Chapter 19: Security: Secure Sensitive Data Management286
Introduction 286
SSD Management287
SSD Rules287
Elements of an SSD Rule288
SSD Rules and User Authentication 291
Default SSD Rules291
SSD Default Read Mode Session Override 292
SSD Properties292
Passphrase293
Default and User-defined Passphrases 293
Local Passphrase 293
Configuration File Passphrase Control294
Configuration File Integrity Control 294
Read Mode295
Configuration Files295
File SSD Indicator295
SSD Control Block296
Startup Configuration File 296
Cisco Small Business 200 Series Smart Switch Administration Guide 10
Contents
Running Configuration File 297
Backup and Mirror Configuration File298
Sensitive Data Zero-Touch Auto Configuration 299
SSD Management Channels300
Menu CLI and Password Recovery 301
Configuring SSD301
SSD Properties301
SSD Rules302
Chapter 20: Quality of Service 304
QoS Features and Components305
QoS Operation305
QoS Workflow306
Configuring QoS - General306
Setting QoS Properties306
Interface QoS Settings308
Configuring QoS Queues 308
Mapping CoS/802.1p to a Queue310
Mapping DSCP to Queue312
Configuring Bandwidth315
Configuring Egress Shaping per Queue316
Managing QoS Statistics317
Viewing Queues Statistics317
Chapter 21: SNMP320
SNMP Versions and Workflow320
SNMPv1 and v2321
SNMPv3321
SNMP Workflow321
Supported MIBs323
Model OIDs323
SNMP Engine ID324
Cisco Small Business 200 Series Smart Switch Administration Guide 11
Contents
Configuring SNMP Views325
Creating SNMP Groups 327
Managing SNMP Users329
Defining SNMP Communities331
Defining Trap Settings333
Notification Recipients333
Defining SNMPv1,2 Notification Recipients334
Defining SNMPv3 Notification Recipients335
SNMP Notification Filters337
Cisco Small Business 200 Series Smart Switch Administration Guide 12
Contents
Cisco Small Business 200 Series Smart Switch Administration Guide 13
Getting Started
This section provides an introduction to the web-based configuration utility, and
covers the following topics:
•Starting the Web-based Configuration Utility
•Quick Start Device Configuration
•Interface Naming Conventions
1
•Window Navigation
Starting the Web-based Configuration Utility
This section describes how to navigate the web-based switch configuration utility.
If you are using a pop-up blocker, make sure it is disabled.
Browser Restrictions
•If you are using older versions of Internet Explorer, you cannot directly use
an IPv6 address to access the device. You can, however, use the DNS
(Domain Name System) server to create a domain name that contains the
IPv6 address, and then use that domain name in the address bar in place of
the IPv6 address.
•If you have multiple IPv6 interfaces on your management station, use the
IPv6 global address instead of the IPv6 link local address to access the
device from your browser.
Cisco Small Business 200 Series Smart Switch Administration Guide 1
Getting Started
Starting the Web-based Configuration Utility
Launching the Configuration Utility
To open the web-based configuration utility:
STEP 1 Open a Web browser.
STEP 2 Enter the IP address of the device you are configuring in the address bar on the
browser, and then press Enter.
NOTE When the device is using the factory default IP address of 192.168.1.254, its power
LED flashes continuously. When the device is using a DHCP assigned IP address or
an administrator-configured static IP address, the power LED is on solid.
Logging In
1
The default username is cisco and the default password is cisco. The first time
that you log in with the default username and password, you are required to enter
a new password.
NOTE If you have not previously selected a language for the GUI, the language of the Login
page is determined by the language(s) requested by your browser and the
languages configured on your device. If your browser requests Chinese, for
example, and Chinese has been loaded into your device, the Login page is
automatically displayed in Chinese. If Chinese has not been loaded into your
device, the Login page appears in English.
The languages loaded into the device have a language and country code (en-US,
en-GB and so on). For the Login page to be automatically displayed in a particular
language, based on the browser request, both the language and country code of
the browser request must match those of the language loaded on the device. If the
browser request contains only the language code without a country code (for
example: fr). The first embedded language with a matching language code is
taken (without matching the country code, for example: fr_CA).
To log in to the device configuration utility:
STEP 1 Enter the username/password. The password can contain up to 64 ASCII
characters. Password-complexity rules are described in the Setting Password
Complexity Rules section of the Configuring Security chapter.
STEP 2 If you are not using English, select the desired language from the Language drop-
down menu. To add a new language to the device or update a current one, refer to
the Upgrade/Backup Firmware/Language section.
Cisco Small Business 200 Series Smart Switch Administration Guide 2
1
Getting Started
Starting the Web-based Configuration Utility
STEP 3 If this is the first time that you logged on with the default user ID (cisco) and the
default password (cisco) or your password has expired, the Change Password
Page appears. See Password Expiration for additional information.
STEP 4 Choose whether to select Disable Password Complexity Enforcement or not.
For more information on password complexity, see the Setting Password
Complexity Rules section.
STEP 5 Enter the new password and click Apply.
When the login attempt is successful, the Getting Started page appears.
If you entered an incorrect username or password, an error message appears and
the Login page remains displayed on the window. If you are having problems
logging in, please see the Launching the Configuration Utility section in the
Administration Guide for additional information.
Select Don’t show this page on startup to prevent the Getting Started page from
being displayed each time that you log on to the system. If you select this option,
the System Summary page is opened instead of the Getting Started page.
HTTP/HTTPS
You can either open an HTTP session (not secured) by clicking Log In, or you can
open an HTTPS (secured) session, by clicking Secure Browsing (HTTPS). You are
asked to approve the logon with a default RSA key, and an HTTPS session is
opened.
NOTE There is no need to input the username/password prior to clicking the Secure
Browsing (HTTPS) button.
For information on how to configure HTTPS, see SSL Server.
Password Expiration
The New Password page appears:
•The first time you access the device with the default username cisco and
password cisco. This page forces you to replace the factory default
password.
•When the password expires, this page forces you to select a new
password.
3Cisco Small Business 200 Series Smart Switch Administration Guide
Getting Started
!
Starting the Web-based Configuration Utility
Logging Out
By default, the application logs out after ten minutes of inactivity. You can change
this default value as described in the Defining Idle Session Timeout section.
CAUTION Unless the Running Configuration is copied to the Startup Configuration, rebooting
the device will remove all changes made since the last time the file was saved.
Save the Running Configuration to the Startup Configuration before logging off to
preserve any changes you made during this session.
A flashing red X icon to the left of the Save application link indicates that Running
Configuration changes have not yet been saved to the Startup Configuration file.
The flashing can be disabled by clicking on the Disable Save Icon Blinking button
on the Copy/Save Configuration page
1
When the device auto-discovers a device, such as an IP phone (see What is a
Smartport), and it configures the port appropriately for the device. These
configuration commands are written to the Running Configuration file. This causes
the Save icon to begin blinking when the you log on even though you did not make
any configuration changes.
When you click Save, the Copy/Save Configuration page appears. Save the
Running Configuration file by copying it to the Startup Configuration file. After this
save, the red X icon and the Save application link are no longer displayed.
To logout, click Logout in the top right corner of any page. The system logs out of
the device.
When a timeout occurs or you intentionally log out of the system, a message
appears and the Login page appears, with a message indicating the logged-out
state. After you log in, the application returns to the initial page.
The initial page displayed depends on the “Do not show this page on startup”
option in the Getting Started page. If you did not select this option, the initial page
is the Getting Started page. If you did select this option, the initial page is the
System Summary page.
Cisco Small Business 200 Series Smart Switch Administration Guide 4
1
Quick Start Device Configuration
To simplify device configuration through quick navigation, the Getting Started
page provides links to the most commonly used pages.
Configure Port MirroringPort and VLAN Mirroring page
There are two hot links on the Getting Started page that take you to Cisco web
pages for more information. Clicking on the Support link takes you to the device
product support page, and clicking on the Forums link takes you to the Small
Business Support Community page.
Interface Naming Conventions
Within the GUI, interfaces are denoted by concatenating the following elements:
5Cisco Small Business 200 Series Smart Switch Administration Guide
Getting Started
Interface Naming Conventions
1
•Type of interface: The following types of interfaces are found on the various
types of devices:
-Fast Ethernet (10/100 bits)—These are displayed as FE.
-Gigabit Ethernet ports (10/100/1000 bits)—These are displayed as
GE.
-LAG (Port Channel)—These are displayed as LAG.
-VLAN—These are displayed as VLAN.
-Tunnel —These are displayed as Tunnel.
•Interface Number: Port, LAG, tunnel or VLAN ID
Cisco Small Business 200 Series Smart Switch Administration Guide 6
1
Window Navigation
This section describes the features of the web-based switch configuration utility.
Application Header
The Application Header appears on every page. It provides the following
application links:
Application Links
Getting Started
Window Navigation
Application Link
Name
UsernameDisplays the name of the user logged on to the device. The
Description
A flashing red X icon displayed to the left of the Save
application link indicates that Running Configuration
changes have been made that have not yet been saved to
the Startup Configuration file. The flashing of the red X can
be disabled on the Copy/Save Configuration page.
Click Save to display the Copy/Save Configuration page.
Save the Running Configuration file by copying it to the
Startup Configuration file type on the device. After this
save, the red X icon and the Save application link are no
longer displayed. When the device is rebooted, it copies
the Startup Configuration file type to the Running
Configuration and sets the device parameters according
to the data in the Running Configuration.
default username is cisco. (The default password is cisco).
7Cisco Small Business 200 Series Smart Switch Administration Guide
Getting Started
Window Navigation
1
Application Links (Continued)
Application Link
Name
Language MenuThis menu provides the following options:
Description
•Select a language: Select one of the languages that
appear in the menu. This language will be the webbased configuration utility language.
•Download Language: Add a new language to the
device.
•Delete Language: Deletes the second language on
the device. The first language (English) cannot be
deleted.
•Debug: Used for translation purposes. If you select
this option, all web-based configuration utility labels
disappear and in their place are the IDs of the
strings that correspond to the IDs in the language
file.
NOTE To upgrade a language file, use the Upgrade/
Backup Firmware/Language page.
LogoutClick to log out of the web-based switch configuration
utility.
AboutClick to display the device name and device version
number.
HelpClick to display the online help.
The SYSLOG Alert Status icon appears when a SYSLOG
message, above the critical severity level, is logged. Click
the icon to open the RAM Memory page. After you access
this page, the SYSLOG Alert Status icon is no longer
displayed. To display the page when there is not an active
SYSLOG message, Click Status and Statistics > View Log > RAM Memory.
Cisco Small Business 200 Series Smart Switch Administration Guide 8
1
Getting Started
Window Navigation
Management Buttons
The following table describes the commonly-used buttons that appear on various
pages in the system.
Management Buttons
Button NameDescription
Use the pull-down menu to configure the number of
entries per page.
Indicates a mandatory field.
AddClick to display the related Add page and add an entry to a
table. Enter the information and click Apply to save it to the
Running Configuration. Click Close to return to the main
page. Click Save to display the Copy/Save Configuration
page and save the Running Configuration to the Startup
Configuration file type on the device.
ApplyClick to apply changes to the Running Configuration on the
device. If the device is rebooted, the Running
Configuration is lost, unless it is saved to the Startup
Configuration file type or another file type. Click Save to
display the Copy/Save Configuration page and save the
Running Configuration to the Startup Configuration file
type on the device.
CancelClick to reset changes made on the page.
Clear All
Interfaces
Counters
Clear Interface
Counters
Clear LogsClears log files.
Clear TableClears table entries.
CloseReturns to main page. If any changes were not applied to
Click to clear the statistic counters for all interfaces.
Click to clear the statistic counters for the selected
interface.
the Running Configuration, a message appears.
9Cisco Small Business 200 Series Smart Switch Administration Guide
Getting Started
Window Navigation
1
Management Buttons (Continued)
Button NameDescription
Copy SettingsA table typically contains one or more entries containing
configuration settings. Instead of modifying each entry
individually, it is possible to modify one entry and then
copy the selected entry to multiple entries, as described
below:
1. Select the entry to be copied. Click Copy Settings to
display the popup.
2. Enter the destination entry numbers in the to field.
3. Click Apply to save the changes and click Close to
return to the main page.
DeleteAfter selecting an entry in the table, click Delete to
remove.
DetailsClick to display the details associated with the entry
selected.
EditSelect the entry and click Edit. The Edit page appears,
and the entry can be modified.
1. C li ck Apply to save the changes to the Running
Configuration.
2. Click Close to return to the main page.
GoEnter the query filtering criteria and click Go. The results
are displayed on the page.
Te stClick Te s t to perform the related tests.
Cisco Small Business 200 Series Smart Switch Administration Guide 10
1
Getting Started
Window Navigation
11Cisco Small Business 200 Series Smart Switch Administration Guide
Status and Statistics
This section describes how to view device statistics.
It covers the following topics:
•Viewing Ethernet Interfaces
•Viewing Etherlike Statistics
•Viewing 802.1X EAP Statistics
2
•Managing RMON
Viewing Ethernet Interfaces
The Interface page displays traffic statistics per port. The refresh rate of the
information can be selected.
This page is useful for analyzing the amount of traffic that is both sent and
received and its dispersion (Unicast, Multicast, and Broadcast).
To display Ethernet statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > Interface.
STEP 2 Enter the parameters.
•Interface—Select the type of interface and specific interface for which
Ethernet statistics are to be displayed.
•Refresh Rate—Select the time period that passes before the interface
Ethernet statistics are refreshed. The available options are:
-No Refresh—Statistics are not refreshed.
-15 Sec—Statistics are refreshed every 15 seconds.
-30 Sec—Statistics are refreshed every 30 seconds.
Cisco Small Business 200 Series Smart Switch Administration Guide 12
2
Status and Statistics
Viewing Etherlike Statistics
-60 Sec—Statistics are refreshed every 60 seconds.
The Receive Statistics area displays information about incoming packets.
•Tot al By te s (O c te t s) —Octets received, including bad packets and FCS
•Click Clear Interface Counters to clear counters for the interface displayed.
•Click View All Interfaces Statistics to see all ports on a single page.
Viewing Etherlike Statistics
The Etherlike page displays statistics per port according to the Etherlike MIB
standard definition. The refresh rate of the information can be selected. This page
provides more detailed information regarding errors in the physical layer (Layer 1),
which might disrupt traffic.
To view Etherlike Statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > Etherlike.
STEP 2 Enter the parameters.
13Cisco Small Business 200 Series Smart Switch Administration Guide
Status and Statistics
Viewing 802.1X EAP Statistics
2
•Interface—Select the type of interface and specific interface for which
Ethernet statistics are to be displayed.
•Refresh Rate—Select the amount of time that passes before the Etherlike
statistics are refreshed.
The fields are displayed for the selected interface.
•Frame Check Sequence (FCS) Errors—Received frames that failed the
CRC (cyclic redundancy checks).
•Single Collision Frames—Frames that were involved in a single collision,
but were successfully transmitted.
•Late Collisions—Collisions that have been detected after the first 512 bits
of data.
•Excessive Collisions—Number of transmissions rejected due to excessive
collisions.
•Oversize Packets—Packets greater than 2000 octets received.
•Internal MAC Receive Errors—Frames rejected because of receiver errors.
•Pause Frames Received—Received flow control pause frames.
•Pause Frames Transmitted—Flow control pause frames transmitted from
the selected interface.
To clear statistics counters:
•Click Clear Interface Counters to clear the selected interfaces counters.
•Click View All Interfaces Statistics to see all ports on a single page.
Viewing 802.1X EAP Statistics
The 802.1x EAP page displays detailed information regarding the EAP (Extensible
Authentication Protocol) frames that were sent or received. To configure the
802.1X feature, see the 802.1X Properties page.
To view the EAP Statistics and/or set the refresh rate:
Cisco Small Business 200 Series Smart Switch Administration Guide 14
2
Status and Statistics
Viewing 802.1X EAP Statistics
STEP 1 Click Status and Statistics > 802.1x EAP.
STEP 2 Select the Interface that is polled for statistics.
STEP 3 Select the time period (Refresh Rate) that passes before the EAP statistics are
refreshed.
The values are displayed for the selected interface.
•EAPOL Frames Received—Valid EAPOL frames received on the port.
•EAPOL Frames Transmitted—Valid EAPOL frames transmitted by the port.
•EAPOL Start Frames Received—EAPOL Start frames received on the port.
•EAPOL Logoff Frames Received—EAPOL Logoff frames received on the
port.
•EAP Response/ID Frames Received—EAP Resp/ID frames received on the
port.
•EAP Response Frames Received—EAP Response frames received by the
port (other than Resp/ID frames).
•EAP Request/ID Frames Transmitted—EAP Req/ID frames transmitted by
the port.
•EAP Request Frames Transmitted—EAP Request frames transmitted by
the port.
•Invalid EAPOL Frames Received—Unrecognized EAPOL frames received
on this port.
•EAP Length Error Frames Received—EAPOL frames with an invalid Packet
Body Length received on this port.
•Last EAPOL Frame Version—Protocol version number attached to the most
recently received EAPOL frame.
•Last EAPOL Frame Source—Source MAC address attached to the most
recently received EAPOL frame.
To clear statistics counters:
•Click Clear Interface Counters to clear the selected interfaces counters.
•Click Clear All Interface Counters to clear the counters of all interfaces.
15Cisco Small Business 200 Series Smart Switch Administration Guide
Status and Statistics
Managing RMON
Managing RMON
RMON (Remote Networking Monitoring) is an SNMP specification that enables an
SNMP agent in the device to proactively monitor traffic statistics over a given
period and send traps to an SNMP manager. The local SNMP agent compares
actual, real-time counters against predefined thresholds and generates alarms,
without the need for polling by a central SNMP management platform. This is an
effective mechanism for proactive management, provided that you have the
correct thresholds set relative to your network’s base line.
RMON decreases the traffic between the manager and the device because the
SNMP manager does not have to poll the device frequently for information, and
enables the manager to get timely status reports, because the device reports
events as they occur.
With this feature, you can perform the following actions:
2
•View the current statistics (since the counter values were cleared). You can
also collect the values of these counters over a period of time, and then
view the table of collected data, where each collected set is a single line of
the History tab.
•Define interesting changes in counter values, such as “reached a certain
number of late collisions” (defines the alarm), and then specify what action
to perform when this event occurs (log, trap, or log and trap).
Viewing RMON Statistics
The Statistics page displays detailed information regarding packet sizes and
information regarding physical layer errors. The information displayed is according
to the RMON standard. An oversized packet is defined as an Ethernet frame with
the following criteria:
•Packet length is greater than MRU byte size.
•Collision event has not been detected.
•Late collision event has not been detected.
•Received (Rx) error event has not been detected.
•Packet has a valid CRC.
Cisco Small Business 200 Series Smart Switch Administration Guide 16
2
Status and Statistics
Managing RMON
To view RMON statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > RMON > Statistics.
STEP 2 Select the Interface for which Ethernet statistics are to be displayed.
STEP 3 Select the Refresh Rate, the time period that passes before the interface
statistics are refreshed.
The statistics are displayed for the selected interface.
•Bytes Received—Number of octets received, including bad packets and
FCS octets, but excluding framing bits.
•Drop Events—Number of packets dropped.
•PacketsReceived—Number of good packets received, including Multicast
and Broadcast packets.
•Broadcast Packets Received—Number of good Broadcast packets
received. This number does not include Multicast packets.
•Multicast Packets Received—Number of good Multicast packets received.
•CRC & Align Errors—Number of CRC and Align errors that have occurred.
•Undersize Packets—Number of undersized packets (less than 64 octets)
received.
•Oversize Packets—Number of oversized packets (over 2000 octets)
received.
•Fragments—Number of fragments (packets with less than 64 octets,
excluding framing bits, but including FCS octets) received.
•Jabbers—Total number received packets that were longer than 1632
octets. This number excludes frame bits, but includes FCS octets that had
either a bad FCS (Frame Check Sequence) with an integral number of octets
(FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number.
A Jabber packet is defined as an Ethernet frame that satisfies the following
criteria:
-Packet data length is greater than MRU.
-Packet has an invalid CRC.
-Received (Rx) Error Event has not been detected.
17Cisco Small Business 200 Series Smart Switch Administration Guide
Status and Statistics
Managing RMON
2
•Collisions—Number of collisions received. If Jumbo Frames are enabled,
the threshold of Jabber Frames is raised to the maximum size of Jumbo
Frames.
•Frames of 64 Bytes—Number of frames, containing 64 bytes that were
received.
•Frames of 65 to 127 Bytes—Number of frames, containing 65-127 bytes
that were received.
•Frames of 128 to 255 Bytes—Number of frames, containing 128-255 bytes
that were received.
•Frames of 256 to 511 Bytes—Number of frames, containing 256-511 bytes
that were received.
•Frames of 512 to 1023 Bytes—Number of frames, containing 512-1023
bytes that were received.
•Frames greater than 1024 Bytes—Number of frames, containing 1024-
2000 bytes, and Jumbo Frames, that were received.
To clear statistics counters:
•Click Clear Interface Counters to clear the selected interfaces counters.
•Click View All Interfaces Statistics to see all ports on a single page.
Configuring RMON History
The RMON feature enables monitoring statistics per interface.
The History Control Table page
samples to store and the port from where to gather the data.
After the data is sampled and stored, it appears in the History Table page that can
be viewed by clicking History Table.
defines the sampling frequency, amount of
Cisco Small Business 200 Series Smart Switch Administration Guide 18
2
Status and Statistics
Managing RMON
To enter RMON control information:
STEP 1 Click Status and Statistics > RMON > History. The fields displayed on this page
are defined in the Add RMON History page, below. The only field is that is on this
page and not defined in the Add page is:
•Current Number of Samples—RMON is allowed by standard to not grant all
requested samples, but rather to limit the number of samples per request.
Therefore, this field represents the sample number actually granted to the
request that is equal or less than the requested value.
STEP 2 Click Add.
STEP 3 Enter the parameters.
•New History Entry—Displays the number of the new History table entry.
•Source Interface—Select the type of interface from which the history
samples are to be taken.
•Max No. of Samples to Keep—Enter the number of samples to store.
•Sampling Interval—Enter the time in seconds that samples are collected
from the ports. The field range is 1-3600.
•Owner—Enter the RMON station or user that requested the RMON
information.
STEP 4 Click Apply. The entry is added to the History Control Table page
Configuration file is updated.
STEP 5 Click History Table to view the actual statistics.
Viewing the RMON History Table
The History Table page displays interface-specific statistical network samplings.
The samples were configured in the History Control table described above.
To view RMON history statistics:
STEP 1 Click Status and Statistics > RMON > History.
,
and the Running
STEP 2 Click History Table.
STEP 3 From the History Entry No. list, select the entry number of the sample to display.
19Cisco Small Business 200 Series Smart Switch Administration Guide
Status and Statistics
Managing RMON
2
The fields are displayed for the selected sample.
•Owner—History table entry owner.
•Sample No.—Statistics were taken from this sample.
•Drop Events—Dropped packets due to lack of network resources during the
sampling interval. This may not represent the exact number of dropped
packets, but rather the number of times dropped packets were detected.
•Bytes Received—Octets received including bad packets and FCS octets,
but excluding framing bits.
•PacketsReceived—Packets received, including bad packets, Multicast,
•Fragments—Fragments (packets with less than 64 octets) received,
excluding framing bits, but including FCS octets.
•Jabbers—Total number of received packets that were longer than 2000
octets. This number excludes frame bits, but includes FCS octets that had
either a bad FCS (Frame Check Sequence) with an integral number of octets
(FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number.
•Collisions—Collisions received.
•Utilization—Percentage of current interface traffic compared to maximum
traffic that the interface can handle.
Defining RMON Events Control
You can control the occurrences that trigger an alarm and the type of notification
that occurs. This is performed as follows:
•Events Page—Configures what happens when an alarm is triggered. This
can be any combination of logs and traps.
Cisco Small Business 200 Series Smart Switch Administration Guide 20
2
Status and Statistics
Managing RMON
•Alarms Page—Configures the occurrences that trigger an alarm.
To define RMON events:
STEP 1 Click Status and Statistics > RMON > Events.
This page displays previously defined events.
STEP 2 Click Add.
STEP 3 Enter the parameters.
•Event Entry—Displays the event entry index number for the new entry.
•Community—Enter the SNMP community string to be included when traps
are sent (optional).
•Description—Enter a name for the event. This name is used in the Add
RMON Alarm page to attach an alarm to an event.
•Notification Type—Select the type of action that results from this event.
Values are:
-None—No action occurs when the alarm goes off.
-Log (Event Log Table)—Add a log entry to the Event Log table when the
alarm is triggered.
-Trap (SNMP Manager and SYSLOG Server)—Send a trap to the remote
log server when the alarm goes off.
-Log and Trap—Add a log entry to the Event Log table and send a trap to
the remote log server when the alarm goes off.
•Time—The time of the event. (This is a read-only table in the parent window
and cannot be defined).
•Owner—Enter the device or user that defined the event.
STEP 4 Click Apply. The RMON event is saved to the Running Configuration file.
STEP 5 Click Event Log Table to display the log of alarms that have occurred and that have
been logged (see description below).
21Cisco Small Business 200 Series Smart Switch Administration Guide
Status and Statistics
Managing RMON
STEP 1 Click Status and Statistics > RMON > Events.
STEP 2 Click Event Log Table.
2
Viewing the RMON Events Logs
The Event Log Table page displays the log of events (actions) that occurred. Two
types of events can be logged: Log or Log and Trap. The action in the event is
performed when the event is bound to an alarm (see the Alarms page) and the
conditions of the alarm have occurred.
This page displays the following fields:
•Event Entry No.—Event’s log entry number.
•Log No.—Log number (within the event).
•Log Time—Time that the log entry was entered.
•Description—Description of event that triggered the alarm.
Defining RMON Alarms
RMON alarms provide a mechanism for setting thresholds and sampling intervals
to generate exception events on any counter or any other SNMP object counter
maintained by the agent. Both the rising and falling thresholds must be configured
in the alarm. After a rising threshold is crossed, no rising events are generated until
the companion falling threshold is crossed. After a falling alarm is issued, the next
alarm is issued when a rising threshold is crossed.
One or more alarms are bound to an event, which indicates the action to be taken
when the alarm occurs.
The Alarms page provides the ability to configure alarms and to bind them with
events. Alarm counters can be monitored by either absolute values or changes
(delta) in the counter values.
Cisco Small Business 200 Series Smart Switch Administration Guide 22
2
Status and Statistics
Managing RMON
To enter RMON alarms:
STEP 1 Click Status and Statistics > RMON > Alarms. All previously-defined alarms are
displayed. The fields are described in the Add RMON Alarm page below. In
addition to those fields, the following field appears:
•Counter Value—Displays the value of the statistic during the last sampling
period.
STEP 2 Click Add.
STEP 3 Enter the parameters.
•Alarm Entry—Displays the alarm entry number.
•Interface—Select the type of interface for which RMON statistics are
displayed.
•Counter Name—Select the MIB variable that indicates the type of
occurrence measured.
•Sample Type—Select the sampling method to generate an alarm. The
options are:
-Absolute—If the threshold is crossed, an alarm is generated.
-Delta—Subtracts the last sampled value from the current value. The
difference in the values is compared to the threshold. If the threshold was
crossed, an alarm is generated.
•Rising Threshold—Enter the value that triggers the rising threshold alarm.
•Rising Event—Select an event to be performed when a rising event is
triggered. Events are created in the Events page.
•Falling Threshold—Enter the value that triggers the falling threshold alarm.
•Falling Event—Select an event to be performed when a falling event is
triggered.
•Startup Alarm—Select the first event from which to start generation of
alarms. Rising is defined by crossing the threshold from a low-value
threshold to a higher-value threshold.
-Rising Alarm—A rising value triggers the rising threshold alarm.
-Falling Alarm—A falling value triggers the falling threshold alarm.
-Rising and Falling—Both rising and falling values trigger the alarm.
23Cisco Small Business 200 Series Smart Switch Administration Guide
Status and Statistics
Managing RMON
STEP 4 Click Apply. The RMON alarm is saved to the Running Configuration file.
2
•Interval—Enter the alarm interval time in seconds.
•Owner—Enter the name of the user or network management system that
receives the alarm.
Cisco Small Business 200 Series Smart Switch Administration Guide 24
2
Status and Statistics
Managing RMON
25Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: System Log
This section describes the System Log feature, which enables the device to
generate several independent logs. Each log is a set of messages describing
system events.
The device generates the following local logs:
•Log sent to the console interface.
3
•Log written into a cyclical list of logged events in the RAM and erased when
the device reboots.
•Log written to a cyclical log-file saved to the Flash memory and persists
across reboots.
In addition, you can send messages to remote SYSLOG servers in the form of
SNMP traps and SYSLOG messages.
This section covers the following sections:
•Setting System Log Settings
•Setting Remote Logging Settings
•Viewing Memory Logs
Setting System Log Settings
You can enable or disable logging on the Log Settings page, and select whether to
aggregate log messages.
You can select the events by severity level. Each log message has a severity level
marked with the first letter of the severity level concatenated with a dash (-) on
each side (except for Emergency that is indicated by the letter F). For example, the
log message "%INIT-I-InitCompleted: … " has a severity level of I, meaning
Informational.
Cisco Small Business 200 Series Smart Switch Administration Guide 26
3
Administration: System Log
Setting System Log Settings
The event severity levels are listed from the highest severity to the lowest severity,
as follows:
•Emergency—System is not usable.
•Alert—Action is needed.
•Critical—System is in a critical condition.
•Error—System is in error condition.
•Warning—System warning has occurred.
•Notice—System is functioning properly, but a system notice has occurred.
•Informational—Device information.
•Debug—Detailed information about an event.
You can select different severity levels for RAM and Flash logs. These logs are
displayed in the RAM Memory page and Flash Memory page, respectively.
Selecting a severity level to be stored in a log causes all of the higher severity
events to be automatically stored in the log. Lower severity events are not stored
in the log.
For example, if Warning is selected, all severity levels that are Warning and higher
are stored in the log (Emergency, Alert, Critical, Error, and Warning). No events with
severity level below Warning are stored (Notice, Informational, and Debug).
To set global log parameters:
STEP 1 Click Administration > System Log > Log Settings.
STEP 2 Enter the parameters.
•Logging—Select to enable message logging.
•Syslog Aggregator—Select to enable the aggregation of SYSLOG
messages and traps. If enabled, identical and contiguous SYSLOG
messages and traps are aggregated over the specified Max Aggregation
Time and sent in a single message. The aggregated messages are sent in
the order of their arrival. Each message states the number of times it was
aggregated.
•Max Aggregation Time—Enter the interval of time that SYSLOG messages
are aggregated.
27Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: System Log
Setting Remote Logging Settings
3
•Originator Identifier—Enables adding an origin identifier to SYSLOG
messages. The options are:
-None—Do not include the origin identifier in SYSLOG messages.
-Hostname—Include the system hostname in SYSLOG messages.
-IPv4 Address—Include the IPv4 address of the sending interface in
SYSLOG messages.
-IPv6 Address—Include the IPv6 address of the sending interface in
SYSLOG messages.
-User Defined—Enter a description to be included in SYSLOG messages.
•RAM Memory Logging—Select the severity levels of the messages to be
logged to the RAM.
•Flash Memory Logging—Select the severity levels of the messages to be
logged to the Flash memory.
STEP 3 Click Apply. The Running Configuration file is updated.
Setting Remote Logging Settings
The Remote Log Servers page enables defining remote SYSLOG servers where
log messages are sent (using the SYSLOG protocol). For each server, you can
configure the severity of the messages that it receives.
•Server Definition—Select whether to identify the remote log server by IP
address or name.
•IP Version—Select the supported IP format.
•IPv6 Address Type—Select the IPv6 address type (if IPv6 is used). The
options are:
Cisco Small Business 200 Series Smart Switch Administration Guide 28
3
Administration: System Log
Viewing Memory Logs
-Link Local—The IPv6 address uniquely identifies hosts on a single
network link. A link local address has a prefix of FE80, is not routable, and
can be used for communication only on the local network. Only one link
local address is supported. If a link local address exists on the interface,
this entry replaces the address in the configuration.
-Global—The IPv6 address is a global Unicast IPV6 type that is visible and
reachable from other networks.
•Link Local Interface—Select the link local interface (if IPv6 Address Type
Link Local is selected) from the list.
•Log Server IP Address/Name—Enter the IP address or domain name of the
log server.
•UDP Port—Enter the UDP port to which the log messages are sent.
•Facility—Select a facility value from which system logs are sent to the
remote server. Only one facility value can be assigned to a server. If a second
facility code is assigned, the first facility value is overridden.
•Description—Enter a server description.
•Minimum Severity—Select the minimum level of system log messages to
be sent to the server.
STEP 4 Click Apply. The Add Remote Log Server page
added, and the Running Configuration file is updated.
Viewing Memory Logs
The device can write to the following logs:
•Log in RAM (cleared during reboot).
•Log in Flash memory (cleared only upon user command).
You can configure the messages that are written to each log by severity, and a
message can go to more than one log, including logs that reside on external
SYSLOG servers.
closes, the SYSLOG server is
29Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: System Log
Viewing Memor y Logs
RAM Memory
The RAM Memory page displays all messages that were saved in the RAM
(cache) in chronological order. Entries are stored in the RAM log according to the
configuration in the Log Settings page.
To view log entries, click Status and Statistics > View Log > RAM Memory.
The top of the page has a button that allows you to Disable Alert Icon Blinking.
Click to toggle between disable and enable.
This page contains the following fields:
3
•Log Index—Log entry number.
•Log Time—Time when message was generated.
•Severity—Event severity.
•Description—Message text describing the event.
To clear the log messages, click Clear Logs. The messages are cleared.
Flash Memory
The Flash Memory page displays the messages that were stored in the Flash
memory, in chronological order. The minimum severity for logging is configured in
the Log Settings page. Flash logs remain when the device is rebooted. You can
clear the logs manually.
To view the Flash logs, click Status and Statistics > View Log > Flash Memory.
This page contains the following fields:
•Log Index—Log entry number.
•Log Time—Time when message was generated.
•Severity—Event severity.
•Description—Message text describing the event.
To clear the messages, click Clear Logs. The messages are cleared.
Cisco Small Business 200 Series Smart Switch Administration Guide 30
3
Administration: System Log
Viewing Memory Logs
31Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
This section describes how system files are managed.
The following topics are covered:
•System Files
•Upgrade/Backup Firmware/Language
•Download/Backup Configuration/Log
4
System Files
•Configuration Files Properties
•Copy/Save Configuration
•DHCP Auto Configuration
System files are files that contain configuration information, firmware images or
boot code.
Various actions can be performed with these files, such as: selecting the firmware
file from which the device boots, copying various types of configuration files
internally on the device, or copying files to or from an external device, such as an
external server.
The possible methods of file transfer are:
•Internal copy.
•HTTP/HTTPS that uses the facilities that the browser provides.
•TFTF/SCP client, requiring a TFTP/SCP server.
Configuration files on the device are defined by their type, and contain the
settings and parameter values for the device.
Cisco Small Business 200 Series Smart Switch Administration Guide 32
4
Administration: File Management
System Files
When a configuration is referenced on the device, it is referenced by its
configuration file type (such as Startup Configuration or Running Configuration),
as opposed to a file name that can be modified by the user.
Content can be copied from one configuration file type to another, but the names
of the file types cannot be changed by the user.
Other files on the device include firmware, boot code, and log files, and are
referred to as operational files.
The configuration files are text files and can be edited in a text editor, such as
Notepad after they are copied to an external device, such as a PC.
Files and File Types
The following types of configuration and operational files are found on the device:
•Running Configuration—Contains the parameters currently being used by
the device to operate. This is the only file type that is modified when you
change parameter values on the device.
If the device is rebooted, the Running Configuration is lost. The Startup
Configuration, stored in Flash, overwrites the Running Configuration, stored
in RAM.
To preserve any changes you made to the device, you must save the
Running Configuration to the Startup Configuration, or another file type.
•Startup Configuration—The parameter values that were saved by copying
another configuration (usually the Running Configuration) to the Startup
Configuration.
The Startup Configuration is retained in Flash and is preserved when the
device is rebooted. At this time, the Startup Configuration is copied to RAM
and identified as the Running Configuration.
•Mirror Configuration—A copy of the Startup Configuration, created by the
device when the following conditions exist:
-The device has been operating continuously for 24 hours.
-No configuration changes have been made to the Running Configuration
in the previous 24 hours.
-The Startup Configuration is identical to the Running Configuration.
33Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
System Files
Only the system can copy the Startup Configuration to the Mirror
Configuration. However, you can copy from the Mirror Configuration to other
file types or to another device.
The option of automatically copying the Running Configuration to the mirror
configuration can be disabled in the Configuration Files Properties page.
•Backup Configuration—A manual copy of a configuration file used for
protection against system shutdown or for the maintenance of a specific
operating state. You can copy the Mirror Configuration, Startup
Configuration, or Running Configuration to a Backup Configuration file. The
Backup Configuration exists in Flash and is preserved if the device is
rebooted.
•Firmware—The program that controls the operations and functionality of
the device. More commonly referred to as the image.
4
•Boot Code—Controls the basic system startup and launches the firmware
image.
•Language File—The dictionary that enables the web-based configuration
utility windows to be displayed in the selected language.
•Flash Log—SYSLOG messages stored in Flash memory.
File Actions
The following actions can be performed to manage firmware and configuration
files:
•Upgrade the firmware or boot code, or replace a second language, as
described in Upgrade/Backup Firmware/Language section.
•Save configuration files on the device to a location on another device as
described in the Download/Backup Configuration/Log section.
•Clear the Startup Configuration or Backup Configuration file types as
described in the Configuration Files Properties section.
•Copy one configuration file type to another configuration file type as
described in the Copy/Save Configuration section.
•Enable automatically uploading a configuration file from a DHCP server to
the device, as described in the DHCP Auto Configuration section.
Cisco Small Business 200 Series Smart Switch Administration Guide 34
4
This section covers the following topics:
•Upgrade/Backup Firmware/Language
•Download/Backup Configuration/Log
•Configuration Files Properties
•Copy/Save Configuration
•DHCP Auto Configuration
Upgrade/Backup Firmware/Language
The Upgrade/Backup Firmware/Language process can be used to:
Administration: File Management
Upgrade/Backup Firmware/Language
•Upgrade or backup the firmware image.
•Upgrade or backup the boot code.
•Import or upgrade a second language file.
The following methods for transferring files are supported:
•HTTP/HTTPS that uses the facilities provided by the browser
•TFTP that requires a TFTP server
•Secure Copy Protocol (SCP) that requires an SCP server
If a new language file was loaded onto the device, the new language can be
selected from the drop-down menu. (It is not necessary to reboot the device).
A single firmware image is stored on the device. After new firmware has been
successfully loaded into the device, the device needs to be rebooted prior to the
new firmware taking effect. The Summary page continues to show the previous
image prior to the reboot.
35Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
Upgrade/Backup Firmware/Language
Upgrade/Backing Firmware or Language File
To upgrade or backup a software image or language file:
STEP 2 Click the Transfer Method. Proceed as follows:
•If you selected TFTP, go to STEP 3.
•If you selected via HTTP/HTTPS, go to STEP 4.
•If you selected via SCP, go to STEP 5.
STEP 3 If you selected via TFTP, enter the parameters as described in this step.
Otherwise, skip to STEP 4.
4
Select one of the following Save Actions:
•Upgrade—Specifies that the file type on the device is to be replaced with a
new version of that file type located on a TFTP server.
•Backup—Specifies that a copy of the file type is to be saved to a file on
another device.
Enter the following fields:
•File Type—Select the destination file type. Only valid file types are shown.
(The file types are described in the Files and File Types section).
•TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
•IP Version—Select whether an IPv4 or an IPv6 address is used.
•IPv6 Address Type—Select the IPv6 address type (if IPv6 is used). The
options are:
-Link Local—The IPv6 address uniquely identifies hosts on a single
network link. A link local address has a prefix of FE80, is not routable, and
can be used for communication only on the local network. Only one link
local address is supported. If a link local address exists on the interface,
this entry replaces the address in the configuration.
-Global—The IPv6 address is a global Unicast IPV6 type that is visible and
reachable from other networks.
Cisco Small Business 200 Series Smart Switch Administration Guide 36
4
Administration: File Management
Upgrade/Backup Firmware/Language
•Link Local Interface—Select the link local interface (if IPv6 is used) from the
list.
•TFTP Server IP Address/Name—Enter the IP address or the domain name
of the TFTP server.
•(For Upgrade) Source File Name—Enter the name of the source file.
•(For Backup) Destination File Name—Enter the name of the backup file.
STEP 4 If you selected via HTTP/HTTPS, you can only Upgrade. Enter the parameters as
described in this step.
•File Type—Select one of the following file types:
-Firmware Image—Select this to upgrade the firmware image.
-Language—Select this to upgrade the language file.
•File Name—Click Browse to select a file or enter the path and source file
name to be used in the transfer.
STEP 5 If you selected via SCP (Over SSH), see SSH Client Authentication for
instructions. Then, enter the following fields: (only unique fields are described, for
non-unique fields, see the descriptions above)
•Remote SSH Server Authentication—To enable SSH server authentication
(which is disabled by default), click Edit. This takes you to the SSH Server
Authentication page to configure the SSH server, and return to this page.
Use the SSH Server Authentication page to select an SSH user
authentication method (password or public/private key), set a username and
password on the device (if the password method is selected), and generate
an RSA or DSA key if required.
SSH Client Authentication—Client authentication can be done in one of the
following ways:
•Use SSH Client System Credentials—Sets permanent SSH user
credentials. Click System Credentials to go to the SSH User Authentication
page where the user/password can be set once for all future use.
•Use SSH Client One-Time Credentials—Enter the following:
-Username—Enter a username for this copy action.
-Password—Enter a password for this copy.
NOTE The username and password for one-time credential will not saved in
configuration file.
37Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
Upgrade/Backup Firmware/Language
Select one of the following Save Actions:
•Upgrade—Specifies that the file type on the device is to be replaced with a
new version of that file type located on a TFTP server.
•Backup—Specifies that a copy of the file type is to be saved to a file on
another device.
Enter the following fields:
•File Type—Select the destination file type. Only valid file types are shown.
(The file types are described in the Files and File Types section).
•SCP Server Definition—Select whether to specify the SCP server by IP
address or by domain name.
•IP Version—Select whether an IPv4 or an IPv6 address is used.
•IPv6 Address Type—Select the IPv6 address type (if used). The options
are:
4
-Link Local—The IPv6 address uniquely identifies hosts on a single
network link. A link local address has a prefix of FE80, is not routable, and
can be used for communication only on the local network. Only one link
local address is supported. If a link local address exists on the interface,
this entry replaces the address in the configuration.
-Global—The IPv6 address is a global Unicast IPv6 type that is visible and
reachable from other networks.
•Link-Local Interface—Select the link local interface from the list.
•SCP Server IP Address/Name—Enter the IP address or domain name of
the SCP server.
•(For Upgrade) Source File Name—Enter the name of the source file.
•(For Backup) Destination File Name—Enter the name of the backup file.
STEP 6 Click Apply. If the files, passwords and server addresses are correct, one of the
following may happen:
•If SSH server authentication is enabled (in the SSH Server Authentication
page), and the SCP server is trusted, the operation succeeds. If the SCP
server is not trusted, the operation fails and an error is displayed.
Cisco Small Business 200 Series Smart Switch Administration Guide 38
4
•If SSH server authentication is not enabled, the operation succeeds for any
SCP server.
Download/Backup Configuration/Log
The Download/Backup Configuration/Log page enables:
•Backing up configuration files or logs from the device to an external device.
•Restoring configuration files from an external device to the device.
When restoring a configuration file to the Running Configuration, the imported file
adds any configuration commands that did not exist in the old file and overwrites
any parameter values in the existing configuration commands.
Administration: File Management
Download/Backup Configuration/Log
When restoring a configuration file to the Startup Configuration or a backup
configuration file, the new file replaces the previous file.
When restoring to Startup Configuration, the device must be rebooted for the
restored Startup Configuration to be used as the Running Configuration. You can
reboot the device by using the process described in the Rebooting the Device
section.
Configuration File Backwards Compatibility
When restoring configuration files from an external device to the device, the
following compatibility issues might arise:
•Change Queues Mode from 4 to 8—Queue-related configurations must be
examined and adjusted to meet QoS objectives with the new Queues
mode. See the CLI Reference Guide for a listing of these QoS commands.
•Change Queues Mode from 8 to 4—Queue-related configuration
commands that conflict with the new Queues mode are rejected, meaning
that the download of the configuration file fails. Use the System Mode and
Stack Management page to change the Queues mode.
•Change the System Mode—If the System mode is contained in a
configuration file that is downloaded to the device, and the file's System
mode matches the current System mode, this information is ignored.
39Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
Download/Backup Configuration/Log
Otherwise, if the System mode is changed, the following cases are
possible:
-If the configuration file is downloaded onto the device (using the
-If the configuration file is downloaded during an automatic configuration
•See Configuration After Reboot for a description of what happens when
the stacking modes are changed.
4
Download/Backup Configuration/Log page), the operation is aborted,
and a message is displayed indicating that the System mode must be
changed in the System Mode and Stack Management page.
process, the Startup Configuration file is deleted and the device reboots
automatically in the new System mode. The device is configured with an
empty configuration file. See DHCP Auto Configuration.
Downloading or Backing-up a Configuration or Log File
To backup or restore the system configuration file:
STEP 3 If you selected via TFTP, enter the parameters. Otherwise, skip to STEP 4.
Select either Download or Backup as the Save Action.
Download Save Action—Specifies that the file on another device replaces a file
type on the device. Enter the following fields:
a. Server Definition—Select whether to specify the TFTP server by IP address
or by domain name.
b. IP Version—Select whether an IPv4 or an IPv6 address is used.
NOTE If the server is selected by name in the Server Definition, there is no
need to select the IP Version related options.
c. IPv6 Address Type—Select the IPv6 address type (if used). The options are:
-Link Local—The IPv6 address uniquely identifies hosts on a single
network link. A link local address has a prefix of FE80, is not routable, and
can be used for communication only on the local network. Only one link
local address is supported. If a link local address exists on the interface,
this entry replaces the address in the configuration.
Cisco Small Business 200 Series Smart Switch Administration Guide 40
4
Administration: File Management
Download/Backup Configuration/Log
-Global—The IPv6 address is a global Unicast IPV6 type that is visible and
reachable from other networks.
d. Link-Local Interface—Select the link local interface from the list.
e. TFTP Server—Enter the IP address of the TFTP server.
slashes (\ or /), cannot start with a period (.), and must include between 1 and
160 characters. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”).
g. Destination File Type—Enter the destination configuration file type. Only valid
file types are displayed. (The file types are described in the Files and File
Types section).
Backup Save Action—Specifies that a file type is to be copied to a file on another
device. Enter the following fields:
a. Server Definition—Select whether to specify the TFTP server by IP address
or by domain name.
b. IP Version—Select whether an IPv4 or an IPv6 address is used.
c. IPv6 Address Type—Select the IPv6 address type (if used). The options are:
•Link Local—The IPv6 address uniquely identifies hosts on a single network
link. A link local address has a prefix of FE80, is not routable, and can be used
for communication only on the local network. Only one link local address is
supported. If a link local address exists on the interface, this entry replaces
the address in the configuration.
•Global—The IPv6 address is a global Unicast IPV6 type that is visible and
reachable from other networks.
d. Link-Local Interface—Select the link local interface from the list.
e. TFTP Server IP Address/Name—Enter the IP address or domain name of the
TFTP server.
f.Source File Type—Enter the source configuration file type. Only valid file
types are displayed. (The file types are described in the Files and File Types
section).
g. Sensitive Data—Select how sensitive data should be included in the backup
file. The following options are available:
-Exclude—Do not include sensitive data in the backup.
-Encrypted—Include sensitive data in the backup in its encrypted form.
41Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
Download/Backup Configuration/Log
-Plaintext—Include sensitive data in the backup in its plaintext form.
NOTE The available sensitive data options are determined by the current
user SSD rules. For details, refer to Secure Sensitive Data Management >
SSD Rules page.
h. Destination File Name—Enter the destination file name. File names cannot
contain slashes (\ or /), the leading letter of the file name must not be a period
(.), and the file name must be between 1 and 160 characters. (Valid characters:
A-Z, a-z, 0-9, “.”, “-”, “_”).
i.Click Apply. The file is upgraded or backed up.
STEP 4 If you selected via HTTP/HTTPS, enter the parameters as described in this step.
Select the Save Action.
If Save Action is Download (replacing the file on the device with a new version
from another device), do the following. Otherwise, go to the next procedure in this
step.
4
a. Source File Name—Click Browse to select a file or enter the path and source
file name to be used in the transfer.
b. Destination File Type—Select the configuration file type. Only valid file types
are displayed. (The file types are described in the Files and File Types
section).
c. Click Apply. The file is transferred from the other device to the device.
If Save Action is Backup (copying a file to another device), do the following:
a. Source File Type—Select the configuration file type. Only valid file types are
displayed. (The file types are described in the Files and File Types section).
b. Sensitive Data—Select how sensitive data should be included in the backup
file. The following options are available:
-Exclude—Do not include sensitive data in the backup.
-Encrypted—Include sensitive data in the backup in its encrypted form.
-Plaintext—Include sensitive data in the backup in its plaintext form.
NOTE The available sensitive data options are determined by the current
user SSD rules. For details, refer to Secure Sensitive Data Management >
SSD Rules page.
c. Click Apply. The file is upgraded or backed up.
Cisco Small Business 200 Series Smart Switch Administration Guide 42
4
Administration: File Management
Download/Backup Configuration/Log
STEP 5 f you selected via SCP (Over SSH), see SSH Client Configuration Through the
GUI for instructions. Then enter the following fields:
•Remote SSH Server Authentication—To enable SSH server authentication
(it is disabled by default), click Edit, which takes you to the SSH Server
Authentication page to configure this, and return to this page. Use the SSH
Server Authentication page to select an SSH user authentication method
(password or public/private key), set a username and password on the
device, if the password method is selected, and generate an RSA or DSA
key if required.
SSH Client Authentication—Client authentication can be done in one of the
following ways:
•Use SSH Client—Sets permanent SSH user credentials. Click System
Credentials to go to the SSH User Authentication page where the user/
password can be set once for all future use.
•Use SSH Client One-Time Credentials—Enter the following:
-Username—Enter a username for this copy action.
-Password—Enter a password for this copy.
•SCP Server Definition—Select whether to specify the TFTP server by IP
address or by domain name.
•IP Version—Select whether an IPv4 or an IPv6 address is used.
•IPv6 Address Type—Select the IPv6 address type (if used). The options
are:
-Link Local—The IPv6 address uniquely identifies hosts on a single
network link. A link local address has a prefix of FE80, is not routable, and
can be used for communication only on the local network. Only one link
local address is supported. If a link local address exists on the interface,
this entry replaces the address in the configuration.
-Global—The IPv6 address is a global Unicast IPV6 type that is visible and
reachable from other networks.
•Link-Local Interface—Select the link local interface from the list.
•SCP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
43Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
Configuration Files Properties
If Save Action is Download (replacing the file on the device with a new version
from another device), enter the following fields.
•Source File Name—Enter the name of the source file.
•Destination File Type—Select the configuration file type. Only valid file
types are displayed. (The file types are described in the Files and File
Types section).
If Save Action is Backup (copying a file to another device), enter the following
fields (in addition to those fields listed above):
•Source File Type—Select the configuration file type. Only valid file types
are displayed. (The file types are described in the Files and File Types
section).
•Sensitive Data—Select how sensitive data should be included in the
backup file. The following options are available:
4
-Exclude—Do not include sensitive data in the backup.
-Encrypted—Include sensitive data in the backup in its encrypted form.
-Plaintext—Include sensitive data in the backup in its plaintext form.
NOTE The available sensitive data options are determined by the current
user SSD rules. For details, refer to Secure Sensitive Data Management >
SSD Rules page.
•Destination File Name—Name of file being copied to.
STEP 6 Click Apply. The file is upgraded or backed up.
Configuration Files Properties
The Configuration Files Properties page allows you to see when various system
configuration files were created. It also enables deleting the Startup Configuration
and Backup Configuration files. You cannot delete the other configuration file
types.
Cisco Small Business 200 Series Smart Switch Administration Guide 44
4
Administration: File Management
Copy/Save Configuration
ITo set whether mirror configuration files will be created, clear configuration files
and see when configuration files were created:
STEP 2 If required, disable Auto Mirror Configuration. This disables the automatic
creation of mirror configuration files. When disabling this feature, the mirror
configuration file, if it exists, is deleted. See System Files for a description of
mirror files and why you might not want to automatically create mirror
configuration files.
STEP 3 If required, select either the Startup Configuration, Backup Configuration or both
and click Clear Files to delete these files.
This page provides the following fields:
•Configuration File Name—Displays the type of file.
•Creation Time—Displays the date and time that file was modified.
Copy/Save Configuration
When you click Apply on any window, changes that you made to the device
configuration settings are stored only in the Running Configuration. To preserve
the parameters in the Running Configuration, the Running Configuration must be
copied to another configuration type or saved on another device.
!
CAUTION Unless the Running Configuration is copied to the Startup Configuration or another
configuration file, all changes made since the last time the file was copied are lost
when the device is rebooted.
45Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
Copy/Save Configuration
The following combinations of copying internal file types are allowed:
•From the Running Configuration to the Startup Configuration or Backup
Configuration.
•From the Startup Configuration to the Running Configuration, Startup
Configuration or Backup Configuration.
•From the Backup Configuration to the Running Configuration, Startup
Configuration or Backup Configuration.
•From the Mirror Configuration to the Running Configuration, Startup
Configuration or Backup Configuration.
To copy one type of configuration file to another type of configuration file:
STEP 2 Select the Source File Name to be copied. Only valid file types are displayed
(described in the Files and File Types section).
STEP 3 Select the Destination File Name to be overwritten by the source file.
•If you are backing up a configuration file, select one of the following formats
for the backup file.
-Exclude—Sensitive data is not included in the backup file.
-Encrypted—Sensitive data is included in the backup file in encrypted
form.
-Plaintext—Sensitive data is included in the backup file in plain text.
NOTE The available sensitive data options are determined by the current
user SSD rules. For details, refer to Secure Sensitive Data Management >
SSD Rules page.
STEP 4 The Save Icon Blinking field indicates whether an icon blinks when there is
unsaved data. To disable/enable this feature, click Disable/Enable Save Icon
Blinking.
STEP 5 Click Apply. The file is copied.
Cisco Small Business 200 Series Smart Switch Administration Guide 46
4
DHCP Auto Configuration
Auto configuration enables passing configuration information to hosts on a TCP/IP
network. Based on this protocol, the Auto Configuration feature enables a device
to download configuration files from a TFTP/SCP server.
The device can be configured as a DHCPv4 client in which auto configuration from
a DHCPv4 server is supported and/or a DHCPv6 client in which auto configuration
from a DHCPv6 server is supported.
By default, the device is enabled as a DHCP client when the Auto Configuration
feature is enabled.
The Auto Configuration process also supports downloading a configuration file
that includes sensitive information, such as RADIUS server keys and SSH/SSL
keys, by using the Secured Copy Protocol (SCP) and the Secure Sensitive Data
(SSD) feature (See Security: Secure Sensitive Data Management).
Administration: File Management
DHCP Auto Configuration
DHCPv4 Auto Configuration is triggered in the following cases:
•After reboot when an IP address is allocated or renewed dynamically (using
DHCPv4).
•Upon an explicit DHCPv4 renewal request and if the device and the server
are configured to do so.
•Upon automatic renewal of the DHCPv4 lease.
DHCPv6 Auto Configuration is triggered when the following conditions are fulfilled:
•When a DHCPv6 server sends information to the device. This occurs in the
following cases:
-When an interface, which is IPv6 enabled, is defined as a DHCPv6
stateless configuration client.
-When DHCPv6 messages are received from the server (for example,
when you press the Restart button on IPv6 Interfaces page,
-When DHCPv6 information is refreshed by the device.
-After rebooting the device when stateless DHCPv6 client is enabled.
•When the DHCPv6 server packets contain the configuration filename
option.
47Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
DHCP Auto Configuration
DHCP Server Options
DHCP messages might contain the configuration server name/address and the
configuration file name/path (these are optional options). These options are found
in the Offer message coming from the DHCPv4 servers and in the Information Reply messages coming from DHCPv6 servers.
Backup information (configuration server name/address and configuration file
name/path) can be configured in the Auto Configuration page. This information is
used when the DHCPv4 message does not contain this information (but it is not
used by DHCPv6).
Auto Configuration Download Protocol (TFTP or SCP)
The Auto Configuration download protocol can be configured, as follows:
4
•Auto By File Extension—(Default) If this option is selected, a user-defined
file extension indicates that files with this extension are downloaded using
SCP (over SSH), while files with other extensions are downloaded using
TFTP. For example, if the file extension specified is.xyz, files with the .xyz
extension are downloaded using SCP, and files with the other extensions
are downloaded using TFTP.
•TFTP Only—The download is done through TFTP regardless of the file
extension of the configuration file name.
•SCP Only—The download is done through SCP (over SSH) regardless of
the file extension of the configuration file name.
SSH Client Authentication Parameters
By default, remote SSH server authentication is disabled, so that the device
accepts any remote SSH server out of the box. You can enable remote SSH server
authentication to only allow connections from servers found in the trusted server
list.
SSH Client Authentication parameters are required to access the SSH server by
the client (which is the device). The default SSH Client authentication parameters
are:
•SSH Authentication method: by username/password
•SSH username: anonymous
•SSH password: anonymous
Cisco Small Business 200 Series Smart Switch Administration Guide 48
4
Administration: File Management
DHCP Auto Configuration
NOTE The SSH Client authentication parameters can also be used when downloading a
file for manual download (a download that is not performed through the DHCP Auto
Configuration feature).
Auto Configuration Process
When the Auto Configuration process is triggered, the following sequence of
events occurs:
•The DHCP server is accessed to acquire the TFTP/SCP server name/
address and configuration file name/path (DHCPv4 options: 66,150, and 67,
DHCPv6 options: 59 and 60).
•If a server and configuration file options were not supplied by the DHCP
server, then:
-For DHCPv4: The user-defined, backup configuration file name is used.
-For DHCPv6: The process is halted.
•If the DHCP server did not send these options and the backup TFTP/SCP
server address parameter is empty then:
-For DHCPv4:
SCP—The Auto Configuration process is halted.
TFTP—The device sends TFTP Request messages to a limited
Broadcast address (for IPv4) or ALL NODES address (for IPv6) on its IP
interfaces and continues the process of Auto Configuration with the first
answering TFTP server.
-For DHCPv6: The Auto Configuration process is halted.
•If the configuration filename was supplied by the DHCP server (DHCPv4:
option 67, DHCPv6: option 60), then the copy protocol (SCP/TFTP) is
selected as described in Auto Configuration Download Protocol (TFTP or
SCP).
•When downloading using SCP, the device accepts any specified SCP/SSH
server (without authentication) if either of the following is true:
-The SSH server authentication process is disabled. Note that by default
the SSH server authentication is disabled in order to allow downloading
configuration file for devices with factory default configuration (for
example out-of-box devices).
49Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: File Management
DHCP Auto Configuration
-The SSH Server is configured in the SSH Trusted Servers list.
If the SSH server authentication process is enabled, and the SSH server is
not found in the SSH Trusted Servers list, the Auto Configuration process is
halted.
•If the information is available, the TFTP/SCP server is accessed to download
the file from it.
The download process is done only if the new configuration filename is
different from the current configuration filename (even if the current
configuration file is empty).
•A SYSLOG message is generated acknowledging that the Auto
Configuration process is completed.
Configuring DHCP Auto Configuration
4
Workflow
To configure DHCP Auto Configuration.
1. Configure the DHCPv4 and/or DHCPv6 servers to send the required options.
this process is not described in this guide.
2. Configure Auto Configuration parameters.
3. Set the IP Address Type to Dynamic in the IPv4 Interface page.
Web Configuration
The DHCP Auto Configuration page is used to perform the following actions when
the information is not provided in a DHCP message:
•Enable the DHCP auto configuration feature.
•Specify the download protocol.
•Configure the device to receive configuration information from a specific file
on a specific server.
Note the following regarding the DHCP auto configuration process:
•A configuration file that is placed on the TFTP/SCP server must match the
form and format requirements of the supported configuration file. The form
Cisco Small Business 200 Series Smart Switch Administration Guide 50
4
Administration: File Management
DHCP Auto Configuration
and format of the file are checked, but the validity of the configuration
parameters is not checked prior to loading it to the Startup Configuration.
•In IPv4, to ensure that the device configuration functions as intended, due to
allocation of different IP addresses with each DHCP renew cycle, it is
recommended that IP addresses be bound to MAC addresses in the DHCP
server table. This ensures that each device has its own reserved IP address
and other relevant information.
•Auto Configuration Via DHCP—Select this field to enable DHCP Auto
Configuration. This feature is enabled by default, but can be disabled here.
•Download Protocol—Select one of the following options:
Auto By File Extension
-
the TFTP or SCP protocol depending on the extension of the
configuration file. If this option is selected, the extension of the
configuration file does not necessarily have to be given. If it is not given,
the default extension is used (as indicated below).
-
File Extension for SCP
indicate a file extension here. Any file with this extension is downloaded
using SCP. If no extension is entered, the default file extension.scp is
used.
-
TFTP Only
for auto configuration.
SCP Only
-
auto configuration.
•SSH Settings for SCP—When using SCP for downloading the configuration
files, select one of the following options:
-
Remote SSH Server Authentication
navigate to the SSH Server Authentication page. There you can enable
authentication of the SSH server to be used for the download and enter
the trusted SSH server if required.
—Select to indicate that only the TFTP protocol is to be used
—Select to indicate that only the SCP protocol is to be used for
—Select to indicate that auto configuration uses
—If Auto By File Extension is selected, you can
—Click on the Enable/Disable link to
-
SSH Client Authentication
user credentials in the SSH User Authentication page.
51Cisco Small Business 200 Series Smart Switch Administration Guide
—Click on the System Credentials link to enter
Administration: File Management
DHCP Auto Configuration
STEP 3 Enter the following optional information to be used if no configuration file name
was received from the DHCP server.
•Backup Server Definition—Select By IP address or By name to configure
the server.
•IP Version—Select whether an IPv4 or an IPv6 address is used.
•IPv6 Address Type—Select the IPv6 address type (if IPv6 is used). The
options are:
-Link Local—The IPv6 address uniquely identifies hosts on a single
-Global—The IPv6 address is a global Unicast IPV6 type that is visible and
4
network link. A link local address has a prefix of FE80, is not routable, and
can be used for communication only on the local network. Only one link
local address is supported. If a link local address exists on the interface,
this entry replaces the address in the configuration.
reachable from other networks.
•Link Local Interface—Select the link local interface (if IPv6 is used) from the
list.
•Backup Server IP Address/Name—Enter the IP address or the name of the
server to be used if no server IP address was specified in the DHCP
message.
•Backup Configuration File Name—Enter the path and file name of the file to
be used if no configuration file name was specified in the DHCP message.
STEP 4 Click Apply. The parameters are copied to the Running Configuration file.
Cisco Small Business 200 Series Smart Switch Administration Guide 52
4
Administration: File Management
DHCP Auto Configuration
53Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: General Information
This section describes how to view system information and configure various
options on the device.
It covers the following topics:
•Device Models
•System Information
5
Device Models
NOTE The following port conventions are used:
•Rebooting the Device
•Monitoring Fan Status
•Defining Idle Session Timeout
•Pinging a Host
All models can be fully managed through the web-based switch configuration
utility.
•GE is used for Gigabit Ethernet (10/100/1000) ports.
•FE is used for Fast Ethernet (10/100) ports.
Cisco Small Business 200 Series Smart Switch Administration Guide 54
5
Smart Switch Models
Administration: General Information
Device Models
The following table describes the various models, the number and type of ports
on them and their PoE information.
Model NameProduct ID
(PID)
SG200-18SLM2016T16 GE ports + 2 GE special-purpose
SG200-26SLM2024T24 GE ports + 2 GE special-purpose
SG200-26PSLM2024PT24 GE ports + 2 GE special-purpose
SG200-50SLM2048T48 GE ports + 2 GE special-purpose
SG200-50PSLM2048PT48 GE ports + 2 GE special-purpose
SF200-24SLM224GT24 FE ports + 2 GE special-purpose
Description of Ports on DevicePower
combo ports
combo-ports
combo-ports
combo-ports
combo-ports
combo-ports
No. of Ports
Dedicated
to PoE
N/AN/A
N/AN/A
100W12 ports
N/AN/A
180W24 ports
N/AN/A
that Support
PoE
FE1-FE6, FE13
- FE18
FE1-FE12,
FE25 - FE36
SF200-24PSLM224PT24 FE ports + 2 GE special-purpose
combo-ports
SF200-48SLM248GT48 FE ports + 2 GE special-purpose
combo-ports
55Cisco Small Business 200 Series Smart Switch Administration Guide
100W12 ports
FE1- FE6,
FE13 - FE18
N/AN/A
Administration: General Information
System Information
System Information
The System Summary page provides a graphic view of the device, and displays
device status, hardware information, firmware version information, general PoE
status, and other items.
Displaying the System Summary
To view system information, click Status and Statistics > System Summary.
The System Summary page contains system and hardware information.
System Information:
•System Description—A description of the system.
5
•System Location—Physical location of the device. Click Edit to go the
System Settings page to enter this information.
•System Contact—Name of a contact person. Click Edit to go the System
Settings page to enter this information.
•Host Name—Name of the device. Click Edit to go the System Settings
page to enter this information. By default, the device hostname is
composed of the word device concatenated with the three least significant
bytes of the device MAC address (the six furthest right hexadecimal digits).
•System Object ID—Unique vendor identification of the network
management subsystem contained in the entity (used in SNMP).
•System Uptime—Time that has elapsed since the last reboot.
•Current Time—Current system time.
•Base MAC Address—Device MAC address.
•Jumbo Frames—Jumbo frame support status. This support can be
enabled or disabled by using the Port Settings page of the Port
Management menu.
NOTE Jumbo frames support takes effect only after it is enabled, and after
the device is rebooted.
TCP/UDP Services Status:
•HTTP Service—Displays whether HTTP is enabled/disabled.
Cisco Small Business 200 Series Smart Switch Administration Guide 56
5
Administration: General Information
System Information
•HTTPS Service—Displays whether HTTPS is enabled/disabled.
•SNMP Service—Displays whether SNMP is enabled/disabled.
Other Summary Information:
•Model Description—Device model description.
•Serial Number—Serial number.
•PID VID—Part number and version ID.
PoE Power Information:
•Maximum Available PoE Power (W)—Maximum available power that can
be delivered by the PoE.
•Total PoE Power Consumption (W)—To tal PoE p ower delive red to
connected PoE devices.
•PoE Power Mode—Port Limit or Class Limit.
Configuring the System Settings
To enter system settings:
STEP 1 Click Administration > System Settings.
STEP 2 View or modify the system settings.
•System Description—Displays a description of the device.
•System Location—Enter the location where the device is physically
located.
•System Contact—Enter the name of a contact person.
•Host Name—Select the host name of this device. This is used in the prompt
of CLI commands:
-Use Default—The default hostname (System Name) of these switches is:
switch123456, where 123456 represents the last three bytes of the
device MAC address in hex format.
-User Defined—Enter the hostname. Use only letters, digits, and hyphens.
Host names cannot begin or end with a hyphen. No other symbols,
punctuation characters, or blank spaces are permitted (as specified in
RFC1033, 1034, 1035).
57Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: General Information
Rebooting the Device
•Custom Login Screen Settings—To display text on the Login page, enter
the text in the Login Banner text box. Click Preview to view the results.
NOTE When you define a login banner from the web-based configuration
utility, it also activates the banner for the CLI interfaces (Console, Telnet, and
SSH).
STEP 3 Click Apply to save the values in the Running Configuration file.
Rebooting the Device
Some configuration changes, such as enabling jumbo frame support, require the
system to be rebooted before they take effect. However, rebooting the device
deletes the Running Configuration, so it is critical that the Running Configuration is
saved to the Startup Configuration before the device is rebooted. Clicking Apply
does not save the configuration to the Startup Configuration. For more information
on files and file types, see the System Files section.
5
You can back up the configuration by using
Copy/Save Configuration
upload the configuration from a remote device. See the Download/Backup
Configuration/Log section.
There are cases when you might prefer to set the time of the reboot for some time
in the future. This could happen for example in one of the following cases:
•You are performing actions on a remote device, and these actions might
create loss of connectivity to the remote device. Pre-scheduling a reboot
restores the working configuration and enables restoring the connectivity to
the remote device. If these actions are successful, the delayed reboot can
be cancelled.
•Reloading the device cause loss of connectivity in the network, thus by
using delayed reboot, you can schedule the reboot to a time that is more
convenient for the users (e.g. late night).
To reboot the device:
STEP 1 Click Administration > Reboot.
STEP 2 Click one of the Reboot buttons to reboot the device.
or clicking Save at the top of the window. You can also
Administration > File Management >
Cisco Small Business 200 Series Smart Switch Administration Guide 58
5
Administration: General Information
Rebooting the Device
•Reboot—Reboots the device. Since any unsaved information in the Running
Configuration is discarded when the device is rebooted, you must click Save
in the upper-right corner of any window to preserve current configuration
across the boot process. If the Save option is not displayed, the Running
Configuration matches the Startup Configuration and no action is necessary.
The following options are available:
-Immediate—Reboot immediately.
-Date—Enter the date (month/day) and time (hour and minutes) of the
schedule reboot. This schedules a reload of the software to take place
at the specified time (using a 24-hour clock). If you specify the month
and day, the reload is scheduled to take place at the specified time and
date. If you do not specify the month and day, the reload takes place at
the specified time on the current day (if the specified time is later than
the current time) or on the next day (if the specified time is earlier than
the current time). Specifying 00:00 schedules the reload for midnight.
The reload must take place within 24 days.
NOTE This option can only be used if the system time has either been set
manually or by SNTP.
-In—Reboot within the specified number of hours and minutes. The
maximum amount of time that can pass is 24 days.
•Reboot to Factory Defaults—Reboots the device by using the factory
default configuration. This process erases the Startup Configuration file, and
the backup configuration file. The mirror configuration file is not deleted
when restoring to factory default.
•Clear Startup Configuration File—Check to clear the startup configuration
on the device for the next time it boots up.
NOTE Clearing the Startup Configuration File and Rebooting is not the same
as Rebooting to Factory Defaults. Rebooting to Factory Defaults is more
intrusive.
59Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: General Information
Monitoring Fan Status
Monitoring Fan Status
The Health page displays the fan status on all devices with fans. Depending on the
model, there are one or more fans on a device. Some models have no fans at all.
On devices on which a temperature sensor is assembled, for protecting the device
hardware in case it overheats, the following actions are performed by the device if
it overheats and during the cool down period after overheating:
Event Action
5
At least one temperature
sensor exceeds the
Warning threshold
At least one temperature
sensor exceeds the Critical
threshold
The following are generated:
•SYSLOG message
•SNMP trap
The following are generated:
•SYSLOG message
•SNMP trap
The following actions are performed:
•System LED is set to solid amber (if hardware
supports this).
•Disable Ports — When the Critical
temperature has been exceeded for two
minutes, all ports will be shut down.
•(On devices that support PoE) Disable the
PoE circuitry so that less power is consumed
and less heat is emitted.
Cool down period after the
Critical threshold was
exceeded (all sensors are
lower than the Warning
threshold - 2 °C).
Cisco Small Business 200 Series Smart Switch Administration Guide 60
After all the sensors cool down to Warning
Threshold minus 2 degree C, the PHY will be reenabled, and all ports brought back up.
If FAN status is OK, the ports are enabled.
(On devices that support PoE) the PoE circuitry is
enabled.
5
Administration: General Information
Defining Idle Session Timeout
To view the device health parameters, click Status and Statistics > Health.
The Health page displays the following fields:
•Fan Status—Fan status. The following values are possible:
-OK—Fan is operating normally.
-Fail—Fan is not operating correctly.
-N/A—Fan ID is not applicable for the specific model.
•Fan Direction—(On relevant devices) The direction that the fans are
working in (for example: Front to Back).
Defining Idle Session Timeout
The
Idle Session Timeout
session can remain idle before it times out and you must log in again to reestablish
the session.
•HTTP Session Timeout
•HTTPS Session Timeout
To set the idle session timeout of an HTTP or HTTPS session:
STEP 2 Select the timeout for the each session from the corresponding list. The default
timeout value is 10 minutes.
STEP 3 Click Apply to set the configuration settings on the device.
configures the time interval during which the HTTP
61Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: General Information
Pinging a Host
Pinging a Host
Ping is a utility used to test if a remote host can be reached and to measure the
round-trip time for packets sent from the device to a destination device.
Ping operates by sending Internet Control Message Protocol (ICMP) echo request
packets to the target host and waiting for an ICMP response, sometimes called a
pong. It measures the round-trip time and records any packet loss.
To ping a host:
STEP 1 Click Administration > Ping.
STEP 2 Configure ping by entering the fields:
•Host Definition—Select whether to specify hosts by their IP address or
name.
5
•IP Version—If the host is identified by its IP address, select either IPv4 or
IPv6 to indicate that it will be entered in the selected format.
•IPv6 Address Type—Select Link Local or Global as the type of IPv6
address to enter.
-Link Local—The IPv6 address uniquely identifies hosts on a single
network link. A link local address has a prefix of FE80, is not routable, and
can be used for communication only on the local network. Only one link
local address is supported. If a link local address exists on the interface,
this entry replaces the address in the configuration.
-Global—The IPv6 address is a global Unicast IPV6 type that is visible and
reachable from other networks.
•Link Local Interface—If the IPv6 address type is Link Local, select from
where it is received.
•Host IP Address/Name—Address or host name of the device to be pinged.
Whether this is an IP address or host name depends on the Host Definition.
•Ping Interval—Length of time the system waits between ping packets. Ping
is repeated the number of times configured in the "Number of Pings" field,
whether the ping succeeds or not. Choose to use the default interval or
specify your own value.
•Number of Pings—The number of times the ping operation is performed.
Choose to use the default or specify your own value.
Cisco Small Business 200 Series Smart Switch Administration Guide 62
5
Administration: General Information
Pinging a Host
•Status—Displays whether the ping succeeded or failed.
STEP 3 Click Activate Ping to ping the host. The ping status appears and another
message is added to the list of messages, indicating the result of the ping
operation.
STEP 4 View the results of ping in the Ping Counters and Status section of the page.
63Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Time Settings
Synchronized system clocks provide a frame of reference between all devices on
the network. Network time synchronization is critical because every aspect of
managing, securing, planning, and debugging a network involves determining
when events occur. Without synchronized clocks, accurately correlating log files
between devices when tracking security breaches or network usage is
impossible.
Synchronized time also reduces confusion in shared file systems, as it is important
for the modification times to be consistent, regardless of the machine on which the
file systems reside.
6
For these reasons, it is important that the time configured on all of the devices on
the network is accurate.
NOTE The device supports Simple Network Time Protocol (SNTP) and when enabled, the
device dynamically synchronizes the device time with time from an SNTP server.
The device operates only as an SNTP client, and cannot provide time services to
other devices.
This section describes the options for configuring the system time, time zone, and
Daylight Savings Time (DST). It covers the following topics:
•System Time Options
•SNTP Modes
•Configuring System Time
Cisco Small Business 200 Series Smart Switch Administration Guide 64
6
System Time Options
System time can be set manually by the user, dynamically from an SNTP server, or
synchronized from the PC running the GUI. If an SNTP server is chosen, the manual
time settings are overwritten when communications with the server are
established.
As part of the boot process, the device always configures the time, time zone, and
DST. These parameters are obtained from the PC running the GUI, SNTP, values
set manually, or if all else fails, from the factory defaults.
Time
The following methods are available for setting the system time on the device:
•Manual—You must manually sets the time.
Administration: Time Settings
System Time Options
•From PC—Time can be received from the PC by using browser information.
The configuration of time from the computer is saved to the Running
Configuration file. You must copy the Running Configuration to the Startup
Configuration in order to enable the device to use the time from the
computer after reboot. The time after reboot is set during the first WEB login
to the device.
When you configure this feature for the first time, if the time was not already
set, the device sets the time from the PC.
This method of setting time works with both HTTP and HTTPS connections.
•SNTP—Time can be received from SNTP time servers. SNTP ensures
accurate network time synchronization of the device up to the millisecond by
using an SNTP server for the clock source. When specifying an SNTP server,
if choosing to identify it by hostname, three suggestions are given in the GUI:
-time-a.timefreq.bldrdoc.gov
-time-b.timefreq.bldrdoc.gov
-time-c.timefreq.bldrdoc.gov
After the time has been set by any of the above sources, it is not set again by the
browser.
NOTE SNTP is the recommended method for time setting.
65Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Time Settings
SNTP Modes
Time Zone and Daylight Savings Time (DST)
The Time Zone and DST can be set on the device in the following ways:
•Dynamic configuration of the device through a DHCP server, where:
•Manual configuration of the time zone and DST becomes the Operational
6
-Dynamic DST, when enabled and available, always takes precedence
over the manual configuration of DST.
-If the server supplying the source parameters fails, or dynamic
configuration is disabled by the user, the manual settings are used.
-Dynamic configuration of the time zone and DST continues after the IP
address lease time has expired.
time zone and DST, only if the dynamic configuration is disabled or fails.
SNTP Modes
NOTE The DHCP server must supply DHCP option 100 in order for dynamic
time zone configuration to take place.
The device can receive the system time from an SNTP server in one of the
following ways:
•Client Broadcast Reception (passive mode)
SNTP servers broadcast the time, and the device listens to these
broadcasts. When the device is in this mode, there is no need to define a
Unicast SNTP server.
•Client Broadcast Transmission (active mode)—T he dev ice, as an S NTP
client, periodically requests SNTP time updates. This mode works in either
of the following ways:
-SNTP Anycast Client Mode—The device broadcasts time request
packets to all SNTP servers in the subnet, and waits for a response.
-Unicast SNTP Server Mode—The device sends Unicast queries to a list
of manually-configured SNTP servers, and waits for a response.
The device supports having all of the above modes active at the same time and
selects the best system time received from an SNTP server, according to an
algorithm based on the closest stratum (distance from the reference clock).
Cisco Small Business 200 Series Smart Switch Administration Guide 66
6
Configuring System Time
Selecting Source of System Time
Use the System Time page to select the system time source. If the source is
manual, you can enter the time here.
!
CAUTION If the system time is set manually and the device is rebooted, the manual time
settings must be reentered.
To define system time:
Administration: Time Settings
Configuring System Time
STEP 1 Click Administration > Time Settings > System Time.
The following fields are displayed:
•Actual Time (Static)—System time on the device. This shows the DHCP
time zone or the acronym for the user-defined time zone if these were
defined.
•Last Synchronized Server—Address, stratum and type of the SNTP server
from which time was last taken.
STEP 2 Enter these parameters:
Clock Source Settings—Select the source used to set the system clock.
•Main Clock Source (SNTP Servers)—If you enable this, the system time is
obtained from an SNTP server. To use this feature, you must also configure a
connection to an SNTP server in the SNTP Interface Settings page.
Optionally, enforce authentication of the SNTP sessions by using the SNTP
Authentication page.
•Alternate Clock Source (PC via active HTTP/HTTPS sessions)—Select to
set the date and time from the configuring computer using the HTTP
protocol.
NOTE The Clock Source Setting needs to be set to either of the above in
order for RIP MD5 authentication to work. This also helps features that
associate with time, for example:
67Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Time Settings
Configuring System Time
Manual Settings—Set the date and time manually. The local time is used when
there is no alternate source of time, such as an SNTP server:
•Date—Enter the system date.
•Local Time—Enter the system time.
Time Zone Settings—The local time is used via the DHCP server or Time Zone
offset.
•Get Time Zone from DHCP—Select to enable dynamic configuration of the
6
time zone and the DST from the DHCP server. Whether one or both of these
parameters can be configured depends on the information found in the
DHCP packet. If this option is enabled, you must also enable DHCP client on the device.
NOTE The DHCP Client supports Option 100 providing dynamic time zone
setting.
•Time Zone from DHCP—Displays the acronym of the time zone configured
from the DHCP server. This acronym appears in the Actual Time field
•Time Zone Offset—Select the difference in hours between Greenwich
Mean Time (GMT) and the local time. For example, the Time Zone Offset for
Paris is GMT +1, while the Time Zone Offset for New York is GMT – 5.
•Time Zone Acronym—Enter a user-defined name that represents the time
zone you have configured. This acronym appears in the Actual Time field.
Daylight Savings Settings—Select how DST is defined:
•Daylight Savings—Select to enable Daylight Saving Time.
•Time S et O ffs et—Enter the number of minutes offset from GMT ranging from
1—1440. The default is 60.
•Daylight Savings Type—Click one of the following:
USA
-
-
—DST is set according to the dates used in the USA.
European
Union and other countries that use this standard.
—DST is set according to the dates used by the European
By Dates
-
or a European country. Enter the following parameters:
-
Recurring
Selecting
Cisco Small Business 200 Series Smart Switch Administration Guide 68
—DST is set manually, typically for a country other than the USA
—DST occurs on the same date every year.
By Dates
allows customization of the start and stop of DST:
6
Administration: Time Settings
Configuring System Time
-From—Day and time that DST starts.
-To —Day and time that DST ends.
Selecting
DST:
•From—Date when DST begins each year.
Day
-
Week
-
-
Month
Time
-
•To —Date when DST ends each year. For example, DST ends locally every
fourth Friday in October at 5:00 am. The parameters are:
Day
-
Week
-
Month
-
Time
-
STEP 3 Click Apply. The system time values are written to the Running Configuration file.
Recurring
—Day of the week on which DST begins every year.
—Week within the month from which DST begins every year.
—Month of the year in which DST begins every year.
—The time at which DST begins every year.
—Day of the week on which DST ends every year.
—Week within the month from which DST ends every year.
—Month of the year in which DST ends every year.
—The time at which DST ends every year.
allows different customization of the start and stop of
Adding a Unicast SNTP Server
Up to 16 Unicast SNTP servers can be configured.
NOTE To specify a Unicast SNTP server by name, you must first configure DNS server(s)
on the device (see DNS Settings). In order to add a Unicast SNTP server, check the
box to enable SNTP Client Unicast.
To add a Unicast SNTP server:
STEP 1 Click Administration > Time Settings > SNTP Unicast.
This page contains the following information for each Unicast SNTP server:
•SNTP Server—SNTP server IP address. The preferred server, or hostname,
is chosen according to its stratum level.
69Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Time Settings
Configuring System Time
•Poll Interval—Displays whether polling is enabled or disabled.
•Authentication Key ID—Key Identification used to communicate between
•Stratum Level—Distance from the reference clock expressed as a
•Status—SNTP server status. The possible values are:
6
the SNTP server and device.
numerical value. An SNTP server cannot be the primary server (stratum
level1) unless polling interval is enabled.
-Up—SNTP server is currently operating normally.
-Down—SNTP server is currently not available.
-Unknown—SNTP server is currently being searched for by the device.
In Process
-
time server (i.e. when first booting up the SNTP server).
•Last Response—Date and time of the last time a response was received
from this SNTP server.
•Offset—The estimated offset of the server's clock relative to the local clock,
in milliseconds. The host determines the value of this offset using the
algorithm described in RFC 2030.
•Delay—The estimated round-trip delay of the server's clock relative to the
local clock over the network path between them, in milliseconds. The host
determines the value of this delay using the algorithm described in RFC
2030.
•Source—How SNTP server was defined, for example: manually or from
DHCPv6 server.
•Interface—Interface on which packets are received.
STEP 2 To add a Unicast SNTP server, enable SNTP Client Unicast.
STEP 3 Click Add.
—Occurs when the SNTP server has not fully trusted its own
STEP 4 Enter the following parameters:
•Server Definition—Select if the SNTP server is going to be identified by its
IP address or if you are going to select a well-known SNTP server by name
from the list.
NOTE To specify a well-known SNTP server, the device must be connected
to the Internet and configured with a DNS server or configured so that a DNS
server is identified by using DHCP. (See DNS Settings)
Cisco Small Business 200 Series Smart Switch Administration Guide 70
6
Administration: Time Settings
Configuring System Time
•IP Version—Select the version of the IP address: Version 6 or Version 4.
•IPv6 Address Type—Select the IPv6 address type (if IPv6 is used). The
options are
-Link Local—The IPv6 address uniquely identifies hosts on a single
network link. A link local address has a prefix of FE80, is not routable, and
can be used for communication only on the local network. Only one link
local address is supported. If a link local address exists on the interface,
this entry replaces the address in the configuration.
-Global—The IPv6 address is a global Unicast IPV6 type that is visible and
reachable from other networks.
•Link Local Interface—Select the link local interface (if IPv6 Address Type
Link Local is selected) from the list.
•SNTP Server IP Address—Enter the SNTP server IP address. The format
depends on which address type was selected.
•SNTP Server—Select the name of the SNTP server from a list of well-known
NTP servers. If other is chosen, enter name of SNTP server in the adjacent
field.
•Poll Interval—Select to enable polling of the SNTP server for system time
information. All NTP servers that are registered for polling are polled, and the
clock is selected from the server with the lowest stratum level (distance from
the reference clock) that is reachable. The server with the lowest stratum is
considered to be the primary server. The server with the next lowest stratum
is a secondary server, and so forth. If the primary server is down, the device
polls all servers with the polling setting enabled, and selects a new primary
server with the lowest stratum.
•Authentication—Select the check box to enable authentication.
•Authentication Key ID—If authentication is enabled, select the value of the
key ID. (Create the authentication keys using the SNTP Authentication page.)
STEP 5 Click Apply. The STNP server is added, and you are returned to the main page.
71Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Time Settings
Configuring System Time
Configuring the SNTP Mode
The device can be in active and/or passive mode (see SNTP Modes for more
information).
To enable receiving SNTP packets from all servers on the subnet and/or to enable
transmitting time requests to SNTP servers:
STEP 1 Click Administration > Time Settings > SNTP Multicast/Anycast.
STEP 2 Select from the following options:
•SNTP IPv4 Multicast Client Mode (Client Broadcast Reception)—Select to
•SNTP IPv6 Multicast Client Mode (Client Broadcast Reception)—Select to
6
receive system time IPv4 Multicast transmissions from any SNTP server on
the subnet.
receive system time IPv6 Multicast transmissions from any SNTP server on
the subnet.
•SNTP IPv4 Anycast Client Mode (Client Broadcast Transmission)—Select to
transmit SNTP IPv4 synchronization packets requesting system time
information. The packets are transmitted to all SNTP servers on the subnet.
•SNTP IPv6 Anycast Client Mode (Client Broadcast Transmission)—Select to
transmit SNTP IPv6 synchronization packets requesting system time
information. The packets are transmitted to all SNTP servers on the subnet.
STEP 3 If the system is in Layer 3 system mode, click Add to enter the interface for SNTP
reception/transmission.
STEP 4 Click Apply to save the settings to the Running Configuration file.
Defining SNTP Authentication
SNTP clients can authenticate responses by using HMAC-MD5. An SNTP server is
associated with a key, which is used as input together with the response itself to
the MD5 function; the result of the MD5 is also included in the response packet.
The SNTP Authentication page enables configuration of the authentication keys
that are used when communicating with an SNTP server that requires
authentication.
Cisco Small Business 200 Series Smart Switch Administration Guide 72
6
Administration: Time Settings
Configuring System Time
The authentication key is created on the SNTP server in a separate process that
depends on the type of SNTP server you are using. Consult with the SNTP server
system administrator for more information.
Workflow
STEP 1 Enable authentication in the SNTP Authentication page.
STEP 2 Create a key in the SNTP Authentication page.
STEP 3 Associate this key with an SNTP server in the SNTP Unicast page.
To enable SNTP authentication and define keys:
STEP 1 Click Administration > Time Settings > SNTP Authentication.
STEP 2 Select SNTP Authentication to support authentication of an SNTP session
between the device and an SNTP server.
STEP 3 Click Apply to update the device.
STEP 4 Click Add.
STEP 5 Enter the following parameters:
•Authentication Key ID—Enter the number used to identify this SNTP
authentication key internally.
•Authentication Key—Enter the key used for authentication (up to eight
characters). The SNTP server must send this key for the device to
synchronize to it.
•Trusted Key—Select to enable the device to receive synchronization
information only from a SNTP server by using this authentication key.
STEP 6 Click Apply. The SNTP Authentication parameters are written to the Running
Configuration file.
73Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Diagnostics
This section contains information for configuring port mirroring, running cable
tests, and viewing device operational information.
It covers the following topics:
•Testing Copper Ports
•Displaying Optical Module Status
7
•Configuring Port and VLAN Mirroring
•Viewing CPU Utilization and Secure Core Technology
Testing Copper Ports
The Copper Test page displays the results of integrated cable tests performed on
copper cables by the Virtual Cable Tester (VCT).
VCT performs two types of tests:
•Time Domain Reflectometry (TDR) technology tests the quality and
characteristics of a copper cable attached to a port. Cables of up to 140
meters long can be tested. These results are displayed in the Test Results
block of the Copper Test page.
•DSP-based tests are performed on active GE links to measure cable length.
These results are displayed in the Advanced Information block of the
Copper Test page.
Preconditions to Running the Copper Port Test
Before running the test, do the following:
•(Mandatory) Disable Short Reach mode (see the Port Management > Green
Ethernet > Properties page)
Cisco Small Business 200 Series Smart Switch Administration Guide 74
7
Administration: Diagnostics
Te st i n g C op pe r P or ts
•(Optional) Disable EEE (see the Port Management > Green Ethernet >
Properties page)
Use a CAT5 data cable when testing cables using (VCT).
Accuracy of the test results can have an error range of +/- 10 for Advanced Testing
and +/- 2 for basic testing.
!
CAUTION When a port is tested, it is set to the Down state and communications are
interrupted. After the test, the port returns to the Up state. It is not recommended
that you run the copper port test on a port you are using to run the web-based
switch configuration utility, because communications with that device are
disrupted.
STEP 4 When the message appears, click OK to confirm that the link can go down or
Cancel to abort the test.
The following fields are displayed in the Test Results block:
•Last Update—Time of the last test conducted on the port.
•Test Results—Cable test results. Possible values are:
-OK—Cable passed the test.
-No Cable—Cable is not connected to the port.
-Open Cable—Cable is connected on only one side.
-Short Cable—Short circuit has occurred in the cable.
-Unknown Test Result—Error has occurred.
•Distance to Fault—Distance from the port to the location on the cable where
the fault was discovered.
•Operational Port Status—Displays whether port is up or down.
75Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Diagnostics
Displaying Optical Module Status
If the port being tested is a Giga port, the Advanced Information block contains the
following information, which is refreshed each time you enter the page:
NOTE TDR tests cannot be performed when the port speed is 10Mbit/Sec.
7
•Cable Length: Provides an estimate for the length.
•Pair—Cable wire pair being tested.
•Status—Wire pair status. Red indicates fault and Green indicates status OK.
•Channel—Cable channel indicating whether the wires are straight or cross-
over.
•Polarity—Indicates if automatic polarity detection and correction has been
activated for the wire pair.
•Pair Skew—Difference in delay between wire pairs.
Displaying Optical Module Status
The Optical Module Status page displays the operating conditions reported by
the SFP (Small Form-factor Pluggable) transceiver. Some information might not be
available for SFPs that do not support the digital diagnostic monitoring standard
SFF-8472.
MSA-compatible SFPs
The following FE SFP (100Mbps) transceivers are supported:
•MFEBX1: 100BASE-BX-20U SFP transceiver for single-mode fiber, 1310 nm
wavelength, supports up to 20 km.
•MFEFX1: 100BASE-FX SFP transceiver, for multimode fiber, 1310 nm
wavelength, supports up to 2 km.
•MFELX1: 100BASE-LX SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 10 km.
The following GE SFP (1000Mbps) transceivers are supported:
•MGBBX1: 1000BASE-BX-20U SFP transceiver, for single-mode fiber, 1310
nm wavelength, supports up to 40 km.
Cisco Small Business 200 Series Smart Switch Administration Guide 76
7
Administration: Diagnostics
Configuring Port and VLAN Mirroring
•MGBLH1: 1000BASE-LH SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 40 km.
•MGBLX1: 1000BASE-LX SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 10 km.
•MGBSX1:1000BASE-SX SFP transceiver, for multimode fiber, 850 nm
wavelength, supports up to 550 m.
•MGBT1: 1000BASE-T SFP transceiver for category 5 copper wire, supports
up to 100 m.
To view the results of optical tests, click Administration > Diagnostics > Optical Module Status.
This page contains the following fields:
•Port—Port number on which the SFP is connected.
•Te mp e ra tu re —Temperature (Celsius) at which the SFP is operating.
•Voltage—SFP’s operating voltage.
•Current—SFP’s current consumption.
•Output Power—Tr ansmi tted optic al po wer.
•Input Power—Received optical power.
•Transmitter Fault—Remote SFP reports signal loss. Values are True, False,
and No Signal (N/S).
•Loss of Signal—Local SFP reports signal loss. Values are True and False.
•Data Ready—SFP is operational. Values are True and False
Configuring Port and VLAN Mirroring
Port mirroring is used on a network device to send a copy of network packets
seen on one device port, multiple device ports, or an entire VLAN to a network
monitoring connection on another port on the device. This is commonly used for
network appliances that require monitoring of network traffic, such as an intrusiondetection system. A network analyzer connected to the monitoring port processes
the data packets for diagnosing, debugging, and performance monitoring. Up to
eight sources can be mirrored. This can be any combination of eight individual
ports and/or VLANs.
77Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Diagnostics
Configuring Port and VLAN Mirroring
A packet that is received on a network port assigned to a VLAN that is subject to
mirroring is mirrored to the analyzer port even if the packet was eventually
trapped or discarded. Packets sent by the device are mirrored when Transmit (Tx)
mirroring is activated.
Mirroring does not guarantee that all traffic from the source port(s) is received on
the analyzer (destination) port. If more data is sent to the analyzer port than it can
support, some data might be lost.
Only one instance of mirroring is supported system-wide. The analyzer port (or
target port for VLAN mirroring or port mirroring) is the same for all the mirrored
VLANs or ports.
To enable mirroring:
STEP 1 Click Administration > Diagnostics > Port and VLAN Mirroring.
7
This page contains the following fields:
•Destination Port—Port to which traffic is to be copied; the analyzer port.
•Source Interface—Interface, port, or VLAN from which traffic is sent to the
analyzer port.
•Type—Type of monitoring: incoming to the port (Rx), outgoing from the port
(Tx), or both.
•Status— Displays one of the following values:
-Active—Both source and destination interfaces are up and forwarding
traffic.
-Not Ready—Either source or destination (or both) are down or not
forwarding traffic for some reason.
STEP 2 Click Add to add a port or VLAN to be mirrored.
STEP 3 Enter the parameters:
•Destination Port—Select the analyzer port to where packets are copied. A
network analyzer, such as a PC running Wireshark, is connected to this port.
If a port is identified as an analyzer destination port, it remains the analyzer
destination port until all entries are removed.
•Source Interface—Select the source port or source VLAN from where
traffic is to be mirrored.
•Type—Select whether incoming, outgoing, or both types of traffic are
mirrored to the analyzer port. If Port is selected, the options are:
Cisco Small Business 200 Series Smart Switch Administration Guide 78
Administration: Diagnostics
7
-Rx Only—Port mirroring on incoming packets.
-Tx Onl y—Port mirroring on outgoing packets.
-Tx an d Rx—Port mirroring on both incoming and outgoing packets.
STEP 4 Click Apply. Port mirroring is added to the Running Configuration.
Viewing CPU Utilization and Secure Core Technology
Viewing CPU Utilization and Secure Core Technology
This section describes the Secure Core Technology (SCT) and how to view CPU
usage.
The device handles the following types of traffic, in addition to end-user traffic:
•Management traffic
•Protocol traffic
•Snooping traffic
Excessive traffic burdens the CPU, and might prevent normal device operation.
The device uses the Secure Core Technology (SCT) feature to ensure that the
device receives and processes management and protocol traffic, no matter how
much total traffic is received
be disabled.
There are no interactions with other features.
To display CPU utilization:
STEP 1 Click Administration > Diagnostics > CPU Utilization.
The CPU Utilization page appears.
The CPU Input Rate field displays the rate of input frames to the CPU per second.
The window contains a graph of the CPU utilization. The Y axis is percentage of
usage, and the X axis is the sample number.
. SCT is enabled by default on the device and cannot
STEP 2 Select the Refresh Rate (time period in seconds) that passes before the statistics
are refreshed. A new sample is created for each time period
79Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Discovery
This section provides information for configuring Discovery.
It covers the following topics:
•Configuring Bonjour Discovery
•LLDP and CDP
•Configuring LLDP
8
•Configuring CDP
Configuring Bonjour Discovery
As a Bonjour client, the device periodically broadcasts Bonjour Discovery protocol
packets to directly-connected IP subnet(s), advertising its existence and the
services that it provides, for example; HTTP or HTTPS. (Use the Security > TCP/
UDP Services page to enable or disable the device services.) The device can be
discovered by a network management system or other third-party applications.
By default, Bonjour is enabled and runs on the Management VLAN. The Bonjour
console automatically detects the device and displays it.
Bonjour in Layer 2 System Mode
Bonjour Discovery can only be enabled globally, and not on a per-port or perVLAN basis. The device advertises the services enabled by the administrator.
When Bonjour Discovery and IGMP are both enabled, the IP Multicast address of
Bonjour appears on the Adding IP Multicast Group Addresses page.
When Bonjour Discovery is disabled, the device stops service type
advertisements and does not respond to requests for service from network
management applications.
Cisco Small Business 200 Series Smart Switch Administration Guide 80
STEP 2 Select Enable to enable Bonjour Discovery globally on the device.
STEP 3 Click Apply. Bonjour is enabled or disabled on the device according to the
LLDP and CDP
Administration: Discovery
LLDP and CDP
By default, Bonjour is enabled on all interfaces that are members of the
Management VLAN.
To globally enable Bonjour:
selection.
LLDP (Link Layer Discovery Protocol) and CDP (Cisco Discovery Protocol) are link
layer protocols for directly-connected LLDP and CDP-capable neighbors to
advertise themselves and their capabilities to each other. By default, the device
sends an LLDP/CDP advertisement periodically to all its interfaces and terminates
and processes incoming LLDP and CDP packets as required by the protocols. In
LLDP and CDP, advertisements are encoded as TLV (Type, Length, Value) in the
packet.
The following CDP/LLDP configuration notes apply:
•CDP/LLDP can be globally enabled or disabled and enabled/disabled per
port. The CDP/LLDP capability of a port is relevant only if CDP/LLDP is
globally enabled.
•If CDP/LLDP is globally enabled, the device filters out incoming CDP/LLDP
packets from ports that are CDP/LLDP-disabled.
•If CDP/LLDP is globally disabled, the device can be configured to discard,
VLAN-aware flooding, or VLAN-unaware flooding of all incoming CDP/LLDP
packets. VLAN-aware flooding floods an incoming CDP/LLDP packet to the
VLAN where the packet is received excluding the ingress port. VLANunaware flooding floods an incoming CDP/LLDP packet to all the ports
excluding the ingress port. The default is to discard CDP/LLDP packets
when CDP/LLDP is globally disabled. You can configure the discard/
flooding of incoming CDP and LLDP packets from the CDP Properties page
and the LLDP Properties page respectively.
81Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Discovery
Configuring LLDP
NOTE CDP/LLDP does not distinguish if a port is in a LAG. If there are multiple ports in a
LAG, CDP/LLDP transmit packets on each port without taking into account the fact
that the ports are in a LAG.
The operation of CDP/LLDP is independent of the STP status of an interface.
If 802.1x port access control is enabled at an interface, the device transmits and
receives CDP/LLDP packets to and from the interface only if the interface is
authenticated and authorized.
8
•Auto Smartport requires CDP and/or LLDP to be enabled. Auto Smartport
automatically configures an interface based on the CDP/LLDP
advertisement received from the interface.
•CDP and LLDP end devices, such as IP phones, learn the voice VLAN
configuration from CDP and LLDP advertisements. By default, the device is
enabled to send out CDP and LLDP advertisement based on the voice
VLAN configured at the device. Refer to the Voice VLAN and Auto Voice
VLAN sections for details.
If a port is the target of mirroring, then according to CDP/LLDP it is considered
down.
NOTE CDP and LLDP are link layer protocols for directly-connected CDP/LLDP capable
devices to advertise themselves and their capabilities. In deployments where the
CDP/LLDP-capable devices are not directly connected and are separated with
CDP/LLDP-incapable devices, the CDP/LLDP-capable devices may be able to
receive the advertisement from other device(s) only if the CDP/LLDP-incapable
devices flood the CDP/LLDP packets they receives. If the CDP/LLDP-incapable
devices perform VLAN-aware flooding, then CDP/LLDP-capable devices can hear
each other only if they are in the same VLAN. A CDP/LLDP-capable device may
receive advertisement from more than one device if the CDP/LLDP-incapable
devices flood the CDP/LLDP packets.
Configuring LLDP
This section describes how to configure LLDP. It covers the following topics:
•LLDP Overview
•Setting LLDP Properties
•Editing LLDP Port Settings
•LLDP MED Network Policy
Cisco Small Business 200 Series Smart Switch Administration Guide 82
8
Administration: Discovery
Configuring LLDP
•Configuring LLDP MED Port Settings
•Displaying LLDP Port Status
•Displaying LLDP Local Information
•Displaying LLDP Neighbors Information
•Accessing LLDP Statistics
•LLDP Overloading
LLDP Overview
LLDP is a protocol that enables network managers to troubleshoot and enhance
network management in multi-vendor environments. LLDP standardizes methods
for network devices to advertise themselves to other systems, and to store
discovered information.
LLDP enables a device to advertise its identification, configuration, and
capabilities to neighboring devices that then store the data in a Management
Information Base (MIB). The network management system models the topology of
the network by querying these MIB databases.
LLDP is a link layer protocol. By default, the device terminates and processes all
incoming LLDP packets as required by the protocol.
The LLDP protocol has an extension called LLDP Media Endpoint Discovery
(LLDP-MED), which provides and accepts information from media endpoint
devices such as VoIP phones and video phones. For further information about
LLDP-MED, see LLDP MED Network Policy.
LLDP Configuration Workflow
Following are examples of actions that can be performed with the LLDP feature
and in a suggested order. You can refer to the LLDP/CDP section for additional
guidelines on LLDP configuration. LLDP configuration pages are accessible under
the Administration > Discovery LLDP menu.
1. Enter LLDP global parameters, such as the time interval for sending LLDP
updates using the LLDP Properties page.
2. Configure LLDP per port by using the Port Settings page. On this page,
interfaces can be configured to receive/transmit LLDP PDUs, send SNMP
notifications, specify which TLVs to advertise, and advertise the device's
management address.
83Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Discovery
Configuring LLDP
8
3. Create LLDP MED network policies by using the LLDP MED Network Policy
page.
4. Associate LLDP MED network policies and the optional LLDP-MED TLVs to the
desired interfaces by using the LLDP MED Port Settings page.
5. If Auto Smartport is to detect the capabilities of LLDP devices, enable LLDP in
the Smartport Properties page.
6. Display overloading information by using the LLDP Overloading page.
Setting LLDP Properties
The LLDP Properties page enables entering LLDP general parameters, such as
enabling/disabling the feature globally and setting timers.
•LLDP Status—Select to enable LLDP on the device (enabled by default).
•LLDP Frames Handling—If LLDP is not enabled, select the action to be taken
if a packet that matches the selected criteria is received:
Filtering
-
Flooding
-
•TLV Advertise Interval—Enter the rate in seconds at which LLDP
advertisement updates are sent, or use the default.
•Topology Change SNMP Notification Interval—Enter the minimum time
interval between SNMP notifications.
•Hold Multiplier—Enter the amount of time that LLDP packets are held before
the packets are discarded, measured in multiples of the TLV Advertise
Interval. For example, if the TLV Advertise Interval is 30 seconds, and the
Hold Multiplier is 4, then the LLDP packets are discarded after 120 seconds.
•Reinitializing Delay—Enter the time interval in seconds that passes
between disabling and reinitializing LLDP, following an LLDP enable/disable
cycle.
—Delete the packet.
—Forward the packet to all VLAN members.
Cisco Small Business 200 Series Smart Switch Administration Guide 84
8
Administration: Discovery
Configuring LLDP
•Transmit Delay—Enter the amount of time in seconds that passes between
successive LLDP frame transmissions due to changes in the LLDP local
systems MIB.
STEP 3 In the Fast Start Repeat Count field, enter the number of times LLDP packets are
sent when the LLDP-MED Fast Start mechanism is initialized. This occurs when a
new endpoint device links to the device. For a description of LLDP MED, refer to
the LLDP MED Network Policy section.
STEP 4 Click Apply. The LLDP properties are added to the Running Configuration file.
Editing LLDP Port Settings
The Port Settings page enables activating LLDP and SNMP notification per port,
and entering the TLVs that are sent in the LLDP PDU.
The LLDP-MED TLVs to be advertised can be selected in the LLDP MED Port
Settings page, and the management address TLV of the device may be
configured.
•Administrative Status—Select the LLDP publishing option for the port. The
values are:
-Tx Onl y—Publishes but does not discover.
-Rx Only—Discovers but does not publish.
-Tx & R x—Publishes and discovers.
-Disable—Indicates that LLDP is disabled on the port.
•SNMP Notification—Select Enable to send notifications to SNMP
notification recipients; for example, an SNMP managing system, when there
is a topology change.
85Cisco Small Business 200 Series Smart Switch Administration Guide
Administration: Discovery
Configuring LLDP
8
The time interval between notifications is entered in the Topology Change
SNMP Notification Interval field in the LLDP Properties page. Define SNMP
Notification Recipients by using the SNMP > Notification Recipient v1,2
and/or SNMP > Notification Recipient v3 page.
•Available Optional TLVs—Select the information to be published by the
device by moving the TLV to the Selected Optional TLVs list. The available
TLVs contain the following information:
-Port Description—Information about the port, including manufacturer,
product name and hardware/software version.
-System Name—System's assigned name (in alpha-numeric format). The
value equals the sysName object.
-System Description—Description of the network entity (in alpha-
numeric format). This includes the system's name and versions of the
hardware, operating system, and networking software supported by the
device. The value equals the sysDescr object.
-System Capabilities—Primary functions of the device, and whether or
not these functions are enabled in the device. The capabilities are
indicated by two octets. Bits 0 through 7 indicate Other, Repeater, Bridge,
WLAN AP, Router, Telephone, DOCSIS cable device, and station
respectively. Bits 8 through 15 are reserved.
-802.3 MAC-PHY—Duplex and bit rate capability and the current duplex
and bit rate settings of the sending device. It also indicates whether the
current settings are due to auto-negotiation or manual configuration.
-802.3 Link Aggregation—Whether the link (associated with the port on
which the LLDP PDU is transmitted) can be aggregated. It also indicates
whether the link is currently aggregated, and if so, provides the
aggregated port identifier.
-802.3 Maximum Frame—Maximum frame size capability of the MAC/
PHY implementation.
The following fields relate to the Management Address:
•Advertisement Mode—Select one of the following ways to advertise the IP
management address of the device:
-Auto Advertise—Specifies that the software would automatically
choose a management address to advertise from all the IP addresses of
the product. In case of multiple IP addresses the software chooses the
Cisco Small Business 200 Series Smart Switch Administration Guide 86
8
Administration: Discovery
Configuring LLDP
lowest IP address among the dynamic IP addresses. If there are no
dynamic addresses, the software chooses the lowest IP address among
the static IP addresses.
-None—Do not advertise the management IP address.
-Manual Advertise—Select this option and the management IP address to
be advertised.
•IP Address—If Manual Advertise was selected, select the Management IP
address from the addresses provided.
STEP 3 Enter the relevant information, and click Apply. The port settings are written to the
Running Configuration file.
LLDP MED Network Policy
LLDP Media Endpoint Discovery
the following additional capabilities to support media endpoint devices. Some of
the features of the LLDP Med Network Policy are:
•Enables the advertisement and discovery of network polices for real-time
applications such as voice and/or video.
•Device location discovery to allow creation of location databases and, in the
case of Voice over Internet Protocol (VoIP), Emergency Call Service (E-911)
by using IP Phone location information.
•Troubleshooting information. LLDP MED sends alerts to network managers
upon:
-Port speed and duplex mode conflicts
-QoS policy misconfigurations
(LLDP-MED) is an extension of LLDP that provides
87Cisco Small Business 200 Series Smart Switch Administration Guide
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.