Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden.
Trademarks used in this text: Dell, Dell OpenManage, the DELL logo, Inspiron, Dell Precision, Dimension, OptiPlex, PowerConnect,
PowerApp, PowerVault, Axim, DellNet, and Latitude are trademarks of Dell Inc. Microsoft and Windows are either trademarks or registered
trademarks of Microsoft Corporation in the United States and/or other countries.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products.
Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own.
This User’s Guide contains the information needed for installing, configuring and maintaining the
PowerConnect 2808, PowerConnect 2816, PowerConnect 2824, and PowerConnect 2848 Webmanaged Gigabit Ethernet switches.
The PowerConnect 28xx switches can be used to connect workstations and other network devices,
such as:
•Servers
•Hubs
•Routers
The PowerConnect devices are primarily designated for the Small Office/Home Office (SOHO) that
require high performance edge connectivity. These PowerConnect devices are ideal for the small to
medium business that requires high performance network connectivity along with advanced web
management features. The PowerConnect management features are designed to minimize
administrative management effort, while enhancing and improving network traffic control.
System Description
This section describes the hardware configurations of the PowerConnect 28xx. The switches are
managed by Dell’s OpenManage Switch Administrator.
1
1
PowerConnect 2808
The following figure illustrates the PowerConnect 2808 front panel.
Figure 1-1. PowerConnect 2808 Front Panel
The PowerConnect 2808 supports the following ports:
•8 Gigabit Ethernet copper ports
PowerConnect 2816
The following figure illustrates the PowerConnect 2816 front panel.
Dell PowerConnect 28xx Systems User Guide9
Figure 1-2. PowerConnect 2816 Front Panel
The PowerConnect 2816 supports the following ports:
•16 Gigabit Ethernet copper ports
PowerConnect 2824
The following figure illustrates the PowerConnect 2824 front panel.
Figure 1-3. PowerConnect 2824 Front Panel
The PowerConnect 2824 supports the following ports:
•24 Gigabit Ethernet copper ports
•2 SFP combo ports (1000BASE-SX or 1000BASE-LX)
PowerConnect 2848
The following figure illustrates the PowerConnect 2848 front panel.
Figure 1-4. PowerConnect 2848 Front Panel
The PowerConnect 2848 supports the following ports:
•48 Gigabit Ethernet copper ports
•4 SFP combo ports (1000BASE-SX or 1000BASE-LX)
10Dell PowerConnect 28xx Systems User Guide
Summary of PowerConnect Models
The following table summarizes the PowerConnect models.
configuration changes by removing the IP address of the device so that it becomes inaccessible for
configuration.
For more information about the management modes, see "Management Modes" on page 49.
— Provides switch management through the web interface.
— In this mode, the device operates as a hub with default configuration, and
— This mode keeps the existing configuration active, but it prevents users from making
Head of Line Blocking Prevention
Head of Line (HOL) blocking results in traffic delays and frame loss caused by traffic competing for the
same egress port resources. HOL blocking queues packets, and the packets at the head of the queue are
forwarded before packets at the end of the queue. By default, the device is configured so that the HOL
blocking prevention mechanism is active at all times, except when QoS (Quality of Service), Flow
Control or Back Pressure is active on a port where the HOL blocking prevention mechanism is disabled
on the whole system.
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by occupying the link so that it is
unavailable for additional incoming traffic. The user may enable or disable this feature on a
per-port basis. The default status on all ports is set to OFF.
Dell PowerConnect 28xx Systems User Guide11
Auto Negotiation
Auto negotiation allows an Ethernet switch to advertise modes of operation. The auto negotiation
function provides the means to exchange information between two Ethernet switches that share a pointto-point link segment, and to automatically configure both Ethernet switches to take maximum
advantage of their transmission capabilities. Port advertisement allows the system administrator to
configure the port speeds advertised.
Jumbo Frames Support
Jumbo frames are frames with an MTU (Maximum Transmission Unit) size of up to 10K bytes. The
Jumbo Frames Support feature, utilizes the network optimally by transporting the same data using less
frames.
The main benefits of this facility are reduced transmission overhead and reduced host processing
overhead. Jumbo frames are used for server-to-server transfers.
AutoMDI/MDIX Support
The switch automatically detects whether the cable connected to an RJ-45 port is crossed or straight
through.
Standard wiring for end stations is Media-Dependent Interface (MDI) and the
s
tandard wiring for hubs
and switches is known as Media-Dependent Interface with Crossover (MDIX).
Auto MDI/MDIX works on 10/100/1000BASE-T Ethernet ports. This feature is automatically enabled for
the entire system and cannot be turned off by the user.
Flow Control Support (IEEE802.3X)
On Full Duplex links (FDX), the flow control mechanism allows the receiving side to signal to the
sending side that transmission must be halted temporarily, in order to prevent buffer overflows. Flow
control is enabled by default.
Virtual Cable Testing (VCT)
VCT technology provides the mechanism to detect and report potential cabling issues, such as cable
opens and cable shorts on copper links.
Cable analysis is available on Copper Cables (10BASE-T/100BASE-T/1000BASE-T), and is only done
when the link is down. When the system initiates a cable-testing operation, upon explicit user action, the
following parameters are detected:
•Cable Type and Status
•Cable Length
•Fault-Distance
12Dell PowerConnect 28xx Systems User Guide
MAC Address Supported Features
MAC Address Capacity Support
The PowerConnect 2808, 2816, 2824 switches support a total of 8K MAC addresses, and the
PowerConnect 2848 supports a total of 16K MAC addresses.
Auto-Learning MAC Addresses
The switch enables MAC address auto-learning from incoming packets. The MAC addresses are stored in
the Bridging Table.
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period of time are aged out. This prevents
the Bridging Table from overflowing.
VLAN-aware MAC-based Switching in Managed and Secure Modes
In Managed or Secure mode, the switch system always performs VLAN-aware bridging. Classic bridging
(IEEE802.1D) is not performed (where frames are forwarded based only on their destination MAC
address). However, a similar functionality may be configured for untagged frames. Addresses are
associated with ports by learning them from the incoming frames source address.
802.1D Bridging in Unmanaged Mode
In Unmanaged Mode, the switch performs classic bridging. Frames are forwarded based on their
destination MAC address only, regardless of the VLAN tag.
MAC Multicast Support
Multicast service is a limited broadcast service, which allows one-to-many and many-to-many
connections for information distribution. Layer 2 Multicast service is where a single frame is addressed to
a specific Multicast address, from where copies of the frame are transmitted to the relevant ports. IGMP
Snooping is supported, including IGMP Querier which simulates the behavior of a multicast router,
allowing snooping of the layer 2 multicast domain even though there is no multicast router. When
Multicast groups are statically enabled, you can set the destination port of registered groups, as well as
define the behavior of unregistered multicast frames.
Layer 2 Features
Green Ethernet
Green Ethernet, also known as Energy Efficient Ethernet, is an effort to make networking equipment
environmentally friendly, specifically by reducing power usage of Ethernet connections. The following
methods are supported by the device:
•
Energy-Detect
— Auto-detection of inactivity on a port, and subsequent reducing of transmit power.
Dell PowerConnect 28xx Systems User Guide13
•
Short-Reach
IGMP Snooping
— Reduction of power over Ethernet cables shorter than 40m.
Internet Group Membership Protocol (IGMP) Snooping examines IGMP frame contents, when they are
forwarded by the device from work stations to an upstream Multicast router. From the frame, the device
identifies work stations configured for Multicast sessions, and which Multicast routers are sending
Multicast frames.
Port Mirroring
The port mirroring mechanism monitors and mirrors network traffic by forwarding copies of incoming
and outgoing packets from a monitored port to a monitoring port. Users can specify which target port
receives copies of all traffic passing through one or more source ports.
Storm Control
Storm Control enables limiting the amount of Multicast, Broadcast and Unknown Unicast frames
accepted and forwarded by the switch. When Layer 2 frames are forwarded, Broadcast and Multicast
frames are flooded to all ports on the relevant VLAN. All nodes connected to these ports accept and
attempt to process these frames, thus placing load on both the network links and the host operating
system.
Dynamic VLAN Assignment (DVA)
Dynamic VLAN Assignment allows automatic assignment of users to VLANs during the RADIUS server
authentication. When a user is authenticated by the RADIUS server, the user is automatically joined to
the VLAN configured on the RADIUS server.
VLAN Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single broadcast domain. Packets are classified
as belonging to a VLAN based on either the VLAN tag or based on a combination of the ingress port and
package contents. Packets sharing common attributes can be grouped in the same VLAN.
Port Based Virtual LANs (VLANs)
Port-based VLANs classify incoming packets to VLANs based on their ingress port.
Link Aggregation
The PowerConnect 28xx switches support up to six aggregated links. Each of the six aggregated links may
be defined with up to four member ports to form a single Link Aggregated Group (LAG).
The benefits of this facility are:
•Fault tolerance protection from physical link disruption
14Dell PowerConnect 28xx Systems User Guide
•Higher bandwidth connections
•Improved bandwidth granularity
•High bandwidth server connectivity
A LAG is composed of ports with the same speed set to full-duplex operation.
DHCP Server
Dynamic Host Configuration Protocol is a method of managing network parameter assignment from a
single DHCP server. The Dynamic Host Configuration Protocol (DHCP) automates the assignment of
IP addresses, subnet masks, default gateway, and other IP parameters.
BootP and DHCP Clients
DHCP (Dynamic Host Configuration Protocol) enables additional setup parameters to be received from
a network server upon system startup. DHCP service is an on-going process. DHCP is an extension to
BootP.
The BootP client is operational if there is a corrupted or invalid software image. The BootP client then
continuously attempts to find a BootP server, by sending BootP requests to all ports on the default
VLAN, until a BootP server replies. The information replied is then used to provide the switch system
with a TFTP server IP address and a download file name. The switch can then configure these values to
the TFTP client and try to download a valid runtime image.
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
802.1d Spanning tree is a standard Layer 2 switch requirement that allows bridges to automatically
prevent and resolve L2 forwarding loops. Switches exchange configuration messages using specifically
formatted frames and selectively enable and disable forwarding on ports.
Fast Link
STP can take up to 30-60 seconds to converge. During this time, STP detects possible loops, allowing
time for status changes to propagate and for relevant devices to respond. 30-60 seconds is considered too
long of a response time for many applications. The Fast Link option bypasses this delay, and can be used
in network topologies where forwarding loops do not occur.
IEEE 802.1w Rapid Spanning Tree
Spanning Tree can take 30-60 seconds for each host to decide whether its ports are actively forwarding
traffic. Rapid Spanning Tree (RSTP) detects uses of network topologies to enable faster convergence,
without creating forwarding loops.
STP Root Guard
Root guard restricts the interface from functioning as the root port for the switch
Dell PowerConnect 28xx Systems User Guide15
Class of Service (CoS) Features
The PowerConnect 28xx system enables users to define various services for traffic classes of service. The
underlying mechanism for supporting bandwidth management and control is based on the use of
multiple priority queues for classifying traffic. The switches support four queues per port.
A CoS is defined by the user, whereby packets are related to the same Class of Service. After a packet has
been classified, it is assigned to one of the queues. The PowerConnect 28xx system can classify according
to IPv4 information (DSCP).
Class of Service 802.1p Support
The IEEE 802.1p signaling technique is an OSI Layer 2 standard for marking and prioritizing network
traffic at the data link/MAC sub-layer. 802.1p traffic is classified and sent to the destination. No
bandwidth reservations or limits are established or enforced. 802.1p is a spin-off of the 802.1Q (VLANs)
standard.
Ethernet Switch Management Features
Web-Based Management
With a Web-based management interface, the Ethernet Switches’ system can be managed from any
Web browser. The system contains an Embedded Web Server (EWS), which serves HTML pages,
through which the system can be monitored and configured.
TFTP Trivial File Transfer Protocol
The PowerConnect 28xx switches support software boot image and software download through TFTP.
Remote Monitoring
Remote Monitoring (RMON) is an extension to the Simple Network Management Protocol (SNMP),
which provides network traffic statistics. RMON defines current and historical MAC-layer statistics and
control objects, allowing real-time information to be captured across the entire network. The switches
support one RMON group for Ethernet statistics. The system provides a means to collect the statistics
defined in RMON and to view the results, using the Web management interface in the system.
16Dell PowerConnect 28xx Systems User Guide
Hardware Description
Switch Port Configurations
PowerConnect 28xx Front and Back Panel Port Description
The Dell™ PowerConnect™ 28xx switches use 10/100/1000BASE-T ports on the front panel for
connecting to a network.
The Gigabit Ethernet ports can operate at 10, 100 or 1000 Mbps. These ports support autonegotiation, duplex mode (Half or Full duplex), and flow control. The combo 1000 Mbps optical
ports can only operate at 1000 Mbps, full-duplex mode.
The following figures illustrate the front panels and back panels of the PowerConnect 28xx switches.
Figure 2-1. PowerConnect 2808 Front Panel
2
On the front panel there are eight ports which are numbered 1 to 8, top down and left to right. On
each port there are LEDs (Light Emitting Diode) to indicate the port status.
On the left side of the front panel is the Managed Mode LED which indicates the Ethernet switch
operational status and the management mode. The Power LED on the front panel indicates whether
the device is powered on or not. A Mode push-button, located on the right side on the front panel is
used to transition between management modes and to reset the device. For more information about
management modes and transitioning between them, see "Management Modes" on page 49.
Dell PowerConnect 28xx Systems User Guide17
Figure 2-2. PowerConnect 2808 Back Panel
Figure 2-3. PowerConnect 2816 Front Panel
On the front panel there are 16 ports which are numbered 1 to 16, top down and left to right. On each
port there are LEDs to indicate the port status.
On the left side of the front panel is the Managed Mode LED which indicates the Ethernet switch
operational status and the management mode. The Power LED on the front panel indicates whether the
device is powered on or not. A Mode push-button, located on the right side on the front panel, is used to
transition between management modes and to reset the device. For more information about
management modes and transitioning between them, see "Management Modes" on page 49.
Figure 2-4. PowerConnect 2816 Back Panel
18Dell PowerConnect 28xx Systems User Guide
Figure 2-5. PowerConnect 2824 Front Panel
On the front panel there are 24 ports which are numbered 1 to 24, top down and left to right. On each
port there are LEDs to indicate the port status. There are two SFP (Small Form-Factor Plugable) ports,
designated as ports 23 and 24, for fiber connection. The two combo ports are logical ports with two
physical connections:
•An RJ-45 connection for Twisted Pair (TP) copper cabling
•An SFP port for swappable optical transceiver, which offers high-speed 1000BASE-SX or 1000BASELX connection.
NOTE: Only one of the two physical connections of a combo port can be used at any one time. Port features and
port controls are determined by the physical connection used. The system automatically detects the media used on
a combo port, and utilizes the information in all the control interfaces.
NOTE: The system can switch from the RJ-45 to the SFP (or vice versa) without resetting the device. If both RJ-45
and SFP ports are present, the SFP port will be the active port, whereas the RJ-45 port will be disabled.
On the front panel is the Managed Mode LED which indicates the Ethernet switch operational status
and the management mode. The Fan LED indicates the device fan operations status, and the Power
LED on the front panel indicates whether the device is powered on or not. A Mode push-button, located
on the right side on the front panel is used to transition between management modes and to reset the
device. For more information about management modes and transitioning between them, see
"Management Modes" on page 49.
Dell PowerConnect 28xx Systems User Guide19
Figure 2-6. PowerConnect 2824 Back Panel
Figure 2-7. PowerConnect 2848 Front Panel
On the front panel there are 48 ports, which are numbered 1 to 48, top down and left to right. On each
port, there are LEDs to indicate the port status. There are four SFP (Small Form-Factor Plugable) ports,
designated as ports 45, 46, 47 and 48, for fiber connection. The four combo ports are logical ports with
two physical connections:
•An RJ-45 connection for Twisted Pair (TP) copper cabling.
•An SFP port for swappable optical transceiver, which offers high-speed 1000BASE-SX or
1000BASE-LX connection.
NOTE: Only one of the two physical connections of a combo port can be used at any one time. Port features and
port controls are determined by the physical connection used. The system automatically detects the media used on
a combo port, and utilizes the information in all the control interfaces.
NOTE: The system can switch from the RJ-45 to the SFP (or vice versa) without resetting the device. If both RJ-45
and SFP ports are present, the SFP port will be the active port, whereas the RJ-45 port will be disabled.
On the top right side of the front panel is the Managed Mode LED which indicates the Ethernet switch
operational status and the management mode. The Fan LED indicates the device fan operations status,
and the Power LED on the front panel indicates whether the device is powered on or not. A Mode push-
20Dell PowerConnect 28xx Systems User Guide
button, located on the right side on the front panel is used to transition between management modes
and to reset the device. For more information about management modes and transitioning between
them, see "Management Modes" on page 49.
Fans are provided on the side panel. The back panel contains an AC Power Supply Interface.
The following figure illustrates the back panel of the PowerConnect 2848 device.
Figure 2-8. PowerConnect 2848 Back Panel
Physical Dimensions
The PowerConnect 2808 switch has the following physical dimensions:
•Height — 43.2 mm (1.7008 in.)
•Width — 256 mm (10.079 in.)
•Depth — 161.7 mm (6.366 in.)
The PowerConnect 2816 and PowerConnect 2824 switches have the following physical dimensions:
•Height — 43.2 mm (1.7008 in.)
•Width — 330 mm (12.992 in.)
•Depth — 230.50 mm (9.075 in.)
The PowerConnect 2848 switch has the following physical dimensions:
•Height — 43.2 mm (1.70 in.)
•Width — 440 mm (17.32 in)
•Depth — 255 mm (10.04 in.)
LED Definitions
The front panel contains LEDs that indicate the status of links, power supply, fan status, and Managed
Mode status.
Dell PowerConnect 28xx Systems User Guide21
Power LED
On the PowerConnect 28xx front panel there is a Power LED. The following table describes the Power
Supply status LED indications.
Table 2-1. Power LED Indications
LED ColorDescription
Green SolidThe switch is turned on.
OffThe switch is not turned on.
Managed Mode LED
On the PowerConnect 28xx front panel there is a Managed Mode LED monitoring the switch node as
well as indicating diagnostic test results. The following table describes the Managed Mode LED
indications. For more information about management modes and transitioning between them, see
"Management Modes" on page 49.
Table 2-2. Managed Mode LED Indications
LED ColorDescription
Green FlashingIndicates diagnostics in progress, firmware loading, or Management Mode transition.
Green SolidIndicates the switch is in Managed Mode.
Amber SolidDiagnostics has failed.
Amber FlashingNo valid image.
OffIndicates Unmanaged mode or Secure mode.
Fan LED (2824/2848 only)
On the PowerConnect 2824 and PowerConnect 2848 front panel there is a fan LED. The following table
describes the fan status LED indications.
Table 2-3. Fan LED Indications
LED ColorDescription
Green SolidAll fans are operating correctly.
Red SolidOne or more fans have failed.
Port LEDs
10/100/1000BASE-T Port LEDs
Each 10/100/1000BASE-T port has two LEDs. Speed/Link/Activity is indicated on the left LED and the
duplex mode is indicated on the right LED.
The following figure illustrates the RJ-45 10/100/1000BASE-T LEDs.
The RJ-45 LED indications are described in the following table:
Table 2-4. RJ-45 Copper based 10/100/ 1000BASE-T LED Indications
LEDColorDescription
Left LED Green SolidThe port is linked at 1000 Mbps.
Green FlashingThe port is transmitting or receiving data at 1000 Mbps.
Amber SolidThe port is linked at either 10 or 100 Mbps.
Amber FlashingThe port is transmitting or receiving data at 10 or 100 Mbps.
OffNo link is established.
Right LEDGreen SolidThe port is currently transmitting in Full Duplex mode.
OffThe port is operating in Half Duplex mode.
SFP Port LED
The following table describes the SFP LED indications.
Table 2-5. SFP LED Indications
LED ColorDescription
Green SolidLink is established.
Green Flashing Activity is occurring.
OffNo link is established.
Managed Mode Button
The PowerConnect 28xx has a Mode push button on the front panel. The Mode button is for changing
between Managed Mode and Unmanaged (or Secure) Mode and for resetting the device. To transition
between modes, press the button normally. To reset the device, press and hold the button for at least 7 seconds. For more information about management modes and transitioning between them, see "Management
Modes" on page 49.
Switch Ventilation Fan
The PowerConnect 2848 switch has three fans and the PowerConnect 2824 switch has one fan for system
ventilation. The PowerConnect 2808 and PowerConnect 2816 devices have no internal fans.
Dell PowerConnect 28xx Systems User Guide23
Cables, Port Connections, and Pinout Information
This section explains the switch physical interfaces, and provides information about cables and port
connections. Copper cable diagnostics are supported. High-speed workstations, hubs, routers, or other
switches are connected through standard RJ-45 connectors to the switch physical interface ports, located
on the front panel. For each device, the supported mode is set to Half Duplex, Full Duplex, and Auto.
1000BASE-T Cable Requirements
All Category 5 UTP cables that are used for 100BASE-TX connections also operate with 1000BASE-T,
provided if all four wire pairs are connected. However, it is recommended that enhanced Category 5
(Category 5e)cable is used for all critical connections or any new cable installations. The Category 5e
specification includes test parameters that are only recommendations for Category 5, and comply with
the IEEE 802.3ab standards.
RJ-45 Connections for 10/100/1000BASE-T Ports
The 10/100/1000BASE-T ports are copper Twisted-Pair ports.
Table 2-6. Port Default Settings
ConnectorPort/InterfaceCable
RJ-4510/100/1000BASE-T PortCat.5
The following figure illustrates the RJ-45 pin connector pin numbers.
Figure 2-10. RJ-45 Pin Numbers
The RJ-45 pin number allocation for the 10/100/1000BASE-T ports is listed in the following table.
Table 2-7. RJ-45 Pin Number Allocation for 10/100/ 1000BASE-T Ethernet Port
Pin NoFunction
1TxRx 1+
2TxRx 1-
3TxRx 2+
4TxRx 2-
5TxRx 3+
24Dell PowerConnect 28xx Systems User Guide
Table 2-7. RJ-45 Pin Number Allocation for 10/100/ 1000BASE-T Ethernet Port
Pin NoFunction
6TxRx 3-
7TxRx 4+
8TxRx 4-
SFP Ports
The PowerConnect 2824 switch supports two SFP transceivers combo ports, and the PowerConnect 2848
switch supports four SFP transceivers combo ports for various fiber-based modules (1000BASE-SX or
1000BASE-LX). Only one of the two physical connections of a combo port can be used at any time. The
system can switch from the RJ-45 to the SFP (or vice versa) without a system reset. The system
automatically detects the media used on a combo port, and utilizes this information in the control
interfaces.
PowerConnect 2824 switch supports SFP diagnostics. The optical transceiver provides access to a set of
parameters that can be monitored and displayed to the system administrator.
NOTE: If both RJ-45 and SFP ports are present, the SFP port will be the active port, whereas the RJ-45 port will be
disabled and ignored.
The pin number allocation for the SFP ports is listed in the following table.
Table 2-8. SFP Pin Connections
Pin NoUse
1Transmitter ground (common with receiver ground)
2Transmitter fault
3Transmitter disable; laser output disabled on high or open.
4Module definition 2; data line for serial ID.
5Module definition 1; clock line for serial ID.
6Module definition 0; grounded within the module.
7Rate select; no connection required.
8Loss of signal indication; logic 0 indicates normal operation.
9Receiver ground (common with transmitter ground)
10Receiver ground (common with transmitter ground)
11Receiver ground (common with transmitter ground)
12Receiver inverted data out; AC coupled.
13Receiver non-inverted data out; AC coupled.
14Receiver ground (common with transmitter ground)
Dell PowerConnect 28xx Systems User Guide25
Table 2-8. SFP Pin Connections
Pin NoUse
15Receiver power supply
16Transmitter power supply
17Transmitter ground (common with receiver ground)
18Transmitter non-inverted data in
19Transmitter inverted data in
20Transmitter ground (common with receiver ground)
Power Connectors
The PowerConnect 28xx is powered by using the AC internal power supply.
Internal Power Supply Connector
The PowerConnect 28xx supports a single internal power supply to provide power for switching
operations. The internal power supply supports input voltages between 100 and 240 VAC. The AC power
connector is located on the back panel of the switch.
26Dell PowerConnect 28xx Systems User Guide
Installing the PowerConnect Device
This section contains information about device unpacking, location, installation, and cable
connections.
Installation Precautions
CAUTION Before performing any of the following procedures, read and follow the safety instructions located
in the
System Information Guide
CAUTION Observe the following points before performing the procedures in this section:
•Ensure that the rack or cabinet housing the device is adequately secured to prevent it from
becoming unstable and/or falling over.
•Ensure that the power source circuits are properly grounded.
•Observe and follow the service markings. Do not service any device except as explained in the
system documentation. Opening or removing covers marked with a triangular symbol with a
lighting bolt may cause electrical shock. These components are to be serviced by trained service
technicians only.
•Ensure that the power cable, extension cable, and/or plug is not damaged.
•Ensure that the device is not exposed to water.
•Ensure that the device is not exposed to radiators and/or heat sources.
•Ensure that the cooling vents are not blocked.
•Do not push foreign objects into the device, as it may cause a fire or electric shock.
•Use the device only with approved equipment.
•Allow the device to cool before removing covers or touching internal equipment.
•Ensure that the device does not overload the power circuits, wiring, and over-current protection.
To determine the possibility of overloading the supply circuits, add together the ampere ratings of
all switches installed on the same circuit as the device. Compare this total with the rating limit for
the circuit.
•Do not install the device in an environment where the operating ambient temperature might
exceed 45ºC (113ºF).
•Ensure that the airflow around the front, sides, and back of the device is not restricted.
included in the Dell Documentation.
3
Dell PowerConnect 28xx Systems User Guide27
Site Requirements
The PowerConnect 28xx can be mounted in a standard equipment rack, placed on a tabletop, or
mounted on the wall.
Before installing the device, verify that the site selected for the device meets the following site
requirements:
•
Power
— The device is installed within 1.5 m (5 feet) of a grounded, easily accessible outlet 220/110
VAC, 50/60 Hz. If the device has two power supplies, the site should have two power outlets with
different power feeders.
•
General
•
Clearance
power connections, and ventilation.
•
Cabling
amplifiers, power lines, and fluorescent lighting fixtures.
•
Ambient Requirements
113 °F) at a relative humidity of up to 95%, non-condensing. Verify that water or moisture cannot enter
the device case.
— Ensure that the power supply is correctly installed.
— There is adequate frontal clearance for operator access. Allow clearance for cabling,
— Cabling is routed to avoid sources of electrical noise such as radio transmitters, broadcast
— The ambient device operating temperature range is 0 to 45 °C (32 to
Unpacking
Package Contents
While unpacking the device, ensure that the following items are included:
NOTE: Before unpacking the device, inspect the packaging and report any evidence of damage.
1
Place the box on a clean flat surface.
2
Open the box or remove the box top.
3
Carefully remove the device from the package and place it on a secure, stable and clean surface.
4
Remove all packing material.
28Dell PowerConnect 28xx Systems User Guide
5
Inspect the product for damage. Report any damage immediately.
Mounting the Device
Overview
There are three device mounting options:
•Installing in a Rack
•Installing on a Flat Surface
•Installing on a Wall
Device Rack Installation
CAUTION Read the safety information in the Product Information Guide as well as the safety information for other
devices that connect to or support the switch.
CAUTION Disconnect all cables from the device before mounting the device in a rack or cabinet.
CAUTION When mounting multiple devices into a rack, mount the devices from the bottom up.
Install the device in a rack as follows:
1
Place the supplied rack-mounting bracket on one side of the device ensuring the mounting holes on
the device line up to the mounting holes on the rack mounting bracket. The following figure illustrates
where to mount the brackets.
Dell PowerConnect 28xx Systems User Guide29
Figure 3-1. Bracket Installation for Rack Mounting
2
Insert the supplied screws into the rack mounting holes and tighten with a screwdriver.
3
Repeat the process for the rack-mounting bracket on the other side of the device.
4
Insert the device into the rack, ensuring the rack-mounting holes on the device line up to the
mounting hole on the rack.
5
Secure the device to the rack with the rack screws (not provided). Fasten the lower pair of screws before
the upper pair of screws. Ensure that the ventilation holes are not obstructed.
Installing on a Flat Surface
The device must be installed on a flat surface if it is not installed on a rack. The surface must be able to
support the weight of the device and the device cables.
1
Attach the self-adhesive rubber pads (provided with the device) on each marked location on the
bottom of the chassis.
2
Set the device on a flat surface, while leaving 2 inches (5.08 cm) on each side and 5 inches (12.7 cm) at
the back.
3
Ensure that the device has proper ventilation.
30Dell PowerConnect 28xx Systems User Guide
Installing on a Wall
To mount the device on a wall:
1
Ensure that the mounting location meets the following requirements:
•The surface of the wall must be capable of supporting the device.
•Allow at least 2 inches (5.1 cm) space on the sides for proper ventilation and 5 inches (12.7 cm) at
the back for power cable clearance.
•The location must not be exposed to direct sunlight.
•The location must be at least 2 feet (61 cm) away from any heating vents, and no area-heating
vent should point towards the device.
•The location must be ventilated to prevent heat buildup.
•Do not locate the device near any data or electrical cabling.
•The power cable must be able to reach an outlet.
2
Place the supplied wall-mounting bracket on one side of the device, ensuring that the mounting holes
on the device line up to the mounting holes on the rack-mounting bracket. The following figure
illustrates where to mount the brackets.
Figure 3-2. Bracket Installation for Wall Mounting
3
Insert the supplied screws into the rack-mounting holes and tighten with a screwdriver.
4
Repeat the process for the wall-mounting bracket on the other side of the device.
5
Place the device on the wall in the location where the device is being installed.
Dell PowerConnect 28xx Systems User Guide31
6
On the wall mark the locations where the screws to hold the device must be prepared.
7
On the marked locations, drill the holes and place all plugs (not provided) in the holes.
8
Secure the device to the wall with screws (not provided). Ensure that the ventilation holes are not
obstructed.
Figure 3-3. Mounting Device on a Wall
Connecting the Device
To configure the device, the device must be connected to a terminal.
Connecting the Device to the Network
To connect to an uplink port, use Category 5 Unshielded Twisted-Pair (UTP) cables with RJ-45
connectors at both ends. The RJ-45 ports on the Ethernet device support automatic Media-Dependent
Interface/Media-Dependent Interface with internal crossover wiring (MDI/MDIX) operation under
Auto-Negotiation mode. Standard straight-through twisted-pair cables can be used to connect to any
other Ethernet network (systems, servers, switches or routers) that supports auto-negotiation.
32Dell PowerConnect 28xx Systems User Guide
NOTE: Do not plug a phone jack connector into an RJ-45 port. This will damage the Ethernet device. Use only
twisted-pair cables with RJ-45 connectors that conform to FCC standards.
NOTE: If auto negotiation is turned off on the ports, a straight through cable must be used.
To connect the device to the network:
1
Attach one end of a Twisted-Pair cable to the device’s RJ-45 connector and the other end to a switch or
server.
2
Make sure each twisted pair cable does not exceed 328 feet (100 meters) in length.
As each connection is made, the link LED corresponding to each port on the device is illuminated (green
or amber) indicating that the connection is valid.
Connecting the Terminal to the Device
The device provides an external console port in models 28016/24/48. The console port enables a
connection to a terminal desktop system running terminal emulation software for monitoring and
configuring the device.
The Console port connector is a male DB-9 connector, implemented as a data terminal equipment
(DTE) connector..
To use the Console port, the following is required:
•VT100 compatible terminal or a desktop or portable system with a serial port and running VT100
terminal emulation software.
•An RS-232 crossover cable with a female DB-9 connector for the Console port and the appropriate
connector for the terminal.
To connect a terminal to the device Console port, perform the following:
1
Connect the supplied RS-232 crossover cable to the terminal running VT100 terminal emulation
software.
2
Ensure that the terminal emulation software is set as follows:
a
Select the appropriate serial port (serial port 1 or serial port 2) to connect to the console.
b
Set the data rate to 9600 baud.
c
Set the data format to 8 data bits, 1 stop bit, and no parity.
d
Set flow control to none.
e
Under Properties, select VT100 for Emulation mode.
f
Select Terminal keys for Function, Arrow, and Ctrl keys. Ensure that the setting is for Terminal
keys (not Windows keys).
NOTE: When using HyperTerminal with Microsoft® Windows 2000, Windows XP, or Windows Vista, ensure that
you have the latest service packs installed. With Windows 2000 Service Pack 2, the arrow keys function properly in
HyperTerminal’s VT100 emulation. Go to
Windows Vista service packs.
www.microsoft.com
for information on Windows 2000, Windows XP, and
Dell PowerConnect 28xx Systems User Guide33
3
Connect the female connector of the RS-232 crossover cable directly to the device Console port on the
device, and tighten the captive retaining screws. The Console port is located on the back panel.
Connecting to Console Port
Connecting a Device to a Power Supply
1
Connect the supplied standard AC power cable to the AC connector on the back panel.
2
Do not connect the power cable to a grounded AC outlet at this time. Connect the device to a power
source in the steps detailed in Starting and Configuring the Device.
Figure 3-4. Connecting to Power Supply
3
After connecting the device to a power source, confirm that the device is connected and operating
correctly by examining the LEDs on the front panel.
34Dell PowerConnect 28xx Systems User Guide
Port Connections, Cables, and Pinout Information
This section explains the device’s physical interfaces, and provides information about port connections.
Connector types, ports and cables are summarized in Ports, Connectors, and Cables. Copper Cable and
Optical Transceiver Diagnostics are supported.
RJ-45 Connections for 10/100/1000BaseT Ports
The 10/100/1000BaseT ports are copper twisted-pair ports.
To establish a link for the twisted-pair ports, Tx pair on one cable end must be connected to the Rx pair
on the other cable end, and vice versa. If the cabling is done such that Tx on one end is wired to Tx on
the other end, and Rx is wired to Rx, a link is not established.
When selecting cables to connect the device ports to their networking peers, straight through cables must
be used to connect the device to a station, and crossover cables must be used to connect one transmission
device (switch or hub) to another. Both the straight through and crossover cables are category 5.
After a port is connected, its LINK indication LED is lit.
Table 3-1. Ports, Connectors and Cables
ConnectorPort/InterfaceCable
RJ-4510/100/1000BaseT PortCat.5
The RJ-45pin number allocation for the 10/100/1000BaseT ports is listed in the table following.
Table 3-2. RJ-45 Pin Number Allocation for 10/100/1000BaseT Ethernet Port
Pin NoFuncti on
1TxRx 1+
2TxRx 1-
3TxRx 2+
4TxRx 2-
5TxRx 3+
6TxRx 3-
7TxRx 4+
8TxRx 4-
Dell PowerConnect 28xx Systems User Guide35
Port Default Settings
The general information for configuring the device ports includes the short description of the autonegotiation mechanism and the default settings for switching ports.
Auto-Negotiation
Auto-negotiation enables automatic detection of speed, duplex mode and flow control on switching
10/100/1000BaseT ports. Auto-negotiation is enabled per port by default.
Auto-negotiation is a mechanism established between two link partners to enable a port to advertise its
transmission rate, duplex mode and flow control (the flow control by default is enabled) abilities to its
partner. The ports then both operate at the highest common denominator between them.
If connecting a NIC that does not support auto-negotiation or is not set to auto-negotiation, both the
device switching port and the NIC must be manually set to the same speed and duplex mode.
If the station on the other side of the link attempts to auto-negotiate with a device 10/100/1000BaseT
port that is configured to full duplex, the auto-negotiation results in the station attempting to operate in
half duplex.
MDI/MDIX
The device supports auto-detection of straight through and crossed cables on all switching
10/100/1000BaseT ports. The feature is part of the Auto-negotiation and is enabled when Auto-negotiation
is enabled.
When the MDI/MDIX (Media Dependent Interface with Crossover) is enabled, the automatic
correction of errors in cable selection is possible, making the distinction between a straight through cable
and a crossover cable irrelevant. (The standard wiring for end stations is known as MDI (Media
Dependent Interface), and the standard wiring for hubs and switches is known as MDIX.)
Flow Control
The device supports 802.3x Flow Control for ports configured with the Full Duplex mode. By default,
this feature is enabled. It can be enabled per port. The flow control mechanism allows the receiving side
to signal to the transmitting side that transmission must temporarily be halted to prevent buffer
overflow.
Back Pressure
The device supports back pressure for ports configured to half duplex mode. By default, this feature is
disabled. It can be enabled per port. The back pressure mechanism prevents the transmitting side from
transmitting additional traffic temporarily. The receiving side may occupy a link so it becomes
unavailable for additional traffic.
36Dell PowerConnect 28xx Systems User Guide
Switching Port Default Settings
The following table gives the port default settings.
Table 3-3. Port Default Settings
FunctionDefault Setting
Port speed and mode10/100/1000BaseT copper: auto-negotiation full duplex
Port forwarding stateEnabled
Port taggingNo tagging
Flow ControlOn
Back PressureOff (disabled on ingress)
MDIX (not user-configurable)On (relevant to coppers ports only)
Dell PowerConnect 28xx Systems User Guide37
38Dell PowerConnect 28xx Systems User Guide
Starting and Configuring the Device
After completing all external connections, procede as follows:
•If the device is to be used as an unmanaged switch, there is no need for a terminal connection.
•A terminal connection is required if the device is to be used in a managed mode.
NOTE: The PowerConnect 2808 has an internal serial port.
NOTE: Before proceeding, read the release notes for this product. The release notes can be downloaded
from http://support.dell.com.
NOTE: It is recommended that you obtain the most recent revision of the user documentation from the Dell
support website at http://support.dell.com.
After completing all external connections, connect a terminal to the device to configure the device
and for other procedures. For initial configuration, the standard device configuration is performed.
4
Dell PowerConnect 28xx Systems User Guide39
Figure 4-1. Installation and Configuration Flow
Connect Device and
Console
Power On
Suspend
Bootup
Yes
Press Esc
Startup Menu (Special
Functions)
Reboot
No
Loading Program from
flash to RAM
Enter Wizard
Yes
No
Initial Configuration:
IP Address, Subnet
mask, Users Basic
Security Configuration
Wizard Configuration
Process
Advanced Configuration:
IP Address from DHCP
Standard
Device
Installation
Advanced
Device
Installation
Hardware
Setup
Booting the Device - Managed Mode
The procedure described in this section refers to the device when set to operate as a managed switch.
The PowerConnect 2808/16/24/48 models include a built-in dual purpose Mode Button. To change between
managed and unmanaged modes, press the Mode Button for less than seven seconds.
Once the device is set to operate as a managed switch the boot procedure can be monitored on the
connected terminal as follows:
1
Ensure that the device console port is connected to a VT100 terminal device or VT100 terminal
emulator via the RS-232 crossover cable.
2
Locate an AC power receptacle.
40Dell PowerConnect 28xx Systems User Guide
3
Deactivate the AC power receptacle.
4
Connect the device to the AC receptacle.
5
Activate the AC power receptacle.
When the power is turned on with the local terminal already connected, the device goes through Power
On Self Test (POST). POST runs every time the device is initialized and checks hardware components to
determine if the device is fully operational before completely booting. If a critical problem is detected,
the program flow stops. If POST passes successfully, a valid executable image is loaded into RAM. POST
messages are displayed on the terminal and indicate test success or failure.
The boot process runs less than 45 seconds when in unmanaged mode (and approximately 90 seconds
when in other modes.
Initial Configuration - Managed Mode
The information and procedures described in this section apply to the dewvice when set as a Managed
Mode switch.
NOTE: The switch is factory-set in Unmanaged Mode.
NOTE: The initial simple configuration uses the following assumptions:
•The PowerConnect device was never configured before, and is in the same state as when you received it.
•The PowerConnect device booted successfully.
•The console connection is established and the console prompt is displayed on the screen of a VT100 terminal
device. (Press the <Enter> key several times to verify that the prompt displays correctly.)
The initial device configuration is through the Serial port. After the initial configuration, the device can
then be managed either from the already connected Serial port or remotely through an interface defined
during the initial configuration.
The system prompts you to use the Set-up wizard when the device boots up for the first time or if the
configuration file is empty because the device is not configured. The Setup Wizard provides guidance
through the initial device configuration, and gets the device up and running as quickly as possible.
NOTE: Obtain the following information from your network administrator before configuring the device:
•SNMP Community String and SNMP Management System IP address (optional).
•Username and Password.
•The IP address to be assigned to the VLAN 1 interface through which the device is to be managed (by default,
every external and internal port is a member of the VLAN 1)
•The IP subnet mask for the network
•The default gateway (next hop router) IP address for configuring the default route.
The Setup Wizard guides you through the initial device configuration, and gets the system up and running
as quickly as possible. You can skip using the setup wizard and configure the device manually through the
device CLI mode (see "Managing the Device Using the CLI" on page 157.
The Setup Wizard configures the following fields.
Dell PowerConnect 28xx Systems User Guide41
•SNMP Community String and SNMP Management System IP address (optional)
•Username and Password
•Device IP address
•IP subnet mask
•Default Gateway IP address
The Setup Wizard displays the following information:
Welcome to Dell Easy Setup Wizard.
The Setup Wizard guides you through the initial switch configuration,
and gets you up and running as quickly as possible. You can skip the
setup wizard, and enter CLI mode to manually configure the switch.
The system will prompt you with a default answer; by pressing enter,
you accept the default. You must respond to the next question to run
the setup wizard within 60 seconds, otherwise the system will
continue with normal operation using the default system
configuration.
Would you like to enter the setup wizard (you must answer this
question within 60 seconds)? (Y/N)[Y] Y
If you select not to use the Setup Wizard, you can access the Web inteface by using the default IP
NOTE:
address/mask (192.168.2.1/255.255.255.0).
NOTE: You can exit the Setup Wizard at any time by entering [Ctrl+Z].
Wizard Step 1
The following information displays:
The system is not setup for SNMP management by default.
To manage the switch using SNMP (required for Dell Network Manager)
you can:
*Setup the initial SNMP Version 2 account now
*Return later and setup additional SNMP v1/v2 accounts
For more information on setting up SNMP accounts, please see the user
documentation.
Would you like to setup the SNMP management interface now? (Y/N)[Y] Y
Enter [N] to skip to Step 2.
Enter [Y] to continue the Set-up wizard. The following information displays:
42Dell PowerConnect 28xx Systems User Guide
To setup the SNMP management account you must specify the management
system IP address and the "community string" or password that the
particular management system uses to access the switch. The wizard
automatically assigns the highest access level [Privilege Level 15]
to this account.
You can use Dell Network Manager or CLI to change this setting, and
to add additional management systems. For more information on adding
management systems, see the user documentation.
To add a management station:
Please enter the SNMP community string to be used:
[Dell_Network_Manager]
Please enter the IP address of the Management System (A.B.C.D) or wildcard(0.0.0.0) to manage from
any Management Station:[0.0.0.0]
Wizard Step 2
The following information displays:
Now we need to setup your initial privilege (Level 15) user account.
This account is used to login to the CLI, Telnet and Web interface.
You may setup other accounts and change privilege levels later.
For more information on setting up user accounts and changing
privilege levels,see the user documentation.
To setup a user account:
Enter the user name<1-20>:[admin]
Please enter the user password:*****
Please reenter the user password:*****
Wizard Step 3
The following information displays:
Next, an IP address is setup.
The IP address is defined on the default VLAN ,(VLAN #2) . This is
the IP address you use to access the Telnet, Web interface, or SNMP
interface for the switch. To setup an IP address:
Please enter the IP address of the device (A.B.C.D):10.6.22.100
Please enter the IP subnet mask (A.B.C.D or nn):[255.255.255.224]
Dell PowerConnect 28xx Systems User Guide43
Wizard Step 4
The following information displays:
Finally, setup the default gateway.
Please enter the IP address of the gateway from which this network is
Press Enter. The following is displayed (as per the example parameters described):
This is the configuration information that has been collected:
==============================================================
SNMP Interface = Dell_Network_Manager@0.0.0.0
User Account setup = admin
Password = **********
Management IP address = 10.6.22.100 255.255.255.224
Default Gateway is 10.6.22.97
==============================================================
Wizard Step 5
The following information displays:
If the information is correct, please select (Y) to save the
configuration, and copy to the start-up configuration file. If the
information is incorrect,select (N) to discard configuration and
restart the wizard: (Y/N)[Y] Y
Configuring SNMP management interface.
Configuring user account.......
Configuring IP and subnet......
Thank you for using Dell Easy Setup Wizard.
Advanced Configuration
This section provides information about dynamic allocation of IP addresses.
When configuring/receiving IP addresses through DHCP, the configuration received from the server
includes the IP address, and may include subnet mask and default gateway.
44Dell PowerConnect 28xx Systems User Guide
Retrieving an IP Address From a DHCP Server
When using the DHCP protocol to retrieve an IP address, the device acts as a DHCP client. When the
device is reset, the DHCP command is saved in the configuration file, but not the IP address. To
configure the device so it will retrieve an IP address from a DHCP server, use the web interface (see
"Defining DHCP Server Settings" on page 83).
NOTE: It is not necessary to delete the device configuration to retrieve an IP address from the DHCP server.
Startup Procedures
Startup Menu Procedures
The procedures called from the Startup menu cover software download, flash handling and password
only
recovery. The diagnostics procedures are for use by technical support personnel
in the document.
The Startup menu can be entered when booting the device – a user input must be entered immediately
after the POST test.
To enter the Startup menu:
1
Turn the power on and watch for the auto-boot message.
**************************************************
***************** SYSTEM RESET *****************
**************************************************
and are not disclosed
------ Performing the Power-On Self Test (POST) ------
BOOT Software Version 1.0.0.20 Built 22-Jan-xxxx 15:09:28
Dell PowerConnect 28xx Systems User Guide45
Processor: FireFox 88E6218 ARM946E-S , 64 MByte SDRAM.
I-Cache 8 KB. D-Cache 8 KB. Cache Enabled.
Autoboot in 2 seconds - press RETURN or Esc. to abort and enter prom.
Preparing to decompress...
2
When the auto-boot message appears, press <Enter> to get the Startup menu. The Startup menu
procedures can be done using the ASCII terminal or Windows HyperTerminal.
[1] Download Software
[2] Erase Flash File
[3] Password Recovery Procedure
[4] Enter Diagnostic Mode
[5] Set Terminal Baud-Rate
[6] Back
Enter your choice or press 'ESC' to exit
The following sections describe the available Startup menu options.
NOTE: When selecting an option form the Startup menu, time out must be taken into account: if no selection is
made within 35 seconds (default), the device times out. This default value can be changed through CLI.
Software Download
The software download procedure is performed when a new version must be downloaded to replace the
corrupted files, update or upgrade the system software. To download software from the Startup menu:
1
From the Startup menu,
press [1]
. The following prompt appears:
Downloading code using XMODEM
2
When using the HyperTerminal, click
3
In the
Filename
4
Ensure that the
5
Press
Send
NOTE: After software download, the device reboots automatically.
NOTE: The length of time taken by the download varies according to the tool used.
field, enter the file path for the file to be downloaded.
Xmodem
protocol is selected in the
. The software is downloaded.
Tr an sf e r
on the HyperTerminal Menu Bar.
Protocol
field.
Erase FLASH File
In some cases, the device configuration must be erased. If the configuration is erased, all parameters
configured via CLI, EWS or SNMP must be reconfigured.
46Dell PowerConnect 28xx Systems User Guide
Erasing the Device Configuration
1
From the Startup menu,
displayed:
Warning! About to erase a Flash file.
Are you sure (Y/N)? y
2
Press Y. The following message is displayed.
Write Flash file name (Up to 8 characters, Enter for none.):config
File config (if present) will be erased after system initialization
======== Press Enter To Continue ========
3
Enter
config
4
Repeat the device initial configuration.
as the name of the flash file. The configuration is erased and the device reboots.
press [2]
within two seconds to erase flash file. The following message is
Password Recovery
If a password is lost, the Password Recovery procedure can be called from the Startup menu. The
procedure enables entry to the device once without password.
To recover a lost password for the local terminal only:
1
From the Startup menu, type 3
The password is deleted.
NOTE: To ensure device security, reconfigure passwords for applicable management methods.
and press <Enter>.
Software Download Through TFTP Server
This section contains instructions for downloading device software (system and boot images) through a
TFTP server. The TFTP server must be configured before beginning to download the software.
System Image Download
The device boots and runs when decompressing the system image from the flash memory area where a
copy of the system image is stored. When a new image is downloaded, it is saved in the other area
allocated for the other system image copy.
On the next boot, the device will decompress and run the currently active system image unless chosen
otherwise.
To download a system image through the TFTP server:
1
Ensure that an IP address is configured on one of the device ports and pings can be sent to a TFTP
server.
2
Make sure that the file to be downloaded is saved on the TFTP server (the
Dell PowerConnect 28xx Systems User Guide47
ros
file).
3
Enter
copy tftp://{tftp address}/{file name} i mage
to copy a new system image to the
device. When the new image is downloaded, it is saved in the area allocated for the other copy of system
image. The following is an example of the information that appears:
console# copy tftp://176.215.31.3/file1.ros image
Accessing file ‘file1’ on 176.215.31.3Ö
Loading file1 from 176.215.31.3:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy took 00:01:11 [hh:mm:ss]
Exclamation symbols indicate that a copying process is in progress. Each symbol (!) corresponds to
512 bytes transferred successfully. A period indicates that the copying process is timed out. Many
periods in a row indicate that the copying process failed.
4
Enter the
console# reload
This command will reset the whole system and disconnect your current
session. Do you want to continue (y/n) [n]?
5
Enter y. The device reboots.
Boot Image Download
reload
command. The following message is displayed:
Loading a new boot image from the TFTP server and programming it into the flash updates the boot
no
image. The boot image is loaded when the device is powered on. A user has
control over the boot
image copies. To download a boot image through the TFTP server:
1
Ensure that an IP address is configured on one of the device ports and pings can be sent to a
TFTP server.
2
Ensure that the file to be downloaded is saved on the TFTP server (the
3
Enter
copy tftp://{tftp address}/{file name} boot
rfb
file).
to copy the boot image to the
device. The following is an example of the information that appears:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy: 2739187 bytes copied in 00:01:13 [hh:mm:ss]
4
Enter the
reload
command. The following message is displayed:
console# reload
This command will reset the whole system and disconnect your current
48Dell PowerConnect 28xx Systems User Guide
session. Do you want to continue (y/n) [n]?
5
Enter y.
The device reboots.
Management Modes
The device supports the following modes:
•
Managed Mode
you can move to Unmanaged mode by pressing the Mode button on the device, or you can move to
Secure mode using the web interface (see "Entering Secure Mode" on page 63). Before leaving
Managed mode it is highly recommended to save the configuration (see "Uploading Files" on page 82).
Unmanaged Mode
•
web management interface, the CLI works in debug mode only; and there is no configuration in the
CDB—default configuration is used. From this mode, you can return to Managed mode by pressing
the Mode button on the device.
Secure Mode
•
configuration changes by removing the IP address of the device so that it becomes inaccessible for
configuration. In this mode, no web management interface is available, and CLI works in debug mode
only. From this mode, you can return to Managed mode by pressing the Mode button on the device.
All modes are maintained through power cycles. The Managed Mode LED provides an indication of the
current mode (see "On the PowerConnect 28xx front panel there is a Managed Mode LED monitoring
the switch node as well as indicating diagnostic test results. The following table describes the Managed
Mode LED indications. For more information about management modes and transitioning between
them, see "Management Modes" on page 50." on page 22).
— Provides switch management through the web interface. From Managed mode,
— In this mode, the device does not have an IP address; STP is disabled; there is no
— This mode keeps the existing configuration active, but it prevents users from making
Default Values
The factory default values, used when the device is in Unmanaged mode, include:
•IP Address — 192.168.2.1
•Netmask — 255.255.255.0
•Username — admin
•Permission — R/W privilege
•DHCP Client — Off
•Flow Control — On
•STP — Off
Dell PowerConnect 28xx Systems User Guide49
Transitioning Between Modes
The following diagram summarizes movement between modes:
Figure 4-2. Transitioning Between Management Modes
50Dell PowerConnect 28xx Systems User Guide
Returning to Managed Mode
When returning to Managed mode from either Unmanaged or Secure mode, the Restore Saved
Configuration page appears. This page can be used to retrieve a saved configuration. You can also change
the device IP address using this page.
Figure 4-3. Restore Saved Configuration
•
Local Configuration
•
Server IP Address/File Name
•
Use Saved IP/User Name/Password —
— No saved configuration is loaded.
— Loads a previously saved configuration.
When restoring local configuration, this option uses the IP
address, user name and password that were automatically saved when you exited Managed mode.
When restoring a saved configuration, this option uses the IP address, user name and password inside
the saved configuration.
Use Current IP/User Name/Password —
•
When restoring local configuration, this option uses the
system default IP address, user name and password.
•
Apply Changes
— The selected configuration is restored and the device reboots.
Dell PowerConnect 28xx Systems User Guide51
52Dell PowerConnect 28xx Systems User Guide
Using Dell OpenManage Switch Administrator
This section provides an introduction to the user interface.
Understanding the Interface
The home page contains the following views:
•
Tree View
of the features and their components.
•
Device View
device, an information or table area, and configuration instructions.
Figure 5-1. Switch Administrator Components
— Located on the left side of the home page, the tree view provides an expandable view
— Located on the right side of the home page, the device view provides a view of the
5
Table 5-1 lists the interface components with their corresponding numbers.
Dell PowerConnect 28xx Systems User Guide53
Table 5-1. Interface Components
Component Name
1The tree view contains a list of the different
device features. The branches in the tree view
can be expanded to view all the components
under a specific feature, or retracted to hide the
feature's components. By dragging the vertical
bar to the right, the tree area can be expanded to
display the full name of a component.
2The device view provides information about
device ports, current configuration and status,
table information, and feature components.
Depending on the option selected, the area at
the bottom of the device view displays other
device information and/or dialogs for configuring
parameters.
3 The components list contains a list of the feature
components. Components can also be viewed by
expanding a feature in the tree view.
4 The information buttons provide access to
information about the device and access to Dell
Support. For more information, see "Information
Buttons."
Device Representation
The PowerConnect home page contains a graphical device representation of the front panel.
Figure 5-2. Port LED Indicators
54Dell PowerConnect 28xx Systems User Guide
The port coloring indicates if a specific port is currently active. Ports can be the following colors:
Table 5-2. Led Indicators
Component Name
Port Indicators
GreenThe port is currently enabled.
RedAn error has occurred on the port.
BlueThe port is currently disabled.
NOTE: The Port LEDs are not reflected in PowerConnect front panel in the PowerConnect OpenManage Switch
Administrator. LED status can only be determined by viewing the actual device. For more information about LEDs,
see "LED Definitions" on page 21.
Using the Switch Administrator Buttons
This section describes the buttons found on the OpenManage Switch Administrator interface.
Information Buttons
Information buttons provide access to on-line support and online help, as well as information about the
OpenManage Switch Administrator interfaces.
Table 5-3. Information Buttons
Button Description
SupportOpens the Dell Support page at
support.dell.com.
HelpOnline help containing information to assist in
configuring and managing the
online help pages are linked directly to the page
currently open. For example, if the IP Addressing page is open, the help topic for that
page opens when Help is clicked.
AboutContains the version and build number and Dell
copyright information.
Log OutLogs out of the application and closes the
browser window.
device
. The
Dell PowerConnect 28xx Systems User Guide55
Device Management Buttons
Device Management buttons provide an easy method of configuring device information, and includes
the following:
Table 5-4. Device Management Buttons
ButtonDescription
Apply ChangesApplies changes to the device.
AddAdds information to tables or dialogs.
Te ln e tStarts a Telnet session.
QueryQueries tables.
Show AllDisplays the
Left arrow/Right arrow Moves information between lists.
RefreshRefreshes device information.
Reset All CountersClears statistic counters.
PrintPrints the Network Management System page and/or
table information.
DrawCreates statistics charts on-the-fly.
device tables.
Starting the Application
1
Open a web browser.
2
Enter the device’s IP address (as defined in the CLI) in the address bar and press <Enter>.
For information about assigning an IP address to a device, see "Static IP Address and Subnet Mask."
3
When the
management modes, see "Management Modes" on page 49.
4
Click OK.
The
Enter Network Password
NOTE: The device is not configured with a default password, and can be configured without entering a
password. For information about recovering a lost password, see “Password Recovery.
NOTE: Passwords are both case sensitive and alpha-numeric.
NOTE: The device can be managed via web interface only in Managed mode. For more information about
When you login to the device, you are automatically assigned one of the following modes, based upon
the access level assigned to you:
56Dell PowerConnect 28xx Systems User Guide
•
Management
•
Monitor
— This is a read-write mode where you can see and edit all pages of the interface.
— This is a read-only mode where you can see a subset of the interface pages, but you cannot
edit them.
For more information about setting the access level, see ("Defining the Local User Databases" on
page 69).
Dell PowerConnect 28xx Systems User Guide57
58Dell PowerConnect 28xx Systems User Guide
Configuring System Information
This section provides information for defining system parameters including security features,
downloading device software, and resetting the device. To open the System page, click System in the
tree view.
Figure 6-1. System
6
Defining General Device Information
The General page contains links to pages for configuring device parameters.
Viewing Device Information
The Asset page contains parameters for configuring general device information, including the
system name, location, and contact, the system MAC Address, System Object ID, date, time, and
System Up Time. To open the Asset page, click System
→ General → Asset in the tree view.
Update with your book title59
Figure 6-2. Asset
•
System Name (0-159 Characters)
•
System Contact (0-159 Characters)
•
System Location (0-159 Characters)
•
MAC Address
•
Sys Object ID
— Specifies the device MAC address.
— Specifies the vendor's authoritative identification of the network management
— Defines the user-defined device name.
— Specifies the name of the contact person.
— Specifies the location where the system is currently running.
subsystem contained in the entity.
•
Service Tag
•
Asset Tag (0-16 Characters)
•
Serial No.
•
Date (DD/MMM/YY
— Specifies the service reference number used when servicing the device.
— Specifies the user-defined device reference.
— Specifies the device serial number.
) — Specifies the current date. The format is day, month, year, for example,
10/NOV/02 is November 10, 2002.
•
Time (HH:MM:SS)
— Specifies the time. The format is hour, minute, second, for example, 20:12:03
is eight twelve and three seconds in the evening.
•
System Up Time
— Specifies the amount of time since the last device reset. The system time is
displayed in the following format: Days, Hours, Minutes and Seconds. For example, 41 days, 2 hours,
22 minutes and 15 seconds.
60Update with your book title
Defining System Information:
1
Open the
2
Define the relevant fields.
3
Click
Asset
page.
Apply Changes
.
The system parameters are defined, and the device is updated.
Initiating a Telnet Session:
1
Open the
2
Click
Asset
Te ln et
page.
.
A Telnet session is initiated.
Viewing the Versions Page
The Ver si on s page contains information about the hardware and software versions currently running. To
open the Ve rs io ns
Figure 6-3. Versions
page, click System→ General→ Vers ion s in the tree view.
•
Software Version
•
Boot Version
•
Hardware Version
— The current software version running on the device.
— The current Boot version running on the device.
— The current hardware version.
Update with your book title61
Resetting the Device
The Reset page enables the device to be reset from a remote location. For more information about saved
Configuration files, see "Managing Files" on page 80
. To op en th e Reset
Reset in the tree view.
Figure 6-4. Reset
Resetting the Device
1
Open the
2
Click
Reset page
reset
.
A confirmation message displays.
3
Click OK.
The device is reset. After the device is reset, a prompt for a user name and password displays.
page, click System → General →
4
Enter a user name and password to reconnect to the Web Interface.
62Update with your book title
Entering Secure Mode
The Secure Mode page allows you to put the device in the
prevents users from making any further configuration changes to the switch. This is done by removing
the IP address of the switch so that it becomes inaccessible. In Secure Mode the switch retains
configuration through power cycles just like in Managed Mode.
To use Secure Mode, configure the device in Managed Mode, and then switch to Secure Mode via the
web interface. To exit Secure Mode, press the Managed Mode button on the device to enter the
Managed Mode default configuration with the default IP address of 192.168.2.1. For information about
management modes, see "Management Modes" on page 49. For information about saving Configuration
files, see "Managing Files" on page 80
.
To open the Secure Mode page, click System → General → Secure Mode in the tree view.
Figure 6-5. Secure Mode
Secure
management mode. Once enabled, it
Entering Secure Mode
1
Open the
2
Click
Secure Mode page.
Secure
.
A confirmation message displays.
3
Click OK.
The device enters Secure mode.
Update with your book title63
Defining Device IP Addresses
The IP Addressing page contains links for assigning interface and default gateway IP addresses, and
enabling or disabling DHCP.
To open the IP Addressing page, click System
Defining IP Interface Parameters
The IP Interface Parameters page is used to select whether the device IP address, mask and/or gateway is
assigned statically, or dynamically using DHCP. The page is also used to make static assignments, and to
approve dynamic assignments received from the DHCP server before they go into affect (until approval,
the old address is used).
To op en th e
the tree view.
Figure 6-6. IP Interface Parameters
IP Interface Parameters page, click System→ IP Addressing → IP Interface Parameters in
→ IP Addressing in the tree view.
•
DHCP
— The DHCP client can be enabled to acquire the network configuration dynamically. The
DHCP default value is Disable. This field enables the DHCP client.
•
IP Address
•
Subnet Mask
•
Default Gateway
•
DHCP IP Address
•
DHCP Subnet Mask
64Update with your book title
— Specifies the static IP Address currently assigned to the device.
— Specifies the subnet mask of the static IP Address, currently assigned to the device.
— Specifies the static Default Gateway Address, currently assigned to the device.
— Specifies the IP Address received from the DHCP server.
— Specifies the Subnet Mask received from the DHCP server.
•
DHCP Default Gateway
•
Apply DHCP Address
Address, received from the DHCP server.
Enabling DHCP:
1
Open the
2
Set
3
Click the
4
Click
DHCP is enabled and the device is updated.
Setting static IP Interface parameters:
1
Open the
2
Set
3
Set the
4
Click
The static interface parameters are set and the device is updated.
IP Interface Parameters
DHCP
to
Enable
Apply DHCP Address
Apply Changes
IP Interface Parameters
DHCP
to
Disable
IP Address, Subnet Mask
Apply Changes
— Defines the Default Gateway Address received from the DHCP server.
— Activates the IP Address, Subnet Mask Address, and Default Gateway
page
.
.
checkbox.
.
page
.
.
and
Default Gateway
.
.
Running Cable Diagnostics
The Diagnostics page contains links to pages for performing virtual cable tests on copper and fiber optics
cables.To open the Diagnostics page, click System → Diagnostics in the tree view.
Viewing Copper Cable Diagnostics
The Integrated Cable Test for Copper Cables page contains fields for performing tests on copper cables.
Cable testing provides information about where errors occurred in the cable, the last time a cable test
was performed, and the type of cable error which occurred. The tests use Time Domain Reflectometry
(TDR) technology to test the quality and characteristics of a copper cable attached to a port. Cables up
to 120 meters long can be tested. Cables are tested when the ports are in the down state, with the
exception of the Approximated Cable Length test. The cable length returned is an approximation in the
ranges of up to 50 meters, 50m-80m, 80m-110m, 110m-120m, or more than 120m. The deviation may be
up to 20 meters.
To open the Integrated Cable Test for Copper Cables page, click System→ Diagnostics→ Integrated Cable Test in the tree view.
Update with your book title65
Figure 6-7. Integrated Cable Test for Copper Cables
•
Port
— The port to which the cable is connected.
•
Test Result
–
No Cable
–
Open Cable
–
Short Cable
–
OK
–
Fiber Cable
•
Cable Fault Distance
•
Last Update
•
Approximate Cable Length
— The cable test results. Possible values are:
— There is no cable connected to the port.
— The cable is connected on only one side.
— The cable is 2 meters long.
— The cable passed the test.
— A fiber cable is connected to the port.
— The distance from the port where the cable error occurred.
— The last time the port was tested.
— The approximate cable length. This test can only be performed when
the port is up and operating at 1 Gbps.
Performing a Cable Test
1
Ensure that both ends of the copper cable are connected to a device.
2
Open the
3
Click
Integrated Cable Test for Copper Cables
Test No w
.
The copper cable test is performed, and the results are displayed on the
Copper Cables
page.
66Update with your book title
page.
Integrated Cable Test for
Displaying Virtual Cable Test Results Table
1
Open the
2
Click
The
Viewing Optical Transceiver Diagnostics
Integrated Cable Test for Copper Cables
Show All
Virtual Cable Test Results Table
.
opens.
page.
The Optical Transceiver Diagnostics page contains fields for performing tests on Fiber Optic cables.
Optical transceiver diagnostics can be performed only when the link is present. To open the Optical Transceiver Diagnostics page, click System→ Diagnostics→ Optical Transceiver Diagnostics in the tree
view.
Figure 6-8. Optical Transceiver Diagnostics
•
Port
— The port to which the fiber cable is connected.
•
Te mp e ra t ur e
•
Vo lt ag e
•
Current
•
Output Power
•
Input Power
•
Transmitter Fault
— The voltage at which the cable is operating.
— The current at which the cable is operating.
— The temperature (in Celsius) at which the cable is operating.
— The rate at which the output power is transmitted.
— The rate at which the input power is transmitted.
— Indicates if a fault occurred during transmission.
Update with your book title67
•
Loss of Signal
•
Data Ready
Displaying Optical Transceiver Diagnostics Test Results Table
1
Open the
2
Click
Show All
— Indicates if a signal loss occurred in the cable.
— The transceiver has achieved power up and data is ready.
Optical Transceiver Diagnostics
page.
.
The test is run and the Virtual Cable Test Results Table opens with the following columns:
•
Te mp
— Internally measured transceiver temperature.
•
Vo lt ag e
•
Current
•
Output Power
•
Input Power
•
TX Fault
— Internally measured supply voltage.
— Measured TX bias current.
— Measured TX output power in milliwatts.
— Measured RX received power in milliwatts.
— Transmitter fault.
Finisair transceivers do not support the transmitter fault diagnostic testing.
•
LOS
— Loss of signal.
•
Data Ready
•
N/A
— Not Available, N/S - Not Supported, W - Warning, E - Error.
— The transceiver has archived power up and data is ready.
Fiber Optic analysis feature works only on SFPs that support the digital diagnostic standard SFF-4872.
68Update with your book title
Managing Device Security
The Management Security page provides access to security pages that contain fields for setting security
parameters for user database, password and RADIUS security. To open the Management Security page
click System→Management Security in the tree view.
Defining the Local User Databases
The Local User Database page contains fields for defining users, passwords and access levels. To open the
Local User Database
Figure 6-9. Local User Database
page, click System→ Management Security→ Local User Database in the tree view.
,
•
User Name
•
Access Level
level. Users with access level 15 are Privileged Users, and only they can access and edit all pages of the
OpenManage Switch Administrator.
•
Password (0-64 Characters)
•
Confirm Password
•
Remove
Assigning Access Rights to a User:
1
Open the
2
Select a user in the
3
Define the fields.
— List of users.
— User access level. The lowest user access level is 1 and 15 is the highest user access
— User-defined password.
— Confirms the user-defined password.
— Removes users from the
Local User Database page.
User Name
field.
User Name
list, when selected.
Update with your book title69
4
Click
Apply Changes
.
The user access rights and passwords are defined, and the device is updated.
Defining a New User:
1
Open the
2
Click
The
Figure 6-10. Add a User
3
Define the fields.
4
Click
Local User Database page.
Add
.
Add User page opens:
Apply Changes
.
The new user is defined, and the device is updated.
Displaying the Local User Table:
1
Open the
2
Click
The
Figure 6-11. Local User Table
Deleting Users:
1
Open the
Local User Database page.
Show All.
Local User Table
opens:
Local User Database page.
70Update with your book title
2
Click
Show All.
The
3
Select a
4
Select the
5
Click
Local User Table
User Name.
Remove
Apply Changes
opens.
check box.
.
The selected user is deleted and the device is updated.
Configuring RADIUS Global Parameters
Remote Authorization Dial-In User Service
RADIUS servers provide a centralized authentication method for:
•Telnet Access
•Web Access
•Console to Device Access
To open the RADIUS Settings page, click System → Management Security → RADIUS in the tree view.
Figure 6-12. RADIUS Settings
(RADIUS) servers provide additional security for networks.
•
IP Address
— The list of Authentication Server IP addresses.
Update with your book title71
•
Priority (0-65535)
— Specifies the server priority. The possible values are 0-65535, where 0 is the
highest value. This is used to configure the order in which servers are queried.
•
Authentication Port
— Identifies the authentication port. The authentication port is used to verify
the RADIUS server authentication.
•
Number of Retries (1-10)
— Specifies the number of transmitted requests sent to RADIUS server
before a failure occurs. The possible field values are 1 - 10. Three is the default value.
•
Timeout for Reply (1-30
) — Specifies the amount of the time in seconds the device waits for an
answer from the RADIUS server before retrying the query, or switching to the next server. The possible
field values are 1 - 30. The default is 3.
•
Dead Time (0-2000)
— Specifies the amount of time (in seconds) that a RADIUS server is bypassed
for service requests. The range is 0-2000.
•
Key String (0-128 Characters)
— Specifies the Key string used for authenticating and encrypting all
RADIUS communications between the device and the RADIUS server. This key is encrypted.
•
Source IP Address
— Specifies the source IP address that is used for communication with RADIUS
servers.
If host-specific Timeouts, Retries, or Dead time values are not specified, the Global values (Defaults) are
applied to each host. The following fields set the RADIUS default values:
•
Default Retries (1-10)
— Specifies the default number of transmitted requests sent to RADIUS server
before a failure occurs.
•
Default Timeout for Reply (1-30)
— Specifies the default amount of the time (in seconds) the device
waits for an answer from the RADIUS server before timing out.
•
Default Dead time (0-2000)
— Specifies the default amount of time (in seconds) that a RADIUS
server is bypassed for service requests. The range is 0-2000.
•
Default Key String (0-128 Characters)
— Specifies the Default Key string used for authenticating and
encrypting all RADIUS communications between the device and the RADIUS server. This key is
encrypted.
•
Source Address
— Specifies the source IP address that is used for communication with RADIUS
servers.
Defining RADIUS Parameters:
1
Open the
2
Define the fields.
3
Click
RADIUS Settings
Apply Changes
.
The RADIUS setting are updated to the device.
Adding a RADIUS Server:
1
Open the
RADIUS Settings
72Update with your book title
page.
page.
2
Click
Add
.
The
Add RADIUS Server
Figure 6-13. Add RADIUS Server Page
3
Define the fields.
4
Click
Apply Changes
page opens:
.
The new RADIUS server is added, and the device is updated.
Displaying the RADIUS Server List:
1
Open the
2
Click
The
RADIUS Settings
Show All
.
page.
Show all RADIUS Servers page opens:
Figure 6-14. Show all RADIUS Servers
Modifying the RADIUS Server Settings:
1
Open the
RADIUS Settings
page.
Update with your book title73
2
Click
Show All
The
RADIUS Servers List
3
Modify the relevant fields.
4
Click
Apply Changes
The RADIUS Server settings are modified, and the device is updated.
Deleting a RADIUS Server for the RADIUS Servers List:
1
Open the
2
Click
Show All
The
RADIUS Servers List
3
Select a RADIUS Server in the
4
Select the
5
Click
Apply Changes
The RADIUS server is removed from the
.
page opens.
.
RADIUS Settings
.
page opens.
Remove check box.
.
page.
RADIUS Servers List
RADIUS Servers List
.
.
Defining SNMP Parameters
Simple Network Management Protocol (SNMP) provides a method for managing network devices.
Devices supporting SNMP run a local software (agent).
The SNMP agents maintain a list of variables, which are used to manage the device. The variables are
defined in the Management Information Base (MIB). The MIB contains the variables controlled by the
agent. The SNMP protocol defines the MIB specification format, as well as the format used to access the
information over the network.
Access rights to the SNMP agents are controlled by access strings. To communicate with the device, the
Embedded Web Server submits a valid community string for authentication. To open the SNMP page,
click System → SNMP in the tree view.
This section contains information for managing the SNMP configuration.
74Update with your book title
Defining SNMP Global Parameters
The SNMP Global Parameters page permits enabling both SNMP and Authentication notifications.To
open the SNMP Global Parameters page, click System → SNMP → Global Parameters in the tree view.
Figure 6-15. Global Parameters
•
SNMP Notifications
•
Authentication Notifications
authentication fails.
Enabling SNMP Notifications
1
Open the
2
Select
3
Click
SNMP Global Parameters
Enable
Apply Changes
SNMP notifications are enabled, and the device is updated.
— Enables or disables the device sending SNMP notifications.
— Enables or disables the device sending SNMP traps when
page.
in the
SNMP Notifications
field.
.
Enabling Authentication Notifications
1
Open the
2
Select Enable in the
3
Click
SNMP Global Parameters
Authentication Notifications
Apply Changes
.
page.
field.
Update with your book title75
Defining Communities
Access rights are managed by defining communities in the Community Table. When the community
names are changed, access rights are also changed.To open the SNMP Community page, click System → SNMP → Community in the tree view.
Figure 6-16. SNMP Community
•
SNMP Management Station
•
Community String
— Functions as a password and used to authenticate the selected management
station to the device.
•
Access Mode
–
Read Only
— Defines the access rights of the community. The possible field values are:
— The management access is restricted to read-only, for all MIBs except the
community table, for which there is no access.
–
Read Write
— The management access is read-write, for all MIBs except the community table, for
which there is no access.
–
SNMP Admin
— The management access is read-write for all MIBs, including the community
table.
•
Remove
Defining a New Community
1
Open the
2
Click
The
— Removes a community, when selected.
SNMP Community
Add
.
Add SNMP Community
76Update with your book title
— A list of management station IP addresses.
page.
page opens:
Figure 6-17. Add SNMP Community
3
Select one of the following:
–
SNMP Management Station
–
All
— Defines an SNMP community for all management stations.
4
Define the remaining fields.
5
Click
Apply Changes
.
— Defines an SNMP community for a specific management station.
The new community is saved, and the device is updated.
Displaying all Communities
1
Open the
2
Click
The
Figure 6-18. Community Table
SNMP Community
Show All.
Community Table
page.
opens:
Deleting Communities
1
Open the
2
Click
The
3
Select a community from the
Community Table
Show All.
Community Table
page.
opens.
Community Table.
Update with your book title77
4
Select the
5
Click
The selected community entry is deleted, and the device is updated.
Remove
Apply Changes
check box.
.
Defining SNMP Notification Recipients
The Notification Recipients page contains information for defining filters that determine whether traps
are sent to specific users, and the trap type sent. SNMP notification filters provide the following services:
•Identifying Management Trap Targets
•Trap Filtering
•Selecting Trap Generation Parameters
•Providing Access Control Checks
To open the Notification Recipients page, click System → SNMP → Notification Recipient in the
tree view.
Figure 6-19. Notification Recipients
•
Recipient IP
•
Community String
station to the device.
•
Notification Version
–
SNMPv1
78Update with your book title
— Indicates the IP address to whom the traps are sent.
— Functions as a password and used to authenticate the selected management
— Determines the trap type. The possible field values are:
— SNMP Version 1 traps are sent.
–
SNMPv2
•
Remove Notification Recipient
Adding a new Trap Recipients
1
Open
2
Click
Add
— SNMP Version 2 traps are sent.
Notification Recipients
page.
.
— When checked, removes selected notification recipients.
The Add Notification Recipients page opens:
3
Define the relevant fields.
4
Click
Apply Changes
.
The notification recipient is added, and the device is updated.
Displaying Notification Recipients Tables
1
Open
2
Notification Recipients
Click
Show All
.
page.
The Notification Recipients Tables page opens:
Figure 6-20. Notification Recipients Tables
Deleting Notification Recipients
1
Open
Notification Recipients
page.
Update with your book title79
2
Click
Show All
The Notification Recipients Tables page opens.
3
Select a notification recipient.
4
Check the
5
Click
Apply Changes
.
Remove
checkbox.
. The recipient is deleted, and the device is updated.
Managing Files
The File Management page contains fields for managing device software, the Image Files, and the
Configuration Files. Files can be downloaded from a TFTP server.
The configuration file structure consists of the following configuration files:
•
Startup Configuration File
settings as when the device is powered down or rebooted.
•
Running Configuration File
during the current session. After the device is powered down or rebooted, all commands stored in the
Running Configuration file are lost. During the startup process, all commands in the Startup file are
copied to the Running Configuration File and applied to the device. During the session, all new
commands entered are added to the commands existing in the Running Configuration file.
Commands are not overwritten.
Image File
•
from the image.
To op en th e File Management page, click System → File Management in the tree view.
— System file images are saved in a Flash File called an image. The device boots and runs
— Contains the commands required to reconfigure the device to the same
— Contains all Startup file commands, as well as all commands entered
Downloading Files
The File Download From Server page contains fields for downloading system image and Configuration
files from the TFTP server or HTTP client to the device. To open the File Download From Server page,
click System → File Management → File Download in the tree view.
80Update with your book title
Figure 6-21. File Download From Server
•
Firmware Download —
Configuration Download
•
Configuration Download —
selected, the
•
Download via TFTP
•
Download via HTTP
Firmware Download
The Firmware file is downloaded. If
fields are grayed out.
The Configuration file is downloaded. If
— Enables initiating an image download via the TFTP server.
— Enables initiating an image download via the HTTP server.
fields are grayed out.
Firmware Download
Configuration Download
is selected, the
is
Firmware Download
•
Server IP Address —
•
Source File Name —
•
Destination File Name
possible field values are:
–
Software Image
–
Boot Code
Configuration Download
•
Server IP Address
The Server IP Address from which the firmware files are downloaded.
Indicates the file to be downloaded.
— The destination file to which the configuration file is downloaded. The
— Downloads the software image file.
— Downloads the boot file.
— The Server IP Address from which the configuration files are downloaded.
Update with your book title81
•
Source File Name (1-64 Characters)
— Indicates the configuration files to be downloaded.
During the image file download, a dialog box opens which displays the download progress.
Downloading Files
1
Open the
2
Define the fields.
3
Click
File Download From Server
Apply Changes
.
page.
The software is downloaded to the device.
Uploading Files
The File Upload to Server page contains fields for uploading the Configuration file from the device to
the TFTP server. To open the File Upload to Server page, click System → File Management → File Upload in the tree view.
Figure 6-22. File Upload to Server
The File Upload to Server page contains the following fields:
•
Upload via TFTP
•
Upload via HTTP
•
TFTP Server IP Address
•
Destination File Name (1-64 Characters) —
— Enables initiating a configuration file upload via the TFTP server.
— Enables initiating a configuration file upload via the FTP server.
— The Server IP Address to which the file is uploaded.
Indicates the file path to which the file is uploaded.
82Update with your book title
Uploading Files
1
Open the
2
Define the fields.
3
Click
The software is uploaded to the device.
File Upload to Server
Apply Changes
page.
.
Restoring Default Settings
The Restore Defaults page allows you to restore the device settings to their factory default values. To
open the Restore Defaults page, click System → File Management → Restore Defaults in the tree view.
Figure 6-23. Restore Defaults
The Restore Defaults page contains the following field:
•
Restore Configuration Factory Defaults
Restoring Default Settings
1
Open the
2
Check the
3
Click
The settings are restored.
Restore Defaults
Restore Configuration Factory Defaults
Apply Changes
page.
.
— Sets the device settings to their factory default values.
checkbox.
Defining DHCP Server Settings
The DHCP server is used mainly for centralized control over assignment of IP addresses to attached
hosts.
A switch can operate as either a DHCP client (obtaining its own IP from a DHCP server) and as a DHCP
server.
Update with your book title83
The DHCP server uses a defined pool of IP addresses (user-defined) from which it allocates IP addresses
to DHCP clients.
The DHCP server can allocate IP addresses in three configuration modes:
•
Static allocation
— The network administrator maps the hardware address of a host to an IP address
on the DHCP server.
•
Permanent allocation
— An IP address received through a standard request-reply mechanism is owned
by a client permanently (unless changes in the network environment/connections take place, for any
reason).
•
Dynamic allocation
— A network device obtains a leased IP address for a specified period of time. The
IP address is revoked at the end of this period and the switch must request another IP address.
This section contains information for configuring a DHCP server on a DHCP-server-enabled switch.
To open the DHCP Server page, click System
→ DHCP Server in the tree view.
Configuring DHCP Properties
The DHCP Server Properties page contains fields for enabling the DHCP server and configuring pinging
capability. The DHCP Server pings a pool address before assigning this address to a requesting client. If
the ping is unanswered, the DHCP Server assumes (with a high probaility) that the address is not in use
and assigns the address to the requesting client. To open the DHCP Server Properties page, click System
→ DHCP Server → DHCP Server Properties in the tree view.
Figure 6-24. DHCP Server Properties
•
DHCP Server Status
–
Enable
— Enables the DHCP server.
–
Disable
— Disables the DHCP server. This is the default value.
— Indicates if the DHCP server is enabled. The possible field values are:
84Update with your book title
•
DHCP Ping
— Indicates if the DHCP server is set to ping the offered IP address before responding to
a client request, to ensure that the address is not in use. The possible field values are:
–
Enable
— Enables ping on the DHCP server.
–
Disable
•
DHCP Ping Retries
— Disables ping on the DHCP server. This is the default value.
— Optionally specifies the number of pings that are sent before an IP address can
be assigned to a requesting client. The range is 1 to 10 and the default value is two.
–
Use Default
•
DHCP Ping Timeout
— Reverts to the default Ping Retries setting (2 retries).
— Optionally specifies the amount of time (in milliseconds) the DHCP server
waits for a ping reply before it stops attempting to reach a pool address, prior to assigning this address
to a requesting client. Default timeout is 500 milliseconds.
–
Use Default
Enabling the DHCP Server
1
Open the
2
Select
Enable
3
Optionally, select
4
Define the number of ping retries in the
— Reverts to the default Ping Timeout (500 milliseconds).
DHCP Server Properties
in the
DHCP Server Status
Enable
in the
page.
field.
DHCP Ping
field to enable ping globally.
DHCP Ping Retries
field, or click
Use Default
to select the
default number of two retries.
5
Define the amount of time (in milliseconds) the DHCP server waits for a ping reply in the
Ping Timeout
6
Click
field, or click
Apply Changes
.
Use Default
to select the default timeout of 500 milliseconds.
The server is enabled.
DHCP
Defining Network Pool
The Network Pool page displays the DHCP Server's created pool name. The pool name, which is
typically assigned to a network segment, consists of an IP address range from which the DHCP Server
allocates IP addresses to DHCP clients. You can define the lease duration of the network pool.
To open the Network Pool page, click System
→ DHCP Server → Network Pool in the tree view.
Update with your book title85
Figure 6-25. Network Pool
•
Subnet IP Address
•
Network Mask
•
Prefix Length
•
Address Pool Start —
•
Address Pool End —
•
Lease Duration
— Specifies the IP address of the subnet in which the network pool resides.
— Specifies the pool’s network mask.
— Specifies the number of bits that comprise the address prefix.
Specifies the first IP address in the range of the network pool.
Specifies the last IP address in the range of the network pool.
— Specifies the amount of time a DHCP client can use an IP address from this pool.
The total lease duration is 4294967295 seconds, i.e. 49710.2696 days. Thus a lease of 49710 days, 0
hours, 0 minutes and 0 seconds is a legal value, while a lease of 49710 days, 23 hours, 59 minutes and
59 seconds results in an Out of Range alert.
Days
–
–
— Specifies the duration of the lease in number of days. The range is 0 to 49710 days.
Hours
— Specifies the number of hours in the lease. A days value must be supplied before an
hours value can be added. The range is 0 to 23 hours.
–
Minutes
— Specifies the number of minutes in the lease. A days value and an hours value must be
added before a minutes value can be added. The range is 0 to 59 minutes.
–
Infinite
•
Used Pool’s Addresses —
•
Default Router —
•
Domain Name Server —
— Specifies that the duration of the lease is unlimited.
Specifies the number of the pool’s addresses that are currently used.
Specifies the default router for the DHCP client.
Specifies the DNS server available to the DHCP client.
86Update with your book title
•
Domain Name —
Specifies the domain name for a DHCP client. The domain name may contain up
to 32 characters.
•
NetBIOS WINS Server —
•
NetBIOS Node Type —
Specifies the NetBIOS WINS name server available to a DHCP client.
A parameter that informs the workstation how to resolve the NetBIOS name.
Valid node types are:
–
Blank —
–
Broadcast —
The workstation is not informed as to what type of NetBIOS node the client is.
IP broadcast messages are used to register and resolve NetBIOS names to IP
addresses.
–
Peer-to-Peer —
Point-to-point communications with a NetBIOS name server are used to register
and resolve computer names to IP addresses.
–
Mixed —
A combination (mix) of b-node and p-node communications is used to register and
resolve NetBIOS names. M-node first uses b-node; then, if necessary, p-node. M-node is typically
not the best choice for larger networks because its preference for b-node broadcasts increases
network traffic.
Hybrid —
–
A hybrid combination of b-node and p-node is used. When configured to use h-node, a
computer always tries p-node first and uses b-node only if p-node fails. This is the default.
•
SNTP Server —
•
Next Server —
Specifies the time server for the DHCP client.
Specifies the IP address of the next server in the boot process of a DHCP client. If the
next server in the boot process is not configured, the DHCP Server uses inbound interface helper
addresses as boot servers.
•
Next Server Name —
Specifies the name of the next server in the boot process. The server name may
contain up to 64 characters.
•
Image File Name —
Specifies the name of the file that is used as a boot image. The file name may
contain up to 128 characters.
Excluding Addresses
By default, the DHCP Server assumes that all pool addresses may be assigned to DHCP clients. The user
can specify IP addresses that must not be used. These addresses are referred to as excluded addresses. A
single IP address or a range of IP addresses can be excluded.
The Excluded Addresses page lists the excluded addresses. To open the Excluded Addresses page, click
System
→ DHCP Server → Excluded Addresses in the tree view.
Update with your book title87
Figure 6-26. Excluded Addresses
•
Start IP Address —
•
End IP Address —
Adding an Excluded Address
1
Open the
2
Click
Excluded Addresses
Add
.
Displays the first IP address in the range of excluded IP addresses.
Displays the last IP address in the range of excluded IP addresses.
The Add Excluded page opens:
Figure 6-27. Add Excluded
page.
3
Define the relevant fields.
4
Click
Apply Changes
.
The address is excluded, and the device is updated.
Deleting Excluded Addresses
1
Open the
2
Check the
3
Click
Excluded Addresses
Remove
checkbox next to an address.
Apply Changes
page.
. The address is deleted, and the device is updated.
88Update with your book title
Manually Allocating IP Addresses (Static Hosts)
The Static Hosts page is used to manually allocate IP addresses to network hosts. To open the Static
Hosts page, click System
Figure 6-28. Static Hosts
→ DHCP Server → Static Hosts in the tree view.
•
Host Name —
Indicates the host pool name, which can be a string of symbols and an integer (for
example, piy4). The range is up to 32 characters.
•
IP Address —
•
Network Mask —
•
Prefix Length —
•
Client Identifier —
Specifies the IP address that was statically assigned to the host.
Specifies the pool’s network mask.
Specifies the number of bits that comprise the address prefix.
A unique identification of the client specified in dotted hexadecimal notation,
e.g., 01b6.0819.6811.72.
•
MAC Address —
•
Client Name —
Specifies the MAC Address of DHCP static host.
Specifies the name of the client, using a standard set of ASCII characters. The client
name must not include the domain name. The range is up to 32 characters.
•
Default Router —
•
Domain Name Server —
•
Domain Name —
Specifies the default router for the DHCP static host.
Specifies the DNS server available to the DHCP client.
Specifies the domain name for a DHCP static host. The domain name may contain
up to 32 characters.
Update with your book title89
•
NetBIOS WINS Server —
Specifies the NetBIOS WINS name server available to a Microsoft DHCP
static host.
•
NetBIOS Node Type —
Informs the workstation how to resolve the NetBIOS name. Valid node types
are:
–
Blank —
–
Broadcast —
The workstation is not informed as to which type of NetBIOS node the client is.
IP broadcast messages are used to register and resolve NetBIOS names to IP
addresses.
–
Peer-to-Peer —
Point-to-point communications with a NetBIOS name server are used to register
and resolve computer names to IP addresses.
–
Mixed —
A combination (mix) of b-node and p-node communications is used to register and
resolve NetBIOS names. M-node first uses b-node; then, if necessary, p-node. M-node is typically
not the best choice for larger networks because its preference for b-node broadcasts increases
network traffic.
Hybrid —
–
A hybrid combination of b-node and p-node is used. When configured to use h-node, a
computer always tries p-node first and uses b-node only if p-node fails. This is the default.
•
SNTP Server —
•
Next Server —
Specifies the time server for the DHCP static host.
Specifies the IP address of the next server in the boot process of a DHCP client. If the
next server in the boot process is not configured, the DHCP Server uses inbound interface helper
addresses as boot servers.
•
Next Server Name —
Specifies the name of the next server in the boot process. The server name may
contain up to 64 characters.
•
Image File Name —
Specifies the name of the file that is used as a boot image. The file name may
contain up to 128 characters.
Adding a new Static Host
1
Open the
2
Click
Static Hosts
Add
.
The Add Static Host page opens:
90Update with your book title
page.
Figure 6-29. Add Static Host
3
Define the relevant fields.
4
Click
Apply Changes
.
The static host is added, and the device is updated.
Displaying Static Hosts Tables
1
Open the
2
Click
Static Hosts
Show All
page.
.
The Static Hosts Table page opens:
Figure 6-30. Static Hosts Table
Update with your book title91
Deleting Static Hosts
1
Open the
2
Click
Static Hosts
Show All
page.
.
The Static Hosts Table page opens.
3
Check the
4
Click
Remove
checkbox next to a static host.
Apply Changes
. The host is deleted, and the device is updated.
Configuring Address Binding
The Address Binding page displays a list of the DHCP server’s allocated IP addresses and each IP
address’s client identifier, lease expiration time, and allocation type. Open the Address Binding page,
click System
Figure 6-31. Address Binding
→ DHCP Server → Address Binding in the tree view.
•
IP Address
•
Client Identifier
— Displays the IP addresses of the clients whose bindings are displayed.
— A unique identification of the client specified in dotted hexadecimal notation,
e.g., 01b6.0819.6811.72.
•
Lease Expiration
•
Ty p e
— Displays the manner in which the IP address was assigned to the host:
–
Static allocation
— Displays the lease expiration date and time of the host’s IP address.
— The network administrator maps the hardware address of a host to an IP
address on the DHCP server.
–
Permanent allocation
owned by a client permanently (unless changes in the network environment/connections take
place, for any reason).
–
Dynamic allocation
The IP address is revoked at the end of this period and the switch must request another IP address.
92Update with your book title
— An IP address received through a standard request-reply mechanism is
— A network device obtains a leased IP address for a specified period of time.
Defining Advanced Settings
The Advanced Settings page contains information for configuring general settings. Use Advanced
Settings to set miscellaneous global attributes for the device. The changes to these attributes are applied
only after the device is reset. To open the Advanced Settings page, click System
the tree view.
Configuring General Device Parameters
The General Settings page provides information for defining general device parameters.To open the
General Settings page, click System
Figure 6-32. General Settings
→ Advanced Settings → General in the tree view.
→ Advanced Settings in
•
Attribute
•
Current
•
After Reset
•
Jumbo Frames
transportation of identical data in fewer frames. This ensures less overhead, lower processing time, and
fewer interrupts.
— The general setting attribute.
— The currently configured value.
— The future (after reset) value.
— Enables or disables the Jumbo Frames feature. Jumbo Frames enable the
Update with your book title93
94Update with your book title
Configuring Device Switching
This section provides all system operation and general information for configuring network security,
ports, Address tables, GARP, VLANs, Spanning Tree, Port Aggregation, and Multicast Support.
Configuring Network Security
The device enables network security through both Access Control Lists and Locked Ports.
Port Based Authentication (802.1x)
Port based authentication enables authenticating system users on a per-port basis via a external
server. Only authenticated and approved system users can transmit and receive data. Ports are
authenticated via the RADIUS server using the Extensible Authentication Protocol (EAP). Port
Authentication includes:
•
Authenticators
•
Supplicants
services.
•
Authentication Server
performs the authentication on behalf of the authenticator, and indicates whether the user is
authorized to access system services.
Port based authentication creates two access states:
•
Controlled Access
authorized.
•
Uncontrolled Access
The device currently supports Port Based Authentication via RADIUS servers.
— Specifies the port that is authenticated before permitting system access.
— Specifies host connected to the authenticated port requesting to access the system
— Specifies the external server, for example, the RADIUS server that
— Permits communication between the user and the system, if the user is
— Permits uncontrolled communication regardless of the port state.
7
Advanced Port Based Authentication
Advanced Port Based Authentication enables multiple hosts to be attached to a single port.
Advanced Port Based Authentication requires only one host to be authorized for all hosts to have
system access. If the port is unauthorized all attached hosts are denied access to the network.
Advanced Port Based Authentication also enables user based authentication. Specific VLANs in the
device are always available, even if specific ports attached to the VLAN are unauthorized. For
example, Voice over IP does not require authentication, while data traffic requires authentication.
VLANs for which authorization is not required can be defined. Unauthenticated VLANs are
available to users, even if the ports attached to the VLAN are defined as authorized.
Update with your book title95
Advanced Port Based Authentication is implemented in the following modes:
•
Single Host Mode
•
Multiple Host Mode
access. Only one host must be authorized for all hosts to access the network. If the host authentication
fails or an EAPOL-logoff message is received, all attached clients are denied network access.
•
Multiple Session Mode
•
Guest VLANs
access via port-based authorization, but the Guest VLAN is enabled, the port receives limited network
access. For example, a network administrator can use Guest VLANs to deny network access via portbased authentication, but grant Internet access to unauthorized users.
To open the Network Security page select Switch → Network Security.
— Enables only the authorized host for single-session access to the port.
— Enables multiple hosts to be attached to a single port, for single-session
— Enables only the authorized host for multiple-session access to the port.
— Provides limited network access to unauthorized ports. If a port is denied network
Configuring Port Based Authentication
The Port Based Authentication page contains fields for configuring port based authentication and for
enabling Guest VLANs. To open the Port Based Authentication page, click Switch → Network Security → Port Based Authentication.
Figure 7-1. Port Based Authentication
•
Port Based Authentication State
field values are:
–
Enable
— Enables port based authentication on the device.
–
Disable
•
Authentication Method
96Update with your book title
— Disables port based authentication on the device.
— Permits port based authentication on the device. The possible
— The Authentication method used. The possible field values are:
–
None
— No authentication method is used to authenticate the port.
–
RADIUS
–
RADIUS, None
— Port authentication is performed using the RADIUS server.
— Port authentication is performed first using the RADIUS server. If the port is
not authenticated, then no authentication method is used, and the session is permitted.
•
Guest VLAN
— Specifies whether the Guest VLAN is enabled on the device. The possible field values
are:
–
Enable
— Enables using a Guest VLAN for unauthorized ports. If a Guest VLAN is enabled, the
unauthorized port automatically joins the VLAN selected in the VLAN List field.
–
Disable
•
VLAN List
•
Interface
•
User Name
•
Admin Interface Control
–
Auto
— Disables using a Guest VLAN for unauthorized ports. This is the default.
— When Guest VLAN is enabled, this field specifies which VLAN the guest will belong to.
— Contains an interface list.
— The user name as configured in the RADIUS server.
— Defines the port authorization state. The possible field values are:
— Enables port-based authentication on the device. The interface moves between an
authorized or unauthorized state based on the authentication exchange between the device and
the client.
–
ForceAuthorized
— Indicates the interface is in an authorized state without being authenticated.
The interface re-sends and receives normal traffic without client port-based authentication.
–
ForceUnauthorized
— Denies the selected interface system access by moving the interface into
unauthorized state. The device cannot provide authentication services to the client through the
interface.
•
Current Interface Control
•Authentication Type
–
802.1x Only
–
MAC Only
–
802.1x & MAC
— Sets the authentication type to 802.1x based authentication only.
— Sets the authentication type to MAC based authentication only.
— The currently configured port authorization state.
— Specifies the type of authentication on the port. The possible field values are:
— Sets the authentication type to 802.1x based authentication and MAC based
authentication.
•
Dynamic VLAN Assignment
— Indicates whether dynamic VLAN assignment is enabled for this port.
This feature allows network administrators to automatically assign users to VLANs during the RADIUS
server authentication. When a user is authenticated by the RADIUS server, the user is automatically
joined to the VLAN configured on the RADIUS server.
–Port Lock and Port Monitor should be disabled when DVA is enabled.
–Dynamic VLAN Assignment (DVA) can occur only if a RADIUS server is configured, and port
authentication is enabled and set to 802.1x multi-session mode.
–If the Radius Accept Message doesn’t contain the supplicant’s VLAN, the supplicant is rejected.
–Authenticated ports are added to the supplicant VLAN as untagged.
–The following list of VLANs cannot participate in DVA: an Unauthenticated VLAN, a Dynamic
VLAN that was created by GVRP, a Voice VLAN, a Default VLAN and a Guest VLAN.
–Network administrators can delete the supplicant VLAN while the supplicant is logged in. The
supplicant is authorized during the next re-authentication if this supplicant VLAN is re-created or
a new VLAN is configured on the RADIUS server.
•
Guest VLAN
•
Periodic Reauthentication
reauthentication period is defined in the
•
Reauthentication Period (300-4294967295)
— Specifies whether the Guest VLAN is enabled on the interface.
— Reauthenticates the selected port periodically, when enabled. The
Reauthentication Period (300-4294967295) field.
— Indicate the time span in which the selected port is
reauthenticated. The field value is in seconds. The field default is 3600 seconds.
•
Reauthenticate Now
•
Authentication Server Timeout (1-65535)
— Permits immediate port reauthentication, when selected.
— Defines the amount of time that lapses before the
device resends a request to the authentication server. The field value is in seconds. The field default is
30 seconds.
•
Resending EAP Identity Request (30-65535)
— Defines the amount of time that lapses before EAP
request are resent. The field default is 30 seconds.
•
Quiet Period (0-65535)
— The number of seconds that the device remains in the quiet state following
a failed authentication exchange. The possible field range is 0-65535. The field default is 60 seconds.
•
Supplicant Timeout (1-65535)
— The amount of time that lapses before EAP requests are resent to
the user. The field value is in seconds. The field default is 30 seconds.
•
Max EAP Requests (1-10)
— The total amount of EAP requests sent. If a response is not received after
the defined period, the authentication process is restarted. The field default is 2 retries.
Displaying the Port Based Authentication Table
1
Display the
2
Click
The
Port Based Authentication
Show All
.
Port Based Authentication Table
98Update with your book title
page.
opens:
Figure 7-2. Port Based Authentication Table
Termination Cause — The reason for which the port authentication was terminated.
Copy To Checkbox — Copies port parameters from one port to the selected ports.
Select All — Selects all ports in the Port Based Authentication Table.
Copying Parameters in the Port Based Authentication Table
1
Open the
2
Click
The
3
Select the interface in the
4
Select an interface in the
5
Select the
Port Based Authentication page.
Show All
Port Based Authentication Table
.
opens.
Copy Parameters from
Port Based Authentication Table
field.
.
Copy to check box to define the interfaces to which the Port based authentication
parameters are copied.
6
Click
Apply Changes
The parameters are copied to the selected port in the
.
Port Based Authentication Table
is updated.
, and the device
Update with your book title99
Configuring Advanced Port Based Authentication
The Multiple Hosts page provides information for defining advanced port based authentication settings
for specific ports. To open the Multiple Hosts, click Switch →Network Security → Multiple Hosts.
Figure 7-3. Multiple Hosts
•
Port
— The port number for which Advanced Port Based Authentication is enabled.
•Host Authentication
–Single
–
–
•
Action on Single Host Violation
mode, from a host whose MAC address is not the client (supplicant) MAC address. The
Single Host Violation
possible field values are:
–
–
–
•
Tr ap s
— Enables a single authorized host for single-session access to the system.
Multiple Host
system.
Multiple Session
Forward
learned.
Discard
Shutdown
locked until they are activated, or the device is reset.
— Enables or disables sending traps to the host if a violation occurs.
— Forwards the packets from an unknown source, however, the MAC address is not
— Discards the packets from any unlearned source. This is the default value.
— Defines the host authentication type. The possible fields are:
— Enables a single host to authorize multiple hosts for single-session access to the
— Enables a single authorized host for multiple-session access to the system.
— Defines the action to be applied to packets arriving in single-host
Action on
field can be defined only if the
— Discards the packet from any unlearned source and locks the port. Ports remain
Multiple Hosts
field is defined as
Disable
. The
100Update with your book title
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.