Enterasys Networks reserves the right to make changes in specifications and other information contained in this
document and its web site without prior notice. The reader should in all cases consult Enterasys Networks to determine
whether any such changes have been made.
The hardware, firmware, or software described in this document is subject to change without notice.
IN NO EVENT SHALL ENTERASYS NETWORKS BE LIABLE FOR ANY INCIDENTAL, INDIRECT, SPECIAL,
OR CONSEQUENTIAL DAMAGES WHATSOEVER (INCLUDING BUT NOT LIMITED TO LOST PROFITS)
ARISING OUT OF OR RELATED TO THIS DOCUMENT, WEB SITE, OR THE INFORMATION CONTAINED IN
THEM, EVEN IF ENTERASYS NETWORKS HAS BEEN ADVISED OF, KNEW OF, OR SHOULD HAVE KNOWN
OF, THE POSSIBILITY OF SUCH DAMAGES.
Enterasys Networks, Inc.
50 Minuteman Road
Andover, MA 01810
ENTERASYS, ENTERASYS NETWORKS, ENTERASYS MATRIX, NETSIGHT, WEBVIEW, and any logos
associated therewith, are trademarks or registered trademarks of Enterasys Networks, Inc. in the United States and other
countries. For a complete list of Enterasys trademarks, see http://www.enterasys.com/company/trademarks.aspx.
All other product names mentioned in this manual may be trademarks or registered trademarks of their respective
companies.
Version:Information in this guide refers to Matrix N Standalone Series firmware version
5.41.xx.
i
ENTERASYS NETWORKS, INC.
FIRMWARE LICENSE AGREEMENT
BEFORE OPENING OR UTILIZING THE ENCLOSED PRODUCT,
CAREFULLY READ THIS LICENSE AGREEMENT.
This document is an agreement (“Agreement”) between the end user (“You”) and Enterasys Networks, Inc. on behalf of
itself and its Affiliates (as hereinafter defined) (“Enterasys”) that sets forth Your rights and obligations with respect to
the Enterasys software program/firmware installed on the Enterasys product (including any accompanying
documentation, hardware or media) (“Program”) in the package and prevails over any additional, conflicting or
inconsistent terms and conditions appearing on any purchase order or other document submitted by You. “Affiliate”
means any person, partnership, corporation, limited liability company, or other form of enterprise that directly or
indirectly through one or more intermediaries, controls, or is controlled by, or is under common control with the party
specified. This Agreement constitutes the entire understanding between the parties, and supersedes all prior discussions,
representations, understandings or agreements, whether oral or in writing, between the parties with respect to the subject
matter of this Agreement. The Program may be contained in firmware, chips or other media.
BY INSTALLING OR OTHERWISE USING THE PROGRAM, YOU REPRESENT THAT YOU ARE
AUTHORIZED TO ACCEPT THESE TERMS ON BEHALF OF THE END USER (IF THE END USER IS AN
ENTITY ON WHOSE BEHALF YOU ARE AUTHORIZED TO ACT, “YOU” AND “YOUR” SHALL BE DEEMED
TO REFER TO SUCH ENTITY) AND THAT YOU AGREE THAT YOU ARE BOUND BY THE TERMS OF THIS
AGREEMENT, WHICH INCLUDES, AMONG OTHER PROVISIONS, THE LICENSE, THE DISCLAIMER OF
WARRANTY AND THE LIMITATION OF LIABILITY. IF YOU DO NOT AGREE TO THE TERMS OF THIS
AGREEMENT OR ARE NOT AUTHORIZED TO ENTER INTO THIS AGREEMENT, ENTERASYS IS
UNWILLING TO LICENSE THE PROGRAM TO YOU AND YOU AGREE TO RETURN THE UNOPENED
PRODUCT TO ENTERASYS OR YOUR DEALER, IF ANY, WITHIN TEN (10) DAYS FOLLOWING THE DATE
OF RECEIPT FOR A FULL REFUND.
IF YOU HAVE ANY QUESTIONS ABOUT THIS AGREEMENT, CONTACT ENTERASYS NETWORKS, LEGAL
DEPARTMENT AT (978) 684-1000.
You and Enterasys agree as follows:
1.LICENSE. You have the non-exclusive and non-transferable right to use only the one (1) copy of the Program
provided in this package subject to the terms and conditions of this Agreement.
2.RESTRICTIONS. Except as otherwise authorized in writing by Enterasys, You may not, nor may You permit any
third party to:
(i) Reverse engineer, decompile, disassemble or modify the Program, in whole or in part, including for reasons of
error correction or interoperability, except to the extent expressly permitted by applicable law and to the extent
the parties shall not be permitted by that applicable law, such rights are expressly excluded. Information
necessary to achieve interoperability or correct errors is available from Enterasys upon request and upon
payment of Enterasys’ applicable fee.
(ii) Incorporate the Program, in whole or in part, in any other product or create derivative works based on the
Program, in whole or in part.
(iii) Publish, disclose, copy, reproduce or transmit the Program, in whole or in part.
(iv) Assign, sell, license, sublicense, rent, lease, encumber by way of security interest, pledge or otherwise transfer
the Program, in whole or in part.
(v) Remove any copyright, trademark, proprietary rights, disclaimer or warning notice included on or embedded in
any part of the Program.
ii
3.APPLICABLE LAW. This Agreement shall be interpreted and governed under the laws and in the state and federal
courts of the Commonwealth of Massachusetts without regard to its conflicts of laws provisions. You accept the personal
jurisdiction and venue of the Commonwealth of Massachusetts courts. None of the 1980 United Nations Convention on
Contracts for the International Sale of Goods, the United Nations Convention on the Limitation Period in the International
Sale of Goods, and the Uniform Computer Information Transactions Act shall apply to this Agreement.
4.EXPORT RESTRICTIONS. You understand that Enterasys and its Affiliates are subject to regulation by agencies
of the U.S. Government, including the U.S. Department of Commerce, which prohibit export or diversion of certain
technical products to certain countries, unless a license to export the Program is obtained from the U.S. Government or
an exception from obtaining such license may be relied upon by the exporting party.
If the Program is exported from the United States pursuant to the License Exception CIV under the U.S. Export
Administration Regulations, You agree that You are a civil end user of the Program and agree that You will use the
Program for civil end uses only and not for military purposes.
If the Program is exported from the United States pursuant to the License Exception TSR under the U.S. Export
Administration Regulations, in addition to the restriction on transfer set forth in Sections 1 or 2 of this Agreement, You
agree not to (i) reexport or release the Program, the source code for the Program or technology to a national of a country
in Country Groups D:1 or E:2 (Albania, Armenia, Azerbaijan, Belarus, Bulgaria, Cambodia, Cuba, Estonia, Georgia,
Iraq, Kazakhstan, Kyrgyzstan, Laos, Latvia, Libya, Lithuania, Moldova, North Korea, the People’s Republic of China,
Romania, Russia, Rwanda, Tajikistan, Turkmenistan, Ukraine, Uzbekistan, Vietnam, or such other countries as may be
designated by the United States Government), (ii) export to Country Groups D:1 or E:2 (as defined herein) the direct
product of the Program or the technology, if such foreign produced direct product is subject to national security controls
as identified on the U.S. Commerce Control List, or (iii) if the direct product of the technology is a complete plant or any
major component of a plant, export to Country Groups D:1 or E:2 the direct product of the plant or a major component
thereof, if such foreign produced direct product is subject to national security controls as identified on the U.S. Commerce
Control List or is subject to State Department controls under the U.S. Munitions List.
5.UNITED STATES GOVERNMENT RESTRICTED RIGHTS. The enclosed Program (i) was developed solely
at private expense; (ii) contains “restricted computer software” submitted with restricted rights in accordance with section
52.227-19 (a) through (d) of the Commercial Computer Software-Restricted Rights Clause and its successors, and (iii) in
all respects is proprietary data belonging to Enterasys and/or its suppliers. For Department of Defense units, the Program
is considered commercial computer software in accordance with DFARS section 227.7202-3 and its successors, and use,
duplication, or disclosure by the Government is subject to restrictions set forth herein.
6.DISCLAIMER OF WARRANTY. EXCEPT FOR THOSE WARRANTIES EXPRESSLY PROVIDED TO YOU
IN WRITING BY ENTERASYS, ENTERASYS DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY,
SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON- INFRINGEMENT
WITH RESPECT TO THE PROGRAM. IF IMPLIED WARRANTIES MAY NOT BE DISCLAIMED BY
APPLICABLE LAW, THEN ANY IMPLIED WARRANTIES ARE LIMITED IN DURATION TO THIRTY (30)
DAYS AFTER DELIVERY OF THE PROGRAM TO YOU.
7.LIMITATION OF LIABILITY. IN NO EVENT SHALL ENTERASYS OR ITS SUPPLIERS BE LIABLE FOR
ANY DAMAGES WHATSOEVER (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF
BUSINESS, PROFITS, BUSINESS INTERRUPTION, LOSS OF BUSINESS INFORMATION, SPECIAL,
INCIDENTAL, CONSEQUENTIAL, OR RELIANCE DAMAGES, OR OTHER LOSS) ARISING OUT OF THE USE
OR INABILITY TO USE THE PROGRAM, EVEN IF ENTERASYS HAS BEEN ADVISED OF THE POSSIBILITY
OF SUCH DAMAGES. THIS FOREGOING LIMITATION SHALL APPLY REGARDLESS OF THE CAUSE OF
ACTION UNDER WHICH DAMAGES ARE SOUGHT.
THE CUMULATIVE LIABILITY OF ENTERASYS TO YOU FOR ALL CLAIMS RELATING TO THE PROGRAM,
IN CONTRACT, TORT OR OTHERWISE, SHALL NOT EXCEED THE TOTAL AMOUNT OF FEES PAID TO
ENTERASYS BY YOU FOR THE RIGHTS GRANTED HEREIN.
iii
8.AUDIT RIGHTS. You hereby acknowledge that the intellectual property rights associated with the Program are of
critical value to Enterasys and, accordingly, You hereby agree to maintain complete books, records and accounts showing
(i) license fees due and paid, and (ii) the use, copying and deployment of the Program. You also grant to Enterasys and
its authorized representatives, upon reasonable notice, the right to audit and examine during Your normal business hours,
Your books, records, accounts and hardware devices upon which the Program may be deployed to verify compliance with
this Agreement, including the verification of the license fees due and paid Enterasys and the use, copying and deployment
of the Program. Enterasys’ right of examination shall be exercised reasonably, in good faith and in a manner calculated
to not unreasonably interfere with Your business. In the event such audit discovers non-compliance with this Agreement,
including copies of the Program made, used or deployed in breach of this Agreement, You shall promptly pay to Enterasys
the appropriate license fees. Enterasys reserves the right, to be exercised in its sole discretion and without prior notice, to
terminate this license, effective immediately, for failure to comply with this Agreement. Upon any such termination, You
shall immediately cease all use of the Program and shall return to Enterasys the Program and all copies of the Program.
9.OWNERSHIP. This is a license agreement and not an agreement for sale. You acknowledge and agree that the
Program constitutes trade secrets and/or copyrighted material of Enterasys and/or its suppliers. You agree to implement
reasonable security measures to protect such trade secrets and copyrighted material. All right, title and interest in and to
the Program shall remain with Enterasys and/or its suppliers. All rights not specifically granted to You shall be reserved
to Enterasys.
10. ENFORCEMENT. You acknowledge and agree that any breach of Sections 2, 4, or 9 of this Agreement by You
may cause Enterasys irreparable damage for which recovery of money damages would be inadequate, and that Enterasys
may be entitled to seek timely injunctive relief to protect Enterasys’ rights under this Agreement in addition to any and
all remedies available at law.
11. ASSIGNMENT. You may not assign, transfer or sublicense this Agreement or any of Your rights or obligations
under this Agreement, except that You may assign this Agreement to any person or entity which acquires substantially all
of Your stock or assets. Enterasys may assign this Agreement in its sole discretion. This Agreement shall be binding upon
and inure to the benefit of the parties, their legal representatives, permitted transferees, successors and assigns as
permitted by this Agreement. Any attempted assignment, transfer or sublicense in violation of the terms of this Agreement
shall be void and a breach of this Agreement.
12. WAIVER. A waiver by Enterasys of a breach of any of the terms and conditions of this Agreement must be in
writing and will not be construed as a waiver of any subsequent breach of such term or condition. Enterasys’ failure to
enforce a term upon Your breach of such term shall not be construed as a waiver of Your breach or prevent enforcement
on any other occasion.
13. SEVERABILITY. In the event any provision of this Agreement is found to be invalid, illegal or unenforceable, the
validity, legality and enforceability of any of the remaining provisions shall not in any way be affected or impaired
thereby, and that provision shall be reformed, construed and enforced to the maximum extent permissible. Any such
invalidity, illegality or unenforceability in any jurisdiction shall not invalidate or render illegal or unenforceable such
provision in any other jurisdiction.
14. TERMINATION. Enterasys may terminate this Agreement immediately upon Your breach of any of the terms and
conditions of this Agreement. Upon any such termination, You shall immediately cease all use of the Program and shall
return to Enterasys the Program and all copies of the Program.
14-8show ip policy Output Details .................................................................................14-177
Matrix NSA Series Configuration Guide xv
Tables
xvi Matrix NSA Series Configuration Guide
About This Guide
W elcome to the Enterasys Enterasys Matrix® N Standalone (NSA) Series Configuration Guide. This
manual explains how to access the device’s Command Line Interface (CLI) and how to use it to
configure Matrix Series switch/router devices.
Important Notice
Depending on the firmware version used in your Matrix Series device, some featur es described in
this document may not be supported. Refer to the Release Notes shipped with your Matrix Series
device to determine which features are supported.
USING THIS GUIDE
A general working knowledge of basic network operations and an unders tanding of CLI
management applications is helpful before configuring the Matrix Series device.
This manual describes how to do the following:
•Access the Matrix Series CLI.
•Use CLI commands to perform network management and device configuration operations.
•Establish and manage Virtual Local Area Networks (VLANs).
•Manage static and dynamically-assigned user policies.
•Establish and manage priority classification.
•Configure IP routing and routing protocols, including RIP versions 1 and 2, OSPF, DVMRP,
IRDP, and VRRP.
•Configure security protocols, including 802.1X and RADIUS, SSHv2, MAC locking, MAC
authentication, multiple authentication, DoS attack prevention, and flow setup throttling.
•Configure policy-based routing.
•Configure access control lists (ACLs).
Enterasys Matrix® N Standalone (NSA) Series Configuration Guidexvii
STRUCTURE OF THIS GUIDE
The guide is organized as follows:
Chapter 1, Introduction, provides an overview of the tasks that can be accomplished using the CLI
interface, an overview of local management requirements, and information about obtaining
technical support.
Chapter 2, Startup and General Configuration, provides an overview of the device’s factory
default settings and describes how to start the CLI interface, how to set basic system properties, how
to download a firmware image, how to configure WebView and Telnet, how to manage
configuration files, how to set the login password, how to exit the CLI, and how to prepare the
device for router mode operation.
Chapter 3, Configuring Discovery Protocols, describes how to configure the three discovery
protocols supported by the firmware using CLI commands, including the Enterasys Discovery
Protocol, the Cisco Discovery Protocol, and the IEEE 802.1AB Link Layer Discovery Protocol
(LLDP) and LLDP Media Endpoint Discovery Protcol (LLDP-MED).
Chapter 4, Port Configuration, describes how to review and configure console port settings, and
how to enable or disable switch ports and configure switch port settings, including port speed,
duplex mode, auto-negotiation, flow control, port mirroring, link aggegatio n and broadcast
suppression.
Chapter 5, SNMP Configuration, describes how to configure SNMP users and user groups, access
rights, target addresses, and notification parameters.
Chapter 6, Spanning Tree Configuration, describes how to review and set Spanning Tree bridge
parameters for the device, including bridge priority, hello time, maximum aging time and forward
delay; and how to review and set Spanning Tree port parameters, including port priority and path
costs. Also describes how to configure the Loop Protect feature.
Chapter 7, 802.1Q VLAN Configuration, describes how to create static VLANs, select the mode
of operation for each port, establish VLAN forwarding (egress) lists, route frames according to
VLAN ID, display the current ports and port types associated with a VLAN and protocol, create a
secure management VLAN, and configure ports on the device as GVRP-aware ports.
Chapter 8, Policy Classification Configuration, describes how to create, change or remove user
roles or profiles based on business-specific use of network services; how to permit or deny access
to specific services by creating and assigning classification rules which map user profiles to frame
filtering policies; how to classify frames to a VLAN or Class of Service (CoS); and how to assign
or unassign ports to policy profiles so that only ports activated for a profile will be allowed to
transmit frames accordingly.
xviiiEnterasys Matrix® N Standalone (NSA) Series Configuration Guide
Chapter 9, Port Priority and Rate Limiting Configuration, describes how to set the transmit
priority of each port, display the current traffic class mapping-to-priority of each port, set ports to
either transmit frames according to selected priority transmit queues or percentage of port
transmission capacity for each queue, and configure a rate limit for a given port and list of priorities.
Chapter 10, IGMP Configuration, describes how to configure Internet Group Management
Protocol (IGMP) settings for multicast filtering, including IGMP query count, IGMP report delay
and IGMP group status.
Chapter 11, Logging and Network Manageme nt, describes how to configure Syslog, how to
manage general switch settings, how to monitor network events and status while the device is in
switch mode, including the eventlog, command history, netstats and RMON statistics, how to
manage network addresses and routes, and how to configure SNTP and node aliases.
Chapter 12, IP Configuration, describes how to enable IP routing for router mode operation, how
to configure IP interface settings, how to review and configure the routing ARP table, how to review
and configure routing broadcasts, how to configure PIM, how to configure LSNAT and DHCP
server, and how to configure IP routes.
Chapter 13, Routing Protocol Configuration, describes how to configure RIP, OSPF, DVMRP,
IRDP and VRRP.
Chapter 14, Security Configuration, describes how to configure 802.1X authentication using
EAPOL, how to configure RADIUS server, TACACS +, RFC3580, Secure Shell server, MAC
authentication, MAC locking, Port Web Authentication, multiple authentication, policy-based
routing, and IP access control lists (ACLs), Denial of Service (DoS) prevention, and flow setup
throttling.
RELATED DOCUMENTS
The following Enterasys Networks documents may help you to set up, control, and manage the
Matrix Series device:
•Ethernet Technology Guide
•Cabling Guide
•Matrix Series Installation Guide(s)
•Matrix WebView User’s Guide
Documents listed above, can be obtained from the World Wide Web in Adobe Acrobat Portable
Document Format (PDF) at the following web site:
http://www.enterasys.com/support/manuals/
Enterasys Matrix® N Standalone (NSA) Series Configuration Guidexix
DOCUMENT CONVENTIONS
This guide uses the following conventions:
bold typeBold type indicates required user input, including command keywords, that
must be entered as shown for the command to execute.
italic typeWhen used in general text, italic type indicates complete document titles.
When used in CLI command syntax, italic type indicates a user-supplied
parameter, either required or optional, to be entered after the command
keyword(s).
n.nnA period in numerals signals the decimal point indicator (e.g., 1.75 equals one
and three fourths). Or, periods used in numerals signal the decimal point in
Dotted Decimal Notation (DDN) (e.g., 000.000.000.000 in an IP address).
xA lowercase italic x indicates the generic use of a letter (e.g., xxx indicates any
combination of three alphabetic characters).
nA lowercase italic n indicates the generic use of a number (e.g., 19nn indicates
a four-digit number in which the last two digits are unknown).
[ ]Square brackets indicate optional parameters.
{ }Braces indicate required parameters. One or more parameters must be entered.
{[ ]}Square brackets nested within braces indicate one or more optional parameters
must be chosen.
|A bar indicates a choice in parameters.
The following icons are used in this guide:
NOTE: Calls the reader’s attention to any item of information that may be of special
importance.
ROUTER: This symbol denotes router-only functions. Features, commands and
information in this guide not differentiated by this symbol refer to switch-mode operation.
CAUTION: Warns the reader about actions that could affect network operation.
xxEnterasys Matrix® N Standalone (NSA) Series Configuration Guide
1
Introduction
This chapter provides an overview of the Matrix Series’ unique features and functionality, an
overview of the tasks that may be accomplished using the CLI interface, an overview of ways to
manage the device, and information on how to contact Enterasys Networks for technical support.
1.1MATRIX SERIES FEATURES
Matrix Series devices support business-driven networking with:
•Advanced QoS and policy-based frame classification, and bandwidth management featuring rate
limiting, CoS priority queueing and link aggregation.
•Customized, single-source management and control with SNMP, port mirroring, Syslog,
RMON, multi-image support and configuration upload/download.
Matrix NSA Series Configuration Guide1-1
Matrix Series CLI Overview
1.2MATRIX SERIES CLI OVERVIEW
Enterasys Networks’ Matrix Series CLI interface allows you to perform a variety of network
management tasks, including the following:
•Assign IP address and subnet mask.
•Select a default gateway.
•Assign a login password to the device for additional security.
•Download a new firmware image.
•Designate which network management workstations receive SNMP traps from the device.
•View device, interface, and RMON statistics.
•Manage configuration files.
•Assign ports to operate in the standard or full duplex mode.
•Control the number of received broadcasts that are switched to the other interfaces.
•Set flow control on a port-by-port basis.
•Set port configurations and port-based VLANs.
•Configure ports to prioritize and assign a VLAN or Class of Service to incoming frames based
on Layer 2, Layer 3, and Layer 4 information.
•Configure the device to operate as a Generic Attribute Registration Protocol (GARP) device to
dynamically create VLANs across a switched network.
•Redirect frames according to a port or VLAN and transmit them on a preselected destination
port.
•Configure Spanning Trees.
•Clear NVRAM.
•Configure interfaces for IP routing.
•Configure RIP, OSPF, DVMRP, IRDP and VRRP routing protocols.
•Configure security methods, including 802.1X. RADIUS, TACACS, CEP, SSHv2, MAC
locking, and DoS attack prevention.
•Configure access lists (ACLs).
1-2 Matrix NSA Series Configuration Guide
Device Management Methods
1.3DEVICE MANAGEMENT METHODS
The Matrix Series device can be managed using the following methods:
•Locally using a VT type terminal connected to the console port.
•Remotely using a VT type terminal connected through a modem.
•Remotely using an SNMP management station.
•In-band through a Telnet connection.
•In-band using Enterasys Networks’ NetSight
®
management application.
•Remotely using WebView™, Enterasys Networks’ embedded web server application.
The Matrix Series Installation Guide provides setup instructions for connecting a terminal or
modem to the Matrix Series device.
1.4GETTING HELP
For additional support related to this device or document, contact Enterasys Networks using one of
the following methods:
World Wide Webwww.enterasys.com/services/support/
Phone1-800-872-8440 (toll-free in U.S. and Canada)
or 1-978-684-1000
For the Enterasys Networks Support toll-free number in your country:
www.enterasys.com/services/support/contact/
Internet mailsupport@enterasys.com
To expedite your message, type [N-Series] in the subject line.
To send comments concerning this document to the Te chnical Publications Department:
techpubs@enterasys.com
Please include the document Part Number in your email message.
Before calling Enterasys Networks, have the following information ready:
•Your Enterasys Networks service contract number
•A description of the failure
•A description of any action(s) already taken to resolve the problem
(for example, changing mode switches, rebooting the unit)
•The serial and revision numbers of all involved Enterasys Networks products in the network
Matrix NSA Series Configuration Guide1-3
Getting Help
•A description of your network environment (for example, layout, cable type)
•Network load and frame size at the time of trouble (if known)
•The device history (for example, have you returned the device before, is this a recurring
problem?)
•Any previous Return Material Authorization (RMA) numbers
1-4 Matrix NSA Series Configuration Guide
2
Startup and General Configuration
This chapter describes factory default settings and the Startup and General Configuration set of
commands.
2.1STARTUP AND GENERAL CONFIGURATION SUMMARY
At startup, the Matrix Series device is configured with many defaults and standard features. The
following sections provide information on how to review and change factory defaults, how to
customize basic system settings to adapt to your work environment, and how to prepare to run the
device in router mode.
2.1.1Factory Default Settings
The following tables list factory default device settings available on the Matrix Series device.
Table 2-1 lists default settings for Matrix Series switch operation. Table 2-2 lists default settings for
router mode operation.
Table 2-1Default Device Settings for Basic Switch Operation
Device FeatureDefault Setting
CDP discovery
protocol
CDP authentication
code
CDP hold timeSet to 180 seconds.
CDP intervalTransmit frequency of CDP messages set to 60 seconds.
Cisco Discovery
Protocol
Auto enabled on all ports.
Set to 00-00-00-00-00-00-00-00
Globally auto-enabled, enabled on ports.
Matrix NSA Series Configuration Guide2-1
Startup and General Configuration Summary
Factory Default Settings
Table 2-1Default Devi ce Settin g s for Basi c Swi tc h Ope rat io n (Co ntin u ed)
mode
GARP timerJoin timer set to 20 centiseconds; leave timer set to 60 centiseconds;
leaveall timer set to 1000 centiseconds.
GVRPGlobally enabled.
IGMPDisabled. When enabled, query interval is set to 125seconds and
response time is set to 100 tenths of a second.
IP mask and gatewaySubnet mask set to 255.0.0.0; default gateway set to 0.0.0.0
IP routesNo static routes configured.
Jumbo frame supportDisabled on all ports.
Link aggregation
Set to 32768 for all ports.
admin key
Link aggregation flow
Does not apply to MATRIX E7.
Disabled.
regeneration
Link aggregation
Set to 32768 for all ports.
system priority
Link aggregation
Set to DIP-SIP.
outport algorithm
Link Layer Discovery
Both transmitting and receiving LLDPDUs are enabled.
Protocol (LLDP)
LLDP transmit interval30 seconds
LLDP hold multiplier4
2-2 Matrix NSA Series Configuration Guide
Startup and General Configuration Summary
Factory Default Settings
Table 2-1Default Device Settings for Basic Switch Operation (Continued)
Device FeatureDefault Setting
LLDP trap interval5 seconds
LLDP-MED fast repeat3 fast start LLDPDUs
LLDP trapsDisabled
LLDP-MED trapsDisabled
LockoutSet to disable Read-Write and Read-Only users, and to lockout the
default admin (Super User) account for 15 minutes, after 3 failed
login attempts,
LoggingSyslog port set to UDP port number 514. Logging severity level set
to 6 (significant conditions) for all applications.
MAC aging timeSet to 300 seconds.
MAC lockingDisabled (globally and on all ports).
Management
Enabled
Authentication
Notification
MTU discovery
Enabled.
protocol
NetFlow collectionDisabled
NetFlow export versionVersion 5
NetFlow Version 9
20 packets
template refresh rate
NetFlow Version 9
30 minutes
template timeout
PasswordsSet to an empty string for all default user accounts. User must press
ENTER at the password prompt to access CLI.
Password agingDisabled.
Password historyNo passwords are checked for duplication.
Matrix NSA Series Configuration Guide2-3
Startup and General Configuration Summary
Factory Default Settings
Table 2-1Default Devi ce Settin g s for Basi c Swi tc h Ope rat io n (Co ntin u ed)
Device FeatureDefault Setting
Policy classificationClassification rules are automatically enabled when created.
Port auto-negotiationEnabled on all ports.
Port advertised abilityMaximum ability advertised on all ports.
Port broadcast
Disabled (no broadcast limit).
suppression
Port duplex modeSet to half duplex, except for 100BASE-FX and 1000BASE-X,
which is set to full duplex.
Port enable/disableEnabled.
Port prioritySet to 1.
Port speedSet to 10 Mbps, except for 1000BASE-X, which is set to 1000 Mbps,
and 100BASE-FX, which is set to 100 Mbps.
Port trapAll ports are enabled to send link traps.
Priority classificationClassification rules are automatically enabled when created.
RADIUS clientDisabled.
RADIUS last resort
When the client is enabled, set to Challenge.
action
RADIUS retriesWhen the client is enabled, set to 3.
RADIUS timeoutWhen the client is enabled, set to 20 seconds.
Rate limitingDisabled (globally and on all ports).
SNMPEnabled.
SNTPDisabled.
Spanning TreeGlobally enabled and enabled on all ports.
Spanning Tree edge
Enabled.
port administrative
status
2-4 Matrix NSA Series Configuration Guide
Loading...
+ 1342 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.