Reproduction of these materials in any manner whatsoever without the written permission of Dell Inc.
is strictly forbidden.
Trademarks used in this text: Dell™, the DELL logo, Dell Precision™, OptiPlex™, Latitude™,
PowerEdge™, PowerVault™, PowerConnect™, OpenManage™, EqualLogic™, KACE™,
FlexAddress™ and Vostro™ are trademarks of Dell Inc. Intel, Pentium, Xeon, Core™ and Celero n
are registered trademarks of Intel Corporation in the U.S. and other countries. AMD is a registered
trademark and AMD Opteron™, AMD Phenom™, and AMD Sempron™ are trademarks of Advanced
Micro Devices, Inc. Microsoft
either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other
countries. Red Hat Enterprise Linux
Inc. in the United States and/or other countries. Novell
trademark of Novell Inc. in the United States and other countries. Oracle
of Oracle Corporation and/or its affiliates. Citrix
registered trademarks or trademarks of Citrix Systems, Inc. in the United States and/or other countries.
®
VMware
trademarks of VMWare, Inc. in the United States or other countries.
Other trademarks and trade names may be used in this publication to refer to either the entities claiming
the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and
trade names other than its own.
, Virtual SMP®, vMotion®, vCenter®, and vSphere® are registered trademarks or
®
, Windows®, Windows Server®, MS-DOS® and Windows V ista® are
®
and Enterprise Linux® are registered trademarks of Red Hat,
®
is a registered trademark and SUSE ™ is a
®
, Xen®, XenServer® and XenMotion® are either
®
is a registered trademark
Regulatory Model: E12M
Regulatory Type: E12M001
April 2013 P/N 56NT1 Rev. A03
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 – FOR PROOF ONLY
The R1-2401is a modular switch that is part of the Plasma chassis.
This guide contains the information needed for installing, configuring, and
maintaining the device through the web-based network administrator. In
addition, it contains a subset of the CLI available.
The
CLI Reference Guide,
provides additional information about the CLI commands.
which is available on a documentation CD,
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
The device functions as an IPv6-compliant host, as well as an IPv4 host (also
known as dual stack). This enables device operation in a pure IPv6 network as
well as in a combined IPv4/IPv6 network.
For more information, see "IP Addressing" on page 98.
Head of Line Blocking Prevention
Head of Line (HOL) blocking results in traffic delays and frame loss caused
by traffic competing for the same egress port resources. To prevent HOL
blocking, the device queues packets, and packets at the head of the queue are
forwarded before packets at the end of the queue.
Back Pressure Support
On half-duplex links, the receiving port prevents buffer overflows by
occupying the link so that it is unavailable for additional traffic.
For more information, see "Back Pressure" on page 251.
Virtual Cable Testing (VCT)
VCT detects and reports copper link cabling faults, such as open cables and
cable shorts.
For more information, see "Diagnostics" on page 129.
Auto-Negotiation
Auto-negotiation enables the device to advertise modes of operation. The
auto-negotiation function enables an exchange of information between two
devices that share a point-to-point link segment, and automatically
configures both devices to take maximum advantage of their transmission
capabilities.
The IOM ARC-II devices enhances auto-negotiation by providing port
advertisement. Port advertisement enables the system administrator to
configure the port speeds that are advertised.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
For more information, see "Port Configuration" on page 262 or "LAG
Configuration" on page 268.
Guide\Plasma_UGFeatures.fm
MDI/MDIX Support
Standard wiring for end stations is known as Media-Dependent Interface
(MDI), and standard wiring for hubs and switches is known as Media-Dependent Interface with Crossover (MDIX).
If auto-negotiation is enabled, the device automatically detects whether the
cable connected to an RJ-45 port is MDIX (crossed) or MDI (straight). This
enables both types to be used interchangeably.
If auto-negotiation is not enabled, only MDI (straight) cables can be used.
For more information, see "Port Configuration" on page 262 or "LAG
Configuration" on page 268.
MAC Address Supported Features
MAC Address Capacity Support
The device supports up to 16K MAC addresses and it reserves specific MAC
addresses for system use.
Static MAC Entries
MAC entries can be manually entered in the Bridging Table, as an alternative
to learning them from incoming frames. These user-defined entries are not
subject to aging, and are preserved across resets and reboots.
For more information, see "Address Tables" on page 277.
Self-Learning MAC Addresses
The device enables controlled MAC address learning from incoming packets.
The MAC addresses are stored in the Bridging Table.
For more information, see "Dynamic Addresses" on page 279.
Automatic Aging for MAC Addresses
MAC addresses from which no traffic is received for a given period, are aged
out. This prevents the Bridging Table from overflowing.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
For more information, see "Dynamic Addresses" on page 279.
Guide\Plasma_UGFeatures.fm
VLAN-Aware MAC-Based Switching
The device always performs VLAN-aware bridging. Classic bridging
(IEEE802.1D), in which frames are forwarded based only on their destination
MAC address, is not performed. However, a similar functionality can be
configured for untagged frames. Frames addressed to a destination MAC
address that is not associated with any port are flooded to all ports of the
relevant VLAN.
MAC Multicast Support
Multicast service is a limited Broadcast service that enables one-to-many and
many-to-many connections for information distribution. In Layer 2 Multicast
service, a single frame is addressed to a specific Multicast address, from which
copies of the frame are transmitted to the relevant ports. When Multicast
groups are statically enabled, you can set the destination port of registered
groups, as well as define the behavior of unregistered Multicast frames.
For more information, see "Multicast" on page 345.
Layer 2 Features
IGMP Snooping
Internet Group Membership Protocol (IGMP) Snooping examines IGMP
frame contents, when they are forwarded by the device from work stations to
an upstream Multicast router. From the frame, the device identifies work
stations configured for Multicast sessions, and which Multicast routers are
sending Multicast frames. The IGMP Querier simulates the behavior of a
Multicast router. This enables snooping of the Layer 2 Multicast domain even
if there is no Multicast router.
For more information, see "IGMP Snooping" on page 352.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Port mirroring monitors network traffic by forwarding copies of incoming and
outgoing packets from a monitored port to a monitoring port. Users specify
which target port receives copies of all traffic passing through a specified
source port.
For more information, see "Port Mirroring" on page 273.
Broadcast Storm Control
Storm Control enables limiting the number of Multicast and Broadcast
frames accepted by and forwarded by the device.
When Layer 2 frames are forwarded, Broadcast and Multicast frames are
flooded to all ports on the relevant VLAN. This occupies bandwidth, and
loads all nodes connected on all ports.
For more information, see "Storm Control" on page 271.
VLAN Supported Features
VLAN Support
VLANs are collections of switching ports that comprise a single Broadcast
domain. Packets are classified as belonging to a VLAN, based on either the
VLAN tag or on a combination of the ingress port and packet contents.
Packets sharing common attributes can be grouped in the same VLAN.
For more information, see "VLANs" on page 311.
Port-Based Virtual LANs (VLANs)
Port-based VLANs classify incoming packets to VLANs, based on their ingress
port.
For more information, see "VLAN Membership" on page 315.
Full 802.1Q VLAN Tagging Compliance
IEEE 802.1Q defines an architecture for virtual, bridged LANs, the services
provided in VLANs, and the protocols and algorithms involved in the
provision of these services.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
For more information, see "Virtual LAN Overview" on page 311.
GVRP Support
GARP VLAN Registration Protocol (GVRP) provides IEEE 802.1Qcompliant VLAN pruning and dynamic VLAN creation on 802.1Q trunk
ports. When GVRP is enabled, the device registers and propagates VLAN
membership on all ports that are part of the active underlying Spanning Tree
Protocol topology.
For more information, see "GVRP Parameters" on page 327.
Voice VLAN
Voice VLAN enables network administrators to enhance VoIP service by
configuring ports to carry IP voice traffic from IP phones on a specific VLAN.
VoIP traffic has a preconfigured OUI prefix in the source MAC address.
Network administrators can configure VLANs from which voice IP traffic is
forwarded. Non-VoIP traffic is dropped from the Voice VLAN in Auto-Voice
VLAN Secure mode. Voice VLAN also provides QoS to VoIP, ensuring that the
quality of voice does not deteriorate if the IP traffic is received unevenly.
For more information, see "Voice VLAN" on page 332.
Guest VLAN
Guest VLAN provides limited network access to unauthorized ports. If a port
is denied network access via port-based authorization, but the Guest VLAN is
enabled, the port receives limited network access through the Guest VLAN.
For more information, see "Dot1x Authentication" on page 259.
Private VLAN
The Private VLAN feature provides Layer 2 isolation between ports that share
the same Broadcast domain, or in other words, it creates a point-tomultipoint Broadcast domain. The ports can be located anywhere in the
Layer 2 network.
For more information, see "Private VLAN" on page 329.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
The Multicast TV VLAN feature provides the ability to supply multicast
transmissions to Layer 2-isolated subscribers, without replicating the
multicast transmissions for each subscriber VLAN. The subscribers are the
only receivers of the multicast transmissions.
For more information, see "Multicast TV VLAN" on page 359.
Spanning Tree Protocol Features
Spanning Tree Protocol (STP)
802.1d Spanning tree is a standard Layer 2 switch requirement that enables
bridges to automatically prevent and resolve Layer 2 forwarding loops.
Switches exchange configuration messages using specifically-formatted
frames, and selectively enable and disable forwarding on ports.
For more information, see "Spanning Tree" on page 287.
Fast Link
STP can take 30–60 seconds to converge. During this time, STP detects
possible loops, enabling time for status changes to propagate and for relevant
devices to respond. This period of 30-60 seconds is considered too long a
response time for many applications. The Fast Link option bypasses this
delay, and can be used in network topologies, where forwarding loops do not
occur.
For more information on enabling Fast Link for ports and LAGs, see "STP
Port Settings" on page 292.
IEEE 802.1w Rapid Spanning Tree
Spanning Tree takes 30–60 seconds for each host to decide whether its ports
are actively forwarding traffic. Rapid Spanning Tree (RSTP) detects uses of
network topologies to enable faster convergence, without creating forwarding
loops.
For more information, see "Spanning Tree" on page 287.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Multiple Spanning Tree (MSTP) operation maps VLANs into STP instances.
MSTP provides a different load balancing scenario. Packets assigned to various
VLANs are transmitted along different paths within MSTP Regions (MST
Regions). Regions are one or more MSTP bridges by which frames can be
transmitted. The standard lets administrators assign VLAN traffic to
unique paths.
For more information, see "Spanning Tree" on page 287.
STP BPDU Guard
BPDU Guard is used as a security mechanism, to protect the network from
invalid configurations.
BPDU Guard is usually used either when fast link ports (ports connected to
clients) are enabled or when the STP feature is disabled. When it is enabled
on a port, the port is shut down if a BPDU message is received and an
appropriate SNMP trap is generated.
For more information, see "Spanning Tree" on page 287.
Link Aggregation
Up to 32 Aggregated Links may be defined, each with up to eight member
ports, to form a single Link Aggregated Group (LAG). This enables:
•Fault tolerance protection from physical link disruption
•Higher bandwidth connections
•Improved bandwidth granularity
•High bandwidth server connectivity
A LAG is composed of ports with the same speed, set to full-duplex
operation.
For more information, see "LAG Configuration" on page 268.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
LACP uses peer exchanges across links to determine, on an ongoing basis, the
aggregation capability of various links, and continuously provides the
maximum level of aggregation capability achievable between a given pair of
devices. LACP automatically determines, configures, binds, and monitors the
port binding within the system.
For more information, see "Link Aggregation" on page 339.
BootP and DHCP Clients
DHCP enables additional setup parameters to be received from a network
server upon system startup. DHCP service is an on-going process. DHCP is an
extension of BootP.
For more information, see "IPv6 Interfaces" on page 105.
Quality of Service Features
Class of Service 802.1p Support
The IEEE 802.1p signaling technique is an OSI Layer 2 standard for marking
and prioritizing network traffic at the data link/MAC sub-layer. 802.1p traffic
is classified and sent to the destination. No bandwidth reservations or limits
are established or enforced. 802.1p is a spin-off of the 802.1Q (VLANs)
standard. 802.1p establishes eight levels of priority, similar to the IP
Precedence IP Header bit-field.
For more information about QoS, see "Quality of Service" on page 423.
Advanced QoS
Frames that match an ACL and were permitted entrance are implicitly
labeled with the name of the ACL that permitted their entrance. Advanced
mode QoS actions defined in network policies can then be applied to these
flows.
The switch can set DSCP values and map IPv6 DSCP to egress queues in the
same way it does for IPv4. The switch detects IPv6 frames by the IPv6 ethertype.
For more information about Advanced QoS, see "QoS Advanced Mode" on
page 439.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
The TCP Congestion Avoidance feature activates an algorithm that breaks up
or prevents TCP global synchronization on a congested node, where the
congestion is due to multiple sources sending packets with the same byte
count.
For more information, see "TCP Congestion Avoidance" on page 433.
Device Management Features
SNMP Alarms and Trap Logs
The system logs events with severity codes and timestamps. Events are sent as
SNMP traps to a Trap Recipient List.
For more information, see "SNMP" on page 178
SNMP Versions 1, 2, and 3
Simple Network Management Protocol (SNMP) over the UDP/IP protocol
controls access to the system. A list of community entries is defined, each
consisting of a community string and its access privileges. There are three
levels of SNMP security: read-only, read-write, and super. Only a super user
can access the Community table.
For more information, see "SNMP" on page 178.
.
Web-Based Management
Web-based management enables managing the system from any web browser.
The system contains an Embedded Web Server (EWS) that serves HTML
pages, through which the system can be monitored and configured. The
system internally converts web-based input into configuration commands,
MIB variable settings, and other management-related settings.
Management IP Address Conflict Notification
This feature validates the uniqueness of the switch's IP address, whether it is
assigned manually or through DHCP. If the IP address is not unique, the
switch performs actions according to the address type. If the IP address is
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
static, see more information about this in "IPv4 Interface Parameters" on
page 100. If the IP address is dynamic, see more information about this
in"IPv6 Interfaces" on page 105.
Configuration File Download and Upload
The device configuration is stored in a configuration file. The configuration
file includes both system-wide and port-specific device configuration. The
system can display configuration files as a collection of CLI commands that
are stored and manipulated as text files.
Auto-Update of Configuration/Image File
This feature facilitates installation of new devices. When you enable the
various auto-update options, the device automatically downloads a new
image or configuration file when it receives its IP address from a TFTP server,
and automatically reboots, using the image or configuration file it received.
For more information, see "Auto-Update/Configuration Feature" on page 184.
TFTP Trivial File Transfer Protocol
The device supports boot image, software, and configuration
upload/download via TFTP.
For more information, see "File Management" on page 182.
Remote Monitoring
Remote Monitoring (RMON) is an extension to SNMP that provides
comprehensive network traffic monitoring capabilities. RMON is a standard
MIB that defines MAC-layer statistics and control objects, enabling real-time
information to be captured across the entire network.
For more information, see "Statistics/RMON" on page 397.
Command Line Interface
Command Line Interface (CLI) syntax and semantics conform as much as
possible to common, industry standards. CLI is composed of mandatory and
optional elements. The CLI interpreter provides command and keyword
completion to assist users and save typing.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Syslog is a protocol that enables event notifications to be sent to a set of
remote servers, where they can be stored, examined, and acted upon. The
system sends notifications of significant events in real time, and keeps a
record of these events for after-the-fact usage.
For more information on SYSLOG, see "Logs" on page 86.
SNTP
The Simple Network Time Protocol (SNTP) assures accurate network
Ethernet Switch clock time synchronization up to the millisecond. Time
synchronization is performed by a network SNTP server. Time sources are
prioritized by strata. Strata define the distance from the reference clock. The
higher the stratum (where zero is the highest), the more accurate the clock.
For more information, see "Time Synchronization" on page 64.
Domain Name System
Domain Name System (DNS) converts user-defined domain names into IP
addresses. Each time a domain name is assigned, the DNS service translates
the name into a numeric IP address. For example, www.ipexample.com is
translated into 192.87.56.2. DNS servers maintain domain name databases
containing their corresponding IP addresses.
For more information, see "Domain Name System" on page 121.
802.1ab (LLDP-MED)
The Link Layer Discovery Protocol (LLDP) enables network managers to
troubleshoot, and enhances network management by discovering and
maintaining network topologies over multi-vendor environments. LLDP
discovers network neighbors by standardizing methods for network devices to
advertise themselves to other systems, and to store discovered information.
The multiple advertisement sets are sent in the packet Typ e L en gt h Va lu e
(TLV) field. LLDP devices must support chassis and port ID advertisement,
as well as system name, system ID, system description, and system capability
advertisements.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
by enabling various IP systems to co-exist on a single network LLDP. It
provides detailed network topology information, emergency call service via IP
phone location information, and troubleshooting information.
For more information, see "LLDP" on page 363.
(LLDP-MED) increases network flexibility
Security Features
SSL
Secure Socket Layer (SSL) is an application-level protocol that enables secure
transactions of data through privacy, authentication, and data integrity. It
relies upon certificates and public and private keys.
Port-Based Authentication (Dot1x)
Port-based authentication enables authenticating system users on a per-port
basis via an external server. Only authenticated and approved system users
can transmit and receive data. Ports are authenticated via the Remote
Authentication Dial-In User Service (RADIUS) server using the Extensible
Authentication Protocol (EAP). Dynamic VLAN Assignment (DVA) enables
network administrators to automatically assign users to VLANs during the
RADIUS server authentication.
For more information, see "Dot1x Authentication" on page 259.
Locked Port Support
Locked Port increases network security by limiting access on a specific port to
users with specific MAC addresses. These addresses are either manually
defined or learned on that port. When a frame is seen on a locked port, and
the frame source MAC address is not tied to that port, the protection
mechanism is invoked.
For more information, see "Port Security" on page 234.
RADIUS Client
RADIUS is a client/server-based protocol. A RADIUS server maintains a user
database that contains per-user authentication information, such as user
name, password, and accounting information.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
This feature enables recording device management sessions (Telnet, serial,
and WEB but not SNMP) and/or 802.1x authentication sessions.
Due to the complexity of 802.1x setup and configuration, many mistakes can
be made that might cause loss of connectivity or incorrect behavior. The
802.1x Monitor mode enables applying 802.1x functionality to the switch,
with all necessary RADIUS and/or domain servers active, without actually
taking any action that may cause unexpected behavior. In this way, the user
can test the 802.1x setup before actually applying it.
For more information, see "RADIUS" on page 156.
SSH
Secure Shell (SSH) is a protocol that provides a secure, remote connection to
a device. SSH version 2 is currently supported. The SSH server feature
enables an SSH client to establish a secure, encrypted connection with a
device. This connection provides functionality that is similar to an inbound
telnet connection. SSH uses RSA and DSA Public Key cryptography for
device connections and authentication.
For more information, see "Security Management and Password
Configuration" on page 64.
TAC ACS+
TACACS+ provides centralized security for validation of users accessing the
device. TACACS+ provides a centralized, user management system, while
still retaining consistency with RADIUS and other authentication processes.
For more information, see "TACACS+" on page 153.
Password Management
Password management provides increased network security and improved
password control. Passwords for SSH, Telnet, HTTP, HTTPS, and SNMP
access are assigned security features.
The switch provides the ability to demand strong passwords, meaning that
they must contain both upper and lower-case letters, numbers, and
punctuation marks.
For more information, see "Password Management" on page 142.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
actions and rules for specific ingress ports. Packets entering an ingress port
with an active ACL, are either admitted or denied entry and the ingress port is
disabled. If they are denied entry, the user can disable the port.
For more information, see "Password Management" on page 142
(ACL) enable network managers to define classification
Dynamic ACL/Dynamic Policy Assignment (DACL/DPA)
The network administrator can specify the user's ACL in the RADIUS server.
After successful authentication, the user is assigned that ACL.
For more information, see "ACLs" on page 237.
DHCP Snooping
DHCP Snooping expands network security by providing firewall security
between untrusted interfaces and DHCP servers. By enabling DHCP
Snooping, network administrators can differentiate between trusted
interfaces connected to end-users or DHCP servers and untrusted interfaces
located beyond the network firewall.
For more information, see "DHCP Snooping" on page 387.
ARP Inspection
Dynamic ARP inspection is a security feature that validates ARP packets in a
network. It intercepts, logs, and discards ARP packets with invalid IP-to-MAC
address bindings. This capability protects the network from certain man-inthe-middle attacks.
For more information, see "Dynamic ARP Inspection" on page 377.
Port Profile (CLI Macro)
Macros provide a convenient way to save and share a common configuration.
A macro is a set of CLI commands with a unique name. When a macro is
applied to a port, the CLI commands contained within it are executed and
added to the Running Configuration file.
For more information, see "Port Profile" on page 257.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Dynamic Host Configuration Protocol (DHCP) provides a means of passing
configuration information (including the IP address of a TFTP server and a
configuration file name) to hosts on a TCP/IP network. The switch can serve
as a DHCP server or client.
For more information on the device serving as a DHCP server, see "SNMP" on
page 161.
Protected Ports
The Protected Ports feature provides Layer 2 isolation between interfaces
(Ethernet ports and LAGs) that share the same Broadcast domain (VLAN)
with other interfaces.
For more information, see "Protected Ports" on page 255.
Proprietary Protocol Filtering
This feature enables user control over the filtering of packets with proprietary
protocols such as CDP, VTP, DTP, UDLD, PaGP, and SSTP. The user can
select any combination of the protocols to be filtered, for example: CDP and
VTP.
For more information, see "Proprietary Protocol Filtering" on page 255.
Identifying a Switch via LED
The switch provides the ability to turn on a LED (through the GUI interface)
for a specific length of time.
For more information, see LED Definitions.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
28Features
3
Hardware and Initial Configuration
This section describes the R1-2401 switch and how it is initially installed and
configured.
It contains the following topics:
•Switch Hardware
•Initial Configuration of the Switch
Switch Hardware
This section describes the ports and LEDs on the device.
It contains the following topics:
•Switch Ports
•Front Panel LEDs
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Template Last Updated - 2/7/2007Hardware and Initial Configuration29
The switch supports an Out-of-Band (OOB) port that is connected to the
management network of the chassis.
Port Naming Convention
There are 5 groups of ports, numbered 0-4. Group 0 represents the external
ports and groups 1-4 represents the internal ports that are connected to blade
servers 1-4.
External/Internal Ports
The following naming convention is used for internal and external ports:
gigabitethernet group/port_number or gi group/port_number
The following table maps the hardware network port numbers to the software
interface port numbers and describe how they are referred to in the CLI/GUI:
Table 3-1. Port Mapping Table
Port Type and NumberSoftware Port Naming Convention in CLI/WEB
External ports 1-8gi0/1.... gi0/8
Internal ports 1-4gi1/1.... gi1/4
Internal ports 5-8gi2/1.... gi2/4
Internal ports 9-12gi3/1.... gi3/4
Internal ports 13-16gi4/1.... gi4/4
Out-of-Band portoob
Front Panel LEDs
The front panel contains LEDs and ports, as follows:
•
2 System LEDs
•
8 ports
— Each having two associated LEDs.
Ta b l e 3 - 3 .
Table 3-2. System LED’s
State of SwitchStatus LED Power LED (Green)Description
OffOffOffSwitch is powered-
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
The CLI is divided into command modes, each with a specific command set.
Entering a question mark at the terminal prompt displays a list of commands
available for that particular command mode.
In each mode, a specific command is used to navigate from one mode to
another.
These modes are described below.
User EXEC Mode
During CLI session initialization, the CLI is in User EXEC mode. Only a
limited subset of commands is available in User EXEC mode. This level is
reserved for tasks that do not change the terminal configuration and is used
to access configuration sub-systems.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
After logging into the device, User EXEC command mode is enabled. The
user-level prompt consists of the host name followed by the angle bracket
(>). For example: console>
NOTE: The default host name is console unless it has been modified during
initial configuration.
The User EXEC commands enable connecting to remote devices, changing
terminal settings on a temporary basis, performing basic tests, and listing
system information.
To list the User EXEC commands, enter a question mark at the command
prompt.
To enter the next level, Privileged EXEC mode, a password is required (if
configured).
Privileged EXEC Mode
Privileged EXEC mode provides access to the device global configuration.
Privileged access can be protected, to prevent unauthorized access and to
secure operating parameters. Passwords are displayed on the screen, and are
case-sensitive.
NOTE: The enable command is only necessary if you login with privilege level less
than 15.
To access and list the Privileged EXEC mode commands:
1
At the prompt type
2
When a password prompt displays, enter the password and press
<Enter>
.
enable and press
<Enter>
.
The Privileged EXEC mode prompt displays as the device host name
followed by #. For example:
console#
To list the Privileged EXEC commands, type a question mark at the
command prompt.
To return from Privileged EXEC mode to User EXEC mode, type
and press
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
The following example illustrates accessing privileged EXEC mode and then
returning to the User EXEC mode:
console>enable
Enter Password: ******
console#
console# disable
console>
Use the exit command to return to a previous mode.
To configure the device, enter the next level, Global Configuration mode.
Global Configuration Mode
The Global Configuration mode manages device configuration on a global
level. Global Configuration commands apply to system features, rather than a
specific protocol or interface.
To access Global Configuration mode, at the Privileged EXEC Mode prompt,
type configure and press <Enter>. The Global Configuration mode displays
as the device host name followed by (config) and the pound sign #:
console# configure
console(config)#
To list the Global Configuration commands, enter a question mark at the
command prompt.
The following example illustrates how to access Global Configuration mode
and return back to the Privileged EXEC mode:
The Interface Configuration mode configures the device at the physical
interface level (port, VLAN, or LAG). Interface commands that require
subcommands have another level, called the Subinterface Configuration
mode. A password is not required to access this level.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
To run a command in a mode, which does not contain it, use do before the
command, as in the following example:
console# configure
console(config)# interface gi0/1
console(config-if)# sntp client enable
console(config-if)# do show sntp configuration
CLI Command Conventions
There are certain command entry conventions that apply to all commands.
The following table describes these conventions.
Table 4-1. Common GUI Elements
ButtonDescription
[ ]In a command line, square brackets indicate an optional
entry.
{ }In a command line, curly brackets indicate a selection of
compulsory parameters separated by the | character. One
option must be selected. For example: flowcontrol
{auto|on|off} means that for the flowcontrol command
either auto, on, or off must be selected.
Italic Font
Bold Italic Font
<button-name>Any individual key on the keyboard. For example click
Ctrl+F4Any combination of keys clicked simultaneously, for example:
Screen DisplayIndicates system messages and prompts appearing on the
Indicates a parameter value.
Indicates a parameter key word.
<Enter>.
Ctrl and F4.
console.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
When a parameter is required to define a range of ports or
parameters and all is an option, the default for the command
is all when no parameters are defined. For example, the
command interface range port-channel has the option of
either entering a range of channels, or selecting all. When the
command is entered without a parameter, it automatically
defaults to all.
Accessing the Device Through the CLI
You can manage the device using CLI commands, through the CMC to the
terminal console, or via a Telnet connection.
Through CMC
Insert the device into the chassis and enter the CLI commands upon
receiving a prompt.
Telnet Connection
Telnet is a terminal emulation TCP/IP protocol. RS-232 terminals can be
virtually connected to the local device through a TCP/IP protocol network.
Telnet is an alternative to a local login terminal, where a remote login is
required.
The device supports up to four simultaneous Telnet sessions. All CLI
commands can be used over a Telnet session.
If access is via a Telnet connection, ensure that the device has an IP address
and that software has been downloaded to the device.
To start a Telnet session:
1
Select
The
Start > Run
Run
window opens.
.
2
Ty p e
cmd.
The
cmd
window opens.
3
In the
cmd
window, type
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
By default, the switch receives its IP address dynamically via a DHCP server.
You can change the OOB port’s IP, but you cannot delete it. and you can add
another IP address on the In-Band interface (port, port-channel or VLAN).
The In-Band IP address can also be received from the DHCP server.
Receiving an In-Band IP Address from a DHCP Server
When using the DHCP protocol to retrieve an IP address, the device acts as a
DHCP client. When the device is reset, the DHCP command is saved in the
configuration file, but the IP address is not.
To retrieve an IP address from a DHCP server, perform the following steps:
1
Select and connect any port to a DHCP server or to a subnet that has a
DHCP server on it.
2
Type the following commands to use the selected port for receiving the IP
address:
a
Assigning dynamic IP Addresses on a port:
console# configure
console(config)# interface gi0/1
console(config-if)# ip address dhcp
b
Assigning a dynamic IP Addresses on a VLAN:
console# configure
console(config)# interface vlan 1
console(config-if)# ip addressdhcp
The interface receives the IP address automatically.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
When configuring/receiving IP addresses through DHCP and BOOTP (an
older version of DHCP), the configuration received from these servers
includes the IP address and may include the subnet mask and default
gateway.
NOTE: It is not necessary to delete the device configuration to retrieve an IP
address from the DHCP server.
NOTE: When copying configuration files, avoid using a configuration file that
contains an instruction to enable DHCP on an interface that connects to the same
DHCP server, or to one with an identical configuration. In this instance, the device
retrieves the new configuration file and boots from it. The device then enables
DHCP, as instructed in the new configuration file, and the DHCP instructs it to reload
the same file.
NOTE: If you configure a DHCP IP address, this address is dynamically retrieved,
and the ip address dhcp command is saved in the configuration file. In the event of
master failure, the backup will again attempt to retrieve a DHCP address. This could
result in one of the following:
•The same IP address may be assigned.
•A different IP address may be assigned, which could result in loss of
connectivity to the management station.
•The DHCP server may be down, which would result in IP address retrieval
failure, and possible loss of connectivity to the management station.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
System security is handled through the Authentication, Authorization, and
Accounting (AAA) mechanism that manages user access rights, privileges,
and management methods. AAA uses both local and remote user databases.
Data encryption is handled through the SSH mechanism.
Passwords can be configured for the following services:
•Terminal
•Telnet
•SSH
•HTTP
•HTTPS
NOTE: When creating a user name, the default priority is 14, which provides
access but not configuration rights. A priority of 15 must be set to enable access
and configuration rights to the device. Although user names can be assigned
privilege level 15 without a password, it is recommended to always assign a
password. If there is no specified password, privileged users can access the Web
interface with any password.
NOTE: Passwords can be secured by using password management commands to
force aging out of passwords, or expiration of passwords. For more information, see
"Management Security" on page 131.
Initial Configuration and Password Recovery
The system is delivered with a default username/password (root/calvin). If a
user-defined password is lost, a password recovery procedure can be invoked
from the Startup menu. This procedure is applicable for the local terminal
only and enables a single access to the device from the local terminal with no
password entered.
The full mode of password recovery mechanism can be enabled/disabled
through the CLI (service password-recovery command).
This affects password recovery in the following way:
•
Enabled:
access to the device without a password is enabled and all configuration
and user files are retained.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
42Using the CLI
When the password-recovery mechanism is invoked, one-time
When the password-recovery mechanism is invoked, one-time
Guide\Plasma_UGUsing_CLI.fm
access to the device without a password is stilled enabled, however all
configuration files (startup and backups) are removed and the following
log message is generated to the terminal after boot process completed: “All
configuration and user files were removed”
Configuring an Initial Terminal Password
To configure an initial terminal password, enter the following commands:
console(config)# aaa authentication login default line
console(config)# aaa authentication enable default line
console(config)# line console
console(config-line)# login authentication default
console(config-line)# enable authentication default
console(config-line)# password george
Configuring an Initial Telnet Password
To configure an initial Telnet password, enter the following commands:
console(config)# aaa authentication login default line
console(config)# aaa authentication enable default line
console(config)# line telnet
console(config-line)# login authentication default
console(config-line)# enable authentication default
console(config-line)# password bob
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
console# configure
console(config)# line console
console(config-line)# exec-banner
console(config-line)# exit
console (config)# banner exec *
Successfully logged in*
Would you like to enable this banner to all lines? (Y/N)[Y] Y
console# do show banner exec
Banner: Exec
Successfully logged in
console(config)#
Startup Menu Procedures
The Startup menu enables performing various tasks, such as software
download, flash handling and password recovery.
You can enter the Startup menu when booting the device. User input must be
entered immediately after the POST test.
To enter the Startup menu:
•Turn the power on. After the auto-boot messages appear, the following
menu is displayed:
The software download procedure is used to replace corrupted files or
upgrade system software, when the device does not have IP connectivity or
when both software images of the device are corrupted and therefore you
cannot use the web-based management system.
NOTE: it is highly recommended that, before loading via xmodem, the baud rate of
the device and terminal be set to 115200.
To download software through the Startup menu:
1
From the Startup menu,
Downloading code using XMODEM
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
2
When using the HyperTerminal, click
Menu Bar and select
3
In the
Filename
4
Ensure that the Xmodem protocol is selected in the
5
Press
Send
NOTE: After software download, the device reboots automatically.
field, enter the file path for the file to be downloaded.
. The software is downloaded.
press [1]
Send File
. The following prompt is displayed:
Tr an sf e r
on the HyperTerminal
.
Protocol
field.
Erase FLASH File - Option[2]
In some cases, the device Startup Configuration file must be erased. If the
configuration is erased, all parameters configured via CLI, web-management
or SNMP must be reconfigured.
To erase the device configuration in the Startup Configuration file:
1
From the Startup menu,
displayed:
Warning! About to erase a Flash file.
Are you sure (Y/N)?
2
Press Y. The following message is displayed.
Write Flash file name (Up to 8 characters, Enter
for none.):
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
("config" is the standard name for the Startup configuration
Guide\Plasma_UGUsing_CLI.fm
file although you can use any name).
The following is displayed:
File config (if present) will be erased after system initialization
======== Press Enter To Continue ========
The configuration is erased when the system is reset.
Password Recovery - Option[3]
If a password is lost, the Password Recovery procedure can be called from the
Startup menu. The procedure enables entry to the device a single time
without entering a password.
To recover a lost password when entering the local terminal only:
1
From the
2
Continue the regular startup by logging in without a password.
3
Enter a new password or press 'ESC' to exit.
NOTE: To ensure device security, reconfigure passwords for applicable
management methods.
Startup
menu, select
[3]
.
Set Terminal Baud-Rate - Option[4]
To set the terminal baud-rate:
1
Ty p e
[4]
and press
<Enter>
.
2Enter the new baud rate. The following is displayed:
Set new device baud-rate: 38,400
Note that after this step, your terminal will no longer respond. Adjust your
terminal speed to the configured one.
Software Download
This section contains instructions for downloading device software (system
and boot images) through a TFTP server. The TFTP server must be
configured before downloading the software.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
When the device boots, it decompresses the system image from the flash
memory area and runs it. When a new image is downloaded, it is saved in the
other area allocated for the other system image copy.
On the next boot, the device decompresses and runs the image from the
currently active system image.
A system image can be downloaded through a TFTP server.
To download the system image from a TFTP server, ensure that an IP address
is configured on one of the device ports and pings can be sent to the TFTP
server. In addition, ensure that the file to be downloaded is saved on the
TFTP server.
To download a system image through the TFTP server:
1
Enter the
currently running on the device. The following is an example of the
information that appears:
console# show version
SW version 1.0.0.17 ( date 05-Sep-2012 time 12:05:41 )
Boot version 1.0.0.2 ( date 22-Aug-2012 time 15:56:52 )
HW version
console#
show version
command, to verify which software version is
2
Enter the
show bootvar
command, to verify which system image is
currently active. The following is an example of the information that is
displayed:
console# show bootvar
Image Filename Version Date Status
----- --------- --------- --------------------- -----1image-1 1.0.0.13 04-Aug-2010 08:27:30 Active*
2 image-2 1.0.0.12 29-Jul-2010 17:02:26 Not active
console#
3
Enter the one of the following commands to copy a new system image to
the current unit:
To copy a new system image to the device:
copy tftp://{tftp address}/{file name} image
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
When the new image is downloaded, it is saved in the area allocated for
Guide\Plasma_UGUsing_CLI.fm
the other copy of the system image (image-2, as shown in the example).
The following is an example of the information that appears:
console# copytftp://176.215.31.3/r2401-100048.ros image
Accessing file ‘r2401-100048’ on 176.215.31.3Ö
Loading r2401-100048 from 176.215.31.3:
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Copy took 00:01:11 [hh:mm:ss]
Exclamation symbols indicate that a copying process is in progress. Each
symbol (!) corresponds to 512 bytes transferred successfully. A period
indicates that the copying process is timed out. Many periods in a row
indicate that the copying process failed.
5
Select the image for the next boot by entering the
After this command, enter the
copy indicated as a parameter in the
show bootvar
boot system
boot system
command.
command to verify that the
command is selected for
the next boot.
The following is an example of the information that appears:
console# boot system image-2
console# show bootvar
Images currently available on the Flash
Image-1 active
Image-2 not active (selected for next boot)
If the image for the next boot is not selected by entering the boot system
command, the system boots from the currently active image.
6
Enter the reload command. The following message is displayed:
console# reload
This command will reset the whole system and disconnect your current
session. Do you want to continue (y/n) [n]?
7
Enter Y. The device reboots.
Boot Image Download
Loading a new boot image from the TFTP server, updates the boot image.
The boot image is loaded when the device is powered on. A user has no
control over the boot image copies.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
under a specific feature, or closed to hide the feature's components. By
dragging the vertical bar to the right, the tree area can be expanded to
display the full name of a component.
•
Device View
— Located in on the top center of the home page, the device
view provides information about device ports, current configuration and
status, table information, and feature components. For further
information, see "Device Representation" on page 54
Components List
•
— Located in the bottom center of the home page,
contains a list of the feature components. When a feature is expanded, the
GUI page for that feature is displayed.
•
Information Buttons
— Located at the top of the home page, provide
access to information about the device and access to Dell Support. For
more information, see "Information Buttons" on page 54.
Device Representation
The graphic display on the home page displays port and system LEDS that
specify whether a specific port is currently active.
See "Front Panel LEDs" on page 31.
To configure a port double-click on its icon.
Using the Network Administrator Buttons
This section describes the buttons found on the Network Administrator
interface.
Information Buttons
Table 5-1 describes the information buttons that provide access to online
support and online help, as well as information about the Network
Administrator interfaces. These are displayed at the top of each page.
Table 5-1. Information Buttons
Button Description
ModeYou are either in Basic or Advanced mode according to your
user privileges. Basic mode has a subset of the features
available. Advanced mode has all features available.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
SupportOpens the Dell Support page at support.dell.com
AboutContains the version and build number and Dell copyright
LogoutOpens the Log Out window.
Guide\Plasma_UGUsing_GUI.fm
information.
Device Management Icons
Table 5-2 describes the device management buttons.
Table 5-2. Device Management Icons
ButtonIconDescription
Apply&SaveSaves changes to the Running and Startup Configuration
files.
HelpOpen online help. The online help pages are
context-sensitive. For example, if the IP Addressing page is
open, the help topic for that page is displayed when Help is
clicked.
PrintPrints the Network Management System page and/or table
information.
RefreshRefreshes device information from the Running
Configuration file.
Field Definitions
Fields that are user-defined can contain between 1–159 characters, unless
otherwise noted on the Network Administrator web page. All letters or
characters can be used, except the following: "\ / : * ? < >"
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Each GUI page in the tree view is described in the following sections. A brief
introduction is provided along with steps specifying how to enter information
in the page. The following terms are used:
•
Enter
— Indicates that information may be entered in the field. It does
not imply that the field is mandatory.
•
Select
—Indicates that information may be selected from a drop-down list
or from radio buttons.
•
Displays
—Indicates that the field is display only.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
58Network Administrator.
6
Configuring System Information
This section describes how to set system parameters, such as security features,
switch software, system time, logging parameters and more.
It contains the following topics:
•General Switch Information
•Time Synchronization
•Logs
•IP Addressing
•Diagnostics
•Management Security
•SNMP
•File Management
General Switch Information
This section describes how to view and set general switch parameters.
It contains the following topics:
•Asset Information
•System Health
Asset Information
Use the Asset page to view and configure general device information,
including the system name, location, contact, system MAC Address, System
Object ID, date, time, and system up time.
To configure general device parameters:
1
Click
System > General > Asset
2
Enter/view the parameters:
–
System Name (0-159 Characters)
name.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
–CLI Script for Receiving Time from an SNTP Server
Global Settings (Clock Source)
System time can be set manually, or it may be received from an external
SNTP server. You if wish to set the system time manually, you do not to use
the Global Settings page, because the default is manual (local) system time.
To set the clock source:
1
Click
to display the
2
Select the
–
Local —
as defined in "Manual Time Settings" on page 66.
–
SNTP —
as defined in "System Time from an SNTP Server" on page 73.
System > Time Synchronization > Global Settings
Global Settings
Clock Source
page.
. The possible options are:
System time is taken from the device’s internal clock. Set this
System time is set via an SNTP server. Set SNTP parameters
in the tree view
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Use the Manual Time Settings page to set system date/time manually (as
opposed to receiving them from an external SNTP server). For more
information on SNTP, see "System Time from an SNTP Server" on page 73.
If system time is kept using an external SNTP clock, and the external SNTP
clock fails, the system time reverts to the time set here or in the Asset page.
In addition to setting the local clock, you can use this page to enable Daylight
Savings Time (DST) on the device.
The following is a list of DST start and end times in various countries:
•
•
•
Albania
Australia
Australia
— Last weekend of March until the last weekend of October.
— From the end of October until the end of March.
- T
asmania
— From beginning of October until the end of
March.
•
•
•
Armenia
Austria
Bahamas
— Last weekend of March until the last weekend of October.
— Last weekend of March until the last weekend of October.
— From April to October, in conjunction with U.S. summer
hours.
•
Belarus
— Last weekend of March until the last weekend of October.
•
•
Belgium
Brazil
— Last weekend of March until the last weekend of October.
— From the 3rd Sunday in October until the 3rd Saturday in
March. During the period of Daylight Saving Time, Brazilian clocks go
forward one hour in most of the Brazilian southeast.
•
Chile
— Easter Island 9th March 12th October. The first Sunday in March
or after 9th March.
•
China
— China does not operate Daylight Saving Time.
•
Canada
— From the first Sunday in April until the last Sunday of October.
Daylight Saving Time is usually regulated by provincial and territorial
governments. Exceptions may exist in certain municipalities.
•
Cuba
— From the last Sunday of March to the last Sunday of October.
•
Cyprus
— Last weekend of March until the last weekend of October.
•
•
Denmark
Egypt
— Last weekend of March until the last weekend of October.
— Last Friday in April until the last Thursday in September.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
— Last weekend of March until the last weekend of October.
— From the 29th March until the 25th October.
— Last weekend of March until the last weekend of October.
Guide\Plasma_UGSystemConfig.fm
— Last weekend of March until the last weekend of
October.
•
South Africa
•
Spain
•
Sweden
•
Switzerland
•
Syria
— From 31st March until 30th October.
•
Ta i wa n
•
Tu r ke y
•
United Kingdom
— South Africa does not operate Daylight Saving Time.
— Last weekend of March until the last weekend of October.
— Last weekend of March until the last weekend of October.
— Last weekend of March until the last weekend of October.
— Taiwan does not operate Daylight Saving Time.
— Last weekend of March until the last weekend of October.
— Last weekend of March until the last weekend of
October.
•
United States of America
— From the second Sunday of March at 02:00
to the first Sunday of November at 02:00.
To manually set the device time:
1
Click
System > Time Synchronization > Manual Time Settings in the
tree view to display the
2
Enter the following local settings:
–
Date
— The system date.
–
Local Time
–
Time Zone Offset
Manual Time Settings
— The system time.
— The difference between Greenwich Mean Time
(GMT) and local time. For example, the Time Zone Offset for Paris is
GMT +1:00, while the local time in New York is GMT –5:00.
3
To set Daylight Savings Time (DST), select the
select one of the possible options:
–
USA
— The device switches to DST at 2 a.m. on the second Sunday
of March, and reverts to standard time at 2 a.m. on the first Sunday of
November.
page.
Daylight Savings
field and
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
— The device switches to DST at 1:00 am on the last
Sunday in March, and reverts to standard time at 1:00 am on the last
Sunday in October. The
European
option applies to EU members,
and other European countries using the EU standard.
–
Other
— Specifies that you will set DST manually in the fields
described below.
If you selected
USA
or
European
you are finished. If you selected
proceed to the next step.
Other
,
There are two types of DST possible when
Others
is selected. You can set a
specific date in a particular year, or you can set a recurring setting,
irrespective of the year. For a specific setting in a particular year, complete
Daylight Savings
the
Recurring
If
Other
area.
is selected, the
Non-recurring
4
To enter non-recurring DST parameters, enter the following fields:
–
From
— The time that DST begins. The possible options are:
•
DD/MMM/YY
area, and for a recurring setting, complete the
From
and To fields must be defined either in the
or
Recurring
section.
— The date, month, and year at which DST
begins.
•
HH/MM
–
To
— The time that DST ends. The possible options are:
•
DD/MMM/YY
•
HH/MM
5
To enter recurring DST parameters, select
— The time (hour and minutes) at which DST begins.
— The date, month, and year at which DST ends.
— The time (hour and minutes) at which DST ends.
Recurring
and enter the
following fields:
–
From
— The time that DST begins each year, for example, DST
begins locally every second Sunday in April at 5:00 am. The possible
options are:
•
Day
— The day of the week from which DST begins every year.
•
Week
— The week within the month from which DST begins
every year.
•
Month
— The month of the year in which DST begins every year.
70
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
console(config)# clock summer-time
Ohio_Summer recurring usa
console(config)# exit
console# show clock
Set a time range for
summer time called
"Ohio".
Set the time zone to GMT
plus 2 hours. The name of
the zone "Ohio" is purely for
documentation purposes.
This is not mandatory for
manual time, but is
recommended. It enables
anyone seeing the time to
know what that time is in
respect to their timezone.
Set Daylight Savings Time
such that it recurs every year
and is based on the summer
time schedule of the USA.
The name of the zone
"Ohio_Summer" is for
documentation purposes
only.
Display the system time.
System Time from an SNTP Server
This section describes how to receive date/time from an SNTP server.
It contains the following topics:
•SNTP Overview
•SNTP Global Settings
•SNTP Authentication
•SNTP Servers
•SNTP Interfaces
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
The switch supports the Simple Network Time Protocol (SNTP), which
provides accurate network switch clock time synchronization of up to 100
milliseconds. The implementation of SNTP is based on SNTPv4 (RFC 2030).
SNTP is a simple and lighter version of NTP, and can be used when the
ultimate performance of the full NTP implementation, described in
RFC-1305, is not required. SNTP operates with NTP, thus an SNTP client
can work with both SNTP and NTP servers.
The switch operates only as a client, and cannot provide time services to other
systems.
SNTP Server Types
The switch can accept time information from the following server types:
•Unicast
Polling for Unicast information is used for polling a server whose IP
address is known. This is the preferred method for synchronizing device
time, as it is most secure.
Up to eight SNTP servers can be defined.
If this method is selected, SNTP information is accepted only from SNTP
servers defined in the
SNTP Servers
page.
Time levels T1 - T4 (see the "Algorithm for Selecting Designated SNTP
Server" on page 76 section) are used to determine from which server time
information is accepted.
If Unicast polling is not enabled or if no servers are defined on the device,
the device accepts time information from any SNTP server of the type that
is enabled, which responds.
•Anycast
Polling for Anycast information is used when the SNTP server’s IP address
is not defined or it cannot be reached. If this method is enabled, time
information can be received from any SNTP server on the network. The
device time and date are synchronized when it proactively requests
synchronization information.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Anycast polling to get time information is preferable to Broadcast polling,
because it is more secure.
Time levels T3 and T4 are used to determine from which server time
information is accepted.
•
Broadcast
Broadcast information is used if receiving Broadcast packets has been
enabled, and one of the following situations occurs:
–The SNTP server IP address has not been defined.
–Several time-information packets are received and the Broadcast time
is best according to the algorithm defined in "Algorithm for Selecting
Designated SNTP Server" on page 76.
Broadcast is the least secure method of receiving time, because it is both
unsecured and the time information was not specifically requested by the
device. Anycast is also unsecured, but time-information packets are only
accepted if they were requested.
Stratums
Each SNTP server is characterized by stratums, which define the accuracy of
its clock. The stratum is the distance, in terms of NTP hops, from the most
authoritative time server. The lower the stratum (where zero is the lowest),
the more accurate the clock. The switch accepts time from stratum 1 and
above.
The following provides examples of clocks from various stratums:
•
Stratum 0
— A real time clock is used as the time source, for example, a
GPS system.
•
Stratum 1
— A server that is directly linked to a Stratum 0 time source is
used.
•
Stratum 2
— The time source is distanced from the Stratum 1 server over
a network path, for example, a Stratum 2 server receives the time over a
network link, via NTP, from a Stratum 1 server.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Messages received from SNTP servers are logged, until there are three
responding servers, or the timer expires. In any event, when the third message
is received, the timer expires.
A server is selected to be the “designated server” according to the following
criteria:
•The stratum (the distance in terms of NTP hops from the best
authoritative time servers) is considered, and the server with the best
(lowest) stratum is selected.
•If there is a tie in stratums, packets from servers defined on the device are
preferred to Anycast packets, which in turn are preferred to Broadcast
packets.
•If multiple servers pass the above criteria, then the server that sent the first
(earliest) time packet is chosen.
If a better server is discovered later, it is selected to be the “designated server”
at that time.
Polling
You can configure the system to acquire time information in the following
ways:
•
Enable polling
•
Do not enable polling
— Time information is requested every polling interval.
— Time information is received when the system is
brought up and every time that a topological change is made to the
Running Configuration file, for example when an SNTP Unicast server is
added.
76
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
This is configured by the user in the SNTP Global Settings page.
On power up, when the switch sends a request and there is no reply, it issues
another request (three retries at most) after 20 seconds of waiting.
If no SNTP server is found, the process is invoked every “poll interval” (set in
the SNTP Global Settings page), and a management trap is triggered.
Authentication
You can require that SNTP servers be authenticated, although this is not
mandatory (see the SNTP Authentication pages).
MD5 (Message Digest 5) Authentication safeguards device synchronization
paths to SNTP servers. MD5 is an algorithm that produces a 128-bit hash
value. MD5 is a variation of MD4, and increases MD4 security.
MD5 both verifies the integrity of the communication and authenticates the
origin of the communication.
SNTP Global Settings
If SNTP was selected as the clock source in the Global Settings page, you
must define the mechanism of setting time from an SNTP server. This is
done in the SNTP pages, described below.
To define the types of server from which the device accepts SNTP
information and the polling interval:
1
Click
System > Time Synchronization > SNTP Global Settings
tree view to display the
2
Enter the fields:
–
Poll Interval (60-86400)
SNTP Global Settings
— Enter the interval (in seconds) at which
page.
the SNTP servers are polled.
–
Receive Broadcast Servers Updates
— Enable/disable receiving time
information from Broadcast servers.
–
Receive Anycast Servers Updates
— Enable/disable receiving time
information from Anycast SNTP servers.
–
Receive Unicast Servers Updates
— Enable/disable receiving time
information from the SNTP servers defined on the switch.
–
Poll Unicast Requests
— Enable/disable sending SNTP Unicast server
time information requests to the SNTP server.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Global Settings pages.
Table 6-7. SNTP Global Parameters CLI Commands
CLI CommandDescription
sntp client poll timer
seconds
no sntp client poll timer
sntp broadcast client
enable
no sntp broadcast client
enable
sntp anycast client enable
no sntp anycast client
enable
sntp unicast client enable
no sntp unicast client
enable
show sntp configurationDisplays SNTP configuration
Sets the polling time for an SNTP client.
Use the no form of this command to
restore the default configuration.
Enables SNTP Broadcast clients.
Use the no form of this command to
disable SNTP Broadcast clients.
Enables SNTP Anycast clients.
Use the no form of this command to
disable SNTP Anycast clients.
Enables SNTP predefined Unicast clients.
Use the no form of this command to
disable SNTP Unicast clients.
The following is an example of the CLI commands:
console(config)# sntp anycast client enable
SNTP Authentication
Use the SNTP Authentication page to enable/disable SNTP authentication
between the device and an SNTP server, and to set the means by which the
SNTP server is authenticated.
To configure SNTP authentication:
1
Click
System > Time Synchronization > SNTP Authentication
tree view to display the
SNTP Authentication: Summary
The previously-defined authentication keys are displayed.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
authenticating SNTP sessions between the device and an SNTP server.
3
Multiple keys can be defined. To add a new SNTP authentication key, click
Add
, and enter the fields.
–
Encryption Key ID (1 - 4294967295)
— Enter the number used to
identify this SNTP authentication key internally.
–
Authentication Key (1 - 8 Characters)
— Enter the key used for
authentication. The SNTP server must send this key for the switch to
use its time/date information.
–
Trus te d Ke y
— Check to specify
that the encryption key is used to
authenticate the (Unicast) SNTP server. If this is not checked, the
key is not used for authentication (and another key(s) is used).
Defining SNTP Authentication Settings Using CLI Commands
The following table summarizes the CLI commands for setting fields
displayed in the SNTP Authentication pages.
Table 6-8. SNTP Authentication CLI Commands
CLI CommandDescription
sntp authenticate
no sntp authenticate
sntp trusted-key key-
number
no sntp trusted-key key-
number
sntp authentication-key
key-number md5 key-value
no sntp authenticationkey key-number
Defines authentication for received SNTP
traffic from servers.
Use the no form of this command to disable
the feature.
Authenticates the identity of a system to
which SNTP will synchronize.
Use the no form of this command to disable
system identity authentication.
Defines an authentication key for SNTP.
Use the no form of this command to remove
the authentication key for SNTP.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
Offset — The estimated offset of the server's clock, relative to the
Guide\Plasma_UGSystemConfig.fm
local clock, in milliseconds. The host determines the value of this
offset, using the algorithm described in RFC 2030.
–
Delay
— The estimated round-trip delay of the server's clock, relative
to the local clock over the network path between them, in
milliseconds. The host determines the value of this delay, using the
algorithm described in RFC 2030.
2
To add an SNTP Server, click
–
Supported IP Format
Add
, and enter the fields:
— Select whether IPv4 or IPv6 format is used
for the IP address of the SNTP server.
–
IPv6 Address Type
— When the server supports IPv6, this specifies
the type of static address supported. Select one of the possible
options:
•
Link Local
— A Link Local address that is non-routable and used
for communication on the same network only.
•
Global
— A globally unique IPv6 address; visible and reachable
from different subnets.
–
Link Local Interface
— When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. Select one of the
possible options:
•
VLAN
— The VLAN on which the IPv6 interface is configured.
•
ISATAP
— The IPv6 interface is configured on an ISATAP
tunnel.
–
SNTP Server
–
Poll Interval
— Enter the SNTP server’s IP address.
— Enable/disable polling the selected SNTP server for
system time information, when enabled.
–
Encryption Key ID
— Check to use an encryption key, and select one
of the encryption keys that was defined in the
pages.
SNTP Authentication
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
console(config)# sntp server 100.1.1.1 poll key 10
console# show sntp status
Clock is unsynchronized
Unicast servers:
Server Status Last Response Offset Delay
[mSec] [mSec]
----------- --------- ------------- ------ -----
Anycast server:
Server Status Last Response Offset Delay
------------ --------------- ---------------------- gi0/1 00:00:00.0 Jan 1 2010
SNTP Interfaces
If receiving time information from Anycast servers is enabled, you can
determine through which interface the Anycast packets are sent and received.
If no interface is defined, Anycast requests are not sent.
To enable receiving Anycast updates on an interface:
1
Click
System > Time Synchronization > SNTP Interface Settings
display the
SNTP Interface Settings: Summary
page.
The following fields are displayed for every interface for which an SNTP
interface has been enabled:
–
Interface
–
Receive Servers Updates
— The port, LAG or VLAN on which SNTP is enabled.
— Displays whether the interface is enabled
to receive updates from the SNTP server.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
System logs record events and report errors or informational messages. Some
aspects of system logging can be configured, as described below.
Some events are automatically logged, such as hardware problems. You may
enable/disable logging the following types of events:
•
Authentication Events
•
Copy File Events
•
Management Access Events
•Login History
in the
Event messages have a unique format, as per the System Logs (SYSLOG)
protocol recommended message format for all error reporting, for example,
SYSLOG and local device reporting messages are assigned a severity code,
and include a message mnemonic that identifies the source application
generating the message.
Messages may be filtered, based on their urgency or relevancy.
Events may be logged to the following destinations:
•Console
•
Logging buffer (RAM)
When the maximum number of messages is reached, messages are written
starting at the beginning of the buffer (overwriting the old messages).
Logs stored on the Logging buffer are deleted when the device is reset.
in the
in the
Global Parameters
Login History
Global Parameters
in the
Global Parameters
page
page
page
page
— Messages are stored in a cyclical file buffer.
•
Logging file (flash)
— Messages are stored in flash memory. When the
buffer is full, messages are written starting at the beginning of the memory
block (overwriting the old messages).
•
SYSLOG Server
— Messages are sent to a remote server. This is useful for
central and remote management and to provide more space for storage of
messages.
Up-to eight SYSLOG servers can be defined in the Remote
Log Server Settings pages.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
You can select where to send logging messages according to their severity.
Each of the severity level can be directed to the console, RAM log, flash log
file or SYSLOG server or to any combination of these destinations.
Global Parameters
Use the Global Parameters page to enable/disable logging for the following
logging severity levels.
–
Emergency
emergency log message is saved to the specified logging location.
–
Alert
for example, all device features are down.
–
Critical
occurs, for example, two device ports are not functioning, while the
rest of the device ports remain functional.
–
Error
offline.
–
Wa rn in g
functioning, but an operational problem has occurred.
–
Notice
respond.
–
Informational
have to respond.
–
Debug
If you enable logging, some events are automatically logged, and in addition,
you can enable/disable specific types of logging and set their destination.
To configure logging:
1
Click
System > Logs > Global Parameters
Global Parameters page.
2
Enable/disable
enabled by default, and cannot be disabled.
3
If Logging is enabled, select the types of events to be logged in addition to
the events that are always logged:
–
Log Authentication Events
users are authenticated.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
88
— If the device is down or not functioning properly, an
— An alert log is saved if there is a serious device malfunction,
— A critical log is saved if a critical device malfunction
— A device error has occurred, for example, a single port is
— The lowest level of a device warning. The device is
— Provides device information to which you might have to
— Enable/disable generating logs
when the device is accessed using a management method, for
example, each time the device is accessed using SSH, a device log is
generated.
4
To select the destination of logging messages, according to their severity
levels, check the minimum severity level that will be associated with the
console log, RAM log, Log file (Flash memory) and remote SYSLOG
servers. When a severity level is selected, all severity levels above the
selection are selected automatically.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
number of RAM log entries permitted, is displayed. When the log buffer is
full, the oldest entries are overwritten. The
many entries are currently permitted, and you can change this number in
New Setting (after reset)
the
The following is displayed for the existing logs:
–
Log Index
–
Log Time
— The log number in the RAM Log table.
— The time at which the log was entered into the RAM Log
table.
–
Severity
–
Description
2
To remove all entries from the RAM log, click
— The log severity.
— The log entry text.
in the tree view to display the
line, which contains the maximum
Current Setting
field.
Clear Log
contains how
.
RAM Log
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
the type of static address supported. The possible options are:
•
Link Local
— A Link Local address that is non-routable and used
for communication on the same network only.
•
Global
— A globally unique IPv6 address; visible and reachable
from different subnets.
–
Link Local Interface
— When the server supports an IPv6 Link Local
address, this specifies the Link Local interface. The possible options
are:
•
VLAN
— The VLAN on which the IPv6 interface is configured.
•
ISATAP
— The IPv6 interface is configured on an ISATAP
tunnel.
–
New Log Server IP Address
— Enter the IP address of the remote
SYSLOG server.
–
UDP Port (1-65535)
— Enter the UDP port to which the logs are sent
for the selected server.
–
Facility
— Select a user-defined application from which system logs
are sent to the remote server. Only a single facility can be assigned to a
single server. If a second facility level is assigned, the first facility level
is overridden. All applications defined for a device utilize the same
facility on a server.
Description (0-64 Characters)
–
–
Severity to Include
— Check the severity levels to be logged to the
— Enter a server description.
remote server. The event severity levels are listed on this page in
descending order from the highest severity to the lowest. When a
severity level is selected to appear in a log, all higher severity events are
automatically selected to appear in the log. When a security level is
not selected, no lower severity events appear in the log.
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
The device functions as an IPv6-compliant host, as well as an IPv4-host (also
known as dual stack). This enables device operation in a pure-IPv6 network,
as well as in a combined IPv4/IPv6 network.
Difference Between IPv4 and IPv6 Addressing
The primary difference between IPv4 to IPv6 is the length of network
addresses. IPv6 addresses are 128 bits, whereas IPv4 addresses are 32 bits.
Thus, IPv6 addresses enable the use of many more unique addresses.
The 128-bit IPv6 address format is divided into eight groups of four
hexadecimal digits. Abbreviation of this format by replacing a group of zeros
with double colons (::) is acceptable. IPv6 address representation can be
further simplified by suppressing the leading zeros.
All IPv6 address formats are acceptable, yet for display purposes, the system
displays the most abbreviated form, which replaces groups of zeros with
double colons and removes the leading zeros.
IPv6 Prefixes
While Unicast IPv6 addresses written with their prefix lengths are permitted,
in practice their prefix lengths are always 64 bits, and therefore are not
required to be expressed. Any prefix that is less than 64 bits is a route or
address range that summarizes a portion of the IPv6 address space.
For every assignment of an IP address to an interface, the system runs the
Duplicate Address Detection (DAD) algorithm to ensure uniqueness.
An intermediary transition mechanism is required for IPv6-only nodes to
communicate with IPv6 nodes over an IPv4 infrastructure. The tunneling
mechanism implemented is the Intra-Site Automatic Tunnel Addressing
Protocol (ISATAP). This protocol treats the IPv4 network as a virtual IPv6
local-link, with each IPv4 address mapped to a Link Local IPv6 address.
IPv4 Interface Parameters
You can assign IP addresses to the interface in the following ways:
•Static Assignment
DELL CONFIDENTIAL – PRELIMINARY 4/18/13 - FOR PROOF ONLY
100
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.