Smc 9712G Software Configuraton Guide

TigerChassis 10/100/1000
14-Slot Multilayer Chassis Switch
IP routing with RIP and OSPF support
Optional blades include 10BASE-T/100BASE-TX, 100BASE-FX,
1000BASE-SX/LX, 10/100/1000BASE-T, GBIC
12 slots available for media expansion
24 Gbps switch fabric for non-blocking switching performance
Security features to prevent intruder access and ensure a safe network
environment
QoS support for IEEE 802.1p priority
IGMP and DVMRP multicast support
Optional redundant power, fan, and switch fabric failover support
Manageable via console, web, SNMP/RMON
Supports CIDR, multinetting
Software Configuraton Guide
SMC9712G
TigerChassis 10/100/1000 Key Information Guide
From SMC’s Tiger line of feature-rich workgroup LAN solutions
38 Tesla Irvine, CA 92618 Phone: (949) 679-8000
February 2002
Pub. # 150200009100A R01
Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, nor for any infringements of patents or other rights of third parties which may result from its use. No license is granted by implication or otherwise under any patent or patent rights of SMC. SMC reserves the right to change specifications at any time without notice.
Copyright © 2002 by
SMC Networks, Inc.
38 Tesla
Irvine, CA 92618
All rights reserved. Printed in Taiwan
Trademarks:
SMC is a registered trademark; and TigerChassis is a trademarks of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders.
L
IMITED
Limited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, under normal use and service, for the applicable warranty term. All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller. SMC may, at its own discretion, repair or replace any product not operating as warranted with a similar or functionally equivalent product, during the applicable warranty term. SMC will endeavor to repair or replace any product returned under warranty within 30 days of receipt of the product.
The standard limited warranty can be upgraded to a Limited Lifetime* warranty by registering new products within 30 days of purchase from SMC or its Authorized Reseller. Registration can be accomplished via the enclosed product registration card or online via the SMC web site. Failure to register will not affect the standard limited warranty. The Limited Lifetime warranty covers a product during the Life of that Product, which is defined as the period of time during which the product is an “Active” SMC product. A product is considered to be “Active” while it is listed on the current SMC price list. As new technologies emerge, older technologies become obsolete and SMC will, at its discretion, replace an older product in its product line with one that incorporates these newer technologies. At that point, the obsolete product is discontinued and is no longer an “Active” SMC product. A list of discontinued products with their respective dates of discontinuance can be found at:
http://www.smc.com/index.cfm?action=customer_service_warranty.
All products that are replaced become the property of SMC. Replacement products may be either new or reconditioned. Any replaced or repaired product carries either a 30-day limited warranty or the remainder of the initial warranty, whichever is longer. SMC is not responsible for any custom software or firmware, configuration information, or memory data of Customer contained in, stored on, or integrated with any products returned to SMC pursuant to any warranty. Products returned to SMC should have any customer-installed accessory or add-on components, such as expansion modules, removed prior to returning the product for replacement. SMC is not responsible for these items if they are returned with the product.
Customers must contact SMC for a Return Material Authorization number prior to returning any product to SMC. Proof of purchase may be required. Any product returned to SMC without a valid Return Material Authorization (RMA) number clearly marked on the outside of the package will be returned to customers at customer’s expense. For warranty claims within North America, please call our toll-free customer support number at (800) 762-4968. Customers are responsible for all shipping charges from their facility to SMC. SMC is responsible for return shipping charges from SMC to customer.
WARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE PRODUCT IN QUESTION, AT SMC’S OPTION. THE FOREGOING WARRANTIES AND REMEDIES ARE EXCLUSIVE AND ARE IN LIEU OF ALL OTHER WARRANTIES OR CONDITIONS, EXPRESS OR IMPLIED, EITHER IN FACT OR BY OPERATION OF LAW, STATUTORY OR OTHERWISE, INCLUDING WARRANTIES OR CONDITIONS OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. SMC NEITHER ASSUMES NOR AUTHORIZES ANY OTHER PERSON TO ASSUME FOR IT ANY OTHER LIABILITY IN CONNECTION WITH THE SALE, INSTALLATION, MAINTENANCE OR USE OF ITS PRODUCTS. SMC SHALL NOT BE LIABLE UNDER THIS WARRANTY IF ITS TESTING AND EXAMINATION DISCLOSE THE ALLEGED DEFECT IN THE PRODUCT DOES NOT EXIST OR WAS CAUSED BY CUSTOMER’S OR ANY THIRD PERSON’S MISUSE, NEGLECT, IMPROPER INSTALLATION OR TESTING, UNAUTHORIZED ATTEMPTS TO REPAIR, OR ANY OTHER CAUSE BEYOND THE RANGE OF THE INTENDED USE, OR BY ACCIDENT, FIRE, LIGHTNING, OR OTHER HAZARD.
LIMITATION OF LIABILITY: IN NO EVENT, WHETHER BASED IN CONTRACT OR TORT (INCLUDING NEGLIGENCE), SHALL SMC BE LIABLE FOR INCIDENTAL, CONSEQUENTIAL, INDIRECT, SPECIAL, OR PUNITIVE DAMAGES OF ANY KIND, OR FOR LOSS OF REVENUE, LOSS OF BUSINESS, OR OTHER FINANCIAL LOSS ARISING OUT OF OR IN CONNECTION WITH THE SALE, INSTALLATION,
W
ARRANTY
i
L
IMITED WARRANTY
MAINTENANCE, USE, PERFORMANCE, FAILURE, OR INTERRUPTION OF ITS PRODUCTS, EVEN IF SMC OR ITS AUTHORIZED RESELLER HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES OR THE LIMITATION OF INCIDENTAL OR CONSEQUENTIAL DAMAGES FOR CONSUMER PRODUCTS, SO THE ABOVE LIMITATIONS AND EXCLUSIONS MAY NOT APPLY TO YOU. THIS WARRANTY GIVES YOU SPECIFIC LEGAL RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL BE TAKEN TO AFFECT YOUR STATUTORY RIGHTS.
* SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase.
SMC Networks, Inc.
38 Tesla
Irvine, CA 92618
ii
CONTENTS
ABOUT THIS GUIDE
Audience 15 Scope of this Guide 15 Using This Book 15
Finding Information 16 Command Information 17 Conventions 18 Switch SMC9712G Documentation 19
1 DEFAULT SOFTWARE CONFIGURATION
What is Management Software? 21 Summary of Software Features 22 Software Features Explained 23
Duplex Modes 23
Flow Control 23
Traffic Prioritization 23
Security 24
Aggregate Links 24
Broadcast Storm Control 25
Virtual LANs 25
Spanning Tree Protocol 25
IGMP Snooping 25
ARP and Proxy ARP 26
Routing Protocols 26
RMON 26
Roving Analysis 26
Management 27 Default Settings 28
2 PREPARING FOR SYSTEM MANAGEMENT
Methods of Managing a Switch 30 Web Interface Management 30
Accessing the Web Interface 31 CLI Management 32
Accessing the CLI 32
Accessing the CLI through the Console Port 32 Accessing the CLI Over the Network via Direct Telnet 33
Accessing the CLI Over the Network via Indirect Telnet 33 SNMP-Based Network Management 33 Connecting to the System 35
Quick Configuration Reference 35 Saving Configuration Values 35 Initial Access 35 Logging into the System 36 Terminating a Connection 36 Configuring User Names, Passwords and Community Strings 36
Configuring User Logins 37
Determining IP Information 38
Which IP Addresses to Use in Your Network 38
Subnet Masks 38
Default Gateway Router 39
Configuring IP Settings 39
Manual Configuration 39
Automatic Configuration 40
Configuring Access for SNMP Management 40
Using the Web Interface 41
Browser and Platform Requirements 41
Color Recommendations 41
Browser Support 41
Embedded Web Management Applications 42 Interface Description 42 Device View Tab 43
Using Configuration Wizards 44
Using the Device Image 45
Help View Tab 46
Using the Administration Console 47
Administration Console Menus 47 Using Menus to Perform Tasks 48
Selecting Menu Options 48
Navigating Through the Menus 49
Entering a Command String 49
Entering Abbreviated Commands 49
Recommendations for Entering Commands 49
Understanding the Values Presented 50
Including Values in Command Strings 50
Keystroke Functions 50
3 SYSTEM MANAGEMENT FEATURES
Basic Configuration Procedure 52
Configure the Management Module 52 Configure Each Interface Module 52
Setting Baselines 53
Important Considerations 53
Roving Analysis 54
Key Guidelines for Implementation 54 feature rovingAnalysis summary 55 feature rovingAnalysis add 56 feature rovingAnalysis remove 57 feature rovingAnalysis start 57 feature rovingAnalysis stop 58
Security Options 58
system management password 58 security device user summary 59 security device user create 59 security device user modify 59 security device user delete 60 security device access summary 60 security device access modify 60 system management remoteAccess 61 security network access portSecurity 61
Ping 63
protocol ip ping 63
Ping Responses 63
Strategies for Using Ping 63 Upgrading System Software 63 Resetting System Components 64
Reboot the System 64 Reset to Factory Defaults 64 Reset IP Information to Factory Defaults 64
Remote Monitoring (RMON) 65
Overview of RMON 65 RMON Benefits 65 RMON in Your System 66 Supported RMON-1 Groups 66
Statistics Group 66
History Groups 67
Alarm Group 67
Event Group 69
RMON-2 Groups 69
Simple Network Management Protocol (SNMP) 69
Manager/Agent Operation 69 SNMP Messages 70 Trap Reporting 70
Administering SNMP Trap Reporting 70
Supported Trap Reports 71
Interpreting NMM Trap Messages 71 CLI Command List 72
4 ETHERNET PORTS
Ethernet Overview 78
Features 78
Benefits 79
Link Bandwidths 79 Link Availability 79 Other Benefits 79
Key Concepts 80
Ethernet Packet Processing 81
Key Guidelines for Implementation 82
Link Bandwidths 82 Trun ks 82
Administering Ethernet Ports 83
physicalInterface ethernet summary 83 physicalInterface ethernet detail 85 physicalInterface ethernet portState 87 physicalInterface ethernet autoNegotiation 88 physicalInterface ethernet portMode 90 physicalInterface ethernet flowControl 91 physicalInterface ethernet portCapabilities 92
Standards, Protocols, and Related Reading 93
Ethernet Protocol 93 Media Specifications 93 Related Reading 94
5 LINK AGGREGATION
Link Aggregation Overview 96
Features 96 Benefits 96 Key Concepts 96
Port Numbering in a Trunk 96
Key Guidelines for Implementation 98
General Guidelines 98 Trunk Capacity Guidelines 99
Administering Aggregate Links 100
bridge linkAggregation summary 100 bridge linkAggregation detail 101 bridge linkAggregation modify addPort 102 bridge linkAggregation modify removePort 103 bridge linkAggregation modify linkState 104
Standards, Protocols, and Related Reading 104
6 BRIDGING
Bridging Overview 106
Benefits 106
Key Bridging Concepts 107
Learning Addresses 107 Aging Addresses 107 Forwarding, Filtering, and Flooding 108
Loop Detection and Network Resiliency 108 Bridging Implementation Summary 109 Key Guidelines for Implementation 110
Physical Ports and Bridge Ports 110
Option For Fast Aging 110
If You Want To Use STP 110
Port Forwarding Behavior 110
STP Compatible with Trunking 110
Bridge Ports and Trunks 110
Broadcast Limits and Trunks 110 Displaying the Current Configuration 111
bridge summary 111
bridge port summary 113
bridge port detail 114 STP Overview 115
STP Algorithm 115
Bridge Hierarchy 115
Reconfiguring the Bridged Network Topology 116
Resulting Actions 116 Actions That Result from CBPDU Information 117
Spanning Tree Port States 118 STP Bridge and Port Parameters 119
Bridge-wide STP Parameters 119
Bridge-Wide STP State 119 Bridge Priority 119 Bridge Maximum Age 119 Bridge Hello Time 120 Bridge Forward Delay 120
Bridge Port STP Parameters 120
Port Path Cost 120 Port Fast Start 121
Configuring STP 121
bridge spanningTree stpState 121
bridge spanningTree stpPriority 122
bridge spanningTree stpMaxAge 123
bridge spanningTree stpHelloTime 124
bridge spanningTree stpForwardDelay 125
bridge port stpCost 126
bridge port stpFastStart 127 MAC Address Table Design 128
Address Space 128
Important Considerations 128 Address Aging 129
Address Table Dependencies 129
Normal Aging Process 129
If the STP State is Enabled 129
STP Topology Change 130 Port Down Events 130
If the STP State is Disabled 130 Important Considerations 130
Administering the Address Database 132
bridge addressDatabase summary 132 bridge addressDatabase add 133 bridge addressDatabase remove 134 bridge addressDatabase find 134 bridge addressDatabase agingTime 135 bridge addressDatabase flushDynamic 136 bridge addressDatabase flushAll 136
Setting Broadcast Limits 137
bridge broadcastStormControl 137
Standards, Protocols, and Related Reading 138
7 VIRTUAL LANS
VLAN Overview 140
Need for VLANs 140 Benefits 141 Features 141
Key Concepts 142
Related Standards and Protocols 142 Tagging Types 142 VLAN IDs 143 Independent VLAN Learning 143 Terminology 143
Key Guidelines for Implementation 144
Design Guidelines 144 Procedural Guidelines 144 General Guidelines 144
Port-based VLANs 145
The Default VLAN 145
Modifying the Default VLAN 145 Trunking and the Default VLAN 146
User-Configured Port-based VLANs 147
Important Considerations 147 Example 1: A Single VLAN Configuration 148 Example 2: Two VLANs with Untagged Ports 149 Example 3: VLANs with Tagged Ports 150
Rules of VLAN Operation 152
Ingress Rules 152 Egress Rules 154
Standard Bridging Rules for Outgoing Frames 154 Tag Status Rules 154
Examples of Flooding and Forwarding Decisions 154
Example 1: Flooding Decisions for VLANs 154 Example 2: VLAN Exception Flooding 155
Modifying and Removing VLANs 155
Configuring VLANs 156
bridge vlan summary 156
bridge vlan detail 157
bridge vlan create 158
bridge vlan modify addPort 159
bridge vlan modify removePort 160
bridge vlan modify name 160
bridge vlan delete 161 Standards, Protocols, and Related Reading 161
8 MULTICAST FILTERING
IP Multicast Overview 164
Unicast Model 164
Broadcast Model 164
Multicast Model 164
Benefits of IP Multicast 164 How a Network Supports IP Multicast 165
IP Multicast Routing 165
Supporting Protocols in Your Switch 165
IP Multicast Filtering 166
Supporting Protocols in Your Switch 166
Key Concepts 167
Traffic Movement 167
IP Multicast Groups 167
Source-Group Pairs 167
Multicast Addresses 167
Registered Groups 167 Reserved MAC Addresses 168
How IGMP Supports IP Multicast 169
Electing the Querier 169
Query Messages 169
Host Messages 169
Response to Queries 169 Join Message 169 Leave-Group Messages 169
Role of IGMP in IP Multicast Filtering 170 Key Guidelines for Implementation 170
Configuration Procedure 170
Impact of IEEE 802.1Q on Multicasts 170 Configuring IGMP Snooping 171
bridge multicastFilter igmp snoopMode 171 Configuring Multicast Router Ports 172
bridge multicastFilter routerPort summary 172
bridge multicastFilter routerPort autoDiscovery 173
bridge multicastFilter routerPort addPort 173
bridge multicastFilter routerPort removePort 174 Standards, Protocols, and Related Reading 174
9 PRIORITY QUEUEING
Overview 176 Key Concepts 177
Basic Elements of the Standard 177 Format of Prioritized Packets 177 Queues and Priority Levels 178
QoS in Your System 178
QoS Architecture 178
Important Considerations 179
Handling Tagged and Untagged Packets 179
Configuring QoS 180
trafficManagement qos modify 180 bridge port defaultPriority 181
Standards, Protocols, and Related Reading 181
10 IP ROUTING
Routing Overview 184
Routing in a Subnetworked Environment 185 Integrating Bridging and Routing 186 Bridging and Routing Models 186 SMC Bridging and Routing 187 IP Routing Overview 189 Features and Benefits 189
Key Concepts 190
Multiple IP Interfaces per VLAN 190 Media Access Control (MAC) Address 190 Network-Layer Address 190 IP Addresses 191
Dotted Decimal Notation 191 Network Portion 191 Subnetwork Portion 192 Subnet Mask Numbering 193
Variable Length Subnet Masks (VLSMs) 194
How VLSMs Work 194 Guidelines for Using VLSMs 194
Supernetting 195
Step 1 - Select a netmask for each supernet 195 Step 2 - Select a range of addresses for each supernet 196
Supernet Example 197 Router Interfaces 198 Routing Table 198
Default Route 199
VLAN-based Routing 200 Key Guidelines for Implementing IP Routing 200
Configure Trunks (Optional) 200 Configure IP VLANs 200 Establish IP Interfaces 201
Interface Parameters 201 Important Consideration 201 Defining an IP Interface 201
Administering IP Routing 202
Configuring IP Interfaces 203
protocol ip interface summary 203 protocol ip interface create 205 protocol ip interface modify 206 protocol ip interface delete 207
Configuring Static Routes 208
protocol ip route summary 208 protocol ip route add 209 protocol ip route findRoute 210
Important Considerations 210 protocol ip route remove 211 protocol ip route flush 211 protocol ip route default 212 protocol ip route noDefault 212
Address Resolution Protocol (ARP) 213 Configuring the ARP Cache 215
protocol ip arp display 215 protocol ip arp static 216 protocol ip arp remove 217 protocol ip arp flush 217 protocol ip arp flushDynamic 218 protocol ip arp flushFFT 218 protocol ip arp age 219 protocol ip arp statistics 220
ARP Proxy 221
Example 221 protocol ip interface arpproxy 222
Internet Control Message Protocol (ICMP) 223
ICMP Redirect 224
Important Considerations 224
Routing Information Protocol (RIP) 225
Basic RIP Parameters 225
Router Mode 225
Cost 225
Update Time 226
Send and Receive Modes 226
Poison Reverse 226
Advertisement Address 227 RIP-1 Versus RIP-2 227
Important Considerations 227
Configuring RIP 228
protocol ip rip summary 228 protocol ip rip mode 229 protocol ip rip cost 229
Options 229 protocol ip rip sendMode 230 protocol ip rip receiveMode 231 protocol ip rip updateTime 231 protocol ip rip poisonReverse 232 protocol ip rip authenticationMode 233 protocol ip rip statistics 234 protocol ip rip neighbors 234
Domain Name System (DNS) 235
Important Considerations 235
Standards, Protocols, and Related Reading 236
Requests For Comments (RFCs) 236 Standards Organizations 236
11 OSPF ROUTING
OSPF Overview 238
Features 238 Benefits 239
Key Concepts 241
Autonomous Systems 241 Areas 241 Neighbors and Adjacency 241 Router Types 241
Router IDs 242 Protocol Packets 242 How OSPF Routing Works 243
Starting Up 243
Finding Neighbors 243
Establishing Adjacencies 243
Electing the Backup Designated Router 243
Electing the Designated Router 243
Calculating Shortest Path Trees 244
Routing Packets 244
Key Guidelines for Implementing OSPF 245 Autonomous System Boundary Routers 246
Configuring an ASBR 246
Areas 247
Types of Areas 247 Area Border Routers 249 Routing Databases 249 Configuring Route Summarization in ABRs 249 Important Considerations 250
OSPF Interfaces 251
Mode 252 Priority 252
Using Priority to Select a Designated Router 252 Area ID 253
Cost 253
Specifying Cost Metrics for Preferred Paths 253 Delay 254 Hello Interval 254 Retransmit Interval 254 Dead Interval 255 Password 255 Statistics 255 Important Considerations 255
Link State Databases 257
Router Link State Advertisements 257 Network Link State Advertisements 258 Summary Link State Advertisements 258 External Link State Advertisements 259 Important Considerations 260
Neighbors 260
Neighbor Information 260 Static Neighbors 262 Important Considerations 262
Router IDs 263
Important Considerations 263
Stub Default Metrics 264
Important Considerations 264
Virtual Links 265
Important Considerations 266
OSPF Statistics 266 Configuring OSPF 267
protocol ip ospf areas display 267 protocol ip ospf areas defineArea 267 protocol ip ospf areas modifyArea 268 protocol ip ospf areas removeArea 268 protocol ip ospf areas addRange 268 protocol ip ospf areas modifyRange 269 protocol ip ospf areas removeRange 269 protocol ip ospf interface summary 270 protocol ip ospf interface detail 271 protocol ip ospf interface statistics 272 protocol ip ospf interface mode 274 protocol ip ospf interface priority 275 protocol ip ospf interface areaID 275 protocol ip ospf interface cost 276 protocol ip ospf interface delay 276 protocol ip ospf interface hello 277 protocol ip ospf interface retransmit 277 protocol ip ospf interface dead 278 protocol ip ospf interface password 278 protocol ip ospf linkStateData databaseSummary 279 protocol ip ospf linkStateData router 279
protocol ip ospf linkStateData network 281 protocol ip ospf linkStateData summary 282 protocol ip ospf linkStateData external 283 protocol ip ospf neighbors display 284 protocol ip ospf neighbors add 285 protocol ip ospf neighbors remove 285 protocol ip ospf routerID 286 protocol ip ospf stubDefaultMetric display 287 protocol ip ospf stubDefaultMetric define 287 protocol ip ospf stubDefaultMetric remove 288 protocol ip ospf virtualLinks summary 288 protocol ip ospf virtualLinks detail 289 protocol ip ospf virtualLinks statistics 291 protocol ip ospf virtualLinks define 294 protocol ip ospf virtualLinks remove 294 protocol ip ospf virtualLinks areaID 295 protocol ip ospf virtualLinks router 295 protocol ip ospf virtualLinks delay 296 protocol ip ospf virtualLinks hello 296 protocol ip ospf virtualLinks retransmit 297 protocol ip ospf virtualLinks dead 297 protocol ip ospf virtualLinks password 298 protocol ip ospf statistics 298
Standards, Protocols, and Related Reading 299
A TECHNICAL SUPPORT
Online Technical Services 301
World Wide Web Site 301
Support from Your Network Supplier 301
B MANAGEMENT INFORMATION BASE (MIB)
MIB Files 303 Compiler Support 304 MIB Objects 304 MIB Tree 305 MIB-II 306 RMON-1 MIB 306 RMON-2 MIB 307 SMC Enterprise MIBs 307
C TROUBLESHOOTING WEB MANAGEMENT
Browser Issues 309
Web Management and Internet Explorer 309 Improving Device View Download Speed 310 Web Management and Netscape Navigator 311 Additional Resources for Solving Problems 311
INDEX

ABOUT THIS GUIDE

This SMC9712G Software Configuration Guide provides information that you need to understand and use features of the SMC9712G after you install it and attach it to your network. This guide describes the commands used to configure and manage switching modules installed in the SMC9712G chassis. All commands are processed by the Management Module via a menu-driven command line interface or Web browser interface. These interfaces are also called the Administration Console and Web Management, respectively.
Before you start configuring the Switch:
Install your switch chassis and modular components. See the SMC9712G
Installation and Maintenance Guide for installation procedures, cabling
information, and environmental information.
Read Chapter 1 of this guide, which lists the default settings for each feature.
Read Chapter 2 of this guide, which provides an overview of the configuration
process.

Audience This guide is intended for the network administrator who is responsible for

configuring, using, and managing the SMC9712G. It assumes a working knowledge of local area network (LAN) operations and familiarity with communications protocols that are used on interconnected LANs.

Scope of this Guide The information in this guide pertains to Release 1.1 software.

The SMC9712G Network Management Module (NMM) is pre-loaded with software at the factory. However, the software that was loaded on the module that you received may be an earlier release. Connect to the module and use the
system summary command to determine what release is loaded. Go to the SMC
Web site
http://www.smc.com/index.cfm?action=tech_support_drivers_downloads) to
( download the latest software.

Using This Book This guide contains information for every command for the SMC9712G. It

includes specific information about command syntax, field descriptions, default values, and the possible range of values. Some command descriptions include a section called “Important Considerations” that contains additional information to be aware of when using the command. It also contains instructional material about feature concepts and guidelines for using the features. Where appropriate, examples are provided to help you understand the commands.
16 ABOUT THIS GUIDE

Finding Information Use this chart to help you find information about specific tasks:

If you are looking for information about Turn to
The purpose of this book
Sending feedback on this book
Description of software features
List of default settings for all features
Web Management interface
Command Line Interface
Connecting to the system
Administration Console menus
Configuring parameters, such as password, IP address, community string
Entering full and abbreviated commands
Basic configuration sequence
Description of key management features
Resetting the system and restoring system defaults
How to use Remote Monitoring (RMON)
Configuring SNMP settings, including trap reporting
Administering Ethernet port options such as setting the port speed and duplex mode
Displaying statistics for Ethernet ports
Increasing point-to-point bandwidth and resiliency by trunking multiple ports together into one logical port
Displaying the summary bridge configuration
Configuring bridging options such as the aging interval, and bridge-wide STP
Configuring STP options on individual bridge ports
Listing, adding, or removing information from the address table
Creating and administering virtual LANs (VLANs) Chapter 7:
Filtering IP multicast packets using the Internet Group Management Protocol (IGMP) function called snooping
Identifying ports attached to multicast routers
Controlling traffic flows with Quality of Service (QoS) by setting the number of priority queues, as well as setting the default priority for untagged frames
Configuring IP interfaces and IP protocol parameters, including ARP, RIP, and CIDR
About This Guide
Chapter 1: Default Software Configuration
Chapter 2: Preparing for System Management
Chapter 3: System Management Features
Chapter 4: Ethernet Ports
Chapter 5: Link Aggregation
Chapter 6: Bridging
Virtual LANs
Chapter 8: Multicast Filtering
Chapter 9: Priority Queueing
Chapter 10: IP Routing

Command Information 17

If you are looking for information about Turn to
Technical support Appendix A:
Technical Support
Troubleshooting and improving the performance of Netscape and Internet Explorer browsers.
Chapter C: Troubleshooting Web Management
Displaying all supported MIBs Appendix B:
Management Information Base (MIB)
Locating information on tasks and topics quickly Index
Command Information Each software command has its own description in this guide. Each command
description begins at the top of a page. A command description begins with these items:
The complete text of a command
A short description of the purpose of the command
The command description continues with one or more of the following
sections:
Valid Minimum Abbreviation — This section lists the shortest number of
characters that you can type to issue the command.
Important Considerations — These usage notes identify potential issues
or requirements.
Options — If the command begins a configuration process or other
procedure, this section presents each prompt that you see, its description,
the possible values that you can enter, and the default value.
Fields — If the command prompts the Switch to display information, this
section lists the display parameters and their definitions.
Procedure — Numbered steps walk you through complex commands.
Example — Examples show the interactive display when it provides
additional useful information.
18 ABOUT THIS GUIDE

Conventions Table 1 and Table 2 list conventions that are used throughout this guide.

Table 1 Notice Icons
Icon Notice Type Description
Information note Information that describes important features or instructions
Caution Information that alerts you to potential loss of data or potential
damage to an application, system, or device
Warning Information that alerts you to potential personal injury
Table 2 Text Conventions
Convention Description
Screen displays This typeface represents information as it appears on the screen.
Commands The word “command” means that you type the command exactly as
The words “enter” and “type”
Keyboard key names If you must press two or more keys simultaneously, the key names are
Words in italics Italics are used to:
shown in the text and then press Return or Enter. Commands appear in bold. Example:
To remove an IP interface, enter the following command:
protocol ip interface delete
This guide always gives the full form of a command in uppercase and lowercase letters. However, you can abbreviate commands by entering only enough characters to differentiate each command. Commands are not case sensitive.
When you see the word “enter” in this guide, you must type something, and then press Return or Enter. Do not press Return or Enter when an instruction simply says “type.”
linked with a plus sign (+). Example:
Press Ctrl+Alt+Del
Emphasize a point.
Denote a new term at the place where it is defined in the text.
Identify menu names, menu commands, and software button
names. Examples:
From the Help menu, select Contents.
Click OK.
Switch SMC9712G Documentation 19
Switch SMC9712G Documentation
The SMC9712G documentation set is comprised of several different titles.
Documents are available in two formats:
Paper Documents — All SMC9712G documents (software and hardware
guides), except for release notes (which you must download from the SMC Web site) are shipped with your chassis.
World Wide Web — All user guides and release notes are available in Adobe
Acrobat Reader PDF format from the SMC Web site at:
http://www.smc.com/
You can order an additional printed copy of the SMC9712G Installation and Maintenance Guide as well as the SMC9712G Software Configuration Guide (as a packaged set) .
SMC9712G Release Notes are not shipped in paper form. You must download all release notes from the SMC Web site.
20 ABOUT THIS GUIDE
1

DEFAULT SOFTWARE CONFIGURATION

This chapter contains introductory information about the SMC9712G management software and how it can be used in your network. It covers the following topics:
What is Management Software?
Summary of Software Features
Software Features Explained
Default Settings

What is Management Software?

Your Network Management Module (NMM) contains software that allows you to change and monitor the way the Switch works. It also includes Network that allows the Switch to forward traffic between ports on different interface modules. You do not need to configure the management software to get the Switch working. It will operate properly at Layer 2 using the default settings. However, you will need to use the management software to improve the efficiency of the Switch and thereby improve the overall performance of your network. Please refer to Chapter 2 “Preparing for System Management” for information on how to access the management software.
22 CHAPTER 1: DEFAULT SOFTWARE CONFIGURATION

Summary of Software Features

Table 3 describes the software features that are supported by the SMC9712G Network Management Module.
Table 3 Software features
Feature Description
No. of MAC Addresses Supported
No. of IP Interfaces Supported
No. of Static Routes Supported
Forwarding Modes Store and forward
Duplex Modes Half and full duplex on all RJ-45 ports,
Flow Control Supported on all ports,
Traffic Prioritization Supports up to four priorities based on IEEE 802.1p
Port Security Supported on all ports by limiting access to known nodes
Aggregate Links Support for 12 Aggregate Links
Broadcast Storm Control Supported
Virtual LANs (VLANs) Support for up to 256 VLANs using the IEEE 802.1Q
Spanning Tree Protocol Supported
Multicast Filtering IGMP Snooping supported
ARP and Proxy ARP Supported
RIP Supported
RMON Four groups supported: Statistics, History, Alarms, Events
Roving Analysis Supported
Management Web interface, command line interface, and SNMP
Up to 32,000
Up to 128
Up to 100
full duplex on all fiber optic ports
back pressure at half duplex and IEEE 802.3x at full duplex
standard
supported

Software Features Explained

Duplex Modes The RJ-45 ports on your Switch can be set to half duplex or full duplex. The fiber

Software Features Explained 23
ports on your switch are fixed at full duplex The duplex modes operate as described below:
Half duplex — Allows packets to be transmitted and received, but not
simultaneously.
Full duplex — Allows packets to be transmitted and received simultaneously
and, in effect, doubles the potential throughput of a link. In addition, full duplex supports longer runs of fiber optic cable.
To communicate effectively, both ends of a link must use the same duplex mode. If the link uses an auto-negotiating connection, this is done automatically. If the link uses a connection that is not auto-negotiating, both ends must be set to half duplex or full duplex manually.
For more information about setting the duplex mode of a port, see “physicalInterface ethernet portMode” on page 90.

Flow Control All the ports on your Switch support flow control, which is a congestion control

mechanism. Congestion is caused by one or more devices sending traffic to an already overloaded port on the Switch. Flow control prevents packet loss and inhibits the devices from generating more packets until the period of congestion ends.
Flow control is implemented in two ways:
Back pressure for ports operating in half duplex.
IEEE 802.3x standard for ports operating in full duplex.
For information about enabling flow control on a port, see “physicalInterface ethernet flowControl” on page 91.

Traffic Prioritization Your Switch supports IEEE 802.1p traffic prioritization, which allows data that has

been assigned a high priority to be forwarded through the Switch without being obstructed by other data. The system works by using the multiple traffic queues that are present in the hardware of the Switch — high priority traffic is forwarded on a different queue from other traffic, and it is always given preference over other traffic.
Traffic prioritization can be useful for critical applications that require a high Quality of Service from the network. This could include:
Financial applications — Accounts departments that need immediate access
to large files and spreadsheets at the end of the month.
CAD/CAM design applications — Design departments that need priority
connections to server farms and other devices for transferring large files.
Converged network applications — Organizations with a converged
network (that is, a network that uses the same infrastructure for voice data and traditional data) that require high quality voice data transmission at all times.
24 CHAPTER 1: DEFAULT SOFTWARE CONFIGURATION
If you use IEEE 802.1p traffic prioritization, we recommend that all relevant ports on your Switch are placed in one or more Virtual LANs (VLANs) using 802.1Q tagging. For a brief explanation of VLANs, see “Virtual LANs” on page 25. For more information, see Chapter 7 “Virtual LANs.”

Security Each port on your Switch can be configured with security features that guard

against unauthorized users connecting devices to your network.
When security mode is set to Continually Learn on a port, it enters Address Learning Mode. In this mode, the Switch:
Removes all the MAC (Ethernet) addresses stored for the port in the Switch
Database.
Continually learns the address of packets it receives on the port, overwriting
old addresses if the address budget is exceeded.
The address cannot be learned on another port until the address is overwritten,
security is disabled, or the address is manually removed from the database.
When port security mode is set to Auto Learn, it enters Address Learning Mode. In this mode, the Switch:
Removes all the MAC (Ethernet) addresses stored for the port in the Switch
Database.
Learns the address of packets it receives on the port until the address budget is
reached.
The address is defined as a permanent entry.
The address cannot be learned on another port until security is disabled or the
address is manually removed from the database.
No other address can be learned until security is disabled or the address is
manually removed from the database.
When port security mode is set to Auto Learn and to Disconnect Unauthorized Device, then once the address budget is filled:
The port is disabled if a different address is seen on the port.
Up to 896 addresses may be learned by the entire system. If security is enabled for a port, then you must provide the budget (or maximum number of addresses to be learned) for each port. For information, see “security network access portSecurity” on page 61.

Aggregate Links Your Switch can support 12 aggregate links — connections that allow devices to

communicate using up to four links in parallel. Port trunks provide two benefits:
They can potentially double, triple or quadruple the bandwidth of a
connection.
They can provide redundancy — if one link is broken, the other links share the
traffic for that link.
An aggregate link can only be created if the ports at both ends of each link are configured as aggregate links.
For more information, see Chapter 5 “Link Aggregation.”
Loading...
+ 296 hidden pages