Digisol DG-CS4554F User Manual

Page 1
Page 1
10G Top-of-Rack Switches
DG-CS4554F
User Manual
V1.0
2015-10-20
As our products undergo continuous development the specifications are subject to change without prior notice.
Page 2
Web Management Guide
DG-CS4554F
54-Port 10G Data Center Switch with 48 10GBASE SFP+ Ports, 6 40GBASE QSFP Ports, 2 Power Supply Units, and 5 Fan Trays (5 Fans – F2B and B2F Airflow)
Page 3
How to Use This Guide
– 3 –
Who Should Read This
Guide?
This guide includes detailed information on the switch software, including how to operate and use the management functions of the switch. To deploy this switch effectively and ensure trouble-free operation, you should first read the relevant sections in this guide so that you are familiar with all of its software features.
This guide is for network administrators who are responsible for operating and maintaining network equipment. The guide assumes a basic working knowledge of LANs (Local Area Networks), the Internet Protocol (IP), and Simple Network Management Protocol (SNMP).
How This Guide is
Documentation
Organized
Related
This guide describes the switch’s web browser interface. For more detailed information on the switch’s key features refer to the Administrator’s Guide.
The guide includes these sections:
Section I “Getting Started” Includes an introduction to switch management, and the basic settings required to access the management interface.
Section II “Web Configuration” Includes all management options available through the web browser interface.
Section III “Appendices” — Includes information on troubleshooting switch management access.
This guide focuses on switch software configuration through the web browser.
For information on how to manage the switch through the command line interface, see the following guide:
CLI Reference Guide
Note: For a description of how to initialize the switch for management access via
the CLI, web interface or SNMP, refer to “Initial Switch Configuration” in the CLI Reference Guide.
Page 4
How to Use This Guide
– 4 –
For information on how to install the switch, see the following guide:
Installation Guide
For all safety information and regulatory statements, see the following documents:
Quick Start Guide Safety and Regulatory Information
Conventions The following conventions are used throughout this guide to show information:
Note: Emphasizes important information or calls your attention to related features
or instructions.
Caution: Alerts you to a potential hazard that could cause loss of data, or damage
the system or equipment.
Revision History This section summarizes the changes in each revision of this guide.
Warning: Alerts you to a potential hazard that could cause personal injury.
Nov 2015 Revision
This is the first version of this guide.
Page 5
– 5 –
Contents
How to Use This Guide
3
Contents
5
Figures
13
Tables
23
Section I
Getting Started 25
1
Introduction
27
Key Features
27
Description of Software Features
28
Equal-cost Multipath Load Balancing
32
System Defaults
34
Section II
Web Configuration
37
2
Using the Web Interface
39
Connecting to the Web Interface
39
Navigating the Web Browser Interface
40
Home Page 40
Configuration Options
41
Panel Display 41
Main Menu
42
3
Basic Management Tasks
55
Displaying System Information
55
Displaying Hardware/Software Versions
56
Configuring Support for Jumbo Frames
58
Displaying Bridge Extension Capabilities
59
Page 6
– 6 –
Contents
Managing System Files 60
Copying Files via FTP/TFTP or HTTP 60
Saving the Running Configuration to a Local File 62
Setting The Start-Up File 63
Showing System Files 64
Automatic Operation Code Upgrade 65
Setting the System Clock 69
Setting the Time Manually 69
Setting the SNTP Polling Interval 70
Configuring NTP 71
Configuring Time Servers 72
Setting the Time Zone 75
Configuring The Console Port 76
Configuring Telnet Settings 78
Displaying CPU Utilization 80
Displaying Memory Utilization 80
Resetting the System 81
4 Interface Configuration 85
Port Configuration 85
Configuring by Port List 85
Configuring by Port Range 88
Displaying Connection Status 89
Configuring Local Port Mirroring 90
Showing Port or Trunk Statistics 92
Displaying Statistical History 96
Displaying Transceiver Data 100
Configuring Transceiver Thresholds 101
Trunk Configuration 103
Configuring a Static Trunk 104
Configuring a Dynamic Trunk 107
Displaying LACP Port Counters 113
Displaying LACP Settings and Status for the Local Side 114
Displaying LACP Settings and Status for the Remote Side 116
Configuring Load Balancing 117
Page 7
– 7 –
Contents
Traffic Segmentation 119
Enabling Traffic Segmentation 119
Configuring Uplink and Downlink Ports 120
5 VLAN Configuration 123
IEEE 802.1Q VLANs 123
Configuring VLAN Groups 125
Adding Static Members to VLANs 128
6 Address Table Settings 133
Configuring MAC Address Learning 133
Setting Static Addresses 135
Changing the Aging Time 136
Displaying the Dynamic Address Table 137
Clearing the Dynamic Address Table 138
Issuing MAC Address Traps 139
7 Spanning Tree Algorithm 141
Overview 141
Configuring Global Settings for STA 143
Displaying Global Settings for STA 148
Configuring Interface Settings for STA 149
Displaying Interface Settings for STA 152
Configuring Multiple Spanning Trees 155
Configuring Interface Settings for MSTP 159
8 Congestion Control 163
Storm Control 163
9 Class of Service 165
Layer 2 Queue Settings 165
Setting the Default Priority for Interfaces 165
Selecting the Queue Mode 166
Mapping CoS Values to Egress Queues 169
Layer 3/4 Priority Settings 172
Setting Priority Processing to IP Precedence/DSCP or CoS 172
Mapping Ingress DSCP Values to Internal DSCP Values 173
Page 8
– 8 –
Contents
Mapping CoS Priorities to Internal DSCP Values 176
Mapping Internal DSCP Values to Egress CoS Values 178
Mapping IP Precedence Values to Internal DSCP Values 180
Mapping IP Port Priority to Internal DSCP Values 182
10 Quality of Service 185
Overview 185
Configuring a Class Map 186
Creating QoS Policies 190
Attaching a Policy Map to a Port 199
11 Security Measures 201
AAA Authorization and Accounting 201
Configuring Local/Remote Logon Authentication
Configuring Remote Logon Authentication Servers 203
Configuring User Accounts 209
Configuring HTTPS 211
Configuring Global Settings for HTTPS 211
Replacing the Default Secure-site Certificate 212
Configuring the Secure Shell 214
Configuring the SSH Server 217
202
Generating the Host Key Pair 218
Importing User Public Keys 220
Access Control Lists 222
Setting A Time Range 223
Showing TCAM Utilization 226
Setting the ACL Name and Type 227
Configuring a Standard IPv4 ACL 229
Configuring an Extended IPv4 ACL 230
Configuring a Standard IPv6 ACL 232
Configuring an Extended IPv6 ACL 234
Configuring a MAC ACL 235
Binding a Port to an Access Control List 237
Filtering IP Addresses for Management Access 238
Page 9
– 9 –
Contents
13 Multicast Filtering
309
Overview
309
12 Basic Administration Protocols 241
Configuring Event Logging 241
System Log Configuration 241
Remote Log Configuration 244
Link Layer Discovery Protocol 245
Setting LLDP Timing Attributes 245
Configuring LLDP Interface Attributes 247
Configuring LLDP Interface Civic-Address 251
Displaying LLDP Local Device Information 253
Displaying LLDP Remote Device Information 256
Displaying Device Statistics 264
Simple Network Management Protocol 266
Configuring Global Settings for SNMP 268
Setting the Local Engine ID 269
Specifying a Remote Engine ID 270
Setting SNMPv3 Views 271
Configuring SNMPv3 Groups 274
Setting Community Access Strings 278
Configuring Local SNMPv3 Users 279
Configuring Remote SNMPv3 Users 281
Specifying Trap Managers 284
Creating SNMP Notification Logs 288
Showing SNMP Statistics 290
Remote Monitoring 292
Configuring RMON Alarms 292
Configuring RMON Events 295
Configuring RMON History Samples 297
Configuring RMON Statistical Samples 300
UDLD Configuration 302
Configuring UDLD Protocol Intervals 303
Configuring UDLD Interface Settings 304
Displaying UDLD Neighbor Information 306
Page 10
Contents
– 10 –
IGMP Protocol 310
Layer 2 IGMP (Snooping and Query for IPv4) 311
Configuring IGMP Snooping and Query Parameters 313
Specifying Static Interfaces for an IPv4 Multicast Router 316
Assigning Interfaces to IPv4 Multicast Services 319
Setting IGMP Snooping Status per Interface 320
Filtering IGMP Query Packets 326
Displaying Multicast Groups Discovered by IGMP Snooping 327
Displaying IGMP Snooping Statistics 328
Filtering and Throttling IGMP Groups 332
Enabling IGMP Filtering and Throttling 332
Configuring IGMP Filter Profiles 333
Configuring IGMP Filtering and Throttling for Interfaces 335
14 IP Configuration 339
Setting the Switch’s IP Address (IP Version 4) 339
Setting the Switch’s IP Address (IP Version 6) 343
Configuring the IPv6 Default Gateway 343
Configuring IPv6 Interface Settings 344
Configuring an IPv6 Address 348
Showing IPv6 Addresses 351
Showing the IPv6 Neighbor Cache 352
Showing IPv6 Statistics 353
Showing the MTU for Responding Destinations 360
15 IP Services 361
Dynamic Host Configuration Protocol 361
Specifying A DHCP Client Identifier 361
Configuring DHCP Relay Service 363
16 General IP Routing 365
Overview 365
Initial Configuration 365
IP Routing and Switching 366
Routing Path Management 367
Routing Protocols 368
Page 11
Contents
– 11 –
Configuring IP Routing Interfaces 368
Configuring Local and Remote Interfaces 368
Using the Ping Function 369
Using the Trace Route Function 370
Address Resolution Protocol 372
ARP Timeout Configuration 372
Configuring Static ARP Addresses 373
Displaying Dynamic or Local ARP Entries 375
Displaying ARP Statistics 375
Configuring Static Routes 376
Displaying the Routing Table 378
Equal-cost Multipath Routing 379
17 Configuring Router Redundancy 383
Configuring VRRP Groups 384
Displaying VRRP Global Statistics 390
Displaying VRRP Group Statistics 391
18 Unicast Routing 393
Overview 393
Configuring the Open Shortest Path First Protocol (Version 2) 393
Defining Network Areas Based on Addresses 395
Configuring General Protocol Settings 398
Displaying Administrative Settings and Statistics 401
Adding an NSSA or Stub 403
Configuring NSSA Settings 404
Configuring Stub Settings 407
Displaying Information on NSSA and Stub Areas 409
Configuring Area Ranges (Route Summarization for ABRs) 410
Redistributing External Routes 412
Configuring Summary Addresses (for External AS Routes) 414
Configuring OSPF Interfaces 416
Configuring Virtual Links 421
Displaying Link State Database Information 424
Displaying Information on Neighboring Routers 426
Configuring Passive Interfaces 427
Page 12
Contents
12
Section III
Appendices 431
A
Software Specifications
433
Software Features
433
Management Features
434
Standards
435
Management Information Bases
436
B
Troubleshooting 439
Problems Accessing the Management Interface
439
Using System Logs 440
C
License Information
441
The GNU General Public License
441
Glossary
445
Index
453
Page 13
– 13 –
Figure 1:
Home Page
40
Figure 2:
Front Panel Indicators
41
Figure 3:
System Information
56
Figure 4:
General Switch Information
57
Figure 5:
Configuring Support for Jumbo Frames
58
Figure 6:
Displaying Bridge Extension Configuration
60
Figure 7:
Copy Firmware
62
Figure 8:
Saving the Running Configuration
63
Figure 9:
Setting Start-Up Files
64
Figure 10:
Displaying System Files
64
Figure 11:
Configuring Automatic Code Upgrade
68
Figure 12:
Manually Setting the System Clock
70
Figure 13:
Setting the Polling Interval for SNTP
70
Figure 14:
Configuring NTP 71
Figure 15:
Specifying SNTP Time Servers
72
Figure 16:
Adding an NTP Time Server
73
Figure 17:
Showing the NTP Time Server List
74
Figure 18:
Adding an NTP Authentication Key
75
Figure 19:
Showing the NTP Authentication Key List
75
Figure 20:
Setting the Time Zone 76
Figure 21:
Console Port Settings
78
Figure 22:
Telnet Connection Settings
79
Figure 23:
Displaying CPU Utilization
80
Figure 24:
Displaying Memory Utilization
81
Figure 25:
Restarting the Switch (Immediately)
83
Figure 26:
Restarting the Switch (In)
83
Figure 27:
Restarting the Switch (At)
84
Figure 28:
Restarting the Switch (Regularly)
84
Figure 29:
Configuring Connections by Port List
88
Figures
Page 14
Figures
– 14 –
Figure 30:
Configuring Connections by Port Range
89
Figure 31:
Displaying Port Information
90
Figure 32:
Configuring Local Port Mirroring
90
Figure 33:
Configuring Local Port Mirroring
91
Figure 34:
Displaying Local Port Mirror Sessions
91
Figure 35:
Showing Port Statistics (Table)
95
Figure 36:
Showing Port Statistics (Chart)
96
Figure 37:
Configuring a History Sample
98
Figure 38:
Showing Entries for History Sampling
98
Figure 39:
Showing Status of Statistical History Sample
99
Figure 40:
Showing Current Statistics for a History Sample
99
Figure 41:
Showing Ingress Statistics for a History Sample
100
Figure 42:
Displaying Transceiver Data
101
Figure 43:
Configuring Transceiver Thresholds
103
Figure 44:
Configuring Static Trunks
104
Figure 45:
Creating Static Trunks
105
Figure 46:
Adding Static Trunks Members
106
Figure 47:
Configuring Connection Parameters for a Static Trunk
106
Figure 48:
Showing Information for Static Trunks
107
Figure 49:
Configuring Dynamic Trunks
107
Figure 50:
Configuring the LACP Aggregator Admin Key
110
Figure 51:
Enabling LACP on a Port
111
Figure 52:
Configuring LACP Parameters on a Port
111
Figure 53:
Showing Members of a Dynamic Trunk
112
Figure 54:
Configuring Connection Settings for Dynamic Trunks
112
Figure 55:
Displaying Connection Parameters for Dynamic Trunks
113
Figure 56:
Displaying LACP Port Counters
114
Figure 57:
Displaying LACP Port Internal Information
115
Figure 58:
Displaying LACP Port Remote Information
117
Figure 59:
Configuring Load Balancing
118
Figure 60:
Enabling Traffic Segmentation
120
Figure 61:
Configuring Members for Traffic Segmentation
121
Figure 62:
Showing Traffic Segmentation Members
122
Figure 63:
VLAN Compliant and VLAN Non-compliant Devices
124
Figure 64:
Creating Static VLANs
126
Page 15
Figures
– 15 –
Figure 65:
Modifying Settings for Static VLANs
127
Figure 66:
Showing Static VLANs
127
Figure 67:
Configuring Static Members by VLAN Index
130
Figure 68:
Configuring Static VLAN Members by Interface
131
Figure 69:
Configuring Static VLAN Members by Interface Range
131
Figure 70:
Configuring MAC Address Learning
134
Figure 71:
Configuring Static MAC Addresses
136
Figure 72:
Displaying Static MAC Addresses
136
Figure 73:
Setting the Address Aging Time
137
Figure 74:
Displaying the Dynamic MAC Address Table
138
Figure 75:
Clearing Entries in the Dynamic MAC Address Table
139
Figure 76:
Issuing MAC Address Traps (Global Configuration)
140
Figure 77:
Issuing MAC Address Traps (Interface Configuration)
140
Figure 78:
STP Root Ports and Designated Ports
142
Figure 79:
MSTP Region, Internal Spanning Tree, Multiple Spanning Tree
142
Figure 80:
Common Internal Spanning Tree, Common Spanning Tree, Internal Spanning Tree
143
Figure 81:
Configuring Global Settings for STA (STP)
147
Figure 82:
Configuring Global Settings for STA (RSTP)
147
Figure 83:
Configuring Global Settings for STA (MSTP)
148
Figure 84:
Displaying Global Settings for STA
149
Figure 85:
Configuring Interface Settings for STA
152
Figure 86:
STA Port Roles
154
Figure 87:
Displaying Interface Settings for STA
155
Figure 88:
Creating an MST Instance
156
Figure 89:
Displaying MST Instances
157
Figure 90:
Modifying the Priority for an MST Instance
157
Figure 91:
Displaying Global Settings for an MST Instance
158
Figure 92:
Adding a VLAN to an MST Instance
158
Figure 93:
Displaying Members of an MST Instance
159
Figure 94:
Configuring MSTP Interface Settings
160
Figure 95:
Displaying MSTP Interface Settings
161
Figure 96:
Configuring Storm Control
164
Figure 97:
Setting the Default Port Priority
166
Figure 98:
Setting the Queue Mode (Strict)
168
Page 16
Figures
– 16 –
Figure 99:
Setting the Queue Mode (WRR)
168
Figure 100:
Setting the Queue Mode (Strict and WRR)
169
Figure 101:
Mapping CoS Values to Egress Queues
171
Figure 102:
Showing CoS Values to Egress Queue Mapping
171
Figure 103:
Setting the Trust Mode
173
Figure 104:
Configuring DSCP to DSCP Internal Mapping
175
Figure 105:
Showing DSCP to DSCP Internal Mapping
175
Figure 106:
Configuring CoS to DSCP Internal Mapping
177
Figure 107:
Showing CoS to DSCP Internal Mapping
178
Figure 108:
Configuring DSCP to CoS Egress Mapping
179
Figure 109:
Showing DSCP to CoS Egress Mapping
180
Figure 110:
Configuring IP Precedence to DSCP Internal Mapping
182
Figure 111:
Showing the IP Precedence to DSCP Internal Map
182
Figure 112:
Configuring IP Port Number to DSCP Internal Mapping
183
Figure 113:
Showing IP Port Number to DSCP Internal Mapping
184
Figure 114:
Configuring a Class Map
187
Figure 115:
Showing Class Maps
188
Figure 116:
Adding Rules to a Class Map
189
Figure 117:
Showing the Rules for a Class Map
189
Figure 118:
Configuring a Policy Map
197
Figure 119:
Showing Policy Maps
197
Figure 120:
Adding Rules to a Policy Map
198
Figure 121:
Showing the Rules for a Policy Map
199
Figure 122:
Attaching a Policy Map to a Port
200
Figure 123:
Configuring the Authentication Sequence
203
Figure 124:
Authentication Server Operation
204
Figure 125:
Configuring Remote Authentication Server (RADIUS)
207
Figure 126:
Configuring Remote Authentication Server (TACACS+)
207
Figure 127:
Configuring AAA Server Groups
208
Figure 128:
Showing AAA Server Groups
208
Figure 129:
Configuring User Accounts
210
Figure 130:
Showing User Accounts
210
Figure 131:
Configuring HTTPS
212
Figure 132:
Downloading the Secure-Site Certificate
214
Figure 133:
Configuring the SSH Server
218
Page 17
Figures
– 17 –
Figure 134:
Generating the SSH Host Key Pair
219
Figure 135:
Showing the SSH Host Key Pair
220
Figure 136:
Copying the SSH User’s Public Key
221
Figure 137:
Showing the SSH User’s Public Key
222
Figure 138:
Setting the Name of a Time Range
224
Figure 139:
Showing a List of Time Ranges
225
Figure 140:
Add a Rule to a Time Range
225
Figure 141:
Showing the Rules Configured for a Time Range
226
Figure 142:
Showing TCAM Utilization
227
Figure 143:
Creating an ACL
228
Figure 144:
Showing a List of ACLs
228
Figure 145:
Configuring a Standard IPv4 ACL
230
Figure 146:
Configuring an Extended IPv4 ACL
232
Figure 147:
Configuring a Standard IPv6 ACL
233
Figure 148:
Configuring an Extended IPv6 ACL
235
Figure 149:
Configuring a MAC ACL
237
Figure 150:
Binding a Port to an ACL
238
Figure 151:
Creating an IP Address Filter for Management Access
240
Figure 152:
Showing IP Addresses Authorized for Management Access
240
Figure 153:
Configuring Settings for System Memory Logs
243
Figure 154:
Showing Error Messages Logged to System Memory
243
Figure 155:
Configuring Settings for Remote Logging of Error Messages
245
Figure 156:
Configuring LLDP Timing Attributes
247
Figure 157:
Configuring LLDP Interface Attributes
251
Figure 158:
Configuring the Civic Address for an LLDP Interface
252
Figure 159:
Displaying Local Device Information for LLDP (General)
255
Figure 160:
Displaying Local Device Information for LLDP (Port)
256
Figure 161:
Displaying Remote Device Information for LLDP (Port)
262
Figure 162:
Displaying Remote Device Information for LLDP (Port Details)
263
Figure 163:
Displaying Remote Device Information for LLDP (End Node)
264
Figure 164:
Displaying LLDP Device Statistics (General)
265
Figure 165:
Displaying LLDP Device Statistics (Port)
266
Figure 166:
Configuring Global Settings for SNMP
269
Figure 167:
Configuring the Local Engine ID for SNMP
270
Figure 168:
Configuring a Remote Engine ID for SNMP
271
Page 18
Figures
– 18 –
Figure 169:
Showing Remote Engine IDs for SNMP
271
Figure 170:
Creating an SNMP View
272
Figure 171:
Showing SNMP Views
273
Figure 172:
Adding an OID Subtree to an SNMP View
273
Figure 173:
Showing the OID Subtree Configured for SNMP Views
274
Figure 174:
Creating an SNMP Group
277
Figure 175:
Showing SNMP Groups
277
Figure 176:
Setting Community Access Strings
278
Figure 177:
Showing Community Access Strings
279
Figure 178:
Configuring Local SNMPv3 Users
280
Figure 179:
Showing Local SNMPv3 Users
281
Figure 180:
Configuring Remote SNMPv3 Users
283
Figure 181:
Showing Remote SNMPv3 Users
283
Figure 182:
Configuring Trap Managers (SNMPv1)
287
Figure 183:
Configuring Trap Managers (SNMPv2c)
287
Figure 184:
Configuring Trap Managers (SNMPv3)
287
Figure 185:
Showing Trap Managers
288
Figure 186:
Creating SNMP Notification Logs
289
Figure 187:
Showing SNMP Notification Logs
290
Figure 188:
Showing SNMP Statistics
291
Figure 189:
Configuring an RMON Alarm
294
Figure 190:
Showing Configured RMON Alarms
295
Figure 191:
Configuring an RMON Event
296
Figure 192:
Showing Configured RMON Events
297
Figure 193:
Configuring an RMON History Sample
299
Figure 194:
Showing Configured RMON History Samples
299
Figure 195:
Showing Collected RMON History Samples
300
Figure 196:
Configuring an RMON Statistical Sample
301
Figure 197:
Showing Configured RMON Statistical Samples
301
Figure 198:
Showing Collected RMON Statistical Samples
302
Figure 199:
Configuring UDLD Protocol Intervals
304
Figure 200:
Configuring UDLD Interface Settings
306
Figure 201:
Displaying UDLD Neighbor Information
307
Figure 202:
Multicast Filtering Concept
309
Figure 203:
IGMP Protocol
311
Page 19
Figures
– 19 –
Figure 204:
Configuring General Settings for IGMP Snooping
316
Figure 205:
Configuring a Static Interface for an IPv4 Multicast Router
318
Figure 206:
Showing Static Interfaces Attached an IPv4 Multicast Router
318
Figure 207:
Showing Current Interfaces Attached an IPv4 Multicast Router
319
Figure 208:
Assigning an Interface to an IPv4 Multicast Service
320
Figure 209:
Showing Static Interfaces Assigned to an IPv4 Multicast Service
320
Figure 210:
Configuring IGMP Snooping on a VLAN
325
Figure 211:
Showing Interface Settings for IGMP Snooping
326
Figure 212:
Dropping IGMP Query Packets
327
Figure 213:
Showing Multicast Groups Learned by IGMP Snooping
328
Figure 214:
Displaying IGMP Snooping Statistics – Query
330
Figure 215:
Displaying IGMP Snooping Statistics – VLAN
331
Figure 216:
Displaying IGMP Snooping Statistics – Port
331
Figure 217:
Enabling IGMP Filtering and Throttling
333
Figure 218:
Creating an IGMP Filtering Profile
334
Figure 219:
Showing the IGMP Filtering Profiles Created
334
Figure 220:
Adding Multicast Groups to an IGMP Filtering Profile
335
Figure 221:
Showing the Groups Assigned to an IGMP Filtering Profile
335
Figure 222:
Configuring IGMP Filtering and Throttling Interface Settings
337
Figure 223:
Configuring a Static IPv4 Address
341
Figure 224:
Configuring a Dynamic IPv4 Address
342
Figure 225:
Showing the IPv4 Address Configured for an Interface
343
Figure 226:
Configuring the IPv6 Default Gateway
344
Figure 227:
Configuring General Settings for an IPv6 Interface
348
Figure 228:
Configuring an IPv6 Address
350
Figure 229:
Showing Configured IPv6 Addresses
352
Figure 230:
Showing IPv6 Neighbors
353
Figure 231:
Showing IPv6 Statistics (IPv6)
358
Figure 232:
Showing IPv6 Statistics (ICMPv6)
359
Figure 233:
Showing IPv6 Statistics (UDP)
359
Figure 234:
Showing Reported MTU Values
360
Figure 235:
Specifying A DHCP Client Identifier
363
Figure 236:
Layer 3 DHCP Relay Service
363
Figure 237:
Configuring DHCP Relay Service
364
Figure 238:
Virtual Interfaces and Layer 3 Routing
366
Page 20
Figures
– 20 –
Figure 239:
Pinging a Network Device
370
Figure 240:
Tracing the Route to a Network Device
371
Figure 241:
Configuring ARP Timeout
373
Figure 242:
Configuring Static ARP Entries
374
Figure 243:
Displaying Static ARP Entries
375
Figure 244:
Displaying ARP Entries
375
Figure 245:
Displaying ARP Statistics
376
Figure 246:
Configuring Static Routes
377
Figure 247:
Displaying Static Routes
378
Figure 248:
Displaying the Routing Table
379
Figure 249:
Setting the Maximum ECMP Number
381
Figure 250:
Master Virtual Router with Backup Routers
383
Figure 251:
Several Virtual Master Routers Using Backup Routers
384
Figure 252:
Several Virtual Master Routers Configured for Mutual Backup and Load Sharing
384
Figure 253:
Configuring the VRRP Group ID
388
Figure 254:
Showing Configured VRRP Groups
388
Figure 255:
Setting the Virtual Router Address for a VRRP Group
389
Figure 256:
Showing the Virtual Addresses Assigned to VRRP Groups
389
Figure 257:
Configuring Detailed Settings for a VRRP Group
390
Figure 258:
Showing Counters for Errors Found in VRRP Packets
391
Figure 259:
Showing Counters for Errors Found in a VRRP Group
392
Figure 260:
Configuring OSPF
394
Figure 261:
OSPF Areas
396
Figure 262:
Defining OSPF Network Areas Based on Addresses
397
Figure 263:
Showing OSPF Network Areas
398
Figure 264:
Showing OSPF Process Identifiers
398
Figure 265:
AS Boundary Router
400
Figure 266:
Configure General Settings for OSPF
401
Figure 267:
Showing General Settings for OSPF
402
Figure 268:
Adding an NSSA or Stub
403
Figure 269:
Showing NSSAs or Stubs
404
Figure 270:
OSPF NSSA
404
Figure 271:
Configuring Protocol Settings for an NSSA
407
Figure 272:
OSPF Stub Area
407
Figure 273:
Configuring Protocol Settings for a Stub
409
Page 21
Figures
– 21 –
Figure 274:
Displaying Information on NSSA and Stub Areas
410
Figure 275:
Route Summarization for ABRs
410
Figure 276:
Configuring Route Summaries for an Area Range
411
Figure 277:
Showing Configured Route Summaries
412
Figure 278:
Redistributing External Routes
412
Figure 279:
Importing External Routes
413
Figure 280:
Showing Imported External Route Types
414
Figure 281:
Summarizing External Routes
415
Figure 282:
Showing Summary Addresses for External Routes
415
Figure 283:
Configuring Settings for All Interfaces Assigned to a VLAN
419
Figure 284:
Configuring Settings for a Specific Area Assigned to a VLAN
420
Figure 285:
Showing OSPF Interfaces
420
Figure 286:
Showing MD5 Authentication Keys
421
Figure 287:
OSPF Virtual Link
421
Figure 288:
Adding a Virtual Link
422
Figure 289:
Showing Virtual Links
423
Figure 290:
Configuring Detailed Settings for a Virtual Link
423
Figure 291:
Showing MD5 Authentication Keys
424
Figure 292:
Displaying Information in the Link State Database
426
Figure 293:
Displaying Neighbor Routers Stored in the Link State Database
427
Figure 294:
Configuring an OSPF Passive Interface
428
Figure 295:
Showing OSPF Passive Interfaces
429
Page 22
Figures
22
Page 23
23
Table 1:
Key Features
27
Table 2:
System Defaults
34
Table 3:
Web Page Configuration Buttons
41
Table 4:
Switch Main Menu
42
Table 5:
Port Statistics
92
Table 6:
LACP Port Counters
113
Table 7:
LACP Internal Configuration Information
114
Table 8:
LACP Remote Device Configuration Information
116
Table 9:
Traffic Segmentation Forwarding
120
Table 10:
Recommended STA Path Cost Range
150
Table 11:
Default STA Path Costs
150
Table 12:
IEEE 802.1p Egress Queue Priority Mapping
169
Table 13:
CoS Priority Levels
170
Table 14:
Mapping Internal Per-hop Behavior to Hardware Queues
170
Table 15:
Default Mapping of DSCP Values to Internal PHB/Drop Values
174
Table 16:
Default Mapping of CoS/CFI to Internal PHB/Drop Precedence
176
Table 17:
Mapping Internal PHB/Drop Precedence to CoS/CFI Values
179
Table 18:
Mapping IP Precedence
180
Table 19:
Default Mapping of IP Precedence to Internal PHB/Drop Values
181
Table 20:
HTTPS System Support
211
Table 21:
Logging Levels
242
Table 22:
LLDP MED Location CA Types
251
Table 23:
Chassis ID Subtype
253
Table 24:
System Capabilities
253
Table 25:
Port ID Subtype
254
Table 26:
Remote Port Auto-Negotiation Advertised Capability
258
Table 27:
SNMPv3 Security Models and Levels
267
Table 28:
Supported Notification Messages
275
Table 29:
Show IPv6 Neighbors - display description
352
Tables
Page 24
Tables
– 24 –
Table 30:
Show IPv6 Statistics - display description
354
Table 31:
Show MTU - display description
360
Table 32:
Options 60, 66 and 67 Statements
361
Table 33:
Options 55 and 124 Statements
362
Table 34:
Address Resolution Protocol
372
Table 35:
ARP Statistics
375
Table 36:
VRRP Group Statistics
391
Table 37:
OSPF System Information
401
Table 38:
Troubleshooting Chart
439
Page 25
– 25 –
Section I
Getting Started
This section provides an overview of the switch, and introduces some basic concepts about network switches. It also describes the basic settings required to access the management interface.
This section includes these chapters:
"Introduction" on page 27
Page 26
Section I
|
Getting Started
26
Page 27
27
Feature Description
1
Key Features
Introduction
This switch provides a broad range of features for Layer 2 switching and Layer 3 routing. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch. However, there are many options that you should configure to maximize the switch’s performance for your particular network environment.
Table 1: Key Features
Configuration Backup and Restore
Authentication Console, Telnet, web – user name/password, RADIUS, TACACS+
General Security Measures IP Address Filtering
Access Control Lists Supports up to 256 ACLs, up to 96 rules per ACL
DHCP
DHCPv6 Client
DNS
Port Configuration Speed, duplex mode and flow control
Port Trunking Supports up to 8 trunks – static or dynamic trunking (LACP)
Port Mirroring 28 sessions, one or more source ports to one analysis port
Congestion Control Rate Limiting
Using management station or FTP/TFTP server
SNMP v1/2c - Community strings SNMP version 3 – MD5 or SHA password Telnet – SSH Web – HTTPS
Local and Remote User Accounts RADIUS Server Authentication Secure Shell
Client, Relay
Client service
Throttling for broadcast, multicast, unknown unicast storms
Page 28
Chapter 1
|
Introduction
Description of Software Features
– 28 –
Feature Description
Table 1: Key Features (Continued)
Address Table 32K MAC addresses in forwarding table, 1K static MAC addresses;
8K entries in ARP cache, 256 static ARP entries; 512 static IP routes, 512 IP interfaces; 12K IPv4 entries in host table; 8K IPv4 entries in routing table; 6K IPv6 entries in host table; 4K IPv6 entries in routing table 1K L2 IPv4 multicast groups; 1K L3 IPv4 multicast groups (shared with IPv6); 1K L3 IPv6 multicast groups (shared with IPv4)
IP Version 4 and 6 Supports IPv4 and IPv6 addressing, and management
IEEE 802.1D Bridge Supports dynamic data switching and addresses learning
Store-and-Forward Switching
Spanning Tree Algorithm Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and
Virtual LANs Up to 4094 using IEEE 802.1Q, and port-based VLANs
Traffic Prioritization Default port priority, traffic class map, queue scheduling, IP Precedence,
Qualify of Service Supports Differentiated Services (DiffServ)
Link Layer Discovery Protocol
Router Redundancy Router backup is provided with the Virtual Router Redundancy Protocol
IP Routing
ARP Static and dynamic address configuration, proxy ARP
Multicast Filtering Supports IGMP snooping and query for Layer 2
Multicast Routing Static multicast routing
Supported to ensure wire-speed switching while eliminating bad frames
Multiple Spanning Trees (MSTP)
or Differentiated Services Code Point (DSCP), and TCP/UDP Port
Used to discover basic information about neighboring devices
(VRRP)
Open Shortest Path First (OSPFv2/v3*), Border Gateway Protocol (BGPv4)*, policy-based routing for BGP*, static routes, Equal-Cost Multipath Routing (ECMP)
Description of Software Features
* These features are only available through the Command Line Interface
The switch provides a wide range of advanced performance enhancing features. Flow control eliminates the loss of packets due to bottlenecks caused by port saturation. Broadcast storm suppression prevents broadcast traffic storms from engulfing the network. Untagged (port-based), tagged, and protocol-based VLANs, plus support for automatic GVRP VLAN registration provide traffic security and efficient use of network bandwidth. CoS priority queueing ensures the minimum delay for moving real-time multimedia data across the network. While multicast filtering and routing provides support for real-time network applications.
Page 29
Chapter 1
|
Introduction
Description of Software Features
– 29 –
Some of the management features are briefly described below.
Configuration
Backup and Restore
You can save the current configuration settings to a file on the management station (using the web interface) or an FTP/TFTP server (using the web or console interface), and later download this file to restore the switch configuration settings.
Authentication This switch authenticates management access via the console port, Telnet, or a web
browser. User names and passwords can be configured locally or can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Other authentication options include HTTPS for secure management access via the web, SSH for secure management access over a Telnet-equivalent connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web management access. MAC address filtering and IP source guard also provide authenticated port access. Access Control Lists
ACLs provide packet filtering for IP frames (based on address, protocol, TCP/UDP port number or TCP control code) or any frames (based on MAC address or Ethernet type). ACLs can by used to improve performance by blocking unnecessary network traffic or to implement security controls by restricting access to specific network resources or protocols.
DHCP DHCP Relay Option 82 controls the processing of Option 82 information in DHCP
request packets relayed by this device.
Port Configuration You can manually configure the speed, duplex mode, and flow control used on
specific ports, or use auto-negotiation to detect the connection settings used by the attached device. Use full-duplex mode on ports whenever possible to double the throughput of switch connections. Flow control should also be enabled to control network traffic during periods of congestion and prevent the loss of packets when port buffer thresholds are exceeded. The switch supports flow control based on the IEEE 802.3x standard (now incorporated in IEEE 802.3-2002).
Port Mirroring The switch can unobtrusively mirror traffic from any port to a monitor port. You can
then attach a protocol analyzer or RMON probe to this port to perform traffic analysis and verify connection integrity.
Port Trunking Ports can be combined into an aggregate connection. Trunks can be manually set
up or dynamically configured using Link Aggregation Control Protocol (LACP – IEEE
802.3-2005). The additional ports dramatically increase the throughput across any connection, and provide redundancy by taking over the load if a port in the trunk should fail. The switch supports up to 8 trunks.
Page 30
Chapter 1
|
Introduction
Description of Software Features
– 30 –
Storm Control Broadcast, multicast and unknown unicast storm suppression prevents traffic from
overwhelming the network.When enabled on a port, the level of traffic passing through the port is restricted. If traffic rises above a pre-defined threshold, it will be throttled until the level falls back beneath the threshold.
Static MAC
Addresses
A static address can be assigned to a specific interface on this switch. Static addresses are bound to the assigned interface and will not be moved. When a static address is seen on another interface, the address will be ignored and will not be written to the address table. Static addresses can be used to provide network security by restricting access for a known host to a specific port.
IP Address Filtering Access to insecure ports can be controlled using DHCP Snooping which filters
ingress traffic based on static IP addresses and addresses stored in the DHCP Snooping table. Traffic can also be restricted to specific source IP addresses or source IP/MAC address pairs based on static entries or entries stored in the DHCP Snooping table.
IEEE 802.1D Bridge The switch supports IEEE 802.1D transparent bridging. The address table facilitates
data switching by learning addresses, and then filtering or forwarding traffic based on this information. The address table supports up to 32K addresses.
Store-and-Forward
Switching
The switch copies each frame into its memory before forwarding them to another port. This ensures that all frames are a standard Ethernet size and have been verified for accuracy with the cyclic redundancy check (CRC). This prevents bad frames from entering the network and wasting bandwidth.
Spanning Tree
Algorithm
To avoid dropping frames on congested ports, the switch provides 3 Mbits for frame buffering. This buffer can queue packets awaiting transmission on congested networks.
The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol provides loop detection. When there are multiple physical paths between segments, this protocol will choose a single path and disable all others to ensure that only one route exists between any two stations on the network. This prevents the creation of network loops. However, if the chosen path should fail for any reason, an alternate path will be activated to maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the convergence time for network topology changes to about 3 to 5 seconds, compared to 30 seconds or more for the older IEEE 802.1D STP standard. It is intended as a complete replacement for STP, but can still interoperate with switches running the older standard by automatically reconfiguring ports to
Page 31
Chapter 1
|
Introduction
Description of Software Features
– 31 –
STP-compliant mode if they detect STP protocol messages from attached devices.
Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) – This protocol is a direct extension of RSTP. It can provide an independent spanning tree for different VLANs. It simplifies network management, provides for even faster convergence than RSTP by limiting the size of each region, and prevents VLAN members from being segmented from the rest of the group (as sometimes occurs with IEEE 802.1D STP).
Virtual LANs The switch supports up to 4094 VLANs. A Virtual LAN is a collection of network
nodes that share the same collision domain regardless of their physical location or connection point in the network. The switch supports tagged VLANs based on the IEEE 802.1Q standard. Members of VLAN groups can be manually assigned to a specific set of VLANs. This allows the switch to restrict traffic to the VLAN groups to which a user has been assigned. By segmenting your network into VLANs, you can:
Eliminate broadcast storms which severely degrade performance in a flat network.
Simplify network management for node changes/moves by remotely configuring VLAN membership for any port, rather than having to manually change the network connection.
Provide data security by restricting all traffic to the originating VLAN, except where a connection is explicitly defined via the switch's routing service.
Traffic Prioritization This switch prioritizes each packet based on the required level of service, using
eight priority queues with strict priority, Weighted Round Robin (WRR), or a combination of strict and weighted queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on input from the end-station application. These functions can be used to provide independent priorities for delay-sensitive data and best-effort data.
Quality of Service Differentiated Services (DiffServ) provides policy-based management mechanisms
This switch also supports several common methods of prioritizing layer 3/4 traffic to meet application requirements. Traffic can be prioritized based on the priority bits in the IP frame’s Type of Service (ToS) octet using DSCP, or IP Precedence or TCP/UDP port numbers. When these services are enabled, the priorities are mapped to a Class of Service value by the switch, and the traffic then sent to the corresponding output queue.
used for prioritizing network resources to meet the requirements of specific traffic types on a per-hop basis. Each packet is classified upon entry into the network based on access lists, IP Precedence or DSCP values, or VLAN lists. Using access lists allows you select traffic based on Layer 2, Layer 3, or Layer 4 information contained
Page 32
Chapter 1
|
Introduction
Description of Software Features
– 32 –
in each packet. Based on network policies, different kinds of traffic can be marked for different kinds of forwarding.
IP Routing The switch provides Layer 3 IP routing. To maintain a high rate of throughput, the
switch forwards all traffic passing within the same segment, and routes only traffic that passes between different subnetworks. The wire-speed routing provided by this switch lets you easily link network segments or VLANs together without having to deal with the bottlenecks or configuration hassles normally associated with conventional routers.
Routing for unicast traffic is supported with static routing, Open Shortest Path First (OSPF) protocol, and Border Gateway Protocol (BGP).
Static Routing – Traffic is automatically routed between any IP interfaces configured on the switch. Routing to statically configured hosts or subnet addresses is provided based on next-hop entries specified in the static routing table.
OSPF – This approach uses a link state routing protocol to generate a shortest-path tree, then builds up its routing table based on this tree. OSPF produces a more stable network because the participating routers act on network changes predictably and simultaneously, converging on the best route more quickly than RIP.
BGP – This protocol uses a path vector approach to connect autonomous systems (AS) on the Internet. BGP maintains a table of IP network prefixes which designate network reachability among autonomous systems based the path of ASs to the destination, and next hop information. It makes routing decisions based on path, network policies and/or rule sets. For this reason, it is more appropriately termed a reachability protocol rather than a routing protocol.
Policy-based Routing for BGP – The next-hop behavior for ingress IP traffic can be determined based on matching criteria.
Equal-cost Multipath
Load Balancing
Router Redundancy Virtual Router Redundancy Protocol (VRRP) uses a virtual IP address to support a
When multiple paths to the same destination and with the same path cost are found in the routing table, the Equal-cost Multipath (ECMP) algorithm first checks if the cost is lower than that of any other routing entries. If the cost is the lowest in the table, the switch will use up to eight paths having the lowest path cost to balance traffic forwarded to the destination. ECMP uses either equal-cost unicast multipaths manually configured in the static routing table, or equal-cost multipaths dynamically detected by the Open Shortest Path Algorithm (OSPF). In other words, it uses either static or unicast routing entries, not both.
primary router and multiple backup routers. The backups can be configured to take over the workload if the master fails or to load share the traffic. The primary goal of
Page 33
Chapter 1
|
Introduction
Description of Software Features
– 33 –
this protocol is to allow a host device which has been configured with a fixed gateway to maintain network connectivity in case the primary gateway goes down.
Address Resolution
Protocol
The switch uses ARP and Proxy ARP to convert between IP addresses and MAC (hardware) addresses. This switch supports conventional ARP, which locates the MAC address corresponding to a given IP address. This allows the switch to use IP addresses for routing decisions and the corresponding MAC addresses to forward packets from one hop to the next. Either static or dynamic entries can be configured in the ARP cache.
Proxy ARP allows hosts that do not support routing to determine the MAC address of a device on another network or subnet. When a host sends an ARP request for a remote network, the switch checks to see if it has the best route. If it does, it sends its own MAC address to the host. The host then sends traffic for the remote destination via the switch, which uses its own routing table to reach the destination on the other network.
Multicast Filtering Specific multicast traffic can be assigned to its own VLAN to ensure that it does not
interfere with normal network traffic and to guarantee real-time delivery by setting the required priority level for the designated VLAN. The switch uses IGMP Snooping and Query for IPv4.
Link Layer
Discovery Protocol
LLDP is used to discover basic information about neighboring devices within the local broadcast domain. LLDP is a Layer 2 protocol that advertises information about the sending device and collects information gathered from neighboring network nodes it discovers.
Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include details such as device identification, capabilities and configuration settings. Media Endpoint Discovery (LLDP-MED) is an extension of LLDP intended for managing endpoint devices such as Voice over IP phones and network switches. The LLDP-MED TLVs advertise information such as network policy, power, inventory, and device location details. The LLDP and LLDP­MED information can be used by SNMP applications to simplify troubleshooting, enhance network management, and maintain an accurate network topology.
Page 34
– 34 –
Chapter 1
|
Introduction
System Defaults
Function Parameter Default
System Defaults
The switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch defaults, this file should be set as
the startup configuration file.
The following table lists some of the basic system defaults.
Table 2: System Defaults
Console Port Connection Baud Rate 115200 bps
Data bits 8
Stop bits 1
Parity none
Local Console Timeout
Authentication and Security Measures
Web Management HTTP Server Enabled
Privileged Exec Level Username “admin”
Normal Exec Level Username “guest”
Enable Privileged Exec from Normal Exec Level
RADIUS Authentication Disabled
TACACS+ Authentication Disabled
MAC Authentication Disabled
HTTPS Enabled
SSH Disabled
IP Filtering Disabled
0 (disabled)
Password “admin”
Password “guest”
Password “super”
SNMP SNMP Agent Enabled
HTTP Port Number 80
HTTP Secure Server Enabled
HTTP Secure Server Port 443
Community Strings
Traps Authentication traps: enabled
SNMP V3 View: defaultview
“public” (read only) “private” (read/write)
Link-up-down events: enabled
Group: public (read only); private (read/write)
Page 35
– 35 –
Chapter 1
|
Introduction
System Defaults
Function
Parameter
Default
Port Configuration
Admin Status
Enabled
Auto-negotiation
Enabled
Flow Control
Disabled
Port Trunking
Static Trunks
None
LACP (all ports)
Disabled
Congestion Control
Storm Control
Broadcast: Enabled
(500 packets/sec)
Multicast: Disabled
Unknown Unicast: Disabled
Address Table
Aging Time
300 seconds
Spanning Tree Algorithm
Status
Enabled, RSTP
(Defaults: RSTP standard)
Edge Ports
Disabled
LLDP Status
Enabled
Virtual LANs
Default VLAN
1 PVID
1 Acceptable Frame Type
All
Ingress Filtering
Disabled
Switchport Mode (Egress Mode)
Hybrid
Traffic Prioritization
Ingress Port Priority
0 Queue Mode
WRR
Queue Weight
Queue: 0 1 2 3 4 5 6 7
Weight: 1 2 4 6 8 10 12 14
Class of Service
Enabled
IP Precedence Priority
Disabled
IP DSCP Priority
Disabled
IP Port Priority
Disabled
IP Settings
Management. VLAN
VLAN 1
IP Address
DHCP assigned
Subnet Mask
255.255.255.0
Default Gateway
0.0.0.0
DHCP
Client: Enabled
DNS Client/Proxy service: Disabled ARP Enabled
Cache Timeout: 20 minutes
Proxy: Disabled
Table 2: System Defaults (Continued)
Page 36
36
Chapter 1
|
Introduction
System Defaults
Function Parameter
Default
Unicast Routing
OSPF Disabled
OSPFv3
Disabled
BGPv4
Disabled
Multicast Routing
Static
Disabled
Router Redundancy
VRRP
Disabled
Multicast Filtering
IGMP Snooping (Layer 2)
Snooping: Enabled Querier: Disabled
System Log
Status
Enabled
Messages Logged to RAM
Levels 0-7 (all)
Messages Logged to Flash
Levels 0-3
SNTP Clock Synchronization
Disabled
Table 2: System Defaults (Continued)
Page 37
– 37 –
Section II
Web Configuration
This section describes the basic switch features, along with a detailed description of how to configure each feature via a web browser.
This section includes these chapters:
"Using the Web Interface" on page 39
"Basic Management Tasks" on page 55
"Interface Configuration" on page 85
"VLAN Configuration" on page 123
"Address Table Settings" on page 133
"Spanning Tree Algorithm" on page 141
"Congestion Control" on page 163
"Class of Service" on page 165
"Quality of Service" on page 185
"Security Measures" on page 201
"Basic Administration Protocols" on page 241
"Multicast Filtering" on page 309
"IP Configuration" on page 339
"IP Services" on page 361
"General IP Routing" on page 365
"Configuring Router Redundancy" on page 383
"Unicast Routing" on page 393
Page 38
– 38 –
Section II
|
Web Configuration
Page 39
– 39 –
2
Using the Web Interface
This switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistics to monitor network activity. The web agent can be accessed by any computer on the network using a standard web browser (Internet Explorer 8, or Mozilla Firefox 37, Google Chrome 42, or later versions).
Note: You can also use the Command Line Interface (CLI) to manage the switch
over a serial connection to the console port or via Telnet. For more information on using the CLI, refer to the CLI Reference Guide.
Connecting to the Web Interface
Prior to accessing the switch from a web browser, be sure you have first performed the following tasks:
1.
Configure the switch with a valid IP address, subnet mask, and default gateway using an out-of-band serial connection or DHCP protocol. (See the CLI Reference Guide.)
2.
Set user names and passwords using an out-of-band serial connection. Access to the web agent is controlled by the same user names and passwords as the onboard configuration program. (See the CLI Reference Guide.)
3.
After you enter a user name and password, you will have access to the system configuration program.
Note: You are allowed three attempts to enter the correct password; on the third
failed attempt the current connection is terminated.
Note: If you log into the web interface as guest (Normal Exec level), you can view
the configuration settings or change the guest password. If you log in as “admin”
(Privileged Exec level), you can change the settings on any page.
Note:
If the path between your management station and this switch does not pass through any device that uses the Spanning Tree Algorithm, then you can set the switch port attached to your management station to fast forwarding (i.e., enable Admin Edge Port) to improve the switch’s response time to management commands issued through the web interface. See “Configuring Interface Settings
for STA” on page 149.
Page 40
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
– 40 –
Note:
Connection to the web interface is not supported for HTTPS using an IPv6 link local address.
Navigating the Web Browser Interface
To access the web-browser interface you must first enter a user name and password. The administrator has Read/Write access to all configuration parameters and statistics. The default user name and password for the administrator is “admin.”
Home Page When your web browser connects with the switch’s web agent, the home page is
displayed as shown below. The home page displays the Main Menu on the left side of the screen and System Information on the right side. The Main Menu links are used to navigate to other menus, and display configuration parameters and statistics.
Figure 1: Home Page
Note: This manual covers the DG-CS4554F 10G Ethernet switch.
Page 41
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
– 41 –
Button Action
Configuration Options Configurable parameters have a dialog box or a drop-down list. Once a
configuration change has been made on a page, be sure to click on the Apply button to confirm the new setting. The following table summarizes the web page configuration buttons.
Table 3: Web Page Configuration Buttons
Apply Sets specified values to the system.
Revert Cancels specified values and restores current
Displays help for the selected page.
values prior to pressing “Apply.”
Refreshes the current page.
Displays the site map.
Logs out of the management interface.
Sends mail to the vendor.
Links to the vendor’s web site.
Panel Display The web agent displays an image of the switch’s ports. The Mode can be set to
display different information for the ports, including Active (i.e., up or down), Duplex (i.e., half or full duplex), or Flow Control (i.e., with or without flow control).
Page 42
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
– 42 –
Manual
Manually sets the current time
69
SNTP Configures SNTP polling interval
70
NTP
Configures NTP authentication parameters
71
Configure Time Server
Configures a list of NTP or SNTP servers
72
Configure SNTP Server
Sets the IP address for SNTP time servers
72
Add NTP Server
Adds NTP time server and index of authentication key
72
Show NTP Server
Shows list of configured NTP time servers
72
Add NTP Authentication Key
Adds key index and corresponding MD5 key
74
Show NTP Authentication Key
Shows list of configured authentication keys
74
Configure Time Zone
Sets the local time zone for the system clock
75
Console Sets console port connection parameters
76
Telnet
Sets Telnet connection parameters
78
CPU Utilization
Displays information on CPU utilization
80
Memory Status
Shows memory utilization parameters
80
Reset
Restarts the switch immediately, at a specified time, after a specified
81
delay, or at a periodic interval
Menu Description Page
Main Menu Using the onboard web agent, you can define system parameters, manage and
control the switch, and all its ports, or monitor network conditions. The following table briefly describes the selections available from this program.
Table 4: Switch Main Menu
System
General Provides basic system description, including contact information 55
Switch Shows the number of ports, hardware version, power status, and
Capability Enables support for jumbo frames;
File 60
Copy Allows the transfer and copying files 60
Set Startup Sets the startup file 63
Show Shows the files stored in flash memory; allows deletion of files 64
Automatic Operation Code Upgrade Automatically upgrades operation code if a newer version is 65
Time 69
Configure General
firmware version numbers
shows the bridge extension parameters
found on the server
56
58, 59
Page 43
– 43 –
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
Interface 85
Port 85
General
Configure by Port List Configures connection settings per port 85
Configure by Port Range Configures connection settings for a range of ports 88
Show Information Displays port connection status 89
Mirror 90
Add Sets the source and target ports for mirroring 90
Show Shows the configured mirror sessions 90
Statistics Shows Interface, Etherlike, and RMON port statistics 92
Chart Shows Interface, Etherlike, and RMON port statistics 92
History Shows statistical history for the specified interfaces
Transceiver Configures thresholds for alarm and warning messages for optical
transceivers which support DDM
Trunk
Static 104
Configure Trunk 104
Add Creates a trunk, along with the first port member 104
Show Shows the configured trunk identifiers 104
Add Member Specifies ports to group into static trunks 104
101
Show Member Shows the port members for the selected trunk 104
Configure General 104
Configure Configures trunk connection settings 104
Show Information Displays trunk connection settings 104
Dynamic 107
Configure Aggregator Configures administration key and timeout for specific LACP groups 107
Configure Aggregation Port 104
Configure 104
General Allows ports to dynamically join trunks 107
Actor Configures parameters for link aggregation group members on the
Partner Configures parameters for link aggregation group members on the
Show Information 113
Counters Displays statistics for LACP protocol messages 113
local side
remote side
107
107
Page 44
– 44 –
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
Internal Displays configuration settings and operational state for the local side
Neighbors Displays configuration settings and operational state for the remote
Configure Trunk 107
Configure Configures connection settings 107
Show Displays port connection status 107
Show Member Shows the active members in a trunk 107
Statistics Shows Interface, Etherlike, and RMON port statistics 92
Chart Shows Interface, Etherlike, and RMON port statistics 92
Load Balance Sets the load-distribution method among ports in aggregated links
History Shows statistical history for the specified interfaces
Traffic Segmentation 119
Configure Global Enables traffic segmentation globally 119
Configure Session Configures the uplink and down-link ports for a segmented group of
Add Assign the downlink and uplink ports to use in a segmented group 120
Show Shows the assigned ports and direction (uplink/downlink) 120
of a link aggregation
side of a link aggregation
ports
114
116
120
VLAN Virtual LAN 123
Static
Add Creates VLAN groups 125
Show Displays configured VLAN groups 125
Modify Configures group name and administrative status 125
Edit Member by VLAN Specifies VLAN attributes per VLAN 128
Edit Member by Interface Specifies VLAN attributes per interface 128
Edit Member by Interface Range Specifies VLAN attributes per interface range 128
MAC Address 133
Learning Status Enables MAC address learning on selected interfaces 133
Static 135
Add Configures static entries in the address table 135
Show Displays static entries in the address table 135
Dynamic
Configure Aging Sets timeout for dynamically learned entries 136
Show Dynamic MAC Displays dynamic entries in the address table 137
Clear Dynamic MAC Removes any learned entries from the forwarding database and clears
the transmit and receive counts for any static or system configured entries
138
Page 45
– 45 –
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
Configure Global
Issues a trap when a dynamic MAC address is added or removed
139
Configure Interface
Enables MAC authentication traps on the current interface
139
Spanning Tree
141
STA Spanning Tree Algorithm
Configure Global
Configure
Configures global bridge settings for STP, RSTP and MSTP
143
Show Information
Displays STA values used for the bridge
148
Configure Interface
Configure
Configures interface settings for STA
149
Show Inform at on
Displays interface settings for STA
152
MSTP
Multiple Spanning Tree Algorithm
155
Configure Global
155
Add Configures initial VLAN and priority for an MST instance
155
Show Configures global settings for an MST instance
155
Modify
Configures the priority or an MST instance
155
Add Member
Adds VLAN members for an MST instance
155
Show Member
Adds or deletes VLAN members for an MST instance
155
Show Information
Displays MSTP values used for the bridge
Configure Interface
159
Configure
Configures interface settings for an MST instance
159
Show Information
Displays interface settings for an MST instance
159
Traffic
Storm Control
Sets the broadcast storm threshold for each interface
163
Priority
Default Priority
Sets the default priority for each port or trunk
165
Queue Sets queue mode for the switch; sets the service weight for each queue
166
that will use a weighted or hybrid mode
Trust Mode
Selects DSCP or CoS priority processing
172
DSCP to DSCP
173
Add Maps DSCP values in incoming packets to per-hop behavior and drop
173
precedence values for internal priority processing
Show Shows the DSCP to DSCP mapping list
173
MAC Notification
Page 46
– 46 –
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
CoS to DSCP
176
Configure
Maps CoS/CFI values in incoming packets to per-hop behavior and drop
176
precedence values for priority processing
Show Shows the CoS to DSCP mapping list
176
DSCP to CoS
178
Add Maps internal per-hop behavior and drop precedence value pairs to CoS
178
values used in tagged egress packets on a Layer 2 interface
Show Shows the DSCP to CoS mapping list
178
IP Precedence to DSCP
180
Add Maps IP precedence values in incoming packets to per-hop behavior
180
and drop precedence values for priority processing
Show Shows the IP Precedence to DSCP mapping list
180
IP Port to DSCP
182
Add Sets TCP/UDP port priority, defining the socket number and associated
182
per-hop behavior and drop precedence
Show Shows the IP Port to DSCP mapping list
182
PHB to Queue
169
Configure
Maps internal per-hop behavior values to hardware queues
169
Show Shows the PHB to Queue mapping list
169
DiffServ
185
Configure Class
186
Add Creates a class map for a type of traffic
186
Show Shows configured class maps
186
Modify
Modifies the name of a class map
186
Add Rule
Configures the criteria used to classify ingress traffic
186
Show Rule
Shows the traffic classification rules for a class map
186
Configure Policy
190
Add Creates a policy map to apply to multiple interfaces
190
Show Shows configured policy maps
190
Modify
Modifies the name of a policy map
190
Add Rule
Sets the boundary parameters used for monitoring inbound traffic, and
190
the action to take for conforming and non-conforming traffic
Show Rule
Shows the rules used to enforce bandwidth policing for a policy map
190
Configure Interface
Applies a policy map to an ingress port
199
Security
201
AAA Authentication, Authorization and Accounting
201
System Authentication
Configures authentication sequence – local, RADIUS, and TACACS
202
Page 47
– 47 –
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
Server
Configures RADIUS and TACACS server message exchange settings
203
User Accounts
209
Add Configures user names, passwords, and access levels
209
Show Shows authorized users
209
Modify
Modifies user attributes
209
HTTPS Secure HTTP
211
Configure Global
Enables HTTPs, and specifies the UDP port to use
211
Copy Certificate
Replaces the default secure-site certificate
212
SSH
Secure Shell
214
Configure Global
Configures SSH server settings
217
Configure Host Key
218
Generate
Generates the host key pair (public and private)
218
Show Displays RSA and DSA host keys; deletes host keys
218
Configure User Key
220
Copy Imports user public keys from TFTP server
220
Show Displays RSA and DSA user keys; deletes user keys
220
ACL
Access Control Lists
222
Configure Time Range
Configures the time to apply an ACL
223
Add Specifies the name of a time range
223
Show Shows the name of configured time ranges
223
Add Rule
223
Absolute
Sets exact time or time range
223
Periodic
Sets a recurrent time
223
Show Rule Shows the time specified by a rule
223
Configure ACL
227
Show TCAM
Shows utilization parameters for TCAM
226
Add Adds an ACL based on IP or MAC address filtering
227
Show Shows the name and type of configured ACLs
227
Add Rule Configures packet filtering based on IP or MAC addresses and other
227
packet attributes
Show Rule Shows the rules specified for an ACL
227
Configure Interface
Binds a port to the specified ACL and time range
237
IP Filter
238
Add Sets IP addresses of clients allowed management access via the web,
238
SNMP, and Telnet
Page 48
– 48 –
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
Show
Shows the addresses to be allowed management access
238
Administration
241
Log
241
System
241
Configure Global
Stores error messages in local memory
241
Show System Logs
Shows logged error messages
241
Remote
Configures the logging of messages to a remote logging process
244
LLDP
245
Configure Global
Configures global LLDP timing parameters
245
Configure Interface
Sets the message transmission mode; enables SNMP notification; and
247
sets the LLDP attributes to advertise
Show Local Device Information
253
General
Displays general information about the local device
253
Port/Trunk
Displays information about each interface
253
Show Remote Device Information
256
Port/Trunk
Displays information about a remote device connected to a port on this
256
switch
Port/Trunk Details
Displays detailed information about a remote device connected to this
256
switch
Show Device Statistics
264
General
Displays statistics for all connected remote devices
264
Port/Trunk
Displays statistics for remote devices on a selected port or trunk
264
SNMP
Simple Network Management Protocol
266
Configure Global
Enables SNMP agent status, and sets related trap functions
268
Configure Engine
269
Set Engine ID
Sets the SNMP v3 engine ID on this switch
269
Add Remote Engine
Sets the SNMP v3 engine ID for a remote device
270
Show Remote Engine
Shows configured engine ID for remote devices
270
Configure View
271
Add View
Adds an SNMP v3 view of the OID MIB
271
Show View
Shows configured SNMP v3 views
271
Add OID Subtree
Specifies a part of the subtree for the selected view
271
Show OID Subtree
Shows the subtrees assigned to each view
271
Configure Group
274
Add
Adds a group with access policies for assigned users
274
Show
Shows configured groups and access policies
274
Page 49
– 49 –
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
Add Community
Configures community strings and access mode
278
Show Community
Shows community strings and access mode
278
Add SNMPv3 Local User
Configures SNMPv3 users on this switch
279
Show SNMPv3 Local User
Shows SNMPv3 users configured on this switch
279
Change SNMPv3 Local User Group
Assign a local user to a new group
279
Add SNMPv3 Remote User
Configures SNMPv3 users from a remote device
281
Show SNMPv3 Remote User
Shows SNMPv3 users set from a remote device
279
Configure Trap
284
Add
Configures trap managers to receive messages on key events that occur
284
this switch
Show
Shows configured trap managers
284
Configure Notify Filter
288
Add
Creates an SNMP notification log
288
Show
Shows the configured notification logs
288
Show Statistics
Shows the status of SNMP communications
290
RMON
Remote Monitoring
292
Alarm
Shows all configured alarms
292
Event
Shows all configured events
295
Alarm
Sets threshold bounds for a monitored variable
292
Event
Creates a response event for an alarm
295
History
Periodically samples statistics on a physical interface
297
Statistics
Enables collection of statistics on a physical interface
300
Show
History
Shows sampling parameters for each entry in the history group
297
Statistics
Shows sampling parameters for each entry in the statistics group
300
Show Details
History
Shows sampled data for each entry in the history group
297
Statistics
Shows sampled data for each entry in the history group
300
Configure User
Configure Global
Add
Show
Configure Interface
Add
Page 50
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
– 50 –
UDLD UniDirectional Link Detection
302
Configure Global
Configures the message probe interval, detection interval, and recovery
303
interval
Configure Interface
Enables UDLD and aggressive mode which reduces the shut-down
304
delay after loss of bidirectional connectivity is detected
Show Information
Displays UDLD neighbor information, including neighbor state,
306
expiration time, and protocol intervals
IP
General
Routing Interface
Add Address
Configures an IP interface for a VLAN
339 Show Address
Shows the IP interfaces assigned to a VLAN
339 Ping Sends ICMP echo request packets to another node on the network
369
Trace Route
Shows the route packets take to the specified
370
destination
ARP Address Resolution Protocol
372 Configure Static Address
373 Add Statically maps a physical address to an IP address
373 Show Shows the MAC to IP address static table
373 Show Information
375 Dynamic Address
Shows dynamically learned entries in the IP routing table
375 Other Address
Shows internal addresses used by the switch
375
Statistics
Shows statistics on ARP requests sent and received
375
Routing
Static Routes
376
Add Configures static routing entries
376
Show Shows static routing entries
376
Routing Table
378
Show Information
Shows all routing entries, including local, static and dynamic routes
378
Configure ECMP Number
Sets the maximum number of equal-cost paths to the same destination
379
that can be installed in the routing table
VRRP
Virtual Router Redundancy Protocol
383
Configure Group ID
384
Add Adds a VRRP group identifier to a VLAN
384
Show Shows the VRRP group identifier list
384
Add IP Address
Sets a virtual interface address for a VRRP group
384
Page 51
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
– 51 –
Show IP Address
Shows the virtual interface address assigned to a VRRP group
384
Configure Detail
Configure detailed settings, such as advertisement interval,
384
preemption, priority, and authentication
Show Statistics
Global Statistics
Displays global statistics for VRRP protocol packet
390
errors
Group Statistics
Displays statistics for VRRP protocol events and errors on the specified
391
VRRP group and interface
IPv6 Configuration
343
Configure Global
Sets an IPv6 default gateway for traffic with no known next hop
343
Configure Interface
Configures IPv6 interface address using auto-configuration or link-local
344
address, and sets related protocol settings
Add IPv6 Address
Adds an global unicast, EUI-64, or link-local IPv6 address to an interface
348
Show IPv6 Address
Show the IPv6 addresses assigned to an interface
351
Show IPv6 Neighbor Cache
Displays information in the IPv6 neighbor discovery cache
352
Show Statistics
353
IPv6
Shows statistics about IPv6 traffic
353
ICMPv6
Shows statistics about ICMPv6 messages
353
UDP
Shows statistics about UDP messages
353
Show MTU Shows the maximum transmission unit (MTU) cache for destinations 360
that have returned an ICMP packet-too-big message along with an
acceptable MTU to this switch
IP Service
361
DHCP Dynamic Host Configuration Protocol
Client
Specifies the DHCP client identifier for an interface
361
Relay
Specifies DHCP relay servers
363
Multicast
309
IGMP Snooping
311
General
Enables multicast filtering; configures parameters for IPv4 multicast
313
snooping
Multicast Router
316
Add Static Multicast Router
Assigns ports that are attached to a neighboring multicast router
316
Show Static Multicast Router
Displays ports statically configured as attached to a neighboring
316
multicast router
Show Current Multicast Router
Displays ports attached to a neighboring multicast router, either
316
through static or dynamic configuration
IGMP Member 319
Add Static Member Statically assigns multicast addresses to the selected VLAN 319
Page 52
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
– 52 –
Show Static Member
Shows multicast addresses statically configured on the selected VLAN
319
Show Current Member
Shows multicast addresses associated with the selected VLAN, either
319
through static or dynamic configuration
Interface
320
Configure VLAN
Configures IGMP snooping per VLAN interface
320
Show VLAN Information
Shows IGMP snooping settings per VLAN interface
320
Forwarding Entry
Displays the current multicast groups learned through IGMP Snooping
327
Filter
332
Configure General
Enables IGMP filtering for the switch
332
Configure Profile
333
Add
Adds IGMP filter profile; and sets access mode
333
Show
Shows configured IGMP filter profiles
333
Add Multicast Group Range
Assigns multicast groups to selected profile
333
Show Multicast Group Range
Shows multicast groups assigned to a profile
333
Configure Interface
Assigns IGMP filter profiles to port interfaces and sets throttling action
335
Statistics
328
Show Query Statistics
Shows statistics for query-related messages
328
Show VLAN Statistics
Shows statistics for protocol messages and number of active groups
328
Show Port Statistics
Shows statistics for protocol messages and number of active groups
328
Show Trunk Statistics
Shows statistics for protocol messages and number of active groups
328
Routing Protocol
393
OSPF Open Shortest Path First (Version 2)
393
Network Area
395
Add
Defines OSPF area address, area ID, and process ID
395
Show
Shows configured areas
395
Show Process
Show configured processes
395
System
398
Configure
Configures the Router ID, global settings, and default information
398
Show
Shows LSA statistics, administrative status, ABR/ASBR, area count, and
401
version number
Area
Configure Area
403
Add Area
Adds NSSA or stub
403
Show Area
Shows configured NSSA or stub
403
Page 53
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Table 4: Switch Main Menu (Continued)
Menu
Description
Page
– 53 –
Configure NSSA Area
Configures settings for importing routes into or exporting routes out of not-so-stubby areas
404
Configure Stub Area
Configures default cost, and settings for importing routes into a stub
407
Show Information Shows statistics for each area, including SPF startups, ABR/ASBR count, 409
LSA count, and LSA checksum
Area Range
410
Add Configures route summaries to advertise at an area boundary
410
Show
Shows route summaries advertised at an area boundary
410
Modify
Modifies route summaries advertised at an area boundary
410
Redistribute
412
Add Redistributes routes from one routing domain to another
412
Show
Shows route types redistributed to another domain
412
Modify
Modifies configuration settings for redistributed routes
412
Summary Address
414
Add Aggregates routes learned from other protocols for advertising
414
into other autonomous systems
Show
Shows configured summary addresses
414
Interface
416
Show
Shows area ID and designated router settings for each interface
416
Configure by VLAN
Configures OSPF protocol settings and authentication for specified
416
VLAN
Configure by Address
Configures OSPF protocol settings and authentication for specified
416
interface address
Show MD5 Key
Shows MD5 key ID used for each area
416
Virtual Link
421
Add Configures a virtual link through a transit area to the backbone
421
Show
Shows virtual links, neighbor address, and state
421
Configure Detailed Settings
Configures detailed protocol and authentication settings
421
Show MD5 Key
Shows the MD5 key ID used for each neighbor
421
Information
424
LSDB
Shows information about different OSPF Link State
424
Advertisements (LSAs)
Neighbor
Shows information about each OSPF neighbor
426
Passive Interface
Suppresses OSPF routing traffic on the specified interface
427
Add Adds passive interface
427
Show
Shows passive interfaces
427
Page 54
– 54 –
Chapter 2
|
Using the Web Interface
Navigating the Web Browser Interface
Page 55
– 55 –
3
Basic Management Tasks
This chapter describes the following topics:
Displaying System Information – Provides basic system description, including
contact information.
Displaying Hardware/Software Versions – Shows the hardware version, power
status, and firmware versions
Configuring Support for Jumbo Frames – Enables support for jumbo frames.
Displaying Bridge Extension Capabilities – Shows the bridge extension
parameters.
Managing System Files – Describes how to upgrade operating software or
configuration files, and set the system start-up files.
Setting the System Clock – Sets the current time manually or through specified
NTP or SNTP servers.
Configuring The Console Port – Sets console port connection parameters.
Configuring Telnet Settings – Sets Telnet connection parameters.
Displaying CPU Utilization – Displays information on CPU utilization.
Displaying Memory Utilization – Shows memory utilization parameters.
Resetting the System – Restarts the switch immediately, at a specified time,
after a specified delay, or at a periodic interval.
Displaying System Information
Use the System > General page to identify the system by displaying information such as the device name, location and contact information.
Parameters
These parameters are displayed:
System Description – Brief description of device type.
Page 56
Chapter 3
|
Basic Management Tasks
Displaying Hardware/Software Versions
– 56 –
System Object ID – MIB II object ID for switch’s network management subsystem.
System Up Time
System Name
System Location – Specifies the system location.
System Contact Administrator responsible for the system.
Length of time the management agent has been up.
Name assigned to the switch system.
Web Interface
To configure general system information:
1.
Click System, General.
2.
Specify the system name, location, and contact information for the system administrator.
3.
Click Apply.
Figure 3: System Information
Displaying Hardware/Software Versions
Use the System > Switch page to display hardware/firmware version numbers for the main board and management software, as well as the power status of the system.
Parameters
The following parameters are displayed:
Main Board Information
Serial Number – The serial number of the switch.
Page 57
Chapter 3
|
Basic Management Tasks
Displaying Hardware/Software Versions
– 57 –
Number of Ports
Number of built-in ports.
Page 58
Chapter 3
|
Basic Management Tasks
Displaying Hardware/Software Versions
– 58 –
Hardware Version – Hardware version of the main board.
Main Power Status
Redundant Power Status
Displays the status of the internal power supply.
Displays the status of the redundant power supply.
Management Software Information
Role – Shows that this switch is operating as Master or Slave.
EPLD Version
Loader Version – Version number of loader code.
Diagnostics Code Version
code.
Operation Code Version
Thermal Detector – The DG-CS4554F has five detectors
Temperature Temperature at specified thermal detection point.
Version number of EEPROM Programmable Logic Device.
Version of Power-On Self-Test (POST) and boot
Version number of runtime code.
Web Interface
To view hardware and software version information.
1.
Click System, then Switch.
Figure 4: General Switch Information
(Diagnostics Code Version should be replaced with Linux Kernel Version)
Page 59
59
Chapter 3
|
Basic Management Tasks
Displaying Bridge Extension Capabilities
Configuring Support for Jumbo Frames
Use the System > Capability page to configure support for layer 2 jumbo frames. The switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames of up to 9216 bytes for Gigabit, 10 Gigabit, and 40 Gigabit Ethernet ports or trunks. Compared to standard Ethernet frames that run only up to 1.5 KB, using jumbo frames significantly reduces the per-packet overhead required to process protocol encapsulation fields.
Usage Guidelines
To use jumbo frames, both the source and destination end nodes (such as a computer or server) must support this feature. Also, when the connection is operating at full duplex, all switches in the network between the two end nodes must be able to accept the extended frame size. And for half-duplex connections, all devices in the collision domain would need to support jumbo frames.
This command globally enables support for jumbo frames on all Gigabit and 10 Gigabit ports and trunks. To set the MTU for a specific interface, enable jumbo frames on this page, and then specify the required size of the MTU on the port or trunk interface configuration page (see “Port Configuration” on page 85 or
“Trunk Configuration” on page 103).
Parameters
The following parameters are displayed:
Jumbo Frame
Web Interface
To configure support for jumbo frames:
1.
Click System, then Capability.
2.
Enable or disable support for jumbo frames.
3.
Click Apply.
Figure 5: Configuring Support for Jumbo Frames
Configures support for jumbo frames. (Default: Disabled)
Page 60
60
Chapter 3
|
Basic Management Tasks
Configuring Support for Jumbo Frames
Displaying Bridge Extension Capabilities
Use the System > Capability page to display settings based on the Bridge MIB. The Bridge MIB includes extensions for managed devices that support Multicast Filtering, Traffic Classes, and Virtual LANs. You can access these extensions to display default settings for the key variables.
Parameters
The following parameters are displayed:
Extended Multicast Filtering Services – This switch does not support the filtering of individual multicast addresses based on GMRP (GARP Multicast Registration Protocol).
Traffic Classes – This switch provides mapping of user priorities to multiple traffic classes. (Refer to “Class of Service” on page 165.)
Static Entry Individual Port – This switch allows static filtering for unicast and multicast addresses. (Refer to “Setting Static Addresses” on page 135.)
VLAN Version Number Based on IEEE 802.1Q, “1” indicates Bridges that support only single spanning tree (SST) operation, and “2” indicates Bridges that support multiple spanning tree (MST) operation.
VLAN Learning – This switch uses Independent VLAN Learning (IVL), where each port maintains its own filtering database.
Local VLAN Capable
outside of the scope of 802.1Q defined VLANs.
Configurable PVID Tagging – This switch allows you to override the default Port VLAN ID (PVID used in frame tags) and egress status (VLAN-Tagged or Untagged) on each port. (Refer to “VLAN Configuration” on page 123.)
Max Supported VLAN Numbers
on this switch.
Max Supported VLAN ID
supported on this switch.
GMRP – GARP Multicast Registration Protocol (GMRP) allows network devices to register end stations with multicast groups. This switch does not support GMRP; it uses the Internet Group Management Protocol (IGMP) to provide automatic multicast filtering.
This switch does not support multiple local bridges
The maximum number of VLANs supported
The maximum configurable VLAN identifier
Page 61
Chapter 3
|
Basic Management Tasks
Managing System Files
– 61 –
Web Interface
To view Bridge Extension information:
1.
Click System, then Capability.
Figure 6: Displaying Bridge Extension Configuration
Managing System Files
Copying Files via FTP/
TFTP or HTTP
This section describes how to upgrade the switch operating software or configuration files, and set the system start-up files.
Use the System > File (Copy) page to upload/download firmware or configuration settings using FTP, TFTP or HTTP. By backing up a file to an FTP/TFTP server or management station, that file can later be downloaded to the switch to restore operation. Specify the method of file transfer, along with the file type and file names as required.
You can also set the switch to use new firmware or configuration settings without overwriting the current version. Just download the file using a different name from the current version, and then set the new file as the startup file.
Parameters
The following parameters are displayed:
Copy Type – The firmware copy operation includes these options:
FTP Upload – Copies a file from an FTP server to the switch.
Page 62
Chapter 3
|
Basic Management Tasks
Managing System Files
– 60 –
FTP Download – Copies a file from the switch to an FTP server.
HTTP Upload – Copies a file from a management station to the switch.
HTTP Download – Copies a file from the switch to a management station
TFTP Upload – Copies a file from a TFTP server to the switch.
TFTP Download – Copies a file from the switch to a TFTP server.
FTP/TFTP Server IP Address – The IP address of an FTP/TFTP server.
User Name – The user name for FTP server access.
Password – The password for FTP server access.
File Type – Specify Operation Code to copy firmware.
File Name – The file name should not contain slashes (\ or /), and the maximum length for file names is 32 characters for files on the switch or 128 characters for files on the server. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”)
Note: Up to two copies of the system software (i.e., the runtime firmware) can be
stored in the file directory on the switch.
Note:
The maximum number of user-defined configuration files is limited only by available flash memory space.
Note: The file Factory_Default_Config.cfgcan be copied to a file server or
management station, but cannot be used as the destination file name on the switch.
Web Interface
To copy firmware files:
1.
Click System, then File.
2.
Select Copy from the Action list.
3.
Select FTP Upload, HTTP Upload, or TFTP Upload as the file transfer method.
4.
If FTP or TFTP Upload is used, enter the IP address of the file server.
5.
If FTP Upload is used, enter the user name and password for your account on the FTP server.
6.
Set the file type to Operation Code.
7.
Enter the name of the file to upload.
Page 63
Page 64
Chapter 3
|
Basic Management Tasks
Managing System Files
– 62 –
8.
Select a file on the switch to overwrite or specify a new file name.
9.
Then click Apply.
Figure 7: Copy Firmware
Saving the Running
Configuration to a
Local File
If you replaced a file currently used for startup and want to start using the new file, reboot the system via the System > Reset menu.
Use the System > File (Copy) page to save the current configuration settings to a local file on the switch. The configuration settings are not automatically saved by the system for subsequent use when the switch is rebooted. You must save these settings to the current startup file, or to another file which can be subsequently set as the startup file.
Parameters
The following parameters are displayed:
Copy Type – The copy operation includes this option:
Running-Config – Copies the current configuration settings to a local file on the switch.
Destination File Name – Copy to the currently designated startup file, or to a new file. The file name should not contain slashes (\ or /), and the maximum length for file names is 32 characters for files on the switch. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”)
Note:
The maximum number of user-defined configuration files is limited only by available flash memory space.
Page 65
Chapter 3
|
Basic Management Tasks
Managing System Files
– 63 –
Web Interface
To save the running configuration file:
1.
Click System, then File.
2.
Select Copy from the Action list.
3.
Select Running-Config from the Copy Type list.
4.
Select the current startup file on the switch to overwrite or specify a new file name.
5.
Then click Apply.
Figure 8: Saving the Running Configuration
Setting The
Start-Up File
If you replaced a file currently used for startup and want to start using the new file, reboot the system via the System > Reset menu.
Use the System > File (Set Start-Up) page to specify the firmware or configuration file to use for system initialization.
Web Interface
To set a file to use for system initialization:
1.
Click System, then File.
2.
Select Set Start-Up from the Action list.
3.
Mark the operation code or configuration file to be used at startup
4.
Then click Apply.
Page 66
Chapter 3
|
Basic Management Tasks
Managing System Files
– 64 –
Figure 9: Setting Start-Up Files
To start using the new firmware or configuration settings, reboot the system via the System > Reset menu.
Showing System Files Use the System > File (Show) page to show the files in the system directory, or to
delete a file.
Note: Files designated for start-up, and the Factory_Default_Config.cfg file, cannot
be deleted.
Web Interface
To show the system files:
1.
Click System, then File.
2.
Select Show from the Action list.
3.
To delete a file, mark it in the File List and click Delete.
Figure 10: Displaying System Files
Page 67
Chapter 3
|
Basic Management Tasks
Managing System Files
– 65 –
Automatic Operation
Code Upgrade
Use the System > File (Automatic Operation Code Upgrade) page to automatically download an operation code file when a file newer than the currently installed one is discovered on the file server. After the file is transferred from the server and successfully written to the file system, it is automatically set as the startup file, and the switch is rebooted.
Usage Guidelines
If this feature is enabled, the switch searches the defined URL once during the bootup sequence.
FTP (port 21) and TFTP (port 69) are both supported. Note that the TCP/UDP port bindings cannot be modified to support servers listening on non-standard ports.
The host portion of the upgrade file location URL must be a valid IPv4 IP address. DNS host names are not recognized. Valid IP addresses consist of four numbers, 0 to 255, separated by periods.
The path to the directory must also be defined. If the file is stored in the root directory for the FTP/TFTP service, then use the “/” to indicate this (e.g., ftp://
192.168.0.1/).
The file name must not be included in the upgrade file location URL. The file name of the code stored on the remote server must be aos5700-54x.bix (using lower case letters exactly as indicated here). Enter the file name for other switches described in this manual exactly as shown on the web interface.
The FTP connection is made with PASV mode enabled. PASV mode is needed to traverse some fire walls, even if FTP traffic is not blocked. PASV mode cannot be disabled.
The switch-based search function is case-insensitive in that it will accept a file name in upper or lower case (i.e., the switch will accept AOS5700-54X.BIX from the server even though AOS5700-54X.bix was requested). However, keep in mind that the file systems of many operating systems such as Unix and most Unix-like systems (FreeBSD, NetBSD, OpenBSD, and most Linux distributions, etc.) are case-sensitive, meaning that two files in the same directory, aos5700-54x.bix and AOS5700-54X.BIX are considered to be unique files. Thus, if the upgrade file is stored as AOS5700-54X.BIX (or even Aos5700-54x.bix) on a case-sensitive server, then the switch (requesting AOS5700-54X.bix) will not be upgraded because the server does not recognize the requested file name and the stored file name as being equal. A notable exception in the list of case­sensitive Unix-like operating systems is Mac OS X, which by default is case­insensitive. Please check the documentation for your server’s operating system if you are unsure of its file system’s behavior.
Note that the switch itself does not distinguish between upper and lower-case file names, and only checks to see if the file stored on the server is more recent than the current runtime image.
Page 68
Chapter 3
|
Basic Management Tasks
Managing System Files
– 66 –
If two operation code image files are already stored on the switch’s file system, then the non-startup image is deleted before the upgrade image is transferred.
The automatic upgrade process will take place in the background without impeding normal operations (data switching, etc.) of the switch.
During the automatic search and transfer process, the administrator cannot transfer or update another operation code image, configuration file, public key, or HTTPS certificate (i.e., no other concurrent file management operations are possible).
The upgrade operation code image is set as the startup image after it has been successfully written to the file system.
The switch will send an SNMP trap and make a log entry upon all upgrade successes and failures.
The switch will immediately restart after the upgrade file is successfully written to the file system and set as the startup image.
Parameters
The following parameters are displayed:
Automatic Opcode Upgrade – Enables the switch to search for an upgraded operation code file during the switch bootup process. (Default: Disabled)
Automatic Upgrade Location URL – Defines where the switch should search for the operation code upgrade file. The last character of this URL must be a forward slash (“/”). The ECS4660-28F.bix filename must not be included since it is automatically appended by the switch. (Options: ftp, tftp)
The following syntax must be observed:
tftp://host[/filedir]/
tftp:// – Defines TFTP protocol for the server connection.
host – Defines the IP address of the TFTP server. Valid IP addresses consist of four numbers, 0 to 255, separated by periods. DNS host names are not recognized.
filedir – Defines the directory, relative to the TFTP server root, where the upgrade file can be found. Nested directory structures are accepted. The directory name must be separated from the host, and in nested directory structures, from the parent directory, with a prepended forward slash “/”.
/ – The forward slash must be the last character of the URL.
ftp://[username[:password@]]host[/filedir]/
ftp:// – Defines FTP protocol for the server connection.
Page 69
Chapter 3
|
Basic Management Tasks
Managing System Files
– 67 –
username Defines the user name for the FTP connection. If the user name is omitted, then “anonymous” is the assumed user name for the
connection.
password – Defines the password for the FTP connection. To differentiate the password from the user name and host portions of the URL, a colon (:) must precede the password, and an “at” symbol (@), must follow the
password. If the password is omitted, then “” (an empty string) is the
assumed password for the connection.
host – Defines the IP address of the FTP server. Valid IP addresses consist of four numbers, 0 to 255, separated by periods. DNS host names are not recognized.
filedir – Defines the directory, relative to the FTP server root, where the upgrade file can be found. Nested directory structures are accepted. The directory name must be separated from the host, and in nested directory structures, from the parent directory, with a prepended forward slash “/”.
/ – The forward slash must be the last character of the URL.
Examples
The following examples demonstrate the URL syntax for a TFTP server at IP address 192.168.0.1 with the operation code image stored in various locations:
tftp://192.168.0.1/
The image file is in the TFTP root directory.
tftp://192.168.0.1/switch-opcode/
The image file is in the “switch-opcode” directory, relative to the TFTP root.
tftp://192.168.0.1/switches/opcode/
The image file is in the “opcode” directory, which is within the “switches” parent directory, relative to the TFTP root.
The following examples demonstrate the URL syntax for an FTP server at IP address 192.168.0.1 with various user name, password and file location options presented:
ftp://192.168.0.1/
The user name and password are empty, so “anonymous” will be the user
name and the password will be blank. The image file is in the FTP root directory.
ftp://switches:upgrade@192.168.0.1/
The user name is “switches” and the password is “upgrade”. The image file is in the FTP root.
Page 70
Chapter 3
|
Basic Management Tasks
Managing System Files
– 68 –
ftp://switches:upgrade@192.168.0.1/switches/opcode/
The user name is “switches” and the password is “upgrade”. The image file is in the “opcode” directory, which is within the “switches” parent directory, relative to the FTP root.
Web Interface
To configure automatic code upgrade:
1.
Click System, then File.
2.
Select Automatic Operation Code Upgrade from the Action list.
3.
Mark the check box to enable Automatic Opcode Upgrade.
4.
Enter the URL of the FTP or TFTP server, and the path and directory containing the operation code.
5.
Click Apply.
Figure 11: Configuring Automatic Code Upgrade
If a new image is found at the specified location, the following type of messages will be displayed during bootup.
.
. .
Automatic Upgrade is looking for a new image New image detected: current version 1.1.1.0; new version 1.1.1.2 Image upgrade in progress The switch will restart after upgrade succeeds Downloading new image Flash programming started Flash programming completed The switch will now restart .
. .
Page 71
69
Chapter 3
|
Basic Management Tasks
Setting the System Clock
Setting the System Clock
Simple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic updates from a time server (SNTP or NTP). Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries. You can also manually set the clock. If the clock is not set manually or via SNTP, the switch will only record the time from the factory default set at the last bootup.
When the SNTP client is enabled, the switch periodically sends a request for a time update to a configured time server. You can configure up to three time server IP addresses. The switch will attempt to poll each server in the configured sequence.
Setting the Time
Manually
Use the System > Time (Configure General - Manual) page to set the system time on the switch manually without using SNTP.
Parameters
The following parameters are displayed:
Web Interface
To manually set the system clock:
1.
2.
3.
4.
5.
Current Time – Shows the current time set on the switch.
Hours – Sets the hour. (Range: 0-23)
Minutes – Sets the minute value. (Range: 0-59)
Seconds – Sets the second value. (Range: 0-59)
Month – Sets the month. (Range: 1-12)
Day – Sets the day of the month. (Range: 1-31)
Year – Sets the year. (Range: 1970-2037)
Click System, then Time.
Select Configure General from the Step list.
Select Manual from the Maintain Type list.
Enter the time and date in the appropriate fields.
Click Apply
Page 72
Chapter 3
|
Basic Management Tasks
Setting the System Clock
– 70 –
Figure 12: Manually Setting the System Clock
Setting the SNTP
Polling Interval
Use the System > Time (Configure General - SNTP) page to set the polling interval at which the switch will query the specified time servers.
Parameters
The following parameters are displayed:
Current Time – Shows the current time set on the switch.
SNTP Polling Interval – Sets the interval between sending requests for a time update from a time server. (Range: 16-16384 seconds; Default: 16 seconds)
Web Interface
To set the polling interval for SNTP:
1.
Click System, then Time.
2.
Select Configure General from the Step list.
3.
Select SNTP from the Maintain Type list.
4.
Modify the polling interval if required.
5.
Click Apply
Figure 13: Setting the Polling Interval for SNTP
Page 73
Chapter 3
|
Basic Management Tasks
Setting the System Clock
– 71 –
Configuring NTP Use the System > Time (Configure General - NTP) page to configure NTP
authentication and show the polling interval at which the switch will query the specified time servers.
Parameters
The following parameters are displayed:
Current Time – Shows the current time set on the switch.
Authentication Status – Enables authentication for time requests and updates between the switch and NTP servers. (Default: Disabled)
You can enable NTP authentication to ensure that reliable updates are received from only authorized NTP servers. The authentication keys and their associated key number must be centrally managed and manually distributed to NTP servers and clients. The key numbers and key values must match on both the server and client.
Polling Interval – Shows the interval between sending requests for a time update from NTP servers. (Fixed: 1024 seconds)
Web Interface
To set the clock maintenance type to NTP:
1.
Click System, then Time.
2.
Select Configure General from the Step list.
3.
Select NTP from the Maintain Type list.
4.
Enable authentication if required.
5.
Click Apply
Figure 14: Configuring NTP
Page 74
Chapter 3
|
Basic Management Tasks
Setting the System Clock
– 72 –
Configuring Time
Servers
Use the System > Time (Configure Time Server) pages to specify the IP address for NTP/SNTP time servers, or to set the authentication key for NTP time servers.
Specifying SNTP Time Servers
Use the System > Time (Configure Time Server – Configure SNTP Server) page to specify the IP address for up to three SNTP time servers.
Parameters
The following parameters are displayed:
SNTP Server IP Address – Sets the IPv4 or IPv6 address for up to three time servers. The switch attempts to update the time from the first server, if this fails it attempts an update from the next server in the sequence.
Web Interface
To set the SNTP time servers:
1.
Click System, then Time.
2.
Select Configure Time Server from the Step list.
3.
Select Configure SNTP Server from the Action list.
4.
Enter the IP address of up to three time servers.
5.
Click Apply.
Figure 15: Specifying SNTP Time Servers
Specifying NTP Time Servers
Use the System > Time (Configure Time Server – Add NTP Server) page to add the IP address for up to 50 NTP time servers.
Parameters
The following parameters are displayed:
NTP Server IP Address – Adds the IPv4 or IPv6 address for up to 50 time servers. The switch will poll the specified time servers for updates when the clock maintenance type is set to NTP on the System > Time (Configure General)
Page 75
Chapter 3
|
Basic Management Tasks
Setting the System Clock
– 73 –
page. It issues time synchronization requests at a fixed interval of 1024 seconds. The switch will poll all the time servers configured, the responses received are filtered and compared to determine the most reliable and accurate time update for the switch.
Version
Authentication Key Specifies the number of the key in the NTP
Specifies the NTP version supported by the server. (Fixed: Version 3)
Authentication Key List to use for authentication with the configured server. NTP authentication is optional. If enabled on the System > Time (Configure General) page, you must also configure at least one key on the System > Time (Add NTP Authentication Key) page. (Range: 1-65535)
Web Interface
To add an NTP time server to the server list:
1.
Click System, then Time.
2.
Select Configure Time Server from the Step list.
3.
Select Add NTP Server from the Action list.
4.
Enter the IP address of an NTP time server, and specify the index of the authentication key if authentication is required.
5.
Click Apply.
Figure 16: Adding an NTP Time Server
To show the list of configured NTP time servers:
1.
Click System, then Time.
2.
Select Configure Time Server from the Step list.
3.
Select Show NTP Server from the Action list.
Page 76
Chapter 3
|
Basic Management Tasks
Setting the System Clock
– 74 –
Figure 17: Showing the NTP Time Server List
Specifying NTP Authentication Keys
Use the System > Time (Configure Time Server – Add NTP Authentication Key) page to add an entry to the authentication key list.
Parameters
The following parameters are displayed:
Authentication Key – Specifies the number of the key in the NTP Authentication Key List to use for authentication with a configured server. NTP authentication is optional. When enabled on the System > Time (Configure General) page, you must also configure at least one key on this page. Up to 255 keys can be configured on the switch. (Range: 1-65535)
Key Context – An MD5 authentication key string. The key string can be up to 32 case-sensitive printable ASCII characters (no spaces).
NTP authentication key numbers and values must match on both the server and client.
Web Interface
To add an entry to NTP authentication key list:
1.
Click System, then Time.
2.
Select Configure Time Server from the Step list.
3.
Select Add NTP Authentication Key from the Action list.
4.
Enter the index number and MD5 authentication key string.
5.
Click Apply.
Page 77
Chapter 3
|
Basic Management Tasks
Setting the System Clock
– 75 –
Figure 18: Adding an NTP Authentication Key
To show the list of configured NTP authentication keys:
1.
Click System, then Time.
2.
Select Configure Time Server from the Step list.
3.
Select Show NTP Authentication Key from the Action list.
Figure 19: Showing the NTP Authentication Key List
Setting the Time Zone
Use the System > Time (Configure Time Server) page to set the time zone. SNTP
uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time at the Earth’s prime meridian, zero degrees longitude, which passes through Greenwich, England. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is west (before) or east (after) of UTC. You can choose one of the 80 predefined time zone definitions, or your can manually configure the parameters for your local time zone.
Parameters
The following parameters are displayed:
Predefined Configuration – A drop-down box provides access to the 80 predefined time zone configurations. Each choice indicates it’s offset from UTC and lists at least one major city or location covered by the time zone.
User-defined Configuration – Allows the user to define all parameters of the local time zone.
Direction – Configures the time zone to be before (east of ) or after (west of) UTC.
Page 78
– 76 –
Chapter 3
|
Basic Management Tasks
Configuring The Console Port
Name – Assigns a name to the time zone. (Range: 1-30 characters)
Hours (0-13) – The number of hours before or after UTC. The maximum value before UTC is 12. The maximum value after UTC is 13.
Minutes (0-59) – The number of minutes before/after UTC.
Web Interface
To set your local time zone:
1.
Click System, then Time.
2.
Select Configure Time Zone from the Step list.
3.
Set the offset for your time zone relative to the UTC in hours and minutes.
4.
Click Apply.
Figure 20: Setting the Time Zone
Configuring The Console Port
Use the System > Console menu to configure connection parameters for the switch’s console port. You can access the onboard configuration program by attaching a VT100 compatible device to the switch’s serial console port. Management access through the console port is controlled by various parameters, including a password (only configurable through the CLI), time outs, and basic communication settings. Note that these parameters can be configured via the web or CLI interface.
Page 79
– 77 –
Chapter 3
|
Basic Management Tasks
Configuring The Console Port
Parameters
The following parameters are displayed:
Login Timeout – Sets the interval that the system waits for a user to log into the CLI. If a login attempt is not detected within the timeout interval, the connection is terminated for the session. (Range: 10-300 seconds; Default: 300 seconds)
Exec Timeout – Sets the interval that the system waits until user input is detected. If user input is not detected within the timeout interval, the current session is terminated. (Range: 60-65535 seconds; Default: 600 seconds)
Password Threshold – Sets the password intrusion threshold, which limits the number of failed logon attempts. When the logon attempt threshold is reached, the system interface becomes silent for a specified amount of time (set by the Silent Time parameter) before allowing the next logon attempt. (Range: 1-120; Default: 3 attempts)
Silent Time – Sets the amount of time the management console is inaccessible after the number of unsuccessful logon attempts has been exceeded. (Range: 1-65535 seconds; Default: Disabled)
Data Bits – Sets the number of data bits per character that are interpreted and generated by the console port. If parity is being generated, specify 7 data bits per character. If no parity is required, specify 8 data bits per character. (Default: 8 bits)
Stop Bits – Sets the number of the stop bits transmitted per byte. (Range: 1-2; Default: 1 stop bit)
Parity – Defines the generation of a parity bit. Communication protocols provided by some terminals can require a specific parity bit setting. Specify Even, Odd, or None. (Default: None)
Speed – Sets the terminal line’s baud rate for transmit (to terminal) and receive (from terminal). Set the speed to match the baud rate of the device connected to the serial port. (Range: 9600, 19200, 38400, 57600, or 115200 baud; Default: 115200 baud)
Note:
The password for the console connection can only be configured through
the CLI (see “password” in the CLI Reference Guide).
Note: Password checking can be enabled or disabled for logging in to the console
connection (see “login” in the CLI Reference Guide). You can select authentication by a single global password as configured for the password command, or by passwords set up for specific user-name accounts. The default is for local passwords configured on the switch.
Page 80
– 78 –
Chapter 3
|
Basic Management Tasks
Configuring Telnet Settings
Web Interface
To configure parameters for the console port:
1.
Click System, then Console.
2.
Specify the connection parameters as required.
3.
Click Apply
Figure 21: Console Port Settings
Configuring Telnet Settings
Use the System > Telnet menu to configure parameters for accessing the CLI over a Telnet connection. You can access the onboard configuration program over the network using Telnet (i.e., a virtual terminal). Management access via Telnet can be enabled/disabled and other parameters set, including the TCP port number, time outs, and a password. Note that the password is only configurable through the CLI.) These parameters can be configured via the web or CLI interface.
Parameters
The following parameters are displayed:
Telnet Status – Enables or disables Telnet access to the switch. (Default: Enabled)
TCP Port – Sets the TCP port number for Telnet on the switch. (Range: 1-65535; Default: 23)
Max Sessions – Sets the maximum number of Telnet sessions that can simultaneously connect to this system. (Range: 0-8; Default: 8)
A maximum of eight sessions can be concurrently opened for Telnet and Secure Shell (i.e., both Telnet and SSH share a maximum number or eight sessions).
Page 81
– 79 –
Chapter 3
|
Basic Management Tasks
Configuring Telnet Settings
Login Timeout – Sets the interval that the system waits for a user to log into the CLI. If a login attempt is not detected within the timeout interval, the connection is terminated for the session. (Range: 10-300 seconds; Default: 300 seconds)
Exec Timeout – Sets the interval that the system waits until user input is detected. If user input is not detected within the timeout interval, the current session is terminated. (Range: 60-65535 seconds; Default: 600 seconds)
Password Threshold – Sets the password intrusion threshold, which limits the number of failed logon attempts. When the logon attempt threshold is reached, the system interface becomes silent for a specified amount of time (set by the Silent Time parameter) before allowing the next logon attempt. (Range: 1-120; Default: 3 attempts)
Silent Time – Sets the amount of time the management interface is inaccessible after the number of unsuccessful logon attempts has been exceeded. (Range: 1-65535 seconds; Default: Disabled)
Note:
Password checking can be enabled or disabled for login to the console connection (see the “login” command in the CLI Reference Guide). You can select authentication by a single global password as configured for the password command, or by passwords set up for specific user-name accounts. The default is for local passwords configured on the switch.
Web Interface
To configure parameters for the console port:
1.
Click System, then Telnet.
2.
Specify the connection parameters as required.
3.
Click Apply
Figure 22: Telnet Connection Settings
Page 82
Chapter 3
|
Basic Management Tasks
Displaying CPU Utilization
– 80 –
Displaying CPU Utilization
Use the System > CPU Utilization page to display information on CPU utilization.
Parameters
The following parameters are displayed:
Web Interface
To display CPU utilization:
1.
2.
Figure 23: Displaying CPU Utilization
Time Interval – The interval at which to update the displayed utilization rate.
(Options: 1, 5, 10, 30, 60 seconds; Default: 1 second)
CPU Utilization
Click System, then CPU Utilization.
Change the update interval if required. Note that the interval is changed as soon as a new setting is selected.
– CPU utilization over specified interval.
Displaying Memory Utilization
Use the System > Memory Status page to display memory utilization parameters.
Parameters
The following parameters are displayed:
Free Size – The amount of memory currently free for use.
Page 83
Chapter 3
|
Basic Management Tasks
Resetting the System
– 81 –
Used Size – The amount of memory allocated to active processes.
Total – The total amount of system memory.
Web Interface
To display memory utilization:
1. Click System, then Memory Status.
Figure 24: Displaying Memory Utilization
Resetting the System
Use the System > Reset menu to restart the switch immediately, at a specified time, after a specified delay, or at a periodic interval.
Command Usage
This command resets the entire system.
When the system is restarted, it will always run the Power-On Self-Test. It will also retain all configuration information stored in non-volatile memory by the “copy running-config startup-config” command in the CLI Reference Guide.
Parameters
The following parameters are displayed:
System Reload Configuration
Reset Mode – Restarts the switch immediately or at the specified time(s).
Immediately – Restarts the system immediately.
In – Specifies an interval after which to reload the switch. (The specified time must be equal to or less than 24 days.)
hours – The number of hours, combined with the minutes, before the switch resets. (Range: 0-576)
minutes – The number of minutes, combined with the hours, before the switch resets. (Range: 0-59)
Page 84
Chapter 3
|
Basic Management Tasks
Resetting the System
– 82 –
At – Specifies a time at which to reload the switch.
DD - The day of the month at which to reload. (Range: 01-31)
MM - The month at which to reload. (Range: 01-12)
YYYY - The year at which to reload. (Range: 1970-2037)
HH - The hour at which to reload. (Range: 00-23)
MM - The minute at which to reload. (Range: 00-59)
Regularly – Specifies a periodic interval at which to reload the switch.
Time
HH - The hour at which to reload. (Range: 00-23)
MM - The minute at which to reload. (Range: 00-59)
Period
Daily - Every day.
Weekly - Day of the week at which to reload. (Range: Sunday ... Saturday)
Monthly - Day of the month at which to reload. (Range: 1-31)
Web Interface
To restart the switch:
1.
Click System, then Reset.
2.
Select the required reset mode.
3.
For any option other than to reset immediately, fill in the required parameters
4.
Click Apply.
5.
When prompted, confirm that you want reset the switch.
Page 85
Chapter 3
|
Basic Management Tasks
Resetting the System
– 83 –
Figure 25: Restarting the Switch (Immediately)
Figure 26: Restarting the Switch (In)
Page 86
Chapter 3
|
Basic Management Tasks
Resetting the System
– 84 –
Figure 27: Restarting the Switch (At)
Figure 28: Restarting the Switch (Regularly)
Page 87
85
4
Port Configuration
Interface Configuration
This chapter describes the following topics:
Port Configuration – Configures connection settings, including auto-
negotiation, or manual setting of speed, duplex mode, and flow control.
Local Port Mirroring – Sets the source and target ports for mirroring on the local
switch.
Displaying Statistics – Shows Interface, Etherlike, and RMON port statistics in
table or chart form.
Displaying Statistical History – Displays statistical history for the specified
interfaces.
Displaying Transceiver Data – Displays identifying information, and operational
parameters for optical transceivers which support DDM.
Configuring Transceiver Thresholds – Configures thresholds for alarm and
warning messages for optical transceivers which support DDM.
Trunk Configuration – Configures static or dynamic trunks.
Traffic Segmentation – Configures the uplinks and down links to a segmented
group of ports.
This section describes how to configure port connections, mirror traffic from one port to another, and run cable diagnostics.
Configuring by Port
Use the Interface > Port > General (Configure by Port List) page to enable/disable an interface, set auto-negotiation and the interface capabilities to advertise, or
List
manually fix the speed, duplex mode, and flow control.
Command Usage
10GBASE-SFP+ connections are fixed at 10G - full duplex, and 40GBASE-QSFP+ connections at 40G - full duplex. Auto-negotiation must be disabled before you can configure or force an RJ-45 interface to use the Flow Control option.
Page 88
– 86 –
Chapter 4
|
Interface Configuration
Port Configuration
When using auto-negotiation1, the optimal settings will be negotiated between the link partners based on their advertised capabilities. To set flow control and symmetric pause frames under auto-negotiation, the required operation modes must be specified in the capabilities list for an interface.
The Speed/Duplex mode is fixed at 100full for 100BASE-FX transceivers, 1000full for Gigabit transceivers, and 10Gfull for 10 Gigabit transceivers. When auto-negotiation is enabled1, the only attributes which can be advertised include flow control and symmetric pause frames.
Using Jumbo Frames
Use the jumbo frame attribute on the System > Capability page to enable or disable jumbo frames for all 10 Gigabit and 40 Gigabit Ethernet ports. Then specify the required MTU size for a specific interface on the port configuration page.
The comparison of packet size against the configured port MTU considers only the incoming packet size, and is not affected by the fact that an ingress port is a tagged port or a QinQ ingress port. In other words, any additional size (for example, a tagged field of 4 bytes added by the chip) will not be considered when comparing the egress packet’s size against the configured MTU.
When pinging the switch from an external device, information added for the Ethernet header can increase the packet size by at least 42 bytes for an untagged packet, and 46 bytes for a tagged packet. If the adjusted frame size exceeds the configured port MTU, the switch will not respond to the ping message.
For other traffic types, calculation of overall frame size is basically the same, including the additional header fields SA(6) + DA(6) + Type(2) + VLAN-Tag(4) (for tagged packets, for untaqged packets, the 4-byte field will not be added by switch), and the payload. This should all be less than the configured port MTU, including the CRC at the end of the frame.
For QinQ, the overall frame size is still calculated as described above, and does not add the length of the second tag to the frame.
Parameters
These parameters are displayed:
Port – Port identifier. (Range: 1-32/54)
Type – Indicates the port type. (1000BASE SFP, 10GBASE SFP+, 40GBASE QSFP)
Name – Allows you to label an interface. (Range: 1-64 characters)
Admin – Allows you to manually disable an interface. You can disable an interface due to abnormal behavior (e.g., excessive collisions), and then re-
1. Support for auto-negotiation depends on transceiver type, such as 1G SFP.
Page 89
– 87 –
Chapter 4
|
Interface Configuration
Port Configuration
enable it after the problem has been resolved. You may also disable an interface for security reasons. (Default: Enabled)
Media Type – Configures the forced transceiver mode for SFP+ ports.
None - Forced transceiver mode is not used for SFP+ ports. (This is the default setting for RJ-45 ports and SFP+ ports.)
SFP-Forced 1000SFP
SFP-Forced 10GSFP
Autonegotiation (Port Capabilities) – Not supported on this switch. Forced
- Always uses the SFP+ port at 1000 Mbps, full duplex.
- Always uses the SFP+ port at 10 Gbps, full duplex.
mode is used for all ports.
Default: Autonegotiation disabled; Forced mode capabilities for ­1000BASE-SX/LX (SFP+) – 1000full 10GBASE-CR/SR/LR/LRM (SFP+) – 10Gfull 40GBASE-T-CR4 (QSFP+) – 40Gfull
Speed/Duplex
Flow Control – Allows automatic or manual selection of flow control.
MTU Size The maximum transfer unit (MTU) allowed for layer 2 packets
Shows the port speed and duplex mode.
crossing a 1G/10G/40G Ethernet port or trunk. (Range: 1500-12288 bytes; Default: 1518 bytes)
Link Up/Down Trap – Issues link-up or link-down notifications. (Default: Enabled)
Web Interface
To configure port connection parameters:
1.
Click Interface, Port, General.
2.
Select Configure by Port List from the Action List.
3.
Modify the required interface settings.
4.
Click Apply.
Page 90
88
Chapter 4
|
Interface Configuration
Port Configuration
Configuring by Port
Range
Figure 29: Configuring Connections by Port List
Use the Interface > Port > General (Configure by Port Range) page to enable/ disable an interface, set auto-negotiation and the interface capabilities to advertise, or manually fix the speed, duplex mode, and flow control.
For more information on command usage and a description of the parameters, refer to “Configuring by Port List” on page 85.
Web Interface
To configure port connection parameters:
1.
Click Interface, Port, General.
2.
Select Configure by Port Range from the Action List.
3.
Enter to range of ports to which your configuration changes apply.
4.
Modify the required interface settings.
5.
Click Apply.
Page 91
89
Chapter 4
|
Interface Configuration
Port Configuration
Displaying
Connection Status
Figure 30: Configuring Connections by Port Range
Use the Interface > Port > General (Show Information) page to display the current connection status, including link state, speed/duplex mode, flow control, and auto­negotiation.
Parameters
These parameters are displayed:
Port – Port identifier.
Type – Indicates the port type. (1000BASE SFP, 10GBASE SFP+, 40GBASE QSFP)
Name – Interface label.
Admin – Shows if the port is enabled or disabled.
Oper Status – Indicates if the link is Up or Down.
Media Type – Shows the forced transceiver mode.
Autonegotiation – Shows that auto-negotiation is disabled.
Oper Speed Duplex
Oper Flow Control
MTU Size The maximum transfer unit (MTU) allowed for layer 2 packets
Shows the current speed and duplex mode.
Shows the flow control type used.
crossing a Gigabit or 10 Gigabit Ethernet port or trunk.
Link Up/Down Trap – Shows if link-up or link-down notifications are enabled.
Page 92
Chapter 4
|
Interface Configuration
Port Configuration
– 90 –
Web Interface
To display port connection parameters:
1.
Click Interface, Port, General.
2.
Select Show Information from the Action List.
Figure 31: Displaying Port Information
Configuring Local Port
Mirroring
Use the Interface > Port > Mirror page to mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic analyzer or RMON probe to the target port and study the traffic crossing the source port in a completely unobtrusive manner.
Figure 32: Configuring Local Port Mirroring
Source port(s)
Command Usage
Traffic can be mirrored from one or more source ports to a destination port on
Single target port
the same switch (local port mirroring as described in this section).
Monitor port speed should match or exceed source port speed, otherwise traffic may be dropped from the monitor port.
When mirroring port traffic, the target port must be included in the same VLAN as the source port when using MSTP (see “Spanning Tree Algorithm” on
page 141).
Note that Spanning Tree BPDU packets are not mirrored to the target port.
Parameters
These parameters are displayed:
Source Port – The port whose traffic will be monitored.
Page 93
Chapter 4
|
Interface Configuration
Port Configuration
– 91 –
Target Port – The port that will mirror the traffic on the source port.
Type – Allows you to select which traffic to mirror to the target port, Rx (receive), Tx (transmit), or Both. (Default: Both)
Web Interface
To configure a local mirror session:
1.
Click Interface, Port, Mirror.
2.
Select Add from the Action List.
3.
Specify the source port.
4.
Specify the monitor port.
5.
Specify the traffic type to be mirrored.
6.
Click Apply.
Figure 33: Configuring Local Port Mirroring
To display the configured mirror sessions:
1.
Click Interface, Port, Mirror.
2.
Select Show from the Action List.
Figure 34: Displaying Local Port Mirror Sessions
Page 94
Chapter 4
|
Interface Configuration
Port Configuration
– 92 –
Parameter Description
Showing Port or Trunk
Statistics
Use the Interface > Port/Trunk > Statistics or Chart page to display standard statistics on network traffic from the Interfaces Group and Ethernet-like MIBs, as well as a detailed breakdown of traffic based on the RMON MIB. Interfaces and Ethernet-like statistics display errors on the traffic passing through each port. This information can be used to identify potential problems with the switch (such as a faulty port or unusually heavy traffic). RMON statistics provide access to a broad range of statistics, including a total count of different frame types and sizes passing through each port. All values displayed have been accumulated since the last system reboot, and are shown as counts per second. Statistics are refreshed every 60 seconds by default.
Note:
RMON groups 2, 3 and 9 can only be accessed using SNMP management
software.
Parameters
These parameters are displayed:
Table 5: Port Statistics
Interface Statistics
Received Octets The total number of octets received on the interface, including framing
Transmitted Octets The total number of octets transmitted out of the interface, including
Received Errors The number of inbound packets that contained errors preventing them
Transmitted Errors The number of outbound packets that could not be transmitted
Received Unicast Packets The number of subnetwork-unicast packets delivered to a higher-layer
Transmitted Unicast Packets
Received Discarded Packets The number of inbound packets which were chosen to be discarded
Transmitted Discarded Packets
Received Multicast Packets The number of packets, delivered by this sub-layer to a higher (sub-
Transmitted Multicast Packets
characters.
framing characters.
from being deliverable to a higher-layer protocol.
because of errors.
protocol.
The total number of packets that higher-level protocols requested be transmitted to a subnetwork-unicast address, including those that were discarded or not sent.
even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. One possible reason for discarding such a packet could be to free up buffer space.
The number of outbound packets which were chosen to be discarded even though no errors had been detected to prevent their being transmitted. One possible reason for discarding such a packet could be to free up buffer space.
)layer, which were addressed to a multicast address at this sub-layer.
The total number of packets that higher-level protocols requested be transmitted, and which were addressed to a multicast address at this sub-layer, including those that were discarded or not sent.
Received Broadcast Packets The number of packets, delivered by this sub-layer to a higher (sub-
)layer, which were addressed to a broadcast address at this sub-layer.
Page 95
Chapter 4
|
Interface Configuration
Port Configuration
– 93 –
Parameter Description
Table 5: Port Statistics (Continued)
Transmitted Broadcast Packets
The total number of packets that higher-level protocols requested be transmitted, and which were addressed to a broadcast address at this sub-layer, including those that were discarded or not sent.
Received Unknown Packets The number of packets received via the interface which were discarded
because of an unknown or unsupported protocol.
Etherlike Statistics
Single Collision Frames The number of successfully transmitted frames for which transmission
is inhibited by exactly one collision.
Multiple Collision Frames A count of successfully transmitted frames for which transmission is
inhibited by more than one collision.
Late Collisions The number of times that a collision is detected later than 512 bit-times
into the transmission of a packet.
Excessive Collisions A count of frames for which transmission on a particular interface fails
due to excessive collisions. This counter does not increment when the interface is operating in full-duplex mode.
Deferred Transmissions A count of frames for which the first transmission attempt on a
particular interface is delayed because the medium was busy.
Frames Too Long A count of frames received on a particular interface that exceed the
maximum permitted frame size.
Alignment Errors The number of alignment errors (missynchronized data packets).
FCS Errors A count of frames received on a particular interface that are an integral
number of octets in length but do not pass the FCS check. This count does not include frames received with frame-too-long or frame-too­short error.
SQE Test Errors A count of times that the SQE TEST ERROR message is generated by the
PLS sublayer for a particular interface.
Carrier Sense Errors The number of times that the carrier sense condition was lost or never
asserted when attempting to transmit a frame.
Internal MAC Receive Errors A count of frames for which reception on a particular interface fails due
to an internal MAC sublayer receive error.
Internal MAC Transmit Errors
A count of frames for which transmission on a particular interface fails due to an internal MAC sublayer transmit error.
RMON Statistics
Drop Events The total number of events in which packets were dropped due to lack
of resources.
Jabbers The total number of frames received that were longer than 1518 octets
(excluding framing bits, but including FCS octets), and had either an FCS or alignment error.
Fragments The total number of frames received that were less than 64 octets in
length (excluding framing bits, but including FCS octets) and had either an FCS or alignment error.
Collisions The best estimate of the total number of collisions on this Ethernet
segment.
Received Octets Total number of octets of data received on the network. This statistic
can be used as a reasonable indication of Ethernet utilization.
Received Packets The total number of packets (bad, broadcast and multicast) received.
Page 96
Chapter 4
|
Interface Configuration
Port Configuration
– 94 –
Parameter Description
Table 5: Port Statistics (Continued)
Broadcast Packets The total number of good packets received that were directed to the
broadcast address. Note that this does not include multicast packets.
Multicast Packets The total number of good packets received that were directed to this
multicast address.
Undersize Packets The total number of packets received that were less than 64 octets long
(excluding framing bits, but including FCS octets) and were otherwise well formed.
Oversize Packets The total number of packets received that were longer than 1518 octets
(excluding framing bits, but including FCS octets) and were otherwise well formed.
64 Bytes Packets The total number of packets (including bad packets) received and
65-127 Byte Packets 128-255 Byte Packets 256-511 Byte Packets 512-1023 Byte Packets 1024-1518 Byte Packets 1519-1536 Byte Packets
Utilization Statistics
Input Octets in kbits per second
Input Packets per second Number of packets entering this interface per second.
Input Utilization The input utilization rate for this interface.
Output Octets in kbits per second
Output Packets per second Number of packets leaving this interface per second.
Output Utilization The output utilization rate for this interface.
transmitted that were 64 octets in length (excluding framing bits but including FCS octets).
The total number of packets (including bad packets) received and transmitted where the number of octets fall within the specified range (excluding framing bits but including FCS octets).
Number of octets entering this interface in kbits/second.
Number of octets leaving this interface in kbits/second.
Web Interface
To show a list of port statistics:
1.
Click Interface, Port, Statistics.
2.
Select the statistics mode to display (Interface, Etherlike, RMON or Utilization).
3.
Select a port from the drop-down list.
4.
Use the Refresh button at the bottom of the page if you need to update the screen.
Page 97
Chapter 4
|
Interface Configuration
Port Configuration
– 95 –
Figure 35: Showing Port Statistics (Table)
Page 98
Chapter 4
|
Interface Configuration
Port Configuration
– 96 –
To show a chart of port statistics:
1.
Click Interface, Port, Chart.
2.
Select the statistics mode to display (Interface, Etherlike, RMON or All).
3.
If Interface, Etherlike, RMON statistics mode is chosen, select a port from the drop-down list. If All (ports) statistics mode is chosen, select the statistics type to display.
Figure 36: Showing Port Statistics (Chart)
Displaying Statistical
History
Use the Interface > Port > History or Interface > Trunk > History page to display statistical history for the specified interfaces.
Command Usage
For a description of the statistics displayed on these pages, see “Showing Port or
Trunk Statistics” on page 92.
Page 99
Chapter 4
|
Interface Configuration
Port Configuration
– 97 –
Parameters
These parameters are displayed:
Add
Port – Port number. (Range: 1-32/54)
History Name – Name of sample interval. (Range: 1-32 characters)
Interval - The interval for sampling statistics. (Range: 1-86400 minutes)
Requested Buckets - The number of samples to take. (Range: 1-96)
Show
Port – Port number. (Range: 1-32/54)
History Name – Name of sample interval. (Default settings: 15min, 1day)
Interval - The interval for sampling statistics.
Requested Buckets
- The number of samples to take.
Show Details
Mode
Status – Shows the sample parameters.
Current Entry – Shows current statistics for the specified port and named sample.
Input Previous Entries – Shows statistical history for ingress traffic.
Output Previous Entries – Shows statistical history for egress traffic.
Port – Port number. (Range: 1-32/54)
Name – Name of sample interval.
Web Interface
To configure a periodic sample of statistics:
1.
Click Interface, Port, Statistics, or Interface, Trunk, Statistics.
2.
Select Add from the Action menu.
3.
Select an interface from the Port or Trunk list.
4.
Enter the sample name, the interval, and the number of buckets requested.
Page 100
Chapter 4
|
Interface Configuration
Port Configuration
– 98 –
5.
Click Apply.
Figure 37: Configuring a History Sample
To show the configured entries for a history sample:
1.
Click Interface, Port, Statistics, or Interface, Trunk, Statistics.
2.
Select Show from the Action menu.
3.
Select an interface from the Port or Trunk list.
Figure 38: Showing Entries for History Sampling
To show the configured parameters for a sampling entry:
1.
Click Interface, Port, Statistics, or Interface, Trunk, Statistics.
2.
Select Show Details from the Action menu.
3.
Select Status from the options for Mode.
4.
Select an interface from the Port or Trunk list.
5.
Select an sampling entry from the Name list.
Loading...