This guide describes how to use the Command Line Interface (CLI) for the Magnum
6K family of switches. For the Web Management Interface please refer to the Web
Management Guide.
Some simple guidelines which will be useful for configuring and using the Magnum
6K family of switches -
If you need information on a specific command in the CLI, type the
command name after you type the word “help” (help <command> ) or just
type <command> [Enter].
If you need information on a specific feature in Web Management Interface,
use the online help provided in the interface.
If you need further information or data sheets on GarrettCom Magnum 6K
family of switches, refer to the GarrettCom web links at:
http://www.garrettcom.com/managed_switches.htm (except MP62 switch shown on the page)
GarrettCom Inc.
47823 Westinghouse Drive
Fremont, CA 94539-7437
Phone (510) 438-9071• Fax (510) 438-9072
Email – Tech support – support@garrettcom.com
Email – Sales – sales@garrettcom.com
WWW – http://www.garrettcom.com/
i
Trademarks
GarrettCom Inc. reserves the right to change specifications, performance characteristics
and/or model offerings without notice. GarrettCom, Magnum, S-Ring, Link-Loss-Learn,
Converter Switch, Convenient Switch and Personal Switch are trademarks and Personal Hub
is a registered trademark of GarrettCom, Inc.
NEBS is a registered trademark of Telcordia Technologies.
UL is a registered trademark of Underwriters Laboratories.
FIGURE 28 – setting up ssh – since telnet sends the information in clear text, make sure that
telnet is disabled to secure the switch. Do not telnet to the switch to disable telnet. Preferred
method is to do that via the console or using SWM. The client access is not shown here.
Commonly an application like PUTTY is used to access the switch via ssh. Use the show
console command to verify telnet is turned off ............................................................................... 48
FIGURE 29 – Use of DNS .................................................................................................................. 49
F
IGURE 30- Querying the serial port settings ....................................................................................... 50
FIGURE 31- System parameters using the show setup command. Most parameters here cannot be
FIGURE 33- Setting the system name, system location and system contact information ........................... 52
FIGURE 34- Setting the system date, time and time zone ...................................................................... 52
FIGURE 35- Setting the system daylight saving time ............................................................................. 53
FIGURE 36- Setting up SNTP services ............................................................................................... 54
FIGURE 37- Saving the configuration on a tftp server ........................................................................... 55
FIGURE 38 – Based on the sftp, ftp, tftp or xmodem commands – the MNS-6K based switch can
upload or download different types of files and images .Other files such as log files, hosts file
can also be saved or loaded onto a switch .................................................................................... 57
IGURE 39 – commands to save the configuration using ftp. Similar options will be specified using
F
tftp etc. When using the ftp command, use the host command discussed later in this section
to define the ftp server ................................................................................................................ 58
FIGURE 40 – Contents of the config file ................................................................................................. 59
FIGURE 41 – Example of Script file. Note all the commands are CLI commands. This script
provides insights into the configuration of Magnum MNS-6K settings. GarrettCom
recommends that modifications of this file and the commands should be verified by the User
in a test environment prior to use in a "live" production network................................................. 61
FIGURE 42 – Creating host entries on MNS-6K .................................................................................. 62
FIGURE 43 – Enabling or disabling the pagination ............................................................................... 62
FIGURE 53 – Using the SNTP commands ........................................................................................... 87
FIGURE 54 – Changing password for a given account ............................................................................ 89
F
IGURE 55 – Port security configuration mode ...................................................................................... 90
FIGURE 56 – Port security configuration mode ...................................................................................... 91
FIGURE 57 – Port security – allowing specific MAC addresses on a specified port. (No spaces
between specified MAC addresses) ............................................................................................. 92
FIGURE 58 – Port security - the port learns the MAC addresses. Note – a maximum of 200
MAC addresses can be learnt per port and a maximum of 500 per switch. Also, the
‘action’ on the port must be set to none before the port ‘learns’ the MAC address
FIGURE 59 – Enabling and disabling port security ............................................................................... 92
FIGURE 60 – Viewing port security settings on a switch. On port 9, learning is enabled. This port
has 6 stations connected to it with the MAC addresses as shown. Other ports have
learning disabled and the MAC addresses are not configured on those ports ................................ 93
FIGURE 61 – Enabling learning on a port. Note – after the learning is enabled, the port security
can be queried to find the status of MAC addresses learnt. If there were machines
connected to this port, the MAC address would be shown on port 11 as they are shown on
port 9 ....................................................................................................................................... 93
IGURE 62 – Allowing specific MAC address on specific ports. After the MAC address is
F
specified, the port or specific ports or a range of ports can be queried as shown .............................. 94
FIGURE 63 – Removing a MAC address from port security .................................................................. 94
FIGURE 64 – Setting the logging on a port ............................................................................................ 94
FIGURE 65 – Steps for setting up port security on a specific port ............................................................ 95
FIGURE 66 – Show log and clear log command. Note the logs are in the syslog format. The syslog
commands are also displayed .................................................................................................... 101
FIGURE 67 – Steps to allow deny or remove specific services ................................................................. 103
FIGURE 97 – Link Loss Learn (LLL) setup. Setup LLL on ports connected to other switches
participating in S-Ring ............................................................................................................ 185
FIGURE 98 – Dual-homing using ESD42 switch and Magnum 6K family of switches. In case of
a connectivity break – the connection switches to the standby path or standby link ..................... 188
FIGURE 99 – Dual-homing using Magnum 6K family of switches. Note the end device (video
surveillance camera) can be powered using PoE options on Magnum 6K family of switches.
In case of a connectivity break – the connection switches to the standby path or standby
link ........................................................................................................................................ 188
F
IGURE 100– Using S-Ring and dual-homing, it is possible to build networks resilient not only
to a single link failure but also for one device failing on the network .......................................... 189
FIGURE 107 – In the architecture above, using RSTP and LACP allows multiple switches to be
configured together in a meshed redundant link architecture. First define the RSTP
configuration on the switches. Then define the LACP ports. Then finally connect the ports
together to form the meshed redundant link topology as shown above. ......................................... 197
FIGURE 108– LACP, along with RSTP/STP brings redundancy to the network core or
backbone. Using this reliable core with a dual-homed edge switch brings reliability and
redundancy to the edge of the network ....................................................................................... 198
FIGURE 109– This architecture is not recommended ............................................................................ 199
FIGURE 110 – Creating a reliable infrastructure using wireless bridges (between two facilities) and
LACP. “A” indicates a Wi-Fi wireless Bridge or other wireless Bridges. ................................. 200
FIGURE 112 – The network for the ‘show lacp’ command listed below .................................................. 203
FIGURE 113– LACP information over a network ............................................................................. 204
FIGURE 114 – ToS and DSCP ......................................................................................................... 206
FIGURE 115 - IP Precedence ToS Field in an IP Packet Header......................................................... 207
FIGURE 116 - Port weight settings and the meaning of the setting ......................................................... 209
FIGURE 117 – QoS configuration and setup ........................................................................................ 213
FIGURE 118 – IGMP concepts – advantages of using IGMP .............................................................. 216
FIGURE 119 – IGMP concepts – Isolating multicast traffic in a network ............................................. 217
FIGURE 120- In a Layer 2 network, an IGMP multicast traffic goes to all the nodes. In the
figure, T1, a surveillance camera, using multicast, will send the traffic to all the nodes - R1
through R6 - irrespective of whether they want to view the surveillance traffic or not. The
traffic is compounded when additional cameras are added to the network. End result is that
users R1 through R6 see the network as heavily loaded and simple day to day operations
may appear sluggish. ................................................................................................................ 219
F
IGURE 121 - Using IGMP-L2 on Magnum 6K family of switches, a Layer 2 network can
minimize multicast traffic as shown above. Each switch has the IGMPL2 turned on.
Each switch can exchange the IGMP query message and respond properly. R4 wants to
view surveillance traffic from T1. As shown by (1), a join request is sent by R4. Once the
join report information is exchanged, only R4 receives the video surveillance traffic, as
shown by (2). No other device on the network gets the video surveillance traffic unless they
issue a join request as well. ...................................................................................................... 220
FIGURE 122 – Enabling IGMP and query the status of IGMP ......................................................... 222
FIGURE 123 – Displaying IGMP groups ........................................................................................... 223
FIGURE 169– upgrading the switch using the serial interface ............................................................... 350
FIGURE 170– Dialog for upgrading the image using tftp ..................................................................... 351
F
IGURE 171 – Updating the boot code over the network using the upgrade command. Make sure
to reboot the switch after the boot loader upgrade is completed .................................................... 353
xviii
Chapter
1
1 – Conventions Followed
Conventions followed in the manual…
o best use this document, please review some of the conventions followed in the
manual, including screen captures, interactions and commands with the switch,
T
Box shows interaction with the switch command line or screen captures from the
switch or computer for clarity
Commands typed by a user will be shown in a different color and this
font
Switch prompt – shown in Bold font, with a “# or >” at the end. For the
document we will use Magnum6K25# as the default prompt.
Syntax rules
Optional entries are shown in [square brackets]
Parameter values within are shown in < pointed brackets >
Optional parameter values are shown again in [square brackets]
In the example above:
Parameter 1 and Parameter 2 are optional values
Parameter 2 can be used optionally only if Parameter 1 is specified
Parameter 3 is mandatory.
Parameter 1 has value1 = IP address
Parameter 2 has value2 = string
Parameter 3 has value3 or value4
etc.
19
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
Re
lated Topics
Re
j
lated topics show that GarrettCom strongly recommends reading
ab
out those topics. You may choose to skip those if you already have
prior detailed knowledge on those subjects.
Tool box – Necessary software and hardware components needed (or
recommended to have) as a prerequisite. These include serial ports on a
computer, serial cables, TFTP or FTP software, serial terminal emulation
software etc.
Caution or take notice – Things to watch out for in case of problems or
potential problems. This is also used to draw attention to a special issue,
capability or fact.
MNS-6K-SECURE – The functionality described in the related
section is available in MNS-6K-SECURE version only. To upgrade
from MNS-6K to MNS-6K-SECURE, please contact the GarrettCom
Sales or support staff. MNS-6K-SECURE has all the commands
MNS-6K has and more. The additional commands in the manual will
be shown by the “lock” icon shown here. MNS-6K-SECURE is a
licensed feature of GarrettCom Inc. Each switch with MNS-6K is upgraded to MNS-6KSECURE with the license key provided for that switch from GarrettCom Inc.
Terminology – Whenever the word PC is used it implies a UNIX, Linux, Windows or
any other operating system based work station, computer, personal computer, laptop,
notebook or any other computing device. Most of the manual uses Windows-XP based
examples. While effort has been made to indicate other Operating System interactions, it
is best to use a Windows-XP based machine when in doubt.
Supported MNS-6K Version – The documentation reflects features of MNS-6K
version 3.4 or later. If your switch is not at the current version, GarrettCom Inc.
recommends upgrade to the latest version. Please refer to the GarrettCom Web site for
information on upgrading the MNS-6K software on Magnum 6K family of switches.
Product Family – this manual is for all the Magnum 6K family of switches.
Finally, at the end of each chapter, is a list of the commands covered in the chapter
as well as a brief synopsis of what they do.
20
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
Flow of the User Guide
The manual is designed to guide the user through a sequence of events.
Chapter 1 – this chapter
Chapter 2 is the basic setup as required by the Magnum 6K family of switches. After
completing Chapter 2, the configuration can be done using the web interface. Chapter 2 is
perhaps the most critical chapter in what needs to be done by the network administrator
once the switch is received.
Chapter 3 focuses on operational issues of the switch. This includes time synchronization
using the command line or using a time server on the network.
Chapter 4 through Chapter 8 focuses on security and access consideration. Bad
passwords trump any security setup, so setup the manager passwords carefully as
described in Chapter 2. Chapter 4 describes how to setup port access using MAC address
security.
Chapter 5 describes the functionality of a DHCP server and how the
switch can be used as a DHCP server
Chapter 6 discusses time synchronization issues and SNTP services
TACACS+ server for authenticating access to devices on the network.
Chapter 10 talks about port mirroring and preventing broadcast storms. Port mirroring is
necessary in a network to reflect traffic from one port onto another port so that the traffic
can be captured for protocol analysis or intrusion analysis.
Chapter 11 deals with VLANs. VLANs provide security as well as traffic separation. This
chapter shows how VLANs can be setup and managed.
At this stage the network and the switch are secured. It is now critical to make the
network more reliable. The User Guide switches gears and talks about STP, RSTP and SRing technologies which can be used for making the network reliable. These technologies
allow resiliency in a network. Chapters 12 through Chapter 14 discuss some resiliency
techniques.
Chapter 7 discusses access consideration and how the access can be
secured.
Chapter 8 describes how a RADIUS server can be used for authentication
and access.
Chapter 9 essentially is similar to Chapter 7, and talks about using a
21
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
Chapter 12 shows how STP can be setup and used. Today, RSTP is preferred over STP.
Chapter 13 shows how RSTP is setup and used as well as how RSTP can be used with
legacy devices which support STP only.
Chapter 14 focuses on S-Ring™ and setup of S-Ring.
Chapter 15 talks about dual homing and how dual homing can be used to bring resiliency
to edge devices.
Chapter 16 describes LACP and how LACP can be used to increase the throughput
using 10/100 Mbps ports or in situations where resiliency is needed between switches
(trunks).
Once the network is made resilient, the network manager may want to setup prioritization
of traffic.
Chapter 17 focuses on Quality of Service (QoS) and other prioritization issues.
Chapters 18 and 19 focus on advanced topics such as IGMP and GVRP.
Chapter 18 focuses on IGMP.
Chapter 19 focuses on GVRP.
Chapter 20 shows how the SNMP parameters can be setup for managing the switch with
network management software such as Castle Rock SNMPc™
Chapter 21 includes miscellaneous commands to improve the overall ease of use and
other diagnostic information.
22
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
2 – Getting Started
First few simple steps …
his section explains how the GarrettCom Magnum 6K family of switches can be setup using
the console port on the switch. Some of the functionality includes setting up the IP address of
T
the switch, securing the switch with a user name and password, setting up VLAN’s and more.
Chapter
2
Before starting
Before you start, it is recommended to acquire the hardware listed below and be ready
with the items listed.
For initial configuration through the serial/console port
1) A female-female null modem cable. This cable is available from GarrettCom Inc. as
well as from LAN store (http://www.lanstore.com)
2) Serial port – if your PC does not have a serial port, you may want to invest in a USB to
serial converter. This is again available from LAN store or from GarrettCom Inc.
Alternately a USB to serial cable can also be used. This cable is also available from
LAN store or GarrettCom Inc.
3) A PC (or a workstation/computer) with a terminal emulation program such as
HyperTerminal (included with Windows) or Teraterm-pro, minicom or other
equivalent software. (Make sure the software supports Xmodem protocol, as you may
need this in the future to update the MNS-6K software)
4) Enough disk space to store and retrieve the configuration files as well as copy software
files from GarrettCom. We recommend at least 15MB of disk space for this purpose
5) Decide on a manager level account name and password for access security
6) IP address, netmask, default gateway for the switch being configured
As a default, the switch has no IP (Internet Protocol) address and subnet mask. For first
time use, the IP address has to be assigned. This can only be done by using the console
interface provided.
The same procedure can also be used for other configuration changes or updates – e.g.
changing the IP address, VLAN assignments and more. Once the IP address is assigned
23
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
and a PC is networked to the switch, the switch’s command line interface (CLI) can be
accessed via telnet. To manage the switch through in-band (networked) access (e.g. telnet,
or Web Browser Interface), you should configure the switch with an IP address and
subnet mask compatible with your network. You should also change the manager
password to control access privileges from the console.
Many other features such as optimizing the switch’s performance, traffic engineering and
traffic prioritizing, VLAN configuration, and improving network security can be
configured through the switch’s console interface as well as in-band (networked) access,
once the IP address is setup. Besides the IP address, setting up the SNMP parameters
allows configuration and monitoring through an SNMP network management station
running a network management program (e.g. SNMPc from Castle Rock – available from
GarrettCom Inc.)
MN
S-6K Software Updates
Ma
j
on updating the MNS-6K software. The documentation on how to update the MNS-6K is
included as an Appendix in this manual.
gnum switches already have the necessary software loaded on them. If a
sof
tware upgrade is needed or the MNS-6K software needs to be updated to
the current version, please refer to the GarrettCom web site for information
The Login prompt is shown when the connection to the GarrettCom Magnum 6K Switch
is successful and the switch is ready for the configuration commands. Should you get a
boot prompt, please contact GarrettCom technical support.
The IP address of the switch is assigned automatically from a DHCP server or a BootP
server. If these servers do not exist, the switch will be assigned an IP address which was
previously configured or a static IP address of 192.168.1.2 with a netmask of
255.255.255.0 (if that address is not in use). It is recommended that the user uses Secure
Web Management (SWM) capabilities built into MNS-6K to setup and manage the switch.
Please refer to the SWM user guide for more information.
Console connection
The connection to the console is accessed through the DB-9 RS232 connector on the
switch marked on the Magnum 6K family of switches as a console port. This interface
provides access to the commands the switch can interpret and is called the Command
Line Interface (or CLI). This interface can be accessed by attaching a VT100 compatible
terminal or a PC running a terminal emulation program to the console port on the
Magnum 6K family of switches.
USB to serial adapters are also available for laptops or computers that do not native serial
ports but have access to USB ports.
The interface through the console or the Console Management Interface (or CMI) enables
you to reconfigure the switch and to monitor switch status and performance.
24
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
Once the switch is configured with an IP address, the Command Line
Interface (or CLI) is also accessible using telnet as well as the serial port. Access to the
switch can be either through the console interface or remotely over the network.
The Command Line Interface (CLI) enables local or remote unit installation and
maintenance. The Magnum 6K family of switches provides a set of system commands
which allow effective monitoring, configuration and debugging of the devices on the
network.
Console setup
Connect the console port on the switch to the serial port on the computer using the serial
cable listed above. The settings for the HyperTerminal software emulating a VT100 are
shown in Figure 1 below. Make sure the serial parameters are set as shown (or bps =
38400, data bits=8, parity=none, stop bits=1, flow control=none).
FIGURE 1- HyperTerminal screen showing the serial settings
Console screen
Once the console cable is connected to the PC and the software configured, MNS-6K
legal disclaimers and other text scrolls by on the screen.
25
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
The switch has three modes of operation – Operator (least privilege), Manager and
Configuration. The prompts for the switches change as the switch changes modes from
Operator to Manager to Configuration. The prompts are shown in Figure 2 below, with a
brief explanation of what the different prompts indicate.
Magnum6K> Operator Level – for running operations queries
Magnum6K# Manager Level – for setting and reviewing commands
Magnum6K## Configuration Level – for changing the switch parameter values
FIGURE 2- Prompt indicating the switch model number as well as mode of operation – note the
commands to switch between the levels is not shown here.
The prompt can be changed by the user. See the Chapter on Miscellaneous Commands,
sub section Prompt for more details. This manual was documented on a Magnum 6K25
switch, and for clarity, the prompt shown in the manual will be
FoUsr additional information on default users, user levels and more, see
j
er Management in this guide.
Magnum6K25
Logging in for the first time
For the first time, use the default user name and passwords assigned by GarrettCom for
the Magnum 6K family of switches. They are:
We recommend you login as manager for the first time to set up the IP address as well as
change user passwords or create new users.
Setting the IP parameters
To setup the switch, the IP address and other relevant TCP/IP parameters have to be
specified. A new GarrettCom Magnum switch looks for a DHCP or a BootP server. If a
DHCP or a BootP server is present, the switch will be assigned an IP address from those
servers. Failing to find these servers, the IP address is automatically assigned to
192.168.1.2 with a netmask of 255.255.255.0.
26
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
Should a situation arise when there are multiple new switches powered up at the same
time, there could be a situation of duplicate IP addresses. In this situation, only one
Magnum switch will be assigned the IP address of 192.168.1.2 and netmask of
255.255.255.0. The other switches will not be assigned an IP address till the static IP
address of 192.168.1.2 is freed up or reassigned.
This situation may not be prevalent in all cases. As the switch tries to
determine the mode of operation and its IP address it may assign and
release the IP address a number of times. A continuous ping to the switch
will show an intermittent response as this happens. This is normal
behavior and is shown below. Once the switch assigns itself an IP address
the intermittent ping issue is no longer prevalent.
FIGURE 3– As the switch tries to determine its mode of operation and its IP address, it may assign and
release the IP address a number of times. A continuous ping to the switch will show an intermittent response
To change the IP address, please ensure that the IP address to be assigned to the switch is
known or contact your system/network administrator to get the IP address information.
Follow the steps listed below to configure the IP address manually.
• Ensure the power is off
• Follow the steps described above
console software
for connecting the console cable and setting the
27
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
• Power on the switch
• Once the login prompt appears, login as manager using default password (manager)
• Configure the IP address, network mask and default gateway as per the IP addressing
scheme for your network
• Set the Manager Password (recommended–refer to next section)
• Save the settings (without saving, the changes made will be lost)
• Power off the switch (or a software reboot as discussed below)
• Power on the switch – login with the new login name and password
• From the PC (or from the switch) ping the IP address specified for the switch to
ensure connectivity
• From the switch ping the default gateway specified (ensure you are connected to the
network to check for connectivity) to ensure network connectivity
This document assumes the reader is familiar with IP addressing schemes as well as how
net mask is used and how default gateways and routers are used in a network.
Reboot gives an opportunity to save the configuration prior to shutdown. For a reboot –
simply type in the command “reboot”. (Note – even though the passwords are not
changed, they can be changed later.)
Magnum6K25#reboot
Proceed on rebooting the switch? [ 'Y' or 'N' ] Y
Do you wish to save current configuration? [ 'Y' or 'N' ] Y
Magnum6K25#
FIGURE 5- Rebooting the switch
MNS-6K forces an answer the prompts with a “Y” or a “N” to prevent accidental
keystroke errors and loss of work.
The parameters can be viewed at any time by using the ‘show’ command. The show
command will be covered in more detail later in various sections throughout the
document.
Magnum6K25# show setup
28
MAGNUM 6K SWITCHES, MNS-6K USER GUIDE
Version : Magnum 6K25 build 14.1 Jul 28 2008 07:51:45
MAC Address : 00:20:06:25:b7:e0
IP Address : 192.168.1.150
Subnet Mask : 255.255.255.0
Gateway Address : 192.168.1.10
CLI Mode : Manager
System Name : Magnum6K25
System Description : 25 Port Modular Ethernet Switch
System Contact : support@garrettcom.com
System Location : Fremont, CA
System ObjectId : 1.3.6.1.4.1.553.12.6
Magnum6K25#show sysconfig
System Name : Magnum6K25
System Contact : support@garrettcom.com
System Location : HO, Fremont, CA
Boot Mode : manual
Inactivity Timeout(min) : 10
Address Age Interval(min) : 300
Inbound Telnet Enabled : Yes
Web Agent Enabled : Yes
Time Zone : GMT-08hours:00minutes
Day Light Time Rule : USA
System UpTime : 36 Days 7 Hours 49 Mins 48 Secs
Magnum6K25#
FIGURE 6- Viewing the basic setup parameters. You can use ‘show setup’ or ‘show sysconfig’ to view
setup parameters
Some of the parameters in the Magnum 6K family of switches are shown above. The list
of parameters below indicates some of the key parameters on the switch and the
recommendations for changing them (or optionally keeping them the same).
Privilege levels
Two privilege levels are available - Manager and Operator. Operator is at privilege level
1 and the Manager is at privilege level 2 (the privilege increases with the levels). For
example, to set up a user for basic monitoring capabilities use lower number or operator
level privilege (Level 1)
The Manager level provides all Operator level privileges plus the ability to perform
system-level actions and configuration commands. To select this level, enter the ‘enable <user-name>’ command at the Operator level prompt and enter the Manager password,
when prompted.
Syntax enable <user-name>
For example, switching from an Operator level to manager level, using the ‘enable’
29
Loading...
+ 334 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.