D-Link DXS-3600 Reference Manual

Page 1
1
Page 2
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Information in this document is subject to change without notice. Reproduction of this document in any manner, without the written permission of the D-Link Corpor ati on, is strictly forbidden.
Other trademarks and trade names may be used in this document to refer to either as the entities claiming the marks and the names or their products. D-Link Corporation disclaims any proprietary interest in trademarks and trade names other than its own.
© 2013 D-Link Corporation. All rights reserved. October, 2013. P/N 651XS3632010G
ii
Page 3
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Table of Contents
1. Introduction ................................................................................................................................................................... 1
Audience ............................................................................................................................................................................ 1
Other Documentation ......................................................................................................................................................... 1
Conventions ....................................................................................................................................................................... 1
Notes, Notices, and Caut io ns ............................................................................................................................................ 1
2. Web-based Switch Configuration ................................................................................................................................ 3
Management Options ......................................................................................................................................................... 3
Connecting using the Web User Interface ......................................................................................................................... 3
Logging onto the Web Manager ........................................................................................................................................ 3
Web User Interface (Web UI) ............................................................................................................................................. 4
Areas of the User Interface ........................................................................................................................................... 4
3. System ............................................................................................................................................................................ 6
Device Information ............................................................................................................................................................. 6
Device Information ........................................................................................................................................................ 6
Temperature Status ...................................................................................................................................................... 7
CPU Status ................................................................................................................................................................... 8
System Log Entries ....................................................................................................................................................... 9
Fan Status................................................................................................................................................................... 11
Flash, SD Card, and Memory Status .......................................................................................................................... 12
Port Configuration ............................................................................................................................................................ 13
Port Settings ............................................................................................................................................................... 13
Port Status .................................................................................................................................................................. 14
Port Auto Negotiation .................................................................................................................................................. 15
Jumbo Frame .............................................................................................................................................................. 16
System Log ...................................................................................................................................................................... 16
System Log Settings ................................................................................................................................................... 16
System Log Discriminator Settings ............................................................................................................................. 18
System Log Server Settings ....................................................................................................................................... 19
System Log ................................................................................................................................................................. 20
System Attack Log ...................................................................................................................................................... 20
Time Profile ...................................................................................................................................................................... 20
4. Management ................................................................................................................................................................ 22
User Account Settings ..................................................................................................................................................... 22
5. Layer 2 Features .......................................................................................................................................................... 24
FDB .................................................................................................................................................................................. 24
Static FDB ................................................................................................................................................................... 24
MAC Address Table Settings...................................................................................................................................... 25
MAC Address Table .................................................................................................................................................... 26
MAC Notificat io n ......................................................................................................................................................... 27
VLAN ................................................................................................................................................................................ 28
802.1Q VLAN .............................................................................................................................................................. 28
802.1v Protocol VLAN ................................................................................................................................................ 29
GVRP .......................................................................................................................................................................... 30
MAC VLAN.................................................................................................................................................................. 34
iii
Page 4
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
VLAN Interface ........................................................................................................................................................... 35
Subnet VLAN .............................................................................................................................................................. 39
Private VLAN .............................................................................................................................................................. 40
Spanning Tree ................................................................................................................................................................. 41
STP Global Settings ................................................................................................................................................... 41
STP Port Settings ....................................................................................................................................................... 43
MST Configuration Identification ................................................................................................................................ 45
STP Instance .............................................................................................................................................................. 46
MSTP Port Information ............................................................................................................................................... 46
Link Aggregation .............................................................................................................................................................. 46
L2 Protocol Tunnel ........................................................................................................................................................... 49
L2 Multicast Control ......................................................................................................................................................... 51
Multicast Filtering ........................................................................................................................................................ 51
6. Layer 3 Features .......................................................................................................................................................... 52
ARP .................................................................................................................................................................................. 52
ARP Aging Time ......................................................................................................................................................... 52
Static ARP................................................................................................................................................................... 52
Proxy ARP .................................................................................................................................................................. 53
ARP Table................................................................................................................................................................... 53
Gratuitous ARP ................................................................................................................................................................ 54
IPv4 Interface ................................................................................................................................................................... 55
IPv4 Static/Default Route ................................................................................................................................................. 56
IPv4 Route Table ............................................................................................................................................................. 57
IPv6 Interface ................................................................................................................................................................... 58
IPv6 Static/Default Route ................................................................................................................................................. 59
IPv6 Route Table ............................................................................................................................................................. 60
7. Quality of Service (QoS) ............................................................................................................................................. 62
Basic Settings .................................................................................................................................................................. 62
Port Default CoS ......................................................................................................................................................... 62
Port Scheduler Method ............................................................................................................................................... 62
Queue Settings ........................................................................................................................................................... 64
CoS to Queue Mapping .............................................................................................................................................. 65
Port Rate Limiting ....................................................................................................................................................... 65
Queue Rate Limiting ................................................................................................................................................... 66
Advanced Settings ........................................................................................................................................................... 67
DSCP Mutation Ma p ................................................................................................................................................... 67
Port Trust State and Mutation Binding ........................................................................................................................ 68
DSCP CoS Mapping ................................................................................................................................................... 69
CoS Color Mapping .................................................................................................................................................... 70
DSCP Color Mapping ................................................................................................................................................. 70
Class Map ................................................................................................................................................................... 71
Aggregate Policer ....................................................................................................................................................... 73
Policy Map .................................................................................................................................................................. 76
Policy Binding ............................................................................................................................................................. 77
8. Access Control List (ACL) .......................................................................................................................................... 78
ACL Access List ............................................................................................................................................................... 78
Standard IP ACL ......................................................................................................................................................... 78
iv
Page 5
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Extend IP ACL ............................................................................................................................................................ 81
Standard IPv6 ACL ................................................................................................................................................... 101
Extend IPv6 ACL ...................................................................................................................................................... 105
Extend MAC ACL ...................................................................................................................................................... 117
Expert ACL................................................................................................................................................................ 120
ACL Interface Access Group ......................................................................................................................................... 147
ACL VLAN Access Map ................................................................................................................................................. 148
ACL VLAN Filter ............................................................................................................................................................. 149
9. Security ...................................................................................................................................................................... 150
Trusted Host................................................................................................................................................................... 150
10. Monitoring .................................................................................................................................................................. 151
Mirror Settings ................................................................................................................................................................ 151
Traffic ............................................................................................................................................................................. 152
Traffic Monitoring by Direction .................................................................................................................................. 152
Traffic Monitoring by Type ........................................................................................................................................ 153
Traffic Monitoring by Size ......................................................................................................................................... 154
Traffic Monitoring by Error ........................................................................................................................................ 155
11. Save and Tools .......................................................................................................................................................... 156
Save Configuration ........................................................................................................................................................ 156
Firmware Upgrade & Backup ......................................................................................................................................... 156
Firmware Upgrade from HTTP ................................................................................................................................. 156
Firmware Upgrade from TFTP .................................................................................................................................. 157
Firmware Backup to HTTP ....................................................................................................................................... 157
Firmware Backup to TFTP ........................................................................................................................................ 158
Configuration Restore & Backup ................................................................................................................................... 158
Configuration Restore from HTTP ............................................................................................................................ 158
Configuration Restore from TFTP ............................................................................................................................ 159
Configuration Backup to HTTP ................................................................................................................................. 159
Configuration Backup to TFTP ................................................................................................................................. 160
Log Backup .................................................................................................................................................................... 160
Log Backup to HTTP ................................................................................................................................................ 160
Log Backup to TFTP ................................................................................................................................................. 161
Reset .............................................................................................................................................................................. 161
Reboot System .............................................................................................................................................................. 162
Appendix A - Password Recovery Procedure ................................................................................................................ 163
Appendix B - System Log Entries ................................................................................................................................... 165
Appendix C - Trap Entries ................................................................................................................................................ 198
Appendix D - RADIUS Attributes Assignment ............................................................................................................... 203
Appendix E - IETF RADIUS Attributes Suppor t .............................................................................................................. 206
v
Page 6
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
1. Introduction
This manual’s command descriptions are based on the software release 2.00. The commands listed here are the subset of commands that are supported by the DXS-3600 Series switch.
Audience
This reference manual is intended for network administrators and other IT networking professionals responsible for managing the switch by using the Web User Interface (Web UI). The Web UI is the secondary management interface to the DXS-3600 Series switch, which will be generally be referred to simply as the “switch” within this manual. This manual is written in a way that assumes that you already have the experience and knowledge of Ethernet and modern networking principles for Local Area Networks.
Other Documentation
The documents below are a further source of information in regards to configuring and troubleshooting the switch. All the documents are available either from the CD, bundled with this switch, or from the D­Link website. Other documents related to this switch are:
DXS-3600 Series Hardware Installation Guide
DXS-3600 Series CLI Reference Guide
Conventions
Convention Description
Boldface Font
Initial capital letter Indicates a window name. Names of keys on the keyboard have initial
Menu Name > Menu Option Indicates the menu structure. Device > Port > Port Properties means
Blue Courier Font
Indicates a button, a toolbar icon, menu, or menu item. For example: Open the File menu and choose Cancel. Used for emphasis. May also indicate system messages or prompts appearing on screen. For example: You have mail. Bold font is also used to represent filenames, program names and commands. For example: use the copy command.
capitals. For example: Click Enter.
the Port Properties menu option under the Port menu option that is located under the Device menu.
This convention is used to represent an example of a screen console display including example entries of CLI command input with the corresponding output.
Notes, Notices, and Cautions
Below are examples of the three types of indicators used in this manual. When administering your switch using the information in this document, you should pay special attention to these in dic ators . Eac h example below provides an explanatory remark regarding each type of indicator.
1
Page 7
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
NOTE: A note indicates important information that helps you make better use of your device.
NOTICE: A notice indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
CAUTION: A caution indicates a potential for property damage, personal injury, or death.
2
Page 8
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
2. Web-based Switch Configuration
Management Options Connecting using the Web User Interface Logging onto the Web Manager Web User Interface (Web UI)
Management Options
This switch provides multiple access platforms that can be used to configure, manage and monitor networking features available on this switch. Currently there are three management platforms available and they are described below.
The Command Line Interface (CLI) through the Serial Port or remote Telnet
This switch can be managed, out-of-band, by using the console port on the front panel of the switch. Alternatively, the switch can also be managed, in-band, by using a Telnet connection to any of the LAN ports on this switch. The command line interface provides complete access to all switch management features.
SNMP-based Management
The switch can be managed with an SNMP-compatible console program. The switch supports SNMP version 1.0, version 2.0 and version 3.0. The SNMP agent decodes the incoming SNMP messages and responds to requests with MIB objects stored in the database. The SNMP agent updates the MIB objects to generate statistics and counters.
Web-based Management Interface
After successfully installing the switch, the user can configure the switch, monitor the LED panel, and display statistics graphically using a Web browser, such as Microsoft later), Mozilla Firefox (version 3 and later), Safari (version 5 and later), Google Chrome (version 5 and later), Opera (version 12 and later), or Netscape (version 8 and later).
®
Internet Explorer (version 6 and
Connecting using the Web User Interface
Most software functions of the DXS-3600 Series switches can be managed, configured and monitored via the embedded web-based (HTML) interface. Manage the switch from remote stations anywhere on the network through a standard web browser. The web browser acts as a universal access tool and can communicate directly with the switch using the HTTP or HTTPS protocol.
NOTE: The Command Line Interface (CLI) provides the functionality of managing, configuring, and monitoring all of the software features that are available on this switch.
Logging onto the Web Manager
To access the Web User Interface, simply open a standard web browser on the management PC and enter the switch’s default IP address into the address bar of the browser and press the Enter key.
3
Page 9
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
NOTE: The default IP address of this switch is 10.90.90.90, with a subnet mask of 255.0.0.0.
Figure 2-1 Displays entering the IP address in Internet Explorer
This will open the user authenticatio n wind o w, as seen bel o w.
Figure 2-2 User Authentication Window
By default, there is no username or password configured on this switch. When connecting to the Web UI for the first time simply leave the User Name and Password fields blank and click the Login button.
Web User Interface (Web UI)
The user interface provides access to various switch configuration and management windows, to view performance statistics, and permits you to graphically monitor the system status.
Areas of the User Interface
The figure below shows the user interface. Three distinct areas that divide the user interface, as described in the table.
4
Page 10
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
AREA 1
AREA 2
AREA 3
Figure 2-3 Main Web UI Window
Area Number Description
AREA 1
In this area, a folder tree layout is displayed of functions that can be configured using the Web UI. Open folders and click the hyperlinked menu buttons to access each individual page for configuration. The DXS-3600-32S link is the default page that will display basic monitoring settings for this switch.
AREA 2
In this area, a graphical near real-time image of the front panel of the switch is displayed. Some management functions, like Save and Tools are accessible here.
AREA 3
In this area, the switch’s configuration page can be found, based on the selection made in Area 1.
5
Page 11
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
3. System
Device Information Port Configuration System Log Time Profile
Device Information
On this page, the Device Information, Temperature status, CPU, Usage status, System Log, Fan status, and Memory usage status are displayed. It appears automatically when you log on to the switch. To return to the Device Information window after viewing other windows, click the DXS-3600-32S link.
Device Information
In the Device Information section, the user can view a list of basic information regarding the switch.
Figure 3-1 Device Information Window
6
Page 12
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 3-2 Device Information (Highlight) Window
In the Device Information section, the following display parameters are available:
Parameter Description
IP Address Subnet Mask Gateway
MAC Address Firmware Version Boot Code Version Hardware Version Serial Number System Up Time
Temperature Status
In the Temperature section, the user can view a real-time display of the switch’s internal temperature. The temperature of the switch is mainly influenced by two factors: (1) the environment, and (2) the internal air-flow of the switch. In the DXS-360 0 Seri es Har dware Ins tallation Guide, there are some guidelines that can ass is t t he us er with t he i ns tal la tio n of this s witc h i n a t emperature friendl y environment. The fan modules, installed in this switch, have temperature sensors built-in that automatically controls the air-flow inside the switch.
Here the IP address of the switch’s main interface is displayed. Here the Subnet Mask of the switch’s main interface is displayed. Here the Gateway IP address of the switch’s main interface is
displayed. Here the MAC address of the switch is displayed. Here the Firmware version of the switch is displayed. Here the Boot Code of the switch is displayed. Here the Hardware version of the switch is displayed. Here the Serial number of the switch is displayed. Here the System’s up time is displayed.
7
Page 13
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 3-3 Temperature Status Window
In the Temperature section, the following display parameters are available:
Parameter Description
Percentage Display
Temperature
Warning Section
CPU Status
In the CPU section, the user can view a real-time display of the switch’s CPU usage. There are a number of factors that can influence a depleted CPU usage. One of those factors is network broadcasts. In the DXS-3600 Series CLI Reference Guide there is an abundance of features that can be enabled to prevent this problem from occurring.
In this graphic, the reading is divided into percentage sections. The green area is known as the ‘safe’ area. This area ranges from 0% to 60%. This is the optimum temperature range recommended for this switch.
Below the percentage gauge needle, the accurate temperature reading, for this switch, is displayed in degrees Celsius.
In this graphic, the reading is divided into percentage sections. The red area is known as the ‘warning’ area. This area ranges from 60% to 100%. It is recommended not to allow the switch to run this hot, to avoid component damage.
8
Page 14
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 3-4 CPU Status Window
In the CPU section, the following display parameters are available:
Parameter Description
Percentage Display
Average
Percentage Bar
System Log Entries
In the System Log section, the user can view a list of System log entries, generated by the switch, when certain events have occurred.
In this graphic, the reading is divided into percentage sections. This area ranges from 0% to 100%.
Below the CPU percentage line chart, we find an accurate display of the average CPU usage percentage.
In this graphic, an accurate reading of the real-time CPU usage percentage is displayed.
9
Page 15
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 3-5 System Log Window
In the System Log section, the following display parameters are available:
Parameter Description
Entry Number
Every log entry has a specific entry number, generated when the log entry was added to the System log entry display. Here the System log entry number is displayed in reverse order.
Time Log Text
Here the specific date and time of the log entry is displayed. Here the log entry description is displayed.
Click the More button to view a larger display of the complete System Log section.
After clicking the More button, the following wi ndo w will appear :
10
Page 16
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 3-6 System Log (More) Window
Click the Close button to exit the larger display.
Fan Status
In the Fan section, the user can view a real-time display of the switch’s fan(s) status. A maximum of 3 fans can be installed in this switch. In this real-time graphic, we observe the status and speed of the three fans installed.
Figure 3-7 Fan Status Window
11
Page 17
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
In the Fan section, the following display parameters are available:
Parameter Description
Fan Number
RPM Graph
RPM Reading
At the top of this graphic, the list of installed fans is displayed. After clicking on any specific fan icon, the real-time RPM gauge of that fan will be displayed. Also after clicking on a fan icon, the Active Fan display parameter will change accordingly.
In this graph (gauge display), we observe the RPM speed at which the selected fan is working at.
At the bottom of the graphics, we observe the accurate real-time display of the RPM value for a specific fan.
Flash, SD Card, and Memory Status
In this section, the user can view a real-time graphic that represents the memory usage for the Flash, SD Card, and RAM Memory.
In this section, the following display parameters are available:
Parameter Description
Used Flash
SD Card
Memory
Figure 3-8 Flash, SD Card, and Memory Status Window
This displays the color that represents the used memory allocation. This displays the used and unused space of the Flash. The more
accurate percentage display can be found below the graphic. This displays the used and unused space of the SD Card. The more
accurate percentage display can be found below the graphic. This displays the used and unused space of the Memory. The more
accurate percentage display can be found below the graphic.
12
Page 18
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Port Configuration
Port Settings
On this page, users can view and configure the switch’s port settings. To view the following wind o w, clic k
System > Port Configuration > Port Settings, as shown below:
Figure 3-9 Port Settings Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Medium Type Select the port medium type here. Options to choose from are RJ45
State MDIX
Select the appropriate port range used for the configuration here.
and SFP. Note: Selecting the SFP option, includes the use of SFP+ transceivers
for 10G connectivity. Select this option to enable or disabled the physical port here. Select the Medium Dependent Interface Crossover (MDIX) option
here. Options to choose from are Auto, Normal, and Cross. Auto - Select this option for auto-sensing of the optimal type of
cabling. Normal - Select this option for normal cabling. If this option is selected,
the port is in the MDI mode and can be connected to a PC’s NIC using a straight-through cable or a port (in the MDI mode) on another switch through a cross-over cable.
Cross - Select this option for cross cabling. If this option is selected, the port is in the MDIX mode and can be connected to a port (in the MDI mode) on another switch through a straight cable.
13
Page 19
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Flow Control Select to either turn flow control On or Off here. Ports configured for
full-duplex use 802.3x flow control, half-duplex ports use back­pressure flow control, and Auto ports use an automatic selection of the two.
Duplex Select the duplex mode used here. Options to choose from are Auto,
Half, and Full.
Speed
Capability Advertised When the Speed is set to Auto, these capabilities are advertised
Description
Select the port speed option here. This option will manually force the connected on the selected port to only connect at the speed specified here. Options to choose from are Auto, 10M, 100M, 1000M, 1000M Master, 1000M Slave, 10G, 10G Master, 10G Slave, and 40G. The switch allows users to configure two types of gigabit connections; 1000M Master and 1000M Slave which refer to connections running a 1000BASE-T cable for connection between the switch port and another device capable of a gigabit connection. The master setting (1000M Master) will allow the port to advertise capabilities related to duplex, speed and physical layer type. The master setting will also determine the master and slave relationship between the two connected physical layers. This relationship is necessary for establishing the timing control between the two physical layers. The timing control is set on a master physical layer by a local source. The slave setting (1000M Slave) uses loop timing, where the timing comes from a data stream received from the master. If one connection is set for 1000M Master, the other side of the connection must be set for 1000M Slave. Any other configuration will result in a link down status for both ports.
Note: The 10M and 100M speed options are only applicable when the DXS-3600-EM-8T expansion module is used.
during auto-negotiation. Enter a 64 characters description for the corresponding port here.
Click the Apply button to accept the changes made.
Port Status
On this page, users can view the switch’s physical port status and settings. To view the following window, click System > Port Configuration > Port Status, as shown below:
14
Page 20
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 3-10 Port Status Window
Port Auto Negotiation
On this page, users can view detailed port auto-negotiation information. To view the following window, click System > Port Configuration > Port Auto Negotiation, as shown below:
Figure 3-11 Port Auto Negotiation Window
15
Page 21
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Jumbo Frame
On this page, users can view and configure the Jumbo Frame size and settings. The switch supports jumbo frames. Jumbo frames are Ethernet frames with more than 1,518 bytes of payload. The switch supports jumbo frames with a maximum frame size of up to 12288 bytes. To view the following window, click System > Port Configuration > Jumbo Frame, as shown below:
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Maximum Receive Frame Size
Click the Apply button to accept the changes made.
System Log
System Log Settings
On this page, users can view and configure the system’s log settings. To view the following window, click System > System Log > System Log Settings, as shown below:
Figure 3-12 Jumbo Frame Window
Select the appropriate port range used for the configuration here. Enter the maximum receive frame size value here. This value must be
between 64 and 12288 bytes. By default, this value is 1536 bytes.
16
Page 22
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
and 65535 seconds. By default, this value is 300 seconds. Tick the
Figure 3-13 System Log Settings Window
The fields that can be configured for Global State are described below:
Parameter Description
Source Interface State
Select this option to enable or disable the source interface’s global state.
Type
Select the type of interface that will be used. Options to choose from are Loopback, Mgmt, and VLAN.
Interface ID
Enter the interface’s ID used here. When selecting the Loopback option as the Type, enter the
interface’s ID used here. This value must be between 1 and 8. When selecting the Mgmt option as the Type, enter the interface’s ID
used here. This value can only be 0 as there is only one management interface.
When selecting the VLAN option as the Type, enter the interface’s ID used here. This value must be between 1 and 4094.
Click the Apply button to accept the changes made.
The fields that can be configured for Buffer Log Settings are described below:
Parameter Description
Buffer Log State
Select whether the enable or disable the buffer log’s global state here. Options to choose from are Enable, Disabled, and Default. When selecting the Default option, the buffer log’s global state will follow the default behavior.
Severity
Select the severity value of the type of information that will be logged. Options to choose from are 0 (Emergencies), 1 (Alerts), 2 (Critical),
3 (Errors), 4 (Warnings), 5 (Notifications), 6 (Informational), and 7 (Debugging).
Discriminator Name
Enter the discriminator name used here. This name can be up to 15 characters long.
Write Delay
Enter the log’s write delay value here. This value must be between 0
17
Page 23
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Infinite option, to disable the write delay feature.
Click the Apply button to accept the changes made.
The fields that can be configured for Console Log Settings are described below:
Parameter Description
Console Log State
Severity
Discriminator Name
Click the Apply button to accept the changes made.
The fields that can be configured for SMTP Log Settings are described below:
Parameter Description
SMTP Log State Severity
Discriminator Name
Select whether the enable or disable the console log’s global state here.
Select the severity value of the type of information that will be logged. Options to choose from are 0 (Emergencies), 1 (Alerts), 2 (Critical),
3 (Errors), 4 (Warnings), 5 (Notifications), 6 (Informational), and 7 (Debugging).
Enter the discriminator name used here. This name can be up to 15 characters long.
Select whether the enable or disable the SMTP log’s global state here. Select the severity value of the type of information that will be logged.
Options to choose from are 0 (Emergencies), 1 (Alerts), 2 (Critical),
3 (Errors), 4 (Warnings), 5 (Notifications), 6 (Informational), and 7 (Debugging).
Enter the discriminator name used here. This name can be up to 15 characters long.
Click the Apply button to accept the changes made.
System Log Discriminator Settings
On this page, users can view and configure the system log’s discriminator settings. To view the following window, click System > System Log > System Log Discriminator Settings, as
shown below:
18
Page 24
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 3-14 System Log Discriminator Settings Window
The fields that can be configured are described below:
Parameter Description
Discriminator
Facility
Severity
Click the Apply button to accept the changes made. Click the Delete button to delete the specified entry.
Enter the discriminator name here. This name can be up to 15 characters long.
Select the facility’s behavior option and the type of facility that will be associated with the selected behavior here. Behavior options to choose from are Drops and Includes.
Select the severity behavior option and the value of the type of information that will be logged. Behavior options to choose from are
Drops and Includes. Severity value options to choose from are 0 (Emergencies), 1 (Alerts), 2 (Critical), 3 (Errors), 4 (Warnings), 5 (Notifications), 6 (Informational), and 7 (Debugging).
System Log Server Settings
On this page, users can view and configure system log’s server settings. To view the following window, click System > System Log > System Log Server Settings, as shown
below:
The fields that can be configured are described below:
Parameter Description
Host IPv4 Address Host IPv6 Address UDP Port
Severity
Facility Discriminator Name
Figure 3-15 System Log Server Settings Window
Enter the system log server’s IPv4 address here. Enter the system log server’s IPv6 address here. Enter the system log server’s UDP port number here. This value must
be between 1024 and 65535. By default, this value is 514. Select the severity value of the type of information that will be logged.
Options to choose from are 0 (Emergencies), 1 (Alerts), 2 (Critical),
3 (Errors), 4 (Warnings), 5 (Notifications), 6 (Informational), and 7 (Debugging).
Select the facility value here. Options to choose from are 0 to 23. Enter the discriminator name here. This name can be up to 15
19
Page 25
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
characters long.
VRF Name
Click the Apply button to accept the changes made. Click the Delete button to delete the specified entry.
System Log
On this page, users can view and clear the system log. To view the following window, click System > System Log > System Log, as shown below:
Enter the VRF name, that will be associated wit h this c onf iguration, here.
Figure 3-16 System Log Window
Click the Clear Log button to clear the system log entries displayed in the table.
System Attack Log
On this page, users can view and clear the system attack log. To view the following window, click System > System Log > System Attack Log, as shown below:
Click the Clear Attack Log button to clear the system attack log entries displayed in the table.
Figure 3-17 System Attack Log Window
Time Profile
On this page, users can view and configure the time profile settings. To view the following window, click System > Time Profile, as shown below:
20
Page 26
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 3-18 Time Profile Window
The fields that can be configured are described below:
Parameter Description
Range Name
Enter the time profile’s range name here. This name can be up to 32 characters long.
From Week ~ To Week
Select the starting and ending days of the week that will be used for this time profile. Tick the Daily option to use this time profile for every day of the week. Tick the End Week Day option to use this time profile from the starting day of the week until the end of the week, which is Sunday.
From Time ~ To Time
Select the starting and ending time of the day that will be used for this time profile. The first drop-down menu selects the hour and the second drop-down menu selects the minute.
Click the Apply button to accept the changes made. Click the Find button to locate a specific entry based on the information entered. Click the Delet e Per iod ic b utton to delete the periodic entry. Click the Delete button to delete the specified entry.
21
Page 27
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
4. Management
User Account Settings
User Account Settings
On this page, user accounts can be created and configured. Also on this page active user account sessions can be viewed.
There are several configuration options available in the Web User Interface (Web UI). The set of configuration options avai la ble to the user dep ends on t he accou nt’s Privilege Level.
NOTE: By default, there is no user account created on this switch.
To view the following window, click Management > User Account Settings, as shown below:
After selecting the User Management Settings tab, the following page will appear.
Figure 4-1 User Management Settings Window
The fields that can be configured are described below:
Parameter Description
User Name
Privilege
Password Type
Enter the user account name here. This name can be up to 32 characters long.
Enter the privilege level for this account here. This value must be between 1 and 15.
Select the password type for this user account here. Options to choose from are None, Simple, and Cipher.
Password After selecting either Simple or Cipher as the password type, enter
Click the Apply button to accept the changes made. Click the Delete button to delete the specified user account entry.
After selecting the Session Table tab, the following page will appear.
the password for this user account here.
22
Page 28
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 4-2 Session Table Window
On this page, a list of active user account session will be displayed.
23
Page 29
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
5. Layer 2 Features
FDB VLAN Spanning Tree Link Aggregation L2 Protocol Tunnel L2 Multicast Control
FDB
Static FDB
Unicast Static FDB
On this page, users can view and configure the static unicast forwarding settings on the switch. To view the following window, click L2 Features > FDB > Static FDB > Unicast Static FDB, as shown below:
Figure 5-1 Unicast Static FDB Window
The fields that can be configured are described below:
Parameter Description
Port/Drop
Port Number After selecting the Port option, select the port number used here. VLAN ID
MAC Address
Click the Apply button to accept the changes made. Click the Delet e All button to delete all the entries found in the display table. Click the Delete button to delete the specified entry.
Allows the selection of the port number on which the MAC address entered resides This option could also drop the MAC address from the unicast static FDB. When selecting Port, select the port number.
Enter the VLAN ID on which the associated unicast MAC address resides.
Enter the MAC address to which packets will be statically forwarded. This must be a unicast MAC address.
Multicast Static FDB
On this page, users can view and configure the multicast static FDB settings. To view the following window, click L2 Features > FDB > Static FDB > Multicast Static FDB, as shown below:
24
Page 30
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 5-2 Multicast Static FDB Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port VLAN ID
MAC Address
Click the Apply button to accept the changes made. Click the Delete All button to remove all the entries. Click the Delete button to remove the specific entry.
Select the range of ports that will be used for this configuration here. Enter the VLAN ID of the VLAN the corresponding MAC address
belongs to. Enter the static destination MAC address of the multicast packets. This
must be a multicast MAC address. The format of the destination MAC address is 01-XX-XX-XX-XX-XX.
MAC Address Table Settings
On this page, users can view and configure the MAC address table’s global settings. To view the following window, click L2 Features > FDB > MAC Address Table Settings, as shown below:
Figure 5-3 MAC Address Table Settings (Global Settings) Window
The fields that can be configured are described below:
Parameter Description
Aging Time
Aging Destination Hit
Click the Apply button to accept the changes made.
After selecting the MAC Address Learning tab option, at the top of the page, the following page will be available.
Enter the MAC address table’s aging time value here. This value must be between 10 and 1000000 seconds. Entering 0 will disable MAC address aging. By default, this value is 300 seconds.
Select to enable or disable the aging destination hit function.
25
Page 31
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 5-4 MAC Address Table Settings (MAC Address Learning) Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port State
Click the Apply button to accept the changes made.
MAC Address Table
On this page, users can view the entries listed in the MAC address table. To view the following window, click L2 Features > FDB > MAC Address Table, as shown below:
Select the range of ports that will be used for this configuration here. Select to enable or disable the MAC address learning function on the
ports specified here.
The fields that can be configured are described below:
Parameter Description
Figure 5-5 MAC Address Table Window
26
Page 32
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
notification. This value must be between 0 and 500. By default, this
Port VLAN ID MAC Address
Click the Apply button to accept the changes made. Click the Clear Dynamic by Port button to clear the dynamic MAC address listed on the corresponding
port. Click the Clear Dynamic by VLAN button to clear the dynamic MAC address listed on the corresponding
VLAN. Click the Clear Dynamic by MAC button to clear the dynamic MAC address entered. Click the Find button to locate a specific entry based on the information entered. Click the C l e a r Al l button to clear all dynamic MAC addresses. Click the V iew All button to display all the MAC addresses recorded in the MAC address table.
MAC Notification
On this page, users can view and configure MAC notification. To view the following window, click L2 Features > FDB > MAC Notification, as shown below:
Select the port that will be used for this configuration here. Enter the VLAN ID that will be used for this configuration here. Enter the MAC address that will be used for this configuration here.
Figure 5-6 MAC Notification (MAC Notification Settings) Window
The fields that can be configured are described below:
Parameter Description
MAC Address Notification Interval
History Size
Select to enable or disable MAC notification globally on the switch Enter the time value between notifications. This val ue must be
between 1 and 2147483647 seconds. B y defau lt, this va lue is 1 second.
Enter the maximum number of entries listed in the history log used for
27
Page 33
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
value is 1.
MAC Notification Trap State From Port ~ To Port Added Trap Removed Trap
Click the Apply button to accept the changes made for each individual section.
After selecting the MAC Notification History tab, at the top of the page, the following page will be available.
Figure 5-7 MAC Notification (MAC Notification History) Window
On this page, a list of MAC notification messages will be displayed.
Select to enable or disable the MAC notification trap state. Select the range of ports that will be used for this configuration here. Select to enable or disable the added trap for the port(s) selected. Select to enable or disable the removed trap for the port(s) selected.
VLAN
802.1Q VLAN
On this page, users can view and configure the VLAN settings on this switch. To view the following window, click L2 Features > VLAN > 802.1Q VLAN, as shown below:
The fields that can be configured are described below:
Parameter Description
VLAN ID List
Figure 5-8 802.1Q VLAN Window
Enter the VLAN ID list that will be created here.
VLAN ID
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry. Click the Find button to locate a specific entry based on the information entered. Click the View All button to locate all the entries.
Enter the VLAN ID that will be displayed here.
28
Page 34
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Click the Edit button to re-configure the specific entry.
802.1v Protocol VLAN
Protocol VLAN Profile
On this page, users can view and configure 802.1v protocol VLAN profiles. The 802.1v Protocol VLAN Group Settings support multiple VLANs for each protocol and allows the user to configure the untagged ports of different protocols on the same physical port. For example, it allows the user to configure an
802.1Q and 802.1v untagged port on the same physical port. To view the following window, click L2
Features > VLAN > 802.1v Protocol VLAN > Protocol VLAN Profile, as shown below:
Figure 5-9 Protocol VLAN Profile Window
The fields that can be configured are described below:
Parameter Description
Profile ID
Frame Type
Ether Type
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
Enter the 802.1v protocol VLAN profile ID here. This value must be between 1 and 16.
Select the frame type option here. This function maps packets to protocol-defined VLANs by examining the type octet within the packet header to discover the type of protocol associated with it. Options to choose from are Ethernet 2, SNAP, and LLC.
Enter the Ethernet type value for the group here. The protocol value is used to identify a protocol of the frame type specified. The form of the input is 0x0 to 0xFFFF. Depending on the frame type, the octet string will have one of the following values:
For Ethernet 2, this is a 16-bit (2-octet) hex value. F or example, IPv4 is 0800, IPv6 is 86DD, ARP is 0806, etc…
For IEEE802.3 SNAP, this is a 16-bit (2-oc tet) hex val u e.
For IEEE802.3 LLC, this is a 2-octet IEEE 802.2 Link Service
Access Point (LSAP) pair. The first octet is for Destination Service Access Point (DSAP) and the second octet is for Source.
Protocol VLAN Profile Interface
On this page, users can view and configure the protocol VLAN profile’s interface settings. To view the following window, click L2 Features > VLAN > 802.1v Protoco l VLAN > Protocol VLAN Profile Interface, as shown below:
29
Page 35
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 5-10 Protocol VLAN Profile Interface Window
The fields that can be configured are described below:
Parameter Description
Port Profile ID VLAN ID Priority
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
GVRP
GVRP Global
On this page, users can view and configure the GARP VLAN Registration Protocol (GVRP) global settings. To view the following window, click L2 Features > VLAN > GVRP > GVRP Global, as shown below:
Select the port that will be used for this configuration here. Select the 802.1v protocol VLAN profile ID here. Enter the VLAN ID used here. Select the priority value used here. This value is between 0 and 7. This
parameter is specified to re-write the 802.1p default priority previously set in the switch, which is used to determine the CoS queue to which packets are forwarded to. Once this field is specified, packets accepted by the switch that match this priority are forwarded to the CoS queue specified previous ly by the user.
The fields that can be configured are described below:
Parameter Description
Global GVRP State Dynamic VLAN Creation NNI BPDU Address
Click the Apply button to accept the changes made.
Figure 5-11 GVRP Global Window
Select to enable or disable the global GVRP state here. Select to enable or disable the dynamic VLAN creation function here. Select the NNI BPDU address option here. This option is used to
determine the BPDU protocol address for GVRP in service provide site. It can use 802.1d GVRP address or 802.1ad service provider GVRP address. Options to choose from are Dot1d and Dot1ad.
30
Page 36
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
GVRP Port
On this page, users can view and configure the GVRP port settings. To view the following window, click
L2 Features > VLAN > GVRP > GVRP Po rt , as shown below:
Figure 5-12 GVRP Port Window
The fields that can be confi gur ed are des c ribed be lo w:
Parameter Description
From Port ~ To Port GVRP Status
Join Time
Leave Time
Leave All Time
Click the Apply button to accept the changes made.
Select the range of ports that will be used for this configuration here. Select the enable or disable the GVRP port status. This enables the
port to dynamically become a member of a VLAN. By default, this option is disabled.
Enter the Join Time value in centiseconds. This value must be between 10 and 10000 centiseconds. By default, this value is 20 centiseconds.
Enter the Leave Time value in centiseconds. This value must be between 10 and 10000 centiseconds. By default, this value is 60 centiseconds.
Enter the Leave All Time value in centiseconds. This value must be between 10 and 10000 centiseconds. By default, this value is 1000 centiseconds.
GVRP Advertise VLAN
On this page, users can view and configure the GVRP advertised VLAN settings. To view the following window, click L2 Features > VLAN > GVRP > GVR P Adv e rti s e VLAN, as shown below:
31
Page 37
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 5-13 GVRP Advertise VLAN Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Action
Advertise VID List
Click the Apply button to accept the changes made.
Select the range of ports that will be used for this configuration here. Select the advertised VLAN to port mapping action that will be taken
here. Options to choose from are All, Add, and Remove. When selecting All, all the advertised VLANs will be used.
Enter the advertised VLAN ID list here.
GVRP Forbidden VLAN
On this page, users can view and configure the GVRP forbidden VLAN settings. To view the following window, click L2 Features > VLAN > GVRP > GVRP Forbidden VLAN, as shown below:
32
Page 38
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 5-14 GVRP Forbidden VLAN Window
The fields that can be configured are described below:
Parameter Description
Unit From Port ~ To Port Action
Forbidden VID List
Click the Apply button to accept the changes made.
Select the switch unit that will be used for this configuration here. Select the range of ports that will be used for this configuration here. Select the forbidden VLAN to port mapping action that will be taken
here. Options to choose from are All, Add, and Remove. When selecting All, all the forbidden VLANs will be used.
Enter the forbidden VLAN ID list here.
GVRP Statistics Table
On this page, GVRP statistics information is displayed. To view the following window, click L2 Features > VLAN > GVRP > GVRP Statistics Table, as shown below:
33
Page 39
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 5-15 GVRP Statistics Table Window
The fields that can be configured are described below:
Parameter Description
Port
Click the Find button to locate a specific entry based on the information entered. Click the Clear button to clear all the information for the specific port. Click the V iew All button to view all GVRP statistic information. Click the C l e a r Al l button to clear all the information in this table.
MAC VLAN
On this page, users can view and configure the MAC-based VLAN information. When a static MAC-based VLAN entry is created for a user, the traffic according to the specified VLAN operating on this port will be configured. To view the following window, click L2 Features > VLAN > MAC VLAN, as shown below:
Select the port number of which GVRP statistic information will be displayed.
The fields that can be configured are described below:
Parameter Description
Figure 5-16 MAC VLAN Window
34
Page 40
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
MAC Address VLAN ID Priority
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
VLAN Interface
On this page, users can view and configure VLAN interface settings. To view the following window, click L2 Features > VLAN > VLAN Interface, as shown below:
Enter the unicast MAC address. Enter the VLAN ID that will be used. Select the priority that is assigned to untagged packets. This value is
between 0 and 7.
Figure 5-17 VLAN Interface Window
Click the View Detail button to view more detailed information about the VLAN on the specific interface. Click the Edit button to re-configure the specific entry.
After clicking the VLAN Detail button, the foll o wing pag e will app ear.
Figure 5-18 VLAN Interface (VLAN Detail) Window
35
Page 41
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
On this page, more detailed information about the VLAN of the specific interface is displayed. Click the <<Back button to return to the previous page.
After click the Edit button, the following page will appear. This is a dynamic page that will change when a different VLAN Mode was selected. When Access was selected as the VLAN Mode, the following page will appear.
Figure 5-19 VLAN Interface (Access) Window
The fields that can be configured are described below:
Parameter Description
VLAN Mode
Select the VLAN mode option here. Options to choose from are
Access, Hybrid, Trunk, 802.1Q-Tunnel, Promiscuous, and Host.
Acceptable Frame
Select the acceptable frame behavior option here. Options to choose from are Tagged Only, Untagged Only, and Adm i t All .
Ingress Checking VLAN ID
Select to enable or disable the ingress checking function. Enter the VLAN ID used for this configuration here. This value must be
between 1 and 4094.
Click the Apply button to accept the changes made. Click the <<Back button to discard the changes made and return to the previous page.
When Hybrid was selected as the VLAN Mode, the following page will appear.
The fields that can be configured are described below:
Parameter Description
VLAN Mode
Figure 5-20 VLAN Interface (Hybrid) Window
Select the VLAN mode option here. Options to choose from are
36
Page 42
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Access, Hybrid, Trunk, 802.1Q-Tunnel, Promiscuous, and Host.
Acceptable Frame
Select the acceptable frame behavior option here. Options to choose from are Tagged Only, Untagged Only, and Adm i t All .
Ingress Checking VLAN Precedence
Select to enable or disable the ingress checking function. Select the VLAN precedence option here. Options to choose from are
Mac-based VLAN and Subnet-based VLAN.
Native VLAN
Tick this option to enable the native VLAN function.
VLAN ID After ticking the Native VLAN option the following parameter will be
available. Enter the VLAN ID used for this configuration here. This value must be between 1 and 4094.
Action
Select the action that will be taken here. Options to choose from are
Add, Remove, Tagged, and Untagged.
Add Mode Select whether to add an Untagged or Tagged parameters. Allowed VLAN Range
Enter the allowed VLAN range information here.
Click the Apply button to accept the changes made. Click the <<Back button to discard the changes made and return to the previous page.
When Trunk was selected as the VLAN Mode, the following page will appear.
Figure 5-21 VLAN Interface (Trunk) Window
The fields that can be configured are described below:
Parameter Description
VLAN Mode
Select the VLAN mode option here. Options to choose from are
Access, Hybrid, Trunk, 802.1Q-Tunnel, Promiscuous, and Host.
Acceptable Frame
Select the acceptable frame behavior option here. Options to choose from are Tagged Only, Untagged Only, and Adm i t All .
Ingress Checking After selecting Trunk as the VLAN Mode the following parameter will
be available. Select to enable or disable the ingress checking function.
Native VLAN
Tick this option to enable the native VLAN function. Also select if this VLAN supports Untagged or Tagged frames.
VLAN ID After ticking the Native VLAN option the following parameter will be
available. Enter the VLAN ID used for this configuration here. This value must be between 1 and 4094.
Action
Select the action that will be taken here. Options to choose from are
All, Add, Remove, Except, and Replace.
Allowed VLAN Range
Enter the allowed VLAN range information here.
37
Page 43
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Click the Apply button to accept the changes made. Click the <<Back button to discard the changes made and return to the previous page.
When 802.1Q-Tunnel was selected as the VLAN Mode, the following page will appear.
Figure 5-22 VLAN Interface (802.1Q-Tunnel) Window
The fields that can be configured are described below:
Parameter Description
VLAN Mode
Select the VLAN mode option here. Options to choose from are
Access, Hybrid, Trunk, 802.1Q-Tunnel, Promiscuous, and Host.
Acceptable Frame
Select the acceptable frame behavior option here. Options to choose from are Tagged Only, Untagged Only, and Adm i t All .
Ingress Checking VLAN Precedence
Select to enable or disable the ingress checking function. Select the VLAN precedence option here. Options to choose from are
Mac-based VLAN and Subnet-based VLAN.
VLAN ID
Enter the VLAN ID used for this configuration here. This value must be between 1 and 4094.
Action
Select the action that will be taken here. Options to choose from are
Add and Remove.
Add Mode Select to add an Untagged parameter. Allowed VLAN Range
Enter the allowed VLAN range information here.
Click the Apply button to accept the changes made. Click the <<Back button to discard the changes made and return to the previous page.
When Promiscuous was selected as the VLAN Mode, the following page will appear.
The fields that can be configured are described below:
Figure 5-23 VLAN Interface (Promiscuous) Window
38
Page 44
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Parameter Description
VLAN Mode
Acceptable Frame
Ingress Checking
Click the Apply button to accept the changes made. Click the <<Back button to discard the changes made and return to the previous page.
When Host was selected as the VLAN Mode, the following page will appear.
The fields that can be configured are described below:
Select the VLAN mode option here. Options to choose from are Access, Hybrid, Trunk, 802.1Q-Tunnel, Promiscuous, and Host.
Select the acceptable frame behavior option here. Options to choose from are Tagged Only, Untagged Only, and Adm i t All.
Select to enable or disable the ingress checking function.
Figure 5-24 VLAN Interface (Host) Window
Parameter Description
VLAN Mode
Acceptable Frame
Ingress Checking
Click the Apply button to accept the changes made. Click the <<Back button to discard the changes made and return to the previous page.
Subnet VLAN
On this page, users can view and configure the subnet VLAN settings. A subnet VLAN entry is an IP subnet-based VLAN classification rule. If an untagged or priority-tagged IP packet is received on a port, its source IP address will be used to match the subnet VLAN entries. If the source IP is in the subnet of an entry, the packet will be classified to the VLAN defined for this subnet. To view the following window, click L2 Features > VLAN > Subnet VLAN, as shown below:
Select the VLAN mode option here. Options to choose from are Access, Hybrid, Trunk, 802.1Q-Tunnel, Promiscuous, and Host.
Select the acceptable frame behavior option here. Options to choose from are Tagged Only, Untagged Only, and Adm i t All .
Select to enable or disable the ingress checking function.
Figure 5-25 Subnet VLAN Window
39
Page 45
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
The fields that can be configured are described below:
Parameter Description
IPv4 Network Prefix / Prefix Length
IPv6 Network Prefix / Prefix Length
VLAN ID Priority
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
Private VLAN
On this page, users can view and configure the private VLAN settings. To view the following window, click L2 Features > VLAN > Private VLAN, as shown below:
Select and enter the IPv4 address and prefix length value for the subnet VLAN here.
Select and enter the IPv6 address and prefix length value for the subnet VLAN here.
Enter the VLAN ID for the subnet VLAN here. Select the priority value used here. This value is between 0 and 7. A
lower value takes higher priority.
Figure 5-26 Private VLAN Window
The fields that can be configured for Private VLAN are described below:
Parameter Description
VLAN ID List State Type
Click the Apply button to accept the changes made.
The fields that can be configured for Private VLAN Association are described below:
Parameter Description
VLAN ID List Action
Enter the private VLAN ID list here. Select to enable or disable the private VLAN state here. Select the type of private VLAN that will be created here. Options to
choose from are Community, Isolated, and Primary.
Enter the private VLAN ID list here. Select the action that will be taken for the private VLAN here. Options
40
Page 46
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
to choose from are Add, Remove, and Disabled.
Secondary VLAN ID List
Click the Apply button to accept the changes made.
The fields that can be configured for Private VLAN Host Association are described below:
Parameter Description
From Port ~ To Port Primary VLAN ID Secondary VLAN ID Enter the secondary private VLAN ID here. When ticking the Remove
Click the Apply button to accept the changes made.
The fields that can be configured for Private VLAN Mapping are described below:
Parameter Description
From Port ~ To Port Primary VLAN ID Action
Enter the secondary private VLAN ID here.
Select the range of ports that will be used for this configuration here. Enter the primary private VLAN ID here.
Association option, specifies that this configuration will not be enabled.
Select the range of ports that will be used for this configuration here. Enter the primary private VLAN ID here. Select the action that will be taken for the private VLAN here. Options
to choose from are Add, Remove, and Disabled.
Secondary VLAN ID List Enter the secondary private VLAN ID here. When ticking the Remove
Click the Apply button to accept the changes made.
Spanning Tree
STP Global Settings
On this page, users can view and configure the STP global settings. To view the following window, click
L2 Features > Spanning Tree > STP Global Settings, as shown bel ow:
Mapping option, specifies that this configuration will not be enabled.
41
Page 47
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
This value must be between 1 and 2 seconds. By default, this value is
Figure 5-27 STP Global Settings Window
The field that can be configured for Spanning Tree State is des cr ibed be lo w:
Parameter Description
Spanning Tree State
Select to enable or disable the STP global state here.
Click the Apply button to accept the changes made.
The fields that can be configured for STP Traps are described below:
Parameter Description
STP New Root Trap STP Topology Change Trap
Select to enable or disable the STP new root trap option here. Select to enable or disable the STP topology change trap option here.
Click the Apply button to accept the changes made.
The fields that can be configured for Spanning Tree Mode are described below:
Parameter Description
Spanning Tree Mode Select the STP mode used here. Options to choose from are MSTP,
RSTP, and STP.
Click the Apply button to accept the changes made.
The fields that can be configured for Spanning Tree Priority are described below:
Parameter Description
Priority
Select the STP priority value here. This value is between 0 and 61440. By default, this value is 32768. The lower the value, the higher the priority.
Click the Apply button to accept the changes made.
The fields that can be configured for Spanning Tree Configuration are described below:
Parameter Description
Spanning Tree Mode Select the STP mode used here. Options to choose from are MSTP,
RSTP, and STP.
Priority
Select the STP priority value here. This value is between 0 and 61440. By default, this value is 32768. The lower the value, the higher the priority.
Bridge Max Age
Enter the bridge’s maximum age value here. This value must be between 6 and 40 seconds. By default, this value is 20 seconds. The maximum age value may be set to ensure that old information does not endlessly circulate through redundant paths in the network, preventing the effective propagation of the new information. Set by the Root Bridge, this value will aid in determining that the switch has spanning tree configuration values consistent with other devices on the bridged LAN.
Bridge Hello Time After selecting RSTP/STP as the Spanning Tree Mode, this
parameter will be available. Enter the bridge’s hello time value here.
42
Page 48
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
2 seconds. This is the interval between two transmissions of BPDU
packets sent by the Root Bridge to tell all other switches that it is indeed the Root Bridge. This field will only appear here when STP or RSTP is selected for the STP Version. For MSTP, the Hello Time must be set on a port per port basis.
Bridge Forward Time
TX Hold Count
Max Hops
NNI BPDU Address
Click the Apply button to accept the changes made.
Enter the bridge’s forwarding time value here. This value must be between 4 and 30 seconds. By default, this value is 15 seconds. Any port on the switch spends this time in the listening state while moving from the blocking state to the forwarding state.
Enter the transmit hold count value here. This value must be between 1 and 10 times. By default, this value is 6 times. This value is used to set the maximum number of Hello packets transmitted per interval.
Enter the maximum number of hops that are allowed. This value must be between 1 and 40 hops. By default, this value is 20 hops. This value is used to set the number of hops between devices in a spanning tree region before the BPDU (bridge protocol data unit) packet sent by the switch will be discarded. Each switch on the hop count will reduce the hop count by one until the value reaches zero. The switch will then discard the BDPU packet and the information held for the port will age out.
Select the NNI BPDU Address option here. Options to choose from are Dot1d and Dot1ad. By default, this option is Dot1d. This parameter is used to determine the BPDU protocol address for STP in the service provide site. It can use an 802.1d STP address, 802.1ad service provider STP address, or a user defined multicast address.
STP Port Settings
On this page, users can view and configure the STP port settings. To view the following window, click L2 Features > Spanning Tree > STP Port Settings, as shown below:
Figure 5-28 STP Port Settings Window
43
Page 49
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Cost
Select the range of ports that will be used for this configuration here. Enter the cost value here. This value must be between 1 and
200000000. This value defines a metric that indicates the relative cost of forwarding packets to the specified port list. Port cost can be set automatically or as a metric value. The default value is 0 (auto). Setting 0 for the external cost will automatically set the speed for forwarding packets to the specified port(s) in the list for optimal efficiency. The default port cost for a 100Mbps port is 2000 00, a Gigabit port is 20000, and a 10 Gigabit port is 2000. The lower the number, the greater the probability the port will be chosen to forward packets.
State Guard Root
Select to enable or disable the STP port state. Select to enable or disable the guard root function.
Link Type Select the link type option here. Options to choose from are Auto,
P2P, and Shared. A full-duplex port is considered to have a point-to-
point (P2P) connection. On the opposite, a half-duplex port is considered to have a Shared connection .The port cannot tr ans it into the forwarding state rapidly by setting the link type to Shared. By default this option is Auto.
Port Fast Select the port fast option here. Options to choose from are Network,
Disabled, and Edge. In the Network mode the port will remain in the
non-port-fast state for three seconds. The port will change to the port­fast state if no BPDU is received and changes to the forwarding state. If the port received the BPDU later, it will change to the non-port-fast state. In the Disable mode, the port will always be in the non-port-fast state. It will always wait for the forward-time delay to change to the forwarding state. In the Edge mode, the port will directly change to the spanning-tree forwarding state when a link-up occurs without waiting for the forward-time delay. If the interface receives a BPDU later, its operation state changes to the non-port-fast state. By default, this option is Network.
TCN Filter
Select to enable or disable the TCN filter option. Enabling TC filtering on a port is useful for an ISP to prevent the external bridge to a core region of the network, causing address flushing in that region, possibly because those bridges are not under the full control of the administrator. When a port is set to the TCN filter mode, the TC event received by the port will be ignored. By default, this option is Disabled.
BPDU Forward
Select to enable or disable BPDU forwarding. If enabled, the received STP BPDU will be forwarded to all VLAN member ports in the untagged form. B y default, t his opti on is Disabled.
Priority Select the priority value here. Options to choose from are 0 to 240. B y
default this option is 0. A lower value has higher priority.
Hello Time Enter the hello time value here. This value must be between 1 and 2
seconds. This value specifies the interval that a design ated por t wil l wait between the periodic transmissions of each configuration message.
Click the Apply button to accept the changes made.
44
Page 50
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
MST Configuration Identification
On this page, users can view and configure the MST configuration identification settings. These settings will uniquely identify a multiple spanning tree instance set on the switch. The switch initially possesses one CIST, or Common Internal Spanning Tree, of which the user may modify the parameters for but cannot change the MSTI ID for, and cannot be deleted. To view the following window, click L2 Features >
Spanning Tree > MST Configuration Identification, as shown below:
Figure 5-29 MST Configuration Identification Window
The fields that can be configured for MST Configuration Settings are described below:
Parameter Description
Configuration Name
Revision Level Enter the revision level value here. This value must be between 0 and
Click the Apply button to accept the changes made.
In the Private VLAN Synchronize section, the user can click the Apply button to synchronize the private VLANs.
The fields that can be configured for Instance ID Settings are described below:
Parameter Description
Enter the MST. This name uniquely identifies the MSTI (Multiple Spanning Tree Instance). If a Configuration Name is not set, this field will show the MAC address to the device running MSTP.
65535. By default, this value is 0. This value, along with the Configuration Name, identifies the MSTP region configured on the switch.
Instance ID Enter the instance ID here. This value must be between 1 and 4094. Action
VID List
Click the Apply button to accept the changes made. Click the Edit button to re-configure the specific entry. Click the Delete button to remove the specific entry.
Select the action that will be taken here. Options to choose from are Add VID and Remove VID.
Enter the VID list value here. This field is used to specify the VID range from configured VLANs set on the switch.
45
Page 51
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
STP Instance
On this page, users can view and configure the STP instance settings. To view the following window, click L2 Features > Spanning Tree > STP Instance, as shown below:
Click the Edit button to re-configure the specific entry.
Figure 5-30 STP Instance Window
MSTP Port Information
On this page, users can view and configure the MSTP port information settings. To view the following window, click L2 Features > Spanning Tree > MSTP Port Information, as shown below:
Figure 5-31 MSTP Port Information Window
The fields that can be configured are described below:
Parameter Description
Port
Click the Clear Detected Protocol button to clear the detected protocol settings for the port selected. Click the Find button to locate a specific entry based on the information entered. Click the Edit button to re-configure the specific entry.
Select the port number that will be cleared here.
Link Aggregation
Understanding Port Trunk Groups
Port trunk groups are used to combine a number of ports together to make a single high-bandwidth data pipeline. The switch supports up to 16 port trunk groups with 1 to 12 ports in each group.
46
Page 52
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 5-32 Example of Port Trunk Group
The switch treats all ports in a trunk group as a single port. Data transmitted to a specific host (destination address) will always be transmitted over the same port in a trunk group. This allows packets in a data stream to arrive in the same order they were sent.
Link aggregation allows several ports to be grouped together and to act as a single link. This gives a bandwidth that is a multiple of a single link's bandwidth.
Link aggregation is most commonly used to link a bandwidth intensive network device or devices, such as a server, to the backbone of a network.
The switch allows the creation of up to 16 link aggregation groups, each group consisting of 1 to 12 links (ports). Each port can only belong to a single link aggregation group.
All of the ports in the group must be members of the same VLAN, and their STP status, static multicast, traffic control; traffic segmentation and 802.1p default priority configurations must be identical. Port locking and 802.1X must not be enabled on the trunk group. Further, the LACP aggregated links must all be of the same speed and should be configured as full duplex.
Load balancing is automatically applied to the ports in the aggregated group, and a link failure within the group causes the network traffic to be directed to the remaining links in the group.
The Spanning Tree Protocol will treat a link aggregation group as a single link, on the switch level. On the port level, the STP will use the port parameters of the Master Port in the calculation of port cost and in determining the state of the link aggregation group. If two redundant link aggregation groups are
47
Page 53
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
type is LACP. A channel group can only consist of either static
configured on the Switch, STP will block one entire group; in the same way STP will block a single port that has a redundant link.
NOTE: If any ports within the trunk group become disconnected, packets intended for the disconnected port will be load shared among the other linked ports of the link aggregation group.
On this page, users can view and configure the link aggregation settings. To view the following window, click L2 Features > Link Aggregation, as shown below:
Figure 5-33 Link Aggregation Window
The fields that can be configured for Link Aggregation are described below:
Parameter Description
System Priority
Enter the system’s priority value used here. This value must be between 1 and 65535. B y def ault, this va lue is 32768. The system priority determines which ports can join a port-channel and which ports are put in the stand-alone mode. The lower value has a higher priority. If two or more ports have the same priority, the port number determines the priority
Load Balance Algorithm
Select the load balancing algorithm that will be used here. Options to choose from are Source MAC, Destination MAC, Source
Destination MAC, Source IP, Destination IP, Source Destination IP, Source L4 Port, Destination L4 Port, and Source Destination L4 Port. By default, this option is Source Destination MAC.
Click the Apply button to accept the changes made.
The fields that can be configured for Trunking Information are described below:
Parameter Description
From Port ~ To Port
Select the list of ports that will be associated with this configuration here.
Channel Group Enter the channel group number here. This value must be between 1
and 16. The system will automatically create the port-channel when a physical port first joins a channel group. An interface can only join one channel-group.
Mode Select the mode option here. Options to choose from are On, Active,
and Passive. If the mode On is specified, the channel group type is static. If the mode Active or Passive is specified, the channel group
48
Page 54
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
members or LACP members. Once the type of channel group has
been determined, other types of interfaces cannot join the channel group.
Click the Apply button to accept the changes made. Click the Edit button to re-configure the specific entry. Click the Delete button to remove the specific entry. Click the Channel Detail button to view more detailed information about the channel.
After clicking the Channel Detail button, the follo wing page will be avai lab le.
Figure 5-34 Link Aggregation (Channel Detail) Window
Click the Edit button to re-configure the specific entry. Click the <<Back button to return to the previous page.
L2 Protocol Tunnel
On this page, users can view and configure the Layer 2 protocol tunnel settings. To view the following window, click L2 Features > L2 Protocol Tunnel, as shown below:
Figure 5-35 L2 Protocol Tunnel (L2 Protocol Tunnel Global Setting) Window
49
Page 55
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
The fields that can be configured for L2 Protocol Tunnel Global Settings are described below:
Parameter Description
CoS for Encapsulated Packets
Select the CoS value for encapsulated packets here. This value is between 0 and 7. Tick the Default option to use the default value.
Drop Threshold Enter the drop threshold value here. This value must be between 100
and 20000. By default, this value is 0. The tunneling of the Layer 2 protocol packets will consume CPU processing power in encapsulating, decapsulating, and forwarding of the packet. Use this option to restrict the CPU processing bandwidth consumed by specifying a threshold on the number of all Layer 2 protocol packets that can be processed by the system. When the maximum number of packets is exceeded, the excessive protocol packets are dropped.
Click the Apply button to accept the changes made.
After selecting the L2 Protocol Tunnel Port Setting tab option, at the top of the page, the following page will be available.
Figure 5-36 L2 Protocol Tunnel (L2 Protocol Tunnel Port Setting) Window
The fields that can be configured for L2 Protocol Tunnel Port Setting are described below:
Parameter Description
From Port ~ To Port Action
Select the range of ports that will be used for this configuration here. Select the action that will be taken here. Options to choose from are
Add and Delete.
Type Select the type option here. Options to choose from are None,
Shutdown, and Drop.
Tunneled Protocol
Select the tunneled protocol option here. Options to choose from are
GVRP, STP, Protocol MAC, and All.
Protocol MAC After selecting the Protocol MAC option as the Tunneled Protocol,
the following option will be available. Select the protocol MAC option here. Options to choose from are 01-00-0C-CC-CC-CC and 01-00-0C-
CC-CC-CD.
Threshold After selecting the Shutdown or Drop options as the Type, the
following param eter will be ava ilab le. Ent er the thresh o ld va lue here. This value must be between 1 and 4096.
Click the Apply button to accept the changes made. Click the C l e a r Al l button to clear all the counter information. Click the Clear button to clear all the counter information of the specific entry.
50
Page 56
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
L2 Multicast Control
Multicast Filtering
On this page, users can view and configure the Layer 2 multicast filtering settings. To view the following window, click L2 Features > L2 Multicast Control > Multicast Filtering, as shown below:
The fields that can be configured are described below:
Parameter Description
Figure 5-37 Multicast Filtering Window
VLAN ID List Multicast Filter Mode
Click the Apply button to accept the changes made.
Enter the VLAN ID list that will be used for this configuration here. Select the multicast filter mode here. Options to choose from are
Forward Unregistered, Forward All, and Filter Unregistered. When selecting the Forward Unregistered option, registered multicast packets will be forwarded based on the forwarding table and all unregistered multicast packets will be flooded based on the VLAN domain. When selecting the Forward All option, all multicast packets will be flooded based on the VLAN domain. When selecting the Filter Unregistered option, registered packets will be forwarded based on the forwarding table and all unregistered multicast packets will be filtered.
51
Page 57
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
6. Layer 3 Features
ARP Gratuitous ARP IPv4 Interface IPv4 Static/Default Route IPv4 Route Table IPv6 Interface IPv6 Static/Default Route IPv6 Route Table
ARP
ARP Aging Time
On this page, users can view and configure the ARP aging time settings. To view the following window, click L3 Features > ARP > ARP Aging Time, as shown below:
The fields that can be configured are described below:
Parameter Description
Timeout After click the Edit button, enter the ARP aging timeout value here.
Click the Apply button to accept the changes made. Click the Edit button to re-configure the specific entry.
Static ARP
On this page, users can view and configure the static ARP settings. To view the following window, click
L3 Features > ARP > Static ARP, as shown below:
Figure 6-1 ARP Aging Time Window
The fields that can be configured are described below:
Figure 6-2 Static ARP Window
52
Page 58
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Parameter Description
VRF Name
IP Address
Hardware Address
Click the Apply button to accept the changes made. Click the Find button to find the entry, based on the information entered. Click the Edit button to re-configure the specific entry. Click the Delete button to remove the specific entry.
Proxy ARP
On this page, users can view and configure the proxy ARP settings. The Proxy ARP feature of the switch will allow the switch to reply to ARP requests destined for another device by faking its identity (IP and MAC Address) as the original ARP responder. Therefore, the switch can then route packets to the intended destination without configuring static routing or a default gateway. The host, usually a Layer 3 switch, will respond to packets destined for another device. To view the following window, click L3 Features > ARP > Pro xy ARP, as shown below:
Enter the Virtual Routing and Forwarding (VRF) instance name used here. This name can be up to 12 characters long.
Enter the IP address that will be associated with the MAC addr ess here.
Enter the MAC address that will be associated with the IP address here.
The fields that can be configured are described below:
Parameter Description
Proxy ARP State Local Proxy ARP State
Click the Apply button to accept the changes made. Click the Edit button to re-configure the specific entry.
ARP Table
On this page, users can view and configure the ARP table settings. To view the following window, click L3 Features > ARP > ARP Table, as shown below:
Figure 6-3 Proxy ARP Window
Select to enable or disable the proxy ARP state here. Select to enable or disable the local proxy ARP state here. This local
proxy ARP function allows the switch to respond to the proxy ARP, if the source IP and destination IP are in the same interface.
53
Page 59
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 6-4 ARP Table Window
The fields that can be configured are described below:
Parameter Description
VRF Name
Interface VLAN
IP Address MASK Address After the IP Address option was selected, enter the mask address for
Hardware Address Type Select the type option here. Options to choose from are All and
Mgmt
Click the Find button to locate a specific entry based on the information entered. Click the C l e a r Al l button to clear all the information. Click the Delete button to remove the specific entry.
Gratuitous ARP
On this page, users can view and configure the gratuitous ARP settings. A gratuitous ARP request pac ket is an ARP request packet where the source and the destination IP address are both set to the IP address of the sending device and the destination MAC address is the broadcast address.
Enter the Virtual Routing and Forwarding (VRF) instance name used here. This name can be up to 12 characters long.
Enter the interface’s VLAN ID used here. This va lue m us t be between 1 and 4094.
Select and enter the IP address to display here.
the IP address here. Select and enter the MAC address to display here.
Dynamic. Select this option to display the Management port’s information.
Generally, a device use the gratuitous ARP request packet to discover whether the IP address is duplicated by other hosts or to preload or reconfigure the ARP cache entry of hosts connected to the interface. To view the following window, click L3 Features > Gratuitous ARP, as shown below:
54
Page 60
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 6-5 Gratuitous ARP Window
The fields that can be configured are described below:
Parameter Description
IP Gratuitous ARP State
IP Gratuitous ARP Dad-Reply State
Gratuitous ARP Learning State
Click the Apply button to accept the changes made. Click the Edit button to re-configure the specific entry.
IPv4 Interface
On this page, users can view and configure the IPv4 interface settings. To view the following window, click L3 Features > IPv4 Interface, as shown below:
Select to enable or disable the learning of gratuitous ARP packets in the ARP cache table.
Select to enable or disable the IP gratuitous ARP Dad-reply state.
Select to enable or disable the gratuitous ARP learning state. Normally, the system will only learn the ARP reply packet or a normal ARP request packet that asks for the MAC address that corresponds to the system’s IP address. This option used to enable or disable the learning of ARP entries in the ARP cache based on the received gratuitous ARP packet. The gratuitous ARP packet is sent by a source IP address that is identical to the IP that the packet is queries for.
Figure 6-6 IPv4 Interface Window
The fields that can be configured are described below:
Parameter Description
Interface VLAN Enter the interface’s VLAN ID here. This value must be between 1 and
4094.
Click the Apply button to accept the changes made. Click the Find button to locate a specific entry based on the information entered. Click the Edit button to re-configure the specific entry. Click the Delete button to remove the specific entry.
After clicking the Edit button, the following page will be available.
55
Page 61
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 6-7 IPv4 Interface (Edit) Window
The fields that can be configured are described below:
Parameter Description
State Get IP From Select the get IP from option here. Options to choose from are Static
IP Address Mask Secondary
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
Select to enable or disable the IPv4 interface’s global state.
and DHCP. When the Static option is selected, users can enter the IPv4 address of this interface manually in the fields provided. When the DHCP option is selected, this interface will obtain IPv4 information automatically from the DHCP server located on the local network.
Enter the IPv4 address for this interface here. Enter the IPv6 subnet mask for this interface here. Tick this option to use the IPv4 address and mask as the secondary
interface configuration.
IPv4 Static/Default Route
On this page, users can view and configure the IPv4 static and default route settings. The switch supports static routing for IPv4 formatted addressing. Users can create up to 1000 static route entries for IPv4. For IPv4 static routes, once a static route has been set, the switch will send an ARP request packet to the next hop router that has been set by the user. Once an ARP response has been retrieved by the switch from that next hop, the route becomes enabled. However, if the ARP entry already exists, an ARP request will not be sent.
The switch also supports a floating static route, which means that the user may create an alternative static route to a different next hop. This secondary next hop device route is considered as a backup static route for when the primary static route is down. If the primary route is lost, the backup route will uplink and its status will become active.
Entries into the switch’s forwarding table can be made using both an IP address subnet mask and a gateway. To view the following window, click L3 Features > IPv4 Static/Default Route, as shown below:
56
Page 62
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 6-8 IPv4 Static/Default Route Window
The fields that can be configured are described below:
Parameter Description
VRF Name
IP Address Enter the IPv4 address for this route here. Tick the Default Route
Netmask Gateway Backup State
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
Enter the VRF instance name used here. This name can be up to 12 characters long.
option to use the default route as the IPv4 address. Enter the IPv4 network mask for this route here. Enter the gateway address for this route here. Select the backup state option here. Options to choose from are
Primary, Backup, and Weight. When the Primary option is selected, the route will be used as the primary route to the destination. When the Backup option is selected, the route will be used as the backup route to the destination. When the Weight option is selected, the weight number must be entered with value greater than zero, but less than the maximum paths number. This number is used to replicate identical route path (multiple copies) in routing table, so the path get more chance to be hit for traffic routing. If weight number is not specified for the static route, the default for the path that exists in the hashing table is one copy. This value must be between 1 and 32.
IPv4 Route Table
On this page, users can view and configure the IPv4 route table settings. To view the following window, click L3 Features > IPv4 Route Table, as shown below:
Figure 6-9 IPv4 Route Table Window
57
Page 63
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
The fields that can be configured are described below:
Parameter Description
Network Address
IP Address RIP OSPF BGP Connected Hardware
Click the Find button to locate a specific entry based on the information entered.
IPv6 Interface
On this page, users can view and configure the IPv6 interface’s settings. To view the following window, click L3 Features > IPv6 Interface, as shown below:
Enter the IPv4 network address here. In the first space enter the network prefix and in the second space enter the network mask.
Enter the single IPv4 address here. Select this option to display only RIP routes. Select this option to display only OSPF routes. Select this option to display only BGP routes. Select this option to display only connected routes. Select this option to display only hardware routes. Hardware routes are
routes that have been written into the hardware chip.
Figure 6-10 IPv6 Interface Windo w
The fields that can be configured are described below:
Parameter Description
Interface VLAN
Click the Apply button to accept the changes made. Click the Find button to locate a specific entry based on the information entered. Click the Detail button to view and configure more detailed settings for the IPv6 interface entry.
After clicking the Detail button, the following page will be available.
Enter the VLAN interface’s ID that will be assoc iate d with the IP v6 entry.
58
Page 64
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 6-11 IPv6 Interface (Detail, IPv6 Interface Settings) Window
The fields that can be configured for Interface are described below:
Parameter Description
IPv6 State
Click the <<Back button to discard the changes made and return to the previous page. Click the Apply button to accept the changes made.
The fields that can be configured for Static IPv6 Address Settings are described below:
Parameter Description
IPv6 Address Enter the IPv6 address for this IPv6 interface here. Select the EUI-64
Click the Apply button to accept the changes made.
After selecting the Interface Address tab option, at the top of the page, the following page will be available.
Figure 6-12 IPv6 Interface (Detail, Interface Address) Window
Select to enable or disable the IPv6 interface’s global state here.
option to configure an IPv6 address on the interface using the EUI-64 interface ID. Select the Link Local option to configure a link-local address for the IPv6 interface.
Click the Delete button to delete the specified entry.
IPv6 Static/Default Route
On this page, users can view and c onf igure the IPv6 static or default r ou tes . T o vi e w the foll o wing windo w, click L3 Features > IPv6 Static/Default Route, as shown below:
59
Page 65
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Longer Prefixes option to display the route and all of the more
Figure 6-13 IPv6 Static/Default Route Window
The fields that can be configured are described below:
Parameter Description
Network Prefix/Prefix Length
Interface VLAN
Next Hop IPv6 Address Backup State
Click the Apply button to accept the changes made.
IPv6 Route Table
On this page, users can view and configure the IPv6 route table. To view the following window, click L3 Features > IPv6 Route Table, as shown below:
Enter the IPv6 address and prefix length for this route here. Tick the Default Route option to use the default route as the IPv6 address.
Enter the interface’s VLAN ID that will be assoc iate d with this rou te here.
Enter the next hop IPv6 address here. Select the backup state option here. Options to choose from are
Primary, Backup, and Distance. When the Primary option is selected, the route is specified as the primary route to the destination. When the Backup option is selected, the route is specified as the backup route to the destination. When the Distance option is selected, enter the administrative distance of the static route in the space provided. This value must be between 1 and 255. A lower value represents a better route. If not specified, the default administrative distance for a static route is 1.
Figure 6-14 IPv6 Route Table Window
The fields that can be configured are described below:
Parameter Description
IPv6 Address/Prefix Length
Enter the IPv6 address and prefix length to display here. Select the
60
Page 66
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
specific routes.
IPv6 Address Interface VLAN RIPng OSPFv3 Database
Enter the IPv6 address to display here. Enter the interface’s VLAN ID to display here. Select this option to display only RIPng routes. Select this option to display only OSPFv3 routes. Select this option to display all the related entries in the routing
database instead of just the best route.
Connected Hardware
Select this option to display only connected routes. Select this option to display only hardware routes. Hardware routes are
routes that have been written into the hardware chip.
Click the Find button to locate a specific entry based on the information entered.
61
Page 67
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
7. Quality of Service (QoS)
Basic Settings Advanced Settings
Basic Settings
Port Default CoS
On this page, users can view and configure the port’s default CoS settings. To view the following window, click QoS > Basic Settings > Port Default CoS, as shown below:
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Default CoS
Click the Apply button to accept the changes made.
Select the range of ports that will be used for this configuration here. Select the default CoS option for the port(s) specified here. Options to
choose from are 0 to 7. Select the Override option to override the CoS of the packets. The default CoS will be applied to all incoming packets, tagged or untagged, received by the port. Select the None option to specify that the CoS of the packets will be the packet’s CoS if the packets are tagged, and will be the port default CoS if the packet is untagged.
Port Scheduler Method
On this page, users can view and configure the port scheduler method settings. To view the following window, click QoS > Basic Settings > Port Scheduler Method, as shown below:
Figure 7-1 Port Default CoS Window
62
Page 68
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
negative and the last packet is transm itted completely. When this
Figure 7-2 Port Scheduler Method Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Scheduler Method
Select the range of ports that will be used for this configuration here. Select the scheduler method that will be applied to the specified
port(s). Options to choose from are Strict Priority (SP), Round-Robin (RR), Weighted Round-Robin (WRR), Weighted Deficit Round-Robin (WDRR), and Enhanced Transmission Selection (ETS). By default, the output queue scheduling algorithm is WRR.
Strict Priority (SP) specifies that all queues use strict priority scheduling. It provides strict priority access to the queues from the highest CoS queue to the lowest.
Round-Robin (RR) specifies that all queues use round-robin scheduling. It provides fair access to service a single packet at each queue before moving on to the next one.
Weighted Round-Robin (WRR) operates by transmitting permitted packets into the transmit queue in a round robin order. Initially, each queue sets its weight to a configurable weighting. Every time a packet from a higher priority CoS queue is sent, the corresponding weight is subtracted by 1 and the packet in the next lower CoS queue will be serviced. When the weight of a CoS queue reaches zero, the queue will not be serviced until its weight is replen ished. When weights of all CoS queues reach 0, the weights get replenished at a time.
Weighted Deficit Round-Robin (WDRR) operates by serving an accumulated set of backlogged credits in the transmit queue in a round robin order. Initially, each queue sets its credit counter to a configurable quantum value. Every time a packet from a CoS queue is sent, the size of the packet is subtracted from the corresponding credit counter and the service right is turned over to the next lower CoS queue. When the credit counter drops below 0, the queue is no longer serviced until its credits are replenished. When the credit counters of all CoS queues reaches 0, the credit counters will be replenished at that time. All packets are serviced until their credit counter is zero or
63
Page 69
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
condition happens, the credits are replenished. When the credits are
Click the Apply button to accept the changes made.
Queue Settings
On this page, users can view and configure the queue settings. To view the following window, click QoS > Basic Settings > Queue Settings, as shown below:
replenished, a quantum of credits are added to each CoS queue credit counter. The quantum for each CoS queue may be different based on the user configuration.
To set a CoS queue in the SP mode, any higher priority CoS queue must also be in the strict priority mode.
Enhanced Transmission Selection (ETS) provides bandwidth allocation on converged links in end stations and bridges in a Data Center Bridging (DCB) environment. Using bandwidth allocations, different traffic classes within different traffic types such as LAN, SAN, IPC and management can be configured to provide bandwidth allocation, low­latency or best effort transmit characteristics.
Figure 7-3 Queue Settings Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port
Queue ID Enter the queue ID value here. This value must be between 0 and 7. WRR Weight Enter the WRR weight value here. This value must be between 0 and
WDRR Quantum Enter the WDRR quantum value here. This va lue must be between 0
Select the range of ports that will be used for this configuration here.
127. To satisfy the behavior requirements of Expedited Forwarding (EF), the highest queue is always selected b y the Per-hop Behavior (PHB) EF and the schedule mode of this queue should be strict priority scheduling. So the weight of the last queue should be zero while the Differentiate Service is supported.
64
Page 70
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
and 127.
Click the Apply button to accept the changes made.
CoS to Queue Mapping
On this page, users can view and configure the CoS-to-Queue mapping settings. To view the following window, click QoS > Basic Settings > CoS to Queue Mapping, as shown below:
Figure 7-4 CoS to Queue Mapping Window
The fields that can be configured are described below:
Parameter Description
Queue ID
Click the Apply button to accept the changes made.
Port Rate Limiting
On this page, users can view and configure the port rate limiting settings. To view the following window, click QoS > Basic Settings > Port Rate Limiting, as shown below:
Select the queue ID that will be mapped to the corresponding CoS value. Options to choose from are 0 to 7.
65
Page 71
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 7-5 Port Rate Limiting Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Direction Select the direction option here. Options to choose from are Input and
Rate Limit
Click the Apply button to accept the changes made.
Select the range of ports that will be used for this configuration here.
Output. When Input is selected, the rate limit for ingress packets is configured. When Output is selected, the rate limit for egress packets is configured.
Select and enter the rate limit value here. When Bandwidth is selected, enter the input/output bandwidth value
used in the space provided. This value must be between 8 and 10000000 kbps. Also, enter the Burst Siz e value in the space provided. This value must be between 0 and 128000 kilobytes.
When Percent is selected, enter the input/output bandwidth percentage value used in the space provided. This value must be between 1 and 100 percent (%). Also, enter the Burst Size value in the space provided. This value must be between 0 and 128000 kilobytes.
Select the None option to remove the rate limit on the specified port(s). The specified limitation cannot exceed the maximum speed of the specified interface. For the ingress bandwidth limitation, the ingress will send a pause frame or a flow control frame when the received traffic exceeds the limitation.
Queue Rate Limiting
On this page, users can view and configure the queue rate limiting settings. To view the following window, click QoS > Basic Settings > Queue Rate Limiting, as shown below:
Figure 7-6 Queue Rate Limiting Window
66
Page 72
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Queue ID
Rate Limit
Select the range of ports that will be used for this configuration here. Select the queue ID that will be configured here. Options to choose
from are 0 to 7. Select and enter the queue rate limit settings here.
When the Min Bandwidth option is selected, enter the m inim um bandwidth rate limit value in the space provided. This value must be between 8 and 10000000 kbps. Also enter the maximum bandwidth (Max Bandwidth) rate limit in the space provided. This value must be between 8 and 10000000 kbps.
When the minimal bandwidth is configured, the packet transmitted from the queue can be guaranteed. When the maximum bandwidth is configured, packets transmitted from the queue cannot exceed the maximum bandwidth even if the bandwidth is available.
When configuring the minimal bandwidth, the aggregate of the configured minimum bandwidth must be less than 75 percent of the interface bandwidth to make sure the configured minimal bandwidth can be guaranteed. It is not necessary to set the minimum guaranteed bandwidth for the highest strict priority queue. This is because the traffic in this queue will be serviced first if the minimal bandwidth of all queues is satisfied.
The configuration of this command can only be attached to a physical port but not a port-channel. That is the minimum guaranteed bandwidth of one CoS cannot be used across physical ports.
When the Min Percent option is selected, enter the minimum bandwidth percentage value in the space provided. This value must be between 1 and 100 percent (%). Also enter the maximum percentage value (Max Percent) in the space provided. This value must be between 1 and 100 percent (%).
Click the Apply button to accept the changes made.
Advanced Settings
DSCP Mutation Map
On this page, users can view and configure the Differentiated Services Code Point (DSCP) mutation map settings. When a packet is received by an interface, based on a DSCP mutation map, the incoming DSCP can be mutated to another DSCP immediately before any QoS operations. The DSCP mutation is helpful to integrate domains with different DSCP assignments. The DSCP-CoS map and DSCP-color map will still be based on the packet’s original DSCP. All the subsequent operations will base on the mutated DSCP. To view the following window, click QoS > Advanced Settings > DSCP Mutation Map, as shown below:
67
Page 73
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 7-7 DSCP Mutation Map Window
The fields that can be configured are described below:
Parameter Description
Mutation Name
Input DSCP List Enter the input DSCP list value here. This value must be between 0
Output DSCP List Enter the output DSCP list value here. This value must be between 0
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
Enter the DSCP mutation m ap name here. This name can be up to 32 characters long.
and 63.
and 63.
Port Trust State and Mutation Binding
On this page, users can view and configure port trust state and mutation binding settings. To view the following window, click QoS > Advanced Settings > Port Trust State and Mutation Binding, as shown below:
68
Page 74
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 7-8 Port Trust State and Mutation Binding Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Trust State Select the port trust state option here. Options to choose from are CoS
DSCP Mutation Map
Click the Apply button to accept the changes made.
DSCP CoS Mapping
On this page, users can view and configure the DSCP CoS mapping settings. To view the following window, click QoS > Advanced Settings > DSCP CoS Mapping, as shown below:
Select the range of ports that will be used for this configuration here.
and DSCP. Select and enter the DSCP mutation map name used here. This name
can be up to 32 characters long. Select the None option to not allocate a DSCP mutation map to the port(s).
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port CoS
DSCP List
Click the Apply button to accept the changes made.
Figure 7-9 DSCP CoS Mapping Window
Select the range of ports that will be used for this configuration here. Select the CoS value to map to the DSCP list. Options to choose from
are 0 to 7. Enter the DSCP list value to map to the CoS value here. This value
must be between 0 and 63.
69
Page 75
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
CoS Color Mapping
On this page, users can view and configure the CoS color mapping settings. To view the following window, click QoS > Advanced Settings > CoS Color Mapping, as shown below:
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port CoS List
Color
Click the Apply button to accept the changes made.
DSCP Color Mapping
On this page, users can view and configure the DSCP color mapping settings. To view the following window, click QoS > Advanced Settings > DSCP Color Mapping, as shown below:
Figure 7-10 CoS Color Mapping Window
Select the range of ports that will be used for this configuration here. Enter the CoS value that will be mapped to the color. This value must
be between 0 and 7. Select the color option that will be mapped to the CoS value. Options
to choose from are Green, Yellow, and Red.
70
Page 76
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 7-11 DSCP Color Mapping Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port DSCP List
Color
Click the Apply button to accept the changes made.
Class Map
On this page, users can view and configure the class map settings. To view the following window, click QoS > Advanced Settings > Class Map, as shown below:
Select the range of ports that will be used for this configuration here. Enter the DSCP list value here that will be mapped to a color. This
value must be between 0 and 63. Select the color option that will be mapped to the DSCP value. Options
to choose from are Green, Yellow, and Red.
The fields that can be configured are described below:
Parameter Description
Class Map Name
Figure 7-12 Class Map Window
Enter the class map name here. This name can be up to 32 characters long.
71
Page 77
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Multiple Match Criteria
Select the multiple match criteria option here. Options to choose from are Match All and Match Any.
Click the Apply button to accept the changes made. Click the Match button to configure the specific entry. Click the Delete button to remove the specific entry.
After clicking the Match button, the following page will be available.
Figure 7-13 Class Map (Match) Window
The fields that can be configured are described below:
Parameter Description
None Specify Access List Name
Select this option to match nothing to this class map. Select the option to match something to this class map. Select and enter the access list name that will be matched with this
class map here. This name can be up to 32 characters long.
CoS List
Select and enter the CoS list value that will be matched with this class map here. This value must be between 0 and 7. Tick the Inner option to match the inner most CoS of QinQ packets on a Layer 2 class of service (CoS) marking.
DSCP List
Select and enter the DSCP list value that will be matched with this class map here. This value must be between 0 and 63. Tick the IPv4 only option to match IPv4 packets only. If not specified, the match is for both IPv4 and IPv6 packets.
Precedence List
Select and enter the precedence list value that will be matched with this class map here. This value must be between 0 and 7. Tick the IPv6 only option to match IPv6 packets only. If not specified, the match is for both IPv4 and IPv6 packets. For IPv6 packets, the precedence is most three significant bits of traffic class of IPv6 header.
Protocol Name
Select the protocol name that will be matched with the class map here. Options to choose from are ARP, BGP, DHCP, DNS, EGP, FTP, IPv4, IPv6, NetBIOS, NFC, NTP, OSPF, PPPOE, RIP, RSTP, SSH, Telnet, and TFTP.
VLAN List
Click the Apply button to accept the changes made. Click the <<Back button to discard the changes made and return to the previous page.
Select and enter the VLAN list value that will be matc hed with the cl ass map here. This value must be between 1 and 4094. Tick the Inner option to match the inner-most VLAN ID in an 802.1Q double tag ged frame.
72
Page 78
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
services code point (DSCP) value and transmits the packet with the
Aggregate Policer
On this page, users can view and configure the aggregate policer settings. To view the following window, click QoS > Advanced Settings > Aggregate Policer, as shown b elow:
Figure 7-14 Aggregate Policer (Single Rate Setting) Window
The fields that can be configured are described below:
Parameter Description
Aggregate Policer Name Average Rate Enter the average rate value here. This value must be between 0 and
Normal Burst Size Enter the normal burst size value here. This value must be between 0
Maximum Burst Size
Confirm Action
Enter the aggregate policer’s name here.
10000000 kbps.
and 16384 Kbytes. Enter the maximum burst size value here. This value must be between
0 and 16384 Kbytes. Select the confirm action here. The confirm action specifies the action
to take on green color packets. If the confirm action is not specified, the default action is to Transmit. Options to choose from are Drop, Set-DSCP-Transmit, Set-1P-Transmit, Transmit, and Set-DSCP-1P.
When selecting the Drop option, the packet will be dropped. When selecting the Set-DSCP-Transmit option, enter the IP DSCP
value in the space provided. This value sets the IP differentiated services code point (DSCP) value and transmits the packet with the new IP DSCP value.
When selecting the Set-1P-Transmit option, enter the 1P transmit value in the space provided. This value sets the 802.1p value and transmits the packet with the new value.
When selecting the Set-DSCP-1P option, enter the IP DSCP and 1P transmit values in the spaces provided.
When selecting the Transmit option, packets will be transmitted unaltered.
Exceed Action
Select the exceed action here. The exceed action specifies the action to take on packets that exceed the rate limit. For a two rate policer, if the exceed action is not specified, the default action is Drop. Options to choose from are Drop, Set-DSCP-Transmit, Set-1P-Transmit, Transmit, and Set-DSCP-1P.
When selecting the Drop option, the packet will be dropped. When selecting the Set-DSCP-Transmit option, enter the IP DSCP
value in the space provided. This value sets the IP differentiated
73
Page 79
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
new IP DSCP value.
When selecting the Set-1P-Transmit option, enter the 1P transmit value in the space provided. This value sets the 802.1p value and transmits the packet with the new value.
When selecting the Set-DSCP-1P option, enter the IP DSCP and 1P transmit values in the spaces provided.
When selecting the Transmit option, packets will be transmitted unaltered.
Violate Action
Select the violate action here. The violate action specifies the action to take on packets that violate the normal and maximum burst sizes for singe rate policing. It specifies the action to take for those packets that did not conform to both CIR and PIR. For a single rate policer, if the violate action is not specified, it will create a single-rate two-color policer. For a two-rate policer, if the violation action is not specified, the default action is equal to the exceed action. Options to choose from are Drop, Set-DSCP-Transmit, Set-1P-Transmit, Transmit, and Set- DSCP-1P.
When selecting the Drop option, the packet will be dropped. When selecting the Set-DSCP-Transmit option, enter the IP DSCP
value in the space provided. This value sets the IP differentiated services code point (DSCP) value and transmits the packet with the new IP DSCP value.
When selecting the Set-1P-Transmit option, enter the 1P transmit value in the space provided. This value sets the 802.1p value and transmits the packet with the new value.
When selecting the Set-DSCP-1P option, enter the IP DSCP and 1P transmit values in the spaces provided.
When selecting the Transmit option, packets will be transmitted unaltered.
Color Aware Select the color aware option here. Options to choose from are None
and Enabled. When color aware is not specified, the policer works in the color blind mode. When color awar e is enabled, the policer works in the color aware mode.
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
After selecting the Two Rate Setting tab option, at the top of the page, the following page will be available.
Figure 7-15 Aggregate Policer (Two Rate Setting) Window
The fields that can be configured are described below:
74
Page 80
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
default action is equal to the exceed action. Options to choose from
Parameter Description
Aggregate Policer Name CIR
Enter the aggregate policer’s name here. Enter the Committed Information Rate (CIR) value here. This value
must be between 0 and 10000000 kbps. The committed packet rate is the first token bucket for the two-rate metering.
Confirm Burst Enter the confirm burst value here. This value must be between 0 and
16384 Kbytes. The confirm burst value specifies the burst size for the
first token bucket in kbps.
PIR
Enter the Peak information Rate (PIR) value here. This value must be between 0 and 10000000 kbps. The peak information rate is the second token bucket for the two-rate metering.
Peak Burst
Enter the peak burst value here. This value must be between 0 and 16384 Kbytes. The peak burst value is the burst size for the second token bucket in kilobytes.
Confirm Action
Select the confirm action here. The confirm action specifies the action to take on green color packets. If the confirm action is not specified, the default action is to Transmit. Options to choose from are Drop, Set-DSCP-Transmit, Set-1P-Transmit, Transmit, and Set-DSCP-1P.
When selecting the Drop option, the packet will be dropped. When selecting the Set-DSCP-Transmit option, enter the IP DSCP
value in the space provided. This value sets the IP differentiated services code point (DSCP) value and transmits the packet with the new IP DSCP value.
When selecting the Set-1P-Transmit option, enter the 1P transmit value in the space provided. This value sets the 802.1p value and transmits the packet with the new value.
When selecting the Set-DSCP-1P option, enter the IP DSCP and 1P transmit values in the spaces provided.
When selecting the Transmit option, packets will be transmitted unaltered.
Exceed Action
Violate Action
Select the exceed action here. The exceed action specifies the action to take on packets that exceed the rate limit. For a two rate policer, if the exceed action is not specified, the default action is Drop. Options to choose from are Drop, Set-DSCP-Transmit, Set-1P-Transmit, Transmit, and Set-DSCP-1P.
When selecting the Drop option, the packet will be dropped. When selecting the Set-DSCP-Transmit option, enter the IP DSCP
value in the space provided. This value sets the IP differentiated services code point (DSCP) value and transmits the packet with the new IP DSCP value.
When selecting the Set-1P-Transmit option, enter the 1P transmit value in the space provided. This value sets the 802.1p value and transmits the packet with the new value.
When selecting the Set-DSCP-1P option, enter the IP DSCP and 1P transmit values in the spaces provided.
When selecting the Transmit option, packets will be transmitted unaltered.
Select the violate action here. The violate action specifies the action to take on packets that violate the normal and maximum burst sizes for singe rate policing. It specifies the action to take for those packets that did not conform to both CIR and PIR. For a single rate policer, if the violate action is not specified, it will create a single-rate two-color policer. For a two-rate policer, if the violation action is not specified, the
75
Page 81
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
are Drop, Set-DSCP-Transmit, Set-1P-Transmit, Transmit, and Set-
DSCP-1P.
When selecting the Drop option, the packet will be dropped. When selecting the Set-DSCP-Transmit option, enter the IP DSCP
value in the space provided. This value sets the IP differentiated services code point (DSCP) value and transmits the packet with the new IP DSCP value.
When selecting the Set-1P-Transmit option, enter the 1P transmit value in the space provided. This value sets the 802.1p value and transmits the packet with the new value.
When selecting the Set-DSCP-1P option, enter the IP DSCP and 1P transmit values in the spaces provided.
When selecting the Transmit option, packets will be transmitted unaltered.
Color Aware Select the color aware option here. Options to choose from are None
and Enabled. When color aware is not specified, the policer works in the color blind mode. When color awar e is enabled, the policer works in the color aware mode.
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
Policy Map
On this page, users can view and configure the policy map settings. To view the following window, click QoS > Advanced Settings > Policy Map, as shown below:
The fields that can be configured for Create/Delete Policy Map are described below:
Figure 7-16 Policy Map Window
Parameter Description
Policy Map Name
Click the Apply button to accept the changes made.
The fields that can be configured for Traffic Policy are described below:
Parameter Description
Policy Map Name
Enter the policy map’s name here that will be created or deleted. This name can be up to 32 characters long.
Enter the policy map’s name here. This name can be up to 32
76
Page 82
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
characters long.
Class Map Name
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
Policy Binding
On this page, users can view and configure the policy binding settings. To view the follow ing window, click QoS > Advanced Settings > Policy Binding, as shown below:
Enter the class map’s name here. This name can be up to 32 characters long.
Figure 7-17 Policy Binding Window
The fields that can be configured are described below:
Parameter Description
From Port ~ To Port Direction Select the direction option here. Options to choose from are Input and
Policy Map Name
Click the Apply button to accept the changes made.
Select the range of ports that will be used for this conf i gurati on her e.
Output. Input specified ingress traffic and output specifies egress traffic.
Enter the policy map name here. This name can be up to 32 characters long. Select the None option to not tie a policy map to this entry.
77
Page 83
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
8. Access Control List (ACL)
ACL Access List ACL Interface Access Group ACL VLAN Access Map ACL VLAN Filter
ACL Access List
On this page, users can view and configure the ACL access list settings. To view the following window, click ACL > ACL Access List, as shown below:
The fields that can be configured are described below:
Parameter Description
ACL Type Select the ACL profile type to find here. Options to choose from are IP
ACL Name
Click the Find button to locate a specific entry based on the information entered. Click the Add AC L button to create a new ACL profile. Click the Clear All Counter button to clear all the counter information displayed. Click the Clear Counter button to clear the counter information for the rule displayed. Click the Add Rule button to create an ACL rule for the ACL profile selected.
Standard IP ACL
After clicking the Add AC L button, users can create a new ACL profile, as shown below:
Figure 8-1 ACL Access List Window
ACL, I P v 6 AC L, MAC AC L, and Expert ACL.
Enter the ACL name here. This name can be up to 32 characters long.
Figure 8-2 Standard IP ACL (Add Profile) Window
78
Page 84
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
The fields that can be configured are described below:
Parameter Description
ACL Type Select the ACL profile type here. Options to choose from are Standard
IP ACL, Extend IP ACL, Standard IPv6 ACL, Extend IPv6 ACL, Extend MAC ACL, and Expert ACL.
ACL Name
Enter the ACL profile’s name here. This name can be up to 32 characters long.
Click the Apply button to create the new ACL profile.
After creating a Standard IP ACL profile, the ne wly created Standard IP ACL profile will be displayed in the ACL profile display table, as shown below:
Figure 8-3 Standard IP ACL (Main) Window
Click the Edit button to re-configure the specific ACL profile. Click the Delete button to remove the specific ACL profile.
To add an ACL rule in the ACL profile, select it (the ACL profile will toggle to the bold font), and click on the Add Rule button.
Figure 8-4 Standard IP ACL (Selected) Window
After selecting the ACL profile and clicking the Add Rule button, users can configure the new ACL rule, in the selected ACL profile, as shown below:
79
Page 85
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 8-5 Standard IP ACL (Add Rule) Window
The fields that can be configured are described below:
Parameter Description
Rule Number Enter the ACL rule number here. This value must be between 1 and
65535. If this value is not specified, the system will automatically
generate an ACL rule number for this entry.
Action
Select the action that this rule will take here. Options to choose from are Permit and Deny.
Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Click the Apply button to accept the changes made. Click the <<Back button to discard the changes made and return to the previous page.
To enable the Counter State option or to enter a Remark for the profile, click the Edit button, next to the specific ACL profile (found in the ACL profile table).
80
Page 86
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 8-6 Standard IP ACL (Counter State Enabled) Window
The fields that can be configured are described below:
Parameter Description
Start Sequence No. Stop Counter State Remark
Click the Apply button to accept the changes made. Click the Delete button to remove the specific entry.
To view the list of rules, that are associated with an ACL profile, select the ACL profile (found in the ACL profile table). The rule of ACL rules, connected to the selected ACL profile, will be displayed in the ACL rule table, as shown below:
Enter the start sequence number here. Enter the stop sequence number here. Select to enable or disable the counter state option here. Enter an optional remark that will be associated with th is prof ile here.
Click the Delete button to remove the specific ACL rule.
Extend IP ACL
After clicking the Add AC L button, users can create a new ACL profile, as shown below:
Figure 8-7 Standard IP ACL (Rule Display) Window
81
Page 87
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 8-8 Extend IP ACL (Add Profile) Window
The fields that can be configured are des c ribed be lo w:
Parameter Description
ACL Type Select the ACL profile type here. Options to choose from are Standard
IP ACL, Extend IP ACL, Standard IPv6 ACL, Extend IPv6 ACL, Extend MAC ACL, and Expert ACL.
ACL Name
Enter the ACL profile’s name here. This name can be up to 32 characters long.
Click the Apply button to create the new ACL profile.
After creating an Extend IP ACL profile, the newly created Extend I P ACL profile will be displayed in the ACL profile display table, as shown below:
Figure 8-9 Extend IP ACL (Main) Window
Click the Edit button to re-configure the specific ACL profile. Click the Delete button to remove the specific ACL profile.
To add an ACL rule in the ACL profile, select it (the ACL profile will toggle to the bold font), and click on the Add Rule button.
82
Page 88
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 8-10 Extend IP ACL (Selected) Window
After selecting the ACL profile and clicking the Add Rule button, users can configure the new ACL rule, in the selected ACL profile, as shown below:
This is a dynamic page. Every selection made in the Protocol Type option will change the bottom part of this page.
The fixed fields that can be configured are described below:
Parameter Description
Rule Number Enter the ACL rule number here. This value must be between 1 and
Action
Figure 8-11 Extend IP ACL (Add Rule) Window
65535. If this value is not specified, the system will automatically
generate an ACL rule number for this entry. Select the action that this rule will take here. Options to choose from
are Permit and Deny.
83
Page 89
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
selected port number will be used. When selecting the > opt ion, al l
Protocol Type Select the protocol type option here. Options to choose from are TCP,
UDP, ICMP, EIGRP, ESP, GRE, IGMP, OSPF, PIM, VRRP, IP-in-IP, PCP, Protocol ID, and None.
After selecting the TCP option as the Protocol Type, the following page and parameters will be available, as shown below:
Figure 8-12 Extend IP ACL (Add Rule) TCP Window
The dynamic fields that can be configured are described below:
Parameter Description
Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Source Port
Select and enter the source port value here. Options to choose from are =, >, <, , and Range. When selecting the = option, the specific
84
Page 90
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
ports greater than the selected port, will be used. When selecting the <
option, all ports smaller than the selected port, will be used. W hen selecting the option, all ports, excluding the selected port, will be used. When selecting the Range option, the start port number and end port number selected, of the range, will be used. Alternatively, the port number(s) can manually be entered in the space(s) provided, if the port number(s) is/are not available in the drop-down list.
Destination Port
Select and enter the destination port value here. Options to choose from are =, >, <, , and Range. When selecting the = option, the specific selected port number will be used. When selecting the > option, all ports greater than the selected port, will be used. When selecting the < option, all ports smaller than the selected port, will be used. When selecting the option, all ports, excluding the selected port, will be used. When selecting the Range option, the start port number and end port number selected, of the range, will be used. Alternatively, the port number(s) can manually be entered in the space(s) provided, if the port number(s) is/are not available in the drop-down list.
TCP Flag
Tick the appropriate TCP flag option to include the flag in this rule. Options to choose from are ack, fin, psh, rst, syn, and urg.
IP Precedence
Select the IP precedence value used here. Options to choose from are
0 (routine), 1 (priority), 2, (imm ediat e), 3 (flash), 4 (flash-override), 5 (critical), 6 (internet), and 7 (network). After selecting the IP
precedence value, select the Type-of-Service (ToS) value that will be used here. Options to choose from are 0 (normal), 1 (min-monetary-
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min­delay), 9, 10, 11, 12, 13, 14, and 15.
ToS Select the Type of Service option here. Options to choose from are 0
to 15.
DSCP
Select or enter the DSCP value used here. This value must be between 0 and 63.
Time Range
Enter the time profile name that will be associated with this ACL rule, here.
After selecting the UDP option as t he Protocol Type, the f ol lo wing pa ge an d p ar a meters will be avai lab le, as shown below:
85
Page 91
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
from are =, >, <, , and Range. When selecting the = option, the
Figure 8-13 Extend IP ACL (Add Rule) UDP Window
The dynamic fields that can be configured are described below:
Parameter Description
Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Source Port
Select and enter the source port value here. Options to choose from are =, >, <, , and Range. When selecting the = option, the specific selected port number will be used. When selecting the > opti on, al l ports greater than the selected port, will be used. When selecting the < option, all ports smaller than the selected port, will be used. When selecting the option, all ports, excluding the selected port, will be used. When selecting the Range option, the start port number and end port number selected, of the range, will be used. Alternatively, the port number(s) can manually be entered in the space(s) provided, if the port number(s) is/are not available in the drop-down list.
Destination Port
Select and enter the destination port value here. Options to choose
86
Page 92
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
specific selected port number will be used. When selecting the >
rule. When the Host option is selected, enter the source host’s IP
option, all ports greater than the selected port, will be used. When selecting the < option, all ports smaller than the selected port, will be used. When selecting the option, all ports, excluding the selected port, will be used. When selecting the Range option, the start port number and end port number selected, of the range, will be used. Alternatively, the port number(s) can manually be entered in the space(s) provided, if the port number(s) is/are not available in the drop-down list.
IP Precedence
Select the IP precedence value used here. Options to choose from are
0 (routine), 1 (priority), 2, (imm ediat e), 3 (flash), 4 (flash-override), 5 (critical), 6 (internet), and 7 (network). After selecting the IP
precedence value, select the Type-of-Service (ToS) value that will be used here. Options to choose from are 0 (normal), 1 (min-monetary-
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min­delay), 9, 10, 11, 12, 13, 14, and 15.
ToS Select the Type of Service option here. Options to choose from are 0
to 15.
DSCP
Select or enter the DSCP value used here. This value must be between 0 and 63.
Time Range
Enter the time profile name that will be associated with this ACL rule, here.
After selecting the ICMP option as the Protocol Type, the following page and parameters will be available, as shown below:
Figure 8-14 Extend IP ACL (Add Rule) ICMP Window
The dynamic fields that can be configured are described below:
Parameter Description
Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this
87
Page 93
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
address here. When the IP option is selected, the Wildcard option will
also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Specify ICMP Message Type
Select the ICMP message type used here.
ICMP Message Type When the ICMP Message Type is not selected, enter the ICMP
Message Type numerical value used here. When the ICMP Message
Type is selected, this numerical value will automatically be entered.
Message Code When the ICMP Message Type is not selected, enter the Message
Code numerical value used here. When the ICMP Message Type is selected, this numerical value will automatically be entered.
IP Precedence
Select the IP precedence value used here. Options to choose from are
0 (routine), 1 (priority), 2, (imm ediat e), 3 (flash), 4 (flash-override), 5 (critical), 6 (internet), and 7 (network). After selecting the IP
precedence value, select the Type-of-Service (ToS) value that will be used here. Options to choose from are 0 (normal), 1 (min-monetary-
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min­delay), 9, 10, 11, 12, 13, 14, and 15.
ToS Select the Type of Service option here. Options to choose from are 0
to 15.
DSCP
Select or enter the DSCP value used here. This value must be between 0 and 63.
Time Range
Enter the time profile name that will be associated with this ACL rule, here.
After selecting the EIGRP option as the Protocol Type, the following page and parameters will be available, as shown below:
88
Page 94
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 8-15 Extend IP ACL (Add Rule) EIGRP Window
The dynamic fields that can be configured are described below:
Parameter Description
Fragments Select the Fragments option to include packet fragment filtering. Source
Destination
IP Precedence
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Select the IP precedence value used here. Options to choose from are
0 (routine), 1 (priority), 2, (immed iate) , 3 (flash), 4 (flash-override), 5 (critical), 6 (internet), and 7 (network). After selecting the IP
precedence value, select the Type-of-Service (ToS) value that will be used here. Options to choose from are 0 (normal), 1 (min-monetary-
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min­delay), 9, 10, 11, 12, 13, 14, and 15.
ToS Select the Type of Service option here. Options to choose from are 0
to 15.
DSCP
Select or enter the DSCP value used here. This value must be between 0 and 63.
Time Range
Enter the time profile name that will be associated with this ACL rule, here.
After selecting the ESP option as the Protocol Type, the following page and parameters will be available, as shown below:
89
Page 95
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
Figure 8-16 Extend IP ACL (Add Rule) ESP Window
The dynamic fields that can be configured are described below:
Parameter Description
Fragments Select the Fragments option to include packet fragment filtering. Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
IP Precedence
Select the IP precedence value used here. Options to choose from are
0 (routine), 1 (priority), 2, (imm ediat e), 3 (flash), 4 (flash-override), 5 (critical), 6 (internet), and 7 (network). After selecting the IP
precedence value, select the Type-of-Service (ToS) value that will be used here. Options to choose from are 0 (normal), 1 (min-monetary-
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min­delay), 9, 10, 11, 12, 13, 14, and 15.
ToS Select the Type of Service option here. Options to choose from are 0
DSCP
Time Range
to 15. Select or enter the DSCP value used here. This value must be
between 0 and 63. Enter the time profile name that will be associated with this ACL rule,
here.
90
Page 96
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
After selecting the GRE option as the Protocol Type, the foll o wing pag e an d p ar a meters will be available , as shown below:
Figure 8-17 Extend IP ACL (Add Rule) GRE Window
The dynamic fields that can be configured are described below:
Parameter Description
Fragments Select the Fragments option to include packet fragment filtering. Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
IP Precedence
Select the IP precedence value used here. Options to choose from are
0 (routine), 1 (priority), 2, (immediate), 3 (flash), 4 (flash-override), 5 (critical), 6 (internet), and 7 (network). After selecting the IP
precedence value, select the Type-of-Service (ToS) value that will be used here. Options to choose from are 0 (normal), 1 (min-monetary-
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min­delay), 9, 10, 11, 12, 13, 14, and 15.
ToS Select the Type of Service option here. Options to choose from are 0
DSCP
Time Range
to 15. Select or enter the DSCP value used here. This value must be
between 0 and 63. Enter the time profile name that will be associated with this ACL rule,
91
Page 97
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
here.
After selecting the IGMP option as the Protocol Type, the following page and parameters will be available, as shown below:
Figure 8-18 Extend IP ACL (Add Rule) IGMP Window
The dynamic fields that can be configured are described below:
Parameter Description
Fragments Select the Fragments option to include packet fragment filtering. Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
IP Precedence
Select the IP precedence value used here. Options to choose from are
0 (routine), 1 (priority), 2, (imm ediat e), 3 (flash), 4 (flash-override), 5 (critical), 6 (internet), and 7 (network). After selecting the IP
precedence value, select the Type-of-Service (ToS) value that will be used here. Options to choose from are 0 (normal), 1 (min-monetary-
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min­delay), 9, 10, 11, 12, 13, 14, and 15.
ToS Select the Type of Service option here. Options to choose from are 0
to 15.
92
Page 98
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min-
DSCP
Select or enter the DSCP value used here. This value must be between 0 and 63.
Time Range
Enter the time profile name that will be associated with this ACL rule, here.
After selecting the OSPF option as the Protocol Type, the following page and parameters will be available, as shown below:
Figure 8-19 Extend IP ACL (Add Rule) OSPF Window
The dynamic fields that can be configured are described below:
Parameter Description
Fragments Select the Fragments option to include packet fragment filtering. Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
IP Precedence
Select the IP precedence value used here. Options to choose from are
0 (routine), 1 (priority), 2, (imm ediat e), 3 (flash), 4 (flash-override), 5 (critical), 6 (internet), and 7 (network). After selecting the IP
precedence value, select the Type-of-Service (ToS) value that will be used here. Options to choose from are 0 (normal), 1 (min-monetary-
93
Page 99
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
delay), 9, 10, 11, 12, 13, 14, and 15.
5 (critical), 6 (internet), and 7 (network). After selecting the IP
ToS Select the Type of Service option here. Options to choose from are 0
to 15.
DSCP
Select or enter the DSCP value used here. This value must be between 0 and 63.
Time Range
Enter the time profile name that will be associated with this ACL rule, here.
After selecting the PIM option as the Protocol Type, the following page and parameters will be available, as shown below:
Figure 8-20 Extend IP ACL (Add Rule) PIM Window
The dynamic fields that can be configured are described below:
Parameter Description
Fragments Select the Fragments option to include packet fragment filtering. Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
IP Precedence
Select the IP precedence value used here. Options to choose from are 0 (routine), 1 (priority), 2, (immed iate) , 3 (flash), 4 (flash-override),
94
Page 100
DXS-3600 Series Layer 3 Managed 10Gigabit Ethernet Switch Web UI Reference Guide
precedence value, select the Type-of-Service (ToS) value that will be
used here. Options to choose from are 0 (normal), 1 (min-monetary-
cost), 2 (max-reliability), 3, 4 (max-throughput), 5, 6, 7, 8 (min­delay), 9, 10, 11, 12, 13, 14, and 15.
ToS Select the Type of Service option here. Options to choose from are 0
to 15.
DSCP
Select or enter the DSCP value used here. This value must be between 0 and 63.
Time Range
Enter the time profile name that will be associated with this ACL rule, here.
After selecting the VRRP option as the Protocol Type, the following page and parameters will be available, as shown below:
Figure 8-21 Extend IP ACL (Add Rule) VRRP Window
The dynamic fields that can be configured are described below:
Parameter Description
Fragments Select the Fragments option to include packet fragment filtering. Source
Select and enter the source information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any source traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the source host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of source IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
Destination
Select and enter the destination information here. Options to choose from are Any, Host, IP, and Wildcard. When the Any option is selected, any destination traffic will be evaluated according to the conditions of this rule. When the Host option is selected, enter the destination host’s IP address here. When the IP option is selected, the Wildcard option will also be available. Enter the group of destination IP addresses by using a wildcard bitmap. The bit corresponding to the bit value 1 will be ignored. The bit corresponding to the bit value 0 will be checked.
95
Loading...