Cisco SF220-24, SF220-24P, SF220-48, SF220-48P, SG220-26 Service Manual

...
ADMINISTRATION
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x
GUIDE
© 2014 Cisco Systems, Inc. All rights reserved. OL-30454-01
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Getting Started 7 Getting Started with the Web-based Interface 7 Before you Begin 8 Logging In To the Web-based Interface 8 HTTP/HTTPS 9 Changing the Administrative Password 10 Logging Out 11 Quick Start Switch Configuration 12 Interface Naming Conventions 13 Window Navigation 14 Application Header 14 Management Buttons 15 Status and Statistics 18 Viewing Ethernet Interface 18 Viewing Etherlike Statistics 20 Viewing TCAM Utilization 21 Viewing Fan Status and Temperature 22 Managing RMON 24 Viewing RMON Statistics 25 Configuring and Viewing RMON Histories 27 Configuring RMON History Control Samples 27 Viewing RMON History Statistics 28 Configuring and Viewing RMON Events 29 Configuring RMON Events 30 Viewing RMON Event Logs 31 Configuring RMON Alarms 31 Administration: System Logs 34 Configuring System Log Settings 34 Configuring Remote Logging Settings 36 Viewing Memory Logs 36 Viewing RAM Memory Logs 37 Viewing Flash Memory Logs 38 Administration: File Management 39 Files and File Types 39 File Actions 41 Upgrade/Backup Firmware/Language 42 Upgrading/Saving the Firmware Image 43 Upgrading the Language File 45 Active Image 46 Download/Backup Configuration or Logs 46 Uploading Configuration File 47 Saving Configuration File or Logs 48 Configuration File Properties 49 Copy/Save Configuration Files 50 DHCP Auto Configuration 51 DHCP Server Options 52
Auto Configuration Process 52 Configuring DHCP Auto Configuration Parameters 52 Administration: General Information 55 Device Models 56 Viewing System Summary 58 Configuring System Settings 60 Configuring Console Settings 61 Rebooting the Switch 61 Defining Idle Session Timeout 62 Ping a Host 63 Using Traceroute 63 Administration: Time Settings 65 System Time Options 66 Configuring System Time 66 Configuring SNTP Server 68 Administration: Diagnostics 69 Testing Copper Ports 69 Viewing Optical Module Status 70 Configuring Port and VLAN Mirroring 71 Viewing CPU Utilization 74 Administration: Discovery 75 Configuring Bonjour 75 LLDP and CDP 76 Configuring LLDP 77 Configuring LLDP Properties 79 Configuring LLDP Port Settings 80 Configuring LLDP MED Network Policy 81 Configuring LLDP MED Port Settings 83 Viewing LLDP Port Status 84 Viewing LLDP Local Information 85 Viewing LLDP Neighbors Information 88 Viewing LLDP Statistics 89 Viewing LLDP Overloading 89 Configuring CDP 92 Configuring CDP Properties 92 Configuring CDP Port Settings 94 Viewing CDP Local Information 95 Displaying CDP Neighbor Information 97 Viewing CDP Statistics 98 Port Management 100 Port Management Workflow 100 Configuring Basic Port Settings 101 Configuring Error Recovery Settings 104 Configuring Link Aggregation 105 Load Balancing 106 LAG Management 106
Static and Dynamic LAG Workflow 107 Configuring LAG Management 108 Configuring LAG Settings 109 Configuring LACP 110 LACP Priotity and Rules 110 LACP With No Link Partner 111 Configuring LACP Parameters 112 Configuring Energy Efficient Ethernet 113 Power-over-Ethernet 114 PoE Considerations 114 PoE on the Switch 116 PoE Features 116 PoE Operation 117 PoE Configuration Considerations 117 Configuring PoE Properties 118 Configuring PoE Port Settings 120 Managing VLANs 122 VLANs 122 VLAN Description 122 VLAN Roles 123 Workflow to Configure VLANs 124 Configuring Default VLAN 125 Creating VLANs 126 Configuring VLAN Interface Settings 127 Configuring Port to VLAN 128 Viewing VLAN Membership 129 Configuring GVRP 131 Configuring Voice VLAN 133 Dynamic Voice VLAN Modes 133 Voice VLAN Constraints 134 Voice VLAN Options 134 Configuring Voice VLAN Properties 135 Configuring Telephony OUI 135 Adding Interfaces to Voice VLAN on Basis of OUIs 137 Spanning Tree Protocol 139 STP Modes 139 Configuring STP Status and Global Settings 140 Configuring STP Interface Settings 142 Configuring RSTP Interface Settings 143 Configuring Multiple Spanning Tree 146 Configuring MSTP Properties 146 Mapping VLANs to an MST Instance 147 Configuring MSTP Instance Settings 148 Configuring MSTP Interface Settings 149 MAC Address Tables 152 Types of MAC Addresses 152
Configuring Static MAC Addresses 153 Configuring Static MAC Address Filter 154 Configuring Dynamic MAC Address Aging Time 154 Querying Dynamic Addresses 155 Configuring Reserved MAC Addresses 156 Multicast Forwarding 157 Multicast Forwarding 157 Typical Multicast Setup 158 Multicast Address Properties 160 Configuring Multicast Properties 160 Configuring IP Multicast Group Addresses 161 Configuring IGMP Snooping 162 Configuring MLD Snooping 165 Querying IGMP/MLD IP Multicast Groups 167 Configuring Multicast Router Ports 167 Configuring Forward All Multicast 168 Configuring Maximum IGMP and MLD Groups 169 Configuring Multicast Filtering 170 Configuring Multicast Filter Profiles 170 Configuring Interface Filter Settings 171 IP Configuration 172 IP Addressing 172 IPv4 Management and Interface 174 IPv6 Management and Interface 175 Configuring Domain Name System 176 Configuring General DNS Settings 177 Viewing Static and Dynamic DNS Servers 178 Configuring Host Mapping 178 Configuring Security 180 Configuring Users 181 Configuring TACACS+ Servers 182 Configuring RADIUS Servers 184 Configuring Management Access Methods 186 Access Profile Rules, Filters, and Elements 186 Active Access Profile 187 Configuring Access Profiles 188 Configuring Profile Rules 190 Configuring Password Complexity Rules 192 Configuring Management Access Authentication 193 Configuring TCP/UDP Services 195 Configuring Storm Control 197 Configuring Port Security 198 Configuring 802.1X 200 Guest VLAN 201 Workflow to configure 802.1X 201 Configuring 802.1X Properties 202
Configuring 802.1X Port Authentication 202 Viewing Authenticated Hosts 204 Configuring DoS Protection 205 Secure Core Technology (SCT) 205 Default Configuration 205 Configuring DoS Security Suite Settings 206 Configuring DoS Interface Settings 207 Configuring SYN Protection 208 Configuring DHCP Snooping 209 Configuring DHCP Snooping Properties 210 Configuring DHCP Snooping on VLANs 211 Configuring DHCP Snooping Trusted Interfaces 211 Querying DHCP Snooping Binding Database 212 Viewing Option 82 Statistics 213 Configuring Option 82 Interface Settings 214 Configuring Option 82 Port CID Settings 214 Configuring IP Source Guard 215 Configuring IP Source Guard Interface Settings 215 Quering IP Source Binding Database 216 Configuring Dynamic ARP Inspection 217 ARP Cache Poisoning 218 How ARP Prevents Cache Poisoning 219 Interaction Between ARP Inspection and DHCP Snooping 220 Workflow to configure ARP Inspection 220 Configuring ARP Inspection Properties 221 Configuring ARP Inspection Trusted Interfaces 221 Viewing ARP Inspection Statistics 222 Configuring ARP Inspection VLAN Settings 223 Access Control 224 Access Control Lists 224 Creating ACLs Workflow 226 Modifying ACLs Workflow 227 Configuring MAC-based ACLs 227 Configuring MAC-based ACEs 228 Configuring IPv4-based ACLs 229 Configuring IPv4-Based ACEs 230 Configuring IPv6-based ACLs 234 Configuring IPv6-based ACEs 234 Configuring ACL Binding 237 Quality of Service 239 QoS Features and Components 239 Workflow to Configure QoS Settings 241 Configuring QoS Properties 242 Configuring QoS Queues 243 Mapping CoS/802.1p to a Queue 244 Mapping IP Precedence to Queue 246
Mapping DSCP to Queue 246 Mapping Queues to CoS/802.1p 247 Mapping Queues to IP Precedences 247 Mapping Queue to DSCP 248 Configuring Interface Remark 248 Configuring Bandwidth 249 Configuring Egress Shaping per Queue 250 Configuring VLAN Rate Limit 251 Configuring VLAN Port Rate Limit 251 Configuring TCP Congestion Avoidance 252 Configuring QoS Basic Mode 253 Configuring Basic QoS Global Settings 254 Configuring Interface QoS Settings 254 Configuring QoS Advanced Mode 255 Configuring Advanced QoS Global Settings 257 Configuring Class Mapping 258 QoS Policers 259 Configuring Aggregate Policers 260 Configuring QoS Policies 261 Configuring Policy Class Maps 262 Configuring Policy Binding 263 SNMP 264 SNMP Versions and Workflow 264 SNMP v1 and v2 265 SNMP v3 265 SNMP Workflow 266 Supported MIBs 267 Model Object IDs 268 Configuring SNMP Engine ID 269 Configuring SNMP Views 270 Configuring SNMP Groups 271 Managing SNMP Users 273 Configuring SNMP Communities 274 Configuring SNMP Notification Recipients 275 Configuring SNMPv1,2 Notification Recipients 276 Configuring SNMPv3 Notification Recipients 277 Using the Console Interface 279 Connecting By Using a Terminal Emulation Application 279 Communicating by Using a Console Cable Connection 281 Communicating By Using a TCP/IP Connection 283 Connecting By Using Telnet 284 Where to Go From Here 285

Getting Started

This chapter provides an introduction to the web-based interface of the Cisco 220 switch and includes the following topics:
Getting Started with the Web-based Interface
Quick Start Switch Configuration
Interface Naming Conventions
Window Navigation

Getting Started with the Web-based Interface

1
The Cisco 220 switch can be accessed and managed by two methods; over your IP network by using the web-based interface, or by using the command-line interface through the console interface. Using the console interface requires advanced user skills. See the
Line Interface Reference Guide
interface.
This section includes the following topics:
Before you Begin
Logging In To the Web-based Interface
HTTP/HTTPS
Changing the Administrative Password
Logging Out
Cisco 220 Series Smart Plus Switches Command
for more information about using the console
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 7
Getting Started
Getting Started with the Web-based Interface

Before you Begin

Before you begin to use the web-based interface, make sure that you have a computer with Internet Explorer 8.0 (or higher), Firefox 20.0 (or higher), Chrome
23.0 (or higher), or Safari 5.7 (or higher).
These are the default settings used when configuring your switch for the first time:
Parameter Default Value
Username cisco
Password cisco
Switch IP 192.168.1.254
1

Logging In To the Web-based Interface

To access the switch with the web-based interface, you must know the IP address that the switch is using. The default configuration of the switch is to use its factory default IP address of 192.168.1.254 until it has obtained an IP address from a DHCP server.
NOTE If you are managing the switch through a network connection and the switch IP
address is changed, either by a DHCP server or manually, your access to the switch will be lost. You must enter the new IP address that the switch is using into your browser to use the web-based interface. If you are managing the switch through a console port connection, the link is retained.
To configure the switch using the web-based interface:
STEP 1 Power on the computer and your switch.
STEP 2 Connect the computer to the switch.
You can connect to the same IP subnet as the switch by connecting them directly with an Ethernet cable, or by connecting to the same LAN where the switch is located through other switches. You can also connect your computer to the switch from another IP subnet through one or more IP routers.
STEP 3 Locate the IP address of the switch.
a. The switch can be accessed and managed by Cisco network tools and
services including the Cisco FindIT Network Discovery Utility that enables you to automatically discover all supported Cisco devices in the same local network segment as your computer. You can get a snapshot view of each
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 8
Getting Started
Getting Started with the Web-based Interface
device or launch the product configuration utility to view and configure the settings. For more information about FindIT, see www.cisco.com/go/findit.
b. Locate the IP address assigned by your DHCP server by accessing your router
or DHCP server; see your DHCP server instructions for information. Make sure that your DHCP server is running and can be reached.
STEP 4 Set up the IP configuration on your computer.
If the switch is using the default static IP address of 192.168.1.254, you
must choose an IP address in the range of 192.168.1.2 to 192.168.1.253 that is not already in use.
If the IP addresses will be assigned by DHCP, make sure that your DHCP
server is running and can be reached from the switch and the computer. You may need to disconnect and reconnect the devices for them to discover their new IP addresses from the DHCP server.
1
NOTE Details on how to change the IP address on your computer depend upon the
type of architecture and operating system that you are using. Use your computers local Help and Support functionality and search for “IP Addressing.”
STEP 5 Open a web browser window. If you are prompted to install an Active-X plug-in
when connecting to the switch, follow the prompts to accept the plug-in.
STEP 6 Enter the IP address of the switch that you are configuring in the address bar on
the browser, and then press Enter. For example, http://192.168.1.254.
STEP 7 When the login page appears, choose the language that you prefer to use in the
web-based interface and enter the username and password.
The default username is cisco and the default password is cisco. Both username and password are case sensitive.
STEP 8 Click Log In.
The first time that you log in with the default username and password, you are required to enter a new password. The Change Password page opens.

HTTP/HTTPS

You can either open an HTTP session (not secured) by clicking Log In, or you can open an HTTPS (secured) session by clicking Secure Browsing (HTTPS). You are asked to approve the logon with a default RSA key, and an HTTPS session is opened.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 9
Getting Started
Getting Started with the Web-based Interface
NOTE There is no need to input the username or password prior to clicking Secure
Browsing (HTTPS).

Changing the Administrative Password

For security purposes you are required to change the administrative password at your first login or when the current administrative password expires.
Password complexity is enabled by default. The minimum password complexity requirements are shown on the page. The new password must comply with the default complexity rules or it can be disabled temporarily by selecting Disable
Password Strength Enforcement. See the Configuring Password Complexity
Rules section for more details about password complexity.
To change the password:
1
STEP 1 Enter the following fields to set a new administrative password:
Old Password—Enter the current password (default is cisco).
Password—Enter a new password.
Confirm Password—Enter the new password again for confirmation.
Password Strength Meter—Displays the strength of the new password.
Disable Password Strength Enforcement—The password strength
enforcement enabled by default requires the password to conform to the following default settings:
- Is different from the current username.
- Has a minimum length of eight characters.
- Contains characters from at least three character classes (uppercase
letters, lowercase letters, numbers, and special characters available on a standard keyboard).
NOTE If you do not want to change the password, check Disable Password
Strength Enforcement and click Apply. You are not required to set a new
password and can be directed to the Getting Started page.
STEP 2 Click Apply.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 10
Getting Started
!
Getting Started with the Web-based Interface
The Getting Started page page opens. You are now ready to configure the switch.
STEP 3 Check Do not show this page on startup to prevent the Getting Started page
from being displayed each time that you logon to the switch. If you select this option, the System Summary page is opened instead of the Getting Started page.

Logging Out

By default, the application logs out after ten minutes of inactivity. You can change this default value as described in the Defining Idle Session Timeout section.
CAUTION Unless the Running Configuration is copied to the Startup Configuration, all
changes made since the last time the file was saved are lost if the switch is rebooted. Save the Running Configuration to the Startup Configuration before logging off to preserve any changes that you made during this session.
1
A red X icon displayed to the left of the Save application link indicates that Running Configuration changes have been made have not yet been saved to the Startup Configuration file. The flashing red X can be displayed by clicking the Disable Save Icon Blinking button on the Copy/Save Configuration page.
When the switch auto-discovers a device, such as an IP phone, it configures the port appropriately for the device. These configuration commands are written to the Running Configuration file. This causes the Save icon to begin blinking when the user logs on even though the user did not make any configuration changes.
When you click Save, the Copy/Save Configuration page is displayed. Save the Running Configuration file by copying it to the Startup Configuration file. After this save, the red X icon and the Save application link are no longer displayed.
To logout, click Logout at the top right corner of any page. The system logs out of the switch.
When a timeout occurs or you intentionally log out of the switch, a message is displayed and the login page opens, with a message indicating the logged-out state. After you log in, the application returns to the initial page.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 11
Getting Started

Quick Start Switch Configuration

The initial page displayed depends on the “Do not show this page on startup” option on the Getting Started page. If you did not select this option, the initial page is the Getting Started page. If you did select this option, the initial page is the System Summary page.
Quick Start Switch Configuration
To simplify switch configuration through quick navigation, the Getting Started page provides links to the most commonly used pages.
Category Link Name (on the Page) Linked Page
1
Initial Setup
Device Status
Change Management Applications and Services
Change Device IP Address Administration > Management
Create VLAN VLAN Management > Create
Configure Port Settings Port Management > Port Setting
System Summary Status and Statistics > System
Port Statistics Status and Statistics > Interface
RMON Statistics Status and Statistics > RMON >
View Log Status and Statistics > View Log >
Security > TCP/UDP Services page
Interface > IPv4 Interface page
VLAN page
page
Summary page
page
Statistics page
RAM Memory page
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 12
Getting Started

Interface Naming Conventions

1
Category Link Name (on the Page) Linked Page
Quick Access
Change Device Password Administration > User Accounts
page
Upgrade Device Software Administration > File Management
> Upgrade/Backup Firmware/ Language page
Backup Device Configuration
Create MAC-Based ACL Access Control > MAC-Based ACL
Create IP-Based ACL Access Control > IPv4-Based ACL
Configure QoS Quality of Service > General >
Configure Port Mirroring Administration > Diagnostics >
Administration > File Management > Download/Backup Configuration/Log page
page
page
QoS Properties page
Port and VLAN Mirroring page
There are two hot links on the Getting Started page that take you to Cisco web pages for more information. Clicking on the Support link takes you to the device product support page, and clicking on the Forums link takes you to the Cisco Support Community page.
Interface Naming Conventions
Within the web-based interface, interfaces are denoted by concatenating the following elements:
Type of interface—The following types of interfaces are found on the
various types of devices:
- Fast Ethernet (10/100 bits)—These are displayed as FE.
- Gigabit Ethernet (10/100/1000 bits)—These are displayed as GE.
- LAG (Port Channel)—These are displayed as LAG.
- VLAN—These are displayed as VLAN.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 13
Getting Started

Window Navigation

- Tunnel —These are displayed as Tunnel.
Interface Number—Port, LAG, tunnel, or VLAN ID.
Window Navigation
This section describes the features of the web-based interface.

Application Header

Application Header
The Application Header appears on every page. It provides the following application links:
1
Application Link Name
Save
Username Displays the name of the user logged on to the switch.
Description
A flashing red X icon displayed to the left of the Save application link indicates that Running Configuration changes have been made have not yet been saved to the Startup Configuration file. The flashing of the red X can be disabled on the Copy/Save Configuration page.
Click Save to display the Copy/Save Configuration page. Save the Running Configuration file by copying it to the Startup Configuration file type on the switch. After this save, the red X icon and the Save application link are no longer displayed. When the switch is rebooted, it copies the Startup Configuration to the Running Configuration and sets the switch parameters according to the data in the Running Configuration.
The default username is cisco. (The default password is cisco)
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 14
Getting Started
Window Navigation
1
Application Link Name
Language Menu
Logout Click to log out of the web-based interface.
About Click to display the switch name and device version
Help Click to display the online help.
Description
This menu provides the following options:
Select a language: Select one of the languages
that appear in the menu. This language will be the web-based interface language.
Download Language: Add a new language to
the switch. To upgrade a language file, use the Upgrade/Backup Firmware/Language page.
Delete Language: Deletes the second
language on the switch. The first language (English) cannot be deleted.
number.
The SYSLOG Alert Status icon appears when a
Alert
SYSLOG message, above the critical severity level, is logged. Click the icon to open the RAM Memory page. After you access this page, the SYSLOG Alert Status icon is no longer displayed. To display the page when there is not an active SYSLOG message, click Status
and Statistics > View Log > RAM Memory.

Management Buttons

Management Buttons
The following table describes the commonly-used buttons that appear on various pages in the system.
Button Name Description
Use the pull-down menu to configure the number of entries per page.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 15
Getting Started
Window Navigation
1
Button Name Description
Indicates a mandatory field.
Add Click to display the related Add page and add an entry
to a table. Enter the information and click Apply to save it to the Running Configuration. Click Close to return to the main page. Click Save to display the Copy/Save Configuration page and save the Running Configuration to the Startup Configuration file type on the switch.
Apply Click to apply the changes to the Running
Configuration on the switch. If the switch is rebooted, the Running Configuration is lost, unless it is saved to the Startup Configuration file type or another file type. Click Save to display the Copy/Save Configuration page and save the Running Configuration to the Startup Configuration file type on the switch.
Cancel Click to reset the changes made on the page.
Clear All Interfaces Counters
Clear Interface Counters
Clear Logs Clears log files.
Clear Table Clears table entries.
Close Returns to the main page. If any changes were not
Copper Test Click Copper Test to perform the related test.
Click to clear the statistics counters for all interfaces.
Click to clear the statistics counters for the selected interface.
applied to the Running Configuration, a message appears.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 16
Getting Started
Window Navigation
1
Button Name Description
Copy Settings A table typically contains one or more entries
containing configuration settings. Instead of modifying each entry individually, it is possible to modify one entry and then copy the selected entry to multiple entries, as described below:
1. S elec t the e ntr y to be c opie d. Clic k Copy Settings to display the popup.
2. Enter the destination entry numbers in the to field.
3. Click Apply to save the changes and click Close to return to the main page.
Delete After selecting an entry in the table, click Delete to
remove.
Details Click to display the details associated with the entry
selected.
Edit Select the entry and click Edit. The Edit page appears,
and the entry can be modified.
1. C li ck Apply to save the changes to the Running Configuration.
2. Click Close to return to the main page.
Go Enter the query filtering criteria and click Go. The
results are displayed on the page.
Refresh Click to manually refresh the data on the page.
View All Interfaces Statistics
View Interface Statistics
Click to see the statistics counters for all interfaces on a single page.
Click to see the statistics counters for the selected interface on a single page.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 17

Status and Statistics

This chapter describes how to view switch statistics, and includes the following topics:
Viewing Ethernet Interface
Viewing Etherlike Statistics
Viewing TCAM Utilization
Viewing Fan Status and Temperature
Managing RMON
2

Viewing Ethernet Interface

The Interface page displays traffic statistics per interface. The refresh rate of the information can be selected. This page is useful for analyzing the amount of traffic that is both sent and received and its dispersion (Unicast, Multicast, and Broadcast).
To view Ethernet statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > Interface.
STEP 2 Enter the following information:
Interface—Select the port or LAG for which the Ethernet statistics are
displayed.
Refresh Rate—Select the time period that passes before the Ethernet
statistics are refreshed. The available options are:
No Refresh
-
-
15 sec
—Statistics are refreshed every 15 seconds.
—Statistics are not refreshed.
30 sec
-
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 18
—Statistics are refreshed every 30 seconds.
Status and Statistics
Viewing Ethernet Interface
2
-
60 sec
The Receive Statistics area displays the following fields about incoming packets:
Tot al By te s (O ct et s) —Octets received, including bad packets and FCS
octets, but excluding framing bits.
Unicast Packets—Good Unicast packets received.
Multicast Packets—Good Multicast packets received.
Broadcast Packets—Good Broadcast packets received.
Packets with Errors—Packets with errors received.
The Transmit Statistics area displays the following fields about outgoing packets:
Tot al By te s (O ct et s) —Octets transmitted, including bad packets and FCS
octets, but excluding framing bits.
—Statistics are refreshed every 60 seconds.
Unicast Packets—Good Unicast packets transmitted.
Multicast Packets—Good Multicast packets transmitted.
Broadcast Packets—Good Broadcast packets transmitted.
STEP 3 Click Clear Interface Counters to clear the statistics counters for the selected
interface.
STEP 4 Click Refresh to manually refresh the statistics counters for the selected interface.
STEP 5 Click View All Interfaces Statistics to see the statistics counters for all interfaces
on a single page. The Interface Statistics Table displays the above counters for all interfaces. From this page you can perform the following actions:
Select the refresh rate from the Refresh Rate drop-down menu.
Select an interface and click Clear Interface Counters to clear the statistics
counters for the selected interface.
Click Clear All Interface Counters to clear the statistics counters for all
interfaces.
Select an interface and click View Interface Statistics to see the statistics
counters for the selected interface on a single page.
Click Refresh to manually refresh the statistics counters for all interfaces.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 19
Status and Statistics

Viewing Etherlike Statistics

Viewing Etherlike Statistics
The Etherlike page displays statistics per interface according to the Etherlike MIB standard definition. The refresh rate of the information can be selected. This page provides more detailed information regarding errors in the physical layer (Layer 1), which might disrupt traffic.
To view Etherlike statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > Etherlike.
STEP 2 Enter the following information:
Interface—Select the port or LAG for which the Etherlike statistics are
displayed.
2
Refresh Rate—Select the time period that passes before the Etherlike
statistics are refreshed.
The following fields are displayed for the selected interface:
Frame Check Sequence (FCS) Errors—Number of received frames that
failed the Cyclic Redundancy Checks (CRC).
Single Collision Frames—Number of frames involved in a single collision,
but were successfully transmitted.
Late Collisions—Number of collisions that have been detected after the first
512 bits of data.
Excessive Collisions—Number of transmissions due to excessive collisions.
Oversize Packets—Number of packets greater than 1518 octets received.
Internal MAC Receive Errors—Number of frames rejected because of
receiver errors.
Pause Frames Received—Number of received flow control pause frames.
Pause Frames Transmitted—Number of flow control pause frames
transmitted from the selected interface.
STEP 3 Click Clear Interface Counters to clear the statistics counters for the selected
interface.
STEP 4 Click Refresh to manually refresh the statistics counters for the selected interface.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 20
Status and Statistics

Viewing TCAM Utilization

STEP 5 Click View All Interfaces Statistics to see the statistics counters for all interfaces
2
on a single page. The Etherlike Statistics Table displays the above counters for all interfaces. From this page you can perform the following actions:
Select the refresh rate from the Refresh Rate drop-down menu.
Select an interface and click Clear Interface Counters to clear the statistics
counters for the selected interface.
Click Clear All Interface Counters to clear the statistics counters for all
interfaces.
Select an interface and click View Interface Statistics to see the statistics
counters for the selected interface on a single page.
Click Refresh to manually refresh the statistics counters for all interfaces.
Viewing TCAM Utilization
The switch architecture uses a Ternary Content Addressable Memory (TCAM) to support packet actions in wire speed. TCAM holds the rules produced by applications (such as ACL and QoS) and the system-created rules.
Only system application allocates rules upon its initiation.
To view TCAM utilization, click Status and Statistics > TCAM Utilization.
The following fields are displayed:
Maximum TCAM Entries—Maximum TCAM Entries available.
In Use—Number of TCAM entries used.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 21
Status and Statistics

Viewing Fan Status and Temperature

Viewing Fan Status and Temperature
The Fan and Thermal Status page displays the fan and temperature status of the switches with PoE capabilities.
The following table lists the number of fan channels and temperature channels applicable on different PoE switch models:
2
Model Number of Fan
Channels
SF220-24P 2 2
SF220-48P 4 2
SG220-26P 2 2
SG220-28MP 3 2
SG220-50P 4 2
To view the fan and temperature status, click Status and Statistics > Fan and Thermal Status.
The following fields are displayed:
x
FAN
-
-
Status—Displays the operation status of the switch fan(s).
Operational Status
displays Fault if the fan does not operate normally.
Speed Value
—Displays OK if the fan operates normally, or
—Displays the fan speed in Revolutions Per Minute (RPM).
Number of Temperature Channels
x
Thermal
Operational Status
-
or displays Fault when the thermal does not operate normally.
-
Temperature Value
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 22
Status—Displays the status of the switch thermal(s).
—Displays OK when the thermal operates normally,
—Displays the current temperature in Celsius.
Status and Statistics
Viewing Fan Status and Temperature
-
Temperature Status
possible values are:
Green—Indicates that the current temperature is lower than the yellow threshold.
Yellow—Indicates that the current temperature is greater than the yellow threshold, but lower than the red threshold.
Red—Indicates that the current temperature is greater than the red threshold.
—Displays the current temperature status. The
2
Yellow Threshold
-
temperature thermal.
-
Red Threshold
thermal.
The following table lists the yellow and red threshold values for two thermals applicable on different PoE switch models:
Model Yellow
Threshold of Thermal 1
SF220-24P 129
SF220-48P 118°F (48°C) 129°F (54°C) 120°F (49°C) 131°F (55°C)
SG220-26P 126°F (52°C) 133°F (56°C) 136°F (58°C) 144°F (62°C)
SG220-28MP 118°F (48°C) 129°F (54°C) 120°F (49°C) 131°F (55°C)
SG220-50P 124°F (51°C) 135°F (57°C) 122°F (50°C) 131°F (55°C)
—Displays the yellow threshold value of the
—Displays the red threshold value of the temperature
Red Threshold of Thermal 1
°F (54°C) 138°F (59°C) 131°F (55°C) 140°F (60°C)
Yel lo w Threshold of Thermal 2
Red Threshold of Thermal 2
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 23
Status and Statistics

Managing RMON

Managing RMON
Remote Networking Monitoring (RMON) is an SNMP specification that enables an SNMP agent in the switch to proactively monitor traffic statistics over a given period and send traps to an SNMP manager. The local SNMP agent compares actual, real-time counters against predefined thresholds and generates alarms, without the need for polling by a central SNMP management platform. This is an effective mechanism for proactive management, provided that you have right thresholds set relative to your network’s base line.
RMON decreases the traffic between the manager and the switch because the SNMP manager does not have to frequently poll the switch for information, and enables the manager to get timely status reports because the switch reports events as they occur.
With this feature, you can perform the following actions:
2
View the current statistics (since the counter values were cleared). You can
also collect the values of these counters over a period of time, and then view the table of collected data, where each collected set is a single line of the History Table.
Define interesting changes in counter values, such as “reached a certain
number of late collisions” (defines the alarm), and then specify what action to perform when this event occurs (log, trap, or log and trap).
NOTE For RMON configuration to be effective, make sure that the SNMP service is
enabled on the switch.
This section includes the following topics:
Viewing RMON Statistics
Configuring and Viewing RMON Histories
Configuring and Viewing RMON Events
Configuring RMON Alarms
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 24
Status and Statistics
Managing RMON
2

Viewing RMON Statistics

The Statistics page displays detailed information regarding packet sizes and some information regarding physical layer errors. The information shown is according to the RMON standard. An oversized packet is defined as an Ethernet frame with the following criteria:
Packet length is greater than MRU byte size.
Collision event has not been detected.
Late collision event has not been detected.
Received (Rx) error event has not been detected.
Packet has a valid CRC.
To view RMON statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > RMON > Statistics.
STEP 2 Enter the following information:
Interface—Select the port or LAG for which RMON statistics are displayed.
Refresh Rate—Select the time period that passes before RMON statistics
are refreshed.
The following fields are displayed for the selected interface:
RMON Received Bytes (Octets)—Number of octets received, including
bad packets and FCS octets, but excluding framing bits.
RMON Drop Events—Number of packets that were dropped.
RMON Received Packets —Number of packets received, including bad
packets, Multicast, and Broadcast packets.
RMON Broadcast Packets Received—Number of good Broadcast packets
received. This number does not include Multicast packets.
RMON Multicast Packets Received—Number of good Multicast packets
received.
RMON CRC & Align Errors—Number of CRC and Align errors that have
occurred.
RMON Undersize Packets—Number of undersized packets (less than 64
octets) received.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 25
Status and Statistics
Managing RMON
2
RMON Oversize Packets—Number of oversized packets (over 1518 octets)
received.
RMON Fragments—Number of fragments (packets with less than 64 octets,
excluding framing bits, but including FCS octets) received.
RMON Jabbers—Number of received packets that were longer than 1632
octets. This number excludes frame bits, but includes FCS octets that had either a bad FCS (Frame Check Sequence) with an integral number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number. A Jabber packet is defined as an Ethernet frame that satisfies the following criteria:
- Packet data length is greater than MRU.
- Packet has an invalid CRC.
- RX error event has not been detected.
RMON Collisions—Number of collisions received. If Jumbo Frames are
enabled, the threshold of Jabber Frames is raised to the maximum size of Jumbo Frames.
Frames of 64 Bytes—Number of frames, containing 64 bytes that were
received.
Frames of 65 to 127 Bytes—Number of frames, containing 65 to 127 bytes
that were received.
Frames of 128 to 255 Bytes—Number of frames, containing 128 to 255
bytes that were received.
Frames of 256 to 511 Bytes—Number of frames, containing 256 to 511
bytes that were received.
Frames of 512 to 1023 Bytes—Number of frames, containing 512 to 1023
bytes that were received.
Frames Greater than 1024 Bytes—Number of frames, containing 1024 to
2000 bytes, and Jumbo Frames, that were received.
STEP 3 Click Clear Interface Counters to clear RMON statistics counters for the selected
interface.
STEP 4 Click Refresh to manually refresh RMON statistics counters for the selected
interface.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 26
Status and Statistics
Managing RMON
STEP 5 Click View All Interfaces Statistics to view RMON statistics counters for all
2
interfaces on a single page. The RMON Statistics Table displays the above counters for all interfaces. From this page you can perform the following actions:
Select the refresh rate from the Refresh Rate drop-down menu.
Select an interface and click Clear Interface Counters to clear RMON
statistics counters for the selected interface.
Click Clear All Interfaces Counters to clear RMON statistics counters for all
interfaces.
Select an interface and click View Interface Statistics to see RMON
statistics counters for the selected interface on a single page.
Click Refresh to manually refresh RMON statistics counters for all interfaces.

Configuring and Viewing RMON Histories

RMON can be used to monitor statistics per interface. Use the History Control Table page to define the sampling frequency, amount of samples to store, and the interface from where to gather the data. After the data is sampled and stored, it appears on the History Table page that can be viewed by clicking History Table.
Configuring RMON History Control Samples
Configuring RMON History Control Samples
To define RMON control sample:
STEP 1 Click Status and Statistics > RMON > History.
RMON is allowed by standard to not grant all requested samples, but rather to limit the number of samples per request. The Current Number of Samples field displays the sample number actually granted to the request that is equal or less than the requested value.
STEP 2 Click Add to add a history control sample.
STEP 3 Enter the following information:
New History Entry—Displays the number of the history entry.
Source Interface—Select the port or LAG from where the history samples
are to be taken.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 27
Status and Statistics
Managing RMON
STEP 4 Click Apply. The RMON history control sample is added, and the Running
STEP 5 Click History Table to view the actual statistics.
2
Max No. of Samples to Keep—Enter the number of samples to store.
Interval—Enter the time in seconds that samples were collected from the
interface.
Owner—Enter the RMON station or user that requested the RMON
information.
Configuration is updated.
Viewing RMON History Statistics
Viewing RMON History Statistics
The History Table page displays interface-specific statistical network samplings. The samples are configured in the History Control Table described above.
To view RMON history statistics:
STEP 1 Click Status and Statistics > RMON > History.
STEP 2 Click History Table.
STEP 3 Select the entry number to display the samples associated with that history entry,
and click Go.
The following fields are displayed for the selected history sample:
History Entry No.—Number of the history entry.
Owner—History entry owner.
Sample No.—Statistics were taken from this sample.
Drop Events—Number of dropped packets due to lack of network
resources during the sampling interval. This may not represent the exact number of dropped packets, but rather the number of times dropped packets were detected.
Bytes Received—Number of octets received that including bad packets
and FCS octets, but excluding framing bits.
Packets Received—Number of packets received, including bad packets,
Multicast, and Broadcast packets.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 28
Status and Statistics
Managing RMON
2
Broadcast Packets—Number of good Broadcast packets received. This
number does not include Multicast packets.
Multicast Packets—Number of good Multicast packets received.
CRC & Align Errors—Number of CRC and Align errors that have occurred.
Undersize Packets—Number of undersized packets (less than 64 octets)
received.
Oversize Packets—Number of oversized packets (over 1518 octets)
received.
Fragments—Number of fragments (packets with less than 64 octets)
received, excluding framing bits, but including Frame Check Sequence (FCS) octets).
Jabbers—Number of received packets that were longer than 1632 octets.
This number excludes frame bits, but includes FCS octets that had either a bad FCS with an integral number of octets (FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number.
Collisions—Number of collisions received.
Utilization—Percentage of current interface traffic compared to the
maximum traffic that the interface can handle.
STEP 4 Click History Control Table to return to the History Control Table page.

Configuring and Viewing RMON Events

You can control the occurrences that trigger an alarm and the type of notification that occurs. This is performed as follows:
Events Page—Configures what happens when an alarm is triggered. This
can be any combination of logs and traps.
Alarms Page—Configures the occurrences that trigger an alarm.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 29
Status and Statistics
Managing RMON
STEP 1 Click Status and Statistics > RMON > Events.
STEP 2 Click Add to add an RMON event.
STEP 3 Enter the following information:
2
Configuring RMON Events
Configuring RMON Events
Use the Events page to configure events that are actions performed when an alarm is generated (alarms are defined on the Alarms page). An event can be any combination of logs and traps. If the action includes logging of the events, they are displayed on the Event Log Table page.
To configure RMON events:
Event Entry—Displays the number for the event entry.
Community— Enter the SNMP community string to be included when traps
are sent.
Description—Enter a name for the event. This name is used to attach an
alarm to an event.
Notification Type—Select the type of action that results from this event.
The available options are:
None
-
-
-
-
Owner—Enter the device or user that defined the event.
STEP 4 Click Apply. The RMON event is added, and the Running Configuration is updated.
—No action occurs when the alarm goes off.
Log (Event Log Table)
alarm goes off.
Trap (SNMP Manager and Syslog Server)
server when the alarm goes off.
Log and Trap
the remote log server when the alarm goes off.
—Add a log entry to the Event Log Table and send a trap to
—Add a log entry to the Event Log Table when the
—Send a trap to the remote log
STEP 5 Click Event Log Table to display the log of alarms that have occurred and that
have been logged.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 30
Status and Statistics
Managing RMON
STEP 1 Click Status and Statistics > RMON > Events.
STEP 2 Click Event Log Table.
2
Viewing RMON Event Logs
Viewing RMON Event Logs
The Event Log Table page displays the log of events (actions) that occurred. An event can be logged when the type of the event is Log or Log and Trap. The action in the event is performed when the event is bound to an alarm (see Configuring
RMON Alarms) and the conditions of the alarm have occurred.
To view RMON event logs:
The following fields are displayed:
Event Entry No.—Number of the event’s log entry.
Log No.—Log number (within the event).
Log Time—Time that the log entry was entered.
Description—Description of event that triggered the alarm.
STEP 3 Click Event Table to return to the Events page.

Configuring RMON Alarms

RMON alarms provide a mechanism for setting thresholds and sampling intervals to generate exception events on any counter or any other SNMP object counter maintained by the agent. Both the rising and falling thresholds must be configured in the alarm. After a rising threshold is crossed, no rising events are generated until the companion falling threshold is crossed. After a falling alarm is issued, the next alarm is issued when a rising threshold is crossed.
One or more alarms are bound to an event, which indicates the action to be taken when the alarm occurs.
Use the Alarms page to configure alarms and to bind them with events. Alarm counters can be monitored by either absolute values or changes (delta) in the counter values.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 31
Status and Statistics
Managing RMON
STEP 1 Click Status and Statistics > RMON > Alarms.
STEP 2 Click Add to add an RMON alarm.
STEP 3 Enter the following information:
2
To define RMON alarms:
Alarm Entry—Displays the number of the alarm entry.
Interface—Select a port or LAG.
Counter Name—Select the MIB variable that indicates the type of
occurrence measured.
Sample Type—Select the sampling method to generate an alarm. The
possible options are:
- Absolute—If the threshold is passed, an alarm is generated.
- Delta—Subtracts the last sampled value from the current value. The
difference in the values is compared to the threshold. If the threshold is passed, an alarm is generated.
Rising Threshold—Enter the rising counter value that triggers the rising
threshold alarm.
Rising Event—Select an event, from those that you defined on the Events
page, to be performed when a rising event is triggered.
Falling Threshold—Enter the falling counter value that triggers the falling
threshold alarm.
Falling Event—Select an event, from those that you defined on the Events
page, to be performed when a falling event is triggered.
Startup Alarm—Select the first event from which to start generation of
alarms. Rising is defined by crossing the threshold from a low-value threshold to a higher-value threshold.
Rising Alarm
-
—A rising counter value triggers the rising threshold alarm.
Falling Alarm
-
Rising and Falling Alarm
-
the alarm.
Interval—Enter the alarm interval time in seconds.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 32
—A falling counter value triggers the falling threshold alarm.
—Both a rising and falling counter values trigger
Status and Statistics
Managing RMON
STEP 4 Click Apply. The RMON alarm is added, and the Running Configuration is updated.
2
Owner—Enter the name of the user or network management system that
receives the alarm.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 33

Administration: System Logs

This chapter describes the System Log feature, which enables the switch to keep several independent logs. Each log is a set of messages recording system events.
The switch generates the following local logs:
Log sent to the console interface.
Log written into a cyclical list of logged events in RAM and is erased when
the switch reboots.
Log written to a cyclical log file saved to flash memory and persists across
reboots.
In addition, you can send messages to remote SYSLOG servers in the form of SYSLOG messages.
3
This chapter covers the following topics:
Configuring System Log Settings
Configuring Remote Logging Settings
Viewing Memory Logs

Configuring System Log Settings

You can enable or disable logging on the switch and select the events to be logged by severity level. The event severity levels are listed from the highest severity to the lowest severity, as follows:
Emergency—System is not usable.
Alert—Immediate action is needed.
Critical—System is in a critical condition.
Error—System is in error condition.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 34
Administration: System Logs
Configuring System Log Settings
Warning—System warning has occurred.
Notice—System is functioning properly, but a system notice has occurred.
Informational—Device information.
Debug—Provides detailed information about an event.
You can select different severity levels for RAM and flash logs. These logs are displayed on the RAM Memory page and Flash Memory page, respectively.
Selecting a severity level to be stored in a log causes all of the higher severity events to be automatically stored in the log. Lower severity events are not stored in the log. For example, if Warning is selected, all severity levels that are Warning and higher are stored in the log (Emergency, Alert, Critical, Error, and Warning). No events with severity level below Warning (Notice, Informational, and Debug) are stored.
3
To configure global log parameters:
STEP 1 Click Administration > System Log > Log Settings.
STEP 2 Enter the following information:
Logging—Check Enable to enable logging on the switch, or uncheck to
disable logging on the switch.
RAM Memory Logging—Check Enable to enable RAM memory logging
and check the severity levels of the messages to be logged to RAM.
Flash Memory Logging—Check Enable to enable flash memory logging
and check the severity levels of the messages to be logged to flash memory.
STEP 3 Click Apply. The global log settings are defined, and the Running Configuration is
updated.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 35
Administration: System Logs

Configuring Remote Logging Settings

Configuring Remote Logging Settings
Use the Remote Log Servers page to define the remote SYSLOG servers where log messages are sent (using the SYSLOG protocol). For each server, you can configure the severity of the messages that it receives.
To configure a remote SYSLOG server:
STEP 1 Click Administration > System Log > Remote Log Servers.
STEP 2 Click Add to add a remote SYSLOG server.
STEP 3 Enter the following information:
Server Definition—Select whether to identify the remote log server by IP
address or name.
3
IP Version—Select either Version 4 or Version 6 if the remote log server is
identified by IP address.
Log Server IP Address/Name—Enter the IP address or hostname of the
remote log server.
UDP Port—Enter the UDP port to which the log messages are sent.
Facility—Select a facility from which system logs are sent to the remote
server. Only one facility can be assigned to a server.
Minimum Severity—Select the minimum level of system log messages to
be sent to the server.
STEP 4 Click Apply. The remote SYSLOG server is added, and the Running Configuration
is updated.

Viewing Memory Logs

The switch can write to the following logs:
Log in RAM (cleared during reboot). See Viewing RAM Memory Logs for
more information.
Log in flash memory (cleared only upon user command). See Viewing Flash
Memory Logs for more information.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 36
Administration: System Logs
Viewing Memor y Logs
You can configure the messages that are written to each log by severity. A message can go to more than one log, including logs that reside on external SYSLOG servers.

Viewing RAM Memory Logs

The RAM Memory page displays all messages that are saved in RAM (cache) in inverse-chronological order. Entries are stored in the RAM log according to the configuration on the Log Settings page.
To view RAM logs:
STEP 1 Click Status and Statistics > View Log > RAM Memory.
The following fields are displayed:
3
Log Index—Log entry number.
Log Time—Time when message was generated.
Severity—Event severity.
Description—Message text describing the event.
STEP 2 Click Clear Logs to clear the log messages.
STEP 3 By default, the SYSLOG Alert Status icon appears and blinks when a SYSLOG
message, above the critical severity level, is logged. To disable this alert icon blinking, click Disable Alert Icon Blinking. The SYSLOG Alert Status icon is no longer displayed.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 37
Administration: System Logs
Viewing Memor y Logs

Viewing Flash Memory Logs

The Flash Memory page displays the messages that are stored in flash memory in chronological order. The minimum severity for logging is configured on the Log Settings page. Flash logs remain when the switch is rebooted. You can clear the logs manually.
To view flash logs:
STEP 1 Click Status and Statistics > View Log > Flash Memory.
The following fields are displayed:
Log Index—Log entry number.
Log Time—Time when message was generated.
Severity—Event severity.
3
Description—Message text describing the event.
STEP 2 Click Clear Logs to clear the log messages.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 38

Administration: File Management

This chapter describes how system files are managed, such as upgrading system firmware, rebooting the switch, restoring the switch to factory defaults, managing the configuration files and log files, and so on.
It includes the following topics:
Files and File Types
File Actions
Upgrade/Backup Firmware/Language
Active Image
Download/Backup Configuration or Logs
4
Configuration File Properties
Copy/Save Configuration Files
DHCP Auto Configuration

Files and File Types

System files are files that contain configuration information or firmware images.
Various actions can be performed with these files, such as: selecting the firmware file from which the switch boots, copying various types of configuration files internally on the switch, or copying files to or from an external device, such as an external server.
The possible methods of file transfer are:
Internal copy.
HTTP/HTTPS that uses the facility that the browser provides.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 39
Administration: File Management
Files and File Types
TFTP client, requiring a TFTP server.
Configuration files on the switch are defined by their type, and contain the settings and parameter values for the switch. When a configuration is referenced on the switch, it is referenced by its configuration file type (such as Startup Configuration or Running Configuration), as opposed a file name that can be modified by the user. Content can be copied from one file type to another, but the names of the file types cannot be changed by the user. Other files on the switch include firmware and log files, and are referred to as operational files.
Configuration files are text files that can be edited by a user in a text editor, such as Notepad after they are copied to an external device, such as a PC.
The following types of configuration and operational files are found on the switch:
Running Configuration—Contains parameters that are currently used by
the switch to operate. It is the only file type that is modified when you change the parameter values on the switch.
4
If the switch is rebooted, the Running Configuration is lost. When the switch is rebooted, this file type is copied from the Startup Configuration stored in Flash to the Running Configuration stored in RAM.
To preserve any changes that you made to the switch, you must save the Running Configuration to the Startup Configuration, or another file type if you do not want the switch to reboot with this configuration. If you have saved the Running Configuration to the Startup Configuration, when the switch is rebooted, it recreates a Running Configuration that includes the changes made since the last time that the Running Configuration was saved to the Startup Configuration.
Startup Configuration—The parameter values that were saved by you by
copying another configuration (usually the Running Configuration) to the Startup Configuration.
The Startup Configuration is retained in Flash and is preserved when the switch is rebooted. At this time, the Startup Configuration is copied to RAM and identified as the Running Configuration.
Backup Configuration—A manual copy of the parameter definitions for
protection against system shutdown or for the maintenance of a specific operating state. You can copy the Mirror Configuration, Startup Configuration, or Running Configuration to the Backup Configuration. The Backup Configuration exists in Flash and is preserved if the switch is rebooted.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 40
Administration: File Management

File Actions

Mirror Configuration—A copy of the Startup Configuration, created by the
switch when the following conditions exist:
- The switch has been operating continuously for 24 hours.
- No configuration changes have been made to the Running Configuration
- The Startup Configuration is identical to the Running configuration.
Only the system can copy the Startup Configuration to the Mirror Configuration. However, you can copy from the Mirror Configuration to other file types or to another device.
If the switch is rebooted, the Mirror Configuration is reset to the factory default parameters. In all other aspects, the Mirror Configuration behaves the same as a Backup Configuration, providing a copy of the parameter values that is preserved if the switch is rebooted.
4
in the previous 24 hours.
File Actions
Firmware—The program that controls the operations and functionality of
the switch. More commonly referred to as the image.
Language File—The dictionary that enables the web-based interface to be
displayed in the selected language.
Flash Logs
The following actions can be performed to manage firmware, configuration files, and logs:
Upgrade the firmware image, replace a second language file, or back up
the firmware as described in Upgrade/Backup Firmware/Language section.
View the firmware image currently in use or select the image to be used in
the next reboot as described in the Active Image section.
Save configuration files on the switch to a location on another device as
described in the Download/Backup Configuration or Logs section.
—SYSLOG messages stored in Flash memory.
Clear the Startup Configuration or Backup Configuration file types as
described in the Configuration File Properties section.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 41
Administration: File Management
!

Upgrade/Backup Firmware/Language

Copy one configuration file type to another configuration file type as
described in the Copy/Save Configuration Files section.
Enable automatically downloading a configuration file from a DHCP server
to the switch as described in the DHCP Auto Configuration section.
CAUTION Unless the Running Configuration is manually copied to the Startup Configuration,
Backup Configuration, or an external file, all changes made since the last time the file was saved are lost when the switch is rebooted. We recommend that you save the Running Configuration to the Startup Configuration before logging off to preserve any changes you made during this session.
A red X icon, displayed to the left of the Save application link, indicates that configuration changes have been made and have not yet been saved to the Startup Configuration file.
4
When you click Save, the Copy/Save Configuration page is displayed. Save the Running Configuration file by copying it to the Startup Configuration file. After this save, the red X icon and the Save link is hidden.
Upgrade/Backup Firmware/Language
Use the Upgrade/Backup Firmware/Language page to upgrade or backup the firmware image, and import a second language file.
The following methods for transferring files are supported:
HTTP/HTTPS that uses the facilities provided by the browser.
TFTP that requires a TFTP server.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 42
Administration: File Management
Upgrade/Backup Firmware/Language

Upgrading/Saving the Firmware Image

Upgrading/Saving the Firmware Image
There are two firmware images, Image1 and Image2, stored on the switch. One of the images is identified as the active image and other image is identified as the inactive image.
When you upgrade the firmware, the new image always replaces the image identified as the the switch continues to boot by using the change the status of the new image to be the described in the Active Image section. Then boot the switch by using the process described in the Rebooting the Switch section.
You can also save a copy of the active image on the switch to a destination location such as a TFTP server.
inactive image
4
. Even after uploading new firmware on the switch,
active image
active image
(the old version) until you
by using the procedure
To upgrade or backup the firmware image:
STEP 1 Click Administration > File Management > Upgrade/Backup Firmware/
Language.
STEP 2 To replace the firmware image on the switch with a new version located on a TFTP
server, enter the following information:
Transfer Method—Select via TFTP as the transfer method.
Save Action—Select Upgrade as the action.
File Type—Select Firmware Image as the file type.
TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
Source File Name—Enter the name of the firmware image located on the
TFTP server.
STEP 3 Click Apply.
STEP 4 To replace the firmware image on the switch with a new version located on
another device such as your local PC, enter the following information:
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 43
Administration: File Management
Upgrade/Backup Firmware/Language
Transfer Method—Select via HTTP/HTTPS as the transfer method.
Save Action—Select Upgrade as the action.
File Type—Select Firmware Image as the file type.
File Name—Click Browse to select a firmware image located on another
device such as your local PC.
STEP 5 Click Apply.
STEP 6 To save a copy of the active image on the switch to a TFTP server, enter the
following information:
Transfer Method—Select via TFTP as the transfer method.
Save Action—Select Backup as the action.
File Type—Select Firmware Image as the file type.
4
TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
Destination File Name—Enter the name of the firmware image that will be
saved to the TFTP server.
STEP 7 Click Apply.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 44
Administration: File Management
Upgrade/Backup Firmware/Language

Upgrading the Language File

Upgrading the Language File
If a new language file was loaded onto the switch, the new language can be selected from the Language drop-down menu. (It is not necessary to reboot the switch.)
To upload a new language file:
STEP 1 Click Administration > File Management > Upgrade/Backup Firmware/
Language.
STEP 2 To upload a language file from a TFTP server to the switch, enter the following
information:
Transfer Method—Select via TFTP as the transfer method.
4
Save Action—Select Upgrade as the action.
File Type—Select Language File as the file type.
TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
Source File Name—Enter the name of the source language file located on
the TFTP server.
STEP 3 Click Apply.
STEP 4 To upload a language file from another device such as your local PC to the switch,
do the following:
Transfer Method—Select via HTTP/HTTPS as the transfer method.
Save Action—Select Upgrade as the action.
File Type—Select Language File as the file type.
File Name—Click Browse to select a new language file located on another
device such as your local PC.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 45
Administration: File Management

Active Image

STEP 5 Click Apply.
Active Image
There are two firmware images, Image1 and Image2, stored on the switch. One of the images is identified as the active image and other image is identified as the inactive image. The switch boots from the image you set as the active image. You can change the image identified as the inactive image to the active image. (You need to reboot the switch.)
To s el e c t t he a c t i v e i m a g e :
4
STEP 1 Click Administration > File Management > Active Image.
The following fields are displayed:
Active Image—Displays the image file that is currently active on the switch.
Active Image Version Number—Displays the firmware version of the active
image.
Active Image Version Number After Reboot—Displays the firmware
version of the active image as it be after reboot.
STEP 2 Select the image from the Active Image After Reboot drop-down menu to
identify the firmware image that is used as the active image after the switch is rebooted.
STEP 3 Click Apply.
STEP 4 Reboot the switch. The switch will boot with the selected active image.

Download/Backup Configuration or Logs

The Download/Backup Configuration/Log page enables:
Backing up configuration files or logs from the switch to an external device.
Restoring configuration files from an external device to the switch.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 46
Administration: File Management
Download/Backup Configuration or Logs
When restoring a configuration file to the Running Configuration, the imported file adds any configuration commands that do not exist in the old file and overwrites any parameter values in the existing configuration commands.
When restoring a configuration file to the Startup Configuration or the Backup Configuration file, the new file replaces the previous file.
When restoring to the Startup Configuration, the switch must be rebooted for the restored Startup Configuration to be used as the Running Configuration.

Uploading Configuration File

Uploading Configuration File
To replace a file type with a saved configuration file:
4
STEP 1 Click Administration > File Management > Download/Backup Configuration/
Log.
STEP 2 To replace a file type on the switch with a version of that file type on a TFTP
server, enter the following information:
Transfer Method—Select via TFTP as the transfer method.
Save Action—Select Download as the action.
TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
Source File Name—Enter the source file name.
Destination File Type—Select the configuration file type to be upgraded.
The switch supports upgrading the Running Configuration, Startup Configuration, and Backup Configuration.
STEP 3 Click Apply. The file is upgraded on the switch (depending upon the file type).
STEP 4 To replace a file type on the switch with a version of that file type on another
device such as your local PC, enter the following information:
Transfer Method—Select via HTTP/HTTPS as the transfer method.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 47
Administration: File Management
Download/Backup Configuration or Logs
Save Action—Select Download as the action.
File Name—Click Browse to select a source file.
Destination File Type—Select the configuration file type to be upgraded.
STEP 5 Click Apply. The file is transferred from the other device to the switch.

Saving Configuration File or Logs

Saving Configuration File or Logs
To copy configuration file types or the flash log on the switch to a file on another device:
4
STEP 1 Click Administration > File Management > Download/Backup Configuration/
Log.
STEP 2 To copy a file type on the switch to a file on a TFTP server, enter the following
information:
Transfer Method—Select via TFTP as the transfer method.
Save Action—Select Backup as the action.
TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
Source File Type—Select the configuration file type to be stored on the
TFTP server. The switch supports storing the Running Configuration, Startup Configuration, Backup Configuration, Mirror Configuration, and the flash log.
Destination File Name—Enter the file name to be store d on the TFTP ser ver.
STEP 3 Click Apply. The file is backed up on the TFTP server (depending upon the file
type).
STEP 4 To copy a file type on the switch to a file on another device such as your local PC,
enter the following information:
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 48
Administration: File Management

Configuration File Properties

Transfer Method—Select via HTTP/HTTPS as the transfer method.
Save Action—Select Backup as the action.
Source File Type—Select the configuration file type to be stored.
STEP 5 Click Apply.
STEP 6 Locate where to save the selected configuration file or flash log, click Save.
Configuration File Properties
Use the Configuration Files Properties page to see when various system configuration files are created. It also enables deleting the Startup Configuration and Backup Configuration files. You cannot delete the other configuration file types.
4
To clear configuration files and/or see when configuration files are created:
STEP 1 Click Administration > File Management > Configuration Files Properties.
The following fields are displayed:
Configuration File Name—The type of file.
Creation Time—The date and time that file was modified.
STEP 2 If required, select either the Startup Configuration, Backup Configuration, or both
and click Clear Files to delete these files.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 49
Administration: File Management
!

Copy/Save Configuration Files

Copy/Save Configuration Files
When you click Apply on any window, changes that you made to the switch configuration settings are stored only in the Running Configuration. To preserve the parameters in the Running Configuration, the Running Configuration must be copied to another configuration type or saved as a file on another device.
Use the Copy/Save Configuration page to copy or save one configuration file to another for backup purposes. The bottom of the page has a button, Disable Save
Icon Blinking. Click to toggle between disable and enable.
CAUTION Unless the Running Configuration is copied to the Startup Configuration or another
configuration file, all changes made since the last time the file was copied are lost when the switch is rebooted.
4
The following combinations of copying internal file types are allowed:
From the Running Configuration to the Running Configuration, Startup
Configuration or Backup Configuration.
From the Startup Configuration to the Running Configuration, Startup
Configuration, or Backup Configuration.
From the Backup Configuration to the Running Configuration, Startup
Configuration, or Backup Configuration.
From the Mirror Configuration to the Running Configuration, Startup
Configuration, or Backup Configuration.
To copy one type of configuration file to another type of configuration file:
STEP 1 Click Administration > File Management > Copy/Save Configuration.
STEP 2 Enter the following information:
Source File Name—Select the configuration file type to be copied.
Destination File Name—Select the configuration file type to be overwritten
by the source file.
STEP 3 Click Apply. The file is copied and the switch is updated.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 50
Administration: File Management

DHCP Auto Configuration

STEP 4 The Save Icon Blinking field indicates whether an icon blinks when there is
unsaved data. To disable or enable this feature, click Disable Save Icon Blinking or Enable Save Icon Blinking.
DHCP Auto Configuration
Auto Configuration enables passing configuration information to hosts on a TCP/IP network. Based on this protocol, the Auto Configuration feature enables the switch to download configuration files from a TFTP server.
By default, the switch is enabled as a DHCP client when the Auto Configuration feature is enabled. The switch can be configured as a DHCPv4 client in which auto configuration from a DHCPv4 server is supported and/or a DHCPv6 client in which auto configuration from a DHCPv6 server is supported.
4
DHCPv4 Auto Configuration is triggered in the following cases:
After rebooting the switch when an IP address is allocated or renewed
dynamically (using DHCPv4).
Upon an explicit DHCPv4 renewal request and if the switch and the server
are configured to do so.
Upon automatic renewal of the DHCPv4 lease.
DHCPv6 Auto Configuration is triggered when the following conditions are fulfilled:
When a DHCPv6 server sends information to the switch. This occurs in the
following cases:
- When IPv6 stateless client is enabled.
- When DHCPv6 messages are received from the server.
- When DHCPv6 information is refreshed by the switch.
- After rebooting the switch when stateless DHCPv6 client is enabled.
When the DHCPv6 server packets contain the configuration filename
option.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 51
Administration: File Management
DHCP Auto Configuration

DHCP Server Options

DHCP Server Options
DHCP messages may contain the configuration server name/address and the configuration file name/path (these are optional options). These options are found in the Offer message coming from the DHCPv4 servers and in the Information Reply messages coming from DHCPv6 servers.
Backup information (configuration server name/address and configuration file name/path) can be configured on the DHCP Auto Configuration page. This information is used when the DHCPv4 or DHCPv6 message does not contain this information.

Auto Configuration Process

4
Auto Configuration Process
When the Auto Configuration process is triggered, the following sequence of events occurs:
The DHCP server is accessed to acquire the TFTP server name/ address
and configuration file name/path (DHCPv4 options: 66,150, and 67, DHCPv6 options: 59 and 60).
If a server and configuration file options are not supplied by the DHCP
server, then for DHCPv4 or DHCPv6 the user-defined, backup configuration file name is used.
If the DHCP server does not send these options and the backup TFTP
server address parameter is empty, then the switch sends TFTP request messages to limited Broadcast IPv4 address and continues the process of Auto Configuration with the first answering TFTP server.

Configuring DHCP Auto Configuration Parameters

Configuring DHCP Auto Configuration Parameters
To configure DHCP Auto Configuration, you need to perform the following:
Configure the DHCPv4 and/or DHCPv6 servers to send the required
options. This process is not described in this guide.
Configure the DHCP Auto Configuration parameters as described in this
section.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 52
Administration: File Management
DHCP Auto Configuration
Set the IP Address Type to Dynamic on the IPv4 Interface page, as
described in the IPv4 Management and Interface section.
Use the DHCP Auto Configuration page to perform the following actions when the information is not provided in a DHCP message:
Enable the DHCP Auto Configuration feature.
Configure the switch to receive configuration information from a specific file
on a specific server.
Note the following regarding the DHCP Auto Configuration process:
A configuration file that is placed on the TFTP server must match the form
and format requirements of the supported configuration file. The form and format of the file are checked, but the validity of the configuration parameters is not checked prior to loading it to the Startup Configuration.
4
In IPv4, to ensure that the device configuration functions as intended, due to
allocation of different IP addresses with each DHCP renew cycle, we recommend that IP addresses be bound to MAC addresses in the DHCP server table. This ensures that each device has its own reserved IP address and other relevant information.
NOTE DHCP Auto Configuration is applicable only when the IP address of the switch is set
to dynamic.
To configure DHCP Auto Configuration:
STEP 1 Click Administration > File Management > DHCP Auto Configuration.
STEP 2 Enter the following information:
Auto Configuration via DHCP—Check Enable to enable the DHCP Auto
Configuration feature on the switch, or uncheck to disable this feature.
Backup Server Definition—Select whether to specify the TFTP server by
IP address or domain name.
IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
Backup TFTP Server IP Address/Name—Enter the IP address or domain
name of the backup TFTP server. If no configuration file name is specified in the DHCP message, the switch will download the backup configuration file from the backup TFTP server.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 53
Administration: File Management
DHCP Auto Configuration
Backup Configuration File—Enter the full file path and name of the
configuration file on the backup TFTP server to be used if no configuration file name is specified in the DHCP message.
Last Auto Configuration TFTP Server IP Address—Displays the IP
address or domain name of the TFTP server that is currently using.
Last Auto Configuration File Name—Displays the name of the
configuration file located on the TFTP server that is currently using.
STEP 3 Click Apply. The DHCP Auto Configuration parameters are defined, and the
Running Configuration is updated.
4
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 54

Administration: General Information

This chapter describes how to view system information and configure various options on the switch.
It includes the following topics:
Device Models
Viewing System Summary
Configuring System Settings
Configuring Console Settings
Rebooting the Switch
5
Defining Idle Session Timeout
Ping a Host
Using Traceroute
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 55
Administration: General Information

Device Models

Device Models
All models can be fully managed through the web-based interface. The following table describes the various models, the number and type of ports on them, and their PoE and PID information:
5
Model Name Ports and Expansion
Ports
Fast Ethernet
SF220-24 24 FE copper ports
and 2 special-purpose combo ports (GE/SFP)
SF220-24P 24 FE copper ports
and 2 special-purpose combo ports (GE/SFP)
SF220-48 48 FE copper ports
and 2 special-purpose combo ports (GE/SFP)
Ports that Support PoE
N/A SF220-24-K9-NA,
1 to 24 SF220-24P-K9-NA,
N/A SF220-48-K9-NA,
PIDs
SF220-24-K9-EU, SF220-24-K9-UK, SF220-24-K9-AU, SF220-24-K9-CN
SF220-24P-K9-EU, SF220-24P-K9-UK, SF220-24P-K9-AU, SF220-24P-K9-CN
SF220-48-K9-EU, SF220-48-K9-UK, SF220-48-K9-AU, SF220-48-K9-CN
SF220-48P 48 FE copper ports
and 2 special-purpose combo ports (GE/SFP)
Gigabit Ethernet
SG220-26 24 GE copper ports
and 2 special-purpose combo ports (GE/SFP)
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 56
1 to 48 SF220-48P-K9-NA,
SF220-48P-K9-EU, SF220-48P-K9-UK, SF220-48P-K9-AU, SF220-48P-K9-CN
N/A SG220-26-K9-NA,
SG220-26-K9-EU, SG220-26-K9-UK, SG220-26-K9-AU, SG220-26-K9-BR, SG220-26-K9-AR
Administration: General Information
Device Models
5
Model Name Ports and Expansion
Ports
SG220-26P 24 GE copper ports
and 2 special-purpose combo ports (GE/SFP)
SG220-50 48 GE copper ports
and 2 special-purpose combo ports (GE/SFP)
SG220-50P 48 GE copper ports
and 2 special-purpose combo ports (GE/SFP)
Ports that Support PoE
1 to 24 SF220-26P-K9-NA,
N/A SG220-50-K9-NA,
1 to 48 SF220-50P-K9-NA,
PIDs
SF220-26P-K9-EU, SF220-26P-K9-UK, SF220-26P-K9-AU, SF220-26P-K9-BR, SF220-26P-K9-AR
SG220-50-K9-EU, SG220-50-K9-UK, SG220-50-K9-AU, SG220-50-K9-BR, SG220-50-K9-AR
SF220-50P-K9-EU, SF220-50P-K9-UK, SF220-50P-K9-AU, SF220-50P-K9-BR, SF220-50P-K9-AR
SG220-28 24 GE copper ports
and 4 SFP ports
SG220-28MP 24 GE copper ports
and 4 SFP ports
SG220-52 48 GE copper ports
and 4 SFP ports
NOTE There are some features applicable only for the models with specific country of
destination (-CN), indicating that these features are only applicable for their China SKUs. These features are noted in this guide. You can find the PID information of your switch from the System Summary page.
N/A SG220-28-K9-CN
1 to 24 SG220-28MP-K9-
CN
N/A SG220-52-K9-CN
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 57
Administration: General Information

Viewing System Summary

Viewing System Summary
The System Summary page provides a graphic view of the switch, and displays general switch information, including system information, software information, PoE power information (if applicable), TCP/UDP services status, and other items.
To view general switch information, click Status and Statistics > System
Summary. The following fields are displayed:
System Information
System Description—A description of the switch.
System Location—Physical location of the switch.
System Contact—Name of a contact person.
5
Host Name—Name of the switch. By default, the switch’s hostname is
composed of the word Switch concatenated with the three least significant bytes of the switch MAC address (the six furthest right hexadecimal digits).
NOTE You can click Edit to go to the Administration > System Settings page
to edit the values for above three fields.
System Object ID—Unique vendor identification of the network
management subsystem contained in the SNMP entity.
System Uptime—Time that has elapsed since the last reboot.
Current Time—Current system time.
Base MAC Address—MAC address of the switch.
Jumbo Frames—Jumbo frame support status. This support can be
enabled or disabled on the Port Management > Port Setting page.
NOTE Jumbo frames support takes affect only after it is enabled, and after
the switch is rebooted.
Software Information
Firmware Version (Active Image)—Version number of the active firmware
image.
Firmware MD5 Checksum (Active Image)—MD5 checksum of the active
firmware image.
Firmware Version (Non-active)—Version number of the non-active
firmware image.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 58
Administration: General Information
Viewing System Summary
Firmware MD5 Checksum (Non-active Image)—MD5 checksum of the
non-active firmware image.
Boot Version—Version number of the switch’s bootloader.
Locale—Locale of the first language. (This is always en-US.)
Language Version—Language package version of the first language.
Language MD5 Checksum—MD5 checksum of the first language.
Locale—Locale of the second language.
Language Version—Language package version of the second language.
Language MD5 Checksum—MD5 checksum of the second language.
TCP/UDP Services Status
5
HTTP Service—Shows whether the HTTP service is enabled or disabled.
HTTPS Service—Shows whether the HTTPS service is enabled or
disabled.
SNMP Service—Shows whether the SNMP service is enabled or disabled.
Tel net S er vi ce —Shows whether the Telnet service is enabled or disabled.
SSH Service—Shows whether the SSH service is enabled or disabled.
NOTE You can click Edit to go to the Security > TCP/UDP Services page to
enable or disable these services on the switch.
PoE Power Information (only applicable for the PoE models)
Maximum Available PoE Power (W)—Maximum available power that can
be delivered by the PoE ports.
Total PoE Power Consumption (W)—Total PoE power delivered to the
connected PoE devices.
PoE Power Mode—Port Limit or Class Limit.
NOTE You can click Detail to go to the Port Management > PoE > PoE
Properties page to see more details about the PoE settings.
Other Summary Information
Serial Number—Serial number.
PID VID—Part number and version ID.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 59
Administration: General Information

Configuring System Settings

Configuring System Settings
To view or modify system settings:
STEP 1 Click Administration > System Settings.
STEP 2 View or modify the following system settings:
System Description—Displays the description of the switch.
System Location—Enter the location where the switch is physically located.
System Contact—Enter the name of a contact person.
Host Name—Select how to define the hostname of the switch. The available
options are:
5
- Use Default—Select this option to use the default hostname (System
Name). The default hostname of the switch is switch123456, where 123456 represents the last three bytes of the switch MAC address in hex format.
- User Defined—Select this option to manually define the hostname. Use
only letters, digits, and hyphens. Hostnames cannot begin or end with a hyphen. No other symbols, punctuation characters, or blank spaces are permitted (as specified in RFC1033, 1034, 1035).
STEP 3 In the Custom Login Screen Settings area, specify the system banners that are
displayed when users try to access the switch. The available banners are:
Login Banner—Enter the text message that is displayed before the login
prompt of username and password (generally shown on the login page). The message is maximum 2000 characters long. Click Preview to preview your settings.
Welcome Banner—Enter the text message that is displayed when an EXEC
process is created. The message is maximum 2000 characters long. Click
Preview to preview your settings.
NOTE The banners defined on the web-based interface can also be
activated on the command-line interfaces (Console, Telnet, and SSH).
STEP 4 Click Apply. The system settings are modified, and the Running Configuration is
updated.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 60
Administration: General Information

Configuring Console Settings

Configuring Console Settings
Use the Console Settings page to configure the console port Baud rate. The default console port settings are displayed as follows:
9,600 bits per second
8 data bits
no parity
1 stop bit
no flow control
To change the console port Baud rate:
5
STEP 1 Click Administration > Console Settings.
STEP 2 Select a value from the Console Port Baud Rate drop-down menu. The available
values are 2400, 4800, 9600, 19200, 38400, 57600, and 115200 Bit/sec.
STEP 3 Click Apply. The console port Baud rate is defined, and the Running Configuration
is updated.

Rebooting the Switch

Some configuration changes require the switch to be rebooted before they take effect. However, rebooting the switch will delete the Running Configuration, so it is critical that the Running Configuration is saved to the Startup Configuration before the switch is rebooted. Clicking Apply does not save the configuration to the Startup Configuration.
You can save the Running Configuration on the Administration > Save/Copy Configuration page or click Save at the top of the window.
To reboot the switch:
STEP 1 Click Administration > Reboot.
STEP 2 Click Reboot to reboot the switch. Since any unsaved information in the Running
Configuration is discarded when the switch is rebooted, you must click Save in the
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 61
Administration: General Information

Defining Idle Session Timeout

upper-right corner of any window to preserve current configuration across the boot process. (If the Save option is not displayed, the Running Configuration matches the Startup Configuration and no action is necessary.)
STEP 3 Or check Enable beside the Reboot to Factory Defaults field and click Reboot to
reboot the switch by using factory default configuration. This process erases the Startup Configuration file; any settings that are not saved to another file are cleared when this action is selected.
The Mirror Configuration is not deleted when restoring to factory defaults.
Defining Idle Session Timeout
5
Use the Idle Session Timeout page to configure the time intervals that the management sessions can remain idle before they timeout and the user must login again to reestablish one of the following sessions:
HTTP session
HTTPS session
Console session
Te l n et s e s si o n
SSH session
To define the idle session timeout for various types of sessions:
STEP 1 Click Administration > Idle Session Timeout.
STEP 2 Select the timeout for the session from the corresponding drop-down menu. The
default value is 10 minutes.
STEP 3 Click Apply. The idle session timeout settings are defined, and the Running
Configuration is updated.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 62
Administration: General Information

Ping a Host

Ping a Host
Ping is a utility used to test if a remote host can be reached and to measure the round-trip time for packets sent from the switch to a destination device.
Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP response, sometimes called a pong. It measures the round-trip time and records any packet loss.
To ping a remote host:
STEP 1 Click Administration > Ping.
STEP 2 Enter the following information:
Host Definition—Select whether to specify the host by its IP address or
name.
5
STEP 3 Click Active Ping to ping the host. The ping counters and status are displayed.

Using Traceroute

Traceroute discovers the IP routes along which packets were forwarded by sending an IP packet to the target host and back to the switch. The Traceroute page displays each hop between the switch and a target host, and the round-trip time to each such hop.
IP Version—Select either Version 4 or Version 6 if the host is identified by
IP address.
Host IP Address/Name—Enter the IP address or hostname of the host to be
pinged.
Number of Pings—Select User Defined to enter the number of times that
the ping operation will be performed, or select Use Default to use the default value.
To use the Traceroute utility:
STEP 1 Click Administration > Traceroute.
STEP 2 Enter the following information:
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 63
Administration: General Information
Using Traceroute
Host Definition—Select whether to specify the host by its IP address or
name.
Host IP Address/Name—Enter the IP address or hostname of the host.
TTL—Select User Defined to enter the maximum number of hops that
Traceroute permits. This is used to prevent a case where the sent frame gets into an endless loop. The Traceroute command terminates when the destination is reached or when this value is reached. To use the default value (30), select Use Default.
STEP 3 Click Apply.
5
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 64

Administration: Time Settings

Synchronized system clocks provide a frame of reference between all devices on the network. Network time synchronization is critical because every aspect of managing, securing, planning, and debugging a network involves determining when events occur. Without synchronized clocks, accurately correlating log files between devices when tracking security breaches or network usage is impossible.
Synchronized time also reduces confusion in shared file systems, as it is important for the modification times to be consistent, regardless of the machine on which the file systems reside.
For these reasons, it is important that the time configured on all of the devices on the network is accurate.
6
The switch supports Simple Network Time Protocol (SNTP) and when enabled, the switch dynamically synchronizes its time with the SNTP server time. The switch operates only as an SNTP client and cannot provide time services to other devices.
This chapter describes how to configure the system time, time zone, and Daylight Savings Time (DST).
It includes the following topics:
System Time Options
Configuring System Time
Configuring SNTP Server
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 65
Administration: Time Settings
!

System Time Options

System Time Options
System time can be set manually by the user, or dynamically from an SNTP server. If an SNTP server is chosen, the manual time settings are overwritten when communications with the server are established.
As part of the boot process, the switch always configures the time, time zone, and DST. These parameters are obtained from the SNTP, values set manually, or if all else fails, from the factory defaults.
The following methods are available for setting the system time on the switch:
Manual—You must manually set the time.
SNTP—Time can be received from the SNTP time server. SNTP ensures
accurate network time synchronization of the switch up to the millisecond by using an SNTP server for the clock source.
6
NOTE Without synchronized time, accurately correlating log files between devices is
difficult, even impossible. We recommend that you use SNTP for the clock source.

Configuring System Time

Use the System Time page to configure the current time, time zone, and the time source.
CAUTION The switch does not have an internal clock that updates this value. If the system
time is set manually and the switch is rebooted, the manual time settings must be reentered.
To define system time:
STEP 1 Click Administration > Time Settings > System Time.
The Actual Time field displays the current system time and time source currently used by the switch.
STEP 2 Check Enable beside the Main Clock Source (SNTP Servers) field to use the
SNTP source to set the system clock. The system time is obtained from an SNTP
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 66
Administration: Time Settings
Configuring System Time
server. To use this feature, you must also add an SNTP server on the SNTP Settings
STEP 3 In the Manual Settings area, you can set the date and time manually. The local
time is used when there is no alternate source of time, such as an SNTP server. Or you can click the here link to receive the date and time from the PC by using browser information.
Date—Enter the system date.
Local Time—Enter the system time.
STEP 4 In the Time Zone Settings area, the local time is used via the Time Zone offset.
Time Zone Offset—Select the difference in hours between Universal Time
6
page, as described in the Configuring SNTP Server section.
Coordinated (UTC) and the local time. For example, the Time Zone Offset for Paris is UTC +10:00, while the Time Zone Offset for New York is UTC - 5.
Time Zone Acronym—Enter a user-defined name that represents the time
zone that you have configured. This acronym appears in the Actual Time field.
STEP 5 In the Daylight Saving Settings area, select how DST is defined:
Daylight Savings—Check Enable to enable Daylight Saving Time.
Time Set Offset—Enter the number of minutes offset from UTC.
Daylight Savings Type—Click one of the following:
- USA—DST will be set according to the dates used in the USA.
- European—DST will be set according to the dates used by the European
Union and other countries that use this standard.
- By Dates—DST will be set manually, typically for a country other than the
USA or a European country.
- Recurring—DST occurs on the same date every year.
Selecting By Dates allows customization of the start and stop of DST:
From—Enter the day and time that DST starts.
To —Enter the day and time that DST ends.
Selecting Recurring allows further customization of the start and stop of DST:
From—Enter the date when DST begins each year.
- Day—Day of the week on which DST begins every year.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 67
Administration: Time Settings

Configuring SNTP Server

To —Enter the date when DST ends each year.
STEP 6 Click Apply. The system time is defined, and the Running Configuration is updated.
6
- Week—Week within the month from which DST begins every year.
- Month—Month of the year in which DST begins every year.
- Time—The time at which DST begins every year.
- Day—Day of the week on which DST ends every year.
- Week—Week within the month from which DST ends every year.
- Month—Month of the year in which DST ends every year.
- Time—The time at which DST ends every year.
Configuring SNTP Server
The switch can be configured to synchronize its system clock with an SNTP server specified on the SNTP Settings page.
To specify an SNTP server by name, you must first configure DNS server(s) on the switch and enable Main Clock Source (SNTP Servers) on the System Time page.
To add an SNTP server:
STEP 1 Click Administration > Time Settings > SNTP Settings.
STEP 2 Enter the following information:
Host Definition—Select whether to specify the SNTP server by IPv4
address or by host name.
SNTP Server IP Address/Name—Enter the IPv4 address or hostname of
the SNTP server.
SNTP Server Port—Enter the UDP port number to be specified in the SNTP
message headers. By default, the port number is the well-known IANA value of 123.
STEP 3 Click Apply. The SNTP server is added, and the Running Configuration is updated.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 68

Administration: Diagnostics

!
This chapter contains information for configuring port mirroring, running cable tests, and viewing optical module status and CPU utilization.
It includes the following topics:
Testing Copper Ports
Viewing Optical Module Status
Configuring Port and VLAN Mirroring
Viewing CPU Utilization
7

Testing Copper Ports

Use the Copper Test page to perform the integrated cable tests on copper cables.
CAUTION When a port is tested, it is set to the Down state and communications are
interrupted. After the test, the port returns to the Up state. We do not recommend that you run the test on a port that you are using to run the web-based interface, because communications with that device are disrupted.
To test copper cables attached to ports:
STEP 1 Click Administration > Diagnostics > Copper Test.
STEP 2 Select a port on which to run the copper test.
STEP 3 Click Copper Test.
The following fields for the test are displayed:
Tes t R es ul ts —Summary of the test results.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 69
Administration: Diagnostics

Viewing Optical Module Status

Cable Length—Estimated cable length. The cable length is Unknown when
the green features are enabled.
Operational Port Status—Displays whether the port is up or down.
Viewing Optical Module Status
The Optical Module Status page displays the operating conditions reported by the Small Form-factor Pluggable (SFP) transceiver. Some information may not be available for SFPs that do not support the digital diagnostic monitoring standard SFF-8472.
The following FE SFP (100 Mbps) transceivers are supported:
7
MFEBX1—100BASE-BX-20U SFP transceiver for single-mode fiber, 1310
nm wavelength, supports up to 20 km.
MFEFX1—100BASE-FX SFP transceiver, for multimode fiber, 1310 nm
wavelength, supports up to 2 km.
MFELX1—100BASE-LX SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 10 km.
The following GE SFP (1000 Mbps) transceivers are supported:
MGBBX1—1000BASE-BX-20U SFP transceiver, for single-mode fiber, 1310
nm wavelength, supports up to 40 km.
MGBLH1—1000BASE-LH SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 40 km.
MGBLX1—1000BASE-LX SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 10 km.
MGBSX1—1000BASE-SX SFP transceiver, for multimode fiber, 850 nm
wavelength, supports up to 550 m.
MGBT1: 1000BASE-T SFP transceiver for category 5 copper wire, supports
up to 100 m.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 70
Administration: Diagnostics

Configuring Port and VLAN Mirroring

To view the status of optical modules, click Administration > Diagnostics > Optical Module Status.
The following fields are displayed:
Port—Port number on which the SFP is connected.
Te mp e rat ur e—Temperature in Celsius at which the SFP is operating.
Voltage—SFP’s operating voltage.
Current—SFP’s current consumption.
Output Power—Transmitted optical power.
Input Power—Received optical power.
Loss of Signal—Local SFP reports signal loss. Values are True and False.
7
Configuring Port and VLAN Mirroring
Port Mirroring is used on a network switch to send a copy of network packets seen on one switch port, multiple switch ports, or an entire VLAN to a network monitoring connection on another port on the switch. This is commonly used for network appliances that require monitoring of network traffic, such as an intrusion­detection system. A network analyzer connected to the monitoring port processes the data packets for diagnosing, debugging, and performance monitoring.
The switch supports up to four mirroring sessions. Each session can be used for local mirroring or remote mirroring purposes. Mirroring does not affect the switching of network traffic on the source ports or VLANs. Each session should have a different destination port, except for traffic that is required for the mirroring. The destination port can be used to receive or forward normal traffic.
A packet that is received on a network port assigned to a VLAN that is subject to mirroring is mirrored to the analyzer port even if the packet was eventually trapped or discarded. Packets sent by the switch are mirrored when Transmit (Tx) mirroring is activated.
Mirroring does not guarantee that all traffic from the source port(s) is received on the analyzer (destination) port. If more data is sent to the analyzer port than it can support, some data might be lost.
NOTE The RSPAN VLAN feature is only applicable for the China switch models.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 71
Administration: Diagnostics
Configuring Port and VLAN Mirroring
To configure port and VLAN mirroring:
STEP 1 Click Administration > Diagnostics > Port and VLAN Mirroring.
STEP 2 If your switch supports the RSPAN VLAN feature, enter the following information:
RSPAN VLAN—Check Enable to enable RSPAN VLAN mirroring.
RSPAN VLAN ID—Select the VLAN to be mirrored. When you configure a
STEP 3 Click Add to add a SPAN or RSPAN mirroring session.
STEP 4 Enter the following information:
Session ID—Select the identifier for the mirroring session.
Session Type—Select one of the following options:
7
RSPAN mirroring session, you should select this VLAN as the RSPAN VLAN.
Local Port Based
-
port to the destination port.
Local VLAN Based
-
port.
-
RSPAN Source Session
port or a source VLAN to another device.
RSPAN Destination Session
-
destination port to another device.
STEP 5 If Local Port Based is selected, enter the following information:
Destination Port—Select the analyzer port to where packets are copied. A
network analyzer, such as a PC running Wireshark, is connected to this port. For a port identified as a analyzer destination port, it remains the analyzer destination port until all the entries are removed.
Allow Ingress Packets—Check Enable to allow the destination port to
receive ingress packets that are not copied.
Source Port—Select the source ports from where traffic is mirrored and
select the type of traffic to be mirrored to the analyzer port. The options are:
—Copies TX, RX, or both TX and RX traffic from each
—Copies traffic from the local VLAN to the destination
—Utilizes a VLAN to copy traffic from a source
—Utilizes a VLAN to copy traffic from a
- Rx Only—Port mirroring on incoming packets.
- Tx Onl y—Port mirroring on outgoing packets.
- Tx an d Rx—Port mirroring on both incoming and outgoing packets.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 72
Administration: Diagnostics
Configuring Port and VLAN Mirroring
STEP 6 If Local VLAN Based is selected, enter the following information:
Destination Port—Select the analyzer port to where packets are copied.
Allow Ingress Packets—Check Enable to allow the destination port to
VLAN—Select the source VLAN from where traffic is mirrored.
STEP 7 If RSPAN Source Session is selected, enter the following information:
RSPAN VLAN—Select the VLAN to be used to copy traffic to another
Reflector Port—Select the port or LAG to be connected to another device.
7
- N/A—Traffic from this port is not mirrored.
receive ingress packets that are not copied.
device. This VLAN should be same as the VLAN defined in the RSPAN VLAN ID field.
Source Type—Select Port or VLAN as the source port or source VLAN.
If Port is selected, select the source ports from where traffic is mirrored and select the type of traffic to be mirrored to the analyzer port. The options are:
- Rx Only—Port mirroring on incoming packets.
- Tx Onl y—Port mirroring on outgoing packets.
- Tx an d Rx—Port mirroring on both incoming and outgoing packets.
- N/A—Traffic from this port is not mirrored.
If VLAN is selected, select a source VLAN from where traffic is mirrored.
- VLAN—Select a VLAN as the source VLAN.
STEP 8 If RSPAN Destination Session is selected, enter the following information:
RSPAN VLAN—Select a VLAN to be used to copy traffic to another device.
This VLAN should be same as the VLAN defined in the RSPAN VLAN ID field.
Destination Port—Select the analyzer port to where packets are copied.
Allow Ingress Packets—Check Enable to allow the destination port to
receive ingress packets that are not copied.
STEP 9 Click Apply. The Running Configuration is updated.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 73
Administration: Diagnostics

Viewing CPU Utilization

Viewing CPU Utilization
To view the current CPU utilization and/or set the refresh rate:
STEP 1 Click Administration > Diagnostics > CPU Utilization.
The CPU Utilization field displays the rate of input frames to the CPU per second.
STEP 2 Select the Refresh Rate (time period in seconds) that passes before the CPU
utilization is refreshed.
7
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 74

Administration: Discovery

This chapter provides information for configuring discovery, and includes the following topics:
Configuring Bonjour
LLDP and CDP
Configuring LLDP
Configuring CDP

Configuring Bonjour

8
As a Bonjour client, the switch periodically broadcasts Bonjour Discovery protocol packets to directly-connected IP subnet(s), advertising its existence and the services that it provides, for example; HTTP, HTTPS, or Telnet.
The switch can be discovered by a network management system or other third­party applications. By default, Bonjour is enabled on the Management VLAN. The Bonjour console automatically detects the switch and displays it.
Bonjour Discovery can only be enabled globally. It cannot be enabled on a per­port or per-VLAN basis. The switch advertises all the services that have been enabled by the administrator based on the configuration on the TCP/UDP Services page.
When Bonjour Discovery is disabled, the switch stops any service type advertisements and does not respond to requests for service from network management applications.
By default, Bonjour is enabled on all interfaces that are members of the Management VLAN.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 75
Administration: Discovery

LLDP and CDP

To globally enable or disable Bonjour:
STEP 1 Click Administration > Discovery Bonjour.
STEP 2 Check Enable to enable Bonjour Discovery globally on the switch, or uncheck to
disable it globally.
STEP 3 Click Apply. Bonjour is enabled or disabled on the switch, and the Running
Configuration is updated.
LLDP and CDP
Link Layer Discovery Protocol (LLDP) and Cisco Discovery Protocol (CDP) are link layer protocols for directly-connected LLDP and CDP-capable neighbors to advertise themselves and their capabilities to each other. By default, the switch sends an LLDP/CDP advertisement periodically to all its interfaces and terminates and processes incoming LLDP and CDP packets as required by the protocols. In LLDP and CDP, advertisements are encoded as TLV (Type, Length, Value) in the packet.
8
The following are additional points about CDP and LLDP configuration:
CDP and LLDP can be enabled or disabled globally as well as on each port.
The CDP or LLDP capability of a port is relevant only if CDP or LLDP is globally enabled.
If CDP or LLDP is globally enabled, the switch filters out incoming CDP or
LLDP packets from ports that are CDP-disabled or LLDP-disabled.
If CDP or LLDP is globally disabled, the switch can be configured to discard,
VLAN-aware flooding, or VLAN-unaware flooding of all incoming CDP or LLDP packets. VLAN-aware flooding floods an incoming CDP or LLDP packet to the VLAN where the packet is received excluding the ingress port. VLAN-unaware flooding floods an incoming CDP or LLDP packet to all the ports excluding the ingress port. The default is to discard CDP or LLDP packets when CDP or LLDP is globally disabled. You can configure the discard or flooding of incoming CDP and LLDP packets from the CDP Properties page and the LLDP Properties page respectively.
The CDP and LLDP end devices, such as IP phones, learn the voice VLAN
configuration from CDP and LLDP advertisements. By default, the switch is enabled to send out CDP and LLDP advertisement based on the voice
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 76
Administration: Discovery

Configuring LLDP

NOTE CDP and LLDP are link layer protocols for directly connected CDP-capable or
LLDP-capable devices to advertise themselves and their capabilities. In deployments where the CDP-capable (or LLDP-capable) devices are not directly connected and are separated with CDP-incapable (or LLDP-incapable) devices, the CDP-capable (or LLDP-capable) devices may be able to receive the advertisement from other device(s) only if the CDP-incapable (or LLDP-incapable) devices flood the CDP (or LLDP) packets they receive. If the CDP-incapable (or LLDP-incapable) devices perform VLAN-aware flooding, then CDP-capable (or LLDP-capable) devices can hear each other only if they are in the same VLAN. It should be noted that a CDP-capable (or LLDP-capable) device may receive advertisement from more than one device if the CDP-incapable (or LLDP­incapable) devices flood the CDP (or LLDP) packets.
8
VLAN configured on the switch. Refer to the Configuring Voice VLAN section for details.
NOTE CDP or LLDP does not distinguish if a port is in a LAG. If there are
multiple ports in a LAG, CDP or LLDP transmit packets on each port without taking into account the fact that the ports are in a LAG.
The operation of CDP or LLDP is independent of the STP status of an
interface.
If 802.1X port access control is enabled on an interface, the switch will
transmit and receive CDP or LLDP packets to and from the interface only if the interface is authenticated and authorized.
If a port is the target of mirroring, then for CDP or LLDP it is considered
down.
Configuring LLDP
LLDP is a protocol that enables network managers to troubleshoot and enhance network management in multi-vendor environments. LLDP standardizes methods for network devices to advertise themselves to other systems, and to store discovered information.
LLDP enables a device to advertise its identification, configuration, and capabilities to neighboring devices that then store the data in a Management Information Base (MIB). The network management system models the topology of the network by querying these MIB databases.
LLDP is a link layer protocol. By default, the switch terminates and processes all incoming LLDP packets as required by the protocol.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 77
Administration: Discovery
Configuring LLDP
The LLDP protocol has an extension called LLDP Media Endpoint Discovery (LLDP MED), which provides and accepts information from media endpoint devices such as VoIP phones and video phones.
Following are examples of actions that can be performed with the LLDP feature in a suggested order:
8
Enable LLDP globally (LLDP is enabled by default), and enter LLDP global
parameters on the LLDP Properties page, as described in the Configuring
LLDP Properties section.
Configure LLDP per port on the Port Settings page, as described in the
Configuring LLDP Port Settings section. On this page, ports can be
configured to receive or transmit LLDP PDUs, and specify which TLVs to advertise.
Create LLDP MED network policies on the LLDP MED Network Policy page,
as described in the Configuring LLDP MED Network Policy section.
Associate LLDP MED network policies and the optional LLDP MED TLVs to
the desired ports on the LLDP MED Port Settings page, as described in the
Configuring LLDP MED Port Settings section.
View LLDP global information and the LLDP status of each port as
described in the Viewing LLDP Port Status section.
View LLDP local information as described in the Viewing LLDP Local
Information section.
View LLDP neighbor information as described in the Viewing LLDP
Neighbors Information section.
View LLDP statistics of each port as described in the Viewing LLDP Statistics section.
View LLDP overloading information as described in the Viewing LLDP
Overloading section.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 78
Administration: Discovery
Configuring LLDP

Configuring LLDP Properties

Use the LLDP Properties page to enable LLDP globally and configure general LLDP parameters.
To define LLDP properties:
STEP 1 Click Administration > Discovery LLDP > Properties.
STEP 2 Enter the following information:
8
LLDP Status—Check Enable to enable LLDP on the switch (enabled by
default).
LLDP Frames Handling—If LLDP is disabled, select the action to be taken if
a packet that matches the selected criteria is received:
- Filtering—Deletes the packet.
- Bridging—(VLAN-aware flooding) Forwards the packet to all VLAN
members.
- Flooding—Forwards the packet to all ports.
TLV Advertise Interval—Select User Defined to manually enter the rate in
seconds at which LLDP advertisement updates are sent, or select Use Default to use the default value (30 seconds).
Hold Multiplier—Select User Defined to manually enter the amount of time
that LLDP packets are held before the packets are discarded, measured in multiples of the TLV Advertise Interval. For example, if the TLV Advertise Interval is 30 seconds, and the Hold Multiplier is 4, then the LLDP packets are discarded after 120 seconds. Or select Use Default to use the default value (4).
Reinitializing Delay—Select User Defined to manually enter the time
interval in seconds that passes between disabling and reinitializing LLDP, following an LLDP enable/disable cycle, or select Use Default to use the default value (2 seconds).
Transmit Delay—Select User Defined to manually enter the amount of time
in seconds that passes between successive LLDP frame transmissions due to changes in the LLDP local systems MIB, or select Use Default to use the default value (2 seconds).
STEP 3 In the Fast Start Repeat Count field, enter the number of times that LLDP packets
are sent when the LLDP MED Fast Start mechanism is initialized. This occurs when
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 79
Administration: Discovery
Configuring LLDP
a new endpoint device links to the switch. Refer the Configuring LLDP MED
Network Policy section for more details.
STEP 4 Click Apply. The LLDP properties are defined, and the Running Configuration is
updated.

Configuring LLDP Port Settings

Use the Port Settings page to activate LLDP per port and enter the TLVs that are sent in the LLDP PDU.
To define the LLDP port settings:
STEP 1 Click Administration > Discovery LLDP > Port Settings.
8
STEP 2 Select a port and click Edit.
STEP 3 Enter the following information:
Interface—Select the port to be defined.
Administrative Status—Select the LLDP publishing option for the port. The
values are:
- Tx Onl y—Publishes only but does not discover.
- Rx Only—Discovers but does not publish.
- Tx & R x—Publishes and discovers.
- Disable—Disables LLDP on the port.
Available Optional TLVs—Select the information to be published by the
switch by moving the TLV to the Selected Optional TLVs list. The available TLVs contain the following information:
- Port Description—Information about the port, including manufacturer,
product name and hardware/software version.
- System Name—System’s assigned name (in alpha-numeric format). The
value equals the sysName object.
- System Description—Description of the network entity (in alpha-
numeric format). This includes the system's name and versions of the hardware, operating system, and networking software supported by the switch. The value equals the sysDescr object.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 80
Administration: Discovery
Configuring LLDP
8
- System Capabilities—Primary functions of the switch, and whether or
not these functions are enabled in the switch. The capabilities are indicated by two octets. Bits 0 through 7 indicate Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device, and station respectively. Bits 8 through 15 are reserved.
- 802.3 MAC-PHY—Duplex and bit rate capability and the current duplex
and bit rate settings of the sending device. It also indicates whether the current settings are due to auto-negotiation or manual configuration.
- 802.3 Link Aggregation—Whether the link (associated with the port on
which the LLDP PDU is transmitted) can be aggregated. It also indicates whether the link is currently aggregated, and if so, provides the aggregated port identifier.
- 802.3 Maximum Frame Size—Maximum frame size capability of the
MAC/PHY implementation.
- Management IP Address—Management IP address of the switch.
STEP 4 Click Apply. The LLDP port settings are modified, and the Running Configuration is
updated.

Configuring LLDP MED Network Policy

LLDP Media Endpoint Discovery (LLDP MED) is an extension of LLDP that provides the following additional capabilities to support media endpoint devices. Some of the features of the LLDP MED network policy are:
Enables the advertisement and discovery of network policies for real-time
applications such as voice and/or video.
Device location discovery to allow creation of location databases and, in
the case of Voice over Internet Protocol (VoIP), Emergency Call Service (E-911) by using IP Phone location information.
NOTE The switch automatically advertises the policy according to your configuration;
however, you must also manually configure the switch to use that policy.
An LLDP MED network policy is a related set of configuration settings for a specific real-time application such as voice, or video. A network policy, if configured, will be included into the outgoing LLDP packets to the attached LLDP media endpoint device. The media endpoint device should send its traffic as specified in the network policy that it receives.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 81
Administration: Discovery
Configuring LLDP
Network policies are associated with ports on the LLDP MED Port Settings page. An administrator can manually configure one or more network policies and the ports where the policies are to be sent. It is the administrator's responsibility to manually create the VLANs and their port memberships according to the network policies and their associated ports.
To define LLDP MED network policies:
STEP 1 Click Administration > Discovery LLDP > LLDP MED Network Policy.
STEP 2 Check Enable beside the LLDP MED Network Policy for Voice Application
option to automatically generate and advertise a network policy for voice application based on the voice VLAN maintained by the switch.
STEP 3 Click Apply.
STEP 4 Click Add to add an LLDP MED network policy.
8
STEP 5 Enter the following information:
Network Policy Number—Select the number of the policy to be created.
Application—Select the type of application (type of traffic) from the list for
which the network policy is being defined:
- Voice
- Voice Signaling
- Guest Voice
- Guest Voice Signaling
- Softphone Voice
- Video Conferencing
- Streaming Video
- Video Signaling
VLAN ID—Enter the VLAN ID to which the traffic should be sent.
VLAN Tag—Select whether the traffic is Tagged or Untagged.
User Priority—Select the traffic priority applied to traffic defined by this
network policy.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 82
Administration: Discovery
Configuring LLDP
STEP 6 Click Apply. The LLDP MED network policy is defined, and the Running
Configuration is updated.
STEP 7 Associate the network policy with a port as described in the Configuring LLDP
MED Port Settings section.

Configuring LLDP MED Port Settings

Use the LLDP MED Port Settings page to select the network policies, configured on the LLDP MED Network Policy page, to be advertised on the port, and select the LLDP MED TLVs to be sent inside the LLDP PDU.
8
DSCP Value—Select the DSCP value to associate with application data
sent by neighbors. This informs them how they should mark the application traffic they send to the switch.
To configure LLDP MED on each port:
STEP 1 Click Administration > Discovery LLDP > LLDP MED Port Settings.
STEP 2 To associate the LLDP MED network policy to a port, select a port and click Edit.
STEP 3 Enter the following information:
Interface—Select a port to be configured.
LLDP MED Status—Enable or disable LLDP MED on this port.
Available Optional TLVs—Select the TLVs that can be published by the
switch, by moving them to the Selected Optional TLVs list.
Available Network Policies—Select the LLDP MED policies that will be
published by LLDP, by moving them to the Selected Network Policies list. These policies were created on the LLDP MED Network Policy
NOTE The following fields must be entered in hexadecimal characters in the
exact data format that is defined in the LLDP MED standard (ANSI-TIA­1057_final_for_publication.pdf).
Location Coordinate—Enter the coordinate location to be published by
LLDP.
page.
Location Civic Address—Enter the civic address to be published by LLDP.
Location (ECS) ELIN—Enter the Emergency Call Service (ECS) ELIN
location to be published by LLDP.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 83
Administration: Discovery
Configuring LLDP
STEP 4 Click Apply. The LLDP MED port settings are modified, and the Running
Configuration is updated.
STEP 5 Click LLDP Local Information Detail to see the details of the LLDP and LLDP MED
TLVs sent to the neighbor.

Viewing LLDP Port Status

The LLDP Port Status page displays the LLDP global information, as well as the LLDP status for every port.
To view the LLDP port status:
STEP 1 Click Administration > Discovery LLDP > LLDP Port Status.
8
Th LLDP Port Status page displays the following LLDP global information:
Chassis ID Subtype—Type of chassis ID (for example, MAC address).
Chassis ID—Identifier of chassis. Where the chassis ID subtype is a MAC
address, the MAC address of the switch is displayed.
System Name—Name of switch.
System Description—Description of the switch (in alpha-numeric format).
Supported System Capabilities—Primary functions of the device, such as
Bridge, WLAN AP, or Router.
Enabled System Capabilities—Primary enabled function(s) of the device.
Port ID Subtype—Type of the port identifier that is shown.
The LLDP Port Status Table displays the following LLDP information for each interface:
Interface—Port identifier.
LLDP Status—LLDP publishing option.
LLDP MED Status—Enabled or disabled.
Local PoE—(Only applicable for PoE models) Local PoE information
advertised.
Remote PoE—(Only applicable for PoE models) PoE information advertised
by the neighbor.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 84
Administration: Discovery
Configuring LLDP
STEP 2 Click LLDP Local Information Detail to see the details of the LLDP and LLDP MED
TLVs sent to the neighbor.
STEP 3 Click LLDP Neighbor Information Detail to see the details of the LLDP and LLDP
MED TLVs received from the neighbor.

Viewing LLDP Local Information

To view the LLDP local port status advertised on a port:
8
# of neighbors—Number of neighbors discovered.
Neighbor Capability of 1st Device—Displays the primary enabled device
functions of the neighbor, for example: Bridge or Router.
STEP 1 Click Administration > Discovery LLDP > LLDP Local Information.
STEP 2 Select the desired port from the Port drop-down menu.
The following information is displayed:
Global
Chassis ID Subtype
-
Chassis ID
-
address, the MAC address of the switch is displayed.
System Name
-
System Description
-
Supported System Capabilities
-
as Bridge, WLAN AP, or Router.
Enabled System Capabilities
-
Port ID Subtype
-
Port ID
-
—Identifier of chassis. Where the chassis ID subtype is a MAC
—Identifier of port.
—Type of chassis ID. (For example the MAC address.)
—Name of switch.
—Description of the switch (in alpha-numeric format).
—Primary functions of the device, such
—Primary enabled function(s) of the device.
—Type of the port identifier that is shown.
Port Description
-
product name and hardware/software version.
Management Address—Displays the table of addresses of the local LLDP
agent. Other remote managers can use this address to obtain information related to the local device. The address consists of the following elements:
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 85
—Information about the port, including manufacturer,
Administration: Discovery
Configuring LLDP
-
Address Subtype
Management Address field, for example, IPv4.
—Type of management IP address that is listed in the
8
Address
-
typically a Layer 3 address.
-
Interface Subtype
number.
Interface Number
-
address.
MAC/PHY Details
Auto-Negotiation Supported
-
status.
Auto-Negotiation Enabled
-
Auto-Negotiation Advertised Capabilities
-
capabilities, for example, 1000BASE-T half duplex mode, 100BASE-TX full duplex mode.
-
Operational MAU Type
performs physical layer functions, including digital data conversion from the Ethernet interfaces’ collision detection and bit injection into the network, for example, 100BASE-TX full duplex mode.
—Returned address most appropriate for management use,
—Numbering method used for defining the interface
—Specific interface associated with this management
—Port speed auto-negotiation support
—Port speed auto-negotiation active status.
—Port speed auto-negotiation
—Medium Attachment Unit (MAU) type. The MAU
802.3 Details
802.3 Maximum Frame Size
-
size.
802.3 Link Aggregation
Aggregation Capability
-
aggregated.
Aggregation Status
-
Aggregation Port ID
-
MED Details
Capabilities Supported
-
Current Capabilities
-
Device Class
-
classes are:
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 86
—LLDP MED endpoint device class. The possible device
—Indicates whether the interface is aggregated.
—Advertised aggregated interface ID.
—MED capabilities enabled on the port.
—The maximum supported IEEE 802.3 frame
—Indicates whether the interface can be
—MED capabilities supported on the port.
Administration: Discovery
Configuring LLDP
Endpoint Class 1—Indicates a generic endpoint class, offering basic LLDP services.
Endpoint Class 2—Indicates a media endpoint class, offering media streaming capabilities, as well as all Class 1 features.
Endpoint Class 3—Indicates a communications device class, offering all Class 1 and Class 2 features plus location, 911, Layer 2 switch support, and device information management capabilities.
-
PoE Device Type
example, powered.
—(Only applicable for PoE models) Port PoE type, for
8
PoE Power Source
-
source.
PoE Power Priority
-
priority.
PoE Power Value
-
Hardware Revision
-
Firmware Revision
-
Software Revision
-
Serial Number
-
Manufacturer Name
-
Model Name
-
Asset ID
-
Location Information
Civic
-
—Street address.
—Device serial number.
—Device model name.
—Asset ID.
—(Only applicable for PoE models) Port power
—(Only applicable for PoE models) Port power
—(Only applicable for PoE models) Port power value.
—Hardware version.
—Firmware version.
—Software version.
—Device manufacturer name.
Coordinates
-
ECS ELIN
-
Identification Number (ELIN).
Network Policy Table
Application Type
-
VLAN ID
-
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 87
—Map coordinates: latitude, longitude, and altitude.
—Emergency Call Service (ECS) Emergency Location
—Network policy application type, for example, Voice.
—VLAN ID for which the network policy is defined.
Administration: Discovery
Configuring LLDP
-
VLAN Type
possible field values are:
Tagged—Indicates the network policy is defined for tagged VLANs.
Untagged—Indicates the network policy is defined for untagged VLANs.
—VLAN type for which the network policy is defined. The
8
User Priority
-
DSCP
-
STEP 3 Click LLDP Port Status Table to display the details of LLDP port status in a table.
—Network policy DSCP.
—Network policy user priority.

Viewing LLDP Neighbors Information

The LLDP Neighbor page displays information that was received using the LLDP protocol from neighboring devices. After timeout (based on the value received from the neighbor Time To Live TLV during which no LLDP PDU was received from a neighbor), the information is deleted.
To view the LLDP neighbors information:
STEP 1 Click Administration > Discovery LLDP > LLDP Neighbor.
STEP 2 Select a local port, and click Go.
The following LLDP neighbor information for the selected port is displayed:
Local Port—Number of the local port to which the neighbor is connected.
Chassis ID Subtype—Type of chassis ID (for example, MAC address).
Chassis ID—Identifier of the 802 LAN neighboring device's chassis.
Port ID Subtype—Type of the port identifier that is shown.
Port ID—Identifier of port.
System Name—Published name of the switch.
Time to Live—Time interval in seconds after which the information for this
neighbor is deleted.
STEP 3 Click Detail to display the details of LLDP port status in a table.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 88
Administration: Discovery
Configuring LLDP
STEP 4 Click Refresh to refresh the data in the LLDP Neighbor table.

Viewing LLDP Statistics

The LLDP Statistics page displays LLDP statistical information per port.
To view the LLDP statistics:
STEP 1 Click Administration > Discovery LLDP > LLDP Statistics.
The following fields are displayed for each port:
8
Interface—Port identifier.
Tx Frames—Total number of transmitted frames.
Rx Frames
To t a l
-
-
-
Rx TLVs
-
-
Neighbor’s Information Deletion Count—Number of neighbor age outs on
the port.
STEP 2 Click Refresh to refresh the LLDP statistics.
—Number of received frames.
Discarded
Errors
Discarded
Unrecognized
—Total number of received frames that were discarded.
—Total number of received frames with errors.
—Total number of received TLVs that were discarded.
—Total number of received TLVs that were unrecognized.

Viewing LLDP Overloading

LLDP adds information as LLDP and LLDP MED TLVs into the LLDP packets. LLDP overload occurs when the total amount of information to be included in an LLDP packet exceed the maximum PDU size supported by an interface.
The LLDP Overloading page displays the number of bytes of LLDP/LLDP MED information, the number of available bytes for additional LLDP information, and the overloading status of each port.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 89
Administration: Discovery
Configuring LLDP
To view LLDP overloading information:
STEP 1 Click Administration > Discovery LLDP > LLDP Overloading.
The following fields for each port is displayed:
STEP 2 To view LLDP overloading details for a port, select it and click Details.
8
Interface—Port identifier.
Tot al By te s In- Us e—Total number of bytes of LLDP information in each
packet.
Available Bytes Left —Total number of available bytes left for additional
LLDP information in each packet.
Status—If TLVs are transmitted, or if they are overloaded.
The following information for each TLV sent on the port is displayed:
LLDP Mandatory TLVs
Size (Bytes)
-
Status
-
was overloaded.
LLDP MED Capabilities
Size (Bytes)
-
Status
-
were overloaded.
LLDP MED Location
Size (Bytes)
-
Status
-
overloaded.
LLDP MED Network Policy
—Total mandatory TLV byte size.
—If the mandatory TLV group is transmitting, or if the TLV group
—Total LLDP MED capabilities packets byte size.
—Whether the LLDP MED capabilities packets were sent or they
—Total LLDP MED location packets byte size.
—Whether the LLDP MED location packets were sent or they were
Size (Bytes)
-
Status
-
were overloaded.
LLDP MED Expanded Power via MDI
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 90
—Total LLDP MED network policies packets byte size.
—If the LLDP MED network policies packets were sent, or if they
Administration: Discovery
Configuring LLDP
-
Size (Bytes)
size.
8
—Total LLDP MED extended power via MDI packets byte
Status
-
if they were overloaded.
802.3 TLVs
Size (Bytes)
-
Status
-
overloaded.
LLDP Optional TLVs
Size (Bytes)
-
Status
-
overloaded.
LLDP MED Inventory
Size (Bytes)
-
Status
-
overloaded.
802.1 TLVs
—If the LLDP MED extended power via MDI packets were sent, or
—Total LLDP MED 802.3 TLVs packets byte size.
—If the LLDP MED 802.3 TLVs packets were sent, or if they were
—Total LLDP MED optional TLVs packets byte size.
—If the LLDP MED optional TLVs packets were sent, or if they were
—Total LLDP MED inventory TLVs packets byte site.
—If the LLDP MED inventory packets were sent, or if they were
Size (Bytes)
-
Status
-
overloaded.
To ta l
To t al ( By t e s)
-
Available Bytes Left
-
LLDP information in each packet.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 91
—Total LLDP MED 802.1 TLVs packets byte size.
—If the LLDP MED 802.1 TLVs packets were sent, or if they were
—Total number of bytes of LLDP information in each packet.
—Total number of available bytes left for additional
Administration: Discovery

Configuring CDP

Configuring CDP
Similar to LLDP, Cisco Discovery Protocol (CDP) is a link layer protocol for directly connected neighbors to advertise themselves and their capabilities to each other. Unlike LLDP, CDP is a Cisco proprietary protocol.
This section describes how to configure CDP and includes the following topics:
8
Configuring CDP Properties
Configuring CDP Port Settings
Viewing CDP Local Information
Displaying CDP Neighbor Information
Viewing CDP Statistics

Configuring CDP Properties

Use the CDP Properties page to globally enable CDP on the switch and configure general CDP parameters.
To define CDP properties:
STEP 1 Click Administration > Discovery CDP > Properties.
STEP 2 Enter the following information:
CDP Status—Check Enable to globally enable CDP on the switch.
CDP Frames Handling—If CDP is disabled, select the action to be taken if a
packet that matches the selected criteria is received:
- Bridging—(VLAN-aware flooding) Forwards the packet based on the
VLAN.
- Filtering—Deletes the packet.
- Flooding—(VLAN-unaware flooding) Forwards incoming CDP packets to
all the ports excluding the ingress ports.
CDP Voice VLAN Advertisement—Check Enable to enable the switch to
advertise the voice VLAN in CDP on all ports that are CDP enabled, and are member of the voice VLAN. The voice VLAN is configured on the Voice VLAN > Properties page.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 92
Administration: Discovery
Configuring CDP
8
CDP Mandatory TLVs Validation—Check Enable to discard incoming CDP
packets not containing the mandatory TLVs and the invalid error counter is incremented.
CDP Version—Select the version of CDP to use.
CDP Hold Time—Amount of time that CDP packets are held before the
packets are discarded, measured in multiples of the TLV Advertise Interval. For example, if the TLV Advertise Interval is 30 seconds, and the Hold Multiplier is 4, then the LLDP packets are discarded after 120 seconds. The following options are possible:
- Use Default—Use the default time (180 seconds).
- User Defined—Enter the time in seconds.
CDP Transmission Rate—The rate in seconds at which CDP advertisement
updates are sent. The following options are possible:
- Use Default—Use the default rate (60 seconds).
- User Defined—Enter the rate in seconds.
Device ID Format—Select the format of the device ID (MAC address, serial
number, or host name).
Source Interface—IP address to be used in the TLV of the frames. The
available options are:
Use Default
-
User Defined
-
Interface field) in the address TLV.
Interface—If User Defined was selected for Source Interface, select the
interface.
Syslog Voice VLAN Mismatch—Check Enable to send a SYSLOG message
when a voice VLAN mismatch is detected. This means that the voice VLAN information in the incoming frame does not match what the local device is advertising.
Syslog Native VLAN Mismatch—Check Enable to send a SYSLOG
message when a native VLAN mismatch is detected. This means that the native VLAN information in the incoming frame does not match what the local device is advertising.
Use the IP address of the outgoing interface.
Use the IP address of the interface (defined in the
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 93
Administration: Discovery
Configuring CDP
STEP 3 Click Apply. The CDP properties are defined, and the Running Configuration is
updated.

Configuring CDP Port Settings

Use the Port Settings page to enable or disable CDP per port. Notifications can also be triggered when there are conflicts with CDP neighbors. The conflict can be Voice VLAN data, Native VLAN, or Duplex.
To define the CDP port settings:
8
Syslog Duplex Mismatch—Check Enable to send a SYSLOG message
when duplex information is mismatched. This means that the duplex information in the incoming frame does not match what the local device is advertising.
STEP 1 Click Administration > Discovery CDP > Port Settings.
The following CDP information for each port is displayed:
CDP Status—CDP publishing option for the port.
Reporting Conflicts with CDP Neighbors—Displays the status of the
reporting options (Voice VLAN/Native VLAN/Duplex) that are enabled/ disabled on the Edit page.
No. of Neighbors—Number of neighbors detected.
STEP 2 Select a port and click Edit.
STEP 3 Enter the following information:
Interface—Select the port to be defined.
CDP Status—Check Enable to enable the CDP publishing option for the
port.
NOTE The next three fields are operational when the switch has been set up
to send traps to the management station.
Syslog Voice VLAN Mismatch—Check Enable to send a SYSLOG message
when a voice VLAN mismatch is detected. This means that the voice VLAN information in the incoming frame does not match what the local device is advertising.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 94
Administration: Discovery
Configuring CDP
STEP 4 Click Apply. The CDP port settings are modified, and the Running Configuration is
updated.

Viewing CDP Local Information

8
Syslog Native VLAN Mismatch—Check Enable to send a SYSLOG
message when a native VLAN mismatch is detected. This means that the native VLAN information in the incoming frame does not match what the local device is advertising.
Syslog Duplex Mismatch—Check Enable to send a SYSLOG message
when duplex information mismatch is detected. This means that the duplex information in the incoming frame does not match what the local device is advertising.
The CDP Local Information page displays information that is advertised by the CDP protocol about the local device.
To view CDP local information:
STEP 1 Click Administration > Discovery CDP > CDP Local Information.
STEP 2 Select a local port, and the following fields are displayed:
CDP State—Displays whether CDP is enabled or not.
Device ID TLV
Device ID Type
-
Device ID
-
System Name TLV
-
System Name
Address TLV
Address(s)
-
—Type of the device ID advertised in the device ID TLV.
—Device ID advertised in the device ID TLV.
—System name of the device.
—IP addresses (advertised in the device address TLV).
Port TLV
Port ID
-
Capabilities TLV
Capabilities
-
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 95
—Identifier of port advertised in the port TLV.
—Capabilities advertised in the port TLV.
Administration: Discovery
Configuring CDP
8
Version TLV
Version
-
running.
Platform TLV
Platform
-
Native VLAN TLV
Native VLAN
-
TLV.
Full/Half Duplex TLV
Duplex
-
duplex TLV.
Appliance TLV
Appliance ID
-
appliance TLV.
Appliance VLAN ID
-
instance if the appliance is an IP phone, this is the voice VLAN.
—Information about the software release on which the device is
—Identifier of platform advertised in the platform TLV.
—The native VLAN identifier advertised in the native VLAN
—Whether port is half or full duplex advertised in the full/half
—Type of device attached to port advertised in the
—VLAN on the device used by the appliance, for
Extended Trust TLV
Extended Trust
-
the host/server from which the packet is received is trusted to mark the packets itself. In this case, packets received on such a port are not remarked. Disabled indicates that the port is not trusted in which case, the following field is relevant.
CoS for Untrusted Ports TLV
-
CoS/802.1p for Untrusted Ports
port, this fields displays the Layer 2 CoS value, meaning, an 802.1D/
802.1p priority value. This is the COS value with which all packets received on an untrusted port are remarked by the device.
Power TLV (Only applicable for PoE models)
Request ID
-
received echoes the Request-ID field last received in a Power Requested TLV. It is 0 if no Power Requested TLV was received since the interface last transitioned to Up.
—Enabled indicates that the port is trusted, meaning that
—If Extended Trust is disabled on the
—(Only applicable for PoE models) Last power request ID
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 96
Administration: Discovery
Configuring CDP
-
Power Management ID
incremented by 1 (or 2, to avoid 0) each time any one of the following events occur:
Available Power or Management Power Level fields change value. A Power Requested TLV is received with a Request-ID field which is different from the last-received set (or when the first value is received). The interface transitions to Down.
-
Available Power
consumed by port.
—(Only applicable for PoE models) Amount of power
—(Only applicable for PoE models) Value
8
Management Power Level
-
the supplier's request to the powered device for its Power Consumption TLV. The switch always displays “No Preference” in this field.
—(Only applicable for PoE models) Displays

Displaying CDP Neighbor Information

The CDP Neighbor Information page displays CDP information received from neighboring devices. After timeout (based on the value received from the neighbor Time To Live TLV during which no CDP PDU was received from a neighbor), the information is deleted.
To view the CDP neighbor information:
STEP 1 Click Administration > Discovery CDP > CDP Neighbor Information.
The following fields for the link partner (neighbor) are displayed:
Device ID—Neighbor’s device ID.
Local Interface—Number of the local port to which the neighbor is
connected.
Advertisement Version—CDP protocol version.
Time to Live—Time interval (in seconds) after which the information for this
neighbor is deleted.
Capabilities—Capabilities advertised by neighbor.
Platform—Information from Platform TLV of neighbor.
Neighbor Interface—Outgoing interface of the neighbor.
STEP 2 Select a device, and click Detail.
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 97
Administration: Discovery
Configuring CDP
The following fields about the neighbor is displayed:
8
Device ID—Identifier of the neighboring device ID.
Local Interface—Interface number of port through which frame arrived.
Advertisement Version—Version of CDP.
Time to Live—Time interval (in seconds) after which the information for this
neighbor is deleted.
Capabilities—Primary functions of the device. The capabilities are
indicated by two octets. Bits 0 through 7 indicate Other, Repeater, Bridge, WLAN AP, Router, Telephone, DOCSIS cable device, and station respectively. Bits 8 through 15 are reserved.
Platform—Identifier of the neighbor’s platform.
Neighbor Interface—Interface number of the neighbor through which frame
arrived.
Native VLAN—Neighbor’s native VLAN.
Duplex—Whether neighbors interface is half or full duplex.
Addresses—Neighbor’s addresses.
Power Drawn—(Only applicable for PoE models) Amount of power
consumed by neighbor on the interface.
Version—Neighbor’s software version.
STEP 3 Click Clear Table to disconnect all connected devices from CDP.
STEP 4 Click Refresh to refresh the CDP neighbor information.

Viewing CDP Statistics

The CDP Statistics page displays information regarding CDP frames that were sent or received from a port.
CDP statistics for a port are only displayed if CDP is enabled globally and on the port. This is done in the CDP Properties page and the CDP Port Settings page.
To v i ew CD P s t a t is ti c s :
Cisco 220 Series Smart Plus Switches Administration Guide Release 1.0.0.x 98
Loading...