Enterasys Networks 2H258, 2H252, 2E253, 2H253 User Manual

SmartSwitch 2200 Series
(2E253, 2H252, 2H253, and 2H258)
Standalone Switches
Local Management User’s Guide
9033650-04

NOTICE

Enterasys Networks reserves the right to make changes in specifications and other information contained in this document and its web site without prior notice. The reader should in all cases consult Enterasys Networks to determine whether any such changes have been made.
The hardware, firmware, or software described in this document is subject to change without notice. IN NO EVENT SHALL ENTERASYS NETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL,
OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS) ARISING OUT OF OR RELATED TO THIS DOCUMENT, WEB SITE, OR THE INFORMATION CONTAINED IN THEM, EVEN IF ENTERASYS NETWORKS HAS BEEN ADVISED OF , KNEW OF, OR SHOULD HA VE KNO WN OF, THE POSSIBILITY OF SUCH DAMAGES.
Enterasys Networks, Inc. 50 Minuteman Road Andover , MA 01810
2003 Enterasys Networks, Inc. All rights reserved. Printed in the United States of America.
Part Number: 9033650-04 June 2003
ENTERASYS NETWORKS, NETSIGHT, SMARTSWITCH and LANVIEW are registered trademarks and ENTERASYS MATRIX, MATRIX, WEBVIEW, and any logos associated therewith, are trademarks of Enterasys Networks, Inc. in the United States and other countries.
All other product names mentioned in this manual may be trademarks or registered trademarks of their respective companies.
Version: Information in this guide refers to SmartSwitch 2200 Series
firmware version 5.05.xx.
ENTERASYS NETWORKS, INC.
PROGRAM LICENSE AGREEMENT
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT,
CAREFULLY READ THIS LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between the end user (“You”) and Enterasys Networks, Inc. on behalf of itself and its Affiliates (as hereinafter defined) (“Enterasys”) that sets forth Your rights and obligations with respect to the Enterasys software program (including any accompanying documentation, hardware or media) (“Program”) in the package and prevails over any additional, conflicting or inconsistent terms and conditions appearing on any purchase order or other document submitted by You. “Affiliate” means any person, partnership, corporation, limited liability company, or other form of enterprise that directly or indirectly through one or more intermediaries, controls, or is controlled by, or is under common control with the party specified. This Agreement constitutes the entire understanding between the parties, and supersedes all prior discussions, representations, understandings or agreements, whether oral or in writing, between the parties with respect to the subject matter of this Agreement. The Program may be contained in firmware, chips or other media.
BY INST ALLING OR O THER WISE USING THE PR OGRAM, YOU REPRESENT THAT YOU ARE A UTHORIZED TO ACCEPT THESE TERMS ON BEHALF OF THE END USER (IF THE END USER IS AN ENTITY ON WHOSE BEHALF YOU ARE AUTHORIZED TO ACT, “YOU” AND “YOUR” SHALL BE DEEMED TO REFER TO SUCH ENTITY) AND THAT YOU AGREE THAT YOU ARE BOUND BY THE TERMS OF THIS AGREEMENT, WHICH INCLUDES, AMONG OTHER PROVISIONS, THE LICENSE, THE DISCLAIMER OF WARRANTY AND THE LIMITATION OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS AGREEMENT OR ARE NOT AUTHORIZED TO ENTER INTO THIS AGREEMENT, ENTERASYS IS UNWILLING TO LICENSE THE PROGRAM TO Y OU AND YOU AGREE TO RETURN THE UNOPENED PRODUCT TO ENTERASYS OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE OF RECEIPT FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT ENTERASYS NETWORKS, LEGAL DEPARTMENT AT (603) 332-9400.
You and Enterasys agree as follows:
1. LICENSE. You have the non-exclusive and non-transferable right to use only the one (1) copy of the Program
provided in this package subject to the terms and conditions of this Agreement.
2. RESTRICTIONS. Except as otherwise authorized in writing by Enterasys, You may not, nor may You permit any third party to:
(i) Reverse engineer, decompile, disassemble or modify the Program, in whole or in part, including for reasons of
error correction or interoperability, e xcept to the e xtent expressly per mitted b y applicabl e law a nd to the e xtent the parties shall not be permitted by that applicable law, such rights are expressly excluded. Information necessary to achieve interoperability or correct errors is available from Enterasys upon request and upon payment of Enterasys’ applicable fee.
(ii) Incorporate the Program, in whole or in part, in any other product or create derivative works based on the
Program, in whole or in part. (iii) Publish, disclose, copy, reproduce or transmit the Program, in whole or in part. (iv) Assign, sell, license, sublicense, rent, lease, encumber by way of security interest, pledge or otherwise transfer
the Program, in whole or in part, except for a sale or other transfer of the hardwar e in which the Program is
embedded. (v) Remove any copyright, trademark, proprietary rights, disclaimer or warning notice included on or embedded in
any part of the Program.
3. APPLICABLE LAW. This Agreement shall be interpreted and governed under the laws and in the state and federal courts of New Hampshire without regard to its conflicts of laws provisions. You accept the personal jurisdiction and venue of the New Hampshire courts. None of the 1980 United Nations Convention on Contracts for the International Sale of Goods, the United Nations Convention on the Limitation Period in the International Sale of Goods, and the Uniform Computer Information Transactions Act shall apply to this Agreement.
4. EXPORT RESTRICTIONS. You understand that Enterasys and its Affiliates are subject to regulation by agencies of the U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain technical products to certain countries, unless a license to export the Program is obtained from the U.S. Government or an exception from obtaining such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export Administration Regulations, in addition to the restriction on transfer set forth in Sections 1 or 2 of this Agreement, You agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia, Iraq, Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s Republic of China, Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct product of the Program or the technology , if such foreign produced direct product is subject to national secu rity controls as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant or an y major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce Control List or is subject to State Department controls under the U.S. Munitions List.
5. UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Program (i) was developed solely at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section
52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in all respects is proprietary data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Program is considered commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use, duplication, or disclosure by the Government is subject to restrictions set forth herein.
6. DISCLAIMER OF WARRANTY. ENTERASYS DISCLAIMS ALL WARRANTIES, OTHER THAN THOSE SUPPLIED TO YOU BY ENTERASYS IN WRITING, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON- INFRINGEMENT WITH RESPECT TO THE PROGRAM. IF IMPLIED WARRANTIES MAY NOT BE DISCLAIMED BY APPLICABLE LAW, THEN ANY IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THIRTY (30) DAYS AFTER DELIVERY OF THE PROGRAM TO YOU.
7. LIMITATION OF LIABILITY. IN NO EVENT SHALL ENTERASYS OR ITS SUPPLIERS BE LIABLE FOR ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL, INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM, EVEN IF ENTERASYS HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. THIS FOREGOING LIMITATION SHALL APPLY REGARDLESS OF THE CAUSE OF ACTION UNDER WHICH DAMAGES ARE SOUGHT.
THE CUMULA TIVE LIABILITY OF ENTERASYS TO YOU FOR ALL CLAIMS RELATING TO THE PROGRAM, IN CONTRACT, TORT OR OTHERWISE, SHALL NOT EXCEED THE TOTAL AMOUNT OF FEES PAID TO ENTERASYS BY YOU FOR THE RIGHTS GRANTED HEREIN.
8. AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of critical value to Enterasys and, accordingly, You hereby agree to maintain complete books, records and accounts showing (i) license fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys an d its authorized representatives, upon reasonable notice, the right to audit and examine during Your normal business hours, Your books, records, accounts and hardware devices upon which the Program may be deployed to verify compliance with this Agreement, including the verification of the license fees due and paid Enterasys and the use, copying and deployment of the Program. Enterasys' right of examination shall be exercised reasonably, in good faith and in a manner calculated to not unreasonably interfere with Your business. In the event such audit discovers non-compliance with this Agreement, including copies of the Program made, used or deployed in breach of this Agreement, You shall promptly pay to Enterasys the appropriate license fees. Enterasys reserves the right, to be exercised in its sol e discretion and without prior notice, to terminate this license, effective immediately, for failure to comply with this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program.
9. OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the Program constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement reasonable security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to the Program shall remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved to Enterasys.
10. ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You may cause Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys may be entitled to seek timely injunctive relief to protect Enterasys’ rights under this Agreement in addition to any and all remedies available at law.
11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations under this Agreement, except in connection with the sale or other transfer of the hardware in which the Program is embedded. Enterasys may assign this Agreement in its sole discretion.
12. WAIVER. A waiver by Enterasys of a breach of any of the terms and conditions of this Agreement must be in writing and will not be construed as a waiver of any subsequent breach of such term or condition. Enterasys’ failure to enforce a term upon Your breach of such term shall not be construed as a waiver of Your breach or prevent enforcement on any other occasion.
13. SEVERABILITY. In the event any provision of this Agreement is found to be invalid, illegal or unenf orceable, the validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired thereby, and that provision shall be reformed, construed and enforced to the maximum extent permissible. Any such invalidity, illegality or unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such provision in any other jurisdiction.
14. TERMINATION. Enterasys may terminate this Agreement immediately upon Your breach of any of the terms and conditions of this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program.

Contents

Figures ..........................................................................................................................................xii
Tables.............................................................................................................................................xv
ABOUT THIS GUIDE
Using This guide ..........................................................................................................xvii
Structure of This Guide .......... .... ... ... ... ....................................... ... .... .......................... xviii
Related Documents.......... ... ... ....................................... ....................................... ... .......xx
Document Conventions.......... .... ... ....................................... ... ... ....................................xx
Typographical and Keystroke Conventions...................................................................xxi
1
2
3
INTRODUCTION
1.1 Overview.........................................................................................................1-1
1.1.1 The Management Agent .................................................................1-2
1.1.2 In-Band vs. Out-of-Band ..... ... .... ... ... ....................................... ... .....1-3
1.2 Navigating Local Management Screens .........................................................1-3
1.3 Local Management Requirements..................................................................1-3
1.4 Local Management Screen Elements .................................. ... ........................1-4
1.5 Local Management Keyboard Conventions ....................................................1-6
1.6 Getting Help....................................................................................................1-7
LOCAL MANAGEMENT REQUIREMENTS
2.1 Management Terminal Setup..........................................................................2-1
2.1.1 Console Cable Connection .............................................................2-2
2.1.2 Management Terminal Setup Parameters......................................2-3
2.2 Telnet Connections .........................................................................................2-4
2.3 Monitoring an Uninterruptible Power Supp ly...................................................2-4
ACCESSING LOCAL MANAGEMENT
3.1 Navigating Local Management Screens .........................................................3-1
3.1.1 Selecting Local Management Menu Screen Items .........................3-3
3.1.2 Exiting Local Management Screens ...............................................3-3
3.1.3 Using the NEXT and PREVIOUS Commands ................................3-4
3.1.4 Using the CLEAR COUNTERS Command.....................................3-4
3.2 Password Screen............................................................................................3-4
Contents v
3.3 Device Menu Screen.......................................................................................3-7
3.4 Overview of Security Methods ......................................................................3-11
3.4.1 Host Access Control Authentication (HACA) ................................3-12
3.4.2 802.1X Port Based Network Access Control ...... ... .... ... ... .............3-15
3.4.2.1 Definitions of Terms and Abbreviations.........................3-15
3.4.2.2 802.1X Security Overview.............................................3-16
3.4.3 MAC Authentication Overview ......................................................3-17
3.4.3.1 Authentication Method Selection...................................3-17
3.4.3.2 Authentication Method Sequence ....................... ... .... ...3-17
3.4.3.3 Concurrent Operation of 802.1X and MAC
Authentication................................................................3-18
3.4.4 MAC Authentication Control..........................................................3-21
3.5 Security Menu Screen............ ....................................... ................................3-22
3.6 Passwords Screen ........................................................................................3-25
3.6.1 Setting the Module Login Password .............................................3-27
3.7 Radius Configuration Screen ........................................................................3-27
3.7.1 Setting the Last Resort Authentication..........................................3-30
3.7.2 Setting the Local and Remote Servers.........................................3-30
3.8 Name Services Configuration Screen...........................................................3-31
3.9 System Authentication Configuration Screen................................................3-33
3.10 EAP (Port) Configuration Screen..................................................................3-35
3.11 EAP Statistics Menu Screen.........................................................................3-40
3.11.1 EAP Session Statistics Screen.....................................................3-42
3.11.2 EAP Authenticator Statistics Screen.............................................3-44
3.11.3 EAP Diagnostic Statistics Screen.................................................3-47
3.12 MAC Port Configuration Screen....................................................................3-50
3.13 MAC Supplicant Configuration Screen..........................................................3-52
4
vi Contents
DEVICE CONFIGURATION MENU SCREENS
4.1 Device Configuration Menu Screen ................................................................4-2
4.2 General Configuration Screen.........................................................................4-4
4.2.1 Setting the IP Address ....................................................................4-8
4.2.2 Setting the Subnet Mask.................................................................4-9
4.2.3 Setting the Default Gateway .........................................................4-10
4.2.4 Setting the TFTP Gateway IP Address.........................................4-10
4.2.5 Setting the Module Name .............................................................4-11
4.2.6 Setting the Device Date ................................................................4-11
4.2.7 Setting the Device Time................................................................4-12
4.2.8 Entering a New Screen Refresh Time ..........................................4-12
4.2.9 Setting the Screen Lockout Time..................................................4-12
4.2.10 Configuring the COM Port.............................................................4-13
4.2.10.1 Changing the COM Port Applica tio n .......................... ...4-14
4.2.11 Clearing NVRAM...........................................................................4-15
4.2.12 Enabling/Disabling IP Fragmentation............................................4-16
4.3 SNMP Configuration Menu Screen...............................................................4-17
4.4 SNMP Community Names Configuration Screen .........................................4-18
4.4.1 Establishing Community Names...................................................4-20
4.5 SNMP Traps Configuration Screen...............................................................4-21
4.5.1 Configuring the Trap Table . ... .... ... ... .............................................4-22
4.6 Access Control List Screen...........................................................................4-23
4.6.1 Entering IP Addresses ........... ....................................... ................4-25
4.6.2 Enable/Disable ACL......................................................................4-27
4.7 System Resources Information Screen.........................................................4-28
4.7.1 Setting the Reset Peak Switch Utilization.....................................4-29
4.8 FLASH Download Configuration Screen.......................................................4-30
4.8.1 Image File Download Using Runtime.. ....................................... ...4-34
4.8.2 Configuration File Download Using TFTP.....................................4-34
4.8.3 Configuration File Upload Using TFTP ... ... ... ... .............................4-35
5
PORT CONFIGURATION MENU SCREENS
5.1 Port Configuration Menu Screen...... ... ....................................... ... ... ...............5-2
5.2 Ethernet Interface Configuration Screen.........................................................5-4
5.3 Ethernet Port Configuration Screen ................................. .... ... ... ... ... ...............5-7
5.3.1 Selecting Field Settings ................................................................5-12
5.3.2 Setting the Advertised Ability............................... ... ... ... ... .... ... ... ...5-12
5.4 HSIM/VHSIM Configuration Screen..............................................................5-13
5.5 Redirect Configuration Menu Screen............................................................5-13
5.6 Port Redirect Configuration Screen ..............................................................5-15
5.6.1 Changing Source and Destination Ports.......................................5-18
5.7 VLAN Redirect Configuration Screen............................... .... .........................5-19
5.7.1 Changing Source VLAN and Destination Ports ............................5-22
5.8 Link Aggregation Menu Screen (802.3ad Main Menu Screen) .....................5-23
5.8.1 802.3ad Port Screen ....................................................................5-27
5.8.1.1 802.3ad Port Details Screen .........................................5-30
5.8.1.2 802.3ad Port Statistics Screen......................................5-36
5.8.2 802.3ad Aggregator Screen..........................................................5-39
5.8.2.1 802.3ad Aggregator Details Screen..............................5-41
5.8.3 802.3ad System Screen................................................................5-43
5.9 Broadcast Suppression Configuration Screen ..............................................5-44
5.9.1 Setting the Threshold....... ... ... .... ...................................................5-46
5.9.2 Setting the Reset Peak .......... .... ... ... ....................................... ... ...5-46
Contents vii
6
802.1 CONFIGURATION MENU SCREENS
6.1 802.1 Configuration Menu Screen ...... ... ... ....................................... ... ... .........6-2
6.2 Spanning Tree Configuration Menu Screen....................................................6-4
6.3 Spanning Tree Configuration Screen..............................................................6-5
6.3.1 Configuring a VLAN Spanning Tree . ... ... ... ......................................6-8
6.4 Spanning Tree Port Configuration Screen ......................................................6-9
6.4.1 Enabling/Disabling the Default Spanning Tree Ports....................6-11
6.4.2 Viewing Status of Spanning Tree Ports........................................6-11
6.5 PVST Port Configuration Screen ..................................................................6-11
7
802.1Q VLAN CONFIGURATION MENU SCREENS
7.1 Summary of VLAN Local Management...........................................................7-2
7.1.1 Preparing for VLAN Configuration ..................................................7-2
7.2 802.1Q VLAN Configuration Menu Screen ................................... ... ...............7-3
7.3 Static VLAN Configuration Screen..................................................................7-6
7.3.1 Creating a Static VLAN...................................................................7-8
7.3.2 Displaying the Current Static VLAN Port Egress List......................7-9
7.3.3 Renaming a Static VLAN ................................................................7-9
7.3.4 Deleting a Static VLAN .................................................................7-10
7.3.5 Paging Through the VLAN List .....................................................7-10
7.4 Static VLAN Egress Configuration Screen....................................................7-11
7.4.1 Setting Egress Types on Ports .....................................................7-13
7.4.2 Displaying the Next Group of Ports...............................................7-14
7.5 Current VLAN Configuration Screen.............................................................7-14
7.6 Current VLAN Egress Configuration Screen.................................................7-16
7.7 VLAN Port Configuration Screen ........ ... ... ... .... ...................................... .... ...7-17
7.7.1 Changing the Port Mode..................................... ... .... ... ................7-20
7.7.2 Configuring the VLAN Ports..........................................................7-20
7.8 VLAN Classification Configuration Screen....................................................7-21
7.8.1 Classification Precedence Rules ..................................................7-29
7.8.2 Displaying the Current Classification Rule Assignments ..............7-32
7.8.3 Assigning a Classification to a VID ...............................................7-33
7.8.4 Deleting Line Items .......................................................................7-34
7.9 Protocol Port Configuration Screen.................................. ... ..........................7-34
7.9.1 Assigning Ports to a VID/Classification.........................................7-37
viii Contents
8
802.1p CONFIGURATION MENU SCREENS
8.1 802.1p Configuration Menu Screen . ... ... .... ...................................... ...............8-2
8.2 Port Priority Configuration Screen...................................................................8-4
8.2.1 Setting Switch Port Priority Port-by-Port.......................... .... ... ........8-6
8.2.2 Setting Switch Port Priority on All Ports........................................ ..8-7
8.3 Traffic Class Information Screen.....................................................................8-7
8.4 Traffic Class Configuration Screen ..... ... .... ... ... ... ....................................... ...8-10
8.4.1 Assigning the Traffic Class to Port Priority....................................8-11
8.5 Transmit Queues Configuration Screen.................................................. ... ...8-12
8.5.1 Setting the Current Queueing Mode ................................ .............8-15
8.6 Priority Classification Configuration Screen..................................................8-16
8.6.1 Classification Precedence Rules ..................................................8-26
8.6.2 About the IP TOS Rewrite Function..............................................8-29
8.6.3 Displaying the Current PID/Classification Assignments................8-30
8.6.4 Assigning a Classification to a PID...............................................8-30
8.6.5 Deleting PID/Classification/Description Line Items.......................8-31
8.7 Protocol Port Configuration Screen...............................................................8-32
8.7.1 Assigning Ports to a PID/Classification.........................................8-34
8.7.2 Solving the Problem......................................................................8-35
8.8 Rate Limiting Configuration Screen ..............................................................8-37
8.8.1 Configuring a Port.........................................................................8-41
8.8.2 Changing/Deleting Port Line Items...............................................8-43
8.8.3 More About Rate Limiting .............................................................8-44
9
10
LAYER 3 EXTENSIONS MENU SCREENS
9.1 Layer 3 Extensions Menu Screen .... ... ... .... ...................................... .... ... ........9-1
9.2 IGMP/VLAN Configuration Screen..................................................................9-3
9.2.1 IGMP/VLAN Configuration Procedure ............................................9-7
DEVICE STATISTICS MENU SCREENS
10.1 Device Statistics Menu Screen .....................................................................10-1
10.2 Switch Statistics Screen............. ... ... ... ....................................... ... ... .............10-3
10.3 Interface Statistics Screen ............................................................................10-5
10.3.1 Displaying Interface Statistics.......................................................10-8
10.4 RMON Statistics Screen ...............................................................................10-9
10.4.1 Displaying RMON Statistics........................................................10-12
Contents ix
11
NETWORK TOOLS SCREENS
11.1 Network Tools ........... ... ... .... ... ....................................... ................................11-1
11.2 Built-in Commands........................................................................................11-4
11.3 Example, Effects of Aging Time on Dynamic Egress..................................11-39
11.4 Example, Using Dynamic Egress to Control Traffic ....................................11-39
11.5 Special Commands.....................................................................................11-40
12
VLAN OPERATION AND NETWORK APPLICATIONS
12.1 Defining VLANs.............................................................................................12-2
12.2 Types of VLANs ............................................................................................12-3
12.2.1 802.1Q VLANs..............................................................................12-3
12.2.2 Other VLAN Strategies ................ .... ... ....................................... ...12-3
12.3 Benefits and Restrictions .......... ... .... ...................................... .... ... ................12-4
12.4 VLAN Terms..................................................................................................12-4
12.5 VLAN Operation............................................................................................12-7
12.5.1 Description....................................................................................12-7
12.5.2 VLAN Components .......................................................................12-7
12.6 Configuration Process..... .... ... ... ... ....................................... ..........................12-7
12.6.1 Defining a VLAN ...........................................................................12-8
12.6.2 Classifying Frames to a VLAN......................................................12-8
12.6.3 Customizing the VLAN Forwarding List........................................12-8
12.7 VLAN Switch Operation ................................................................................12-8
12.7.1 Receiving Frames from VLAN Ports...........................................12-10
12.7.2 Forwarding Decisions .................................................................12-10
12.7.2.1 Broadcasts, Multicast s, an d Un kn own Unic ast s..........12-10
12.7.2.2 Known Unicasts...........................................................12-11
12.8 VLAN Configuration ....................................................................................12-11
12.8.1 Managing the Switch...................................................................12-11
12.8.2 Switch Without VLANs................................................................12-12
12.8.3 Switch with VLANs......................................................................12-12
12.9 Summary of VLAN Local Management.................................................. .....12-15
12.9.1 Preparing for VLAN Configuration ..............................................12-15
12.10 Quick VLAN Walkthrough ......................... ... ....................................... ... .... .12-16
12.11 Examples ....................................................................................................12-21
12.12 Example 1, Single Switch Operation...........................................................12-21
12.12.1 Solving the Problem....................................................................12-22
12.12.2 Frame Handling ..........................................................................12-23
12.13 Example 2, VLANs Across Multiple Switches .............................................12-24
12.13.1 Solving the Problem....................................................................12-26
12.13.2 Frame Handling ..........................................................................12-29
x Contents
12.14 Example 3, Filtering Traffic According to a Layer 4 Classification Rule......12-32
12.14.1 Solving the Problem....................................................................12-32
12.15 Example 4, Securing Sensitive Information According to Subnet...............12-33
12.15.1 Solving the Problem....................................................................12-34
12.16 Example 5, Using Dynamic Egress to Control Traffic .................................12-34
12.17 Example 6, Locking a MAC Address to a Port Using Classification Rules .12-36
12.17.1 Solving the Problem....................................................................12-36
A
B
INDEX
GENERIC ATTRIBUTE REGISTRATION PROTOCOL (GARP)
A.1 Overview.........................................................................................................A-1
A.2 How It Works...................................................................................................A-2
ABOUT IGMP
B.1 IGMP Overview...............................................................................................B-1
B.2 Supported Features and Functions.. ... ... ....................................... ... .... ...........B-2
B.3 Detecting Multicast Routers ....................................... ... ... ...............................B-3
Contents xi

Figures

Figure Page
1-1 Example of a Local Management Screen....................................................................... 1-4
2-1 Management Terminal Connection................................................................................. 2-2
2-2 Uninterruptible Power Supply (UPS) Connection ........................................................... 2-5
3-1 802.1Q Switching Mode, LM Screen Hierarchy.............................................................. 3-2
3-2 Local Management Password Screen............................................................................ 3-5
3-3 Device Menu Screen....................................................................................................... 3-7
3-4 Security Menu Screen................................................................................................... 3-23
3-5 M o du le Login Pas swo rd s Scr ee n ........................................... ... .... ............................... 3-25
3-6 Radius Configuration Screen........................................................................................ 3-28
3-7 Name Services Configuration Screen........................................................................... 3-31
3-8 System Authentication Configuration Screen ............................................................... 3-33
3-9 EAP Port Configuration Screen .................................................................................... 3-35
3-10 EAP Statistics Menu Screen......................................................................................... 3-40
3-11 EAP Session Statistics Screen..................................................................................... 3-42
3-12 EAP Authenticator Statistics Screen............................................................................. 3-45
3-13 EAP Diagnostic Statistics Screen................................................................................. 3-47
3-14 MAC Port Configuration Screen................................. ... ....................................... ... .... .. 3-51
3-15 MAC Supplicant Configuration Screen ......................................................................... 3-53
4-1 D evice Configuration Menu Screen ........... ... .... ... ... ....................................... ... ... ........... 4-2
4-2 General Configuration Screen ........................................................................................ 4-4
4-3 Configuration Warning Screen, IP Address.................................................................... 4-8
4-4 Configuration Warning Screen, Subnet Mask................................................................. 4-9
4-5 COM Port Warning........................................................................................................ 4-14
4-6 Clear NVRAM Warning................................................. .... ... ....................................... .. 4-16
4-7 SNMP Configuration Menu Screen............................................................................... 4-17
4-8 SNMP Community Names Configuration Screen......................................................... 4-19
4-9 SNMP Traps Configuration Screen............................................................................... 4-21
4-10 Access Control List Screen........................................................................................... 4-23
4-11 System Resources Information Screen ........................................................................ 4-28
4-12 Flash Download Configuration Screen ......................................................................... 4-31
5-1 Port Configuration Menu Screen (in Agg Mode, HUNTGROUP).................................... 5-2
5-2 Port Configuration Menu Screen (in Agg Mode, IEEE8023ad)....................................... 5-3
5-3 Ethernet Interface Configuration Screen......................................................................... 5-5
5-4 Ethernet Port Configuration Screen................................................................................ 5-8
5-5 Redirect Configuration Menu Screen............................................................................ 5-14
5-6 Port Redirect Configuration Screen ........................................... .... ... ............................ 5 -1 6
xii
Figure Page
5-7 VLA N Red ire ct Co nf igu ra tio n Scr ee n...................................................... ... ... ................5-20
5-8 802.3ad Main Menu Screen ..........................................................................................5-26
5-9 802.3ad Port Screen .....................................................................................................5-28
5-10 802.3ad Port Details Screen .........................................................................................5-30
5-11 802.3ad Port Statistics Screen......................................................................................5-36
5-12 802.3ad Aggregator Screen..........................................................................................5-39
5-13 802.3ad Aggregator Details Screen..............................................................................5-41
5-14 802.3ad System Screen................................................................................................5-43
5-15 Broadcast Suppression Configuration Screen ..............................................................5-45
6-1 802.1 Configuration Menu Screen...................................................................................6-2
6-2 Span nin g Tree Co nf igu ra tio n Men u Scr ee n..................... ... .... ... ... ... ...............................6-4
6-3 Span nin g Tree Co nf igu ra tio n Scr een..................... .... ... ... ... ....................................... ... ..6-6
6-4 Span nin g Tree Por t Con fig u ratio n Scre e n ................................. ... ... .... ... ........................6-9
6-5 PVST Port Configuration Screen...................................................................................6-12
7-1 802.1Q VLAN Screen Hierarchy .....................................................................................7-2
7-2 802.1Q VLAN Configuration Menu Screen .....................................................................7-4
7-3 Static VLAN Configuration Screen ..................................................................................7-7
7-4 Static VLAN Egress Configuration Screen....................................................................7-11
7-5 Current VLAN Configuration Screen .............................................................................7-15
7-6 Current VLAN Egress Configuration Screen.................................................................7-16
7-7 VLAN Port Configuration Screen...................................................................................7-18
7-8 VLA N Class ifica tio n Co nf igu ra tio n Scr een................. ... ... ... .... ... ...................................7-22
7-9 Protocol Port Configuration Screen...............................................................................7-35
8-1 802.1p Configuration Menu Screen.................................................................................8-2
8-2 Port Priority Configuration Screen...................................................................................8-5
8-3 Traffic Class Information Screen.....................................................................................8-8
8-4 Tra ffic Class Co nfig u ra tio n Scre e n............................. ...................................... .... ... ......8-10
8-5 Tra ns mit Que ue s Co nfig u ra tio n Scre e n..................... ... ... ....................................... ......8-13
8-6 Priority Classification Configuration Screen..................................................................8-17
8-7 Datagram, Layer 2 and Layer 3..... ... ... ..........................................................................8-29
8-8 Protocol Port Configuration Screen...............................................................................8-32
8-9 Priorit izin g Net w o rk Tra ffic Acco r din g to Classif ica tio n Rule.........................................8-35
8-10 Rate Limiting Configuration Screen...............................................................................8-38
9-1 Laye r 3 Exte n sio ns Me n u Scr een ................................. ... ... .... ...................................... ..9-2
9-2 IGMP/VLAN Configuration Screen..................................................................................9-4
10-1 Device Statistics Menu Screen......................................................................................10-2
10-2 Switch Statistics Screen............ .... ... ... ....................................... ... ... .............................10-4
10-3 Interface Statistics Screen.............................................................................................10-6
10-4 RMON Statistics Screen................................................................................................10-9
11-1 Example, Dynamic Egress Application........................................................................11-39
12-1 Example of a VLAN.......................................................................................................12-2
12-2 View from Inside the Switch..........................................................................................12-9
xiii
Figure Page
12-3 Switch Management with Only Default VLAN......................... ... .... ... ... ... .....................1 2- 1 2
12-4 Switch Management with VLANs............................... ... .... ... ....................................... .12-13
12-5 802.1Q VLAN Screen Hierarchy..................................................................................12-15
12-6 Walkthrough Stage One, Static VLAN Configuration Screen ......................................12-17
12-7 Walkthrough Stage Two, Port 3 Egress Setting ..........................................................12-18
12-8 Walkthrough Stage Three, Port 10 Egress Setting......................................................12-19
12-9 Walkthrough Stage Four, VLAN Port Configuration ....................................................12-20
12-10 Example 1, Single Switch Operation ...........................................................................12-21
12-11 Switch Configured for VLANs ....... ... .... ... ... ....................................... ... ... .....................12- 2 3
12-12 Example 2, VLANs Across Multiple Switches..............................................................12-25
12-13 Bridge 1 Broadcasts Frames ........ ... .... ... ....................................... ... ...........................12-29
12-14 Transmitting to Switch 4 ...................... ...................................... .... ..............................12-30
12-15 Transmitting to Bridge 4............. ....................................... ...................................... .....12-31
12-16 Example 3, Filtering Traffic According to a Classification............................................12-32
12-17 Example 4, Securing Traffic to One Subnet ................................................................12-33
12-18 Example 5, Dynamic Egress Application.....................................................................12-35
12-19 Example 6, Locking Ports According to Classification Rule ........................................12-36
A-1 Example of VLAN Propagation via GVRP...................................................................... A-2
xiv

Tables

Table Page
1-1 Event Messages..............................................................................................................5
1-2 Keyboard Conventions ....................................................................................................6
2-1 VT Terminal Setup...........................................................................................................3
3-1 Device Menu Screen Menu Item Descriptions ................................................................ 8
3-2 Authentication Terms and Abbreviations.......................................................................15
3-3 MAC / 802.1X Precedence States................................................................................. 19
3-4 Security Menu Screen Menu Item Descriptions ................... ... ... ... ................................ 24
3-5 Module Login Passwords Screen Field Descriptions ....................................................26
3-6 Radius Configuration Screen Field Descript ion s ..... ... ... ....................................... ... ... ... 28
3-7 Name Services Configuration Screen Field Descriptions.............................................. 32
3-8 System Authentication Configuration Screen Field Descriptions ..................................34
3-9 EAP Port Configuration Screen Field Descriptions .......................................................36
3-10 EAP Statistics Menu Screen Descriptions.....................................................................41
3-11 EAP Session Statistics Screen Field Descriptions ........................................................43
3-12 EAP Authenticator Statistics Screen Field Descriptions................................................45
3-13 EAP Diagnostic Statistics Screen Field Descriptions ....................................................48
3-14 MAC Port Configuration Screen Field Descriptions.......................................................51
3-15 MAC Supplicant Configuration Screen Field Descriptions ............................................53
4-1 Device Configuration Menu Screen Menu Item Descriptions ..........................................3
4-2 General Configuration Screen Field Description s ................... ... ... .... ... ...........................5
4-3 COM Port Application Settings...................... ....................................... ... ... ...................15
4-4 SNMP Configuration Menu Screen Menu Item Descriptions......................................... 18
4-5 SNMP Community Names Configuration Screen Field Descriptions ............................19
4-6 SNMP Traps Configuration Screen Field Descriptions..................................................22
4-7 Access Control List Screen Field Descriptions..............................................................24
4-8 System Resources Information Scree n Fie l d De scr ipt ion s .................. ... ......................29
4-9 Flash Download Configuration Screen Field Descriptions ............................................32
5-1 Port Configuration Menu Screen Menu Item Descr ipt ion s ..................................... ... .... . 3
5-2 Ethernet Interface Configuration Screen Field Descriptions ...........................................5
5-3 Ethernet Port Configuration Screen Field Descr ipt ion s .... .... ... ... ..................................... 9
5-4 Redirect Configuration Menu Screen Menu Item Descriptions...................................... 14
5-5 Port Redirect Configuration Screen Field Descriptions .................................................16
5-6 VLAN Redirect Configuration Screen Field Description s .................. ... ... ... ...................21
5-7 802.3ad Main Menu Screen Menu Item Descriptions.................................................... 27
5-8 802.3ad Port Screen Field Descriptions........................................................................ 29
5-9 802.3ad Port Details Screen Field Descriptions............................................................ 31
5-10 802.3ad Port Statistics Screen Field Descriptions.........................................................37
Tables xvTables xv
Table Page
5-11 802.3ad Aggregator Screen Field Description s ................ ... ... .... ...................................40
5-12 802.3ad Aggregator Details Screen Field Descriptions .................................................42
5-13 802.3ad System Screen Field Descriptions...................................................................44
5-14 Broadcast Suppression Configuration Screen Field Descriptions .................................45
6-1 802.1 Configuration Menu Screen Menu Item Descriptions ............................................3
6-2 Spanning Tree Configuration Menu Screen................... ... ... ....................................... ... ..5
6-3 Spanning Tree Configuration Screen...................... ... .... ... ... ... ....................................... ..6
6-4 Spanning Tree Port Configuration Screen................. .... ... ... ... .......................................10
6-5 PVST Port Configuration Screen Field Descriptions......................................................12
7-1 802.1Q VLAN Configuration Menu Screen Menu Item Descriptions ...............................5
7-2 Static VLAN Configuration Screen Field Descriptions .....................................................7
7-3 Static VLAN Egress Configuration Screen Field Descriptions.......................................12
7-4 Current VLAN Configuration Screen Field Descriptions ................................................15
7-5 Current VLAN Egress Configuration Screen Field Descr ip tion s .... ... ... .... ... ... ... ............. 1 7
7-6 VLAN Port Configuration Screen Field Descriptions......................................................18
7-7 VLAN Classification Configuration Screen Field Descrip tio ns ....... ... ... .... ... ...................22
7-8 Classification List ...........................................................................................................24
7-9 Classification Precedence..............................................................................................30
7-10 Protocol Port Configuration Screen Field Descriptions..................................................36
8-1 802.1p Configuration Menu Screen Men u Item De scr ipt i on s ........................ ... ... .... ... .....3
8-2 Port Priority Configuration Screen Field Descriptions......................................................6
8-3 Traffic Class Information Screen Field Descriptions........................................................9
8-4 Traffic Class Configuration Screen Field Description s............ .... ... ... ... .... ... ...................11
8-5 Transmit Queues Configuration Scree n Fie ld Descr ip tion s ........ ... ... ... .... ......................14
8-6 Priority Classification Configuration Screen Field Descriptions .....................................17
8-7 Classification List ...........................................................................................................19
8-8 Classification Precedence..............................................................................................27
8-9 Protocol Port Configuration Screen Field Descriptions..................................................33
8-10 Rate Limiting Configuration Screen Field Descriptions..................................................38
9-1 Layer 3 Extensions Menu Screen Menu Item Description s .............. ... .... ... ... ... ... .... ........ 2
9-2 IGMP/VLAN Configuration Screen Field Descriptions.....................................................4
10-1 Device Statistics Menu Screen Menu Item Descriptions .................................................2
10-2 Switch Statistics Screen Field Descriptions............... .... ... ... ... ....................................... ..4
10-3 Interface Statistics Screen Field Descriptions..................................................................6
10-4 RMON Statistics Screen Field Descriptions...................................................................10
11-1 Built-In Commands ....... ... ....................................... ....................................... ... ...............3
11-2 Path Cost Parameter Values ..... ....................................... ... ... .......................................32
12-1 VLAN Terms and Definitions................................... ... .... ... ....................................... ... ... ..4
xvi Tables

About This Guide

Welcome to the Enterasys Networks SmartSwitch 2200 Series (2E253, 2H252, 2H253, and 2H258) Standalone Switches Local Management User’s Guide. This manual explains how to
access and use the Enterasys Networks Local Management to manage the SmartSwitch devices. Local Management is a series of screens that enable the user to monitor and control the SmartSwitch device and its attached segments.
Important Notice
Depending on the firmware version used in the SmartSwitch device, some features described in this document may not be supported. Refer to the Release Notes shipped with the SmartSwitch device to determine which features are supported.

USING THIS GUIDE

A general working knowledge of basic network operations and an understanding of management applications is helpful before using Local Management.
This manual describes how to do the following:
Access the Loca l Management application
Identify and operate the types of fields used by Local Management
Navigate through Local Management fields and menus
Use Local Management screens to perform management operations
Establish and manage Virtual Local Area Networks (VLANs)
About This Guide xvii

Structure of This Guide

STRUCTURE OF THIS GUIDE
The guide is organized as follows:
Chapter 1, Introduction, provides an o verview of the tasks that may be accomplished using Local
Management (LM), and an introduction to LM screen navigation, in-band and out-of-band network management, screen elements, and LM keyboard conventions.
Chapter 2, Local Management Requirements, provides the setup requirements for accessing
Local Management, the instructions to configure and connect a management terminal to the SmartSwitch device, and the instructions for connecting the SmartSwitch device to an Uninterruptible Power Supply (UPS) for monitoring the UPS power status.
Chapter 3, Accessing Local Management, describes how to access the Main Menu screen and
navigate the Local Management screens. This chapter also describes the security screens.
Chapter 4, Device Configuration Menu Screens, describes the Device Configuration Menu
screen and the screens that can be selected from it. These screens are used to control access to the SmartSwitch device by assigning community names, configure the SmartSwitch device to send SNMP trap messages to multiple network management stations, limit access according to an Access Control List (ACL) for additional security, access system resource information, download a new firmware image to the switch module, provide access to menu screens to configure ports, and configure the switch module for 802.1, 802.1Q VLAN, and layer 3 operations.
Chapter 5, Port Configuration Menu Screens, describes how to use the screens to configure the
ports for various operations, such as for Ethernet Interface, HSIM/VHSIM, port and VLAN redirect, SmartTrunk, and broadcast suppressor configuration.
Chapter 6, 802.1 Configuration Menu Screens, describes how to access the Spanning Tree
Configuration Menu, 802.1Q VLAN Configuration Menu, and 802.1p Configuration Menu, screens. This chapter also introduces and describes how to use the Spann ing Tree screens to create a separate Spanning Tree topology for each VLAN configured in the SmartSwitch device.
Chapter 7, 802.1Q VLAN Configuration Menu Screens, describes how to use the screens to
create static VLANs, select the mode of operation for each port, filter frames according to VLAN, establish VLAN forwarding (Egress) lists, route frames according to VLAN ID, display the current ports and port types associated with a VLAN and protocol, and configure ports on the switch as GVRP-aware ports. VLAN classification and classification rules are also discussed.
xviii About This Guide
Structure of This Guide
Chapter 8, 802.1p Configuration Menu Screens, describes how to use the screens to set the
transmit priority of each port, display the current traffic class mapping-to-priority of each port, set ports to either transmit frames according to selected priority transmit queues or percentage of port transmission capacity for each queue, assign transmit priorities according to protocol types, and configure a rate limit for a give n port and list of priorities.
Chapter 9, Layer 3 Extensions Menu Screens, introduces and describes how to enable or disable
IGMP (Internet Group Management Protocol, RFC 2236) on selected VLANs, or globally on all VLANs that are available.
Chapter 10, Device Statistics Menu Screens, introduces and describes how to use the statistics
screens to gather statistics about the switch, interfaces, RMON, and HSIM/VHSIM and, if the device is a repeater, repeater statistics.
Chapter 11, Network Tools Screens, describes how to access and use the Network Tools screens.
This chapter also lists built-in and new functional CLI commands, including examples.
Chapter 12, VLAN Operation and Network Applications, introduces VLANs, describes how
they operate, and how to configure them using the Local Management screens described in Chapter 7. Examples are also provided to show how VLANs are configured to solve a problem and how the VLAN frames travel through the network.
Appendix A, Generic Attribute Registration Protocol (GARP), describes the switch operation
when its ports are configured to operate under the Generic Attribute Registration Protocol (GARP) VLAN Registration Protocol (GVRP) application.
NOTE: There is a global setting for GVRP that is enabled by default. However, this setting is only accessible through a Management Information Base (MIB).
Appendix B, About IGMP, introduces the Internet Group Management Protocol (IGMP), its
features and functions, and describes how it detects multicast routers.
About This Guide xix

Related Documents

RELATED DOCUMENTS
The following Enterasys Networks documents may help to set up, con t rol, and manage the SmartSwitch device:
Ethernet Technology Guide
Cabling Guide
SmartTrunk User’s Guide
WAN Series Local Management User’s Guide
Documents associated with the optional HSIM and VHSIM interface modules, SmartSwitch device installation user’s guides, and the manuals listed above, can be obtained from the World Wide Web in Adobe Acrobat Portable Document Format (PDF) at the following web site:
http://www.enterasys.com/

DOCUMENT CONVENTIONS

This guide uses the following conventions:
NOTE: Calls the reader’s attention to any item of information that may be of special importance.
TIP: Conveys helpful hints concerning procedures or actions.
CAUTION: Contains information essential to avoid damage to the equipment.
xx About This Guide

Typographical and Keystroke Conventions

TYPOGRAPHICAL AND KEYSTROKE CONVENTIONS
bold type Bold type can denote either a user input or a highlighted screen selection. RETURN Indicates either the ENTER or RETURN key, depending on your
keyboard. ESC Indicates the keyboard Escape key. SPACE bar Indicates the keyboard space bar key. BACKSPACE Indicates the keyboard backspace key. arrow keys Refers to the four keyboard arrow keys. [-] Indicates the keyboard – key. DEL Indicates the keyboard delete key. italic type Italic type indicates complete document titles. n.nn A period in numerals signals the decimal point indicator (e.g., 1.75 equals
one and three fourths). Or, periods used in numerals signal the decimal
point in Dotted Decimal Notation (DDN) (e.g., 000.000.000.000 in an IP
address). x A lowercase italic x indicates the generic use of a letter (e.g., xxx indicates
any combination of three alphabetic characters). n A lowercase italic n indicates the generic use of a number (e.g., 19nn
indicates a four-digit number in which the last two digits are unknown). [ ] In the Local Management screens, the square brackets indicate that a value
may be selected. In the format descriptions in the Network Tools section,
required arguments are enclosed in square brackets, [ ]. < > In the format descriptions in the Network Tools section, optional
arguments are enclosed in angle brackets, < >.
About This Guide xxi
1

Introduction

This chapter provides an overview of the tasks that may be accomplished using Local Management (LM), and an introduction to LM screen navigation, in-band and out-of-band network management, screen elements, and LM keyboard conventions.
Important Notice
Depending on the firmware version used in the SmartSwitch device, some features described in this document may not be supported. Refer to the Release Notes shipped with the SmartSwitch device to determine which features are supported.

1.1 OVERVIEW

Enterasys Networks’ Local Management is a management tool that allows a network manager to perform the following tasks:
Assign IP address and subnet ma sk.
Select a default gateway.
Assign a login password to the device for additional security.
Download a new firmware image.
Upload or download a configuration file to or from a TFTP server.
Design ate which Network Management Workstations receive SNMP traps from the device.
View switch, interface, and RMON statistics.
Assign ports to operate in the standard or full duplex mode.
Configure ports to perform load sharing using SmartTrunking. Refer to the SmartTrunk User’s
Guide for details.
Control th e number of receive broadcasts that are switched to the other interfaces.
Set flow control on a port-by-port basis.
Configure ports to prioritize incoming frames at Layer 2, Layer 3, and Layer 4.
Introduction 1-1
Overview
Clear NVRAM.
Set 802.1Q VLAN memberships and port configurations.
Redirect frames according to port or VLAN and transmit them on a preselected destination port.
Create a separate Spanning Tree topology for each VLAN configured in the SmartSwitch device.
Transmit frames on preselected destination ports according to protocol and priority or protocol
and VLAN.
Configure the switch to operate as a Generic Attribute Registration Protocol (GARP) device to
dynamically create VLANs across a switched network.
Configure the device to control the rate of network traffic entering and leaving the switch on a
per port/priority basis.
Configure an optional HSIM or VHSIM installed in the device.
Configure the device to dynamically switch frames according to a characteristic rule and VLAN.
Configure ports on the SmartSwitch device as Router Redundancy Protocol (VRRP) ports.
Provide additional security and policy administration capabilities via Port-based Web
Authentication (PWA) by configuring pertinent variables within the LM screen.
Configure multiple ports to act in an 802.3ad trunk group.
Configure and manage the use of 802.1w, a standards-based method to rapidly fail over links to
reduce downtime on a network.
Provide additional security by configuring a physical port to lock on an attached device
according to a Classification rule so no other device can be connected to that port and used.
Configure the device to operate using the path cost values conforming legacy 802.1D or 802.1
standards.
There are three ways to access Local Management:
Locally using a VT type terminal connected to the COM port.
Remotely using a VT type terminal connected through a modem.
In-band through a Telnet connection.

1.1.1 The Management Agent

The management agent is a process within the SmartSwitch device that collects statistical information (e.g., frames received, errors detected) about the operational performance of the managed network. Local Management communicates with the management agent for the purpose of viewing statistics or issuing management commands. Local Management provides a wide range of screens used to monitor and configure the SmartSwitch device.
1-2 Introduction
Navigating Local Management Screens

1.1.2 In-Band vs. Out-of-Band

Network management systems are often classified as either in-band or out-of-band. In-band network management passes data along the same medium (cables, frequencies) used by all other stations on the network.
Out-of-band network management passes data along a medium that is entirely separate from the common data carrier of the network, for example, a cable connection between a dumb terminal and a SmartSwitch device COM port. The Enterasys Networks’ Local Management is an out-of-band network management system.
A device connected out-of-band to the management agent is not connected to the LAN. This type of connection allows you to communicate with a network de vice even when that device is unable to communicate through the network, for example, at the time of installation.

1.2 NAVIGATING LOCAL MANAGEMENT SCREENS

To navigate within a Local Management screen, use the arrow keys of the terminal or the workstation providing terminal emulation services. The Local Manage ment screen cursor responds to the LEFT, RIGHT, UP, and DOWN arrow keys. Each time you press an arrow key, the Local Management screen cursor moves to the next available field in the direction of the arrow key.
The Local Management screen cursor only moves to fields that can be selected or used for input. This means that the cursor jumps over display fields and empty lines on the Local Management screen.
The Local Management screen cursor provides wrap-around operation. This means that a cursor located at the edge of a screen, when moved in the direction of that edge, “wraps around” to the outermost selectable item on the opposite side of the screen which is on the same line or column.

1.3 LOCAL MANAGEMENT REQUIREMENTS

The SmartSwitch device provides one communication po rt, labeled COM, which supp orts a management terminal connection. To access Local Management, connect one of the following systems to the COM port:
Digital Equipment Corporation VT series terminal.
VT type terminal running emulation programs for the Digital Equipment Corporation VT series.
IBM or compatible PC running a VT series emulation software package.
Introduction 1-3
Local Management Screen Elements
You can also access Local Management using a Telnet connection through one of the network ports of the SmartSwitch device.
NOTE: For details on the setup parameters for the console, how to connect a console to the SmartSwitch, or how to make a telnet connection, refer to Chapter 2.

1.4 LOCAL MANAGEMENT SCREEN ELEMENTS

There are six types of screens used in Local Management: password, menu, statistics, configuration, status, and warning screens. Each type of screen can consist of one to five basic elements, or fields. Figure 1-1 shows an example of the fields in a screen. A description of each field follows the figure.
Figure 1-1 Example of a Local Management Screen
Event Message Field
Event Message Line
Device Type: xxxxx-xx
MAC Address:
IP Address:
Subnet Mask:
Default Gateway:
TFTP Gateway IP Addr:
Operational Mode: [802.1Q SWITCHING]
Clear NVRAM [NO]
Selection Field
Display Fields
xxxxx-xx LOCAL MANAGEMENT
General Configuration
00-00-ID-00-00-00
0.0.0.0
255.255.0.0
NONE DEFINED
0.0.0.0
IP Fragmentation [ENABLED]
EXIT
Command Fields
Display Field
Input Fields
Firmware Revision: XX.XX.XX
BOOTPROM Revision: XX.XX.XX
Device Date:
Device Time:
Screen Refresh Time:
Screen Lockout Time:
Device Uptime XX D XX H XX M
10/11/97
14:23:00
30 sec.
15 min.
RETURNSAVE
See Note
Note: This shows the location of the cut away that is used in most of the screen graphics in this document. The top portion of the screen is cut away to eliminate repeating the same information in each graphic.The screen title is contained in its figure title.
30691_01
1-4 Introduction
Local Management Screen Elements
Event Message Field
This field briefly displays messages that indicate if a Local Management procedure was executed correctly or incorrectly, that changes were saved or not saved to Non-Volatile Random Access Memory (NVRAM), or that a user did not have access privileges to an application.
Table 1-1 describes the most common event messages. Event messages related to specific Local
Management applications are described with those applications throughout this manual.
Table 1-1 Event Messages
Message What it Means
SAVED OK One or more fields were modified, and saved to NVRAM. NOT SAVED
--PRESS SAVE-­TO KEEP CHANGES
NOTHING TO SAVE The SAVE command was executed, but nothing was saved to
Attempting to exit the LM screen after one or more fields were modified, but not saved to NVRAM.
NVRAM because there were no configuration changes since the data was last saved.
Display Fields
Display fields cannot be edited. These fields may display information that never changes, or information that may change as a result of Local Management operations, user selections, or network monitoring information. In the screens shown in this guide, the characters in the display fields are in plain type (not bold). In the field description, the field is identified as being “read-only”.
Input Fields
Input Fields require the entry of keyboard characters. IP addresses, subnet mask, default gateway and device time are examples of input fields. In the screens shown in this guide, the characters in the input fields are in bold type. In the field description, the field is identified as being “modifiable”.
Selection Fields
Selection fields provide a series of possible values. Only applicable values appear in a selection field. In the screens shown in this guide, the selections display within brackets and are in bold type. In the field description, the field is identified as being either “selectab le” when there are mo re than two possible values, or “toggle” when there are only two possible values.
Introduction 1-5
Local Management Keyboard Conventions
Command Fields
Command fields (located at the bottom of Local Management screens) are used to exit Local Management screens, save Local Management entries, or navigate to another display of the same screen. In the screens shown in this guide, the characters in this field are all upper case and in bold type. In the field description, the field is identified as being a “command” field.

1.5 LOCAL MANAGEMENT KEYBOARD CONVENTIONS

All key names appear as capital letters in this manual. Table 1-2 explains the keyboard conventions and the key functions that are used.
Table 1-2 Keyboard Conventions
Key Function
ENTER Key RETURN Key
Used to enter data or commands. These keys perform the same Local Management function. For example, “Press ENTER” means that you can press either ENTER or RETURN, unless this manual specifically instructs you otherwise.
ESCAPE (ESC) Key Used to “escape” from a Local Management screen without saving
changes. For example, “Press ESC twice” means the ESC key must be pressed quickly two times.
SPACE Bar BACKSPACE Key
Used to cycle through selections in some Local Management fields. Use the SPACE bar to cycle forward through selections and use the BACKSPACE key to cycle backward through selections.
Arrow Keys (UP-ARROW, DOWN-ARROW, LEFT-ARROW, RIGHT-ARROW)
Used to move the screen cursor. For example, “Use the arrow keys” means to press whichever arrow key moves the cursor to the desired field on the Local Management screen.
DEL Key Used to remove characters from a Local Management field. For
example, “Press DEL” means to press the Delete key.
1-6 Introduction
Loading...
+ 360 hidden pages