Reproduction in any manner whatsoever without the written permission of D-Link Computer Corporation is strictly forbidden.
Trademarks used in this text: D-Link and the D-LINK logo are trademarks of D-Link Computer Corporation; Microsoft and
Windows are registered trademarks of Microsoft Corporation.
Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or
their products. D-Link Computer Corporation disclaims any proprietary interest in trademarks and trade names other than its
own.
USING THE CONSOLE CLI.........................................................................................................................................4
MODIFY BANNER AND PROMPT COMMANDS .....................................................................................................20
SWITCH PORT COMMANDS ....................................................................................................................................23
PORT SECURITY COMMANDS ................................................................................................................................26
BROADCAST STORM CONTROL COMMANDS .....................................................................................................87
COS COMMANDS......................................................................................................................................................91
PORT MIRRORING COMMANDS ...........................................................................................................................105
LINK AGGREGATION COMMANDS.......................................................................................................................113
BASIC IP COMMANDS............................................................................................................................................118
ACCESS CONTROL LIST (ACL) COMMANDS......................................................................................................151
TIME RANGE COMMANDS.....................................................................................................................................164
TIME AND SNTP COMMANDS ...............................................................................................................................170
COMMAND HISTORY LIST.....................................................................................................................................237
The Switch can be managed through the Switch’s serial port, Telnet, or the Web-based management agent. The Command Line
Interface (CLI) can be used to configure and manage the Switch via the serial port or Telnet interfaces.
This manual provides a reference for all of the commands contained in the CLI. Configuration and management of the Switch via
the Web-based management agent is discussed in the Manual. This manual provides a reference for all of the commands contained
in the CLI for members of this series, including the DES-3028, DES-3028P, DES-3052, and DES-3052P. Examples present in this
manual may refer to any member of this series and may show different port counts, but are universal to this series of switches,
unless otherwise stated. Configuration and management of the Switch via the Web-based management agent is discussed in the
User’s Guide.
Accessing the Switch via the Serial Port
The Switch’s serial port’s default settings are as follows:
• 9600 baud
• no parity
• 8 data bits
• 1 stop bit
A computer running a terminal emulation program capable of emulating a VT-100 terminal and a serial port configured as above
is then connected to the Switch’s serial port via an RS-232 DB-9 cable.
With the serial port properly connected to a management computer, the following screen should be visible. If this screen does not
appear, try pressing Ctrl+r to refresh the console screen.
Figure 1-1. Initial CLI screen
There is no initial username or password. Just press the Enter key twice to display the CLI input cursor − DES-3028P:4#. This is
the command line where all commands are input.
Each Switch must be assigned its own IP Address, which is used for communication with an SNMP network manager or other
TCP/IP application (for example BOOTP, TFTP). The Switch’s default IP address is 10.90.90.90. Users can change the default
Switch IP address to meet the specification of your networking address scheme.
The Switch is also assigned a unique MAC address by the factory. This MAC address cannot be changed, and can be found on the
initial boot console screen – shown below.
Figure 1-2. Boot screen
The Switch’s MAC address can also be found in the Web management program on the Switch Information (Basic Settings)
window on the Configuration menu.
The IP address for the Switch must be set before it can be managed with the Web-based manager. The Switch IP address can be
automatically set using BOOTP or DHCP protocols, in which case the actual address assigned to the Switch must be known.
The IP address may be set using the Command Line Interface (CLI) over the console serial port as follows:
1. Starting at the command line prompt, enter the commands config ipif System ipaddress
xxx.xxx.xxx.xxx/yyy.yyy.yyy.yyy. Where the x’s represent the IP address to be assigned to the IP interface named
System and the y’s represent the corresponding subnet mask.
2. Alternatively, users can enter config ipif System ipaddress xxx.xxx.xxx.xxx/z. Where the x’s represent the IP address to
be assigned to the IP interface named System and the z represents the corresponding number of subnets in CIDR
notation.
The IP interface named System on the Switch can be assigned an IP address and subnet mask which can then be used to connect a
management station to the Switch’s Telnet or Web-based management agent.
In the above example, the Switch was assigned an IP address of 10.90.90.91 with a subnet mask of 255.0.0.0. The system message
Success indicates that the command was executed successfully. The Switch can now be configured and managed via Telnet,
SNMP MIB browser and the CLI or via the Web-based management agent using the above IP address to connect to the Switch.
The DES-3028/28P/52/52P support a console management interface that allows the user to connect to the Switch’s management
agent via a serial port and a terminal or a computer running a terminal emulation program. The console can also be used over the
network using the TCP/IP Telnet protocol. The console program can be used to configure the Switch to use an SNMP-based
network management software over the network.
This chapter describes how to use the console interface to access the Switch, change its settings, and monitor its operation.
Note: Switch configuration settings are saved to non-volatile RAM using the save command. The current
configuration will then be retained in the Switch’s NV-RAM, and reloaded when the Switch is rebooted. If
the Switch is rebooted without using the save command, the last configuration saved to NV-RAM will be
loaded.
Connecting to the Switch
The console interface is used by connecting the Switch to a VT100-compatible terminal or a computer running an ordinary
terminal emulator program (e.g., the HyperTerminal program included with the Windows operating system) using an RS-232C
serial cable. Your terminal parameters will need to be set to:
• VT-100 compatible
• 9600 baud
• 8 data bits
• No parity
• One stop bit
• No flow control
Users can also access the same functions over a Telnet interface. Once users have set an IP address for your Switch, users can use
a Telnet program (in VT-100 compatible terminal mode) to access and control the Switch. All of the screens are identical, whether
accessed from the console port or from a Telnet interface.
After the Switch reboots and users have logged in, the console looks like this:
Figure 2-1. Initial Console Screen after logging in
Commands are entered at the command prompt, DES-3028P:4#.
There are a number of helpful features included in the CLI. Entering the ? command will display a list of all of the top-level
commands.
When users enter a command without its required parameters, the CLI will prompt users with a Next possible completions:
message.
Figure 2-3. Example Command Parameter Help
In this case, the command config account was entered with the parameter <username>. The CLI will then prompt users to enter
the <username> with the message, Next possible completions:. Every command in the CLI has this feature, and complex
commands have several layers of parameter prompting.
In addition, after typing any given command plus one space, users can see all of the next possible sub-commands, in sequential
order, by repeatedly pressing the Tab key.
To re-enter the previous command at the command prompt, press the up arrow cursor key. The previous command will appear at
the command prompt.
Figure 2-4. Using the Up Arrow to Re-enter a Command
In the above example, the command config account was entered without the required parameter <username>, the CLI returned
the Next possible completions: <username> prompt. The up arrow cursor control key was pressed to re-enter the previous
command (config account) at the command prompt. Now the appropriate username can be entered and the config account
command re-executed.
All commands in the CLI function in this way. In addition, the syntax of the help prompts are the same as presented in this manual
− angle brackets < > indicate a numerical value or character string, braces { } indicate optional parameters or a choice of
parameters, and brackets [ ] indicate required parameters.
If a command is entered that is unrecognized by the CLI, the top-level commands will be displayed under the Available commands: prompt.
Figure 2-5. The Next Available Commands Prompt
The top-level commands consist of commands such as show or config. Most of these commands require one or more parameters
to narrow the top-level command. This is equivalent to show what? or config what? Where the what? is the next parameter.
For example, if users enter the show command with no additional parameters, the CLI will then display all of the possible next
parameters.
Figure 2-6. Next possible completions: Show Command
In the above example, all of the possible next parameters for the show command are displayed. At the next command prompt, the
up arrow was used to re-enter the show command, followed by the account parameter. The CLI then displays the user accounts
configured on the Switch.
name in the <ipif_name 12> space, a VLAN name in the
<vlan_name 32> space, and the network address in the
<network_address> space. Do not type the angle brackets.
config ipif Engineering ipaddress 10.24.22.5/255.0.0.0 vlan
Design state enable
[square brackets]
Purpose Encloses a required value or set of required arguments. One value
or argument can be specified.
Syntax
Description In the above syntax example, users must specify either an admin or
Example
Command
create account [admin | user] <username 15>
a user level account to be created. Do not type the square brackets.
create account admin Darren
| vertical bar
Purpose Separates two or more mutually exclusive items in a list, one of
which must be entered.
Syntax
Description In the above syntax example, users must specify either admin, or
Example
Command
create account [admin | user] <username 15>
user. Do not type the vertical bar.
create account admin Darren
{braces}
Purpose Encloses an optional value or set of optional arguments.
Syntax
Description In the above syntax example, users have the option to specify
reset {[config | system]}
config or system. It is not necessary to specify either optional value,
however the effect of the system reset is dependent on which, if any,
value is specified. Therefore, with this example there are three
possible outcomes of performing a system reset. See the following
chapter, Basic Commands for more details about the reset
command.
Example
command
reset config
Line Editing Key Usage
Delete Deletes the character under the cursor and then shifts the
remaining characters in the line to the left.
Backspace Deletes the character to the left of the cursor and then shifts the
remaining characters in the line to the left.
Insert or Ctrl+R Toggle on and off. When toggled on, inserts text and shifts previous
text to the right.
Left Arrow Moves the cursor to the left.
Right Arrow Moves the cursor to the right.
Up Arrow Repeats the previously entered command. Each time the up arrow
is pressed, the command previous to that displayed appears. This
way it is possible to review the command history for the current
session. Use the down arrow to progress sequentially forward
through the command history list.
Down Arrow The down arrow will display the next command in the command
history entered in the current session. This displays each command
sequentially as it was entered. Use the up arrow to review previous
commands.
Tab Shifts the cursor to the next field to the left.
Multiple Page Display Control Keys
Space Displays the next page.
CTRL+c Stops the display of remaining pages when multiple pages are to be
displayed.
ESC Stops the display of remaining pages when multiple pages are to be
displayed.
n Displays the next page.
p Displays the previous page.
q Stops the display of remaining pages when multiple pages are to be
displayed.
r Refreshes the pages currently displayed.
a Displays the remaining pages without pausing between pages.
Each command is listed, in detail, in the following sections.
create account
Example usage:
Purpose
Syntax create [admin | user] <username 15>
Description
Parameters admin <username>
Restrictions
Used to create user accounts.
The create account command is used to create user accounts that
consist of a username of 1 to 15 characters and a password of 0 to
15 characters. Up to 8 user accounts can be created.
user <username>
Only Administrator-level users can issue this command.
Usernames can be between 1 and 15 characters.
Passwords can be between 0 and 15 characters.
This command is used to configure the serial port’s baud rate and auto
logout settings.
baud_rate [9600 | 19200 | 38400 | 115200]− The serial bit rate that will be
used to communicate with the management host. There are four options:
9600, 19200, 38400, 115200.
never − No time limit on the length of time the console can be open with
no user input.
2_minutes− The console will log out the current user if there is no user
input for 2 minutes.
5_minutes − The console will log out the current user if there is no user
input for 5 minutes.
10_minutes− The console will log out the current user if there is no user
input for 10 minutes.
15_minutes− The console will log out the current user if there is no user
input for 15 minutes.
Only administrator-level users can issue this command.
Used to pause the scrolling of the console screen when a command
displays more than one page.
This command is used when issuing a command which causes the
console screen to rapidly scroll through several pages. This
command will cause the console to pause at the end of each page.
The default setting is enabled.
None.
Only administrator-level users can issue this command.
disable clipaging
Example usage:
To disable pausing of the screen display when show command output reaches the end of the page:
Used to disable the pausing of the console screen scrolling at the
end of each page when a command displays more than one screen
of information.
This command is used to disable the pausing of the console screen
at the end of each page when a command would display more than
one screen of information.
None.
Only administrator-level users can issue this command.
enable telnet
Purpose
Syntax enable telnet <tcp_port_number 1-65535>
Description
Parameters
Used to enable communication with and management of the Switch
using the Telnet protocol.
This command is used to enable the Telnet protocol on the Switch.
The user can specify the TCP or UDP port number the Switch will
use to listen for Telnet requests.
<tcp_port_number 1-65535>− The TCP port number. TCP ports
Used to enable the HTTP-based management software on the Switch.
This command is used to enable the Web-based management software
on the Switch. The user can specify the TCP port number the Switch will
use to listen for Telnet requests.
<tcp_port_number 1-65535> − The TCP port number. TCP ports are
numbered between 1 and 65535. The “well-known” port for the Webbased management software is 80.
Only administrator-level users can issue this command.
DES-3028P:4#enable web 80
Command: enable web 80
Note: SSL will be disabled if web is enabled.
Success.
DES-3028P:4#
Example usage:
To disable HTTP:
disable web
Purpose
Syntax disable web
Description
Parameters
Restrictions
DES-3028P:4#disable web
Command: disable web
Success.
DES-3028P:4#
Used to disable the HTTP-based management software on the
Switch.
This command disables the Web-based management software on
the Switch.
None.
Only administrator-level users can issue this command.
save
Purpose
Syntax save
Description
Parameters
Used to save changes in the Switch’s configuration to non-volatile
RAM.
This command is used to enter the current switch configuration into
non-volatile RAM. The saved switch configuration will be loaded into
the Switch’s memory each time the Switch is restarted.
To save the Switch’s current configuration to non-volatile RAM:
Restrictions
DES-3028P:4#save
Command: save
Saving all configurations to NV-RAM... Done.
Success.
DES-3028P:4#
Only administrator-level users can issue this command.
reboot
Purpose
Syntax reboot
Description
Parameters
Used to restart the Switch.
This command is used to restart the Switch.
None.
Restrictions
Example usage:
To restart the Switch:
DES-3028P:4#reboot
Command: reboot
Are users sure want to proceed with the system reboot? (y|n)
Please wait, the switch is rebooting...
reset
Purpose
Syntax reset {[config | system]}
Description
Parameters
None.
Used to reset the Switch to the factory default settings.
This command is used to restore the Switch’s configuration to the
default settings assigned from the factory.
config− If the keyword ‘config’ is specified, all of the factory default
settings are restored on the Switch including the IP address, user
accounts, and the switch history log. The Switch will not save or
reboot.
system− If the keyword ‘system’ is specified all of the factory default
settings are restored on the Switch. The Switch will save and reboot
after the settings are changed to default. Rebooting will clear all
entries in the Forwarding Data Base.
If no parameter is specified, the Switch’s current IP address, user
accounts, and the switch history log are not changed. All other
parameters are restored to the factory default settings. The Switch
will not save or reboot.
Example usage:
Restrictions
Only administrator-level users can issue this command.
new name of no more that 16 characters.
username - The command prompt will be changed to the login
username.
default – The command prompt will reset to factory default
command prompt.
restrictions include:
• If the “reset/reset config” command is executed, the
modified command prompt will remain modified. However,
the “reset system” command will reset the command
prompt to the original factory banner.
config greeting _message
Purpose Used to configure the login banner (greeting message).
Syntax
Description Users can use this command to modify the login banner (greeting
Parameters default – If the user enters default to the modify banner command, then
the banner will be reset to the original factory banner.
To open the Banner Editor, click Enter after typing the config
greeting_message command. Type the information to be displayed on
the banner by using the commands described on the Banner Editor:
Quit without save: Ctrl+C
Save and quit: Ctrl+W
Move cursor: Left/Right/Up/Down
Delete line: Ctrl+D
Erase all setting: Ctrl+X
Reload original setting: Ctrl+L
Restrictions Only administrator-level users can issue this command. Other restrictions
include:
• If the “reset/reset config” command is executed, the modified
banner will remain modified. However, the “reset system”
command will reset the modified banner to the original factory
banner.
• The capacity of the banner is 6*80. 6 Lines and 80 characters per
line.
• Ctrl+W will only save the modified banner in the DRAM. Users
need to type the “save” command to save it into FLASH.
• Only valid in threshold level.
Example usage:
To modify the banner to read “Say goodnight, Gracie”:
Greeting Messages Editor
================================================================================
Say Goodnight, Gracie
DGS-3028P Fast Ethernet Switch
Command Line Interface
Firmware: Build 1.00-B22
Copyright(C) 2006-2009D-Link Corporation. All rights reserved.
================================================================================
<Function Key> <Control Key>
Ctrl+C Quit without save left/right/
Ctrl+W Save and quit up/down Move cursor
Ctrl+D Delete line
Ctrl+X Erase all setting
Ctrl+L Reload original setting
<portlist> − Specifies a port or range of ports to be configured.
medium_type [fiber | copper] – This applies only to the Combo ports. If configuring the Combo
ports this defines the type of transport medium used.
speed – Allows the user to adjust the speed for a port or range of ports. The user has a choice of
the following:
• auto − Enables auto-negotiation for the specified range of ports.
• [10 | 100 | 1000] − Configures the speed in Mbps for the specified range of ports. Gigabit
ports are statically set to 1000 and cannot be set to slower speeds.
• [half | full] − Configures the specified range of ports as either full-duplex or half-duplex.
• [master | slave] - The master setting (1000M/Full_M) will allow the port to advertise
capabilities related to duplex, speed and physical layer type. The master setting will also
determine the master and slave relationship between the two connected physical layers.
This relationship is necessary for establishing the timing control between the two physical
layers. The timing control is set on a master physical layer by a local source. The slave
setting (1000M/Full_S) uses loop timing, where the timing comes form a data stream
received from the master. If one connection is set for 1000M/Full_M, the other side of the
connection must be set for 1000M/Full_S. Any other configuration will result in a link
down status for both ports.
flow_control [enable | disable] – Enable or disable flow control for the specified ports.
learning [enable | disable] − Enables or disables the MAC address learning on the specified
range of ports.
state [enable | disable] − Enables or disables the specified range of ports.
description <desc 32> - Enter an alphanumeric string of no more than 32 characters to describe
a selected port interface.
clear_description - Enter this command to clear the port description of the selected port(s).
Restrictions Only administrator-level users can issue this command.
To configure the speed of port 3 to be 10 Mbps, full duplex, with learning and state enabled:
DES-3028P:4#config ports 1-3 speed 10_full state enable
Command: config ports 1-3 speed 10_full state enable
Success.
DES-3028P:4#
show ports
Example usage:
To display the configuration of all ports on a standalone switch:
Purpose
Syntax show ports [<portlist>] {description | err_disabled}
Description
Parameters
Restrictions
DES-3028P:4#show ports
Command show ports
Port Port Settings Connection Address
State Speed/Duplex/FlowCtrl Speed/Duplex/FlowCtrl Learning
------ -------- --------------------- --------------------- -------1 Enabled Auto/Enabled Link Down Enabled
2 Enabled Auto/Enabled Link Down Enabled
3 Enabled Auto/Enabled Link Down Enabled
4 Enabled Auto/Enabled Link Down Enabled
5 Enabled Auto/Enabled Link Down Enabled
6 Enabled Auto/Enabled Link Down Enabled
7 Enabled Auto/Enabled Link Down Enabled
8 Enabled Auto/Enabled Link Down Enabled
9 Enabled Auto/Enabled Link Down Enabled
10 Enabled Auto/Enabled 100M/Full/None Enabled
11 Enabled Auto/Enabled Link Down Enabled
12 Enabled Auto/Enabled Link Down Enabled
13 Enabled Auto/Disabled Link Down Enabled
14 Enabled Auto/Disabled Link Down Enabled
15 Enabled Auto/Disabled Link Down Enabled
16 Enabled Auto/Disabled Link Down Enabled
17 Enabled Auto/Disabled Link Down Enabled
18 Enabled Auto/Disabled Link Down Enabled
19 Enabled Auto/Disabled Link Down Enabled
20 Enabled Auto/Disabled Link Down Enabled
CTRL+C ESC q Quit SPACE n Next Page p Previous Page r Refresh
Used to display the current configuration of a range of ports.
This command is used to display the current configuration of a
range of ports.
<portlist> − Specifies a port or range of ports to be displayed.
{description} – Adding this parameter to the show ports command
indicates that a previously entered port description will be included
in the display.
err_disabled – Use this to list disabled ports including connection
status and reason for being disabled.
To display the configuration of all ports on a standalone switch, with description:
DES-3028P:4#show ports description
Command: show ports description
Port Port Settings Connection Address
State Speed/Duplex/FlowCtrl Speed/Duplex/FlowCtrl Learning
------ -------- --------------------- --------------------- -------1 Enabled Auto/Disabled Link Down Enabled
Desc: dads1
2 Enabled Auto/Disabled Link Down Enabled
Desc:
3 Enabled Auto/Disabled Link Down Enabled
Desc:
4 Enabled Auto/Disabled Link Down Enabled
Desc:
5 Enabled Auto/Disabled Link Down Enabled
Desc:
6 Enabled Auto/Disabled Link Down Enabled
Desc:
7 Enabled Auto/Disabled Link Down Enabled
Desc:
8 Enabled Auto/Disabled Link Down Enabled
Desc:
9 Enabled Auto/Disabled Link Down Enabled
Desc:
10 Enabled Auto/Disabled Link Down Enabled
Desc:
CTRL+C ESC q Quit SPACE n Next Page p Previous Page r Refresh
Used to clear MAC address entries learned from a specified port for
the port security function.
This command is used to clear MAC address entries which were
learned by the Switch by a specified port. This command only relates
to the port security function.
<auth_portlist> − Specifies a port or port range to clear.
Only administrator-level users can issue this command.
CTRL+C ESC q Quit SPACE n Next Page p Previous Page r Refresh
Used to display the current port security configuration.
This command is used to display port security information of the
Switch’s ports. The information displayed includes port security,
admin state, maximum number of learning address and lock mode.
<auth_portlist>− Specifies a port or range of ports to be viewed.
None.
Example usage:
To enable the port security trap log setting:
enable port_security trap_log
Purpose
Syntax enable port_security trap_log
Description
Parameters
Restrictions
Used to enable the trap log for port security.
This command, along with the disable port_security trap_log, will
enable and disable the sending of log messages to the Switch’s log
and SNMP agent when the port security of the Switch has been
triggered.
This command, along with the enable port_security trap_log, will
enable and disable the sending of log messages to the Switch’s log
and SNMP agent when the port security of the Switch has been
triggered.
The DES-3028/28P/52/52P support the Simple Network Management Protocol (SNMP) versions 1, 2c, and 3. Users can specify
which version of the SNMP users want to use to monitor and control the Switch. The three versions of SNMP vary in the level of
security provided between the management station and the network device. The following table lists the security features of the
three SNMP versions:
SNMP
Version
v1 Community String
v2c Community String
v3 Username
v3 MD5 or SHA Authentication is based on the HMAC-MD5 or HMAC-SHA
v3 MD5 DES or SHA DES Authentication is based on the HMAC-MD5 or HMAC-SHA
The network management commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in
the following table.
Authentication
Method
Description
Community String is used for authentication − NoAuthNoPriv
Community String is used for authentication − NoAuthNoPriv
Username is used for authentication − NoAuthNoPriv
algorithms − AuthNoPriv
algorithms − AuthPriv.
DES 56-bit encryption is added based on the CBC-DES (DES-56)
standard
Command Parameters
create snmp user <SNMP_name 32> <groupname 32> {encrypted [by_password
The create snmp user command creates a new SNMP user and adds the user to
an SNMP group that is also created by this command. SNMP ensures:
Message integrity − Ensures that packets have not been tampered with during
transit.
Authentication − Determines if an SNMP message is from a valid source.
Encryption − Scrambles the contents of messages to prevent it from being viewed
by an unauthorized source.
<SNMP_name 32>− An alphanumeric name of up to 32 characters that will identify
the new SNMP user.
<groupname 32>− An alphanumeric name of up to 32 characters that will identify
the SNMP group the new SNMP user will be associated with.
encrypted – Allows the user to choose a type of authorization for authentication
using SNMP. The user may choose:
•
by_password – Requires the SNMP user to enter a password for
authentication and privacy. The password is defined by specifying the
auth_password below. This method is recommended.
•
by_key – Requires the SNMP user to enter a encryption key for
authentication and privacy. The key is defined by specifying the key in hex
form below. This method is not recommended.
auth - The user may also choose the type of authentication algorithms used to
authenticate the snmp user. The choices are:
•
md5 − Specifies that the HMAC-MD5-96 authentication level will be used.
md5 may be utilized by entering one of the following:
• <auth password 8-16> - An alphanumeric sting of between 8 and
16 characters that will be used to authorize the agent to receive
packets for the host.
• <auth_key 32-32> - Enter an alphanumeric sting of exactly 32
characters, in hex form, to define the key that will be used to
authorize the agent to receive packets for the host.
•
sha − Specifies that the HMAC-SHA-96 authentication level will be used.
• <auth password 8-20> - An alphanumeric sting of between 8 and
20 characters that will be used to authorize the agent to receive
packets for the host.
• <auth_key 40-40> - Enter an alphanumeric sting of exactly 40
characters, in hex form, to define the key that will be used to
authorize the agent to receive packets for the host.
priv – Adding the priv (privacy) parameter will allow for encryption in addition to the
authentication algorithm for higher security. The user may choose:
•
des – Adding this parameter will allow for a 56-bit encryption to be added
using the DES-56 standard using:
• <priv_password 8-16> - An alphanumeric string of between 8 and
16 characters that will be used to encrypt the contents of messages
the host sends to the agent.
• <priv_key 32-32> - Enter an alphanumeric key string of exactly 32
characters, in hex form, that will be used to encrypt the contents of
messages the host sends to the agent.
•
none – Adding this parameter will add no encryption.
Restrictions
Only administrator-level users can issue this command.
Example usage:
To create an SNMP user on the Switch:
DES-3028P:4#create snmp user dlink default encrypted by_password auth md5
canadian priv none
Command: create snmp user dlink default encrypted by_password auth md5
canadian priv none
Success.
DES-3028P:4#
delete snmp user
Purpose
Syntax delete snmp user <SNMP_name 32>
Description
Parameters
Restrictions
Used to remove an SNMP user from an SNMP group and also to
delete the associated SNMP group.
The delete snmp user command removes an SNMP user from its
SNMP group and then deletes the associated SNMP group.
<SNMP_name 32>− An alphanumeric string of up to 32 characters
that identifies the SNMP user that will be deleted.
Only administrator-level users can issue this command.
DES-3028P:4#show snmp view
Command: show snmp view
Vacm View Table Settings
View Name Subtree View Type
-------------------- ------------------------- --------- ReadView 1 Included
WriteView 1 Included
NotifyView 1.3.6 Included
restricted 1.3.6.1.2.1.1 Included
restricted 1.3.6.1.2.1.11 Included
restricted 1.3.6.1.6.3.10.2.1 Included
restricted 1.3.6.1.6.3.11.2.1 Included
restricted 1.3.6.1.6.3.15.1.1 Included
CommunityView 1 Included
CommunityView 1.3.6.1.6.3 Excluded
CommunityView 1.3.6.1.6.3.1 Included
Total Entries: 11
DES-3028P:4#
create snmp community
Purpose Used to create an SNMP community string to define the relationship
between the SNMP manager and an agent. The community string acts like
a password to permit access to the agent on the Switch. One or more of the
following characteristics can be associated with the community string:
An Access List of IP addresses of SNMP managers that are permitted to
use the community string to gain access to the Switch’s SNMP agent.
An MIB view that defines the subset of all MIB objects that will be
accessible to the SNMP community.
read_write or read_only level permission for the MIB objects accessible to
the SNMP community.
The create snmp community command is used to create an SNMP
community string and to assign access-limiting characteristics to this
community string.
<community_string 32> − An alphanumeric string of up to 32 characters that
is used to identify members of an SNMP community. This string is used like
a password to give remote SNMP managers access to MIB objects in the
Switch’s SNMP agent.
view <view_name 32> − An alphanumeric string of up to 32 characters that
is used to identify the group of MIB objects that a remote SNMP manager is
allowed to access on the Switch.
read_only − Specifies that SNMP community members using the community
string created with this command can only read the contents of the MIBs on
the Switch.
read_write− Specifies that SNMP community members using the
community string created with this command can read from and write to the
contents of the MIBs on the Switch.
Restrictions Only administrator-level users can issue this command.
DES-3028P:4#create snmp community dlink view ReadView read_write
Command: create snmp community dlink view ReadView read_write
Success.
DES-3028P:4#
delete snmp community
Purpose Used to remove a specific SNMP community string from the Switch.
Example usage:
To delete the SNMP community string “dlink:”
Syntax
Description The delete snmp community command is used to remove a
Parameters
Restrictions Only administrator-level users can issue this command.
DES-3028P:4#delete snmp community dlink
Command: delete snmp community dlink
Success.
DES-3028P:4#
delete snmp community <community_string 32>
previously defined SNMP community string from the Switch.
<community_string 32>− An alphanumeric string of up to 32
characters that is used to identify members of an SNMP community.
This string is used like a password to give remote SNMP managers
access to MIB objects in the Switch’s SNMP agent.
show snmp community
Example usage:
To display the currently entered SNMP community strings:
Purpose Used to display SNMP community strings configured on the Switch.
Syntax
Description The show snmp community command is used to display SNMP
Parameters
Restrictions None.
show snmp community {<community_string 32>}
community strings that are configured on the Switch.
<community_string 32> − An alphanumeric string of up to 32
characters that is used to identify members of an SNMP community.
This string is used like a password to give remote SNMP managers
access to MIB objects in the Switch’s SNMP agent.
The create snmp group command creates a new SNMP group, or a
table that maps SNMP users to SNMP views.
<groupname 32>− An alphanumeric name of up to 32 characters that
will identify the SNMP group the new SNMP user will be associated
with.
v1 – Specifies that SNMP version 1 will be used. The Simple Network
Management Protocol (SNMP), version 1, is a network management
protocol that provides a means to monitor and control network
devices.
v2c – Specifies that SNMP version 2c will be used. The SNMP v2c
supports both centralized and distributed network management
strategies. It includes improvements in the Structure of Management
Information (SMI) and adds some security features.
v3 – Specifies that the SNMP version 3 will be used. SNMP v3
provides secure access to devices through a combination of
authentication and encrypting packets over the network. SNMP v3
adds:
• Message integrity − Ensures that packets have
not been tampered with during transit.
• Authentication − Determines if an SNMP
message is from a valid source.
• Encryption − Scrambles the contents of
messages to prevent it being viewed by an
unauthorized source.
noauth_nopriv − Specifies that there will be no authorization and no
encryption of packets sent between the Switch and a remote SNMP
manager.
auth_nopriv − Specifies that authorization will be required, but there
will be no encryption of packets sent between the Switch and a
remote SNMP manager.
auth_priv− Specifies that authorization will be required, and that
packets sent between the Switch and a remote SNMP manger will be
encrypted.
read_view – Specifies that the SNMP group being created can
request SNMP messages.
write_view – Specifies that the SNMP group being created has write
privileges.
notify_view − Specifies that the SNMP group being created can
receive SNMP trap messages generated by the Switch’s SNMP
agent.
• <view_name 32>− An alphanumeric string of up to 32
characters that is used to identify the group of MIB objects
that a remote SNMP manager is allowed to access on the
Switch.
Only administrator-level users can issue this command.
DES-3028P:4#delete snmp group sg1
Command: delete snmp group sg1
Success.
DES-3028P:4#
Used to remove an SNMP group from the Switch.
The delete snmp group command is used to remove an SNMP
group from the Switch.
<groupname 32>− An alphanumeric name of up to 32 characters that
will identify the SNMP group the new SNMP user will be associated
with.
Only administrator-level users can issue this command.
Used to display the group-names of SNMP groups currently configured on
the Switch. The security model, level, and status of each group are also
displayed.
Syntax show snmp groups
Description
Parameters
Restrictions
Example usage:
To display the currently configured SNMP groups on the Switch:
The show snmp groups command displays the group-names of SNMP
groups currently configured on the Switch. The security model, level, and
status of each group are also displayed.
DES-3028P:4#show snmp groups
Command: show snmp groups
Vacm Access Table Settings
Group Name : Group3
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : NoAuthNoPriv
Group Name : Group4
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : authNoPriv
Group Name : Group5
ReadView Name : ReadView
WriteView Name : WriteView
Notify View Name : NotifyView
Security Model : SNMPv3
Security Level : authNoPriv
Group Name : initial
ReadView Name : restricted
WriteView Name :
Notify View Name : restricted
Security Model : SNMPv3
Security Level : NoAuthNoPriv
Group Name : ReadGroup
ReadView Name : CommunityView
WriteView Name :
Notify View Name : CommunityView
Security Model : SNMPv1
Security Level : NoAuthNoPriv
Total Entries: 5
DES-3028P:4#
create snmp host
Purpose Used to create a recipient of SNMP traps generated by the Switch’s
SNMP agent.
Syntax
Description The create snmp host command creates a recipient of SNMP traps
<ipaddr>− The IP address of the remote management station that will
serve as the SNMP host for the Switch.
v1 – Specifies that SNMP version 1 will be used. The Simple Network
Management Protocol (SNMP), version 1, is a network management
protocol that provides a means to monitor and control network devices.
v2c – Specifies that SNMP version 2c will be used. The SNMP v2c
supports both centralized and distributed network management
strategies. It includes improvements in the Structure of Management
Information (SMI) and adds some security features.
v3 – Specifies that the SNMP version 3 will be used. SNMP v3
provides secure access to devices through a combination of
authentication and encrypting packets over the network. SNMP v3
adds:
•
Message integrity − ensures that packets have not been
tampered with during transit.
•
Authentication − determines if an SNMP message is from a
valid source.
•
Encryption − scrambles the contents of messages to prevent
it being viewed by an unauthorized source.
noauth_nopriv
encryption of packets sent between the Switch and a remote SNMP
manager.
auth_nopriv− Specifies that authorization will be required, but there
will be no encryption of packets sent between the Switch and a remote
SNMP manager.
auth_priv − Specifies that authorization will be required, and that
packets sent between the Switch and a remote SNMP manger will be
encrypted.
•
Restrictions Only administrator-level users can issue this command.
−
Specifies that there will be no authorization and no
<auth_sting 32> − An alphanumeric string used to authorize
a remote SNMP manager to access the Switch’s SNMP
agent.
Example usage:
To create an SNMP host to receive SNMP messages:
DES-3028P:4#create snmp host 10.48.74.100 v3 auth_priv public
Command: create snmp host 10.48.74.100 v3 auth_priv public
Success.
DES-3028P:4#
delete snmp host
Purpose Used to remove a recipient of SNMP traps generated by the Switch’s
SNMP agent.
Syntax
Description The delete snmp host command deletes a recipient of SNMP traps
Parameters
Restrictions Only administrator-level users can issue this command.
delete snmp host <ipaddr>
generated by the Switch’s SNMP agent.
<ipaddr>− The IP address of a remote SNMP manager that will
receive SNMP traps generated by the Switch’s SNMP agent.
and configuration information of remote SNMP managers that are
designated as recipients of SNMP traps that are generated by the
Switch’s SNMP agent.
<ipaddr>− The IP address of a remote SNMP manager that will
receive SNMP traps generated by the Switch’s SNMP agent.
Example usage:
To create the trusted host:
create trusted_host
Purpose Used to create the trusted host.
Syntax
Description The create trusted_host command creates the trusted host. The
Parameters
Restrictions Only administrator-level users can issue this command.
create trusted_host <ipaddr>
Switch allows users to specify up to four IP addresses that are
allowed to manage the Switch via in-band SNMP or TELNET based
management software. These IP addresses must be members of the
Management VLAN. If no IP addresses are specified, then there is
nothing to prevent any IP address from accessing the Switch,
provided the user knows the Username and Password.
<ipaddr> − The IP address of the trusted host to be created.
firmware_fromTFTP− Download and install new firmware on the
Switch from a TFTP server.
cfg_fromTFTP− Download a switch configuration file from a TFTP
server.
<ipaddr> − The IP address of the TFTP server.
<path_filename> − The DOS path and filename of the firmware or
switch configuration file on the TFTP server. For example,
C:\3028.had.
image_id <int 1-2> - Specify the working section ID. The Switch can
hold two firmware versions for the user to select from, which are
specified by section ID.
increment − Allows the download of a partial switch configuration
file. This allows a file to be downloaded that will change only the
switch parameters explicitly stated in the configuration file. All other
switch parameters will remain unchanged.
Restrictions The TFTP server must be on the same IP subnet as the Switch.
Only administrator-level users can issue this command.
The download configuration command will initiate the loading of the various settings in the order listed in the configuration file.
When the file has been successfully loaded the message “End of configuration file for DES-3028P” appears followed by the
command prompt.
'*' : Boot up firmware
(SSH) : Firmware update through SSH
(WEB) : Firmware update through WEB
(SIM) : Firmware update through Single IP Management
(SNMP) : Firmware update through SNMP
(TELNET) : Firmware update through TELNET
(CONSOLE) : Firmware update through CONSOLE
DES-3028P:4#
show firmware information
show config
Purpose Used to display the current or saved version of the configuration settings of the
switch.
Syntax
Description Use this command to display all the configuration settings that are saved to NV
show config [current_config | config_in_nvram]
RAM or display the configuration settings as they are currently configured. Use the
keyboard to list settings one line at a time (Enter), one page at a time (Space) or
view all (a).
The configuration settings are listed by category in the following order:
cfg_toTFTP − Specifies that the Switch’s current settings will be
uploaded to the TFTP server.
log_toTFTP− Specifies that the switch history log will be uploaded to
the TFTP server.
<ipaddr> − The IP address of the TFTP server. The TFTP server must
be on the same IP subnet as the Switch.
<path_filename 64>− Specifies the location of the Switch
configuration file on the TFTP server. This file will be replaced by the
uploaded file from the Switch.
administrator-level users can issue this command.
enable autoconfig
Purpose Used to activate the autoconfiguration function for the Switch. This will load a
previously saved configuration file for current use.
Syntax
Description When autoconfig is enabled on the Switch, the DHCP reply will contain a
Parameters None.
Restrictions When autoconfig is enabled, the Switch becomes a DHCP client automatically
enable autoconfig
configuration file and path name. It will then request the file from the TFTP server
specified in the reply. When autoconfig is enabled, the ipif settings will
automatically become DHCP client.
(same as: config ipif System dhcp). The DHCP server must have the TFTP
server IP address and configuration file name, and be configured to deliver this
information in the data field of the DHCP reply packet. The TFTP server must be
running and have the requested configuration file in its base directory when the
request is received from the Switch. Consult the DHCP server and TFTP server
software instructions for information on loading a configuration file.
If the Switch is unable to complete the autoconfiguration process the previously
saved local configuration file present in Switch memory will be loaded.
NOTE: Dual-purpose (DHCP/TFTP) server utility software may require entry of the
configuration file name and path within the user interface. Alternatively, the DHCP software
may require creating a separate ext file with the configuration file name and path in a specific
directory on the server. Consult the documentation for the DCHP server software if users are
unsure.
When autoconfig is enabled and the Switch is rebooted, the normal login screen will appear for a few moments while the
autoconfig request (i.e. download configuration) is initiated. The console will then display the configuration parameters as they
are loaded from the configuration file specified in the DHCP or TFTP server. This is exactly the same as using a download configuration command. After the entire Switch configuration is loaded, the Switch will automatically “logout” the server. The
configuration settings will be saved automatically and become the active configuration.
Upon booting up the autoconfig process is initiated, the console screen will appear similar to the example below. The
configuration settings will be loaded in normal order.
DES-3028P Fast Ethernet Switch Command Line Interface
Firmware: Build 1.00-B22
Copyright(C) 2006-2009 D-Link Corporation. All rights reserved.
The very end of the autoconfig process appears like this:
Success.
DES-3028P:4#
DES-3028P:4## ROUTE
DES-3028P:4#
DES-3028P:4#
DES-3028P:4##------------------------------------------------------------------------------------DES-3028P:4## End of configuration file for DES-3028P
DES-3028P:4##------------------------------------------------------------------------------------DES-3028P:4#
DES-3028P:4#
NOTE: With autoconfig enabled, the Switch ipif settings now define the Switch as a DHCP client. Use the show switch command to display the new IP settings status.
DHCP server. This does not change the IP settings of the Switch. The ipif
settings will continue as DHCP client until changed with the config ipif
command.
show autoconfig
Purpose Used to display the current autoconfig status of the Switch.
Syntax
Description This command will list the current status of the autoconfiguration
Parameters None.
Restrictions None.
Example usage:
To display the autoconfig status:
DES-3028P:4#show autoconfig
Command: show autoconfig
echo messages to a remote IP address. The remote IP address will
then “echo” or return the message. This is used to confirm
connectivity between the Switch and the remote device.
times <value 1-255> - The number of individual ICMP echo
messages to be sent. A value of 0 will send an infinite ICMP echo
messages. The maximum value is 255. The default is 0.
timeout <sec 1-99> - Defines the time-out period while waiting for a
response from the remote device. A value of 1 to 99 seconds can be
specified. The default is 1 second
DES-3028P:4#show log index 1-5
Command: show log index 1-5
Index Data Time Log Text
----- ---------------------------- ------------------------------------------------------------------------------------5 00000-00-00 01:01:09 Successful login through Console (Username: Anonymous)
4 00000-00-00 00:00:14 System started up
3 00000-00-00 00:00:06 Port 1 link up, 100Mbps FULL duplex
2 00000-00-00 00:00:01 Spanning Tree Protocol is disabled
1 00000-00-00 00:06:31 Configuration saved to flash (Username: Anonymous)
DES-3028P:4#
enable syslog
Purpose Used to enable the system log to be sent to a remote host.
Example usage:
To the syslog function on the Switch:
Syntax
Description The enable syslog command enables the system log to be sent to
Parameters None.
Restrictions Only administrator-level users can issue this command.
DES-3028P:4#enable syslog
Command: enable syslog
Success.
DES-3028P:4#
enable syslog
a remote host.
disable syslog
Purpose
Syntax disable syslog
Description
Used to enable the system log to be sent to a remote host.
The disable syslog command enables the system log to be sent to a
remote host.
Example usage:
To disable the syslog function on the Switch:
Parameters
Restrictions
None.
Only administrator-level users can issue this command.
The create syslog host command is used to create a new syslog host.
<index 1-4>− Specifies that the command will be applied to an index of hosts. There are
four available indexes, numbered 1 through 4.
ipaddress <ipaddr>− Specifies the IP address of the remote host where syslog messages
will be sent.
severity − Severity level indicator. These are described in the following:
Bold font indicates that the corresponding severity level is currently supported on the
Switch.
Numerical Severity
Code
0 Emergency: system is unusable
1 Alert: action must be taken immediately
2 Critical: critical conditions
3 Error: error conditions
16 local use 0 (local0)
17 local use 1 (local1)
18 local use 2 (local2)
19 local use 3 (local3)
20 local use 4 (local4)
21 local use 5 (local5)
22 local use 6 (local6)
23 local use 7 (local7)
local0 − Specifies that local use 0 messages will be sent to the remote host. This
corresponds to number 16 from the list above.
local1− Specifies that local use 1 messages will be sent to the remote host. This
corresponds to number 17 from the list above.
local2 − Specifies that local use 2 messages will be sent to the remote host. This
corresponds to number 18 from the list above.
local3− Specifies that local use 3 messages will be sent to the remote host. This
corresponds to number 19 from the list above.
local4− Specifies that local use 4 messages will be sent to the remote host. This
corresponds to number 20 from the list above.
local5− Specifies that local use 5 messages will be sent to the remote host. This
corresponds to number 21 from the list above.
local6− Specifies that local use 6 messages will be sent to the remote host. This
corresponds to number 22 from the list above.
local7− Specifies that local use 7 messages will be sent to the remote host. This
corresponds to number 23 from the list above.
udp_port <udp_port_number>− Specifies the UDP port number that the syslog protocol will
use to send messages to the remote host.
state [enable | disable] − Allows the sending of syslog messages to the remote host,
specified above, to be enabled and disabled.
Restrictions
Example usage:
To create syslog host:
Only administrator-level users can issue this command.
DES-3028P:4#create syslog host 1 severity all facility local0
Command: create syslog host 1 severity all facility local0
The config syslog host command is used to configure the syslog protocol to send system
log information to a remote host.
<index 1-4>− Specifies that the command will be applied to an index of hosts. There are
four available indexes, numbered 1 through 4.
ipaddress <ipaddr>− Specifies the IP address of the remote host where syslog messages
will be sent.
severity− Severity level indicator. These are described in the following: Bold font indicates that the corresponding severity level is currently supported on the
Switch.
Numerical Severity
Code
0 Emergency: system is unusable
1 Alert: action must be taken immediately
2 Critical: critical conditions
3 Error: error conditions
4 Warning: warning conditions
5 Notice: normal but significant condition
6 Informational: informational messages
7 Debug: debug-level messages
informational− Specifies that informational messages will be sent to the remote host. This
corresponds to number 6 from the list above.
warning− Specifies that warning messages will be sent to the remote host. This
corresponds to number 4 from the list above.
all− Specifies that all of the currently supported syslog messages that are generated by the
Switch will be sent to the remote host.
facility − Some of the operating system daemons and processes have been assigned
Facility values. Processes and daemons that have not been explicitly assigned a Facility
may use any of the "local use" facilities or they may use the "user-level" Facility. Those
Facilities that have been designated are shown in the following: Bold font indicates the
facility values the Switch currently supports.
16 local use 0 (local0)
17 local use 1 (local1)
18 local use 2 (local2)
19 local use 3 (local3)
20 local use 4 (local4)
21 local use 5 (local5)
22 local use 6 (local6)
23 local use 7 (local7)
Parameters
local0 − Specifies that local use 0 messages will be sent to the remote host. This
corresponds to number 16 from the list above.
local1− Specifies that local use 1 messages will be sent to the remote host. This
corresponds to number 17 from the list above.
local2 − Specifies that local use 2 messages will be sent to the remote host. This
corresponds to number 18 from the list above.
local3 − Specifies that local use 3 messages will be sent to the remote host. This
corresponds to number 19 from the list above.
local4− Specifies that local use 4 messages will be sent to the remote host. This
corresponds to number 20 from the list above.
local5 − Specifies that local use 5 messages will be sent to the remote host. This
corresponds to number 21 from the list above.
local6− Specifies that local use 6 messages will be sent to the remote host. This
corresponds to number 22 from the list above.
local7− Specifies that local use 7 messages will be sent to the remote host. This
corresponds to number 23 from the list above.
udp_port <udp_port_number> − Specifies the UDP port number that the syslog protocol will
use to send messages to the remote host.
state [enable | disable] − Allows the sending of syslog messages to the remote host,
specified above, to be enabled and disabled.
Restrictions
Example usage:
To configure a Syslog host:
Only administrator-level users can issue this command.
This Switch supports three versions of the Spanning Tree Protocol; 802.1d STP, 802.1w Rapid STP and 802.1s MSTP. Multiple
Spanning Tree Protocol, or MSTP, is a standard defined by the IEEE community that allows multiple VLANs to be mapped to a
single spanning tree instance, which will provide multiple pathways across the network. Therefore, these MSTP configurations
will balance the traffic load, preventing wide scale disruptions when a single spanning tree instance fails. This will allow for faster
convergences of new topologies for the failed instance. Frames designated for these VLANs will be processed quickly and
completely throughout interconnected bridges utilizing either of the three spanning tree protocols (STP, RSTP or MSTP). This
protocol will also tag BDPU packets so receiving devices can distinguish spanning tree instances, spanning tree regions and the
VLANs associated with them. These instances will be classified by an instance_id. MSTP will connect multiple spanning trees
with a Common and Internal Spanning Tree (CIST). The CIST will automatically determine each MSTP region, its maximum
possible extent and will appear as one virtual bridge that runs a single spanning tree. Consequentially, frames assigned to different
VLANs will follow different data routes within administratively established regions on the network, continuing to allow simple
and full processing of frames, regardless of administrative errors in defining VLANs and their respective spanning trees. Each
switch utilizing the MSTP on a network will have a single MSTP configuration that will have the following three attributes:
a) A configuration name defined by an alphanumeric string of up to 32 characters (defined in the config stp mst_config_id
command as name <string>).
b) A configuration revision number (named here as a revision_level) and;
c) A 4094 element table (defined here as a vid_range) which will associate each of the possible 4094 VLANs supported by
the Switch for a given instance.
To utilize the MSTP function on the Switch, three steps need to be taken:
a) The Switch must be set to the MSTP setting (config stp version)
b) The correct spanning tree priority for the MSTP instance must be entered (config stp priority).
c) VLANs that will be shared must be added to the MSTP Instance ID (config stp instance_id).
The Multiple Spanning Tree Protocol commands in the Command Line Interface (CLI) are listed (along with the appropriate
parameters) in the following table.
This command is used to setup the Spanning Tree Protocol (STP) for the
entire Switch. All commands here will be implemented for the STP
version that is currently set on the Switch.
Parameters
maxage <value 6-40>− This value may be set to ensure that old
information does not endlessly circulate through redundant paths in the
network, preventing the effective propagation of the new information. Set
by the Root Bridge, this value will aid in determining that the Switch has
spanning tree configuration values consistent with other devices on the
bridged LAN. If the value ages out and a BPDU has still not been
received from the Root Bridge, the Switch will start sending its own BPDU
to all other switches for permission to become the Root Bridge. If it turns
out that your switch has the lowest Bridge Identifier, it will become the
Root Bridge. The user may choose a time between 6 and 40 seconds.
The default value is 20.
maxhops <value 1-20> - The number of hops between devices in a
spanning tree region before the BPDU (bridge protocol data unit) packet
sent by the Switch will be discarded. Each switch on the hop count will
reduce the hop count by one until the value reaches zero. The Switch will
then discard the BDPU packet and the information held for the port will
age out. The user may set a hop count from 1 to 20. The default is 20.
hellotime <value 1-10>− The user may set the time interval between
transmission of configuration messages by the root device, thus stating
that the Switch is still functioning. A time between 1 and 10 seconds may
be chosen, with a default setting of 2 seconds.
NOTE:
and therefore, the hellotime must be set using the
configure stp ports command for switches utilizing the
Multiple Spanning Tree Protocol.
In MSTP, the spanning tree is configured by port
forwarddelay <value 4-30>− The maximum amount of time (in seconds)
that the root device will wait before changing states. The user may
choose a time between 4 and 30 seconds. The default is 15 seconds.
txholdcount <1-10> - The maximum number of BPDU Hello packets
transmitted per interval. Default value = 3.
fbpdu [enable | disable] − Allows the forwarding of STP BPDU packets
from other network devices when STP is disabled on the Switch. The
default is enable.
lbd [enable | disable] – Enabling this feature temporarily block STP on the
Switch when a BPDU packet has been looped back to the switch. When
the Switch detects its own BPDU packet coming back, it signifies a loop
on the network. STP will automatically be blocked and an alert will be
sent to the administrator. The LBD STP port will restart (change to
discarding state) when the LBD Recover Time times out. The default is
enabled.
lbd_recover_timer [0 | <value 60-1000000>] - This field will set the time
the STP port will wait before recovering the STP state set. 0 will denote
that the LBD will never time out or restart until the administrator
personally changes it. The user may also set a time between 60 and
1000000 seconds. The default is 60 seconds.
Restrictions
Example usage:
To configure STP with maxage 18 and maxhops of 15:
This command is used to create and configure STP for a group of ports.
<portlist> − Specifies a range of ports to be configured.
externalCost − This defines a metric that indicates the relative cost of forwarding
packets to the specified port list. Port cost can be set automatically or as a metric
value. The default value is auto.
1. auto – Setting this parameter for the external cost will automatically set the
speed for forwarding packets to the specified port(s) in the list for optimal
efficiency. Default port cost: 100Mbps port = 200000. Gigabit port = 20000.
2. <value 1-200000000> - Define a value between 1 and 200000000 to
determine the external cost. The lower the number, the greater the
probability the port will be chosen to forward packets.
hellotime <value 1-10>− The time interval between transmission of configuration
messages by the designated port, to other devices on the bridged LAN, thus
stating that the Switch is still functioning. The user may choose a time between 1
and 10 seconds. The default is 2 seconds.
migrate [yes | no] – Setting this parameter as “yes” will set the ports to send out
BDPU packets to other bridges, requesting information on their STP setting If the
Switch is configured for RSTP, the port will be capable to migrate from 802.1d STP
to 802.1w RSTP. If the Switch is configured for MSTP, the port is capable of
migrating from 802.1d STP to 802.1s MSTP. RSTP and MSTP can coexist with
standard STP, however the benefits of RSTP and MSTP are not realized on a port
where an 802.1d network connects to an 802.1w or 802.1s enabled network.
Migration should be set as yes on ports connected to network stations or segments
that are capable of being upgraded to 802.1w RSTP or 802.1s MSTP on all or
some portion of the segment.
edge [true | false] – true designates the port as an edge port. Edge ports cannot
create loops, however an edge port can lose edge port status if a topology change
creates a potential for a loop. An edge port normally should not receive BPDU
packets. If a BPDU packet is received it automatically loses edge port status. false
indicates that the port does not have edge port status.
p2p [true | false | auto] – true indicates a point-to-point (P2P) shared link. P2P
ports are similar to edge ports however they are restricted in that a P2P port must
operate in full-duplex. Like edge ports, P2P ports transition to a forwarding state
rapidly thus benefiting from RSTP. A p2p value of false indicates that the port
cannot have p2p status. Auto allows the port to have p2p status whenever possible
and operate as if the p2p status were true. If the port cannot maintain this status
(for example if the port is forced to half-duplex operation) the p2p status changes
to operate as if the p2p value were false. The default setting for this parameter is
auto.
state [enable | disable] − Allows STP to be enabled or disabled for the ports
specified in the port list. The default is enable.
lbd [enable | disable] - Used to enable or disable the loop-back detection function on the switch for the ports configured above in the config stp command.
fbpdu [enable | disable] − When enabled, this allows the forwarding of STP BPDU
packets from other network devices when STP is disabled in the specified ports. If
users want to enable Forwarding BPDU on a per port basis, the following settings
must first be in effect: 1. STP must be globally disabled and 2. Forwarding BPDU
must be globally enabled. To globally disable STP, use the disable stp command,
to globally enable fbpdu, use the config stp command. The default is disable.
Restrictions
Only administrator-level users can issue this command.
This command allows the user to create a STP instance ID for the
Multiple Spanning Tree Protocol. There are 5 STP instances on
the Switch (one internal CIST, unchangeable) and the user may
create up to 4 instance IDs for the Switch.
<value 1-4> - Enter a value between 1 and 4 to identify the
Spanning Tree instance on the Switch.
Only administrator-level users can issue this command.
config stp instance_id
Purpose Used to add or delete an STP instance ID.
Syntax
Description This command is used to map VIDs (VLAN IDs) to previously configured
Parameters <value 1-4> - Enter a number between 1 and 4 to define the
STP instances on the Switch by creating an instance_id. A STP
instance may have multiple members with the same MSTP
configuration. There is no limit to the number of STP regions in a
network but each region only supports a maximum of 5 spanning tree
instances (one unchangeable default entry). VIDs can belong to only
ne spanning tree instance at a time. o
NOTE:
having the same STP instance_id must be mapped
identically, and have the same configuration
revision_level number and the same name.
instance_id. The Switch supports 5 STP regions with one unchangeable default instance ID set as 0.
add_vlan – Along with the vid_range <vidlist> parameter, this command
will add VIDs to the previously configured STP instance_id.
settings on the Switch. The MSTP will utilize the priority in selecting
the root bridge, root port and designated port. Assigning higher
priorities to STP regions will instruct the Switch to give precedence to
the selected instance_id for forwarding packets. The lower the
priority value set, the higher the priority.
specify the priority for a specified instance ID for forwarding packets.
The lower the value, the higher the priority. This entry must be
divisible by 4096.
instance_id <value 0-4> - Enter the value corresponding to the
previously configured instance ID of which the user wishes to set the
priority value. An instance id of 0 denotes the default instance_id
(CIST) internally set on the Switch.
config stp mst_config_id
Purpose Used to update the MSTP configuration identification.
Syntax
Description This command will uniquely identify the MSTP configuration
Parameters revision_level <int 0-65535>– Enter a number between 0 and
Restrictions Only administrator-level users can issue this command.
Example usage:
To configure the MSTP region of the Switch with revision_level 10 and the name “Trinity”:
config stp mst_config_id {revision_level <int 0-65535> | name
<string 32>}
currently configured on the Switch. Information entered here will
be attached to BPDU packets as an identifier for the MSTP region
to which it belongs. Switches having the same revision_level and name will be considered as part of the same MSTP region.
65535 to identify the MSTP region. This value, along with the
name will identify the MSTP region configured on the Switch. The
default setting is 0.
name <string> - Enter an alphanumeric string of up to 32
characters to uniquely identify the MSTP region on the Switch.
This name, along with the revision_level value will identify the
MSTP region configured on the Switch. If no name is entered, the
default name will be the MAC address of the device.
If a loop occurs, the MSTP function will use the port priority to select an
interface to put into the forwarding state. Set a higher priority value for
interfaces to be selected for forwarding first. In instances where the
priority value is identical, the MSTP function will implement the lowest
MAC address into the forwarding state and other interfaces will be
blocked. Remember that lower priority values mean higher priorities for
forwarding packets.
instance_id <value 0-4> - Enter a numerical value between 0 and 4 to
identify the instance_id previously configured on the Switch. An entry of
0 will denote the CIST (Common and Internal Spanning Tree).
internalCost – This parameter is set to represent the relative cost of
forwarding packets to specified ports when an interface is selected
within a STP instance. The default setting is auto. There are two
options:
• • auto – Selecting this parameter for the internalCost will set
quickest route automatically and optimally for an interface.
The default value is derived from the media speed of the
interface.
value 1-2000000 – Selecting this parameter with a value in
the range of 1-2000000 will set the quickest route when a
loop occurs. A lower internalCost represents a quicker
transmission.
priority <value 0-240> - Enter a value between 0 and 240 to set the
priority for the port interface. A higher priority will designate the
interface to forward packets first. A lower number denotes a higher
priority.
Restrictions Only administrator-level users can issue this command.
Example usage:
To designate ports 1 through 5, with instance id 2, to have an auto internalCost and a priority of 16:
Purpose Used to display the Switch’s current STP configuration.
Syntax
Description This command displays the Switch’s current STP configuration.
Parameters None
Restrictions None.
DES-3028P:4#show stp
Command: show stp
STP Status : Enabled
STP Version : STP Compatible
Max Age : 20
Hello Time : 2
Forward Delay : 15
Max Age : 20
TX Hold Count : 3
Forwarding BPDU : Enabled
Loopback Detection : Enabled
LBD Recover Time : 60
DES-3028P:4#
show stp
Status 2 : STP enabled for RSTP
DES-3028P:4#show stp
Command: show stp
STP Status : Enabled
STP Version : RSTP
Max Age : 20
Hello Time : 2
Forward Delay : 15
Max Age : 20
TX Hold Count : 3
Forwarding BPDU : Enabled
Loopback Detection : Enabled
LBD Recover Time : 60
DES-3028P:4#
Status 3 : STP enabled for MSTP
DES-3028P:4#show stp
Command: show stp
STP Status : Enabled
STP Version : MSTP
Max Age : 20
Forward Delay : 15
Max Age : 20
TX Hold Count : 3
Forwarding BPDU : Enabled
Loopback Detection : Enabled
LBD Recover Time : 60
Purpose Used to display the Switch’s current STP ports configuration.
Syntax
Description This command displays the STP ports settings for a specified port or
Parameters
Restrictions None.
Example usage:
To show STP ports information for port 5 (STP enabled on Switch):
DES-3028P:4#show stp ports
Command: show stp ports
MSTP Port Information
---------------------Port Index : 5 , Hello Time: 2 /2 , Port STP Enabled LBD : No
External PathCost : Auto/200000 , Edge Port : No /No , P2P : Auto /Yes
Port Forward BPDU Disabled
Msti Designated Bridge Internal PathCost Prio Status Role
CTRL+C ESC q Quit SPACE n Next Page p Previous Page r Refresh
show stp ports <portlist>
group of ports (one port at a time).
<portlist>− Specifies a port or range of ports to be viewed. Information
for a single port is displayed. If no ports are specified the STP
information for port 1 will be displayed. Users may use the Space bar,
p and n keys to view information for the remaining ports.
show stp instance_id
Purpose Used to display the Switch’s STP instance configuration
Syntax
Description This command displays the Switch’s current STP Instance
Parameters <value 0-4> - Enter a value defining the previously configured
Restrictions None
Example usage:
To display the STP instance configuration for instance 0 (the internal CIST) on the Switch:
show stp instance_id <value 0-4>
Settings and the STP Instance Operational Status.
instance_id on the Switch. An entry of 0 will display the STP
configuration for the CIST internally set on the Switch.
The layer 2 forwarding database commands in the Command Line Interface (CLI) are listed (along with the appropriate
parameters) in the following table.
Syntax create fdb <vlan_name 32> <macaddr> port <port>
Description
Parameters
Restrictions
Used to create a static entry to the unicast MAC address forwarding
table (database).
This command will make an entry into the Switch’s unicast MAC
address forwarding database.
<vlan_name 32> − The name of the VLAN on which the MAC
address resides.
<macaddr>− The MAC address that will be added to the forwarding
table.
port <port>− The port number corresponding to the MAC destination
address. The Switch will always forward traffic to the specified
device through this port.
Only administrator-level users can issue this command.
Example usage:
To create a unicast MAC FDB entry:
DES-3028P:4#create fdb default 00-00-00-00-01-02 port 5
Command: create fdb default 00-00-00-00-01-02 port 5
forwarding table entries, which are made up of the source MAC
addresses and their associated port numbers, are deleted from the
table if they are not accessed within the aging time. The aging time
can be from 10 to 1000000 seconds with a default value of 300
seconds. A very long aging time can result in dynamic forwarding
table entries that are out-of-date or no longer exist. This may cause
incorrect packet forwarding decisions by the Switch. If the aging time
is too short however, many entries may be aged out too soon. This
will result in a high percentage of received packets whose source
addresses cannot be found in the forwarding table, in which case the
Switch will broadcast the packet to all ports, negating many of the
benefits of having a switch.
<sec 10-1000000> − The aging time for the MAC address forwarding
database value. The value in seconds may be between 10 and
1000000 seconds.
Example usage:
To delete a permanent FDB entry:
delete fdb
Purpose Used to delete an entry to the Switch’s forwarding database.
Syntax
Description This command is used to delete a previous entry to the Switch’s
Parameters
Restrictions Only administrator-level users can issue this command.
Purpose Used to clear the Switch’s forwarding database of all dynamically
learned MAC addresses.
Example usage:
To clear all FDB dynamic entries:
Syntax
Description This command is used to clear dynamically learned entries to the
Parameters
Restrictions Only administrator-level users can issue this command.
DES-3028P:4#clear fdb all
Command: clear fdb all
Success.
DES-3028P:4#
clear fdb [vlan <vlan_name 32> | port <port> | all]
Switch’s forwarding database.
<vlan_name 32>− The name of the VLAN on which the MAC
address resides.
port <port> − The port number corresponding to the MAC
destination address. The Switch will always forward traffic to the
specified device through this port.
all − Clears all dynamic entries to the Switch’s forwarding database.
Example usage:
To display multicast MAC address table:
show multicast_fdb
Purpose Used to display the contents of the Switch’s multicast forwarding
database.
Syntax
Description This command is used to display the current contents of the
Parameters
Restrictions None.
show mulitcast_fdb [vlan <vlan_name 32> | mac_address
<macaddr>]
Switch’s multicast MAC address forwarding database.
<vlan_name 32>− The name of the VLAN on which the MAC
address resides.
<macaddr>− The MAC address that is present in the forwarding
database table.
This command will display the current contents of the Switch’s
forwarding database.
port <port>− The port number corresponding to the MAC destination
address. The Switch will always forward traffic to the specified device
through this port.
<vlan_name 32> − The name of the VLAN on which the MAC address
resides.
<macaddr> − The MAC address that is present in the forwarding
database table.
static − Displays the static MAC address entries.
aging_time − Displays the aging time for the MAC address forwarding
On a computer network, packets such as Multicast packets and Broadcast packets continually flood the network as normal
procedure. At times, this traffic may increase do to a malicious endstation on the network or a malfunctioning device, such as a
faulty network card. Thus, switch throughput problems will arise and consequently affect the overall performance of the switch
network. To help rectify this packet storm, the Switch will monitor and control the situation.
The packet storm is monitored to determine if too many packets are flooding the network, based on the threshold level provided
by the user. Once a packet storm has been detected, the Switch will drop packets coming into the Switch until the storm has
subsided. This method can be utilized by selecting the Drop option of the Action field in the window below. The Switch will also
scan and monitor packets coming into the Switch by monitoring the Switch’s chip counter. This method is only viable for
Broadcast and Multicast storms because the chip only has counters for these two types of packets. Once a storm has been detected
(that is, once the packet threshold set below has been exceeded), the Switch will shutdown the port to all incoming traffic with the
exception of STP BPDU packets, for a time period specified using the CountDown field. If this field times out and the packet
storm continues, the port will be placed in a Shutdown Forever mode which will produce a warning message to be sent to the Trap
Receiver. Once in Shutdown Forever mode, the only method of recovering this port is to manually recoup it using the Port Configuration window in the Administration folder and selecting the disabled port and returning it to an Enabled status. To
utilize this method of Storm Control, choose the Shutdown option of the Action field in the window below.
The broadcast storm control commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in
the following table.
By adding the new software traffic control mechanism, the user can now
use both a hardware and software mechanism, the latter of which will now
provide shutdown, recovery and trap notification functions for the Switch.
Parameters
<portlist> − Used to specify a range of ports to be configured for traffic
control.
all − Specifies all ports are to be configured for traffic control on the
Switch.
broadcast [enable | disable]− Enables or disables broadcast storm
control.
the Switch’s hardware will determine the Packet Storm based on
the Threshold value stated and drop packets until the issue is
resolved.
shutdown - Utilizes the Switch’s software Traffic Control mechanism
to determine the Packet Storm occurring. Once detected, the
port will deny all incoming traffic to the port except STP BPDU
packets, which are essential in keeping the Spanning Tree
operational on the Switch. If the countdown timer has expired
and yet the Packet Storm continues, the port will be placed in
Shutdown Forever mode and is no longer operational until the
user manually resets the port using the config ports enable
command. Choosing this option obligates the user to configure
the time_interval field as well, which will provide packet count
samplings from the Switch’s chip to determine if a Packet Storm
is occurring.
threshold <value 64-1000000> − The upper threshold at which the
specified traffic control is switched on. The <value> is the number of
broadcast/multicast/dlf packets, in Kbits per second (Kbit/sec), received by
the Switch that will trigger the storm traffic control measures. The default
setting is 64 Kbit/sec.
time_interval - The Interval will set the time between Multicast and
Broadcast packet counts sent from the Switch’s chip to the Traffic Control
function. These packet counts are the determining factor in deciding when
incoming packets exceed the Threshold value.
sec 5-30 - The Interval may be set between 5 and 30 seconds with the
default setting of 5 seconds.
countdown - The countdown timer is set to determine the amount of time,
in minutes, that the Switch will wait before shutting down the port that is
experiencing a traffic storm. This parameter is only useful for ports
configured as shutdown in the action field of this command and therefore
will not operate for Hardware based Traffic Control implementations.
• • minutes 0 - 0 is the default setting for this field and 0 will denote
that the port will never shutdown.
minutes 5-30 – Select a time from 5 to 30 minutes that the
Switch will wait before shutting down. Once this time expires
and the port is still experiencing packet storms, the port will be
placed in shutdown forever mode and can only be manually
recovered using the config ports command mentioned
previously in this manual.
Restrictions User Account Command Level – Administrator and Operator
Example usage:
To configure traffic control and enable broadcast storm control for ports 1-12:
will be used when a packet storm is detected by the Switch. This function
can only be used for the software traffic storm control mechanism (when
the action field in the config traffic control command is set as
shutdown).
control is detected by the Switch.
storm _occurred – A notification will be generated and sent when a
packet storm has been detected by the Switch.
storm_cleared - A notification will be generated and sent when a packet
storm has been cleared by the Switch.
both - A notification will be generated and sent when a packet storm has
The DES-3028/28P/52/52P supports 802.1p priority queuing. The Switch has four priority queues. These priority queues are
numbered from 3 (Class 3) — the highest priority queue — to 0 (Class 0) — the lowest priority queue. The eight priority tags
specified in IEEE 802.1p (p0 to p7) are mapped to the Switch’s priority queues as follows:
• Priority 0 is assigned to the Switch’s Q1 queue.
• Priority 1 is assigned to the Switch’s Q0 queue.
• Priority 2 is assigned to the Switch’s Q0 queue.
• Priority 3 is assigned to the Switch’s Q1 queue.
• Priority 4 is assigned to the Switch’s Q2 queue.
• Priority 5 is assigned to the Switch’s Q2 queue.
• Priority 6 is assigned to the Switch’s Q3 queue.
• Priority 7 is assigned to the Switch’s Q3 queue.
Priority scheduling is implemented by the priority queues stated above. The Switch will empty the four hardware priority queues
in order, beginning with the highest priority queue, 3, to the lowest priority queue, 0. Each hardware queue will transmit all of the
packets in its buffer before permitting the next lower priority to transmit its packets. When the lowest hardware priority queue has
finished transmitting all of its packets, the highest hardware priority queue will begin transmitting any packets it may have
received.
The commands in the Command Line Interface (CLI) are listed (along with the appropriate parameters) in the following table.
must be mapped to one of these four queues. This command is used to
specify the rotation by which these four hardware priority queues are
emptied.
The Switch’s default (if the config scheduling command is not used) is
to empty the four hardware priority queues in order − from the highest
priority queue (hardware queue 3) to the lowest priority queue
(hardware queue 0). Each hardware queue will transmit all of the
packets in its buffer before allowing the next lower priority queue to
transmit its packets. When the lowest hardware priority queue has
finished transmitting all of its packets, the highest hardware priority
queue can again transmit any packets it may have received.
weight <value 1-55> − Specifies the weights for weighted fiar queueing.
A value between 1 and 55 can be specified.
<class_id 0-3> − This specifies which of the four hardware priority
queues the config scheduling command will apply to. The four
hardware priority queues are identified by number − from 0 to 3 − with
the 0 queue being the lowest priority.
between a weight fair and a Strict mechanism for emptying the priority
classes of service of the QoS function. The Switch contains seven
hardware priority classes of service. Incoming packets must be mapped
to one of these seven hardware priority classes of service. This
command is used to specify the rotation by which these seven hardware
priority classes of service are emptied.
The Switch’s default is to empty the seven priority classes of service in
order − from the highest priority class of service (queue 6) to the lowest
priority class of service (queue 0). Each queue will transmit all of the
packets in its buffer before allowing the next lower priority class of
service to transmit its packets. Lower classes of service will be preempted from emptying its queue if a packet is received on a higher class
of service. The packet that was received on the higher class of service
will transmit its packet before allowing the lower class to resume clearing
its queue.
service is the first to be processed. That is, the highest class of service
should finish emptying before the others begin.
weight_fair – Entering the weight fair parameter indicates that the priority
classes of service will empty packets in a fair weighted order. That is to
say that they will be emptied in an even distribution.
Restrictions Only administrator-level users can issue this command.
Example usage:
To configure the traffic scheduling mechanism for each QoS queue: