financiére Alcatel, Paris, France.
®
and OmniStack® are registered trademarks of Alcatel Internetworking, Inc. Omni Switch/Router™,
SM
, the Xylan logo are trademarks of Alcatel Internetworking, Inc. All other brand and product names
26801 West Agoura Road
Calabasas, CA 91301
(818) 880-3500 FAX (818) 880-3505
info@ind.alcatel.com
US Customer Support-(800) 995-2696
International Customer Support-(818) 878-4507
Internet-http://eservice.ind.alcatel.com
Warning
This equipment has been tested and found to comply with the limits for Class A digital
device pursuant to Part 15 of the FCC Rules. These limits are designed to provide
reasonable protection against harmful interference when the equipment is operated in a
commercial environment. This equipment generates, uses, and can radiate radio frequency energy and,
if not installed and used in accordance with the instructions in this guide, may cause interference to
radio communications. Operation of this equipment in a residential area is likely to cause interference,
in which case the user will be required to correct the interference at his own expense.
The user is cautioned that changes and modifications made to the equipment without
approval of the manufacturer could void the user’s authority to operate this equipment. It is suggested
that the user use only shielded and grounded cables to ensure compliance with FCC Rules.
This digital apparatus does not exceed the Class A limits for radio noise emissions from
digital apparatus set out in the radio interference regulations of the Canadian department of
communications.
Le present appareil numerique níemet pas de bruits radioelectriques depassant les limites applicables
aux appareils numeriques de la Class A prescrites dans le reglement sur le brouillage radioelectrique
edicte par le ministere des communications du Canada.
Utilice sólo adaptadores con las siguientes características eléctricas y que estén debidamente
certificados de acuerdo a la legislación vigente. El uso de otros adaptadores podría dañar el dispositivo
y anular la garantía además de provocar riesgos al usuario.
OS-LS-6224PAC100/115/220/230V; 50/60Hz; 2.0/1.7/0.9/
OS-LS-6248PAC100/115/220/230V; 50/60Hz; 4.0/3.4/1.8/
OS-LS-6224 AC 100/115/220/230V; 50/60Hz; 0.4/0.4/0.2/
OS-LS-6248 AC100/115/220/230V; 50/60Hz; 0.6/0.6/0.4/
OS-LS-6224U AC 100/115/220/230V 50/60Hz 1.0/1.0/0.5/
Adaptador:
OS-LS-6224POS-LS-62BP-P3Y Power
OS-LS-6248POS-LS-62BP-PAlcatel
OS-LS-6248 OS-LS-62BP-DC & OS-LS-62BPAccton & 3Y Power
OS-LS-6224 OS-LS-62BP-DC & OS-LS-62BPAccton & 3Y Power
Características de entrada:Características de salida:
0.9A; Clase I
1.8A; Clase I
0.2A; Clase I
0.4A; Clase I
0.5A Clase I
Modelo:Marca comercial:
DC 12V, 4.0A; -50V, 3.6A
DC 12V, 7.5A; -50V, 7.5A
DC 12V, 4.5A
DC 12V, 4.5A
DC 12V , 4.5A
Contents
Contents
Chapter 1: Introduction 1
Key Features ........................................................................................................1
Description of Software Features .........................................................................3
System Defaults .............................................................. ... ................................. .9
Chapter 2: Initial Configuration 13
General Configuration Information .....................................................................14
Auto-Negotiation 15
Device Port Default Settings 15
Booting the Switch ..............................................................................................16
Stacking Members and Unit ID 38
Removing and Replacing Stacking Members 39
Exchanging Stacking Members 40
Switching between the Stacking Master and the Secondary Master 40
Configuring Stacking 41
Resetting the Stack 42
Managing System Logs ......................................................................................43
Enabling System Logs 43
Viewing Memory Logs 45
Viewing the Device FLASH Logs 47
Remote Log Configuration 48
Polling for Unicast Time Information 51
Polling for Anycast Time Information 51
Polling For Broadcast Time Information 52
Defining SNTP Global Settings 52
Defining SNTP Authentication 53
Defining SNTP Servers 54
Defining SNTP Interface Settings 56
Configuring System Time ...................................................................................57
Configuring Daylight Savings Time 57
Managing System Files ......................................................................................61
Downloading System Files 62
Uploading System Files 64
Copying Files 65
Viewing RMON Statistics 118
Defining RMON History Control 120
Viewing the RMON History Table 121
Defining RMON Events Control 124
Viewing the RMON Events Logs 125
Defining RMON Alarms 126
Defining LLDP Port Settings 132
Defining Media Endpoint Discovery Network Policy 133
Defining LLDP MED Port Settings 134
Viewing the LLDP Neighbor Information 135
Viewing Neighbor Information Details 136
Defining VLAN Groups ...................................... ... .. ..................................... .....213
Configuring MAC Based VLAN Groups 213
Configuring Subnet Based VLAN Groups 214
Configuring Protocol Based VLAN Groups 215
Mapping Groups to VLANs 216
Defining GARP 217
Defining GVRP 219
Viewing GVRP Statistics 220
Defining IGMP Snooping 223
Specifying Static Interfaces for a Multicast Group 225
Displaying Interfaces Attached to a Multicast Router 227
Configuring Multicast TV 228
Defining Multicast TV Membership 229
Configuring Triple Play .....................................................................................230
Configuring Quality of Service ..........................................................................231
Access Control Lists 232
Mapping to Queues 233
QoS Modes 234
Enabling QoS 235
Defining Global Queue Settings 236
Defining Bandwidth Settings 237
Configuring VLAN Rate Limit 239
Mapping CoS Values to Queues 240
Mapping DSCP Values to Queues 241
Defining Basic QoS Settings 242
Defining QoS DSCP Rewriting Settings 243
Defining QoS DSCP Mapping Settings 244
Defining QoS Class Maps 245
Defining Policies 246
Defining Tail Drop 248
Viewing the Policy Table 248
Viewing Policy Bindings 250
Chapter 4: Command Line Interface 253
Using the Command Line Interface ..................................................................253
lldp optional-tlv 333
lldp med enable 334
lldp med network-policy (global) 334
lldp med network-policy (interface) 335
lldp med location 335
clear lldp rx 336
show lldp configuration 337
show lldp med configuration 337
show lldp local 338
show lldp neighbors 340
interface ethernet 376
interface range ethernet 377
shutdown 378
description 379
speed 380
duplex 381
negotiation 382
flowcontrol 383
mdix 383
back-pressure 384
clear counters 385
set interface active 386
show interfaces advertise 386
show interfaces configuration 388
show interfaces status 390
xii
Contents
show interfaces description 392
show interfaces counters 392
port storm-control broadcast enable 395
port storm-control broadcast rate 396
show ports storm-control 397
ip igmp snooping (Global) 408
ip igmp snooping (Interface) 409
ip igmp snooping host-time-out 410
ip igmp snooping mrouter-time-out 410
ip igmp snooping leave-time-out 411
ip igmp snooping multicast-tv 412
ip igmp snooping querier enable 413
ip igmp snooping querier address 413
ip igmp snooping querier version 414
show ip igmp snooping mrouter 414
show ip igmp snooping interface 415
show ip igmp snooping groups 416
IP Addressing Commands ................................................................................418
ip address 418
ip address dhcp 419
ip default-gateway 420
show ip interface 421
arp 422
arp timeout 423
clear arp-cache 424
show arp 424
ip domain-lookup 425
ip domain-name 426
ip name-server 426
ip host 427
clear host 428
clear host dhcp 429
show hosts 429
test copper-port tdr 451
show copper-ports tdr 452
show copper-ports cable-length 452
show fiber-ports optical-transceiver 453
Port Channel Commands .................................................................................455
interface port-channel 455
interface range port-channel 455
channel-group 456
show interfaces port-channel 457
Port Monitor Commands ...................................................................................458
port monitor 458
show ports monitor 459
Power over Ethernet Commands ......................................................................460
power inline 460
power inline powered-device 461
power inline priority 462
power inline usage-threshold 462
power inline traps enable 463
show power inline 464
show rmon statistics 503
rmon collection history 505
show rmon collection history 506
show rmon history 507
rmon alarm 510
show rmon alarm-table 511
show rmon alarm 512
xv
Contents
rmon event 514
show rmon events 514
show rmon log 515
rmon table-size 517
stack reload 614
stack display-order 614
show stack 615
show users 617
show sessions 617
show system 618
show version 619
service cpu-utilization 620
show cpu utilization 6 21
Triple Play Commands .....................................................................................627
switchport customer vlan 627
switchport customer multicast-tv vlan 627
ip igmp snooping map cpe vlan 628
show ip igmp snooping cpe vlans 629
show ip igmp snooping interface 629
DHCP Snooping, IP Source Guard and ARP Inspection Commands ..............631
ip dhcp snooping 632
ip dhcp snooping vlan 633
ip dhcp snooping trust 634
ip dhcp information option allowed-untrusted 634
ip dhcp information option 635
ip dhcp snooping verify 635
ip dhcp snooping database 636
ip dhcp snooping database update-freq 636
ip dhcp snooping binding 637
clear ip dhcp snooping database 638
show ip dhcp snooping 638
show ip dhcp snooping binding 639
ip source-guard (global) 640
ip source-guard (interface) 640
ip source-guard binding 641
ip source-guard tcam retries-freq 642
ip source-guard tcam locate 643
show ip source-guard 643
show ip source-guard inactive 644
ip arp inspection 645
ip arp inspection vlan 646
ip arp inspection trust 646
ip arp inspection validate 647
xviii
Contents
ip arp inspection list create 648
ip mac 648
ip arp inspection list assign 649
ip arp inspection logging interval 650
show ip arp inspection 650
show ip arp inspection list 651
User Interface Commands ...................................................... ... ......................652
do 652
enable 653
disable 654
login 654
configure 655
exit (Configuration) 655
exit 656
end 657
help 657
terminal datadump 658
show history 659
show privilege 659
vlan database 662
vlan 663
default-vlan vlan 664
interface vlan 664
interface range vlan 665
name 666
map protocol protocols-group 666
switchport general map protocols-group vlan 667
switchport mode 668
switchport access vlan 669
switchport trunk allowed vlan 670
switchport trunk native vlan 671
switchport general allowed vlan 672
switchport general pvid 673
switchport general ingress-filtering disable 674
switchport general acceptable-frame-type tagged-only 675
switchport forbidden vlan 676
map mac macs-group 677
switchport general map macs-group vlan 677
map subnet subnets-group 678
switchport general map subnets-group vlan 679
switchport protected 680
ip internal-usage-vlan 681
show vlan 682
show vlan internal usage 683
xix
Contents
show interfaces switchport 684
switchport access multicast-tv vlan 687
show vlan protocols-groups 688
show vlan macs-groups 688
show vlan subnets-groups 689
show vlan multicast-tv 690
Web Server Commands ...................................................................................691
ip http server 691
ip http port 692
ip http exec-timeout 693
ip https server 693
ip https port 694
ip https exec-timeout 695
crypto certificate generate 695
crypto certificate request 6 96
crypto certificate import 698
ip https certificate 699
show crypto certificate mycertificate 699
show ip http 700
show ip https 701
• OS-LS-6212 –
combo uplink ports (with SFP or 10/100/1000Base-TX interfaces) and two ports
full-duplex Gigabit stacking
• OS-LS-6212P –
standard-based Power over Ethernet, two Gigabit combo uplink ports (with SFP or 10/
100/1000Base-TX interfaces) and two ports full-duplex Gigabit stacking
• OS-LS-6224 – Ethernet based switch with 24 RJ-45 10/100Base-TX ports, two
Gigabit combo uplink ports (with SFP or 10/1 00/1000Base-TX interf aces) and two
ports full-duplex Gigabit stacking (optional DC power source)
• OS-LS-6224P – Ethernet based switch with 24 RJ-45 10/100Base-TX ports
providing standard-based Power over Ethernet, two Gigabit combo uplink ports
(with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit
stacking
• OS-LS-6248 – Ethernet based switch with 48 RJ-45 10/100Base-TX ports, two
Gigabit combo uplink ports (with SFP or 10/1 00/1000Base-TX interf aces) and two
ports full-duplex Gigabit stacking (optional DC power source)
• OS-LS-6248P – Ethernet based switch with 48 RJ-45 10/100Base-TX ports
providing standard-based Power over Ethernet, two Gigabit combo uplink ports
(with SFP or 10/100/1000Base-TX interfaces) and two ports full-duplex Gigabit
stacking
• OS-LS-6224U – Ethernet based switch with 24 100Base-FX external SFP ports,
two Gigabit combo ports with assicuated Mini-GBIC slots or RJ-45 ports and two
1000Base-T stacking ports
All devices have a management port which is used for debuggi ng an d manag ement
purposes.
This switch provides a broad range of features for switching. It includes a
management agent that allows you to configure the features listed in this manual.
The default configuration can be used for most of the features provided by t his
switch. However, there are many options that you should configure to maximize the
switch’s performance for your particular network environment.
Ethernet based switch with 12 RJ-45 10/100Base-TX ports, two Gigabit
Ethernet based switch with 12 RJ-45 10/100Base-TX ports providing
Key Features
FeatureDescription
Configuration Backup
and Restore
Backup to TFTP server
Table1-1. Key Features
1
Introduction
1
Table1-1. Key Features
FeatureDescription
AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+
Web – HTTPS; Telnet – SSH
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Port – IEEE 802.1x
Access Control ListsSupports up to 1K IP or MAC ACLs
DHCP ClientSupported
DNS ServerSupported
Port ConfigurationSpeed, duplex mode and flow control
Rate LimitingInput and output rate limiting per port
Port MirroringOne or more ports mirrored to single analysis port
Port TrunkingSupports up to 8 trunks using either static or dynamic trunking (LACP)
Broadcast Storm
Control
Static AddressUp to 16K MAC addresses in the forwarding table
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward
Switching
Spanning Tree
Protocol
Virtual LANsUp to 255 using IEEE 802.1Q, port-based, protocol-based, or private VLANs GVRP
Traffic PrioritizationDefault port priority, traffic class map, queue scheduling, IP Precedence, or
STP Root GuardPrevents devices outside the network core from being assigned the
STP BPDU GuardUsed as a security mechanism to protect the network from invalid configurations.
802.1x - MAC
Authentication
DHCP SnoopingExpands network security by providing a firewall security between untrusted
DHCP Option 82Enables to add information for the DHCP server on request.
IP Source Address
Guard
ARP InspectionClassic Address Resolution Protocol is a TCP/IP protocol that translates IP
Supported
Supported to ensure wire-speed switching while eliminating bad frames
Supports standard STP, Rapid Spanning Tree Protocol (RSTP), Multiple Spanning
Trees (MSTP).
Differentiated Services Code Point (DSCP) and TCP/UDP Port
spanning tree root.
MAC authentication ensures that end-user stations meet security policies criteria,
and protects networks from viruses.
interfaces and DHCP servers.
Restricts IP traffic on non-routed, Layer 2 interfaces by f ilterin g traffic. This feature
is based on the DHCP snooping binding database and on manually configured IP
source bindings.
addresses into MAC addresses.
2
Description of Software Features
Table1-1. Key Features
FeatureDescription
LLDP-MEDIncreases network flexibility by allowing different IP systems to co-exist on a single
QoSSupports Quality of Service (QoS).
Multicast FilteringSupports IGMP snooping and query.
Power over EthernetEnables PoE support.
Multicast TV VLAN Supplies multicast transmissions to L2-isolated subscribers, without replicating the
IP Subnet-Based
VLANs
MAC-Based VLANsPackets are classified according to MAC address
Jumbo FramesSupport of mini jumbo frames allows forwarding of packets up to 1632 bytes.
QinQAllows network managers to add an additional tag to previously tagged packets
network.
multicast transmissions for each subscriber VLAN.
Packets are classified according to the packet’s source IP subnet in its IP header
1
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Port-based and protocol-based VLANs, plus support for
automatic GVRP VLAN registration provide traffic security and efficient use of
network bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering provides
support for real-time network applications. Some of the management features are
briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, T eln et or web browser . User names and pa sswords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based and MAC-based authentication is also supported via the IEEE 802.1x
protocol. This protocol uses the Extensible Authentication Protocol over LANs
(EAPOL) to request user credentials from the 802.1x client, and then verifies the
client’s right to access the network via an authentication server.
Other authentication options include HTTPS for secure management ac cess via t he
web, SSH for secure management access over a Telnet-e quivalent connection,
SNMP version 3, IP address filtering for SNMP/web/Telnet management access,
and MAC address filtering for port access.
3
Introduction
1
MAC Address Capacity Support – The device supports up to 16K MAC
addresses. The device reserves specific MAC addresses for system use.
Self-Learning MAC Addresses – The device enables automatic MAC addresses
learning from incoming packets.
Automatic Aging for MAC Addresses – MAC addresses from which no traffic is
received for a given period are aged out. This prevents the Bridging Table from
overflowing.
Static MAC Entries – User defined static MAC entries are stored in the Bridging
Table, in addition to the Self Learned MAC addresses.
VLAN-Aware MAC-based Switching – Packets arriving from an unknown source
address are sent to the CPU. When source addresses are added to the Hardware Table, packets addressed to this address are then forwarded straight to
corresponding port.
MAC Multicast Support – Multicast service is a limited broadcast service, which
allows one-to-many and many-to-many connections for information distribut ion.
Layer 2 multicast service is where a single frame is address ed to a speci fic multicast
address, and copies of the frame transmitted to relevant all relevan t ports.
Address Resolution Protocol –
switches to inter-communicate using various routing protocols to discover network
topology and define Routing tables. Device Next-Hop MAC addresses are
automatically derived by ARP. This includes directly attached end systems. Users can
override and supplement this by defining additional ARP Table entries.
QinQ tagging – QinQ tagging allows network managers to add an additional tag to
previously tagged packets. Adding additional tags to the packets helps create more
VLAN space. The added tag provides an VLAN ID to each customer, this ensures
private and segregated network traffic.
Port Configuration – You can manually configure the speed, duplex mode, and
flow control used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports whenever
possible to double the throughput of switch connecti ons. Flow control should also be
enabled to control network traffic during periods of congestion and prevent the loss
of packets when port buff er thresholds are exceeded. The switch supports flow
control based on the IEEE 802.3x standard.
Rate Limiting – This feature controls the maximum rate for traffic transmitted or
received on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into o r out of the network. T r affic th at falls within t he rate limit is
transmitted, while packets that exceed the acceptable amount of traffic are dropped.
Port Mirroring – The switch can unobtrusively mirror traffic from any port to a
monitor port. You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
Port Trunking – Ports can be combined into an aggregate connection. Trunks can
be manually set up or dynamically configured using I EEE 802. 3ad Lin k Ag gregatio n
IP routing generally utilizes routers and Layer 3
4
Description of Software Features
Control Protocol (LACP). The additional ports dramatically increase the throughput
across any connection, and provide redundancy by taking over the load if a port in
the trunk should fail. The switch supports up to 6 trunks.
Broadcast Storm Control – Broadcast s uppress ion preve nts broadcast traffic from
overwhelming the network. When enabled on a port, the level of broadcast traffic
passing through the port is restricted. If broadcast traffic rises above a pre-defined
threshold, it will be throttled until the level falls back beneath the threshold.
Static Addresses – A st atic MAC address ca n be assigned to a specific inte rface on
this switch. Static addresses are bound to the assigned interface and will not be
moved. When a static address is seen on another interface, the address will be
ignored and will not be written to th e a ddress table. Static addresses can be used to
provide network security by restricting access for a known host to a specific port.
STP BPDU Guard– Bridge Protocol Data Units (BPDU) Guard expands network
adminstrator’s ablility to enforce STP borders and maintain STP top ologies
realibility. BPDU is utilized when Fast Link ports is enabled and/or if the Spanning
Tree Protocol is disabled on ports. If a BPDU message is sent to a port on which
STP is disabled, BPDU Guard shuts down the port, and generates a SNMP
message.
STP Root Guard – Spanning Tree Root Guard is used to prevent an unauthorized
device from becoming the root of a spanning tree. Root guard functionality enables
detection and resolution of misconfigurations, while preventing loops or loss of
connectivity.
802.1x - MAC Authentication – MAC authentication like the 802.1X allows network
access to a device, for example, printers and IP phones, that do not have the 802.1X
supplicant capability. MAC authentication uses the MAC address of the connecting
device to grant or deny network access.
To support MAC authentication, the RADIUS authentication server maintains a
database of MAC addresses for devices that require access to th e netwo rk. In order
for the feature to be active, 802.1x must be in auto-mode.
User then can enable the MAC authentication feature in one of following modes:
• MAC Only – Where only MAC authentication is enabled
• MAC + 802.1x (In that case 802.1x takes precedence)
The feature can be enabled per port. The port must be a member of a guest VLAN
prior of activating the feature.
DHCP Snooping – DHCP Snooping expands network security by providing a
firewall security between untrusted interfaces and DHCP serv ers. By enabling
DHCP Snooping network administrators can identify between trusted interfaces
connected to end-users or DHCP Servers, and untrusted interface located beyond
the network firewall. DHCP Snooping creates and maintains a DHCP Snooping
Table which contains information received from untrusted packets. Interfaces are
untrusted if the packet is received from an interface from out side the network or from
a interface beyond the network firewall.
1
5
Introduction
1
DHCP Option 82 – DHCP server can insert information into DHCP requests. The
DHCP information is used to assign IP addresses to network interfaces.
IP Source Address Guard – IP source guard stops malignant network users from
using unallocated network IP addresses. IP Sou rce Guard ensures that only packet s
with an IP address stored in the DHCP Database are forwarded. IP address stored
in the DHCP Snooping Database are either statically configured by the network
administrator or are retrieved using DHCP. IP source guard can be enabled only on
DHCP snooping untrusted interface.
Dynamic ARP Inspection – ARP Inspection eliminates man-in-the-middle attacks,
where false ARP packets are inserted into the s ubnet. ARP req uests and responses
are inspected, and their MAC Address to IP Address binding is checked. Packets
with invalid ARP Inspection Bindings are logged and dro pped. Packet s are classified
as:
• Trusted — Indicates that the interface IP and MAC address are recognized, and
recorded in the ARP Inspec-tion List. Trusted packets are forward without ARP
Inspection.
• Untrusted — Indicates that the packet arrived fro m an interface that does no t have
a recognized IP and MAC addresses. The packet is checked for:
• Source MAC — Compares the packet’s source MAC address against the
sender’s MAC address in the ARP request. This check is performed on both
ARP requests and responses.
• Destination MAC — Compares the packet’s destination MAC address again st
the destination interface’s MAC address. This check is performed for ARP
responses.
• IP Addresses — Compares the ARP body for invalid and unexpected IP
addresses. Addresses include 0.0.0.0, 255.255.255.25 5, a nd al l I P Multi cas t
addresses. If the packet’s IP address was not found in the ARP Inspection
List, and DHCP snooping is enabled for a VLAN, a search of the DHCP
Snooping Database is performed. If the IP address i s found the packet is valid,
and is forwarded. ARP inspection is performed only on untrusted interfaces.
LLDP - The Link Layer Discovery Protocol (LLDP) allows network managers to
troubleshoot and enhance network management by discovering and maintaining
network topologies over multi-vendor environments. LLDP discovers network
neighbors by standardizing methods for network devices to advertise themselves to
other system, and to store discovered information. Device discovery information
includes:
• Device Identification
• Device Capabilities
• Device Configuration
The advertising device transmits multiple advertisement message sets in a single
LAN packet. The multiple advertisement sets are sent in the packet Type Length
Val ue (TLV) field. LLDP devices must support chassis and port ID advertisement, as
well as system name, system ID, system description, and system capability
6
Description of Software Features
advertisements
LLDP-MED – LLDP Media Endpoint Discovery (LLDP-MED) increases network
flexibility by allowing different IP systems to co-exist on a single network. Provides
detailed network topology information, including what device are located on the
network, and where the devices are located. For example, which IP phone is
connect to what port, which software is running on what switch, and which port is
connected to what PC.
Spanning Tree Protocol – The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol adds a level of fault
tolerance by allowing two or more redundant connections to be created between a
pair of LAN segments. When there are multiple physical paths between segments,
this protocol will choose a single path and disable all others to ensure that only one
route exists between any two stations on the network. This prevents the creation of
network loops. However, if the chosen path should fail for any reason, an alternate
path will be activated to maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the
convergence time for network topology changes to about 10% of tha t required by the
older IEEE 802.1D STP standard. It is intended as a compl ete replac ement fo r STP,
but can still interoperate with switches running the older standard by automatically
reconfiguring ports to STP-compliant mode if they detect STP protocol messages
from attached devices.
Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) – This protocol is a direct
extension of RSTP. It can provide an independent spanning tree for dif ferent VLANs.
It simplifies network management, provides for even faster conv ergence than RSTP
by limiting the size of each region, and prevents VLAN members from being
segmented from the rest of the group (as sometimes occurs with IEEE 802 .1D STP).
Virtual LANs – The switch supports up to 255 VLANs. A Virtual LAN is a collection
of network nodes that share the same broadcast domain rega rdless of the ir physical
location or connection point in the network. The switch supports tagged VLANs
based on the IEEE 802.1Q standard. Members of VLAN groups can be dynamically
learned via GVRP, or ports can be manually assigned to a specific set of VLANs.
This allows the switch to restrict traffic to the VLAN groups to which a user has been
assigned. By segmenting your network into VLANs, you can:
• Eliminate broadcast storms which severely degrade performance in a flat network.
• Simplify network management for node changes/moves by remotely configuring
VLAN membership for any port, rather than having to manually change the network
connection.
• Provide data security by restricting all traffic to the originating VLAN.
• Use private VLANs to restrict traffic to pass only between data ports and the upli nk
ports, thereby isolating adjacent ports within t he s ame VL AN, and al l owing you to
limit the total number of VLANs that need to be configured.
•
Use protocol VLANs to restrict traffic to specified interfaces based on protocol type.
1
7
Introduction
1
Traffic Prioritization – This switch prioritizes each packet based on the requi red
level of service, using eight priority queues with strict or Weighted Round Robin
Queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize inc oming traffic based on
input from the end-station application. These functions can
independent priorities for delay-sensitive data and best-effort data.
This switch also supports several common methods of prioritizing layer 3/4 traffic to
meet application requirements. Traffic can be prioritized based on the priority bits in
the IP frame’s Type of Service (ToS) octet or the number of the TCP/UDP port.
When these services are enabled, the priorities are mapped to a Class of Service
value by the switch, and the traffic then sent to the corresponding output queue.
Multicast Filtering – Specific mul ticast traffic can be assigned to it s own VLAN to
ensure that it does not interfere with normal network traffic and to guarantee
real-time delivery by setting the required priority level for the designated VLAN. The
switch uses IGMP Snooping and Query to manage multicast group registration.
Virtual Cable Testing (VCT) – VCT
occurrences, such as open cables and cable shorts.
MDI/MDIX Support – The device supports auto-detection between crossed and
straight-through cables. S tandard wiring for end stations is Media-Dependent
Interface (MDI) and the standard wiring for hubs and switches is known as
Media-Dependent Interface with Crossover (MDIX).
Quality of Service (QoS) Support – Network traffic is usually unpredictable, and
the only basic assurance that can be offered is Best Effort traffic delivery. To
overcome this challenge, Quality of Service (QoS) is applied throughout th e net wo rk.
This ensures that network traffic is prioritized accord ing to specified crit eria, and that
specific traffic receives preferen tial treat ment. QoS in the network opti mizes network
performance. The device supports the following QoS modes:
•Basic
• Advanced
Class Of Service 802.1p Support – The IEEE 802.1p signaling technique is an OSI
Layer 2 standard for marking and prioritizing network traffic at the data link/MAC
sub-layer. 802.1p traffic is classified and sent to the destination. No bandwidth
reservations or limits are established or enforced. 802.1p is a spin-off of the 802.1Q
(Vlans) standard. 802.1p establishes eight levels of priority, similar to the IP
Precedence IP Header bit-field.
Quality of Service Basic Mode – In the Basic QoS mode, it i s possible to a ctivate a
trust mode (to trust VPT, DSCP, TCP/UDP or none). In addition, a single Access
Control List can be attached to an interface.
Web Based Management – With web based management, the system can be
managed from any web browser. Th e s ystem contains an Embedded Web Server
(EWS), which serves HTML pages, through which the system can be monitored an d
configured. The system internally converts web-based input into configuration
commands, MIB variable settings and other management-related settings.
detects and reports copper link cabling
be used to provide
8
System Defaults
Remote Monitoring – Remote Monitoring (RMON) is an extension to SNMP,
which provides comprehensive network traff ic mon itoring cap abilities (a s opposed to
SNMP which allows network device management and monitoring). RMON is a
standard MIB that defines current and historical MAC-layer statistics and control
objects, allowing real-time information to be cap tured across the entire network.
VLAN Groups – Provides VLAN classification by MAC address, subnet , and
protocol groups.
Multicast TV – Supplies multicast transmis sions to L2-isolated subscribers, without
replicating the multicast transmissions for each subscriber VLAN
Port Based Authentication – Port based authentication enables authenticating
system users on a per-port basis via an external server. Only authenticated and
approved system users can transmit and receive data. Ports are authenticated via
the Remote Authentication Dial In User Service (RADIUS) server using the
Extensible Authentication Protocol (EAP).
1
System Defaults
The device is configured with default settings. To reset the device to the default
settings, delete the startup configura tion. The following table lists some of the basic
system defaults.
Table1-2. System Defaults
FunctionParameterDefault
Console Port
Connection
AuthenticationPrivileged Exec Levelno password
Baud Rate9600
Data bits8
Stop bits1
Parity0
Local Console Timeout10
Normal Exec Levelno password
Enable Privileged Exec from Normal
802.1x Port Authenticationdisabled
HTTPSdisabled
SSHdisabled
Port Securitydisabled
no password
9
Introduction
1
Table1-2. System Defaults
FunctionParameterDefault
SNMPCommunity Stringsno SNMP communities
Trapsdisabled
SNMP V3 View:
Port ConfigurationAdmin Statusenabled
Auto-negotiationon
Flow Controloff
Port Capabilitylist of all capabilities on port
AMAPStatusenabled
Common Phase Timeout Interval300 sec.
Discovery Phase Timeout Interval 30 sec.
Rate LimitingInput and output limitsdisabled
Port TrunkingStatic Trunksup to 8 port in 8 trunks can be defined
IGMP Snooping (Interface)disabled
Multicast TV VLANdisabled
SSHServerenabled
queue 1
Cos 3 - queue 1; CoS 4 - queue 2; Cos 5 queue 2
Cos 6 - queue 3; CoS 7 - queue 3;
no command line activity within 60 seconds
System Defaults
1
11
Introduction
1
Table1-2. System Defaults
FunctionParameterDefault
SSLServerenabled
RADIUSRADIUS servernone defined
TACACS+TACACS+ servernone defined
12
Chapter 2: Initial Configuration
This section describes the initial device configuration and includes the following
topics:
• General Configuration Information
• Booting the Switch
• Configuration Overview
• Advanced Configuration
• Software Download and Reboot
• Startup Menu Functions
After completing all external connections, connect a terminal to the device to monitor
the boot and other procedures. The order of installation and configuration
procedures is illustrated in the following figure. For the initial configuration, the
standard device configuration is performed. Other functio ns can be performed, but
doing so suspends the installation process and causes a system reboot.
Performing other functions is described later in this section.
13
2
Initial Configuration
Figure 2-1. Installation and Configuration
General Configuration Information
Your device has predefined features and setup configuration.
14
General Configuration Information
2
Auto-Negotiation
Auto-negotiation allows a device to advertise modes of operation and share
information with another device that shares a point-to-point link segment. This
automatically configures both devices to take maximum advantage of their abilities.
Auto-negotiation is performed completely within the physical layers during link
initiation, without any additional overhead to either the MAC or higher protocol
layers. Auto-negotiation allows the ports to do th e following:
• Advertise their abilities
• Acknowledge receipt and understanding of the common modes of operation that
both devices share
• Reject the use of operational modes that are not shared by both devices
• Configure each port for the highest-level operation al mode that both ports can
support
If connecting a port of the switch to the network interface card (NIC) of a terminal
that does not support auto-negotiation or is not set to auto-negotiation, both the
device port and the NIC must be manual ly set wi th the Web browser interfa ce or CLI
commands to the same speed and duplex mode.
Note:
If the station on the other side of the link attempts to auto-negotiate with a port that
is manually configured to full duplex, the auto-negotiation results in the station
attempting to operate in half duplex. The resulting mismatch may lead to
significant frame loss. This is inherent in the auto-negotiation standard.
Device Port Default Settings
The following table describes the device port default settings.
FunctionDefault Settings
Port speed and mode100 M or 1000M Auto-negotiation
Port forwarding stateEnabled
Head of line blocking preventionOn (Enabled)
Flow Control Off
Back PressureOff
These default settings can be modified once the device is installed.
Note:
The following is an example for changing the port speed on port g1 using CLI
commands:
1.Ensure that the device console is connected to a VT100 terminal device or
VT100 terminal emulator.
2.Deactivate the AC power receptacle.
3.Connect the device to the AC receptacle.
4.Activate the AC power receptacle.
When the power is turned on with the local terminal already connect ed, the switch
goes through Power On Self Test (POST). POST runs every time the device is
initialized and checks hardware components to determine if the device is fully
operational before completely booting. If a critical problem is detected, the program
flow stops. If POST passes successfully, a valid executable image is loaded into
RAM. POST messages are displayed on the terminal and indicate test success or
failure.
As the switch boots, the bootup test first counts the device memory availability and
then continues to boot. The following screen is an example of the displayed POST.
------ Performing the Power-On Self Test (POST) ------
BOOT Software Version x.x.x.xx Built 07-Jan-200x 10:53:05
Processor: xxxxxx xxxxx xxxx, xx MByte SDRAM.
I-Cache 8 KB. D-Cache 8 KB. Cache Enabled.
Autoboot in 2 seconds - press RETURN or Esc. to abort and enter prom.
The boot process runs approximately 30 seconds.
16
Booting the Switch
2
The auto-boot message that appears at the end of POST (see the last lines)
indicates that no problems were encountered during boot.
During boot, the St artup menu can be accessed if necessary to run special
procedures. To enter the Startup menu, press <Esc> or <Enter> within the first two
seconds after the auto-boot message is displayed. For information on the Startup
menu, see "Startup Menu Functions."
If the system boot is not interrupted by pressing <Esc> or <Enter>, the system
continues operation by decompressing and loading the code into RAM. The code
starts running from RAM and the list of numbered system ports and their states (up
or down) are displayed.
Note:
The following screen is an example configuration. Items such as addresses,
versions, and dates may differ for each device.
Preparing to decompress...
Decompressing SW from image-1
638000
OK
Running from RAM...
*********************************************************************
*** Running SW Ver. x.x.x.x Date 11-Jan-200x Time 15:43:13 ***
*********************************************************************
HW version is
Base Mac address is: 00:00:b0:24:11:80
Dram size is: xxM bytes
Dram first block size is: 47104K bytes
Dram first PTR is: 0x1200000
Flash size is: xM
Devices on SMI BUS:
------------------smi dev id = 16, dev type=0xd0411ab, dev revision=0x1
Device configuration:
Prestera based - Back-to-back system
Slot 1 - DB-DX240-24G HW Rev. xx.xx
Tapi Version: xx.x.x-x
Core Version: xx.x.x-x
01-Jan-200x 01:01:22 %INIT-I-InitCompleted: Initialization task is
completed
After the switch boots successfully, a system prompt appears (console>) and the
local terminal can be used to begin configuring the switch. However, before
17
2
Initial Configuration
configuring the switch, ensure that the sof tware version inst alled on the devi ce is the
latest version. If it is not the latest version, down load and install the latest version.
See "Software Download and Reboot."
Configuration Overview
Before assigning a static IP address to the device, obtain the following information
from the network administrator:
• A specific IP address allocated by the network administrator for the switch to be
configured
• Network mask for the network
There are two types of configuration: Initial configuration consists of configuration
functions with basic security considerations, whereas advanced configuration
includes dynamic IP configuration and more advanced security considerations.
After making any configuration changes, the new configuration must be saved
before rebooting. To save the configuration, enter the following CLI command:
Console# copy running-config startup-config4-365
Initial Configuration
Initial configuration, which starts after the device has booted successfully, includes
static IP address and subnet mask configuration, and setting user name and
privilege level to allow remote management. If the device is to be managed from an
SNMP-based management station, SNMP community strings must also be
configured. The following configurations are completed:
• Static IP Address and Subnet Mask
• Static Route Configuration
•User Name
• SNMP Community strings
Static IP Address and Subnet Mask
IP interfaces can be configured on each interface of the device. After entering the
configuration command, it is recommended to check if a interface was configured
with the IP address by entering the show ip interface command.
The commands to configure the device are interface specific.
To manage the switch from a remote network, a static route must be configured,
which is an IP address to where packets are sent when no entries are found in the
device tables. The configured IP address must belo ng to the same subne t as one of
the device IP interfaces.
18
Initial Configuration
2
T o confi gure a static route, enter the command at the system prompt as shown in the
following configuration example where 101.1.1.2 is the speci fic management stati on:
A user name is used to manage the device remotely, for example through SSH,
Telnet, or the Web interface. To gain complete administrative (super-user) control
over the device, the highest privilege level 15 must be specif ied.
Note:
Only the administrator (super-user) with the highest privilege level (15) is allowed
to manage the device through the Web browser interface.
For more information about the privilege level, see the Command Line Interface.
The configured user name is entered as a login name for remote management
sessions. To configure user name and privilege level, enter the command at the
system prompt as shown in the configuration example:
Console> enable
Console# configure
Console(config)# username admin password lee privilege 15
SNMP Community Strings
Simple Network Management Protocol (SNMP) provides a method for managing
network devices. Devices supporting SNMP run a local software (agent ). The SNMP
agents maintain a list of variables, used to manage the device. The variables are
defined in the Management Information Base (MIB). The MIB present s the variables
controlled by the agent. The SNMP agent defines the MIB specification format, as
well as the format used to access the information over the network.
Access rights to the SNMP agents are controlled by access strings and SNMP
community strings.
The device is SNMP-compliant and contains an SNMP agent that supports a set of
standard and private MIB variables. Developers of management st ations require t he
19
2
Initial Configuration
exact structure of the MIB tree and receive the complete private MIBs information
before being able to manage the MIBs.
All parameters are manageable from any SNMP management platform, except the
SNMP management station IP address and community (community name and
access rights). The SNMP management access to the switch is disabled if no
community strings exist.
Note:
The device switch is delivered with no community strings configured.
The following screen displays the default device configuration:
Console#
Community-String Community-Access IP address
---------------- ---------------- ----------
System Contact:
System Location:
show snmp4-531
The community-string, community-access, and IP address can be configured
through the local terminal during the initial configuration procedure.
The SNMP configuration options for the Community String are as follows:
• Access rights options: ro (read only), rw (read-and-write) or su (super).
• An option to configure IP address or not: If an IP address is not configured, it
means that all community members having the same community name a re granted
the same access rights.
Common practice is to use two community strings for the switch one (public
community) with read-only access and the other (priva te community) with re ad-write
access. The public string allows authorized management stations to retrieve MIB
objects, while the private string allows authorized management statio ns to retrieve
and modify MIB objects.
During initial configuration, it is recommended to configure the device according to
the network administrator requirements, in accordance with using an SNMP-based
management station.
To configure SNMP station IP address and community string(s) perform the
following:
1.At the console prompt, enter the command Enable. The prompt is disp layed as
#.
2.Enter the command configure and press <Enter>.
3.In the configuration mode, enter the SNMP configuration command with the
parameters including community name (privat e), community access right (read
and write) and IP address, as shown in the following example:
private readWrite 11.1.1.2
Traps are enabled.
Authentication-failure trap is enabled.
Trap-Rec-Address Trap-Rec-Community Version
---------------- ------------------ -------
System Contact:
System Location:
exit4-656
show snmp4-531
2
This completes the initial configuration of the device from a local terminal. The
configured parameters enable furth er dev ice con figurat io n fr om an y remote loc ati on.
Advanced Configuration
This section provides information about dynamic allocation of IP addresses and
security management based on the authentication, authorization, and accounting
(AAA) mechanism, and includes the following topics:
• Configuring IP Addresses through DHCP
• Configuring IP Addresses through BOOTP
• Security Management and Password Configuration
When configuring/receiving IP addresses through DHCP and BOOTP, the
configuration received from these servers includes the IP address, and may include
subnet mask and default gateway.
Retrieving an IP Address From a DHCP Server
When using the DHCP protocol to retrieve an IP address, the device acts as a
DHCP client. To retrieve an IP address from a DHCP server, perform the following
steps:
1.Select and connect any port to a DHCP server or to a subnet that has a DHCP
server on it, in order to retrieve the IP address.
2.Enter the following commands to use the selected port for receiving the IP
address. In the following example, the commands are based on the port type
used for configuration.
The interface receives the IP address automatically.
3.To verify the IP address, enter the show ip interface command at the system
prompt as shown in the following example.
Console#
Gateway IP
Address
-----------------------------
10.7.1.1 StaticActive
IP addressInterfaceTypeDirected Broadcast
-------------------------------------
10.7.1.192/24VLAN 1Static
Notes: 1.
show ip interface
TypeActivity status
The device configuration does not have to be deleted to retrieve an IP
address for the DHCP server.
2. When copying configuration files, avoid using a configuration file that
contains an instruction to enable DHCP on an interface that connects to the
same DHCP server, or to one with an identical configuration. In this instance,
the switch retrieves the new configuration file and boots from it. The device
then enables DHCP as instructed in the new configuration file, and the
DHCP instructs it to reload the same file again.
Receiving an IP Address From a BOOTP Server
The standard BOOTP protocol is supported and enables the swi t ch to aut omatic all y
download its IP host configuration from any stan dard BOOTP server in t he network.
In this case, the device acts as a BOOTP client.
To retrieve an IP address from a BOOTP server:
1.Select and connect any port to a BOOTP server or subnet containing such a
server, to retrieve the IP address.
2.At the system prompt, enter the delete startup con figuration command to delete
the startup configuration from flash. The device reboots with no configuration
22
Security Management and Password Configuration
and in 60 seconds starts sending BOOTP requests. The device receives the IP
address automatically.
Note:
When the device reboot begins, any input at the ASCII terminal or keyboard
automatically cancels the BOOTP process before completion and the device does
not receive an IP address from the BOOTP server.
The following example illustrates the process:
2
Console> enable4-368
Console#
Startup file was deleted
Console#
You haven’t saved your changes. Are you sure you want to continue (y/
n)[n]?
This command will reset the whole system and disconnect your current
session.Do you want to continue (y/n)[n]?
******************************************************
/*the device reboots */
delete startup-config4-368
reload4-612
To verify the IP address, enter the show ip interface command. The device is now
configured with an IP address.
Security Management and Password Configuration
System security is handled through the AAA (Authentication, Authorization, and
Accounting) mechanism that manages user access rights, privileges, and
management methods. AAA uses both local and remote user databases. Data
encryption is handled through the SSH mechanism.
The system is delivered with no default password configured; all passwords are
user-defined. If a user-defined password is lost, a p assword recovery procedure c an
be invoked from the S tartup menu. The proce dure is appli cable for the l ocal termi nal
only and allows a one-time access to the device from the local terminal with no
password entered.
Configuring Security Passwords Introduction
The security passwords can be configured for the following services:
• Console
•Telnet
•SSH
•HTTP
•HTTPS
Passwords are user-defined.
When creating a user name, the default priority is "1," which allows access but not
configuration rights. A priority of "15" must b e set to enable access an d configuration
rights to the device. Although user names can be assigned pri vilege lev el 15 without
23
2
Initial Configuration
a password, it is recommended to always assign a password. If there is no specified
password, privileged users can access the Web interface wit h any password.
Configuring an Initial Console Password
To configure an initial console password, enter the following commands:
When initially logging onto a device through a SSH session, enter jones at the
password prompt.
When changing a device mode to enable, enter jones.
24
Software Download and Reboot
Configuring an Initial HTTP Password
To configure an initial HTTP password, enter the following commands:
2
Console(config)# ip http authentication local4-293
Console(config)#
username admin password user1 level 154-297
Configuring an initial HTTPS Password
To configure an initial HTTPS password, enter the following commands:
Console(config)#
Console(config)#
ip https authentication local4-294
username admin password user1 level 154-297
Enter the following commands once when configuring to use a console, a Telnet, or
an SSH session in order to use an HTTPS session.
In the Web browser enable SSL 2.0 or greater for the content of the page to appear.
Console(config)# c
Console(config)#
rypto certificate generate key_generate 4-695
ip https server4-693
When initially enabling an http or https session, enter admin for user name and
user1 for password.
Note:
HTTP and HTTPS services require level 15 access and connect directly to the
configuration level access.
Software Download and Reboot
Software Download through XModem
This section contains instructions for downloading device sof tware (system and boot
images) using XModem, which is a data transfer protocol for updating back-up
configuration files.
To download a boot file using XModem:
1.Enter the command “xmodem:boot”. The switch is ready to receive the file via
the XModem protocol and displays text similar to the following:
Console# copyxmodem:boot4-365
Please download program using XMODEM.
console#
2.Speci fy the path of the source file within 20 seconds. If t he p at h is not spe cif ie d
within 20 seconds, the command times out.
To download a software image file using XModem:
1.Enter the command “xmodem:image”. The switch is ready to receive the file via
25
2
Initial Configuration
the XModem protocol.
2.Speci fy the path of the source file to begin t he transfer process. The following is
an example of the information that appears:
Console# copy xmodem:image4-365
Please download program using XMODEM
console#
Software Download Through TFTP Server
This section contains instructions for downloading device sof tware (system and boot
images) through a TFTP server. The TFTP server must be configured before
downloading the software.
The switch boots and runs when decompressing the system image from the flash
memory area where a copy of the system image is stored. When a new image is
downloaded, it is saved in the other area allocated for the additional system image
copy.
On the next boot, the switch decompresses and runs the currently active system
image unless chosen otherwise.
To download an image through the TFTP server:
1.Ensure that an IP address is configured on one of the device ports and pings
can be sent to a TFTP server.
2.Ensure that the file to be downloaded is saved on the TFTP server (the Image
file).
3.Enter the command “show version” to verify which software version is currently
running on the device. The following is an example of the information that
appears:
Console# show version4-619
SW version x.xx.xx (date xx-xxx-2004 time 13:42:41)Boot version
x.xx.x (date x-xxx-2003 time 15:12:20) HW version
4.Enter the command “show bootvar” to verify which system image is currently
active. The following is an example of the information that appears:
Console# show bootvar4-374
Images currently available on the Flash Image-1 active (selected
for next boot)Image-2 not active
Console#
5.Enter the command “copy tftp://{tftp address}/{file name} image” to copy a new
system image to the device. When the new image is downloaded , i t is saved in
26
Software Download and Reboot
the area allocated for the other copy of system image (image-2, as given in the
example). The following is an example of the informa tion that appears:
Console# copytftp://176.215.31.3/file1 image Accessing file
file1 on 176.215.31.3...4-365
Loading file1 from
176.215.31.3:!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!
Copy took 00:01:11 [hh:mm:ss]
Exclamation symbols indicate that a copying process is in progress. A period
indicates that the copying process is timed out. Many periods in a row indicate
that the copying process failed.
6.Select the image for the next boot by entering the boot system command.
After this command, enter the command show bootvar to verify that the copy
indicated as a parameter in the boot system command is selected for the
next boot. The following is an example of the information that appears:
Console# boot system image-24-372
Console# show bootvar4-374
Images currently available on the Flash
Image-1 active Image-2 not active (selected for next boot)
If the image for the next boot is not selected by entering the boot system
command, the system boots from the currently active image (image-1,as given
in the example).
7.Enter the command “reload”. The following message is displayed:
2
Console# reload4-612
This command will reset the whole system and disconnect your
current session.Do you want to continue (y/n)[n]?
8.Enter “Y” to reboot the switch.
Note:
For information on downloading software to stacking units, see "Configuring
Stacking".
Boot Image Download
Loading a new boot image from the TFTP server and programming it into the flash
updates the boot image. The boot image is loaded when the switch is powered on.
To download a boot file through the TFTP server:
1.Ensure that an IP address is configured on one of the device ports and pings
can be sent to a TFTP server .
2.Ensure that the file to be downloaded (the .rfb fi le) is saved on the TFTP serv er.
27
2
Initial Configuration
3.Enter the command “show version” to verify which boot version is currently
running on the device. The following is an example of the information that
appears:
Console# show version4-619
SW version x.xx.xx (date xx-xxx-2004 time 13:42:41)Boot version
x.xx.xx (date xx-xx-2004 time 15:12:20)HW version xx.xx.xx (date
xx-xxx-2004 time 12:12:20)
4.Enter the command “copy tftp://{tftp address}/{file name} boot” to copy the boot
image to the switch. The following is an example of the information that
appears:
5.Enter the command “reload”. The following message is displayed:
Console# reload4-612
This command will reset the whole system and disconnect your
current session. Do you want to continue (y/n)[n]?
6.Enter “Y” to reboot the switch.
Startup Menu Functions
Additional configuration functions can be performed from the Startup menu.
To display the Startup menu:
1.During the boot process, after the first part of the POST is completed press
<Esc> or <Enter> within two seconds after the foll owing message is displ ayed:
Autoboot in 2 seconds -press RETURN or Esc.to abort and enter prom.
The Startup menu is displayed and contains the following configuration
functions:
[1]Download Software
[2]Erase Flash File
[3]Erase Flash Sectors
[4]Password Recovery Procedure
[5]Enter Diagnostic Mode
[6]Back Enter your choice or press 'ESC' to exit:
28
Startup Menu Functions
The following sections describe the Startup menu options. If no selection is made
within 25 seconds (default), the switch times out and the device continues to load
normally.
Only technical support personnel can operate the Diagnostics Mode. For th is
reason, the Enter Diagnostic Mode option of the Startup menu is not described in
this guide.
Download Software
Use the software download option when a new software version must be
downloaded to replace corrupted files, update, or upgrade the system software.
To download software from the Startup menu:
1.On the Startup menu, press “1”.
The following prompt is displayed:
Downloading code using XMODEM
2.When using HyperTerminal, click Transfer on the HyperTerminal menu bar.
3.From the Transfer menu, click Send File. The Send File window is displayed.
2
Figure 2-2. Send File window
4.Enter the file path for the file to be downloaded.
5.Ensure the protocol is defined as Xmodem.
6.Click Send.
The software is downloaded. Software downloa ding takes severa l minutes. The
terminal emulation application, such as HyperTerminal, may display the
progress of the loading process.
29
2
Initial Configuration
After software downloads, the device reboots automatically.
Erase FLASH File
In some cases, the device configuration must be erased. If the configuration is
erased, all parameters configured via CLI, Web brows er interface, or SNMP must be
reconfigured.
To erase the device configuration:
1.From the Startup menu, press “2” within 6 seconds to erase flash file. The
following message is displayed:
Warning! About to erase a Flash file.
Are you sure (Y/N)?y
2.Press “Y”.
Note:
Do not press <Enter>.
The following message is displayed.
Write Flash file name (Up to 8 characters, Enter for none.):config
File config (if present) will be erased after system initialization
========Press Enter To Continue ========
3.Enter config as the name of the flash file. The configuration is erased and the
device reboots.
4.Perform the switch’s initial configuration.
Erase FLASH Sectors
For troubleshooting purposes, the flash sectors may need to be erased. If the flash
is erased, all software files must be downloaded and installed again.
To erase the FLASH:
1.From the Startup menu, press “3” within 6 seconds. The following message is
displayed:
Warning! About to erase Flash Memory! FLASH size =16252928.blocks =64
Are you sure (Y/N)
2.Confirm by pressing <Y>. The following message is displayed:
Enter First flash block (1 -63):
3.Enter the first flash block to be erased and press <Enter>. The following
message is displayed:
Enter Last flash block (1 -63):
30
Startup Menu Functions
2
4.Enter the last flash block to be erased and press <Enter>. The following
message is displayed:
Are you sure (Y/N)
5.Confirm by pressing <Y>. The following message is displayed:
Erasing flash blocks 1 -63: Done.
Password Recovery
If a password is lost, use the Password Recovery option on the Startup menu. The
procedure enables the user to enter the device once without a password.
To recover a lost password for the local terminal only:
1.From the St artup menu, select “4” and press <Enter>. The p assword is deleted.
2.To ensure device security, reconfigure passwords for applicable management
methods.
31
2
Initial Configuration
32
Chapter 3: Configuring the Switch
Using the Web Interface
This switch provides an embedded HTTP Web agent. Using a We b browser you can
configure the switch and view statistics to monitor network activity. The Web agent
can be accessed by any computer on the network using a standard Web browser
(Internet Explorer 6.0 or above, or Netscape Navigator 6.2 or above).
You can also use the Command Line Interface (CLI) to manage the switch over a
Note:
serial connection to the console port or via Telnet.For more information on using
the CLI, refer to Chapter 4: “Command Line Interface.”
Prior to accessing the switch from a Web browser, be sure you have first performed
the following tasks:
1.Configure the switch with a valid IP address, subnet mask, and defaul t gateway
using an out-of-band serial connection, BOOTP or DHCP protocol.
2.Set user names and passwords using an out-of-band serial connection. Access
to the Web agent is controlled by the same user names and passwords as the
onboard configuration program.
3.After you enter a user name and password, you wil l hav e access to the system
configuration program.
Notes: 1.
If you log into the CLI interface as guest (Normal Exec level), you can view
the configuration settings or change the guest password. If you log in as
“admin” (Privileged Exec level), you can change the settings on any page.
2. If the path between your management station and this switch does not pass
through any device that uses the Spanning Tree Algorithm, then you can set
the switch port attached to your management station to fast forwarding (i.e.,
enable Admin Edge Port) to improve the switch’s response time to
management commands issued through the web interface.
Navigating the Web Browser Interface
To access the web-browser interface you must first enter a user name and
password. The administrator has Read/Write access to all co nfigurat i on p arame ters
and statistics.
Home Page
When your web browser connects with the switch’s web agent, the home page is
displayed as shown below. The home page displays the Main Menu on the lef t side
of the screen and System Information on the right side. The Main Menu links are
33
Configuring the Switch
3
used to navigate to other menus, and display configuration parameters and
statistics.
Figure 3-3. Home Page
Configuration Options
Configurable parameters have a dialog box or a drop-down list. Once a conf iguration
change has been made on a page, be sure to click on the “Apply” or “Apply
Changes” button to confirm the new set ting. The following t able summarizes the web
page configuration buttons:
Table 3-1.
Add Adds new device configuration information.
ModifyModifies existing device configuration information.
ApplySaves new or modified configuration information to the device.
Delete CheckboxDelet es current device configuration information.
Test NowPerforms either copper or fiber cabl e te s t s .
Clear CountersClears device statistics.
Notes: 1.
34
To ensure proper screen refresh, be sure that Internet Explorer 5.x is
configured as follows: Under the menu “Tools / Internet Options / General /
Temporary Internet Files / Settings,” the setting for item “Check for newer
versions of stored pages” should be “Every visit to the page.”
2. When using Internet Explorer 5.0, you may have to manually refresh the
screen after making configuration changes by pressing the browser’s refresh
button.
Navigating the Web Browser Interface
3
Panel Display
The web agent displays an image of the switch’s ports. The Mode can be set to
display different information for the ports, including Active (i.e., up or down), Duplex
(i.e., half or full duplex, or Flow Control (i.e., with or without flow control). Cli cking on
the image of a port opens the Interface Configuration Page as described on page
3-71.
Figure 3-4. Ports Panel
Main Menu
Using the onboard web agent, you can define system parameters, manage and
control the switch, and all its ports, or monitor network conditions. The following
table briefly describes the selections available from this program:
Table 3-2. EWS Menu Options
System
System ManagementProvides system information including the general device
InterfacesProvides information for configuring the device interfaces.
IP AddressingProvides information for configuring IP addressing. In additi on, this
SNMPProvides information for configuring SNMP.
Web View ManagementProvides information for configuring system passwords, and web
RMONProvides information for viewing RMON statistics.
Network DiscoveryProvides Information for configuring the LLDP and the AMAP
PhysicalProvides information for managing Power-over-Ethernet devices
EthernetProvides information for managing PoE devices and viewing PoE
DiagnosticsProvides information for performing copper and f iber cable tests,
Security
information, stacking information, system logs, system time
parameters, and parameters for managing system files.
section contains information for defining ARP, DHCP, and DNS
settings.
access.
protocols.
and system diagnostics.
statistics.
performing port mirroring, and viewing device health information.
35
Configuring the Switch
3
Table 3-2. EWS Menu Options
Traffic ControlProvides in formation for configuring Broadcast Storm Control and
802.1XProvides information for configuring 802.1X port authentication.
Access ControlProvides information for configuring Access Control Lists and
DHCP SnoopingBuilds and maintains a binding table used b y DHCP Sn ooping , th e
Layer 2
Address TablesProvides information for defining static and dynamic addresses.
Spanning TreeProvides information for configuring the Spanning Tree Protocol,
VLANProvides information for defining VLANs, including VLAN groups,
MulticastProvides information for configuring Multicast Groups, Multicast
Policy
General QoSProvides information for configuring the QoS general mode
Basic ModeProvides information for configuring the QoS basic mode.
Advanced ModeProvides information for configuring the QoS advanced mode.
port security.
Access Control Entries, as well as, information for binding ACLs to
interfaces.
ARP Inspection and IP Source Guard features.
the Rapid Spanning Tree, and Multiple Spanning T ree.
GARP, and GVRP.
Forwarding, and IGMP snooping.
Managing Device Information
In the System Information Page, you can easily identify the syste m by disp laying the
device name, location and contact information.
Command Attributes
• Model Name — Displays the device model number and name.
• System Name — Defines the user-defined device name. The field range is 0-160
characters.
• System Location — Defines the location where the system is currently running.
The field range is 0-160 characters.
• System Contact — Defines the name of the contact person. The field range is
0-160 characters.
• System Object ID — Displays the vendor’s authoritative identification of the
network management subsystem contained in the entity.
• System Up Time — Displays the amount of time since the most recent device
reset. The system time is displayed in the following format: Days, Hours, Minutes ,
and Seconds. For example, 41 days, 2 hours, 22 minutes and 15 seconds.
• Base MAC Address — Displays the device MAC address.
• Hardware Version — Displays the installed device hardware version number.
36
Managing Stacking
• Software Version — Displays the installed software version number.
• Boot Version — Displays the current boot version running on the device.
Web – Click System, System Management, System Information. Spe cify the system
name, location, and contact information for the system administrator, then click
Apply.
Figure 3-5. System Information Page
3
CLI – The following is an example of the CLI System Information commands:
console# showsystem
4-618
Managing Stacking
Stacking provides multiple switch management through a single point as if all stack
members are a single unit. All stack members are accessed through a single IP
address through which the stack is managed. The stack is managed from the
following:
• Web-based interface
• SNMP Management Station
• Command Line Interface (CLI)
Devices support stacking up to six units per stack, or can operate as stand-alone
units.
During the Sta cking setup, one switch is selected as the Stacking Master and
another stacking member can be selected as the Secondary Master. All other
devices are selected as stack members, and assigned a unique Unit ID.
37
Configuring the Switch
3
Switch software is downloaded separately for each stack members. However, all
units in the stack must be running the same software version.
Switch stacking and configuration is maintained by the Stacking Master. The
Stackin g Master det ects and configures the ports with minimal ope ra tiona l impact in
the event of:
• Unit Failure
• Inter-unit Stacking Link Failure
•Unit Insertion
• Removal of a Stacking Unit
This section provides an introduction to the user interface, and includes the following
topics:
• Understanding the Stack Topology
• Stacking Failover Topology
• Stacking Members and Unit ID
• Removing and Replacing Stacking Members
• Exchanging Stacking Members
• Switching between the Stacking Master and the Secondary Master
Understanding the Stack Topology
The devices operate in a Ring topology. A stacked Ring topology is where all
devices in the stack are connect ed to each other formi ng a circl e. Each device in the
stack accepts data and sends it to the device to which it is attached. The packet
continues through the stack until it reache s its des tination. The system discovers the
optimal path on which to send traffic.
Most difficulties incurred in Ring topologies occ ur when a device in t he ring becomes
non-functional, or a link is severed. In a stack, the system automatically switches to
a Stacking Failover topology without any system downtime. An SNMP message is
automatically generated, but no stack managemen t action is requ ired. However, the
stacking link or stacking member must be rep aired to ensure the stacking integrity.
After the stacking issues are resolved, the device can be reconnected to the stack
without interruption, and the Ring topology is restored.
Stacking Failover Topology
If a failure occurs in the stacking topology, the stack reverts to Stacking Failover
Topology. In the Stacking Failover topology, devices operate in a chain formation.
The Stackin g Master determines where the packet s are sent. Each unit is conne cted
to two neighboring devices, except for the top and bottom units.
Stacking Members and Unit ID
Stackin g Unit I Ds a re esse nt ial t o t he stacking configuration. The stacking operation
is determined during the boot process. The operation mode is determined by the
Unit ID selected during the initialization process. Stacking LEDs are dual mode
38
Managing Stacking
LEDS. During bootup, the Stacking LEDs indicate the stacking Unit number. When
the device is running, the stack ID selector displays the unit ID number. Pressing a
second time displays the port speed. For example, if the user selected s tand-alone
mode, the device boots in the boot-up process as a stand-alone device.
The device units are shipped with a default Unit ID of the stand-alone unit. If the
device is operating as a stand-alone unit , all stacking LEDs are off.
Once the user selects a different Unit ID, it is not erased, and remains valid, even if
the unit is reset.
Unit ID 1 and Unit ID 2 are reserved for Master enabled units. Unit IDs 3 to 8 can be
defined for stack members.
When the Master unit boots or when inserting or removing a stack member, the
Master unit initiates a stacking discovering process.
Note:
If two members are discovered with the same Unit ID the stack continues to
function, however only the unit with the older join time joins the stack. A message
is sent to the user, notifying that a unit failed to join the stack.
3
Removing and Replacing Stacking Members
Stackin g member 1 and Stacking member 2 are Stacking Master enabled units. Unit
1 and Unit 2 are either designated as Master Unit or Secondary Master Unit. The
Stacking Master assignment is performed during the configuration process. One
Master enabled stack member is elected Master, and the other Master enabled
stack member is elected Secondary Master, according to the following decision
process:
• If only one Stacking Master enabled unit is present, it is elected Stacking Master.
• If two Stacking Masters enabled stacking members are present, and one has been
manually configured as the Stacking Master, the manually configured member is
elected Stacking Master.
• If two Master enabled units are present and neither has been manuall y configured
as the Stacking Master, the one with the longer up-t ime is elected Stacking Maste r.
• If the two Master enabled stacking members are the same age, Unit 1 is elected
Stacking Master.
• Two stacking member are considered the same age if they were insert ed within the
same ten minute interval.
For example, Stack member 2 is inserted in the first minute of a ten-minute cycle,
and Stack member 1 is i nserted in fifth minute of the same cycle, the units are
considered the same age. If there are two Master enabled units tha t are the same
age, then Unit 1 is elected Stacking Master.
The Stacking Master and the Secondary Master maintain a Warm Standby. The
Warm Standby ensures that the Secondary Master takes over for the Stacking
Master if a failover occurs. This guarantees that the stack continues to operate
normally.
During the Warm Standby, the Master and the Secondary Master are synchronized
with the static configuration only. When the Stacking Master is configured, the
39
Configuring the Switch
3
Stacking Master must synchronize the Stacking Secondary Master. The Dynamic
configuration is not saved, for exampl e, dynamically l earned MAC addresses are n ot
saved.
Each port in the stack has a specific Unit ID, port type, and port number, which is
part of both the configuration commands and the configuration files. Configuration
files are managed only from the device Stacking Master, including:
• Saving to the FLASH
• Uploading Configuration files to an external TFTP Server
• Downloading Configuration files from an external TFTP Server
Whenever a reboot occurs, topology discovery is performed, and the master learns
all units in the stack. Unit IDs are sa ved in the un it and are l earned t hrough t opolog y
discovery. If a unit attempts to boot without a selected Master, and the unit is not
operating in stand-alone mode, the unit does not boot.
Configuration files are changed only through explicit user configuration.
Configuration files are not automatically modified when:
• Units are Added
• Units are Removed
• Units are reassigned Unit IDs
• Units toggle between Stacking Mode and Stand-alone Mode
Each time the system reboots, the Startup Configuration file in the Master unit is
used to configure the stack. If a stack member is removed from the stack, and then
replaced with a unit with the same Unit ID, the stack member is configured with the
original device configuration. Only ports which are physically present are displayed
in the home page, and can be configured through the WebViewMgmt system.
Non-present ports are configured through the CLI or SNMP interfaces.
Exchanging Stacking Members
If a stack member with the same Unit ID replaces an existing Unit ID with the same
Unit ID, the previous device configurati on is a ppl ied to the i nse rt ed st a ck me mber. If
the new inserted device has either more than or less ports than t he previous device,
the relevant port configuration is applied to the new stack member.
Switching between the Stacking Master and the Secondary Master
The Secondary Master replaces the Stacking Master if the following events occur:
• The Stacking Master fails or is removed from the stack.
• Links from the Stacking Master to the stacking members fails.
• A soft switchover is performed with either via web interface or the CLI.
Switching between the Stacking Master and the Secondary Master results in a
limited service loss. Any dynamic tables are relearned if a failure occurs. The
running configuration file is synchronized between Stacking Master and the
Secondary Master, and continues running on the Secondary Master.
40
Managing Stacking
3
Configuring Stacking
The St ack Management Topology Page allows network managers to either reset the
entire stack or a specific device. Device configuration changes that are not saved
before the device is reset are not saved. If the Stacking Master is reset, the entire
stack is reset.
Command Attributes
• Top Unit — Indicates the first stack member’s number. Possible values are Master
and 1-8.
• Bottom Unit — Indicates the second stack member’s number. Possible values are
Master and 1-8.
• Stack Order — Displays the number of the unit within the stack.
• Neighbor 1 — Indicates the first stack member of the stack.
• Neighbor 2 — Indicates the second stack member of the stack.
• Switch Stack Control from Unit 1 to Unit 2 — Switches the stack control from
the Stack Master to the Secondary Stack Master. The possible field values are:
• Checked — Enables switching the st ack control to the Secondary Stack Maste r.
• Unchecked — Maintains the current stacking control.
Web – Click System, System Management, Stack Management, Topology. Specify
the upper and lower stacking members, then click Apply.
Figure 3-6. Stack Management Topology Page
It is recommended to upgrade software on all units in a stack simultaneously. Use
the following steps:
41
Configuring the Switch
3
1.Download the file
2.Open the File Download Page.
3.Select the Firmware Download field.
4.Enter full path and file name of software to be downloaded to device.
5.Select Download to all Units.
6.Reset the stack.
CLI – The following is an example of stack management commands:
Console(config)# stack master unit 2
4-613
Console(config)# stack display-order top 6 bottom 1
4-614
Resetting the Stack
The Stack Management - Reset Page resets the stack.
Command Attributes
• Reset Unit No — Indicates the unit to be reset.
Web – Click System, System Management, Stack Management, Reset page. Click
the Reset button.
42
Figure 3-7. Stack Management - Reset Page
Managing System Logs
CLI – The following is an example of stack reset commands:
Console(config)# stack reload unit 2
4-614
3
Managing System Logs
The switch allows you to control the loggi ng of error messages, i ncludi ng th e type of
events that are recorded in switch memory, logging to a remote System Log (syslog)
server, and di splays a list of recent event messages.
The default for all logs is information, with the exception of logs in the Remote Log
Server, which are errors.
LevelSeverity NameDes cription
7DebugDebugging messages
6InformationalInformational messages only
5NoticeNormal but significant condition, such as cold
The Logs Settings Pagecontains fields for defining which events are recorded to
which logs. It contains fields for enabling logs globally, and parameters for defining
logs. The Severity log messages are listed from the highest severity to the lowest.
When a severity level is selected, all severity level choices above the selection are
selected automatically.
Command Attributes
• Enable Logging — Indicates if devic e global logs for Cache and File are enabled.
Console logs are enabled by default. The possible field values are:
• Checked — Enables device logs.
• Unchecked — Disables device logs.
• Severity — The following are the available severity logs:
43
Configuring the Switch
3
• Emergency — Indicates the highest warning level. If the device i s do wn or not
functioning properly, an emergency log message is saved to the specified
logging location.
• Alert — Indicates the second highest warning level. An alert log is saved, if there
is a serious device malfunction; for example, all device features are down.
• Critical — Indicates the third highest warning level. A critical log is saved if a
critical device malfunction occurs; for example, two device ports are not
functioning, while the rest of the device ports remain functional.
• Error — Indicates that a device error has occurred, for example, if a single port
is offline.
• Warning — Indicates the lowest level of a device warning. The device is
functioning, but an operational problem has occurred.
• Notice — Provides device information, for example, a port is not operating.
• Informational — Provides device information.
• Debug — Provides debugging messages.
• Console — Defines the minimum severity level from which logs are sent to the
console.
• RAM Logs — Defines the minimum severity level from which logs are sent to the
Event Log kept in RAM (Cache).
• Log File — Defines the minimum severity level from which logs are sent to the
Message Log kept in FLASH memory.
Web – Click System, System Management, Logs, Log Settings, and enable logs.
Figure 3-8. Logs Settings Page
CLI – The following is an example of the CLI commands used to view system logs:
The system allows you to enable or disable event logging, and specify which levels
are logged to the RAM (Cache).
Severe error messages that are logged to the RAM are permanently stored in the
switch to assist in troubleshooting network problems. When a severity level is
selected, all severity level choices above the selection are selected automatically.
The Memory Page allows you to configure and limit system messages that are
logged to the RAM.
Command Attributes
• Log Index — Displays the log number.
• Log Time — Displays the time at which the log was generated.
• Severity — The following are the available log severity levels:
• Emergency — The highest warning level. If t he device is down or not functioning
properly, an emergency log message is saved to the specified l ogging locati on.
• Alert — The second highest warning level. An alert log is saved, if there is a
serious device malfunction; for example, all device features are down.
• Critical — The third highest warning level. A critical log is saved if a critical
device malfunction occurs; for example, two device ports are not functioning,
while the rest of the device ports remain functional.
• Error — A device error has occurred, for example, if a single port is offline.
• Warning — The lowest level of a device warning. The device is functio ning, but
an operational problem has occurred.
• Notice — Provides device information.
• Informational — Provides device information.
• Debug — Provides debugging messages.
• Description — Displays the log message text.
Web – Click System, System Management, Logs, Memory.
45
Configuring the Switch
3
Figure 3-9. Memory Page
46
Managing System Logs
3
CLI – The following is an example of the CLI comma nds used to vie w me mory logs:
Console# show logging
4-599
Logging is enabled.
Console logging: level debugging. Console Messages: 0 Dropped
(severity).
Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max.
File logging: level notifications. File Messages: 0 Dropped (severity).
Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped
(severity).
Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped
(severity).
2 messages were not logged (resources)
Application filtering control
Application Event Status
----------- ----- -----AAA Login Enabled
File system Copy Enabled
File system Delete-Rename Enabled
Management ACL Deny Enabled
Buffer log:
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed
state to up
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/0, changed
state to up
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/1, changed
state to up
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/2, changed
state to up
11-Aug-2004 15:41:43: %LINK-3-UPDOWN: Interface Ethernet1/3, changed
state to up
11-Aug-2004 15:41:43: %SYS-5-CONFIG_I: Configured from memory by console
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface
Ethernet1/0, changed state to down
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface
Ethernet1/1, changed state to down
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface
Ethernet1/2, changed state to down
11-Aug-2004 15:41:39: %LINEPROTO-5-UPDOWN: Line protocol on Interface
Viewing the Device FLASH Logs
The FLASH Logs Page contains all system logs in a chronological order that are
saved in FLASH memory.
Command Attributes
•Log Index — Displays the log number.
•Log Time — Displays the time at which the log was generated.
•Severity — Displays the log severity.
•Description — Displays the log message text.
47
Configuring the Switch
3
Web – Click System, System Management, Logs, Flash.
Figure 3-10. FLASH Logs Page
CLI – The following is an example of the CLI commands used to display FLASH
The Remote Log Page allows you to configure the logging of messages that are
sent to syslog servers or other management stations. You can also limit the event
messages sent to only those messages at or above a specified level.
Command Attributes
• Server — Specifies the IP address of the server to which logs can be sent.
• UDP Port — Defines the UDP port to which the server logs are sent. The possible
range is 1 - 65535. The default value is 514.
• Facility — Defines an application from which system logs are sent to the remote
server. Only one facility can be assigned t o a single server. If a second facil ity level
48
Managing System Logs
is assigned, the first facility is overridden. All applications defined for a device
utilize the same facility on a server. The field default is Local 7. The possible field
values are Local 0 - Local 7.
• Description— Displays the user-defined server description.
• Minimum Severity — Indicates the minimum severity from which logs are sent to
the server. For example, if Notice is selec ted, all logs with a severity level of Notice
and higher are sent to the remote server.
• Remove — Deletes the currently selected server from the Servers list. The
possible field values are:
• Checked — Removes the selected server from the Remote Log Page. Once
removed, logs are no longer sent to the removed server.
• Unchecked — Maintains the remote servers.
Web – Click System, System Management, Logs, Remote Logs. Specify Remote
Log Statu s.
3
Figure 3-11. Remote Log Page
CLI – Enable system logging and then specify the level of messa ges to be logged to remote logs. Use the show logging command to display the current settings.
49
Configuring the Switch
3
Console# show logging file
4-601
Logging is enabled.
Console logging: level debugging. Console Messages: 0 Dropped
(severity).
Buffer logging: level debugging. Buffer Messages: 11 Logged, 200 Max.
File logging: level notifications. File Messages: 0 Dropped (severity).
Syslog server 192.180.2.27 logging: errors. Messages: 6 Dropped
(severity).
Syslog server 192.180.2.28 logging: errors. Messages: 6 Dropped
(severity).
2 messages were not logged (resources)
Application filtering control
Buffer log:
11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface FastEthernet0/0, changed
state to up
11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface Ethernet1/0, changed
state to up
11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface Ethernet1/1, changed
state to up
11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface Ethernet1/2, changed
state to up
11-Aug-2004 15:41:43:%LINK-3-UPDOWN: Interface Ethernet1/3, changed
state to up
11-Aug-2004 15:41:43:%SYS-5-CONFIG_I: Configured from memory by console
11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface
FastEthernet0/0, changed state to up
11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface
Ethernet1/0, changed state to down
11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface
Ethernet1/1, changed state to down
11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface
Ethernet1/2, changed state to down
11-Aug-2004 15:41:39:%LINEPROTO-5-UPDOWN: Line protocol on Interface
Ethernet1/3, changed state to down
50
Configuring SNTP
3
Configuring SNTP
Simple Network Time Protocol (SNTP) allows the switch to set its internal clock
based on periodic updates from a time server (SNTP or NTP). Maintaining an
accurate time on the switch enables the system log to record meaningful dates and
times for event entries. You can also manually set the clock using the CLI. If the
clock is not set, the switch will only record the time from th e factory defa ult set at t he
last bootup.
Note:
The system time is not saved in NVRAM.
The device can poll the following server types for the server time:
• Unicast
• Anycast
• Broadcast
Time sources are established by stratums. Stratums define the accuracy of the
reference clock. The higher the stratum (where zero is the highest), the more
accurate the clock is. The device receives time from stratum 1 and above.
The following is an example of stratums:
•Stratum 0 — A real time clock (such as a GPS system) is used as the time
source.
•Stratum 1 — A server that is directly linked to a Stratum 0 time source is used.
Stratum 1 time servers provide primary network time standards.
•Stratum 2 — The time source is distanced from the Stratum 1 server over a
network path. For example, a Stratum 2 server receives the time over a network
link, via NTP, from a Stratum 1 server.
Information received from SNTP servers is evaluated based on the Time level and
server type. SNTP time definitions are assessed and determined by the following
time levels:
•T1 — The time at which the original request was sent by the client.
•T2 — The time at which the original request was received by the server.
•T3 — The time at which the server sent the client a reply.
•T4 — The time at which the client received the server's reply.
Polling for Unicast Time Information
Polling for Unicast information is used for polling a server for which the IP addre ss is
known. T1 - T4 are used to determine the server time. This is the preferred method
for synchronizing device time.
Polling for Anycast Time Information
Polling for Anycast information is used when the server I P add ress i s unknown . The
first Anycast server to return a response is used to set the time va lue. T ime levels T3
and T4 are used to determine the server time. Using Anycast time information for
synchronizing device time is preferred to using Broadcast time information.
51
Configuring the Switch
3
Polling For Broadcast Time Information
Broadcast information is used when the server IP address is unknown. When a
broadcast message is sent from an SNTP server, the SNTP client listens for the
response. The SNTP client neither sends time information requests nor receives
responses from the Broadcast server.
Message Digest 5 (MD5) Authentication safeguards de vice synchronizatio n paths to
SNTP servers. MD5 is an algorithm that produces a 128 -bit hash. MD5 is a variat ion
of MD4, and increases MD4 security. MD5 verifies the integrity of the
communication, authenticates the origin of the communi cation.
Defining SNTP Global Settings
The SNTP Configuration Page provides information for defining SNTP parameters
globally.
Command Attributes
• Poll Interval — Defines the interval (in seconds) at which the SNTP server is
polled for Unicast information. The Poll Interval default is 1024 seconds.
• Enable Receive Broadcast Servers Up da tes — Defines whether or not the
device monitors the SNTP servers for the interface’s Broadcast server time
information. The possible values are:
• Checked — Enables the device to receive Broadcast server updates.
• Unchecked — Disables the device from receiving Broadcast server updates.
• Enable Receive Anycast Servers Updates— Defines whethe r or not the device
polls the SNTP server for Anycast server time information. If both the Enable
Receive Anycast Servers Update and the Enable Receive Broadcast Servers
Update fields are enabled, the system time is set according the Anycast server time
information. The possible values are:
• Checked — Enables the device to receive Anycast server updates.
• Unchecked — Disables the device from receiving Anycast server updates.
• Enable Receive Unicast Servers Updates — Defines whether or not the devi ce
polls the SNTP server for Unicast server time information. If the Enable Receive
Broadcast Servers Updates, Enable Receive Anycast Servers Updates, and
Enable Receive Unicast Servers Updates fields a re all enabled, the system time is
set according the Unicast server time information. The possible values are:
• Checked — Enables the device to receive Unicast server updates.
• Unchecked — Disables the device from receiving Unicast server updates.
• Enable Poll Unicast Servers — Defines whether or not the device sends SNTP
Unicast forwarding information to the SNTP server. The possible values are:
• Checked — Enables the device to receive Poll Unicast server updates.
• Unchecked — Disables the device from receiving Poll Unicast server updates.
Web – Select System, System Management, SNTP, Configuration. Define the fields
and click Apply.
52
Configuring SNTP
Figure 3-12. SNTP Configuration Page
CLI - The following is an example of the SNTP global parameters commands:
The SNTP Authentication Page provides parameters for defining the means by
which the SNTP server is authenticated.
Command Attributes
• Enable SNTP Authentication — Indicates if authenticating an SNTP session
between the device and an SNTP server is enabled on the device. The possible
field values are:
• Checked — Authenticates SNTP sessions between the device and SNTP
server.
• Unchecked — Disables authenticating SNTP sessions between the device and
SNTP server.
• Encryption Key ID— Indicates if the encryption key identification is used to
authenticate the SNTP server and device. The field value is up to 4294967295.
53
Configuring the Switch
3
• Authentication Key— Indicates the key used for authentication.
• Trusted Key— Indicates the encryption key used (Unicast/Anycast) or elected
(Broadcast) to authenticate the SNTP server.
• Remove — Removes Encryption Key IDs. The possible field values are:
• Checked — Removes the selected Encryption Key ID
• Unchecked— Maintains the Encryption Key IDs. This is the default value.
Web – Select System, System Management , SNTP, Authentication. Define the fields
and click Apply.
Figure 3-13. SNTP Authentication Page
CLI - The following is an example of the SNTP authentication commands:
The SNTP Servers Page cont ains in formation for enabli ng SNTP servers, as well as
adding new SNTP servers. In addition, the SNTP Servers Page enables the device
to request and accept SNTP traffic from a server.
Command Attributes
• SNTP Server— Displays user-defined SNTP server IP addresses. Up to eight
SNTP servers can be defined.
• Poll Interval— Indicates whether or not the device polls t he selected SNTP server
for system time information.
54
Configuring SNTP
• Encryption Key ID— Displays the encryption key identification used to
communicate between the SNTP server and device. The field range is
1-4294967295.
• Preference — Indicates the SNTP server providing SNTP system time
information. The possib le fie l d v al u es are:
• Primary — Indicates the primary server provides SNTP information.
• Secondary — Indicates the backup server provides SNTP information.
• Status — Displays the SNTP server operating status.
• Last Response — Displays the last time a response was received from t he SNTP
server.
• Offset — Indicates the time difference between the device local clock and the
acquired time from the SNTP server.
• Delay — Indicates the amount of time it takes for a device request to reach the
SNTP server.
• Remove — Removes SNTP servers from the SNTP server list. The possible field
values are:
• Checked — Removes the SNTP server.
• Unchecked — Maintains the SNTP server.
Web – Select System, System Management, SNTP, Servers. Define the fields and
click Apply.
3
Figure 3-14. SNTP Servers Page
55
Configuring the Switch
3
CLI - The following is an example of the SNTP server commands:
Console(config)# sntp server 192.1.1.1
4-360
Defining SNTP Interface Settings
TheSNTP Interface Page contains fields for setting SNTP on different interfaces.
Command Attributes
• Interface — Indicates the interface on which SNTP can be enabled. The poss ible
field values are:
• Port — Indicates the specific port number on which SNTP is enabled.
• LAG — Indicates the specific LAG number on which SNTP is enabled.
• VLAN — Indicates the specific VLAN number on which SNTP is enabled.
• Receive Servers Updates — Enables the interface to receive or not recei ve
updates.
• Remove — Removes SNTP interfaces.
• Checked — Removes the selected SNTP interface.
• Unchecked — Maintains the selected SNTP interfaces.
Web – Select System, System Management, SNTP, Interface. Define the fields and
click Apply.
Figure 3-15. SNTP Interface Page
CLI - The following is an example of the SNTP interface commands:
Simple Network Time Protocol (SNTP) allows the switch to set its internal clock
based on periodic updates from a time server (SNTP or NTP). Maintaining an
accurate time on the switch enables the system log to record meaningful dates and
times for event entries. You can also manually set the clock using the CLI. If the
clock is not set and the time cannot be established from a SNTP server, the switch
will only record the time from the factory default set at the last bootup.
When the SNTP client is enabled, the switch periodically sends a request for a time
update to a configured time server. You can configure up to eight time server IP
addresses. The switch attempts to poll each server in the configured sequence.
Polling can be enabled per interface.
Configuring Daylight Savings Time
The Clock Time Zone Page contains fields for defining system time parameters for
both the local hardware clock and the extern al SNTP clock. If the system time is kept
using an external SNTP clock, and the external SNTP clock fails, the system time
reverts to the local hardware clock. Daylight Savings Time can be enabled on the
device.
The following is a list of Daylight Savings Time start and end times in specific
countries:
• Albania — From the last weekend of March until the last weekend of October.
• Australia — From the end of October until the end of March.
• Australia - Tasmania — From the beginning of October until the end of March.
• Armenia — From the last weekend of March until the last weekend of October.
• Austria — From the last weekend of March until the last weekend of October.
• Bahamas — From April to October, in conjunction with Daylight Savings Time in
the United States.
• Belarus — From the last weekend of March until the last weekend of October.
• Belgium — From the last weekend of March until the last weekend of October.
• Brazil — From the third Sunday in October until the third Saturday in March. During
the period of Daylight Saving Time, Brazilian clocks go forward one hour in most
of the Brazilian southeast.
• Chile — In Easter Island, from March 9 until October 12. In the rest of t he country,
from the first Sunday in March or after 9th March.
• China — China does not use Daylight Saving Time.
• Canada — From the first Sunday in April until the last Sunday of October. Daylight
Saving Time is usually regulated by provincial and territorial governments.
Exceptions may exist in certain municipalities.
• Cuba — From the last Sunday of March to the last Sunday of October.
• Cyprus — From the last weekend of March until the last weekend of October.
• Denmark — From the last weekend of March until the last weekend of October.
57
Configuring the Switch
3
• Egypt — From the last Friday in April until the last Thursday in September.
• Estonia — From the last weekend of March until the last weekend of October.
• Finland — From the last weekend of March until the last weekend of October.
• France — From the last weekend of March until the last weekend of October.
• Germany — From the last weekend of March until the last weekend of October.
• Greece — From the last weekend of March until the last weekend of October.
• Hungary — From the last weekend of March until the last weekend of October.
• India — India does not use Daylight Saving Time.
• Iran — From Farvardin 1 until Mehr 1.
• Iraq — From April 1 until October 1.
• Ireland — From the last weekend of March until the last weekend of October.
• Israel — Varies year-to-year.
• Italy — From the last weekend of March until the last weekend of October.
• Japan — Japan does not use Daylight Saving Time.
• Jordan — From the last weekend of March until the last weekend of Octo ber.
• Latvia — From the last weekend of March until the last weekend of October.
• Lebanon — From the last weekend of March until the last weekend of October.
• Lithuania — From the last weekend of March until the last weekend of October.
• Luxembourg — From the last weekend of March until the last weekend of
October.
• Macedonia — From the last weekend of March until the last weekend of October.
• Mexico — From the first Sunday in April at 02:00 to the last Sunday in October at
02:00.
• Moldova — From the last weekend of March until the last weekend of October.
• Montenegro — From the last weekend of March until t he last weekend of October.
• Netherlands — From the last weekend of March until the last weekend of Octobe r.
• New Zealand — From the first Sunday in October until the first Sunday on or after
March 15.
• Norway — From the last weekend of March until the last weekend of October.
• Paraguay — From April 6 until September 7.
• Poland — From the last weekend of March until the last weekend of October.
• Portugal — From the last weekend of March until the last weekend of October.
• Romania — From the last weekend of March until the last weekend of October.
• Russia — From the last weekend of March until the last weekend of October.
• Serbia — From the last weekend of March until the last weekend of October.
• Slovak Republic
October.
• South Africa — South Africa does not use Daylight Saving Time.
• Spain — From the last weekend of March until the last weekend of October.
• Sweden — From the last weekend of March until the last weekend of October.
- From the last weekend of March until the last weekend of
58
Configuring System Time
• Switzerland — From the last weekend of March until the last weekend of October.
• Syria — From March 31 until October 30.
• Taiwan — Taiwan does not use Daylight Saving Time.
• Turkey — From the last weekend of March until the last weekend of October.
• United Kingdom — From the last weekend of March until the last weekend of
October.
• United States of America — From the first Sunday in April at 02:00 to the last
Sunday in October at 02:00.
Command Attributes
• Clock Source — The source used to set the system clock. The possible field
values are:
• None — Indicates that a clock source is not used. The clock is set locally.
• SNTP — Indicates that the system time is set via an SNTP server.
• Date — The system date. The field format is Day/Month/Year. For example: 04/
May/50 (May 4, 2050).
• Local Time — The system time. The field format is HH:MM:SS. For example:
21:15:03.
• Time Zone Offset — The difference between Greenwich Mean Time (GMT) and
local time. For example, the Time Zone Offset for Paris i s GMT +1, while the Time
Zone Offset for New York is GMT –5.
• Daylight Savings — Enables automatic Daylight Savings Time (DST) on the
device based on the device’s location. There are two types of daylight settings,
either by a specific date in a particular year or a recurring setting irrespective of the
year. For a specific setting in a particular year complete the Dayli ght Savings area,
and for a recurring setting, complete the Recurring area. The possi ble field values
are:
• USA — Enables switching to DST at 2:00 a.m. on the first Sunday of April, and
reverts to standard time at 2:00 a.m. on the last Sunday of October.
• European — Enables switching to DST at 1:00 am on the last Sunday in March
and reverts to standard time at 1:00 am on the last Sunday in October. The
European option applies to EU members, and other European countries using
the EU standard.
• Other — Indicates the DST definitions are user-defined based on the device
locality. If Other is selected, the From and To fields must be defined.
• Time Set Offset (1-1440) — Used for non-USA and European countries to set the
amount of time for DST (in minutes). The default time is 60 minutes.
• From — Indicates the time that DST begins in countries other than the USA and
Europe, in the format Day/Month/Year in one field and HH:MM in another. For
example, if DST begins on October 25, 2007 at 5:00 am, the two fields should be
set to 25/Oct/07 and 05:00. The possible field values are:
• Date — The date on which DST begins. The possible field range is 1-31.
• Month — The month of the year in which DST begins. The possible field range
is Jan-Dec.
3
59
Configuring the Switch
3
• Year — The year in which the configured DST begins.
• Time — The time at which DST begins. The field f ormat is HH:MM. For example:
05:30.
• To — Indicates the time that DST ends in countries other than the USA and
Europe, in the format Day/Month/Year in one field and HH:MM in another. For
example, if DST ends on March 23, 2008 at midnight, the two fields should be 23/
Mar/08 and 00:00. The possible field values are:
• Date — The date on which DST ends. The possible field range is 1-31.
• Month — The month of the year in which DST ends. The possible field range is
Jan-Dec.
• Year— The year in which the configured DST ends.
• Time — The time at which DST starts. The field format is HH:MM. For example:
05:30.
• Recurring — Enables user-defined DST for countries in which DST is constant
from year to year, other than the USA and Europe.
• From — The time that DST begins each year. In the example, DST begins l ocally
every first Sunday in April at midnight. The possible field values are:
• Day — The day of the week from which DST begins every year. The possible
field range is Sunday-Saturday.
• Week — The week within the month from which DST begins every year. The
possible field range is 1-5.
• Month — The month of the year in which DST begins every year. The possible
field range is Jan-Dec.
• Time — The time at which DST begins every year. The field format is
Hour:Minute. For example: 02:10.
• To — The time that DST ends each year. In the example, DST e nds loca ll y ev ery
first Sunday in October at midnight. The possible field values are:
• Day — The day of the week at which DST ends every year. The possible field
range is Sunday-Saturday.
• Week — The week within the month at which DST ends every year. The
possible field range is 1-5.
• Month — The month of the year in which DST ends every year. The possible
field range is Jan-Dec.
• Time — The time at which DST ends every year. The field format is HH:MM. For
example: 05:30.
Web – Select System, System Management, SNTP, Clock Time Zone. Define the
fields and set the offset for your time zone relative to the UTC, and click Apply.
60
Managing System Files
Figure 3-16. Clock Time Zone Page
CLI - The following is an example of the system clock commands:
Console# clock set 13:32:00 7 Mar 2002
4-349
Console# configure 4-655
Console(config)# clock source sntp
4-350
Console(config)# clock timezone -6 zone CST
4-350
Console(config)# clock summer-time recurring first sun apr 2:00 last sunoct 2:00
4-351
3
Managing System Files
You can upload/download firmware to or from a TFTP server. By saving runtime
code to a file on a TFTP server, that file can later be downloaded to the switch to
restore operation. You can set the switch to use new firmware without overwriting
the previous version.
The system run-time software and configuration information is kept in files which
may be saved, copied, uploaded for host-based storage and manipulation. The
system files include:
• Boot Files — The system uses two identical copies of the boot image, stored in
flash. The first copy is used when the system comes up.
• Software Image Files — two images are stored. The device boots f rom one , and
the other is used as a redundant backup.
61
Configuring the Switch
3
• Startup Configuration File — Contains the commands required to reconfigure the
device to the same settings as when the device is powered down or rebooted. The
Startup file is created by copying the configuration commands from the Running
Configuration file or the Backup Configuration file.
• Running Configuration File — Contains all conf iguration file comma nds, as we ll
as all commands entered during the current session. After the device is powered
down or rebooted, all commands stored in the Running Configu ration fi le are lost.
During the startup process, all commands in the Startup file are copied to the
Running Configuration File and applied to the device. During the session, all new
commands entered are added to the commands existing in the Running
Configuration file. Commands are not overwritten. To update the Startup file,
before powering down the device, the Runnin g Configuration file must be copied
to the Startup Configuration file. The next time the device is restarted, the
commands are copied back into the Running Configuration file from the Startup
Configuration file.
• Image files — Software upgrades are used when a new version file is downloaded.
The file is checked for the right format, and that it is complete. After a successful
download, the new version is marked, and is used after the device is reset.
Downloading System Files
There are two types of files, firmware files and configuration files. The firmware f iles
manage the device, and the configuration files configure the device for
transmissions. Only one type of download can be performed at any one time. File
names cannot contain slashes (\ or /), the leading letter of the file name should not
be a period (.), and the maximum length for file names on the TFTP server is 127
characters or 31 characters for files on the switch. (Valid characters: A-Z, a-z, 0-9,
“.”, “-”, “_”). The File Download Page contains parameters for downloading system
files.
Command Attributes
• Firmware Download/Configuration Download — Indicates whether a firmware
file or a configuration is being do wnloa ded. I f Firmware Download is sel ect ed, t he
Configuration Download fields are grayed out. If Configuration Download is
selected, the Firmware Download fields are grayed out.
• TFTP Server IP Address — Specifies the TFTP Server IP Address from which
files are downloaded.
• Source File Name — Specifies the file to be downloaded.
• Destination File — Specifies the destination file type to which to the file is
downloaded. The possible field values are:
• Software Image — Downloads the Image file.
• Boot Code — Downloads the Boot file.
• Download to Master Only — Downloads the system file only to the Master.
• Download to All Units — Downloads the system file to all units.
62
Managing System Files
• Configuration Download — Indicates that the download is for configuration files.
If Configuration Download is selected, the Firmware Download fields are grayed
out.
• Configuration TFTP Server IP Address — Specifies the TFTP Server IP Address
from which the configuration files are downloaded.
• Configuration Source File Name — Specifies the configuration files to be
downloaded.
• Configuration Destination File — Specifies the destination file to which to the
configuration file is downloaded. The possible field values are:
• Running Configuration — Downloads commands into the Running
Configuration file.
• Startup Configuration — Downloads the Startup Configuration file, and
overwrites the old Startup Configuration file.
Web – Click System, System Management, File Management, File Download.
Define the fields. Click Apply.
3
Figure 3-17. File Download Page
CLI – The following is an example of downloading system files using CLI
Accessing file 'file1' on 172.16.101.101..
Loading file1 from 172.16.101.101:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!! [OK]
Copy took 0:01:11 [hh:mm:ss]
Uploading System Files
The File Upload Page contains fields for uploading the software from the device to
the TFTP server.
Command Attributes
• Firmware Upload — Specifies that the software image file is uploaded. If
Firmware Upload is selected, the Configuration Upload fields are grayed out.
• Configuration Upload — Specifies that the Configuration file is uploaded. If
Configuration Upload is selected, the Soft ware Image Upload fields are grayed out.
• Software TFTP Server IP Address — Specifies the TFTP Server IP Address to
which the Software Image is uploaded.
• Software Destination File Name — Specifies the software image file path to
which the file is uploaded.
• Configuration TFTP Server IP Address — Specifies the TFTP Server IP Address
to which the Configuration file is uploaded.
• Configuration Destination File Name— Specifies the file name to which the
Startup Configuration file is uploaded.
• Configuration Transfer file name — Specifies the Configuration file name that is
uploaded. The possible field values are:
• Running Configuration — Uploads the Running Configuration file.
• Startup Configuration — Uploads the Startup Configuration file.
Web – Click System, System Management, File Management, File Upload. Define
64
Managing System Files
the fields. Click Apply.
Figure 3-18. File Upload Page
CLI – The following is an example of downloading system files using CLI
Accessing file 'file1' on 172.16.101.101..
Loading file1 from 172.16.101.101:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!! [OK]
Copy took 0:01:11 [hh:mm:ss]
3
Copying Files
Files can be copied and deleted from the Copy Files Page.
Command Attributes
• Copy Master Firmware — Copies the Firmware file currently running on the
Stacking Master. The possible field values are selected from the following list
boxes:
• Source — Select if the Software Image or Bootcode file will be copied.
• DestinationUnit — Select the stacking member to whic h the firmware is copied,
the possible field values are All, Backup, and stacking members 1-4.
• Copy Configuration — Copies the Running Configurati on File. The possible field
values are: The possible field values are:
• Source — Select if the Starting Configuration file , the Running Configuration file,
65
Configuring the Switch
3
or the Backup file will be copied.
• Destination — Specifies t he usage for the source fil e after it is copied. It may be
used as a Starting Configuration file, the Running Confi guration file, the Backup
file, or as a configuration file with a new name.
• Restore Configuration Factory Defaults — Resets the Configuration file to the
factory defaults. The factory defaults are reset after the device is reset. When
unselected, the device maintains the current Configuration file.
Web – System, System Management, File Management, Copy Files. Define the
fields. Click Apply.
Figure 3-19. Copy Files Page
CLI – The following is an example of downloading system files using CLI
The Active Image Page allows network managers to select and reset the Image
files. The Active Image file for each unit in a stacking configuration can be
individually selected.
Command Attributes
• Image – Binary file that contains executable code
66
TCAM Resources
• Filename – The name of the file
• Version – Binary code version
• Date – Version’s date
• Status – Indicates Image status
• Image After Reset – The Image file which is active on the unit after the device is
reset. The possible field values are:
• Image 1 — Activates Image file 1 after the device is reset.
• Image 2 — Activates Image file 2 after the device is reset.
Web – System, System Management, File Management, Active Image. Define the
fields. Click Apply.
3
Figure 3-20. Active imag e Pa g e
TCAM Resources
The TCAM Resources Page display the availability of TCAM resources (Ternary
Content Addressable Memory
searching throughout the stack, in order to perform securit y, QoS, and other types of
applications. In contrast with binary CAM, TCAM allows a third ma tching st ate o f “X”
or “Don’t Care” bits in data searches ( the first two bit types are “0” and “1”), adding
more flexibility to searches. However, the need to encode three possible states
instead of two also adds greater resource costs.
The maximum number of rules that may be allocated by all applications on the
device is 1024.
The following table lists all applications that can allocate TCAM rules. Each
allocation has its specific allocation policy.
) across the stack. TCAM is used for high-speed
67
Configuring the Switch
3
Note: Some applications allocate rules upon their initiation. Additionally, applications that
initialize during system boot use some of their rules during the startup process.
Table3-3. TCAM Allocation
ApplicationPer
QoS
Advanced
Mode rules
Access
Control
Rules
PVEPort2/port
IP Subnet
VLAN
Protocol
Based VLAN
MAC Based
VLAN
DHCP
Snooping
IP Source
Guard
ARP
Inspection
VLAN Rate
Limiting
Port/
Device
Port6/
Port6/
Port02552 or 4Rules are duplicated
Port0No limit1 or 2Rules are duplicated
Port04321 or 2Rules are duplicated
Device2/
Port0No limit1 TCAM entry/1 IP
Device2/
Both02551 global rule/1 VLAN
Per
Alloca
tion
on
Activa
tion
device
device
or
LAG
device
device
Application
Upper Limit
No limit1 or 2 TCAM entries
No limit1 or 2 TCAM entries
------Feature is activated
No limit8 TCAM entries/1
1284 TCAM entries/1
TCAM rules per
User ACL
per each rule.
per each rule.
DHCP Snooping rule
Source Guard entry
ARP Inspection rule
Rate Limit.
Additional rule is
created for each
“permit” rule on the
interface.
Comments
Feature is activated
by default.
Feature is activated
by default.
by default.
Allocation done only
during initialization.
for both IP and MAC
based VLANs.
for both IP and MAC
based VLANs.
for both IP and MAC
based VLANs.
Command Attributes
• Stack Unit – Indicates the stacking member for which TCAM resource usage is
displayed.
• TCAM Utilization – Percentage of the available TCAM resources which are used.
For example, if more ACLs and policy maps are defined, the system will use more
TCAM resources.
68
Configuring Interfaces
Figure 3-21. TCAM Resources Page
Configuring Interfaces
The Interfaces pages provide detailed information about each interface on the
switch, such as administrative status, input/output packets, packet errors and
discards.
3
Configuring Interface Connections
You can use the Interface Configuration Page to enable/disable an interface, set
auto-negotiation and the interface capabilities to advertise, or manually fix the
speed, duplex mode, and flow control. Interfaces can also be designated as PVE
ports. PVE ports bypass the Forwarding Database (FDB), and forward all Unicast,
Multicast and Broadcast traffic to an uplink. A single uplink can be defined for a
protected port.
Command Attributes
• Unit No. — Indicates the stacking member for which the interface configuration
information is displayed.
• Interface — Indicates the stacking member for which the interface configuration
information is displayed.
• Name — Displays the port number.
• Port Type — Displays the port type. The possible field values are:
• Copper — Indicates the port has a copper port connection.
• Fiber — Indicates the port has a fiber optic port connection.
69
Configuring the Switch
3
• Port Status — Indicates whether the port is currently operational or
non-operational. The possible field values are:
• Up — Indicates the port is currently operating.
• Down — Indicates the port is currently not operating.
• Port Speed — Displays the configured rate for the port. The port type determines
what speed setting options are available. Port speeds can only be configured when
auto negotiation is disabled. The possible field values are:
• 10M — Indicates the port is currently operating at 10 Mbps.
• 100M — Indicates the port is currently operating at 100 Mbps.
• 1000M — Indicates the port is currently operating at 1000 Mbps.
• Duplex Mode — Displays the port duplex mode. This field is configurable only
when auto negotiation is disabled, and the port speed is set to 10M or 100 M. This
field cannot be configur e d on LA Gs. The possible field val ues are:
• Full — The interface supports transmission between the device and its link
partner in both directions simultaneously.
• Half — The interface supports transmission between the device and the client
in only one direction at a time.
• Auto Negotiation — Displays the auto negotiation status on the port. Auto
negotiation is a protocol between two link partners that enabl es a port to a dvertise
its transmission rate, duplex mode, and flow control abilities to its partner.
• Advertisement — Defines the auto negotiation setting the port advertises. The
possible field values are:
• Max Capability — Indicates that all port speeds and duplex mode settings are
accepted.
• 10 Half — Indicates that the port advertises for a 10 Mbps speed port and half
duplex mode setting.
• 10 Full — Indicates that the port advertises for a 10 Mbps speed port and full
duplex mode setting.
• 100 Half — Indicates that the port adver tises for a 100 Mbps speed port and half
duplex mode setting.
• 100 Full — Indicates that the port advertises for a 100 Mbps speed port and ful l
duplex mode setting.
• 1000 Full — Indicates that the port advertises for a 1000 Mbps speed port and
full duplex mode setting
• Back Pressure — Displays the back pressure mode on the Port. Back pressure
mode is used with half duplex mode to disable ports from receiving messages.
• Flow Control — Displays the flow control status on the port. Operates when the
port is in full duplex mode.
• MDI/MDIX — Displays the MDI/MDIX status on the port. Hubs and switches are
deliberately wired opposite the way end stati ons are wired, so that when a hub or
switch is connected to an end station, a straight through Ethernet cable can be
used, and the pairs are matched up properly. When two hubs or switches are
connected to each other, or two end stations are connected to each other, a
70
Configuring Interfaces
crossover cable is used to ensure that the correct pairs are connected. The
possible field values are:
• Auto — Use to automatically detect the cable type.
• MDI (Media Dependent Interface) — Use for end stations.
• MDIX (Media Dependent Interface with Crossover) — Use for hubs and
switches.
• LAG — Indicates the LAG of which the port is a member.
• PVE — Enables a port to be a Private VLAN Edge (PVE) port. When a port is
defined as PVE, it bypasses the Forwarding Database (FDB), and forwards all
Unicast, Multicast and Broadcast traffic to an uplink (except MAC-to-me packet s).
Uplinks can be a port or GE port. Traffic from the uplink is distributed to all
interfaces.
Only one uplink can be defined for a protected port. Private VLANs cannot be
configured on ports on which IGMP snooping or Multicast TV VLAN has been
configured. An IP address cannot be configured on the VLAN of which a protected
port is a member. Only one uplink can be defined for a protected port. Private
VLANs cannot be configured on ports on which IGMP snooping or Mul ticast TV
VLAN has been configured. An IP address cannot be configured on the VLAN of
which a protected port is a member .
Web – Click System, Interfaces, Interface, Interface Configuration. Modify the
required interface settings, and click Apply.
3
Figure 3-22. Interface Configuration Page
71
Configuring the Switch
3
CLI – The following is an example of the Port Configuration CLI commands:
Console# set interface active ethernet 1/e54-386
Console#
Console(config)#
Console(config-if)#
Console(config-if)#
Console(config-if)#
Console(config-if)#
Console(config-if)#
Console(config-if)#
Link Aggregation optimizes port usage by linking a group of port s tog eth er to form a
single LAG (aggregated group). Aggregating port s multiplies the b andwidth bet ween
the devices, increases port flexibility, and provides link redundancy. The device
supports up to eight ports per LAG, and eight LAGs per system.
The device supports both static LAGs and Link Aggregation Control Protoc ol (LACP)
LAGs. LACP LAGs negotiate aggregating ports’ links with other LACP po rt s l ocated
on a different device. If the other device ports are also LACP ports, the devices
establish a LAG between them.
• Consider the following when aggregating ports:
• All ports within a LAG must be the s ame m ed i a ty p e.
• A VLAN is not configured on the port.
• The port is not assigned to a different LAG.
• Auto-negotiation mode is not configured on the port.
• The port is in full-duplex mode.
• All ports in the LAG have the same ingress filtering and tagged modes.
• All ports in the LAG have the same back pressure and flow control modes.
• All ports in the LAG have the sam e prio ri ty .
• All ports in the LAG have the same transceiver type.
• The device supports up to eight LAGs, and eight ports in each LAG.
• Ports can be configured as LACP ports only if the ports are not part of a previous ly
configured LAG.
• Ports added to a LAG lose their individual port configuration. When ports are
removed from the LAG, the original port configuration is applied to the port s.
The device uses a hash function to determine which packets are carried on which
aggregated-link member. The hash function statistically load-balances the
aggregated link members. The device considers an Aggregated Link as a single
logical port.
Note: To avoid creating a loop in the network, be sure you add a static trunk via the
configuration interface before connecting the ports, and also disconnect the
ports before removing a static trunk via the configuration interface.
72
Configuring Interfaces
The LAG Membership Page contains parameters for defining LAG and LACP ports.
Command Attributes
• LAG Port — Displays the LAG number.
• Name — Displays the user-defined port name.
• Link State — Displays the link operational status.
• Member — Displays the ports configured to the LAG.
• Remove — Removes the LAG. The possible field values:
• Checked — Removes the selected LAG.
• Unchecked — Maintains the LAGs.
Web – Click System, Interfaces, Interface, LAG Membership. Define the fields and
click Apply.
3
Figure 3-23. LAG Membership Page
CLI – The following is an example of the CLI commands for aggregating ports:
Console(config-if)# channel-group 1 mode on4-456
Configuring LACP
Aggregate ports can be linked into link-aggregation port-groups. Each group is
comprised of ports with the same speed, set to full-duplex operations.
LAG ports can contain different media types if the ports are operating at the same
speed. Aggregated links can be set up manually or automatically established by
enabling Link Aggregation Control Protocol (LACP) on t he re le vant links . Aggreg ate
ports can be linked into link-aggregation port -groups. Each group is comprised of
73
Configuring the Switch
3
ports with the same speed.
• Ports assigned to a common port channel must meet the following criteria:
• Ports must have the same LACP System Priority.
Notes: 1.
The Interface LACP Configuration Page contains parameters for defining the LACP
ports.
Command Attributes
• LACP System Priority — Determines the link aggregation group (LAG)
membership, and to identify this device to other swi tches during LAG negotiations.
Ports must be configured with the same system priority to join the same LAG.
System priority is combined with the switch’s MAC address to form the LAG
identifier. This identifier is used to indicate a specific LAG during LACP
negotiations with other systems. The field range is 1 - 65535, and the default is 1.
• Unit No. — Displays the stacking member for which the LACP parameters are
displayed
• Port — Displays the port number to which timeout and priority values are assigned.
• Port-Priority — Displays the LACP priority value for the port. The field range is
1-65535.
• LACP Timeout — Displays the administrative LACP timeout.
Web – Click System, Interfaces, Interface, LACP Configuration. Define the
LACP parameters and click Apply.
If the port channel admin key is not set (through the CLI) when a channel
group is formed (i.e., it has a null value of 0), this key is set to the same value
as the port admin key used by the interfaces that joined the group (lacp
admin key).
2. To avoid creating a loop in the network, be sure you enable LACP before
connecting the ports, and also disconnect the ports before disabling LACP.
3. If the target switch has also enabled LACP on the connected ports, the trunk
will be activated automatically.
4. A trunk formed with another switch using LACP will automatically be
assigned the next available trunk ID.
5. All ports on both ends of an LACP trunk must be configured for full duplex,
either by forced mode or auto-negotiation.
port
74
Displaying Port Statistics
Figure 3-24. Interface LACP Configuration Page
CLI – The following is an example of the LACP interface CLI commands:
Console(config)#
4-431
Console(config)#
4-376
Console(config-if)#
4-432
Console(config-if)#
4-432
lacp system-priority
interface ethernet 1/e6
lacp port-priority
lacp timeout long
120
247
3
Displaying Port Statistics
You can display standard statistics on network traffic from the Interfaces Group and
Ethernet-like MIBs, as well as a detailed breakdown of traffic based on the RMON
MIB. Interfaces and Ethernet-like statisti cs display errors on the traffic passing
through each port. This information can be used to identify potential problems with
the switch (such as a faulty port or unusually heavy loading). RMON statistics
provide access to a broad range of statistics, including a total count of different
frame types and sizes passing through each port. All values di splayed have been
accumulated since the last system reboot, and are shown as counts per second.
75
Configuring the Switch
3
Interface Statistics
Command Attributes
• Unit No. — Displays the stacking member for which the Interface Statistics are
displayed.
• Interface — Indicates the device for which statistics are displayed. The possible
field values are:
• Port — Defines the specific port for which interface statistics ar e d isplayed.
• LAG — Defines the specific LAG for which interface statistics are displayed.
• Refresh Rate — Defines the amount of time that passes before the interface
statistics are refreshed. The possible field values are:
• 15 Sec — Indicates that the Interface statistics are ref reshed every 15 seconds.
• 30 Sec — Indicates that the Interface statistics are ref reshed every 30 seconds.
• 60 Sec — Indicates that the Interface statistics are ref reshed every 60 seconds.
• No Refresh — Indicates that the Interface statistics are not refreshed.
Receive Statistics
• Total Bytes (Octets) — Displays the number of octets received on the selected
interface.
• Unicast Packets — Displays the number of Unicast packets received on the
selected interface.
• Multicast Packets — Displays the number of Multicast packets received on the
selected interface.
• Broadcast Packets — Displays the number of Broadcast packet s received on the
selected interface.
• Packets with Errors — Displays the number of error packets received from the
selected interface. Packet with Errors counts all errors without the CRC errors.
Transmit Statistics
• Total Bytes (Octets) — Displays the number of octets transmitted from the
selected interface.
• Unicast Packets — Displays the number of Unicast packets transmit ted from the
selected interface.
• Multicast Packets — Displays the number of Multicast packets transmitted from
the selected interface.
• Broadcast Packets — Displays the number of Broadcast packets transmitted
from the selected interface.
76
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.