SMC Networks L2-Lite Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software SMC Networks L2-Lite. SMC Networks L2-Lite User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 614
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 0
MANAGEMENT GUIDE
ta
TigerSwitch
TM
10/100/1000
L2-Lite SMB PoE Gigabit Switch
SMC8126PL2-F
Zobrazit stránku 0
1 2 3 4 5 6 ... 613 614

Shrnutí obsahu

Strany 1 - MANAGEMENT GUIDE

MANAGEMENT GUIDEtaTigerSwitchTM 10/100/1000L2-Lite SMB PoE Gigabit SwitchSMC8126PL2-F

Strany 2

ContentsxSetting a Switch Power Budget 3-136Displaying Port Power Status 3-136Configuring Port PoE Power 3-137Address Table Settings 3-139Setting

Strany 3 - Management Guide

Configuring the Switch3-523Setting SNMPv3 Views SNMPv3 views are used to restrict user access to specified portions of the MIB tree. The predefined vi

Strany 4

Simple Network Management Protocol3-533CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces

Strany 5 - About This Guide

Configuring the Switch3-543User AuthenticationYou can configure this switch to authenticate users logging into the system for management access using

Strany 6

User Authentication3-553Web – Click Security, User Accounts. To configure a new user account, specify a user name, select the user’s access level, the

Strany 7

Configuring the Switch3-563Configuring Local/Remote Logon AuthenticationUse the Authentication Settings menu to restrict management access based on sp

Strany 8

User Authentication3-573Command Attributes• Authentication – Select the authentication, or authentication sequence required:- Local – User authenticat

Strany 9

Configuring the Switch3-583Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authent

Strany 10

User Authentication3-593CLI – Specify all the required parameters to enable logon authentication.Configuring Encryption KeysThe Encryption Key feature

Strany 11

Configuring the Switch3-603- Confirm Secret Text String – Re-type the string entered in the previous field to ensure no errors were made. The switch w

Strany 12

User Authentication3-613AAA Authorization and AccountingThe Authentication, authorization, and accounting (AAA) feature provides the main framework fo

Strany 13

ContentsxiQuality of Service 3-200Configuring Quality of Service Parameters 3-201Configuring a Class Map 3-201Creating QoS Policies 3-204Attachi

Strany 14

Configuring the Switch3-623Configuring AAA RADIUS Group SettingsThe AAA RADIUS Group Settings screen defines the configured RADIUS servers to use for

Strany 15

User Authentication3-633Configuring AAA TACACS+ Group SettingsThe AAA TACACS+ Group Settings screen defines the configured TACACS+ servers to use for

Strany 16

Configuring the Switch3-643The group names “radius” and “tacacs+” specifies all configured RADIUS and TACACS+ hosts (see "Configuring Local/Remot

Strany 17

User Authentication3-653AAA Accounting UpdateThis feature sets the interval at which accounting updates are sent to accounting servers.Command Attribu

Strany 18

Configuring the Switch3-663AAA Accounting 802.1X Port SettingsThis feature applies the specified accounting method to an interface.Command Attributes•

Strany 19

User Authentication3-673AAA Accounting Exec Command PrivilegesThis feature specifies a method name to apply to commands entered at specific CLI privil

Strany 20

Configuring the Switch3-683AAA Accounting Exec SettingsThis feature specifies a method name to apply to console and Telnet connections.Command Attribu

Strany 21

User Authentication3-693Web – Click Security, AAA, Summary. Figure 3-43 AAA Accounting Summary

Strany 22 - Contents

Configuring the Switch3-703CLI – Use the following command to display the currently applied accounting methods, and registered users.Authorization Set

Strany 23

User Authentication3-713Web – Click Security, AAA, Authorization, Settings. To configure a new authorization method, specify a method name and a group

Strany 24

ContentsxiiPartial Keyword Lookup 4-5Negating the Effect of Commands 4-5Using Command History 4-5Understanding Command Modes 4-6Exec Commands 4-6

Strany 25

Configuring the Switch3-723CLI – Specify the authorization method to use for Console and Telnet interfaces.Authorization SummaryThe Authorization Summ

Strany 26

User Authentication3-733Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket

Strany 27

Configuring the Switch3-743Web – Click Security, HTTPS Settings. Enable HTTPS and specify the port number, then click Apply.Figure 3-47 HTTPS Setting

Strany 28

User Authentication3-753Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of t

Strany 29

Configuring the Switch3-7633. Import Client’s Public Key to the Switch – Use the copy tftp public-key command (4-25) to copy a file containing the pub

Strany 30

User Authentication3-773Authenticating SSH v2 Clientsa. The client first queries the switch to determine if DSA public key authentication using a pref

Strany 31 - Chapter 1: Introduction

Configuring the Switch3-783Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to save th

Strany 32 - Introduction

User Authentication3-793Configuring the SSH ServerThe SSH server includes basic settings for authentication. Note:You must first generate the host key

Strany 33

Configuring the Switch3-803CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that t

Strany 34

User Authentication3-813TLS (Transport Layer Security), PEAP (Protected Extensible Authentication Protocol), or TTLS (Tunneled Transport Layer Securit

Strany 35

Contentsxiiispeed 4-38stopbits 4-38disconnect 4-39show line 4-39Event Logging Commands 4-40logging on 4-41logging history 4-42logging host 4-43l

Strany 36 - System Defaults

Configuring the Switch3-823CLI – This example shows the default global setting for 802.1X. Configuring 802.1X Global SettingsThe 802.1X protocol provi

Strany 37

User Authentication3-833Configuring Port Settings for 802.1XWhen 802.1X is enabled, you need to configure the parameters for the authentication proces

Strany 38

Configuring the Switch3-843Web – Click Security, 802.1X, Port Configuration. Modify the parameters required, and click Apply.Figure 3-52 802.1X Port

Strany 39 - Connecting to the Switch

User Authentication3-853CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displayed in this example,

Strany 40 - Required Connections

Configuring the Switch3-863Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Web – Select Secu

Strany 41 - Basic Configuration

User Authentication3-873CLI – This example displays the 802.1X statistics for port 4. Filtering IP Addresses for Management AccessYou create a list of

Strany 42 - Setting an IP Address

Configuring the Switch3-883Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed management access to an inte

Strany 43 - Dynamic Configuration

General Security Measures3-893General Security Measures This switch supports many methods of segregating traffic for clients attached to each of the d

Strany 44 - Initial Configuration

Configuring the Switch3-903Configuring Port SecurityPort security is a feature that allows you to configure a switch port with one or more device MAC

Strany 45 - Trap Receivers

Access Control Lists3-913Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox

Strany 46 - Managing System Files

Contentsxivsnmp-server engine-id 4-68show snmp engine-id 4-69snmp-server view 4-69show snmp view 4-71snmp-server group 4-71show snmp group 4-73s

Strany 47 - Saving Configuration Settings

Configuring the Switch3-923• When an ACL is bound to an interface as an egress filter, all entries in the ACL must be deny rules. Otherwise, the bind

Strany 48

Access Control Lists3-933Configuring a Standard IP ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Addres

Strany 49 - Using the Web Interface

Configuring the Switch3-943Configuring an Extended IP ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Sou

Strany 50 - Home Page

Access Control Lists3-953Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (An

Strany 51 - Panel Display

Configuring the Switch3-963Configuring a MAC ACLUse this page to configure ACLs based on hardware addresses, packet format, and Ethernet type.Command

Strany 52 - Main Menu

Access Control Lists3-973Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (An

Strany 53

Configuring the Switch3-983Binding a Port to an Access Control ListAfter configuring the Access Control Lists (ACL), you can bind the ports that need

Strany 54

Access Control Lists3-993CLI – This example assigns an IP access list to port 1, and an IP access list to port 3.Filtering IP Addresses for Management

Strany 55

Configuring the Switch3-1003Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed management access to an int

Strany 56

Access Control Lists3-1013DHCP SnoopingThe addresses assigned to DHCP clients on insecure ports can be carefully controlled using the dynamic bindings

Strany 57

ContentsxvWeb Server Commands 4-99ip http port 4-99ip http server 4-100ip http secure-server 4-100ip http secure-port 4-101Telnet Server Commands

Strany 58

Configuring the Switch3-1023- If a DHCP packet from a client passes the filtering criteria above, it will only be forwarded to trusted ports in the sa

Strany 59

Access Control Lists3-1033DHCP Snooping VLAN ConfigurationUse the DHCP Snooping VLAN Configuration page to enable or disable DHCP snooping on specific

Strany 60

Configuring the Switch3-1043Command Usage• DHCP Snooping (see 3-102) must be enabled for Option 82 information to be inserted into request packets.• W

Strany 61

Access Control Lists3-1053CLI – This example enables DHCP Snooping Information Option, and sets the policy as replace.DHCP Snooping Port Configuration

Strany 62

Configuring the Switch3-1063Web – Click DHCP Snooping, Port Configuration. Set any ports within the local network or firewall to trusted, and click Ap

Strany 63

Access Control Lists3-1073• IP Address Type – Indicates an IPv4 address type.• Lease Time (Seconds) – The time for which this IP address is leased to

Strany 64

Configuring the Switch3-1083Command Usage• Setting source guard mode to SIP (Source IP) or SIP-MAC (Source IP and MAC) enables this function on the se

Strany 65 - Manual Configuration

Access Control Lists3-1093Web – Click IP Source Guard, Port Configuration. Set the required filtering type for each port and click Apply. Figure 3-67

Strany 66 - Using DHCP/BOOTP

Configuring the Switch3-1103- If there is an entry with the same VLAN ID and MAC address, and the type of the entry is dynamic DHCP snooping binding,

Strany 67 - Enabling Jumbo Frames

Access Control Lists3-1113Displaying Information for Dynamic IP Source Guard BindingsUse the Dynamic Information page to display the source-guard bind

Strany 68 - Managing Firmware

Contentsxvishow network-access mac-address-table 4-130DHCP Snooping Commands 4-131ip dhcp snooping 4-132ip dhcp snooping vlan 4-133ip dhcp snoopin

Strany 69

Configuring the Switch3-1123Port ConfigurationDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the c

Strany 70

Port Configuration3-1133Configuration:• Name – Interface label.• Port admin – Shows if the interface is enabled or disabled (i.e., up or down).•Speed-

Strany 71

Configuring the Switch3-1143CLI – This example shows the connection status for Port 5.Configuring Interface ConnectionsYou can use the Port Configurat

Strany 72 - Console Port Settings

Port Configuration3-1153problem has been resolved. You may also disable an interface for security reasons.• Speed/Duplex – Allows you to manually set

Strany 73

Configuring the Switch3-1163CLI – Select the interface, and then enter the required settings.Creating Trunk GroupsYou can create multiple links betwee

Strany 74 - Telnet Settings

Port Configuration3-1173• The ports at both ends of a trunk must be configured in an identical manner, including communication mode (i.e., speed, dupl

Strany 75

Configuring the Switch3-1183CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switc

Strany 76 - Configuring Event Logging

Port Configuration3-1193Command Attributes • Member List (Current) – Shows configured trunks (Port).• New – Includes entry fields for creating new tru

Strany 77 - Remote Log Configuration

Configuring the Switch3-1203CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another

Strany 78

Port Configuration3-1213- System priority is combined with the switch’s MAC address to form the LAG identifier. This identifier is used to indicate a

Strany 79 - Simple Mail Transfer Protocol

Contentsxviishow interfaces switchport 4-165Link Aggregation Commands 4-167channel-group 4-168lacp 4-169lacp system-priority 4-170lacp admin-key

Strany 80

Configuring the Switch3-1223CLI – The following example configures LACP parameters for ports 1-4. Ports 1-4 are used as active members of the LAG.Disp

Strany 81 - Renumbering the System

Port Configuration3-1233Web – Click Port, LACP, Port Counters Information. Select a member port to display the corresponding information.Figure 3-75

Strany 82 - Resetting the System

Configuring the Switch3-1243Displaying LACP Settings and Status for the Local SideYou can display configuration settings and the operational state for

Strany 83 - Setting the System Clock

Port Configuration3-1253Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-76

Strany 84 - Setting the Time Zone

Configuring the Switch3-1263Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state fo

Strany 85 - Console(config)#

Port Configuration3-1273CLI – The following example displays the LACP configuration settings and operational state for the remote side of port channel

Strany 86

Configuring the Switch3-1283Web – Click Port, Port/Trunk Broadcast Control. Set the threshold, mark the Enabled field for the desired interface and cl

Strany 87 - Enabling the SNMP Agent

Port Configuration3-1293Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port, t

Strany 88

Configuring the Switch3-1303Web – Click Port, Rate Limit, Input/Output Port/Trunk Configuration. Enable the Rate Limit Status for the required interfa

Strany 89

Port Configuration3-1313Received Multicast Packets The number of packets, delivered by this sub-layer to a higher (sub-)layer, which were addressed to

Strany 90

Contentsxviiimst priority 4-203name 4-204revision 4-205max-hops 4-205spanning-tree spanning-disabled 4-206spanning-tree cost 4-206spanning-tree por

Strany 91 - Setting the Local Engine ID

Configuring the Switch3-1323Multiple Collision Frames A count of successfully transmitted frames for which transmission is inhibited by more than one

Strany 92 - Specifying a Remote Engine ID

Port Configuration3-1333Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the

Strany 93 - Configuring SNMPv3 Users

Configuring the Switch3-1343Figure 3-81 Port StatisticsCLI – This example shows statistics for port 13.Power Over Ethernet SettingsThe switch can pro

Strany 94

Power Over Ethernet Settings3-1353power, if necessary by dropping power to ports set for a lower priority. If power is dropped to some low-priority po

Strany 95

Configuring the Switch3-1363Setting a Switch Power BudgetA maximum PoE power budget for the switch (power available to all switch ports) can be define

Strany 96

Power Over Ethernet Settings3-1373re-enabled when the overload condition is no longer detected on the port. (Default: Disabled)Web – Click PoE, Power

Strany 97 - Configuring SNMPv3 Groups

Configuring the Switch3-1383• If a device is connected to a critical or high-priority port and causes the switch to exceed its budget, port power is t

Strany 98

Address Table Settings3-1393Address Table SettingsSwitches store the addresses for all known devices. This information is used to pass traffic directl

Strany 99

Configuring the Switch3-1403Displaying the Address TableThe Dynamic Address Table contains the MAC addresses learned by monitoring the source address

Strany 100 - Setting SNMPv3 Views

Address Table Settings3-1413CLI – This example also displays the address table entries for port 1.Changing the Aging TimeYou can set the aging time fo

Strany 101

ContentsxixConfiguring Private VLANs 4-235private-vlan 4-236private vlan association 4-237switchport mode private-vlan 4-238switchport private-vlan

Strany 102 - User Authentication

Configuring the Switch3-1423Spanning Tree Algorithm Configuration The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, a

Strany 103

Spanning Tree Algorithm Configuration3-1433MSTP – MSTP When using STP or RSTP, it may be difficult to maintain a stable path between all VLAN members.

Strany 104

Configuring the Switch3-1443Once you specify the VLANs to include in a Multiple Spanning Tree Instance (MSTI), the protocol will automatically build a

Strany 105

Spanning Tree Algorithm Configuration3-1453These additional parameters are only displayed for the CLI:• Spanning tree mode – Specifies the type of spa

Strany 106

Configuring the Switch3-1463Web – Click Spanning Tree, STA, Information.Figure 3-89 Displaying Spanning Tree InformationCLI – This command displays g

Strany 107 - Configuring Encryption Keys

Spanning Tree Algorithm Configuration3-1473Configuring Global Settings for STAGlobal settings apply to the entire switch.Command Usage• Spanning Tree

Strany 108

Configuring the Switch3-1483• Priority – Bridge priority is used in selecting the root device, root port, and designated port. The device with the hig

Strany 109

Spanning Tree Algorithm Configuration3-1493• Transmission Limit – The maximum transmission rate for BPDUs is specified by setting the minimum interval

Strany 110

Configuring the Switch3-1503Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-90 Configuring Sp

Strany 111 - Configuring AAA Accounting

Spanning Tree Algorithm Configuration3-1513CLI – This example enables Spanning Tree Protocol, sets the mode to RSTP, and then configures the STA and R

Strany 113 - AAA Accounting Update

ContentsxxIGMP Snooping Commands 4-266ip igmp snooping 4-267ip igmp snooping vlan static 4-267ip igmp snooping version 4-268ip igmp snooping leave

Strany 114

Configuring the Switch3-1523• Designated Port – The port priority and number of the port on the designated bridging device through which this switch m

Strany 115

Spanning Tree Algorithm Configuration3-1533These additional parameters are only displayed for the CLI:• Admin Status – Shows if this interface is enab

Strany 116 - AAA Accounting Summary

Configuring the Switch3-1543CLI – This example shows the STA attributes for port 5. Configuring Interface Settings for STAYou can configure RSTP and M

Strany 117

Spanning Tree Algorithm Configuration3-1553The following interface attributes can be configured:• Spanning Tree – Enables/disables STA on this interfa

Strany 118 - Authorization Settings

Configuring the Switch3-1563• Admin Link Type – The link type attached to this interface.- Point-to-Point – A connection to exactly one other bridge.-

Strany 119 - Authorization EXEC Settings

Spanning Tree Algorithm Configuration3-1573Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes,

Strany 120 - Authorization Summary

Configuring the Switch3-1583Configuring Multiple Spanning TreesMSTP generates a unique spanning tree for each instance. This provides multiple pathway

Strany 121 - Configuring HTTPS

Spanning Tree Algorithm Configuration3-1593Web – Click Spanning Tree, MSTP, VLAN Configuration. Select an instance identifier from the list, set the i

Strany 122

Configuring the Switch3-1603CLI – This displays STA settings for instance 1, followed by settings for each port.Console#show spanning-tree mst 1 4-213

Strany 123

Spanning Tree Algorithm Configuration3-1613Displaying Interface Settings for MSTPThe MSTP Port Information and MSTP Trunk Information pages display th

Strany 124

Contentsxxiip default-gateway 4-298ip dhcp restart 4-299show ip interface 4-299show ip redirects 4-300ping 4-300Appendix A: Software Specificatio

Strany 125 - Generating the Host Key Pair

Configuring the Switch3-1623CLI – This displays STA settings for instance 0, followed by settings for each port. The settings for instance 0 are globa

Strany 126

Spanning Tree Algorithm Configuration3-1633Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance usi

Strany 127 - Configuring the SSH Server

Configuring the Switch3-1643Web – Click Spanning Tree, MSTP, Port Configuration or Trunk Configuration. Enter the priority and path cost for an interf

Strany 128

VLAN Configuration3-1653This switch supports the following VLAN features:• Up to 255 VLANs based on the IEEE 802.1Q standard• Distributed VLAN learnin

Strany 129

Configuring the Switch3-1663Untagged VLANs – Untagged (or static) VLANs are typically used to reduce broadcast traffic and to increase security. A gro

Strany 130

VLAN Configuration3-1673Forwarding Tagged/Untagged FramesIf you want to create a small port-based VLAN for devices attached directly to a single switc

Strany 131

Configuring the Switch3-1683Displaying Basic VLAN InformationThe VLAN Basic Information page displays basic information on the VLAN type supported by

Strany 132

VLAN Configuration3-1693Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN and whether or not the port support

Strany 133

Configuring the Switch3-1703• Name – Name of the VLAN (1 to 32 characters).• Status – Shows if this VLAN is enabled or disabled. - Active: VLAN is ope

Strany 134 - Displaying 802.1X Statistics

VLAN Configuration3-1713Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbox to

Strany 135

Contentsxxii

Strany 136

Configuring the Switch3-1723CLI – This example creates a new VLAN.Console(config)#vlan database 4-220Console(config-vlan)#vlan 2 name R&D media et

Strany 137 - General Security Measures

VLAN Configuration3-1733Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port members for the selected VLAN index. As

Strany 138 - Configuring Port Security

Configuring the Switch3-1743Web – Click VLAN, 802.1Q VLAN, Static Table. Select a VLAN ID from the scroll-down list. Modify the VLAN name and status i

Strany 139 - Access Control Lists

VLAN Configuration3-1753Adding Static Members to VLANs (Port Index)Use the VLAN Static Membership by Port menu to assign VLAN groups to the selected i

Strany 140 - Setting the ACL Name and Type

Configuring the Switch3-1763Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLA

Strany 141 - Configuring a Standard IP ACL

VLAN Configuration3-1773• GARP Leave Timer13 – The interval a port waits before leaving a VLAN group. This time should be set to more than twice the j

Strany 142

Configuring the Switch3-1783Configuring IEEE 802.1Q TunnelingIEEE 802.1Q Tunneling (QinQ) is designed for service providers carrying traffic for multi

Strany 143

VLAN Configuration3-1793customer’s network. The packet is sent as a normal IEEE 802.1Q-tagged frame, preserving the original VLAN numbers used in the

Strany 144 - Configuring a MAC ACL

Configuring the Switch3-1803Layer 2 Flow for Packets Coming into a Tunnel Uplink PortAn uplink port receives one of the following packets:• Untagged•

Strany 145

VLAN Configuration3-1813• Static trunk port groups are compatible with QinQ tunnel ports as long as the QinQ configuration is consistent within a trun

Strany 146

xxiiiTablesTable 1-1 Key Features 1-1Table 1-2 System Defaults 1-6Table 3-1 Configuration Options 3-3Table 3-2 Main Menu 3-4Table 3-3 Logging Leve

Strany 147

Configuring the Switch3-1823incoming frames containing that ethertype are assigned to the VLAN contained in the tag following the ethertype field, as

Strany 148

VLAN Configuration3-1833the attached client is using a nonstandard 2-byte ethertype to identify 802.1Q tagged frames (see "Displaying Basic VLAN

Strany 149 - DHCP Snooping

Configuring the Switch3-1843Configuring Private VLANs Private VLANs provide port-based security and isolation between ports within the assigned VLAN.

Strany 150 - DHCP Snooping Configuration

VLAN Configuration3-1853Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports des

Strany 151

Configuring the Switch3-1863Command UsageTo configure protocol-based VLANs, follow these steps:1. First configure VLAN groups for the protocols you wa

Strany 152

VLAN Configuration3-1873CLI – This example creates protocol group 1 for Ethernet frames using the IP protocol, and group 2 for Ethernet frames using t

Strany 153

Configuring the Switch3-1883Web – Click VLAN, Protocol VLAN, Port Configuration.Figure 3-108 Protocol VLAN Port ConfigurationCLI – The following maps

Strany 154

Class of Service Configuration3-1893Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precede

Strany 155 - IP Source Guard

Configuring the Switch3-1903Command Attributes• Default Priority14 – The priority that is assigned to untagged frames received on the specified interf

Strany 156

Class of Service Configuration3-1913Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using f

Strany 157

TablesxxivTable 4-25 Authentication Commands 4-76Table 4-24 show snmp user - display description 4-76Table 4-26 User Access Commands 4-77Table 4-27

Strany 158

Configuring the Switch3-1923Web – Click Priority, Traffic Classes. Select a port or trunk for the current mapping of CoS values to output queues to be

Strany 159

Class of Service Configuration3-1933Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traf

Strany 160 - Port Configuration

Configuring the Switch3-1943Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determine the f

Strany 161

Class of Service Configuration3-1953Layer 3/4 Priority SettingsMapping Layer 3/4 Priorities to CoS ValuesThis switch supports several common methods o

Strany 162

Configuring the Switch3-1963Mapping IP PrecedenceThe Type of Service (ToS) octet in the IPv4 header includes three precedence bits defining eight diff

Strany 163

Class of Service Configuration3-1973CLI – The following example globally enables IP Precedence service on the switch, maps IP Precedence value 1 to Co

Strany 164 - Creating Trunk Groups

Configuring the Switch3-1983Command Attributes• DSCP Priority Table – Shows the DSCP Priority to CoS map.• Class of Service Value – Maps a CoS value t

Strany 165

Class of Service Configuration3-1993Mapping IP Port PriorityYou can also map network applications to Class of Service values based on the IP port numb

Strany 166

Configuring the Switch3-2003CLI* – The following example globally enables IP Port Priority service on the switch, maps HTTP traffic on port 5 to CoS v

Strany 167

Quality of Service3-2013Configuring Quality of Service Parameters To create a service policy for a specific category or ingress traffic, follow these

Strany 168

TablesxxvTable 4-76 Priority Commands 4-244Table 4-77 Priority Commands (Layer 2) 4-244Table 4-78 Default CoS Values to Egress Queues 4-248Table 4-

Strany 169

Configuring the Switch3-2023Class Configuration• Class Name – Name of the class map. (Range: 1-16 characters)• Type – Only one match command is permit

Strany 170 - Displaying LACP Port Counters

Quality of Service3-2033Web – Click QoS, DiffServ, then click Add Class to create a new class, or Edit Rules to change the rules of an existing class.

Strany 171

Configuring the Switch3-2043Creating QoS PoliciesThis function creates a policy map that can be attached to multiple interfaces.Command Usage • To con

Strany 172

Quality of Service3-2053Policy Rule Settings- Class Settings -• Class Name – Name of class map.• Action – Shows the service provided to ingress traffi

Strany 173

Configuring the Switch3-2063Web – Click QoS, DiffServ, Policy Map to display the list of existing policy maps. To add a new policy map click Add Polic

Strany 174

Quality of Service3-2073CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps,

Strany 175

Configuring the Switch3-2083CLI - This example applies a service policy to an ingress interface.Multicast Filtering Multicasting is used to support re

Strany 176

Multicast Filtering3-2093Layer 2 IGMP (Snooping and Query)IGMP Snooping and Query – If multicast routing is not supported on other switches in your ne

Strany 177 - Configuring Rate Limits

Configuring the Switch3-2103Configuring IGMP Snooping and Query ParametersYou can configure the switch to forward multicast traffic intelligently. Bas

Strany 178 - Showing Port Statistics

Multicast Filtering3-2113• Act as IGMP Querier — When enabled, the switch can serve as the Querier, which is responsible for asking hosts if they want

Strany 179

Tablesxxvi

Strany 180

Configuring the Switch3-2123CLI – This example modifies the settings for multicast filtering, and then displays the current status.Enabling IGMP Immed

Strany 181

Multicast Filtering3-2133Command Attributes• VLAN ID – ID of configured VLAN (1-4094).• Immediate Leave – Sets the status for immediate leave on the s

Strany 182 - Power Over Ethernet Settings

Configuring the Switch3-2143Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch use informa

Strany 183 - Switch Power Status

Multicast Filtering3-2153Specifying Static Interfaces for a Multicast RouterDepending on your network connections, IGMP snooping may not always be abl

Strany 184 - Displaying Port Power Status

Configuring the Switch3-2163Displaying Port Members of Multicast Services You can display the port members associated with a specified VLAN and multic

Strany 185 - Configuring Port PoE Power

Multicast Filtering3-2173Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query me

Strany 186

Configuring the Switch3-2183CLI – This example assigns a multicast address to VLAN 1, and then displays all the known multicast services supported on

Strany 187 - Address Table Settings

Multicast Filtering3-2193Web – Click IGMP Snooping, IGMP Filter Configuration. Create a profile number by entering the number in text box and clicking

Strany 188 - Displaying the Address Table

Configuring the Switch3-2203• Access Mode – Sets the access mode of the profile; either permit or deny. (Default: Deny)• New Multicast Address Range L

Strany 189 - Changing the Aging Time

Multicast Filtering3-2213CLI – This example configures profile number 19 by setting the access mode to “permit” and then specifying a range of multica

Strany 190

xxviiFiguresFigure 3-1 Home Page 3-2Figure 3-2 Panel Display 3-3Figure 3-3 System Information 3-12Figure 3-4 Switch Information 3-13Figure 3-5 Bri

Strany 191

Configuring the Switch3-2223Web – Click IGMP Snooping, IGMP Filter/Throttling Port Configuration or IGMP Filter/Throttling Trunk Configuration. Select

Strany 192

Multicast Filtering3-2233Multicast VLAN Registration Multicast VLAN Registration (MVR) is a protocol that controls access to a single network-wide VLA

Strany 193

Configuring the Switch3-2243Configuring Global MVR Settings The global settings for Multicast VLAN Registration (MVR) include enabling or disabling MV

Strany 194

Multicast Filtering3-2253Web – Click MVR, Configuration. Enable MVR globally on the switch, select the MVR VLAN, add the multicast groups that will st

Strany 195

Configuring the Switch3-2263Displaying MVR Interface Status You can display information about the interfaces attached to the MVR VLAN.Field Attributes

Strany 196

Multicast Filtering3-2273Displaying Port Members of Multicast GroupsYou can display the multicast groups assigned to the MVR VLAN either through IGMP

Strany 197

Configuring the Switch3-2283Configuring MVR Interface Status Each interface that participates in the MVR VLAN must be configured as an MVR source port

Strany 198

Multicast Filtering3-2293- Non-MVR – An interface that does not participate in the MVR VLAN. (This is the default type.)• Immediate Leave – Configures

Strany 199

Configuring the Switch3-2303Assigning Static Multicast Groups to InterfacesFor multicast streams that will run for a long term and be associated with

Strany 200

Configuring Domain Name Service3-2313Configuring Domain Name Service The Domain Naming System (DNS) service on this switch allows host names to be map

Strany 201

FiguresxxviiiFigure 3-43 AAA Accounting Summary 3-69Figure 3-44 AAA Authorization Settings 3-71Figure 3-45 AAA Authorization Exec Settings 3-71Figu

Strany 202

Configuring the Switch3-2323Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more name ser

Strany 203

Configuring Domain Name Service3-2333Configuring Static DNS Host to Address EntriesYou can manually configure static entries in the DNS table that are

Strany 204

Configuring the Switch3-2343Web – Select DNS, Static Host Table. Enter a host name and one or more corresponding addresses, then click Apply.Figure 3-

Strany 205

Configuring Domain Name Service3-2353Displaying the DNS CacheYou can display entries in the DNS cache that have been learned via the designated name s

Strany 206

Configuring the Switch3-2363Switch ClusteringSwitch Clustering is a method of grouping switches together to enable centralized management through a si

Strany 207 - Console(config-mst)#

Switch Clustering3-2373• Cluster IP Pool – An “internal” IP address pool that is used to assign IP addresses to Member switches in the cluster. Intern

Strany 208

Configuring the Switch3-2383Cluster Member ConfigurationAdds Candidate switches to the cluster as Members. Command Attributes• Member ID – Specify a M

Strany 209

Switch Clustering3-2393Displaying Information on Cluster MembersUse the Cluster Member Information page to display information on current cluster Memb

Strany 210

Configuring the Switch3-2403Cluster Candidate InformationUse the Cluster Candidate Information page to display information about discovered switches i

Strany 211

4-1Chapter 4: Command Line InterfaceThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the C

Strany 212 - VLAN Configuration

FiguresxxixFigure 3-88 Setting the Address Aging Time 3-141Figure 3-89 Displaying Spanning Tree Information 3-146Figure 3-90 Configuring Spanning Tr

Strany 213 - Assigning Ports to VLANs

Command Line Interface4-24Telnet ConnectionTelnet operates over the IP transport protocol. In this environment, your management station and any networ

Strany 214

Entering Commands4-34Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Strany 215

Command Line Interface4-44Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the curren

Strany 216

Entering Commands4-54The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword w

Strany 217 - Displaying Current VLANs

Command Line Interface4-64Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands generally display i

Strany 218 - Creating VLANs

Entering Commands4-74Configuration CommandsConfiguration commands are privileged level commands used to modify switch settings. These commands modify

Strany 219

Command Line Interface4-84To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end command to ret

Strany 220

Entering Commands4-94Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough

Strany 221

Command Line Interface4-104Command GroupsThe system commands can be broken down into the functional groups shown below.Table 4-4 Command GroupsComman

Strany 222

General Commands4-114The access mode shown in the following tables is indicated by these abbreviations: ACL (Access Control List Configuration) NE (No

Strany 223

20 MasonIrvine, CA 92618Phone: (949) 679-8000TigerSwitch 10/100/1000Management GuideFrom SMC’s Tiger line of feature-rich workgroup LAN solutionsAugus

Strany 224

FiguresxxxFigure 3-133 MVR Port Configuration 3-229Figure 3-134 MVR Group Member Configuration 3-230Figure 3-135 DNS General Configuration 3-232Fig

Strany 225

Command Line Interface4-124Command ModeNormal ExecCommand Usage • “super” is the default password required to change the command mode from Normal Exec

Strany 226

General Commands4-134Example Related Commands end (4-14)show historyThis command shows the contents of the command history buffer.Command Mode Normal

Strany 227

Command Line Interface4-144Command Mode Privileged ExecCommand Usage • This command resets the entire system.• When the system is restarted, it will a

Strany 228

General Commands4-154exitThis command returns to the previous configuration mode or exit the configuration program.Command Mode AnyExample This exampl

Strany 229

Command Line Interface4-164System Management CommandsThese commands are used to control system logs, passwords, user names, browser configuration opti

Strany 230

System Management Commands4-174Example System Status CommandsThis section describes commands used to display system information.show startup-configThi

Strany 231

Command Line Interface4-184Example Related Commandsshow running-config (4-18)show running-configThis command displays the configuration information c

Strany 232 - Enabling Private VLANs

System Management Commands4-194Command Usage • Use this command in conjunction with the show startup-config command to compare the information in runn

Strany 233 - Protocol VLANs

Command Line Interface4-204Example Related Commandsshow startup-config (4-17)Console#show running-configbuilding startup-config, please wait...!<

Strany 234

System Management Commands4-214show systemThis command displays system information.Command Mode Normal Exec, Privileged ExecCommand Usage • For a desc

Strany 235 - Mapping Protocols to VLANs

1-1Chapter 1: IntroductionThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to conf

Strany 236

Command Line Interface4-224Example show versionThis command displays hardware and software version information for the system.Command Mode Normal Exec

Strany 237 - Layer 2 Queue Settings

System Management Commands4-234Frame Size Commandsjumbo frameThis command enables support for jumbo frames. Use the no form to disable it.Syntax [no]

Strany 238

Command Line Interface4-244File Management CommandsManaging FirmwareFirmware can be uploaded and downloaded to or from an TFTP server. By saving run-t

Strany 239 - 15. CLI shows Queue ID

System Management Commands4-254copyThis command moves (upload/download) a code image or configuration file between the switch’s flash memory and a TFT

Strany 240

Command Line Interface4-264• The Boot ROM and Loader cannot be uploaded or downloaded from the TFTP server. You must follow the instructions in the re

Strany 241 - Selecting the Queue Mode

System Management Commands4-274The following example shows how to download a configuration file: This example shows how to copy a secure-site certific

Strany 242

Command Line Interface4-284deleteThis command deletes a file or image.Syntax delete filenamefilename - Name of the configuration file or image name.Co

Strany 243 - Layer 3/4 Priority Settings

System Management Commands4-294• File information is shown below:Example The following example shows how to display all file information:whichbootThis

Strany 244 - Mapping IP Precedence

Command Line Interface4-304boot systemThis command specifies the image used to start up the system.Syntax boot system {boot-rom| config | opcode}: fil

Strany 245 - Mapping DSCP Priority

System Management Commands4-314Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s se

Strany 246

Introduction1-21Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates t

Strany 247 - Mapping IP Port Priority

Command Line Interface4-324Command Usage Telnet is considered a virtual terminal connection and will be shown as “Vty” in screen displays such as show

Strany 248 - Quality of Service

System Management Commands4-334Example Related Commandsusername (4-77)password (4-33)passwordThis command specifies the password for a line. Use the n

Strany 249 - Configuring a Class Map

Command Line Interface4-344timeout login responseThis command sets the interval that the system waits for a user to log into the CLI. Use the no form

Strany 250

System Management Commands4-354Command Mode Line ConfigurationCommand Usage • If user input is detected within the timeout interval, the session is ke

Strany 251

Command Line Interface4-364Related Commandssilent-time (4-36)timeout login response (4-13)silent-timeThis command sets the amount of time the manageme

Strany 252 - Creating QoS Policies

System Management Commands4-374Command Usage The databits command can be used to mask the high bit on input from devices that generate 7 data bits wit

Strany 253

Command Line Interface4-384speedThis command sets the terminal line’s baud rate. This command sets both the transmit (to terminal) and receive (from t

Strany 254

System Management Commands4-394Example To specify 2 stop bits, enter this command:disconnectThis command terminates an SSH, Telnet, or console connect

Strany 255

Command Line Interface4-404Example To show all lines, enter this command:Event Logging Commands Console#show line Console Configuration: Password Thr

Strany 256 - Multicast Filtering

System Management Commands4-414logging onThis command controls logging of error messages, sending debug or error messages to switch memory. The no for

Strany 257

Description of Software Features1-31Port Configuration – You can manually configure the speed, duplex mode, and flow control used on specific ports, o

Strany 258

Command Line Interface4-424logging historyThis command limits syslog messages saved to switch memory based on severity. The no form returns the loggin

Strany 259

System Management Commands4-434logging hostThis command adds a syslog server host IP address that will receive logging messages. Use the no form to re

Strany 260 - Enabling IGMP Immediate Leave

Command Line Interface4-444logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved to

Strany 261

System Management Commands4-454Related Commandsshow logging (4-45)show loggingThis command displays the configuration settings for logging messages to

Strany 262

Command Line Interface4-464The following example displays settings for the trap function. Related Commandsshow logging sendmail (4-50)show logThis com

Strany 263

System Management Commands4-474ExampleThe following example shows sample messages stored in RAM.SMTP Alert CommandsThese commands configure SMTP event

Strany 264

Command Line Interface4-484Command Mode Global ConfigurationCommand Usage • You can specify up to three SMTP servers for event handing. However, you m

Strany 265

System Management Commands4-494logging sendmail source-emailThis command sets the email address used for the “From” field in alert messages. Use the n

Strany 266 - IGMP Filtering and Throttling

Command Line Interface4-504logging sendmailThis command enables SMTP event handling. Use the no form to disable this function.Syntax[no] logging sendm

Strany 267

System Management Commands4-514Time CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Maintain

Strany 268

Introduction1-41(CRC). This prevents bad frames from entering the network and wasting bandwidth.To avoid dropping frames on congested ports, the switc

Strany 269

Command Line Interface4-524Example Related Commandssntp server (4-52)sntp poll (4-53)show sntp (4-53)sntp serverThis command sets the IP address of th

Strany 270

System Management Commands4-534sntp pollThis command sets the interval between sending time requests when the switch is set to SNTP client mode. Use t

Strany 271 - Multicast VLAN Registration

Command Line Interface4-544clock timezoneThis command sets the time zone for the switch’s internal clock.Syntax clock timezone name hour hours minute

Strany 272

System Management Commands4-554calendar setThis command sets the system clock. It may be used if there is no time server on your network, or if you ha

Strany 273

Command Line Interface4-564Switch Cluster CommandsSwitch Clustering is a method of grouping switches together to enable centralized management through

Strany 274

System Management Commands4-574Command Usage • To create a switch cluster, first be sure that clustering is enabled on the switch (the default is enab

Strany 275

Command Line Interface4-584cluster ip-poolThis command sets the cluster IP address pool. Use the no form to reset to the default address.Syntax cluste

Strany 276

System Management Commands4-594Command Usage • The maximum number of cluster Members is 16.• The maximum number of switch Candidates is 100.Examplerco

Strany 277

Command Line Interface4-604show cluster membersThis command shows the current switch cluster members.Command Mode Privileged ExecExampleshow cluster c

Strany 278

SNMP Commands4-614SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as

Strany 279

Description of Software Features1-51Traffic Prioritization – This switch prioritizes each packet based on the required level of service, using four pr

Strany 280

Command Line Interface4-624snmp-serverThis command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c, 3). Use th

Strany 281

SNMP Commands4-634Examplesnmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the specifie

Strany 282

Command Line Interface4-644Command Mode Global ConfigurationExample snmp-server contactThis command sets the system contact string. Use the no form to

Strany 283 - Figure 3-137 DNS Cache

SNMP Commands4-654Example Related Commandssnmp-server contact (4-64)snmp-server host This command specifies the recipient of a Simple Network Manageme

Strany 284 - Switch Clustering

Command Line Interface4-664Command Usage • If you do not enter an snmp-server host command, no notifications are sent. In order to configure the switc

Strany 285

SNMP Commands4-674exist, and the switch will not authorize SNMP access for the host. However, if you specify a V3 host with the “noauth” option, an SN

Strany 286 - Cluster Member Configuration

Command Line Interface4-684Related Commandssnmp-server host (4-65)snmp-server engine-idThis command configures an identification string for the SNMPv3

Strany 287 - SMC8126PL2-F

SNMP Commands4-694Related Commandssnmp-server host (4-65)show snmp engine-idThis command shows the SNMP engine ID.Command Mode Privileged ExecExampleT

Strany 288 - Cluster Candidate Information

Command Line Interface4-704Command Usage • Views are used in the snmp-server group command to restrict user access to specified portions of the MIB tr

Strany 289 - Console Connection

SNMP Commands4-714show snmp viewThis command shows information on the SNMP views.Command Mode Privileged ExecExample snmp-server groupThis command add

Strany 290 - Telnet Connection

Introduction1-61System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch d

Strany 291 - Entering Commands

Command Line Interface4-724Default Setting • Default groups: public20 (read only), private21 (read/write)• readview - Every object belonging to the In

Strany 292 - Showing Commands

SNMP Commands4-734show snmp groupFour default groups are provided – SNMPv1 read-only access and read/write access, and SNMPv2c read-only access and re

Strany 293 - Using Command History

Command Line Interface4-744snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read, Write, or Notify V

Strany 294 - Exec Commands

SNMP Commands4-754Command Usage • The SNMP engine ID is used to compute the authentication/privacy digests from the password. You should therefore con

Strany 295 - Configuration Commands

Command Line Interface4-764Authentication Commands You can configure this switch to authenticate users logging into the system for management access u

Strany 296 - Command Line Interface

Authentication Commands4-774User Account and Privilege Level CommandsThe basic commands required for management access are listed in this section. Thi

Strany 297 - Command Line Processing

Command Line Interface4-784Command Mode Global ConfigurationCommand Usage • Privilege level 0 provides access to a limited number of the commands whic

Strany 298 - Command Groups

Authentication Commands4-794Example Related Commandsenable (4-11)authentication enable (4-82)privilegeThis command assigns a privilege level to specif

Strany 299 - General Commands

Command Line Interface4-804Command Usage Due to system limitations in the current software, privilege commands (page 4-79) entered during the current

Strany 300

Authentication Commands4-814authentication loginThis command defines the login authentication method and precedence. Use the no form to restore the de

Strany 301

System Defaults1-71SNMP SNMP Agent EnabledCommunity Strings “public” (read only), “private” (read/write) Traps Authentication traps: enabledLink-up-do

Strany 302

Command Line Interface4-824authentication enableThis command defines the authentication method and precedence to use when changing from Exec command m

Strany 303

Authentication Commands4-834RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software run

Strany 304 - System Management Commands

Command Line Interface4-844Example radius-server portThis command sets the RADIUS server network port. Use the no form to restore the default.Syntax r

Strany 305 - System Status Commands

Authentication Commands4-854radius-server retransmitThis command sets the number of retries. Use the no form to restore the default.Syntax radius-serv

Strany 306

Command Line Interface4-864Example TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that us

Strany 307

Authentication Commands4-874tacacs-server hostThis command specifies the TACACS+ server. Use the no form to restore the default.Syntax [no] tacacs-ser

Strany 308

Command Line Interface4-884Example tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to restore the default.Syntax tacacs

Strany 309

Authentication Commands4-894tacacs-server timeoutThis command sets the interval between transmitting authentication requests to the TACACS+ server. Us

Strany 310

Command Line Interface4-904AAA CommandsThe Authentication, authorization, and accounting (AAA) feature provides the main framework for configuring acc

Strany 311 - Frame Size Commands

Authentication Commands4-914Example serverThis command adds a security server to an AAA server group. Use the no form to remove the associated server

Strany 312 - File Management Commands

Introduction1-81IP Settings IP Address DHCP assignedSubnet Mask 255.255.255.0Default Gateway 0.0.0.0DHCP Client: EnabledDNS Client/Proxy service: Disa

Strany 313

Command Line Interface4-924aaa accounting dot1xThis command enables the accounting of requested 802.1X services for network access. Use the no form to

Strany 314

Authentication Commands4-934aaa accounting execThis command enables the accounting of requested Exec services for network access. Use the no form to d

Strany 315

Command Line Interface4-944aaa accounting commandsThis command enables the accounting of Exec mode commands. Use the no form to disable the accounting

Strany 316

Authentication Commands4-954aaa accounting updateThis command enables the sending of periodic updates to the accounting server. Use the no form to dis

Strany 317

Command Line Interface4-964Example accounting execThis command applies an accounting method to local console or Telnet connections. Use the no form to

Strany 318

Authentication Commands4-974Command Mode Line ConfigurationExample aaa authorization execThis command enables the authorization for Exec access. Use t

Strany 319 - Line Commands

Command Line Interface4-984authorization execThis command applies an authorization method to local console or Telnet connections. Use the no form to d

Strany 320

Authentication Commands4-994Command ModePrivileged ExecExample Web Server CommandsThis section describes commands used to configure web browser manage

Strany 321

Command Line Interface4-1004ExampleRelated Commandsip http server (4-100)ip http serverThis command allows this device to be monitored or configured f

Strany 322

Authentication Commands4-1014• When you start HTTPS, the connection is established in this way:- The client authenticates the server using the server’

Strany 323

2-1Chapter 2: Initial ConfigurationConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent off

Strany 324

Command Line Interface4-1024Command Usage • You cannot configure the HTTP and HTTPS servers to use the same port. • If you change the HTTPS port numbe

Strany 325

Authentication Commands4-1034Secure Shell CommandsThis section describes the commands used to configure the SSH server. However, note that you also ne

Strany 326

Command Line Interface4-1044Otherwise, you need to manually create a known hosts file on the management station and place the host public key in it. A

Strany 327

Authentication Commands4-1054d) The client uses its private key to decrypt the challenge string, computes the MD5 checksum, and sends the checksum bac

Strany 328 - Event Logging Commands

Command Line Interface4-1064Related Commandsip ssh crypto host-key generate (4-108)show ssh (4-110)ip ssh timeoutThis command configures the timeout f

Strany 329

Authentication Commands4-1074Command Mode Global ConfigurationExample Related Commandsshow ip ssh (4-109)ip ssh server-key sizeThis command sets the S

Strany 330

Command Line Interface4-1084Example ip ssh crypto host-key generateThis command generates the host key pair (i.e., public and private). Syntax ip ssh

Strany 331

Authentication Commands4-1094Default Setting Clears both the DSA and RSA key.Command Mode Privileged ExecCommand Usage • This command clears the host

Strany 332

Command Line Interface4-1104Example show sshThis command displays the current SSH server connections.Command Mode Privileged ExecExample Console#show

Strany 333

Authentication Commands4-1114show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [use

Strany 334

Information furnished by SMC Networks, Inc. (SMC) is believed to be accurate and reliable. However, no responsibility is assumed by SMC for its use, n

Strany 335 - SMTP Alert Commands

Initial Configuration2-22• Configure up to 32 static or LACP trunks• Enable port mirroring• Set broadcast, multicast or unknown unicast storm control

Strany 336

Command Line Interface4-1124802.1X Port AuthenticationThe switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorized acc

Strany 337

Authentication Commands4-1134dot1x defaultThis command sets all configurable dot1x global and port settings to their default values.Command ModeGlobal

Strany 338

Command Line Interface4-1144Defaultforce-authorizedCommand ModeInterface ConfigurationExampledot1x operation-modeThis command allows single or multipl

Strany 339 - Time Commands

Authentication Commands4-1154dot1x re-authenticateThis command forces re-authentication on all ports or a specific interface.Syntaxdot1x re-authentica

Strany 340

Command Line Interface4-1164Related Commandsdot1x timeout re-authperiod (4-116)dot1x timeout quiet-periodThis command sets the time that a switch port

Strany 341

Authentication Commands4-1174dot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication session

Strany 342

Command Line Interface4-1184Exampleshow dot1xThis command shows general port authentication related settings on the switch or a specific interface.Syn

Strany 343

Authentication Commands4-1194- max-req – Maximum number of times a port will retransmit an EAP request/identity packet to the client before it times o

Strany 344 - Switch Cluster Commands

Command Line Interface4-1204ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status

Strany 345

Authentication Commands4-1214Management IP Filter CommandsThis section describes commands used to configure IP management access to the switch.managem

Strany 346

Basic Configuration2-32Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a va

Strany 347

Command Line Interface4-1224ExampleThis example restricts management access to the indicated addresses.show managementThis command displays the client

Strany 348

General Security Measures4-1234General Security MeasuresThis switch supports many methods of segregating traffic for clients attached to each of the d

Strany 349 - SNMP Commands

Command Line Interface4-1244Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switch s

Strany 350

General Security Measures4-1254Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it

Strany 351

Command Line Interface4-1264Network Access (MAC Address Authentication)Network Access authentication controls access to the network by authenticating

Strany 352

General Security Measures4-1274Command Usage The maximum number of MAC addresses per port is 2048, and the maximum number of secure MAC addresses supp

Strany 353

Command Line Interface4-1284indicates untagged VLAN and “t” tagged VLAN. The “Tunnel-Type” attribute should be set to “VLAN,” and the “Tunnel-Medium-T

Strany 354

General Security Measures4-1294Examplemac-authentication max-mac-countUse this command to set the maximum number of MAC addresses that can be authenti

Strany 355

Command Line Interface4-1304Example show network-access mac-address-tableUse this command to display secure MAC address table entries.Syntaxshow netwo

Strany 356

General Security Measures4-1314Example DHCP Snooping CommandsDHCP snooping allows a switch to protect a network from rogue DHCP servers or other devic

Strany 357

Initial Configuration2-42Setting PasswordsNote: If this is your first time to log into the CLI program, you should define new passwords for both defau

Strany 358

Command Line Interface4-1324ip dhcp snoopingThis command enables DHCP snooping globally. Use the no form to restore the default setting.Syntax [no] ip

Strany 359

General Security Measures4-1334MAC address verification is enabled, then the packet will only be forwarded if the client’s hardware address stored in

Strany 360

Command Line Interface4-1344packet filtering will be performed on any untrusted ports within the VLAN as specified by the ip dhcp snooping trust comma

Strany 361

General Security Measures4-1354• Additional considerations when the switch itself is a DHCP client – The port(s) through which it submits a client req

Strany 362

Command Line Interface4-1364ip dhcp snooping information optionThis command enables the DHCP Option 82 information relay for the switch. Use the no fo

Strany 363

General Security Measures4-1374ip dhcp snooping information policyThis command sets the DHCP snooping information option policy for DHCP client packet

Strany 364 - Authentication Commands

Command Line Interface4-1384show ip dhcp snoopingThis command shows the DHCP snooping configuration settings.Command Mode Privileged ExecExampleshow i

Strany 365

General Security Measures4-1394IP Source Guard CommandsIP Source Guard is a security feature that filters IP traffic on network interfaces based on ma

Strany 366

Command Line Interface4-1404• When enabled, traffic is filtered based upon dynamic entries learned via DHCP snooping, or static addresses configured i

Strany 367

General Security Measures4-1414ip source-guard bindingThis command adds a static address to the source-guard binding table. Use the no form to remove

Strany 368 - Authentication Sequence

Basic Configuration2-52Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Strany 369

Command Line Interface4-1424Related Commands ip source-guard (4-139)ip dhcp snooping (4-132)ip dhcp snooping vlan (4-133)show ip source-guardThis comm

Strany 370

Access Control List Commands4-1434Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, pro

Strany 371 - RADIUS Client

Command Line Interface4-1444access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. Use the

Strany 372

Access Control List Commands4-1454permit, deny (Standard ACL) This command adds a rule to a Standard IP ACL. The rule sets a filter condition for pack

Strany 373

Command Line Interface4-1464permit, deny (Extended ACL) This command adds a rule to an Extended IP ACL. The rule sets a filter condition for packets w

Strany 374 - TACACS+ Client

Access Control List Commands4-1474Command Usage• All new rules are appended to the end of the list.• Address bitmasks are similar to a subnet mask, co

Strany 375

Command Line Interface4-1484Related Commandsaccess-list ip (4-144)show ip access-list This command displays the rules for configured IP ACLs.Syntaxsho

Strany 376

Access Control List Commands4-1494Example Related Commandsshow ip access-list (4-148)show ip access-groupThis command shows the ports assigned to IP A

Strany 377

Command Line Interface4-1504access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove the s

Strany 378 - AAA Commands

Access Control List Commands4-1514[no] {permit | deny} untagged-eth2{any|hostsource | source address-bitmask} {any|hostdestination | destination addre

Strany 379

Initial Configuration2-624. If network connections are normally slow, type “ip dhcp restart” to re-start broadcasting service requests. Press <Ente

Strany 380

Command Line Interface4-1524Example This rule permits packets from any source MAC address to the destination address 00-e0-29-94-34-de where the Ether

Strany 381

Access Control List Commands4-1534Example Related Commandsshow mac access-list (4-152)show mac access-groupThis command shows the ports assigned to MA

Strany 382

Command Line Interface4-1544ACL Informationshow access-listThis command shows all ACLs and associated rules.Command ModePrivileged ExecExample show ac

Strany 383

Interface Commands4-1554Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or

Strany 384

Command Line Interface4-1564Command Mode Global Configuration Example To specify port 24, enter the following command:descriptionThis command adds a d

Strany 385

Interface Commands4-1574Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex settin

Strany 386

Command Line Interface4-1584Command Usage • When auto-negotiation is enabled the switch will negotiate the best settings for a link based on the capab

Strany 387 - Web Server Commands

Interface Commands4-1594Command Usage When auto-negotiation is enabled with the negotiation command, the switch will negotiate the best settings for a

Strany 388

Command Line Interface4-1604• Avoid using flow control on a port connected to a hub unless it is actually required to solve a problem. Otherwise back

Strany 389

Interface Commands4-1614Default Setting All interfaces are enabled.Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage This com

Strany 390 - Telnet Server Commands

Basic Configuration2-72The default strings are:• public - with read-only access. Authorized management stations are only able to retrieve MIB objects.

Strany 391 - Secure Shell Commands

Command Line Interface4-1624Example The following shows how to configure broadcast storm control at 500 packets per second: clear countersThis command

Strany 392

Interface Commands4-1634show interfaces statusThis command displays the status for an interface.Syntax show interfaces status [interface]interface • e

Strany 393

Command Line Interface4-1644show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interface •

Strany 394

Interface Commands4-1654show interfaces switchportThis command displays the administrative and operational status of the specified interfaces.Syntax s

Strany 395

Command Line Interface4-1664 Private-VLAN Mode: NONE Private-VLAN host-association: NONE Private-VLAN Mapping: NONE 802.1Q-tunnel

Strany 396

Link Aggregation Commands4-1674Link Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth

Strany 397

Command Line Interface4-1684Dynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following criteria:• Ports must

Strany 398

Link Aggregation Commands4-1694lacpThis command enables 802.3ad Link Aggregation Control Protocol (LACP) for the current interface. Use the no form to

Strany 399

Command Line Interface4-1704ExampleThe following shows LACP enabled on ports 11-13. Because LACP has also been enabled on the ports at the other end o

Strany 400 - 802.1X Port Authentication

Link Aggregation Commands4-1714Command Mode Interface Configuration (Ethernet)Command Usage • Port must be configured with the same system priority to

Strany 401

Initial Configuration2-82Configuring Access for SNMP Version 3 ClientsTo configure management access for SNMPv3 clients, you need to first create a vi

Strany 402

Command Line Interface4-1724• Once the remote side of a link has been established, LACP operational settings are already in use on that side. Configur

Strany 403

Link Aggregation Commands4-1734lacp port-priorityThis command configures LACP port priority. Use the no form to restore the default setting.Syntax lac

Strany 404

Command Line Interface4-1744show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sysid}•

Strany 405

Link Aggregation Commands4-1754Console#show lacp 1 internalPort channel : 1-------------------------------------------------------------------------Op

Strany 406

Command Line Interface4-1764Console#show lacp 1 neighborsPort channel 1 neighbors---------------------------------------------------------------------

Strany 407

Link Aggregation Commands4-1774Console#show lacp sysidPort Channel System Priority System MAC Address------------------------------------------

Strany 408

Command Line Interface4-1784Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis com

Strany 409 - Management IP Filter Commands

Mirror Port Commands4-1794Example The following example configures the switch to mirror received packets from port 6 to 11:show port monitorThis comma

Strany 410

Command Line Interface4-1804RSPAN Mirroring CommandsRemote Switched Port Analyzer (RSPAN) allows you to mirror traffic from remote switches for analys

Strany 411

RSPAN Mirroring Commands4-1814has been configured, MAC address learning will still not be re-started on the RSPAN uplink ports. • IEEE 802.1X – RSPAN

Strany 412 - Port Security Commands

Managing System Files2-92Due to the size limit of the flash memory, the switch supports only two operation code files. However, you can have as many d

Strany 413

Command Line Interface4-1824• The source port and destination port cannot be configured on the same switch.Example The following example configures th

Strany 414

RSPAN Mirroring Commands4-1834Example The following example configures port 4 to receive mirrored RSPAN traffic:rspan remote vlanUse this command to s

Strany 415

Command Line Interface4-1844switchport allowed vlan command (page 4-226). Nor can GVRP dynamically add port members to an RSPAN VLAN. Also, note that

Strany 416

Rate Limit Commands4-1854Command Mode Privileged ExecExample Rate Limit CommandsThis function allows the network manager to control the maximum rate f

Strany 417

Command Line Interface4-1864Command Mode Interface Configuration (Ethernet, Port Channel)ExamplePower over Ethernet CommandsThe commands in this group

Strany 418

Power over Ethernet Commands4-1874Default Setting 375 wattsCommand Mode Global ConfigurationCommand Usage • Setting a maximum power budget for the swi

Strany 419 - DHCP Snooping Commands

Command Line Interface4-1884Example power inlineThis command instructs the switch to automatically detect if a PoE-compliant device is connected to th

Strany 420

Power over Ethernet Commands4-1894power inline maximum allocationThis command limits the power allocated to specific ports. Use the no form to restore

Strany 421

Command Line Interface4-1904Command Usage • If the power demand from devices connected to the switch exceeds the power budget setting, the switch uses

Strany 422

Power over Ethernet Commands4-1914show power inline statusThis command displays the current power status for all ports or for specific ports.Syntax sh

Strany 423

Initial Configuration2-102

Strany 424

Command Line Interface4-1924show power mainpowerUse this command to display the current power status for the switch.Command Mode Privileged ExecExampl

Strany 425

Power over Ethernet Commands4-1934mac-address-table staticThis command maps a static address to a destination port in a VLAN. Use the no form to remov

Strany 426

Command Line Interface4-1944clear mac-address-table dynamicThis command removes any learned entries from the forwarding database and clears the transm

Strany 427 - IP Source Guard Commands

Power over Ethernet Commands4-1954means to match a bit and “1” means to ignore a bit. For example, a mask of 00-00-00-00-00-00 means an exact match, a

Strany 428

Command Line Interface4-1964Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the swi

Strany 429

Spanning Tree Commands4-1974spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Synta

Strany 430

Command Line Interface4-1984Command Usage • Spanning Tree ProtocolUses RSTP for the internal state machine, but sends only 802.1D BPDUs. - This create

Strany 431 - Access Control List Commands

Spanning Tree Commands4-1994Default Setting 15 secondsCommand Mode Global ConfigurationCommand Usage This command sets the maximum time (in seconds) t

Strany 432

Command Line Interface4-2004spanning-tree max-ageThis command configures the spanning tree bridge maximum age globally for this switch. Use the no for

Strany 433

Spanning Tree Commands4-2014Default Setting 32768Command Mode Global ConfigurationCommand Usage Bridge priority is used in selecting the root device,

Strany 434

3-1Chapter 3: Configuring the SwitchUsing the Web InterfaceThis switch provides an embedded HTTP web agent. Using a web browser you can configure the

Strany 435

Command Line Interface4-2024spanning-tree transmission-limitThis command configures the minimum interval between the transmission of consecutive RSTP/

Strany 436

Spanning Tree Commands4-2034mst vlanThis command adds VLANs to a spanning tree instance. Use the no form to remove the specified VLANs. Using the no f

Strany 437 - MAC ACLs

Command Line Interface4-2044Default Setting 32768Command Mode MST ConfigurationCommand Usage • MST priority is used in selecting the root bridge and a

Strany 438

Spanning Tree Commands4-2054revisionThis command configures the revision number for this multiple spanning tree configuration of this switch. Use the

Strany 439

Command Line Interface4-2064bridge decrements the hop count by one before passing on the BPDU. When the hop count reaches zero, the message is dropped

Strany 440

Spanning Tree Commands4-2074Default Setting By default, the system automatically detects the speed and duplex mode used on each port, and configures t

Strany 441

Command Line Interface4-2084spanning-tree port-priorityThis command configures the priority for the specified interface. Use the no form to restore th

Strany 442 - ACL Information

Spanning Tree Commands4-2094devices such as workstations or servers, retains the current forwarding database to reduce the amount of frame flooding re

Strany 443 - Interface Commands

Command Line Interface4-2104Related Commandsspanning-tree edge-port (4-208)spanning-tree link-typeThis command configures the link type for Rapid Span

Strany 444

Spanning Tree Commands4-2114spanning-tree mst costThis command configures the path cost on a spanning instance in the Multiple Spanning Tree. Use the

Strany 445

vAbout This GuidePurposeThis guide gives specific information on how to operate and use the management functions of the switch.AudienceThe guide is in

Strany 446

Configuring the Switch3-23Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and password. The a

Strany 447

Command Line Interface4-2124spanning-tree mst port-priorityThis command configures the interface priority on a spanning instance in the Multiple Spann

Strany 448

Spanning Tree Commands4-2134Command Usage If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notification BPDUs,

Strany 449

Command Line Interface4-2144ExampleConsole#show spanning-treeSpanning-tree information---------------------------------------------------------------

Strany 450

VLAN Commands4-2154show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Command Mode Privileged Exec

Strany 451

Command Line Interface4-2164GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN information

Strany 452

VLAN Commands4-2174show bridge-extThis command shows the configuration for bridge extension commands.Default Setting NoneCommand Mode Privileged ExecC

Strany 453

Command Line Interface4-2184show gvrp configurationThis command shows if GVRP is enabled.Syntax show gvrp configuration [interface]interface • etherne

Strany 454

VLAN Commands4-2194Command Usage • Group Address Registration Protocol is used by GVRP and GMRP to register or deregister client attributes for client

Strany 455 - Link Aggregation Commands

Command Line Interface4-2204Related Commandsgarp timer (4-218)Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in

Strany 456

VLAN Commands4-2214vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [name vlan

Strany 457

Navigating the Web Browser Interface3-33Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration chang

Strany 458

Command Line Interface4-2224Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to conf

Strany 459

VLAN Commands4-2234switchport modeThis command configures the VLAN membership mode for a port. Use the no form to restore the default.Syntax switchpor

Strany 460

Command Line Interface4-2244switchport acceptable-frame-types This command configures the acceptable frame types for a port. Use the no form to restor

Strany 461

VLAN Commands4-2254• If ingress filtering is disabled and a port receives frames tagged for VLANs for which it is not a member, these frames will be f

Strany 462

Command Line Interface4-2264switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the defau

Strany 463

VLAN Commands4-2274switchport forbidden vlanThis command configures forbidden VLANs. Use the no form to remove the list of forbidden VLANs.Syntax swit

Strany 464

Command Line Interface4-2284Displaying VLAN Informationshow vlanThis command shows VLAN information.Syntax show vlan [id vlan-id | name vlan-name | pr

Strany 465

VLAN Commands4-2294Configuring IEEE 802.1Q TunnelingIEEE 802.1Q tunneling (QinQ tunneling) uses a single Service Provider VLAN (SPVLAN) for customers

Strany 466 - Mirror Port Commands

Command Line Interface4-2304reconfigured to overcome a break in the tree. It is therefore advisable to disable spanning tree on these ports.dot1q-tunn

Strany 467

VLAN Commands4-2314• When a tunnel uplink port receives a packet from a customer, the customer tag (regardless of whether there are one or more tag la

Strany 468 - RSPAN Mirroring Commands

Configuring the Switch3-43Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, o

Strany 469

Command Line Interface4-2324ExampleRelated Commandsshow interfaces switchport (4-165)show dot1q-tunnelThis command displays information about QinQ tun

Strany 470

VLAN Commands4-2334Configuring Port-based Traffic SegmentationIf tighter security is required for passing traffic from different clients through downl

Strany 471

Command Line Interface4-2344Examplepvlan up-link/down-linkThis command configures uplink/downlink ports for traffic-segmentation client sessions. Use

Strany 472

VLAN Commands4-2354ExampleConfiguring Private VLANsPrivate VLANs provide port-based security and isolation of local ports contained within different p

Strany 473 - Rate Limit Commands

Command Line Interface4-2364To configure primary/community associated groups, follow these steps:1. Use the private-vlan command to designate one or m

Strany 474 - Power over Ethernet Commands

VLAN Commands4-2374Exampleprivate vlan associationUse this command to associate a primary VLAN with a secondary (i.e., community) VLAN. Use the no for

Strany 475

Command Line Interface4-2384switchport mode private-vlanUse this command to set the private VLAN mode for an interface. Use the no form to restore the

Strany 476

VLAN Commands4-2394Command UsageAll ports assigned to a secondary (i.e., community) VLAN can pass traffic between group members, but must communicate

Strany 477

Command Line Interface4-2404Default Setting NoneCommand Mode Privileged Executive ExampleConfiguring Protocol-based VLANsThe network devices required

Strany 478

VLAN Commands4-2414Ethernet traffic must not be mapped to another VLAN or you will lose administrative network connectivity to the switch. If lost in

Strany 479

Navigating the Web Browser Interface3-53SNMPv3 3-43Engine ID Sets the SNMP v3 engine ID on this switch 3-43Remote Engine ID Sets the SNMP v3 engine ID

Strany 480 - Address Table Commands

Command Line Interface4-2424Default Setting No protocol groups are mapped for any interface.Command Mode Interface Configuration (Ethernet, Port Chann

Strany 481

VLAN Commands4-2434Example This shows protocol group 1 configured for IP over Ethernet:show interfaces protocol-vlan protocol-groupThis command shows

Strany 482

Command Line Interface4-2444Class of Service CommandsThe commands described in this section allow you to specify which data packets have greater prece

Strany 483

Class of Service Commands4-2454queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (C

Strany 484 - Spanning Tree Commands

Command Line Interface4-2464Default Setting The priority is not set, and the default value for untagged frames received on the interface is zero.Comma

Strany 485 -

Class of Service Commands4-2474Default Setting Weights 1, 2, 4, 8 are assigned to queues 0-3 respectively.Command Mode Interface Configuration (Ethern

Strany 486

Command Line Interface4-2484Default Setting This switch supports Class of Service by using four priority queues, with Weighted Round Robin queuing for

Strany 487

Class of Service Commands4-2494show queue bandwidthThis command displays the weighted round-robin (WRR) bandwidth allocation for the four priority que

Strany 488

Command Line Interface4-2504Priority Commands (Layer 3 and 4) map ip port (Global Configuration)This command enables IP port mapping (i.e., class of s

Strany 489

Class of Service Commands4-2514map ip port (Interface Configuration)This command sets IP port priority (i.e., TCP/UDP port priority). Use the no form

Strany 490

Configuring the Switch3-63 802.1X Port authentication 3-80Information Displays global configuration settings 3-82Configuration Configures the global

Strany 491

Command Line Interface4-2524Example The following example shows how to enable IP precedence mapping globally:map ip precedence (Interface Configuratio

Strany 492

Class of Service Commands4-2534Default Setting DisabledCommand Mode Global ConfigurationCommand Usage The precedence for priority mapping is IP DSCP,

Strany 493

Command Line Interface4-2544Command Usage • The precedence for priority mapping is IP DSCP, and default switchport priority. • DSCP priority values ar

Strany 494

Class of Service Commands4-2554show map ip precedenceThis command shows the IP precedence priority map.Syntax show map ip precedence [interface]interf

Strany 495

Command Line Interface4-2564Command Mode Privileged ExecExample Related Commands map ip dscp (Global Configuration) (4-252)map ip dscp (Interface Conf

Strany 496

Quality of Service Commands4-2574Quality of Service CommandsThe commands described in this section are used to configure Differentiated Services (Diff

Strany 497

Command Line Interface4-25845. Use the set command to modify the QoS value for matching traffic class, and use the policer command to monitor the aver

Strany 498

Quality of Service Commands4-2594matchThis command defines the criteria used to classify traffic. Use the no form to delete the matching criteria.Synt

Strany 499

Command Line Interface4-2604renameThis command redefines the name of a class map or policy map.Syntax rename map-namemap-name - Name of the class map

Strany 500

Quality of Service Commands4-2614policy-mapThis command creates a policy map that can be attached to multiple interfaces, and enters Policy Map config

Strany 501

Navigating the Web Browser Interface3-73Power Config Configures the power budget for the switch 3-136Power Port Status Displays the status of port pow

Strany 502

Command Line Interface4-2624Command Mode Policy Map ConfigurationCommand Usage • Use the policy-map command to specify a policy map and enter Policy M

Strany 503 - VLAN Commands

Quality of Service Commands4-2634incoming packets will receive, and then uses the police command to limit the average bandwidth to 100,000 Kbps, the b

Strany 504

Command Line Interface4-2644service-policyThis command applies a policy map defined by the policy-map command to the ingress queue of a particular int

Strany 505

Quality of Service Commands4-2654Exampleshow policy-map This command displays the QoS policy maps which define classification criteria for incoming tr

Strany 506

Command Line Interface4-2664Command Mode Privileged ExecExample Multicast Filtering CommandsThis switch uses IGMP (Internet Group Management Protocol)

Strany 507

Multicast Filtering Commands4-2674ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Strany 508 - Editing VLAN Groups

Command Line Interface4-2684ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Syntax i

Strany 509

Multicast Filtering Commands4-2694• The IGMP snooping leave-proxy feature suppresses all unnecessary IGMP leave messages so that the non-querier switc

Strany 510 - Configuring VLAN Interfaces

Command Line Interface4-2704ExampleThe following shows how to enable immediate leave. show ip igmp snoopingThis command shows the IGMP snooping config

Strany 511

Multicast Filtering Commands4-2714Command Mode Privileged ExecCommand Usage Member types displayed include IGMP or USER, depending on selected options

Strany 512

Configuring the Switch3-83Trunk Configuration Specifies default trunk VID and VLAN attributes 3-176Tunnel Port Configuration Adds ports to a QinQ tun

Strany 513

Command Line Interface4-2724Command Usage • IGMP snooping querier is not supported for IGMPv3 snooping (see ip igmp snooping version, page 4-268).• If

Strany 514

Multicast Filtering Commands4-2734ip igmp snooping query-intervalThis command configures the query interval. Use the no form to restore the default.Sy

Strany 515

Command Line Interface4-2744Example The following shows how to configure the maximum response time to 20 seconds:Related Commands ip igmp snooping ver

Strany 516 - Displaying VLAN Information

Multicast Filtering Commands4-2754Static Multicast Routing CommandsThis section describes commands used to configure static multicast routing on the s

Strany 517

Command Line Interface4-2764show ip igmp snooping mrouter This command displays information on statically configured and dynamically learned multicast

Strany 518

Multicast Filtering Commands4-2774IGMP Filtering and Throttling CommandsIn certain switch applications, the administrator may want to control the mult

Strany 519

Command Line Interface4-2784• The IGMP filtering feature operates in the same manner when MVR is used to forward multicast traffic.Example ip igmp pro

Strany 520

Multicast Filtering Commands4-2794• When the access mode is set to permit, IGMP join reports are processed when a multicast group falls within the con

Strany 521

Command Line Interface4-2804Command Mode Interface ConfigurationCommand Usage • The IGMP filtering profile must first be created with the ip igmp prof

Strany 522

Multicast Filtering Commands4-2814Example ip igmp max-groups actionThis command sets the IGMP throttling action for an interface on the switch. Syntax

Strany 523

Navigating the Web Browser Interface3-93IGMP Immediate Leave Enables the immediate leave function 3-212Multicast Router Port InformationDisplays the p

Strany 524

Command Line Interface4-2824Command Mode Privileged ExecExample show ip igmp profileThis command displays IGMP filtering profiles created on the switc

Strany 525

Multicast Filtering Commands4-2834show ip igmp throttle interfaceThis command displays the interface settings for IGMP throttling. Syntax show ip igmp

Strany 526

Command Line Interface4-2844Multicast VLAN Registration CommandsThis section describes commands used to configure Multicast VLAN Registration (MVR). A

Strany 527

Multicast Filtering Commands4-2854Command Mode Global ConfigurationCommand Usage • Use the mvr group command to statically configure all multicast gro

Strany 528

Command Line Interface4-2864mvr (Interface Configuration)This command configures an interface as an MVR receiver or source port using the type keyword

Strany 529

Multicast Filtering Commands4-2874• Immediate leave applies only to receiver ports. When enabled, the receiver port is immediately removed from the mu

Strany 530

Command Line Interface4-2884Default Setting Displays global configuration settings for MVR when no keywords are used.Command Mode Privileged ExecComma

Strany 531

Multicast Filtering Commands4-2894The following shows information about the interfaces associated with multicast groups assigned to the MVR VLAN:Statu

Strany 532 - Class of Service Commands

Command Line Interface4-2904Domain Name Service CommandsThese commands are used to configure Domain Naming System (DNS) services. Entries can be manua

Strany 533

Domain Name Service Commands4-2914Command Usage Servers or other network devices may support one or more connections via multiple IP addresses. If mor

Strany 534

Configuring the Switch3-103Binding Information Displays the DHCP Snooping binding information 3-106IP Source Guard 3-107Port Configuration Enables IP

Strany 535

Command Line Interface4-2924Default Setting NoneCommand Mode Global ConfigurationExampleRelated Commands ip domain-list (4-292)ip name-server (4-293)i

Strany 536

Domain Name Service Commands4-2934ExampleThis example adds two domain names to the current list and then displays the list.Related Commands ip domain-

Strany 537

Command Line Interface4-2944ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (4

Strany 538

Domain Name Service Commands4-2954Related Commands ip domain-name (4-291)ip name-server (4-293)show hostsThis command displays the static host name-to

Strany 539

Command Line Interface4-2964show dns cacheThis command displays entries in the DNS cache.Command Mode Privileged ExecExample clear dns cacheThis comma

Strany 540

IP Interface Commands4-2974IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for

Strany 541

Command Line Interface4-2984• If you select the bootp or dhcp option, IP is enabled but will not function until a BOOTP or DHCP reply has been receive

Strany 542

IP Interface Commands4-2994Related Commands show ip redirects (4-300)ip dhcp restart This command submits a BOOTP or DHCP client request.Default Setti

Strany 543

Command Line Interface4-3004Related Commands show ip redirects (4-300)show ip redirectsThis command shows the default gateway configured for this devi

Strany 544

IP Interface Commands4-3014• Press <Esc> to stop pinging.Example Related Commands interface (4-155)Console#ping 10.1.0.9Type ESC to abort.PING t

Strany 545 - Quality of Service Commands

Basic Configuration3-113Basic ConfigurationThis section describes the basic functions required to set up management access to the switch, display or u

Strany 546

Command Line Interface4-3024

Strany 547

A-1Appendix A: Software SpecificationsSoftware FeaturesAuthentication and General Security MeasuresLocal, RADIUS, TACACS, Port (802.1X, MAC Authentica

Strany 548

Software SpecificationsA-2AMulticast Filtering IGMP Snooping (Layer 2)Multicast VLAN RegistrationQuality of ServiceDiffServ supports class maps, polic

Strany 549

Management Information BasesA-3ADHCP Client (RFC 2131)DHCP Options (RFC 2132)HTTPS IGMP (RFC 1112)IGMPv2 (RFC 2236)IGMPv3 (RFC 3376) - partial support

Strany 550

Software SpecificationsA-4ASNMP View Based ACM MIB (RFC 3415)TACACS+ Authentication Client MIBTCP MIB (RFC 2013)Trap (RFC 1215)UDP MIB (RFC 2013)

Strany 551

B-1Appendix B: Troubleshooting Problems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet,

Strany 552

TroubleshootingB-2BUsing System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caus

Strany 553

Glossary-1GlossaryAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Strany 554 - Multicast Filtering Commands

GlossaryGlossary-2DHCP SnoopingA technique used to enhance network security by snooping on DHCP server messages to track the physical location of host

Strany 555

Glossary-3GlossaryIEEE 802.1pAn IEEE standard for providing quality of service (QoS) in Ethernet networks. The standard uses packet tags that define u

Strany 557

Configuring the Switch3-123Web – Click System, System Information. Specify the system name, location, and contact information for the system administr

Strany 558

GlossaryGlossary-4IP Multicast FilteringA process whereby this switch can pass multicast traffic along to participating hosts.IP PrecedenceThe Type of

Strany 559 - IGMP Query Commands (Layer 2)

Glossary-5GlossaryMultiple Spanning Tree Protocol (MSTP)MSTP can provide an independent spanning tree for different VLANs. It simplifies network manag

Strany 560

GlossaryGlossary-6Remote Monitoring (RMON)RMON provides comprehensive network monitoring capabilities. It eliminates the polling required in standard

Strany 561

Glossary-7GlossaryTransmission Control Protocol/Internet Protocol (TCP/IP)Protocol suite that includes TCP as the primary transport protocol, and IP a

Strany 562

GlossaryGlossary-8

Strany 563

Index-1Numerics802.1Q tunnel 3-178, 4-229access 3-183, 4-230configuration, guidelines 3-181configuration, limitations 3-180description 3-178ethernet t

Strany 564

Index-2IndexDdefault gateway, configuration 3-16, 4-298default priority, ingress port 3-189, 4-245default settings, system 1-6DHCP 3-18, 4-297client 3

Strany 565

Index-3IndexIGMPfilter profiles, configuration 3-219, 4-277filter, parameters 3-219, 4-277filtering & throttling, creating profile 3-218, 4-278fil

Strany 566

Index-4IndexMSTP 3-158, 4-197configuring 3-158, 4-202–4-213global settings, configuring 3-147, 3-158, 4-196, 4-203–4-205global settings, displaying 3-

Strany 567

Index-5Indexproblems, troubleshooting B-1profiles, IGMP filter 3-219, 4-278promiscuous ports 4-235protocol migration 3-156, 4-212protocol VLANs 3-185,

Strany 568

Basic Configuration3-133Displaying Switch Hardware/Software Versions Use the Switch Information page to display hardware/firmware version numbers for

Strany 569

Index-6IndexSTA 3-142, 4-196edge port 3-153, 3-156, 4-208global settings, configuring 3-147, 4-197–4-202global settings, displaying 3-144, 4-213interf

Strany 570

Index-7IndexVVLANs 3-164, 3-185, 3-189, 4-215, 4-228802.1Q tunnel mode 3-183, 4-230adding static members 3-173, 3-175, 4-226creating 3-170, 4-221descr

Strany 571

Index-8Index

Strany 573

149100000023A R01SMC8126PL2-F

Strany 574

Configuring the Switch3-143CLI – Use the following command to display version information.Console#show version 4-22Unit 1Unit 1 Serial Number:

Strany 575

Basic Configuration3-153Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filterin

Strany 576

Configuring the Switch3-163CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP interface

Strany 577

Basic Configuration3-173Manual ConfigurationWeb – Click System, IP Configuration. Select the VLAN through which the management station is attached, se

Strany 578 - Domain Name Service Commands

Configuring the Switch3-183Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by

Strany 579

Basic Configuration3-193Renewing DCHP – DHCP may lease addresses to clients indefinitely or for a specific period of time. If the address expires or t

Strany 580

Configuring the Switch3-203Managing FirmwareJust specify the method of file transfer, along with the file type and file names as required. By saving r

Strany 581

Basic Configuration3-213Web –Click System, File Management, Copy Operation. Select “tftp to file” as the file transfer method, enter the IP address of

Strany 582

viiContents Chapter 1: Introduction 1-1Key Features 1-1Description of Software Features 1-2System Defaults 1-6Chapter 2: Initial Configuration 2

Strany 583

Configuring the Switch3-223CLI – To download new firmware form a TFTP server, enter the IP address of the TFTP server, select “opcode” as the file typ

Strany 584

Basic Configuration3-233Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set it

Strany 585 - IP Interface Commands

Configuring the Switch3-243CLI – Enter the IP address of the TFTP server, specify the source file on the server, set the startup file name on the swit

Strany 586

Basic Configuration3-253• Speed – Sets the terminal line’s baud rate for transmit (to terminal) and receive (from terminal). Set the speed to match th

Strany 587

Configuring the Switch3-263CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the cur

Strany 588

Basic Configuration3-273• Password2 – Specifies a password for the line connection. When a connection is started on a line with password protection, t

Strany 589

Configuring the Switch3-283Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events that

Strany 590

Basic Configuration3-293Web – Click System, Log, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM and flash

Strany 591 - Software Features

Configuring the Switch3-303• Host IP Address – Specifies a new server IP address to add to the Host IP List.Web – Click System, Log, Remote Logs. To a

Strany 592 - Standards

Basic Configuration3-313Displaying Log MessagesThe Logs page allows you to scroll through the logged system and event messages. The switch can store u

Strany 593 - Management Information Bases

ContentsviiiSaving or Restoring Configuration Settings 3-22Downloading Configuration Settings from a Server 3-23Console Port Settings 3-24Telnet Se

Strany 594 - Software Specifications

Configuring the Switch3-323• SMTP Server – Specifies a new SMTP server address to add to the SMTP Server List.• Email Destination Address List – Speci

Strany 595 - Appendix B: Troubleshooting

Basic Configuration3-333CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specify

Strany 596 - Using System Logs

Configuring the Switch3-343CLI – Use the reload command to restart the switch. When prompted, confirm that you want to reset the switch.When restartin

Strany 597 - Glossary

Basic Configuration3-353Setting the System ClockSimple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic upda

Strany 598

Configuring the Switch3-363Web – Select SNTP, Configuration. Modify any of the required parameters, and click Apply.Figure 3-22 SNTP ConfigurationCLI

Strany 599

Simple Network Management Protocol3-373Web – Select SNTP, Clock Time Zone. Set the offset for your time zone relative to the UTC, and click Apply.Figu

Strany 600

Configuring the Switch3-383Access to the switch using from clients using SNMPv3 provides additional security features that cover message integrity, au

Strany 601

Simple Network Management Protocol3-393Enabling the SNMP AgentEnables SNMPv3 service for all management clients (i.e., versions 1, 2c, 3).Command Attr

Strany 602

Configuring the Switch3-403Web – Click SNMP, Configuration. Add new community strings as required, select the access rights from the Access Mode drop-

Strany 603

Simple Network Management Protocol3-413To send an inform to a SNMPv2c host, complete these steps:1. Enable the SNMP agent (3-39).2. Enable trap inform

Strany 604 - Glossary-8

ContentsixGenerating the Host Key Pair 3-77Configuring the SSH Server 3-79Configuring 802.1X Port Authentication 3-80Displaying 802.1X Global Sett

Strany 605 - Numerics

Configuring the Switch3-423• Enable Authentication Traps3 – Issues a notification message to specified IP trap managers whenever an invalid community

Strany 606

Simple Network Management Protocol3-433Configuring SNMPv3 Management AccessTo configure SNMPv3 management access to the switch, follow these steps:1.

Strany 607

Configuring the Switch3-443Specifying a Remote Engine IDTo send inform messages to an SNMPv3 user on a remote device, you must first specify the engin

Strany 608

Simple Network Management Protocol3-453Configuring SNMPv3 Users Each SNMPv3 user is defined by a unique name. Users must be configured with a specific

Strany 609

Configuring the Switch3-463Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and assign it to a

Strany 610

Simple Network Management Protocol3-473Configuring Remote SNMPv3 Users Each SNMPv3 user is defined by a unique name. Users must be configured with a s

Strany 611

Configuring the Switch3-483Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a name and assign

Strany 612

Simple Network Management Protocol3-493Configuring SNMPv3 Groups An SNMPv3 group sets the access policy for its assigned users, restricting them to sp

Strany 613

Configuring the Switch3-503linkDown*1.3.6.1.6.3.1.1.5.3 A linkDown trap signifies that the SNMP entity, acting in an agent role, has detected that the

Strany 614

Simple Network Management Protocol3-513Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, ass

Komentáře k této Příručce

Žádné komentáře