No part of this publication may be reproduced in any form without the prior written consent of iS5 Communications Inc.
(iS5).
Trademarks
iS5Com is a registered trademark of iS5. All other trademarks belong to their respective owners.
Regulatory Compliance Statement
Product(s) associated with this publication complies/comply with all applicable regulations. Please refer to the Technical
Specifications section for more details.
Warranty
iS5 warrants that all products are free from defects in material and workmanship for a specified warranty period from the
invoice date (5 years for most products). iS5 will repair or replace products found to be defective within this warranty
period including shipping costs. This warranty does not cover product modifications or repairs done by persons other
than iS5-approved personnel, and this warranty does not apply to products that are misused, abused, improperly
installed, or damaged by accident.
Please refer to the Technical Specifications section for the actual warranty period(s) of the product(s) associated with this
publication.
Disclaimer
Information in this publication is intended to be accurate. iS5 shall not be responsible for its use or infringements on
third-parties as a result of its use. There may occasionally be unintentional errors on this publication. iS5 reserves the
right to revise the contents of this publication without notice.
This user guide includes the relevant information for utilizing the IS5 Communications iSG18GFP switches.
The information in this document is subject to change without notice and describes only the product defined in the
introduction of this document.
This document is intended for the use of customers of IS5 Communications only for the purposes of the agreement under
which the document is submitted, and no part of it may be reproduced or transmitted in any form or means without the
prior written permission of IS5 Communications.
The document is intended for use by professional and properly trained personnel, and the customer assumes full
responsibility when using it.
If the Release Notes that are shipped with the device contain information that conflicts with the information in this
document or supplements it, the customer should follow the Release Notes.
The information or statements given in this document concerning the suitability, capacity, or performance of the relevant
hardware or software products are for general informational purposes only and are not considered binding. Only those
statements and/or representations defined in the agreement executed between IS5 Communications and the customer
shall bind and obligate IS5 Communications.
IS5 Communications however has made all reasonable efforts to ensure that the instructions contained in this document
are adequate and free of material errors. IS5 Communications will, if necessary, explain issues which may not be covered
by the document.
IS5 Communications sole and exclusive liability for any errors in the document is limited to the documentary correction of
errors. IS5 COMMUNICATIONS IS NOT AND SHALL NOT BE RESPONSIBLE IN ANY EVENT FOR ERRORS IN THIS DOCUMENT
OR FOR ANY DAMAGES OR LOSS OF WHATSOEVER KIND, WHETHER DIRECT, INCIDENTAL, OR CONSEQUENTIAL
(INCLUDING MONETARY LOSSES), that might arise from the use of this document or the information in it.
This document and the product it describes are the property of IS5 Communications, which is the owner of all intellectual
property, rights therein, and are protected by copyright according to the applicable laws.
Other product and company names mentioned in this document reserve their copyrights, trademarks, and registrations;
they are mentioned for identification purposes only
The IS5 Communications Service-aware Industrial Ethernet switches combine a ruggedized Ethernet platform with a
unique application-aware processing engine.
As an Industrial Ethernet switches the IS5 Communications switches provide a strong Ethernet and IP feature-set with a
special emphasis on the fit to the miSG18GFPion-critical industrial environment such as fit to the harsh environment, high
reliability and network resiliency.
In addition the IS5 Communications switches have unique service-aware capabilities that enable an integrated handling of
application-level requirements such as implementation of security measures.
Such an integrated solution results in simple network architecture with an optimized fit to the application requirements.
Key Features
The IS5 Communications iSG18GFP devices offer the following features:
Wire speed, non-blocking Layer 2 switching
Dynamic and static layer 3 routing
Compact systems with flexible ordering options of interfaces type /quantity
Advanced Ethernet and IP feature-set
Integrated Defense-in-Depth tool-set
Ethernet and Serial interfaces
Cellular mode
Fit to harsh industrial environment
Supported by a dedicated industrial service management tool (iSIM)
iS5 Communications Inc. Page: 17 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
You are:
Document Function
Function
Installation Guide
Contains information about installing the hardware and
software; including site preparation, testing, and safety
information.
User Guide
Contains information on configuring and using the system.
Release Notes
Contains information about the current release, including new
features, resolved iSG18GFPues (bug fixes), known
iSG18GFPues, and late-breaking information that supersedes
information in other documentation.
Using This Document
Documentation Purpose
This user guide includes the relevant information for configuring the IS5 Communications iSG18GFP functionalities.
It provides the complete syntax for the commands available in the currently-supported software version and describes
the features supplied with the device.
For more information regarding the device installation, refer to the Installation and Maintenance chapter.
For the latest software updates, see the Release Notes for the relevant release. If the release notes contain information
that conflicts with the information in the user guide or supplements it, follow the release notes' instructions.
Intended Audience
This user guide is intended for network administrators responsible for installing and configuring network equipment.
Users must be familiar with the concepts and terminology of Ethernet and local area networking (LAN) to use this User
Guide.
Documentation Suite
This document is just one part of the full documentation suite provided with this product.
iS5 Communications Inc. Page: 18 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
NOTE
Indicating special information to which the user needs to pay special attention.
CAUTION
Indicating special instructions to avoid possible damage to the product.
DANGER
Indicating special instructions to avoid possible injury or death.
Conventions
Description
commands
CLI and SNMP commands
command example
CLI and SNMP examples
<Variable>
user-defined variables
(numerical variable)
numerical variable
{mandatory command parameters}
CLI syntax
[Optional Command Parameters]
CLI syntax
Conventions Used
The conventions below are used to inform important information:
The table below explains the conventions used within the document text:
iS5 Communications Inc. Page: 19 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Ethernet Port 1-8
Ethernet Port 9-10
Option 1
Description
8RJ45
| | 8 x 10/100 Base TX RJ45
8PRJ45
| | 8 x 10/100 Base TX RJ45 PoE Ports 30W Max per port***
xx | None
2GSFP
|
2 x 100/1000 Base X SFP Port (Blank no SFP transceiver**)
xx
None
8RJ45
8 x 10/100 Base TX RJ45
8SFP
8 x 100 Base X SFP Port (Blank no SFP transceiver)
4SRJ45
4 x RS232 RJ45 Serial Ports with 2KV Isolation
2SIM
Dual SIM GPRS/UMTS Modem
6GCX
4 x RS232 RJ45 Serial Ports with 2KV Isolation + Dual SIM
OSPF
VRRP
RIP
IEC 104 Firewall
DNP3 Firewall
Modbus Firewall
DM-VPN
IPSEC-VPN
Cellular modem
Hardware and Interfaces
Introduction
Depending on the iSG18GFP hardware variant ordered your switch will hold physical Ethernet and Serial ports.
Serial, RJ 45 ports, are RS-232 supporting. Max 4 ports
Ethernet RJ45 copper ports are 10/100 FE. Max 16 ports
Ethernet SFP based ports are 100/100 FE. Max 8 ports.
Ethernet SFP based ports are 100/1000 GE. Max 2 ports.
Ordering options of Hardware
The Following Table Represent Ordering option for iES18GFP
iSG18GFP B variants do not support the following features:
iS5 Communications Inc. Page: 20 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Port
Description
1-8
8 x 10/100 Base TX RJ45 or 8 x 10/100 Base TX RJ45 PoE Ports 30W Max per port
9-10
2 x 100/1000 Base X SFP Port (SFP located on bottom side)
11-18
8 x 10/100 Base TX RJ45 or
8 x 100 Base X SFP Port (Blank no SFP transceiver) or
4 x RS232 RJ45 Serial Ports with 2KV Isolation or
Dual SIM GPRS/UMTS Modem or
4 x RS232 RJ45 Serial Ports with 2KV Isolation + Dual SIM
Antena
Dual SIM GPRS/UMTS
Console
RJ45, EIA232 VT-100 compatible port
Graphical view of Hardware
Front Panel
Product description:
Figure 1: iES18GFP variant
iS5 Communications Inc. Page: 21 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Rear
The image below shows the DIN bracket on the back of the router. Circled in red are the mounting holes for the Panel
bracket mounting option.
Bottom
The image below shows the 10 position terminal block and ground lug of the iSG4F.
Side view
The image below shows the side of the iSG4F with the product label displaying router information. Circled in red are the
side mounting holes for the Panel bracket mounting option.
iS5 Communications Inc. Page: 22 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Logical System View
Configuration Environment
Two CLI based configuration environments are available for the user, these are called
1. Global Configuration Environment (GCE)
2. Application Configuration Environment (ACE)
These two environments are complementing each other and allowing each a set of supported interfaces, network tools and
management.
At the iSG18GFP infrastructure, the GCE and ACE are as well representing two different software processing areas. The
physical and logical communication between these areas are done by internal switching /routing using the Ethernet gigabit
ports Gi 0/3 and Gi 0/4. These are known as the ACE ports.
For additional information about the ACE ports see chapter ACE ports.
Command Line Interface
The CLI (Command Line Interface) is used to configure the iSG18GFP from a console attached to the serial port of the switch
or from a remote terminal using Telnet or SSH. The following table lists the CLI environments and modes.
Table 3-1: Command Line Interface
iS5 Communications Inc. Page: 23 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command Mode
Access Method
Prompt
Exit Method
Root
Following user log in this
mode is available to the
user.
iSG18GFP#
To exit this mode
would mean the
user to log out from
the system.
Use the command
logout
Global
Configuration
Environment
(GCE)
Use the command config to
enter the Global
Configuration mode.
iSG18GFP(config)#
To exit to the Root
mode, the commands
exit and end are used.
Global Hierarchy
Configuration
From the Global
Configuration mode
command you may drill
down to specific feature
sub tree.
Example is shown here for
interface configuration sub
tree.
iSG18GFP(config-if)#
To exit to the
Global
Configuration
mode,
the exit command
is used and to exit
to the Root mode,
the end command
is used.
Application
Configuration
Environment
(ACE)
Use the “application
connect” from the
Privileged mode to enter
the application
configuration area
[/]
To exit to the
Global
Configuration
mode,
the exit command
is used
Application
Hierarchy
Configuration
From the application root
you may drill down to
specific feature sub tree.
example is shown here for
router configuration sub
tree using the command
“router”
[router/]
To exit to the
application root use
.. (two dots).
The commands exit
and end are not
applicable at this
sub tree mode.
iS5 Communications Inc. Page: 24 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Global Configuration Environment
GCE
Application Configuration Environment
ACE
L2 Ethernet switching
Ethernet ports
Serial ports
Cellular modem
OSPF
Vlan tagging
IPSec
VPN
Management
Authentication
SCADA Gateway
SCADA Firewall
L2-L4 Firewall
QOS
Serial services
Terminal services
ERP
MSTP
OSPF
RIP
FTP
SNMP
Supported Functionalities
The iSG18GFP is a feature rich industrial units supporting:
The below table gives a high level view of the supported feature sets and their corresponding configuration environment.
iS5 Communications Inc. Page: 25 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Group
Feature
GCE
ACE
Interfaces
Cellular modem with 2 SIM cards
X FE RJ45 Ports
X
Fiber Optic ports
X Gigabit ports
X POE ports
X RS 232 ports ,with control lines
X SFP Ports
X
USB X
Switching
Managemen
t
802.1
X Auto Crossing
X Auto Negotiation IEEE 802.3ab
X
Mac list
X Storm Control
X VLAN segregation Tagging IEEE 802.1q
X Jumbo frames
X IGMP Snooping
X
IGMP v1,v2,v3
X Backup / Restore running config
X Conditioned/ scheduled system reboot
X
Console serial port
X
FTP client
X Inband Management
X Outband Management
X Remote Upgrade
X Safe Mode
X
SFTP Client
X SNMP Trap
X
SNMP
X SSH Client
X
X
Syslog
X
X
The below table details the iSG18GFP supported feature and its corresponding configuration environment.
iS5 Communications Inc. Page: 26 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Group
Feature
GCE
ACE
Telnet Client
X X Telnet server
X
X
TFTP Client
X Web management interface
X
Networking
LLDP
X OAM CFM ITU-T Y.1731
X QOS X
Protection
Conditioned/ scheduled system reboot
X
ITU-T G.8032v2 Ethernet ring
X Link Aggregation with LACP
X MSTP IEEE 802.1s
X
Protection between Cellular ISP (SIM cards backup)
X
Spanning Tree
X
Routing
DHCP Client
X DHCP Relay
X DHCP Server
X IPv4 X X
OSPF v2
X X RIPv2
X Static Routing
X
X
VRRP
X
Security
ACLs , L2-L4
X Application aware IPS Firewall for SCADA protocols
X IEEE 802.1X Port Based Network Access Control.
X IPSec
X Local Authentication
X
MAC limit
X Port shutdown
X
RADIUS Accounting and Authentication
X
Tacacs
X
iS5 Communications Inc. Page: 27 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Group
Feature
GCE
ACE
Time
Local Time settings
X NTP X
Diagnostics
Counters & statistics per Port
X Led diagnostics
X Ping X X
Port mirroring
X Relay Alarm Contact
X RMON
X
Trace Route
X
Serial
Gateway
IEC 101/104 gateway
X IEC 104 Firewall
X
Serial Transparent Tunneling
X
Terminal Server
X
VPN
L2 GRE VPN
X L3 IPSec VPN
X L3 mGRE DM-VPN
X
iS5 Communications Inc. Page: 28 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Feature
Default state
Ethernet Ports
All ports are enabled
Serial interfaces
Disabled
Cellular modem
Disabled
Vlan 1
Enabled. All ports are members
Ports PVID
All Ethernet ports have pvid 1
POE
POE is enabled for supporting hardware
Layer 3 interface
Interface vlan 1 is set to : 10.0.0.1/8
Spanning Tree
Mst is enabled.
Application ports gigabit 0/3-0/4 are edge ports. Depending on hardware type ports
fast 0/9-0/16 may be edge ports as well (ET28 HW variants)
ERP
Disabled
LLDP
Disabled
SSH
Enabled
Telnet
Disabled
Http
Disabled
Syslog
Disabled
Snmp
Disabled
Tacacs
Disabled
Radius
Disabled
ACLs
Disabled
SNTP
Disabled
Firewall
Disabled
VPN
Disabled
System Default state
The following table details the default state of features and interfaces.
Root Commands
The Root Configuration Environment list of main CLI commands is shown below
+Root
- Help
iS5 Communications Inc. Page: 29 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
- clear screen
- enable
- disable
- configure terminal / configure
- run script
- listuser
- lock
- username
- enable password
- line
- access-list provision mode
- access-list commit
- exec-timeout
- logout
- end
- exit
- show privilege
- show line
- show aliases
- show users
- show history
iS5 Communications Inc. Page: 30 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
Help [command]
This command displays a brief description for the
given command.
To display help description for commands with more
than one word, do not provide any space between
the word
clear screen
Clears all the contents from the screen.
Enable [<0-15> Enable Level]
This command enters into default level privileged
mode.
If required, the user can specify the privilege level by
enabling level with a password (login password)
protection to avoid unauthorized user.
Disable [<0-15> Enable Level]
This command turns off privileged commands. The
privilege level varies between 0 and 15. This value
should be lesser than the privilege level value given
in the enable command.
configure [terminal]
Enters configuration mode.
run script
This command runs CLI commands from the specified
script file.
listuser
This command lists all the default and newly created
users, along with their permissible mode.
Lock
This command locks the CLI console. It allows the
user/system administrator to lock the console to
prevent unauthorized users from gaining access to the
CLI command shell. Enter the login password to release
the console lock and access the CLI command shell.
username
This command creates a user and sets the enable
password for that user with the privilege level.
alias - replacement string
This command replaces the given token by the given
string and the no form of the command removes the
alias created for the given string.
access-list commit
This command triggers provisioning of active filter
rules to hardware based on configured priority. This
command is applicable only when provision mode is
consolidated. Traffic flow would be impacted when
filter-rules are reprogrammed to hardware.
logout
This command exits the user from the console session.
In case of a telnet session, this command terminates
the session.
end
Exists the configuration mode
exit
Exists the current config location to one step up in the
root
show privilege
This command shows the current user privilege level
Root Commands Description
iS5 Communications Inc. Page: 31 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
show line
This command displays TTY line information such as
EXEC timeout
show aliases
This command displays all the aliases
show users
This command displays the information about the
current user.
show history
This command displays a list of recently executed
commands
GCE Commands
The Global Configuration Environment list of main CLI commands is shown below
This command configures the mode by which the
default interface gets its IP address.
default vlan id
default ip address
This command configures the IP address and subnet
mask for the default interface.
ip address
This command sets the IP address for an interface.
The no form of the command resets the IP address
of the interface to its default value.
default ip address
allocation protocol
This command configures the protocol used by the
default interface for acquiring its IP address.
ip address - dhcp
configures the current VLAN interface to dynamically
acquire an IP address from a DHCP server.
login authentication
This command configures the authentication
method for user logins for accessing the GUI to
manage the switch.
login authentication-
default
configures the authentication method for user logins
for accessing the GUI to manage the switch.
authorized-manager ip-
source
This command configures an IP authorized manager
and the no form of the command removes manager
from authorized managers list.
ip http port
This command sets the HTTP port. This port is used
to configure the router using the Web interface. The
value ranges between 1 and 65535. The no form of
the command resets the HTTP port to its default
value.
set ip http
This command enables/disables HTTP in the switch.
mtu frame size
configures the maximum transmission unit frame
size for all the frames transmitted and received on
all the interfaces in a switch.
snmp trap link-status
enables trap generation on the interface. The no
form of this command disables trap generation on
the interface.
show audit
set http authentication-scheme
set http redirection enable
http redirect
show http authentication-scheme
show http redirection
GCE Commands Description
iS5 Communications Inc. Page: 34 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
clock set
This command manages the system clock.
Delete startup-cfg
This command clears the contents of the startup
configuration
cli console
This command enables the console CLI through a
serial port. The no form of the command disables
console CLI.
flowcontrol
set the send or receive flow-control value for an
interface
[no] shutdown -
physical/VLAN/port
interface
This command disables/enables a physical interface
/ VLAN interface / port-channel interface
debug interface
This command sets the debug traces for all the
interfaces. The no form of the command resets the
configured debug traces.
debug-logging
This command configures the displays of debug logs.
Debug logs are directed to the console screen or to a
buffer file, which can later be uploaded, based on
the input.
incremental-save
This command enables/disables the incremental
save feature
auto-save trigger
This command enables / disables the auto save
trigger function.
Rollback { enable |
disable }
This command enables/disables the rollback
function.
set switch maximum –
threshold
This command sets the switch maximum threshold
values of RAM, CPU, and Flash
set switch temperature –
threshold
This command sets the maximum and minimum
temperature threshold values of the switch in
celcius.
mac-learn-rate
configures the maximum number of unicast dynamic
MAC (L2) MAC entries hardware can learn on the
system
system contact
system location
clear interfaces –
counters
clear counters
show ip interface
show authorized-managers
show interfaces
show interfaces – counters
iS5 Communications Inc. Page: 35 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
show interface mtu
show interface bridge
port-type
show nvram
This command displays the current information
stored in the NVRAM.
show env
This command displays the status of the all the
resources like CPU, Flash and RAM usage, and also
displays the current, power and temperature of the
switch.
show system information
This command displays system information.
show flow-control
show debug-logging
show debugging
show clock
show running-config
show http server status
show mac-learn-rate
port-isolation in_vlan_ID
show port-isolation
audit-logging reset
show config log
memtrace
show memtrace status
management vlan-list
<port_list>
show iftype protocol deny
table
clear line vty
login block-for
audit-logging logsize-
threshold
feature telnet
show telnet server
show audit
set http authentication-
scheme
iS5 Communications Inc. Page: 36 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
set http redirection
enable
http redirect
show http authentication-
scheme
show http redirection
audit-logging reset
show config log
clear line vty
tunnel hop-limit
tunnel hop-limit
login block-for
audit-logging logsize-
threshold
feature telnet
show telnet server
show audit
set http authentication-
scheme
set http redirection
enable
http redirect
show http authentication-
scheme
show http redirection
audit-logging reset
default rm-interface
show config log
show memtrace status
management vlan-list
<port_list>
show iftype protocol deny
table
clear line vty
audit-logging logsize-
threshold
iS5 Communications Inc. Page: 37 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
feature telnet
show telnet server
show audit
set http authentication-
scheme
set http redirection
enable
http redirect
show http authentication-
scheme
show http redirection
audit-logging reset
show config log
management vlan-list
<port_list>
internal-lan
show iftype protocol deny
table
clear line vty
login block-for
audit-logging logsize-
threshold
feature telnet
show telnet server
show audit
set http authentication-
scheme
set http redirection
enable
http redirect
show http authentication-
scheme
show http redirection
audit-logging reset
show config log
iS5 Communications Inc. Page: 38 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
show iftype protocol deny
table
clear line vty
login block-for
iS5 Communications Inc. Page: 39 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
ACE Commands
The Application Configuration Environment list of main CLI commands is shown below.
show running-config interface fastethernet 0/<1-8>
show running-config interface gigabitethernet 0/<1-2>
show vlan port config
show interfaces status
[ACLs]
show running-config acl
[FDB]
show mac-address-table
show ip arp
show logging
show interfaces storm-control
[GCE Routing]
show ip interface
show ip route
show ip ospf
show ip ospf neighbor
show running-config ospf
show ip rip database
show ip rip statistics
show running-config rip
[SNMP]
show running-config snmp
iS5 Communications Inc. Page: 41 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
[STP]
ACE
show spanning-tree detail
show spanning-tree summary
[ERP]
show running-config ecfm
show ethernet cfm domain
show ethernet cfm service
show ethernet cfm maintenance-point local
show ethernet cfm maintenance-points remote
show ethernet cfm global information
show aps ring
show aps ring global info
[ACE Routing]
router interface show
router route show
router static
enable
show running-config
show ip route
exit
router ospf
enable
show running-config
show ip ospf route
show ip ospf neighbor
show ip ospf interface
exit
router rip
enable
show running-config
show ip rip
exit
exit
iS5 Communications Inc. Page: 42 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
[Cellular]
cellular wan show
cellular settings show
cellular network show
cellular connection show
[VPN & IPSec]
application connect
dm-vpn multipoint-gre
dm-vpn nhrp map
dm-vpn nhrp map
dm-vpn nhrp route-show
l2-vpn tunnel show
l2-vpn fdb show
l2-vpn nhrp spoke show
l2-vpn nhrp hub show
ipsec-vpn tunnel show
ipsec show global-defs
ipsec show preshared
ipsec show sa
ipsec show log
[Serial]
serial card show
serial port show
serial local-end-point show
serial port show slot <4-9> port <1-4>
serial remote-end-point show
iec101-gw show all
terminal-server settings show
iS5 Communications Inc. Page: 43 of: 465
terminal-server connections show
[Firewall]
show running-config acl
show access-lists
firewall log show
firewall profile show
firewall tcp show
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
NOTE
iSG18GFP.conf and iSG18GFPnvram.txt files are not accessible for the user to do
file operations on (copy ,rename and such)
NOTE
The OS image file is a tar file type. When upgrading the system from the USB
the file should be placed at the root directory of the USB drive. The file should
not be unzipped.
System Version and Data Base
Configuration Database
By default User configuration is saved in a file called iSG18GFP.conf. Configuration saved in this file will be available at
system startup. If this file is deleted, the system will boot with the iSG18GFPnvram.txt file holding factory configuration.
User Configuration is taking effect immediately upon entering. No specific COMMIT command is required.
The user can as well save his running configuration in a file with a chosen name for backup and boot the system with this
file when needed.
Multiple running configuration files can be saved with different names locally on the flash or at an TFTP /SFTP server.
However, configuration which will not be saved as below example will not be available following system reboot.
User configuration is saved (to the iSG18GFP.conf) using the following command
Removing all user configuration and setting the switch to its factory defaults is done by erasing the iSG18GFP.conf with
the following command
iSG18GFP# write startup-cfg
Building configuration...
[OK]
iSG18GFP# delete startup-cfg
iSG18GFP# reload
OS VERSION
Updating of system version is available by TFTP/SFTP server and via the USB port.
Available OS files on the switch can be seen with command showed below.
Running OS file is marked with “active”.
Upgrading system OS from a USB drive can be done under safe mode interface or under a running system assuming the
USB drive was in place when the system booted.
iS5 Communications Inc. Page: 44 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
NOTE
The USB drive must be FAT32
NOTE
The iSG18GFP can hold at its disk maximum two OS image files. Before
downloading a new OS file to the switch make sure the iSG18GFP has on it only
one (the active) file. If needed, delete the unused file before attempting to
download new.
NOTE
System must be rebooted following activation of a new OS image file
Running Configuration
The user can save his running configuration to a file with a chosen name for backup and boot the system with this file
when needed.
Multiple running configuration files can be saved with different names locally on the flash or at a TFTP /SFTP server.
It is as well possible to import /export a running configuration file to a USB drive from the safe mode.
3. Reload the switch for the data base to take effect
iSG18GFP# reload
..
..
iS5 Communications Inc. Page: 48 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
IS5-1 login: su
Password:
<129>Mar 10 09:06:28 IS5-1 CLI Attempt to login as su via console Succeeded
IS5-1#
Safe Mode
The system has two safe mode menus available.
To access safe mode, connect to the switch via console cable, reboot the unit and interrupt the boot process at the safe
mode prompt.
The first Safe mode is used for approved technician only and should not be used unless specified by IS5 Communications.
This safe mode state is available at the prompt
“For first safe mode Press 's'...”
The second safe mode is accessible at the following prompt:
##########################
For safe mode Press 's'...
##########################
Below screenshot details the 2 safe mode menus and their options for:
1. system reset
2. Load the factory-default configuration for the device
3. Write to EEPROM (should be used only after consulting with IS5 Communications)
4. Recover the device's images from a package file
active | 3 : Change the active working application
show | 4 : Display the active working application
remove | 5 : Delete an application
free | 6 : Display the free space in the application file system
main | X : Return to the main menu
help | H : Display help about this menu
List of sw versions:
3.5.04.32 (active)
4.0.02.10
Enter version to activate
1
4. Activate the new version. The system will boot
4
3
iS5 Communications Inc. Page: 53 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
For main menu press X
Updating bank1 with vmlinux.UBoot file, please wait ...
4.0.02.10
Installing First OS image from a USB
Follow below steps as an example of installing a first version from a usb. Local database and any active OS image will be
deleted. The system will boot with manufacturing defaults using the new OS imported file.
1. Access first safe mode, use option 4 “install”. Select the version to be used. the system will boot automatically to
Port number is in the range of 0-16 (depended on the
hardware)
iSG18GFP variant of 8RJ45+2GSFP+6GCX
iSG18GFP variant of 8RJ45+2GSFP+8SFP
Port Interfaces
Port addressing
The ports are configured as <interface-type> <port id>
Graphical view of system Interfaces
iS5 Communications Inc. Page: 57 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
NOTE
The RS 232 ports are configured and identified within the ACE CLI mode and
are not seen at “show vlan”. See chapter Serial Interfaces for more information.
NOTE
The iSG18GFP has several hardware ordering options of interfaces. The
Ethernet interfaces which are applicable to the hardware will be available for
configuration.
A logical view of ports
Below screen shots shown the available typical ports of a iSG18GFP with 8 Ethernet ports.
iS5 Communications Inc. Page: 58 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
NOTE
System Default has all ports as enabled
Vlan id / port
Gi 0/3
Gi 0/4
Vlan 4092
Tagged
Vlan 4093
Tagged
Vlan 1
Tagged (pvid)
Tagged
NOTE
The ACE ports properties should not be changed from their default settings of
auto-negotiation and hybrid state.
Enabling Ports
In order to be accessible, the required interfaces must be activated. This is done using the no shutdown command.
Example of enabling port interface number 5
ACE Ports
iSG18GFP(config)# interface gigabitethernet 0/5
iSG18GFP(config-if)# no shutdown
iSG18GFP(config-if)# end
iSG18GFP# write startup-cfg
The show interfaces command displays the complete information of all available interfaces.
Ports Gigabitethernet 0/3 and Gi 0/4 are unique ports. These are internal system ports used for directing access and
network traffic handled at the GCE to the Application services.
The use of these ports should be made in accordance to configuration instructions given in relevant chapters of this
manual.
Default state
iS5 Communications Inc. Page: 59 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Networking / port
Gi 0/3
Gi 0/4
Serial tunneling
Service VLANs
Terminal Server
Service VLANs
Gateway
Service VLANs
L2 VPN
NNI Vlan
UNI Vlan
L3 VPN
NNI Vlan
IPsec
NNI Vlan
Cellular
Firewall
Service VLANs
NOTE
With hardware versions of ET28 these ports properties should not be changed
from their default settings of auto-negotiation and hybrid state.
Vlan assignment
The assignment of the ACE ports to a vlan is always as a tagged member.
Following table summarizes the ports vlan membership depending on the network planning.
Ports FE 0/9-0/16
The usage of ports FE 0/9 -0/16 is dependent on the hardware type.
With hardware versions of ET216 and ET288 these ports are standard user ports to be addressed and configured for all
application purposes.
With hardware versions of ET28 these ports are not physically available for the user but are still mapped in the cli.
At this case these ports are designated for internal system functions and should not be addressed by the user unless
specifically mentioned in a configuration setup of feature in this manual.
iS5 Communications Inc. Page: 60 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
POE Ports
Depending on your hardware variant POE ports might be applicable.
Hardware supporting POE is named:
IS5-ISG18GFP-<P>-<T>/<E>/8PE30/<R>/<C> - hardware includes 8 POE support on the FE Ethernet ports 1-8. All POE ports
are wired as Alternative-A (PoE runs on the FE twisted pairs)
IS5-ISG18GFP-<P>-<T>/<E>/8PE302RW/<R>/<C> - hardware includes 8 POE support on the FE Ethernet ports 1-8. Ports 2
and 8 are wired as Alternative-B (PoE runs on the spare twisted pairs)
IS5-ISG18GFP-<P>-<T>/<E>/8PE304RW/<R>/<C> - hardware includes 8 POE support on the FE Ethernet ports 1-8. Ports
2,4,6,8 are wired as Alternative-B (PoE runs on the spare twisted pairs)
Power Management of POE
The 8 POE ports supports in total maximum power output of:
1. For 12Vdc powered units (IS5-ISG18GFP-24../PE) : 60w
2. For 24Vdc powered units (IS5-ISG18GFP-24../PE) : 80w
3. For 48Vdc powered units (IS5-ISG18GFP-48../PE) : 120w
4. For 110Vdc powered units (IS5-ISG18GFP-11../PE) : 100w
5. For AC powered units (IS5-ISG18GFP-AC../PE) : 120w
iS5 Communications Inc. Page: 61 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
CAUTION
Alternate-B POE ports work in forced mode and provides constant power on the
twisted pair lines. Make sure to connect only adequate equipment to these ports
The 8 POE ports divided to 2 groups ,each group supports maximum power output of:
Modes of POE
1. For 12Vdc powered units (IS5-ISG18GFP-24../PE) : 30w
2. For 24Vdc powered units (IS5-ISG18GFP-24../PE) : 40w
3. For 48Vdc powered units (IS5-ISG18GFP-48../PE) : 60w
4. For 110Vdc powered units (IS5-ISG18GFP-11../PE) : 50w
5. For AC powered units (IS5-ISG18GFP-AC../PE) : 60w
6. The group division is as follows:
a. Group 1: p1,p2,p3,p6
b. Group 2: p4,p5,p7,p8
Alternative-A wired ports will supply POE power on demand. Non-POE equipment connected to such port is protected as it
will not receive power over the Fast Ethernet communication lines.
Alternative-B wired ports will supply POE power constantly (forced mode) when enabled.
iS5 Communications Inc. Page: 62 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
Config terminal
Interface <type> <port id>
Enter the specific Interface.
only fastethernet ports are applicable.
Permissible values : Fastethernet <1-8>
Poe
No shutdown: port is POE enabled. (default)
Shutdown: port is POE disabled.
poe-power
Detect: POE will be available only upon negotiation
with a POE connected load device. (default)
Manual: POE will be available constantly.
Caution: connect only POE capable load
devices to ports which are in Manual mode.
note : ports which are hardware Alternate-B
must be in Manual mode.
show poe-status port <>
Show the POE state of the port.
Port number is in the range 1-8, relating to
fastethernet 1-8.
POE command Hierarchy
+ Root
+ config terminal
+ interface <type> <port id>
- poe-power { detect | manual }
- poe { shutdown | no shutdown }
- show poe-status port <1-8>
POE Commands Description
iS5 Communications Inc. Page: 63 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Controlling Ports
Storm Control
Sets the storm control rate for broadcast, multicast
Rate Limit Output
Enables the rate limiting and burst size rate limiting by configuring the egress packet rate of an interface and the no form of
the command disables the rate limiting and burst size rate limiting on an egress port
- Show interfaces [<interface-type> <interface-id>] [vlan <vlan-id> ]
iS5 Communications Inc. Page: 64 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
Config terminal
Interface <type> <port id>
Alias
Set a description name for the port.
Speed
Set manual speed to the port. Requires first disabling
‘negotiation’ at the port.
Default: negotiation enabled.
Duplex
Set port duplex as full | half | auto.
Default: full
switchport mode
Configures the mode of operation for a switch port.
This mode defines the way of handling of traffic for
VLANs.
Access: accepts and sends only untagged. This kind
of port is added as a member to specific VLAN only
and carries traffic only for the VLAN to which the
port is assigned.
This mode is allowed only if the port is not a tagged
member at any vlan.
The port property of “switchport acceptable-frame-
type” must be set to untagged AND priority Tagged”.
Trunk: accepts and sends only tagged frames. This
kind of port is added as member of all existing
VLANs and for any new VLAN created, and carries
traffic for all VLANs. The trunk port accepts untagged
frames too, if the “switchport acceptable-frame-
type” is set as “all”.
The port can be set as trunk port, only if the port is
not a member of untagged ports for any VLAN in the
switch.
Hybrid: Configures the port as hybrid port that
accepts and sends both tagged and untagged
frames.
Default: Hybrid
- Show interfaces <type> <port id>
- show interface mtu
- show interfaces status
- show interfaces counters
- show interfaces capabilities
- show vlan port config [port <type> <port id>]
- show running-config interface <type> <port id>
Port Commands Description
iS5 Communications Inc. Page: 65 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
switchport pvid
The PVID represents the VLAN ID that is to be
assigned to untagged frames.
The packets are processed against PVID, if the
packets accepted at ingress is not having a tag.
Permissible range: 1-4000.
default: 1.
switchport acceptable frame-type
negotiation
Enables port auto negotiation of speed.
default: enabled
mtu frame size
This command configures the maximum
transmission unit frame size for all the frames
transmitted and received on all the interfaces in a
switch. The size of the MTU frame size can be
increased using this command. The value ranges
between 90 and 9216.
This value defines the largest PDU that can be
passed by the interface without any need for
fragmentation. This value is shown to the higher
interface sub-layer and should not include size of the
encapsulation or header added by the interface. This
value represents the IP MTU over the interface, if IP
is operating over the interface.
Note: Any messages larger than the MTU are divided
into smaller packets before transmission
Default : 1500
system-specific port-id <>
This command configures the system specific index
for the port. It provides a different numbering space
other than the IfIndex to identify ports. The value
ranges between 1 and 16384.
Default : 0.
[no] snmp trap link-status
This command enables trap generation on the
interface. The no form of this command disables
trap generation on the interface.
The interface generated linkUp or linkDown trap.
The linkUp trap denotes that the communication link
is available and ready for traffic flow. The linkDown
trap denotes that the communication link failed and
isnot ready for traffic flow.
Default : enable
flowcontrol
{ send | receive}
Send : Sets the interface to send flow control
packets to a remote device
Receive : Sets the interface to receive flow control
packets from a remote device
iS5 Communications Inc. Page: 66 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
{ on | off |desired}
On : If used with receive allows an interface to
operate with the attached device to send flow
control packets .If used with send the interface
sends flowcontrol packets to a remote device if the
device supports it
Off : Turns-off the attached devices (when used with
receive) or the local ports (when used with send)
ability to send flow-control packets to an interface
or to a remote device respectively
Desired : Allows a local port to operate with an
attached device that is required
to send flow control packets or that may send the
control packets,
when used with receive option.
Allows the local port to send administrative status to
a remote device if the remote device supports it,
when used with send option.
storm-control
sets the storm control rate for broadcast, multicast
and DLF packets
broadcast - Broadcast packets
multicast - Multicast packets
dlf - Unicast packets
level - Storm-control suppression level as a total
number of packets per second. Permissible values :
1-250,000
clears all the current interface counters from the
interface
iS5 Communications Inc. Page: 67 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Port Configuration Example
1.Set a port speed to 100
iSG18GFP# config
iSG18GFP(config)# interface fastethernet 0/2
iSG18GFP(config-if)# no negotiation
iSG18GFP(config-if)# speed 100
2. Set a port as Trunk. Make sure to remove it from any vlan at which it is set as untagged member.
iSG18GFP(config)# Vlan 1
iSG18GFP(config-vlan)# no ports fastethernet 0/1 untagged fastethernet 0/1
iSG18GFP(config-vlan)# exit
iSG18GFP(config)# interface fastethernet 0/1
iSG18GFP(config-if)# switchport mode trunk
iSG18GFP(config-if)# switchport acceptable-frame-type all
3. Set a port PVID
iSG18GFP(config)# interface fastethernet 0/5
iSG18GFP(config-if)# switchport pvid 5
4. Set a Port Alias
iSG18GFP(config)# interface fastethernet 0/2
iSG18GFP(config-if)# alias Office-network
Configuration Output Example
iSG18GFP# show interfaces fastethernet 0/2
Fa0/2 up, line protocol is up (connected)
Bridge Port Type: Customer Bridge Port
Interface SubType: fastEthernet
Interface Alias: Office-network
Hardware Address is 00:20:d2:fc:c1:f1
MTU 1500 bytes, Full duplex, 100 Mbps, No-Negotiation
HOL Block Prevention disabled.
CPU Controlled Learning disabled.
Auto-MDIX on
Input flow-control is off,output flow-control is off
Link Up/Down Trap is enabled
iSG18GFP# show interfaces status
Port Status Duplex Speed Negotiation Capability
iS5 Communications Inc. Page: 68 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
---- ------ ------ ----- ----------- ----------
Fa0/1 not connected Half - Auto Auto-MDIX on
Fa0/2 connected Full 100 Mbps No-Negotiation Auto-MDIX on
Fa0/3 not connected Half - Auto Auto-MDIX on
…
iSG18GFP# show vlan port config port fastethernet 0/1
Vlan Port configuration table
-------------------------------
Port Fa0/1
Bridge Port Type : Customer Bridge Port
Port Vlan ID : 1
Port Acceptable Frame Type : Admit All
Port Mac Learning Status : Enabled
Port Mac Learning Limit : Default
Port Ingress Filtering : Disabled
Port Mode : Trunk
…
iSG18GFP# show vlan port config port fastethernet 0/5
Vlan Port configuration table
-------------------------------
Port Fa0/5
Bridge Port Type : Customer Bridge Port
Port Vlan ID : 5
Port Acceptable Frame Type : Admit All
Port Mac Learning Status : Enabled
…
Login and Management
Configuring the Login Authentication Method sets the authentication method for user logins.
Setting up specific authorized personal for the switch management is possible using filtering conditions as: IP address
(mandatory), vlan-id and service type (SSH, Telnet, SNMP...)
Once an authorized personal is configured in the system, no other entity can have management to the switch over IP.
Serial console management remains available and not influenced by the authorized manager conditions.
If no authorized managers are configured (default state),then switch management is possible on all configured Vlans and
associated ports via the respective IP interfaces assigned.
This command configures an IP authorized manager
and the no form of the command removes manager
from authorized managers list.
<ip-address>
Sets the network or host address from which the
switch is managed. An address 0.0.0.0 indicates 'Any
Manager'."
<subnet-mask>
Sets the subnet mask for the configured IP address.
The configured subnet mask should be in the same
subnet of the network in which the switch is placed.
<prefixlength(1-32)>
Configures the number of high-order bits in the IP
address.These bits are common among all hosts
within a network.
The value ranges between 1 and 32.
interface
vlan <>
Sets the list of VLANs or a single specific VLAN in
which the IP authorized manager can reside.
Service
Configures the type of service to be used by the IP
authorized manager. The values can be:
SSH | SNMP | HTTP | HTTPS
login authentication [{radius
| tacacs }] [local]
Radius : Sets the RADIUS server to be used as an
authentication server. Enables remote access
servers to communicate with a central server to
authenticate dial-in users and authorize their access
to the requested system or service.
Tacacs : Sets the TACACS server to be used as an
authentication server. Communicates with the
authentication server commonly used in networks.
Local : Sets locals authentication. The user
identification, authentication, and authorization
method is chosen by the local system administration
and does not necessarily comply with any other
profiles.
Default : local
Login Authentication Commands Description
iS5 Communications Inc. Page: 71 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
[no] login authentication
default
default: Sets the default authentication method for
User Logins.
Privilege Levels can be determined in order to best allocate system accessibility to different users.
Total of 16 levels, numbered 0-15 can be configured.
By default, the root user holds privilege level 15, allowing complete system availability.
Privilege Level 0 is the lowest level, restricting the user to minimum system access.
Users with Privilege Level 0 can access only the following commands:
Users with Privilege Level 1 can access all user-level commands with iSG18GFP> prompt.
System allows to configure additional privilege levels (from level 2 to 14) to meet the needs of the users while protecting
the system from unauthorized access.
Users with Privilege Level 15 can access all commands. It is the least restricted level.
Enable
Disable
Exit
Help
logout
Commands Description
iS5 Communications Inc. Page: 74 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
Password <passwd>
Specifies the password to be entered by the user to
login to the system.
Password must contain 8-20 characters and should
include at least one of each character type:
* special character
* alphabetic character
* numerical character
* uppercase character
* lowercase character
Special characters supported :
!@#$%^&*(){}[]/\`~+=
privilege <1-15>
Applies restriction to the user for accessing the CLI
commands. This values ranges between 1 and 15.
For example, a user ID configured with privilege level
as four can access only the commands having
privilege ID lesser than or equal to four
Serial Console Port
Management over the serial console port is enabled by default but can be blocked with the following command.
For the change in state to take effect the system must be rebooted.
Keep in mind to maintain management over IP interface prior to disabling the console port.
Connecting to the Console Port
The console port is an EIA232 VT-100 compatible port to enable the definition of the device's basic operational
parameters.
Connecting the device to a PC using the Console Port:
Connect the RJ-45 connector of the console cable to the device's Console Port (CON).
Connect the other side of the cable to the PC.
Configure the PC port to 9600-N-8-1 (9600 bps, no parity,8 data bits, 1 stop bit, no flow control)
iS5 Communications Inc. Page: 75 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
RJ45 Male
DB9 Female
1 -
Rx 2 3
Tx 3 2
GND
4
5
GND
5
5
6 -
7 - 8
-
NOTE
The “cli console” takes effect only after system restart.
Below table details the console cable pin-out.
CLI Console Commands
This command enables the console CLI through a serial port. The no form of the command disables the console CLI.
+ root
- lock
+ config
- Show nvram
- logout
- [no] Cli console
+ line {vty |console}
- exec-timeout <timeout sec>
Management
The switch can be managed via following methods:
IP and Vlan based.
Serial console port.
HTTP page.
For Restrictions of users, privileges and authentications please see related chapters in this manual.
iS5 Communications Inc. Page: 76 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Feature
Default state
Vlan 1
Active. All ports are members
Layer 3 interface
Interface vlan 1 is set to : 10.0.0.1/8
SSH
Enabled
Telnet
Disabled
Http
Disabled
Console
Enabled
User
User name : su
Password : 1234
Privilege : admin (15)
Default state
Commands Hierarchy
+ root
- set host-name <[default | <name> ]
- set welcome-banner [ default | <”banner name”> ]
- set ssh-client { enable | disable }
- set telnet-client { enable | disable }
- ssh {<user>@<remote IP>}
- show iss memory all
- show iss-memory-leak modules
iS5 Communications Inc. Page: 77 of: 465
- telnet [user]@{remote IP}
- lock
- logout
- show running-config system
+ config terminal
+ line {vty |console}
- exec-timeout <timeout sec>
-[no] cli console
-[no] feature telnet
- set ip http [ enable | disable]
- ip http port <port-number(1-65535)>
+ interface <type> <port id>
- [no] switchport pvid <vlan ID>
- [no] shutdown
+ [no] interface vlan <vlan id>
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
set host-name
Set the switch name as shown in the root prompt.
Default name is “iSG18GFP”.
set welcome-banner
Set the welcome banner as shown at log in screen.
default is “Welcome IS5 Communications customer”.
if spaces are required, place the complete title in
double brackets.
ssh
The switch supports ssh client allowing It to open ssh
session to a remote partner.
User : user name to be logged in at the remote
partner.
Remote-ip : IP address of remote partner.
Config terminal
- [no] shutdown
+ ip address [dhcp | <ip-address> <subnet-mask>]
- [no] ip http port <port>
- set ip http
+ Application connect
+ reload
- schedule date-and-time YYYY-MM-DD,HH:MM:SS
- schedule every <180 – 604800 seconds >
- schedule time HH:MM:SS
- schedule in <0 – 604800 seconds >
- cancel
- show
- show ip interface
- show http server status
- show running-config interface vlan <vlan id>
- Show interfaces
- Show interfaces <type> <port id>
- show telnet server
- show vlan port config [port <type> <port id>]
- show running-config interface <type> <port id>
- show telnet-client
- show ssh-client
Commands Description
iS5 Communications Inc. Page: 78 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
line vty
Set idle time out for telnet / ssh to the switch.
exec-timeout : given in seconds .
default : 300 seconds
[no] cli
This command enables the console CLI through a
serial port. The no form of the command disables
console CLI.
This command takes effect only on system restart.
[no] ip http port <port>
This command sets the HTTP port. This port is used
to configure the router using the Web interface.
port number : 1-65535.
Default : 80
set ip http {enable | disable}
Enable : Enables HTTP in the switch.
Disable : Disables HTTP in the switch
Default : enable
[no] feature telnet
This command enables the telnet service in the
system.
Application Connect
reload schedule date-and-time
Set specific date and time for switch reload.
Time format : YYYY-MM-DD,HH:MM:SS
configuration which was not committed will not be
available after reload!
reload schedule every
Set time interval for cyclic automatic system reload.
Permissible range in seconds is 180 – 604800.
configuration which was not committed will not be
available after reload!
reload schedule time
Set specific time for switch reload.
Time format : HH:MM:SS
configuration which was not committed will not be
available after reload!
reload schedule in
Set specific timer for next switch reload.
Permissible range in seconds is 180 – 604800.
configuration which was not committed will not be
available after reload!
reload cancel
Cancels all scheduled automatic reloads
reload show
Shows user set scheduled reloads
Example
Follow below configuration example for establishing management on a certain port/s using designated vlan and IP.
1. Create your vlan and assign ports. Port 0/1 is configured as untagged ,0/2 as tagged
Represents the string for which a replacement is
needed.
<token to be replaced>
Specifies an abbreviated/ short form of the
replacement string
show alias
Displays the aliases
System Alias
This command replaces the given token by the given string and the no form of the command removes the alias created
for the given string.
This is to allow easier names to be used for perhaps long cli command.
+ Root
+ Config terminal
- alias <replacement string> <token to be replaced>
- show alias
CLI Pagination
Some show commands for example might produce a long output. By default, the output will be interrupted after every
screen length pending with the notice “—more—“ to continue.
Options:
Pressing the ENTER key will progress the output by a single line.
Pressing the SPACE key will progress the output by a screen length.
Pressing the Q key will interrupt the output entirely.
Turning CLI pagination on/off iss available with following command:
iSG18GFP(config)# set cli pagination on
iSG18GFP(config)# set cli pagination off
An output example of a show command with pagination set to on:
The Administrator configures the Mac Learning Status of each port as enabled or disabled. By default, each port in the
bridge is allocated a limit on the number of Mac address that is learnt on that port. The Mac Learning Limit on each port
is also configurable. The Port Mac Learning Limit is applicable only for the dynamic learnt entries.
- show ip arp [ { Vlan <vlan-id(1-4094)> | <interface-type> <interface-id> |<ip-
address> | <mac-address> |summary | information }]
iS5 Communications Inc. Page: 83 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
Config terminal
Arp timeout <>
sets the ARP (Address Resolution Protocol) cache
timeout. The timeout defines the period an arp
entry remains in the cache. When a new timeout
value is assigned, it only affects the new arp entries.
All the older entries retain their old timeout values.
The timeout values can be assigned to dynamic arp
entries only. static arp entries remain unaltered by
timeout value.
timeout <seconds (30-86400)>
default : 7200
arp <ip address> <MAC> vlan <>
<ip address> : Defines the IP address or IP alias to
map to the specified MAC address.
<hardware address> : Defines the MAC address to
map to the specified IP
Virtual LAN (VLAN) technology, defined under the IEEE 802.1q specifications, allows enterprises to extend the reach of
their corporate networks across WAN. VLANs enable partitioning of a LAN based on functional requirements, while
maintaining connectivity across all devices on the network. VLAN groups network devices and enable them to behave as
if, they are in one single network. Data security is ensured by keeping the data exchanged between the devices of a
particular VLAN within the same network.
VLAN offers a number of advantages over traditional LAN. They are:
1. Performance
In networks with traffic consisting of a high percentage of broadcasts and multicasts, VLAN minimizes the possibility of
sending the broadcast and multicast traffic to unnecessary destinations.
2. Formation of Virtual Workgroups
VLAN helps in forming virtual workgroups. During this period, communication between the members of the workgroup
will be high. Broadcasts and multicasts can be restricted within the workgroup.
3. Simplified Administration
Most of the network costs are a result of adds, moves, and changes of users in the network. Every time a user is moved in
a LAN, recabling, new station addressing, and reconfiguration of hubs and routers becomes necessary. Some of these
tasks can be simplified with the use of VLANs.
4. Reduced Cost
VLANs can be used to create broadcast domains, which eliminate the need for expensive routers.
5. Security
Sensitive data may be periodically broadcast on a network. Placing only those users, who are allowed to access to such
sensitive data on a VLAN can reduce the chances of an outsider gaining access to the data. VLAN can also be used to
control broadcast domains, set up firewalls, restrict access, and inform the network manager of an intrusion.
VLANs of System Usage
The Vlan range of 4000-4093 should be left for system internal usage and should not be used or manipulated by the user
unless specifically indicated in this manual.
VLAN Range of NMS Usage
The IS5 Communications iSIM NMS uses a configurable range of Vlans for the creation and management of services.
The user should take notice to avoid manipulating NMS created Vlans.
VLAN Configuration Guidelines
VLAN is enabled in the switch by default.
The default VLAN 1- cannot be deleted in the switch, but the ports can be removed from it.
iS5 Communications Inc. Page: 86 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
VLAN Module status
Enable
Default VLAN Id configured in the
switch
1
Mac address table aging time
300 seconds
Acceptable frame types
All (Accepts untagged frames or priority-tagged
frames or tagged frames received on the port)
Ingress filtering
Disabled
NOTE
If the port type is not explicitly specified as untagged, then all the ports are
configured to be of tagged port type allowing transmission of frames with the
specified VLAN tag.
NOTE
If PVID value has not been explicitly configured for a port, then PVID assumes
a default value of 1
Mapping of forwarding database identifier (FID) to VLANs is successful only when, VLAN learning mode is hybrid.
To configure a static unicast/multicast MAC address in the forwarding database, VLAN must have been
VLAN logically segments the shared media LAN, forming virtual workgroups. It redefines and optimizes the basic
Transparent Bridging functionalities such as learning, forwarding, filtering and flooding.
VLAN Default state
configured and member ports must have been configured for the specified VLAN.
It is not possible to configure a port as trunk, if the port is an untagged member of a VLAN.
Up to 1k Vlans may be configured simultaneously.
Vlan ports
Member ports represent the set of ports permanently assigned to the VLAN egress list. Frames belonging to the specified
VLAN are forwarded to the ports in the egress list.
The untagged setting allows the port to transmit the frames without a VLAN tag. This setting is used to configure a port
connected to an end user device.
iS5 Communications Inc. Page: 87 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
NOTE
Adding port to a vlan using the command “ports <type>..” will remove all ports
from the vlan and associate only the detailed ports to the vlan.
Adding port to a vlan using the command “ports add<type>..” will add this port
to the vlan without affecting other port members of the vlan.
Enabling VLAN
A VLAN can be made active in two ways:
By adding a member port to a VLAN (refer section Configuring Static ) or
By using the VLAN active command.
Total limit of 64 subnets is supported at the routing table. Customer static and
dynamic entries in total should not exceed a total of 60 entries.
IP Interfaces
The iSG18GFP supports multiple layer 3 interfaces to be set for the purposes of:
An IP interface is always assigned to a vlan.
Depending on its purpose an interface will be set either at the Global Configuration Environment or at the Application
Configuration Environment.
GCE IP Interfaces
The GCE interfaces are usually used for:
Different Interfaces must be in different subnets.
Each interface can be assigned, and must be assigned, to a single VLAN.
A VLAN can only be assigned a single IP interface.
Static routing of GCE IP interfaces is immediate and requires no special configuration.
Routing.
Management.
Serial services.
1. IP Management to the switch (SSH, Telnet ,HTTP, SNMP, FTP)
2. Routing of access traffic using static entries or OSPF
Dynamic routing of GCE IP interfaces is supported with OSPF.
Commands Hierarchy
+ root
+ config terminal
- debug ip dhcp client all
- release dhcp vlan <>
+ interface vlan <vlan id>
- [no] shutdown
- ip address [dhcp | <ip-address> <subnet-mask>]
[no] ip route <destination ip address> <destination subnet mask>
<next hope ip> <distance>
- renew dhcp vlan <>
- show interfaces
iS5 Communications Inc. Page: 91 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
NOTE
Configuring the IP address for an Interface requires the interface to be shutdown
prior to the configuration.
Command
Description
Config terminal
Interface vlan <>
ip address
This command sets the IP address for an interface.
The no form of the command resets the IP address
of
the interface to its default value.
<ip address>
Sets the IP address for an interface. If the network in
which
Default : 172.18.212.150
<subnet mask>
Sets the subnet mask for the configured IP address.
The configured subnet mask should be in the same
subnet of the network in which the switch is placed.
Default : 255.255.255.0
[no] shutdown
Disable / enable the interface.
Prior to any configuration changes to the interface it
must first be disabled.
[no] ip route
This command adds a static route. The Route defines
the IP address or interface through which the
destination can be reached. The no form of this
command deletes a static route.
<destination ip address>
A.B.C.D
<destination mask>
Format 255.255.255.255
<next hop ip address>
Defines the IP address or IP alias of the next hop that
can be used to reach that network.
A.B.C.D
- show ip interface [vlan <vlan id>] [loopback <loopback id>]
- show running-config interface vlan <vlan id>
- show ip route [ { <ip-address> [<mask>] | connected |ospf | rip | static | summary } ]
- show debugging
- show ip dhcp client stats
- show ip dhcp server binding
- show running-config ip
Commands Description
iS5 Communications Inc. Page: 92 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
<distance>
(1-254)
NOTE
Interface vlan 1 is available by default for In-band management.
NOTE
Interface vlan 4093 is used for internal purposes and should not be deleted
/changed.
Default state
iSG18GFP# show ip interface
vlan1 is up, line protocol is up
Internet Address is 10.0.0.1/8
Broadcast Address 255.255.255.255
vlan4093 is up, line protocol is up
Internet Address is 7.7.7.4/29
Broadcast Address 7.7.7.7
Configuration Examples
3180# show ip interface
vlan1 is up, line protocol is up
Internet Address is 172.17.203.39/24
1. Example for interface configuration
3180#config
interface vlan 10
ip address 192.168.0.100 255.255.255.0
no shutdown
end
write startup-cfg
2. Static route configuration
Config
ip route 0.0.0.0 0.0.0.0 192.168.0.10 1
end
write startup-cfg
3. Dhcp configuration
config
interface vlan 1
ip address dhcp
end
iS5 Communications Inc. Page: 93 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
Config terminal
default mode
manual | dynamic
manual - Assigns static IP address to the default
interface. The IP address and IP mask configured by
user are assigned to the default interface.
dynamic - Assigns dynamic IP address to the default
interface. That is, IP
address provided by the server in the network is
assigned to the default interface on switch reboot.
The IP address is fetched through the dynamic IP
address configuration protocols such as DHCP client.
Default : manual
Default ip address
<ip address>
Sets the IP address for the default interface /
specified interface. If the network in which the
switch is
implemented contains a server such as DHCP server,
dynamically allocating IP address, the configured IP
address should not be within the range of the
addresses that will be allocated by the server to the
other switches.
This precaution avoids creation of IP address
conflicts between the switches.
Default : 10.0.0.1
Broadcast Address 172.17.203.255
IP address allocation method is dynamic
IP address allocation protocol is dhcp
Static & Dynamic switch Default IP Address assignment
+ root
+ config terminal
+ default mode [dynamic | manual]
+ default ip address <ip-address> [ subnet-mask <subnet mask> ]
[ interface <interface-type> <interface-id> ]
show nvram
+ default ip allocation protocol dhcp
iS5 Communications Inc. Page: 94 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
subnet-mask <subnet mask>
Sets the subnet mask for the configured IP address.
The configured subnet mask should be in the same
subnet of the network in which the switch is placed
Default : 255.0.0.0
<interface-type>
fastethernet | gigabitethernet
<interface-id>
ID : <slot number>/<port number>
Slot number is fixed as 0.
default ip allocation protocol
dhcp
Allows the client device to obtain configuration
parameters such as network address, from the DHCP
server.
Default : dhcp
iS5 Communications Inc. Page: 95 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
ACE IP Interfaces
The following services require assignment of an IP interface and possibly routes at the Application Configuration
Environment.
Multiple IP interfaces are optional.
The Application IP interfaces are supported on top of the layer 3 interfaces configured at the GCE and may be routed with
them.
Application IP interfaces are required for the following:
- Each IP interface must be associated with a user predefined VLAN (set at the GCE).
- Each interface must be associated with a “purpose”.
Serial tunneling
Terminal server
Protocol gateway
L2-VPN
L3-DMVPN
IPSec
o One (and only one) of the interfaces must be set to purpose application-host
- At each such purpose vlan, the ACE port Gi 0/3 must be set as a tagged member.
- Each interface must be in a unique subnet.
- The IP interfaces are given an automatic name indicating the vlan tag they are created with. The name format is:
ACE IP Interface Commands Hierarchy
+ root
+ configure terminal
o All other interfaces must be set to purpose general
Destination Gateway Genmask Flags Metric Ref Use Iface
172.17.212.0 0.0.0.0 255.255.255.0 U 0 0 0 eth1.100
0.0.0.0 172.17.212.100 0.0.0.0 UG 0 0 0 eth1.100
Completed OK
[router/] static
router/static> enable
router/static# configure terminal
router/static(config)# ip route 0.0.0.0/0 172.17.212.100
router/static(config)# write
router/static(config)# exit
router/static# exit
commit
Diagnostic
System Environment
Environment Command Hierarchy
+ Root
+ config terminal
- set switch maximum { RAM | CPU | flash } threshold <percentage>
- set switch temperature {min|max} threshold <celsius>}
+ interface <type> <port id>
- [no] snmp trap link-status
- show system information
- show env {all | temperature| RAM | CPU | flash | power}
- show nvram
iS5 Communications Inc. Page: 98 of: 465
iSG18GFP User Manual R3.5
Ver: 1.3
Date: 04.28.2015
Command
Description
Config terminal
Interface <type> <port id>
[no] snmp trap link-status
This command enables trap generation on the
interface. The no form of this command disables
trap generation on the interface.
The interface generated linkUp or linkDown trap.
The linkUp trap denotes that the communication link
is available and ready for traffic flow. The linkDown
trap denotes that the communication link failed and
isnot ready for traffic flow.
set switch maximum
This command sets the switch maximum threshold
values of RAM, CPU, and Flash. When the current
resource usage rises above the threshold limit, the
SNMP trap message with maximum severity will be
sent for the specified resource and the sntp message
will be displayed. This threshold value is represented
in percentage and ranges between 1 and 100
percentage
{ RAM | CPU | flash }
RAM : Indicates the maximum RAM usage of the
switch in percentage to trigger a trap.
CPU : Indicates the maximum CPU usage of the
switch in percentage to trigger a trap.
Flash : Indicates the maximum flash usage of the
switch in percentage to trigger a trap.
threshold <percentage>
Percentage : 1-100
Default : 100
set switch temperature
This command sets the maximum and minimum
temperature threshold values of the switch in
celcius.
When the current temperature drops below the
threshold, an SNMP trap with maximum severity will
be sent to the manager. This threshold value ranges
between -14 and 40 degree Celsius.
{min|max}
Sets the minimum /maximum temperature
threshold value for the switch to trigger a trap.
Enable: Enables the RMON feature in the system. On
enabling, the RMON starts monitoring the networks
both local and remote and provides network fault
diagnosis
Disable: Disables the RMON feature in the system.
On disabling, the RMON‟s network monitoring is
called off.
Default :disabled
Interface <type> <id>
rmon collection stats
This command enables history collection of interface
statistics in the buckets for the specified time
interval. The no form of the command disables the
history collection on the interface
<index (1-65535)> : Identifies an entry in the alarm
table. The value ranges between 1 and 65535.
Owner: Allows the user to enter the name of the
owner of the RMON group of statistics.
RMON
RMON (Remote Monitoring) is a standard monitoring specification that enables various network monitors and console
systems to exchange network-monitoring data.
The RMON specification defines a set of statistics and functions that can be exchanged between RMON-compliant
console managers and network probes. As such, RMON provides network administrators with comprehensive networkfault diagnosis, planning, and performance-tuning information.