Configuration manual for QSW-3400
QSW-3400 series
CONFIGURATION MANUAL
Content |
|
CONTENT ........................................................................................................... |
1 |
CHAPTER 1 SWITCH MANAGEMENT............................................................. |
16 |
1.1 MANAGEMENT OPTIONS ................................................................................................ |
16 |
1.1.1 Out-Of-Band Management ............................................................................. |
16 |
1.1.2 In-band Management...................................................................................... |
20 |
1.2 CLI INTERFACE ............................................................................................................. |
26 |
1.2.1 Configuration Modes...................................................................................... |
27 |
1.2.2 Configuration Syntax ..................................................................................... |
29 |
1.2.3 Shortcut Key Support..................................................................................... |
30 |
1.2.4 Help Function.................................................................................................. |
30 |
1.2.5 Input Verification ............................................................................................ |
31 |
1.2.6 Fuzzy Match Support...................................................................................... |
31 |
CHAPTER 2 BASIC SWITCH CONFIGURATION............................................. |
33 |
2.1 BASIC CONFIGURATION ................................................................................................. |
33 |
2.2 TELNET MANAGEMENT .................................................................................................. |
34 |
2.2.1 Telnet ............................................................................................................... |
34 |
2.2.2 SSH .................................................................................................................. |
36 |
2.3 CONFIGURE SWITCH IP ADDRESSES ............................................................................... |
37 |
2.3.1 Switch IP Addresses Configuration Task List.............................................. |
38 |
2.4 SNMP CONFIGURATION................................................................................................. |
39 |
2.4.1 Introduction to SNMP ..................................................................................... |
39 |
2.4.2 Introduction to MIB......................................................................................... |
40 |
2.4.3 Introduction to RMON .................................................................................... |
41 |
2.4.4 SNMP Configuration....................................................................................... |
42 |
2.4.5 Typical SNMP Configuration Examples ........................................................ |
45 |
2.4.6 SNMP Troubleshooting .................................................................................. |
46 |
2.5 SWITCH UPGRADE......................................................................................................... |
47 |
2.5.1 Switch System Files ....................................................................................... |
47 |
2.5.2 BootROM Upgrade.......................................................................................... |
48 |
2.5.3 FTP/TFTP Upgrade ......................................................................................... |
50 |
CHAPTER 3 FILE SYSTEM OPERATIONS ...................................................... |
60 |
3.1 INTRODUCTION TO FILE STORAGE DEVICES ..................................................................... |
60 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
1
3.2 FILE SYSTEM OPERATION CONFIGURATION TASK LIST...................................................... |
60 |
3.3 TYPICAL APPLICATIONS ................................................................................................. |
62 |
3.4 TROUBLESHOOTING....................................................................................................... |
62 |
CHAPTER 4 CLUSTER CONFIGURATION ...................................................... |
63 |
4.1 INTRODUCTION TO CLUSTER NETWORK MANAGEMENT ...................................................... |
63 |
4.2 CLUSTER NETWORK MANAGEMENT CONFIGURATION SEQUENCE ...................................... |
63 |
4.3 EXAMPLES OF CLUSTER ADMINISTRATION ....................................................................... |
66 |
4.4 CLUSTER ADMINISTRATION TROUBLESHOOTING .............................................................. |
67 |
CHAPTER 5 PORT CONFIGURATION............................................................. |
68 |
5.1 INTRODUCTION TO PORT ................................................................................................ |
68 |
5.2 NETWORK PORT CONFIGURATION TASK LIST .................................................................. |
68 |
5.3 PORT CONFIGURATION EXAMPLE ................................................................................... |
71 |
5.4 PORT TROUBLESHOOTING ............................................................................................. |
72 |
CHAPTER 6 PORT ISOLATION FUNCTION CONFIGURATION...................... |
73 |
6.1 INTRODUCTION TO PORT ISOLATION FUNCTION ................................................................ |
73 |
6.2 TASK SEQUENCE OF PORT ISOLATION............................................................................. |
73 |
6.3 PORT ISOLATION FUNCTION TYPICAL EXAMPLES ............................................................. |
74 |
CHAPTER 7 PORT LOOPBACK DETECTION FUNCTION CONFIGURATION |
|
.......................................................................................................................... |
75 |
7.1 INTRODUCTION TO PORT LOOPBACK DETECTION FUNCTION ............................................. |
75 |
7.2 PORT LOOPBACK DETECTION FUNCTION CONFIGURATION TASK LIST ............................... |
75 |
7.3 PORT LOOPBACK DETECTION FUNCTION EXAMPLE.......................................................... |
77 |
7.4 PORT LOOPBACK DETECTION TROUBLESHOOTING .......................................................... |
78 |
CHAPTER 8 ULDP FUNCTION CONFIGURATION.......................................... |
79 |
8.1 INTRODUCTION TO ULDP FUNCTION ............................................................................... |
79 |
8.2 ULDP CONFIGURATION TASK SEQUENCE ....................................................................... |
80 |
8.3 ULDP FUNCTION TYPICAL EXAMPLES ............................................................................ |
83 |
8.4 ULDP TROUBLESHOOTING ............................................................................................ |
84 |
CHAPTER 9 LLDP FUNCTION OPERATION CONFIGURATION .................... |
86 |
9.1 INTRODUCTION TO LLDP FUNCTION ............................................................................... |
86 |
9.2 LLDP FUNCTION CONFIGURATION TASK SEQUENCE ........................................................ |
87 |
9.3 LLDP FUNCTION TYPICAL EXAMPLE .............................................................................. |
90 |
9.4 LLDP FUNCTION TROUBLESHOOTING............................................................................. |
91 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
2
CHAPTER 10 PORT CHANNEL CONFIGURATION |
.........................................92 |
10.1 INTRODUCTION TO PORT CHANNEL ............................................................................... |
92 |
10.2 BRIEF INTRODUCTION TO LACP ................................................................................... |
93 |
10.2.1 Static LACP Aggregation ............................................................................. |
94 |
10.2.2 Dynamic LACP Aggregation ........................................................................ |
94 |
10.3 PORT CHANNEL CONFIGURATION TASK LIST ................................................................. |
94 |
10.4 PORT CHANNEL EXAMPLES ......................................................................................... |
96 |
10.5 PORT CHANNEL TROUBLESHOOTING ............................................................................ |
98 |
CHAPTER 11 MTU CONFIGURATION ........................................................... |
100 |
11.1 INTRODUCTION TO MTU ............................................................................................. |
100 |
11.2 MTU CONFIGURATION TASK SEQUENCE ..................................................................... |
100 |
CHAPTER 12 EFM OAM CONFIGURATION .................................................. |
101 |
12.1 INTRODUCTION TO EFM OAM.................................................................................... |
101 |
12.2 EFM OAM CONFIGURATION ...................................................................................... |
104 |
12.3 EFM OAM EXAMPLE ................................................................................................ |
106 |
12.4 EFM OAM TROUBLESHOOTING ................................................................................. |
107 |
CHAPTER 13 PORT SECURITY..................................................................... |
108 |
13.1 INTRODUCTION TO PORT SECURITY........................................................................ |
108 |
13.2 PORT SECURITY CONFIGURATION TASK LIST .......................................................... |
108 |
13.3 EXAMPLE OF PORT SECURITY ............................................................................... |
109 |
13.4 PORT SECURITY TROUBLESHOOTING ..................................................................... |
110 |
CHAPTER 14 DDM CONFIGURATION........................................................... |
111 |
14.1 INTRODUCTION TO DDM ............................................................................................ |
111 |
14.1.1 Brief Introduction to DDM .......................................................................... |
111 |
14.1.2 DDM Function ............................................................................................. |
112 |
14.2 DDM CONFIGURATION TASK LIST............................................................................... |
113 |
14.3 EXAMPLES OF DDM .................................................................................................. |
114 |
14.4 DDM TROUBLESHOOTING.......................................................................................... |
119 |
CHAPTER 15 LLDP-MED ............................................................................... |
120 |
15.1 INTRODUCTION TO LLDP-MED .................................................................................. |
120 |
15.2 LLDP-MED CONFIGURATION TASK SEQUENCE........................................................... |
120 |
15.3 LLDP-MED EXAMPLE .............................................................................................. |
122 |
15.4 LLDP-MED TROUBLESHOOTING ............................................................................... |
125 |
CHAPTER 16 BPDU-TUNNEL CONFIGURATION ......................................... |
126 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
3
16.1 INTRODUCTION TO BPDU-TUNNEL................................................................................ |
126 |
16.1.1 bpdu-tunnel function.................................................................................. |
126 |
16.1.2 Background of bpdu-tunnel....................................................................... |
126 |
16.2 BPDU-TUNNEL CONFIGURATION TASK LIST .................................................................. |
127 |
16.3 EXAMPLES OF BPDU-TUNNEL...................................................................................... |
127 |
16.4 BPDU-TUNNEL TROUBLESHOOTING ............................................................................. |
129 |
CHAPTER 17 EEE ENERGY-SAVING CONFIGURATION ............................. |
130 |
17.1 INTRODUCTION TO EEE ENERGY-SAVING .................................................................... |
130 |
17.2 EEE ENERGY-SAVING CONFIGURATION LIST ................................................................ |
130 |
17.3 EEE ENERGY-SAVING TYPICAL EXAMPLES.................................................................. |
130 |
CHAPTER 18 VLAN CONFIGURATION ......................................................... |
131 |
18.1 VLAN CONFIGURATION ............................................................................................. |
131 |
18.1.1 Introduction to VLAN.................................................................................. |
131 |
18.1.2 VLAN Configuration Task List ................................................................... |
132 |
18.1.3 Typical VLAN Application .......................................................................... |
135 |
18.1.4 Typical Application of Hybrid Port ............................................................ |
136 |
18.2 DOT1Q-TUNNEL CONFIGURATION................................................................................ |
138 |
18.2.1 Introduction to Dot1q-tunnel ..................................................................... |
138 |
18.2.2 Dot1q-tunnel Configuration ....................................................................... |
140 |
18.2.3 Typical Applications of the Dot1q-tunnel ................................................. |
140 |
18.2.4 Dot1q-tunnel Troubleshooting .................................................................. |
141 |
18.3 SELECTIVE QINQ CONFIGURATION ............................................................................. |
141 |
18.3.1 Introduction to Selective QinQ .................................................................. |
141 |
18.3.2 Selective QinQ Configuration.................................................................... |
142 |
18.3.3 Typical Applications of Selective QinQ..................................................... |
142 |
18.3.4 Selective QinQ Troubleshooting ............................................................... |
144 |
18.4 VLAN-TRANSLATION CONFIGURATION ........................................................................ |
144 |
18.4.1 Introduction to VLAN-translation .............................................................. |
144 |
18.4.2 VLAN-translation Configuration ................................................................ |
145 |
18.4.3 Typical application of VLAN-translation ................................................... |
146 |
18.4.4 VLAN-translation Troubleshooting ........................................................... |
147 |
18.5 MULTI-TO-ONE VLAN TRANSLATION CONFIGURATION ................................................. |
147 |
18.5.1 Introduction to Multi-to-One VLAN Translation ....................................... |
147 |
18.5.2 Multi-to-One VLAN Translation Configuration ......................................... |
147 |
18.5.3 Typical application of Multi-to-One VLAN Translation ............................ |
148 |
18.5.4 Multi-to-One VLAN Translation Troubleshooting..................................... |
149 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
4
18.6 DYNAMIC VLAN CONFIGURATION............................................................................... |
149 |
18.6.1 Introduction to Dynamic VLAN.................................................................. |
149 |
18.6.2 Dynamic VLAN Configuration ................................................................... |
150 |
18.6.3 Typical Application of the Dynamic VLAN................................................ |
152 |
18.6.4 Dynamic VLAN Troubleshooting ............................................................... |
153 |
18.7 GVRP CONFIGURATION............................................................................................. |
153 |
18.7.1 Introduction to GVRP ................................................................................. |
153 |
18.7.2 GVRP Configuration Task List................................................................... |
154 |
18.7.3 Example of GVRP ....................................................................................... |
155 |
18.7.4 GVRP Troubleshooting .............................................................................. |
157 |
18.8 VOICE VLAN CONFIGURATION ................................................................................... |
157 |
18.8.1 Introduction to Voice VLAN ....................................................................... |
157 |
18.8.2 Voice VLAN Configuration ......................................................................... |
158 |
18.8.3 Typical Applications of the Voice VLAN ................................................... |
158 |
18.8.4 Voice VLAN Troubleshooting .................................................................... |
160 |
CHAPTER 19 MAC TABLE CONFIGURATION .............................................. |
161 |
19.1 INTRODUCTION TO MAC TABLE .................................................................................. |
161 |
19.1.1 Obtaining MAC Table.................................................................................. |
161 |
19.1.2 Forward or Filter ......................................................................................... |
162 |
19.2 MAC ADDRESS TABLE CONFIGURATION TASK LIST ...................................................... |
163 |
19.3 TYPICAL CONFIGURATION EXAMPLES ......................................................................... |
165 |
19.4 MAC TABLE TROUBLESHOOTING ............................................................................... |
165 |
19.5 MAC ADDRESS FUNCTION EXTENSION ....................................................................... |
166 |
19.5.1 MAC Address Binding................................................................................ |
166 |
19.6 MAC NOTIFICATION CONFIGURATION ......................................................................... |
168 |
19.6.1 Introduction to MAC Notification............................................................... |
168 |
19.6.2 MAC Notification Configuration ................................................................ |
168 |
19.6.3 MAC Notification Example ......................................................................... |
170 |
19.6.4 MAC Notification Troubleshooting............................................................ |
170 |
CHAPTER 20 MSTP CONFIGURATION ......................................................... |
171 |
20.1 INTRODUCTION TO MSTP........................................................................................... |
171 |
20.1.1 MSTP Region .............................................................................................. |
171 |
20.1.2 Port Roles.................................................................................................... |
173 |
20.1.3 MSTP Load Balance ................................................................................... |
173 |
20.2 MSTP CONFIGURATION TASK LIST ............................................................................. |
173 |
20.3 MSTP EXAMPLE ....................................................................................................... |
177 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
5
20.4 MSTP TROUBLESHOOTING ........................................................................................ |
182 |
CHAPTER 21 QOS CONFIGURATION........................................................... |
183 |
21.1 INTRODUCTION TO QOS ............................................................................................. |
183 |
21.1.1 QoS Terms................................................................................................... |
183 |
21.1.2 QoS Implementation................................................................................... |
184 |
21.1.3 Basic QoS Model ........................................................................................ |
185 |
21.2 QOS CONFIGURATION TASK LIST ............................................................................... |
188 |
21.3 QOS EXAMPLE ......................................................................................................... |
193 |
21.4 QOS TROUBLESHOOTING .......................................................................................... |
195 |
CHAPTER 22 FLOW-BASED REDIRECTION ................................................ |
196 |
22.1 INTRODUCTION TO FLOW-BASED REDIRECTION ............................................................ |
196 |
22.2 FLOW-BASED REDIRECTION CONFIGURATION TASK SEQUENCE .................................... |
196 |
22.3 FLOW-BASED REDIRECTION EXAMPLES ...................................................................... |
197 |
22.4 FLOW-BASED REDIRECTION TROUBLESHOOTING HELP ................................................ |
197 |
CHAPTER 23 FLEXIBLE QINQ CONFIGURATION........................................ |
198 |
23.1 INTRODUCTION TO FLEXIBLE QINQ ............................................................................. |
198 |
23.1.1 QinQ Technique .......................................................................................... |
198 |
23.1.2 Basic QinQ .................................................................................................. |
198 |
23.1.3 Flexible QinQ .............................................................................................. |
198 |
23.2 FLEXIBLE QINQ CONFIGURATION TASK LIST ............................................................... |
198 |
23.3 FLEXIBLE QINQ EXAMPLE.......................................................................................... |
200 |
23.4 FLEXIBLE QINQ TROUBLESHOOTING........................................................................... |
202 |
CHAPTER 24 LAYER 3 MANAGEMENT CONFIGURATION ......................... |
203 |
24.1 LAYER 3 MANAGEMENT INTERFACE ............................................................................ |
203 |
24.1.1 Introduction to Layer 3 Management Interface ........................................ |
203 |
24.1.2 Layer 3 Interface Configuration Task List ................................................ |
203 |
24.2 IP CONFIGURATION ................................................................................................... |
204 |
24.2.1 Introduction to IPv4, IPv6........................................................................... |
204 |
24.2.2 IP Configuration.......................................................................................... |
206 |
24.2.3 IPv6 Troubleshooting ................................................................................. |
208 |
24.3 STATIC ROUTE .......................................................................................................... |
208 |
24.3.1 Introduction to Static Route....................................................................... |
208 |
24.3.2 Introduction to Default Route .................................................................... |
208 |
24.3.3 Static Route Configuration Task List ........................................................ |
209 |
24.3.4 Static Route Configuration Examples....................................................... |
209 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
6
24.4 ARP ........................................................................................................................ |
210 |
24.4.1 Introduction to ARP .................................................................................... |
210 |
24.4.2 ARP Configuration Task List...................................................................... |
210 |
24.4.3 ARP Troubleshooting ................................................................................. |
210 |
CHAPTER 25 ARP SCANNING PREVENTION FUNCTION CONFIGURATION |
|
........................................................................................................................ |
211 |
25.1 INTRODUCTION TO ARP SCANNING PREVENTION FUNCTION ......................................... |
211 |
25.2 ARP SCANNING PREVENTION CONFIGURATION TASK SEQUENCE.................................. |
211 |
25.3 ARP SCANNING PREVENTION TYPICAL EXAMPLES ...................................................... |
213 |
25.4 ARP SCANNING PREVENTION TROUBLESHOOTING HELP.............................................. |
214 |
CHAPTER 26 PREVENT ARP SPOOFING CONFIGURATION ...................... |
215 |
26.1 OVERVIEW ................................................................................................................ |
215 |
26.1.1 ARP (Address Resolution Protocol).......................................................... |
215 |
26.1.2 ARP Spoofing.............................................................................................. |
215 |
26.1.3 How to prevent void ARP Spoofing........................................................... |
215 |
26.2 PREVENT ARP SPOOFING CONFIGURATION ................................................................. |
216 |
26.3 PREVENT ARP SPOOFING EXAMPLE........................................................................... |
217 |
CHAPTER 27 ARP GUARD CONFIGURATION ............................................. |
219 |
27.1 INTRODUCTION TO ARP GUARD ............................................................................... |
219 |
27.2 ARP GUARD CONFIGURATION TASK LIST ................................................................. |
220 |
CHAPTER 28 GRATUITOUS ARP CONFIGURATION ................................... |
221 |
28.1 INTRODUCTION TO GRATUITOUS ARP ......................................................................... |
221 |
28.2 GRATUITOUS ARP CONFIGURATION TASK LIST............................................................ |
221 |
28.3 GRATUITOUS ARP CONFIGURATION EXAMPLE............................................................. |
222 |
28.4 GRATUITOUS ARP TROUBLESHOOTING....................................................................... |
222 |
CHAPTER 29 DHCP CONFIGURATION......................................................... |
224 |
29.1 INTRODUCTION TO DHCP .......................................................................................... |
224 |
29.2 DHCP SERVER CONFIGURATION ................................................................................ |
225 |
29.3 DHCP RELAY CONFIGURATION .................................................................................. |
227 |
29.4 DHCP CONFIGURATION EXAMPLES ............................................................................ |
229 |
29.5 DHCP TROUBLESHOOTING........................................................................................ |
232 |
CHAPTER 30 DHCPV6 CONFIGURATION .................................................... |
234 |
30.1 INTRODUCTION TO DHCPV6 ...................................................................................... |
234 |
30.2 DHCPV6 SERVER CONFIGURATION ............................................................................ |
235 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
7
30.3 DHCPV6 RELAY DELEGATION CONFIGURATION........................................................... |
237 |
30.4 DHCPV6 PREFIX DELEGATION SERVER CONFIGURATION ............................................. |
237 |
30.5 DHCPV6 PREFIX DELEGATION CLIENT CONFIGURATION .............................................. |
239 |
30.6 DHCPV6 CONFIGURATION EXAMPLES ........................................................................ |
240 |
30.7 DHCPV6 TROUBLESHOOTING .................................................................................... |
242 |
CHAPTER 31 DHCP OPTION 82 CONFIGURATION ..................................... |
243 |
31.1 INTRODUCTION TO DHCP OPTION 82 .......................................................................... |
243 |
31.1.1 DHCP option 82 Message Structure.......................................................... |
243 |
31.1.2 option 82 Working Mechanism .................................................................. |
244 |
31.2 DHCP OPTION 82 CONFIGURATION TASK LIST ............................................................ |
245 |
31.3 DHCP OPTION 82 APPLICATION EXAMPLES ................................................................ |
248 |
31.4 DHCP OPTION 82 TROUBLESHOOTING ....................................................................... |
250 |
CHAPTER 32 DHCP OPTION 60 AND OPTION 43........................................ |
251 |
32.1 DHCPV6 OPTION 60 AND OPTION 43 EXAMPLE ........................................................... |
252 |
32.2 DHCP OPTION 60 AND OPTION 43 TROUBLESHOOTING ................................................ |
252 |
CHAPTER 33 DHCPV6 OPTION37, 38........................................................... |
253 |
33.1 INTRODUCTION TO DHCPV6 OPTION37, 38 ................................................................. |
253 |
33.2 DHCPV6 OPTION37, 38 CONFIGURATION TASK LIST ................................................... |
253 |
33.3 DHCPV6 OPTION37, 38 EXAMPLES............................................................................ |
259 |
33.3.1 DHCPv6 Snooping option37, 38 Example ................................................ |
259 |
33.3.2 DHCPv6 Relay option37, 38 Example ....................................................... |
261 |
33.4 DHCPV6 OPTION37, 38 TROUBLESHOOTING .............................................................. |
262 |
CHAPTER 34 DHCP SNOOPING CONFIGURATION..................................... |
263 |
34.1 INTRODUCTION TO DHCP SNOOPING .......................................................................... |
263 |
34.2 DHCP SNOOPING CONFIGURATION TASK SEQUENCE .................................................. |
264 |
34.3 DHCP SNOOPING TROUBLESHOOTING HELP .............................................................. |
269 |
34.3.1 Monitor and Debug Information ................................................................ |
269 |
34.3.2 DHCP Snooping Troubleshooting Help .................................................... |
270 |
CHAPTER 35 DHCP SNOOPING OPTION 82 CONFIGURATION ................. |
271 |
35.1 INTRODUCTION TO DHCP SNOOPING OPTION 82 ......................................................... |
271 |
35.1.1 DHCP Snooping option 82 Working Mechanism ..................................... |
272 |
35.1.2 DHCP Snooping option 82 Configuration Task List ................................ |
273 |
35.2 DHCP SNOOPING OPTION 82 APPLICATION EXAMPLES................................................ |
274 |
35.3 DHCP SNOOPING OPTION 82 TROUBLESHOOTING ....................................................... |
275 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
8
CHAPTER 36 IPV4 MULTICAST PROTOCOL ............................................... |
276 |
36.1 IPV4 MULTICAST PROTOCOL OVERVIEW ..................................................................... |
276 |
36.1.1 Introduction to Multicast............................................................................ |
276 |
36.1.2 Multicast Address....................................................................................... |
276 |
36.1.3 IP Multicast Packet Transmission ............................................................. |
278 |
36.1.4 IP Multicast Application ............................................................................. |
278 |
36.2 DCSCM................................................................................................................... |
279 |
36.2.1 Introduction to DCSCM .............................................................................. |
279 |
36.2.2 DCSCM Configuration Task List................................................................ |
279 |
36.2.3 DCSCM Configuration Examples .............................................................. |
282 |
36.2.4 DCSCM Troubleshooting ........................................................................... |
283 |
36.3 IGMP SNOOPING ...................................................................................................... |
283 |
36.3.1 Introduction to IGMP Snooping................................................................. |
283 |
36.3.2 IGMP Snooping Configuration Task List .................................................. |
284 |
36.3.3 IGMP Snooping Examples ......................................................................... |
286 |
36.3.4 IGMP Snooping Troubleshooting .............................................................. |
288 |
CHAPTER 37 IPV6 MULTICAST PROTOCOL ............................................... |
289 |
37.1 MLD SNOOPING........................................................................................................ |
289 |
37.1.1 Introduction to MLD Snooping .................................................................. |
289 |
37.1.2 MLD Snooping Configuration Task ........................................................... |
289 |
37.1.3 MLD Snooping Examples........................................................................... |
291 |
37.1.4 MLD Snooping Troubleshooting ............................................................... |
294 |
CHAPTER 38 MULTICAST VLAN .................................................................. |
295 |
38.1 INTRODUCTIONS TO MULTICAST VLAN ....................................................................... |
295 |
38.2 MULTICAST VLAN CONFIGURATION TASK LIST ........................................................... |
295 |
38.3 MULTICAST VLAN EXAMPLES.................................................................................... |
296 |
CHAPTER 39 ACL CONFIGURATION............................................................ |
299 |
39.1 INTRODUCTION TO ACL ............................................................................................. |
299 |
39.1.1 Access-list................................................................................................... |
299 |
39.1.2 Access-group.............................................................................................. |
299 |
39.1.3 Access-list Action and Global Default Action .......................................... |
299 |
39.2 ACL CONFIGURATION TASK LIST................................................................................ |
300 |
39.3 ACL EXAMPLE.......................................................................................................... |
313 |
39.4 ACL TROUBLESHOOTING........................................................................................... |
317 |
CHAPTER 40 802.1X CONFIGURATION ....................................................... |
319 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
9
40.1 INTRODUCTION TO 802.1X.......................................................................................... |
319 |
40.1.1 The Authentication Structure of 802.1x .................................................... |
319 |
40.1.2 The Work Mechanism of 802.1x................................................................. |
321 |
40.1.3 The Encapsulation of EAPOL Messages .................................................. |
322 |
40.1.4 The Encapsulation of EAP Attributes ....................................................... |
324 |
40.1.5 The Authentication Methods of 802.1x ..................................................... |
324 |
40.1.6 The Extension and Optimization of 802.1x............................................... |
329 |
40.1.7 The Features of VLAN Allocation .............................................................. |
330 |
40.2 802.1X CONFIGURATION TASK LIST ............................................................................ |
331 |
40.3 802.1X APPLICATION EXAMPLE .................................................................................. |
334 |
40.3.1 Examples of Guest Vlan Applications ...................................................... |
334 |
40.3.2 Examples of IPv4 Radius Applications ..................................................... |
337 |
40.3.3 Examples of IPv6 Radius Application....................................................... |
338 |
40.4 802.1X TROUBLESHOOTING ....................................................................................... |
339 |
CHAPTER 41 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN |
|
PORT, VLAN CONFIGURATION..................................................................... |
340 |
41.1INTRODUCTION TO THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN 340
41.2THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN CONFIGURATION TASK
SEQUENCE ....................................................................................................................... |
341 |
41.3 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN TYPICAL EXAMPLES |
|
........................................................................................................................................ |
343 |
41.4 THE NUMBER LIMITATION FUNCTION OF MAC AND IP IN PORT, VLAN TROUBLESHOOTING |
|
HELP ............................................................................................................................... |
344 |
CHAPTER 42 OPERATIONAL CONFIGURATION OF AM FUNCTION.......... |
345 |
42.1 INTRODUCTION TO AM FUNCTION ............................................................................... |
345 |
42.2 AM FUNCTION CONFIGURATION TASK LIST ................................................................. |
345 |
42.3 AM FUNCTION EXAMPLE............................................................................................ |
347 |
42.4 AM FUNCTION TROUBLESHOOTING ............................................................................ |
347 |
CHAPTER 43 SECURITY FEATURE CONFIGURATION ............................... |
348 |
43.1 INTRODUCTION TO SECURITY FEATURE ....................................................................... |
348 |
43.2 SECURITY FEATURE CONFIGURATION.......................................................................... |
348 |
43.2.1 Prevent IP Spoofing Function Configuration Task Sequence ................ |
348 |
43.2.2 Prevent ICMP Fragment Attack Function Configuration Task Sequence |
|
................................................................................................................................ |
348 |
CHAPTER 44 TACACS+ CONFIGURATION .................................................. |
350 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
10
44.1 INTRODUCTION TO TACACS+.................................................................................... |
350 |
44.2 TACACS+ CONFIGURATION TASK LIST ...................................................................... |
350 |
44.3 TACACS+ SCENARIOS TYPICAL EXAMPLES ............................................................... |
351 |
44.4 TACACS+ TROUBLESHOOTING ................................................................................. |
352 |
CHAPTER 45 RADIUS CONFIGURATION ..................................................... |
353 |
45.1 INTRODUCTION TO RADIUS....................................................................................... |
353 |
45.1.1 AAA and RADIUS Introduction .................................................................. |
353 |
45.1.2 Message structure for RADIUS ................................................................. |
353 |
45.2 RADIUS CONFIGURATION TASK LIST ......................................................................... |
355 |
45.3 RADIUS TYPICAL EXAMPLES .................................................................................... |
357 |
45.3.1 IPv4 Radius Example.................................................................................. |
357 |
45.3.2 IPv6 RadiusExample................................................................................... |
358 |
45.4 RADIUS TROUBLESHOOTING .................................................................................... |
358 |
CHAPTER 46 SSL CONFIGURATION............................................................ |
360 |
46.1 INTRODUCTION TO SSL.............................................................................................. |
360 |
46.1.1 Basic Element of SSL................................................................................. |
360 |
46.2 SSL CONFIGURATION TASK LIST ................................................................................ |
361 |
46.3 SSL TYPICAL EXAMPLE............................................................................................. |
362 |
46.4 SSL TROUBLESHOOTING ........................................................................................... |
363 |
CHAPTER 47 IPV6 SECURITY RA CONFIGURATION .................................. |
365 |
47.1 INTRODUCTION TO IPV6 SECURITY RA........................................................................ |
365 |
47.2 IPV6 SECURITY RA CONFIGURATION TASK SEQUENCE ................................................ |
365 |
47.3 IPV6 SECURITY RA TYPICAL EXAMPLES ..................................................................... |
366 |
47.4 IPV6 SECURITY RA TROUBLESHOOTING HELP ............................................................ |
366 |
CHAPTER 48 MAB CONFIGURATION........................................................... |
368 |
48.1 INTRODUCTION TO MAB ............................................................................................ |
368 |
48.2 MAB CONFIGURATION TASK LIST............................................................................... |
368 |
48.3 MAB EXAMPLE......................................................................................................... |
370 |
48.4 MAB TROUBLESHOOTING.......................................................................................... |
372 |
CHAPTER 49 PPPOE INTERMEDIATE AGENT CONFIGURATION .............. |
373 |
49.1 INTRODUCTION TO PPPOE INTERMEDIATE AGENT........................................................ |
373 |
49.1.1 Brief Introduction to PPPoE ...................................................................... |
373 |
49.1.2 Introduction to PPPoE IA ........................................................................... |
373 |
49.2 PPPOE INTERMEDIATE AGENT CONFIGURATION TASK LIST .......................................... |
377 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
11
49.3 PPPOE INTERMEDIATE AGENT TYPICAL APPLICATION ................................................. |
378 |
49.4 PPPOE INTERMEDIATE AGENT TROUBLESHOOTING ..................................................... |
380 |
CHAPTER 50 WEB PORTAL CONFIGURATION ........................................... |
381 |
50.1 INTRODUCTION TO WEB PORTAL AUTHENTICATION ...................................................... |
381 |
50.2 WEB PORTAL AUTHENTICATION CONFIGURATION TASK LIST......................................... |
381 |
50.3 WEB PORTAL AUTHENTICATION TYPICAL EXAMPLE ..................................................... |
383 |
50.4 WEB PORTAL AUTHENTICATION TROUBLESHOOTING.................................................... |
384 |
CHAPTER 51 VLAN-ACL CONFIGURATION................................................. |
385 |
51.1 INTRODUCTION TO VLAN-ACL .................................................................................. |
385 |
51.2 VLAN-ACL CONFIGURATION TASK LIST..................................................................... |
385 |
51.3 VLAN-ACL CONFIGURATION EXAMPLE...................................................................... |
386 |
51.4 VLAN-ACL TROUBLESHOOTING................................................................................ |
388 |
CHAPTER 52 SAVI CONFIGURATION........................................................... |
389 |
52.1 INTRODUCTION TO SAVI ............................................................................................ |
389 |
52.2 SAVI CONFIGURATION............................................................................................... |
389 |
52.3 SAVI TYPICAL APPLICATION ...................................................................................... |
393 |
52.4 SAVI TROUBLESHOOTING.......................................................................................... |
394 |
CHAPTER 53 MRPP CONFIGURATION......................................................... |
396 |
53.1 INTRODUCTION TO MRPP .......................................................................................... |
396 |
53.1.1 Conception Introduction ............................................................................ |
396 |
53.1.2 MRPP Protocol Packet Types .................................................................... |
397 |
53.1.3 MRPP Protocol Operation System ............................................................ |
398 |
53.2 MRPP CONFIGURATION TASK LIST............................................................................. |
399 |
53.3 MRPP TYPICAL SCENARIO ........................................................................................ |
401 |
53.4 MRPP TROUBLESHOOTING........................................................................................ |
403 |
CHAPTER 54 ULPP CONFIGURATION ......................................................... |
404 |
54.1 INTRODUCTION TO ULPP ........................................................................................... |
404 |
54.2 ULPP CONFIGURATION TASK LIST ............................................................................. |
406 |
54.3 ULPP TYPICAL EXAMPLES ........................................................................................ |
408 |
54.3.1 ULPP Typical Example1 ............................................................................. |
408 |
54.3.2 ULPP Typical Example2 ............................................................................. |
410 |
54.4 ULPP TROUBLESHOOTING ........................................................................................ |
411 |
CHAPTER 55 ULSM CONFIGURATION......................................................... |
413 |
55.1 INTRODUCTION TO ULSM .......................................................................................... |
413 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
12
55.2 ULSM CONFIGURATION TASK LIST............................................................................. |
414 |
55.3 ULSM TYPICAL EXAMPLE ......................................................................................... |
415 |
55.4 ULSM TROUBLESHOOTING........................................................................................ |
416 |
CHAPTER 56 MIRROR CONFIGURATION .................................................... |
417 |
56.1 INTRODUCTION TO MIRROR ........................................................................................ |
417 |
56.2 MIRROR CONFIGURATION TASK LIST........................................................................... |
417 |
56.3 MIRROR EXAMPLES ................................................................................................... |
418 |
56.4 DEVICE MIRROR TROUBLESHOOTING .......................................................................... |
419 |
CHAPTER 57 SFLOW CONFIGURATION...................................................... |
420 |
57.1 INTRODUCTION TO SFLOW.......................................................................................... |
420 |
57.2 SFLOW CONFIGURATION TASK LIST ............................................................................ |
420 |
57.3 SFLOW EXAMPLES .................................................................................................... |
422 |
57.4 SFLOW TROUBLESHOOTING ....................................................................................... |
423 |
CHAPTER 58 RSPAN CONFIGURATION....................................................... |
424 |
58.1 INTRODUCTION TO RSPAN ........................................................................................ |
424 |
58.2 RSPAN CONFIGURATION TASK LIST........................................................................... |
426 |
58.3 TYPICAL EXAMPLES OF RSPAN................................................................................. |
427 |
58.4 RSPAN TROUBLESHOOTING...................................................................................... |
430 |
CHAPTER 59 ERSPAN................................................................................... |
431 |
59.1 INTRODUCTION TO ERSPAN...................................................................................... |
431 |
59.2 ERSPAN CONFIGURATION TASK LIST ........................................................................ |
431 |
59.3 TYPICAL EXAMPLES OF ERSPAN .............................................................................. |
432 |
59.4 ERSPAN TROUBLESHOOTING ................................................................................... |
434 |
CHAPTER 60 SNTP CONFIGURATION ......................................................... |
435 |
60.1 INTRODUCTION TO SNTP ........................................................................................... |
435 |
60.2 TYPICAL EXAMPLES OF SNTP CONFIGURATION........................................................... |
436 |
CHAPTER 61 NTP FUNCTION CONFIGURATION ........................................ |
437 |
61.1 INTRODUCTION TO NTP FUNCTION.............................................................................. |
437 |
61.2 NTP FUNCTION CONFIGURATION TASK LIST ................................................................ |
437 |
61.3 TYPICAL EXAMPLES OF NTP FUNCTION ...................................................................... |
440 |
61.4 NTP FUNCTION TROUBLESHOOTING ........................................................................... |
440 |
CHAPTER 62 SUMMER TIME CONFIGURATION ......................................... |
442 |
62.1 INTRODUCTION TO SUMMER TIME ............................................................................... |
442 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
13
62.2 SUMMER TIME CONFIGURATION TASK SEQUENCE ........................................................ |
442 |
62.3 EXAMPLES OF SUMMER TIME ..................................................................................... |
442 |
62.4 SUMMER TIME TROUBLESHOOTING............................................................................. |
443 |
CHAPTER 63 DNSV4/V6 CONFIGURATION.................................................. |
444 |
63.1 INTRODUCTION TO DNS ............................................................................................. |
444 |
63.2 DNSV4/V6 CONFIGURATION TASK LIST ...................................................................... |
445 |
63.3 TYPICAL EXAMPLES OF DNS ..................................................................................... |
447 |
63.4 DNS TROUBLESHOOTING .......................................................................................... |
448 |
CHAPTER 64 MONITOR AND DEBUG .......................................................... |
450 |
64.1 PING ........................................................................................................................ |
450 |
64.2 PING6 ...................................................................................................................... |
450 |
64.3 TRACEROUTE............................................................................................................ |
450 |
64.4 TRACEROUTE6.......................................................................................................... |
451 |
64.5 SHOW ...................................................................................................................... |
451 |
64.6 DEBUG ..................................................................................................................... |
452 |
64.7 SYSTEM LOG............................................................................................................. |
452 |
64.7.1 System Log Introduction ........................................................................... |
452 |
64.7.2 System Log Configuration......................................................................... |
455 |
64.7.3 System Log Configuration Example ......................................................... |
456 |
CHAPTER 65 RELOAD SWITCH AFTER SPECIFIED TIME.......................... |
457 |
65.1 INTRODUCE TO RELOAD SWITCH AFTER SPECIFID TIME ................................................ |
457 |
65.2 RELOAD SWITCH AFTER SPECIFID TIME TASK LIST ...................................................... |
457 |
CHAPTER 66 DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED |
|
AND SENT BY CPU........................................................................................ |
458 |
66.1 INTRODUCTION TO DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND SENT BY |
|
CPU ................................................................................................................................ |
458 |
66.2 DEBUGGING AND DIAGNOSIS FOR PACKETS RECEIVED AND SENT BY CPU TASK LIST .... |
458 |
CHAPTER 67 DYING GASP CONFIGURATION............................................. |
459 |
67.1 INTRODUCTION TO DYING GASP................................................................................... |
459 |
67.2 DYING GASP TYPICAL EXAMPLES ................................................................................ |
459 |
67.3 DYING GASP TROUBLESHOOTING ................................................................................ |
459 |
CHAPTER 68 POE CONFIGURATION ........................................................... |
460 |
68.1 INTRODUCTION TO POE ............................................................................................. |
460 |
68.2 POE CONFIGURATION ................................................................................................ |
460 |
+7(495) 797-3311 www.qtech.ru |
|
Москва, Новозаводская ул., 18, стр. 1 |
|
14
68.3 TYPICAL APPLICATION OF POE................................................................................... |
462 |
68.4 POE TROUBLESHOOTING HELP .................................................................................. |
463 |
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
15
After purchasing the switch, the user needs to configure the switch for network management. Switch provides two management options: in-band management and out-of-band management.
Out-of-band management is the management through Console interface. Generally, the user will use out-of-band management for the initial switch configuration, or when in-band management is not available. For instance, the user must assign an IP address to the switch via the Console interface to be able to access the switch through Telnet.
The procedures for managing the switch via Console interface are listed below: Step 1: setting up the environment:
Connect with serial port
Out-of-band Management Configuration Environment
As shown in above, the serial port (RS-232) is connected to the switch with the serial cable provided. The table below lists all the devices used in the connection.
|
Device Name |
|
|
Description |
|
|
|
|
|
||
|
PC machine |
|
|
Has functional keyboard and RS-232, with terminal emulator |
|
|
|
|
|
installed, such as HyperTerminal included in Windows |
|
|
|
|
|
9x/NT/2000/XP. |
|
|
Serial port cable |
|
|
One end attach to the RS-232 serial port, the other end to the |
|
|
|
|
|
Console port. |
|
|
Switch |
|
|
Functional Console port required. |
|
Step 2: Entering the HyperTerminal
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
16
Open the HyperTerminal included in Windows after the connection established. The example below is based on the HyperTerminal included in Windows XP.
Click Start menu - All Programs -Accessories -Communication - HyperTerminal.
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
17
Opening Hyper Terminal
Type a name for opening HyperTerminal, such as “Switch”.
Opening HyperTerminal
In the “Connecting using” drop-list, select the RS-232 serial port used by the PC, e.g. COM1, and click “OK”.
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
18
Opening HyperTerminal
COM1 property appears, select “9600” for “Baud rate”, “8” for “Data bits”, “none” for “Parity checksum”, “1” for stop bit and “none” for traffic control; or, you can also click “Restore default” and click “OK”.
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
19
Opening HyperTerminal
Step 3: Entering switch CLI interface
Power on the switch, the following appears in the HyperTerminal windows, that is the CLI
configuration mode for Switch.
Testing RAM...
0x077C0000 RAM OK
Loading MiniBootROM...
Attaching to file system ...
Loading nos.img ... done.
Booting......
Starting at 0x10000...
Attaching to file system ...
……
--- Performing Power-On Self Tests (POST) ---
DRAM Test.................... |
PASS! |
|
PCI |
Device 1 Test............ |
PASS! |
FLASH Test................... |
PASS! |
|
FAN |
Test..................... |
PASS! |
Done All Pass.
------------------ DONE ---------------------
Current time is SUN JAN 01 00:00:00 2006
……
Switch>
The user can now enter commands to manage the switch. For a detailed description for the commands, please refer to the following chapters.
In-band management refers to the management by login to the switch using Telnet, or using HTTP, or using SNMP management software to configure the switch. In-band management enables management of the switch for some devices attached to the switch. In the case when in-band management fails due to switch configuration changes, out-of-band management can be used for configuring and managing the switch.
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
20
To manage the switch with Telnet, the following conditions should be met: 1. Switch has an IPv4/IPv6 address configured;
The host IP address (Telnet client) and the switch’s VLAN interface IPv4/IPv6 address is in the same network segment;
If 2. is not met, Telnet client can connect to an IPv4/IPv6 address of the switch via other devices, such as a router.
The switch is a Layer 2 switch that can be configured with several IP addresses, the configuration method refers to the relative chapter. The following example assumes the shipment status of the switch where only VLAN1 exists in the system.
The following describes the steps for a Telnet client to connect to the switch’s VLAN1 interface by Telnet(IPV4 address example):
Connected with cable
Manage the switch by Telnet
Step 1: Configure the IP addresses for the switch and start the Telnet Server function on the switch.
First is the configuration of host IP address. This should be within the same network segment as the switch VLAN1 interface IP address. Suppose the switch VLAN1 interface IP address is
10.1.128.251/24. Then, a possible host IP address is 10.1.128.252/24. Run “ping 10.1.128.251” from the host and verify the result, check for reasons if ping failed.
The IP address configuration commands for VLAN1 interface are listed below. Before in-band management, the switch must be configured with an IP address by out-of-band management (i.e. Console mode), the configuration commands are as follows (All switch configuration prompts are assumed to be “Switch” hereafter if not otherwise specified):
Switch>
Switch>enable
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
21
Switch#config Switch(config)#interface vlan 1
Switch(Config-if-Vlan1)#ip address 10.1.128.251 255.255.255.0 Switch(Config-if-Vlan1)#no shutdown
To enable the Telnet Server function, users should type the CLI command telnet-server enable in the global mode as below:
Switch>enable
Switch#config
Switch(config)# telnet-server enable
Step 2: Run Telnet Client program.
Run Telnet client program included in Windows with the specified Telnet target.
Run telnet client program included in Windows
Step 3: Login to the switch.
Login to the Telnet configuration interface. Valid login name and password are required, otherwise the switch will reject Telnet access. This is a method to protect the switch from unauthorized access. As a result, when Telnet is enabled for configuring and managing the switch, username and password for authorized Telnet users must be configured with the following command: username <username> privilege <privilege> [password (0|7) <password>]. To open the local authentication style with the following command: authentication line vty login local. Privilege option must exist and just is 15. Assume an authorized user in the switch has a username of “test”, and password of “test”, the configuration procedure should like the following:
Switch>enable
Switch#config
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
22
Switch(config)#username test privilege 15 password 0 test Switch(config)#authentication line vty login local
Enter valid login name and password in the Telnet configuration interface, Telnet user will be able to enter the switch’s CLI configuration interface. The commands used in the Telnet CLI interface after login is the same as that in the Console interface.
Telnet Configuration Interface
To manage the switch via HTTP, the following conditions should be met: 1. Switch has an IPv4/IPv6 address configured;
The host IPv4/IPv6 address (HTTP client) and the switch’s VLAN interface IPv4/IPv6 address are in the same network segment;
If 2. is not met, HTTP client should connect to an IPv4/IPv6 address of the switch via other devices, such as a router.
Similar to management the switch via Telnet, as soon as the host succeeds to ping/ping6 an IPv4/IPv6 address of the switch and to type the right login password, it can access the switch via HTTP. The configuration list is as below:
Step 1: Configure the IP addresses for the switch and start the HTTP server function on the switch.
For configuring the IP address on the switch through out-of-band management, see the telnet
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
23
management chapter.
To enable the WEB configuration, users should type the CLI command IP http server in the global mode as below:
Switch>enable
Switch#config Switch(config)#ip http server
Step 2: Run HTTP protocol on the host.
Open the Web browser on the host and type the IP address of the switch, or run directly the HTTP protocol on the Windows. For example, the IP address of the switch is “10.1.128.251”;
Run HTTP Protocol
When accessing a switch with IPv6 address, it is recommended to use the Firefox browser with 1.5 or later version. For example, if the IPv6 address of the switch is 3ffe:506:1:2::3. Input the IPv6 address of the switch is http://[3ffe:506:1:2::3] and the address should draw together with the square brackets.
Step 3: Login to the switch.
Login to the Web configuration interface. Valid login name and password are required, otherwise the switch will reject HTTP access. This is a method to protect the switch from unauthorized access. As a result, when Telnet is enabled for configuring and managing the switch, username and password for authorized Telnet users must be configured with the following command: username <username> privilege <privilege> [password (0|7) <password>]. To open the local authentication style with the following command: authentication line web login local. Privilege option must exist and just is 15. Assume an authorized user in the switch has a username of “admin”, and password of “admin”, the configuration procedure should like the following:
Switch>enable
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
24
Switch#config
Switch(config)#username admin privilege 15 password 0 admin Switch(config)#authentication line web login local
The Web login interface of QSW3400-28T-POE is as below:
Web Login Interface
Input the right username and password, and then the main Web configuration interface is shown as below.
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
25
Main Web Configuration Interface
Notice: When configure the switch, the name of the switch is composed with English letters.
The necessities required by SNMP network management software to manage switches: 1. IP addresses are configured on the switch;
The IP address of the client host and that of the VLAN interface on the switch it subordinates to should be in the same segment;
If 2. is not met, the client should be able to reach an IP address of the switch through devices like routers;
SNMP should be enabled.
The host with SNMP network management software should be able to ping the IP address of the switch, so that, when running, SNMP network management software will be able to find it and implement read/write operation on it. Details about how to manage switches via SNMP network management software will not be covered in this manual, please refer to “Snmp network management software user manual”.
The switch provides thress management interface for users: CLI (Command Line Interface) interface, Web interface, Snmp netword management software. We will introduce the CLI interface and Web configuration interface in details, Web interface is familiar with CLI interface function and will not be covered, please refer to “Snmp network management software user manual”.
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
26
CLI interface is familiar to most users. As aforementioned, out-of-band management and Telnet login are all performed through CLI interface to manage the switch.
CLI Interface is supported by Shell program, which consists of a set of configuration commands. Those commands are categorized according to their functions in switch configuration and management. Each category represents a different configuration mode. The Shell for the switch is described below:
Configuration Modes
Configuration Syntax
Shortcut keys
Help function
Input verification
Fuzzy match support
Shell Configuration Modes
On entering the CLI interface, entering user entry system first. If as common user, it is defaulted to User Mode. The prompt shown is “Switch>“, the symbol “>“ is the prompt for User
Mode. When exit command is run under Admin Mode, it will also return to the User Mode. Under User Mode, no configuration to the switch is allowed, only clock time and version
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
27
information of the switch can be queries.
To Admin Mode sees the following: In user entry system, if as Admin user, it is defaulted to
Admin Mode. Admin Mode prompt “Switch#” can be entered under the User Mode by running the enable command and entering corresponding access levels admin user password, if a password has been set. Or, when exit command is run under Global Mode, it will also return to the Admin Mode. Switch also provides a shortcut key sequence "Ctrl+z”, this allows an easy way to exit to Admin Mode from any configuration mode (except User Mode).
Under Admin Mode, the user can query the switch configuration information, connection status and traffic statistics of all ports; and the user can further enter the Global Mode from Admin Mode to modify all configurations of the switch. For this reason, a password must be set for entering Admin mode to prevent unauthorized access and malicious modification to the switch.
Type the config command under Admin Mode will enter the Global Mode prompt
“Switch(config)#”. Use the exit command under other configuration modes such as Port Mode,
VLAN mode will return to Global Mode.
The user can perform global configuration settings under Global Mode, such as MAC Table, Port Mirroring, VLAN creation, IGMP Snooping start and STP, etc. And the user can go further to Port Mode for configuration of all the interfaces.
Use the interface command under Global Mode can enter the interface mode specified. Switch provides three interface type: 1. VLAN interface; 2. Ethernet port; 3. port-channel, accordingly the three interface configuration modes.
|
Interface Type |
|
|
Entry |
|
|
Operates |
|
|
Exit |
|
|
|
|
|
|
|
|
|
||||
|
VLAN |
|
|
Type interface vlan <Vlan- |
|
|
Configure switch IPs, |
|
|
Use the exit |
|
|
Interface |
|
|
id> command under Global |
|
|
etc |
|
|
command to return to |
|
|
|
|
|
Mode. |
|
|
|
|
|
Global Mode. |
|
|
Ethernet Port |
|
|
Type interface ethernet |
|
|
Configure supported |
|
|
Use the exit |
|
|
|
|
|
<interface-list> command |
|
|
duplex mode, speed, |
|
|
command to return to |
|
|
|
|
|
under Global Mode. |
|
|
etc. of Ethernet Port. |
|
|
Global Mode. |
|
|
port-channel |
|
|
Type interface port-channel |
|
|
Configure port-channel |
|
|
Use the exit |
|
|
|
|
|
<port-channel-number> |
|
|
related settings such |
|
|
command to return to |
|
|
|
|
|
command under Global |
|
|
as duplex mode, |
|
|
Global Mode. |
|
|
|
|
|
Mode. |
|
|
speed, etc. |
|
|
|
|
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
28
Using the vlan <vlan-id> command under Global Mode can enter the corresponding VLAN Mode. Under VLAN Mode the user can configure all member ports of the corresponding VLAN. Run the exit command to exit the VLAN Mode to Global Mode.
Type the ip dhcp pool <name> command under Global Mode will enter the DHCP Address
Pool Mode prompt “Switch(Config-<name>-dhcp)#”. DHCP address pool properties can be configured under DHCP Address Pool Mode. Run the exit command to exit the DHCP Address Pool Mode to Global Mode.
|
ACL type |
|
|
Entry |
|
|
Operates |
|
|
Exit |
|
|
|
|
|
|
|
|
|
||||
|
Standard IP |
|
|
Type ip access-list |
|
|
Configure parameters for |
|
|
Use the exit |
|
|
ACL Mode |
|
|
standard command under |
|
|
Standard IP ACL Mode. |
|
|
command to return |
|
|
|
|
|
Global Mode. |
|
|
|
|
|
to Global Mode. |
|
|
Extended IP |
|
|
Type ip access-list |
|
|
Configure parameters for |
|
|
Use the exit |
|
|
ACL Mode |
|
|
extanded command under |
|
|
Extended IP ACL Mode. |
|
|
command to return |
|
|
|
|
|
Global Mode. |
|
|
|
|
|
to Global Mode. |
|
Switch provides various configuration commands. Although all the commands are different, they all abide by the syntax for Switch configuration commands. The general commands format of Switch is shown below:
cmdtxt <variable> {enum1 | … | enumN } [option1 | … | optionN]
Conventions: cmdtxt in bold font indicates a command keyword; <variable> indicates a variable parameter; {enum1 | … | enumN } indicates a mandatory parameter that should be selected from the parameter set enum1~enumN; and the square bracket ([ ]) in [option1 | … | optionN] indicate an optional parameter. There may be combinations of “< >“, “{ }” and “[ ]” in the command line, such as [<variable>], {enum1 <variable>| enum2}, [option1 [option2]], etc.
Here are examples for some actual configuration commands:
show version, no parameters required. This is a command with only a keyword and no parameter, just type in the command to run.
vlan <vlan-id>, parameter values are required after the keyword.
+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
29