Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks,
go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner
does not imply a partnership relationship between Cisco and any other company. (1110R)
Contents
Chapter 1: Getting Started10
Getting Started with the Web-based Interface10
Before You Begin11
Logging In to the Web-based Interface11
HTTP/HTTPS12
Changing the Administrative Password13
Logging Out14
Quick Start Switch Configuration15
Interface Naming Conventions16
Window Navigation17
Chapter 2: Status and Statistics21
Viewing Ethernet Interface21
Viewing Etherlike Statistics23
Viewing TCAM Utilization24
Viewing Fan Status and Temperature25
Managing RMON27
Viewing RMON Statistics28
Configuring and Viewing RMON Histories30
Configuring and Viewing RMON Events32
Configuring RMON Alarms34
Chapter 3: Administration: System Logs37
Configuring System Log Settings37
Configuring Remote Logging Settings39
Viewing Memory Logs39
Viewing RAM Memory Logs40
Viewing Flash Memory Logs41
Chapter 4: Administration: File Management42
Files and File Types42
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x1
File Actions44
Upgrade/Backup Firmware/Language45
Active Image48
Download/Backup Configuration or Logs49
Configuration File Properties51
Copy/Save Configuration Files52
DHCP Auto Configuration53
Contents
Chapter 5: Administration: General Information58
Device Models59
Viewing System Summary61
Configuring System Settings63
Configuring Console Settings64
Rebooting the Switch64
Defining Idle Session Timeout65
Ping a Host66
Using Traceroute66
Chapter 6: Administration: Time Settings68
System Time Options69
Configuring System Time69
Configuring SNTP Server71
Time Range72
Absolute Time Range73
Periodic Time Range73
Chapter 7: Administration: Diagnostics75
Testing Copper Ports75
Viewing Optical Module Status76
Configuring Port and VLAN Mirroring77
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x2
Contents
Viewing CPU Utilization80
Chapter 8: Administration: Discovery81
Configuring Bonjour81
LLDP and CDP82
Configuring LLDP83
Configuring LLDP Properties85
Configuring LLDP Port Settings86
Configuring LLDP MED Network Policy87
Configuring LLDP MED Port Settings89
Viewing LLDP Port Status90
Viewing LLDP Local Information91
Viewing LLDP Neighbors Information94
Viewing LLDP Statistics95
Viewing LLDP Overloading95
Configuring CDP98
Configuring CDP Properties98
Configuring CDP Port Settings100
Viewing CDP Local Information101
Displaying CDP Neighbor Information103
Viewing CDP Statistics104
Chapter 9: Port Management106
Port Management Workflow106
Configuring Basic Port Settings107
Configuring Error Recovery Settings110
Loopback Detection111
How LBD Works112
Configuring Loopback Detection112
Default Settings and Configuration112
Interactions with Other Features112
Configuring LBD Workflow113
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x3
To configure Loopback Detection:113
Contents
Configuring Link Aggregation114
Load Balancing114
LAG Management115
Static and Dynamic LAG Workflow116
Configuring LAG Management116
Configuring LAG Settings117
Configuring LACP119
Configuring Energy Efficient Ethernet121
Chapter 10: Power over Ethernet123
PoE Considerations123
PoE on the Switch124
Configuring PoE Properties126
Configuring PoE Port Settings128
Chapter 11: Managing VLANs131
VLANs131
Configuring Default VLAN133
Creating VLANs134
Configuring Interface’s VLAN Settings 135
Configuring Port to VLAN137
Viewing VLAN Membership138
Configuring GVRP140
Configuring Voice VLAN141
Configuring Voice VLAN Properties143
Configuring Telephony OUI143
Adding Interfaces to Voice VLAN on Basis of OUIs145
Chapter 12: Spanning Tree Protocol147
STP Modes147
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x4
Contents
Configuring STP Status and Global Settings148
Configuring STP Interface Settings150
Configuring RSTP Interface Settings151
Configuring Multiple Spanning Tree153
Configuring MSTP Properties154
Mapping VLANs to MST Instance155
Configuring MSTP Instance Settings156
Configuring MSTP Interface Settings156
Chapter 13: MAC Address Tables159
Types of MAC Addresses159
Configuring Static MAC Addresses160
Configuring Static MAC Address Filter161
Configuring Dynamic MAC Address Aging Time161
Querying Dynamic MAC Addresses162
Configuring Reserved MAC Addresses163
Chapter 14: Multicast Forwarding164
Multicast Forwarding164
Configuring Multicast Properties167
Configuring IP Multicast Group Addresses168
Configuring IGMP Snooping169
Configuring MLD Snooping171
Querying IGMP/MLD IP Multicast Groups173
Configuring Multicast Router Ports174
Configuring Forward All Multicast175
Configuring Maximum IGMP and MLD Groups176
Configuring Multicast Filtering176
Configuring Multicast Filter Profiles177
Configuring Interface Filter Settings177
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x5
Contents
Chapter 15: IP Configuration179
IP Addressing179
IPv4 Management and Interface181
IPv6 Management and Interface182
Configuring Domain Name System183
Configuring General DNS Settings184
Viewing Static and Dynamic DNS Servers185
Configuring Host Mapping185
Chapter 16: Configuring Security187
Configuring Users188
Configuring TACACS+ Servers189
Configuring RADIUS Servers191
Configuring Management Access Methods193
Access Profile Rules, Filters, and Elements193
Active Access Profile194
Configuring Access Profiles194
Configuring Profile Rules196
Configuring Password Complexity Rules198
Configuring Management Access Authentication200
Configuring TCP/UDP Services201
Configuring Storm Control203
Configuring Port Security205
Configuring 802.1X207
802.1X Parameters Workflow208
Defining 802.1X Properties209
Defining 802.1X Port Authentication209
Defining Host and Session Authentication212
Viewing Authenticated Hosts213
Configuring DoS Protection214
Secure Core Technology (SCT)214
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x6
Default Configuration214
Configuring DoS Security Suite Settings215
Configuring DoS Interface Settings216
Configuring SYN Protection217
Contents
Configuring DHCP Snooping218
Configuring DHCP Snooping Properties219
Configuring DHCP Snooping on VLANs220
Configuring DHCP Snooping Trusted Interfaces220
Querying DHCP Snooping Binding Database221
Viewing Option 82 Statistics222
Configuring Option 82 Interface Settings223
Configuring Option 82 Port CID Settings223
Configuring IP Source Guard224
Configuring IP Source Guard Interface Settings224
Querying IP Source Binding Database225
Configuring Dynamic ARP Inspection226
ARP Cache Poisoning227
How ARP Prevents Cache Poisoning227
Interaction Between ARP Inspection and DHCP Snooping228
Workflow to Configure ARP Inspection228
Configuring ARP Inspection Properties229
Configuring ARP Inspection Trusted Interfaces230
Viewing ARP Inspection Statistics231
Configuring ARP Inspection VLAN Settings231
Chapter 17: Access Control233
Access Control Lists234
Configuring MAC-based ACLs236
Configuring MAC-based ACEs237
Configuring IPv4-based ACLs239
Configuring IPv4-Based ACEs240
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x7
Contents
Configuring IPv6-based ACLs243
Configuring IPv6-based ACEs243
Configuring ACL Binding246
Chapter 18: Quality of Service248
QoS Features and Components248
Workflow to Configure QoS Settings250
Configuring QoS Properties251
Configuring QoS Queues252
Mapping CoS/802.1p to a Queue253
Mapping IP Precedence to Queue255
Mapping DSCP to Queue255
Mapping Queues to CoS/802.1p256
Mapping Queue to IP Precedence256
Mapping Queue to DSCP257
Configuring Interface Remark257
Configuring Bandwidth258
Configuring Egress Shaping per Queue258
Configuring VLAN Rate Limit259
Configuring VLAN Port Rate Limit260
Configuring TCP Congestion Avoidance261
Configuring QoS Basic Mode261
Configuring Basic QoS Trust Mode262
Configuring Basic QoS Interface Settings263
Configuring QoS Advanced Mode263
Configuring Advanced QoS Global Settings265
Configuring Class Mapping266
QoS Policers267
Configuring Aggregate Policers268
Configuring QoS Policies269
Configuring Policy Class Maps270
Configuring Policy Binding271
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x8
Contents
Chapter 19: SNMP272
SNMP Versions and Workflow272
Supported MIBs275
Model Object IDs276
Configuring SNMP Engine ID276
Configuring SNMP Views278
Configuring SNMP Groups279
Managing SNMP Users280
Configuring SNMP Communities282
Configuring SNMP Notification Recipients283
Configuring SNMPv1,2 Notification Recipients284
Configuring SNMPv3 Notification Recipients285
Appendix A: Where to Go From Here287
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x9
Getting Started
This chapter provides an introduction to the web-based interface of the Cisco 220
switch and includes the following topics:
•Getting Started with the Web-based Interface
•Quick Start Switch Configuration
•Interface Naming Conventions
•Window Navigation
Getting Started with the Web-based Interface
1
The Cisco 220 switch can be accessed and managed by two methods; over your
IP network by using the web-based interface, or by using the command-line
interface through the console interface. Using the console interface requires
advanced user skills. See the
Interface Reference Guide
This section includes the following topics:
•Before You Begin
•Logging In to the Web-based Interface
•HTTP/HTTPS
•Changing the Administrative Password
•Logging Out
Cisco 220 Series Smart Switches Command Line
for more information about using the console interface.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x10
Getting Started
Getting Started with the Web-based Interface
Before You Begin
Before you begin to use the web-based interface, make sure that you have a
computer with Internet Explorer 8.0 (or higher), Firefox 20.0 (or higher), Chrome
23.0 (or higher), or Safari 5.7 (or higher).
These are the default settings used when configuring your switch for the first time:
ParameterDefault Value
Usernamecisco
Passwordcisco
Switch IP192.168.1.254
1
Logging In to the Web-based Interface
To access the switch with the web-based interface, you must know the IP address
that the switch is using. The default configuration of the switch is to use its factory
default IP address of 192.168.1.254 until it has obtained an IP address from a
DHCP server.
NOTE If you are managing the switch through a network connection and the switch IP
address is changed, either by a DHCP server or manually, your access to the switch
will be lost. You must enter the new IP address that the switch is using into your
browser to use the web-based interface. If you are managing the switch through a
console port connection, the link is retained.
To configure the switch using the web-based interface:
STEP 1 Power on the computer and your switch.
STEP 2 Connect the computer to the switch.
You can connect to the same IP subnet as the switch by connecting them directly
with an Ethernet cable, or by connecting to the same LAN where the switch is
located through other switches. You can also connect your computer to the switch
from another IP subnet through one or more IP routers.
STEP 3 Locate the IP address of the switch.
a. The switch can be accessed and managed by Cisco network tools and
services including the Cisco FindIT Network Discovery Utility which enables
you to automatically discover all supported Cisco devices in the same local
network segment as your computer. You can get a snapshot view of each
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x11
Getting Started
Getting Started with the Web-based Interface
device or launch the product configuration utility to view and configure the
settings. For more information about FindIT, see www.cisco.com/go/findit.
b. Locate the IP address assigned by your DHCP server by accessing your router
or DHCP server; see your DHCP server instructions for information. Make sure
that your DHCP server is running and can be reached.
STEP 4 Set up the IP configuration on your computer.
•If the switch is using the default static IP address of 192.168.1.254, you
must choose an IP address in the range of 192.168.1.2 to 192.168.1.253 that
is not already in use.
•If the IP addresses will be assigned by DHCP, make sure that your DHCP
server is running and can be reached from the switch and the computer. You
may need to disconnect and reconnect the devices for them to discover their
new IP addresses from the DHCP server.
1
NOTE Details on how to change the IP address on your computer depend upon the
type of architecture and operating system that you are using. Use your computers
local Help and Support functionality and search for “IP Addressing.”
STEP 5 Open a web browser window. If you are prompted to install an Active-X plug-in
when connecting to the switch, follow the prompts to accept the plug-in.
STEP 6 Enter the IP address of the switch that you are configuring in the address bar on
the browser, and then press Enter. For example, http://192.168.1.254.
STEP 7 When the login page appears, choose the language that you prefer to use in the
web-based interface and enter the username and password.
The default username is cisco and the default password is cisco. Both username
and password are case sensitive.
STEP 8 Click Log In.
The first time that you log in with the default username and password, you are
required to enter a new password. The Change Password page opens.
HTTP/HTTPS
You can either open an HTTP session (not secured) by clicking Log In, or you can
open an HTTPS (secured) session by clicking Secure Browsing (HTTPS). You are
asked to approve the logon with a default RSA key, and an HTTPS session is
opened.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x12
Getting Started
Getting Started with the Web-based Interface
NOTE You do not need to input the username or password before clicking Secure
Browsing (HTTPS).
Changing the Administrative Password
For security purposes, you are required to change the administrative password at
your first login or when the current administrative password expires.
Password complexity is enabled by default. The minimum password complexity
requirements are shown on the page. The new password must comply with the
default complexity rules, or it can be disabled temporarily by selecting Disable
Password Strength Enforcement. See the Configuring Password Complexity
Rules section for more details about password complexity.
To change the password:
1
STEP 1 Enter the following fields to set a new administrative password:
•Old Password—Enter the current password (default is cisco).
•Password—Enter a new password.
•Confirm Password—Enter the new password again for confirmation.
•Password Strength Meter—Displays the strength of the new password.
enforcement enabled by default requires the password to conform to the
following default settings:
-Is different from the current username.
-Has a minimum length of eight characters.
-Contains characters from at least three character classes (uppercase
letters, lowercase letters, numbers, and special characters available on a
standard keyboard).
NOTE If you do not want to change the password, check Disable Password
Strength Enforcement and click Apply.
STEP 2 Click Apply.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x13
Getting Started
!
Getting Started with the Web-based Interface
The Getting Started page opens. You are now ready to configure the switch.
STEP 3 Check Do not show this page on startup to prevent the Getting Started page
from being displayed each time that you log on to the switch. If you select this
option, the System Summary page is opened instead of the Getting Started page.
Logging Out
By default, the application logs out after ten minutes of inactivity. You can change
this default value as described in the Defining Idle Session Timeout section.
CAUTION Unless the Running Configuration is copied to the Startup Configuration, all
changes made since the last time the file was saved are lost if the switch is
rebooted. Save the Running Configuration to the Startup Configuration before
logging off to preserve any changes that you made during this session.
1
A red X icon displayed to the left of the Save application link indicates that Running
Configuration changes that have been made have not yet been saved to the Startup
Configuration file. The flashing red X can be displayed by clicking the Disable Save Icon Blinking button on the Copy/Save Configuration page.
When the switch auto-discovers a device, such as an IP phone, it configures the
port appropriately for the device. These configuration commands are written to the
Running Configuration file. This operation causes the Save icon to begin blinking
when the user logs on even though the user did not make any configuration
changes.
When you click Save, the Copy/Save Configuration page is displayed. Save the
Running Configuration file by copying it to the Startup Configuration file. After this
save, the red X icon and the Save application link are no longer displayed.
To l o g o u t , c l i c k Logout at the top right corner of any page. The system logs out of
the switch.
When a timeout occurs or you intentionally log out of the switch, a message is
displayed and the login page opens with a message indicating the logged-out
state. After you log in, the application returns to the initial page.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x14
Getting Started
Quick Start Switch Configuration
The initial page displayed depends on the “Do not show this page on startup”
option on the Getting Started page. If you did not select this option, the initial page
is the Getting Started page. If you did select this option, the initial page is the
System Summary page.
Quick Start Switch Configuration
To simplify switch configuration through quick navigation, the Getting Started
page provides links to the most commonly used pages.
CategoryLink Name (on the Page)Linked Page
1
Initial
Setup
Device
Status
Change Management
Applications and Services
Change Device IP AddressAdministration > Management
Create VLANVLAN Management > Create
Configure Port SettingsPort Management > Port Setting
System SummaryStatus and Statistics > System
Port StatisticsStatus and Statistics > Interface
RMON StatisticsStatus and Statistics > RMON >
View LogStatus and Statistics > View Log >
Security > TCP/UDP Services
page
Interface > IPv4 Interface page
VLAN page
page
Summary page
page
Statistics page
RAM Memory page
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x15
Getting Started
Interface Naming Conventions
1
CategoryLink Name (on the Page)Linked Page
Quick
Access
Change Device PasswordAdministration > User Accounts
There are two hot links on the Getting Started page that take you to Cisco web
pages for more information. Clicking on the Support link takes you to the device
product support page, and clicking on the Forums link takes you to the Cisco
Support Community page.
Interface Naming Conventions
Within the web-based interface, interfaces are denoted by concatenating the
following elements:
•Type of interface—The following types of interfaces are found on the
various types of devices:
-Fast Ethernet (10/100 bits)—These are displayed as FE.
-Gigabit Ethernet (10/100/1000 bits)—These are displayed as GE.
-LAG (Port Channel)—These are displayed as LAG.
-VLAN—These are displayed as VLAN.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x16
Getting Started
Window Navigation
-Tunnel —These are displayed as Tunnel.
•Interface Number—Port, LAG, tunnel, or VLAN ID.
Window Navigation
This section describes the features of the web-based interface.
Application Header
The Application Header appears on every page. It provides the following
application links:
1
Application Link
Name
UsernameDisplays the name of the user logged on to the switch.
Language Menu
LogoutClick to log out of the web-based interface.
AboutClick to display the switch name and device version
Description
The default username is cisco. (The default password
is cisco)
This menu provides the following options:
•Select a language: Select one of the languages
that appear in the menu. This language will be
the web-based interface language.
•Download Language: Add a new language to
the switch. To upgrade a language file, use the
Upgrade/Backup Firmware/Language page.
•Delete Language: Deletes the second
language on the switch. The first language
(English) cannot be deleted.
number.
HelpClick to display the online help.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x17
Getting Started
Window Navigation
1
Application Link
Name
AlertThe SYSLOG Alert Status icon appears when a
SaveA flashing red X icon displayed to the left of the Save
Description
SYSLOG message, above the critical severity level, is
logged. Click the icon to open the RAM Memory page.
After you access this page, the SYSLOG Alert Status
icon is no longer displayed. To display the page when
there is not an active SYSLOG message, click Status and Statistics > View Log > RAM Memory.
application link indicates that Running Configuration
changes have been made have not yet been saved to
the Startup Configuration file. The flashing of the red X
can be disabled on the Copy/Save Configuration page.
Click Save to display the Copy/Save Configuration
page. Save the Running Configuration file by copying it
to the Startup Configuration file type on the switch.
After this save, the red X icon and the Save application
link are no longer displayed. When the switch is
rebooted, it copies the Startup Configuration to the
Running Configuration and sets the switch parameters
according to the data in the Running Configuration.
Management Buttons
The following table describes the commonly-used buttons that appear on various
pages in the system.
Button NameDescription
AddClick to display the related Add page and add an entry
to a table. Enter the information and click Apply to save
it to the Running Configuration. Click Close to return to
the main page. Click Save to display the Copy/Save
Configuration page and save the Running
Configuration to the Startup Configuration file type on
the switch.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x18
Getting Started
Window Navigation
1
Button NameDescription
ApplyClick to apply the changes to the Running
Configuration on the switch. If the switch is rebooted,
the Running Configuration is lost, unless it is saved to
the Startup Configuration file type or another file type.
Click Save to display the Copy/Save Configuration
page and save the Running Configuration to the
Startup Configuration file type on the switch.
CancelClick to reset the changes made on the page.
Clear All Interfaces
Counters
Clear Interface
Counters
Clear LogsClears log files.
Clear TableClears table entries.
CloseReturns to the main page. If any changes were not
Copper TestClick Copper Test to perform the related test.
Copy SettingsA table typically contains one or more entries
Click to clear the statistics counters for all interfaces.
Click to clear the statistics counters for the selected
interface.
applied to the Running Configuration, a message
appears.
containing configuration settings. Instead of modifying
each entry individually, it is possible to modify one
entry and then copy the selected entry to multiple
entries, as described here:
1. Select the entry to be copied and click Copy Settings.
2. Enter the destination entry numbers in the to field.
3. Click Apply to save the changes and click Close to
return to the main page.
DeleteAfter selecting an entry in the table, click Delete to
remove.
DetailsClick to display the details associated with the entry
selected.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x19
Getting Started
Window Navigation
1
Button NameDescription
EditSelect the entry and click Edit. The Edit page appears,
and the entry can be modified.
1. C li ck Apply to save the changes to the Running
Configuration.
2. Click Close to return to the main page.
GoEnter the query filtering criteria and click Go. The
results are displayed on the page.
RefreshClick to manually refresh the data on the page.
View All Interfaces
Statistics
View Interface
Statistics
Click to see the statistics counters for all interfaces on
a single page.
Click to see the statistics counters for the selected
interface on a single page.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x20
Status and Statistics
This chapter describes how to view switch statistics, and includes the following
topics:
•Viewing Ethernet Interface
•Viewing Etherlike Statistics
•Viewing TCAM Utilization
•Viewing Fan Status and Temperature
•Managing RMON
2
Viewing Ethernet Interface
The Interface page displays traffic statistics per interface. The refresh rate of the
information can be selected. This page is useful for analyzing the amount of traffic
that is both sent and received and its dispersion (Unicast, Multicast, and
Broadcast).
To view Ethernet statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > Interface.
STEP 2 Enter the following information:
•Interface—Select the port or LAG for which the Ethernet statistics are
displayed.
•Refresh Rate—Select the time period that passes before the Ethernet
statistics are refreshed. The available options are:
No Refresh
-
-
15 sec
—Statistics are refreshed every 15 seconds.
—Statistics are not refreshed.
30 sec
-
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x21
—Statistics are refreshed every 30 seconds.
Status and Statistics
Viewing Ethernet Interface
2
-
60 sec
The Receive Statistics area displays the following fields about incoming packets:
•Tot al B y tes (O ct ets )—Octets received, including bad packets and FCS
STEP 3 Click Clear Interface Counters to clear the statistics counters for the selected
interface.
STEP 4 Click Refresh to manually refresh the statistics counters for the selected interface.
STEP 5 Click View All Interfaces Statistics to see the statistics counters for all interfaces
on a single page. The Interface Statistics Table displays the statistics counters for
all interfaces. From this page you can perform the following actions:
•Select the refresh rate from the Refresh Rate drop-down menu.
•Select an interface and click Clear Interface Counters to clear the statistics
counters for the selected interface.
•Click Clear All Interface Counters to clear the statistics counters for all
interfaces.
•Select an interface and click View Interface Statistics to see the statistics
counters for the selected interface on a single page.
•Click Refresh to manually refresh the statistics counters for all interfaces.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x22
Status and Statistics
Viewing Etherlike Statistics
Viewing Etherlike Statistics
The Etherlike page displays statistics per interface according to the Etherlike MIB
standard definition. The refresh rate of the information can be selected. This page
provides more detailed information regarding errors in the physical layer (Layer 1),
which might disrupt traffic.
To view Etherlike statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > Etherlike.
STEP 2 Enter the following information:
•Interface—Select the port or LAG for which the Etherlike statistics are
displayed.
2
•Refresh Rate—Select the time period that passes before the Etherlike
statistics are refreshed.
The following fields are displayed for the selected interface:
•Frame Check Sequence (FCS) Errors—Number of received frames that
failed the Cyclic Redundancy Checks (CRC).
•Single Collision Frames—Number of frames involved in a single collision,
but were successfully transmitted.
•Late Collisions—Number of collisions that have been detected after the first
512 bits of data.
•Excessive Collisions—Number of transmissions due to excessive collisions.
•Oversize Packets—Number of packets greater than 1518 octets received.
•Internal MAC Receive Errors—Number of frames rejected because of
receiver errors.
•Pause Frames Received—Number of received flow control pause frames.
•Pause Frames Transmitted—Number of flow control pause frames
transmitted from the selected interface.
STEP 3 Click Clear Interface Counters to clear the statistics counters for the selected
interface.
STEP 4 Click Refresh to manually refresh the statistics counters for the selected interface.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x23
Status and Statistics
Viewing TCAM Utilization
STEP 5 Click View All Interfaces Statistics to see the statistics counters for all interfaces
2
on a single page. The Etherlike Statistics Table displays the statistics counters for
all interfaces. From this page you can perform the following actions:
•Select the refresh rate from the Refresh Rate drop-down menu.
•Select an interface and click Clear Interface Counters to clear the statistics
counters for the selected interface.
•Click Clear All Interface Counters to clear the statistics counters for all
interfaces.
•Select an interface and click View Interface Statistics to see the statistics
counters for the selected interface on a single page.
•Click Refresh to manually refresh the statistics counters for all interfaces.
Viewing TCAM Utilization
The switch architecture uses a Ternary Content Addressable Memory (TCAM) to
support packet actions in wire speed. TCAM holds the rules produced by
applications (such as ACL and QoS) and the system-created rules.
Only system application allocates rules upon its initiation.
To view TCAM utilization, click Status and Statistics > TCAM Utilization.
•In Use—Number of TCAM entries that are currently using.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x24
Status and Statistics
Viewing Fan Status and Temperature
Viewing Fan Status and Temperature
The Fan and Thermal Status page displays the fan and temperature status of the
switches with PoE capabilities.
The following table lists the number of fan channels and temperature channels
applicable on different PoE switch models:
2
ModelNumber of Fan
Channels
SF220-24P22
SF220-48P42
SG220-26P22
SG220-28MP32
SG220-50P42
To view the fan and temperature status, click Status and Statistics > Fan and Thermal Status.
The following fields are displayed:
x
•FAN
-
-
Status—Displays the operation status of the switch fans.
Operational Status
displays Fault if the fan does not operate normally.
Speed Value
—Displays OK if the fan operates normally, or
—Displays the fan speed in revolutions per minute (RPM).
Number of Temperature
Channels
x
•Thermal
Operational Status
-
or displays Fault when the thermal does not operate normally.
-
Temperature Value
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x25
Status—Displays the status of the switch thermals.
—Displays OK when the thermal operates normally,
—Displays the current temperature in Celsius.
Status and Statistics
Viewing Fan Status and Temperature
-
Temperature Status
possible values are:
Green—Indicates that the current temperature is lower than the yellow
threshold.
Yellow—Indicates that the current temperature is greater than the
yellow threshold, but lower than the red threshold.
Red—Indicates that the current temperature is greater than the red
threshold.
—Displays the current temperature status. The
2
Yellow Threshold
-
temperature thermal.
-
Red Threshold
thermal.
The following table lists the yellow and red threshold values for two thermals
applicable on different PoE switch models:
ModelYellow
Threshold of
Thermal 1
SF220-24P158
SF220-26P203
SF220-28MP167
SF220-48P147
SF220-50P158
—Displays the yellow threshold value of the
—Displays the red threshold value of the temperature
Red
Threshold of
Thermal 1
°F (70°C)167°F (75°C)171°F (77°C)180°F (82°C)
°F (95°C)210°F (99°C)178°F (81°C)185°F (85°C)
°F (75°C)176°F (80°C)152°F (67°C)162°F (72°C)
°F (64°C)156°F (69°C)156°F (69°C)165°F (74°C)
°F (70°C)167°F (75°C)167°F (75°C)176°F (80°C)
Yel lo w
Threshold of
Thermal 2
Red
Threshold of
Thermal 2
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x26
Status and Statistics
Managing RMON
Managing RMON
Remote Networking Monitoring (RMON) is an SNMP specification that enables an
SNMP agent in the switch to proactively monitor traffic statistics over a given
period and send traps to an SNMP manager. The local SNMP agent compares
actual, real-time counters against predefined thresholds and generates alarms,
without the need for polling by a central SNMP management platform. This is an
effective mechanism for proactive management, provided that you have right
thresholds set relative to your network’s base line.
RMON decreases the traffic between the manager and the switch because the
SNMP manager does not have to frequently poll the switch for information, and
enables the manager to get timely status reports because the switch reports
events as they occur.
With this feature, you can perform the following actions:
2
•View the current statistics (since the counter values were cleared). You can
also collect the values of these counters over a period of time, and then
view the table of collected data, where each collected set is a single line of
the History Table.
•Define interesting changes in counter values, such as “reached a certain
number of late collisions” (defines the alarm), and then specify what action
to perform when this event occurs (log, trap, or log and trap).
NOTE For RMON configuration to be effective, make sure that the SNMP service is
enabled on the switch.
This section includes the following topics:
•Viewing RMON Statistics
•Configuring and Viewing RMON Histories
•Configuring and Viewing RMON Events
•Configuring RMON Alarms
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x27
Status and Statistics
Managing RMON
2
Viewing RMON Statistics
The Statistics page displays detailed information regarding packet sizes and
some information regarding physical layer errors. The information shown is
according to the RMON standard. An oversized packet is defined as an Ethernet
frame with the following criteria:
•Packet length is greater than MRU byte size.
•Collision event has not been detected.
•Late collision event has not been detected.
•Received (Rx) error event has not been detected.
•Packet has a valid CRC.
To view RMON statistics and/or set the refresh rate:
STEP 1 Click Status and Statistics > RMON > Statistics.
STEP 2 Enter the following information:
•Interface—Select the port or LAG for which RMON statistics are displayed.
•Refresh Rate—Select the time period that passes before RMON statistics
are refreshed.
The following fields are displayed for the selected interface:
•RMON Received Bytes (Octets)—Number of octets received, including
bad packets and FCS octets, but excluding framing bits.
•RMON Drop Events—Number of packets that were dropped.
•RMON Received Packets —Number of packets received, including bad
packets, Multicast packets, and Broadcast packets.
•RMON Broadcast Packets Received—Number of good Broadcast packets
received. This number does not include Multicast packets.
•RMON Multicast Packets Received—Number of good Multicast packets
received.
•RMON CRC & Align Errors—Number of CRC and Align errors that have
occurred.
•RMON Undersize Packets—Number of undersized packets (less than 64
octets) received.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x28
Status and Statistics
Managing RMON
2
•RMON Oversize Packets—Number of oversized packets (over 1518 octets)
received.
•RMON Fragments—Number of fragments (packets with less than 64 octets,
excluding framing bits, but including FCS octets) received.
•RMON Jabbers—Number of received packets that were longer than 1632
octets. This number excludes frame bits, but includes FCS octets that had
either a bad FCS (Frame Check Sequence) with an integral number of octets
(FCS Error) or a bad FCS with a non-integral octet (Alignment Error) number.
A Jabber packet is defined as an Ethernet frame that satisfies the following
criteria:
-Packet data length is greater than MRU.
-Packet has an invalid CRC.
-RX error event has not been detected.
•RMON Collisions—Number of collisions received. If Jumbo Frames are
enabled, the threshold of Jabber Frames is raised to the maximum size of
Jumbo Frames.
•Frames of 64 Bytes—Number of frames, containing 64 bytes that were
received.
•Frames of 65 to 127 Bytes—Number of frames, containing 65 to 127 bytes
that were received.
•Frames of 128 to 255 Bytes—Number of frames, containing 128 to 255
bytes that were received.
•Frames of 256 to 511 Bytes—Number of frames, containing 256 to 511
bytes that were received.
•Frames of 512 to 1023 Bytes—Number of frames, containing 512 to 1023
bytes that were received.
•Frames Greater than 1024 Bytes—Number of frames, containing 1024 to
2000 bytes, and Jumbo Frames, that were received.
STEP 3 Click Clear Interface Counters to clear RMON statistics counters for the selected
interface.
STEP 4 Click Refresh to manually refresh RMON statistics counters for the selected
interface.
STEP 5 Click View All Interfaces Statistics to view RMON statistics counters for all
interfaces on a single page. The RMON Statistics Table displays the RMON
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x29
Status and Statistics
Managing RMON
2
statistics counters for all interfaces. From this page you can perform the following
actions:
•Select the refresh rate from the Refresh Rate drop-down menu.
•Select an interface and click Clear Interface Counters to clear RMON
statistics counters for the selected interface.
•Click Clear All Interfaces Counters to clear RMON statistics counters for all
interfaces.
•Select an interface and click View Interface Statistics to see RMON
statistics counters for the selected interface on a single page.
•Click Refresh to manually refresh RMON statistics counters for all interfaces.
Configuring and Viewing RMON Histories
RMON can be used to monitor statistics per interface. Use the History Control
Table page to define the sampling frequency, amount of samples to store, and the
interface from where to gather the data. After the data is sampled and stored, it
appears on the History Table page that can be viewed by clicking History Table.
Configuring RMON History Control Samples
To define RMON control sample:
STEP 1 Click Status and Statistics > RMON > History.
RMON is allowed by standard to not grant all requested samples, but rather to limit
the number of samples per request. The Current Number of Samples field
displays the sample number actually granted to the request that is equal or less
than the requested value.
STEP 2 Click Add to add a history control sample.
STEP 3 Enter the following information:
•New History Entry—Displays the number of the history entry.
•Source Interface—Select the port or LAG from where the history samples
are to be taken.
•Max No. of Samples to Keep—Enter the number of samples to store.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x30
Status and Statistics
Managing RMON
STEP 4 Click Apply. The RMON history control sample is added, and the Running
STEP 5 Click History Table to view the actual statistics.
2
•Interval—Enter the time in seconds that samples were collected from the
interface.
•Owner—Enter the RMON station or user that requested the RMON
information.
Configuration is updated.
Viewing RMON History Statistics
The History Table page displays interface-specific statistical network samplings.
The samples are configured in the History Control Table described in the previous
section.
To view RMON history statistics:
STEP 1 Click Status and Statistics > RMON > History.
STEP 2 Click History Table.
STEP 3 Select the entry number to display the samples associated with that history entry,
and click Go.
The following fields are displayed for the selected history sample:
•History Entry No.—Number of the history entry.
•Owner—History entry owner.
•Sample No.—Statistics were taken from this sample.
•Drop Events—Number of dropped packets due to lack of network
resources during the sampling interval. This field may not represent the
exact number of dropped packets, but rather the number of times that
dropped packets were detected.
•Bytes Received—Number of octets received including bad packets and
FCS octets, but excluding framing bits.
•PacketsReceived—Number of packets received, including bad packets,
Multicast, and Broadcast packets.
•Broadcast Packets—Number of good Broadcast packets received. This
number does not include Multicast packets.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x31
Status and Statistics
Managing RMON
2
•Multicast Packets—Number of good Multicast packets received.
•CRC & Align Errors—Number of CRC and align errors that have occurred.
•Undersize Packets—Number of undersized packets (less than 64 octets)
received.
•Oversize Packets—Number of oversized packets (over 1518 octets)
received.
•Fragments—Number of fragments (packets with less than 64 octets)
received, excluding framing bits, but including Frame Check Sequence
(FCS) octets.
•Jabbers—Number of received packets that were longer than 1632 octets.
This number excludes frame bits, but includes FCS octets that had either a
bad FCS with an integral number of octets (FCS Error) or a bad FCS with a
non-integral octet (Alignment Error) number.
•Collisions—Number of collisions received.
•Utilization—Percentage of current interface traffic compared to the
maximum traffic that the interface can handle.
STEP 4 Click History Control Table to return to the History Control Table page.
Configuring and Viewing RMON Events
You can control the occurrences that trigger an alarm and the type of notification
that occurs. This is performed as follows:
•Events Page—Configures what happens when an alarm is triggered. This
can be any combination of logs and traps.
•Alarms Page—Configures the occurrences that trigger an alarm.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x32
Status and Statistics
Managing RMON
STEP 1 Click Status and Statistics > RMON > Events.
STEP 2 Click Add to add an RMON event.
STEP 3 Enter the following information:
2
Configuring RMON Events
Use the Events page to configure events that are actions performed when an
alarm is generated (alarms are defined on the Alarms page). An event can be any
combination of logs and traps. If the action includes logging of the events, they are
displayed on the Event Log Table page.
To configure RMON events:
•Event Entry—Displays the number for the event entry.
•Community— Enter the SNMP community string to be included when traps
are sent.
•Description—Enter a name for the event. This name is used to attach an
alarm to an event.
•Notification Type—Select the type of action that results from this event.
The available options are:
None
-
-
-
-
•Owner—Enter the device or user that defined the event.
STEP 4 Click Apply. The RMON event is added, and the Running Configuration is updated.
STEP 5 Click Event Log Table to display the log of alarms that have occurred and that
have been logged.
—No action occurs when the alarm goes off.
Log (Event Log Table)
alarm goes off.
Tra p ( SN MP Man ag er )
Log and Trap
the remote log server when the alarm goes off.
—Add a log entry to the Event Log Table and send a trap to
—Add a log entry to the Event Log Table when the
—Send a trap when alarm goes off.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x33
Status and Statistics
Managing RMON
STEP 1 Click Status and Statistics > RMON > Events.
STEP 2 Click Event Log Table.
2
Viewing RMON Event Logs
The Event Log Table page displays the log of events (actions) that occurred. An
event can be logged when the type of the event is Log or Log and Trap. The action
in the event is performed when the event is bound to an alarm (see Configuring
RMON Alarms) and the conditions of the alarm have occurred.
To view RMON event logs:
The following fields are displayed:
•Event Entry No.—Number of the event’s log entry.
•Log No.—Log number (within the event).
•Log Time—Time that the log entry was entered.
•Description—Description of event that triggered the alarm.
STEP 3 Click Event Table to return to the Events page.
Configuring RMON Alarms
RMON alarms provide a mechanism for setting thresholds and sampling intervals
to generate exception events on any counter or any other SNMP object counter
maintained by the agent. Both the rising and falling thresholds must be configured
in the alarm. After a rising threshold is crossed, no rising events are generated until
the companion falling threshold is crossed. After a falling alarm is issued, the next
alarm is issued when a rising threshold is crossed.
One or more alarms are bound to an event, which indicates the action to be taken
when the alarm occurs.
Use the Alarms page to configure alarms and to bind them with events. Alarm
counters can be monitored by either absolute values or changes (delta) in the
counter values.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x34
Status and Statistics
Managing RMON
STEP 1 Click Status and Statistics > RMON > Alarms.
STEP 2 Click Add to add an RMON alarm.
STEP 3 Enter the following information:
2
To define RMON alarms:
•Alarm Entry—Displays the number of the alarm entry.
•Interface—Select a port or LAG.
•Counter Name—Select the MIB variable that indicates the type of
occurrence measured.
•Sample Type—Select the sampling method to generate an alarm. The
possible options are:
-Absolute—If the threshold is passed, an alarm is generated.
-Delta—Subtracts the last sampled value from the current value. The
difference in the values is compared to the threshold. If the threshold is
passed, an alarm is generated.
•Rising Threshold—Enter the rising counter value that triggers the rising
threshold alarm.
•Rising Event—Select an event, from those that you defined on the Events
page, to be performed when a rising event is triggered.
•Falling Threshold—Enter the falling counter value that triggers the falling
threshold alarm.
•Falling Event—Select an event, from those that you defined on the Events
page, to be performed when a falling event is triggered.
•Startup Alarm—Select the first event from which to start generation of
alarms. Rising is defined by crossing the threshold from a low-value
threshold to a higher-value threshold.
Rising Alarm
-
—A rising counter value triggers the rising threshold alarm.
Falling Alarm
-
Rising and Falling Alarm
-
the alarm.
•Interval—Enter the alarm interval time in seconds.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x35
—A falling counter value triggers the falling threshold alarm.
—Both a rising and falling counter values trigger
Status and Statistics
Managing RMON
STEP 4 Click Apply. The RMON alarm is added, and the Running Configuration is updated.
2
•Owner—Enter the name of the user or network management system that
receives the alarm.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x36
Administration: System Logs
This chapter describes the System Log feature, which enables the switch to keep
several independent logs. Each log is a set of messages recording system events.
The switch generates the following local logs:
•Log sent to the console interface.
•Log written into a cyclical list of logged events in RAM and is erased when
the switch reboots.
•Log written to a cyclical log file saved to flash memory and persists across
reboots.
In addition, you can send messages to remote SYSLOG servers in the form of
SYSLOG messages.
3
This chapter covers the following topics:
•Configuring System Log Settings
•Configuring Remote Logging Settings
•Viewing Memory Logs
Configuring System Log Settings
You can enable or disable logging on the switch and select the events to be
logged by severity level. The event severity levels are listed from the highest
severity to the lowest severity:
•Emergency—System is not usable.
•Alert—Immediate action is needed.
•Critical—System is in a critical condition.
•Error—System is in error condition.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x37
Administration: System Logs
Configuring System Log Settings
•Warning—System warning has occurred.
•Notice—System is functioning properly, but a system notice has occurred.
•Informational—Device information.
•Debug—Provides detailed information about an event.
You can select different severity levels for RAM and flash logs. These logs are
displayed on the RAM Memory page and Flash Memory page, respectively.
Selecting a severity level to be stored in a log causes all of the higher severity
events to be automatically stored in the log. Lower severity events are not stored
in the log. For example, if Warning is selected, all severity levels that are Warning
and higher are stored in the log (Emergency, Alert, Critical, Error, and Warning). No
events with severity level below Warning (Notice, Informational, and Debug) are
stored.
3
To configure global log parameters:
STEP 1 Click Administration > System Log > Log Settings.
STEP 2 Enter the following information:
•Logging—Check Enable to enable logging on the switch, or uncheck to
disable logging on the switch.
•RAM Memory Logging—Check Enable to enable RAM memory logging
and check the severity levels of the messages to be logged to RAM.
•Flash Memory Logging—Check Enable to enable flash memory logging
and check the severity levels of the messages to be logged to flash memory.
STEP 3 Click Apply. The global log settings are defined, and the Running Configuration is
updated.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x38
Administration: System Logs
Configuring Remote Logging Settings
Configuring Remote Logging Settings
Use the Remote Log Servers page to define the remote SYSLOG servers where
log messages are sent (using the SYSLOG protocol). For each server, you can
configure the severity of the messages that it receives.
•Server Definition—Select whether to identify the remote log server by IP
address or name.
3
•IP Version—Select either Version 4 or Version 6 if the remote log server is
identified by IP address.
•Log Server IP Address/Name—Enter the IP address or hostname of the
remote log server.
•UDP Port—Enter the UDP port to which the log messages are sent.
•Facility—Select a facility from which system logs are sent to the remote
server. Only one facility can be assigned to a server.
•Minimum Severity—Select the minimum level of system log messages to
be sent to the server.
STEP 4 Click Apply. The remote SYSLOG server is added, and the Running Configuration
is updated.
Viewing Memory Logs
The switch can write to the following logs:
•Log in RAM (cleared during reboot). See Viewing RAM Memory Logs for
more information.
•Log in flash memory (cleared only upon user command). See Viewing Flash
Memory Logs for more information.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x39
Administration: System Logs
Viewing Memor y Logs
You can configure the messages that are written to each log by severity. A
message can go to more than one log, including logs that reside on external
SYSLOG servers.
Viewing RAM Memory Logs
The RAM Memory page displays all messages that are saved in RAM (cache) in
inverse-chronological order. Entries are stored in the RAM log according to the
configuration on the Log Settings page.
To view RAM logs:
STEP 1 Click Status and Statistics > View Log > RAM Memory.
The following fields are displayed:
3
•Log Index—Log entry number.
•Log Time—Time when message was generated.
•Severity—Event severity.
•Description—Message text describing the event.
STEP 2 Click Clear Logs to clear the log messages.
STEP 3 By default, the SYSLOG Alert Status icon appears and blinks when a SYSLOG
message above the critical severity level is logged. To disable this alert icon
blinking, click Disable Alert Icon Blinking. The SYSLOG Alert Status icon is no
longer displayed.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x40
Administration: System Logs
Viewing Memor y Logs
Viewing Flash Memory Logs
The Flash Memory page displays the messages that are stored in flash memory in
chronological order. The minimum severity for logging is configured on the Log
Settings page. Flash logs remain when the switch is rebooted. You can clear the
logs manually.
To view flash logs:
STEP 1 Click Status and Statistics > View Log > Flash Memory.
The following fields are displayed:
•Log Index—Log entry number.
•Log Time—Time when message was generated.
•Severity—Event severity.
3
•Description—Message text describing the event.
STEP 2 Click Clear Logs to clear the log messages.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x41
Administration: File Management
This chapter describes how system files are managed, such as upgrading system
firmware, rebooting the switch, restoring the switch to factory defaults, managing
the configuration files and log files, and so on.
It includes the following topics:
•Files and File Types
•File Actions
•Upgrade/Backup Firmware/Language
•Active Image
•Download/Backup Configuration or Logs
4
•Configuration File Properties
•Copy/Save Configuration Files
•DHCP Auto Configuration
Files and File Types
System files are files that contain configuration information or firmware images.
Various actions can be performed with these files:
•Selecting the firmware file from which the switch boots.
•Copying various types of configuration files internally on the switch.
•Copying files to or from an external device, such as an external server.
The possible methods of file transfer are:
•Internal copy.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x42
Administration: File Management
Files and File Types
•HTTP/HTTPS that uses the facility that the browser provides.
•TFTP client, requiring a TFTP server.
Configuration files on the switch are defined by their type, and contain the settings
and parameter values for the switch. When a configuration is referenced on the
switch, it is referenced by its configuration file type (such as Startup Configuration
or Running Configuration), instead of a file name that can be modified by the user.
Content can be copied from one file type to another, but the names of the file
types cannot be changed by the user. Other files on the switch include firmware
and log files, and are referred to as operational files.
Configuration files are text files that can be edited by a user in a text editor, such as
Notepad after they are copied to an external device, such as a PC.
The following types of configuration and operational files are found on the switch:
•Running Configuration—Contains parameters that are currently used by
the switch to operate. It is the only file type that is modified when you
change the parameter values on the switch.
4
If the switch is rebooted, the Running Configuration is lost. When the switch
is rebooted, this file type is copied from the Startup Configuration stored in
flash to the Running Configuration stored in RAM.
To preserve any changes that you made to the switch, you must save the
Running Configuration to the Startup Configuration, or another file type if
you do not want the switch to reboot with this configuration. If you have
saved the Running Configuration to the Startup Configuration, when the
switch is rebooted, it recreates a Running Configuration that includes the
changes made since the last time that the Running Configuration was saved
to the Startup Configuration.
•Startup Configuration—The parameter values that were saved by you by
copying another configuration (usually the Running Configuration) to the
Startup Configuration.
The Startup Configuration is retained in flash and is preserved when the
switch is rebooted. At this time, the Startup Configuration is copied to RAM
and identified as the Running Configuration.
•Backup Configuration—A manual copy of the parameter definitions for
protection against system shutdown or for the maintenance of a specific
operating state. You can copy the Mirror Configuration, Startup
Configuration, or Running Configuration to the Backup Configuration. The
Backup Configuration exists in flash and is preserved if the switch is
rebooted.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x43
Administration: File Management
File Actions
•Mirror Configuration—A copy of the Startup Configuration, created by the
switch when the following conditions exist:
-The switch has been operating continuously for 24 hours.
-No configuration changes have been made to the Running Configuration
-The Startup Configuration is identical to the Running configuration.
Only the system can copy the Startup Configuration to the Mirror
Configuration. However, you can copy from the Mirror Configuration to other
file types or to another device.
If the switch is rebooted, the Mirror Configuration is reset to the factory
default parameters. In all other aspects, the Mirror Configuration functions
the same as a Backup Configuration, providing a copy of the parameter
values that is preserved if the switch is rebooted.
4
in the previous 24 hours.
File Actions
•Firmware—The program that controls the operations and functionality of
the switch. More commonly referred to as the image.
•Language File—The dictionary that enables the web-based interface to be
displayed in the selected language.
•
Flash Logs
The following actions can be performed to manage firmware, configuration files,
and logs:
•Upgrade the firmware image, replace a second language file, or back up
the firmware as described in Upgrade/Backup Firmware/Language
section.
•View the firmware image currently in use or select the image to be used in
the next reboot as described in the Active Image section.
•Save configuration files on the switch to a location on another device as
described in the Download/Backup Configuration or Logs section.
—SYSLOG messages stored in flash memory.
•Clear the Startup Configuration or Backup Configuration file types as
described in the Configuration File Properties section.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x44
Administration: File Management
!
Upgrade/Backup Firmware/Language
•Copy one configuration file type to another configuration file type as
described in the Copy/Save Configuration Files section.
•Automatically download a configuration file from a DHCP server to the
switch as described in the DHCP Auto Configuration section.
CAUTION Unless the Running Configuration is manually copied to the Startup Configuration,
Backup Configuration, or an external file, all changes made since the last time the
file was saved are lost when the switch is rebooted. We recommend that you save
the Running Configuration to the Startup Configuration before logging off to
preserve any changes you made during this session.
A red X icon, displayed to the left of the Save application link, indicates that
configuration changes have been made and have not yet been saved to the Startup
Configuration file.
4
When you click Save, the Copy/Save Configuration page is displayed. Save the
Running Configuration file by copying it to the Startup Configuration file. After this
save, the red X icon and the Save link is hidden.
Upgrade/Backup Firmware/Language
Use the Upgrade/Backup Firmware/Language page to upgrade or backup the
firmware image, and import a second language file.
The following methods for transferring files are supported:
•HTTP/HTTPS that uses the facilities provided by the browser.
•TFTP that requires a TFTP server.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x45
Administration: File Management
Upgrade/Backup Firmware/Language
Upgrading/Saving the Firmware Image
There are two firmware images, Image1 and Image2, stored on the switch. One of
the images is identified as the active image and other image is identified as the
inactive image.
When you upgrade the firmware, the new image always replaces the image
identified as the inactive image. Even after uploading new firmware on the switch,
the switch continues to boot by using the active image (the old version) until you
change the status of the new image to be the active image by using the procedure
described in the Active Image section, and boot the switch by using the process
described in the Rebooting the Switch section.
You can also save a copy of the active image on the switch to a destination
location such as a TFTP server.
STEP 2 To replace the firmware image on the switch with a new version located on a TFTP
server, enter the following information:
•Transfer Method—Select via TFTP as the transfer method.
•Save Action—Select Upgrade as the action.
•File Type—Select Firmware Image as the file type.
•TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
•IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
•TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
•Source File Name—Enter the name of the firmware image located on the
TFTP server.
STEP 3 Click Apply.
STEP 4 To replace the firmware image on the switch with a new version located on
another device such as your local PC, enter the following information:
•Transfer Method—Select viaHTTP/HTTPS as the transfer method.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x46
Administration: File Management
Upgrade/Backup Firmware/Language
•Save Action—Select Upgrade as the action.
•File Type—Select Firmware Image as the file type.
•File Name—Click Browse to select a firmware image located on another
device such as your local PC.
STEP 5 Click Apply.
STEP 6 To save a copy of the active image on the switch to a TFTP server, enter the
following information:
•Transfer Method—Select via TFTP as the transfer method.
•Save Action—Select Backup as the action.
•File Type—Select Firmware Image as the file type.
•TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
4
•IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
•TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
•Destination File Name—Enter the name of the firmware image that will be
saved to the TFTP server.
STEP 7 Click Apply.
Upgrading the Language File
If a new language file was loaded onto the switch, the new language can be
selected from the Language drop-down menu. (It is not necessary to reboot the
switch.)
STEP 2 To upload a language file from a TFTP server to the switch, enter the following
information:
•Transfer Method—Select via TFTP as the transfer method.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x47
Administration: File Management
Upgrade/Backup Firmware/Language
•Save Action—Select Upgrade as the action.
•File Type—Select Language File as the file type.
•TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
•IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
•TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
•Source File Name—Enter the name of the source language file located on
the TFTP server.
STEP 3 Click Apply.
STEP 4 To upload a language file from another device such as your local PC to the switch,
do the following:
4
•Transfer Method—Select via HTTP/HTTPS as the transfer method.
•Save Action—Select Upgrade as the action.
•File Type—Select Language File as the file type.
•File Name—Click Browse to select a new language file located on another
device such as your local PC.
STEP 5 Click Apply.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x48
Administration: File Management
Active Image
Active Image
There are two firmware images, Image1 and Image2, stored on the switch. One of
the images is identified as the active image and other image is identified as the
inactive image. The switch boots from the image you set as the active image. You
can change the image identified as the inactive image to the active image. (You
need to reboot the switch.)
To s e l e c t th e a c t i ve i m a g e :
STEP 1 Click Administration > File Management > Active Image.
The following fields are displayed:
•Active Image—Displays the image file that is currently active on the switch.
4
•Active Image Version Number—Displays the firmware version of the active
image.
•Active Image Version Number After Reboot—Displays the firmware
version of the active image after reboot.
STEP 2 Select the image from the Active Image After Reboot drop-down menu to
identify the firmware image that is used as the active image after the switch is
rebooted.
STEP 3 Click Apply.
STEP 4 Reboot the switch. The switch will boot with the selected active image.
Download/Backup Configuration or Logs
The Download/Backup Configuration/Log page enables:
•Backing up of configuration files or logs from the switch to an external
device.
•Restoring configuration files from an external device to the switch.
When restoring a configuration file to the Running Configuration, the imported file
adds any configuration commands that do not exist in the old file and overwrites
any parameter values in the existing configuration commands.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x49
Administration: File Management
Download/Backup Configuration or Logs
When restoring a configuration file to the Startup Configuration or the Backup
Configuration file, the new file replaces the previous file.
When restoring to the Startup Configuration, the switch must be rebooted for the
restored Startup Configuration to be used as the Running Configuration.
Uploading Configuration File
To replace a file type with a saved configuration file:
STEP 2 To copy a file type on the switch to a file on a TFTP server, enter the following
information:
•Transfer Method—Select via TFTP as the transfer method.
•Save Action—Select Backup as the action.
4
•TFTP Server Definition—Select whether to specify the TFTP server by IP
address or domain name.
•IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
•TFTP Server IP Address/Name—Enter the IP address or domain name of
the TFTP server.
•Source File Type—Select the configuration file type to be stored on the
TFTP server. The switch supports storing the Running Configuration, Startup
Configuration, Backup Configuration, Mirror Configuration, and the flash log.
•Destination File Name—Enter the file name to be stored on the TF TP server.
STEP 3 Click Apply. The file is backed up on the TFTP server (depending upon the file
type).
STEP 4 To copy a file type on the switch to a file on another device such as your local PC,
enter the following information:
•Transfer Method—Select via HTTP/HTTPS as the transfer method.
•Save Action—Select Backup as the action.
•Source File Type—Select the configuration file type to be stored.
STEP 5 Click Apply.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x51
Administration: File Management
Configuration File Properties
STEP 6 Locate where to save the selected configuration file or flash log, click Save.
Configuration File Properties
Use the Configuration Files Properties page to see when various system
configuration files are created. It also enables deleting the Startup Configuration
and Backup Configuration files. You cannot delete the other configuration file
types.
To clear configuration files and/or see when configuration files are created:
•Creation Time—The date and time that file was modified.
STEP 2 If required, select either the Startup Configuration, Backup Configuration, or both
and click Clear Files to delete these files.
Copy/Save Configuration Files
When you click Apply on any window, changes that you made to the switch
configuration settings are stored only in the Running Configuration. To preserve
the parameters in the Running Configuration, the Running Configuration must be
copied to another configuration type or saved as a file on another device.
Use the Copy/Save Configuration page to copy or save one configuration file to
another for backup purposes. The bottom of the page has a button, Disable Save Icon Blinking. Click to toggle between disable and enable.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x52
Administration: File Management
!
Copy/Save Configuration Files
CAUTION Unless the Running Configuration is copied to the Startup Configuration or another
configuration file, all changes made since the last time the file was copied are lost
when the switch is rebooted.
The following combinations of copying internal file types are allowed:
•From the Running Configuration to the Running Configuration, Startup
Configuration or Backup Configuration.
•From the Startup Configuration to the Running Configuration, Startup
Configuration, or Backup Configuration.
•From the Backup Configuration to the Running Configuration, Startup
Configuration, or Backup Configuration.
4
•From the Mirror Configuration to the Running Configuration, Startup
Configuration, or Backup Configuration.
To copy one type of configuration file to another type of configuration file:
•Source File Name—Select the configuration file type to be copied.
•Destination File Name—Select the configuration file type to be overwritten
by the source file.
STEP 3 Click Apply. The file is copied and the switch is updated.
STEP 4 The Save Icon Blinking field indicates whether an icon blinks when there is
unsaved data. To disable or enable this feature, click Disable Save Icon Blinking
or Enable Save Icon Blinking.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x53
Administration: File Management
DHCP Auto Configuration
DHCP Auto Configuration
Auto Configuration enables passing configuration information to hosts on a TCP/IP
network. Based on this protocol, the Auto Configuration feature enables the switch
to download configuration files from a TFTP server.
By default, the switch is enabled as a DHCP client when the Auto Configuration
feature is enabled. The switch can be configured as a DHCPv4 client in which auto
configuration from a DHCPv4 server is supported and/or a DHCPv6 client in which
auto configuration from a DHCPv6 server is supported.
DHCPv4 Auto Configuration is triggered in the following cases:
•After rebooting the switch when an IP address is allocated or renewed
dynamically (using DHCPv4).
•Upon an explicit DHCPv4 renewal request and if the switch and the server
are configured to do so.
4
•Upon automatic renewal of the DHCPv4 lease.
DHCPv6 Auto Configuration is triggered when the following conditions are fulfilled:
•When a DHCPv6 server sends information to the switch. This occurs in the
following cases:
-When IPv6 stateless client is enabled.
-When DHCPv6 messages are received from the server.
-When DHCPv6 information is refreshed by the switch.
-After rebooting the switch when stateless DHCPv6 client is enabled.
•When the DHCPv6 server packets contain the configuration filename
option.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x54
Administration: File Management
DHCP Auto Configuration
DHCP Server Options
DHCP messages may contain the configuration server name/address and the
configuration file name/path (these are optional options). These options are found
in the Offer message coming from the DHCPv4 servers and in the Information
Reply messages coming from DHCPv6 servers.
Backup information (configuration server name/address and configuration file
name/path) can be configured on the DHCP Auto Configuration page. This
information is used when the DHCPv4 or DHCPv6 message does not contain this
information.
Auto Configuration Process
When the Auto Configuration process is triggered, the following sequence of
events occurs:
•The DHCP server is accessed to acquire the TFTP server name/ address
and configuration file name/path (DHCPv4 options: 66,150, and 67, DHCPv6
options: 59 and 60).
4
•If a server and configuration file options are not supplied by the DHCP
server, the user-defined, backup configuration file name is used for DHCPv4
or DHCPv6.
•If the DHCP server does not send these options and the backup TFTP
server address parameter is empty, then the switch sends TFTP request
messages to limited Broadcast IPv4 address and continues the process of
Auto Configuration with the first answering TFTP server.
Configuring DHCP Auto Configuration Parameters
To configure DHCP Auto Configuration, you need to perform the following:
•Configure the DHCPv4 and/or DHCPv6 servers to send the required
options. This process is not described in this guide.
•Configure the DHCP Auto Configuration parameters as described in this
section.
•Set the IP Address Type to Dynamic on the IPv4 Interface page, as
described in the IPv4 Management and Interface section.
Use the DHCP Auto Configuration page to perform the following actions when the
information is not provided in a DHCP message:
•Enable the DHCP Auto Configuration feature.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x55
Administration: File Management
DHCP Auto Configuration
•Configure the switch to receive configuration information from a specific file
on a specific server.
Note the following regarding the DHCP Auto Configuration process:
•A configuration file that is placed on the TFTP server must match the form
and format requirements of the supported configuration file. The form and
format of the file are checked, but the validity of the configuration
parameters is not checked prior to loading it to the Startup Configuration.
•In IPv4, different IP addresses are allocated with each DHCP renewal cycle.
To ensure that the device configuration functions as intended, we
recommend that IP addresses be bound to MAC addresses in the DHCP
server table.
NOTE DHCP Auto Configuration is applicable only when the IP address of the switch is set
•Auto Configuration via DHCP—Check Enable to enable the DHCP Auto
Configuration feature on the switch, or uncheck to disable this feature.
•Backup Server Definition—Select whether to specify the TFTP server by
IP address or domain name.
•IP Version—Select either Version 4 or Version 6 if the TFTP server is
identified by IP address.
•Backup TFTP Server IP Address/Name—Enter the IP address or domain
name of the backup TFTP server. If no configuration file name is specified in
the DHCP message, the switch will download the backup configuration file
from the backup TFTP server.
•Backup Configuration File—Enter the full file path and name of the
configuration file on the backup TFTP server to be used if no configuration
file name is specified in the DHCP message.
•Last Auto Configuration TFTP Server IP Address—Displays the IP
address or domain name of the TFTP server that is currently using.
•Last Auto Configuration File Name—Displays the name of the
configuration file located on the TFTP server that is currently using.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x56
Administration: File Management
DHCP Auto Configuration
STEP 3 Click Apply. The DHCP Auto Configuration parameters are defined, and the
Running Configuration is updated.
4
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x57
Administration: General Information
This chapter describes how to view system information and configure various
options on the switch.
It includes the following topics:
•Device Models
•Viewing System Summary
•Configuring System Settings
•Configuring Console Settings
•Rebooting the Switch
5
•Defining Idle Session Timeout
•Ping a Host
•Using Traceroute
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x58
Administration: General Information
Device Models
Device Models
All models can be fully managed through the web-based interface. The following
table describes the various models, the number and type of ports on them, and
their PoE and PID information:
NOTE There are some features applicable only for the models with specific country of
destination (-CN), indicating that these features are only applicable for their China
SKUs. These features are noted in this guide. You can find the PID information of
your switch from the System Summary page.
N/ASG220-28-K9-CN
1 to 24SG220-28MP-K9-
CN
N/ASG220-52-K9-CN
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x60
Administration: General Information
Viewing System Summary
Viewing System Summary
The System Summary page provides a graphic view of the switch, and displays
general switch information, including system information, software information,
PoE power information (if applicable), TCP/UDP services status, and other items.
To view general switch information, click Status and Statistics > System
Summary. The following fields are displayed:
System Information
•System Description—A description of the switch.
•System Location—Physical location of the switch.
•System Contact—Name of a contact person.
5
•Host Name—Name of the switch. By default, the switch’s hostname is
composed of the word Switch concatenated with the three least significant
bytes of the switch MAC address (the six furthest right hexadecimal digits).
NOTE You can click Edit to go to the Administration > System Settings page
to edit the location, contact, and/or hostname.
•System Object ID—Unique vendor identification of the network
management subsystem contained in the SNMP entity.
•System Uptime—Time that has elapsed since the last reboot.
•Current Time—Current system time.
•Base MAC Address—MAC address of the switch.
•Jumbo Frames—Jumbo frame support status. This support can be
enabled or disabled on the Port Management > Port Setting page.
NOTE Jumbo frames support takes effect only after it is enabled, and after
the switch is rebooted.
Software Information
•Firmware Version (Active Image)—Version number of the active firmware
image.
•Firmware MD5 Checksum (Active Image)—MD5 checksum of the active
firmware image.
•Firmware Version (Non-active)—Version number of the non-active
firmware image.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x61
Administration: General Information
Viewing System Summary
•Firmware MD5 Checksum (Non-active Image)—MD5 checksum of the
non-active firmware image.
•Boot Version—Version number of the switch’s bootloader.
•Locale—Locale of the first language. (This is always en-US.)
•Language Version—Language package version of the first language.
•Language MD5 Checksum—MD5 checksum of the first language.
•Locale—Locale of the second language.
•Language Version—Language package version of the second language.
•Language MD5 Checksum—MD5 checksum of the second language.
TCP/UDP Services Status
5
•HTTP Service—Shows whether the HTTP service is enabled or disabled.
•HTTPS Service—Shows whether the HTTPS service is enabled or
disabled.
•SNMP Service—Shows whether the SNMP service is enabled or disabled.
•Tel net Se r vi ce —Shows whether the Telnet service is enabled or disabled.
•SSH Service—Shows whether the SSH service is enabled or disabled.
NOTE You can click Edit to go to the Security > TCP/UDP Services page to
enable or disable these services on the switch.
PoE Power Information (only applicable for the PoE models)
•Maximum Available PoE Power (W)—Maximum available power that can
be delivered by the PoE ports.
•Total PoE Power Consumption (W)—Total PoE power delivered to the
connected PoE devices.
•PoE Power Mode—Port Limit or Class Limit.
NOTE You can click Detail to go to the Port Management > PoE > PoE
Properties page to see more details about the PoE settings.
Other Summary Information
•Serial Number—Serial number.
•PID VID—Part number and version ID.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x62
Administration: General Information
Configuring System Settings
Configuring System Settings
To view or modify system settings:
STEP 1 Click Administration > System Settings.
STEP 2 View or modify the following system settings:
•System Description—Displays the description of the switch.
•System Location—Enter the location where the switch is physically located.
•System Contact—Enter the name of a contact person.
•Host Name—Select how to define the hostname of the switch. The available
options are:
5
-Use Default—Use the default hostname (System Name). The default
hostname of the switch is switch123456, where 123456 indicates the
last three bytes of the switch MAC address in hex format.
-User Defined—Manually enter the hostname of the switch. Use only
letters, digits, and hyphens. Hostnames cannot begin or end with a
hyphen. No other symbols, punctuation characters, or blank spaces are
permitted (as specified in RFC1033, 1034, 1035).
STEP 3 In the Custom Login Screen Settings area, specify the system banners that are
displayed when users try to access the switch. The available banners are:
•Login Banner—Enter the text message that is displayed before the login
prompt of username and password (generally shown on the login page). The
message is maximum 2000 characters long. Click Preview to preview your
settings.
•Welcome Banner—Enter the text message that is displayed when an EXEC
process is created. The message is maximum 2000 characters long. Click
Preview to preview your settings.
NOTE The banners defined on the web-based interface can also be
activated on the command-line interfaces (Console, Telnet, and SSH).
STEP 4 Click Apply. The system settings are modified, and the Running Configuration is
updated.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x63
Administration: General Information
Configuring Console Settings
Configuring Console Settings
Use the Console Settings page to configure the console port Baud rate. The
default console port settings are displayed as follows:
•9,600 bits per second
•8 data bits
•no parity
•1 stop bit
•no flow control
To change the console port Baud rate:
5
STEP 1 Click Administration > Console Settings.
STEP 2 Select a value from the Console Port Baud Rate drop-down menu. The available
values are 2400, 4800, 9600, 19200, 38400, 57600, and 115200 Bit/sec.
STEP 3 Click Apply. The console port Baud rate is defined, and the Running Configuration
is updated.
Rebooting the Switch
Some configuration changes require the switch to be rebooted before they take
effect. However, rebooting the switch will delete the Running Configuration, so it is
critical that the Running Configuration is saved to the Startup Configuration before
the switch is rebooted. Clicking Apply does not save the configuration to the
Startup Configuration.
You can save the Running Configuration on the Administration > Save/Copy Configuration page or click Save at the top of the window.
To reboot the switch:
STEP 1 Click Administration > Reboot.
STEP 2 Click Reboot to reboot the switch. Because any unsaved information in the
Running Configuration is discarded when the switch is rebooted, you must click
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x64
Administration: General Information
Defining Idle Session Timeout
Save in the upper-right corner of any window to preserve current configuration
across the boot process. (If the Save option is not displayed, the Running
Configuration matches the Startup Configuration and no action is necessary.)
STEP 3 You can also check Enable next to the Reboot to Factory Defaults field and click
Reboot to reboot the switch by using factory default configuration. This process
erases the Startup Configuration file; any settings that are not saved to another file
are cleared when this action is selected.
The Mirror Configuration is not deleted when restoring to factory defaults.
Defining Idle Session Timeout
5
Use the Idle Session Timeout page to configure the time intervals that the
management sessions can remain idle before they timeout and the user must log
in again to reestablish one of the following sessions:
•HTTP session
•HTTPS session
•Console session
•Te l n e t s e s si o n
•SSH session
To define the idle session timeout for various types of sessions:
STEP 2 Select the timeout for the session from the corresponding drop-down menu. The
default value is 10 minutes.
STEP 3 Click Apply. The idle session timeout settings are defined, and the Running
Configuration is updated.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x65
Administration: General Information
Ping a Host
Ping a Host
Ping is a utility used to test if a remote host can be reached and to measure the
round-trip time for packets sent from the switch to a destination device.
Ping operates by sending Internet Control Message Protocol (ICMP) echo request
packets to the target host and waiting for an ICMP response, sometimes called a
pong. It measures the round-trip time and records any packet loss.
To ping a remote host:
STEP 1 Click Administration > Ping.
STEP 2 Enter the following information:
•Host Definition—Select whether to specify the host by its IP address or
name.
5
STEP 3 Click Active Ping to ping the host. The ping counters and status are displayed.
Using Traceroute
Traceroute discovers the IP routes along which packets were forwarded by
sending an IP packet to the target host and back to the switch. The Traceroute
page displays each hop between the switch and a target host and the round-trip
time to each hop.
•IP Version—Select either Version 4 or Version 6 if the host is identified by
IP address.
•Host IP Address/Name—Enter the IP address or hostname of the host to be
pinged.
•Number of Pings—Select User Defined to enter the number of times that
the ping operation will be performed, or select Use Default to use the
default value.
To use the Traceroute utility:
STEP 1 Click Administration > Traceroute.
STEP 2 Enter the following information:
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x66
Administration: General Information
Using Traceroute
•Host Definition—Select whether to specify the host by its IP address or
name.
•Host IP Address/Name—Enter the IP address or hostname of the host.
•TTL—Select User Defined to enter the maximum number of hops that
Traceroute permits. This is used to prevent a case where the sent frame gets
into an endless loop. The Traceroute command terminates when the
destination is reached or when this value is reached. To use the default value
(30), select Use Default.
STEP 3 Click Apply.
5
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x67
Administration: Time Settings
Synchronized system clocks provide a frame of reference between all devices on
the network. Network time synchronization is critical because every aspect of
managing, securing, planning, and debugging a network involves determining
when events occur. Without synchronized clocks, accurately correlating log files
between devices when tracking security breaches or network usage is
impossible.
Synchronized time also reduces confusion in shared file systems, as it is important
for the modification times to be consistent, regardless of the machine on which the
file systems reside.
For these reasons, it is important that the time configured on all of the devices on
the network is accurate.
6
The switch supports Simple Network Time Protocol (SNTP) and when enabled,
the switch dynamically synchronizes its time with the SNTP server time. The
switch operates only as an SNTP client and cannot provide time services to other
devices.
This chapter describes how to configure the system time, time zone, and daylight
savings time (DST).
It includes the following topics:
•System Time Options
•Configuring System Time
•Configuring SNTP Server
•Time Range
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x68
Administration: Time Settings
!
System Time Options
System Time Options
System time can be set manually by the user, or dynamically from an SNTP server.
If an SNTP server is chosen, the manual time settings are overwritten when
communications with the server are established.
As part of the boot process, the switch always configures the time, time zone, and
DST. These parameters are obtained from the SNTP, values set manually, or if all
else fails, from the factory defaults.
The following methods are available for setting the system time on the switch:
•Manual—You must manually set the time.
•SNTP—Time can be received from the SNTP time server. SNTP ensures
accurate network time synchronization of the switch up to the millisecond
by using an SNTP server for the clock source.
6
NOTE Without synchronized time, accurately correlating log files between devices is
difficult, even impossible. We recommend that you use SNTP for the clock source.
Configuring System Time
Use the System Time page to configure the current time, time zone, and the time
source.
CAUTION The switch does not have an internal clock that updates this value. If the system
time is set manually and the switch is rebooted, the manual time settings must be
reentered.
To define system time:
STEP 1 Click Administration > Time Settings > System Time.
The Actual Time field displays the current system time and time source currently
used by the switch.
STEP 2 Check Enable next to the Main Clock Source (SNTP Servers) field to use the
SNTP source to set the system clock. The system time is obtained from an SNTP
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x69
Administration: Time Settings
Configuring System Time
server. To use this feature, you must also add an SNTP server on the SNTP
Settings
STEP 3 In the Manual Settings area, you can set the date and time manually. The local
time is used when there is no alternate source of time, such as an SNTP server. You
can also click the here link to receive the date and time from the PC by using
browser information.
•Date—Enter the system date.
•Local Time—Enter the system time.
STEP 4 In the Time Zone Settings area, the local time is used via the Time Zone offset.
•Time Zone Offset—Select the difference in hours between Universal Time
6
page, as described in the Configuring SNTP Server section.
Coordinated (UTC) and the local time. For example, the Time Zone Offset for
Paris is UTC +10:00, while the Time Zone Offset for New York is UTC - 5.
•Time Zone Acronym—Enter a user-defined name that represents the time
zone that you have configured. This acronym appears in the Actual Time
field.
STEP 5 In the Daylight Saving Settings area, select how DST is defined:
•Daylight Saving—Check Enable to enable Daylight Saving Time.
•Time Set Offset—Enter the number of minutes offset from UTC.
•Daylight Saving Type—Click one of the following:
-USA—DST will be set according to the dates used in the USA.
-European—DST will be set according to the dates used by the European
Union and other countries that use this standard.
-By Dates—DST will be set manually, typically for a country other than the
USA or a European country.
-Recurring—DST occurs on the same date every year.
Selecting By Dates allows customization of the start and stop of DST:
•From—Enter the day and time that DST starts.
•To —Enter the day and time that DST ends.
Selecting Recurring allows further customization of the start and stop of DST:
•From—Enter the date when DST begins each year.
-Day—Day of the week on which DST begins every year.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x70
Administration: Time Settings
Configuring SNTP Server
•To —Enter the date when DST ends each year.
STEP 6 Click Apply. The system time is defined, and the Running Configuration is updated.
6
-Week—Week within the month from which DST begins every year.
-Month—Month of the year in which DST begins every year.
-Time—The time at which DST begins every year.
-Day—Day of the week on which DST ends every year.
-Week—Week within the month from which DST ends every year.
-Month—Month of the year in which DST ends every year.
-Time—The time at which DST ends every year.
Configuring SNTP Server
The switch can be configured to synchronize its system clock with an SNTP server
specified on the SNTP Settings page.
To specify an SNTP server by name, you must first configure DNS servers on the
switch and enable Main Clock Source (SNTP Servers) on the System Time page.
To add an SNTP server:
STEP 1 Click Administration > Time Settings > SNTP Settings.
STEP 2 Enter the following information:
•Host Definition—Select whether to specify the SNTP server by IPv4
address or by host name.
•SNTP Server IP Address/Name—Enter the IPv4 address or hostname of
the SNTP server.
•SNTP Server Port—Enter the UDP port number to be specified in the SNTP
message headers. By default, the port number is the well-known IANA value
of 123.
STEP 3 Click Apply. The SNTP server is added, and the Running Configuration is updated.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x71
Administration: Time Settings
Time Range
Time Range
Time ranges can be defined and associated with the following types of
commands, so that they are applied only during that time range:
•Port Stat
•Time-B ased PoE
There are two types of time ranges:
•Absolute—This type of time range begins on a specific date or immediately
•Periodic—This type of time range contains a time range element that is
6
and ends on a specific date or extends infinitely. It is created in the Time
Range pages. A periodic element can be added to it.
added to an absolute range, and begins and ends on a periodic basis. It is
defined in the Periodic Range pages.
If a time range includes both absolute and periodic ranges, the process
associated with it is activated only if both absolute start time and the periodic time
range have been reached. The process is deactivated when either of the time
ranges are reached.
The device supports a maximum of 20 absolute time ranges.
To ensure that the time range entries take effect at the desired times, the system
time must be set.
The time-range feature can be used for the following:
•Limit access of computers to the network during business hours (for
example), after which the network ports are locked, and access to the rest
of the network is blocked (see Configuring Ports and Configuring LAG
Settings)
•Limit PoE operation to a specified period.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x72
Administration: Time Settings
Time Range
Absolute Time Range
To define an absolute time range:
STEP 1 Click Administration > Time Set tings > Time Range.
The existing time ranges are displayed.
STEP 2 To add a new time range, click Add.
STEP 3 Enter the following fields:
•Time Range Name—Enter a new time range name.
•Absolute Starting Time—To define the start time, enter the following:
6
-Immediate—Select for the time range to start immediately.
-Date, Time—Enter the date and time that the Time Range begins.
•Absolute Ending Time—To define the start time, enter the following:
-Infinite—Select for the time range to never end.
-Date, Time—Enter the date and time that the Time Range ends.
STEP 4 To add a periodic time range, click Periodic Range.
Periodic Time Range
A periodic time element can be added to an absolute time range. This limits the
operation to certain time periods within the absolute range.
To add a periodic time range element to an absolute time range:
STEP 1 Click Administration > Time Settings > Periodic Range.
The existing periodic time ranges are displayed (filtered per a specific, absolute
time range.)
STEP 2 Select the absolute time range to which to add the periodic range.
STEP 3 To add a new periodic time range, click Add.
STEP 4 Enter the following fields:
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x73
Administration: Time Settings
Time Range
•Periodic Starting Time—Enter the date and time that the Time Range begins
•Periodic Ending Time—Enter the date and time that the Time Range ends on
STEP 5 Click Apply.
STEP 6 Click Time Ran ge to access the Absolute Time Range.
6
on a periodic basis.
a periodic basis.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x74
Administration: Diagnostics
!
This chapter contains information for configuring port mirroring, running cable
tests, and viewing optical module status and CPU utilization.
It includes the following topics:
•Testing Copper Ports
•Viewing Optical Module Status
•Configuring Port and VLAN Mirroring
•Viewing CPU Utilization
7
Testing Copper Ports
Use the Copper Test page to perform the integrated cable tests on copper cables.
CAUTION When a port is tested, it is set to the Down state and communications are
interrupted. After the test, the port returns to the Up state. We do not recommend
that you run the test on a port that you are using to run the web-based interface,
because communications with that device are disrupted.
STEP 2 Select a port on which to run the copper test.
STEP 3 Click Copper Test.
The following fields for the test are displayed:
•Tes t Re su lt s—Summary of the test results.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x75
Administration: Diagnostics
Viewing Optical Module Status
•Cable Length—Estimated cable length. The cable length is Unknown when
the green features are enabled.
NOTE The estimated cable length for the ports if their links are up or their
connected cables are less than 10 meters are used for reference only.
•Operational Port Status—Displays whether the port is up or down.
Viewing Optical Module Status
The Optical Module Status page displays the operating conditions reported by
the Small Form-factor Pluggable (SFP) transceiver. Some information may not be
available for SFPs that do not support the digital diagnostic monitoring standard
SFF-8472.
7
The following FE SFP (100 Mbps) transceivers are supported:
•MFEBX1—100BASE-BX-20U SFP transceiver for single-mode fiber, 1310
nm wavelength, supports up to 20 km.
•MFEFX1—100BASE-FX SFP transceiver, for multimode fiber, 1310 nm
wavelength, supports up to 2 km.
•MFELX1—100BASE-LX SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 10 km.
The following GE SFP (1000 Mbps) transceivers are supported:
•MGBBX1—1000BASE-BX-20U SFP transceiver, for single-mode fiber, 1310
nm wavelength, supports up to 40 km.
•MGBLH1—1000BASE-LH SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 40 km.
•MGBLX1—1000BASE-LX SFP transceiver, for single-mode fiber, 1310 nm
wavelength, supports up to 10 km.
•MGBSX1—1000BASE-SX SFP transceiver, for multimode fiber, 850 nm
wavelength, supports up to 550 m.
•MGBT1: 1000BASE-T SFP transceiver for category 5 copper wire, supports
up to 100 m.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x76
Administration: Diagnostics
Configuring Port and VLAN Mirroring
To view the status of optical modules, click Administration > Diagnostics >
Optical Module Status.
The following fields are displayed:
•Port—Port number on which the SFP is connected.
•Te mp e rat ur e—Temperature in Celsius at which the SFP is operating.
•Voltage—SFP’s operating voltage.
•Current—SFP’s current consumption.
•Output Power—Transmitted optical power.
•Input Power—Received optical power.
•Loss of Signal—Local SFP reports signal loss. Values are True and False.
7
Configuring Port and VLAN Mirroring
Port Mirroring is used on a network switch to send a copy of network packets
seen on one switch port, multiple switch ports, or an entire VLAN to a network
monitoring connection on another port on the switch. Port Mirroring is commonly
used for network appliances that require monitoring of network traffic, such as an
intrusion-detection system. A network analyzer connected to the monitoring port
processes the data packets for diagnosing, debugging, and performance
monitoring.
The switch supports up to four mirroring sessions. Each session can be used for
local mirroring or remote mirroring purposes. Mirroring does not affect the
switching of network traffic on the source ports or VLANs. Each session should
have a different destination port. Except for traffic that is required for the mirroring,
the destination port can also be used to receive or forward normal traffic.
A packet that is received on a network port assigned to a VLAN that is subject to
mirroring is mirrored to the analyzer port even if the packet was eventually
trapped or discarded. Packets sent by the switch are mirrored when Transmit (Tx)
mirroring is activated.
Mirroring does not guarantee that all traffic from the source ports is received on
the analyzer (destination) port. If more data is sent to the analyzer port than it can
support, some data might be lost.
NOTE The RSPAN VLAN feature is only applicable for the China switch models.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x77
Administration: Diagnostics
Configuring Port and VLAN Mirroring
To configure port and VLAN mirroring:
STEP 1 Click Administration > Diagnostics > Port and VLAN Mirroring.
STEP 2 If your switch supports the RSPAN VLAN feature, enter the following information:
•RSPAN VLAN—Check Enable to enable RSPAN VLAN mirroring.
•RSPAN VLAN ID—Select the VLAN to be mirrored. When you configure a
STEP 3 Click Add to add a SPAN or RSPAN mirroring session.
STEP 4 Enter the following information:
•Session ID—Select the identifier for the mirroring session.
•Session Type—Select one of the following options:
7
RSPAN mirroring session, you should select this VLAN as the RSPAN VLAN.
Local Port Based
-
port to the destination port.
Local VLAN Based
-
port.
-
RSPAN Source Session
port or a source VLAN to another device.
RSPAN Destination Session
-
destination port to another device.
STEP 5 If Local Port Based is selected, enter the following information:
•Destination Port—Select the analyzer port to where packets are copied. A
network analyzer, such as a PC running Wireshark, is connected to this port.
•Allow Ingress Packets—Check Enable to allow the destination port to send
or receive normal packets.
•Source Port—Select the source ports from where traffic is mirrored and the
type of traffic to be mirrored to the analyzer port. The options are:
-Rx Only—Port mirroring on incoming packets.
—Copies TX, RX, or both TX and RX traffic from each
—Copies traffic from the local VLAN to the destination
—Utilizes a VLAN to copy traffic from a source
—Utilizes a VLAN to copy traffic from a
-Tx Onl y—Port mirroring on outgoing packets.
-Tx an d R x—Port mirroring on both incoming and outgoing packets.
-N/A—Traffic from this port is not mirrored.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x78
Administration: Diagnostics
Configuring Port and VLAN Mirroring
STEP 6 If Local VLAN Based is selected, enter the following information:
•Destination Port—Select the analyzer port to where packets are copied.
•Allow Ingress Packets—Check Enable to allow the destination port to send
•VLAN—Select the source VLAN from where traffic is mirrored.
STEP 7 If RSPAN Source Session is selected, enter the following information:
•RSPAN VLAN—Select the VLAN to be used to copy traffic to another
•Reflector Port—Select the port or LAG to be connected to another device.
•Source Type—Select Port or VLAN as the source port or source VLAN.
7
or receive normal packets.
device. This VLAN should be same as the VLAN defined in the RSPAN VLAN ID field.
If Port is selected, select the source ports from where traffic is mirrored and
select the type of traffic to be mirrored to the analyzer port. The options are:
-Rx Only—Port mirroring on incoming packets.
-Tx Onl y—Port mirroring on outgoing packets.
-Tx an d R x—Port mirroring on both incoming and outgoing packets.
-N/A—Traffic from this port is not mirrored.
If VLAN is selected, select a source VLAN from where traffic is mirrored.
-VLAN—Select a VLAN as the source VLAN.
STEP 8 If RSPAN Destination Session is selected, enter the following information:
•RSPAN VLAN—Select a VLAN to be used to copy traffic to another device.
This VLAN should be same as the VLAN defined in the RSPAN VLAN ID field.
•Destination Port—Select the analyzer port to where packets are copied.
•Allow Ingress Packets—Check Enable to allow the destination port to send
or receive normal packets.
STEP 9 Click Apply. The Running Configuration is updated.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x79
Administration: Diagnostics
Viewing CPU Utilization
Viewing CPU Utilization
To view the current CPU utilization and/or set the refresh rate:
STEP 1 Click Administration > Diagnostics > CPU Utilization.
The CPU Utilization page appears.
The CPU Input Rate field displays the rate of input frames to the CPU per second.
The window contains a graph of the CPU utilization. The Y axis is percentage of
usage, and the X axis is the sample number.
STEP 2 Ensure that the CPU Utilization checkbox is enabled.
STEP 3 Select the Refresh Rate (time period in seconds) that passes before the statistics
are refreshed. A new sample is created for each time period.
7
STEP 4 STEP 4 Click Apply.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x80
Administration: Discovery
This chapter provides information for configuring discovery, and includes the
following topics:
•Configuring Bonjour
•LLDP and CDP
•Configuring LLDP
•Configuring CDP
Configuring Bonjour
8
As a Bonjour client, the switch periodically broadcasts Bonjour Discovery protocol
packets to directly connected IP subnets, advertising its existence and the
services that it provides, for example, HTTP, HTTPS, or Telnet.
The switch can be discovered by a network management system or other thirdparty applications. By default, Bonjour is enabled on the Management VLAN. The
Bonjour console automatically detects the switch and displays it.
Bonjour Discovery can only be enabled globally. It cannot be enabled on a perport or per-VLAN basis. The switch advertises all the services that have been
enabled by the administrator based on the configuration on the TCP/UDP Services
page.
When Bonjour Discovery is disabled, the switch stops any service type
advertisements and does not respond to requests for service from network
management applications.
By default, Bonjour is enabled on all interfaces that are members of the
Management VLAN.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x81
Administration: Discovery
LLDP and CDP
To globally enable or disable Bonjour:
STEP 1 Click Administration > Discovery Bonjour.
STEP 2 Check Enable to enable Bonjour Discovery globally on the switch, or uncheck to
disable it globally.
STEP 3 Click Apply. Bonjour is enabled or disabled on the switch, and the Running
Configuration is updated.
LLDP and CDP
Link Layer Discovery Protocol (LLDP) and Cisco Discovery Protocol (CDP) are link
layer protocols for directly connected LLDP and CDP-capable neighbors to
advertise themselves and their capabilities to each other. By default, the switch
sends an LLDP or CDP advertisement periodically to all its interfaces and
terminates and processes incoming LLDP and CDP packets as required by the
protocols. In LLDP and CDP, advertisements are encoded as TLV (Type, Length,
Value) in the packet.
8
In deployments where the CDP-capable (or LLDP-capable) devices are not
directly connected and are separated with CDP-incapable (or LLDP-incapable)
devices, the CDP-capable (or LLDP-capable) devices may be able to receive the
advertisement from other devices only if the CDP-incapable (or LLDP-incapable)
devices flood the CDP (or LLDP) packets they receive. If the CDP-incapable (or
LLDP-incapable) devices perform VLAN-aware flooding, then CDP-capable (or
LLDP-capable) devices can hear each other only if they are in the same VLAN.
It should be noted that a CDP-capable (or LLDP-capable) device may receive
advertisement from more than one device if the CDP-incapable (or LLDPincapable) devices flood the CDP (or LLDP) packets.
The following are additional points about CDP and LLDP configuration:
•CDP and LLDP can be enabled or disabled globally as well as on each port.
The CDP or LLDP capability of a port is relevant only if CDP or LLDP is
globally enabled.
•If CDP or LLDP is globally enabled, the switch filters out incoming CDP or
LLDP packets from ports that are CDP-disabled or LLDP-disabled.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x82
Administration: Discovery
Configuring LLDP
8
•If CDP or LLDP is globally disabled, the switch can be configured to discard,
VLAN-aware flooding, or VLAN-unaware flooding of all incoming CDP or
LLDP packets. VLAN-aware flooding floods an incoming CDP or LLDP
packet to the VLAN where the packet is received excluding the ingress
port. VLAN-unaware flooding floods an incoming CDP or LLDP packet to all
the ports excluding the ingress port. The default is to VLAN-unaware flood
CDP or LLDP packets when CDP or LLDP is globally disabled. You can
configure the discard or flooding of incoming CDP and LLDP packets from
the CDP Properties page and the LLDP Properties page, respectively.
•The CDP and LLDP end devices, such as IP phones, learn the voice VLAN
configuration from CDP and LLDP advertisements. By default, the switch is
enabled to send out CDP and LLDP advertisement based on the voice
VLAN configured on the switch. Refer to the Configuring Voice VLAN
section for details.
NOTE CDP or LLDP does not distinguish if a port is in a LAG. If there are
multiple ports in a LAG, CDP or LLDP transmit packets on each port without
taking into account the fact that the ports are in a LAG.
•The operation of CDP or LLDP is independent of the STP status of an
•If 802.1X port access control is enabled on an interface, the switch will
•If a port is the target of mirroring, then for CDP or LLDP it is considered
Configuring LLDP
LLDP is a protocol that enables network managers to troubleshoot and enhance
network management in multivendor environments. LLDP standardizes methods
for network devices to advertise themselves to other systems, and to store
discovered information.
LLDP enables a device to advertise its identification, configuration, and
capabilities to neighboring devices that then store the data in a Management
Information Base (MIB). The network management system models the topology of
the network by querying these MIB databases.
interface.
transmit and receive CDP or LLDP packets to and from the interface only if
the interface is authenticated and authorized.
down.
LLDP is a link layer protocol. By default, the switch terminates and processes all
incoming LLDP packets as required by the protocol.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x83
Administration: Discovery
Configuring LLDP
The LLDP protocol has an extension called LLDP Media Endpoint Discovery (LLDP
MED), which provides and accepts information from media endpoint devices such
as VoIP phones and video phones.
Following are examples of actions that can be performed with the LLDP feature in
a suggested order:
8
•Enable LLDP globally (LLDP is enabled by default), and enter LLDP global
parameters on the LLDP Properties page, as described in the Configuring
LLDP Properties section.
•Configure LLDP per port on the Port Settings page, as described in the
Configuring LLDP Port Settings section. On this page, ports can be
configured to receive or transmit LLDP PDUs, and specify which TLVs to
advertise.
•Create LLDP MED network policies on the LLDP MED Network Policy page,
as described in the Configuring LLDP MED Network Policy section.
•Associate LLDP MED network policies and the optional LLDP MED TLVs to
the desired ports on the LLDP MED Port Settings page, as described in the
Configuring LLDP MED Port Settings section.
•View LLDP global information and the LLDP status of each port as
described in the Viewing LLDP Port Status section.
•View LLDP local information as described in the Viewing LLDP Local
Information section.
•View LLDP neighbor information as described in the Viewing LLDP
Neighbors Information section.
•View LLDP statistics of each port as described in the Viewing LLDP
Statistics section.
•View LLDP overloading information as described in the Viewing LLDP
Overloading section.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x84
Administration: Discovery
Configuring LLDP
Configuring LLDP Properties
Use the LLDP Properties page to enable LLDP globally and configure general
LLDP parameters.
•LLDP Status—Check Enable to enable LLDP on the switch (enabled by
default).
•LLDP Frames Handling—If LLDP is disabled, select the action to be taken if
a packet that matches the selected criteria is received:
-Filtering—Deletes the packet.
-Bridging—(VLAN-aware flooding) Forwards the packet to all VLAN
members.
-Flooding—Forwards the packet to all ports.
•TLV Advertise Interval—Select User Defined to enter the rate in seconds
at which LLDP advertisement updates are sent, or select Use Default to use
the default value (30 seconds).
•Hold Multiplier—Select User Defined to set the amount of time that LLDP
packets are held before the packets are discarded, measured in multiples of
the TLV Advertise Interval. For example, if the TLV Advertise Interval is 30
seconds, and the Hold Multiplier is 4, then the LLDP packets are discarded
after 120 seconds. You can select Use Default to use the default value (4).
•Reinitializing Delay—Select User Defined to enter the time interval in
seconds that passes between disabling and reinitializing LLDP, following an
LLDP enable or disable cycle, or select Use Default to use the default value
(2 seconds).
•Transmit Delay—Select User Defined to enter the amount of time in
seconds that passes between successive LLDP frame transmissions due to
changes in the LLDP local systems MIB, or select Use Default to use the
default value (2 seconds).
STEP 3 In the Fast Start Repeat Count field, enter the number of times that LLDP packets
are sent when the LLDP MED Fast Start mechanism is initialized. This occurs when
a new endpoint device links to the switch. Refer the Configuring LLDP MED
Network Policy section for more details.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x85
Administration: Discovery
Configuring LLDP
STEP 4 Click Apply. The LLDP properties are defined, and the Running Configuration is
updated.
Configuring LLDP Port Settings
Use the Port Settings page to activate LLDP per port and enter the TLVs that are
sent in the LLDP PDU.
To define the LLDP port settings:
STEP 1 Click Administration > Discovery LLDP > Port Settings.
STEP 2 Select a port and click Edit.
STEP 3 Enter the following information:
8
•Interface—Select the port to be defined.
•Administrative Status—Select the LLDP publishing option for the port. The
available options are:
-Tx Onl y—Publishes only but does not discover.
-Rx Only—Discovers but does not publish.
-Tx & R x—Publishes and discovers.
-Disable—Disables LLDP on the port.
•Available Optional TLVs—Select the information to be published by the
switch by moving the TLV to the Selected Optional TLVs list. The available
TLVs contain the following information:
-Port Description—Information about the port, including manufacturer,
product name, and hardware and software versions.
-System Name—System’s assigned name (in alphanumeric format). The
value equals the sysName object.
-System Description—Description of the network entity (in alphanumeric
format). This includes the system's name and versions of the hardware,
operating system, and networking software supported by the switch.
The value equals the sysDescr object.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x86
Administration: Discovery
Configuring LLDP
8
-System Capabilities—Primary functions of the switch, and whether or
not these functions are enabled in the switch. The capabilities are
indicated by two octets. Bits 0 through 7 indicate Other, Repeater, Bridge,
WLAN AP, Router, Telephone, DOCSIS cable device, and station,
respectively. Bits 8 through 15 are reserved.
-802.3 MAC-PHY—Duplex and bit rate capability and the current duplex
and bit rate settings of the sending device. It also indicates whether the
current settings are due to auto-negotiation or manual configuration.
-802.3 Link Aggregation—Whether the link (associated with the port on
which the LLDP PDU is transmitted) can be aggregated. It also indicates
whether the link is currently aggregated, and if so, provides the
aggregated port identifier.
-802.3 Maximum Frame Size—Maximum frame size capability of the
MAC/PHY implementation.
-Management IP Address—Management IP address of the switch.
STEP 4 Click Apply. The LLDP port settings are modified, and the Running Configuration is
updated.
Configuring LLDP MED Network Policy
LLDP Media Endpoint Discovery (LLDP MED) is an extension of LLDP that provides
the following additional capabilities to support media endpoint devices. Some of
the features of the LLDP MED network policy are:
•Enables the advertisement and discovery of network policies for real-time
applications such as voice and/or video.
•Device location discovery to allow creation of location databases and, in
the case of Voice over Internet Protocol (VoIP), Emergency Call Service
(E-911) by using IP Phone location information.
NOTE The switch automatically advertises the policy according to user configuration;
however, the user must also manually configure the switch to use that policy.
An LLDP MED network policy is a related set of configuration settings for a
specific real-time application such as voice or video. A network policy, if
configured, will be included into the outgoing LLDP packets to the attached LLDP
media endpoint device. The media endpoint device should send its traffic as
specified in the network policy that it receives.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x87
Administration: Discovery
Configuring LLDP
Network policies are associated with ports on the LLDP MED Port Settings page.
An administrator can manually configure one or more network policies and the
ports where the policies are to be sent. It is the administrator's responsibility to
manually create the VLANs and their port memberships according to the network
policies and their associated ports.
STEP 2 Check Enable next to the LLDP MED Network Policy for Voice Application
option to automatically generate and advertise a network policy for voice
application based on the voice VLAN maintained by the switch.
STEP 3 Click Apply.
STEP 4 Click Add to add an LLDP MED network policy.
8
STEP 5 Enter the following information:
•Network Policy Number—Select the number of the policy to be created.
•Application—Select the type of application (type of traffic) from the list for
which the network policy is being defined:
-Voice
-Voice Signaling
-Guest Voice
-Guest Voice Signaling
-Softphone Voice
-Video Conferencing
-Streaming Video
-Video Signaling
•VLAN ID—Enter the VLAN ID to which the traffic should be sent.
•VLAN Tag—Select whether the traffic is Tagged or Untagged.
•User Priority—Select the traffic priority applied to traffic defined by this
network policy.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x88
Administration: Discovery
Configuring LLDP
STEP 6 Click Apply. The LLDP MED network policy is defined, and the Running
Configuration is updated.
STEP 7 Associate the network policy with a port as described in the Configuring LLDP
MED Port Settings section.
Configuring LLDP MED Port Settings
Use the LLDP MED Port Settings page to select the network policies, configured
on the LLDP MED Network Policy page, to be advertised on the port, and select
the LLDP MED TLVs to be sent inside the LLDP PDU.
8
•DSCP Value—Select the DSCP value to associate with application data
sent by neighbors. This informs them how they should mark the application
traffic that they send to the switch.
To configure LLDP MED on each port:
STEP 1 Click Administration > Discovery LLDP > LLDP MED Port Settings.
STEP 2 To associate the LLDP MED network policy to a port, select a port and click Edit.
STEP 3 Enter the following information:
•Interface—Select a port to be configured.
•LLDP MED Status—Enable or disable LLDP MED on this port.
•Available Optional TLVs—Select the TLVs that can be published by the
switch, by moving them to the Selected Optional TLVs list.
•Available Network Policies—Select the LLDP MED policies that will be
published by LLDP, by moving them to the Selected Network Policies list.
These policies were created on the LLDP MED Network Policy
NOTE The following fields must be entered in hexadecimal characters in the
exact data format that is defined in the LLDP MED standard (ANSI-TIA1057_final_for_publication.pdf).
•Location Coordinate—Enter the coordinate location to be published by
LLDP.
page.
•Location Civic Address—Enter the civic address to be published by LLDP.
•Location (ECS) ELIN—Enter the Emergency Call Service (ECS) ELIN
location to be published by LLDP.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x89
Administration: Discovery
Configuring LLDP
STEP 4 Click Apply. The LLDP MED port settings are modified, and the Running
Configuration is updated.
STEP 5 Click LLDP Local Information Detail to see the details of the LLDP and LLDP MED
TLVs sent to the neighbor.
Viewing LLDP Port Status
The LLDP Port Status page displays the LLDP global information, as well as the
LLDP status per port.
STEP 2 Select the desired port from the Port drop-down menu.
The following fields are displayed:
Global
•Chassis ID Subtype—Type of chassis ID, such as the MAC address.
•Chassis ID—Identifier of chassis. Where the chassis ID subtype is a MAC
address, the MAC address of the switch is displayed.
•System Name—Name of switch.
•System Description—Description of the switch (in alphanumeric format).
•Supported System Capabilities—Primary functions of the device, such as
Bridge, WLAN AP, or Router.
•Enabled System Capabilities—Primary enabled functions of the device.
•Port ID Subtype—Type of the port identifier that is shown.
•Port ID—Identifier of port.
•Port Description—Information about the port, including manufacturer,
product name, and hardware and software versions.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x91
Administration: Discovery
Configuring LLDP
Management Address
Displays the table of addresses of the local LLDP agent. Other remote managers
can use this address to obtain information related to the local device. The address
consists of the following elements:
8
•Address Subtype—Type of management IP address that is listed in the
Management Address field, for example, IPv4.
•Address—Returned address most appropriate for management use,
typically a Layer 3 address.
•Interface Subtype—Numbering method used for defining the interface
number.
•Interface Number—Specific interface associated with this management
address.
MAC/PHY Details
•Auto-Negotiation Supported—Port speed auto-negotiation support status.
•Auto-Negotiation Enabled—Port speed auto-negotiation active status.
capabilities, for example, 1000BASE-T half-duplex mode, 100BASE-TX fullduplex mode.
•Operational MAU Type—Medium Attachment Unit (MAU) type. The MAU
performs physical layer functions, including digital data conversion from the
Ethernet interfaces’ collision detection and bit injection into the network, for
example, 100BASE-TX full duplex mode.
802.3 Details
•802.3 Maximum Frame Size—The maximum supported IEEE 802.3 frame
size.
802.3 Link Aggregation
•Aggregation Capability—Indicates whether the interface can be
aggregated.
•Aggregation Status—Indicates whether the interface is aggregated.
•Aggregation Port
MED Details
•Capabilities Supported—MED capabilities supported on the port.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x92
ID—Advertised aggregated interface ID.
Administration: Discovery
Configuring LLDP
8
•Current Capabilities—MED capabilities enabled on the port.
•Device Class—LLDP MED endpoint device class.
•PoE Device Type—(Only applicable for PoE models) Port PoE type, for
example, powered.
•PoE Power Source—(Only applicable for PoE models) Port power source.
•PoE Power Priority—(Only applicable for PoE models) Port power priority.
•PoE Power Value—(Only applicable for PoE models) Port power value.
•Hardware Revision—Hardware version.
•Firmware Revision—Firmware version.
•Software Revision—Software version.
•Serial Number—Device serial number.
•Manufacturer Name—Device manufacturer name.
•Model Name—Device model name.
•Asset ID—Asset ID.
Location Information
•Civic—Street address.
•Coordinates—Map coordinates: latitude, longitude, and altitude.
•ECS ELIN—Emergency Call Service (ECS) Emergency Location
Identification Number (ELIN).
Network Policy Table
•Application Type—Network policy application type, for example, Voice.
•VLAN ID—VLAN ID for which the network policy is defined.
•VLAN Type—VLAN type for which the network policy is defined. The
possible field values are:
Tagged
-
Untagged
-
•User Priority—Network policy user priority.
•DSCP—Network policy DSCP.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x93
—Indicates the network policy is defined for tagged VLANs.
—Indicates the network policy is defined for untagged VLANs.
Administration: Discovery
Configuring LLDP
STEP 3 Click LLDP Port Status Table to display the details of LLDP port status in a table.
Viewing LLDP Neighbors Information
The LLDP Neighbor page displays information that was received using the LLDP
protocol from neighboring devices. After timeout (based on the value received
from the neighbor Time To Live TLV during which no LLDP PDU was received from
a neighbor), the information is deleted.
•Tx Frames Total—Total number of transmitted frames.
•Rx Frames Total—Number of received frames.
•Rx Frames Discarded—Total number of received frames that were
discarded.
•Rx Frames Errors—Total number of received frames with errors.
•Rx TLVs Discarded—Total number of received TLVs that were discarded.
•Rx TLVs Unrecognized—Total number of received TLVs that were
unrecognized.
•Neighbor’s Information Deletion Count—Number of neighbor age outs on
the port.
STEP 2 Click Refresh to refresh the LLDP statistics.
Viewing LLDP Overloading
LLDP adds information as LLDP and LLDP MED TLVs into the LLDP packets. LLDP
overload occurs when the total amount of information to be included in an LLDP
packet exceeds the maximum PDU size supported by a port.
The LLDP Overloading page displays the number of bytes of LLDP/LLDP MED
information, the number of available bytes for additional LLDP information, and the
overloading status of each port.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x95
•Tot al B y tes In -Us e—Total number of bytes of LLDP information in each
packet.
•Available Bytes Left —Total number of available bytes left for additional
LLDP information in each packet.
•Status—If TLVs are transmitted, or if they are overloaded.
The following fields are displayed:
•LLDP Mandatory TLVs
Size (Bytes)
-
Status
-
was overloaded.
•LLDP MED Capabilities
Size (Bytes)
-
Status
-
were overloaded.
•LLDP MED Location
Size (Bytes)
-
Status
-
overloaded.
•LLDP MED Network Policy
—Total mandatory TLV byte size.
—If the mandatory TLV group is transmitting, or if the TLV group
—Total LLDP MED capabilities packets byte size.
—Whether the LLDP MED capabilities packets were sent or they
—Total LLDP MED location packets byte size.
—Whether the LLDP MED location packets were sent or they were
Size (Bytes)
-
Status
-
were overloaded.
•LLDP MED Expanded Power via MDI
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x96
—Total LLDP MED network policies packets byte size.
—If the LLDP MED network policies packets were sent, or if they
Administration: Discovery
Configuring LLDP
-
Size (Bytes)
size.
8
—Total LLDP MED extended power via MDI packets byte
Status
-
if they were overloaded.
•802.3 TLVs
Size (Bytes)
-
Status
-
overloaded.
•LLDP Optional TLVs
Size (Bytes)
-
Status
-
overloaded.
•LLDP MED Inventory
Size (Bytes)
-
Status
-
overloaded.
•802.1 TLVs
—If the LLDP MED extended power via MDI packets were sent, or
—Total LLDP 802.3 TLVs packets byte size.
—If the LLDP 802.3 TLVs packets were sent, or if they were
—Total LLDP optional TLVs packets byte size.
—If the LLDP optional TLVs packets were sent, or if they were
—Total LLDP MED inventory TLVs packets byte site.
—If the LLDP MED inventory packets were sent, or if they were
Size (Bytes)
-
Status
-
overloaded.
•To ta l
To t a l ( B y te s)
-
Available Bytes Left
-
LLDP information in each packet.
Cisco 220 Series Smart Switches Administration Guide Release 1.1.0.x97
—Total LLDP 802.1 TLVs packets byte size.
—If the LLDP 802.1 TLVs packets were sent, or if they were
—Total number of bytes of LLDP information in each packet.
—Total number of available bytes left for additional
Administration: Discovery
Configuring CDP
Configuring CDP
Similar to LLDP, Cisco Discovery Protocol (CDP) is a link layer protocol for directly
connected neighbors to advertise themselves and their capabilities to each other.
Unlike LLDP, CDP is a Cisco proprietary protocol.
This section describes how to configure CDP and includes the following topics:
8
•Configuring CDP Properties
•Configuring CDP Port Settings
•Viewing CDP Local Information
•Displaying CDP Neighbor Information
•Viewing CDP Statistics
Configuring CDP Properties
Use the CDP Properties page to globally enable CDP on the switch and configure
general CDP parameters.