Nokia ESB26 User Manual

© 2004 by Nokia
Nokia
ESB26 GigabitEthernet Switch
User Guide
ISSUE DATE
ISSUED
COMMENTS
MN700004 Rev 01 15 Jan 2004 First draft.
Table of Contents
PREFACE.................................................................................................................................................. A
1. INTRODUCTION..............................................................................................................................1
OVERVIEW........................................................................................................................................1
SPECIFICATIONS..............................................................................................................................3
2. GETTING STARTED .......................................................................................................................6
OVERVIEW........................................................................................................................................6
UNPACKING...................................................................................................................................... 6
FRONT PANEL .................................................................................................................................. 6
USING THE CLI TO CONFIGURE THE SWITCH.......................................................................... 7
PLANNING THE CONFIGURATION .............................................................................................. 9
BASIC CLI OPERATING CONVENTIONS ..................................................................................... 9
SPECIAL KEYS.................................................................................................................................. 9
CLI MODES...................................................................................................................................... 10
MESSAGES ......................................................................................................................................11
GETTING SYSTEM HELP ..............................................................................................................12
USING THE LIST COMMAND.......................................................................................................12
COMMAND HISTORY.................................................................................................................... 12
USING TELNET............................................................................................................................... 12
CONFIGURING THE DEVICE'S IP PARAMETERS..................................................................... 13
GENERAL COMMANDS ................................................................................................................14
VIEW MODE AND PRIVILEGED MODE .....................................................................................14
CONFIGURE MODE........................................................................................................................ 18
3. CONFIGURING A TELNET CONNECTION ............................................................................. 20
INTRODUCTION ............................................................................................................................. 20
CONFIGURING A TELNET SESSION...........................................................................................20
SWITCHING BETWEEN SESSIONS..............................................................................................24
4. USER PRIVILEGE LEVELS .........................................................................................................25
INTRODUCTION ............................................................................................................................. 25
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................27
DEFAULT USER PRIVILEGE LEVELS CONFIGURATION....................................................... 27
CONFIGURING AND DISPLAYING USER PRIVILEGES...........................................................27
5. ETHERNET INTERFACE CONFIGURATION..........................................................................30
INTRODUCTION ............................................................................................................................. 30
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................31
DEFAULT FAST AND GIGA ETHERNET PORTS CONFIGURATION ..................................... 31
CONFIGURING AND DISPLAYING FAST AND GIGA ETHERNET PORTS ........................... 32
RELATED COMMANDS.................................................................................................................44
6. PORT SECURITY ........................................................................................................................... 45
INTRODUCTION ............................................................................................................................. 45
CONFIGURING AND DISPLAYING PORT SECURITY SETTINGS.......................................... 45
7. LINK AGGREGATION GROUPS (LAGS).................................................................................. 49
INTRODUCTION ............................................................................................................................. 49
FEATURE OVERVIEW ................................................................................................................... 50
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................52
PREREQUISITES ............................................................................................................................. 53
DEFAULT LINK AGGREGATION CONFIGURATION ............................................................... 53
CONFIGURING AND DISPLAYING LAGS.................................................................................. 54
CONFIGURATION EXAMPLES.....................................................................................................58
8. TRAFFIC MONITORING..............................................................................................................66
INTRODUCTION ............................................................................................................................. 66
FEATURE OVERVIEW ................................................................................................................... 66
SUPPORTED STANDARDS, MIBS AND RFCS............................................................................69
PREREQUISITES ............................................................................................................................. 69
DEFAULT TRAFFIC MONITORING CONFIGURATION............................................................69
CONFIGURING AND DISPLAYING MONITOR SESSION......................................................... 70
CONFIGURATION EXAMPLES.....................................................................................................71
9. RESILIENT LINK...........................................................................................................................73
INTRODUCTION ............................................................................................................................. 73
CONFIGURING AND DISPLAYING A RESILIENT LINK.......................................................... 73
10. SNMP SERVER CONFIGURATION............................................................................................81
INTRODUCTION ............................................................................................................................. 81
CONFIGURING AND DISPLAYING THE SNMP SERVER SETTINGS..................................... 81
11. FORWARDING DATABASE (FDB)........................................................................................... 104
INTRODUCTION ........................................................................................................................... 104
MAC-TABLE ENTRY TYPES.......................................................................................................104
HOW ENTRIES ARE ADDED TO THE FDB............................................................................... 105
CONFIGURING AND DISPLAYING FDB SETTINGS...............................................................105
DESCRIPTION OF COMMANDS................................................................................................. 105
12. SPANNING TREE PROTOCOL (STP)......................................................................................110
INTRODUCTION ........................................................................................................................... 110
CONFIGURING AND DEBUGGING STP.................................................................................... 110
DISPLAYING PORT SPANNING-TREE TOPOLOGY SETTINGS............................................ 117
13. RAPID SPANNING TREE PROTOCOL (RSTP)...................................................................... 121
INTRODUCTION ........................................................................................................................... 121
SELECTION OF THE ROOT BRIDGE AND ROOT PORT......................................................... 122
SELECTION OF THE DESIGNATED BRIDGE AND DESIGNATED PORT............................ 122
CHANGING PORT STATES ......................................................................................................... 123
CONFIGURING AND DEBUGGING RSTP ................................................................................. 124
DISPLAYING PORT RAPID-SPANNING-TREE TOPOLOGY SETTINGS...............................134
14. MULTIPLE SPANNING TREE PROTOCOL (MSTP).............................................................139
INTRODUCTION ........................................................................................................................... 139
FEATURE OVERVIEW ................................................................................................................. 140
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................147
PREREQUISITES ........................................................................................................................... 148
DEFAULT MSTP CONFIGURATION.......................................................................................... 148
CONFIGURING AND DISPLAYING MSTP ................................................................................ 149
CONFIGURATION EXAMPLES...................................................................................................173
15. GARP MULTICAST REGISTRATION PROTOCOL (GMRP).............................................. 186
INTRODUCTION ........................................................................................................................... 186
FEATURE OVERVIEW ................................................................................................................. 186
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................187
PREREQUISITES ........................................................................................................................... 187
DEFAULT GMRP CONFIGURATION ......................................................................................... 187
CONFIGURING AND DISPLAYING GMRP............................................................................... 188
RELATED COMMANDS............................................................................................................... 189
16. GARP VLAN REGISTRATION PROTOCOL (GVRP)............................................................ 190
INTRODUCTION ........................................................................................................................... 190
CONFIGURING AND DISPLAYING GVRP SETTINGS............................................................ 190
17. VIRTUAL LANS (VLANS)........................................................................................................... 194
INTRODUCTION ........................................................................................................................... 194
BENEFITS OF USING VLANS..................................................................................................... 194
VLAN TYPES................................................................................................................................. 194
USES OF TAGGED VLANS.......................................................................................................... 195
ASSIGNING A VLAN TAG........................................................................................................... 196
DESCRIPTION OF COMMANDS................................................................................................. 197
18. QUALITY OF SERVICE..............................................................................................................209
INTRODUCTION ........................................................................................................................... 209
FEATURE OVERVIEW ................................................................................................................. 209
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................216
DEFAULT QOS CONFIGURATION ............................................................................................216
CONFIGURING QUALITY OF SERVICE FEATURES ..............................................................218
RELATED COMMANDS............................................................................................................... 233
19. DHCP CLIENT ..............................................................................................................................234
DHCP OVERVIEW ........................................................................................................................ 234
THE ESB26 STARTUP PROCESS ................................................................................................ 235
THE DHCP NEGOTIATION PROCESS........................................................................................236
CONFIGURING THE DHCP CLIENT .......................................................................................... 239
CONFIGURATION EXAMPLE.....................................................................................................242
20. IGMP SNOOPING......................................................................................................................... 243
INTRODUCTION ........................................................................................................................... 243
JOINING A MULTICAST GROUP ...............................................................................................243
LEAVING A MULTICAST GROUP .............................................................................................243
IMMEDIATE-LEAVE PROCESSING........................................................................................... 244
IGMP SNOOPING COMMANDS.................................................................................................. 244
21. MULTICAST VLAN REGISTRATION (MVR) ........................................................................ 255
INTRODUCTION ........................................................................................................................... 255
DESCRIPTION OF COMMANDS................................................................................................. 256
22. TRANSPARENT LAN SERVICES (TLS)...................................................................................265
INTRODUCTION ........................................................................................................................... 265
FEATURE OVERVIEW ................................................................................................................. 265
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................266
PREREQUISITES ........................................................................................................................... 267
DEFAULT TLS CONFIGURATION ............................................................................................. 267
CONFIGURING AND DISPLAYING TLS ...................................................................................267
23. SOFTWARE UPGRADE AND REBOOT OPTIONS................................................................ 272
OVERVIEW....................................................................................................................................272
DESCRIPTION OF COMMANDS................................................................................................. 272
24. FILE SYSTEM FOR CONFIGURATION SCRIPT FILES...................................................... 282
INTRODUCTION ........................................................................................................................... 282
SCRIPT-FILE COMMANDS..........................................................................................................282
25. STATUS MONITORING, STATISTICS AND GENERAL COMMANDS ............................. 289
OVERVIEW....................................................................................................................................289
DESCRIPTION OF COMMANDS................................................................................................. 290
26. REMOTE MONITORING............................................................................................................ 304
INTRODUCTION ........................................................................................................................... 304
FEATURE OVERVIEW ................................................................................................................. 304
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................305
STATISTICS MONITORING ........................................................................................................306
RMON ALARMS............................................................................................................................ 307
27. PERIODIC MONITORING .........................................................................................................312
INTRODUCTION ........................................................................................................................... 312
FEATURE OVERVIEW ................................................................................................................. 312
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................314
DEFAULT PERIODIC MONITORING CONFIGURATION........................................................315
CONFIGURING AND DISPLAYING PERIODIC MONITORING .............................................316
CONFIGURATION EXAMPLES...................................................................................................326
RELATED COMMANDS............................................................................................................... 328
28. LOGGING SYSTEM TRAP MESSAGES TO THE NVRAM ..................................................329
INTRODUCTION ........................................................................................................................... 329
CONFIGURING THE TRAP LEVEL FOR STORED SYSTEM MESSAGES.............................329
CONFIGURING THE MESSAGE FORMAT................................................................................ 329
NVRAM SYSTEM-TRAP LOGGING COMMANDS...................................................................330
29. NVRAM CONFIGURATION HISTORY....................................................................................333
INTRODUCTION ........................................................................................................................... 333
HISTORY LOG FORMAT AND GENERATION ......................................................................... 333
CONFIGURING HISTORY SETTINGS........................................................................................ 333
DISPLAYING THE CONFIGURATION HISTORY..................................................................... 334
30. CONFIGURING THE WATCHDOG FEATURES....................................................................337
OVERVIEW....................................................................................................................................337
ACCESSING WATCHDOG MODE .............................................................................................. 337
CONFIGURING THE RESET-LOOP DETECTION FEATURE .................................................. 338
CONFIGURING THE SNMP REQUEST FAILURE DETECTION FEATURE...........................339
CONFIGURING THE APPLICATION SUSPENSION DETECTION FEATURE....................... 340
DISPLAYING THE WATCHDOG CONFIGURATION............................................................... 341
31. NTP CLIENT DESCRIPTION..................................................................................................... 342
INTRODUCTION ........................................................................................................................... 342
THE NTP TIMESERVER COMMANDS.......................................................................................342
WHY USE NTP PROTOCOL ?...................................................................................................... 343
CONFIGURING AND DISPLAYING NTP SERVER SETTINGS............................................... 343
MD5 AUTHENTICATION.............................................................................................................345
RUNNING THE NTP SERVER ..................................................................................................... 346
EXAMPLES .................................................................................................................................... 347
CONFIGURATION EXAMPLE.....................................................................................................347
CONFIGURING DAYLIGHT SAVING TIME (DST) ..................................................................348
32. REMOTE AUTHENTICATION DIAL-IN USER SERVICE (RADIUS) ................................ 351
INTRODUCTION ........................................................................................................................... 351
BINOS RADIUS FEATURES ........................................................................................................ 351
DESCRIPTION OF COMMANDS................................................................................................. 352
USING RADIUS TO CONFIGURE LOGIN AUTHENTICATION.............................................. 354
A RADIUS CONFIGURATION EXAMPLE ................................................................................. 355
33. SECURE SHELL (SSH) ................................................................................................................ 357
INTRODUCTION ........................................................................................................................... 357
SOME SECURITY CONSIDERATIONS ...................................................................................... 357
COMMANDS FOR MANAGING THE SSH SERVER.................................................................358
SUPPORTED CLIENTS................................................................................................................. 359
SUPPORTED STANDARDS..........................................................................................................359
34. 802.1X PORT-BASED AUTHENTICATION ............................................................................. 360
INTRODUCTION ........................................................................................................................... 360
FEATURE OVERVIEW ................................................................................................................. 360
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................363
DEFAULT 802.1X CONFIGURATION.........................................................................................364
CONFIGURING AND DISPLAYING 802.1X...............................................................................365
CONFIGURATION EXAMPLE.....................................................................................................376
RELATED COMMANDS............................................................................................................... 376
35. BUILT-IN SELF TEST (BIST)..................................................................................................... 378
OVERVIEW....................................................................................................................................378
STARTUP EXECUTION OF BIST ................................................................................................ 378
BIST COMMANDS ........................................................................................................................ 379
36. DIAGNOSTIC TESTS................................................................................................................... 382
ESB26 DIAGNOSTICS-RELATED COMMANDS.......................................................................382
THE DIAGNOSTICS-RELATED COMMANDS .......................................................................... 382
37. DNS RESOLVER........................................................................................................................... 390
INTRODUCTION ........................................................................................................................... 390
FEATURE OVERVIEW ................................................................................................................. 390
SUPPORTED STANDARDS, MIBS AND RFCS..........................................................................391
DEFAULT DNS RESOLVER CONFIGURATION....................................................................... 392
CONFIGURING AND DISPLAYING DNS RESOLVER............................................................. 392
CONFIGURATION EXAMPLE.....................................................................................................393
RELATED COMMANDS............................................................................................................... 393
APPENDIX: LOADER, SYSLOADER AND DUAL BOOT ................................................................. I
OVERVIEW.........................................................................................................................................I
LOADER..............................................................................................................................................I
SYSLOADER AND DUAL BOOT ..................................................................................................IX
MN700004 Rev 01 a
Preface
This guide provides the required information to setup and configure the ESB26 switch, firmware version 3.3.0. It is intended for network administrators who are responsible for installing and setting up network equipment. It assumes a basic working knowledge of the following:
Local area networks (LANs)
Ethernet concepts
Ethernet switching and bridging concepts
Routing concepts
Internet Protocol (IP) concepts
If the information in the Release Notes that are shipped with your unit differs from the information in this guide, follow the Release Notes.
Conventions Used in This Guide
The syntax of CLI command lines, explained in "Basic CLI Operating Conventions" and the further topics and discussed throughout this guide, is represented by the following general format:
device-name>keyword(s) [parameter(s)] ... [keyword(s)] [parameter(s)]
OR
device-name[ (config ...)]#keyword(s) [parameter(s)] ... [keyword(s)] [parameter(s)]
where:
The angle bracket (>) is the CLI prompt symbol in View mode.
The pound symbol (#) is the CLI prompt symbol in all other modes.
The left part, up to and including the prompt symbol represents the command prompt displayed by the computer. In this part:
device-name stands for the name of the switch (e.g. ESB26).
The optional expression “(config)” or “(cfg ...)” – including the parentheses – appears on the screen exactly as in the manual.
The part following the prompt symbol represents the users command. In this
Preface
MN700004 Rev 01
b
part:
> keyword(s), in boldface characters, stands for one or more standard CLI
command keywords. The first keyword may optionally be preceded by no to indicate a negation of the command.
> parameter(s) may be one or more optional or requisite values, depending
on the requirements of the specific command. They are represented by slanted characters.
> In this guide, keywords and parameters may be separated by vertical OR
bars (|). The OR bars indicate an exclusive-or choice among a group of selectable entities separated by these symbols.
> Parentheses and braces may be used in this guide to enclose selectable
entities – for the purpose of clarification.
Acronyms Used in This Guide
L3 OSI Layer 3 requirements
DHCP Dynamic host configuration protocol
Downlink The Ethernet links connecting to equipment that perform host data processing.
GARP Generic Attribute Registration Protocol
GMRP Group Multicast Registration Protocol
GVRP GARP VLAN Registration Protocol
MAC Media Access Control
MIB Management information base
pps Packets per second
SNMP Simple network management protocol
STP Spanning Tree Protocol
RSTP Rapid Spanning Tree Protocol
Uplink The Ethernet links connecting to another switch or router.
UTP Unshielded twisted pair
VLAN Virtual Local Area Network
10Base-T 10Mbit/s Ethernet link that works over standard UTP copper cabling.
Preface
MN700004 Rev 01
c
100Base-TX
1000Base-T
1000Base-SX
100Mbit/s Ethernet link that works over standard UTP copper cabling.
1000Mbit/s Ethernet link that works over standard UTP copper cabling.
1000Mbit/s Ethernet link that works over optical, 850nm multimode cabling.
Summary of Version 3.3.0 Features
The Version 3.3.0 includes the following features:
VLANs (Virtual local area networks) including support for IEEE 802.1Q and IEEE
802.1p
VLAN aggregation
STP (Spanning Tree Protocol) (IEEE 802.1D)
RSTP (Rapid Spanning Tree Protocol) (IEEE 802.1w)
MSTP (Multiple Spanning Tree Protocol) (IEEE 802.1s)
QoS (Quality of Service)
IGMP snooping to control IP multicast traffic.
GMRP (GARP Multicast Registration Protocol)
GVRP (GARP VLAN Registration Protocol)
MVR (Multicast VLAN Registration)
Console CLI (Command-line Interface) connection
Telnet CLI connection
SNMP (Simple Network Management Protocol) v1, v2c and v3 support
RMON (Remote Monitoring)
Traffic mirroring for all ports
DHCP Client
Backpressure and flow control support
802.3x flow control for full-duplex links
Link Aggregation (LAG) for increased bandwidth without requiring expensive hardware upgrade
Link Aggregation Control Protocol (LACP) providing dynamic LAGs
Console timeout value
Remote logging
Remote time synchronization protocol (rfc867, rfc868).
SSH
Preface
MN700004 Rev 01
d
RADIUS
CLI user privilege levels
Resilient link for port redundancy
Script file system
Up to 1.7 MB size of the configuration file
More accurate CPU utilization measurement
Inform requests for SNMPv2c
MAC address per port in BPDU for xSTP
Enhanced DHCP boot process:
Startup configuration integrity check
Option to save downloaded file to the internal Flash memory
Image file upload
Enhanced password security (passwords are saved in the internal Flash memory and not in the running config, startup or script files.)
Cable crossover support
MN700004 Rev 01 1
1. Introduction
Overview
ESB26 is an integrated Ethernet switch based on DX200 hardware platform. The ESB26 features a total of 26 Ethernet ports of types and placements as follows:
Port Placement Connector Traffic
20 full duplex 10/100Base
T/TX Ethernet ports
back panel AMP 2mm Z-pack
connectors compatible
downlink
2 full duplex 10/100Base T/TX Ethernet ports
front panel RJ45 downlink/uplink
2 1000Base-T ports front panel RJ45 downlink/uplink
2 1000Base-SX ports front panel LC uplink
ESB26 contains also one RS-232 interface (RJ45) on the front panel for management purposes.
The two 1000Base-T ports support all the 10/100/1000 Mbit/s link speeds. Speed mixing is supported, too, e.g. it is possible to use one of the 1000Base-T ports in gigabit mode while the other runs in 100Mbit mode.
The intended use of the ESB26 is to collect the Ethernet links of different computer units and preprocessor units of DX200-based network elements, and allow access to them from the upper levels. The ESB26 can be used in all M98F DX200 based network elements. The ESB26 can be assembled into a place of ESB20/ESB20-A by using the existing cabling.
NOTE
The ESB26 is designed to operate in forced cooling M98F only.
The two graphics below represent two examples of operational environments for the ESB26. As presented, the ESB26s are used to collect traffic from/to different computer units and preprocessor units and forward it towards 3rd party L3 switches. It is important to note that VLAN-technology is used in order to divide the different units into several broadcast domains. It must also be noted that redundant paths do exists and Rapid STP (as according to IEEE 802.1w) is used in order to avoid loops.
1. Introduction
MN700004 Rev 01
2
OSR
OSR
IPET
IPET
IPET
IPET
TGSU
TGSU
IPET-
cabinet
IPET-
cabinet
Legend:
Forwarding
Blocked
VLANs
Rapid-
STP
Rapid-
STP
3550
3550
3550
3550
Rapid-
STP
OSRs used as L2-
devices
ESB26
ESB26
ESB26 ESB26
ESB26
ESB26
ESB26 ESB26
ESB26
ESB26
ESB26
ESB26
3550
3550
GSR
GSR
Cisco 3550s or
ESB26s
Cisco 3550s or ESB26s
Cisco 3550s or ESB26s
Figure 1-1 Example of Operational Environment for the ESB26 with L2 OSRs
OSR
OSR
IPET
IPET
IPET
IPET
TGSU
TGSU
IPET-cabinet
IPET-cabine
t
Legend
Forwarding
Blocked
VLANs
Rapid-
STP
3550
3550
3550
3550
3550
3550
ESB26
ESB26 ESB26 ESB26 ESB26 ESB26 ESB26 ESB26
ESB26
ESB26
ESB26
ESB26
Rapid-
STP
OSRs used as L3-
Cisco 3550s or ESB26s (possible with L3 software)
Cisco 3550s or ESB26s (possible with L3 software)
Cisco 3550s or ESB26s (possible with L3 software)
Figure 1-2 Example of Operational Environment for the ESB26 with L3 OSRs.
1. Introduction
MN700004 Rev 01
3
The switch is managed via BiNOS Command Language Interface (CLI) commands typed in by the user by either of the following means:
By direct connection, through a VT-100 compatible terminal connected to the console port on the unit’s front panel;
Remotely, using telnet over a TCP/IP communication network.
Specifications
Compliance
IEEE802.3
IEEE802.1d
IEEE802.3X
IEEE802.1q
IEEE802.1w
IEEE802.1s
IEEE802.3ad
Switching Characteristics
Bridging
Address table:
Forwarding Rate:
Internal Bandwidth (max):
Buffers Memory:
Priority Queuing:
Virtual LAN:
Per IEEE 802.1d / 802.1w /802.1s spanning tree.
16 K MAC address per switch.
148,800 packets-per-second maximum for 100Base ports.
1,488,000 packets-per-second maximum for 1000Base ports.
5.3 Gbps (Full Duplex).
32 Mbytes
8 Queues per port, provides CoS per 802.1p
Port Based VLAN per 802.1q.
Up to 4094 VLAN groups can be defined.
GVRP protocol support.
Port Aggregation: Up to 7 static or dynamic LAGs can be defined.
In-Band: SNMP, TELNET,
Supported MIBs: MIB-II, BRIDGE MIB (RFC-1493), PRIVATE MIB, RMON MIB (Group
I,2,3,9)
1. Introduction
MN700004 Rev 01
4
Local:
For initial configuration, EIA-232 protocol, RJ-45 console connector on the front panel, VT100 compatible
Management
Software download: Via TFTP (Server application)
Monitoring: Port mirroring for sniffer connection.
Max. configuration file size: 1.7 MB
Indicators
General: Operation Indicator. A single two-color LED (Green/Red)
Green: the unit is operational.
Red: during power up and in faulty condition.
Blinking orange: when no image software is loaded.
Off: power is off.
Physical Characteristics
Dimensions: 233.4x220mm with PCB thickness of 1.6mm and spacing of 20.34mm (4T)
Supported chassis models:
CC3C-ACC4C-ACM2C-ALASWC-AIPETC-A
Environmental Characteristics
Operating Temperature: According to Nokia Environmental Specification (Commercial Range
0-70°C)
Humidity: Complying to Nokia Environmental Specification
Power Characteristics
Voltage:
Power Consumption:
+3.3Vand +5V (±5% voltage tolerances)
Less than 25 W
Ex-Factory Default Settings
IP Address: 192.168.0.5
1. Introduction
MN700004 Rev 01
5
Subnet mask: 255.255.255.128
Default gateway: 192.168.0.10
Password: nokia
Telnet: enabled
SNMP: disabled
RMON: enabled
802.1p priority recognition: enabled
802.1q tagging: disabled on the default VLAN
Forwarding database aging period:
300 seconds (5 minutes)
GVRP: disabled
GMRP: disabled
SSH: disabled
LACP: disabled
LAN ports status: enabled
Port auto negotiation: enabled
Port mirroring: disabled
VLANs: disabled
Rapid STP: disabled
DHCP: enabled
Hot-Swap
The card can be inserted and removed while power is applied to the IPA2800 chassis. Before removing the card, press the Reset button twice within two seconds. This will disconnect power from the card for 20 seconds. The LED will turn off, indicating that the card can be safely removed.
MN700004 Rev 01 6
2. Getting Started
Overview
ESB26 installation consists of inserting the card into the appropriate slot in the system, turning the unit power on, and setting the IP Address in order to enable remote management. All other management procedures may be performed remotely via Terminal Interface management applications that are integrated into the unit.
This chapter describes how to install the unit, perform initial setup, use Terminal Interface management applications, and how to perform basic switch operations.
Unpacking
After unpacking:
Verify that the ESB26 unit has not been damaged during shipment.
It is recommended that you keep the shipping package until the unit has been installed and verified as being fully operational. As all electronic devices with static sensitive components, ESB26 should be handled with care.
Front Panel
SER1
OPR
RST
ETH2
ETH1
Operation indicator
Reset button
Serial
connector
1000Base T
ports
Open tabs outwards to insert or extract card
ETH4
ETH3
B
A
ETH6
ETH5
1000Base SX
ports
10/100Base
T/TX ports
Figure 2-1 ESB26 Front Panel
Table 2-1 ESB26 Front Panel Components
ETH1, ETH2 Two 1000Base SX ports interface connectors
2. Getting Started
MN700004 Rev 01
7
ETH3, ETH4 Two 1000Base T ports interface connectors
ETH5, ETH6 Two 10/100Base T/TX ports interface connectors
OPR
Operation Indicator. A single two-color LED (Green/Red)
Green: the unit is operational
Red: during power up and in faulty condition.
Blinking orange: when no image software is loaded.
Off: power is off.
RST Local Reset and Hotswap button.
To perform Hotswap, press twice within two seconds before removing the card. Power will be turned off for 20 seconds during which the card may be removed safely.
SER1 RJ45 console connector used for initial configuration.
TX – Pin 2 (Going out of the switch)
RX – Pin 5 (Going into the switch)
GND – Pin 3
GND – Pin 4
Using the CLI to Configure the Switch
The configuration program uses a CLI (Command Line Interface) that enables you to start using the switch quickly and without extensive background knowledge. It does this by prompting you for the information required to perform basic configuration procedures.
Using the CLI, you will be able to do the following:
Establish host names and interfaces
Enable transparent Ethernet bridging
Configure Layer 2 switch protocols (GVRP, GMRP, Spanning Tree, etc.)
Configure VLANs
System parameters are stored in a non-volatile memory. They have to be set up only once during initial setup.
Getting Started with the CLI
Configuration of the switch is done by connecting a VT-100 (or compatible terminal) to the card RJ-45 (Console) connector.
The CLI operates automatically when you power on the switch. Before you start using the CLI, you must do the following:
2. Getting Started
MN700004 Rev 01
8
Step 1.
Insert the device into its chassis slot.
Step 2.
Attach an RS-232 ASCII terminal to the RJ-45 (SER1) connector (See Figure 2-1).
Step 3.
Configure the terminal to operate at:
Emulation mode: VT-100 mode (default mode)
9600 bps
8 data bits
1 stop bit
No parity
No flow control
25 lines and 80 columns window size
Step 4.
Establish a session with the unit and power on the unit. After a few seconds, the following is displayed on the terminal screen:
Press any key to stop auto-boot... 0
Verifying validity of primary application.....OK
Start primary application...
BUILT-IN SELF TEST
-----------------­CPU Core Test : Passed CPU Notify RAM Test : Passed CPU Interface Test : Passed Testing Switch Core : Passed On-board Power Test : Passed
//////////////////////////////////////////////////////////////////////// // // // N O K I A // // // // // // Switch model : NOKIA ESB26 // // SW version : 3.2.89 ER created Dec 17 2003 - 11:32:40 // // // ////////////////////////////////////////////////////////////////////////
User Access Verification
Password:
Step 5.
Enter your password, which is nokia
by default. The device-name> prompt is
displayed, allowing you to begin the configuration process.
2. Getting Started
MN700004 Rev 01
9
If the password has been lost or cannot be configured, please contact Nokia support.
Planning the Configuration
Before starting the configuration process, determine the following:
The protocols you plan to use and their specific parameters
The types of interfaces installed: Ethernet or Serial
Whether or not you plan to use bridging
Basic CLI Operating Conventions
Entering commands at the CLI prompt and then pressing the Return key initiates CLI commands. Based on user input, the CLI returns various data in response.
You type all commands on one line and then press <Enter>. The CLI response is displayed on your screen.
You can use abbreviated commands provided they are unique. For example, enter the letters
sho
for the show command.
Certain commands display multiple screens with this prompt at the bottom of the screen:
--More--
Press on the space bar to continue.
Special Keys
Table 2-2 summarizes special keys available at the CLI prompt.
Table 2-2 CLI Entry Keys
Key Action
Backspace Erase characters
Ctrl-U Delete line
Ctrl-W Erase the last word
Exit Escape current mode and go to previous mode
2. Getting Started
MN700004 Rev 01
10
Key Action
Ctrl-F Move forward one character
Ctrl-B Move backward one character
Esc and then B Move bacward one word
Esc and then F Move forward one word
Ctrl-A Move to the beginning of the line
Ctrl-E Move to the end of the line
Ctrl-H Delete the character before point
Ctrl-D Delete the character after point
Esc and then D Forward kill word
Ctrl-K Kill to the end of the line
Ctrl-C Interrupt current input and moves to the next line
Ctrl-N Move down to next line in the history buffer
Ctrl-P Move up to previous line in the history buffer
Tab Use command line completion by pressing the Tab key.
?
Typing
?
at the beginning of the line, generates a list of available commands.
Typing ?
at any point within the line will show possible completions.
CLI Modes
There are several CLI modes and associated prompt levels. The prompt is the string that appears after the host name (
ESB26
by
default). The following are the main CLI modes:
View Mode (user-level)
The View mode allows viewing capabilities only. Its prompt is an angle bracket (>):
device-name>
View mode is password protected. The password is nokia by default. You can change this password by using the password command in global Configuration mode.
Privileged Mode
The Privileged mode allows advanced viewing unit capabilities and limited configuration capabilities. Its prompt is a pound symbol (#):
2. Getting Started
MN700004 Rev 01
11
device-name#
By default, Privileged mode is not password protected. However, you can configure password protection by using the password command from the Configure prompt.
To access Privileged mode from View mode, use the enable command. (That is why this mode is also referred as "Enable" mode.)
Configure Mode
The Configure mode allows full configuration capabilities. Its prompt is displayed as follows:
device-name(config)#
Additional information can be displayed inside the parentheses, before the pound symbol, to indicate the present configuration mode.
For example:
device-name(cfg protocol)#
indicates that you are in the Configure Protocol mode.
To access Configure mode from Privileged mode, use the configure terminal command.
Startup Modes
There are also two separate special startup modes, called "Loader" and "Sysloader". They are designed mainly for techical support purposes and are not user-configurable. Both of them are covered in detail in the Appendix.
Messages
Several messages may be issued in response to incorrect entries (e.g., wrong syntax, or incomplete commands). The following are some of these messages:
% unknown command
displayed when you enter a string that is not a command.
% command incomplete
indicates that you entered a valid command but failed to enter all its required parameters. Press the <Tab> key to display the possible options.
Other messages include:
2. Getting Started
MN700004 Rev 01
12
% ambiguous command. % port 9 invalid, valid val: 1..8
Getting System Help
For system help, enter ? or the letter l (for "list") to display a list of commands that are available at either the user-level or the privileged-level CLI prompt.
To get more information about certain commands, type ? after the command. For more information, see the lists of commands that are displayed after entering ?
Using the List Command
The
list
command displays a complete list of the commands relevant to the prompt displayed.
If the list is larger than can be displayed on your screen, the following is displayed.
--more--
Command History
A memory buffer in the ESB26 retains the last 20 commands you entered.
Using Telnet
Any workstation with a telnet facility should be able to communicate with the ESB26 over a TCP/IP network. Up to five active telnet sessions can access the ESB26 concurrently. The telnet session will be disconnected after a specified time of inactivity.
Before you can start a telnet session, you must set up the IP parameters described in the Configuring the Device's IP Parameters section. Telnet is enabled by default.
To open the telnet session, you must specify the IP address of the device that you want to manage. Check the user manual supplied with the telnet facility if you are unsure of how to do this.
Once the connection is established, you will be prompted to log in. VT100 emulation and VT100 keys must be used.
2. Getting Started
MN700004 Rev 01
13
Configuring the Device's IP Parameters
To manage the ESB26 by a telnet connection or by using an SNMP Network Manager, you must first configure the IP parameters of the ESB26 switch and the default gateway.
Step 1.
Change to Global Configuration mode by typing
configure terminal
at the Privileged
mode prompt.
The DHCP client is enabled by default; therefore, to configure a static IP address, you should first disable the DHCP client.
Step 2.
To disable the DHCP client, use the following command in Global Configuration mode:
Command Syntax
device-name(config)#no ip address dhcp
Step 3.
To set the IP address, use the following command in Global Configuration mode:
Command Syntax
device-name(config)#ip address A1.B1.C1.D1 [/M|A2.B2.C2.D2] [dhcp A3.B3.C3.D3]
Argument Description
A1.B1.C1.D1 IP address of the configured IP interface.
/M Subnet mask of the configured IP interface (in the range 1-30).
A2.B2.C2.D2 Subnet mask of the configured IP interface.
dhcp Use dhcp client
A3.B3.C3.D3
Request IP address A.B.C.D
Example
device-name(config)#ip address 100.1.2.3/16 device-name(config)#ip address dhcp 9.0.0.1
The IP address of the ESB26 becomes 100.1.2.3 in network 100.1.0.0
Step 4.
Set the default gateway IP address as follows:
Command Syntax
device-name(config)#ip route {destination-address netmask|destination-prefix} A.B.C.D [<distance>] device-name(config)#no ip route {destination-address netmask|destination-prefix} A.B.C.D [<distance>]
2. Getting Started
MN700004 Rev 01
14
Argument Description
destination-address
Route’s IP destination address, in
A.B.C.D
format, used in conjunction with
netmask to define a network address.
netmask
Destination network mask, in
A.B.C.D format, used in conjunction with
destination-address.
destination-prefix
Route’s destination prefix, in
A.B.C.D/M format.
A.B.C.D
IP gateway address in
A.B.C.D
format.
distance (Optional). Distance assigned for this route, in the range <1-255>.
Example
device-name(config)#ip route 0.0.0.0/0 100.1.1.1
The default gateway IP address is 100.1.1.1 in network 100.1.0.0
General Commands
Table 2-3 shows the commands you can use at all times, regardless of the type of prompt displayed.
Table 2-3 General Commands
exit Escape current mode and go to previous mode
help Display help information
no Negate a command or set its defaults
quit Escape current mode and go to previous mode
View Mode and Privileged Mode
Table 2-4 summarizes the Privileged mode commands. The enable command is available only in View mode and is used to access Privileged mode. All other commands listed in the table are available in Privileged mode. The show command and the terminal command are available both in View and in Privileged mode.
2. Getting Started
MN700004 Rev 01
15
Table 2-4 Privileged Mode Command Summary
clear Clears a specified entry or entries from one of the tables (the command is available only
in Privileged mode).
configure Configuration from VTY interface (the command is available only in Privileged mode).
copy Transfers file to the target base (the command is available only in Privileged mode).
debug Enables the debugging options
disable Exits from Privileged mode (the command is available only in Privileged mode).
enable Enters Privileged mode (the command is available only in View mode).
reload Halts and performs a cold restart (the command is available only in Privileged mode).
self-test Shows built-in test results (the command is available only in Privileged mode).
session Telnet session commands (the command is available only in Privileged mode).
show Shows running system information.
telnet Start telnet client (the command is available only in Privileged mode).
terminal Terminal configuration setup.
ping Sends ICMP echo messages (the command is available only in Privileged mode).
traceroute Trace routing path (the command is available only in Privileged mode).
who Displays who is on VTY.
write
scp-image
swap
Writes configuration to memory, network or terminal (the command is available only in Privileged mode). Secure copy.
Swaps the primaryand the secondary applications.
Accessing Privileged Mode
enable
The enable command, in View mode, allows accessing the Privileged mode. After entering this command, the prompt symbol changes from an angle bracket to a pound symbol (#).
Command Syntax
device-name>enable
Example
device-name>enable device-name#
2. Getting Started
MN700004 Rev 01
16
Description of View and Privileged Mode Commands
configure terminal
The configure terminal command, in Privileged (Enable) mode, allows accessing the Global Configure mode, for configuration of VLANs, interfaces, resilient link, etc.
Command Syntax
device-name#configure terminal
Example
device-name#configure terminal device-name(config)#
terminal length
The terminal length command, in View or Privileged (Enable) mode, specifies the number of lines the CLI displays, in response to a command, before displaying the
--More--
string.
Command Syntax
device-name#terminal length
show ip
The show ip command, in View or Privileged (Enable) mode, displays the IP address of the ESB26 and its subnet mask.
Command Syntax
device-name#show ip
Example
device-name#show ip IP-ADDR : 212.29.220.136 NET-MASK : 255.255.255.192 device-name#
show ip arp
The show ip arp command, in View or Privileged (Enable) mode, displays Address Resolution Protocol information.
Command Syntax
device-name#show ip arp
Example
device-name#show ip arp show ip arp ======+==================+=================+========+========+ # | IP Address | MAC |Age(min)| if |
2. Getting Started
MN700004 Rev 01
17
------+------------------+-----------------+--------+--------+ 0 | 192.168.0.4 |00:40:95:30:12:2e| 2 | sw0 |
1 | 192.168.0.22 |00:40:95:32:76:04| 1 | sw0 | 2 | 192.168.0.44 |00:40:95:30:5e:e1| 1 | sw0 | device-name#
traceroute
The traceroute command, in Privileged (Enable) mode, displays the routing path from the ESB26 to the targeted IP address. This command can help determine how routing is done in the network. The execution of the command can be stopped by pressing the ESC key.
Command Syntax
device-name#traceroute A.B.C.D [TTL] [TIMEOUT]
Argument Description
A.B.C.D The IP address to be traced.
TTL
Defines the numbers of routers that allow the traceroute command to pass when it looks for the specified IP address.
TIMEOUT
Defines the length of time (in seconds) that an answer to a traceroute request can be received (default is 2 seconds).
ping
The ping command, in Privileged (Enable) mode, allows to ping a unit.
Command Syntax
device-name#ping A.B.C.D [NUMBER] [TIMEOUT] [DELAY] [LENGTH]
Argument Description
A.B.C.D The destination IP address.
NUMBER Number of echo packets to send (default 5).
TIMEOUT Wait for response in seconds (default 2 seconds).
DELAY Delay between packets in seconds (default immediately).
LENGTH Size of the ICMP echo packet (default 100).
Example
To send 5 pings of 80 bytes with a 30-second wait for reply and a 20-second delay between pings, enter the following command:
device-name#ping 212.29.220.136 5 30 20 80 sending 5, 80-byte icmp echos to 212.29.220.136, timeout is 1 seconds: !!!
The exclamation points are displayed at the end of each successful packet. The CLI prompt is displayed on your screen when the entire ping sequence has been completed. The execution of the command can be stopped by pressing the ESC key.
2. Getting Started
MN700004 Rev 01
18
Configure Mode
The Configure mode allows full configuration capabilities. Its prompt is as follows:
device-name(config)#
Additional information can be displayed inside the parentheses, before the pound symbol, to indicate the present Configuration Mode.
For example:
device-name(cfg protocol)#
indicates that you are in the Configure Protocol mode.
Accessing Global Configuration Mode
To access Global Configuration mode:
Step 1.
Type the enable command at the EXEC prompt:
device-name>enable
The prompt indicates entry into Privileged mode:
device-name#
Step 2.
Type configure terminal
at the Privileged-level prompt. The prompt following this
command indicates entry into the global Configuration mode.
device-name(config)#
Configuration Command Types
Configuration commands are categorized as follows:
Global configuration commands
Defines system-wide parameters.
Interface configuration commands
Defines the characteristics of an interface (for example, a Serial or Ethernet interface). To access these commands, use the interface command in global Configuration mode.
Line subcommands Defines the characteristics of a serial line. These commands must be
preceded by a line command.
Observe the following guidelines when you execute configuration commands:
You can enter configuration subcommands in uppercase letters, lowercase letters, or both. You can also abbreviate all commands and other keywords to the least number of characters that uniquely identify the command.
To add a comment, begin the line with an exclamation point (!). Comments do not affect command processing.
2. Getting Started
MN700004 Rev 01
19
Configuration Mode Sub-Modes
Configuration mode has several sub-modes, each used to configure various entities in the ESB26. Each mode has its own unique prompt and list of commands. The following are the Configuration mode sub-modes.
Table 2-5 Configure Mode Sub-Modes Summary
Mode Description Prompt (following device-name)
Line VTY Configuration Configures the VTY sub-mode, to allow
accessing the ESB26 via telnet.
(config-VTY)#
Interface Configuration Configures interface ports or port
groups.
(config-if 1/1/1)#
or
(config-if-group)#
VLAN Configuration Configures Virtual LANs (VLANs).
(config vlan)#
Protocol Configuration Configures protocols.
(cfg protocol)#
Resilient Link Configuration Configures resilient links.
(config-resil-link N)#
File system Configuration For script file system management.
(config script-file-system)#
Monitor Configuration Configures monitoring parameters.
(config monitor NAME)#
Loading...
+ 391 hidden pages