Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and
its web site without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such
changes have been made.
The hardware, firmware, or software described in this document is subject to change without notice.
IN NO EVENT SHALL ENTERASYS NETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL, OR
CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF
OR RELATED TO THIS DOCUMENT, WEB SITE, OR THE INFORMATION CONTAINED IN THEM, EVEN IF
ENTERASYS NETWORKS HAS BEEN ADVISED OF, KNEW OF, OR SHOULD HAVE KNOWN OF, THE POSSIBILITY OF
SUCH DAMAGES.
Enterasys Networks, Inc.
50 Minuteman Road
Andover, MA 01810
2012 Enterasys Networks, Inc. All rights reserved.
Part Number: 9034662-02 October 2012
ENTERASYS, ENTERASYS NETWORKS, ENTERASYS SECURE NETWORKS, NETSIGHT, ENTERASYS NETSIGHT, and any
logos associated therewith, are trademarks or registered trademarks of Enterasys Networks, Inc., in the United States and/or
other countries. For a complete list of Enterasys trademarks, see http://www.enterasys.com/company/trademarks.aspx.
All other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies.
Enterasys Networks, Inc. Firmware License Agreement
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT,
CAREFULLY READ THIS LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between the end user (“You”) and Enterasys Networks, Inc., on behalf of itself
and its Affiliates (as hereinafter defined) (“Enterasys”) that sets forth Your rights and obligations with respect to the Enterasys
software program/firmware (including any accompanying documentation, hardware or media) (“Program”) in the package
and prevails over any additional, conflicting or inconsistent terms and conditions appearing on any purchase order or other
document submitted by You. “Affiliate” means any person, partnership, corporation, limited liability company, other form of
enterprise that directly or indirectly through one or more intermediaries, controls, or is controlled by, or is under common
control with the party specified. This Agreement constitutes the entire understanding between the parties, with respect to the
subject matter of this Agreement. The Program may be contained in firmware, chips or other media.
BY INSTALLING OR OTHERWISE USING THE PROGRAM, YOU REPRESENT THAT YOU ARE AUTHORIZED TO ACCEPT
THESE TERMS ON BEHALF OF THE END USER (IF THE END USER IS AN ENTITY ON WHOSE BEHALF YOU ARE
AUTHORIZED TO ACT, “YOU” AND “YOUR” SHALL BE DEEMED TO REFER TO SUCH ENTITY) AND THAT YOU
AGREE THAT YOU ARE BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES, AMONG OTHER
PROVISIONS, THE LICENSE, THE DISCLAIMER OF WARRANTY AND THE LIMITATION OF LIABILITY. IF YOU DO NOT
AGREE TO THE TERMS OF THIS AGREEMENT OR ARE NOT AUTHORIZED TO ENTER INTO THIS AGREEMENT,
ENTERASYS IS UNWILLING TO LICENSE THE PROGRAM TO YOU AND YOU AGREE TO RETURN THE UNOPENED
PRODUCT TO ENTERASYS OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT
FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT ENTERASYS NETWORKS, LEGAL
DEPARTMENT AT (978) 684-1000.
You and Enterasys agree as follows:
1.LICENSE. You have the non-exclusive and non-transferable right to use only the one (1) copy of the Program provided in
this package subject to the terms and conditions of this Agreement.
2.RESTRICTIONS. Except as otherwise authorized in writing by Enterasys, You may not, nor may You permit any third
party to:
(a) Reverse engineer, decompile, disassemble or modify the Program, in whole or in part, including for reasons of error
correction or interoperability, except to the extent expressly permitted by applicable law and to the extent the parties
shall not be permitted by that applicable law, such rights are expressly excluded. Information necessary to achieve
interoperability or correct errors is available from Enterasys upon request and upon payment of Enterasys’ applicable
fee.
(b) Incorporate the Program in whole or in part, in any other product or create derivative works based on the Program, in
whole or in part.
(c) Publish, disclose, copy reproduce or transmit the Program, in whole or in part.
(d) Assign, sell, license, sublicense, rent, lease, encumber by way of security interest, pledge or otherwise transfer the
Program, in whole or in part.
(e) Remove any copyright, trademark, proprietary rights, disclaimer or warning notice included on or embedded in any
part of the Program.
3.APPLICABLE LAW. This Agreement shall be interpreted and governed under the laws and in the state and federal courts
of the Commonwealth of Massachusetts without regard to its conflicts of laws provisions. You accept the personal jurisdiction
and venue of the Commonwealth of Massachusetts courts. None of the 1980 United Nations Convention on the Limitation Period
in the International Sale of Goods, and the Uniform Computer Information Transactions Act shall apply to this Agreement.
4.EXPORT RESTRICTIONS. You understand that Enterasys and its Affiliates are subject to regulation by agencies of the
U.S. Government, including the U.S. Department of Commerce, which
to certain countries, unless a license to export the product is obtained from the U.S. Government or an exception from obtaining
such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export
Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the Program for
civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export
Administration Regulations, in addition to the restriction on transfer set forth in Section 1 or 2 of this Agreement, You agree not
to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country
Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Cambodia, Cuba, Georgia, Iraq, Kazakhstan, Laos, Libya, Macau,
prohibit export or diversion of certain technical products
ii
Moldova, Mongolia, North Korea, the People’s Republic of China, Russia, Tajikistan, Turkmenistan, Ukraine, Uzbekistan,
Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or
E:2 (as defined herein) the direct product of the Program or the technology, if such foreign produced direct product is subject to
national security controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a
complete plant or any major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a
major component thereof, if such foreign produced direct product is subject to national security controls as identified on the
U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.
5.UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Program (i) was developed solely at private
expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section 52.227-19 (a)
through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in all respects is
proprietary data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Program is considered
commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or
disclosure by the U.S. Government is subject to restrictions set forth herein.
6.DISCLAIMER OF WARRANTY. EXCEPT FOR THOSE WARRANTIES EXPRESSLY PROVIDED TO YOU IN WRITING
BY ENTERASYS, ENTERASYS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR
PURPOSE, TITLE AND NON-INFRINGEMENT WITH RESPECT TO THE PROGRAM. IF IMPLIED WARRANTIES MAY NOT
BE DISCLAIMED BY APPLICABLE LAW, THEN ANY IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THIRTY
(30) DAYS AFTER DELIVERY OF THE PROGRAM TO YOU.
7.LIMITATION OF LIABILITY. IN NO EVENT SHALL ENTERASYS OR ITS SUPPLIERS BE LIABLE FOR ANY
DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS,
BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR
RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, EVEN IF
ENTERASYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS FOREGOING LIMITATION SHALL
APPLY REGARDLESS OF THE CAUSE OF ACTION UNDER WHICH DAMAGES ARE SOUGHT.
THE CUMULATIVE LIABILITY OF ENTERASYS TO YOU FOR ALL CLAIMS RELATING TO THE PROGRAM, IN
CONTRACT, TORT OR OTHERWISE, SHALL NOT EXCEED THE TOTAL AMOUNT OF FEES PAID TO ENTERASYS BY
YOU FOR THE RIGHTS GRANTED HEREIN.
8.AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of critical
value to Enterasys, and, accordingly, You hereby agree to maintain complete books, records and accounts showing (i) license
fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys and its authorized
representatives, upon reasonable notice, the right to audit and examine during Your normal business hours, Your books, records,
accounts and hardware devices upon which the Program may be deployed to verify compliance with this Agreement, including
the verification of the license fees due and paid Enterasys and the use, copying and deployment of the Program. Enterasys’ right
of examination shall be exercised reasonably, in good faith and in a manner calculated to not unreasonably interfere with Your
business. In the event such audit discovers non-compliance with this Agreement, including copies of the Program made, used
or deployed in breach of this Agr
the right, to be exercised in its sole discretion and without prior notice, to terminate this license, effective immediately, for failure
to comply with this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return
to Enterasys the Program and all copies of the Program.
9.OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the Program
constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement reasonable
security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to the Program shall
remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved to Enterasys.
10. ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You may cause
Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys may be entitled
to seek timely injunctive relief to protect Enterasys’ rights under this Agreement in addition to any and all remedies available at
law.
11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations under this
Agreement, except that You may assign this Agreement to any person or entity which acquires substantially all of Your stock
assets. Enterasys may assign this Agreement in its sole discretion. This Agreement shall be binding upon and inure to the benefit
of the parties, their legal representatives, permitted transferees, successors and assigns as permitted by this Agreement. Any
attempted assignment, transfer or sublicense in violation of the terms of this Agreement shall be void and a breach of this
Agreement.
12. WAIVER. A waiver by Enterasys of a breach of any of the terms and conditions of this Agreement must be in writing and
will not be construed as a waiver of any subsequent breach of such term or condition. Enterasys’ failure to enforce a term upon
Your breach of such term shall not be construed as a waiver of Your breach or prevent enforcement on any other occasion.
eement, You shall promptly pay to Enterasys the appropriate license fees. Enterasys reserves
iii
13. SEVERABILITY. In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the validity,
legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired thereby, and that
provision shall be reformed, construed and enforced to the maximum extent permissible. Any such invalidity, illegality, or
unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such provision in any other
jurisdiction.
14. TERMINATION. Enterasys may terminate this Agreement immediately upon Your breach of any of the terms and
conditions of this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return
to Enterasys the Program and all copies of the Program.
iv
v
Contents
Chapter 1: Setting Up a Switch for the First Time
Before You Begin ...........................................................................................................................................1-1
Connecting to the Switch .............................. ... ... ... ... .... ... ... ... .... ... ... ... ............................................................1-2
Downloading New Firmware ........................................................................................................................... 1-3
Deleting a Backup Image File .................................................................................................................. 1-5
Saving the Configuration and Connecting Devices ........................................................................................ 1-7
Configuring a Stack of New Switches ............................................................................................................. 1-8
Where to Go Next ...........................................................................................................................................1-9
Getting Help ..................................................................................................................................................1-10
Downloading Firmware via the Serial Port ................................................................................................... 1-10
Chapter 2: Configuring Switches in a Stack
About Switch Operation in a Stack ................................................................................................................. 2-1
Creating a Virtual Switch Configuration .......................................................................................................... 2-4
Example ...................................................................................................................................................2-5
Considerations About Using “clear config” in a Stack ............................... ... ... ... .... ... ... ... .... ...........................2-5
Logging In ................................................................................................................................................3-3
Using a Default User Account ............................................................................................................3-3
Using an Administratively Configured User Account..........................................................................3-3
Clearing and Closing the CLI ................................................................................................................... 3-3
Navigating the Command Line Interface ..................................................................................................3-3
Getting Help with CLI Syntax..............................................................................................................3-3
DHCP Server .........................................................................................................................................4-16
MAC Address Settings .................................................................................................................................4-24
Age Time ................................................................................................................................................4-24
Limiting MAC Addresses to Specific VLANs ..........................................................................................4-25
Port Configuration Overview ..................... ......................................................................................................8-1
Port String Syntax Used in the CLI ........... ... ... ... .... ... ... ... .... ... ... ... .... ... ... ..................................................8-1
Console Port Settings .............................................................................................................................. 8-2
Port Name or Alias .................................... ... .... ... ... ....................................... ... ... .... ... ... .....................8-3
Auto-Negotiation and Advertised Ability .............................................................................................8-4
Port Speed and Duplex Mode ................................... .... ... ... ... .... ... ... ... ... .... ... ... ..................................8-4
Protected Port Mode...........................................................................................................................8-6
Displaying Port Status ..............................................................................................................................8-6
vii
Displaying Cable Status .....................................................................................................................8-7
Configuring SFP Ports for 100BASE-FX ..................................................................................................8-7
Configuring Port Link Flap Detection ..............................................................................................................8-8
Basic Link Flap Detection Configuration .................................................................................................. 8-9
Example .................................................................................................................................................8-10
Link Flap Detection Display Commands ................................................................................................8-11
Mirroring Features ..................................................................................................................................8-12
Configuring Port Mirroring ................................................................................................................8-13
Remote Port Mirroring ............................................................................................................................8-13
Configuring Remote Port Mirroring...................................................................................................8-14
Configuring SMON MIB Port Mirroring ................................................................................................... 8-15
Example of a VLAN Switch in Operation .................................................................................................. 9-5
VLAN Support on Enterasys Switches ...........................................................................................................9-6
Maximum Active VLANs ...........................................................................................................................9-6
Configurable Range .................................................................................................................................9-6
Terms and Definitions ................................................................................................................................... 9-14
Enabling RADIUS On the Switch ......................................................................................................... 10-26
Creating RADIUS User Accounts on the Authentication Server .......................................................... 10-26
Configuring the Engineering Group 802.1x End-User Stations ............................................................10-26
Configuring the Printer Cluster for MAC-Based Authentication ...........................................................10-27
Configuring the Public Area PWA Station .......... .... ... ... ... .... ... ... ... .... ... ... ... ... .... ... ... ... ...........................10-28
Terms and Definitions ................................................................................................................................. 10-28
Flexible Link Aggregation Groups ..........................................................................................................11-8
Configuring Link Aggregation .......................................................................................................................11-9
Link Aggregation Configuration Example ...................................................................................................11-11
Configuring the S8 Distribution Switch ............. ... ... ... .... .................................................................11-14
Configuring the Fixed Switch Stack 1.............................................................................................11-14
Configuring the Fixed Switch Stack 2.............................................................................................11-14
Configuring the Server....................................................................................................................11-15
Terms and Definitions ................................................................................................................................. 11-15
SNMPv3 User-Based Security Model (USM) Enhancements ..........................................................12-4
Terms and Definitions ............................................................................................................................12-5
Security Models and Levels ...................................................................................................................12-6
Access Control .......................................................................................................................................12-6
System Logging Overview ............................................................................................................................ 14-1
Example .................................................................................................................................................14-6
x
About Security Audit Logging .......................................................................................................................14-6
Disabling Spanning Tree ........................................................................................................................ 15-7
STP Features .........................................................................................................................................15-7
Spanning Tree Basics ..................................................................................................................................15-9
Spanning Tree Bridge Protocol Data Units ......................................... ... ... ............................................. 15-9
Paths to Root .......................................................................................................................................15-10
Identifying Designated, Alternate, and Backup Port Roles ..................................................................15-12
Assigning Port States ...........................................................................................................................15-13
Adjusting Spanning Tree Parameters ..................................................................................................15-20
Setting Bridge Priority Mode and Priority........................................................................................15-21
xi
Setting a Port Priority................................................. .... ... ... ... .... ....................................................15-21
Assigning Port Costs ......................................................................................................................15-22
Adjusting Bridge Protocol Data Unit (BPDU) Intervals ...................................................................15-22
Enabling the Backup Root Function .....................................................................................................15-23
Terms and Definitions ................................................................................................................................. 15-36
Chapter 16: Configuring Policy
Using Policy in Your Network ....................................................................................................................... 16-1
Standard and Enhanced Policy on Enterasys Platforms ........................................................................16-2
Policy Configuration Example ..................................................................................................................... 16-12
Configuring Guest Policy on Edge Platforms .................................................................................16-15
Configuring Policy for the Edge Student Fixed Switch ...................................................................16-15
Configuring PhoneFS Policy for the Edge Fixed Switch.................................................................16-16
Configuring Policy for the Edge Faculty Fixed Switch....................................................................16-17
Terms and Definitions ................................................................................................................................. 16-18
Chapter 17: Configuring Quality of Service
Quality of Service Overview ............................... ... ... .... ... ... ... .... ... ... ... ..........................................................17-1
Quality of Service Operation .................................. ... ... ... .... ...................................... .... ... ... ...................17-2
Class of Service (CoS) .................................... ... .... ... ... ... .... ...................................... .... ... ......................17-2
CoS Settings ..........................................................................................................................................17-3
CoS Hardware Resource Reference................................................................................................17-3
CoS Flood Control State...................................................................................................................17-3
CoS Priority and ToS Rewrite...........................................................................................................17-3
CoS Reference .......................................................................................................................................17-4
Port Group and Type........................................................................................................................17-4
CoS Settings Reference to Port Resource Mapping ........................................................................17-5
Port Traffic Rate Limiting ............................................................................................................................17-17
Using Multicast in Your Network ................................................................................................................... 19-1
Enabling the Switch for Routing ................................................................................................................... 20-1
Example .................................................................................................................................................20-3
The ARP Table ............................................................................................................................................. 20-6
Terms and Definitions ................................................................................................................................. 20-10
Configuring OSPF Areas .............................................................................................................................. 22-8
Configuring Area Range ......................................................................................................................... 22-8
Terms and Definitions ................................................................................................................................... 23-8
Chapter 24: Configuring Access Control Lists
Using Access Control Lists (ACLs) in Your Network ....................................................................................24-1
Access Control Lists on the A4 ................................................................................................................... 24-11
About IPsec ............................................................................................................................................ 26-4
Example .................................................................................................................................................26-7
MAC Locking ................................................................................................................................................26-7
First Arrival Configuration .......................................................................................................................26-8
MAC Locking Notifications ..................................................................................................................... 26-8
xvii
Disabling and Enabling Ports ................................................................................................................. 26-9
Service ACLs ..............................................................................................................................................26-16
Restricting Management Access to the Console Port ............................... ... .... ... ... ... .... ... ... .................26-17
Configuring a Service Access Control List ...........................................................................................26-17
This guide provides basic configuration information for the Enterasys Networks Fixed Switch
platforms using the Command Line Interface (CLI0, including procedures and code examples.
For detailed information about the CLI commands used in this book, refer to the CLI Reference for
your Fixed Switch platform.
How to Use This Guide
Read through this guide completely to familiarize yourself with its contents and to gain an
understanding of the features and capabilities of the Enterasys Networks Fixed Switches. A
general working knowledge of data communications networks is helpful when setting up these
switches.
Related Documents
The CLI Reference manuals and Hardware Installation Guides for each platform can be obtained from
the World Wide Web in Adobe Acrobat Portable Document Format (PDF) at the following site:
http://extranet.enterasys.com/downloads/
Conventions Used in This Guide
The following conventions are used in the text of this document:
Important Notice
Depending on the firmware version used on your Fixed Switch platform, some features described in this
document may not be supported. Refer to the most recent Release Notes for your product to determine which
features are supported. Release Notes are available at this link: https://extranet.enterasys.com/downloads
ConventionDescription
Bold fontIndicates mandatory keywords, parameters or keyboard keys.
italic fontIndicates complete document titles.
Courier fontUsed for examples of information displayed on the screen.
Courier font in italicsIndicates a user-supplied value, either required or optional.
[ ]Square brackets indicate an optional value.
{ }Braces indicate required values. One or more values may be required.
|A vertical bar indicates a choice in values.
[x | y | z]Square brackets with a vertical bar indicates a choice of a value.
{x | y | z} Braces with a vertical bar indicate a choice of a required value.
[x {y | z} ]A combination of square brackets with braces and vertical bars indicates a
required choice of an optional value.
Getting Help
xxiv About This Guide
The following icons are used in this guide:
Getting Help
For additional support related to the product or this document, contact Enterasys Networks using
one of the following methods:
Before contacting Enterasys Networks for technical support, have the following data ready:
•Your Enterasys Networks service contract number
•A description of the failure
•A description of any action(s) already taken to resolve the problem (for example, changing
mode switches or rebooting the unit)
•The serial and revision numbers of all involved Enterasys Networks products in the network
•A description of your network environment (such as layout, cable type, other relevant
environmental information)
•Network load and frame size at the time of trouble (if known)
•The device history (for example, if you have returned the device before, or if this is a recurring
problem)
•Any previous Return Material Authorization (RMA) numbers
Note: Calls the reader’s attention to any item of information that may be of special importance.
Router: Calls the reader’s attention to router-specific commands and information.
Caution: Contains information essential to avoid damage to the equipment.
Precaución: Contiene información esencial para prevenir dañar el equipo.
Achtung: Verweißt auf wichtige Informationen zum Schutz gegen Beschädigungen.
World Wide Webwww.enterasys.com/support
Phone1-800-872-8440 (toll-free in U.S. and Canada)
or 1-978-684-1000
To find the Enterasys Networks Support toll-free number in your country:
www.enterasys.com/support
Emailsupport@enterasys.com
To expedite your message, type [insert correct indicator here] in the subject line.
Fixed Switch Configuration Guide 1-1
1
Setting Up a Switch for the First Time
This chapter describes how to configure an Enterasys stackable or standalone Fixed Switch
received from the factory that has not been previously configured. Most of the procedures assume
that you are configuring a single switch that has not been connected to a network, and they
require that you have physical access to the console port on the switch.
If you are configuring multiple new switches in a stack, review the procedures that apply to a
single switch first, then refer to “Configuring a Stack of New Switches” on page 1-8.
Before You Begin
The procedures in this chapter assume that:
•You have installed a terminal emulation program on the PC or laptop computer that you will
use to configure the switch. Commonly used (and often free) terminal emulation programs
available on the Internet include:
–HyperTeminal
–Tera Term
–PuTTY
•You can connect your PC or laptop to the (DB9 male) console port on the switch.
If your PC or laptop has a DB9 communications port, use the DB9 female-to-DB9 female cable
that was shipped with the switch to connect your computer to the switch console port.
If your PC or laptop does not have a DB9 communications port but does provide a USB port:
–Obtain a USB to RS 232 DB9 (Male) Serial Interface adapter cable.
For information about...Refer to page...
Before You Begin1-1
Connecting to the Switch1-2
Downloading New Firmware1-3
Additional Configuration Tasks1-5
Saving the Configuration and Connecting Devices1-7
Configuring a Stack of New Switches1-8
Where to Go Next1-9
Getting Help1-10
Downloading Firmware via the Serial Port1-10
Connecting to the Switch
1-2 Setting Up a Switch for the First Time
If the adapter cable requires a driver, install the driver on your computer. (These drivers
are usually provided by the vendor of the adapter cable.)
–Connect the adapter cable’s USB connector to a USB port on your PC or laptop and
determine which COM port has been assigned to that USB port.
(On Windows 7, this information is displayed in the Device Manager window.)
–Connect the adapter cable’s DB9 male connector to the DB9 female-to-DB9 female cable
shipped with the switch.
–Connect the free end of the DB9 female-to-DB9 female cable to the switch console port.
•You have access to a TFTP server. Since this procedure assumes that the switch is not
connected to a network, the TFTP server application should be locally installed on your PC or
laptop. TFTP servers are available on the Internet for purchase or free download.
Review your TFTP server documentation for information about how to configure the server.
In particular, you must configure the upload/download directory used by the TFTP server.
•You have downloaded the latest firmware for the switch from the Enterasys web site to your
computer, unzipped/uncompressed the firmware, and copied the firmware to the upload/
download directory configured for your TFTP server (see previous bullet). The firmware is
available at this Enterasys location:
https://extranet.enterasys.com/downloads
Review the Release Notes for the downloaded firmware to check for any upgrade notices or
limitations that may apply to your switch.
Connecting to the Switch
Follow these steps to connect to the switch and set its IP address:
1.Connect your PC or laptop to the console port of the switch, as described above.
2.On your computer, start your terminal emulation program and set the serial session
parameters, including the following:
–Transmit speed or baud rate = 9600
–Data bits = 8
–Parity = None
–Stop bits = 1
–Mode = 7 bit control, if available
–Specify the appropriate COM port
3.Open the terminal emulation session, then power up the switch.
4.In the window of the terminal emulation session, you will see switch boot up output.
5.When the boot up output is complete, the system prints a Username prompt.
6.Log in to the system by typing the default username admin, then pressing the Enter key at the
Password prompt. You will see a Welcome screen similar to the following.
Username:admin
Password:
Note: Using TFTP to copy the latest firmware to the switch is recommended because it is faster.
However, if you cannot use a TFTP server, you can download the firmware over the console port.
That procedure is described in “Downloading Firmware via the Serial Port” on page 1-10 .
Downloading New Firmware
Fixed Switch Configuration Guide 1-3
Enterasys C5
Command Line Interface
Enterasys Networks, Inc.
50 Minuteman Rd.
Andover, MA 01810-1008 U.S.A.
Last successful login : WED DEC 07 20:23:20 2011
Failed login attempts since last login : 0
C5(su)->
7.Note the firmware version displayed in the Welcome screen — it is most likely earlier than the
latest version you downloaded from the Enterasys web site, so you will need to upgrade the
firmware on the switch.
8.Set a static system IP address on the switch to be used to download the new firmware. For
example:
C5(su)->set ip address 192.168.1.1 mask 255.255.255.0
Setting a mask and gateway address are optional. If they are not specified, mask will be set to
the natural mask of the address and gateway will stay at the default value of 0.0.0.0.
9.On your computer, set an IP address in the same subnet you gave to the switch. For example:
192.168.1.2.
10. Set up in-band access between your computer and the switch by connecting an Ethernet cable
from the network port on your computer to one of the front panel fixed ports on the switch.
(Pings and the TFTP transfer will occur via this in-band connection.)
11. From within the switch session, ping the IP address you gave to your computer, to ensure
connectivity between the switch and your computer. For example:
C5(su)->ping 192.168.1.2
Then, from your computer, ping the switch.
Downloading New Firmware
On stackable and standalone switches, the system Flash can store up to two firmware images at a
time. A new switch should have only one firmware image installed, which allows you to
download the new firmware image as described below. If you are installing a replacement switch
Note: If the pings are unsuccessful, there may be fire wall or other configuration issues on your
computer. As a first step, try disabling the fire wall on your computer. If that does not resolve the
problem, contact your IT group for assistance.
Downloading New Firmware
1-4 Setting Up a Switch for the First Time
or just want to verify the contents of the images directory, refer to “Deleting a Backup Image File”
on page 1-5 for more information.
After you have established your connection to the switch, follow these steps to download the
latest firmware:
1.Start the TFTP application.
2.In the terminal emulation session window, use the copy command to TFTP transfer the
firmware file from the TFTP server location to the images directory on the switch. For
example:
3.Set the new firmware to be active and reboot the system with the set boot system command.
When the command asks if you want to reset the system now, reply y. For example:
C5(su)->set boot system c5-series_06.61.01.0031
This command can optionally reset the system to boot the new image.
Do you want to reset now (y/n) [n]y
Resetting system ...
4.After the switch reboots, log in again and use the dir command to confirm that the new
firmware is the “active” and “boot” firmware. For example:
Note: If this switch will be added to an existing stack, you should install the primary and backup
firmware versions that are currently installed on the stack units.
Note: If you receive the error message “Error: No space left on the device. Please remove backup
file.”, refer to “Deleting a Backup Image File” on page 1-5 before proceeding.
Loading...
+ 422 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.