As our product undergoes continuous development the specifications are subject to change without prior notice
Management Guide
Page 2
Page 3
M
ANAGEMENT
G
UIDE
FAST ETHERNET SWITCH
DG-FS4528P
Layer 2 Workgroup Switch
with Power over Ethernet,
24 10/100BASE-TX (RJ-45) Ports,
2 10/100/1000BASE-T (RJ-45) Ports
and 2 Gigabit Combination Ports (RJ-45/SFP)
DG-FS4528P
Page 4
Page 5
ABOUT THIS GUIDE
PURPOSE This guide gives specific information on how to operate and use the
management functions of the switch.
AUDIENCE The guide is intended for use by network administrators who are
responsible for operating and maintaining network equipment;
consequently, it assumes a basic working knowledge of general switch
functions, the Internet Protocol (IP), and Simple Network Management
Protocol (SNMP).
CONVENTIONS The following conventions are used throughout this guide to show
information:
N
OTE
:
Emphasizes important information or calls your attention to related
features or instructions.
C
AUTION
damage the system or equipment.
W
ARNING
:
Alerts you to a potential hazard that could cause loss of data, or
:
Alerts you to a potential hazard that could cause personal injury.
RELATED PUBLICATIONS The following publication details the hardware features of the switch,
including the physical and performance-related characteristics, and how to
install the switch:
The Installation Guide
Also, as part of the switch’s software, there is an online web-based help
that describes all management related features.
DECEMBER 2010 REVISION
This is the first revision of this guide.
– 5 –
Page 6
CONTENTS
ABOUT THIS GUIDE 5
C
ONTENTS 6
IGURES 34
F
T
ABLES 41
SECTION IGETTING STARTED 46
1INTRODUCTION 47
Key Features 47
Description of Software Features 48
System Defaults 53
2INITIAL SWITCH CONFIGURATION 56
Connecting to the Switch 56
Configuration Options 56
Required Connections 57
Remote Connections 58
Basic Configuration 59
Console Connection 59
Setting Passwords 59
Setting an IP Address 60
Manual Configuration 60
Dynamic Configuration 61
Downloading a Configuration File Referenced by a DHCP Server 62
Enabling SNMP Management Access 64
Community Strings (for SNMP version 1 and 2c clients) 65
Trap Receivers 65
Configuring Access for SNMP Version 3 Clients 66
Managing System Files 66
Saving or Restoring Configuration Settings 67
Configuring Power over Ethernet 68
– 6 –
Page 7
C
ONTENTS
SECTION IIWEB CONFIGURATION 70
3USINGTHE WEB INTERFACE 71
Connecting to the Web Interface 71
Navigating the Web Browser Interface 72
Home Page 72
Configuration Options 73
Panel Display 73
Main Menu 74
4BASIC MANAGEMENT TASKS 83
Displaying System Information 84
Displaying Switch Hardware/Software Versions 85
Displaying Bridge Extension Capabilities 87
Setting the Switch’s IP Address 88
Configuring Support for Jumbo Frames 93
Displaying CPU Utilization 94
Displaying Memory Utilization 95
Managing System Files 96
Automatic Operation Code Upgrade 96
Copying Operation Code via FTP or TFTP 100
Saving or Restoring Configuration Settings 102
Copying Files Using HTTP 104
Deleting Files 106
Setting The Start-Up File 106
Console Port Settings 107
Telnet Settings 109
Configuring Event Logging 110
System Log Configuration 110
Remote Log Configuration 112
Sending Simple Mail Transfer Protocol Alerts 114
Resetting the System 115
Setting the System Clock 117
Setting the Time Manually 117
Configuring SNTP 118
Configuring NTP 119
Setting the Time Zone 121
– 7 –
Page 8
C
ONTENTS
Configuring Summer Time 122
UPnP 124
UPnP Configuration 125
Switch Clustering 126
Configuring General Settings for Clusters 127
Cluster Member Configuration 128
Displaying Information on Cluster Members 129
Cluster Candidate Information 130
5SIMPLE NETWORK MANAGEMENT PROTOCOL131
Overview 131
Setting Community Access Strings 133
Specifying Trap Managers and Trap Types 135
Configuring MAC Notification Traps for Interfaces 138
Table 142: show mvr interface - display description 888
Table 143: show mvr members - display description 889
Table 144: show mvr receiver members - display description 890
Table 145: MLD Snooping Commands 891
Table 146: LLDP Commands 898
Table 147: Address Table Commands 921
Table 148: show dns cache - display description 927
Table 149: DHCP Commands 929
Table 150: DHCP Client Commands 929
Table 151: DHCP Relay Commands 931
Table 152: Inserting Option 82 Information - display description 933
Table 153: Basic IP Configuration Commands 937
Table 154: Troubleshooting Chart 948
– 45 –
Page 46
S
ECTION
GETTING STARTED
This section provides an overview of the switch, and introduces some basic
concepts about network switches. It also describes the basic settings
required to access the management interface.
This section includes these chapters:
"Introduction" on page 47
"Initial Switch Configuration" on page 56
I
– 46 –
Page 47
1INTRODUCTION
This switch provides a broad range of features for Layer 2 switching. It
includes a management agent that allows you to configure the features
listed in this manual. The default configuration can be used for most of the
features provided by this switch. However, there are many options that you
should configure to maximize the switch’s performance for your particular
network environment.
The Fast Ethernet ports on this switch also supports the IEEE 802.3af
Power-over-Ethernet (PoE) standard that enables DC power to be supplied
to attached devices over the connecting Ethernet cable.
KEY FEATURES
Table 1: Key Features
FeatureDescription
Power over EthernetPowers attached devices using IEEE 802.3af Power over Ethernet
Configuration Backup
and Restore
AuthenticationConsole, Telnet, web – user name/password, RADIUS, TACACS+
General Security
Measures
Access Control ListsSupports IP and MAC ACLs, 100 rules per system
DHCPClient
DNS Client and Proxy service
Port ConfigurationSpeed and duplex mode and flow control
Using management station or FTP/TFTP server
Port – IEEE 802.1X, MAC address filtering
SNMP v1/2c - Community strings
SNMP version 3 – MD5 or SHA password
Tel n e t – S S H
Web – HTTPS
AAA
ARP inspection
DHCP Snooping (with Option 82 relay information)
IP Source Guard
Network Access – MAC Address Authentication
Private VLANs
Port Authentication – IEEE 802.1X
Port Security – MAC address filtering
Web Authentication – Web access with RADIUS Authentication
Port TrunkingSupports up to 8 trunks – static or dynamic trunking (LACP)
Port MirroringOne or more source ports to one analysis port
Congestion ControlRate Limiting
Throttling for broadcast, multicast, unknown unicast storms
– 47 –
Page 48
C
HAPTER
Description of Software Features
Table 1: Key Features (Continued)
FeatureDescription
Address Table8K MAC addresses in the forwarding table, 1K static MAC
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward
Switching
Spanning Tree Algorithm Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and
addresses, 256 L2 multicast groups
Supported to ensure wire-speed switching while eliminating bad
frames
Multiple Spanning Trees (MSTP)
1
| Introduction
Virtual LANsUp to 255 using IEEE 802.1Q, port-based, protocol-based, private
Traffic PrioritizationDefault port priority, traffic class map, queue scheduling, or
Qualify of ServiceSupports Differentiated Services (DiffServ)
Switch ClusteringSupports up to 36 member switches in a cluster
TunnelingSupports IEEE 802.1Q tunneling (QinQ)
DESCRIPTIONOF SOFTWARE FEATURES
The switch provides a wide range of advanced performance enhancing
features. Flow control eliminates the loss of packets due to bottlenecks
caused by port saturation. Storm suppression prevents broadcast,
multicast or unknown unicast traffic storms from engulfing the network.
Port-based, protocol based and private VLANs, plus support for automatic
GVRP VLAN registration provide traffic security and efficient use of network
bandwidth. CoS priority queueing ensures the minimum delay for moving
real-time multimedia data across the network. While multicast filtering
provides support for real-time network applications. Some of the
management features are briefly described below.
VLANs, and voice VLANs
Differentiated Services Code Point (DSCP)
Used to discover basic information about neighboring devices
and Multicast VLAN Registration
CONFIGURATION
BACKUPAND
RESTORE
You can save the current configuration settings to a file on the
management station (using the web interface) or an FTP/TFTP server
(using the web or console interface), and later download this file to restore
the switch configuration settings.
AUTHENTICATION This switch authenticates management access via the console port, Telnet,
or a web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or
TACACS+). Port-based authentication is also supported via the IEEE
802.1X protocol. This protocol uses Extensible Authentication Protocol over
LANs (EAPOL) to request user credentials from the 802.1X client, and then
verifies the client’s right to access the network via an authentication server.
– 48 –
Page 49
C
HAPTER
Description of Software Features
Other authentication options include HTTPS for secure management access
via the web, SSH for secure management access over a Telnet-equivalent
connection, SNMP Version 3, IP address filtering for SNMP/Telnet/web
management access. MAC address filtering and IP source guard also
provide authenticated port access. While DHCP snooping is provided to
prevent malicious attacks from insecure ports
1
| Introduction
ACCESS CONTROL
LISTS
ACLs provide packet filtering for IPv4 frames (based on address, protocol,
Layer 4 protocol port number or TCP control code), IPv6 frames (based on
address, next header type, or flow label), or any frames (based on MAC
address or Ethernet type). ACLs can be used to improve performance by
blocking unnecessary network traffic or to implement security controls by
restricting access to specific network resources or protocols.
PORT CONFIGURATION You can manually configure the speed, duplex mode, and flow control used
on specific ports, or use auto-negotiation to detect the connection settings
used by the attached device. Use full-duplex mode on ports whenever
possible to double the throughput of switch connections. Flow control
should also be enabled to control network traffic during periods of
congestion and prevent the loss of packets when port buffer thresholds are
exceeded. The switch supports flow control based on the IEEE 802.3x
standard (now incorporated in IEEE 802.3-2002).
RATE LIMITING This feature controls the maximum rate for traffic transmitted or received
on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Packets that exceed the
acceptable amount of traffic are dropped.
PORT MIRRORING The switch can unobtrusively mirror traffic from any port, VLAN or packets
with a specified MAC address to a monitor port. You can then attach a
protocol analyzer or RMON probe to this port to perform traffic analysis and
verify connection integrity.
PORT TRUNKING Ports can be combined into an aggregate connection. Trunks can be
manually set up or dynamically configured using Link Aggregation Control
Protocol (LACP – IEEE 802.3-2005). The additional ports dramatically
increase the throughput across any connection, and provide redundancy by
taking over the load if a port in the trunk should fail. The switch supports
up to 8 trunks.
STORM CONTROL Broadcast, multicast and unknown unicast storm suppression prevents
traffic from overwhelming the network.When enabled on a port, the level of
traffic passing through the port is restricted. If traffic rises above a predefined threshold, it will be throttled until the level falls back beneath the
threshold.
– 49 –
Page 50
C
HAPTER
Description of Software Features
1
| Introduction
STATIC ADDRESSES A static address can be assigned to a specific interface on this switch.
Static addresses are bound to the assigned interface and will not be
moved. When a static address is seen on another interface, the address will
be ignored and will not be written to the address table. Static addresses
can be used to provide network security by restricting access for a known
host to a specific port.
IP ADDRESS
FILTERING
Access to insecure ports can be controlled using DHCP Snooping which
filters ingress traffic based on static IP addresses and addresses stored in
the DHCP Snooping table. Traffic can also be restricted to specific source IP
addresses or source IP/MAC address pairs based on static entries or entries
stored in the DHCP Snooping table.
IEEE 802.1D BRIDGE The switch supports IEEE 802.1D transparent bridging. The address table
facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up
to 8K addresses.
STORE-AND-FORWARD
SWITCHING
The switch copies each frame into its memory before forwarding them to
another port. This ensures that all frames are a standard Ethernet size and
have been verified for accuracy with the cyclic redundancy check (CRC).
This prevents bad frames from entering the network and wasting
bandwidth.
To avoid dropping frames on congested ports, the switch provides 4 Mbits
for frame buffering. This buffer can queue packets awaiting transmission
on congested networks.
SPANNING TREE
ALGORITHM
The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol provides
loop detection. When there are multiple physical paths between
segments, this protocol will choose a single path and disable all others
to ensure that only one route exists between any two stations on the
network. This prevents the creation of network loops. However, if the
chosen path should fail for any reason, an alternate path will be
activated to maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1D-2004) – This protocol
reduces the convergence time for network topology changes to about 3
to 5 seconds, compared to 30 seconds or more for the older IEEE
802.1D STP standard. It is intended as a complete replacement for STP,
but can still interoperate with switches running the older standard by
automatically reconfiguring ports to STP-compliant mode if they detect
STP protocol messages from attached devices.
Multiple Spanning Tree Protocol (MSTP, IEEE 802.1D-2004) – This
protocol is a direct extension of RSTP. It can provide an independent
spanning tree for different VLANs. It simplifies network management,
– 50 –
Page 51
C
HAPTER
Description of Software Features
provides for even faster convergence than RSTP by limiting the size of
each region, and prevents VLAN members from being segmented from
the rest of the group (as sometimes occurs with IEEE 802.1D STP).
1
| Introduction
VIRTUAL LANS The switch supports up to 255 VLANs. A Virtual LAN is a collection of
network nodes that share the same collision domain regardless of their
physical location or connection point in the network. The switch supports
tagged VLANs based on the IEEE 802.1Q standard. Members of VLAN
groups can be dynamically learned via GVRP, or ports can be manually
assigned to a specific set of VLANs. This allows the switch to restrict traffic
to the VLAN groups to which a user has been assigned. By segmenting
your network into VLANs, you can:
Eliminate broadcast storms which severely degrade performance in a
flat network.
Simplify network management for node changes/moves by remotely
configuring VLAN membership for any port, rather than having to
manually change the network connection.
TRAFFIC
PRIORITIZATION
Provide data security by restricting all traffic to the originating VLAN.
Use private VLANs to restrict traffic to pass only between data ports
and the uplink ports, thereby isolating adjacent ports within the same
VLAN, and allowing you to limit the total number of VLANs that need to
be configured.
Use protocol VLANs to restrict traffic to specified interfaces based on
protocol type.
N
OTE
:
The switch allows 255 user-manageable VLANs. One other VLAN
(VLAN ID 4093) is reserved for switch clustering.
This switch prioritizes each packet based on the required level of service,
using four priority queues with strict or Weighted Round Robin Queuing. It
uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on
input from the end-station application. These functions can
provide independent priorities for delay-sensitive data and best-effort data.
This switch also supports several common methods of prioritizing layer 3/4
traffic to meet application requirements. Traffic can be prioritized based on
the DSCP field in the IP frame. When these services are enabled, the
priorities are mapped to a Class of Service value by the switch, and the
traffic then sent to the corresponding output queue.
be used to
QUALITYOF SERVICE Differentiated Services (DiffServ) provides policy-based management
mechanisms used for prioritizing network resources to meet the
requirements of specific traffic types on a per-hop basis. Each packet is
– 51 –
Page 52
C
HAPTER
Description of Software Features
classified upon entry into the network based on access lists, IP Precedence
or DSCP values, or VLAN lists. Using access lists allows you select traffic
based on Layer 2, Layer 3, or Layer 4 information contained in each
packet. Based on network policies, different kinds of traffic can be marked
for different kinds of forwarding.
1
| Introduction
MULTICAST FILTERING Specific multicast traffic can be assigned to its own VLAN to ensure that it
does not interfere with normal network traffic and to guarantee real-time
delivery by setting the required priority level for the designated VLAN. The
switch uses IGMP Snooping and Query to manage multicast group
registration for IPv4 traffic, and MLD Snooping for IPv6 traffic. It also
supports Multicast VLAN Registration (MVR) which allows common
multicast traffic, such as television channels, to be transmitted across a
single network-wide multicast VLAN shared by hosts residing in other
standard or private VLAN groups, while preserving security and data
isolation for normal traffic.
IEEE 802.1Q
TUNNELING(QINQ)
LINK LAYER
DISCOVERY
PROTOCOL
This feature is designed for service providers carrying traffic for multiple
customers across their networks. QinQ tunneling is used to maintain
customer-specific VLAN and Layer 2 protocol configurations even when
different customers use the same internal VLAN IDs. This is accomplished
by inserting Service Provider VLAN (SPVLAN) tags into the customer’s
frames when they enter the service provider’s network, and then stripping
the tags when the frames leave the network.
LLDP is used to discover basic information about neighboring devices
within the local broadcast domain. LLDP is a Layer 2 protocol that
advertises information about the sending device and collects information
gathered from neighboring network nodes it discovers.
Advertised information is represented in Type Length Value (TLV) format
according to the IEEE 802.1ab standard, and can include details such as
device identification, capabilities and configuration settings. Media
Endpoint Discovery (LLDP-MED) is an extension of LLDP intended for
managing endpoint devices such as Voice over IP phones and network
switches. The LLDP-MED TLVs advertise information such as network
policy, power, inventory, and device location details. The LLDP and LLDPMED information can be used by SNMP applications to simplify
troubleshooting, enhance network management, and maintain an accurate
network topology.
– 52 –
Page 53
SYSTEM DEFAULTS
C
HAPTER
1
| Introduction
System Defaults
The switch’s system defaults are provided in the configuration file
“Factory_Default_Config.cfg.” To reset the switch defaults, this file should
be set as the startup configuration file.
The following table lists some of the basic system defaults.
SMTP Email AlertsEvent HandlerEnabled (but no server defined)
SNTP Clock SynchronizationDisabled
NTP Clock SynchronizationDisabled
Switch ClusteringStatusEnabled
CommanderDisabled
Querier: Disabled
– 55 –
Page 56
2INITIAL SWITCH CONFIGURATION
This chapter includes information on connecting to the switch and basic
configuration procedures.
CONNECTINGTOTHE SWITCH
The switch includes a built-in network management agent. The agent
offers a variety of management options, including SNMP, RMON (Groups 1,
2, 3, 9) and a web-based interface. A PC may also be connected directly to
the switch for configuration and monitoring via a command line interface
(CLI).
N
OTE
:
An IP address for this switch is obtained via DHCP by default. To
change this address, see “Setting an IP Address.”
CONFIGURATION
OPTIONS
The switch’s HTTP web agent allows you to configure switch parameters,
monitor port connections, and display statistics using a standard web
browser such as Internet Explorer 5.x or above, Netscape 6.2 or above,
and Mozilla Firefox 2.0.0.0 or above. The switch’s web management
interface can be accessed from any computer attached to the network.
The CLI program can be accessed by a direct connection to the RS-232
serial console port on the switch, or remotely by a Telnet or Secure Shell
(SSH) connection over the network.
The switch’s management agent also supports SNMP (Simple Network
Management Protocol). This SNMP agent permits the switch to be managed
from any system in the network using network management software.
The switch’s web interface, console interface, and SNMP agent allow you to
perform management functions such as those shown below:
Set user names and passwords
Set an IP interface for
Configure SNMP parameters
Enable/disable any port
a management VLAN
Set the speed/duplex mode for any port
– 56 –
Page 57
C
HAPTER
2
| Initial Switch Configuration
Connecting to the Switch
Configure the bandwidth of any port by limiting input or output rates
Control port access through IEEE 802.1X security or static address
filtering
Filter packets using Access Control Lists (ACLs)
Configure up to 255 IEEE 802.1Q VLANs
Enable GVRP automatic VLAN registration
Configure IGMP multicast filtering
Upload and download system firmware or configuration files via HTTP
(using the web interface) or FTP/TFTP (using the command line or web
interface)
Configure Spanning Tree parameters
Configure Class of Service (CoS) priority queuing
REQUIRED
CONNECTIONS
Configure static or LACP trunks (up to 8)
Enable port mirroring
Set storm control on any port for excessive broadcast, multicast, or
unknown unicast traffic
Display system information and statistics
The switch provides an RS-232 serial port that enables a connection to a
PC or terminal for monitoring and configuring the switch. A null-modem
console cable is provided with the switch.
Attach a VT100-compatible terminal, or a PC running a terminal emulation
program to the switch. You can use the console cable provided with this
package, or use a null-modem cable that complies with the wiring
assignments shown in the Installation Guide.
To connect a terminal to the console port, complete the following steps:
1. Connect the console cable to the serial port on a terminal, or a PC
running terminal emulation software, and tighten the captive retaining
screws on the DB-9 connector.
2. Connect the other end of the cable to the RS-232 serial port on the
switch.
3. Make sure the terminal emulation software is set as follows:
Select the appropriate serial port (COM port 1 or COM port 2).
Set the baud rate to 9600 bps.
– 57 –
Page 58
C
HAPTER
Set the data format to 8 data bits, 1 stop bit, and no parity.
Set flow control to none.
Set the emulation mode to VT100.
When using HyperTerminal, select Terminal keys, not Windows
2
| Initial Switch Configuration
Connecting to the Switch
keys.
N
OTE
:
Once you have set up the terminal correctly, the console login screen
will be displayed.
For a description of how to use the CLI, see “Using the Command Line
Interface.” For a list of all the CLI commands and detailed information on
using the CLI, refer to “CLI Command Groups.”
REMOTE
CONNECTIONS
Prior to accessing the switch’s onboard agent via a network connection,
you must first configure it with a valid IP address, subnet mask, and
default gateway using a console connection, or DHCP protocol.
The IP address for this switch is obtained via DHCP by default. To manually
configure this address or enable dynamic address assignment via DHCP,
see “Setting an IP Address.”
N
OTE
:
This switch supports four concurrent Telnet or SSH sessions.
After configuring the switch’s IP parameters, you can access the onboard
configuration program from anywhere within the attached network. The
command-line interface can be accessed using Telnet from any computer
attached to the network. The switch can also be managed by any computer
using a web browser (Internet Explorer 5.0 or above, Netscape 6.2 or
above, or Mozilla Firefox 2.0.0.0 or above), or from a network computer
using SNMP network management software.
The onboard program only provides access to basic configuration functions.
To access the full range of SNMP management functions, you must use
SNMP-based network management software.
– 58 –
Page 59
BASIC CONFIGURATION
C
HAPTER
2
| Initial Switch Configuration
Basic Configuration
CONSOLE
CONNECTION
The CLI program provides two different command levels — normal access
level (Normal Exec) and privileged access level (Privileged Exec). The
commands available at the Normal Exec level are a limited subset of those
available at the Privileged Exec level and allow you to only display
information and use basic utilities. To fully configure the switch
parameters, you must access the CLI at the Privileged Exec level.
Access to both CLI levels are controlled by user names and passwords. The
switch has a default user name and password for each level. To log into the
CLI at the Privileged Exec level using the default user name and password,
perform these steps:
1. To initiate your console connection, press <Enter>. The “User Access
Verification” procedure starts.
2. At the User Name prompt, enter “admin.”
3. At the Password prompt, also enter “admin.” (The password characters
are not displayed on the console screen.)
4. The session is opened and the CLI displays the “Console#” prompt
indicating you have access at the Privileged Exec level.
SETTING PASSWORDS If this is your first time to log into the CLI program, you should define new
passwords for both default user names using the “username” command,
record them and put them in a safe place.
Passwords can consist of up to 32 alphanumeric characters and are case
sensitive. To prevent unauthorized access to the switch, set the passwords
as follows:
1. Open the console interface with the default user name and password
“admin” to access the Privileged Exec level.
2. Type “configure” and press <Enter>.
3. Type “username guest password 0 password,” for the Normal Exec
level, where password is your new password. Press <Enter>.
4. Type “username admin password 0 password,” for the Privileged Exec
level, where password is your new password. Press <Enter>.
Username: admin
Password:
CLI session with the DG-FS4528P is opened.
To end the CLI session, enter [Exit].
You must establish IP address information for the switch to obtain
management access through the network. This can be done in either of the
following ways:
Manual — You have to input the information, including IP address and
subnet mask. If your management station is not in the same IP subnet
as the switch, you will also need to specify the default gateway router.
Dynamic — The switch can send IP configuration requests to BOOTP or
DHCP address allocation servers on the network.
MANUAL CONFIGURATION
You can manually assign an IP address to the switch. You may also need to
specify a default gateway that resides between this device and
management stations that exist on another network segment. Valid IP
addresses consist of four decimal numbers, 0 to 255, separated by periods.
Anything outside this format will not be accepted by the CLI program.
N
OTE
:
The IP address for this switch is obtained via DHCP by default.
Before you can assign an IP address to the switch, you must obtain the
following information from your network administrator:
IP address for the switch
Network mask for this network
Default gateway for the network
To assign an IP address to the switch, complete the following steps
1. From the Global Configuration mode prompt, type “interface vlan 1” to
access the interface-configuration mode. Press <Enter>.
2. Type “ip address ip-address netmask,” where “ip-address” is the switch
IP address and “netmask” is the network mask for the network. Press
<Enter>.
3. Type “exit” to return to the global configuration mode prompt. Press
<Enter>.
4. To set the IP address of the default gateway for the network to which
the switch belongs, type “ip default-gateway gateway,” wh er e
“gateway” is the IP address of the default gateway. Press <Enter>.
If you select the “bootp” or “dhcp” option, the system will immediately
start broadcasting service requests. IP will be enabled but will not function
until a BOOTP or DHCP reply has been received. Requests are broadcast
every few minutes using exponential backoff until IP configuration
information is obtained from a BOOTP or DHCP server. BOOTP and DHCP
values can include the IP address, subnet mask, and default gateway. If
the DHCP/BOOTP server is slow to respond, you may need to use the “ip
dhcp restart” command to re-start broadcasting service requests.
Note that the “ip dhcp restart” command can be used to start broadcasting
service requests for any VLAN configured to obtain address assignments
through BOOTP or DHCP. It may be necessary to use this command when
DHCP is configured on a VLAN, and the member ports which were
previously shut down are now enabled.
If the “bootp” or “dhcp” option is saved to the startup-config file (step 6),
then the switch will start broadcasting service requests as soon as it is
powered on.
To automatically configure the switch by communicating with BOOTP or
DHCP address allocation servers on the network, complete the following
steps:
1. From the Global Configuration mode prompt, type “interface vlan 1” to
access the interface-configuration mode. Press <Enter>.
2. At the interface-configuration mode prompt, use one of the following
commands:
To obtain IP settings via DHCP, type “ip address dhcp” and press
<Enter>.
To obtain IP settings via BOOTP, type “ip address bootp” and press
<Enter>.
3. Type “end” to return to the Privileged Exec mode. Press <Enter>.
4. Wait a few minutes, and then check the IP configuration settings by
typing the “show ip interface” command. Press <Enter>.
5. Then save your configuration changes by typing “copy running-config
startup-config.” Enter the startup file name and press <Enter>.
– 61 –
Page 62
C
HAPTER
Console(config)#interface vlan 1
Console(config-if)#ip address dhcp
Console(config-if)#end
Console#show ip interface
IP address and netmask: 192.168.1.54 255.255.255.0 on VLAN 1,
and address mode: DHCP
Console#copy running-config startup-config
Startup configuration file name []: startup
\Write to FLASH Programming.
\Write to FLASH finish.
Success.
2
| Initial Switch Configuration
Basic Configuration
DOWNLOADINGA CONFIGURATION FILE REFERENCEDBYA DHCP SERVER
Information passed on to the switch from a DHCP server may also include a
configuration file to be downloaded and the TFTP servers where that file
can be accessed. If the Factory Default Configuration file is used to
provision the switch at startup, in addition to requesting IP configuration
settings from the DHCP server, it will also ask for the name of a bootup
configuration file and TFTP servers where that file is stored.
If the switch receives information that allows it to download the remote
bootup file, it will save this file to a local buffer, and then restart the
provision process.
Note the following DHCP client behavior:
The bootup configuration file received from a TFTP server is stored on
the switch with the original file name. If this file name already exists in
the switch, the file is overwritten.
If the name of the bootup configuration file is the same as the Factory
Default Configuration file, the download procedure will be terminated,
and the switch will not send any further DHCP client requests.
If the switch fails to download the bootup configuration file based on
information passed by the DHCP server, it will not send any further
DHCP client requests.
If the switch does not receive a DHCP response prior to completing the
bootup process, it will continue to send a DHCP client request once a
minute. These requests will only be terminated if the switch’s address is
manually configured, but will resume if the address mode is set back to
DHCP.
– 62 –
Page 63
C
HAPTER
2
| Initial Switch Configuration
Basic Configuration
To successfully transmit a bootup configuration file to the switch the DHCP
daemon (using a Linux based system for this example) must be configured
with the following information:
Options 60, 66 and 67 statements can be added to the daemon’s
configuration file.
Table 3: Options 60, 66 and 67 Statements
Option
KeywordParameter
60vendor-class-identifiera string indicating the vendor class identifier
66tftp-server-namea string indicating the tftp server name
67bootfile-namea string indicating the bootfile name
Statement
By default, DHCP option 66/67 parameters are not carried in a DHCP
server reply. To ask for a DHCP reply with option 66/67 information, the
DHCP client request sent by this switch includes a “parameter request
list” asking for this information. Besides, the client request also
includes a “vendor class identifier” that allows the DHCP server to
identify the device, and select the appropriate configuration file for
download. This information is included in Option 55 and 124.
Table 4: Options 55 and 124 Statements
Option
KeywordParameter
55dhcp-parameter-request-list a list of parameters, separated by ','
124vendor-class-identifiera string indicating the vendor class identifier
Statement
The following configuration examples are provided for a Linux-based DHCP
daemon (dhcpd.conf file). The server will reply with Options 66/67
encapsulated in Option 43. Note that in the “Vendor class two” section, the
server still sends Option 43 telling the switch to download the test2
configuration file from the server 192.168.255.101.
class "Option66,67_1" { #DHCP Option 60 Vendor class
one
match if option vendor-class-identifier = "DG-FS4528P";
option dhcp-parameter-request-list 1,43,66,67;
#option 43
option vendor-class-information code 43 = encapsulate
dynamicProvision;
#option 66 encapsulated in option 43
option vendor-class-information.tftp-server-name "192.168.255.100";
#option 67 encapsulated in option 43
option vendor-class-information.bootfile-name "test1"
}
class "Option66,67_2" {#DHCP Option 60 Vendor class
two
match if option vendor-class-identifier = "DG-FS4528P";
option dhcp-parameter-request-list 1,43,66,67;
option tftp-server-name "192.168.255.101";
option bootfile-name "test2";
}
2
| Initial Switch Configuration
Basic Configuration
ENABLING SNMP
MANAGEMENT ACCESS
N
OTE
:
Use “DG-FS4528P” for the vendor-class-identifier in the dhcpd.conf
file.
The switch can be configured to accept management commands from
Simple Network Management Protocol (SNMP) applications. You can
configure the switch to respond to SNMP requests or generate SNMP traps.
When SNMP management stations send requests to the switch (either to
return information or to set a parameter), the switch provides the
requested data or sets the specified parameter. The switch can also be
configured to send information to SNMP managers (without being
requested by the managers) through trap messages, which inform the
manager that certain events have occurred.
The switch includes an SNMP agent that supports SNMP version 1, 2c, and
3 clients. To provide management access for version 1 or 2c clients, you
must specify a community string. The switch provides a default MIB View
(i.e., an SNMPv3 construct) for the default “public” community string that
provides read access to the entire MIB tree, and a default view for the
“private” community string that provides read/write access to the entire
MIB tree. However, you may assign new views to version 1 or 2c
community strings that suit your specific security requirements (see
"Setting SNMPv3 Views").
– 64 –
Page 65
C
HAPTER
2
| Initial Switch Configuration
Basic Configuration
COMMUNITY STRINGS (FOR SNMP VERSION 1 AND 2CCLIENTS)
Community strings are used to control management access to SNMP
version 1 and 2c stations, as well as to authorize SNMP stations to receive
trap messages from the switch. You therefore need to assign community
strings to specified users, and set the access level.
The default strings are:
public - with read-only access. Authorized management stations are
only able to retrieve MIB objects.
private - with read/write access. Authorized management stations are
able to both retrieve and modify MIB objects.
To prevent unauthorized access to the switch from SNMP version 1 or 2c
clients, it is recommended that you change the default community strings.
To configure a community string, complete the following steps:
1. From the Privileged Exec level global configuration mode prompt, type
“snmp-server community string mode,” where “string” is the
community access string and “mode” is rw (read/write) or ro (read
only). Press <Enter>. (Note that the default mode is read only.)
2. To remove an existing string, simply type “no snmp-server community
string,” where “string” is the community access string to remove. Press
<Enter>.
Console(config)#snmp-server community admin rw
Console(config)#snmp-server community private
Console(config)#
N
OTE
:
If you do not intend to support access to SNMP version 1 and 2c
clients, we recommend that you delete both of the default community
strings. If there are no community strings, then SNMP management access
from SNMP v1 and v2c clients is disabled.
TRAP RECEIVERS
You can also specify SNMP stations that are to receive traps from the
switch. To configure a trap receiver, use the “snmp-server host” command.
From the Privileged Exec level global configuration mode prompt, type:
“snmp-server host host-address community-string
[version {1 | 2c | 3 {auth | noauth | priv}}]”
where “host-address” is the IP address for the trap receiver, “communitystring” specifies access rights for a version 1/2c host, or is the user name
of a version 3 host, “version” indicates the SNMP client version, and “auth |
noauth | priv” means that authentication, no authentication, or
– 65 –
Page 66
C
HAPTER
2
| Initial Switch Configuration
Managing System Files
authentication and privacy is used for v3 clients. Then press <Enter>. For
a more detailed description of these parameters, see “snmp-server host.”
The following example creates a trap host for each type of SNMP client.
Console(config)#snmp-server host 10.1.19.23 batman
Console(config)#snmp-server host 10.1.19.98 robin version 2c
Console(config)#snmp-server host 10.1.19.34 barbie version 3 auth
Console(config)#
CONFIGURING ACCESSFOR SNMP VERSION 3 CLIENTS
To configure management access for SNMPv3 clients, you need to first
create a view that defines the portions of MIB that the client can read or
write, assign the view to a group, and then assign the user to a group. The
following example creates one view called “mib-2” that includes the entire
MIB-2 tree branch, and then another view that includes the IEEE 802.1D
bridge MIB. It assigns these respective read and read/write views to a
group call “r&d” and specifies group authentication via MD5 or SHA. In the
last step, it assigns a v3 user to this group, indicating that MD5 will be
used for authentication, provides the password “greenpeace” for
authentication, and the password “einstien” for encryption.
Console(config)#snmp-server view mib-2 1.3.6.1.2.1 included
Console(config)#snmp-server view 802.1d 1.3.6.1.2.1.17 included
Console(config)#snmp-server group r&d v3 auth mib-2 802.1d
Console(config)#snmp-server user steve group r&d v3 auth md5 greenpeace priv
des56 einstien
Console(config)#
For a more detailed explanation on how to configure the switch for access
from SNMPv3 clients, refer to “Simple Network Management Protocol,” o r
refer to the specific CLI commands for SNMP starting on page 516.
MANAGING SYSTEM FILES
The switch’s flash memory supports three types of system files that can be
managed by the CLI program, web interface, or SNMP. The switch’s file
system allows files to be uploaded and downloaded, copied, deleted, and
set as a start-up file.
The types of files are:
Configuration — This file type stores system configuration information
and is created when configuration settings are saved. Saved
configuration files can be selected as a system start-up file or can be
uploaded via FTP/TFTP to a server for backup. The file named
“Factory_Default_Config.cfg” contains all the system default settings
and cannot be deleted from the system. If the system is booted with
the factory default settings, the switch will also create a file named
“startup1.cfg” that contains system settings for switch initialization,
including information about the unit identifier, and MAC address for the
– 66 –
Page 67
C
HAPTER
switch. The configuration settings from the factory defaults
configuration file are copied to this file, which is then used to boot the
switch. See "Saving or Restoring Configuration Settings" for more
information.
Operation Code — System software that is executed after boot-up,
also known as run-time code. This code runs the switch operations and
provides the CLI and web management interfaces. See "Managing
System Files" for more information.
Diagnostic Code — Software that is run during system boot-up, also
known as POST (Power On Self-Test).
Due to the size limit of the flash memory, the switch supports only two
operation code files. However, you can have as many diagnostic code files
and configuration files as available flash memory space allows. The switch
has a total of 16 Mbytes of flash memory for system files.
In the system flash memory, one file of each type must be set as the startup file. During a system boot, the diagnostic and operation code files set as
the start-up file are run, and then the start-up configuration file is loaded.
2
| Initial Switch Configuration
Managing System Files
SAVINGOR
RESTORING
CONFIGURATION
SETTINGS
Note that configuration files should be downloaded using a file name that
reflects the contents or usage of the file settings. If you download directly
to the running-config, the system will reboot, and the settings will have to
be copied from the running-config to a permanent file.
Configuration commands only modify the running configuration file and are
not saved when the switch is rebooted. To save all your configuration
changes in nonvolatile storage, you must copy the running configuration
file to the start-up configuration file using the “copy” command.
New startup configuration files must have a name specified. File names on
the switch are case-sensitive, can be from 1 to 31 characters, must not
contain slashes (\ or /), and the leading letter of the file name must not be
a period (.). (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”)
There can be more than one user-defined configuration file saved in the
switch’s flash memory, but only one is designated as the “startup” file that
is loaded when the switch boots. The copy running-config startup-config command always sets the new file as the startup file. To select a
previously saved configuration file, use the boot system config:<filename> command.
The maximum number of saved configuration files depends on available
flash memory with each configuration file normally requiring less than 20
kbytes. The amount of available flash memory can be checked by using the
dir command.
To save the current configuration settings, enter the following command:
1. From the Privileged Exec mode prompt, type “copy running-config
startup-config” and press <Enter>.
– 67 –
Page 68
C
HAPTER
2
| Initial Switch Configuration
Configuring Power over Ethernet
2. Enter the name of the start-up file. Press <Enter>.
Console#copy running-config startup-config
Startup configuration file name []: startup
\Write to FLASH Programming.
\Write to FLASH finish.
Success.
To restore configuration settings from a backup server, enter the following
command:
1. From the Privileged Exec mode prompt, type “copy tftp startup-config”
and press <Enter>.
2. Enter the address of the TFTP server. Press <Enter>.
3. Enter the name of the startup file stored on the server. Press <Enter>.
4. Enter the name for the startup file on the switch. Press <Enter>.
Console#copy file startup-config
Console#copy tftp startup-config
TFTP server IP address: 192.168.0.4
Source configuration file name: startup-rd.cfg
Startup configuration file name [startup1.cfg]:
Success.
Console#
CONFIGURING POWEROVER ETHERNET
This switch supports the IEEE 802.3af Power-over-Ethernet (PoE) standard
that enables DC power to be supplied to attached devices over the wire
pairs in the connecting Ethernet cable. Any 802.3af compliant device
attached to a port can directly draw power from the switch over the
Ethernet cable without requiring its own separate power source. This
capability gives network administrators centralized power control for
devices such as IP phones and wireless access points, which translates into
greater network availability.
A maximum PoE power budget for the switch (power available to all switch
ports) can be defined so that power can be centrally managed, preventing
overload conditions at the power source. If the power demand from
devices connected to the switch exceeds the power budget setting, the
switch uses port power priority settings to limit the supplied power.
In the example below, the power mainpower maximum allocation CLI
command is used to set the PoE power budget for the switch. (Range: 37 180 watts). If devices connected to the switch require more power than the
switch budget, the port power priority settings are used to control the
– 68 –
Page 69
C
HAPTER
2
| Initial Switch Configuration
Configuring Power over Ethernet
supplied power. See "Setting a Switch Power Budget" on page 281 for
details.
Console(config)#power mainpower maximum allocation 180
Console(config)#
PoE is enabled for all ports by default. Power can be disabled for a port by
using the no form of the power inline CLI command, as shown in the
example below.
Console(config)#interface ethernet 1/2
Console(config-if)#no power inline
Console(config-if)#
– 69 –
Page 70
S
ECTION
WEB CONFIGURATION
This section describes the basic switch features, along with a detailed
description of how to configure each feature via a web browser.
This section includes these chapters:
"Using the Web Interface" on page 71
"Basic Management Tasks" on page 83
"Simple Network Management Protocol" on page 131
"Sampling Traffic Flows" on page 151
II
"Security Measures" on page 155
"Interface Configuration" on page 248
"Power Over Ethernet Settings" on page 280
"Address Table Settings" on page 285
"Spanning Tree Algorithm" on page 290
"Layer 2 Protocol Tunneling" on page 313
"VLAN Configuration" on page 318
"Link Layer Discovery Protocol" on page 352
"Class of Service" on page 366
"Quality of Service" on page 374
"VoIP Traffic Configuration" on page 384
"Multicast Filtering" on page 390
"Domain Name Service" on page 415
– 70 –
Page 71
3USINGTHE WEB INTERFACE
This switch provides an embedded HTTP web agent. Using a web browser
you can configure the switch and view statistics to monitor network
activity. The web agent can be accessed by any computer on the network
using a standard web browser (Internet Explorer 5.0 or above, Netscape
6.2 or above, or Mozilla Firefox 2.0.0.0 or above).
N
OTE
:
You can also use the Command Line Interface (CLI) to manage the
switch over a serial connection to the console port or via Telnet. For more
information on using the CLI, refer to “Using the Command Line Interface.”
CONNECTINGTOTHE WEB INTERFACE
Prior to accessing the switch from a web browser, be sure you have first
performed the following tasks:
1. Configure the switch with a valid IP address, subnet mask, and default
gateway using an out-of-band serial connection, BOOTP or DHCP
protocol. (See “Setting an IP Address.”)
2. Set user names and passwords using an out-of-band serial connection.
Access to the web agent is controlled by the same user names and
passwords as the onboard configuration program. (See “Setting
Passwords.”)
3. After you enter a user name and password, you will have access to the
system configuration program.
N
OTE
:
You are allowed three attempts to enter the correct password; on
the third failed attempt the current connection is terminated.
N
OTE
:
If you log into the web interface as guest (Normal Exec level), you
can view the configuration settings or change the guest password. If you
log in as “admin” (Privileged Exec level), you can change the settings on
any page.
N
OTE
:
If the path between your management station and this switch does
not pass through any device that uses the Spanning Tree Algorithm, then
you can set the switch port attached to your management station to fast
forwarding (i.e., enable Admin Edge Port) to improve the switch’s response
time to management commands issued through the web interface. See
“Configuring Interface Settings for STA.”
– 71 –
Page 72
NAVIGATINGTHE WEB BROWSER INTERFACE
To access the web-browser interface you must first enter a user name and
password. The administrator has Read/Write access to all configuration
parameters and statistics. The default user name and password for the
administrator is “admin.”
HOME PAGE When your web browser connects with the switch’s web agent, the home
page is displayed as shown below. The home page displays the Main Menu
on the left side of the screen and System Information on the right side. The
Main Menu links are used to navigate to other menus, and display
configuration parameters and statistics.
Figure 1: Home Page
C
HAPTER
Navigating the Web Browser Interface
3
| Using the Web Interface
N
OTE
:
You can open a connection to the manufacturer’s web site by clicking
on the DIGISOL logo.
– 72 –
Page 73
C
HAPTER
Navigating the Web Browser Interface
3
| Using the Web Interface
CONFIGURATION
OPTIONS
Configurable parameters have a dialog box or a drop-down list. Once a
configuration change has been made on a page, be sure to click on the
Apply button to confirm the new setting. The following table summarizes
the web page configuration buttons.
Table 5: Web Page Configuration Buttons
ButtonAction
ApplySets specified values to the system.
RevertCancels specified values and restores current
HelpLinks directly to web help.
N
OTE
:
To ensure proper screen refresh, be sure that Internet Explorer 5.x
values prior to pressing “Apply.”
is configured as follows: Under the menu “Tools / Internet Options /
General / Temporary Internet Files / Settings,” the setting for item “Check
for newer versions of stored pages” should be “Every visit to the page.”
N
OTE
:
When using Internet Explor er 5.0, you may h ave to manually refresh
the screen after making configuration changes by pressing the browser’s
refresh button.
PANEL DISPLAY The web agent displays an image of the switch’s ports. The Mode can be
set to display different information for the ports, including Active (i.e., up
or down), Duplex (i.e., half or full duplex), or Flow Control (i.e., with or
without flow control).
Figure 2: Front Panel Indicators
– 73 –
Page 74
C
HAPTER
3
| Using the Web Interface
Navigating the Web Browser Interface
MAIN MENU Using the onboard web agent, you can define system parameters, manage
and control the switch, and all its ports, or monitor network conditions. The
following table briefly describes the selections available from this program.
Table 6: Switch Main Menu
MenuDescriptionPage
System
System InformationProvides basic system description, including contact information84
Switch InformationShows the number of ports, hardware version, power status, and
Bridge Extension ConfigurationShows the bridge extension parameters87
IP ConfigurationSets the IP address for management access88
Jumbo FramesEnables jumbo frame packets.93
Resource
CPU Status Displays information on CPU utilization; also sets thresholds for
firmware version numbers
CPU utilization alarm
85
94
Memory Status Displays information on memory utilization; also sets thresholds
File Management96
Automatic Operation Code UpgradeAutomatically upgrades operation code if a newer version is
Copy OperationAllows the transfer and copying of files100
HTTP UpgradeCopies operation code or configuration files from management
HTTP DownloadCopies operation code or configuration files from the switch to the
DeleteAllows deletion of files from the flash memory106
Set Start-UpSets the startup file106
Line
ConsoleSets console port connection parameters107
Tel n e tS e t s Te l n et c o nn e c ti o n pa r a m et e r s109
Log110
LogsStores and displays error messages110
System LogsSends error messages to a logging process110
Remote LogsConfigures the logging of messages to a remote logging process112
SMTPSends an SMTP client message to a participating server.114
ResetRestarts the switch immediately, or after a specified delay115
SNTPSimple Network Time Protocol
for memory utilization alarm
found on the server
station to the switch
management station
95
96
104
104
Current TimeManually sets the current time 117
Configuration Configures SNTP and NTP client settings, including broadcast
Time ZoneSets the local time zone for the system clock121
mode, authentication parameters or a specified list of servers
– 74 –
118
Page 75
C
HAPTER
3
| Using the Web Interface
Navigating the Web Browser Interface
Table 6: Switch Main Menu (Continued)
MenuDescriptionPage
Summer TimeConfigures summer time settings122
SNMPSimple Network Management Protocol131
Configuration Configures community strings and related trap functions133
Port Configuration Enables traps when changes occur for dynamic addresses in the
Trunk Configuration Enables traps when changes occur for dynamic addresses in the
Agent StatusEnables or disables SNMP Agent Status139
SNMPv3
Engine IDSets the SNMP v3 engine ID on this switch140
Remote Engine IDSets the SNMP v3 engine ID for a remote device141
UsersConfigures SNMP v3 users on this switch142
Remote UsersConfigures SNMP v3 users from a remote device143
GroupsConfigures SNMP v3 groups146
ViewsConfigures SNMP v3 views149
MAC address table for a port
MAC address table for a trunk
138
138
sFlowSamples traffic flows, and forwards data to designated collector151
ConfigurationGlobally enables flow sampling, enables sampling per port, and
Port ConfigurationSets destination parameters, payload parameters, and sampling
Security155
User AccountsConfigures user names, passwords, and access levels156
ConfigurationThis page is used to create/remove primary or community VLANs 340
AssociationEach community VLAN must be associated with a primary VLAN341
Port InformationShows VLAN port type, and associated primary or secondary
Port ConfigurationSets the private VLAN interface type, and associates the
Trunk InformationShows VLAN port type, and associated primary or secondary
Trunk ConfigurationSets the private VLAN interface type, and associates the
status and timers per trunk
on specified downlink and uplink ports
between uplink ports assigned to different client sessions
ports to service the traffic
VLANs
interfaces with a private VLAN
VLANs
interfaces with a private VLAN
328
336
336
337
341
343
341
343
Protocol VLAN344
ConfigurationCreates a protocol group, specifying the supported protocols345
System ConfigurationMaps a protocol group to a VLAN346
VLAN Mirror ConfigurationMirrors traffic from one or more source VLANs to a target port347
IP Subnet VLAN349
ConfigurationMaps IP subnet traffic to a VLAN349
– 79 –
Page 80
C
HAPTER
3
| Using the Web Interface
Navigating the Web Browser Interface
Table 6: Switch Main Menu (Continued)
MenuDescriptionPage
MAC-based VLAN350
ConfigurationMaps traffic with specified source MAC address to a VLAN350
LLDPLink Layer Discovery Protocol352
ConfigurationConfigures global LLDP timing parameters353
Port ConfigurationSets the message transmission mode; enables SNMP notification;
Trunk ConfigurationSets the message transmission mode; enables SNMP notification;
Local InformationDisplays general information about the local device358
Remote Port InformationDisplays information about a remote device connected to a port on
Remote Trunk InformationDisplays information about a remote device connected to a trunk
Remote Information DetailsDisplays detailed information about a remote device connected to
Device StatisticsDisplays statistics for all connected remote devices363
Device Statistics DetailsDisplays statistics for remote devices on a selected port or trunk 364
Priority366
Default Port PrioritySets the default priority for each port366
Default Trunk PrioritySets the default priority for each trunk366
Traffic ClassesMaps IEEE 802.1p priority tags to output queues367
Traffic Classes StatusEnables/disables traffic class priorities (not implemented)NA
Queue ModeSets queue mode to strict priority or Weighted Round-Robin369
Queue SchedulingConfigures Weighted Round Robin queueing 370
and sets the LLDP attributes to advertise for ports
and sets the LLDP attributes to advertise for trunks
this switch
on this switch
this switch
355
355
360
360
361
IP DSCP Priority Status Globally selects DSCP Priority, or disables it.371
IP DSCP PrioritySets IP Differentiated Services Code Point priority, mapping a
QoSQuality of Service374
DiffServConfigure QoS classification criteria and service policies374
Class MapCreates a class map for a type of traffic375
Policy MapCreates a policy map for multiple interfaces378
Service PolicyApplies a policy map defined to an ingress port382
VoIP Traffic Setting384
ConfigurationConfigures auto-detection of VoIP traffic, sets the Voice VLAN,
Port ConfigurationConfigures VoIP traffic settings for ports, including the way in
OUI ConfigurationMaps the OUI in the source MAC address of ingress packets to the
DSCP tag to a class-of-service value
nd VLAN aging time
which a port is added to the Voice VLAN, filtering of non-VoIP
packets, the method of detecting VoIP traffic, and the priority
assigned to the voice traffic
VoIP device manufacturer
– 80 –
372
385
386
388
Page 81
C
HAPTER
3
| Using the Web Interface
Navigating the Web Browser Interface
Table 6: Switch Main Menu (Continued)
MenuDescriptionPage
IGMP Snooping390
IGMP ConfigurationEnables multicast filtering; configures parameters for multicast
IGMP Immediate LeaveConfigures immediate leave for multicast services no longer
Multicast Router Port InformationDisplays the ports that are attached to a neighboring multicast
Static Multicast Router Port Configuration Assigns ports that are attached to a neighboring multicast router 396
IP Multicast Registration TableDisplays all multicast groups active on this switch, including
IGMP Member Port TableStatically assigns multicast addresses to the selected VLAN398
IGMP Filter ConfigurationEnables IGMP filtering for the switch400
IGMP Filter Profile ConfigurationConfigures IGMP filter profiles, controlling groups and access mode 401
IGMP Filter/Throttling Port ConfigurationAssigns IGMP filter profiles to port interfaces and sets throttling
IGMP Filter/Throttling Trunk Configuration Assigns IGMP filter profiles to trunk interfaces and sets throttling
MVRMulticast VLAN Registration404
ConfigurationGlobally enables MVR, sets the MVR VLAN, adds multicast stream
Port InformationDisplays MVR interface type, MVR operational and activity status,
Trunk InformationDisplays MVR interface type, MVR operational and activity status,
query
required
router for each VLAN ID
multicast IP addresses and VLAN ID
action
action
addresses
and immediate leave status
and immediate leave status
392
394
396
397
402
402
405
406
406
Group IP InformationDisplays the ports attached to an MVR multicast stream407
Port ConfigurationConfigures MVR interface type and immediate leave status408
Trunk ConfigurationConfigures MVR interface type and immediate leave status408
Group Member ConfigurationStatically assigns MVR multicast streams to an interface410
Receiver ConfigurationPermits forwarding of tagged multicast traffic by specifying MVR
Receiver Group IP InformationDisplays ports assigned to MVR receiver groups412
Receiver Group Member ConfigurationStatically assigns MVR receiver groups to selected ports412
DNSDomain Name Service415
General ConfigurationEnables DNS; configures domain name and domain list; and
Static Host TableConfigures static entries for domain name to address mapping417
CacheDisplays cache entries discovered by designated name servers418
DHCP Snooping234
ConfigurationEnables DHCP Snooping and DHCP Snooping MAC-Address
VLAN ConfigurationEnables DHCP Snooping for a VLAN236
receiver VLAN and MVR receiver groups
specifies IP address of name servers for dynamic lookup
Verification
411
415
236
– 81 –
Page 82
C
HAPTER
3
| Using the Web Interface
Navigating the Web Browser Interface
Table 6: Switch Main Menu (Continued)
MenuDescriptionPage
Information Option ConfigurationEnables DHCP Snooping Information Option; and sets the
information policy
Port ConfigurationSets the trust mode for an interface240
Binding InformationDisplays the DHCP Snooping binding information241
237
IP Source GuardFilters IP traffic based on static entries in the IP Source Guard
Port ConfigurationEnables IP source guard and selects filter type per port242
Static ConfigurationAdds a static addresses to the source-guard binding table244
Dynamic InformationDisplays the source-guard binding table for a selected interface246
UPNPUniversal Plug and Play124
ConfigurationEnables UPNP and defines timeout values125
Cluster126
ConfigurationGlobally enables clustering for the switch; sets Commander status 127
Member ConfigurationAdds switch Members to the cluster128
Member InformationDisplays cluster Member switch information129
table, or dynamic entries in the DHCP Snooping table
242
– 82 –
Page 83
4BASIC MANAGEMENT TASKS
This chapter describes the following topics:
Displaying System Information – Provides basic system description,
including contact information.
Displaying Switch Hardware/Software Versions – Shows the hardware
version, power status, and firmware versions
Displaying Bridge Extension Capabilities – Shows the bridge extension
parameters.
IP Configuration – Sets an IP address for management access.
Configuring Support for Jumbo Frames – Enables support for jumbo
frames.
Checking System Resources – Displays information on CPU and
memory utilization parameters.
Managing System Files – Describes how to upgrade operating software
or configuration files, and set the system start-up files.
Configuring Console and Telnet Settings – Sets console port and Telnet
connection parameters.
Logging Events – Sets conditions for logging event messages to system
memory or flash memory, configures conditions for sending trap
messages to remote log servers, and configures trap reporting to
remote hosts using Simple Mail Transfer Protocol (SMTP).
Resetting the System – Restarts the switch immediately, at a specified
time, after a specified delay, or at a periodic interval.
Setting the System Clock – Sets the current time manually or through
specified SNTP servers.
UPnP – Configures Universal Plug-and-Play functionality on the switch.
Switch Clustering – Configures centralized management by a single unit
over a group of switches connected to the same local network
– 83 –
Page 84
DISPLAYING SYSTEM INFORMATION
Use the System > System Information page to identify the system by
displaying information such as the device name, location and contact
information.
CLI REFERENCES
"System Management Commands" on page 442"SNMP Commands" on page 516
PARAMETERS
These parameters are displayed in the web interface:
System Name – Name assigned to the switch.
Object ID – MIB II object ID for switch’s network management
subsystem.
Location – Specifies the system location.
C
HAPTER
4
| Basic Management Tasks
Displaying System Information
Contact – Administrator responsible for the system.
System Up Time – Length of time the management agent has been
up.
WEB INTERFACE
To configure general system information:
1. Click System, General.
2. Specify the system name, location, and contact information for the
system administrator.
3. Click Apply.
– 84 –
Page 85
Figure 3: System Information
C
HAPTER
Displaying Switch Hardware/Software Versions
4
| Basic Management Tasks
N
OTE
:
This page also
Command Line Interface via Telnet
includes a Telnet button that allows access to the
.
DISPLAYING SWITCH HARDWARE/SOFTWARE VERSIONS
Use the System > Switch Information page to display hardware/firmware
version numbers for the main board and management software, as well as
the power status of the system.
CLI REFERENCES
"System Management Commands" on page 442
PARAMETERS
The following parameters are displayed in the web interface:
Main Board
Serial Number – The serial number of the switch.
Number of Ports – Number of built-in ports.
Hardware Version – Hardware version of the main board.
Chip Device ID – Identifier for basic MAC/Physical Layer switch chip.
Internal Power Status – Displays the status of the internal power
supply.
– 85 –
Page 86
C
HAPTER
Displaying Switch Hardware/Software Versions
4
| Basic Management Tasks
Management Software
EPLD Version – Version number of EEPROM Programmable Logic
Device.
Loader Version – Version number of loader code.
Boot-ROM Version – Version of Power-On Self-Test (POST) and boot
code.
Operation Code Version – Version number of runtime code.
Role – Shows that this switch is operating as Master or Slave.
WEB INTERFACE
To view hardware and software version information.
1. Click System, then Switch Information.
Figure 4: General Switch Information
– 86 –
Page 87
DISPLAYING BRIDGE EXTENSION CAPABILITIES
Use the System > Bridge Extension Configuration page to display settings
based on the Bridge MIB. The Bridge MIB includes extensions for managed
devices that support Multicast Filtering, Traffic Classes, and Virtual LANs.
You can access these extensions to display default settings for the key
variables.
CLI REFERENCES
"GVRP and Bridge Extension Commands" on page 793
PARAMETERS
The following parameters are displayed in the web interface:
Extended Multicast Filtering Services – This switch does not
support the filtering of individual multicast addresses based on GMRP
(GARP Multicast Registration Protocol).
Traffic Classes – This switch provides mapping of user priorities to
multiple traffic classes. (Refer to "Class of Service" on page 366.)
C
HAPTER
Displaying Bridge Extension Capabilities
4
| Basic Management Tasks
Static Entry Individual Port – This switch allows static filtering for
unicast and multicast addresses. (Refer to "Setting Static Addresses"
on page 285.)
VLAN Learning – This switch uses Independent VLAN Learning (IVL),
where each port maintains its own filtering database.
Configurable PVID Tagging – This switch allows you to override the
default Port VLAN ID (PVID used in frame tags) and egress status
(VLAN-Tagged or Untagged) on each port. (Refer to "VLAN
Configuration" on page 318.)
Local VLAN Capable – This switch does not support multiple local
bridges outside of the scope of 802.1Q defined VLANs.
devices to register end stations with multicast groups. This switch does
not support GMRP; it uses the Internet Group Management Protocol
(IGMP) to provide automatic multicast filtering.
– 87 –
Page 88
C
HAPTER
4
| Basic Management Tasks
Setting the Switch’s IP Address
WEB INTERFACE
To view Bridge Extension information:
1. Click System, then Bridge Extension Configuration.
Use the System > IP Configuration page to configure an IP address for
management access over the network. An IP address is obtained via DHCP
by default for VLAN 1. To configure a static address, you need to change
the switch’s default settings to values that are compatible with your
network. You may also need to a establish a default gateway between the
switch and management stations that exist on another network segment.
You can direct the device to obtain an address from a BOOTP or DHCP
server, or manually configure a static IP address. Valid IP addresses consist
of four decimal numbers, 0 to 255, separated by periods. Anything other
than this format will not be accepted.
CLI REFERENCES
"DHCP Client" on page 929"IP Interface Commands" on page 937
PARAMETERS
These parameters are displayed:
Management VLAN – ID of the configured VLAN (1-4094). By default,
all ports on the switch are members of VLAN 1. However, the
management station can be attached to a port belonging to any VLAN,
as long as that VLAN has been assigned an IP address.
IP Address Mode – Specifies whether IP functionality is enabled via
manual configuration (Static), Dynamic Host Configuration Protocol
(DHCP), or Boot Protocol (BOOTP). If DHCP/BOOTP is enabled, IP will
– 88 –
Page 89
C
HAPTER
4
| Basic Management Tasks
Setting the Switch’s IP Address
not function until a reply has been received from the server. Requests
will be broadcast periodically by the switch for an IP address. DHCP/
BOOTP responses can include the IP address, subnet mask, and default
gateway. (Default: Static)
IP Address – Address of the VLAN to which the management station is
attached. Valid IP addresses consist of four numbers, 0 to 255,
separated by periods. (Default: 0.0.0.0)
Subnet Mask – This mask identifies the host address bits used for
routing to specific subnets. (Default: 255.0.0.00)
Gateway IP Address – IP address of the gateway router between the
switch and management stations that exist on other network
segments. (Default: 0.0.0.0)
MAC Address – The physical layer address for this switch.
DHCP Relay Option 82 – Enables relay agent information option for
sending information about its DHCP clients to the DHCP server.
DHCP provides a relay agent information option for sending information
about its DHCP clients to the DHCP server. Also known as DHCP Option
82, it allows compatible DHCP servers to use this information when
assigning IP addresses, or to set other services or policies for clients.
When Option 82 is enabled, the requesting client (or an intermediate
relay agent that has used the information fields to describe itself) can
be identified in the DHCP request packets forwarded by the switch and
in reply packets sent back from the DHCP server. Depending on the
selected frame format for the remote-id set by the ip dhcp relay
information option command, this information may specify the MAC
address or IP address of the requesting device (that is, the relay agent
in this context).
By default, the relay agent also fills in the Option 82 circuit-id field with
information indicating the local interface over which the switch received
the DHCP client request, including the stack unit, port, and VLAN ID.
If Option 82 is enabled on the switch, client information will be included
in any relayed request packet received over any VLAN according to this
criteria.
Table 7: Inserting Option 82 Information
*
DHCP Relay
DisabledEnabledCircuit-id and remote-id are added to the
EnabledEnabledCircuit-id and remote-id are added to the
DHCP Option 82Action
Option 82 packet, but the gateway
Internet address is not included.
option 82 packet, and the gateway
Internet address is included.
* DHCP Relay is enabled if a DHCP relay server is specified.
– 89 –
Page 90
C
HAPTER
4
| Basic Management Tasks
Setting the Switch’s IP Address
DHCP request packets are flooded onto the VLAN which received the
request if DHCP relay service is enabled on the switch, and the request
packet contains a valid (i.e., non-zero) relay agent address field.
DHCP reply packets received by the relay agent are handled as follows:
1. When the relay agent receives a DHCP reply packet with Option 82
information on the management VLAN, it first ensures that the
packet is destined for it, and then removes the Option 82 field from
the packet.
2. If the DHCP packet’s broadcast flag is on, the switch uses the
circuit-id information contained in the option 82 information fields
to identify the VLAN connected to the requesting client and then
broadcasts the DHCP reply packet to this VLAN. If the DHCP
packet’s broadcast flag is off, the switch uses the circuit-id
information in option 82 fields to identify the interface connected to
the requesting client and unicasts the reply packet to the client
DHCP reply packets are flooded onto the VLAN which received the reply
if DHCP relay service is enabled
apply
:
and any of the following situations
The reply packet does not contain Option 82 information.
The reply packet contains a valid relay agent address field (that is
not the address of this switch), or receives a reply packet with a
zero relay agent address through the management VLAN.
The reply packet is received on a non-management VLAN.
DHCP Relay Option 82 Policy – Specifies how to handle DHCP client
request packets which already contain Option 82 information:
Drop – Floods the request packet onto the VLAN that received the
original request instead of relaying it.
Keep – Retains the Option 82 information in the client request,
inserts the relay agent’s address, and unicasts the packet to the
DHCP server.
When the Option 82 policy is set to “keep” the original information
in the request packet, the frame type specified by the ip dhcp relay
information option command is ignored.
Replace – Replaces the Option 82 information circuit-id and
remote-id fields in the client’s request with information provided by
the relay agent itself, inserts the relay agent’s address, and unicasts
the packet to the DHCP server. (This is the default policy.)
– 90 –
Page 91
C
HAPTER
4
| Basic Management Tasks
Setting the Switch’s IP Address
DHCP Relay Server – Specifies the DHCP servers to be used by the
switch’s DHCP relay agent in order of preference.
This switch supports DHCP relay service for attached host devices. If
DHCP relay is enabled (by specifying the address for at least one DHCP
server), and this switch sees a DHCP request broadcast, it inserts its
own IP address into the request so that the DHCP server will know the
subnet where the client is located. Then, the switch forwards the packet
to the DHCP server. When the server receives the DHCP request, it
allocates a free IP address for the DHCP client from its defined scope
for the DHCP client’s subnet, and sends a DHCP response back to the
DHCP relay agent (i.e., this switch). This switch then passes the DHCP
response received from the server to the client.
You must specify the IP address for at least one DHCP server.
Otherwise, the switch’s DHCP relay agent will not forward client
requests to a DHCP server.
DHCP Relay Option 82 Sub-option Format – Disables use of sub-
type and sub-length fields in circuit-ID (CID) and remote-ID (RID) in
Option 82 information.
DHCP Relay Option 82 Remote ID – Specifies the frame format to
use for the remote-id when Option 82 information is generated by the
switch.
MAC-HEX - Includes a MAC address field for the relay agent in
hexadecimal format (that is, the MAC address of the switch’s CPU).
MAC-ACSII - Includes a MAC address field for the relay agent in
ASCII format (that is, the MAC address of the switch’s CPU).
IP-HEX - Includes the IP address field for the relay agent in
hexadecimal format (that is, the IP address of the management
interface).
IP-ASCII - Includes the IP address field for the relay agent in
ASCII format (that is, the IP address of the management interface).
String - An arbitrary string inserted into the remote identifier field.
(Range: 1-32 characters)
Restart DHCP – Requests a new IP address from the DHCP server.
WEB INTERFACE
To set a static address for the switch:
1. Click System, IP Configuration.
2. Select the VLAN through which the management station is attached,
set the IP Address Mode to “Static,” enter the IP address, subnet mask
– 91 –
Page 92
C
HAPTER
4
| Basic Management Tasks
Setting the Switch’s IP Address
and gateway. Specify the required settings for DHCP Relay Option.
Enter the DHCP Relay Servers to use in order of preference.
3. Click Apply.
Figure 6: Configuring a Static IP Address
To obtain an dynamic address through DHCP/BOOTP for the switch:
1. Click System, IP Configuration.
2. Select the VLAN through which the management station is attached,
set the IP Address Mode to “DHCP” or “BOOTP.”
3. Click Apply to save your changes.
4. Then click Restart DHCP to immediately request a new address.
Figure 7: Configuring a Dynamic IPv4 Address
– 92 –
Page 93
C
HAPTER
Configuring Support for Jumbo Frames
N
OTE
:
The switch will also broadcast a request for IP configuration settings
4
| Basic Management Tasks
on each power reset.
N
OTE
:
If you lose the management connection, make a console connection
to the switch and enter “show ip interface” to determine the new switch
address.
Renewing DCHP – DHCP may lease addresses to clients indefinitely or for
a specific period of time. If the address expires or the switch is moved to
another network segment, you will lose management access to the switch.
In this case, you can reboot the switch or submit a client request to restart
DHCP service via the CLI.
If the address assigned by DHCP is no longer functioning, you will not be
able to renew the IP settings via the web interface. You can only restart
DHCP service via the web interface if the current address is still available.
CONFIGURING SUPPORTFOR JUMBO FRAMES
Use the System > Jumbo Frames page to configure support for jumbo
frames. The switch provides more efficient throughput for large sequential
data transfers by supporting jumbo frames up to 10 KB for the Gigabit
Ethernet ports. Compared to standard Ethernet frames that run only up to
1.5 KB, using jumbo frames significantly reduces the per-packet overhead
required to process protocol encapsulation fields.
CLI REFERENCES
"System Management Commands" on page 442
USAGE GUIDELINES
To use jumbo frames, both the source and destination end nodes (such as
a computer or server) must support this feature. Also, when the connection
is operating at full duplex, all switches in the network between the two end
nodes must be able to accept the extended frame size. And for half-duplex
connections, all devices in the collision domain would need to support
jumbo frames.
PARAMETERS
The following parameters are displayed in the web interface:
Jumbo Packet Status – Configures support for jumbo frames.
(Default: Disabled)
WEB INTERFACE
To configure support for jumbo frames:
1. Click System, then Jumbo Frames.
2. Enable or disable support for jumbo frames.
– 93 –
Page 94
3. Click Apply.
Figure 8: Configuring Support for Jumbo Frames
DISPLAYING CPU UTILIZATION
Use the System > Resource > CPU Status page to display information on
CPU utilization; or to set thresholds for the CPU utilization alarm.
CLI REFERENCES
"show process cpu" on page 453
C
HAPTER
4
| Basic Management Tasks
Displaying CPU Utilization
PARAMETERS
The following parameters are displayed in the web interface:
Current CPU Utilization – CPU utilization over the past 5 seconds.
Maximum CPU Utilization – Peak CPU utilization over past 60
seconds.
Average CPU Utilization – Average CPU utilization over past 60
seconds.
CPU Peak Time – Time when CPU reached peak utilization since last
reset.
CPU Peak Duration – Duration CPU ran at peak utilization since
system boot.
CPU Utilization Rising Threshold
1
– Rising threshold for CPU
utilization alarm. (Range: 1-100%; Default: 90%)
CPU Utilization Falling Threshold
1
– Falling threshold for CPU
utilization alarm. (Range: 1-100%; Default: 70%)
WEB INTERFACE
To display CPU utilization:
1. Click System, Resource, then CPU Status.
2. Modify threshold values for the CPU utilization alarm if required.
1. Once the rising alarm threshold is exceeded, utilization must drop beneath the falling
threshold before the alarm is terminated, and then exceed the rising threshold again
before another alarm is triggered.
– 94 –
Page 95
3. Click Apply.
Figure 9: Displaying CPU Utilization
C
HAPTER
4
| Basic Management Tasks
Displaying Memory Utilization
DISPLAYING MEMORY UTILIZATION
Use the System > Resource > Memory Status page to display memory
utilization parameters; or to set thresholds for the memory utilization
alarm.
CLI REFERENCES
"show memory" on page 453
PARAMETERS
The following parameters are displayed in the web interface:
Total Size – Total amount of memory provided by the system.
Allocated Size – Amount of memory allocated to active processes.
Free Size – Amount of memory currently free for use.
Free Percent – Percentage of free memory compared to total memory.
Utilization Raising Threshold
utilization alarm. (Range: 1-100%; Default: 90%)
Utilization Falling Threshold
utilization alarm. (Range: 1-100%; Default: 90%)
1
– Rising threshold for memory
1
– Falling threshold for memory
WEB INTERFACE
To display memory utilization:
1. Click System, Resource, then Memory Status.
2. Modify threshold values for the memory utilization alarm if required.
3. Click Apply.
– 95 –
Page 96
Figure 10: Displaying Memory Utilization
MANAGING SYSTEM FILES
This section describes how to upgrade the switch operating software or
configuration files, and set the system start-up files.
C
HAPTER
4
| Basic Management Tasks
Managing System Files
AUTOMATIC
OPERATION CODE
UPGRADE
The system can be configured to automatically download an operation code
file when a file newer than the currently installed one is discovered on the
file server. After the file is transferred from the server and successfully
written to the file system, it is automatically set as the startup file, and the
switch is rebooted.
CLI REFERENCES
"upgrade opcode auto" on page 467"upgrade opcode path" on page 469"show upgrade" on page 470
COMMAND USAGE
If this feature is enabled, the switch searches the defined URL once
during the bootup sequence.
FTP (port 21) and TFTP (port 69) are both supported. Note that the
TCP/UDP port bindings cannot be modified to support servers listening
on non-standard ports.
The host portion of the upgrade file location URL must be a valid IPv4
IP address. DNS host names are not recognized. Valid IP addresses
consist of four numbers, 0 to 255, separated by periods.
The path to the directory must also be defined. If the file is stored in
the root directory for the FTP/TFTP service, then use the “/” to indicate
this (e.g., ftp://192.168.0.1/).
The file name must not be included in the upgrade file location URL.
The file name of the code stored on the remote server must be DG-
– 96 –
Page 97
C
HAPTER
4
| Basic Management Tasks
Managing System Files
FS4528P.bix (using upper case and lower case letters exactly as
indicated here).
The FTP connection is made with PASV mode enabled. PASV mode is
needed to traverse some fire walls, even if FTP traffic is not blocked.
PASV mode cannot be disabled.
The switch-based search function is case-insensitive in that it will
accept a file name in upper or lower case (i.e., the switch will accept
DG-FS4528P.BIX from the server even though dg-fs5628p.bix was
requested). However, keep in mind that the file systems of many
operating systems such as Unix and most Unix-like systems (FreeBSD,
NetBSD, OpenBSD, and most Linux distributions, etc.) are casesensitive, meaning that two files in the same directory, dg-fs5628p.bix
and DG-FS4528P.BIX are considered to be unique files. Thus, if the
upgrade file is stored as DG-FS4528P.BIX (or even dg-fs5628p.bix) on
a case-sensitive server, then the switch (requesting dg-fs5628p.bix)
will not be upgraded because the server does not recognize the
requested file name and the stored file name as being equal. A notable
exception in the list of case-sensitive Unix-like operating systems is
Mac OS X, which by default is case-insensitive. Please check the
documentation for your server’s operating system if you are unsure of
its file system’s behavior.
Note that the switch itself does not distinguish between upper and
lower-case file names, and only checks to see if the file stored on the
server is more recent than the current runtime image.
If two operation code image files are already stored on the switch’s file
system, then the non-startup image is deleted before the upgrade
image is transferred.
The automatic upgrade process will take place in the background
without impeding normal operations (data switching, etc.) of the
switch.
During the automatic search and transfer process, the administrator
cannot transfer or update another operation code image, configuration
file, public key, or HTTPS certificate (i.e., no other concurrent file
management operations are possible).
The upgrade operation code image is set as the startup image after it
has been successfully written to the file system.
The switch will send an SNMP trap and make a log entry upon all
upgrade successes and failures.
The switch will immediately restart after the upgrade file is successfully
written to the file system and set as the startup image.
– 97 –
Page 98
C
HAPTER
4
| Basic Management Tasks
Managing System Files
PARAMETERS
The following parameters are displayed in the web interface:
Automatic Opcode Upgrade – Enables the switch to search for an
upgraded operation code file during the switch bootup process.
Enabledcheck box – Defines the state of this feature.
(Default: Disabled)
Automatic Upgrade Location URL – Defines where the switch should
search for the operation code upgrade file. The last character of this
URL must be a forward slash (“/”). The DG-FS4528P.bix filename must
not be included since it is automatically appended by the switch.
(Options: ftp, tftp)
The following syntax must be observed:
tftp://host[/filedir]/
tftp:// – Defines TFTP protocol for the server connection.
host – Defines the IP address of the TFTP server. Valid IP addresses
consist of four numbers, 0 to 255, separated by periods. DNS host
names are not recognized.
filedir – Defines the directory, relative to the TFTP server root,
where the upgrade file can be found. Nested directory structures
are accepted. The directory name must be separated from the host,
and in nested directory structures, from the parent directory, with a
prepended forward slash “/”.
/ – The forward slash must be the last character of the URL.
ftp://[username[:password@]]host[/filedir]/
ftp:// – Defines FTP protocol for the server connection.
username – Defines the user name for the FTP connection. If the
user name is omitted, then “anonymous” is the assumed user name
for the connection.
password – Defines the password for the FTP connection. To
differentiate the password from the user name and host portions of
the URL, a colon (:) must precede the password, and an “at” symbol
(@), must follow the password. If the password is omitted, then “”
(an empty string) is the assumed password for the connection.
host – Defines the IP address of the FTP server. Valid IP addresses
consist of four numbers, 0 to 255, separated by periods. DNS host
names are not recognized.
filedir – Defines the directory, relative to the FTP server root, where
the upgrade file can be found. Nested directory structures are
accepted. The directory name must be separated from the host, and
in nested directory structures, from the parent directory, with a
prepended forward slash “/”.
/ – The forward slash must be the last character of the URL.
File Name – The name of the operation code file on the file TFTP or
FTP server. Remember that this name should not be included in the
– 98 –
Page 99
C
HAPTER
4
| Basic Management Tasks
Managing System Files
upgrade path of the preceding item since it is automatically appended
by the switch.
EXAMPLES
The following examples demonstrate the URL syntax for a TFTP server
at IP address 192.168.0.1 with the operation code image stored in
various locations:
tftp://192.168.0.1/
The image file is in the TFTP root directory.
tftp://192.168.0.1/switch-opcode/
The image file is in the “switch-opcode” directory, relative to the
TFTP root.
tftp://192.168.0.1/switches/opcode/
The image file is in the “opcode” directory, which is within the
“switches” parent directory, relative to the TFTP root.
The following examples demonstrate the URL syntax for an FTP server
at IP address 192.168.0.1 with various user name, password and file
location options presented:
ftp://192.168.0.1/
The user name and password are empty, so “anonymous” will be
the user name and the password will be blank. The image file is in
the FTP root directory.
ftp://switches:upgrade@192.168.0.1/
The user name is “switches” and the password is “upgrade”. The
image file is in the FTP root.
The user name is “switches” and the password is “upgrade”. The
image file is in the “opcode” directory, which is within the “switches”
parent directory, relative to the FTP root.
WEB INTERFACE
To automatically download an operation code file from a file server:
1. Click System, File Management, then Automatic Operation Code
Upgrade.
2. Check the Automatic Opcode Upgrade box, enter the URL of the FTP or
TFTP server, the path and directory containing the operation code.
3. Click Apply.
– 99 –
Page 100
C
HAPTER
Figure 11: Configuring Automatic Code Upgrade
4
| Basic Management Tasks
Managing System Files
If a new image is found at the specified location, the following type of
messages will be displayed on the console interface during bootup.
.
.
.
Automatic Upgrade is looking for a new image
New image detected: current version 1.1.1.0; new version 1.1.1.2
Image upgrade in progress
The switch will restart after upgrade succeeds
Downloading new image
Flash programming started
Flash programming completed
The switch will now restart
.
.
.
COPYING OPERATION
CODEVIA FTP OR
TFTP
Use the System > File (Copy) page to upload/download firmware or
configuration settings using FTP or TFTP. By backing up a file to an FTP or
TFTP server or management station, that file can later be downloaded to
the switch to restore operation. Specify the method of file transfer, along
with the file type and file names as required.
You can also set the switch to use new firmware or configuration settings
without overwriting the current version. Just download the file using a
different name from the current version, and then set the new file as the
startup file.
N
OTE
:
You can also download and upload files to the switch using HTTP, see
"Copying Files Using HTTP" on page 104.
CLI REFERENCES
"copy" on page 462"dir" on page 466
PARAMETERS
The following parameters are displayed in the web interface:
File Transfer Method – The firmware copy operation includes these
options:
file to file – Copies a file within the switch directory, assigning it a
new name.
– 100 –
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.