This distributionmay includematerials developedby third parties.
Parts ofthe product maybe derivedfrom Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademarkin
the U.S.and inother countries,exclusively licensedthrough X/Open Company, Ltd.
Sun, SunMicrosystems, the Sun logo, Netra, Sun Ray, the Netra logo and the Solaris logo are trademarks or registered trademarks of Sun
Microsystems, Inc., or its subsidiaries, in the U.S. and other countries.
All SPARC trademarks are usedunder licenseand are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other
countries. Products bearingSPARC trademarks arebased uponarchitecture developed by Sun Microsystems,Inc.
Use ofany spare orreplacement CPUs is limited to repair or one-for-one replacementof CPUsin products exported in compliance with U.S.
export laws.Use ofCPUs asproduct upgrades unless authorized by the U.S. Government is strictly prohibited.
DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES,
INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Cette distributionpeut comprendre des composants développés par des tierces parties.
Des partiesde ceproduit pourront être dérivées des systèmes Berkeley BSD licenciés par l’Université de Californie. UNIX est une marque
déposée auxEtats-Unis etdans d’autres payset licenciéeexclusivement parX/Open Company, Ltd.
Sun, SunMicrosystems, le logo Sun, Netra, Sun Ray, le logo Netra et le logo Solaris sont des marques de fabrique ou des marquesdéposées de
Sun Microsystems, Inc.,ou sesfiliales, auxEtats-Unis etdans d’autres pays.
Toutes les marquesSPARC sont utiliséessous licenceet sontdes marques de fabrique ou des marques déposéesde SPARC International,Inc.
aux Etats-Uniset dansd’autres pays. Les produits portant les marques SPARC sont basés sur une architecture développée par Sun
Microsystems, Inc.
L’utilisationde piecesdetachees oud’unites centralesde remplacement est limitee aux reparationsou al’echange standard d’unites centrales
pour lesproduits exportes, conformement a la legislation americaine en matiere d’exportation. Sauf autorisation par les autorites des EtatsUnis, l’utilisationd’unites centralespour proceder ades misesa jourde produits estrigoureusement interdite.
LA DOCUMENTATION EST FOURNIE "EN L’ETAT" ET TOUTES AUTRES CONDITIONS, DECLARATIONS ET GARANTIES EXPRESSES
OU TACITES SONT FORMELLEMENT EXCLUES, DANS LA MESURE AUTORISEEPAR LA LOIAPPLICABLE, YCOMPRIS NOTAMMENT
TOUTE GARANTIE IMPLICITE RELATIVE A LA QUALITE MARCHANDE, A L’APTITUDE A UNE UTILISATION PARTICULIERE OU A
L’ABSENCE DE CONTREFACON.
Please
Recycle
Please
Recycle
Contents
Prefacexxix
1.Getting Started1
Default Settings2
Initial Configuration2
▼Obtain Configuration Information3
In-band and Out-of-band Connectivity3
Initial Access Configuration3
MGMT Serial Configuration3
Configuring for In-band Connectivity4
▼Using DHCP5
▼Using a Static IP6
Configuring for Out-Of-Band Connectivity6
▼Using DHCP7
▼Using a Static IP7
Saving Settings8
Quick Start8
System Information and System Setup9
Quick Startup Software Version Information10
Quick Startup Physical Port Data10
v
Quick Startup User Account Management11
Quick Startup IP Address12
Quick Startup Uploading from Networking Device to TFTP Server13
Quick Startup Downloading from TFTP Server13
Quick Startup Factory Defaults14
2.Using the Command-Line Interface15
Command Syntax16
Command Conventions16
Parameter Conventions17
Parameter Values18
Slot/Port Naming Convention19
‘No’ Form of a Command20
Command Modes20
Mode-Based Topology23
Mode-Based Command Hierarchy25
User Exec Mode25
Privileged Exec Mode25
Global Config Mode25
VLAN Mode29
Operation Flow29
Command Completion and Abbreviation30
CLI Error Messages31
CLI Line-Editing Conventions31
Using CLI Help32
Accessing the CLI34
Comments34
3.Using the Web Interface35
viSun Netra CP3240 Switch User’s Guide • April 2009
Configuring for Web Access36
▼To Configure for Web Access36
Starting the Web Interface37
Web Page Layout38
Configuring an SNMP V3 User Profile41
Command Buttons42
4.Establishing Management Security43
Certificate Generation44
Configuring Secure Shell45
Configuring Secure Socket Layer46
Using Certificate Generation Scripts47
SSH sshKeygen.sh47
SSL pemCreate.sh47
SSL root.cnf49
SSH server.cnf51
5.Configuring Virtual LANs53
VLAN Configuration Example54
CLI Examples56
Example 1: Create Two VLANs56
Example 2: Assign Ports to VLAN256
Example 3: Assign Ports to VLAN357
Example 4: Assign VLAN3 as the Default VLAN57
Example 5: Assign IP Addresses to VLAN 258
Web Interface58
Private Edge VLANs59
CLI Example59
Example 1: Switchport Protected59
Contentsvii
Example 2: Show Switchport Protected59
6.Configuring Port Channels by Link Aggregation61
Using the Link Aggregation Feature62
Configuring Link Aggregation via CLI63
CLI Example 1: Create Two Port Channels64
CLI Example 2: Add Physical Ports to the Port Channels65
CLI Example 3: Enable Both Port Channels65
Configuring Link Aggregation via Web Interface66
7.Configuring Storm Control67
Understanding Traffic Storms68
CLI Examples69
Example 1: Set Broadcast Storm Control for All Interfaces69
Example 2: Set Multicast Storm Control for All Interfaces70
Example 3: Set Unicast Storm Control for All Interfaces70
8.Monitoring IGMP Snooping71
CLI Examples72
Example 1: show igmpsnooping72
Example 2: show ip igmp Interface73
Example 3: show mac-address-table igmpsnooping73
Example 4: show ip igmp interface74
Example 5: (Config) #ip igmp74
Example 6: #show ip igmp74
Example 7: (Interface 1/0/2) #ip igmp75
Web Examples76
9.Configuring Port Mirroring85
Configuring Port Mirroring via CLI86
viiiSun Netra CP3240 Switch User’s Guide • April 2009
Example 1: Set Up a Port Mirroring Session86
Example 2: Show the Port Mirroring Session86
Example 4: Show Status of Source and Destination Ports87
Configuring Port Mirroring via Web Interface88
10.Configuring Port Security93
Port Security Benefits94
Configuring Port Security via CLI95
Example 1: show port security95
Example 2: show port security on a Specific Interface95
Example 3: (Config) port security96
Configuring Port Security via Web Interfaces96
11.Configuring Port Description99
Configuring Port Description via CLI100
Example 1: Enter a Description for a Port100
Example 2: Show the Port Description100
Configuring Port Description via the Web Interface100
12.Configuring Link Layer Discovery Protocol105
Configuring LLDP via CLI106
Example 1: Set Global LLDP Parameters106
Example 2: Set Interface LLDP Parameters107
Example 3: Show Global LLDP Parameters108
Example 4 Show Interface LLDP Parameters108
Configuring LLDP via Web Interface109
13.Configuring Denial of Service Attack Protection113
Configuring Denial of Service via CLI114
14.Configuring Port Routing115
Contentsix
Understanding Port Routing116
Configuring Port Routing via CLI117
Example 1. Enabling Routing for the Switch118
Example 2. Enabling Routing for Ports on the Switch118
Configuring Port Routing via Web Interface119
15.Configuring Routing Information Protocol121
Understanding Routing Information Protocol122
Configuring RIP via CLI123
Example 1: Enable Routing for the Switch:123
Example 2: Enable Routing for Ports124
Example 3. Enable RIP for the Switch124
Example 4. Enable RIP for Ports 1/0/2 and 1/0/3125
Configuring RIP via Web Interface125
16.Configuring Open Shortest Path First (OSPF)127
Understanding Open Shortest Path First (OSPF)128
Configuring OSPF via CLI129
Example 1: Configuring an Inter-Area Router129
Enable Routing for the Switch130
Assign IP Addresses for Ports130
Specify Router ID and Enable OSPF for the Switch130
Enable and Configure OSPF for the Ports131
Example 2: Configuring OSPF on a Border Router131
Enable Routing for the Switch133
Enable Routing and Assign IP for Ports 1/0/2, 1/0/3, and 1/0/4133
Specify Router ID and Enable OSPF for the Switch133
Enable OSPF for the Ports134
Configuring OSPF via Web Interface135
xSun Netra CP3240 Switch User’s Guide • April 2009
Configuring an Inter-Area Router135
Configuring a Border Router135
17.Configuring VLAN Routing137
Understanding VLAN Routing138
Configuring VLAN Routing via CLI138
Example 1: Create Two VLANs139
Example 2: Set Up VLAN Routing for the VLANs and the Switch140
Configuring VLAN Routing via Web Interface141
Configuring VLAN Routing With RIP142
Configuring VLAN With RIP via CLI143
Example 1: Configuring VLAN Routing with RIP Support143
Example 2: Enable RIP for the Switch145
Configuring VLAN Routing with RIP via Web Interface146
Configuring VLAN Routing With OSPF146
Configuring VLAN Routing With OSPF via CLI147
Example 1: OSPF on FASTPATH as an Inter-area Router147
Example 2: Specify the Router ID and Enable OSPF for the Switch148
xxSun Netra CP3240 Switch User’s Guide • April 2009
Tables
TABLE 1-1Quick Startup Software Version Information10
TABLE 1-2Quick Startup Physical Port Data10
TABLE 1-3Quick Startup User Account Management11
TABLE 1-4Quick Startup IP Address12
TABLE 1-5Quick Startup Uploading from Networking Device to TFTP Server13
TABLE 1-6Quick Startup Downloading from TFTP Server13
TABLE 1-7Quick Startup Factory Defaults14
TABLE 2-1Parameter Value Types17
TABLE 2-2Common Parameter Values18
TABLE 2-3Slot Types19
TABLE 2-4Port Types19
TABLE 2-5CLI Command Modes21
TABLE 2-6CLI Error Messages31
TABLE 2-7CLI Editing Conventions31
xxi
xxiiSun Netra CP3240 Switch User’s Guide • April 2009
Code Examples
CODE EXAMPLE 4-1SSH sshKeygen.sh Example47
CODE EXAMPLE 4-2SSL pemCreate.sh Example47
CODE EXAMPLE 4-3SSL root.cnf Example49
CODE EXAMPLE 4-4SSH server.cnf Example51
CODE EXAMPLE 5-1Creating Two VLANs56
CODE EXAMPLE 5-2Assigning Ports to VLAN256
CODE EXAMPLE 5-3Assigning Ports to VLAN357
CODE EXAMPLE 5-4Assigning VLAN3 as Default57
CODE EXAMPLE 5-5Assigning IP Addresses to VLAN258
CODE EXAMPLE 5-6Protecting the Switchport59
CODE EXAMPLE 6-1Creating Two Port Channels64
CODE EXAMPLE 6-2Showing Port Channels64
CODE EXAMPLE 6-3Adding Ports to the Port Channels65
CODE EXAMPLE 6-4Enabling Both Port Channels65
CODE EXAMPLE 7-1Set Broadcast Storm Control for All Interfaces69
CODE EXAMPLE 7-2Set Multicast Storm Control for All Interfaces70
CODE EXAMPLE 7-3Set Unicast Storm Control for All Interfaces70
CODE EXAMPLE 8-1show igmpsnooping72
CODE EXAMPLE 8-2show ip igmp Interface73
CODE EXAMPLE 8-3show mac-address-table igmpsnooping73
xxiii
CODE EXAMPLE 8-4show ip igmp interface74
CODE EXAMPLE 8-5(Config) #ip igmp74
CODE EXAMPLE 8-6#show ip igmp74
CODE EXAMPLE 8-7(Interface 1/0/2) #ip igmp75
CODE EXAMPLE 9-1Setting Up a Port Mirroring Session86
CODE EXAMPLE 9-2Showing the Port Mirroring Session86
CODE EXAMPLE 9-3Showing Status of Source and Destination Ports87
CODE EXAMPLE 10-1show port security95
CODE EXAMPLE 10-2show port security on a Specific Interface95
CODE EXAMPLE 10-3(Config) port security96
CODE EXAMPLE 11-1Specifying Port Description100
CODE EXAMPLE 11-2show port description100
CODE EXAMPLE 12-1Setting Global LLDP Parameters106
CODE EXAMPLE 12-2Setting Interface LLDP Parameters107
CODE EXAMPLE 12-3Showing Global LLDP Parameters108
CODE EXAMPLE 12-4Showing Interface LLDP Parameters108
CODE EXAMPLE 13-1Configuring DoS via CLI114
CODE EXAMPLE 14-1Enabling Routing for the Switch118
CODE EXAMPLE 14-2Enabling Routing for Ports on the Switch118
CODE EXAMPLE 15-1Enable Routing for the Switch123
CODE EXAMPLE 15-2Enable Routing for the Ports124
CODE EXAMPLE 15-3Enable RIP for the Switch124
CODE EXAMPLE 15-4Enable RIP for Ports 1/0/2 and 1/0/3125
CODE EXAMPLE 16-1Enabling Routing for the Switch130
CODE EXAMPLE 16-2Assigning IP Addresses for Ports130
CODE EXAMPLE 16-3Specifying Router ID and Enabling OSPF for the Switch130
CODE EXAMPLE 16-4Enabling and Configuring OSPF for the Ports131
CODE EXAMPLE 16-5Enabling Routing for the Switch133
CODE EXAMPLE 16-6Enabling Routing and Assigning IP Ports 1/0/2, 1/0/3, and 1/0/4133
CODE EXAMPLE 16-7Specifying Router ID and Enabling OSPF for the Switch133
xxivSun Netra CP3240 Switch User’s Guide • April 2009
CODE EXAMPLE 16-8Enabling OSPF for the Ports134
CODE EXAMPLE 17-1Creating Two VLANs139
CODE EXAMPLE 17-2Enabling Routing for the VLANs140
CODE EXAMPLE 17-3Configuring IP Addresses and Subnet for the VLAN Ports141
CODE EXAMPLE 17-4Configuring VLAN Routing with RIP Support143
CODE EXAMPLE 17-5Enabling RIP for the Switch145
CODE EXAMPLE 17-6Configuring IP Addresses and Subnet Mask for Non-virtual Router Port145
CODE EXAMPLE 17-7Enabling RIP for VLAN Router Ports145
CODE EXAMPLE 17-8Creating VLANs and Enabling VLAN Routing on an Inter-area Router With
OSPF147
CODE EXAMPLE 17-9Speciying Router ID148
CODE EXAMPLE 17-10Enabling OSPF for the VLAN and Router Ports149
CODE EXAMPLE 17-11Set OSPF Priority and Cost for the VLAN and Router Ports149
CODE EXAMPLE 18-1Enabling Routing for the Switch153
CODE EXAMPLE 18-2Configuring IP Addresses and Subnet Masks153
CODE EXAMPLE 18-3Enabling VRRP for the Switch153
CODE EXAMPLE 18-4Assinging a Virtual Router to the Port153
CODE EXAMPLE 18-5Specifying IP Address for Virtual Router153
CODE EXAMPLE 18-6Enabling VRRP on the Port154
CODE EXAMPLE 18-7Enabling Routing for the Switch154
CODE EXAMPLE 18-8Configuring IP Addresses and Subnet Masks154
CODE EXAMPLE 18-9Enabling VRRP for the Switch154
CODE EXAMPLE 18-10Assigning a Virtual Router to the Port154
CODE EXAMPLE 18-11Specifying the IP Address for the Virtual Router155
CODE EXAMPLE 18-12Setting Port Priority155
CODE EXAMPLE 18-13Enabling VRRP on the Port155
CODE EXAMPLE 19-1show ip interface158
CODE EXAMPLE 19-2ip proxy-arp158
CODE EXAMPLE 20-1Configuring the Interface163
CODE EXAMPLE 20-2Setting Unsolicited Report Interval163
Code Examplesxxv
CODE EXAMPLE 20-3Resetting Host Interface Status Parameters164
CODE EXAMPLE 20-4Showing IGMP Proxy Host Interfaces164
CODE EXAMPLE 20-5Showing Host Interface Status164
CODE EXAMPLE 20-6Showing IGMP Proxy Groups165
CODE EXAMPLE 20-7Showing Detailed Information About Proxy Groups165
CODE EXAMPLE 21-1Device 1170
CODE EXAMPLE 21-2Device 2171
CODE EXAMPLE 22-1Set Up a MAC Access Label180
CODE EXAMPLE 22-2Specify MAC ACL Attributes180
CODE EXAMPLE 22-3Configure MAC Access Group181
CODE EXAMPLE 22-4Set Up ACL with Permit Action183
CODE EXAMPLE 22-5Show MAC Access Lists184
CODE EXAMPLE 23-1Configuring Ingress201
CODE EXAMPLE 23-2Configuring Egress202
CODE EXAMPLE 24-1Creating a Diffserv Class Type All215
CODE EXAMPLE 24-2Creating a Diffserv Policy for Inbound Traffic215
CODE EXAMPLE 24-3Attaching the Policy to Interfaces216
CODE EXAMPLE 24-4Setting CoS Queue for Egress216
CODE EXAMPLE 24-5Setting Queue on All Ports232
CODE EXAMPLE 24-6Creating a Diffserv Classifier232
CODE EXAMPLE 24-7Creating a Second Diffserv Classifier232
CODE EXAMPLE 24-8Creating a Diffserv Policy232
CODE EXAMPLE 24-9Attaching the Policy to Inbound Interface234
CODE EXAMPLE 25-1Configuring 802.1x Port Access Control238
CODE EXAMPLE 26-1Configuring RADIUS for Authentication of Users242
CODE EXAMPLE 27-1Configuring Access Control for Networked Devices246
CODE EXAMPLE 29-1Configuring Traceroute252
CODE EXAMPLE 30-1script Command255
CODE EXAMPLE 30-2script list and script delete Commands255
CODE EXAMPLE 30-3script apply running-config.scr Command256
xxviSun Netra CP3240 Switch User’s Guide • April 2009
CODE EXAMPLE 30-4show running-config Command256
CODE EXAMPLE 30-5copy nvram: script Command257
CODE EXAMPLE 30-6script validate running-config.scr Command257
CODE EXAMPLE 30-7script validate default.scr Command258
CODE EXAMPLE 31-1show network Command260
CODE EXAMPLE 31-2show telnet Command261
CODE EXAMPLE 31-3transport output telnet Command261
CODE EXAMPLE 31-4session-limit and session-timeout Commands262
CODE EXAMPLE 32-1Creating a Pre-login Banner266
CODE EXAMPLE 33-1show sntp Command270
CODE EXAMPLE 33-2show sntp client270
CODE EXAMPLE 33-3show sntp server Command271
CODE EXAMPLE 33-4Configure sntp Command271
CODE EXAMPLE 33-5sntp client mode broadcast Command272
CODE EXAMPLE 33-6Configure sntp server Command272
CODE EXAMPLE 33-7Configure sntp client port Command272
CODE EXAMPLE 34-1show logging Command278
CODE EXAMPLE 34-2show logging buffered Command279
CODE EXAMPLE 34-3show logging traplogs Command280
CODE EXAMPLE 34-4show logging hosts Command280
CODE EXAMPLE 34-5Logging Port Configuration Commands281
Code Examplesxxvii
xxviii Sun Netra CP3240 Switch User’s Guide • April 2009
Preface
This document provides information and instructions for using the configuration
options of the Netra CP3240 switch. This document shows examples of the use of the
Netra CP3240 switch in a typical network. It describes the uses and advantages of
functions provided by the switch, and includes information on configuring those
functions using CLI and Web interfaces.
The Netra CP3240 switch can operate as a Layer 2 switch, a Layer 3 router, or a
combination switch/router. The switch also includes support for network
management and Quaility of Service functions such as Access Control Lists and
Differientiated Services. The functions you choose to activate will depend on the size
and complexity of your network.
This document illustrates configuration for the following functions:
■ switching
■ routing
■ Quality of Service (QoS)
■ management
Before You Read This Document
This document is intended for use by the following users:
■ Experienced system administrators (SAs) who are responsible for configuring and
operating a network using
■ Engineers who will be integrating the Netra CP3240 switch into an
AdvancedTCA system.
■ Level 1 and/or Level 2 support providers.
Netra CP3240 switches.
xxix
Typographic Conventions
Typeface
AaBbCc123The names of commands, files,
AaBbCc123What you type, when contrasted
AaBbCc123Book titles, new words or terms,
* The settings on your browser might differ from these settings.
*
MeaningExamples
and directories; on-screen
computer output
with on-screen computer output
words to be emphasized.
Replace command-line variables
with real names or values.
Edit your.login file.
Use ls -a to list all files.
% You have mail.
su
%
Password:
Read Chapter 6 in the User’s Guide.
These are called class options.
You must be superuser to do this.
To delete a file, type rm filename.
xxxSun Netra CP3240 Switch User’s Guide • April 2009
Related Documentation
The following table lists the documentation for this product. The online
documentation is available at:
The following table lists the documentation that is related to this product. The online
documentation is available at:
http://docs.sun.com/app/docs/prod/n900.srvr#hic
.
ApplicationTitlePart NumberFormatLocation
Latest
information
Pointer DocNetra CT 900 Server Getting Started
Netra CT 900 Server Product Notes819-1180-xxPDFOnline
819-1173-xxPrintedShipping kit
Guide
OverviewNetra CT 900 Server Overview819-1174-xxPDFOnline
InstallationNetra CT 900 Server Installation
Guide
ServiceNetra CT 900 Server Service Manual 819-1176-xxPDFOnline
AdministrationNetra CT 900 Server Administration
and Reference Manual
ProgrammingNetra CT 900 Software Developer’s
Guide
819-1175-xxPDFOnline
819-1177-xxPDFOnline
819-1178-xxPDFOnline
Prefacexxxi
ApplicationTitlePart NumberFormatLocation
SafetyNetra CT 900 Server Safety and
Compliance Guide
SetupNetra CT 900 Server Hardware
Setup Guide
SafetyImportant Safety Information for
Sun Hardware Systems
Third-Party Web Sites
Sun is not responsible for the availability of third-party web sites mentioned in this
document. Sun does not endorse and is not responsible or liable for any content,
advertising, products, or other materials that are available on or through such sites
or resources. Sun will not be responsible or liable for any actual or alleged damage
or loss caused by or in connection with the use of or reliance on any such content,
goods, or services that are available on or through such sites or resources.
819-1179-xxPDFOnline
819-1647-xxPDFOnline
816-7190-xxPrintedShipping kit
Sun Welcomes Your Comments
Sun is interested in improving its documentation and welcomes your comments and
suggestions. You can submit your comments by going to:
http://www.sun.com/hwdocs/feedback
Please include the title and part number of your document with your feedback:
Sun Netra CP3240 Switch User’s Guide, part number 820-3252-11
xxxiiSun Netra CP3240 Switch User’s Guide • April 2009
CHAPTER
1
Getting Started
This chapter provides information and instructions for configuring the switch. You
must connect a serial console to the switch to begin configuration.
This chapter contains the following topics:
■ Section , “Default Settings” on page 1-2
■ Section , “Initial Configuration” on page 1-2
■ Section , “In-band and Out-of-band Connectivity” on page 1-3
■ Section , “Quick Start” on page 1-8
1
Default Settings
■ The switch is configured with all ports enabled, set to auto-negotiate, mtu of 1518,
and in Layer 2 MAC switching mode
■ All ports are in VLAN 1
■ DHCP client is enabled on the out-of-band management port
■ Telnet acess enabled
■ HTTP access enabled
■ SNMP read-only community “public”
■ SNMP read-write community “private”
Initial Configuration
By default, DHCP on OOB management port is enabled, and it’s possible to directly
telnet into the OOB management interface to configure the switch, if DHCP server is
running. You can use a DHCP server, switch serial console, or SNMP discovery to
determine which IP address it reports, and use that address to telnet.
The initial configuration procedure is based on the following assumptions:
■ The switch was not configured before and is in the same state as when you
received it.
■ The switch booted successfully.
■ The console connection was established, and the console prompt appeared on the
screen of a VT100 terminal or terminal equivalent.
The initial switch configuration is performed through the console port. After the
initial configuration, you can manage the switch either from the already-connected
console port or remotely through an interface defined during the initial
configuration.
Note – The switch is not configured with a default user name and password.
Note – All of the settings that follow are necessary to allow remote management of
the switch through Telnet (Telnet client) or HTTP (Web browser).
2Sun Netra CP3240 Switch User’s Guide • April 2009
▼ Obtain Configuration Information
● Before setting up the initial configuration of the switch, obtain the following
information from your network administrator:
■ The IP address to be assigned to the management interface through which the
switch is managed.
■ The IP subnet mask for the network.
■ The IP address of the default gateway.
In-band and Out-of-band Connectivity
Ask the system administrator to determine whether you will configure the switch
for in-band or out-of-band connectivity.
Initial Access Configuration
Initial configuration of the Netra CP3240 switch must be done either through the
serial console port or though the out-of-band Ethernet management port.
MGMT Serial Configuration
You can use a locally or remotely attached terminal to configure in-band and out-ofband management through the MGMT serial port.
1. To use a locally attached terminal, attach one end of a null-modem serial cable
to the MGMT serial port of the switch and the other end to the COM port of
the terminal or workstation.
2. For remote attachment, attach one end of the serial cable to the MGMT serial
port of the switch and the other end to the modem.
Chapter 1Getting Started3
3. Set up the terminal for VT100 terminal emulation.
a. Set the terminal ON.
b. Launch the VT100 application.
c. Configure the COM port as follows:
i.Set the data rate to 9600 baud.
ii.Set the data format to 8 data bits, 1 stop bit, and no parity.
iii.Set the flow control to none.
iv.Select the proper mode under Properties.
v.Select Terminal keys.
The Log-in User prompt displays when the terminal interface initializes.
4. Enter an approved user name and password.
The default is admin for the user name and the password is blank.
The switch is installed and loaded with the default configuration.
Configuring for In-band Connectivity
In-band connectivity allows you to access the switch from a remote workstation. To
use in-band connectivity, you must configure the switch with IP information (IP
address, subnet mask, and default gateway).
4Sun Netra CP3240 Switch User’s Guide • April 2009
▼ Using DHCP
1. Enter the following command over the MGMT serial port to enable DHCP
client:
network protocol dhcp
You can assign IP information over the network through BootP or DHCP. Check
with your system administrator to determine whether BootP or DHCP is enabled.
You need to configure the BootP or DHCP server with information about the
switch —obtain this information through the serial port connection using the
show network command. Set up the server with the following values.
ValueDescription
IP addressUnique IP address for the switch. Each IP parameter is made up of four
decimal numbers, ranging from 0 to 255. The default for all IP
parameters is zeroes (0.0.0.0).
SubnetSubnet mask for the LAN
GatewayIP address of the default router, if the switch is a node outside the IP
range of the LAN
MAC addressMAC address of the switch
When you connect the switch to the network for the first time after setting up the
BootP or DHCP server, it is configured with the information supplied above. The
switch is ready for in-band connectivity over the switched network.
If you do not use BootP or DHCP, access the switch through the EIA-232 port, and
configure the network information as described below.
Chapter 1Getting Started5
▼ Using a Static IP
1. Enter the following command to allow a static IP:
network protocol none
2. Set the IP address, subnet mask, and gateway address by issuing the following
command:
network IP <ipaddress> <netmask> [<gateway>]
ValueDescription
IP addressUnique IP address for the switch. Each IP parameter is made up of four
decimal numbers, ranging from 0 to 255. The default for all IP
parameters is zeroes (0.0.0.0).
SubnetSubnet mask for the LAN
GatewayIP address of the default router, if the switch is a node outside the IP
range of the LAN
Configuring for Out-Of-Band Connectivity
Out-of-band connectivity allows you to access the switch from a remote workstation
using the Ethernet network over a private network. To use Out-of-band connectivity,
you must configure the switch with IP information (IP address, subnet mask, and
default gateway).
6Sun Netra CP3240 Switch User’s Guide • April 2009
▼ Using DHCP
DHCP is enabled by default on the Netra CP3240 switch.
You need to configure the BootP or DHCP server with information about the switch
—obtain this information through the serial port connection using the
serviceport
ValueDescription
IP addressUnique IP address for the switch. Each IP parameter is made up of four
SubnetSubnet mask for the LAN
GatewayIP address of the default router, if the switch is a node outside the IP
MAC addressMAC address of the switch
command. Set up the server with the following values:
decimal numbers, ranging from 0 to 255. The default for all IP
parameters is zeroes (0.0.0.0).
range of the LAN
When you connect the switch to the network for the first time after setting up the
BootP or DHCP server, it is configured with the information supplied above. The
switch is ready for out-of-band connectivity over the front panel Ethernet
Management port.
show
If you do not use BootP or DHCP, access the switch through the MGMT Serial
port, and configure the network information as described below.
▼ Using a Static IP
1. Enter the following command to allow a static IP:
serviceport protocol none
2. Set the IP address, subnet mask, and gateway address by issue the following
command:I
serviceport IP <ipaddress> <netmask> [<gateway>]
Chapter 1Getting Started7
ValueDescription
IP addressUnique IP address for the switch. Each IP parameter is made up of four
decimal numbers, ranging from 0 to 255. The default for all IP
parameters is zeroes (0.0.0.0).
SubnetSubnet mask for the LAN
GatewayIP address of the default router, if the switch is a node outside the IP
range of the LAN
MAC addressMAC address of the switch
Saving Settings
1. To enable these changes to be retained during a reset of the switch, type
CTRL+Z to return to the main prompt, type save config at the main menu
prompt, and type
2. To view the changes and verify out-of-band information, issue the command:
show network.
3. The switch is configured for out-of-band connectivity and ready for Web-based
and remote console management.
y to confirm the changes.
Quick Start
1. Turn the Power ON.
2. Allow the device to load the software until the login prompt appears. The
device initial state is called the default mode.
3. When the prompt asks for operator login, do the following steps:
a. Type
b. The CLI User EXEC prompt is displayed.
8Sun Netra CP3240 Switch User’s Guide • April 2009
admin at the login prompt.
Because a number of the Quick Setup commands require administrator
account rights, log into an administrator account.
Do not enter a password because the default mode does not use a password after typing
i.Type
admin, press Enter two times.
enable to switch to the Privileged EXEC mode from User EXEC.
ii.Type configure to switch to the Global Config mode from Privileged
EXEC.
iii.Type
iv.Enter
exit to return to the previous mode.
? to show a list of commands that are available in the current
mode.
4. If you want to access the switch remotely, configure the switch for In-band or
Out-of-Band connectivity.
You must configure the device with IP information (IP address, subnet mask, and
default gateway).
System Information and System Setup
This section describes the commands you use to view system information and to
setup the network device. The tables below contain the Quick Start commands that
allow you to view or configure the following information:
■ Software versions
■ Physical port data
■ User account management
■ IP address configuration
■ Uploading from Networking Device to Out-of-Band PC
■ Downloading from Out-of-Band PC to Networking Device
■ Downloading from TFTP Server
■ Restoring factory defaults
For each of these tasks, a table shows the command syntax, the mode you must be in
to execute the command, and the purpose and output of the command. If you
configure any network parameters, you should execute the following command:
copy system:running-config nvram:startup-config
This command saves the changes to the configuration file. You must be in the correct
mode to execute the command. If you do not save the configuration, all changes are
lost when you power down or reset the networking device. In a stacking
environment, the running configuration is saved in all units of the stack.
Chapter 1Getting Started9
Quick Startup Software Version Information
TABLE 1-1Quick Startup Software Version Information
CommandDetails
show hardware
(Privileged EXEC Mode)
Display System Information
System Description
Serial Number
MAC Address
Software Version
Quick Startup Physical Port Data
TABLE 1-2Quick Startup Physical Port Data
CommandDetails
show port all
(Privileged EXEC Mode)
Displays the ports
Interface - slot/port, See the FASTPATH 2000Command Reference for more information about
naming conventions.
Type - Indicates if the port is a special type of port.
Admin Mode - Selects the Port Control
Administration State.
Physical Mode - Selects the desired port speed and
duplex mode.
Physical Status - Indicates the port speed and duplex
mode.
Link Status - Indicates whether the link is up or
down.
Link Trap - Determines whether or not to send a
trap when link status changes.
LACP Mode - Displays whether LACP is enabled or
disabled on this port.
10Sun Netra CP3240 Switch User’s Guide • April 2009
Quick Startup User Account Management
TABLE 1-3Quick Startup User Account Management
CommandDetails
show users
(Privileged EXEC Mode)
show loginsession
(User EXEC Mode)
users passwd
<username>
(Global Config
Mode)
copy
system:runningconfig
nvram:startupconfig
(Privileged EXEC Mode)
logout
(User EXEC and
Privileged EXEC Modes)
Displays all of the users who are allowed to access the
networking device
Access Mode - Shows whether the user is able to change
parameters on the networking device(Read/Write) or is only
able to view them (Read Only).
As a factory default, the admin user has Read/Write access and
the guest user has Read Only access. There can only be one
Read/Write user and up to five Read Only users.
Displays all of the login session information.
Allows the user to set passwords or change passwords needed
to login
A prompt appears after the command is entered requesting the
user’s old password. In the absence of an old password, leave
the area blank. The user must press
command.
The system then prompts the user for a new password; then a
prompt to confirm the new password. If the new password and
the confirmed password match, a confirmation message is
displayed.
A user password should not be more than eight characters in
length.
This command saves passwords and all other changes to the
device.
If you do not save the configuration by entering this command,
all configurations are lost when a power cycle is performed on
the networking device or when the networking device is reset.
In a stacking environment, the running configuration is saved
in all units of the stack.
Logs the user out of the networking device.
Enter to execute the
Chapter 1Getting Started11
Quick Startup IP Address
To view the network parameters the operator can access the device by the following
three methods.
■ Simple Network Management Protocol - SNMP
■ Telnet
■ Web Browser
Note – Helpful Hint: The user should do a ‘copy system:running-config
nvram:startup-config’ after configuring the network parameters so that the
configurations are not lost.
TABLE 1-4Quick Startup IP Address
CommandDetails
show network
(User EXEC Mode)
network parms
<ipaddr>
<netmask>
[gateway]
(Privileged EXEC
Mode)
Displays the Network Configurations
IP Address - IP Address of the interface
Default IP is 0.0.0.0
Subnet Mask - IP Subnet Mask for the interface
Default is 0.0.0.0
Default Gateway - The default Gateway for this interface
Default value is 0.0.0.0
Burned in MAC Address - The Burned in MAC Address used
for in-band connectivity
Locally Administered MAC Address - Can be configured to
allow a locally administered MAC address
MAC Address Type - Specifies which MAC address should be
used for in-band connectivity
Network Configurations Protocol Current - Indicates which
network protocol is being used
Default is none
Management VLAN Id - Specifies VLAN id
Web Mode - Indicates whether HTTP/Web is enabled
Java Mode - Indicates whether java mode is enabled.
Sets the IP Address, subnet mask, and gateway of the router.
The IP Address and the gateway must be on the same subnet.
IP Address range from 0.0.0.0 to 255.255.255.255
Subnet Mask range from 0.0.0.0 to 255.255.255.255
Gateway Address range from 0.0.0.0 to 255.255.255.255
12Sun Netra CP3240 Switch User’s Guide • April 2009
Quick Startup Uploading from Networking Device to
TFTP Server
TABLE 1-5Quick Startup Uploading from Networking Device to TFTP Server
CommandDetails
copy nvram:startup-config
<tftp://<ipaddress>/<filepath>/<f
ilename>>
(Privileged EXEC Mode)
copy nvram:errorlog
<tftp://<ipaddress>/<filepath>/<f
ilename>>
(Privileged EXEC Mode)
copy nvram:msglog
<tftp://<ipaddress>/<filepath>/<f
ilename>>
(Privileged EXEC Mode)
copy nvram:traplog
<tftp://<ipaddress>/<filepath>/<f
ilename>>
(Privileged EXEC Mode)
Starts the upload, displays the mode
and type of upload, and confirms the
upload is progressing.
The types are:
config - configuration file
errorlog - error log
msglog- message log
traplog - trap log
The URL must be specified as:
xmodem:<filepath>/<filename>
For example:
If you are using HyperTerminal, you
must specify where the file is to be
received by the PC.
Quick Startup Downloading from TFTP Server
Before starting a TFTP server download, the operator must complete the Quick Start
up for the IP Address
TABLE 1-6Quick Startup Downloading from TFTP Server
Sets the destination (download)
datatype to be an image
(system:image) or a configuration
file (nvram:startup-config).
The URL must be specified as:
tftp://<ipaddress>/<filepath>/<
filename>.
The nvram:startup-config option
downloads the configuration file
using tftp and system:image
option downloads the code file.
Chapter 1Getting Started13
Quick Startup Factory Defaults
TABLE 1-7Quick Startup Factory Defaults
CommandDetails
clear config
(Privileged EXEC Mode)
copy system:running-config
nvram:startup-config
reload (or cold boot the
networking device)
(Privileged EXEC Mode)
Enter yes when the prompt pops up to clear all the
configurations made to the networking device.
Enter yes when the prompt pops up that asks if you
want to save the configurations made to the
networking device.
Enter yes when the prompt pops up that asks if you
want to reset the system.
You can reset the networking device or cold start the
networking device. Both work effectively.
14Sun Netra CP3240 Switch User’s Guide • April 2009
CHAPTER
2
Using the Command-Line Interface
The command-line interface (CLI) is a text-based way to manage and monitor the
switch and system. You can access the CLI by using a direct serial connection or by
using a remote logical connection with telnet or SSH.
For detailed information about using the CLI with the switch’s software commands,
refer to the Sun Netra CP3240 Switch Software Reference Manual (820-3253).
This chapter describes the CLI syntax, conventions, and modes. It contains the
following sections:
■ “Command Syntax” on page 16
■ “Command Conventions” on page 16
■ “Parameter Conventions” on page 17
■ “Parameter Values” on page 18
■ “Slot/Port Naming Convention” on page 19
■ “‘No’ Form of a Command” on page 20
■ “Command Modes” on page 20
■ “Command Completion and Abbreviation” on page 30
■ “CLI Error Messages” on page 31
■ “CLI Line-Editing Conventions” on page 31
■ “Using CLI Help” on page 32
■ “Accessing the CLI” on page 34
15
Command Syntax
A command is one or more words that might be followed by one or more
parameters. Parameters can be required or optional values.
Some commands, such as show network or clear vlan, do not require
parameters. Other commands, such as network parms, have parameters for which
you must supply a value. Parameters are positional—you must type the values in
the correct order. Optional parameters will follow required parameters. Following
are two examples.
network parms <ipaddr> <netmask> [gateway]
In the preceding example, <ipaddr> and <netmask> are the required values for the
command, and [gateway] is the optional value for the command.
snmp-server location <loc>
In the second example, <loc> is the required parameter for the command.
Command Conventions
The following conventions apply to the command name:
■ The command name is displayed in this document in monospace font and must
be typed exactly as shown.
■ Once you have entered enough letters of a command name to uniquely identify
the command, pressing the spacebar or Tab key causes the system to complete the
word.
■ Pressing Ctrl-Z returns you to the root-level command prompt.
This reference manual lists each command by the command name and provides a
brief description of the command. Each command entry contains the following
information:
■ Format shows the command keywords and parameters (required and optional).
■ Mode identifies the command mode you must be in to access the command.
■ Default shows the default value, if any, of a configurable setting on the device.
16Sun Netra CP3240 Switch User’s Guide • April 2009
The show commands also contain a description of the information that the command
shows.
Parameter Conventions
The following conventions apply to parameters:
■ Parameters are order dependent.
■ Variables are displayed in this document in italic font, and must be replaced with
a name or number.
■ To use spaces as part of a name parameter, enclose it in double quotes. For
example, the expression “System Name with Spaces” forces the system to accept
the spaces.
■ Empty strings (““) are not valid user-defined strings.
■ Parameters might be mandatory values, optional values, choices, or a
combination. Parameter values might be names (strings) or numbers.
Table 2-1 describes the conventions this document uses to distinguish between value
types.
TABLE 2-1Parameter Value Types
SymbolExampleDescription
<> angle
brackets
[] square
brackets
{} curly braces
| Vertical bars
[{}] Braces
within square
brackets
<value>
[value]
{choice1 | choice2}Indicates that you must select a parameter
choice1 | choice2Separates the mutually exclusive choices.
[{choice1 |
choice2}]
Indicates that you must enter a value in
place of the brackets and text inside them.
Indicates an optional parameter that you can
enter in place of the brackets and text inside
them.
from the list of choices.
Indicates a choice within an optional
element.
Chapter 2Using the Command-Line Interface17
Parameter Values
The following conventions apply to the values of the common parameters. Table 2-2
describes common parameter values and formatting.
TABLE 2-2Common Parameter Values
ParameterDescription
ipaddrThis parameter is a valid IP address. You can enter the IP address in the
following formats:
• a (32 bits)
• a.b (8.24 bits)
• a.b.c (8.8.16 bits)
• a.b.c.d (8.8.8.8)
In addition to these formats, the CLI accepts decimal, hexidecimal and octal
formats through the following input formats (where n is any valid
hexidecimal, octal or decimal number):
areaidEnter area IDs in dotted-decimal notation (for example, 0.0.0.1).
• An area ID of 0.0.0.0 is reserved for the backbone.
• Area IDs have the same format as IP addresses but are distinct from IP
addresses.
• You can use the IP network number of the sub-netted network for the
area ID.
routeridEnter the value of
A router ID of 0.0.0.0 is invalid.
Interface or
slot/port
Logical
Interface
Character
strings
Valid slot and port number separated by forward slashes. For example, 0/1
represents slot number 0 and port number 1.
Represents a Logical slot and port number.. This is applicable in the case of
a port-channel (LAG). You can use the logical slot/port to configure the
port-channel.
Use double quotation marks to identify character strings, for example,
“System Name with Spaces.” An empty string (“”) is not valid.
<routerid> in dotted-decimal notation, such as 0.0.0.1.
18Sun Netra CP3240 Switch User’s Guide • April 2009
Slot/Port Naming Convention
Sun Netra CP3240 switch software references physical entities such as cards and
ports by using a slot/port naming convention. The Sun Netra CP3240 switch
software also uses this convention to identify certain logical entities, such as PortChannel interfaces.
The slot number has two uses. In the case of physical ports, it identifies the card
containing the ports. In the case of logical and CPU ports, it also identifies the type
of interface or port.
TABLE 2-3Slot Types
Slot TypeDescription
Physical slot
numbers
Logical slot
numbers
CPU slot
numbers
The port identifies the specific physical port or logical interface being managed on a
given slot.
Physical slot numbers begin with zero, and are allocated up to the
maximum number of physical slots.
Logical slots immediately follow physical slots and identify portchannel (LAG) or router interfaces.
The CPU slots immediately follow the logical slots.
TABLE 2-4Port Types
Port TypeDescription
Physical PortsThe physical ports for each slot are numbered sequentially starting
from zero.
Logical
Interfaces
CPU portsCPU ports are handled by the driver as one or more physical entities
Port-channel or Link Aggregation Group (LAG) interfaces are logical
interfaces that are only used for bridging functions.
VLAN routing interfaces are only used for routing functions.
Loopback interfaces are logical interfaces that are always up.
Tunnel interfaces are logical point-to-point links that carry
encapsulated packets.
located on physical slots.
Note – In the CLI, loopback and tunnel interfaces do not use the slot/port format.
To specify a loopback interface, you use the loopback ID. To specify a tunnel
interface, you use the tunnel ID.
Chapter 2Using the Command-Line Interface19
‘No’ Form of a Command
The no keyword is a specific form of an existing command and does not represent a
new or distinct command. Almost every configuration command has a no form.
In general, use the no form to reverse the action of a command or reset a value back
to the default. For example, the no shutdown configuration command reverses the
shutdown of an interface.
Use the command without the keyword no to re-enable a disabled feature or to
enable a feature that is disabled by default.
The behavior of the “?” and the help text are the same for the no keyword:
■ The help message is the same for all forms of the command. The help string might
be augmented with details about the no form behavior.
■ For the (no interface?) and (no inte?) cases, the help options displayed are
identical to the case when the no token is not specified, as in (
(
inte?).
interface?) and
Command Modes
The CLI groups commands into modes according to the command function. Each of
the command modes supports specific Sun Netra CP3240 switch software
commands. The commands in one mode are not available until you switch to that
particular mode, with the exception of the User EXEC mode commands. You can
execute the User EXEC mode commands in the Privileged EXEC mode.
For detailed information about using the CLI with the switch’s software commands
and modes, refer to the Sun Netra CP3240 Switch Software Reference Manual (820-
3253).
The command prompt changes in each command mode to help you identify the
current mode.
TABLE 2-5 lists the command modes, the prompts visible in each mode, and the exit
method from that mode.
Topology is described in “Mode-Based Topology” on page 23.
Descriptions and hierarchy of each mode are in “Mode-Based Command Hierarchy”
on page 25.
20Sun Netra CP3240 Switch User’s Guide • April 2009
TABLE 2-5CLI Command Modes
Command ModeAccess MethodPromptExit or Access Previous Mode
User ExecThis is the first level of access
for performing basic tasks and
listing system information.
Privileged ExecFrom the User Exec mode,
enter the enable command.
Global ConfigFrom the Privileged Exec
mode, enter the configure
command.
VLAN ConfigFrom the Privileged Exec
mode, enter the vlandatabase command.
Interface ConfigFrom the Global Config mode,
enter the interface
<slot/port> command.
Switch>Enter logout command
Switch#Type exit or press Ctrl-Z to
exit to the User Exec mode.
Switch(Config)#Type exit to exit to the
Privileged Exec mode, or press
Ctrl-Z to switch to the User
Exec mode.
Switch(Vlan)#Type exit to exit to the
Privileged Exec mode, or press
Ctrl-Z to switch to the User
Exec mode.
Switch (Interface
<slot/port>)#
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the User Exec
Switch (Inter-
mode.
face Loopback
<id>)#
Switch (Interface Tunnel
<id>)#
Line ConfigFrom the Global Config mode,
enter the lineconfig
command.
Policy Map
Config
From the Global Config mode,
enter the policy-map<policy-name> command.
Policy Class
Config
From the Policy Map mode,
enter the class command.
Class Map Config From the Global Config mode,
enter the class-map
<class-map-name>
command.
Switch (line)#Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the User Exec
mode.
Switch (Configpolicy-map)#
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the User Exec
mode.
Switch (Configpolicy-class-map)#
Type exit to exit to the Policy
Map mode, or press Ctrl-Z to
switch to the User Exec mode.
Switch (Configclass-map)#
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the User Exec
mode.
Chapter 2Using the Command-Line Interface21
TABLE 2-5CLI Command Modes (Continued)
Command ModeAccess MethodPromptExit or Access Previous Mode
Router OSPF
Config
From the Global Config mode,
enter the router ospf
command.
Router OSPFv3
Config
From the Global Config mode,
enter the
ipv6 router ospf
command.
Router RIP
Config
From the Global Config mode,
enter the router rip
command.
Router BGP
Config
From the Global Config mode,
enter the router bgp
<asnumber> command.
MAC Access-list
Config
From the Global Config mode,
enter mac access-list
extended
<name>.
TACACS ConfigFrom the Global Config mode,
tacacs-server host
enter
<ip-addr>
addr>
, where <ip-
is the IP address of the
TACACS server on your
network.
Switch (Configrouter)#
Switch (Configrtr)#
Switch (Configrouter)#
Switch (Configrouter)#
Switch (Configmac-access-list)#
Switch (Tacacs)#
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the User Exec
mode.
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the User Exec
mode.
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the User Exec
mode.
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the User Exec
mode.
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the Privileged
EXEC mode.
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the Privileged
EXEC mode.
DHCP Pool
Config
From the Global Config mode,
enter the ip dhcp pool
Switch (Configdhcp-pool)#
<pool-name> command.
DHCPv6 Pool
Config
From the Global Config mode,
enter the ip dhcp pool
Switch (Configdhcp6-pool)#
<pool-name> command.
22Sun Netra CP3240 Switch User’s Guide • April 2009
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the Privileged
EXEC mode.
Type exit to exit to the Global
Config mode, or press Ctrl-Z
to switch to the Privileged
EXEC mode.
Mode-Based Topology
The CLI tree is built on a mode concept in which the commands are available
according to the interface. Some of the modes in the mode-based CLI are depicted in
FIGURE 2-1.
Note – The User Exec commands are also accessible in the Privileged Exec Mode.
Note – Access to all commands in the Privileged Exec mode and below is restricted
through a password.
Chapter 2Using the Command-Line Interface23
FIGURE 2-1Mode-based CLI
Root
User Exec
Enable
Passwd
Correct
?
Yes
Privileged
Exec
No
Return to the
Return to the
User prompt
Exec prompt
Bwp
bwallocation
VLAN
Policy MapBwprovisioning
Class MapLine Config
Policy Class
Bwp
traffic class
Global Config
Interface
Config
Router BGP
Config
DHCP Pool
Config
Router OSPF
Config
Router RIP
Config
Stacking
Config
24Sun Netra CP3240 Switch User’s Guide • April 2009
Mode-Based Command Hierarchy
The commands in one mode are not available until the operator switches to that
particular mode, with the exception of the User Exec mode commands. The User
Exec mode commands can also be executed in the Privileged Exec mode.
The commands available to the operator at any time depend upon the mode.
Entering a question mark (?) at the CLI prompt displays a list of the currently
available commands and descriptions of the commands.
User Exec Mode
When the operator logs in to the CLI, the User Exec mode is the initial mode. The
User Exec mode contains a limited set of commands. The command prompt shown
at this level is $ Switch>
Privileged Exec Mode
To have access to the full suite of commands, the operator must enter the Privileged
Exec mode. The Privileged Exec mode requires password authentication. From
Privileged Exec mode, the operator can issue any Exec command, enter the VLAN
mode or enter the Global Config mode. The command prompt shown at this level is
$ Switch#
Global Config Mode
This mode permits the operator to make modifications to the running configuration.
General setup commands are grouped in this mode. From the Global Config mode,
the operator can enter the System Config mode, the Physical Port Config mode, the
Interface Config mode, or the protocol-specific modes. The command prompt at this
level is $ Switch (Config)#
From the Global Config mode, the operator can enter the following protocol-specific
modes configuration modes.
Chapter 2Using the Command-Line Interface25
Interface Config
Many features are enabled for a particular interface. The Interface commands enable
or modify the operation of an interface.
This mode allows you to enable or modify the operation of an interface and provides
access to the router interface configuration commands.
Use this mode to set up a physical port for a specific logical connection operation.
In this mode, a physical port is set up for a specific logical connection operation. The
Interface Config mode provides access to the router interface configuration
commands. The command prompt at this level is $ Switch (Interface
<slot/port>)#
The resulting prompt for the interface configuration command entered in the Global
Configuration mode is $ Switch (Interface Loopback <id> and $ Switch(Interface Tunnel <id>.
Line Config
This mode allows the operator to configure the console interface. The operator can
configure the interface from the directly connected console or the virtual terminal
used with Telnet. The command prompt at this level is $ Switch(line)#
Policy Map Config
Use the policy-map <policy-name> command to access the QoS policy map
configuration mode to configure the QoS policy map.
$ Switch (Config)# policy map <policy-name>
$ Switch (Config-policy-map)#
Policy Class Config
Use the class <class-name> command to access the QoS policy-classmap mode to
attach or remove a diffserv class to a policy and to configure the QoS policy class.
$ Switch (Config policy-map)# class <class-name>
$ Switch (Config-policy-classmap)#
26Sun Netra CP3240 Switch User’s Guide • April 2009
Class Map Config
This mode consists of class creation, deletion, and matching commands. The class
match commands specify layer 2, layer 3, and general match criteria. Use the
class-map <class-map-name> commands to access the QoS class map
configuration mode to configure QoS class maps.
$ Switch (Config)# class-map <class-map-name>
$ Switch (Config class-map)#
Router OSPF Config
In this mode, the operator is allowed to access the router OSPF configuration
commands. The command prompt at this level is:
$ Switch (Config)# router ospf
$ Switch (Config-router) #
Router OSPFv3 Config
In this mode, the operator is allowed to access the router OSPFv3 configuration
commands. The command prompt at this level is:
$ Switch (Config)# rtr ospf
$ Switch (Config-rtr) #
Router RIP Config
In this mode, the operator is allowed to access the router RIP configuration
commands. The command prompt at this level is:
$ Switch (Config)# router rip
$ Switch (Config router)#
Chapter 2Using the Command-Line Interface27
Router BGP Config
In this mode, the operator is allowed to access the router BGP-4 configuration
commands. The command prompt at this level is:
$ Switch (Config)# router bgp <1-65535>
$ Switch (Config-routerbgp)#
MAC Access-list Config
In this mode, the operator is allowed to create a MAC Access-list and to enter the
mode containing Mac Access-list configuration commands. The command prompt at
this level is:
$ Switch (Config)#
$ Switch (Config-mac-access-list) #
mac access-list extended <name>
TACACS Config
In this mode, the operator is allowed to configure properties for the TACACS
servers. The command prompt at this level is:
$ Switch (Config)# tacacs-server host
$ Switch (Tacacs) #
<ip-addr>
DHCP Pool Config
Use the ip dhcp pool <pool-name> command to access the DHCP Pool Config
mode.
$ Switch (Config)# ip dhcp pool <pool-name>
$ Switch (Config-dhcp-pool)#
28Sun Netra CP3240 Switch User’s Guide • April 2009
DHCPv6 Pool Config
Use the ip dhcp pool <pool-name> command to access the DHCP Pool Config
mode.
$ Switch (Config)# ip dhcpv6 pool <pool-name>
$ Switch (Config-dhcp6-pool)#
VLAN Mode
This mode groups all the commands pertaining to VLANs. The command prompt
shown at this level is $ Switch (Vlan)#
Operation Flow
This section captures the flow of operation for the CLI.
1. The operator logs in to the CLI session and enters the User Exec mode. In the
User Exec mode, the $(exec)> prompt is displayed on the screen.
The parsing process is initiated whenever the operator types a command and
presses Enter. The command tree is searched for the command of interest. If the
command is not found, the output message indicates where the offending entry
begins. For instance, if command node A has the command
but the operator attempts to execute the command show arpp brief, the output
message is $(exec)> show arpp brief^. $%Invalid input detected
at '^' marker.
If the operator has given an invalid input parameter in the command, the
message conveys to the operator that an invalid input was detected. The layout of
the output is:
(exec) #show arpp brief
^
%Invalid input detected at ‘^’ marker.
After all the mandatory parameters are entered, any additional parameters
entered are treated as optional parameters. If any of the parameters are not
recognized, a syntax error message is displayed.
2. After the command is successfully parsed and validated, the control of execution
goes to the corresponding CLI callback function.
show arp brief
Chapter 2Using the Command-Line Interface29
3. For mandatory parameters, the command tree extends until the mandatory
parameters make the leaf of the branch. The callback function is invoked only
when all the mandatory parameters are provided. For optional parameters, the
command tree extends until the mandatory parameters and the optional
parameters make the leaf of the branch. However, the callback function is
associated with the node where the mandatory parameters are fetched. The
callback function then takes care of the optional parameters.
4. Once the control has reached the callback function, the callback function has
complete information about the parameters entered by the operator.
Command Completion and
Abbreviation
Command completion finishes spelling the command when you have typed enough
letters of a command to uniquely identify the command word. You can execute the
command by pressing the Enter key (command abbreviation) or you can complete
the command word by pressing the Tab or spacebar keys (command completion).
The value “Er” designates that the requested value was not internally accessible.
This should not happen and indicates that the software is not handling this instance
correctly.
The value of “-----” designates that the value is unknown
.
30Sun Netra CP3240 Switch User’s Guide • April 2009
CLI Error Messages
If you enter a command and the system is unable to execute it, an error message
appears. Table 2-6 describes the most common CLI error messages.
TABLE 2-6CLI Error Messages
Message TextDescription
% Invalid input detected
at '^' marker.
Command not found /
Incomplete command. Use
? to list commands.
Ambiguous command
Indicates that you entered an incorrect or unavailable
command. The carat (^) shows where the invalid text
is detected. This message also appears if any of the
parameters or values are not recognized.
Indicates that you did not enter the required
keywords or values.
Indicates that you did not enter enough letters to
uniquely identify the command.
CLI Line-Editing Conventions
Table 2-7 describes the key combinations you can use to edit commands or increase
the speed of command entry. You can access this list from the CLI by entering
help
from the User or Privileged EXEC modes.
TABLE 2-7CLI Editing Conventions
Key SequenceDescription
DEL or BackspaceDelete previous character
Ctrl-AGo to beginning of line
Ctrl-EGo to end of line
Ctrl-FGo forward one character
Ctrl-BGo backward one character
Ctrl-DDelete current character
Ctrl-U, XDelete to beginning of line
Ctrl-KDelete to end of line
Ctrl-WDelete previous word
Ctrl-TTranspose previous character
Chapter 2Using the Command-Line Interface31
TABLE 2-7CLI Editing Conventions (Continued)
Key SequenceDescription
Ctrl-PGo to previous line in history buffer
Ctrl-RRewrites or pastes the line
Ctrl-NGo to next line in history buffer
Ctrl-YPrints last deleted character
Ctrl-QEnables serial flow
Ctrl-SDisables serial flow
Ctrl-ZReturn to root command prompt
Tab, <SPACE>Command-line completion
ExitGo to next lower command prompt
?List available commands, keywords, or parameters
Using CLI Help
Enter a question mark (?) at the command prompt to display the commands
available in the current mode.
(switch) >?
enable Enter into user privilege mode.
help Display help for various special keys.
logoutExit this session. Any unsaved changes are
lost.
pingSend ICMP echo packets to a specified IP
address.
quitExit this session. Any unsaved changes are
lost.
show Display Switch Options and Settings.
telnet Telnet to a remote host.
32Sun Netra CP3240 Switch User’s Guide • April 2009
Enter a question mark (?) after each word you enter to display available command
keywords or parameters.
(switch) #network ?
javamode Enable/Disable.
mgmt_vlan Configure the Management VLAN ID of the
switch.
parmsConfigure Network Parameters of the router.
protocolSelect DHCP, BootP, or None as the network
config
protocol.
If the help output shows a parameter in angle brackets, you must replace the
parameter with a value.
(switch) #network parms ?
<ipaddr> Enter the IP Address.
If there are no additional command keywords or parameters, or if additional
parameters are optional, the following message appears in the output:
<cr> Press Enter to execute the command
You can also enter a question mark (?) after typing one or more characters of a word
to list the available command or parameters that begin with the letters, as shown in
the following example:
(switch) #show m?
mac-addr-table mac-address-table monitor
Chapter 2Using the Command-Line Interface33
Accessing the CLI
You can access the CLI by using a direct-console connection or by using a telnet or
SSH connection from a remote management host.
For the initial connection, you must use a direct connection to the console port. You
cannot access the system remotely until the system has an IP address, subnet mask,
and default gateway. You can set the network configuration information manually,
or you can configure the system to accept these settings from a BOOTP or DHCP
server on your network. For more information, see “Network Interface Commands”
on page 472.
Comments
The CLI enables the user to type single-line annotations at the command prompt for
use when writing test or configuration scripts and for better readability. The
exclamation point (!) character flags the beginning of a comment. The comment flag
character can begin a word anywhere on the command line and all input following
this character is ignored. Any command line that begins with the character ! is
recognized as a comment line and ignored by the parser.
Some examples of comments are provided in the following code.
! Script file for displaying the ip interface
! Display information about interfaces
show ip interface 0/1 !Displays the information about the first interface
! Display information about the next interface
show ip interface 0/2
! End of the script file
34Sun Netra CP3240 Switch User’s Guide • April 2009
CHAPTER
3
Using the Web Interface
This chapter is a brief introduction to the Web interface. This chapter explains how
to access the Web-based management panels to configure and manage the system.
This chapter contains the following topics:
■ Section , “Configuring for Web Access” on page 3-36
■ Section , “Starting the Web Interface” on page 3-37
35
Configuring for Web Access
You can manage your switch through a Web browser and Internet connection. This is
referred to as Web-based management. To use Web-based management, the system
must be set up for network connectivity.
To access the switch, the Web browser must support:
■ HTML version 4.0, or later
■ HTTP version 1.1, or later
■ JavaScript
■ Java
There are equivalent functions in the Web interface and the terminal interface—both
applications usually employ the same menus to accomplish a task. For example,
when you log in, there is a Main Menu with the same functions available, etc.
There are several differences between the Web and terminal interfaces. For example,
on the Web interface the entire forwarding database can be displayed, while the
terminal interface only displays 10 entries starting at specified addresses.
To terminate the Web interface session, close the web browser.
TM
version 1.2, or later
TM
Runtime Plug-in 1.50-06 or later
▼ To Configure for Web Access
1. Configure the switch for network connectivity. (See Chapter 1 for instructions.)
2. Connect the switch to the network.
3. Use the
By default, the web server is enabled.
36Sun Netra CP3240 Switch User’s Guide • April 2009
ip http server command to verify the web server is enabled.
Starting the Web Interface
1. Enter the IP address of the switch in the Web browser address field.
2. Click Login when the Login panel (Figure ) displays.
FIGURE 3-1Web Interface Panel-Example
3. Enter the appropriate User Name and Password.
The User Name and associated Password are the same as those used for the
terminal interface.
4. Click on the Login button.
The System Description Menu displays as shown in Figure 3-2, with the
navigation tree appearing to the left of the screen.
5. Make a selection by clicking on the appropriate item in the navigation tree.
Web Page Layout
A Web interface panel for the switch Web page consists of three areas (Figure 3-2).
■ A banner graphic of the switch appears across the top of the panel.
■ A hierarchical-tree view appears to the left of the panel. The tree consists of a
combination of folders, subfolders, and configuration and status HTML pages.
You can think of the folders and subfolders as branches and the configuration and
status HTML pages as leaves. Only the selection of a leaf (not a folder or
subfolder) will cause the display of a new HTML page. A folder or subfolder has
no corresponding HTML page.
Chapter 3Using the Web Interface37
■ At the bottom-right of the panel display, the currently selected device
configuration status and/or the user configurable information that you have
selected from the tree view.
FIGURE 3-2Web Interface Panel-Example
FIGURE 3-3Configuring an SNMP V3 User Profile
38Sun Netra CP3240 Switch User’s Guide • April 2009
Chapter 3Using the Web Interface39
Configuring an SNMP V3 User Profile
Configuring an SNMP V3 user profile is a part of user configuration. Any user can
connect to the switch using the SNMPv3 protocol, but for authentication and
encryption, additional steps are needed. Use the following steps to configure an
SNMP V3 new user profile.
1. Select System-->Configuration-->User Accounts from the hierarchical tree on
the left side of the web interface (see Figure 3-3).
2. Using the User pull-down menu, select Create to create a new user.
3. Enter a new user name in the User Name field.
4. Enter a new user password in the Password field and then retype it in the
Confirm Password field.
Note – If SNMPv3 Authentication is to be implemented for this user, set a password
of eight or more alphanumeric characters.
5. If you do not need authentication, go to Step 9.
6. To enable authentication, use the Authentication Protocol pull-down menu to
select either MD5 or SHA for the authentication protocol.
7. If you do not need encryption, go to Step 9.
8. To enable encryption, use the Encryption Protocol pull-down menu to select
DES for the encryption scheme. Then, enter an encryption code of eight or
more alphanumeric characters in the Encryption Key field.
9. Click Submit.
40Sun Netra CP3240 Switch User’s Guide • April 2009
Command Buttons
The following command buttons are used throughout the Web interface panels for
the switch:
Command ButtonDescription
SavePressing the Save button implements and saves the changes you just
made. Some settings may require you to reset the system in order for
them to take effect.
RefreshPressing the Refresh button that appears next to the Apply button in Web
interface panels refreshes the data on the panel.
SubmitPressing the Submit button sends the updated configuration to the
switch. Configuration changes take effect immediately, but these changes
are not retained across a power cycle unless a save is performed.
Chapter 3Using the Web Interface41
42Sun Netra CP3240 Switch User’s Guide • April 2009
CHAPTER
4
Establishing Management Security
This chapter describes how to enable management security. Enabling management
security is a two-step process. The first step involves generating and loading
appropriate authentication keys (SSH) and security certificates (SSL). Optionally a
reputable third party such as RSA Security, Inc. or Entrust, Inc. can validate these
certificates and keys but for evaluation purposes validation is unnecessary. The
second step involves enabling either SSL or SSH and optionally disabling the
insecure versions of telnet and web management. Once enabled, subsequent
management connections may be made in a secure manner.
This chapter contains the following topics:
■ Section , “Certificate Generation” on page 4-44
■ Section , “Configuring Secure Shell” on page 4-45
■ Section , “Configuring Secure Socket Layer” on page 4-46
■ Section , “Using Certificate Generation Scripts” on page 4-47
43
Certificate Generation
To generate self-signed credentials, the open source applications ssh-keygen and
openssl can be used to create the seven files used to form the security certificates and
authentication keys. Both of these applications are well documented by the open
source community. Detailed descriptions will not be repeated here as the user can
check the man pages for detailed help. Two scripts are included at the end of
thischapter along with some helper files. This set of files can be freely modified and
used to generate the appropriate self-signed credentials. Generation of these
credentials has been verified using both cygwin and Linux.
Once the component files are created, the credentials must be loaded onto the Sun
Netra CP3240 switch. This is accomplished using the "copy" command from a tftp
server. From privileged EXEC mode, issue the following command:
where the IP address of the tftp server should be substituted as appropriate. This
copy command is repeated for all the authentication components:
■ rsa1.key nvram:sshkey-rsa1
■ rsa2.key nvram:sshkey-rsa2
■ dsa.key nvram:sshkey-dsa
■ dh512.pem nvram:sslpem-dhweak
■ dh1024.pem nvram:sslpem-dhstrong
■ server.pem nvram:sslpem-server
■ rootcert.pem nvram:sslpem-root
The SSL and SSH credentials may be uploaded separately as needed but as it is
likely that if security is required for one access method it would be required for all
access methods, it is recommended that the certificates and authentication key be
created simultaneously.
44Sun Netra CP3240 Switch User’s Guide • April 2009
Configuring Secure Shell
Once the authentication credentials are loaded and the certificates and
authentication keys are formed, management security may be configured on the
FASTPATH device. From privileged EXEC mode, issue the command:
ip ssh
This will allow secure shell sessions to be instantiated on the Sun Netra CP3240
switch. The message log should be checked for errors if a secure connection cannot
be established. Entries such as the following indicate the nature of the problem.
0 days 02:30:30 File: ssh_sys_fastpath.c : Line: 584 : tid 40052584, context
0x0x157dba0, deleting 40052584, retval = 1
0 days 02:30:30 File: ssh_sys_fastpath.c : Line: 401 : SSHD: exiting global context
0x0x157dba0
0 days 02:30:30 File: sshd_main.c : Line: 550 : SSHD: host key is corrupt (did not
decode).
In this case, the authentication credentials were invalid and should be regenerated.
Messages indicating successful start of the ssh service look like the following
example.
0 days 00:17:07 Unit: 1 : File: sshd_main.c : Line: 349 : SSHD:
Done generating server key
0 days 00:17:06 Unit: 1 : File: sshd_main.c : Line: 639 : SSHD:
successfully loaded RSA2 key
0 days 00:17:06 Unit: 1 : File: sshd_main.c : Line: 627 : SSHD:
successfully opened file ssh_host_rsa_key
0 days 00:17:06 Unit: 1 : File: sshd_main.c : Line: 605 : SSHD:
successfully loaded DSA key
0 days 00:17:06 Unit: 1 : File: sshd_main.c : Line: 592 : SSHD:
successfully opened file ssh_host_dsa_key
0 days 00:17:06 Unit: 1 : File: sshd_control.c : Line: 400 : SSHD:
sshdListenTask started
To disable insecure access, issue the commands:
lineconfig
no transport input telnet
Chapter 4Establishing Management Security45
Note – Issuing this command terminates all active telnet sessions, and no new telnet
sessions will be allowed. Refer to the
(820-3253) for more information on configuring remote sessions.
Sun Netra CP3240 Switch Command Reference Manual
Configuring Secure Socket Layer
Optionally or in concert with SSH, SSL may be enabled. Once again the message log
is the best source of feedback for problem determination. To enable SSL, issue the
privileged EXEC mode command:
ip http secure-server
Success may be determined by attempting secure web access using https. Once
again, consult the message log for failure information. Valid certificates are indicated
by a message log entry that looks like the following:
0 days 01:25:29 Unit: 1 : File: sslt_util.c : Line: 303 : SSLT:
Successfully loaded all required SSL PEM files
Certificate information may be accessed using browser-specific methods. With
Internet Explorer, the lock icon along the bottom message line can be checked for
certificate details. Additionally, when connecting to a Sun Netra CP3240 switch that
uses self-generated credentials, Explorer will warn the user about the authenticity of
the certificate. When secure certificates are acquired from a third party this warning
will no longer occur. Insecure web sessions may be prevented by disabling the http
server using the privileged EXEC mode command:
no ip http server
As with secure shell, the best guide for information on FASTPATH commands
controlling http and https access is the Sun Netra CP3240 Switch Software Reference
Manual (
820-3253).
46Sun Netra CP3240 Switch User’s Guide • April 2009
Using Certificate Generation Scripts
The following four scripts and helper files can be used to generate self-signed
certificates and authentication keys.
#!/bin/sh
# Ensure that OpenSSL is installed and set the location correctly
OPENSSL=/usr/bin/openssl
# Set the password to something unique
PASSWORD=FASTPATH
# Set the number of days the certs will be valid for
VALID_NUM_DAYS=3650
#################################################################
####
#
# Generate the Self Signed Trusted Root Certification Authority
(CA) and
Chapter 4Establishing Management Security47
CODE EXAMPLE 4-2SSL pemCreate.sh Example (Continued)
#################################################################
####
#
# Generate the Trusted Server Certificate signed by the Root CA
#
#################################################################
####
${OPENSSL} req -newkey rsa:1024 -sha1 -keyout serverkey.pem -nodes
52Sun Netra CP3240 Switch User’s Guide • April 2009
CHAPTER
5
Configuring Virtual LANs
This chapter provides examples for configuring LANS.
This chapter contains the following topics:
■ Section , “VLAN Configuration Example” on page 5-54
■ Section , “CLI Examples” on page 5-56
■ Section , “Web Interface” on page 5-58
■ Section , “Private Edge VLANs” on page 5-59
53
VLAN Configuration Example
Each VLAN in a network has an associated VLAN ID, which appears in the IEEE
802.1Q tag in the Layer 2 header of packets transmitted on a VLAN. An end station
may omit the tag, or the VLAN portion of the tag, in which case the first switch port
to receive the packet may either reject it or insert a tag using its default VLAN ID. A
given port may handle traffic for more than one VLAN, but it can only support one
default VLAN ID.
Two features let you define packet filters that the switch uses as the matching criteria
to determine if a particular packet belongs to a particular VLAN.
■ The IP-subnet Based VLAN feature lets you map IP addresses to VLANs by
specifying a source IP address, network mask, and the desired VLAN ID.
■ The MAC-based VLAN feature let packets originating from end stations become
part of a VLAN according to source MAC address. To configure the feature, you
specify a source MAC address and a VLAN ID.
The Private Edge VLAN feature lets you set protection between ports located on the
switch. This means that a protected port cannot forward traffic to another protected
port on the same switch.
The feature does not provide protection between ports located on different switches.
The diagram in this section shows a switch with four ports configured to handle the
traffic for two VLANs. Port 0/2 handles traffic for both VLANs, while port 0/1 is a
member of VLAN 2 only, and ports 0/3 and 0/4 are members of VLAN 3 only. The
script following the diagram shows the commands you would use to configure the
switch as shown in the diagram.
54Sun Netra CP3240 Switch User’s Guide • April 2009
FIGURE 5-1VLAN Example Network Diagram
Layer 3 Switch
VLAN 2
Port 1/0/1
VLAN 2
Port 1/0/2
VLANs 2 & 3
Port 1/0/4
VLAN 3
Port 1/0/3
VLAN 3
VLAN 3
Chapter 5Configuring Virtual LANs55
CLI Examples
The following examples show how to create VLANs, assign ports to the VLANs, and
assign a VLAN as the default VLAN to a port.
Example 1: Create Two VLANs
Use the following commands to create two VLANs and to assign the VLAN IDs
while leaving the names blank.
This sequence shows how to assign ports to VLAN2, specify that frames will always
be transmitted tagged from all member ports, and that untagged frames will be
rejected on receipt.
Use the following screens to perform the same configurations described in the
previous sections, but using the Web interface instead of the CLI:
■ Switching --> VLAN--> Configuration. To create VLANs and specify port
participation.
■ Switching --> VLAN --> Port Configuration. To specify the handling of untagged
frames on receipt, and whether frames will be transmitted tagged or untagged.
58Sun Netra CP3240 Switch User’s Guide • April 2009
Private Edge VLANs
Use the Private Edge VLAN feature to prevent ports on the switch from forwarding
traffic to each other even if they are on the same VLAN.
■ Protected ports cannot forward traffic to other protected ports in the same group,
even if they have the same VLAN membership. Protected ports can forward
traffic to unprotected ports.
■ Unprotected ports can forward traffic to both protected and unprotected ports.
You can also configure groups of protected ports, but unprotected ports are
independent and cannot be added to a group. Each group’s configuration consists of
a name and a mask of ports. A port can belong to only one set of protected ports, but
an unprotected port can be added to a group as a protected port.
The group name is configurable by the network administrator.
Use the switchport protected command to designate a port as protected. Use the
show switchport protected command to display a listing of the protected ports.
CLI Example
Example 1: Switchport Protected
CODE EXAMPLE 5-6Protecting the Switchport
(DTI SWITCH) #config
(DTI SWITCH) (Config)#interface 0/1
(DTI SWITCH) (Interface 0/1)#switchport protected ?
<cr> Press Enter to execute the command.
(DTI SWITCH) (Interface 0/1)#switchport protected
Example 2: Show Switchport Protected
(DTI SWITCH) #show switchport protected 0/1
Chapter 5Configuring Virtual LANs59
60Sun Netra CP3240 Switch User’s Guide • April 2009
CHAPTER
6
Configuring Port Channels by Link
Aggregation
This chapter describes how to use the Link Aggregation feature to configure portchannels via the CLI and the Graphical User Interface.
This chapter contains the following topics:
■ Section , “Using the Link Aggregation Feature” on page 6-62
■ Section , “Configuring Link Aggregation via CLI” on page 6-63
■ Section , “Configuring Link Aggregation via Web Interface” on page 6-66
61
Using the Link Aggregation Feature
The Link Aggregation (LAG) feature allows the switch to treat multiple physical
links between two end-points as a single logical link called a port-channel. All of the
physical links in a given port-channel must operate in full-duplex mode at the same
speed.
You can use the feature to directly connect two switches when the traffic between
them requires high bandwidth and reliability, or to provide a higher bandwidth
connection to a public network.
You can configure the port-channels as either dynamic or static. Dynamic
configuration uses the IEEE 802.3ad standard, which provides for the periodic
exchanges of LACPDUs. Static configuration is used when connecting the switch to
an external switch that does not support the exchange of LACPDUs.
The feature offers the following benefits:
■ Increased reliability and availability -- if one of the physical links in the port-
channel goes down, traffic is dynamically and transparently reassigned to one of
the other physical links.
Use the show port-channel all command to show the logical interface ids you
will use to identify the port-channels in subsequent commands. Assume that lag_10
is assigned id 1/1 and lag_20 is assigned id 1/2.
CODE EXAMPLE 6-2Showing Port Channels
(DTI SWITCH) #show port-channel all
Port- Link
Log.ChannelAdm. TrapSTPMbrPortPort
IntfNameLinkMode ModeModeTypePortsSpeed
Active
At this point, the LAGs could be added to the default management VLAN.
Chapter 6Configuring Port Channels by Link Aggregation65
Configuring Link Aggregation via Web
Interface
To perform the same configuration as described in the previous CLI sections, use:
Switching --> Link Aggregation --> Configuration on the Web interface.
To create the port-channels, specify port participation and enable Link Aggregation
(LAG) support on the switch.
66Sun Netra CP3240 Switch User’s Guide • April 2009
CHAPTER
7
Configuring Storm Control
This chapter describes how to configure storm control on the switch.
This chapter contains the following topics:
■ Section , “Understanding Traffic Storms” on page 7-68
■ Section , “CLI Examples” on page 7-69
67
Understanding Traffic Storms
A traffic storm is a condition that occurs when incoming packets flood the LAN,
which creates performance degradation in the network. FASTPATH’s Storm Control
feature protects against this condition.
FASTPATH provides broadcast, multicast, and unicast storm recovery for individual
interfaces or for all interfaces, depending on forwarding-plane silicon. If the silicon
supports configuration for all interfaces, you will not be able to configure individual
interfaces.
Unicast Storm Control protects against traffic whose MAC addresses are not known
by the system.
For broadcast, multicast, and unicast storm control, if the rate of traffic ingressing on
an interface increases beyond the configured threshold for that type, the traffic is
dropped.
To configure storm control, you’ll enable the feature for all interfaces or for
individual interfaces, and you’ll set the threshold (storm control level) beyond which
the broadcast, multicast, or unicast traffic will be dropped.
Configuring a storm-control level also enables that form of storm-control. Disabling
a storm-control level (using the “no” version of the command) sets the storm-control
level back to default value and disables that form of storm-control. Using the “no”
version of the “storm-control” command (not stating a “level”) disables that form of
storm-control but maintains the configured “level” (to be active next time that form
of storm-control is enabled).
68Sun Netra CP3240 Switch User’s Guide • April 2009
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.