Canadian EMI Notice
This Class A digital apparatus meets all the requirements of the Canadian
Interference-Causing Equipment Regulations.
Cet appareil numerique de la classe A respecte toutes les exigences du Reglement sur le
materiel brouilleur du Canada.
European Notice
Products with the CE Marking comply with both the EMC Directive (89/336/EEC) and the
Low Voltage Directive (73/23/EEC) issued by the Commission of the European Community
Compliance with these directives imply conformity to the following European Norms:
EN55022 (CISPR 22) - Radio Frequency Interference
EN61000-X - Electromagnetic Immunity
EN60950-1 - Product Safety
MiLAN Technology warrants to the original consumer or purchaser that each of it's
products, and all components thereof, will be free from defects in material and/or
workmanship for a period of five years from the original factory shipment date. Any
warranty hereunder is extended to the original consumer or purchaser and is not
assignable.
MiLAN Technology makes no express or implied warranties including, but not limited to,
any implied warranty of merchantability or fitness for a particular purpose, except as
expressly set forth in this warranty. In no event shall MiLAN Technology be liable for
incidental or consequential damages, costs, or expenses arising out of or in connection
with the performance of the product delivered hereunder. MiLAN Technology will in no
case cover damages arising out of the product being used in a negligent fashion or
manner.
Trademarks
The MiLAN logo and MiLAN Technology trademarks are registered trademarks of
MiLAN Technology in the United States and/or other countries.
To Contact MiLAN Technology
For prompt response when calling for service information, have the following information
ready:
- Product serial number and revision
- Date of purchase
- Vendor or place of purchase
Five-Year Limited Warranty
i
You can reach MiLAN Technology technical support at:
E-mail: support@milan.com
Telephone: +1.408.744.2751
Fax: +1.408.744.2771
MiLAN Technology
1329 Moffett Park Drive
Sunnyvale, CA 94089
United States of America
Telephone: +1.408.744.2775
Fax: +1.408.744.2793
Using the Web Interface 3-1
Navigating the Web Browser Interface 3-2
Home Page 3-2
Configuration Options 3-3
Panel Display 3-3
Main Menu 3-4
Basic Configuration 3-9
Displaying System Information 3-9
Displaying Switch Hardware/Software Versions 3-10
Displaying Bridge Extension Capabilities 3-11
Setting the Switch’s IP Address 3-13
Manual Configuration 3-14
Using DHCP/BOOTP 3-15
Managing Firmware 3-16
Downloading System Software from a Server 3-16
Saving or Restoring Configuration Settings 3-17
Downloading Configuration Settings from a Server 3-18
Replacing the Default Secure-site Certificate 3-35
Configuring the Secure Shell 3-36
Generating the Host Key Pair 3-38
Configuring the SSH Server 3-40
Configuring Port Security 3-41
Configuring 802.1X Port Authentication 3-43
Displaying 802.1X Global Settings 3-44
Configuring 802.1X Global Settings 3-46
Configuring Port Authorization Mode 3-47
Displaying 802.1X Statistics 3-48
Filtering IP Addresses for Management Access 3-50
Access Control Lists 3-52
Configuring Access Control Lists 3-52
Setting the ACL Name and Type 3-53
Configuring a Standard IP ACL 3-53
Configuring an Extended IP ACL 3-54
Configuring a MAC ACL 3-57
Configuring ACL Masks 3-59
Specifying the Mask Type 3-59
Configuring an IP ACL Mask 3-60
Configuring a MAC ACL Mask 3-62
Binding a Port to an Access Control List 3-63
Port Configuration 3-64
Displaying Connection Status 3-64
Configuring Interface Connections 3-67
Creating Trunk Groups 3-69
Statically Configuring a Trunk 3-70
Enabling LACP on Selected Ports 3-71
Configuring LACP Parameters 3-73
Displaying LACP Port Counters 3-76
iv
Contents
Displaying LACP Settings and Status for the Local Side 3-77
Displaying LACP Settings and Status for the Remote Side 3-79
Setting Broadcast Storm Thresholds 3-80
Configuring Port Mirroring 3-82
Configuring Rate Limits 3-83
Showing Port Statistics 3-84
Address Table Settings 3-88
Setting Static Addresses 3-88
Displaying the Address Table 3-89
Changing the Aging Time 3-91
Spanning Tree Algorithm Configuration 3-91
Displaying Global Settings 3-92
Configuring Global Settings 3-96
Displaying Interface Settings 3-100
Configuring Interface Settings 3-103
Configuring Multiple Spanning Trees 3-105
Displaying Interface Settings for MSTP 3-108
Configuring Interface Settings for MSTP 3-109
VLAN Configuration 3-111
IEEE 802.1Q VLANs 3-111
Enabling or Disabling GVRP (Global Setting) 3-114
Displaying Basic VLAN Information 3-114
Displaying Current VLANs 3-115
Creating VLANs 3-116
Adding Static Members to VLANs (VLAN Index) 3-117
Adding Static Members to VLANs (Port Index) 3-119
Configuring VLAN Behavior for Interfaces 3-119
Configuring Private VLANs 3-122
Enabling Private VLANs 3-122
Configuring Uplink and Downlink Ports 3-123
Configuring Protocol-Based VLANs 3-123
Configuring Protocol Groups 3-124
Mapping Protocols to VLANs 3-124
Class of Service Configuration 3-126
Layer 2 Queue Settings 3-126
Setting the Default Priority for Interfaces 3-126
Mapping CoS Values to Egress Queues 3-128
Selecting the Queue Mode 3-129
Setting the Service Weight for Traffic Classes 3-130
Layer 3/4 Priority Settings 3-132
Mapping Layer 3/4 Priorities to CoS Values 3-132
Selecting IP Precedence/DSCP Priority 3-132
Mapping IP Precedence 3-133
Mapping DSCP Priority 3-134
Mapping IP Port Priority 3-136
v
Contents
Mapping CoS Values to ACLs 3-137
Changing Priorities Based on ACL Rules 3-138
Multicast Filtering 3-140
Layer 2 IGMP (Snooping and Query) 3-140
Configuring IGMP Snooping and Query Parameters 3-141
Displaying Interfaces Attached to a Multicast Router 3-143
Specifying Static Interfaces for a Multicast Router 3-143
Displaying Port Members of Multicast Services 3-144
Assigning Ports to Multicast Services 3-145
Configuring Domain Name Service 3-146
Configuring General DNS Server Parameters 3-147
Configuring Static DNS Host to Address Entries 3-149
Displaying the DNS Cache 3-151
Chapter 4: Command Line Interface 4-1
Using the Command Line Interface 4-1
Accessing the CLI 4-1
Console Connection 4-1
Telnet Connection 4-1
Entering Commands 4-3
Keywords and Arguments 4-3
Minimum Abbreviation 4-3
Command Completion 4-3
Getting Help on Commands 4-3
Showing Commands 4-4
Partial Keyword Lookup 4-5
Negating the Effect of Commands 4-5
Using Command History 4-5
Understanding Command Modes 4-6
Exec Commands 4-6
Configuration Commands 4-7
Command Line Processing 4-9
enable 4-20
disable 4-21
configure 4-21
show history 4-22
reload 4-22
end 4-23
exit 4-23
quit 4-24
System Management Commands 4-24
Device Designation Commands 4-25
prompt 4-25
hostname 4-25
User Access Commands 4-26
username 4-26
enable password 4-27
IP Filter Commands 4-28
management 4-28
show management 4-29
Web Server Commands 4-30
ip http port 4-30
ip http server 4-30
ip http secure-server 4-31
ip http secure-port 4-32
Telnet Server Commands 4-33
ip telnet port 4-33
ip telnet server 4-33
Secure Shell Commands 4-34
ip ssh server 4-36
ip ssh timeout 4-37
ip ssh authentication-retries 4-37
ip ssh server-key size 4-38
delete public-key 4-38
ip ssh crypto host-key generate 4-39
ip ssh crypto zeroize 4-39
ip ssh save host-key 4-40
show ip ssh 4-40
show ssh 4-41
show public-key 4-42
Event Logging Commands 4-43
logging on 4-43
logging history 4-44
logging host 4-45
vii
Contents
logging facility 4-45
logging trap 4-46
clear logging 4-46
show logging 4-47
SMTP Alert Commands 4-48
logging sendmail host 4-49
logging sendmail level 4-49
logging sendmail source-email 4-50
logging sendmail destination-email 4-50
logging sendmail 4-51
show logging sendmail 4-51
Time Commands 4-52
sntp client 4-52
sntp server 4-53
sntp poll 4-54
show sntp 4-54
clock timezone 4-55
calendar set 4-55
show calendar 4-56
System Status Commands 4-57
show startup-config 4-57
show running-config 4-58
show system 4-60
show users 4-61
show version 4-61
Frame Size Commands 4-62
jumbo frame 4-62
Flash/File Commands 4-63
copy 4-63
delete 4-65
dir 4-66
whichboot 4-67
boot system 4-67
Authentication Commands 4-68
Authentication Sequence 4-69
authentication login 4-69
authentication enable 4-70
RADIUS Client 4-71
radius-server host 4-71
radius-server port 4-71
radius-server key 4-72
radius-server retransmit 4-72
radius-server timeout 4-73
show radius-server 4-73
viii
Contents
TACACS+ Client 4-74
tacacs-server host 4-74
tacacs-server port 4-74
tacacs-server key 4-75
show tacacs-server 4-75
access-list ip 4-88
permit, deny (Standard ACL) 4-89
permit, deny (Extended ACL) 4-90
show ip access-list 4-92
access-list ip mask-precedence 4-92
mask (IP ACL) 4-93
show access-list ip mask-precedence 4-96
ip access-group 4-97
show ip access-group 4-97
map access-list ip 4-98
show map access-list ip 4-99
match access-list ip 4-99
show marking 4-100
MAC ACLs 4-101
access-list mac 4-101
permit, deny (MAC ACL) 4-102
show mac access-list 4-103
access-list mac mask-precedence 4-104
mask (MAC ACL) 4-105
show access-list mac mask-precedence 4-107
mac access-group 4-107
show mac access-group 4-108
map access-list mac 4-108
ix
Contents
show map access-list mac 4-109
match access-list mac 4-110
ACL Information 4-111
show access-list 4-111
show access-group 4-111
SNMP Commands 4-112
snmp-server community 4-112
snmp-server contact 4-113
snmp-server location 4-113
snmp-server host 4-114
snmp-server enable traps 4-115
show snmp 4-115
DNS Commands 4-117
ip host 4-117
clear host 4-118
ip domain-name 4-118
ip domain-list 4-119
ip name-server 4-120
ip domain-lookup 4-121
show hosts 4-122
show dns 4-123
show dns cache 4-123
clear dns cache 4-124
Interface Commands 4-125
interface 4-125
description 4-126
speed-duplex 4-126
negotiation 4-127
capabilities 4-128
flowcontrol 4-129
combo-forced-mode 4-130
shutdown 4-130
switchport broadcast packet-rate 4-131
clear counters 4-132
show interfaces status 4-133
show interfaces counters 4-134
show interfaces switchport 4-135
protocol-vlan protocol-group (Configuring Groups) 4-183
protocol-vlan protocol-group (Configuring Interfaces) 4-183
show protocol-vlan protocol-group 4-184
show interfaces protocol-vlan protocol-group 4-185
GVRP and Bridge Extension Commands 4-186
bridge-ext gvrp 4-186
show bridge-ext 4-187
switchport gvrp 4-187
show gvrp configuration 4-188
garp timer 4-188
show garp timer 4-189
Priority Commands 4-190
Priority Commands (Layer 2) 4-190
queue mode 4-191
switchport priority default 4-192
queue bandwidth 4-193
queue cos-map 4-193
show queue mode 4-194
show queue bandwidth 4-195
show queue cos-map 4-195
Priority Commands (Layer 3 and 4) 4-196
map ip port (Global Configuration) 4-196
map ip port (Interface Configuration) 4-197
map ip precedence (Global Configuration) 4-197
map ip precedence (Interface Configuration) 4-198
map ip dscp (Global Configuration) 4-199
map ip dscp (Interface Configuration) 4-199
show map ip port 4-200
show map ip precedence 4-201
show map ip dscp 4-202
Multicast Filtering Commands 4-203
IGMP Snooping Commands 4-204
ip igmp snooping 4-204
ip igmp snooping vlan static 4-204
ip igmp snooping version 4-205
xii
Contents
show ip igmp snooping 4-205
show mac-address-table multicast 4-206
IGMP Query Commands (Layer 2) 4-207
ip igmp snooping querier 4-207
ip igmp snooping query-count 4-207
ip igmp snooping query-interval 4-208
ip igmp snooping query-max-response-time 4-209
ip igmp snooping router-port-expire-time 4-209
Static Multicast Routing Commands 4-210
ip igmp snooping vlan mrouter 4-210
show ip igmp snooping mrouter 4-211
IP Interface Commands 4-212
ip address 4-212
ip dhcp restart 4-213
ip default-gateway 4-214
show ip interface 4-214
show ip redirects 4-215
ping 4-215
Appendix A: Software Specifications A-1
Software Features A-1
Management Features A-2
Standards A-2
Management Information Bases A-3
Appendix B: Troubleshooting B-1
Problems Accessing the Management Interface B-1
Using System Logs B-2
Glossary
Index
xiii
Contents
xiv
Tables
Table 1-1.Key Features 1-1
Table 1-2.System Defaults 1-5
Table 3-1Web Page Configuration Buttons 3-3
Table 3-2Switch Main Menu 3-4
Table 3-3Logging Levels 3-19
Table 3-4HTTPS System Support 3-35
Table 3-5802.1X Statistics 3-48
Table 3-6LACP Port Counters 3-76
Table 3-7LACP Internal Configuration Information 3-77
Table 3-8LACP Neighbor Configuration Information 3-79
Table 3-9Port Statistics 3-84
Table 3-10Mapping CoS Values to Egress Queues 3-128
Table 3-11CoS Priority Levels 3-128
Table 3-12Mapping IP Precedence 3-133
Table 3-13Mapping DSCP Priority 3-134
Table 3-14Mapping CoS Values to IP ACLs 3-137
Table 4-1General Command Modes 4-6
Table 4-2Configuration Command Modes 4-8
Table 4-3Keystroke Commands 4-9
Table 4-4Command Group Index 4-10
Table 4-5Line Commands 4-11
Table 4-6General Commands 4-20
Table 4-7System Management Commands 4-24
Table 4-8Device Designation Commands 4-25
Table 4-9User Access Commands 4-26
Table 4-10Default Login Settings 4-26
Table 4-11IP Filter Commands 4-28
Table 4-12Web Server Commands 4-30
Table 4-13HTTPS System Support 4-31
Table 4-14Telnet Server Commands 4-33
Table 4-15Secure Shell Commands 4-34
Table 4-16show ssh - display description 4-41
Table 4-17Event Logging Commands 4-43
Table 4-18Logging Levels 4-44
Table 4-19show logging flash/ram- display description 4-47
Table 4-20show logging trap - display description 4-48
Table 4-21SMTP Alert Commands 4-48
Table 4-22Time Commands 4-52
Table 4-23System Status Commands 4-57
Table 4-24Frame Size Commands 4-62
Table 4-25Flash/File Commands 4-63
Table 4-26File Directory Information 4-66
This switch provides a broad range of features for Layer 2 switching. It includes a
management agent that allows you to configure the features listed in this manual.
The default configuration can be used for most of the features provided by this
switch. However, there are many options that you should configure to maximize the
switch’s performance for your particular network environment.
Key Features
Table 1-1. Key Features
FeatureDescription
Configuration Backup
and Restore
AuthenticationConsole, Telnet, web – User name / password, RADIUS, TACACS+
Access Control ListsSupports up to 32 IP or MAC ACLs
DHCP ClientSupported
DNS ServerSupported
Port ConfigurationSpeed, duplex mode and flow control
Rate LimitingInput and output rate limiting per port
Port MirroringOne or more ports mirrored to single analysis port
Port TrunkingSupports up to 6 trunks using either static or dynamic trunking (LACP)
Broadcast Storm
Control
Static AddressUp to 16K MAC addresses in the forwarding table
IEEE 802.1D BridgeSupports dynamic data switching and addresses learning
Store-and-Forward
Switching
Spanning Tree
Protocol
Virtual LANsUp to 255 using IEEE 802.1Q, port-based, protocol-based, or private VLANs
Traffic PrioritizationDefault port priority, traffic class map, queue scheduling, IP Precedence, or
Multicast FilteringSupports IGMP snooping and query
Backup to TFTP server
Web – HTTPS; Telnet – SSH
SNMP – Community strings, IP address filtering
Port – IEEE 802.1X, MAC address filtering
Supported
Supported to ensure wire-speed switching while eliminating bad frames
Supports standard STP, Rapid Spanning Tree Protocol (RSTP), and Multiple
Spanning Tree Protocol (MSTP)
Differentiated Services Code Point (DSCP), and TCP/UDP Port
1-1
Introduction
1
Description of Software Features
The switch provides a wide range of advanced performance enhancing features.
Flow control eliminates the loss of packets due to bottlenecks caused by port
saturation. Broadcast storm suppression prevents broadcast traffic storms from
engulfing the network. Untagged (port-based), tagged, and protocol-based VLANs,
plus support for automatic GVRP VLAN registration provide traffic security and
efficient use of network bandwidth. CoS priority queueing ensures the minimum
delay for moving real-time multimedia data across the network. While multicast
filtering provides support for real-time network applications. Some of the
management features are briefly described below.
Configuration Backup and Restore – You can save the current configuration
settings to a file on a TFTP server, and later download this file to restore the switch
configuration settings.
Authentication – This switch authenticates management access via the console
port, Telnet or web browser. User names and passwords can be configured locally or
can be verified via a remote authentication server (i.e., RADIUS or TACACS+).
Port-based authentication is also supported via the IEEE 802.1X protocol. This
protocol uses the Extensible Authentication Protocol over LANs (EAPOL) to request
user credentials from the 802.1X client, and then verifies the client’s right to access
the network via an authentication server.
Other authentication options include HTTPS for secure management access via the
web, SSH for secure management access over a Telnet-equivalent connection, IP
address filtering for SNMP/web/Telnet management access, and MAC address
filtering for port access.
Access Control Lists – ACLs provide packet filtering for IP frames (based on
address, protocol, TCP/UDP port number or TCP control code) or any frames
(based on MAC address or Ethernet type). ACLs can by used to improve
performance by blocking unnecessary network traffic or to implement security
controls by restricting access to specific network resources or protocols.
Port Configuration – You can manually configure the speed, duplex mode, and
flow control used on specific ports, or use auto-negotiation to detect the connection
settings used by the attached device. Use the full-duplex mode on ports whenever
possible to double the throughput of switch connections. Flow control should also be
enabled to control network traffic during periods of congestion and prevent the loss
of packets when port buffer thresholds are exceeded. The switch supports flow
control based on the IEEE 802.3x standard.
Rate Limiting – This feature controls the maximum rate for traffic transmitted or
received on an interface. Rate limiting is configured on interfaces at the edge of a
network to limit traffic into or out of the network. Traffic that falls within the rate limit is
transmitted, while packets that exceed the acceptable amount of traffic are dropped.
1-2
Description of Software Features
Port Mirroring – The switch can unobtrusively mirror traffic from any port to a
monitor port. You can then attach a protocol analyzer or RMON probe to this port to
perform traffic analysis and verify connection integrity.
Port Trunking – Ports can be combined into an aggregate connection. Trunks can
be manually set up or dynamically configured using IEEE 802.3ad Link Aggregation
Control Protocol (LACP). The additional ports dramatically increase the throughput
across any connection, and provide redundancy by taking over the load if a port in
the trunk should fail. The switch supports up to 6 trunks.
Broadcast Storm Control – Broadcast suppression prevents broadcast traffic from
overwhelming the network. When enabled on a port, the level of broadcast traffic
passing through the port is restricted. If broadcast traffic rises above a pre-defined
threshold, it will be throttled until the level falls back beneath the threshold.
Static Addresses – A static address can be assigned to a specific interface on this
switch. Static addresses are bound to the assigned interface and will not be moved.
When a static address is seen on another interface, the address will be ignored and
will not be written to the address table. Static addresses can be used to provide
network security by restricting access for a known host to a specific port.
IEEE 802.1D Bridge – The switch supports IEEE 802.1D transparent bridging. The
address table facilitates data switching by learning addresses, and then filtering or
forwarding traffic based on this information. The address table supports up to 16K
addresses.
Store-and-Forward Switching – The switch copies each frame into its memory
before forwarding them to another port. This ensures that all frames are a standard
Ethernet size and have been verified for accuracy with the cyclic redundancy check
(CRC). This prevents bad frames from entering the network and wasting bandwidth.
To avoid dropping frames on congested ports, the switch provides 1 MB for frame
buffering for the ES4524C and 2 MB for the ES4548C. This buffer can queue
packets awaiting transmission on congested networks.
Spanning Tree Protocol – The switch supports these spanning tree protocols:
Spanning Tree Protocol (STP, IEEE 802.1D) – This protocol adds a level of fault
tolerance by allowing two or more redundant connections to be created between a
pair of LAN segments. When there are multiple physical paths between segments,
this protocol will choose a single path and disable all others to ensure that only one
route exists between any two stations on the network. This prevents the creation of
network loops. However, if the chosen path should fail for any reason, an alternate
path will be activated to maintain the connection.
Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) – This protocol reduces the
convergence time for network topology changes to about 10% of that required by the
older IEEE 802.1D STP standard. It is intended as a complete replacement for STP,
but can still interoperate with switches running the older standard by automatically
reconfiguring ports to STP-compliant mode if they detect STP protocol messages
from attached devices.
1
1-3
Introduction
1
Multiple Spanning Tree Protocol (MSTP, IEEE 802.1s) – This protocol is a direct
extension of RSTP. It can provide an independent spanning tree for different VLANs.
It simplifies network management, provides for even faster convergence than RSTP
by limiting the size of each region, and prevents VLAN members from being
segmented from the rest of the group (as sometimes occurs with IEEE 802.1D STP).
Virtual LANs – The switch supports up to 255 VLANs. A Virtual LAN is a collection
of network nodes that share the same collision domain regardless of their physical
location or connection point in the network. The switch supports tagged VLANs
based on the IEEE 802.1Q standard. Members of VLAN groups can be dynamically
learned via GVRP, or ports can be manually assigned to a specific set of VLANs.
This allows the switch to restrict traffic to the VLAN groups to which a user has been
assigned. By segmenting your network into VLANs, you can:
• Eliminate broadcast storms which severely degrade performance in a flat network.
• Simplify network management for node changes/moves by remotely configuring
VLAN membership for any port, rather than having to manually change the network
connection.
• Provide data security by restricting all traffic to the originating VLAN.
• Use private VLANs to restrict traffic to pass only between data ports and the uplink
ports, thereby isolating adjacent ports within the same VLAN, and allowing you to
limit the total number of VLANs that need to be configured.
• Use protocol VLANs to restrict traffic to specified interfaces based on protocol type
Traffic Prioritization – This switch prioritizes each packet based on the required
level of service, using eight priority queues with strict or Weighted Round Robin
Queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on
input from the end-station application. These functions can
independent priorities for delay-sensitive data and best-effort data.
This switch also supports several common methods of prioritizing layer 3/4 traffic to
meet application requirements. Traffic can be prioritized based on the priority bits in
the IP frame’s Type of Service (ToS) octet or the number of the TCP/UDP port.
When these services are enabled, the priorities are mapped to a Class of Service
value by the switch, and the traffic then sent to the corresponding output queue.
Multicast Filtering – Specific multicast traffic can be assigned to its own VLAN to
ensure that it does not interfere with normal network traffic and to guarantee
real-time delivery by setting the required priority level for the designated VLAN. The
switch uses IGMP Snooping and Query to manage multicast group registration.
be used to provide
1-4
System Defaults
1
System Defaults
The switch’s system defaults are provided in the configuration file
“Factory_Default_Config.cfg.” To reset the switch defaults, this file should be set as
the startup configuration file (page 3-18).
The following table lists some of the basic system defaults.