Smc-networks SMC TigerAccess SMC7824M/FSW Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Počítačové příslušenství Smc-networks SMC TigerAccess SMC7824M/FSW. SMC Networks SMC TigerAccess SMC7824M/FSW User Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 748
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
TigerAccess
10/100
Fast Ethernet Switch
24 100BASE-BX Single-Fiber Ports
2 10/100/1000BASE-T ports shared with SFP slots
2 module slots for shared 1000BASE-T port / SFP slot
Non-blocking switching architecture
Spanning Tree Protocol, RSTP and MSTP
Up to 12 LACP or static 8-port trunks
Layer 2/3/4 CoS support through eight priority queues
Layer 3/4 traffic priority with IP Precedence and IP DSCP
Full support for VLANs with GVRP
IGMP multicast filtering and snooping
Support for jumbo frames up to 9 KB
Manageable via console, Web, SNMP/RMON
Security features: ACL, RADIUS, 802.1X
Management Guide
SMC7824M/FSW
Zobrazit stránku 0
1 2 3 4 5 6 ... 747 748

Shrnutí obsahu

Strany 1 - TigerAccess

TigerAccess™ 10/100Fast Ethernet Switch◆ 24 100BASE-BX Single-Fiber Ports◆ 2 10/100/1000BASE-T ports shared with SFP slots◆ 2 module slots for shared

Strany 2

TABLE OF CONTENTSxCreating Trunk Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-8Statically Configuring a Trun

Strany 3 - Management Guide

BASIC MANAGEMENT TASKS4-26Web – Click System, Line, Telnet. Specify the connection parameters for Telnet access, then click Apply.Figure 4-15 Configu

Strany 4 - Trademarks:

CONFIGURING EVENT LOGGING4-27Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events tha

Strany 5

BASIC MANAGEMENT TASKS4-28• RAM Level – Limits log messages saved to the switch’s temporary RAM memory for all levels up to the specified level. For e

Strany 6

CONFIGURING EVENT LOGGING4-29CLI – Enable system logging and then specify the level of messages to be logged to RAM and flash memory. Use the show log

Strany 7

BASIC MANAGEMENT TASKS4-30• Host IP Address – Specifies a new server IP address to add to the Host IP List.Web – Click System, Logs, Remote Logs. To a

Strany 8

CONFIGURING EVENT LOGGING4-31CLI – Enter the syslog server host IP address, choose the facility type and set the logging trap.Displaying Log MessagesU

Strany 9

BASIC MANAGEMENT TASKS4-32CLI – This example shows the event message stored in RAM.Sending Simple Mail Transfer Protocol AlertsTo alert system adminis

Strany 10

CONFIGURING EVENT LOGGING4-33Web – Click System, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. To add

Strany 11

BASIC MANAGEMENT TASKS4-34CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and speci

Strany 12

SETTING THE SYSTEM CLOCK4-35CLI – Use the reload command to restart the switch.Note: When restarting the system, it will always run the Power-On Self-

Strany 13

TABLE OF CONTENTSxiConfiguring Private VLANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-25Enabling Private VLANs . . . . .

Strany 14

BASIC MANAGEMENT TASKS4-36• SNTP Server – Sets the IP address for up to three time servers. The switch attempts to update the time from the first serv

Strany 15

SETTING THE SYSTEM CLOCK4-37Setting the Time ZoneSNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time

Strany 16

BASIC MANAGEMENT TASKS4-38

Strany 17

5-1CHAPTER 5SIMPLE NETWORKMANAGEMENT PROTOCOLSimple Network Management Protocol (SNMP) is a communication protocol designed specifically for managing

Strany 18

SIMPLE NETWORK MANAGEMENT PROTOCOL5-2Access to the switch using from clients using SNMPv3 provides additional security features that cover message int

Strany 19

5-3Note: The predefined default groups and view can be deleted from the system. You can then define customized groups and views for the SNMP clients t

Strany 20

SIMPLE NETWORK MANAGEMENT PROTOCOL5-4Enabling the SNMP AgentEnables SNMPv3 service for all management clients (i.e., versions 1, 2c, 3). Command Attri

Strany 21

SETTING COMMUNITY ACCESS STRINGS5-5• Community String – A community string that acts like a password and permits access to the SNMP protocol. Default

Strany 22

SIMPLE NETWORK MANAGEMENT PROTOCOL5-6Specifying Trap Managers and Trap TypesTraps indicating status changes are issued by the switch to specified trap

Strany 23

SPECIFYING TRAP MANAGERS AND TRAP TYPES5-7To send an inform to a SNMPv3 host, complete these steps:1. Enable the SNMP agent (page 5-4).2. Enable trap

Strany 24

TABLE OF CONTENTSxiiDisplaying Port Members of Multicast Groups . . . . . . . . . . . 15-19Assigning Static Multicast Groups to Interfaces . . . . .

Strany 25

SIMPLE NETWORK MANAGEMENT PROTOCOL5-8• Trap Inform – Notifications are sent as inform messages. Note that this option is only available for version 2c

Strany 26

SPECIFYING TRAP MANAGERS AND TRAP TYPES5-9Web – Click SNMP, Configuration. Enter the IP address and community string for each management station that

Strany 27

SIMPLE NETWORK MANAGEMENT PROTOCOL5-10Configuring SNMPv3 Management AccessTo configure SNMPv3 management access to the switch, follow these steps:1. I

Strany 28

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-11Web – Click SNMP, SNMPv3, Engine ID. Enter an ID of up to 64 hexadecimal characters and then click Save.Figure

Strany 29

SIMPLE NETWORK MANAGEMENT PROTOCOL5-12Web – Click SNMP, SNMPv3, Remote Engine ID. Enter an ID of up to 64 hexadecimal characters and then click Save.F

Strany 30

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-13- AuthPriv – SNMP communications use both authentication and encryption (only available for the SNMPv3 securit

Strany 31

SIMPLE NETWORK MANAGEMENT PROTOCOL5-14Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and ass

Strany 32

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-15CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring Remot

Strany 33

SIMPLE NETWORK MANAGEMENT PROTOCOL5-16• Security Model – The user security model; SNMP v1, v2c or v3. (Default: v1)• Security Level – The security lev

Strany 34

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-17Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a nam

Strany 35 - NTRODUCTION

TABLE OF CONTENTSxiiiprompt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-6end . . . . . .

Strany 36

SIMPLE NETWORK MANAGEMENT PROTOCOL5-18CLI – Use the snmp-server user command to configure a new user name and assign it to a group.Configuring SNMPv3

Strany 37

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-19• Notify View – The configured view for notifications. (Range: 1-64 characters)Table 5-2 Supported Notificati

Strany 38 - ESCRIPTION

SIMPLE NETWORK MANAGEMENT PROTOCOL5-20linkDown*1.3.6.1.6.3.1.1.5.3 A linkDown trap signifies that the SNMP entity, acting in an agent role, has detect

Strany 39

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-21RMON Events (V2)risingAlarm 1.3.6.1.2.1.16.0.1 The SNMP trap that is generated when an alarm entry crosses its

Strany 40

SIMPLE NETWORK MANAGEMENT PROTOCOL5-22swThermalRising Notification1.3.6.1.4.1.202.20.64.90.2.1.0.58 This trap is sent when the temperature exceeds the

Strany 41

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-23Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, as

Strany 42 - System Defaults

SIMPLE NETWORK MANAGEMENT PROTOCOL5-24CLI – Use the snmp-server group command to configure a new group, specifying the security model and level, and r

Strany 43

CONFIGURING SNMPV3 MANAGEMENT ACCESS5-25Web – Click SNMP, SNMPv3, Views. Click New to configure a new view. In the New View page, define a name and sp

Strany 44

SIMPLE NETWORK MANAGEMENT PROTOCOL5-26CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces

Strany 45

6-1CHAPTER 6USER AUTHENTICATIONYou can configure this switch to authenticate users logging into the system for management access using local or remote

Strany 46

TABLE OF CONTENTSxivspeed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-32stopbits . . . . . . . . .

Strany 47

USER AUTHENTICATION6-2Command Attributes• Account List – Displays the current list of user accounts and associated access levels. (Defaults: admin, an

Strany 48 - ONNECTING

CONFIGURING LOCAL/REMOTE LOGON AUTHENTICATION6-3CLI – Assign a user name to access-level 15 (i.e., administrator), then specify the password.Configuri

Strany 49

USER AUTHENTICATION6-4Command Usage• By default, management access is always checked against the authentication database stored on the local switch. I

Strany 50 - Basic Configuration

CONFIGURING LOCAL/REMOTE LOGON AUTHENTICATION6-5• RADIUS Settings- Global – Provides globally applicable RADIUS settings.- ServerIndex – Specifies one

Strany 51 - Setting Passwords

USER AUTHENTICATION6-6Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authenticati

Strany 52 - Manual Configuration

CONFIGURING HTTPS6-7Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket Laye

Strany 53 - Dynamic Configuration

USER AUTHENTICATION6-8• The following web browsers and operating systems currently support HTTPS:• To specify a secure-site certificate, see “Replacin

Strany 54

CONFIGURING HTTPS6-9Replacing the Default Secure-site CertificateWhen you log onto the web interface using HTTPS (for secure access), a Secure Sockets

Strany 55

USER AUTHENTICATION6-10Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of th

Strany 56 - Trap Receivers

CONFIGURING THE SECURE SHELL6-11To use the SSH server, complete these steps:1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a

Strany 57

TABLE OF CONTENTSxvsnmp-server engine-id . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-10show snmp engine-id . . . .

Strany 58 - Managing System Files

USER AUTHENTICATION6-126. Authentication – One of the following authentication methods is employed:Password Authentication (for SSH v1.5 or V2 Clients

Strany 59 - Saving Configuration Settings

CONFIGURING THE SECURE SHELL6-13Authenticating SSH v2 Clientsa. The client first queries the switch to determine if DSA public key authentication usin

Strany 60

USER AUTHENTICATION6-14• Host-Key Type – The key type used to generate the host key pair (i.e., public and private keys). (Range: RSA, DSA, Both: Defa

Strany 61

CONFIGURING THE SECURE SHELL6-15Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to sa

Strany 62

USER AUTHENTICATION6-16CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and then d

Strany 63

CONFIGURING THE SECURE SHELL6-17• SSH Authentication Retries – Specifies the number of authentication attempts that a client is allowed before authent

Strany 64

USER AUTHENTICATION6-18CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that the a

Strany 65 - AVIGATING

CONFIGURING 802.1X PORT AUTHENTICATION6-19Configuring 802.1X Port Authentication Network switches can provide open and easy access to network resource

Strany 66 - Button Action

USER AUTHENTICATION6-20Transport Layer Security). PEAP will be supported in future releases. The client responds to the appropriate method with its cr

Strany 67 - Table 3-2 Switch Main Menu

CONFIGURING 802.1X PORT AUTHENTICATION6-21Displaying 802.1X Global SettingsThe 802.1X protocol provides port authentication. Command Attributes 802.1X

Strany 68

TABLE OF CONTENTSxviip ssh timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-25ip ssh authentication-retries .

Strany 69

USER AUTHENTICATION6-22Configuring 802.1X Global SettingsThe 802.1X protocol provides port authentication. The 802.1X protocol must be enabled globall

Strany 70

CONFIGURING 802.1X PORT AUTHENTICATION6-23Configuring Port Settings for 802.1XWhen 802.1X is enabled, you need to configure the parameters for the aut

Strany 71

USER AUTHENTICATION6-24• Re-authentication Period – Sets the time period after which a connected client must be re-authenticated. (Range: 1-65535 seco

Strany 72

CONFIGURING 802.1X PORT AUTHENTICATION6-25CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displaye

Strany 73

USER AUTHENTICATION6-26Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Backend State Machine

Strany 74

CONFIGURING 802.1X PORT AUTHENTICATION6-27Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to u

Strany 75

USER AUTHENTICATION6-28Filtering IP Addresses for Management AccessYou can create a list of up to 16 IP addresses or IP address groups that are allowe

Strany 76

FILTERING IP ADDRESSES FOR MANAGEMENT ACCESS6-29• End IP Address – The end address of a range.Web – Click Security, IP Filter. Enter the IP addresses

Strany 77

USER AUTHENTICATION6-30

Strany 78

7-1CHAPTER 7CLIENT SECURITYThis switch supports many methods of segregating traffic for clients attached to each of the data ports, and for ensuring t

Strany 79

TABLE OF CONTENTSxviiip dhcp snooping binding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22-14ip dhcp snooping verify mac-address . .

Strany 80

CLIENT SECURITY7-2• DHCP Snooping5 – Filters IP traffic on unsecure ports for which the source address cannot be identified via DHCP snooping nor stat

Strany 81

CONFIGURING PORT SECURITY7-3• The default maximum number of MAC addresses allowed on a secure port is zero. You must configure a maximum address count

Strany 82

CLIENT SECURITY7-4Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox in the

Strany 83

8-1CHAPTER 8ACCESS CONTROL LISTSAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port n

Strany 84

ACCESS CONTROL LISTS8-2The following filtering modes are supported: • Standard IP ACL mode (STD-ACL) filters packets based on the source IP address. •

Strany 85 - APABILITIES

CONFIGURING ACCESS CONTROL LISTS8-3• Egress MAC ACLs only work for destination-mac-known packets, not for multicast, broadcast, or destination-mac-unk

Strany 86

ACCESS CONTROL LISTS8-4Web – Click Security, ACL, Configuration. Enter an ACL name in the Name field, select the list type (IP Standard, IP Extended,

Strany 87

CONFIGURING ACCESS CONTROL LISTS8-5Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,”

Strany 88 - Using DHCP/BOOTP

ACCESS CONTROL LISTS8-6• Source/Destination IP Address – Source or destination IP address.• Source/Destination Subnet Mask – Subnet mask for source or

Strany 89

CONFIGURING ACCESS CONTROL LISTS8-7Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the addres

Strany 90

TABLE OF CONTENTSxviiiflowcontrol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24-7media-type . .

Strany 91

ACCESS CONTROL LISTS8-83. Permit all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Configuring a MAC ACLComman

Strany 92

CONFIGURING ACCESS CONTROL LISTS8-9Command UsageEgress MAC ACLs only work for destination-mac-known packets, not for multicast, broadcast, or destinat

Strany 93 - ESTORING

ACCESS CONTROL LISTS8-10Configuring ACL MasksYou must specify masks that control the order in which ACL rules are checked. ACL rules matching the firs

Strany 94

CONFIGURING ACCESS CONTROL LISTS8-11Specifying the Mask TypeUse the ACL Mask Configuration page to edit the mask for the Ingress IP ACL, Egress IP ACL

Strany 95

ACCESS CONTROL LISTS8-12Configuring an IP ACL MaskThis mask defines the fields to check in the IP header. Command Usage• Masks that include an entry f

Strany 96

CONFIGURING ACCESS CONTROL LISTS8-13Web – Configure the mask to match the required rules in the IP ingress or egress ACLs. Set the mask to check for a

Strany 97 - 1. CLI only

ACCESS CONTROL LISTS8-14CLI – This shows that the entries in the mask override the precedence in which the rules are entered into the ACL. In the foll

Strany 98

CONFIGURING ACCESS CONTROL LISTS8-15Web – Configure the mask to match the required rules in the MAC ingress or egress ACLs. Set the mask to check for

Strany 99 - 2. CLI only

ACCESS CONTROL LISTS8-16CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rules

Strany 100 - ANAGEMENT

BINDING A PORT TO AN ACCESS CONTROL LIST8-17• When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Oth

Strany 101 - Command Attributes

TABLE OF CONTENTSxixspanning-tree mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29-4spanning-tree forward-time

Strany 102

ACCESS CONTROL LISTS8-18CLI – This examples assigns an IP and MAC ingress ACL to port 1, and an IP ingress ACL to port 2.Console(config)#interface eth

Strany 103

9-1CHAPTER 9PORT CONFIGURATIONDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the current connectio

Strany 104

PORT CONFIGURATION9-2Web – Click Port, Port Information or Trunk Information.Figure 9-1 Port - Port InformationField Attributes (CLI)Basic informatio

Strany 105 - Displaying Log Messages

DISPLAYING CONNECTION STATUS9-3- 100full - Supports 100 Mbps full-duplex operation - 1000full - Supports 1000 Mbps full-duplex operation - Sym - Trans

Strany 106

PORT CONFIGURATION9-4CLI – This example shows the connection status for Port 5.Configuring Interface Connections You can use the Port Configuration or

Strany 107 - ONFIGURING

CONFIGURING INTERFACE CONNECTIONS9-5Note: 100BASE-BX ports are fixed at 100 Mbps, full-duplex. The 1000BASE-T standard does not support forced mode. A

Strany 108 - Resetting the System

PORT CONFIGURATION9-6-SFP-Forced - Always uses the SFP port (even if module is not installed).-SFP-Preferred-Auto - Uses SFP port if both combination

Strany 109

CONFIGURING INTERFACE CONNECTIONS9-7CLI – Select the interface, and then enter the required settings.Console(config)#interface ethernet 1/13 24-2Conso

Strany 110

PORT CONFIGURATION9-8Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers

Strany 111

CREATING TRUNK GROUPS9-9• The ports at both ends of a trunk must be configured in an identical manner, including communication mode (i.e., speed, dupl

Strany 113

TABLE OF CONTENTSxxinterface vlan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30-9switchport mode . . . . . . . .

Strany 114

PORT CONFIGURATION9-10Command Attributes• Member List (Current) – Shows configured trunks (Trunk ID, Unit, Port).• New – Includes entry fields for cr

Strany 115

CREATING TRUNK GROUPS9-11CLI – This example creates trunk 1 with ports 9 and 10. Just connect these ports to two static trunk ports on another switch

Strany 116

PORT CONFIGURATION9-12• A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID. • If more than eight

Strany 117 - OMMUNITY

CREATING TRUNK GROUPS9-13CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another sw

Strany 118 - Command Usage

PORT CONFIGURATION9-14Note: If the port channel admin key (lacp admin key, page 25-8) is not set (through the CLI) when a channel group is formed (i.e

Strany 119

CREATING TRUNK GROUPS9-15Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can o

Strany 120

PORT CONFIGURATION9-16CLI – The following example configures LACP parameters for ports 1-10. Ports 1-8 are used as active members of the LAG, ports 9

Strany 121

CREATING TRUNK GROUPS9-17Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters Inf

Strany 122

PORT CONFIGURATION9-18CLI – The following example displays LACP counters for port channel 1.Displaying LACP Settings and Status for the Local SideYou

Strany 123

CREATING TRUNK GROUPS9-19Admin State, Oper StateAdministrative or operational values of the actor’s state parameters:• Expired – The actor’s receive m

Strany 124

TABLE OF CONTENTSxximap ip precedence (Interface Configuration) . . . . . . . . . . . . . 31-13map ip dscp (Global Configuration) . . . . . . . . .

Strany 125

PORT CONFIGURATION9-20Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 9-7 LA

Strany 126

CREATING TRUNK GROUPS9-21Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for t

Strany 127

PORT CONFIGURATION9-22Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information.Figure 9-8 L

Strany 128

SETTING BROADCAST STORM THRESHOLDS9-23Setting Broadcast Storm ThresholdsBroadcast storms may occur when a device on your network is malfunctioning, or

Strany 129

PORT CONFIGURATION9-24Web – Click Port, Port Broadcast Control or Trunk Broadcast Control. Check the Enabled box for any interface, set the threshold,

Strany 130

CONFIGURING PORT MIRRORING9-25Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can t

Strany 131

PORT CONFIGURATION9-26Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port, the

Strany 132

CONFIGURING RATE LIMITS9-27Command AttributeRate Limit – Sets the output rate limit for an interface. Default Status – DisabledDefault Rate – Fast Eth

Strany 133

PORT CONFIGURATION9-28Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like MIBs,

Strany 134

SHOWING PORT STATISTICS9-29Received Unknown PacketsThe number of packets received via the interface which were discarded because of an unknown or unsu

Strany 135

TABLE OF CONTENTSxxiiMulticast VLAN Registration Commands . . . . . . . . . . . . . . . . . . . . . 33-15mvr (Global Configuration) . . . . . . . .

Strany 136

PORT CONFIGURATION9-30FCS Errors A count of frames received on a particular interface that are an integral number of octets in length but do not pass

Strany 137

SHOWING PORT STATISTICS9-31RMON StatisticsDrop Events The total number of events in which packets were dropped due to lack of resources.Jabbers The to

Strany 138

PORT CONFIGURATION9-32Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the bo

Strany 139 - UTHENTICATION

SHOWING PORT STATISTICS9-33Figure 9-12 Port Statistics

Strany 140

PORT CONFIGURATION9-34CLI – This example shows statistics for port 12.Console#show interfaces counters ethernet 1/12 24-14Ethernet 1/12 Iftable stats:

Strany 141 - Authentication

10-1CHAPTER 10ADDRESS TABLE SETTINGSSwitches store the addresses for all known devices. This information is used to pass traffic directly between the

Strany 142

ADDRESS TABLE SETTINGS10-2Web – Click Address Table, Static Addresses. Specify the interface, the MAC address and VLAN, then click Add Static Address.

Strany 143

DISPLAYING THE ADDRESS TABLE10-3Displaying the Address TableThe Dynamic Address Table contains the MAC addresses learned by monitoring the source addr

Strany 144

ADDRESS TABLE SETTINGS10-4Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN checkb

Strany 145

CHANGING THE AGING TIME10-5Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attributes• Aging Statu

Strany 146

TABLE OF CONTENTSxxiiiSection IV AppendicesA Software Specifications . . . . . . . . . . . . . . . . . . . . . . . . A-1Software Features . . . . .

Strany 147

ADDRESS TABLE SETTINGS10-6

Strany 148

11-1CHAPTER 11SPANNING TREE ALGORITHMThe Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links be

Strany 149

SPANNING TREE ALGORITHM11-2Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Data Units) transm

Strany 150

11-3maintain connectivity among each of the assigned VLAN groups. MSTP then builds a Internal Spanning Tree (IST) for the Region containing all common

Strany 151 - Field Attributes

SPANNING TREE ALGORITHM11-4MSTP connects all bridges and LAN segments with a single Common and Internal Spanning Tree (CIST). The CIST is formed as a

Strany 152

DISPLAYING GLOBAL SETTINGS11-5make it return to a discarding state; otherwise, temporary data loops might result.• Designated Root – The priority and

Strany 153 - Generate

SPANNING TREE ALGORITHM11-6configuration messages at regular intervals. If the root port ages out STA information (provided in the last configuration

Strany 154

DISPLAYING GLOBAL SETTINGS11-7CLI – This command displays global STA settings, followed by settings for each port. Note: The current root port and cur

Strany 155

SPANNING TREE ALGORITHM11-8Configuring Global SettingsGlobal settings apply to the entire switch.Command Usage• Spanning Tree Protocol11Uses RSTP for

Strany 156

CONFIGURING GLOBAL SETTINGS11-9- Be careful when switching between spanning tree modes. Changing modes stops all spanning-tree instances for the previ

Strany 157 - 802.1X P

TABLE OF CONTENTSxxiv

Strany 158

SPANNING TREE ALGORITHM11-10reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals. An

Strany 159

CONFIGURING GLOBAL SETTINGS11-11Configuration Settings for MSTP • Max Instance Numbers – The maximum number of MSTP instances to which this switch can

Strany 160

SPANNING TREE ALGORITHM11-12Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 11-2 STA Global Con

Strany 161

DISPLAYING INTERFACE SETTINGS11-13CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MSTP parame

Strany 162

SPANNING TREE ALGORITHM11-14- If two ports of a switch are connected to the same segment and there is no other STA device attached to this segment, th

Strany 163

DISPLAYING INTERFACE SETTINGS11-15• Trunk Member – Indicates if a port is a member of a trunk. (STA Port Information only)These additional parameters

Strany 164 - Displaying 802.1X Statistics

SPANNING TREE ALGORITHM11-16loops. Where more than one port is assigned the highest priority, the port with the lowest numeric identifier will be enab

Strany 165

CONFIGURING INTERFACE SETTINGS11-17CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RSTP and MS

Strany 166

SPANNING TREE ALGORITHM11-18- Discarding - Port receives STA configuration messages, but does not forward packets.- Learning - Port has transmitted co

Strany 167 - DDRESSES

CONFIGURING INTERFACE SETTINGS11-19When the short path cost method is selected and the default path cost recommended by the IEEE 8021w standard exceed

Strany 168

xxvTABLESTable 1-1 Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Table 1-2 System Defaults . . . . . .

Strany 169

SPANNING TREE ALGORITHM11-20such as workstations or servers, retains the current forwarding database to reduce the amount of frame flooding required t

Strany 170

CONFIGURING MULTIPLE SPANNING TREES11-21Configuring Multiple Spanning Trees MSTP generates a unique spanning tree for each instance. This provides mul

Strany 171

SPANNING TREE ALGORITHM11-22• VLANs in MST Instance – VLANs assigned this instance.• MST ID – Instance identifier to configure. (Range: 0-4094; Defaul

Strany 172 - Console(config-if)#

CONFIGURING MULTIPLE SPANNING TREES11-23CLI – This displays STA settings for instance 1, followed by settings for each port. Console#show spanning-tre

Strany 173

SPANNING TREE ALGORITHM11-24CLI – This example sets the priority for MSTI 1, and adds VLANs 1-5 to this MSTI. Displaying Interface Settings for MSTPTh

Strany 174

DISPLAYING INTERFACE SETTINGS FOR MSTP11-25CLI – This displays STA settings for instance 0, followed by settings for each port. The settings for insta

Strany 175

SPANNING TREE ALGORITHM11-26Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance using the MSTP Por

Strany 176

CONFIGURING INTERFACE SETTINGS FOR MSTP11-27• Admin MST Path Cost – This parameter is used by the MSTP to determine the best path between devices. The

Strany 177

SPANNING TREE ALGORITHM11-28CLI – This example sets the MSTP attributes for port 4. Console(config)#interface ethernet 1/4 24-2Console(config-if)#span

Strany 178

12-1CHAPTER 12VLAN CONFIGURATIONIEEE 802.1Q VLANsIn large networks, routers are used to isolate broadcast traffic for each subnet into separate domain

Strany 179

TABLESxxviTable 19-11 show logging flash/ram - display description . . . . . . . . . . 19-43Table 19-12 show logging trap - display description . .

Strany 180

VLAN CONFIGURATION12-2• Distributed VLAN learning across multiple switches using explicit or implicit tagging and GVRP protocol• Port overlapping, all

Strany 181

IEEE 802.1Q VLANS12-3VLAN Classification – When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, the

Strany 182

VLAN CONFIGURATION12-4To implement GVRP in a network, first add the host devices to the required VLANs (using the operating system or other applicatio

Strany 183 - Specifying the Mask Type

IEEE 802.1Q VLANS12-5forwarding a frame from this switch along a path that does not contain any VLAN-aware devices (including the destination host), t

Strany 184 - Configuring an IP ACL Mask

VLAN CONFIGURATION12-6Displaying Basic VLAN InformationThe VLAN Basic Information page displays basic information on the VLAN type supported by the sw

Strany 185

IEEE 802.1Q VLANS12-7Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN and whether or not the port supports V

Strany 186 - Configuring a MAC ACL Mask

VLAN CONFIGURATION12-8Command Attributes (CLI)• VLAN – ID of configured VLAN (1-4093, no leading zeroes).• Type – Shows how this VLAN was added to the

Strany 187

IEEE 802.1Q VLANS12-9• VLAN ID – ID of configured VLAN (1-4093).• VLAN Name – Name of the VLAN (1 to 32 characters).• Status (Web) – Enables or disabl

Strany 188

VLAN CONFIGURATION12-10CLI – This example creates a new VLAN.Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port me

Strany 189

IEEE 802.1Q VLANS12-11• Status – Enables or disables the specified VLAN. - Enable: VLAN is operational.- Disable: VLAN is suspended; i.e., does not pa

Strany 190

TABLESxxviiTable 26-1 Mirror Port Commands . . . . . . . . . . . . . . . . . . . . . . . . . . 26-1Table 27-1 Rate Limit Commands . . . . . . . .

Strany 191 - Field Attributes (Web)

VLAN CONFIGURATION12-12Web – Click VLAN, 802.1Q VLAN, Static Table. Select a VLAN ID from the scroll-down list. Modify the VLAN name and status if req

Strany 192 - Configuration:

IEEE 802.1Q VLANS12-13Adding Static Members to VLANs (Port Index)Use the VLAN Static Membership by Port menu to assign VLAN groups to the selected int

Strany 193 - Current status:

VLAN CONFIGURATION12-14Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN ide

Strany 194

IEEE 802.1Q VLANS12-15- If ingress filtering is disabled and a port receives frames tagged for VLANs for which it is not a member, these frames will b

Strany 195 - ONNECTIONS

VLAN CONFIGURATION12-16belonging to the port’s default VLAN (i.e., associated with the PVID) are also transmitted as tagged frames. - Hybrid – Specifi

Strany 196 - ONFIGURATION

CONFIGURING IEEE 802.1Q TUNNELING12-17CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP,

Strany 197

VLAN CONFIGURATION12-18IDs. QinQ tunneling expands VLAN space by using a VLAN-in-VLAN hierarchy, preserving the customer’s original tagged packets, an

Strany 198

CONFIGURING IEEE 802.1Q TUNNELING12-19Layer 2 Flow for Packets Coming into a Tunnel PortA QinQ tunnel port may receive either tagged or untagged packe

Strany 199

VLAN CONFIGURATION12-203. After packet classification through the switching process, the packet is written to memory with one tag (an outer tag) or wi

Strany 200

CONFIGURING IEEE 802.1Q TUNNELING12-214. After successful source and destination lookup, the packet is double tagged. The switch uses the TPID of 0x81

Strany 201

TABLESxxviii

Strany 202

VLAN CONFIGURATION12-22- Tunnel ports do not support IP Access Control Lists. - Layer 3 Quality of Service (QoS) and other QoS features containing Lay

Strany 203 - Configuring LACP Parameters

CONFIGURING IEEE 802.1Q TUNNELING12-23Adding an Interface to a QinQ TunnelFollow the guidelines in the preceding section to set up a QinQ tunnel on th

Strany 204

VLAN CONFIGURATION12-24Web – Click VLAN, 802.1Q VLAN, Port Configuration or Trunk Configuration. Set the mode for the tunnel port to Dot1q-Tunnel, and

Strany 205

CONFIGURING PRIVATE VLANS12-25Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN.

Strany 206

VLAN CONFIGURATION12-26Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports desi

Strany 207 - Displaying LACP Port Counters

CONFIGURING PROTOCOL-BASED VLANS12-27Configuring Protocol-Based VLANs The network devices required to support multiple protocols cannot be easily grou

Strany 208

VLAN CONFIGURATION12-28• Frame Type16 – Frame type used by this protocol. (Options: Ethernet, RFC_1042, LLC_other) • Protocol Type – The only option f

Strany 209

CONFIGURING PROTOCOL-BASED VLANS12-29Membership by Port menu (page 13), these interfaces will admit traffic of any protocol type into the associated V

Strany 210

VLAN CONFIGURATION12-30CLI – The following maps the traffic entering Port 1 which matches the protocol type specified in protocol group 1 to VLAN 3. C

Strany 211

13-1CHAPTER 13CLASS OF SERVICEClass of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the

Strany 212

xxixFIGURESFigure 3-1 Home Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Figure 3-2 Front Panel Indicators .

Strany 213

CLASS OF SERVICE13-2• If the output port is an untagged member of the associated VLAN, these frames are stripped of all VLAN tags prior to transmissio

Strany 214

LAYER 2 QUEUE SETTINGS13-3CLI – This example assigns a default priority of 5 to port 3.Mapping CoS Values to Egress QueuesThis switch processes Class

Strany 215 - Configuring Port Mirroring

CLASS OF SERVICE13-4The priority levels recommended in the IEEE 802.1p standard for various network applications are shown in the following table. How

Strany 216 - Configuring Rate Limits

LAYER 2 QUEUE SETTINGS13-5Web – Click Priority, Traffic Classes. Assign priorities to the traffic classes (i.e., output queues), then click Apply.Figu

Strany 217 - Command Attribute

CLASS OF SERVICE13-6Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traffic in a higher

Strany 218 - Showing Port Statistics

LAYER 2 QUEUE SETTINGS13-7Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determine the fre

Strany 219 - TATISTICS

CLASS OF SERVICE13-8CLI – The following example shows how to assign WRR weights to each of the priority queues.Layer 3/4 Priority SettingsMapping Laye

Strany 220

LAYER 3/4 PRIORITY SETTINGS13-9Selecting IP Precedence/DSCP PriorityThe switch allows you to choose between using IP Precedence or DSCP priority. Sele

Strany 221

CLASS OF SERVICE13-10Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different p

Strany 222

LAYER 3/4 PRIORITY SETTINGS13-11Web – Click Priority, IP Precedence Priority. Select an entry from the IP Precedence Priority Table, enter a value in

Strany 223 - Figure 9-12 Port Statistics

38 TeslaIrvine, CA 92618Phone: (949) 679-8000TigerAccess™ 10/100Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsDecember

Strany 224

FIGURESxxxFigure 6-4 SSH Host-Key Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-15Figure 6-5 SSH Server Settings . . . . . . . .

Strany 225

CLASS OF SERVICE13-12Mapping DSCP PriorityThe DSCP is six bits wide, allowing coding for up to 64 different forwarding behaviors. The DSCP replaces th

Strany 226 - Figure 10-1 Static Addresses

LAYER 3/4 PRIORITY SETTINGS13-13Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Val

Strany 227

CLASS OF SERVICE13-14Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port number (i.e., TCP/U

Strany 228

LAYER 3/4 PRIORITY SETTINGS13-15Click Priority, IP Port Priority. Enter the port number for a network application in the IP Port Number box and the ne

Strany 229

CLASS OF SERVICE13-16

Strany 230

14-1CHAPTER 14QUALITY OF SERVICEThe commands described in this section are used to configure Quality of Service (QoS) classification criteria and serv

Strany 231 - LGORITHM

QUALITY OF SERVICE14-2Notes: 1. You can configure up to 16 rules per Class Map. You can also include multiple classes in a Policy Map.2. You should cr

Strany 232

CONFIGURING QUALITY OF SERVICE PARAMETERS14-3Configuring a Class MapA class map is used for matching packets to a specified class.Command Usage • To c

Strany 233 - Region R

QUALITY OF SERVICE14-4Settings” page. Enter the criteria used to classify ingress traffic on this page.• Remove Class – Removes the selected class.Cla

Strany 234

CONFIGURING QUALITY OF SERVICE PARAMETERS14-5Web – Click QoS, DiffServ, then click Add Class to create a new class, or Edit Rules to change the rules

Strany 235 - ISPLAYING

FIGURESxxxiFigure 11-7 MSTP Port Configuration . . . . . . . . . . . . . . . . . . . . . . . 11-28Figure 12-1 Globally Enabling GVRP . . . . . . . .

Strany 236

QUALITY OF SERVICE14-6CLI - This example creates a class map call “rd-class,” and sets it to match packets marked for DSCP service value 3.Creating Qo

Strany 237

CONFIGURING QUALITY OF SERVICE PARAMETERS14-7• After using the policy map to define packet classification, service tagging, and bandwidth policing, it

Strany 238

QUALITY OF SERVICE14-8• Meter – The maximum throughput and burst rate.- Rate (kbps) – Rate in kilobits per second.- Burst (byte) – Burst in bytes.• Ex

Strany 239

CONFIGURING QUALITY OF SERVICE PARAMETERS14-9Web – Click QoS, DiffServ, Policy Map to display the list of existing policy maps. To add a new policy ma

Strany 240

QUALITY OF SERVICE14-10CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps,

Strany 241

CONFIGURING QUALITY OF SERVICE PARAMETERS14-11Web – Click QoS, DiffServ, Service Policy Settings. Check Enabled and choose a Policy Map for a port fro

Strany 242

QUALITY OF SERVICE14-12

Strany 243

15-1CHAPTER 15MULTICAST FILTERINGMulticasting is used to support real-time applications such as videoconferencing or streaming audio. A multicast serv

Strany 244

MULTICAST FILTERING15-2those ports only. It then propagates the service request up to any neighboring multicast switch/router to ensure that it will c

Strany 245

LAYER 2 IGMP (SNOOPING AND QUERY)15-3Only IGMPv3 hosts can request service from a specific multicast source. When downstream hosts request service fro

Strany 246

FIGURESxxxiiFigure 16-3 DNS Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-7

Strany 247

MULTICAST FILTERING15-4Static IGMP Host Interface – For multicast applications that you need to control more carefully, you can manually assign a mult

Strany 248

LAYER 2 IGMP (SNOOPING AND QUERY)15-5Note: Multicast routers use this information, along with a multicast routing protocol such as DVMRP or PIM, to su

Strany 249

MULTICAST FILTERING15-6Web – Click IGMP Snooping, IGMP Configuration. Adjust the IGMP settings as required, and then click Apply. (The default setting

Strany 250

LAYER 2 IGMP (SNOOPING AND QUERY)15-7Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch us

Strany 251

MULTICAST FILTERING15-8CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router.Specifying Static

Strany 252

LAYER 2 IGMP (SNOOPING AND QUERY)15-9CLI – This example configures port 1 as a multicast router port within VLAN 1.Displaying Port Members of Multicas

Strany 253

MULTICAST FILTERING15-10Web – Click IGMP Snooping, IP Multicast Registration Table. Select a VLAN ID and the IP address for a multicast service from t

Strany 254

LAYER 2 IGMP (SNOOPING AND QUERY)15-11Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and

Strany 255

MULTICAST FILTERING15-12Web – Click IGMP Snooping, IGMP Member Port Table. Specify the interface attached to a multicast service (via an IGMP-enabled

Strany 256

MULTICAST VLAN REGISTRATION15-13distribution tree for a normal multicast VLAN. This makes it possible to support common multicast services over a wide

Strany 257

SECTION IGETTING STARTEDThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also describes

Strany 258

MULTICAST FILTERING15-144. For multicast streams that will run for a long term and be associated with a stable set of hosts, you can statically bind t

Strany 259

MULTICAST VLAN REGISTRATION15-15Web – Click MVR, Configuration. Enable MVR globally on the switch, select the MVR VLAN, add the multicast groups that

Strany 260 - VU: VLAN Unaware

MULTICAST FILTERING15-16• MVR Status – Shows the MVR status. MVR status for source ports is “ACTIVE” if MVR is globally enabled on the switch. MVR sta

Strany 261 - IEEE 802.1Q VLAN

MULTICAST VLAN REGISTRATION15-17Configuring MVR Interface StatusEach interface that participates in the MVR VLAN must be configured as an MVR source p

Strany 262

MULTICAST FILTERING15-18- Non-MVR – An interface that does not participate in the MVR VLAN. (This is the default type.)• Immediate Leave – Configures

Strany 263

MULTICAST VLAN REGISTRATION15-19Displaying Port Members of Multicast GroupsYou can display the multicast groups assigned to the MVR VLAN either throug

Strany 264

MULTICAST FILTERING15-20Assigning Static Multicast Groups to InterfacesFor multicast streams that will run for a long term and be associated with a st

Strany 265 - Command Attributes (Web)

MULTICAST VLAN REGISTRATION15-21Web – Click MVR, Group Member Configuration. Select a port or trunk from the “Interface” field, and click Query to dis

Strany 267

16-1CHAPTER 16DOMAIN NAME SERVICEThe Domain Naming System (DNS) service on this switch allows host names to be mapped to IP addresses using static tab

Strany 268

GETTING STARTED

Strany 269

DOMAIN NAME SERVICE16-2• When more than one name server is specified, the servers are queried in the specified sequence until a response is received,

Strany 270

CONFIGURING GENERAL DNS SERVICE PARAMETERS16-3Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify on

Strany 271

DOMAIN NAME SERVICE16-4CLI - This example sets a default domain name and a domain list. However, remember that if a domain list is specified, the defa

Strany 272

CONFIGURING STATIC DNS HOST TO ADDRESSENTRIES16-5Field Attributes• Host Name – Name of a host device that is mapped to one or more IP addresses. (Rang

Strany 273

DOMAIN NAME SERVICE16-6CLI - This example maps two address to a host name, and then configures an alias host name for the same addresses.Displaying th

Strany 274

DISPLAYING THE DNS CACHE16-7Web – Select DNS, Cache.Figure 16-3 DNS CacheCLI - This example displays all the resource records learned from the design

Strany 275 - IEEE 802.1Q T

DOMAIN NAME SERVICE16-8

Strany 276

SECTION IIICOMMAND LINE INTERFACEThis section provides a detailed description of the Command Line Interface, along with examples for all of the comman

Strany 277

COMMAND LINE INTERFACEIP Interface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35-1

Strany 278

17-1CHAPTER 17OVERVIEW OF COMMANDLINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAcce

Strany 279

1-1CHAPTER 1INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to config

Strany 280

OVERVIEW OF COMMAND LINE INTERFACE17-2After connecting to the system through the console port, the login screen displays:Telnet ConnectionTelnet opera

Strany 281

ENTERING COMMANDS17-3After you configure the switch with an IP address, you can open a Telnet session by performing these steps:1. From the remote hos

Strany 282

OVERVIEW OF COMMAND LINE INTERFACE17-4You can enter commands as follows:• To enter a simple command, enter the command keyword. • To enter multiple co

Strany 283 - Configuring Private VLANs

ENTERING COMMANDS17-5Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the current com

Strany 284

OVERVIEW OF COMMAND LINE INTERFACE17-6The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a

Strany 285

ENTERING COMMANDS17-7Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display inform

Strany 286

OVERVIEW OF COMMAND LINE INTERFACE17-8Privileged Exec mode from within Normal Exec mode, by entering the enable command, followed by the privileged le

Strany 287

ENTERING COMMANDS17-9• Interface Configuration - These commands modify the port configuration such as speed-duplex and negotiation. • Line Configurati

Strany 288

OVERVIEW OF COMMAND LINE INTERFACE17-10To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end c

Strany 289

ENTERING COMMANDS17-11Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enoug

Strany 290

KEY FEATURES1-2Rate Limiting Input and output rate limiting per portInput rate limiting per port per CoS valuePort Mirroring Single session, one sourc

Strany 291 - Queue 20134567

OVERVIEW OF COMMAND LINE INTERFACE17-12Command GroupsThe system commands can be broken down into the functional groups shown below.Table 17-4 Command

Strany 292

COMMAND GROUPS17-13The access mode shown in the following tables is indicated by these abbreviations: ACL (Access Control List Configuration)CM (Class

Strany 293 - Figure 13-2 Traffic Classes

OVERVIEW OF COMMAND LINE INTERFACE17-14

Strany 294

18-1CHAPTER 18GENERAL COMMANDSThese commands are used to control the command access mode, configuration mode, and other basic functions.Table 18-1 Ge

Strany 295

GENERAL COMMANDS18-2enableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, and certain commands dis

Strany 296 - Layer 3/4 Priority Settings

DISABLE18-3disableThis command returns to Normal Exec mode from privileged mode. In normal access mode, you can only display basic information on the

Strany 297

GENERAL COMMANDS18-4Example Related Commands end (18-6)show historyThis command shows the contents of the command history buffer.Default Setting NoneC

Strany 298

RELOAD18-5The ! command repeats commands from the Execution command history buffer when you are in Normal Exec or Privileged Exec Mode, and commands f

Strany 299

GENERAL COMMANDS18-6promptThis command customizes the CLI prompt. Use the no form to restore the default prompt.Syntax prompt stringno promptstring -

Strany 300

EXIT18-7exitThis command returns to the previous configuration mode or exits the configuration program.Default Setting NoneCommand Mode AnyExample Thi

Strany 301

INTRODUCTION1-3Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates th

Strany 302 - Mapping IP Port Priority

GENERAL COMMANDS18-8Example This example shows how to quit a CLI session:Console#quitPress ENTER to start sessionUser Access VerificationUsername:

Strany 303

19-1CHAPTER 19SYSTEM MANAGEMENTCOMMANDSThese commands are used to control system logs, passwords, user names, management options, and display or confi

Strany 304

SYSTEM MANAGEMENT COMMANDS19-2Device Designation CommandsThis section describes commands used to configure information that uniquely identifies the sw

Strany 305

SYSTEM STATUS COMMANDS19-3System Status CommandsThis section describes commands used to display system information.show startup-configThis command dis

Strany 306

SYSTEM MANAGEMENT COMMANDS19-4mode command, and corresponding commands. This command displays the following information:- MAC address for the switch-

Strany 307

SYSTEM STATUS COMMANDS19-5Related Commandsshow running-config (19-5)show running-configThis command displays the configuration information currently i

Strany 308

SYSTEM MANAGEMENT COMMANDS19-6- VLAN configuration settings for each interface- Multiple spanning tree instances (name and interfaces)- IP address - L

Strany 309 - ARAMETERS

SYSTEM STATUS COMMANDS19-7Related Commandsshow startup-config (19-3)show systemThis command displays system information.Default Setting NoneCommand Mo

Strany 310

SYSTEM MANAGEMENT COMMANDS19-8Exampleshow usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet

Strany 311

SYSTEM STATUS COMMANDS19-9Command Usage The session used to execute this command is indicated by a “*” symbol next to the Line (i.e., session) index n

Strany 312

DESCRIPTION OF SOFTWARE FEATURES1-4Access Control Lists – ACLs provide packet filtering for IP frames (based on address, protocol, TCP/UDP port number

Strany 313

SYSTEM MANAGEMENT COMMANDS19-10Example System Mode CommandsThis section describes command used to configure the switch to operate in normal mode or Qi

Strany 314

SYSTEM MODE COMMANDS19-11Default Setting No system mode is set; the switch functions in normal operating mode.Command Mode Global ConfigurationCommand

Strany 315

SYSTEM MANAGEMENT COMMANDS19-12System MTU CommandsThis section describes commands used to configure the Ethernet frame size on the switch.jumbo frameT

Strany 316

SYSTEM MTU COMMANDS19-13• To use jumbo frames, both the source and destination end nodes (such as a computer or server) must support this feature. Als

Strany 317 - ULTICAST

SYSTEM MANAGEMENT COMMANDS19-14Command Usage • Gigabit Ethernet ports are not affected by the system mtu FE-size command. Fast Ethernet ports are not

Strany 318

FILE MANAGEMENT COMMANDS19-15When downloading runtime code, the destination file name can be specified to replace the current image, or the file can b

Strany 319

SYSTEM MANAGEMENT COMMANDS19-16copy This command moves (upload/download) a code image or configuration file between the switch’s flash memory and a

Strany 320

FILE MANAGEMENT COMMANDS19-17or 31 characters for files on the switch. (Valid characters: A-Z, a-z, 0-9, “.”, “-”, “_”)• Due to the size limit of the

Strany 321

SYSTEM MANAGEMENT COMMANDS19-18The following example shows how to upload the configuration settings to a file on the TFTP server:The following example

Strany 322

FILE MANAGEMENT COMMANDS19-19This example shows how to copy a public-key used by SSH from an TFTP server. Note that public key authentication via SSH

Strany 323

INTRODUCTION1-5Storm Control – Broadcast and multicast storm suppression prevents traffic from overwhelming the network. When enabled on a port, the l

Strany 324

SYSTEM MANAGEMENT COMMANDS19-20Related Commandsdir (19-20)delete public-key (21-28)dirThis command displays a list of files in flash memory.Syntax dir

Strany 325

FILE MANAGEMENT COMMANDS19-21Example The following example shows how to display all file information:whichbootThis command displays which files were b

Strany 326

SYSTEM MANAGEMENT COMMANDS19-22boot systemThis command specifies the file or image used to start up the system.Syntax boot system {boot-rom| config |

Strany 327

LINE COMMANDS19-23Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial port. Th

Strany 328 - Multicast VLAN Registration

SYSTEM MANAGEMENT COMMANDS19-24lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Sy

Strany 329 - EGISTRATION

LINE COMMANDS19-25loginThis command enables password checking at login. Use the no form to disable password checking and allow connections without a p

Strany 330

SYSTEM MANAGEMENT COMMANDS19-26Example Related Commandsusername (21-2)password (19-26)passwordThis command specifies the password for a line. Use the

Strany 331

LINE COMMANDS19-27configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.Example Related Commandslo

Strany 332

SYSTEM MANAGEMENT COMMANDS19-28Example To set the timeout to two minutes, enter this command:exec-timeoutThis command sets the interval that the syste

Strany 333

LINE COMMANDS19-29password-threshThis command sets the password intrusion threshold which limits the number of failed logon attempts. Use the no form

Strany 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Strany 335

DESCRIPTION OF SOFTWARE FEATURES1-6this protocol will choose a single path and disable all others to ensure that only one route exists between any two

Strany 336

SYSTEM MANAGEMENT COMMANDS19-30silent-timeThis command sets the amount of time the management console is inaccessible after the number of unsuccessful

Strany 337

LINE COMMANDS19-31Default Setting 8 data bits per characterCommand Mode Line Configuration Command Usage The databits command can be used to mask the

Strany 338

SYSTEM MANAGEMENT COMMANDS19-32Command Usage Communication protocols provided by devices such as terminals and modems often require a specific parity

Strany 339

LINE COMMANDS19-33Example To specify 57600 bps, enter this command:stopbitsThis command sets the number of the stop bits transmitted per byte. Use the

Strany 340

SYSTEM MANAGEMENT COMMANDS19-34Command Usage Specifying session identifier “0” will disconnect the console connection. Specifying any other identifier

Strany 341

LINE COMMANDS19-35Example To show all lines, enter this command:Console#show line Console configuration: Password threshold: 3 times Interactive ti

Strany 342

SYSTEM MANAGEMENT COMMANDS19-36Event Logging CommandsThis section describes commands used to configure event logging on the switch.logging onThis comm

Strany 343

EVENT LOGGING COMMANDS19-37command to control the type of error messages that are stored in memory. You can use the logging trap command to control th

Strany 344

SYSTEM MANAGEMENT COMMANDS19-38Default Setting Flash: errors (level 3 - 0)RAM: warnings (level 7 - 0)Command Mode Global ConfigurationCommand Usage Th

Strany 345 - Figure 16-3 DNS Cache

EVENT LOGGING COMMANDS19-39Command Mode Global ConfigurationCommand Usage Use this command more than once to build up a list of host IP addresses.The

Strany 346

INTRODUCTION1-7• Use private VLANs to restrict traffic to pass only between data ports and the uplink ports, thereby isolating adjacent ports within t

Strany 347

SYSTEM MANAGEMENT COMMANDS19-40logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved

Strany 348

EVENT LOGGING COMMANDS19-41clear logThis command clears messages from the log buffer.Syntax clear log [flash | ram]• flash - Event history stored in f

Strany 349 - Console Connection

SYSTEM MANAGEMENT COMMANDS19-42show loggingThis command displays the configuration settings for logging messages to local switch memory, to an SMTP ev

Strany 350

EVENT LOGGING COMMANDS19-43ExampleThe following example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., de

Strany 351 - Entering Commands

SYSTEM MANAGEMENT COMMANDS19-44Related Commandsshow logging sendmail (19-49)show logThis command displays the log messages stored in local memory.Synt

Strany 352

SMTP ALERT COMMANDS19-45SMTP Alert CommandsThese commands configure SMTP event handling, and forwarding of alert messages to the specified SMTP server

Strany 353 - Showing Commands

SYSTEM MANAGEMENT COMMANDS19-46• To send email alerts, the switch first opens a connection, sends all the email alerts waiting in the queue one by one

Strany 354

SMTP ALERT COMMANDS19-47logging sendmail source-emailThis command sets the email address used for the “From” field in alert messages. Syntaxlogging se

Strany 355 - Exec Commands

SYSTEM MANAGEMENT COMMANDS19-48Command Usage You can specify up to five recipients for alert messages. However, you must enter a separate command to s

Strany 356

SMTP ALERT COMMANDS19-49show logging sendmailThis command displays the settings for the SMTP event handler.Command Mode Normal Exec, Privileged ExecEx

Strany 357 - Console(config)#

SYSTEM DEFAULTS1-8to be transmitted across a single network-wide multicast VLAN shared by hosts residing in other standard or private VLAN groups, whi

Strany 358 - Privileged Exec mode

SYSTEM MANAGEMENT COMMANDS19-50Time CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Maintain

Strany 359 - Command Line Processing

TIME COMMANDS19-51Command Usage • The time acquired from time servers is used to record accurate dates and times for log events. Without SNTP, the swi

Strany 360 - Command Groups

SYSTEM MANAGEMENT COMMANDS19-52Command Mode Global ConfigurationCommand Usage This command specifies time servers from which the switch will poll for

Strany 361

TIME COMMANDS19-53Related Commandssntp client (19-50)show sntpThis command displays the current time and configuration settings for the SNTP client, a

Strany 362

SYSTEM MANAGEMENT COMMANDS19-54clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours min

Strany 363 - Table 18-1 General Commands

TIME COMMANDS19-55calendar setThis command sets the system clock. It may be used if there is no time server on your network, or if you have not config

Strany 364 - Console#

SYSTEM MANAGEMENT COMMANDS19-56Example Console#show calendar 15:12:34 February 1 2002Console#

Strany 365 - Console>

20-1CHAPTER 20SNMP COMMANDSControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the

Strany 366

SNMP COMMANDS20-2snmp-serverThis command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c, 3). Use the no form

Strany 367 - Console#reload

SHOW SNMP20-3Command Usage This command provides information on the community access strings, counter information for SNMP input and output protocol d

Strany 368 - Console(config-if)#end

INTRODUCTION1-9Authentication Privileged Exec Level Username “admin”Password “admin”Normal Exec Level Username “guest”Password “guest”Enable Privilege

Strany 369 - Username:

SNMP COMMANDS20-4snmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the specified commun

Strany 370 - Example

SNMP-SERVER CONTACT20-5snmp-server contactThis command sets the system contact string. Use the no form to remove the system contact information.Syntax

Strany 371

SNMP COMMANDS20-6Command Mode Global ConfigurationExample Related Commandssnmp-server contact (20-5)snmp-server host This command specifies the recipi

Strany 372 - Device Designation Commands

SNMP-SERVER HOST20-7community command prior to using the snmp-server host command. (Maximum length: 32 characters)• version - Specifies whether to sen

Strany 373 - System Status Commands

SNMP COMMANDS20-8• Notifications are issued by the switch as trap messages by default. The recipient of a trap message does not send a response to the

Strany 374

SNMP-SERVER ENABLE TRAPS20-9user command. Otherwise, the authentication password and/or privacy password will not exist, and the switch will not autho

Strany 375

SNMP COMMANDS20-10notifications are enabled. If you enter the command with a keyword, only the notification type related to that keyword is enabled. •

Strany 376

SNMP-SERVER ENGINE-ID20-11Command Mode Global ConfigurationCommand Usage • An SNMP engine is an independent SNMP agent that resides either on this swi

Strany 377

SNMP COMMANDS20-12show snmp engine-idThis command shows the SNMP engine ID.Command Mode Privileged ExecExampleThis example shows the default engine ID

Strany 378

SNMP-SERVER VIEW20-13snmp-server viewThis command adds an SNMP view which controls user access to the MIB. Use the no form to remove an SNMP view.Synt

Strany 379

SYSTEM DEFAULTS1-10Port Configuration Admin Status EnabledAuto-negotiation EnabledFlow Control DisabledRate Limiting Input and output limits DisabledI

Strany 380 - System Mode Commands

SNMP COMMANDS20-14This view includes the MIB-2 interfaces table, and the mask selects all index entries.show snmp viewThis command shows information o

Strany 381

SNMP-SERVER GROUP20-15snmp-server groupThis command adds an SNMP group, mapping SNMP users to SNMP views. Use the no form to remove an SNMP group.Synt

Strany 382 - System MTU Commands

SNMP COMMANDS20-16• When privacy is selected, the DES 56-bit algorithm is used for data encryption.• For additional information on the notification me

Strany 383 - Console(config)#jumbo frame

SHOW SNMP GROUP20-17Group Name: publicSecurity Model: v2cRead View: defaultviewWrite View: noneNotify View: noneStorage Type: volatileRow Status: acti

Strany 384 - File Management Commands

SNMP COMMANDS20-18snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read, Write, or Notify View. Use

Strany 385

SNMP-SERVER USER20-19Command Usage • The SNMP engine ID is used to compute the authentication/privacy digests from the password. You should therefore

Strany 386

SNMP COMMANDS20-20show snmp userThis command shows information on SNMP users.Command Mode Privileged ExecExample Console#show snmp userEngineId: 80000

Strany 387

21-1CHAPTER 21USER AUTHENTICATIONCOMMANDSYou can configure this switch to authenticate users logging into the system for management access using local

Strany 388

USER AUTHENTICATION COMMANDS21-2User Account CommandsThe basic commands required for management access are listed in this section. This switch also in

Strany 389

USER ACCOUNT COMMANDS21-3• password password - The authentication password for the user. (Maximum length: 8 characters plain text, 32 encrypted, case

Strany 390

INTRODUCTION1-11Traffic PrioritizationIngress Port Priority 0Queue Mode WRRWeighted Round Robin Queue: 0 1 2 3 4 5 6 7Weight: 1 2 4 6

Strany 391

USER AUTHENTICATION COMMANDS21-4enable passwordAfter initially logging onto the system, you should set the Privileged Exec password. Remember to recor

Strany 392

AUTHENTICATION SEQUENCE21-5Related Commandsenable (18-2)authentication enable (21-7)Authentication SequenceThree authentication methods can be specifi

Strany 393 - Line Commands

USER AUTHENTICATION COMMANDS21-6Command Usage • RADIUS uses UDP while TACACS+ uses TCP. UDP only offers best effort delivery, while TCP offers a conne

Strany 394

AUTHENTICATION SEQUENCE21-7authentication enableThis command defines the authentication method and precedence to use when changing from Exec command m

Strany 395

USER AUTHENTICATION COMMANDS21-8Example Related Commandsenable password - sets the password for changing command modes (21-4)RADIUS ClientRemote Authe

Strany 396

RADIUS CLIENT21-9radius-server hostThis command specifies primary and backup RADIUS servers and authentication parameters that apply to each server. U

Strany 397 - Console(config-line)#

USER AUTHENTICATION COMMANDS21-10radius-server portThis command sets the RADIUS server network port. Use the no form to restore the default.Syntax rad

Strany 398

RADIUS CLIENT21-11Example radius-server retransmitThis command sets the number of retries. Use the no form to restore the default.Syntax radius-server

Strany 399

USER AUTHENTICATION COMMANDS21-12Command Mode Global ConfigurationExample show radius-serverThis command displays the current settings for the RADIUS

Strany 400

TACACS+ CLIENT21-13TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses software runn

Strany 401

SYSTEM DEFAULTS1-12

Strany 402

USER AUTHENTICATION COMMANDS21-14tacacs-server portThis command specifies the TACACS+ server network port. Use the no form to restore the default.Synt

Strany 403

WEB SERVER COMMANDS21-15Example show tacacs-serverThis command displays the current settings for the TACACS+ server.Default Setting NoneCommand Mode P

Strany 404

USER AUTHENTICATION COMMANDS21-16ip http portThis command specifies the TCP port number used by the web browser interface. Use the no form to use the

Strany 405

WEB SERVER COMMANDS21-17Example Related Commandsip http port (21-16)ip http secure-serverThis command enables the secure hypertext transfer protocol (

Strany 406 - Event Logging Commands

USER AUTHENTICATION COMMANDS21-18• The client and server establish a secure encrypted connection.A padlock icon should appear in the status bar for In

Strany 407 - Table 19-10 Logging Levels

WEB SERVER COMMANDS21-19Default Setting 443Command Mode Global ConfigurationCommand Usage • You cannot configure the HTTP and HTTPS servers to use the

Strany 408

USER AUTHENTICATION COMMANDS21-20Telnet Server CommandsThis section describes commands used to configure Telnet management access to the switch.ip tel

Strany 409

SECURE SHELL COMMANDS21-21Secure Shell CommandsThis section describes the commands used to configure the SSH server. Note that you also need to instal

Strany 410

USER AUTHENTICATION COMMANDS21-22Configuration GuidelinesThe SSH server on this switch supports both password and public key authentication. If passwo

Strany 411 - Console#clear log

SECURE SHELL COMMANDS21-231024 35 1341081685609893921040944920155425347631641921872958921143173880 055536161631051775940838686311092912322268285192543

Strany 412

2-1CHAPTER 2INITIAL CONFIGURATIONConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent offer

Strany 413

USER AUTHENTICATION COMMANDS21-24c. If a match is found, the switch uses its secret key to generate a random 256-bit string as a challenge, encrypts t

Strany 414

SECURE SHELL COMMANDS21-25Default Setting DisabledCommand Mode Global ConfigurationCommand Usage • The SSH server supports up to four client sessions.

Strany 415 - SMTP Alert Commands

USER AUTHENTICATION COMMANDS21-26Default Setting 10 secondsCommand Mode Global ConfigurationCommand Usage The timeout specifies the interval the switc

Strany 416

SECURE SHELL COMMANDS21-27Example Related Commandsshow ip ssh (21-31)ip ssh server-key sizeThis command sets the SSH server key size. Use the no form

Strany 417

USER AUTHENTICATION COMMANDS21-28delete public-keyThis command deletes the specified user’s public key.Syntax delete public-key username [dsa | rsa]•u

Strany 418

SECURE SHELL COMMANDS21-29• This command stores the host key pair in memory (i.e., RAM). Use the ip ssh save host-key command to save the host key pai

Strany 419 - Normal Exec, Privileged Exec

USER AUTHENTICATION COMMANDS21-30• The SSH server must be disabled before you can execute this command.Example Related Commandsip ssh crypto host-key

Strany 420 - Time Commands

SECURE SHELL COMMANDS21-31show ip sshThis command displays the connection settings used when authenticating client access to the SSH server.Command Mo

Strany 421

USER AUTHENTICATION COMMANDS21-32show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user

Strany 422

SECURE SHELL COMMANDS21-33Command Mode Privileged ExecCommand Usage • If no parameters are entered, all keys are displayed. If the user keyword is ent

Strany 423

CONNECTING TO THE SWITCH2-2The switch’s web interface, CLI configuration program, and SNMP agent allow you to perform the following management functio

Strany 424

USER AUTHENTICATION COMMANDS21-34802.1X Port AuthenticationThe switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorize

Strany 425

802.1X PORT AUTHENTICATION21-35dot1x system-auth-controlThis command enables IEEE 802.1X port authentication globally on the switch. Use the no form t

Strany 426

USER AUTHENTICATION COMMANDS21-36dot1x max-reqThis command sets the maximum number of times the switch port will retransmit an EAP request/identity pa

Strany 427 - Table 20-1 SNMP Commands

802.1X PORT AUTHENTICATION21-37Defaultforce-authorizedCommand ModeInterface ConfigurationExampledot1x operation-modeThis command allows single or mult

Strany 428 - Console(config)#snmp-server

USER AUTHENTICATION COMMANDS21-38• In “multi-host” mode, only one host connected to a port needs to pass authentication for all other hosts to be gran

Strany 429

802.1X PORT AUTHENTICATION21-39dot1x re-authenticationThis command enables periodic re-authentication for a specified port. Use the no form to disable

Strany 430

USER AUTHENTICATION COMMANDS21-40Default60 secondsCommand ModeInterface ConfigurationExampledot1x timeout re-authperiodThis command sets the time peri

Strany 431

802.1X PORT AUTHENTICATION21-41dot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication sessio

Strany 432

USER AUTHENTICATION COMMANDS21-42Command UsageThis command displays the following information:• Global 802.1X Parameters – Shows whether or not 802.1X

Strany 433

802.1X PORT AUTHENTICATION21-43- Port-control – Shows the dot1x mode on a port as auto, force-authorized, or force-unauthorized (page 21-36).- Supplic

Strany 434

INITIAL CONFIGURATION2-3To connect a terminal to the console port, complete the following steps: 1. Connect the console cable to the serial port on a

Strany 435

USER AUTHENTICATION COMMANDS21-44ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status

Strany 436

MANAGEMENT IP FILTER COMMANDS21-45Management IP Filter CommandsThis section describes commands used to configure IP management access to the switch.ma

Strany 437

USER AUTHENTICATION COMMANDS21-46Command Usage • If anyone tries to access a management interface on the switch from an invalid address, the switch wi

Strany 438 - Privileged Exec

MANAGEMENT IP FILTER COMMANDS21-47Command Mode Privileged ExecExampleConsole#show management all-clientManagement Ip Filter HTTP-Client: Start IP ad

Strany 439

USER AUTHENTICATION COMMANDS21-48

Strany 440

22-1CHAPTER 22CLIENT SECURITYCOMMANDSThis switch supports many methods of segregating traffic for clients attached to each of the data ports, and for

Strany 441 - 24. Maps to the defaultview

CLIENT SECURITY COMMANDS22-2Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switch s

Strany 442

PORT SECURITY COMMANDS22-3port securityThis command enables or configures port security. Use the no form without any keywords to disable port security

Strany 443

CLIENT SECURITY COMMANDS22-4Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has

Strany 444

IP SOURCE GUARD COMMANDS22-5the IP address of a neighbor to access the network. This section describes commands used to configure IP Source Guard.ip s

Strany 445

vLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Strany 446

BASIC CONFIGURATION2-4Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a val

Strany 447

CLIENT SECURITY COMMANDS22-6Command Usage • Source guard is used to filter traffic on an unsecure port which receives messages from outside the networ

Strany 448 - User Account Commands

IP SOURCE GUARD COMMANDS22-7static DHCP snooping binding or dynamic DHCP snooping binding, the packet will be forwarded.- If IP source guard if enable

Strany 449

CLIENT SECURITY COMMANDS22-8Command ModeGlobal ConfigurationCommand Usage • Table entries include a MAC address, IP address, lease time, entry type (S

Strany 450

IP SOURCE GUARD COMMANDS22-9show ip source-guardThis command shows whether source guard is enabled or disabled on each interface.Command Mode Privileg

Strany 451 - Authentication Sequence

CLIENT SECURITY COMMANDS22-10DHCP Snooping CommandsDHCP snooping allows a switch to protect a network from rogue DHCP servers or other devices which s

Strany 452

DHCP SNOOPING COMMANDS22-11ip dhcp snoopingThis command enables DHCP snooping globally. Use the no form to restore the default setting.Syntax [no] ip

Strany 453

CLIENT SECURITY COMMANDS22-12- If DHCP snooping is enabled globally, and also enabled on the VLAN where the DHCP packet is received, all DHCP packets

Strany 454 - RADIUS Client

DHCP SNOOPING COMMANDS22-13binding table when it receives an ACK message from a DHCP server. Also, when the switch sends out DHCP client packets for i

Strany 455 - RADIUS C

CLIENT SECURITY COMMANDS22-14• When the DHCP snooping is globally disabled, DHCP snooping can still be configured for specific VLANs, but the changes

Strany 456

DHCP SNOOPING COMMANDS22-15• unit - Stack unit. (Range: 1) • port - Port number. (Range: 1-28)• lease-time - The time after which an entry is removed

Strany 457

INITIAL CONFIGURATION2-5Access to both CLI levels are controlled by user names and passwords. The switch has a default user name and password for each

Strany 458

CLIENT SECURITY COMMANDS22-16• When the lease time for a dynamic or static DHCP binding entry expires, it is removed from the binding table.ExampleThi

Strany 459 - TACACS+ Client

DHCP SNOOPING COMMANDS22-17Related Commands ip dhcp snooping (22-11)ip dhcp snooping vlan (22-13)ip dhcp snooping trust (22-17)ip dhcp snooping databa

Strany 460

CLIENT SECURITY COMMANDS22-18Command Usage • An untrusted interface is an interface that is configured to receive messages from outside the network or

Strany 461 - Web Server Commands

DHCP SNOOPING COMMANDS22-19Exampleshow ip dhcp snooping bindingThis command shows the DHCP snooping binding table entries.Command Mode Privileged Exec

Strany 462

CLIENT SECURITY COMMANDS22-20

Strany 463

23-1CHAPTER 23ACCESS CONTROL LISTCOMMANDSAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protoc

Strany 464

ACCESS CONTROL LIST COMMANDS23-2IP ACLsThe commands in this section configure ACLs based on IP addresses, TCP/UDP port number, protocol type, and TCP

Strany 465

IP ACLS23-3access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the no form to remov

Strany 466 - Telnet Server Commands

ACCESS CONTROL LIST COMMANDS23-4permit, deny (Standard ACL) This command adds a rule to a Standard IP ACL. The rule sets a filter condition for packet

Strany 467 - Secure Shell Commands

IP ACLS23-5permit, deny (Extended ACL) This command adds a rule to an Extended IP ACL. The rule sets a filter condition for packets with specific sour

Strany 468

BASIC CONFIGURATION2-64. Type “username admin password 0 password,” for the Privileged Exec level, where password is your new password. Press <Ente

Strany 469

ACCESS CONTROL LIST COMMANDS23-6• control-flags – Decimal number (representing a bit string) that specifies flag bits in byte 14 of the TCP header. (R

Strany 470

IP ACLS23-7ExampleThis example accepts any incoming packets if the source address is within subnet 10.7.1.x. For example, if the rule is matched; i.e.

Strany 471 - Console(config)#ip ssh server

ACCESS CONTROL LIST COMMANDS23-8Example Related Commandspermit, deny 23-4ip access-group (23-14)access-list ip mask-precedence This command changes to

Strany 472

IP ACLS23-9Example Related Commandsmask (IP ACL) (23-9)ip access-group (23-14)mask (IP ACL)This command defines a mask for IP ACLs. This mask defines

Strany 473

ACCESS CONTROL LIST COMMANDS23-10Default SettingNoneCommand ModeIP MaskCommand Usage• Packets crossing a port are checked against all the rules in the

Strany 474

IP ACLS23-11This shows that the entries in the mask override the precedence in which the rules are entered into the ACL. In the following example, pac

Strany 475

ACCESS CONTROL LIST COMMANDS23-12This shows how to create an extended ACL with an egress mask to drop packets leaving network 171.69.198.0 when the La

Strany 476

IP ACLS23-13This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other packets. It then sets th

Strany 477 - Console#show ssh

ACCESS CONTROL LIST COMMANDS23-14Command ModePrivileged ExecExample Related Commandsmask (IP ACL) (23-9)ip access-group This command binds a port to a

Strany 478

MAC ACLS23-15Related Commandsshow ip access-list (23-7)show ip access-groupThis command shows the ports assigned to IP ACLs.Command ModePrivileged Exe

Strany 479

INITIAL CONFIGURATION2-7Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Strany 480 - 802.1X Port Authentication

ACCESS CONTROL LIST COMMANDS23-16access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove

Strany 481 - 802.1X P

MAC ACLS23-17Related Commandspermit, deny (23-17)mac access-group (23-23)show mac access-list (23-19)permit, deny (MAC ACL)This command adds a rule to

Strany 482

ACCESS CONTROL LIST COMMANDS23-18• tagged-eth2 – Tagged Ethernet II packets.• untagged-eth2 – Untagged Ethernet II packets.• tagged-802.3 – Tagged Eth

Strany 483

MAC ACLS23-19Example This rule permits packets from any source MAC address to the destination address 00-e0-29-94-34-de where the Ethernet type is 080

Strany 484

ACCESS CONTROL LIST COMMANDS23-20access-list mac mask-precedence This command changes to MAC Mask mode used to configure access control masks. Use the

Strany 485

MAC ACLS23-21mask (MAC ACL)This command defines a mask for MAC ACLs. This mask defines the fields to check in the packet header. Use the no form to re

Strany 486

ACCESS CONTROL LIST COMMANDS23-22ExampleThis example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of

Strany 487

MAC ACLS23-23show access-list mac mask-precedence This command shows the ingress or egress rule masks for MAC ACLs.Syntaxshow access-list mac mask-pre

Strany 488

ACCESS CONTROL LIST COMMANDS23-24• If a port is already bound to an ACL and you bind it to a different ACL, the switch will replace the old binding wi

Strany 489

ACL INFORMATION23-25show access-listThis command shows all IPv4 ACLs and associated rules.Command ModePrivileged ExecCommand UsageOnce the ACL is boun

Strany 490

BASIC CONFIGURATION2-8To automatically configure the switch by communicating with BOOTP or DHCP address allocation servers on the network, complete th

Strany 491 - Management IP Filter Commands

ACCESS CONTROL LIST COMMANDS23-26

Strany 492

24-1CHAPTER 24INTERFACE COMMANDSThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN. Tab

Strany 493

INTERFACE COMMANDS24-2interfaceThis command configures an interface type and enter interface configuration mode. Use the no form to remove a trunk.Syn

Strany 494

DESCRIPTION24-3descriptionThis command adds a description to an interface. Use the no form to remove the description.Syntax description stringno descr

Strany 495

INTERFACE COMMANDS24-4Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex setting

Strany 496 - Port Security Commands

NEGOTIATION24-5negotiationThis command enables autonegotiation for a given interface. Use the no form to disable autonegotiation.Syntax [no] negotiati

Strany 497

INTERFACE COMMANDS24-6capabilitiesThis command advertises the port capabilities of a given interface during autonegotiation. Use the no form with para

Strany 498 - IP Source Guard Commands

FLOWCONTROL24-7Example The following example configures Ethernet port 5 capabilities to 100half and 100full.Related Commands negotiation (24-5)speed-d

Strany 499

INTERFACE COMMANDS24-8To enable flow control under auto-negotiation, “flowcontrol” must be included in the capabilities list for any port• Avoid using

Strany 500

SHUTDOWN24-9ExampleThis forces the switch to use the built-in RJ-45 port for the combination port 28.shutdown This command disables an interface. To r

Strany 501

INITIAL CONFIGURATION2-9Enabling SNMP Management Access The switch can be configured to accept management commands from Simple Network Management Prot

Strany 502

INTERFACE COMMANDS24-10switchport packet-rateThis command configures broadcast and multicast storm control. Use the no form to restore the default set

Strany 503

SWITCHPORT BLOCK24-11switchport block This command prevents flooding of unknown unicast or multicast packets to an interface. Use the no form to resto

Strany 504 - DHCP Snooping Commands

INTERFACE COMMANDS24-12clear countersThis command clears statistics on an interface.Syntax clear counters interfaceinterface • ethernet unit/port- uni

Strany 505

SHOW INTERFACES STATUS24-13show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface

Strany 506

INTERFACE COMMANDS24-14Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interfac

Strany 507

SHOW INTERFACES COUNTERS24-15Command Mode Normal Exec, Privileged ExecCommand Usage If no interface is specified, information on all interfaces is dis

Strany 508

INTERFACE COMMANDS24-16show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax sh

Strany 509

SHOW INTERFACES SWITCHPORT24-17Table 24-2 show interfaces switchport - display descriptionField DescriptionBroadcast threshold Shows if broadcast sto

Strany 510

INTERFACE COMMANDS24-18

Strany 511

25-1CHAPTER 25LINK AGGREGATIONCOMMANDSPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network conn

Strany 512

BASIC CONFIGURATION2-10To prevent unauthorized access to the switch from SNMP version 1 or 2c clients, it is recommended that you change the default c

Strany 513

LINK AGGREGATION COMMANDS25-2Guidelines for Creating TrunksGeneral Guidelines –• Finish configuring port trunks before you connect the corresponding n

Strany 514

CHANNEL-GROUP25-3• If the port channel admin key (lacp admin key - Port Channel) is not set when a channel group is formed (i.e., it has the null valu

Strany 515

LINK AGGREGATION COMMANDS25-4Example The following example creates trunk 1 and then adds port 11:lacpThis command enables 802.3ad Link Aggregation Con

Strany 516 - Table 23-2 IP ACL Commands

LACP25-5ExampleThe following shows LACP enabled on ports 46-48. Because LACP has also been enabled on the ports at the other end of the links, the sho

Strany 517 - Console(config-std-acl)#

LINK AGGREGATION COMMANDS25-6lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default se

Strany 518

LACP ADMIN-KEY (ETHERNET INTERFACE)25-7lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no fo

Strany 519

LINK AGGREGATION COMMANDS25-8lacp admin-key (Port Channel)This command configures a port channel's LACP administration key string. Use the no for

Strany 520

LACP PORT-PRIORITY25-9lacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax lacp {actor

Strany 521

LINK AGGREGATION COMMANDS25-10show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sys-i

Strany 522 - permit host 10.1.1.21

SHOW LACP25-11Table 25-2 show lacp counters - display descriptionField DescriptionLACPDUs Sent Number of valid LACPDUs transmitted from this channel

Strany 523 - Console(config-ip-mask-acl)#

INITIAL CONFIGURATION2-11Then press <Enter>. For a more detailed description of these parameters, see “snmp-server host” on page 20-6. The follo

Strany 524

LINK AGGREGATION COMMANDS25-12LACPDUs InternalNumber of seconds before invalidating received LACPDU information.LACP System PriorityLACP system priori

Strany 525

SHOW LACP25-13Console#show lacp 1 neighborsPort channel 1 neighbors-------------------------------------------------------------------Eth 1/1---------

Strany 526

LINK AGGREGATION COMMANDS25-14Console#show lacp sysidPort Channel System Priority System MAC Address-------------------------------------------

Strany 527

26-1CHAPTER 26MIRROR PORT COMMANDSThis section describes how to mirror traffic from a source port to a target port. port monitorThis command configure

Strany 528

MIRROR PORT COMMANDS26-2Command Usage • You can mirror traffic from any source port to a destination port for real-time analysis. You can then attach

Strany 529 - MAC ACLs

SHOW PORT MONITOR26-3Command Usage This command displays the currently configured source port, destination port, and mirror mode (i.e., RX, TX, RX/TX)

Strany 531

27-1CHAPTER 27RATE LIMIT COMMANDSThis function allows the network manager to control the maximum rate for traffic transmitted or received on an interf

Strany 532

RATE LIMIT COMMANDS27-2rate-limitThis command defines the rate limit for a specific interface. Use this command without specifying a rate to restore t

Strany 533

RATE-LIMIT COS27-3rate-limit cosThis command defines the output rate limit for an interface based on specified CoS priorities. Use the no form to rest

Strany 534 - Console(config-mac-mask-acl)#

MANAGING SYSTEM FILES2-12Managing System FilesThe switch’s flash memory supports three types of system files that can be managed by the CLI program, w

Strany 535

RATE LIMIT COMMANDS27-4ExampleThis example sets the maximum output rate for CoS traffic of priority level 0 to 50 Mbps on Port 1. Table 27-2 Mapping

Strany 536

SHOW RATE-LIMIT COS27-5show rate-limit cosThis command displays the output rate limit for CoS priorities.Command Mode Privileged ExecCommand Usage If

Strany 537 - MAC egress mask ACL:

RATE LIMIT COMMANDS27-6

Strany 538 - PE 23-25

28-1CHAPTER 28ADDRESS TABLE COMMANDSThese commands are used to configure the address table for filtering specified addresses, displaying current entri

Strany 539 - NFORMATION

ADDRESS TABLE COMMANDS28-2mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an add

Strany 540

CLEAR MAC-ADDRESS-TABLE DYNAMIC28-3• A static address cannot be learned on another port until the address is removed with the no form of this command.

Strany 541

ADDRESS TABLE COMMANDS28-4show mac-address-tableThis command shows classes of entries in the bridge-forwarding database.Syntax show mac-address-table

Strany 542

MAC-ADDRESS-TABLE AGING-TIME28-5• The maximum number of address entries is 8191.Examplemac-address-table aging-timeThis command sets the aging time fo

Strany 543 - DESCRIPTION

ADDRESS TABLE COMMANDS28-6show mac-address-table aging-timeThis command shows the aging time for entries in the address table.Default Setting NoneComm

Strany 544

29-1CHAPTER 29SPANNING TREE COMMANDSThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and comma

Strany 545 - NEGOTIATION

INITIAL CONFIGURATION2-13In the system flash memory, one file of each type must be set as the start-up file. During a system boot, the diagnostic and

Strany 546

SPANNING TREE COMMANDS29-2revision Configures the revision number for the multiple spanning treeMST 29-14max-hops Configures the maximum number of hop

Strany 547 - FLOWCONTROL

SPANNING-TREE29-3spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Syntax [no] span

Strany 548

SPANNING TREE COMMANDS29-4spanning-tree modeThis command selects the spanning tree mode for this switch. Use the no form to restore the default.Syntax

Strany 549 - SHUTDOWN

SPANNING-TREE FORWARD-TIME29-5restarts the migration delay timer and begins using RSTP BPDUs on that port.• Multiple Spanning Tree Protocol- To allow

Strany 550

SPANNING TREE COMMANDS29-6Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discar

Strany 551 - SWITCHPORT

SPANNING-TREE MAX-AGE29-7Related Commandsspanning-tree forward-time (29-5)spanning-tree max-age (29-7)spanning-tree max-ageThis command configures the

Strany 552

SPANNING TREE COMMANDS29-8Related Commandsspanning-tree forward-time (29-5)spanning-tree hello-time (29-6)spanning-tree priorityThis command configure

Strany 553 - INTERFACES

SPANNING-TREE PATHCOST METHOD29-9spanning-tree pathcost methodThis command configures the path cost method used for Rapid Spanning Tree and Multiple S

Strany 554

SPANNING TREE COMMANDS29-10spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP/M

Strany 555 - COUNTERS

MST VLAN29-11Related Commands mst vlan (29-11)mst priority (29-12)name (29-13)revision (29-14)max-hops (29-14)mst vlanThis command adds VLANs to a spa

Strany 556

viWARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT OF THE PRODUCT IN

Strany 557

MANAGING SYSTEM FILES2-14To save the current configuration settings, enter the following command:1. From the Privileged Exec mode prompt, type “copy r

Strany 558

SPANNING TREE COMMANDS29-12instance (on each bridge) with the same set of VLANs. Also, note that RSTP treats each MSTI region as a single node, connec

Strany 559 - GGREGATION

NAME29-13Example nameThis command configures the name for the multiple spanning tree region in which this switch is located. Use the no form to clear

Strany 560

SPANNING TREE COMMANDS29-14revisionThis command configures the revision number for this multiple spanning tree configuration of this switch. Use the n

Strany 561

SPANNING-TREE SPANNING-DISABLED29-15Default Setting 20Command Mode MST ConfigurationCommand Usage An MSTI region is treated as a single node by the ST

Strany 562

SPANNING TREE COMMANDS29-16Example This example disables the spanning tree algorithm for port 5.spanning-tree costThis command configures the spanning

Strany 563

SPANNING-TREE COST29-17Default Setting By default, the system automatically detects the speed and duplex mode used on each port, and configures the pa

Strany 564

SPANNING TREE COMMANDS29-18spanning-tree port-priorityThis command configures the priority for the specified interface. Use the no form to restore the

Strany 565

SPANNING-TREE PORTFAST29-19Default Setting DisabledCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage • You can enable this op

Strany 566

SPANNING TREE COMMANDS29-20Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command is used to enable/disable the fas

Strany 567 - PRIORITY

SPANNING-TREE LINK-TYPE29-21spanning-tree link-typeThis command configures the link type for Rapid Spanning Tree and Multiple Spanning Tree. Use the n

Strany 568

SECTION IISWITCH MANAGEMENTThis section describes the basic switch features, along with a detailed description of how to configure each feature via a

Strany 569

SPANNING TREE COMMANDS29-22spanning-tree mst costThis command configures the path cost on a spanning instance in the Multiple Spanning Tree. Use the n

Strany 570

SPANNING-TREE MST PORT-PRIORITY29-23should be assigned to interfaces attached to faster media, and higher values assigned to interfaces with slower me

Strany 571

SPANNING TREE COMMANDS29-24Where more than one interface is assigned the highest priority, the interface with lowest numeric identifier will be enable

Strany 572

SHOW SPANNING-TREE29-25Example show spanning-treeThis command shows the configuration for the common spanning tree (CST) or for an instance within the

Strany 573 - Command Function Mode Page

SPANNING TREE COMMANDS29-26description of the items displayed for specific interfaces, see “Displaying Interface Settings” on page 11-13.ExampleConsol

Strany 574

SHOW SPANNING-TREE MST CONFIGURATION29-27show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Comman

Strany 575

SPANNING TREE COMMANDS29-28

Strany 576

30-1CHAPTER 30VLAN COMMANDSA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same p

Strany 577

VLAN COMMANDS30-2GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN information in order to

Strany 578

GVRP AND BRIDGE EXTENSION COMMANDS30-3Command Usage GVRP defines a way for switches to exchange VLAN information in order to register VLAN members on

Strany 579

SWITCH MANAGEMENT

Strany 580 - 0 to 50 Mbps on Port 1

VLAN COMMANDS30-4switchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchport gvrpDefault Setting Disable

Strany 581

GVRP AND BRIDGE EXTENSION COMMANDS30-5garp timerThis command sets the values for the join, leave and leaveall timers. Use the no form to restore the t

Strany 582

VLAN COMMANDS30-6Example Related Commandsshow garp timer (30-6)show garp timerThis command shows the GARP timers for the selected interface.Syntax sho

Strany 583

EDITING VLAN GROUPS30-7Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in this mode will take effect immediately.

Strany 584

VLAN COMMANDS30-8vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [name vlan-n

Strany 585

CONFIGURING VLAN INTERFACES30-9Related Commands show vlan (30-16)Configuring VLAN Interfacesinterface vlanThis command enters interface configuration

Strany 586

VLAN COMMANDS30-10Default Setting NoneCommand Mode Global ConfigurationExample The following example shows how to set the interface configuration mode

Strany 587

CONFIGURING VLAN INTERFACES30-11Example The following shows how to set the configuration mode to port 1, and then set the switchport mode to hybrid:Re

Strany 588 - Aging time: 300 sec

VLAN COMMANDS30-12Related Commandsswitchport mode (30-10)switchport ingress-filtering This command enables ingress filtering for an interface. Use the

Strany 589

CONFIGURING VLAN INTERFACES30-13switchport native vlanThis command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore

Strany 590

3-1CHAPTER 3CONFIGURING THE SWITCHUsing the Web InterfaceThis switch provides an embedded HTTP web agent. Using a web browser you can configure the sw

Strany 591 - SPANNING

VLAN COMMANDS30-14switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Strany 592 -

CONFIGURING VLAN INTERFACES30-15• If a VLAN on the forbidden list for an interface is manually added to that interface, the VLAN is automatically remo

Strany 593

VLAN COMMANDS30-16Example The following example shows how to prevent port 1 from being added to VLAN 3:Displaying VLAN InformationThis section describ

Strany 594

CONFIGURING PRIVATE VLANS30-17Example The following example shows how to display information for VLAN 1:Configuring Private VLANsPrivate VLANs provide

Strany 595

VLAN COMMANDS30-18Command Mode Global ConfigurationCommand Usage• A private VLAN provides port-based security and isolation between ports within the V

Strany 596

CONFIGURING PROTOCOL-BASED VLANS30-19Configuring Protocol-based VLANsThe network devices required to support multiple protocols cannot be easily group

Strany 597 - PATHCOST

VLAN COMMANDS30-203. Then map the protocol for each interface to the appropriate VLAN using the protocol-vlan protocol-group command (Interface Config

Strany 598 - Console(config-mstp)#

CONFIGURING PROTOCOL-BASED VLANS30-21protocol-vlan protocol-group (Configuring Interfaces)This command maps a protocol group to a VLAN for the current

Strany 599

VLAN COMMANDS30-22Example The following example maps the traffic entering Port 1 which matches the protocol type specified in protocol group 1 to VLAN

Strany 600

CONFIGURING PROTOCOL-BASED VLANS30-23show interfaces protocol-vlan protocol-groupThis command shows the mapping from protocol groups to VLANs for the

Strany 601

CONFIGURING THE SWITCH3-2Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is

Strany 602

VLAN COMMANDS30-24Configuring IEEE 802.1Q TunnelingQinQ tunneling uses a single Service Provider VLAN (SPVLAN) for customers who have multiple VLANs.

Strany 603 - DISABLED

CONFIGURING IEEE 802.1Q TUNNELING30-25ethertype to identify 802.1Q tagged frames. The standard ethertype value is 0x8100. (See switchport dot1q-ethert

Strany 604

VLAN COMMANDS30-26ExampleRelated Commandsshow dot1q-tunnel (page 30-26)show interfaces switchport (24-16)show dot1q-tunnelThis command displays infor

Strany 605

CONFIGURING IEEE 802.1Q TUNNELING30-27switchport dot1q-ethertypeThis command sets the Tag Protocol Identifier (TPID) value of a tunnel port. Use the n

Strany 606

VLAN COMMANDS30-28

Strany 607 - PORTFAST

31-1CHAPTER 31CLASS OF SERVICECOMMANDSThe commands described in this section allow you to specify which data packets have greater precedence when traf

Strany 608

CLASS OF SERVICE COMMANDS31-2Priority Commands (Layer 2)This section describes commands used to configure Layer 2 traffic priority on the switch.Table

Strany 609

PRIORITY COMMANDS (LAYER 2)31-3queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (C

Strany 610

CLASS OF SERVICE COMMANDS31-4Related Commandsqueue bandwidth (31-6)show queue mode (31-4)show queue modeThis command shows the current queue mode.Defa

Strany 611

PRIORITY COMMANDS (LAYER 2)31-5Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priori

Strany 612

NAVIGATING THE WEB BROWSER INTERFACE3-3Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and pa

Strany 613

CLASS OF SERVICE COMMANDS31-6queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queu

Strany 614

PRIORITY COMMANDS (LAYER 2)31-7queue cos-mapThis command assigns class of service (CoS) values to the priority queues (i.e., hardware output queues 0

Strany 615

CLASS OF SERVICE COMMANDS31-8Example The following example shows how to change the CoS assignments to a one-to-one mapping:Related Commands show queue

Strany 616

PRIORITY COMMANDS (LAYER 2)31-9show queue cos-mapThis command shows the class of service priority map.Syntax show queue cos-map [interface]interface •

Strany 617 - Table 30-1 VLAN Commands

CLASS OF SERVICE COMMANDS31-10Default Setting The original priority value in the VLAN tag of a tagged packet, or a VLAN priority tag inserted by anoth

Strany 618

PRIORITY COMMANDS (LAYER 3 AND 4)31-11Priority Commands (Layer 3 and 4)This section describes commands used to configure Layer 3 and Layer 4 traffic p

Strany 619 - XTENSION

CLASS OF SERVICE COMMANDS31-12Command Usage The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport priority.

Strany 620

PRIORITY COMMANDS (LAYER 3 AND 4)31-13map ip precedence (Global Configuration)This command enables IP precedence mapping (i.e., IP Type of Service). U

Strany 621

CLASS OF SERVICE COMMANDS31-14Default Setting The list below shows the default priority mapping.Command Mode Interface Configuration (Ethernet, Port C

Strany 622

PRIORITY COMMANDS (LAYER 3 AND 4)31-15Command Usage • The precedence for priority mapping is IP Port, IP Precedence or IP DSCP, and default switchport

Strany 623 - Editing VLAN Groups

CONFIGURING THE SWITCH3-4Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made

Strany 624 - Console(config-vlan)#

CLASS OF SERVICE COMMANDS31-16Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • The precedence for priority mapping is IP P

Strany 625 - Configuring VLAN Interfaces

PRIORITY COMMANDS (LAYER 3 AND 4)31-17Example The following shows that HTTP traffic has been mapped to CoS value 0:Related Commands map ip port (Globa

Strany 626

CLASS OF SERVICE COMMANDS31-18Example Related Commands map ip precedence (Global Configuration) (31-13)map ip precedence (Interface Configuration) (31

Strany 627 - NTERFACES

PRIORITY COMMANDS (LAYER 3 AND 4)31-19Example Related Commands map ip dscp (Global Configuration) (31-14)map ip dscp (Interface Configuration) (31-15)

Strany 628

CLASS OF SERVICE COMMANDS31-20

Strany 629

32-1CHAPTER 32QUALITY OF SERVICECOMMANDSThe commands described in this section are used to configure Differentiated Services (DiffServ) classification

Strany 630

QUALITY OF SERVICE COMMANDS32-2To create a service policy for a specific category of ingress traffic, follow these steps:1. Use the class-map command

Strany 631

CLASS-MAP32-3Notes: 1. You can configure up to 16 rules per Class Map. You can also include multiple classes in a Policy Map.2. You should create a Cl

Strany 632 - Displaying VLAN Information

QUALITY OF SERVICE COMMANDS32-4• The class map is used with a policy map (page 32-6) to create a service policy (page 32-10) for a specific interface

Strany 633

MATCH32-5Command Usage •First enter the class-map command to designate a class map and enter the Class Map configuration mode. Then use the match comm

Strany 634

NAVIGATING THE WEB BROWSER INTERFACE3-5Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all

Strany 635

QUALITY OF SERVICE COMMANDS32-6policy-mapThis command creates a policy map that can be attached to multiple interfaces, and enters Policy Map configur

Strany 636

CLASS32-7classThis command defines a traffic classification upon which a policy can act, and enters Policy Map Class configuration mode. Use the no fo

Strany 637

QUALITY OF SERVICE COMMANDS32-8Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd_

Strany 638

POLICE32-9Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd_class,” uses the set

Strany 639

QUALITY OF SERVICE COMMANDS32-10burst-byte field, and the average rate tokens are removed from the bucket is by specified by the rate-bps option. Exam

Strany 640

SHOW CLASS-MAP32-11• You must first define a class map, then define a policy map, and finally use the service-policy command to bind the policy map to

Strany 641

QUALITY OF SERVICE COMMANDS32-12show policy-map This command displays the QoS policy maps which define classification criteria for incoming traffic, a

Strany 642

SHOW POLICY-MAP INTERFACE32-13show policy-map interfaceThis command displays the service policy assigned to the specified interface.Syntax show policy

Strany 643

QUALITY OF SERVICE COMMANDS32-14

Strany 644

33-1CHAPTER 33MULTICAST FILTERINGCOMMANDSThis switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts that want to recei

Strany 645 - Table 31-1 Priority Commands

CONFIGURING THE SWITCH3-6Remote Logs Configures the logging of messages to a remote logging process4-29SMTP Sends an SMTP client message to a partici

Strany 646

MULTICAST FILTERING COMMANDS33-2IGMP Snooping CommandsThis section describes commands used to configure IGMP snooping on the switch. ip igmp snoopingT

Strany 647

IGMP SNOOPING COMMANDS33-3Command Mode Global ConfigurationExample The following example enables IGMP snooping.ip igmp snooping vlan staticThis comman

Strany 648 - Wrr status: Enabled

MULTICAST FILTERING COMMANDS33-4ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Synt

Strany 649

IGMP SNOOPING COMMANDS33-5ip igmp snooping leave-proxyThis command suppresses leave messages unless received from the last member port in the group. U

Strany 650 - Console(config)#int eth 1/5

MULTICAST FILTERING COMMANDS33-6• IGMP version 1 hosts do not respond to multicast group-specific queries. If a version 1 host is known by the switch

Strany 651

IGMP SNOOPING COMMANDS33-7• This command is only effective if IGMP snooping is enabled, and IGMPv2 or IGMPv3 snooping is used. Example The following s

Strany 652

MULTICAST FILTERING COMMANDS33-8show mac-address-table multicast This command shows known multicast addresses.Syntax show mac-address-table multicast

Strany 653 - Information of Eth 1/1

IGMP QUERY COMMANDS33-9IGMP Query CommandsThis section describes commands used to configure Layer 2 IGMP query on the switch. ip igmp snooping querier

Strany 654

MULTICAST FILTERING COMMANDS33-10Exampleip igmp snooping query-countThis command configures the query count. Use the no form to restore the default.Sy

Strany 655

IGMP QUERY COMMANDS33-11ip igmp snooping query-intervalThis command configures the query interval. Use the no form to restore the default.Syntax ip ig

Strany 656 - Console(config)#map ip port

NAVIGATING THE WEB BROWSER INTERFACE3-7Port Security Configures per port security, including status, response for security breach, and maximum allowed

Strany 657

MULTICAST FILTERING COMMANDS33-12Command Usage• The switch must be using IGMPv2 or v3 snooping for this command to take effect. • This command defines

Strany 658 - CoS Value 01234567

STATIC MULTICAST ROUTING COMMANDS33-13Command Usage The switch must use IGMPv2 or v3 snooping for this command to take effect.Example The following sh

Strany 659 - Console(config)#map ip dscp

MULTICAST FILTERING COMMANDS33-14Default Setting No static multicast router ports are configured. Command Mode Global ConfigurationCommand Usage Depen

Strany 660

MULTICAST VLAN REGISTRATION COMMANDS33-15Example The following shows that port 11 in VLAN 1 is attached to a multicast router:Multicast VLAN Registrat

Strany 661

MULTICAST FILTERING COMMANDS33-16mvr (Global Configuration)This command enables Multicast VLAN Registration (MVR) globally on the switch, statically c

Strany 662

MULTICAST VLAN REGISTRATION COMMANDS33-17• IGMP snooping must be enabled to a allow a subscriber to dynamically join or leave an MVR group (see ip igm

Strany 663 - Related Commands

MULTICAST FILTERING COMMANDS33-18Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • A port which is not configured as an MVR

Strany 664

MULTICAST VLAN REGISTRATION COMMANDS33-19page 33-2). Note that only IGMP version 2 or 3 hosts can issue multicast join or leave messages.Example The f

Strany 665

MULTICAST FILTERING COMMANDS33-20Command Mode Privileged ExecCommand Usage Enter this command without any keywords to display the global settings for

Strany 666

MULTICAST VLAN REGISTRATION COMMANDS33-21The following displays information about the interfaces attached to the MVR VLAN:Console#show mvr interfacePo

Strany 667

viiTABLE OF CONTENTSSection I Getting Started1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1Key Features . .

Strany 668

CONFIGURING THE SWITCH3-8Port Neighbors Information Displays settings and operational state for the remote side9-21Port Broadcast Control Sets the bro

Strany 669

MULTICAST FILTERING COMMANDS33-22The following shows information about the interfaces associated with multicast groups assigned to the MVR VLAN:Consol

Strany 670 - Console(config-pmap-c)#

34-1CHAPTER 34DOMAIN NAME SERVICECOMMANDSThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entries

Strany 671

DOMAIN NAME SERVICE COMMANDS34-2ip hostThis command creates a static entry in the DNS table that maps a host name to an IP address. Use the no form to

Strany 672

CLEAR HOST34-3Example This example maps two address to a host name.clear hostThis command deletes entries from the DNS table.Syntax clear host {name |

Strany 673

DOMAIN NAME SERVICE COMMANDS34-4ip domain-nameThis command defines the default domain name appended to incomplete host names (i.e., host names passed

Strany 674

IP DOMAIN-LIST34-5ip domain-listThis command defines a list of domain names that can be appended to incomplete host names (i.e., host names passed fro

Strany 675

DOMAIN NAME SERVICE COMMANDS34-6ExampleThis example adds two domain names to the current list and then displays the list.Related Commands ip domain-na

Strany 676

IP DOMAIN-LOOKUP34-7ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (34-4)ip d

Strany 677 - INTERFACE

DOMAIN NAME SERVICE COMMANDS34-8ExampleThis example enables DNS and then displays the configuration.Related Commands ip domain-name (34-4)ip name-serv

Strany 678

SHOW DNS34-9show dnsThis command displays the configuration of the DNS service.Command Mode Privileged ExecExampleshow dns cacheThis command displays

Strany 679

NAVIGATING THE WEB BROWSER INTERFACE3-9MSTP VLAN Configuration Configures priority and VLANs for a spanning tree instance11-21 Port Information Displ

Strany 680

DOMAIN NAME SERVICE COMMANDS34-10clear dns cacheThis command clears all entries in the DNS cache.Command Mode Privileged ExecExampleTYPE This field in

Strany 681

35-1CHAPTER 35IP INTERFACE COMMANDSAn IP address may be used for management access to the switch over your network. An IP address is obtained via DHCP

Strany 682

IP INTERFACE COMMANDS35-2ip address This command sets the IP address for the currently selected VLAN interface. Use the no form to remove the current

Strany 683

BASIC IP CONFIGURATION35-3Notes: 1. Only one VLAN interface can be assigned an IP address (the default is VLAN 1). This defines the management VLAN, t

Strany 684

IP INTERFACE COMMANDS35-4• An default gateway can only be successfully set when a network interface that directly connects to the gateway has been con

Strany 685

BASIC IP CONFIGURATION35-5Example In the following example, the device is reassigned the same address.Related Commands ip address (35-2)show ip interf

Strany 686

IP INTERFACE COMMANDS35-6Example Related Commands ip default-gateway (35-3)show arpUse this command to display entries in the Address Resolution Proto

Strany 687 - IGMP Query Commands

BASIC IP CONFIGURATION35-7pingThis command sends ICMP echo request packets to another node on the network.Syntax ping host [count count][size size]• h

Strany 688

IP INTERFACE COMMANDS35-8Example Related Commands interface (24-2)Console#ping 10.1.0.9Type ESC to abort.PING to 10.1.0.9, by 5 32-byte payload ICMP p

Strany 689

SECTION IVAPPENDICESThis section provides additional information on the following topics. Software Specifications . . . . . . . . . . . . . . . . .

Strany 690

CONFIGURING THE SWITCH3-10Priority 13-1Default Port Priority Sets the default priority for each port 13-1Default Trunk Priority Sets the default prior

Strany 691

APPENDICES

Strany 692

A-1APPENDIX ASOFTWARE SPECIFICATIONSSoftware FeaturesAuthenticationLocal, RADIUS, TACACS+, Port (802.1X), HTTPS, SSH, Port SecurityAccess Control List

Strany 693

SOFTWARE SPECIFICATIONSA-2Rate LimitsInput LimitOutput limitRange (configured per port)Port TrunkingStatic trunks (Cisco EtherChannel compliant)Dynami

Strany 694

MANAGEMENT FEATURESA-3Management FeaturesIn-Band ManagementTelnet, web-based HTTP or HTTPS, SNMP manager, or Secure ShellOut-of-Band ManagementRS-232

Strany 695

SOFTWARE SPECIFICATIONSA-4IGMPv2 (RFC 2236)IPv4 IGMP (RFC 3228)RADIUS+ (RFC 2618)RMON (RFC 2819 groups 1,2,3,9)SNMP (RFC 1157)SNMPv2c (RFC 2571)SNMPv3

Strany 696

MANAGEMENT INFORMATION BASESA-5RADIUS Authentication Client MIB (RFC 2621)RMON MIB (RFC 2819)RMON II Probe Configuration Group (RFC 2021, partial impl

Strany 697

SOFTWARE SPECIFICATIONSA-6

Strany 698

B-1APPENDIX BTROUBLESHOOTINGProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet, we

Strany 699 - MVR VLAN:

TROUBLESHOOTINGB-2Cannot connect using Secure Shell• If you cannot connect using SSH, you may have exceeded the maximum number of concurrent Telnet/SS

Strany 700

USING SYSTEM LOGSB-3Using System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually cau

Strany 701 - Table 34-1 DNS Commands

NAVIGATING THE WEB BROWSER INTERFACE3-11Static Multicast Router Port ConfigurationAssigns ports that are attached to a neighboring multicast router15-

Strany 702

TROUBLESHOOTINGB-4

Strany 703

Glossary-1GLOSSARYAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Strany 704

GLOSSARYGlossary-2marked for different kinds of forwarding. The DSCP bits are mapped to the Class of Service categories, and then into the output queu

Strany 705

GLOSSARYGlossary-3Generic Multicast Registration Protocol (GMRP)GMRP allows network devices to register end stations with multicast groups. GMRP requi

Strany 706

GLOSSARYGlossary-4IEEE 802.3acDefines frame extensions for VLAN tagging.IEEE 802.3xDefines Ethernet frame start/stop requests and timers used for flow

Strany 707

GLOSSARYGlossary-5IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight different priority lev

Strany 708

GLOSSARYGlossary-6Multicast SwitchingA process whereby the switch filters incoming multicast frames for services for which no attached host has regist

Strany 709 - Field Description

GLOSSARYGlossary-7Port MirroringA method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON

Strany 710

GLOSSARYGlossary-8Rapid Spanning Tree Protocol (RSTP)RSTP reduces the convergence time for network topology changes to about 10% of that required by t

Strany 711 - Basic IP Configuration

GLOSSARYGlossary-9Terminal Access Controller Access Control System Plus (TACACS+)TACACS+ is a logon authentication protocol that uses software running

Strany 712

CONFIGURING THE SWITCH3-12

Strany 713

GLOSSARYGlossary-10XModemA protocol used to transfer files between devices. Data is grouped in 128-byte blocks and error-corrected.

Strany 714

Index-1Numerics802.1Q tunnel 12-17, 30-24description 12-17interface configuration 12-23, 30-25–30-27mode selection 12-23TPID 12-16, 12-23, 30-27802.1X

Strany 715

INDEXIndex-2name server list 16-1, 34-6static entries 16-4Domain Name Service See DNSdownloading software 4-16, 19-16DSCPenabling 13-9, 31-14mapping

Strany 716

INDEXIndex-3Link Aggregation Control Protocol See LACPlink type, STA 11-16, 11-19, 29-21loggingsyslog traps 19-40to syslog servers 19-38log-in, Web i

Strany 717

INDEXIndex-4rate limitssetting input and output limits 27-2setting output limits based on priorities 27-3rate limits, setting 9-26remote logging 19-40

Strany 718

INDEXIndex-5user account 6-1user password 6-1, 21-2, 21-4VVLANs 12-1–12-26, 30-1–30-18802.1Q tunnel mode 12-23adding static members 12-10, 12-13, 30-1

Strany 721 - PECIFICATIONS

38 TeslaIrvine, CA 92618Phone: (949) 679-8000FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOU; (949)

Strany 722

4-1CHAPTER 4BASIC MANAGEMENT TASKSThis chapter describes the basic functions required to set up management access to the switch, display or upgrade op

Strany 723 - Standards

BASIC MANAGEMENT TASKS4-2• Web Secure Server Port – Shows the TCP port used by the HTTPS interface.• Telnet Server – Shows if management access via Te

Strany 724 - Management Information Bases

DISPLAYING SYSTEM INFORMATION4-3CLI – Specify the hostname, location and contact information.Console(config)#hostname R&D 5 19-2Console(config)#sn

Strany 725

BASIC MANAGEMENT TASKS4-4Configuring the Switch for Normal Operation or Tunneling ModeThe system can be configured to operate in normal mode or IEEE 8

Strany 726

CONFIGURING THE MAXIMUM FRAME SIZE4-5CLI – This example sets the switch to operate in QinQ mode.Configuring the Maximum Frame SizeThe maximum transfer

Strany 727 - ROUBLESHOOTING

TABLE OF CONTENTSviiiMain Menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-54 Basic Management Tasks . .

Strany 728

BASIC MANAGEMENT TASKS4-6Command Attributes• System MTU (1500-1548) – Specifies the MTU size for Fast Ethernet ports. (Range: 1500-1548 bytes)• Jumbo

Strany 729 - Using System Logs

CONFIGURING SUPPORT FOR JUMBO FRAMES4-7Configuring Support for Jumbo FramesThe switch provides more efficient throughput for large sequential data tra

Strany 730

BASIC MANAGEMENT TASKS4-8Displaying Switch Hardware/Software Versions Use the Switch Information page to display hardware/firmware version numbers for

Strany 731 - Glossary-1

DISPLAYING SWITCH HARDWARE/SOFTWARE VERSIONS4-9Web – Click System, Switch Information.Figure 4-5 Switch InformationCLI – Use the following command to

Strany 732 - Glossary-2

BASIC MANAGEMENT TASKS4-10Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filter

Strany 733 - Glossary-3

DISPLAYING BRIDGE EXTENSION CAPABILITIES4-11Web – Click System, Bridge Extension.Figure 4-6 Displaying Bridge Extension ConfigurationCLI – Enter the

Strany 734 - Glossary-4

BASIC MANAGEMENT TASKS4-12Setting the Switch’s IP AddressThis section describes how to configure an IP interface for management access over the networ

Strany 735 - Glossary-5

SETTING THE SWITCH’S IP ADDRESS4-13• MAC Address – The physical layer address for this switch.Manual ConfigurationWeb – Click System, System, IP Confi

Strany 736 - Glossary-6

BASIC MANAGEMENT TASKS4-14Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the stack to be dynamically configured by t

Strany 737 - Glossary-7

MANAGING FIRMWARE4-15Renewing DCHP – DHCP may lease addresses to clients indefinitely or for a specific period of time. If the address expires or the

Strany 738 - Glossary-8

TABLE OF CONTENTSixConfiguring Remote SNMPv3 Users . . . . . . . . . . . . . . . . . . . . . 5-15Configuring SNMPv3 Groups . . . . . . . . . . . . .

Strany 739 - Glossary-9

BASIC MANAGEMENT TASKS4-16• File Name – The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period

Strany 740 - Glossary-10

MANAGING FIRMWARE4-17If you download to a new destination file, go to the File Management, Set Start-Up menu, mark the operation code file used at sta

Strany 741 - Numerics

BASIC MANAGEMENT TASKS4-18CLI – To download new firmware form a TFTP server, enter the IP address of the TFTP server, select “config” as the file type

Strany 742

SAVING OR RESTORING CONFIGURATION SETTINGS4-19- running-config to startup-config – Copies the running config to the startup config.- running-config to

Strany 743

BASIC MANAGEMENT TASKS4-20Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set i

Strany 744

SAVING OR RESTORING CONFIGURATION SETTINGS4-21If you download to a new file name using “tftp to startup-config” or “tftp to file,” the file is automat

Strany 745

BASIC MANAGEMENT TASKS4-22Console Port SettingsYou can access the onboard configuration program by attaching a VT100 compatible device to the switch’s

Strany 746

CONSOLE PORT SETTINGS4-23device connected to the serial port. (Range: 9600, 19200, 38400, 57600, or 115200 baud, Auto; Default: Auto)• Stop Bits – Set

Strany 747

BASIC MANAGEMENT TASKS4-24CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the curr

Strany 748

TELNET SETTINGS4-25• Login Timeout – Sets the interval that the system waits for a user to log into the CLI. If a login attempt is not detected within

Komentáře k této Příručce

Žádné komentáře