SMC Networks SMC8624/48T Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Síťové přepínače SMC Networks SMC8624/48T. SMC Networks SMC8624/48T User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 556
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
TigerSwitch 10/100/1000
Gigabit Ethernet Switch
24/48 auto-MDI/MDI-X 10/100/1000BASE-T ports
4 ports shared with 4 SFP transceiver slots
Non-blocking switching architecture
Support for a redundant power unit
Spanning Tree Protocol, Rapid STP, and Multiple STP
Up to six LACP or static 8-port trunks
Layer 2/3/4 CoS support through 8 priority queues
Layer 3/4 traffic priority with IP Precedence and IP DSCP
Full support for VLANs with GVRP
IGMP multicast filtering and snooping
Support for jumbo frames up to 9 KB
Manageable via console, Web, and SNMP/RMON
Management Guide
SMC8624/48T
Zobrazit stránku 0
1 2 3 4 5 6 ... 555 556

Shrnutí obsahu

Strany 1 - TigerSwitch 10/100/1000

TigerSwitch 10/100/1000Gigabit Ethernet Switch◆ 24/48 auto-MDI/MDI-X 10/100/1000BASE-T ports◆ 4 ports shared with 4 SFP transceiver slots◆ Non-blockin

Strany 2

CONTENTSviAdding Static Members to VLANs (Port Index) . . . . . . . . . . 3-153Configuring VLAN Behavior for Interfaces . . . . . . . . . . . . . .

Strany 3 - Management Guide

CONFIGURING THE SWITCH3-52The operation of 802.1x on the switch requires the following:• The switch must have an IP address assigned.• RADIUS authenti

Strany 4

USER AUTHENTICATION3-53Command Attributes • 802.1x Re-authentication – Indicates if switch port requires a client to be re-authenticated after a certa

Strany 5

CONFIGURING THE SWITCH3-54CLI – This example shows the default protocol settings for 802.1x. For a description of the additional entries displayed in

Strany 6

USER AUTHENTICATION3-55Configuring 802.1x Global SettingsThe dot1x protocol includes global parameters that control the client authentication process

Strany 7

CONFIGURING THE SWITCH3-56Web – Select Security, 802.1x, Configuration. Enable dot1x globally for the switch, modify any of the parameters required, a

Strany 8

USER AUTHENTICATION3-57• Max Count – The maximum number of hosts that can connect to a port when the Multi-Host operation mode is selected. (Range: 1-

Strany 9

CONFIGURING THE SWITCH3-58CLI – This example sets the authentication mode to enable 802.1x on port 2, and allows up to ten clients to connect to this

Strany 10

USER AUTHENTICATION3-59Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to update the statistic

Strany 11

CONFIGURING THE SWITCH3-60CLI – This example displays the 802.1x statistics for port 4.Access Control ListsAccess Control Lists (ACL) provide packet f

Strany 12

ACCESS CONTROL LISTS3-61Command UsageThe following restrictions apply to ACLs:• Each ACL can have up to 32 rules.• The maximum number of ACLs is also

Strany 13

CONTENTSviiEntering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-4Keywords and Arguments . . . . . . .

Strany 14

CONFIGURING THE SWITCH3-62Command Attributes• Name – Name of the ACL. (Maximum length: 16 characters)• Type – There are three filtering modes:- Stand

Strany 15

ACCESS CONTROL LISTS3-63Configuring a Standard IP ACLCommand Attributes• Action – An ACL can contain all permit rules or all deny rules. (Default: Per

Strany 16

CONFIGURING THE SWITCH3-64CLI – This example configures one permit rule for the specific address 10.1.1.21 and another rule for the address range 168.

Strany 17

ACCESS CONTROL LISTS3-65• Control Bitmask – Decimal number representing the code bits to match.The control bitmask is a decimal number (for an equival

Strany 18

CONFIGURING THE SWITCH3-66Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (A

Strany 19

ACCESS CONTROL LISTS3-673. Permit all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.”Configuring a MAC ACLComma

Strany 20

CONFIGURING THE SWITCH3-68• Packet Format – This attribute includes the following packet types:- Any – Any Ethernet packet type.- Untagged-eth2 – Unta

Strany 21

ACCESS CONTROL LISTS3-69Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (Any

Strany 22

CONFIGURING THE SWITCH3-70Configuring ACL MasksYou can specify optional masks that control the order in which ACL rules are checked. The switch includ

Strany 23

ACCESS CONTROL LISTS3-71Web – Click Security, ACL, Mask Configuration. Click Edit for one of the basic mask types to open the configuration page.Figur

Strany 24

CONTENTSviiiSystem Management Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-32Device Designation Commands . . . . . . . . .

Strany 25 - NTRODUCTION

CONFIGURING THE SWITCH3-72subnet), or “IP” to specify a range of addresses. (Options: Any, Host, IP; Default: Any)• Src/Dst IP Bitmask – Source or des

Strany 26 - Table 1-1. Key Features

ACCESS CONTROL LISTS3-73Web – Configure the mask to match the required rules in the IP ingress or egress ACLs. Set the mask to check for any source or

Strany 27 - ESCRIPTION

CONFIGURING THE SWITCH3-74Configuring a MAC ACL MaskThis mask defines the fields to check in the packet header. Command UsageYou must configure a mask

Strany 28

ACCESS CONTROL LISTS3-75Web – Configure the mask to match the required rules in the MAC ingress or egress ACLs. Set the mask to check for any source o

Strany 29

CONFIGURING THE SWITCH3-76CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the rule

Strany 30

ACCESS CONTROL LISTS3-77• When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Otherwise, the bind ope

Strany 31 - System Defaults

CONFIGURING THE SWITCH3-78CLI – This examples assigns an IP and MAC ingress ACL to port 1, and an IP ingress ACL to port 2.Filtering Management Access

Strany 32 - Table 1-2. System Defaults

FILTERING MANAGEMENT ACCESS3-79Command Attributes• Web IP Filter – Configures IP address(es) for the web group.• SNMP IP Filter – Configures IP addres

Strany 33

CONFIGURING THE SWITCH3-80Port ConfigurationDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the cur

Strany 34

PORT CONFIGURATION3-81Web – Click Port, Port Information or Trunk Information.Figure 3-36. Port Status InformationField Attributes (CLI)Basic informa

Strany 35

CONTENTSixSMTP Alert Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-65logging sendmail host . . . . . . . . . . . . . . .

Strany 36 - Required Connections

CONFIGURING THE SWITCH3-82• Capabilities – Specifies the capabilities to be advertised for a port during auto-negotiation. (To access this item on the

Strany 37 - ONNECTING

PORT CONFIGURATION3-83CLI – This example shows the connection status for Port 5.Console#show interfaces status ethernet 1/5 3-178Information of Eth 1/

Strany 38 - Basic Configuration

CONFIGURING THE SWITCH3-84Configuring Interface ConnectionsYou can use the Port Configuration or Trunk Configuration page to enable/disable an interfa

Strany 39 - Setting Passwords

PORT CONFIGURATION3-85- Flow control can eliminate frame loss by “blocking” traffic from end stations or segments connected directly to the switch wh

Strany 40 - Setting an IP Address

CONFIGURING THE SWITCH3-86Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click Apply.Figure

Strany 41 - Dynamic Configuration

PORT CONFIGURATION3-87The switch supports both static trunking and dynamic Link Aggregation Control Protocol (LACP). Static trunks have to be manually

Strany 42

CONFIGURING THE SWITCH3-88Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of differe

Strany 43 - Community Strings

PORT CONFIGURATION3-89CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch to f

Strany 44

CONFIGURING THE SWITCH3-90• A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID. • If more than f

Strany 45 - Saving Configuration Settings

PORT CONFIGURATION3-91CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another switc

Strany 46 - Managing System Files

CONTENTSxradius-server retransmit . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-97radius-server timeout . . . . . . . . . . . . . . . .

Strany 47

CONFIGURING THE SWITCH3-92Note: If the port channel admin key (lacp admin key, page 4-194) is not set (through the CLI) when a channel group is formed

Strany 48

PORT CONFIGURATION3-93Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can opti

Strany 49

CONFIGURING THE SWITCH3-94CLI – The following example configures LACP parameters for ports 1-6. Ports 1-4 are used as active members of the LAG; ports

Strany 50

PORT CONFIGURATION3-95Web – Click Port, LACP, Port Counters Information. Select a member port to display the corresponding information.Figure 3-41. D

Strany 51 - AVIGATING

CONFIGURING THE SWITCH3-96CLI – The following example displays LACP counters for port channel 1.Displaying LACP Settings and Status for the Local Side

Strany 52

PORT CONFIGURATION3-97Admin State,Oper StateAdministrative or operational values of the actor’s state parameters:• Expired – The actor’s receive machi

Strany 53 - Table 3-2. Main Menu

CONFIGURING THE SWITCH3-98Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-4

Strany 54

PORT CONFIGURATION3-99Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for the

Strany 55

CONFIGURING THE SWITCH3-100Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information.Figure 3

Strany 56

PORT CONFIGURATION3-101Setting Broadcast Storm ThresholdsBroadcast storms may occur when a device on your network is malfunctioning, or if application

Strany 57

CONTENTSxiMAC ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-135access-list mac . . . . . . . . . . . . .

Strany 58

CONFIGURING THE SWITCH3-102Web – Click Port, Port Broadcast Control. Set the threshold any port, click Apply.Figure 3-44. Enabling Port Broadcast Con

Strany 59

PORT CONFIGURATION3-103Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can then att

Strany 60

CONFIGURING THE SWITCH3-104Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port

Strany 61

PORT CONFIGURATION3-105Command AttributeRate Limit – Sets the output rate limit for an interface. Default Status – DisabledDefault Rate – 1000 MbpsRan

Strany 62

CONFIGURING THE SWITCH3-106Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like M

Strany 63

PORT CONFIGURATION3-107Received Discarded PacketsThe number of inbound packets which were chosen to be discarded even though no errors had been detect

Strany 64

CONFIGURING THE SWITCH3-108Alignment Errors The number of alignment errors (missynchronized data packets). Late Collisions The number of times that a

Strany 65

PORT CONFIGURATION3-109Internal MAC Receive ErrorsA count of frames for which reception on a particular interface fails due to an internal MAC sublaye

Strany 66

CONFIGURING THE SWITCH3-110Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at t

Strany 67 - Manual Configuration

PORT CONFIGURATION3-111Figure 3-48. Displaying Etherlike and RMON Statistics

Strany 68 - Using DHCP/BOOTP

CONTENTSxiiInterface Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-167interface . . . . . . . . . . . . . .

Strany 69

CONFIGURING THE SWITCH3-112CLI – This example shows statistics for port 13.Address Table SettingsSwitches store the addresses for all known devices. T

Strany 70 - Managing Firmware

ADDRESS TABLE SETTINGS3-113Command Attributes• Static Address Counts* – The number of manually configured addresses.• Current Static Address Table – L

Strany 71

CONFIGURING THE SWITCH3-114Displaying the Address TableThe Dynamic Address Table contains the MAC addresses learned by monitoring the source address f

Strany 72

ADDRESS TABLE SETTINGS3-115CLI – This example also displays the address table entries for port 1.Changing the Aging TimeYou can set the aging time for

Strany 73

CONFIGURING THE SWITCH3-116Spanning Tree Algorithm Configuration The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, an

Strany 74 - Resetting the System

SPANNING TREE ALGORITHM CONFIGURATION3-117Once a stable network topology has been established, all bridges listen for Hello BPDUs (Bridge Protocol Dat

Strany 75 - Setting the System Clock

CONFIGURING THE SWITCH3-118Field Attributes• Spanning Tree State – Shows if the switch is enabled to participate in an STA-compliant network.• Bridge

Strany 76

SPANNING TREE ALGORITHM CONFIGURATION3-119• Configuration Changes – The number of times the Spanning Tree has been reconfigured.• Last Topology Change

Strany 77

CONFIGURING THE SWITCH3-120that would make it return to a discarding state; otherwise, temporary data loops might result.• Root Hold Time – The interv

Strany 78

SPANNING TREE ALGORITHM CONFIGURATION3-121CLI – This command displays global STA settings, followed by settings for each port. Note: The current root

Strany 79

CONTENTSxiiiSpanning Tree Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-205spanning-tree . . . . . . . . . . . . . .

Strany 80

CONFIGURING THE SWITCH3-122• Rapid Spanning Tree ProtocolRSTP supports connections to either STP or RSTP nodes by monitoring the incoming protocol mes

Strany 81 - User Authentication

SPANNING TREE ALGORITHM CONFIGURATION3-123• Priority – Bridge priority is used in selecting the root device, root port, and designated port. The devic

Strany 82

CONFIGURING THE SWITCH3-124• Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discarding to learning

Strany 83

SPANNING TREE ALGORITHM CONFIGURATION3-125• Maximum Hop Count – The maximum number of hops allowed in the MST region before a BPDU is discarded. (Rang

Strany 84

CONFIGURING THE SWITCH3-126CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MSTP parameters. D

Strany 85

SPANNING TREE ALGORITHM CONFIGURATION3-127The rules defining port status are:- A port on a network segment with no other STA compliant bridging devic

Strany 86 - Configuring HTTPS

CONFIGURING THE SWITCH3-128• Port Role – Roles are assigned according to whether the port is part of the active topology connecting the bridge to the

Strany 87

SPANNING TREE ALGORITHM CONFIGURATION3-129• Internal path cost – The path cost for the MST. See the proceeding item.• Priority – Defines the priority

Strany 88

CONFIGURING THE SWITCH3-130Web – Click Spanning Tree, STA, Port Information or STA Trunk Information.Figure 3-54. Displaying STA - Port Status Inform

Strany 89 - Configuring the Secure Shell

SPANNING TREE ALGORITHM CONFIGURATION3-131Command AttributesThe following attributes are read-only and cannot be changed:• STA State – Displays curren

Strany 90

CONTENTSxivDisplaying VLAN Information . . . . . . . . . . . . . . . . . . . . . . . . 4-242show vlan . . . . . . . . . . . . . . . . . . . . . . . .

Strany 91 - Generating the Host Key Pair

CONFIGURING THE SWITCH3-132• Path Cost – This parameter is used by the STP to determine the best path between devices. Therefore, lower values should

Strany 92

SPANNING TREE ALGORITHM CONFIGURATION3-133• Migration – If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notifi

Strany 93 - Generate

CONFIGURING THE SWITCH3-134By default all VLANs are assigned to the Internal Spanning Tree (MST Instance 0) that connects all bridges and LANs within

Strany 94 - Configuring the SSH Server

SPANNING TREE ALGORITHM CONFIGURATION3-135• VLAN ID – VLAN to assign to this selected MST instance. (Range: 1-4094)The other global attributes are des

Strany 95

CONFIGURING THE SWITCH3-136CLI – This displays STA settings for instance 1, followed by settings for each port. Console#show spanning-tree mst 2 3-228

Strany 96 - Configuring Port Security

SPANNING TREE ALGORITHM CONFIGURATION3-137CLI – This example sets the priority for MSTI 1, and adds VLANs 1-5 to this MSTI.Displaying Interface Settin

Strany 97

CONFIGURING THE SWITCH3-138CLI – This displays STA settings for instance 0, followed by settings for each port. The settings for instance 0 are global

Strany 98

SPANNING TREE ALGORITHM CONFIGURATION3-139Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance usin

Strany 99

CONFIGURING THE SWITCH3-140• MST Path Cost – This parameter is used by the MSTP to determine the best path between devices. Therefore, lower values sh

Strany 100 - ONFIGURING

VLAN CONFIGURATION3-141CLI – This example sets the MSTP attributes for port 4. VLAN ConfigurationOverviewIn large networks, routers are used to isolat

Strany 101 - Command Attributes

CONTENTSxvMulticast Filtering Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-272IGMP Snooping Commands . . . . . . . . . .

Strany 102

CONFIGURING THE SWITCH3-142This switch supports the following VLAN features:• Up to 255 VLANs based on the IEEE 802.1Q standard• Distributed VLAN lear

Strany 103

VLAN CONFIGURATION3-143VLAN Classification – When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, t

Strany 104

CONFIGURING THE SWITCH3-144Automatic VLAN Registration – GVRP (GARP VLAN Registration Protocol) defines a system whereby the switch can automatically

Strany 105 - UTHENTICATION

VLAN CONFIGURATION3-145Forwarding Tagged/Untagged FramesIf you want to create a small port-based VLAN for devices attached directly to a single switch

Strany 106 - Console(config-if)#

CONFIGURING THE SWITCH3-146Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange V

Strany 107 - Table 3-4. 802.1x Statistics

VLAN CONFIGURATION3-147Web – Click VLAN, 802.1Q VLAN, Basic Information.Figure 3-60. Displaying Basic VLAN InformationCLI – Enter the following comma

Strany 108 - Access Control Lists

CONFIGURING THE SWITCH3-148Web – Click VLAN, 802.1Q VLAN, Current Table. Select any ID from the scroll-down list.Figure 3-61. Displaying VLAN Informa

Strany 109 - Setting the ACL Name and Type

VLAN CONFIGURATION3-149CLI – Current VLAN information can be displayed with the following command.Creating VLANsUse the VLAN Static List to create or

Strany 110

CONFIGURING THE SWITCH3-150• Remove – Removes a VLAN group from the current list. If any port is assigned to this group as untagged, it will be reassi

Strany 111 - Configuring a Standard IP ACL

VLAN CONFIGURATION3-151Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port members for the selected VLAN index. Ass

Strany 113

xviTABLESTable 1-1. Key Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1Table 1-2. System Defaults . . . . . .

Strany 114

CONFIGURING THE SWITCH3-152• Membership Type – Select VLAN membership for each interface by marking the appropriate radio button for a port or trunk:

Strany 115 - Console(config-std-acl)#

VLAN CONFIGURATION3-153CLI – The following example adds tagged and untagged ports to VLAN 2.Adding Static Members to VLANs (Port Index)Use the VLAN St

Strany 116

CONFIGURING THE SWITCH3-154Figure 3-64. Assigning VLAN Port and Trunk GroupsCLI – This example adds Port 3 to VLAN 1 as a tagged port, and removes Po

Strany 117 - Console(config-mac-acl)#

VLAN CONFIGURATION3-155Command Attributes• PVID – VLAN ID assigned to untagged frames received on the interface. (Default: 1)If an interface is not a

Strany 118 - Configuring ACL Masks

CONFIGURING THE SWITCH3-156• GARP Join Timer* – The interval between transmitting requests/queries to participate in a VLAN group. (Range: 20-1000 cen

Strany 119 - Configuring an IP ACL Mask

VLAN CONFIGURATION3-157Web – Click VLAN, 802.1Q VLAN, Port Configuration or VLAN Trunk Configuration. Fill in the required settings for each interface

Strany 120

CONFIGURING THE SWITCH3-158Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN. Da

Strany 121

VLAN CONFIGURATION3-159Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports desi

Strany 122 - Configuring a MAC ACL Mask

CONFIGURING THE SWITCH3-160To avoid these problems, you can configure this switch with protocol-based VLANs that divide the physical network into logi

Strany 123

VLAN CONFIGURATION3-161Web – Click VLAN, Protocol VLAN, Configuration. Enter a protocol group ID, frame type and protocol type, then click Apply. Fi

Strany 124

TABLESxviiTable 4-22. RADIUS Client Commands . . . . . . . . . . . . . . . . . . . . . . . . 4-95Table 4-23. TACACS+ Client Commands . . . . . . . .

Strany 125

CONFIGURING THE SWITCH3-162• When a frame enters a port that has been assigned to a protocol VLAN, it is processed in the following manner:- If the f

Strany 126 - Filtering Management Access

CLASS OF SERVICE CONFIGURATION3-163CLI – The following maps the traffic entering Port 1 which matches the protocol type specified in protocol group 1

Strany 127

CONFIGURING THE SWITCH3-164Command Attributes• Default Priority* – The priority that is assigned to untagged frames received on the specified interfac

Strany 128 - Port Configuration

CLASS OF SERVICE CONFIGURATION3-165Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using ei

Strany 129 - Configuration:

CONFIGURING THE SWITCH3-166Web – Click Priority, Traffic Classes. Mark an interface and click Select to display the current mapping of CoS values to o

Strany 130 - Current status:

CLASS OF SERVICE CONFIGURATION3-167Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traff

Strany 131 - ONFIGURATION

CONFIGURING THE SWITCH3-168Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determine the fr

Strany 132

CLASS OF SERVICE CONFIGURATION3-169CLI – The following example shows how to assign WRR weights to each of the priority queues.Mapping Layer 3/4 Priori

Strany 133

CONFIGURING THE SWITCH3-170Selecting IP Precedence/DSCP PriorityThe switch allows you to choose between using IP Precedence or DSCP priority. Select o

Strany 134 - Creating Trunk Groups

CLASS OF SERVICE CONFIGURATION3-171Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eig

Strany 135

xviiiFIGURESFigure 3-1. Homepage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-3Figure 3-2. Panel Display . . . . . .

Strany 136

CONFIGURING THE SWITCH3-172Web – Click Priority, IP Precedence Priority. Select an entry from the IP Precedence Priority Table, enter a value in the C

Strany 137

CLASS OF SERVICE CONFIGURATION3-173Mapping DSCP PriorityThe DSCP is six bits wide, allowing coding for up to 64 different forwarding behaviors. The DS

Strany 138

CONFIGURING THE SWITCH3-174Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Value fi

Strany 139 - Configuring LACP Parameters

CLASS OF SERVICE CONFIGURATION3-175Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port numbe

Strany 140

CONFIGURING THE SWITCH3-176Click Priority, IP Port Priority. Select a port or trunk from the Interface field. Enter the port number for a network appl

Strany 141

CLASS OF SERVICE CONFIGURATION3-177Mapping CoS Values to ACLsUse the ACL CoS Mapping page to set the output queue for packets matching an ACL rule as

Strany 142 - Counter Information

CONFIGURING THE SWITCH3-178Web – Click Priority, ACL CoS Priority. Enable mapping for any port, select an ACL from the scroll-down list, then click Ap

Strany 143

CLASS OF SERVICE CONFIGURATION3-179Command Usage• You must configure an ACL mask before you can change priorities based on a rule.• Traffic priorities

Strany 144 - Table 3-6. LACP Settings

CONFIGURING THE SWITCH3-180Web – Click Priority, ACL Marker. Select a port and an ACL rule. To specify a ToS priority, mark the Precedence/DSCP check

Strany 145

MULTICAST FILTERING3-181Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A mul

Strany 146

FIGURESxixFigure 3-37. Configuring Port Attributes . . . . . . . . . . . . . . . . . . . . . . 3-86Figure 3-38. Static Trunk Configuration . . . . .

Strany 147

CONFIGURING THE SWITCH3-182Layer 2 IGMP (Snooping and Query)IGMP Snooping and Query — If multicast routing is not supported on other switches in your

Strany 148

MULTICAST FILTERING3-183• IGMP Querier — A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast tra

Strany 149

CONFIGURING THE SWITCH3-184• IGMP Version — Sets the protocol version for compatibility with other devices on the network. (Range: 1-2; Default: 2)Not

Strany 150

MULTICAST FILTERING3-185Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch use information

Strany 151 - Configuring Port Mirroring

CONFIGURING THE SWITCH3-186CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router.Specifying St

Strany 152 - Configuring Rate Limits

MULTICAST FILTERING3-187CLI – This example configures port 11 as a multicast router port within VLAN 1.Displaying Port Members of Multicast Services Y

Strany 153 - Command Attribute

CONFIGURING THE SWITCH3-188Web – Click IGMP Snooping, IP Multicast Registration Table. Select a VLAN ID and the IP address for a multicast service fro

Strany 154 - Showing Port Statistics

MULTICAST FILTERING3-189Command Usage• Static multicast addresses are never aged out.• When a multicast address is assigned to an interface in a speci

Strany 155 - Table 3-8. Port Statistics

CONFIGURING THE SWITCH3-190CLI – This example assigns a multicast address to VLAN 1, and then displays all the known multicast services supported on V

Strany 156

CONFIGURING DOMAIN NAME SERVICE3-191• When an incomplete host name is received by the DNS server on this switch and a domain name list has been specif

Strany 157

FIGURESxxFigure 3-74. Setting IP Precedence/DSCP Priority Status . . . . . . . 3-170Figure 3-75. Mapping IP Precedence to Class of Service Values .

Strany 158

CONFIGURING THE SWITCH3-192Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more name serv

Strany 159

CONFIGURING DOMAIN NAME SERVICE3-193CLI - This example sets a default domain name and a domain list. However, remember that if a domain list is specif

Strany 160 - Address Table Settings

CONFIGURING THE SWITCH3-194Field Attributes• Host Name – Name of a host device that is mapped to one or more IP addresses. (Range: 1-64 characters) •

Strany 161

CONFIGURING DOMAIN NAME SERVICE3-195Displaying the DNS CacheYou can display entries in the DNS cache that have been learned via the designated name se

Strany 162 - Displaying the Address Table

CONFIGURING THE SWITCH3-196Web – Select DNS, Cache.Figure 3-87. Displaying the DNS CacheCLI - This example displays all the resource records learned

Strany 163 - Changing the Aging Time

4-1CHAPTER 4COMMAND LINE INTERFACEThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the CLI

Strany 164

COMMAND LINE INTERFACE4-23. When finished, exit the session with the “quit” or “exit” command.After connecting to the system through the console port,

Strany 165 - LGORITHM

USING THE COMMAND LINE INTERFACE4-3After you configure the switch with an IP address, you can open a Telnet session by performing these steps:1. From

Strany 166 - Field Attributes

COMMAND LINE INTERFACE4-4Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords

Strany 167

ENTERING COMMANDS4-5Command CompletionIf you terminate input with a Tab key, the CLI will print the remaining characters of a partial keyword up to th

Strany 168

1-1CHAPTER 1INTRODUCTIONThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to config

Strany 169

COMMAND LINE INTERFACE4-6Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the current

Strany 170

ENTERING COMMANDS4-7The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword wi

Strany 171

COMMAND LINE INTERFACE4-8Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display in

Strany 172

ENTERING COMMANDS4-9You can also enter Privileged Exec mode from within Normal Exec mode, by entering the enable command, followed by the privileged l

Strany 173

COMMAND LINE INTERFACE4-10• Interface Configuration - These commands modify the port configuration such as speed-duplex and negotiation. • Line Config

Strany 174 - Displaying Interface Settings

ENTERING COMMANDS4-11For example, you can use the following commands to enter interface configuration mode, and then return to Privileged Exec mode. C

Strany 175

COMMAND LINE INTERFACE4-12Command GroupsThe system commands can be broken down into the functional groups shown below.Ctrl-R Repeats current command l

Strany 176

COMMAND GROUPS4-13SNMP Activates authentication failure traps; configures community access strings, and trap managers; also configures IP address fil

Strany 177

COMMAND LINE INTERFACE4-14The access mode shown in the following tables is indicated by these abbreviations: NE (Normal Exec) IC (Interface Configura

Strany 178

LINE COMMANDS4-15lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Syntax line {con

Strany 179

INTRODUCTION1-2Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates th

Strany 180

COMMAND LINE INTERFACE4-16Related Commandsshow line (4-25)show users (4-83)loginThis command enables password checking at login. Use the no form to di

Strany 181

LINE COMMANDS4-17• This command controls login authentication via the switch itself. To configure user names and passwords for remote authentication s

Strany 182

COMMAND LINE INTERFACE4-18• The encrypted password is required for compatibility with legacy password settings (i.e., plain text or encrypted) when re

Strany 183

LINE COMMANDS4-19Example To set the timeout to two minutes, enter this command:password-threshThis command sets the password intrusion threshold which

Strany 184

COMMAND LINE INTERFACE4-20Related Commandssilent-time (4-20)silent-timeThis command sets the amount of time the management console is inaccessible aft

Strany 185

LINE COMMANDS4-21databitsThis command sets the number of data bits per character that are interpreted and generated by the console port. Use the no fo

Strany 186

COMMAND LINE INTERFACE4-22parityThis command defines the generation of a parity bit. Use the no form to restore the default setting.Syntax parity {non

Strany 187

LINE COMMANDS4-23speedThis command sets the terminal line’s baud rate. This command sets both the transmit (to terminal) and receive (from terminal) s

Strany 188

COMMAND LINE INTERFACE4-24stopbitsThis command sets the number of the stop bits transmitted per byte. Use the no form to restore the default setting.S

Strany 189 - VLAN Configuration

LINE COMMANDS4-25Example Related Commandsshow ssh (4-55)show users (4-83)show lineThis command displays the terminal line’s parameters.Syntax show lin

Strany 190 - Assigning Ports to VLANs

DESCRIPTION OF SOFTWARE FEATURES1-3Authentication – This switch authenticates management access via the console port, Telnet or web browser. User name

Strany 191 - VU: VLAN Unaware

COMMAND LINE INTERFACE4-26General CommandsenableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, an

Strany 192

GENERAL COMMANDS4-27Command ModeNormal ExecCommand Usage • “super” is the default password required to change the command mode from Normal Exec to Pri

Strany 193

COMMAND LINE INTERFACE4-28Example Related Commands enable (4-26)configureThis command activates Global Configuration mode. You must enter this mode to

Strany 194

GENERAL COMMANDS4-29Command Mode Normal Exec, Privileged ExecCommand Usage The history buffer size is fixed at 10 Execution commands and 10 Configurat

Strany 195 - Displaying Current VLANs

COMMAND LINE INTERFACE4-30Default Setting NoneCommand Mode Privileged ExecCommand Usage This command resets the entire system.Example This example sho

Strany 196 - Command Attributes (CLI)

GENERAL COMMANDS4-31exitThis command returns to the previous configuration mode or exit the configuration program.Default Setting NoneCommand Mode Any

Strany 197 - Creating VLANs

COMMAND LINE INTERFACE4-32This example shows how to quit a CLI session:System Management CommandsThese commands are used to control system logs, passw

Strany 198

SYSTEM MANAGEMENT COMMANDS4-33Device Designation CommandspromptThis command customizes the CLI prompt. Use the no form to restore the default prompt.S

Strany 199

COMMAND LINE INTERFACE4-34hostnameThis command specifies or modifies the host name for this device. Use the no form to restore the default host name.S

Strany 200

SYSTEM MANAGEMENT COMMANDS4-35usernameThis command adds named users, requires authentication at login, specifies or changes a user's password (or

Strany 201

INTRODUCTION1-4Port Mirroring – The switch can unobtrusively mirror traffic from any port to a monitor port. You can then attach a protocol analyzer o

Strany 202

COMMAND LINE INTERFACE4-36Command Usage The encrypted password is required for compatibility with legacy password settings (i.e., plain text or encryp

Strany 203

SYSTEM MANAGEMENT COMMANDS4-37Command Usage • You cannot set a null password. You will have to enter a password to change the command mode from Normal

Strany 204

COMMAND LINE INTERFACE4-38managementThis command specifies the client IP addresses that are allowed management access to the switch through various pr

Strany 205

SYSTEM MANAGEMENT COMMANDS4-39• You cannot delete an individual address from a specified range. You must delete the entire range, and reenter the addr

Strany 206 - Configuring Private VLANs

COMMAND LINE INTERFACE4-40ExampleWeb Server CommandsConsole#show management all-clientManagement Ip Filter Http-Client: Start ip address End ip

Strany 207

SYSTEM MANAGEMENT COMMANDS4-41ip http portThis command specifies the TCP port number used by the Web browser interface. Use the no form to use the def

Strany 208 - Configuring Protocol Groups

COMMAND LINE INTERFACE4-42ExampleRelated Commandsip http port (4-41)copy tftp https-certificate (4-86)ip http secure-serverThis command enables the se

Strany 209 - Mapping Protocols to VLANs

SYSTEM MANAGEMENT COMMANDS4-43• When you start HTTPS, the connection is established in this way:- The client authenticates the server using the server

Strany 210

COMMAND LINE INTERFACE4-44ip http secure-portThis command specifies the UDP port number used for HTTPS/SSL connection to the switch’s Web interface. U

Strany 211

SYSTEM MANAGEMENT COMMANDS4-45Secure Shell CommandsThe Berkley-standard includes remote access tools originally designed for Unix systems. Some of the

Strany 212

DESCRIPTION OF SOFTWARE FEATURES1-5To avoid dropping frames on congested ports, the switch provides 1 MB for frame buffering. This buffer can queue pa

Strany 213

COMMAND LINE INTERFACE4-46The SSH server on this switch supports both password and public key authentication. If password authentication is specified

Strany 214

SYSTEM MANAGEMENT COMMANDS4-472. Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the ini

Strany 215

COMMAND LINE INTERFACE4-489. If a match is found, the switch uses the public key to encrypt a random sequence of bytes, and sends this string to the c

Strany 216

SYSTEM MANAGEMENT COMMANDS4-49Example Related Commandsip ssh crypto host-key generate (4-52)show ssh (4-55)ip ssh timeoutUse this command to configure

Strany 217

COMMAND LINE INTERFACE4-50Related Commandsexec-timeout (4-18)show ip ssh (4-54)ip ssh authentication-retriesUse this command to configure the number o

Strany 218

SYSTEM MANAGEMENT COMMANDS4-51ip ssh server-key sizeUse this command to set the SSH server key size. Use the no form to restore the default setting.Sy

Strany 219

COMMAND LINE INTERFACE4-52Command Mode Privileged ExecExample ip ssh crypto host-key generateUse this command to generate the host key pair (i.e., pub

Strany 220

SYSTEM MANAGEMENT COMMANDS4-53Related Commandsip ssh crypto zeroize (4-53)ip ssh save host-key (4-54)ip ssh crypto zeroizeUse this command to clear th

Strany 221

COMMAND LINE INTERFACE4-54ip ssh save host-keyUse this command to save host key from RAM to flash memory. Syntax ip ssh save host-key [dsa | rsa]• dsa

Strany 222

SYSTEM MANAGEMENT COMMANDS4-55show sshUse this command to display the current SSH server connections.Command Mode Privileged ExecExample Console#show

Strany 223

38 TeslaIrvine, CA 92618Phone: (949) 679-8000TigerSwitch 10/100/1000Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsApril

Strany 224

INTRODUCTION1-6Virtual LANs – The switch supports up to 255 VLANs. A Virtual LAN is a collection of network nodes that share the same collision domain

Strany 225

COMMAND LINE INTERFACE4-56show public-keyUse this command to show the public key for the specified user or for the host.Syntax show public-key [user [

Strany 226

SYSTEM MANAGEMENT COMMANDS4-57Default Setting Shows all public keys.Command Mode Privileged ExecCommand Usage • If no parameters are entered, all keys

Strany 227

COMMAND LINE INTERFACE4-58Event Logging Commands logging onThis command controls logging of error messages, sending debug or error messages to switch

Strany 228

SYSTEM MANAGEMENT COMMANDS4-59Example Related Commandslogging history (4-59)clear logging (4-62)logging historyThis command limits syslog messages sav

Strany 229 - Multicast Filtering

COMMAND LINE INTERFACE4-60Default Setting Flash: errors (level 3 - 0)RAM: warnings (level 7 - 0)Command Mode Global ConfigurationCommand Usage The mes

Strany 230

SYSTEM MANAGEMENT COMMANDS4-61Command Usage • By using this command more than once you can build up a list of host IP addresses.• The maximum number o

Strany 231

COMMAND LINE INTERFACE4-62logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved to a

Strany 232

SYSTEM MANAGEMENT COMMANDS4-63Command Mode Privileged ExecExample Related Commandsshow logging (4-63)show loggingThis command displays the logging con

Strany 233 - ILTERING

COMMAND LINE INTERFACE4-64 The following example displays settings for the trap function.Console#show logging flashSyslog logging: EnableHistory loggi

Strany 234

SYSTEM MANAGEMENT COMMANDS4-65Related Commandsshow logging sendmail (4-69)SMTP Alert CommandsConfigures SMTP event handling, and forwarding of alert m

Strany 235

SYSTEM DEFAULTS1-7System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch

Strany 236

COMMAND LINE INTERFACE4-66logging sendmail hostThis command specifies SMTP servers that will be sent alert messages. Use the no form to remove an SMTP

Strany 237

SYSTEM MANAGEMENT COMMANDS4-67logging sendmail levelThis command sets the severity threshold used to trigger alert messages.Syntaxlogging sendmail lev

Strany 238

COMMAND LINE INTERFACE4-68Default Setting None Command Mode Global ConfigurationCommand Usage You may use an symbolic email address that identifies th

Strany 239

SYSTEM MANAGEMENT COMMANDS4-69Examplelogging sendmailThis command enables SMTP event handling. Use the no form to disable this function.Syntax[no] log

Strany 240 - Figure 3-85. Configuring DNS

COMMAND LINE INTERFACE4-70ExampleTime CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP), or by

Strany 241

SYSTEM MANAGEMENT COMMANDS4-71sntp serverThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command

Strany 242

COMMAND LINE INTERFACE4-72sntp pollThis command sets the interval between sending time requests when the switch is set to SNTP client mode. Use the no

Strany 243

SYSTEM MANAGEMENT COMMANDS4-73Default Setting DisabledCommand Mode Global ConfigurationCommand Usage • The time acquired from time servers is used to

Strany 244 - Web – Select DNS, Cache

COMMAND LINE INTERFACE4-74sntp broadcast clientThis command synchronizes the switch’s clock based on time broadcast from time servers (using the multi

Strany 245 - NTERFACE

SYSTEM MANAGEMENT COMMANDS4-75clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours minu

Strany 246 - Telnet Connection

INTRODUCTION1-8Port ConfigurationAdmin Status EnabledAuto-negotiation EnabledFlow Control DisabledPort Capability 1000BASE-T –(10 Mbps half duplex)(10

Strany 247

COMMAND LINE INTERFACE4-76calendar setThis command sets the system clock. It may be used if there is no time server on your network, or if you have no

Strany 248 - Entering Commands

SYSTEM MANAGEMENT COMMANDS4-77Example System Status Commandsshow startup-configThis command displays the configuration file stored in non-volatile mem

Strany 249 - Getting Help on Commands

COMMAND LINE INTERFACE4-78Command Usage • Use this command in conjunction with the show running-config command to compare the information in running m

Strany 250 - Showing Commands

SYSTEM MANAGEMENT COMMANDS4-79Example Related Commandsshow running-config (4-80)Console#show startup-configbuilding startup-config, please wait...!

Strany 251

COMMAND LINE INTERFACE4-80show running-configThis command displays the configuration information currently in use.Default Setting NoneCommand Mode Pri

Strany 252 - Table 4-1. Command Modes

SYSTEM MANAGEMENT COMMANDS4-81Example Related Commandsshow startup-config (4-77)Console#show running-configbuilding running-config, please wait...!!

Strany 253 - Configuration Commands

COMMAND LINE INTERFACE4-82show systemThis command displays system information.Default Setting NoneCommand Mode Normal Exec, Privileged ExecCommand Usa

Strany 254

SYSTEM MANAGEMENT COMMANDS4-83show usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client.

Strany 255 - Command Line Processing

COMMAND LINE INTERFACE4-84Command Usage See “Displaying Switch Hardware/Software Versions” on page 3-14 for detailed information on the items displaye

Strany 256 - Command Groups

FLASH/FILE COMMANDS4-85Command Usage • This switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames u

Strany 257

SYSTEM DEFAULTS1-9Virtual LANs Default VLAN 1PVID 1Acceptable Frame Type AllIngress Filtering DisabledSwitchport Mode (Egress Mode)Hybrid: tagged/unta

Strany 258 - Line Commands

COMMAND LINE INTERFACE4-86copy This command moves (upload/download) a code image or configuration file between the switch’s flash memory and a TFTP

Strany 259 - Console(config-line)#

FLASH/FILE COMMANDS4-87Command Usage • The system prompts for data required to complete the copy command. • The destination file name should not conta

Strany 260

COMMAND LINE INTERFACE4-88Example The following example shows how to upload the configuration settings to a file on the TFTP server:The following exam

Strany 261

FLASH/FILE COMMANDS4-89This example shows how to copy a secure-site certificate from an TFTP server. It then reboots the switch to activate the certif

Strany 262

COMMAND LINE INTERFACE4-90Command Mode Privileged ExecCommand Usage • If the file type is used for system startup, then this file cannot be deleted. •

Strany 263

FLASH/FILE COMMANDS4-91Command Mode Privileged ExecCommand Usage • If you enter the command dir without any parameters, the system displays all files.

Strany 264

COMMAND LINE INTERFACE4-92ExampleThis example shows the information displayed by the whichboot command. See the table under the dir command for a desc

Strany 265

AUTHENTICATION COMMANDS4-93ExampleRelated Commandsdir (4-90)whichboot (4-91) Authentication Commands You can configure this switch to authenticate use

Strany 266

COMMAND LINE INTERFACE4-94authentication loginThis command defines the login authentication method and precedence. Use the no form to restore the defa

Strany 267

AUTHENTICATION COMMANDS4-95Example Related Commandsusername - for setting the local user names and passwords (4-35)RADIUS ClientRemote Authentication

Strany 268

INTRODUCTION1-10

Strany 269

COMMAND LINE INTERFACE4-96Default Setting 10.1.0.1Command Mode Global ConfigurationExample radius-server portThis command sets the RADIUS server netwo

Strany 270 - General Commands

AUTHENTICATION COMMANDS4-97radius-server keyThis command sets the RADIUS encryption key. Use the no form to restore the default.Syntax radius-server k

Strany 271 - Console#

COMMAND LINE INTERFACE4-98Command Mode Global ConfigurationExample radius-server timeoutThis command sets the interval between transmitting authentica

Strany 272

AUTHENTICATION COMMANDS4-99Example TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that us

Strany 273

COMMAND LINE INTERFACE4-100Command Mode Global ConfigurationExample tacacs-server portThis command specifies the TACACS+ server network port. Use the

Strany 274

AUTHENTICATION COMMANDS4-101tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to restore the default.Syntax tacacs-server

Strany 275 - Username:

COMMAND LINE INTERFACE4-102Port Security CommandsThese commands can be used to disable the learning function or manually specify secure addresses for

Strany 276 - System Management Commands

AUTHENTICATION COMMANDS4-103Default Setting Status: DisabledAction: NoneMaximum Addresses: 0Command Mode Interface Configuration (Ethernet)Command Usa

Strany 277 - Device Designation Commands

COMMAND LINE INTERFACE4-104Example The following example enables port security for port 5, and sets the response to a security violation to issue a tr

Strany 278 - User Access Commands

AUTHENTICATION COMMANDS4-105authentication dot1x defaultThis command sets the default authentication server type. Use the no form to restore the defau

Strany 279 - ANAGEMENT

2-1CHAPTER 2INITIAL CONFIGURATIONConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent offer

Strany 280

COMMAND LINE INTERFACE4-106dot1x defaultThis command sets all configurable dot1x global and port settings to their default values.Syntaxdot1x defaultC

Strany 281 - IP Filter Commands

AUTHENTICATION COMMANDS4-107dot1x port-controlThis command sets the dot1x mode on a port interface. Use the no form to restore the default.Syntaxdot1x

Strany 282

COMMAND LINE INTERFACE4-108dot1x operation-modeThis command allows single or multiple hosts (clients) to connect to an 802.1X-authorized port. Use the

Strany 283

AUTHENTICATION COMMANDS4-109Command ModePrivileged ExecExampledot1x re-authenticationThis command enables periodic re-authentication globally for all

Strany 284 - Web Server Commands

COMMAND LINE INTERFACE4-110Command ModeGlobal ConfigurationExampledot1x timeout re-authperiodThis command sets the time period after which a connected

Strany 285

AUTHENTICATION COMMANDS4-111Default30 secondsCommand ModeGlobal ConfigurationExampleshow dot1xThis command shows general port authentication related s

Strany 286

COMMAND LINE INTERFACE4-112• 802.1X Port Summary – Displays the port access control parameters for each interface, including the following items:- Sta

Strany 287

AUTHENTICATION COMMANDS4-113ExampleConsole#show dot1xGlobal 802.1X Parameters reauth-enabled: yes reauth-period: 300 quiet-period: 350 tx-period:

Strany 288

COMMAND LINE INTERFACE4-114Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol,

Strany 289 - Secure Shell Commands

ACCESS CONTROL LIST COMMANDS4-115The following restrictions apply to ACLs:• This switch supports ACLs for both ingress and egress filtering. However,

Strany 290

INITIAL CONFIGURATION2-2The switch’s Web interface, CLI configuration program, and SNMP agent allow you to perform the following management functions:

Strany 291

COMMAND LINE INTERFACE4-1166. Explicit default rule (permit any any) in the ingress MAC ACL for ingress ports.7. If no explicit rule is matched, the i

Strany 292

ACCESS CONTROL LIST COMMANDS4-117permit, deny Filters packets meeting the specified criteria, including source and destination IP address, TCP/UDP por

Strany 293

COMMAND LINE INTERFACE4-118access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the

Strany 294

ACCESS CONTROL LIST COMMANDS4-119Related Commandspermit, deny 4-119ip access-group (4-129)show ip access-list (4-123)permit, deny (Standard ACL) This

Strany 295

COMMAND LINE INTERFACE4-120Example This example configures one permit rule for the specific address 10.1.1.21 and another rule for the address range 1

Strany 296

ACCESS CONTROL LIST COMMANDS4-121• address-bitmask – Decimal number representing the address bits to match.• host – Keyword followed by a specific IP

Strany 297

COMMAND LINE INTERFACE4-122• The control-code bitmask is a decimal number (representing an equivalent bit mask) that is applied to the control code. E

Strany 298

ACCESS CONTROL LIST COMMANDS4-123Related Commandsaccess-list ip (4-118)show ip access-list This command displays the rules for configured IP ACLs.Synt

Strany 299 - Console#show ssh

COMMAND LINE INTERFACE4-124Default SettingDefault system mask: Filter inbound packets according to specified IP ACLs.Command ModeGlobal ConfigurationC

Strany 300 - Table 4-13. SSH Information

ACCESS CONTROL LIST COMMANDS4-125mask (IP ACL)This command defines a mask for IP ACLs. This mask defines the fields to check in the IP header. Use the

Strany 301

CONNECTING TO THE SWITCH2-3To connect a terminal to the console port, complete the following steps: 1. Connect the console cable to the serial port on

Strany 302 - Event Logging Commands

COMMAND LINE INTERFACE4-126Command Usage• Packets crossing a port are checked against all the rules in the ACL until a match is found. The order in wh

Strany 303

ACCESS CONTROL LIST COMMANDS4-127This shows how to create a standard ACL with an ingress mask to deny access to the IP host 171.69.198.102, and permit

Strany 304 - Name Level Description

COMMAND LINE INTERFACE4-128This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other packets.

Strany 305

ACCESS CONTROL LIST COMMANDS4-129Command ModePrivileged ExecExample Related Commandsmask (IP ACL) (4-125)ip access-group This command binds a port to

Strany 306

COMMAND LINE INTERFACE4-130Example Related Commandsshow ip access-list (4-123)show ip access-groupThis command shows the ports assigned to IP ACLs.Com

Strany 307

ACCESS CONTROL LIST COMMANDS4-131Default SettingNoneCommand ModeInterface Configuration (Ethernet)Command Usage• You must configure an ACL mask before

Strany 308

COMMAND LINE INTERFACE4-132show map access-list ip This command shows the CoS value mapped to an IP ACL for the current interface. (The CoS value dete

Strany 309 - SMTP Alert Commands

ACCESS CONTROL LIST COMMANDS4-133match access-list ip This command changes the IEEE 802.1p priority, IP Precedence, or DSCP Priority of a frame matchi

Strany 310

COMMAND LINE INTERFACE4-134Example Related Commands show marking (4-134)show marking This command displays the current configuration for packet markin

Strany 311

ACCESS CONTROL LIST COMMANDS4-135MAC ACLs Table 4-28. MAC ACL CommandsCommand Function Mode Pageaccess-list mac Creates a MAC ACL and enters configur

Strany 312

INITIAL CONFIGURATION2-4Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a v

Strany 313

COMMAND LINE INTERFACE4-136access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove the sp

Strany 314 - Time Commands

ACCESS CONTROL LIST COMMANDS4-137permit, deny (MAC ACL)This command adds a rule to a MAC ACL. The rule filters packets matching a specified MAC source

Strany 315

COMMAND LINE INTERFACE4-138•vid-bitmask* – VLAN bitmask. (Range: 1-4095)• protocol – A specific Ethernet protocol number. (Range: 600-fff hex.)• proto

Strany 316

ACCESS CONTROL LIST COMMANDS4-139show mac access-list This command displays the rules for configured MAC ACLs.Syntaxshow mac access-list [acl_name]acl

Strany 317

COMMAND LINE INTERFACE4-140Command Usage• You must configure a mask for an ACL rule before you can bind it to a port or set the queue or frame priorit

Strany 318

ACCESS CONTROL LIST COMMANDS4-141• vid-bitmask – VLAN ID of rule must match this bitmask.• ethertype – Check the Ethernet type field.• ethertype-bitma

Strany 319

COMMAND LINE INTERFACE4-142ExampleThis example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that the order of the ru

Strany 320

ACCESS CONTROL LIST COMMANDS4-143This example creates an Egress MAC ACL.show access-list mac mask-precedence This command shows the ingress or egress

Strany 321 - System Status Commands

COMMAND LINE INTERFACE4-144Related Commandsmask (MAC ACL) (4-140)mac access-groupThis command binds a port to a MAC ACL. Use the no form to remove the

Strany 322

ACCESS CONTROL LIST COMMANDS4-145show mac access-groupThis command shows the ports assigned to MAC ACLs.Command ModePrivileged ExecExample Related Com

Strany 323 - Related Commands

BASIC CONFIGURATION2-5Access to both CLI levels are controlled by user names and passwords. The switch has a default user name and password for each l

Strany 324

COMMAND LINE INTERFACE4-146Command Usage• You must configure an ACL mask before you can map CoS values to the rule.• A packet matching a rule within t

Strany 325

ACCESS CONTROL LIST COMMANDS4-147Example Related Commandsmap access-list mac (4-145)match access-list mac This command changes the IEEE 802.1p priorit

Strany 326

COMMAND LINE INTERFACE4-148Related Commands show marking (4-134)ACL Informationshow access-listThis command shows all ACLs and associated rules, as we

Strany 327

SNMP COMMANDS4-149show access-groupThis command shows the port assignments of ACLs.Command ModePrivileged ExecutiveExample SNMP CommandsControl access

Strany 328 - Frame Size Commands

COMMAND LINE INTERFACE4-150snmp communityThis command defines the community access string for the Simple Network Management Protocol. Use the no form

Strany 329 - Flash/File Commands

SNMP COMMANDS4-151snmp contactThis command sets the system contact string. Use the no form to remove the system contact information.Syntax snmp contac

Strany 330

COMMAND LINE INTERFACE4-152Command Mode Global ConfigurationExample Related Commandssnmp contact (4-151)snmp host This command specifies the recipient

Strany 331

SNMP COMMANDS4-153Command Usage • If you do not enter an snmp host command, no notifications are sent. In order to configure the switch to send SNMP n

Strany 332

COMMAND LINE INTERFACE4-154snmp enable trapsThis command enables this device to send Simple Network Management Protocol traps (SNMP notifications). Us

Strany 333

SNMP COMMANDS4-155Related Commandssnmp host (4-152)show snmpThis command checks the status of SNMP communications.Default Setting NoneCommand Mode Nor

Strany 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Strany 335

INITIAL CONFIGURATION2-6Type “username admin password 0 password,” for the Privileged Exec level, where password is your new password. Press <Enter

Strany 336

COMMAND LINE INTERFACE4-156ExampleConsole#show snmpSystem Contact: PaulSystem Location: WC-19SNMP traps: Authentication: enable Link-up-down: enable

Strany 337 - Authentication Commands

DNS COMMANDS4-157DNS CommandsThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entries in the DNS d

Strany 338

COMMAND LINE INTERFACE4-158ip hostThis command creates a static entry in the DNS table that maps a host name to an IP address. Use the no form to remo

Strany 339 - RADIUS Client

DNS COMMANDS4-159clear hostThis command deletes entries from the DNS table.Syntaxclear host {name | *}• name - Name of the host. (Range: 1-64 characte

Strany 340

COMMAND LINE INTERFACE4-160Command Mode Global ConfigurationExampleRelated Commands ip domain-list (4-160)ip name-server (4-162)ip domain-lookup (4-16

Strany 341

DNS COMMANDS4-161Command Usage • Domain names are added to the end of the list one at a time. • When an incomplete host name is received by the DNS se

Strany 342

COMMAND LINE INTERFACE4-162ip name-serverThis command specifies the address of one or more domain name servers to use for name-to-address resolution.

Strany 343 - TACACS+ Client

DNS COMMANDS4-163Related Commands ip domain-name (4-159)ip domain-lookup (4-163)ip domain-lookupThis command enables DNS host name-to-address translat

Strany 344

COMMAND LINE INTERFACE4-164Related Commands ip domain-name (4-159)ip name-server (4-162)show hostsThis command displays the static host name-to-addres

Strany 345

DNS COMMANDS4-165show dnsThis command displays the configuration of the DNS server.Command Mode Privileged ExecExampleshow dns cacheThis command displ

Strany 346 - Port Security Commands

BASIC CONFIGURATION2-7Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:• I

Strany 347

COMMAND LINE INTERFACE4-166clear dns cacheThis command clears all entries in the DNS cache.Command Mode Privileged ExecExampleField DescriptionNO The

Strany 349

COMMAND LINE INTERFACE4-167Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link,

Strany 350

INTERFACE COMMANDS4-168interfaceThis command configures an interface type and enter interface configuration mode. Use the no form to remove a trunk.Sy

Strany 351

COMMAND LINE INTERFACE4-169Default Setting NoneCommand Mode Interface Configuration (Ethernet, Port Channel)Example The following example adds a descr

Strany 352

INTERFACE COMMANDS4-170Command Usage• To force operation to the speed and duplex mode specified in a speed-duplex command, use the no negotiation comm

Strany 353

COMMAND LINE INTERFACE4-171Command Usage • When auto-negotiation is enabled the switch will negotiate the best settings for a link based on the capabi

Strany 354

INTERFACE COMMANDS4-172capabilitiesThis command advertises the port capabilities of a given interface during autonegotiation. Use the no form with par

Strany 355

COMMAND LINE INTERFACE4-173Example The following example configures Ethernet port 5 capabilities to 100half, 100full and flow control.Related Commands

Strany 356

INTERFACE COMMANDS4-174• When using the negotiation command to enable auto-negotiation, the optimal settings will be determined by the capabilities co

Strany 357

INITIAL CONFIGURATION2-8If the “bootp” or “dhcp” option is saved to the startup-config file (step 6), then the switch will start broadcasting service

Strany 358 - Access Control List Commands

COMMAND LINE INTERFACE4-175Default Setting sfp-preferred-autoCommand Mode Interface Configuration (Ethernet)ExampleThis forces the switch to use the b

Strany 359

INTERFACE COMMANDS4-176switchport broadcast packet-rateThis command configures broadcast storm control. Use the no form to disable broadcast storm con

Strany 360 - IP ACLs

COMMAND LINE INTERFACE4-177clear countersThis command clears statistics on an interface.Syntax clear counters interfaceinterface • ethernet unit/port-

Strany 361 - Table 4-27. IP ACL Commands

INTERFACE COMMANDS4-178show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]• interface -

Strany 362

COMMAND LINE INTERFACE4-179Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]• in

Strany 363

INTERFACE COMMANDS4-180Command Mode Normal Exec, Privileged ExecCommand Usage If no interface is specified, information on all interfaces is displayed

Strany 364

COMMAND LINE INTERFACE4-181show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Synta

Strany 365

INTERFACE COMMANDS4-182Field DescriptionBroadcast threshold Shows if broadcast storm suppression is enabled or disabled; if enabled it also shows the

Strany 366 - Console(config-ext-acl)#

COMMAND LINE INTERFACE4-183Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port.port monitorThis comma

Strany 367 - permit host 10.1.1.21

MIRROR PORT COMMANDS4-184Command Usage • You can mirror traffic from any source port to a destination port for real-time analysis. You can then attach

Strany 368

BASIC CONFIGURATION2-96. Then save your configuration changes by typing “copy running-config startup-config.” Enter the startup file name and press &l

Strany 369

COMMAND LINE INTERFACE4-185Command Usage This command displays the currently configured source port, destination port, and mirror mode (i.e., RX, TX,

Strany 370

RATE LIMIT COMMANDS4-186rate-limitThis command defines the rate limit for a specific interface. Use this command without specifying a rate to restore

Strany 371

COMMAND LINE INTERFACE4-187Link Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of

Strany 372

LINK AGGREGATION COMMANDS4-188Guidelines for Creating TrunksGeneral Guidelines• Finish configuring port trunks before you connect the corresponding ne

Strany 373 - mask 255.255.255.0 any

COMMAND LINE INTERFACE4-189channel-group This command adds a port to a trunk. Use the no form to remove a port from a trunk.Syntax channel-group chann

Strany 374

LINK AGGREGATION COMMANDS4-190lacpThis command enables 802.3ad Link Aggregation Control Protocol (LACP) for the current interface. Use the no form to

Strany 375 - Queue12034567

COMMAND LINE INTERFACE4-191ExampleThe following shows LACP enabled on ports 11-13. Because LACP has also been enabled on the ports at the other end of

Strany 376

LINK AGGREGATION COMMANDS4-192lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default s

Strany 377

COMMAND LINE INTERFACE4-193lacp admin-key (Ethernet Interface)This command configures a port's LACP administration key. Use the no form to restor

Strany 378

LINK AGGREGATION COMMANDS4-194Examplelacp admin-key (Port Channel)This command configures a port channel's LACP administration key string. Use th

Strany 379 - Table 4-28. MAC ACL Commands

INITIAL CONFIGURATION2-10The default strings are:• public - with read-only access. Authorized management stations are only able to retrieve MIB object

Strany 380

COMMAND LINE INTERFACE4-195Examplelacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax

Strany 381

LINK AGGREGATION COMMANDS4-196Example show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors

Strany 382

COMMAND LINE INTERFACE4-197Field DescriptionLACPDUs Sent Number of valid LACPDUs transmitted from this channel group.LACPDUs Received Number of valid

Strany 383 - MAC access-list jerry:

LINK AGGREGATION COMMANDS4-198LACPDUs InternalNumber of seconds before invalidating received LACPDU information.LACP System PriorityLACP system priori

Strany 384

COMMAND LINE INTERFACE4-199Console#show lacp 1 neighborsChannel group 1 neighbors-------------------------------------------------------------------Et

Strany 385

ADDRESS TABLE COMMANDS4-200Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Strany 386

COMMAND LINE INTERFACE4-201mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remove an ad

Strany 387

ADDRESS TABLE COMMANDS4-202Example clear mac-address-table dynamicThis command removes any learned entries from the forwarding database and clears the

Strany 388

COMMAND LINE INTERFACE4-203Default Setting NoneCommand Mode Privileged ExecCommand Usage • The MAC Address Table contains the MAC addresses associated

Strany 389 - MAC access-list M5 out

ADDRESS TABLE COMMANDS4-204Default Setting 300 secondsCommand Mode Global ConfigurationCommand Usage The aging time is used to age out dynamically lea

Strany 390

BASIC CONFIGURATION2-11Trap ReceiversYou can also specify SNMP stations that are to receive traps from the switch.To configure a trap receiver, comple

Strany 391

COMMAND LINE INTERFACE4-205Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the swit

Strany 392 - ACL Information

SPANNING TREE COMMANDS4-206spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Syntax

Strany 393 - SNMP Commands

COMMAND LINE INTERFACE4-207Command Mode Global ConfigurationCommand Usage The Spanning Tree Algorithm (STA) can be used to detect and disable network

Strany 394

SPANNING TREE COMMANDS4-208Command Usage • Spanning Tree ProtocolUses RSTP for the internal state machine, but sends only 802.1D BPDUs. This creates o

Strany 395 - Console(config)#

COMMAND LINE INTERFACE4-209Example The following example configures the switch to use Rapid Spanning Tree.spanning-tree forward-timeThis command confi

Strany 396

SPANNING TREE COMMANDS4-210spanning-tree hello-timeThis command configures the spanning tree bridge hello time globally for this switch. Use the no fo

Strany 397

COMMAND LINE INTERFACE4-211Command Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) a device can wait without re

Strany 398

SPANNING TREE COMMANDS4-212Command Usage Bridge priority is used in selecting the root device, root port, and designated port. The device with the hig

Strany 399

COMMAND LINE INTERFACE4-213Example spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutiv

Strany 400

SPANNING TREE COMMANDS4-214Command Mode Global ConfigurationExample Related Commands mst vlan (4 -214)mst priority (4 -215)name (4 -216)revision (4 -2

Strany 401 - DNS Commands

INITIAL CONFIGURATION2-12Managing System FilesThe switch’s flash memory supports three types of system files that can be managed by the CLI program, W

Strany 402

COMMAND LINE INTERFACE4-215Command Usage • Use this command to group VLANs into spanning tree instances. MSTP generates a unique spanning tree for eac

Strany 403 - Console(config)#clear host *

SPANNING TREE COMMANDS4-216Default Setting 32768Command Mode MST ConfigurationCommand Usage • MST priority is used in selecting the root bridge and al

Strany 404

COMMAND LINE INTERFACE4-217Command Usage The MST region name and revision number (page 4-217) are used to designate a unique MST region. A bridge (i.e

Strany 405

SPANNING TREE COMMANDS4-218Example Related Commandsname (4 -216)max-hopsThis command configures the maximum number of hops in the region before a BPDU

Strany 406

COMMAND LINE INTERFACE4-219spanning-tree spanning-disabledThis command disables the spanning tree algorithm for the specified interface. Use the no fo

Strany 407

SPANNING TREE COMMANDS4-220Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000• Fast Ethernet – half duplex: 2

Strany 408

COMMAND LINE INTERFACE4-221Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command defines the priority for the use

Strany 409

SPANNING TREE COMMANDS4-222Command Usage • You can enable this option if an interface is attached to a LAN segment that is at the end of a bridged LAN

Strany 410 - Privileged Exec

COMMAND LINE INTERFACE4-223Command Usage • This command is used to enable/disable the fast spanning-tree mode for the selected port. In this mode, por

Strany 411

SPANNING TREE COMMANDS4-224Default Setting autoCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage • Specify a point-to-point l

Strany 412 - Interface Commands

MANAGING SYSTEM FILES2-13Note that configuration files should be downloaded using a file name that reflects the contents or usage of the file settings

Strany 413

COMMAND LINE INTERFACE4-225Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000• Fast Ethernet – half duplex: 2

Strany 414

SPANNING TREE COMMANDS4-226spanning-tree mst port-priorityThis command configures the interface priority on a spanning instance in the Multiple Spanni

Strany 415

COMMAND LINE INTERFACE4-227spanning-tree protocol-migrationThis command re-checks the appropriate BPDU format to send on the selected interface. Synta

Strany 416

SPANNING TREE COMMANDS4-228show spanning-treeThis command shows the configuration for the common spanning tree (CST) or for an instance within the mul

Strany 417

COMMAND LINE INTERFACE4-229ExampleConsole#show spanning-treeSpanning-tree information---------------------------------------------------------------Sp

Strany 418

SPANNING TREE COMMANDS4-230show spanning-tree mst configurationThis command shows the multiple spanning tree configuration.Syntax show spanning-tree m

Strany 419

COMMAND LINE INTERFACE4-231VLAN CommandsA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong

Strany 420

VLAN COMMANDS4-232vlan databaseThis command enters VLAN database mode. All commands in this mode will take effect immediately.Default Setting NoneComm

Strany 421

COMMAND LINE INTERFACE4-233vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [n

Strany 422

VLAN COMMANDS4-234Example The following example adds a VLAN, using VLAN ID 105 and name RD5. The VLAN is activated by default.Related Commands show vl

Strany 423

INITIAL CONFIGURATION2-14

Strany 424

COMMAND LINE INTERFACE4-235interface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLAN parameters for a

Strany 425

VLAN COMMANDS4-236switchport modeThis command configures the VLAN membership mode for a port. Use the no form to restore the default.Syntax switchport

Strany 426

COMMAND LINE INTERFACE4-237switchport acceptable-frame-types This command configures the acceptable frame types for a port. Use the no form to restore

Strany 427

VLAN COMMANDS4-238switchport ingress-filtering This command enables ingress filtering for an interface. Use the no form to restore the default.Syntax

Strany 428 - Mirror Port Commands

COMMAND LINE INTERFACE4-239switchport native vlanThis command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore the d

Strany 429

VLAN COMMANDS4-240switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Strany 430 - Rate Limit Commands

COMMAND LINE INTERFACE4-241• If a VLAN on the forbidden list for an interface is manually added to that interface, the VLAN is automatically removed f

Strany 431

VLAN COMMANDS4-242Example The following example shows how to prevent port 1 from being added to VLAN 3.Displaying VLAN Informationshow vlanThis comman

Strany 432 - Link Aggregation Commands

COMMAND LINE INTERFACE4-243Example The following example shows how to display information for VLAN 1.Configuring Protocol-based VLANsThe network devic

Strany 433 - GGREGATION

VLAN COMMANDS4-244To configure protocol-based VLANs, follow these steps:1. First configure VLAN groups for the protocols you want to use (page -233).

Strany 434

3-1CHAPTER 3CONFIGURING THE SWITCHUsing the Web InterfaceThis switch provides an embedded HTTP Web agent. Using a Web browser you can configure the sw

Strany 435

COMMAND LINE INTERFACE4-245Example The following creates protocol group 1, and specifies Ethernet frames with IP and ARP protocol types.protocol-vlan

Strany 436

VLAN COMMANDS4-246• When a frame enters a port that has been assigned to a protocol VLAN, it is processed in the following manner:- If the frame is ta

Strany 437

COMMAND LINE INTERFACE4-247Example This shows protocol group 1 configured for IP over Ethernet.show interfaces protocol-vlan protocol-groupThis comman

Strany 438

VLAN COMMANDS4-248Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN. This sectio

Strany 439

COMMAND LINE INTERFACE4-249• Entering the pvlan command without any parameters enables the private VLAN. Entering no pvlan disables the private VLAN.E

Strany 440

GVRP AND BRIDGE EXTENSION COMMANDS4-250GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN i

Strany 441

COMMAND LINE INTERFACE4-251Command Mode Global ConfigurationCommand Usage GVRP defines a way for switches to exchange VLAN information in order to reg

Strany 442

GVRP AND BRIDGE EXTENSION COMMANDS4-252switchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchport gvrpD

Strany 443

COMMAND LINE INTERFACE4-253Example garp timerThis command sets the values for the join, leave and leaveall timers. Use the no form to restore the time

Strany 444

GVRP AND BRIDGE EXTENSION COMMANDS4-254• Timer values are applied to GVRP for all the ports on all VLANs. • Timer values must meet the following restr

Strany 445 - Address Table Commands

iLIMITED WARRANTYLimited Warranty Statement: SMC Networks, Inc. (“SMC”) warrants its products to be free from defects in workmanship and materials, un

Strany 446

CONFIGURING THE SWITCH3-2Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is

Strany 447

COMMAND LINE INTERFACE4-255Example Related Commandsgarp timer (4 -253)Priority CommandsThe commands described in this section allow you to specify whi

Strany 448

PRIORITY COMMANDS4-256Priority Commands (Layer 2)switchport priority defaultThis command sets a priority for incoming untagged frames. Use the no form

Strany 449 - Aging time: 300 sec

COMMAND LINE INTERFACE4-257Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • The precedence for priority mapping is IP Port

Strany 450 - Spanning Tree Commands

PRIORITY COMMANDS4-258queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (CoS) prior

Strany 451

COMMAND LINE INTERFACE4-259queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queues

Strany 452 -

PRIORITY COMMANDS4-260queue cos-mapThis command assigns class of service (CoS) values to the priority queues (i.e., hardware output queues 0 - 7). Use

Strany 453

COMMAND LINE INTERFACE4-261Example The following example shows how to change the CoS assignments to a one-to-one mapping. Related Commands show queue

Strany 454

PRIORITY COMMANDS4-262show queue bandwidthThis command displays the weighted round-robin (WRR) bandwidth allocation for the eight priority queues.Defa

Strany 455

COMMAND LINE INTERFACE4-263Default Setting NoneCommand Mode Privileged ExecExample Priority Commands (Layer 3 and 4) Console#show queue cos-map ethern

Strany 456

PRIORITY COMMANDS4-264map ip port (Global Configuration)Use this command to enable IP port mapping (i.e., class of service mapping for TCP/UDP sockets

Strany 457

NAVIGATING THE WEB BROWSER INTERFACE3-3Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and pa

Strany 458

COMMAND LINE INTERFACE4-265Default Setting NoneCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage • The precedence for priorit

Strany 459 - Console(config-mstp)#

PRIORITY COMMANDS4-266Example The following example shows how to enable IP precedence mapping globally:map ip precedence (Interface Configuration)This

Strany 460

COMMAND LINE INTERFACE4-267Example The following example shows how to map IP precedence value 1 to CoS value 0:map ip dscp (Global Configuration)This

Strany 461

PRIORITY COMMANDS4-268map ip dscp (Interface Configuration)This command sets IP DSCP priority (i.e., Differentiated Services Code Point priority). Use

Strany 462

COMMAND LINE INTERFACE4-269Example The following example shows how to map IP DSCP value 1 to CoS value 0.show map ip portUse this command to show the

Strany 463

PRIORITY COMMANDS4-270Related Commands map ip port (Global Configuration) (4 -264)map ip port (Interface Configuration) (4 -264) show map ip precedenc

Strany 464

COMMAND LINE INTERFACE4-271Related Commands map ip precedence (Global Configuration) (4 -265)map ip precedence (Interface Configuration) (4 -266) show

Strany 465

MULTICAST FILTERING COMMANDS4-272Related Commands map ip dscp (Global Configuration) (4 -267)map ip dscp (Interface Configuration) (4 -268)Multicast F

Strany 466

COMMAND LINE INTERFACE4-273ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp snoopi

Strany 467

MULTICAST FILTERING COMMANDS4-274ip igmp snooping vlan staticThis command adds a port to a multicast group. Use the no form to remove the port.Syntax

Strany 468

CONFIGURING THE SWITCH3-4Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made

Strany 469

COMMAND LINE INTERFACE4-275ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Syntax ip

Strany 470

MULTICAST FILTERING COMMANDS4-276show ip igmp snoopingThis command shows the IGMP snooping configuration.Default Setting NoneCommand Mode Privileged E

Strany 471

COMMAND LINE INTERFACE4-277Default Setting NoneCommand Mode Privileged ExecCommand Usage Member types displayed include IGMP or USER, depending on sel

Strany 472

MULTICAST FILTERING COMMANDS4-278ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no form to disable it.Syntax [no]

Strany 473

COMMAND LINE INTERFACE4-279Command Mode Global ConfigurationCommand Usage The query count defines how long the querier waits for a response from a mul

Strany 474

MULTICAST FILTERING COMMANDS4-280Command Mode Global ConfigurationExample The following shows how to configure the query interval to 100 seconds.ip ig

Strany 475

COMMAND LINE INTERFACE4-281Example The following shows how to configure the maximum response time to 20 seconds.Related Commands ip igmp snooping vers

Strany 476 - VLAN Commands

MULTICAST FILTERING COMMANDS4-282Related Commands ip igmp snooping version (4 -275)Static Multicast Routing Commandsip igmp snooping vlan mrouterThis

Strany 477 - Console(config-vlan)#

COMMAND LINE INTERFACE4-283Command Usage Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier. There

Strany 478

IP INTERFACE COMMANDS4-284Example The following shows that port 11 in VLAN 1 is attached to a multicast router.IP Interface CommandsThere are no IP ad

Strany 479 - Configuring VLAN Interfaces

NAVIGATING THE WEB BROWSER INTERFACE3-5Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all

Strany 480

COMMAND LINE INTERFACE4-285ip address This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the defau

Strany 481

IP INTERFACE COMMANDS4-286Note: Before you can change the IP address, you must first clear the current address with the no form of this command.Exampl

Strany 482

COMMAND LINE INTERFACE4-287Example In the following example, the device is reassigned the same address.Related Commands ip address (4 -285)ip default-

Strany 483

IP INTERFACE COMMANDS4-288Related Commands show ip redirects (4 -288)show ip interfaceThis command displays the settings of an IP interface.Default Se

Strany 484

COMMAND LINE INTERFACE4-289Related Commands If the BOOTP or DHCP server has been moved to a different domain, the network portion of the address provi

Strany 485

IP INTERFACE COMMANDS4-290Example Related Commands interface (4 -168)Console#ping 10.1.0.9Type ESC to abort.PING to 10.1.0.9, by 5 32-byte payload ICM

Strany 486

COMMAND LINE INTERFACE4-291

Strany 487 - Displaying VLAN Information

A-1APPENDIX ASOFTWARE SPECIFICATIONSSoftware FeaturesAuthenticationLocal, RADIUS, TACACS, Port (802.1x), HTTPS, SSH, Port SecurityAccess Control Lists

Strany 488

SOFTWARE SPECIFICATIONSA-2Port MirroringMultiple source ports, one destination portRate LimitsInput LimitOutput limitRange (configured per port)Port T

Strany 489

SOFTWARE SPECIFICATIONSA-3Management FeaturesIn-Band ManagementTelnet, Web-based HTTP or HTTPS, SNMP manager, or Secure ShellOut-of-Band ManagementRS-

Strany 490

CONFIGURING THE SWITCH3-6SSH 3-41Settings Configures Secure Shell server settings 3-46Host-Key Settings Generates the host key pair (public and privat

Strany 491

SOFTWARE SPECIFICATIONSA-4HTTPSICMP (RFC 792)IGMP (RFC 1112)IGMPv2 (RFC 2236)RADIUS+ (RFC 2618)RMON (RFC 1757 groups 1,2,3,9)SNTP (RFC 2030)SNMP (RFC

Strany 492

B-1APPENDIX BTROUBLESHOOTINGTable B-1. Troubleshooting ChartSymptom ActionCannot connect using Telnet, Web browser, or SNMP software• Ensure that you

Strany 493

TROUBLESHOOTINGB-2

Strany 494 - Console(config)#pvlan

Glossary-1GLOSSARYAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Strany 495 - XTENSION

GLOSSARYGlossary-2Extensible Authentication Protocol over LAN (EAPOL) EAPOL is a client authentication protocol used by this switch to verify the netw

Strany 496

GLOSSARYGlossary-3IEEE 802.1QVLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to differ

Strany 497

GLOSSARYGlossary-4IGMP QueryOn each subnetwork, one IGMP-capable device will act as the querier — that is, the device that asks all hosts to report on

Strany 498

GLOSSARYGlossary-5Link AggregationSee Port Trunk. Link Aggregation Control Protocol (LACP)Allows ports to automatically negotiate a trunked link with

Strany 499

GLOSSARYGlossary-6Port TrunkDefines a network link aggregation and trunking method which specifies how to create a single high-speed logical link that

Strany 500 - Priority Commands

GLOSSARYGlossary-7Simple Network Management Protocol (SNMP)The application protocol in the Internet suite of protocols which offers network management

Strany 501 - Priority Commands (Layer 2)

NAVIGATING THE WEB BROWSER INTERFACE3-7LACP 3-89Configuration Allows ports to dynamically join trunks 3-89Aggregation Port Configures system priority,

Strany 502

GLOSSARYGlossary-8User Datagram Protocol (UDP)UDP provides a datagram mode for packet-switched communications. It uses IP as the underlying transport

Strany 503

Index-1Numerics802.1x, port authentication 4-104Aacceptable frame type 3-155, 4-237Access Control List See ACLACLExtended IP 3-62, 4-114, 4-116, 4-12

Strany 504

INDEXIndex-2Eedge port, STA 3-129, 3-132, 4-221event logging 4-58Ffirmwaredisplaying version 3-14, 4-83upgrading 3-22, 4-86GGARP VLAN Registration Pro

Strany 505 - Priority20134567

INDEXIndex-3multicast groups 3-187, 4-276displaying 4-276static 3-187, 4-274, 4-276multicast servicesconfiguring 3-188, 4-274displaying 3-187, 4-276mu

Strany 506

INDEXIndex-4interface settings 3-126, 3-137, 3-139, 4-219–4-227, 4-228link type 3-129, 3-132, 4-223path cost 3-118, 3-128, 4-219path cost method 3-124

Strany 508 - Default Setting

38 TeslaIrvine, CA 92618Phone: (949) 679-8000FOR TECHNICAL SUPPORT, CALL:From U.S.A. and Canada (24 hours a day, 7 days a week)(800) SMC-4-YOU; Phn: (

Strany 509 - Console(config)#map ip port

CONFIGURING THE SWITCH3-8Address Aging Sets timeout for dynamically learned entries 3-115Spanning Tree 3-116STAInformation Displays STA values used f

Strany 510

NAVIGATING THE WEB BROWSER INTERFACE3-9VLAN 3-141802.1Q VLANGVRP Status Enables GVRP VLAN registration protocol3-146Basic Information Displays informa

Strany 511 - CoS Value 01234567

CONFIGURING THE SWITCH3-10Traffic Classes Status Enables/disables traffic class priorities (not implemented)NAQueue Mode Sets queue mode to strict pri

Strany 512

NAVIGATING THE WEB BROWSER INTERFACE3-11IP Multicast Registration Table Displays all multicast groups active on this switch, including multicast IP ad

Strany 513

LIMITED WARRANTYiiWARRANTIES EXCLUSIVE: IF AN SMC PRODUCT DOES NOT OPERATE AS WARRANTED ABOVE, CUSTOMER’S SOLE REMEDY SHALL BE REPAIR OR REPLACEMENT O

Strany 514

CONFIGURING THE SWITCH3-12Basic ConfigurationDisplaying System InformationYou can easily identify the system by displaying the device name, location a

Strany 515

BASIC CONFIGURATION3-13Web – Click System, System Information. Specify the system name, location, and contact information for the system administrator

Strany 516

CONFIGURING THE SWITCH3-14Displaying Switch Hardware/Software Versions Use the Switch Information page to display hardware/firmware version numbers fo

Strany 517 - Multicast Filtering Commands

BASIC CONFIGURATION3-15Web – Click System, Switch Information.Figure 3-4. Switch InformationCLI – Use the following command to display version inform

Strany 518

CONFIGURING THE SWITCH3-16Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filter

Strany 519

BASIC CONFIGURATION3-17Web – Click System, Bridge Extension.Figure 3-5. Bridge Extension ConfigurationCLI – Enter the following command. Setting the

Strany 520

CONFIGURING THE SWITCH3-18You can manually configure a specific IP address, or direct the device to obtain an address from a BOOTP or DHCP server. Val

Strany 521

BASIC CONFIGURATION3-19Manual ConfigurationWeb – Click System, IP Configuration. Select the VLAN through which the management station is attached, set

Strany 522 - IGMP Query Commands (Layer 2)

CONFIGURING THE SWITCH3-20Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by

Strany 523

BASIC CONFIGURATION3-21CLI – Specify the management interface, and set the IP address mode to DHCP or BOOTP, and then enter the “ip dhcp restart clien

Strany 524

iiiCONTENTS1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-1Key Features . . . . . . . . . . . . . . . . . . . .

Strany 525

CONFIGURING THE SWITCH3-22Managing FirmwareYou can upload/download firmware to or from a TFTP server. By saving runtime code to a file on a TFTP serve

Strany 526

BASIC CONFIGURATION3-23Web – Click System, File, Firmware. Enter the IP address of the TFTP server, enter the file name of the software to download, s

Strany 527

CONFIGURING THE SWITCH3-24CLI – Enter the IP address of the TFTP server, select “config” or “opcode” file type, then enter the source and destination

Strany 528

BASIC CONFIGURATION3-25Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set it a

Strany 529 - IP Interface Commands

CONFIGURING THE SWITCH3-26.If you download the startup configuration file under a new file name, you can set this file as the startup file at a later

Strany 530

BASIC CONFIGURATION3-27Setting the System ClockSimple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic updat

Strany 531

CONFIGURING THE SWITCH3-28Command Attributes• SNTP Client – Configures the switch to operate as an SNTP unicast client. This mode requires at least on

Strany 532

BASIC CONFIGURATION3-29Setting the Time ZoneSNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time at t

Strany 533

CONFIGURING THE SWITCH3-30Simple Network Management Protocol Simple Network Management Protocol (SNMP) is a communication protocol designed specifical

Strany 534

SIMPLE NETWORK MANAGEMENT PROTOCOL3-31• Access Mode - Read-Only – Specifies read-only access. Authorized management stations are only able to retrieve

Strany 535

CONTENTSivSetting the Switch’s IP Address . . . . . . . . . . . . . . . . . . . . . . . . 3-17Manual Configuration . . . . . . . . . . . . . . . .

Strany 536

CONFIGURING THE SWITCH3-32Command Attributes• Trap Manager Capability – This switch supports up to five trap managers.• Trap Manager IP Address – Inte

Strany 537 - PECIFICATIONS

USER AUTHENTICATION3-33User AuthenticationYou can restrict management access to this switch using the following options:• Passwords – Manually configu

Strany 538

CONFIGURING THE SWITCH3-34Web – Click Security, Passwords. To change the password for the current user, enter the old password, the new password, conf

Strany 539 - Standards

USER AUTHENTICATION3-35Remote Authentication Dial-in User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+) are log

Strany 540 - Management Information Bases

CONFIGURING THE SWITCH3-36Command Attributes• Authentication – Select the authentication, or authentication sequence required:- Local – User authentic

Strany 541 - ROUBLESHOOTING

USER AUTHENTICATION3-37• TACACS Settings- Server IP Address – Address of the TACACS+ server. (Default: 10.11.12.13)- Server Port Number – Network (TCP

Strany 542

CONFIGURING THE SWITCH3-38CLI – Specify all the required parameters to enable logon authentication.Configuring HTTPSYou can configure the switch to en

Strany 543 - Glossary-1

USER AUTHENTICATION3-39• The client and server establish a secure encrypted connection.A padlock icon should appear in the status bar for Internet Exp

Strany 544 - Glossary-2

CONFIGURING THE SWITCH3-40CLI – This example enables the HTTP secure server and modifies the port number.Replacing the Default Secure-site Certificate

Strany 545 - Glossary-3

USER AUTHENTICATION3-41Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of th

Strany 546 - Glossary-4

CONTENTSvFiltering Management Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-78Port Configuration . . . . . . . . . . . .

Strany 547 - Glossary-5

CONFIGURING THE SWITCH3-42To use the SSH server, complete these steps:1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a host p

Strany 548 - Glossary-6

USER AUTHENTICATION3-436. Challenge-Response Authentication – When an SSH client attempts to contact the switch, the SSH server uses the host key pair

Strany 549 - Glossary-7

CONFIGURING THE SWITCH3-44Field Attributes• Public-Key of Host-Key – The public key for the host.- RSA: The first field indicates the size of the hos

Strany 550 - Glossary-8

USER AUTHENTICATION3-45Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to save the ho

Strany 551 - Numerics

CONFIGURING THE SWITCH3-46CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and the

Strany 552

USER AUTHENTICATION3-47• SSH Authentication Retries – Specifies the number of authentication attempts that a client is allowed before authentication f

Strany 553

CONFIGURING THE SWITCH3-48CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that th

Strany 554

USER AUTHENTICATION3-49To add new VLAN members at a later time, you can manually add secure addresses with the Static Address Table (page 3-112), or t

Strany 555

CONFIGURING THE SWITCH3-50Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox

Strany 556

USER AUTHENTICATION3-51Configuring 802.1x Port AuthenticationNetwork switches can provide open and easy access to network resources by simply attachin

Komentáře k této Příručce

Žádné komentáře