NetWare and Novell are registered trademarks of Novell, Inc. Merit is a registered trademark of Merit Network, Inc.
Solaris is a trademark of Sun Microsystems, Inc. F5, BIG/ip, and 3DNS are registered trademarks of F5 Networks, Inc.
see/IT is a trademark of F5 Networks, Inc.
“Data Fellows”, the triangle symbol, and Data Fellows product names and symbols/logos are
trademarks of Data Fellows.
F-Secure SSH is a registered trademark of Data Fellows.
All other registered trademarks, trademarks and service marks are property of their respective owners.
Authors: Julie Laccabue, Barbara Weinstein
Editor: Amy Guzules
Production: Julie Laccabue
Special Thanks: Collin Batey, Valerie Swisher, Richard Small
2
Contents
Preface
Introduction15
Conventions15
Related Publications16
Chapter 1ExtremeWare Overview
Summary of Feature s17
Unified Access18
Virtual LANs (VLANs)18
Spanning Tree Protocol18
Quality of Service19
Load Sharing19
ESRP-Aware Switches19
Software Licensing19
Security Licensing20
Obtaining a Security License20
Security Features Under License Control20
Controlling Web Access47
Setting Up Your Browser47
Accessing ExtremeWare Vista48
Navigating ExtremeWare Vista48
Saving Changes50
Filtering Information50
Do a GET When C onfiguring a V LAN51
Sending Screen Output to Extreme Networks51
Using the Simple Network Time Protocol51
Configuring and Using SNTP51
SNTP Configuration Commands54
SNTP Example54
Chapter 4Configuring Ports on a Switch
4Summit 300-48 Switch Software User Guide
Port Numbering55
Enabling and Disabling Switch Ports55
Configuring Switch Port Speed and Duplex Setting56
Switch Port Commands56
Load Sharing on the Switch57
Load-Sharing Algorithms57
Configuring Switch Load S haring58
Load-Sharing Example59
Verifying the Load-Sharing Configuration59
Switch Port- Mirroring59
Port-Mir roring Co mmands60
Port-Mir roring E xampl e61
Configuring Wireless Port Interfaces79
Managing Wireless Clients80
Show Commands80
Event Logging and Reporting81
Chapter 7Unified Access Security
Overview of Securi ty83
User Access Security84
Authentication84
Privacy85
Cipher Suites85
Network Security Policies87
Policy Design87
Policy Examples88
Policies and RADIUS S upport88
RADIUS Attributes88
CLI Commands for Security on the Switch89
Security Profile Commands89
Example Wireless Configuration Process91
Chapter 8Power Over Ethernet
Overview95
Summary of PoE Features95
Port Power Management96
Port Power Operator Limit96
Power Budget Management96
Port Power Events97
Per-Port LEDs98
Configuring Power Over Ethernet98
Chapter 9Forwarding Database (FDB)
Overview of the FDB103
FDB Contents1 03
FDB Entry Types103
How FDB Entries Get Added104
Associating a QoS Profil e with an FDB Entry104
93
Configuring FDB Entries105
FDB Configuration Examples106
Displaying FDB Entries106
6Summit 300-48 Switch Software User Guide
Chapter 10Access Policies
Overview of Access Policies107
Access Control Lists107
Rate Limits107
Using Access Control Lists107
Access Masks108
Access Lists108
Rate Limits109
How Access Control Lists Work109
Access Mask Precedence Numbers110
Specifying a Default Rule110
The permit-established Keyword111
Adding Access Mask, Access List, and Rate Limit Entries111
Deleting Access Mask, Access List, and Rate Limit Entries112
Verifying Access Control List Configurations112
Access Control List Commands112
Access Control List Examples116
Contents
Chapter 11Quality of Service (QoS)
Overview of Po licy-Based Quality of Se rvice121
Applications and Types of QoS122
Voice Applications122
Video Applications122
Critical Database Applications122
Web Browsing Applications123
File Server Applications1 23
Configuring QoS for a Port or VLAN123
Traffic Groupings124
Access List Based Traffic Groupings124
MAC-Based Traffic Groupings125
Explicit Class of Service (802.1p a nd DiffServ) Traffic Groupings126
Configuring DiffServ128
Physical and Logical Groupings130
Power169
Power Cord170
Connections170
Lithium Battery171
Contents
Appendix BSupported Standards
Appendix CSoftware Upgrade and Boot Options
Downloading a New I mage175
Rebooting the Sw itch176
Saving Configuration Changes176
Returning to Factory Defaults1 76
Using TFTP to Upload the Configuration177
Using TFTP to Download the Configuration178
Downloading a Complete Co nfiguration178
Downloading an Incremental Configura tion1 78
Scheduled Incremental Configuration Download178
Remember to Save179
Upgrading and Accessing BootROM179
Upgrading Bootloader179
Accessing the Bootstrap CLI179
Accessing the Bootloader CLI180
Boot Option Commands181
Appendix DTroubleshooting
LEDs183
Using the Command-Line Interface184
Port Configuration185
VLANs186
STP187
Summit 300-48 Switch Software User Guide9
Contents
Debug Tracing187
TOP Command187
Contacting Extreme Technical Support187
Index
Index of Commands
10Summit 300-48 Switch Software User Guide
Figures
1Example of a port-based VLAN on the Summit 300-48 switch64
2Single port-based VLAN spanning two switches65
3Two port-based VLANs spann ing two switches66
4Physical diagram of tagged and un tagged traffic68
5Logical diagram of tagged and untagged traffic68
6Sample integrated wired and wireless network74
7Permit-established access list exam ple topology116
8Access control list denies all TCP and UDP traffic117
9Access list allows TCP traffic118
10Host A initiates a TCP sessi on to host B118
11Permit-established access list f ilters out SYN packet to destinati on119
12ICMP packets are filtered out119
13Ethernet packet encapsulation126
14IP packet header encapsulation128
15Multiple Spanning Tree Domains147
16Tag-based STP configuration148
17Routing between VLANs154
18Unicast routing configuration example162
Summit 300-48 Switch Software User Guide11
Figures
12Summit 300-48 Switch Software User Guide
Tables
1Notice Icons15
2Te xt Con v entions1 6
3ExtremeWare Summit 300-48 Factory Defaults20
4Command Syntax Symbols25
5Line-Editing Keys25
6Common Commands26
7Default Accounts29
8DNS Commands31
9Ping Command Parame ters32
10SNMP Configuration Commands41
11RADIUS Comm ands43
12Multiselect List Box Key Definitions49
13Greenwich Mean Time Offsets52
14SNTP Configuration Commands54
15Switch Port Commands56
16Switch Port-Mirroring Configuration Com mands60
17EDP Commands61
18VLAN Configuration Commands70
19RF Configuration Commands76
20RF Profile Property Values76
21Switch-Level Wireless Configuration Commands78
22Switch-Level Configuration Property Values78
23Wireless Port Configuration Commands79
24Wireless Port Configuration Property Values79
25Wireless Port Interface Configuration Com mands80
26Client Configuration Commands80
27Show Comman ds80
28Wi-Fi Security Cipher Suites86
29Authentication-Based Network Access Example88
30RADIUS Request Attributes88
31RADIUS Response Attributes89
32Vendor-Specific Attributes89
33Security Profile Commands89
Summit 300-48 Switch Software User Guide13
Tables
34Security Profile Command Property Values90
35Per-Port LEDs98
36Power Over Ethernet Configuration Commands98
37PoE Show Commands101
38FDB Configuration Commands105
39Access Control List Configuration Commands113
40Traffic Type and QoS Guidelines123
41QoS Configuration Commands123
42Traffic Groupings by Precedence124
43802.1p Priority Value-to-QoS Profile to Hardware Queue Default Mapping127
44802.1p Configuration Commands127
45DiffServ Configuration Commands128
46Default Code Point-to-QoS Profile Mapping129
47Status Monitoring Commands134
48Port Monitoring Display Keys137
49Fault Levels Assigned by the Switch138
50Fault Log Subsystems138
51Logging Commands140
52Event Actions144
53STP Configuration Commands149
54STP Disable and Reset Commands152
55Relative Route Priorities157
56Basic IP Commands158
57Route Table Configuration Commands159
58ICMP Configuration Commands160
59Router Show Commands163
60Router Reset and Disa ble Commands163
61UDP-Forwarding Commands166
62Bootstrap Command Options180
63Bootloader Command Options180
64Boot Option Commands181
14Summit 300-48 Switch Software User Guide
Preface
This preface provides an overview of this guide, describes guide conventions, and lists other
publications that may be useful.
Introduction
This guide provides the required information to in stall the Summit™ 300-48 switch and configure the
ExtremeWare
This guide is intended for use by net work administrators who a re responsible for installing and setting
up network equipment. It assu mes a basic working knowledg e of:
• Local area networks (LANs)
• Ethern et conc epts
• Ethernet switching and bridging concepts
• Routing concepts
• Internet Protocol (IP) conce pts
• Simple Network Management Protocol ( SNMP)
NOTE
If the information in the rel ease notes shipped with your switch differs from the information in thi s guide,
follow the release notes.
™
software running on the Summit 300-48 switch.
Conventions
Table 1 and Table 2 list conventions that are used throughout this guide.
Table 1: Notice Icons
IconNotice TypeAlerts you to...
NoteImportant features or instructions.
Summit 300-48 Switch Software User Guide15
Preface
Table 1: Notice Icons (continued)
IconNotice TypeAlerts you to...
CautionRisk of perso nal injury , system damage,
WarningRisk of severe pe rsonal injury .
or loss of dat a.
Table 2: Text Conventions
ConventionDescription
Screen displaysThis typeface indicates command syntax, or represents information
The words “enter”
and “type”
[Key] namesKey names are written with brackets, such as [Return] or [Esc].
Words in italicized typeItalics emphasize a point or denote new terms at the place where
as it appears on the screen.
When you see the word “enter” in this guide, you must type
something, and then press the Return or Enter key. Do not press the
Return or Enter key when an instr uction simpl y says “type.”
If you must press two or more keys simultaneously, the key names
are linked with a plus sign (+). Example:
Press [Ctrl]+[Alt]+[Del].
they are defined in the text.
Related Publications
The publications related to this one are:
• ExtremeWare Release Notes
• Summit 300-48 Switch Release Notes
Documentation for Extreme Networks products is av ailable on the World Wide Web at the following
location:
• http://www.extremenetworks.com/
16Summit 300-48 Switch Software User Guide
1ExtremeWare Over view
This chapter describes the following topics:
• Summary of Feat ures on page 17
• Security Licensing on page 20
• Software Factory Defaults on page 20
ExtremeWare is the full-featured software operating system that is designed to run on the
Summit 300-48 switch. This section describes the supported ExtremeWare features for the Summit
300-48 switch.
Summary of Features
The Summit 300-48 switch supports the following ExtremeWare features:
• Unified Access support
• Virtual local area networks (VLANs) including support for IEEE 802.1Q and IEEE 802.1p
• Spanning Tree Protocol (STP) (IEEE 802.1D)
• Quality of Service (QoS) including support for IEEE 802.1p, MAC Q oS, and four hardware queues
• Wire-speed Internet Protocol (IP) forwarding
• Extreme Standby Router Protocol (ESRP) - Aware support
• Diffserv suppo rt
• Access-policy support for routing protocols
• Access list support for packet filtering
• Access list support for rate-limiting
• Load sharing on multiple ports
• RADIUS client
• Console command-line interface (CLI) connection
• Telnet CLI connection
Summit 300-48 Switch Software User Guide17
ExtremeWare Overview
• SSH2 connec tion
• Simple Network M anagement Protocol (SNM P) support
• Remote Monitoring (RMON)
• Traffic mirroring for ports
Unified Access
The Summit 300-48 supports the Unified Access architecture, enabling wired and wireless applications
across a completely integrated enterprise infrastructure. With the Altitude product line, the Summit
300-48 supports 802.11 WLAN connectivity. Provisioning of Unified Access is completely controlled by
the Summit 300-48.
Virtual LANs (VLANs)
ExtremeWa re has a VLAN feature that enables you to construct your broadcast domains without being
restricted by physical connections. A VLAN is a group of location- and topolog y-independent devices
that communicate as if they were on the same physical local area network (LAN).
Implementing VLANs on your network has the following three advantages:
• They help to control broadcast traffic. If a device in VLAN Marketing transmits a broadcast frame,
only VLAN Marketing devices receive the frame.
• They provide extra security. Devices in VLAN Marketing can only communicate with devices on
VLAN Sales using routing services.
• They ease the change and movement of devices on networks.
NOTE
For more information on VLANs, see Chapte r 5, “Virtual LANs (VLA Ns)”.
Spanning Tree Protocol
The Summit 300-48 supports the IEEE 802.1D Spanning Tree Protocol (STP), which is a bridge-based
mechanism for providing fault tolerance on netw orks. STP enables you to implem ent parallel paths for
network traffic, and ensure that:
• Redundant paths are disabled when the main paths are operational.
• Redundant paths are enabled if the main traffic paths fail.
A single spanning tree can span multi ple VLANs.
NOTE
For more information on STP, see Chapte r 13, “Spanning Tree Protocol (STP)”.
18Summit 300-48 Switch Software User Guide
Software Licensing
Quality of Service
ExtremeWare has Quality of Service (QoS) features that support IEEE 802.1p, MAC QoS, and four
queues. These features enable you to specify service levels for different traffic groups. By default, all
traffic is assigned the “normal” QoS policy profile. If needed, you can create other QoS policies and
rate-limiting access control lists and apply them to di fferent traffic types so that they have different
maximum bandwidth, and priority.
NOTE
For more information on Quality of Service, see Chap ter 11, “Quality of Ser vice (QoS)”.
Load Sharing
Load sharing allows you to increase bandwidth and resiliency by usi ng a group of ports to carry traffic
in parallel between systems. The sharing algorithm allows th e switch to use multiple ports as a single
logical port. For example, VLANs see the lo ad-sharing group as a single vi rtual port. The algorithm also
guarantees packet sequencing between clients.
NOTE
For information on load shar ing, see Chapter 4, “Config uring Ports on a Sw itch”.
ESRP-Aware Switches
Extreme switches that are not running ESRP, but are connected on a network that has other Extreme
switches running ESRP are ESRP-aware. When ESRP-aware switches are attached to ESRP-enabled
switches, the ESRP-aware switches reliably perform f ail-over and fail-back scenarios in the prescribed
recovery times. No configuration of th is feature is necessary.
If Extreme switches running ESRP are connected to layer 2 switches that are not manufactured by
Extreme Networks (or Extreme switches that are not running ExtremeWare 4.0 or above), the fail-over
times seen for traffic local to the segment m ay appear longer, depending on the application involved
and the FDB timer used by the other vendor ’s layer 2 switch. As such, ESRP can be used with layer 2
switches from other vendors, but the recovery times vary.
The VLANs associated with the ports connecting an ESRP-aware switch to an ESRP-enabled switch
must be configured using an 802.1Q tag on the connecti ng port, or, if only a single VLAN is involved, as
untagged using the protocol filter
interconnection port is configured for a protocol -sensitive VLA N using untagged t raffic.
any. E SRP will not function correctly if the ESR P-aware switch
Software Licensing
Summit 300-48 switches support Advanced Edge licensing.
Summit 300-48 Switch Software User Guide19
ExtremeWare Overview
Security Licensing
Certain additional ExtremeWare security features, such as the use of Secure Shell (SSH2) encryption,
may be under United States export restriction control. Extreme Networks ships these security features in
a disabled state. You can obtain information on enabling these features at no charge from Extreme
Networks.
Obtaining a Security License
To obtain information on enabling features that require export restriction, access the Extreme Networks
Support website at:
http://www.extremenetworks.com/go/security.htm
Fill out a contact form to indica te compliance or noncomplia nce with the export restrictions. If you are
in compliance, you will be given in formation that will allo w you to enable security fea tures.
Security Features Under License Control
ExtremeWare version 6.0 and above supports the SSH2 protocol. SSH2 allows the encryption of session
data. The encryption methods used are under U.S. export restriction control.
Software Factor y Defaults
Table 3 shows factory defaults for Summit 300-48 ExtremeWare features.
Serial or Telnet user accountadmin with no password and user with no password
TelnetEnabled
SSH2Disabled
SNMPEnabled
SNMP read community stringpublic
SNMP write community stringprivate
RMON Disabled
BOOTPDisabled on the default VLAN (default)
QoSAll traffic is part of the default queue
802.1p pri orityRecognition enabled
802.3x flow controlEnabled on Gigabit Ethernet ports
Virtual LANsTwo VLANs predefined. VLAN named default contains all
802.1Q taggingAll packets are untagged on the default VLAN (default).
Spanning Tree ProtocolDisabled for the switch; enabled for each port in the STPD.
Forwarding database aging period300 seconds (5 minutes)
IP RoutingDisabled
IP multicast routingDisabled
IGMPEnabled
IGMP snoopingDisabled
SNTPDisabled
DNSDisabled
Port MirroringDisabled
WirelessEnabled
NOTE
For default settings of individual Extre meWare features, see the applicable individual cha pters in this
guide.
Summit 300-48 Switch Software User Guide21
ExtremeWare Overview
22Summit 300-48 Switch Software User Guide
2Accessing the Switch
This chapter describes the following topics:
• Understanding the Comman d Syntax on page 23
• Line-Editing Keys on page 25
• Command History on page 26
• Common Commands on page 26
• Configuring Management Access o n page 28
• Domain Name Service Client Services on page 31
• Checking Basic Connectivity on page 32
Understanding the Command Syntax
This section describes the steps to take when entering a command. Refer to the sections that follow for
detailed information on us ing the command-line interf ace (CLI).
When entering a command at the prompt, ensure that you have the appropriate privilege level. Most
configuration commands require you to have the ad ministrator privilege level. To use the CLI, follow
these steps:
1 Enter the command name.
If the command does not include a parameter or values, skip to step 3. If the command requires
more information, continue to step 2.
2 If the command includes a parameter, enter the parameter name and values.
3 The value part of the command specifies how you want the parameter to be set. Values include
numerics, strings, or addresses, depending on the parameter.
4 After entering the complete command, press [Return].
NOTE
If an asterisk (*) appe ars in front of the comm and-line prompt, it in dicates that you have outstanding
configuration changes that have not been saved. For more informa tion on saving con figuration chang es,
see Appendix C, “Software Upgrade and B oot Options”.
Summit 300-48 Switch Software User Guide23
Accessing the Switch
Syntax Helper
The CLI has a built-in syntax helper. If you are unsure of the complete syntax for a particular command,
enter as much of the command as possible and press [Return]. The syntax helper provides a list of
options for the remainde r of the command.
The syntax helper also provides assistance if you have entered an incorrect command.
Command Completion with Syntax Helper
ExtremeWare provides command completion by way of the [Tab] key. If you enter a partial command,
pressing the [Tab] key posts a list of available options, and places the cursor at the end of the command.
Abbreviated Syntax
Abbreviated syntax is the most unambiguous, sh ortest allowable abbreviation of a com mand or
parameter. Typically, th is is the first three letters of the command.
In command tables throughout this guide, abbreviated syntax is noted using bold characters.
NOTE
When using abbreviated syntax, you must enter enough characters to ma ke the command
unambiguous and disti nguishable to the switch.
Command Shortcuts
All named components of the switch configuration must have a unique name. Components are named
using the
create command. When you enter a command to configure a named component, you do not
need to use the keyword of the component. For example, to create a VLAN, you must enter a unique
VLAN name:
create vlan engineering
After you have created the VLAN with a unique name, you can then elimin ate the keyword vlan from
all other commands that require the name to be entered. For example, on the stand-alone switch,
instead of entering the command
config vlan engineering delete port 1:1-1:3,1:6
you could enter the following shortcut:
config engineering delete port 1:1-1:3,1:6
Summit 300-48 Switch Numerical Ranges
Commands that require you to enter one or more slot:port numbers on a Summit 300-48 switch use the
parameter
port 1:1-1:3
<portlist> in the syntax. A portlist can be a range of numbers, for example:
You can add additional slot and port numbers to the list, separated by a comma:
port 1:1-1:3, 1:6,1:8
24Summit 300-48 Switch Software User Guide
Line-Editing Keys
Names
All named components of the switch configuration must have a unique name. Names must begin with
an alphabetical character and are delimited by w hitespace, unless enclosed in qu otation marks.
Symbols
You may see a variety of symbols shown as part of the command syntax. These symbols explain how to
enter the command, and you do not type them as part of the com mand itself. Table 4 summarizes
command syntax symbols.
Table 4: Command Syntax Symbol s
angle brackets < >Enclose a variable or value. You must specify the variable or value. For
example, in the syntax
config vlan <name> ipaddress <ip_address>
you must supply a VLAN name for <name> and an address for
<ip_address> when entering the command. Do not type the angle
brackets.
square brackets [ ]Enclose a required value or list of required arguments. One or more
values or arguments can be specified. For example, in the syntax
use image [primary | secondary]
you must specify either the primary or secondary image when entering
the command. Do not type the square brackets.
vertical bar |Separates mutually exclusive items in a list, one of which must be
braces { }Enclose an optional value or a list of optional arguments. One or more
entered. For example, in the syntax
config snmp community [readonly | readwrite] <string>
you must specify either the read or write community string in the
command. Do not type the vertical bar.
values or arguments can be specified. For example, in the syntax
reboot {<date> <time> | cancel}
you can specify either a particular date and time combination, or the
keyword cancel to cancel a previously scheduled reboot. If you do not
specify an argument, the command will prompt, asking if you want to
reboot the switch now. Do not type the braces.
Line-Editing Keys
Table 5 describes the line-editing keys ava ilable using the CLI.
Table 5: Line-Editing Keys
SymbolDescription
BackspaceDeletes character to left of cursor and shifts remainder of line to left.
Delete or [Ctrl] + DDeletes character under cursor and shifts remainder of line to left.
[Ctrl] + KDeletes characters from under cursor to end of line.
[Ctrl] + UClears all characters typed from cursor to beginning of line.
Summit 300-48 Switch Software User Guide25
Accessing the Switch
Table 5: Line-Editing Keys (continued)
SymbolDescription
[Ctrl] + WDelet es previ ous word .
InsertToggles on and off. When toggled on, inserts text and shifts previous
Left ArrowMoves cursor to left.
Right ArrowMoves cursor to right.
Home or [Ctrl] + AMoves cursor to first character in line.
End or [Ctrl] + EMoves cursor to last character in line.
[Ctrl] + LClears screen and movers cursor to beginning of line.
[Ctrl] + P or
Up Arrow
[Ctrl] + N or
Down Arrow
text to right.
Displays previous command in command history buffer and places cursor
at end of command.
Displays next command in command history buffer and places cursor at
end of command.
Command History
ExtremeWare “remembers” the last 49 commands you entered. Yo u can display a list of these
commands by using the follow ing command:
history
Common Commands
Table 6 describes comm on commands used to manage the switch. Commands specific to a particular
feature are described in the other chapters of this guide.
Table 6: Common Commands
CommandDescription
clear session <number>Terminates a Telnet session from the
config bannerConfigures the banner string. You can
config ports <portlist> auto off {speed [10 | 100 |
1000]} duplex [half | full]
config ssh2 ke y {pregen erated} Generates the SSH2 host key.
Configure s a user acc ount pass word.
Passwords must have a minimum of 1
character and can have a maximum of 32
characters. User names and passwords
are case-sensitive.
enter up to 24 rows of 79-column text that
is displayed before the login prompt of
each session. Press [Return] at the
beginning of a line to terminate the
command and apply the banner. To clear
the banner, pr es s [R et ur n] at t he be gi n ni ng
of the first line.
Manually configures the port speed and
duplex setting of one or more ports on a
switch.
26Summit 300-48 Switch Software User Guide
Table 6: Common Commands (conti nued)
CommandDescription
config sys-r ecovery-l evel [none | critic al | all]Configures a recovery option for instances
config time <date> <time>Configures the system date and time. The
config timezone <gmt_offset> {autodst | noautodst} Configures the time zone information to
create vlan <name>Creates a VLAN.
delete account <username>Deletes a user account.
delete vla n <name>Deletes a VLAN.
disable bootp vlan [<name> | all]Disables BOOTP for one or more VLANs.
disable cli-config-loggingDisables logging of CLI commands to the
disable clipagingDisables pausing of the screen display
disable idletimeoutsDisables the timer that disconnects all
disable ports <portlist>Disables a port on th e switch.
where an exception occurs in
ExtremeWare. Specify one of the
following:
• none — Recovery without system
reboot.
• critical — ExtremeWare logs an
error to the syslog, and reboots the
system after critical exceptions.
• all — ExtremeWa re logs an error to
the syslog, and reboots the system
after any ex ception.
The default setting is none.
format is as follows:
mm/dd/yyyy hh:mm:ss
The time us es a 24-ho ur cloc k for mat . You
cannot set the year past 2036.
the configured offset from GMT time. The
format of gmt_offset is +/- minutes from
GMT time. Specify:
• autodst — Enables automatic
Daylight Savings Time change.
• nosautodst — Disables automatic
Daylight Savings Time change.
The default setting is autodst.
Configures an IP address and subnet
mask for a VLAN.
Creates a user account. This command is
available to admin-level users and to users
with RADIUS command authorization. The
username is between 1 and 32 characters,
the password is between 0 and 16
characters.
Syslog.
when a show command output reaches
the end of the page.
sessions. Once d is abl ed , co ns ol e sess io n s
remain open until the switch is rebooted or
you logoff. Telnet sessions remain open
until you close the Telnet client.
Common Commands
Summit 300-48 Switch Software User Guide27
Accessing the Switch
Table 6: Common Commands (continued)
CommandDescription
disable ssh2Disables SSH2 access to the s witch.
disable telnetDisables Telnet access to the switch.
enable bootp vlan [<name> | all]Enables BOOTP for one or more VLANs.
enable cli-config-loggingEnables the logging of CLI configuration
enable clipagingEnables pausing of the screen display
enable idletimeouts Enables a timer that disconnects all
show bannerDisplays the user-configured banner.
unconfig switch {all}Resets all switch parameters (with the
commands to the Syslog for auditing
purposes. The defaul t settin g is enabl ed.
when show command output reaches the
end of the page. The default setting is
enabled.
sessions (both Telnet and console) after
20 minutes of inactivity. The default setting
is disabled.
Enables SSH2 sessions. By default, SSH2
uses TCP port number 22.
Enables Telnet access to the switch. By
default, Telnet uses TCP port number 23 .
entered on t he switc h.
exception of defined user accounts, and
date and time information) to the factory
defaults. If you specify the keyword all,
the switch eras es the curr ently sele cted
configuration image in flash memory and
reboots. As a result, all parameters are
reset to default settings.
Configuring Mana gement Access
ExtremeWare supports the following two levels of man agement:
• User
• Administrator
In addition to the management levels, you can optional ly use an external RADIUS server to provide CLI
command authorization checking for each command. For more information on RADIUS, see “RADIUS
Client” in Chapter 3, “Managing the Switch”.
28Summit 300-48 Switch Software User Guide
Configuring Mana gement Acce ss
User Account
A user-level account has viewing access to all manageable parameters, with the exception of:
• User account database.
• SNMP community strings.
A user-level account can use the ping command to test device reachability, and change the password
assigned to the account name. If you h ave logged on with user capabilit ies, the command-line prompt
ends with a (>) sign. For example:
Summit 300-48:2>
Administrator Account
An administrator-level account can view and ch ange all switch parameters. It can also add and delete
users, and change the password associated with any account name. The administrator can disconnect a
management session that has been established by way of a Telnet connection. If this happens, the user
logged on by way of the Telnet connection is notified that the session has been terminated.
If you have logged on with administrator capabilities, the command-line prompt ends with a (#) sign.
For example:
Summit 300-48:18#
Prompt Text
The prompt text is taken from the SNMP sysname setting. The number that follows the colon indicates
the sequential line /command number.
If an asterisk (*) appears in front of the command-line prompt, it indicates tha t you have outstanding
configuration changes that have not been saved. For example:
*Summit 300-48:19#
Default Accounts
By default, the switch is configured with t wo accounts, as shown in Table 7.
Table 7: Default Accounts
Account NameAccess Level
adminThis user can access and change all manageable
userThis user can view (but not change) all manageable
parameters. The admin account cannot be deleted.
parameters, with the following exceptions:
• This user cannot view the user account database.
• This user cannot view the SNMP community strings.
Summit 300-48 Switch Software User Guide29
Accessing the Switch
Changing the Default Password
Default accounts do not ha ve passwords assigned to the m. Passwords must have a mi nimum of four
characters and can have a maximum of 12 characters.
NOTE
User names and passwords are case-s ensitive.
To add a password to the default admin account, follow these steps:
1 Log in to the switch using the n ame admin.
2 At the password prompt, press [Return].
3 Add a default admin password by entering the following command:
config account admin
4 Enter the new password at the prompt.
5 Re-enter the new password at the prompt.
To add a password to the default user account, follow these steps:
1 Log in to the switch using the n ame admin.
2 At the password prompt, press [Return], or enter the password that you have configured for the
admin account.
3 Add a default user password by entering the following command:
config account user
4 Enter the new password at the prompt.
5 Re-enter the new password at the prompt.
NOTE
If you forget your password while logged out of the command- line interface, contact your local tec hnical
suppor t representative, who will advise on your next course of a ction.
Creating a Management Account
The switch can have a total of 16 management accounts. You can use the default names (admin and
user), or you can create new names and passwords for the accounts. Pass words can have a minimum of
0 characters and can have a maximum of 31 characters.
To create a new account, follow these steps:
1 Log in to the switch as admin.
2 At the password prompt, press [Return], or enter the password that you have configured for the
admin account.
3 Add a new user by using the followi ng command:
create account [admin | user] <username>
4 Enter the password at the prompt.
5 Re-enter the password at the prompt.
30Summit 300-48 Switch Software User Guide
Loading...
+ 168 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.