Edge-Core ES3528M-PoE Installation Guide

Browse online or download Installation Guide for Networking Edge-Core ES3528M-PoE. Edge-Core ES3528M-PoE Installation guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 694
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
Powered by Accton
www.edge-core.com
Management Guide
ES3528M-PoE
Fast Ethernet Switch
Page view 0
1 2 3 4 5 6 ... 693 694

Summary of Contents

Page 1 - Powered by Accton

Powered by Acctonwww.edge-core.comManagement GuideES3528M-PoEFast Ethernet Switch

Page 2

ContentsxConfiguring Parameters for LACP Group Members 3-137Configuring Parameters for LACP Groups 3-140Displaying LACP Port Counters 3-141Displayi

Page 3 - Fast Ethernet Switch

Configuring the Switch3-503Configuring Remote SNMPv3 Users Each SNMPv3 user is defined by a unique name. Users must be configured with a specific secu

Page 4 - 149100041600A

Simple Network Management Protocol3-513Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a name

Page 5 - About This Guide

Configuring the Switch3-523Configuring SNMPv3 Groups An SNMPv3 group sets the access policy for its assigned users, restricting them to specific read,

Page 6

Simple Network Management Protocol3-533linkDown*1.3.6.1.6.3.1.1.5.3 A linkDown trap signifies that the SNMP entity, acting in an agent role, has detec

Page 7

Configuring the Switch3-543Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, assign a securi

Page 8

Simple Network Management Protocol3-553CLI – Use the snmp-server group command to configure a new group, specifying the security model and level, and

Page 9

Configuring the Switch3-563Web – Click SNMP, SNMPv3, Views. Click New to configure a new view. In the New View page, define a name and specify OID sub

Page 10

User Authentication3-573CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces table, and the

Page 11

Configuring the Switch3-583Configuring User AccountsThe guest only has read access for most configuration parameters. However, the administrator has w

Page 12

User Authentication3-593Web – Click Security, User Accounts. To configure a new user account, specify a user name, select the user’s access level, the

Page 13

ContentsxiConfiguring Private VLANs 3-207Associating VLANs 3-208Displaying Private VLAN Interface Information 3-209Configuring Private VLAN Interf

Page 14

Configuring the Switch3-603multiple user name/password pairs with associated privilege levels for each user that requires management access to the swi

Page 15

User Authentication3-613- Accounting Port Number – UDP port on authentication server used for accounting messages. (Range: 1-65535; Default: 1813)- Nu

Page 16

Configuring the Switch3-623Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authent

Page 17

User Authentication3-633CLI – Specify all the required parameters to enable logon authentication.Console(config)#authentication login radius 4-98Conso

Page 18

Configuring the Switch3-643Configuring Encryption KeysThe Encryption Key feature provides a central location for the management of all RADIUS and TACA

Page 19

User Authentication3-653- Secret Text String – Encryption key used to authenticate logon access for client. Do not use blank spaces in the string. (Ma

Page 20

Configuring the Switch3-663AAA Authorization and AccountingThe Authentication, authorization, and accounting (AAA) feature provides the main framework

Page 21

User Authentication3-673Configuring AAA RADIUS Group SettingsThe AAA RADIUS Group Settings screen defines the configured RADIUS servers to use for acc

Page 22

Configuring the Switch3-683Configuring AAA TACACS+ Group SettingsThe AAA TACACS+ Group Settings screen defines the configured TACACS+ servers to use f

Page 23

User Authentication3-6933-59). Any other group name refers to a server group configured on the RADIUS or TACACS+ Group Settings pages.Web – Click Secu

Page 24 - Contents

ContentsxiiConfiguring IGMP Filtering and Throttling for Interfaces 3-261Multicast VLAN Registration 3-263Configuring Global MVR Settings 3-264Dis

Page 25

Configuring the Switch3-703AAA Accounting UpdateThis feature sets the interval at which accounting updates are sent to accounting servers.Command Attr

Page 26

User Authentication3-713AAA Accounting 802.1X Port SettingsThis feature applies the specified accounting method to an interface.Command Attributes• Po

Page 27

Configuring the Switch3-723AAA Accounting Exec Command PrivilegesThis feature specifies a method name to apply to commands entered at specific CLI pri

Page 28

User Authentication3-733AAA Accounting Exec SettingsThis feature specifies a method name to apply to console and Telnet connections.Command Attributes

Page 29

Configuring the Switch3-743Web – Click Security, AAA, Summary. Figure 3-42 AAA Accounting SummaryCLI – Use the following command to display the curre

Page 30

User Authentication3-753Authorization SettingsAAA authorization is a feature that verifies a user has access to specific services.Command Attributes•

Page 31

Configuring the Switch3-763Authorization EXEC SettingsThis feature specifies an authorization method name to apply to console and Telnet connections.C

Page 32

User Authentication3-773Authorization SummaryThe Authorization Summary displays the configured authorization methods and the interfaces to which they

Page 33 - Chapter 1: Introduction

Configuring the Switch3-783Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Sock

Page 34 - Introduction

User Authentication3-793Web – Click Security, HTTPS Settings. Enable HTTPS and specify the port number, then click Apply.Figure 3-46 HTTPS SettingsCL

Page 35

Contentsxiiiquit 4-16System Management Commands 4-16Device Designation Commands 4-17hostname 4-17Banner Information Commands 4-18banner configure

Page 36

Configuring the Switch3-803• Private Password – Password stored in the private key file. This password is used to verify authorization for certificate

Page 37

User Authentication3-813Notes: 1. You need to install an SSH client on the management station to access the switch for management via the SSH protocol

Page 38 - System Defaults

Configuring the Switch3-8236. Authentication – One of the following authentication methods is employed:Password Authentication (for SSH v1.5 or V2 Cli

Page 39

User Authentication3-833Generating the Host Key PairA host public/private key pair is used to provide secure communications between an SSH client and

Page 40

Configuring the Switch3-843Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to save th

Page 41 - Connecting to the Switch

User Authentication3-853Importing User Public KeysA user’s Public Key must be uploaded to the switch in order for the user to be able to log in using

Page 42 - Required Connections

Configuring the Switch3-863Web – Click Security, SSH, SSH User Public-Key Settings. Select the user name and the public-key type from the respective d

Page 43 - Basic Configuration

User Authentication3-873CLI – This example imports an SSHv2 DSA public key for the user admin and then displays admin’s imported public keys. Note tha

Page 44 - Setting an IP Address

Configuring the Switch3-883• SSH Authentication Retries – Specifies the number of authentication attempts that a client is allowed before authenticati

Page 45 - Dynamic Configuration

User Authentication3-893Configuring 802.1X Port Authentication Network switches can provide open and easy access to network resources by simply attach

Page 46 - Initial Configuration

Contentsxivshow line 4-48Event Logging Commands 4-49logging on 4-49logging history 4-50logging host 4-51logging facility 4-51logging trap 4-52c

Page 47 - Trap Receivers

Configuring the Switch3-903• Each switch port that will be used must be set to dot1X “Auto” mode.• Each client that needs to be authenticated must hav

Page 48 - Managing System Files

User Authentication3-913Configuring 802.1X Global SettingsThe 802.1X protocol provides port-based client authentication. The 802.1X protocol must be e

Page 49 - Saving Configuration Settings

Configuring the Switch3-923• Re-authentication – Sets the client to be re-authenticated after the interval specified by the Re-authentication Period.

Page 50

User Authentication3-933CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields displayed in this example,

Page 51 - Using the Web Interface

Configuring the Switch3-943Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Table 3-7 802.1X

Page 52 - Home Page

User Authentication3-953Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to update the statisti

Page 53 - Panel Display

Configuring the Switch3-963• IP address can be configured for SNMP, web and Telnet access respectively. Each of these groups can include up to five di

Page 54 - Main Menu

General Security Measures3-973CLI – This example allows SNMP access for a specific client.General Security Measures This switch supports many methods

Page 55

Configuring the Switch3-983• IP Source Guard – Filters untrusted DHCP messages on unsecure ports by building and maintaining a DHCP snooping binding t

Page 56

General Security Measures3-993• Security Status – Enables or disables port security on the port. (Default: Disabled)• Max MAC Count – The maximum numb

Page 57

ContentsxvUPnP Commands 4-77upnp device 4-78upnp device ttl 4-78upnp device advertise duration 4-79show upnp 4-79Debug Commands 4-80debug spa

Page 58

Configuring the Switch3-1003Configuring Web AuthenticationWeb authentication is configured on a per-port basis, however there are four configurable pa

Page 59

General Security Measures3-1013Configuring Web Authentication for PortsWeb authentication is configured on a per-port basis. The following parameters

Page 60

Configuring the Switch3-1023Displaying Web Authentication Port InformationThis switch can display web authentication information for all ports and con

Page 61

General Security Measures3-1033Web – Click Security, Web Authentication, Re-authentication.Figure 3-60 Web Authentication Port Re-authenticationCLI –

Page 62

Configuring the Switch3-1043• Configured static MAC addresses are added to the secure address table when seen on a switch port. Static addresses are t

Page 63

General Security Measures3-1053CLI – This example sets and displays the reauthentication time. Configuring MAC Authentication for PortsConfigures MAC

Page 64

Configuring the Switch3-1063Note: MAC authentication cannot be configured on trunk ports. Ports configured as trunk members are indicated on the Netwo

Page 65

General Security Measures3-1073Displaying Secure MAC Address InformationAuthenticated MAC addresses are stored in the secure MAC address table. Inform

Page 66

Configuring the Switch3-1083CLI – This example displays all entries currently in the secure MAC address table. Access Control Lists Access Control Lis

Page 67

General Security Measures3-1093- Extended – IP ACL mode that filters packets based on source or destination IP address, as well as protocol type and p

Page 68 - Manual Configuration

ContentsxviAAA Commands 4-109aaa group server 4-109server 4-110aaa accounting dot1x 4-111aaa accounting exec 4-112aaa accounting commands 4-113aa

Page 69 - Using DHCP/BOOTP

Configuring the Switch3-1103Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,” enter a

Page 70 - Enabling Jumbo Frames

General Security Measures3-1113• Source/Destination Port Bitmask – Decimal number representing the port bits to match. (Range: 0-65535)• Control Code

Page 71 - Managing Firmware

Configuring the Switch3-1123Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type

Page 72

General Security Measures3-1133Configuring a MAC ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Source/D

Page 73

Configuring the Switch3-1143Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type

Page 74

General Security Measures3-1153Binding a Port to an Access Control ListAfter configuring the Access Control Lists (ACL), you can bind the ports that n

Page 75 - Console Port Settings

Configuring the Switch3-1163Command Usage• Network traffic may be disrupted when malicious DHCP messages are received from an outside source. DHCP sno

Page 76

General Security Measures3-1173configured as trusted. Note that the switch will not add a dynamic entry for itself to the binding table when it receiv

Page 77 - Telnet Settings

Configuring the Switch3-1183• When DHCP snooping is globally enabled, and DHCP snooping is then disabled on a VLAN, all dynamic bindings learned for t

Page 78

General Security Measures3-1193• In some cases, the switch may receive DHCP packets from a client that already includes DHCP Option 82 information. Th

Page 79 - Configuring Event Logging

ContentsxviiManagement IP Filter Commands 4-140management 4-140show management 4-141General Security Measures 4-142Port Security Commands 4-143por

Page 80 - Remote Log Configuration

Configuring the Switch3-1203Configuring Ports for DHCP SnoopingUse the DHCP Snooping Port Configuration page to configure switch ports as trusted or u

Page 81

General Security Measures3-1213CLI – This example shows how to enable the DHCP Snooping Trust Status for ports.Displaying DHCP Snooping Binding Inform

Page 82 - Displaying Log Messages

Configuring the Switch3-1223Web – Click DHCP Snooping, DHCP Snooping Binding Information. Figure 3-73 DHCP Snooping Binding InformationCLI – This exa

Page 83

General Security Measures3-1233• If IP source guard is enabled, an inbound packet’s IP address (sip option) or both its IP address and corresponding M

Page 84 - Resetting the System

Configuring the Switch3-1243CLI – This example shows how to enable IP source guard on port 5 to check the source IP address for ingress packets agains

Page 85 - Setting the System Clock

General Security Measures3-1253Web – Click IP Source Guard, Static Configuration. Select the VLAN and port to which the entry will be bound, enter the

Page 86 - Configuring SNTP

Configuring the Switch3-1263Web – Click IP Source Guard, Dynamic Information. Figure 3-76 Dynamic IP Source Guard Binding InformationCLI – This exam

Page 87 - Configuring NTP

Port Configuration3-1273Port ConfigurationDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the curre

Page 88

Configuring the Switch3-1283Field Attributes (CLI)Basic Information:• Port type – Indicates the port type. (100BASE-TX, 1000BASE-T, or SFP)• MAC addre

Page 89 - Setting the Time Zone

Port Configuration3-1293Current Status:• Link Status – Indicates if the link is up or down.• Port Operation Status – Provides detailed information on

Page 90

ContentsxviiiAccess Control List Commands 4-170IP ACLs 4-170access-list ip 4-171permit, deny (Standard ACL) 4-172permit, deny (Extended ACL) 4-

Page 91 - Enabling SNMP Agent Status

Configuring the Switch3-1303trunk. If not used, the success of the link process cannot be guaranteed when connecting to other types of switches. Howev

Page 92

Port Configuration3-1313back pressure is used for half-duplex operation and IEEE 802.3-2005 (formally IEEE 802.3x) for full-duplex operation.Avoid usi

Page 93

Configuring the Switch3-1323CLI – Select the interface, and then enter the required settings.Console(config)#interface ethernet 1/13 4-182Console(conf

Page 94

Port Configuration3-1333Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offe

Page 95

Configuring the Switch3-1343Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of diffe

Page 96 - Setting the Local Engine ID

Port Configuration3-1353CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch to

Page 97 - Specifying a Remote Engine ID

Configuring the Switch3-1363Command Attributes • Member List (Current) – Shows configured trunks (Port).• New – Includes entry fields for creating new

Page 98 - Configuring SNMPv3 Users

Port Configuration3-1373CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another swi

Page 99

Configuring the Switch3-1383Command Attributes Set Port Actor – This menu sets the local side of an aggregate link; i.e., the ports on this switch.• P

Page 100 - Configuring the Switch

Port Configuration3-1393Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can op

Page 101

Contentsxixpower inline priority 4-208show power inline status 4-209show power mainpower 4-210Mirror Port Commands 4-211port monitor 4-211show po

Page 102 - Configuring SNMPv3 Groups

Configuring the Switch3-1403CLI – The following example configures LACP parameters for ports 1-4. Ports 1-4 are used as active members of the LAG.Conf

Page 103

Port Configuration3-1413Web – Click Port, LACP, Aggregator. Set the Admin Key for the required LACP group, and click Apply.Figure 3-82 LACP Aggregati

Page 104

Configuring the Switch3-1423Web – Click Port, LACP, Port Counters Information. Select a member port to display the corresponding information.Figure 3-

Page 105 - Setting SNMPv3 Views

Port Configuration3-1433Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 3-84

Page 106

Configuring the Switch3-1443CLI – The following example displays the LACP configuration settings and operational state for the local side of port chan

Page 107 - User Authentication

Port Configuration3-1453Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information.Figure 3-85

Page 108 - Configuring User Accounts

Configuring the Switch3-1463Setting Broadcast Storm ThresholdsBroadcast storms may occur when a device on your network is malfunctioning, or if applic

Page 109

Port Configuration3-1473Web – Click Port, Port/Trunk Broadcast Control. Set the threshold and mark the Enabled field for the required interface, then

Page 110

Configuring the Switch3-1483Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can the

Page 111

Port Configuration3-1493Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic received on a port or

Page 113

ContentsxxVLAN Commands 4-240GVRP and Bridge Extension Commands 4-241bridge-ext gvrp 4-241show bridge-ext 4-242switchport gvrp 4-242show gvrp con

Page 114 - Configuring Encryption Keys

Configuring the Switch3-1503Showing Port StatisticsYou can display standard statistics on network traffic from the Interfaces Group and Ethernet-like

Page 115

Port Configuration3-1513Transmit Discarded Packets The number of outbound packets which were chosen to be discarded even though no errors had been det

Page 116

Configuring the Switch3-1523Received Frames The total number of frames (bad, broadcast and multicast) received.Broadcast Frames The total number of go

Page 117

Port Configuration3-1533Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the

Page 118 - Configuring AAA Accounting

Configuring the Switch3-1543CLI – This example shows statistics for port 13.Power Over Ethernet SettingsThis switch can provide DC power to a wide ran

Page 119

Power Over Ethernet Settings3-1553Switch Power StatusUse the Main Power Status page to display the Power over Ethernet settings for the switch.Command

Page 120 - AAA Accounting Update

Configuring the Switch3-1563Setting a Switch Power BudgetA maximum PoE power budget for the switch (power available to all switch ports) can be define

Page 121

Power Over Ethernet Settings3-1573Web – Click PoE, Power Port Status.Figure 3-92 Displaying Port PoE StatusCLI – This example displays the PoE status

Page 122

Configuring the Switch3-1583Command Attributes• Port – The port number on the switch. (Range: 1-28)• Admin Status – Enables PoE power on the port. Pow

Page 123 - AAA Accounting Summary

Address Table Settings3-1593Address Table SettingsSwitches store the addresses for all known devices. This information is used to pass traffic directl

Page 124

ContentsxxiConfiguring Voice VLANs 4-270voice vlan 4-271voice vlan aging 4-271voice vlan mac-address 4-272switchport voice vlan 4-273switchport

Page 125 - Authorization Settings

Configuring the Switch3-1603CLI – This example adds an address to the static address table, but sets it to be deleted when the switch is reset.Display

Page 126 - Authorization EXEC Settings

Address Table Settings3-1613CLI – This example also displays the address table entries for port 1.Changing the Aging TimeYou can set the aging time fo

Page 127 - Authorization Summary

Configuring the Switch3-1623Spanning Tree Algorithm Configuration The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, a

Page 128 - Configuring HTTPS

Spanning Tree Algorithm Configuration3-1633MSTP – When using STP or RSTP, it may be difficult to maintain a stable path between all VLAN members. Freq

Page 129

Configuring the Switch3-1643Configuring Port and Trunk Loopback DetectionWhen Port Loopback Detection is enabled and a port receives it’s own BPDU, th

Page 130 - Configuring the Secure Shell

Spanning Tree Algorithm Configuration3-1653CLI – This command enables loopback detection for port 1/5, configures automatic release-mode, and enables

Page 131

Configuring the Switch3-1663These additional parameters are only displayed for the CLI:• Spanning Tree Mode – Specifies the type of spanning tree used

Page 132

Spanning Tree Algorithm Configuration3-1673Web – Click Spanning Tree, STA, Information.Figure 3-98 Displaying Spanning Tree InformationCLI – This com

Page 133 - Generating the Host Key Pair

Configuring the Switch3-1683Configuring Global SettingsGlobal settings apply to the entire switch.Command Usage• Spanning Tree Protocol12Uses RSTP for

Page 134

Spanning Tree Algorithm Configuration3-1693• Priority – Bridge priority is used in selecting the root device, root port, and designated port. The devi

Page 135 - Importing User Public Keys

Contentsxxiiswitchport priority default 4-300queue cos-map 4-301show queue mode 4-302show queue bandwidth 4-302show queue cos-map 4-303Priority C

Page 136

Configuring the Switch3-1703Configuration Settings for RSTP The following attributes apply to both RSTP and MSTP:• Path Cost Method – The path cost is

Page 137 - Configuring the SSH Server

Spanning Tree Algorithm Configuration3-1713Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 3-99

Page 138

Configuring the Switch3-1723CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MSTP parameters.

Page 139

Spanning Tree Algorithm Configuration3-1733• Designated Port – The port priority and number of the port on the designated bridging device through whic

Page 140

Configuring the Switch3-1743should be assigned to ports attached to faster media, and higher values assigned to ports with slower media. (Path cost ta

Page 141

Spanning Tree Algorithm Configuration3-1753CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RST

Page 142

Configuring the Switch3-1763The following interface attributes can be configured:• Spanning Tree – Enables/disables STA on this interface. (Default: E

Page 143

Spanning Tree Algorithm Configuration3-1773• Admin Link Type – The link type attached to this interface.- Point-to-Point – A connection to exactly one

Page 144 - Displaying 802.1X Statistics

Configuring the Switch3-1783Web – Click Spanning Tree, STA, Port Configuration or Trunk Configuration. Modify the required attributes, then click Appl

Page 145

Spanning Tree Algorithm Configuration3-1793To ensure that the MSTI maintains connectivity across the network, you must configure a related set of brid

Page 146

Contentsxxiiiip igmp max-groups action 4-329show ip igmp filter 4-330show ip igmp profile 4-331show ip igmp throttle interface 4-331Multicast VLAN

Page 147 - General Security Measures

Configuring the Switch3-1803CLI – This example sets the priority for MSTI 1, and adds VLAN 1 to this MSTI. It then displays the STA settings for insta

Page 148 - Configuring Port Security

Spanning Tree Algorithm Configuration3-1813Displaying Interface Settings for MSTPThe MSTP Port Information and MSTP Trunk Information pages display th

Page 149 - Web Authentication

Configuring the Switch3-1823CLI – This displays STA settings for instance 0, followed by settings for each port. The settings for instance 0 are globa

Page 150

Spanning Tree Algorithm Configuration3-1833Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance usi

Page 151

Configuring the Switch3-1843Web – Click Spanning Tree, MSTP, Port Configuration or Trunk Configuration. Enter the priority and path cost for an interf

Page 152

VLAN Configuration3-1853This switch supports the following VLAN features:• Up to 255 VLANs based on the IEEE 802.1Q standard• Distributed VLAN learnin

Page 153

Configuring the Switch3-1863Untagged VLANs – Untagged (or static) VLANs are typically used to reduce broadcast traffic and to increase security. A gro

Page 154

VLAN Configuration3-1873Forwarding Tagged/Untagged FramesIf you want to create a small port-based VLAN for devices attached directly to a single switc

Page 155

Configuring the Switch3-1883Displaying Basic VLAN InformationThe VLAN Basic Information page displays basic information on the VLAN type supported by

Page 156

VLAN Configuration3-1893Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN and whether or not the port support

Page 157

Contentsxxiv

Page 158 - Access Control Lists

Configuring the Switch3-1903• Name – Name of the VLAN (1 to 32 characters).• Status – Shows if this VLAN is enabled or disabled. - Active: VLAN is ope

Page 159 - Configuring a Standard IP ACL

VLAN Configuration3-1913Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbox to

Page 160

Configuring the Switch3-1923Adding Static Members to VLANs (VLAN Index)Use the VLAN Static Table to configure port members for the selected VLAN index

Page 161

VLAN Configuration3-1933Web – Click VLAN, 802.1Q VLAN, Static Table. Select a VLAN ID from the scroll-down list. Modify the VLAN name and status if re

Page 162

Configuring the Switch3-1943Adding Static Members to VLANs (Port Index)Use the VLAN Static Membership by Port menu to assign VLAN groups to the select

Page 163 - Configuring a MAC ACL

VLAN Configuration3-1953Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN id

Page 164

Configuring the Switch3-1963• GARP Leave Timer17 – The interval a port waits before leaving a VLAN group. This time should be set to more than twice t

Page 165 - DHCP Snooping

VLAN Configuration3-1973Web – Click VLAN, 802.1Q VLAN, Port Configuration or Trunk Configuration. Fill in the required settings for each interface, cl

Page 166

Configuring the Switch3-1983QinQ tunneling uses a single Service Provider VLAN (SPVLAN) for customers who have multiple VLANs. Customer VLAN IDs are p

Page 167 - Configuring DHCP Snooping

VLAN Configuration3-1993process transmits the packet. Packets entering a QinQ tunnel port are processed in the following manner:1. New SPVLAN tags are

Page 168

xxvTablesTable 1-1 Key Features 1-1Table 1-2 System Defaults 1-6Table 3-1 Configuration Options 3-3Table 3-2 Main Menu 3-4Table 3-3 Logging Levels

Page 169

Configuring the Switch3-20034. After successful source and destination lookups, the packet is double tagged. The switch uses the TPID of 0x8100 to ind

Page 170

VLAN Configuration3-20135. Configure the QinQ tunnel access port to join the SPVLAN as an untagged member (see “Adding Static Members to VLANs (VLAN I

Page 171

Configuring the Switch3-2023CLI – This example sets the switch to operate in QinQ mode.Adding an Interface to a QinQ TunnelFollow the guidelines in th

Page 172 - IP Source Guard

VLAN Configuration3-2033Web – Click VLAN, 802.1Q VLAN, 802.1Q Tunnel Configuration or Tunnel Trunk Configuration. Set the mode for a tunnel access por

Page 173

Configuring the Switch3-2043Configuring Global Settings for Traffic SegmentationUse the Traffic Segmentation Status page to enable traffic segmentatio

Page 174

VLAN Configuration3-2053Web – Click VLAN, Traffic Segmentation, Session Configuration. Set the session number, specify whether an uplink or downlink i

Page 175

Configuring the Switch3-2063Private VLANs Private VLANs provide port-based security and isolation between ports within the assigned VLAN. This switch

Page 176 - Console#

VLAN Configuration3-2073Web – Click VLAN, Private VLAN, Information. Select the desired port from the VLAN ID drop-down menu.Figure 3-116 Private VLA

Page 177 - Port Configuration

Configuring the Switch3-2083Web – Click VLAN, Private VLAN, Configuration. Enter the VLAN ID number, select Primary or Community type, then click Add.

Page 178

VLAN Configuration3-2093CLI – This example associates community VLANs 6 and 7 with primary VLAN 5.Displaying Private VLAN Interface InformationUse the

Page 179

xxviTablesTable 4-21 Switch Cluster Commands 4-73Table 4-22 Debug Commands 4-80Table 4-23 SNMP Commands 4-81Table 4-24 show snmp engine-id - displa

Page 180

Configuring the Switch3-2103CLI – This example shows the switch configured with primary VLAN 5 and community VLAN 6. Port 3 has been configured as a p

Page 181

VLAN Configuration3-2113Web – Click VLAN, Private VLAN, Port Configuration or Trunk Configuration. Set the PVLAN Port Type for each port that will joi

Page 182

Configuring the Switch3-2123Command UsageTo configure protocol-based VLANs, follow these steps:1. First configure VLAN groups for the protocols you wa

Page 183 - Creating Trunk Groups

VLAN Configuration3-2133CLI – This example shows the switch configured with Protocol Group 2 which matches RFC 1042 IP traffic.Configuring the Protoco

Page 184

Configuring the Switch3-2143Link Layer Discovery ProtocolLink Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring

Page 185

Link Layer Discovery Protocol3-2153This attribute must comply with the rule: (4 * Delay Interval) ≤ Transmission Interval • Reinitialization Delay – C

Page 186

Configuring the Switch3-2163CLI – This example sets several attributes which control basic LLDP message timing.Configuring LLDP Interface AttributesUs

Page 187

Link Layer Discovery Protocol3-2173• TLV Type – Configures the information included in the TLV field of advertised messages.- Port Description – The p

Page 188

Configuring the Switch3-2183power (the Endpoint Device could use this information to decide to enter power conservation mode). Note that this device d

Page 189

Link Layer Discovery Protocol3-2193CLI – This example sets the interface to both transmit and receive LLDP messages, enables SNMP trap messages, enabl

Page 190

xxviiTablesTable 4-66 Link Type 4-229Table 4-66 IEEE 802.1D-1998 4-229Table 4-66 IEEE 802.1w-2001 4-229Table 4-67 Default STA Path Costs 4-230Tabl

Page 191 - Displaying LACP Port Counters

Configuring the Switch3-2203• Chassis ID – An octet string indicating the specific identifier for the particular chassis in this system. • System Name

Page 192

Link Layer Discovery Protocol3-2213Web – Click LLDP, Local Information.Figure 3-125 LLDP Local Device InformationCLI – This example displays LLDP inf

Page 193

Configuring the Switch3-2223Displaying LLDP Remote Port InformationUse the LLDP Remote Port/Trunk Information screen to display information about devi

Page 194

Link Layer Discovery Protocol3-2233Displaying LLDP Remote Information DetailsUse the LLDP Remote Information Details screen to display detailed inform

Page 195

Configuring the Switch3-2243Web – Click LLDP, Remote Information Details. Select an interface from the drop down lists, and click Query.Figure 3-127

Page 196

Link Layer Discovery Protocol3-2253Displaying Device StatisticsUse the LLDP Device Statistics screen to general statistics for LLDP-capable devices at

Page 197

Configuring the Switch3-2263CLI – This example displays LLDP statistics received from all LLDP-enabled remote devices connected directly to this switc

Page 198 - Configuring Port Mirroring

Link Layer Discovery Protocol3-2273Web – Click LLDP, Device Statistics Details.Figure 3-129 LLDP Device Statistics DetailsCLI – This example displays

Page 199 - Configuring Rate Limits

Configuring the Switch3-2283Class of Service ConfigurationClass of Service (CoS) allows you to specify which data packets have greater precedence when

Page 200 - Showing Port Statistics

Class of Service Configuration3-2293Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interfa

Page 201

xxviiiTables

Page 202

Configuring the Switch3-2303Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using four egre

Page 203

Class of Service Configuration3-2313Web – Click Priority, Traffic Classes. The current mapping of CoS values to output queues is displayed. Assign pri

Page 204 - Power Over Ethernet Settings

Configuring the Switch3-2323Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traffic in a

Page 205 - Switch Power Status

Class of Service Configuration3-2333Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determi

Page 206 - Displaying Port Power Status

Configuring the Switch3-2343Layer 3/4 Priority SettingsMapping Layer 3/4 Priorities to CoS ValuesThis switch supports one method of prioritizing layer

Page 207 - Configuring Port PoE Power

Class of Service Configuration3-2353CLI – The following example globally enables DSCP Priority service on the switch.Mapping DSCP PriorityThe DSCP is

Page 208

Configuring the Switch3-2363Web – Click Priority, IP DSCP Priority. Select an entry from the DSCP table, enter a value in the Class of Service Value f

Page 209 - Address Table Settings

Quality of Service3-2373Quality of Service The commands described in this section are used to configure Quality of Service (QoS) classification criter

Page 210 - Displaying the Address Table

Configuring the Switch3-2383Configuring a Class MapA class map is used for matching packets to a specified class.Command Usage • To configure a Class

Page 211 - Changing the Aging Time

Quality of Service3-2393• VLAN – A VLAN. (Range:1-4094)• Add – Adds specified criteria to the class. Up to 16 items are permitted per class.• Remove –

Page 212

xxixFiguresFigure 3-1 Home Page 3-2Figure 3-2 Panel Display 3-3Figure 3-3 System Information 3-13Figure 3-4 Switch Information 3-14Figure 3-5 Brid

Page 213

Configuring the Switch3-2403CLI - This example creates a class map call “rd_class,” and sets it to match packets marked for DSCP service value 3.Creat

Page 214

Quality of Service3-2413Policy Configuration• Policy Name — Name of policy map. (Range: 1-16 characters)• Description – A brief description of a polic

Page 215 - Displaying Global Settings

Configuring the Switch3-2423Web – Click QoS, DiffServ, Policy Map to display the list of existing policy maps. To add a new policy map click Add Polic

Page 216

Quality of Service3-2433CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps,

Page 217

Configuring the Switch3-2443VoIP Traffic ConfigurationWhen IP telephony is deployed in an enterprise network, it is recommended to isolate the Voice o

Page 218 - Configuring Global Settings

Quality of Service3-2453Web – Click QoS, VoIP Traffic Setting, Configuration. Enable Auto Detection, specify the Voice VLAN ID, the set the Voice VLAN

Page 219

Configuring the Switch3-2463address OUI numbers must be configured in the Telephony OUI list so that the switch recognizes the traffic as being from a

Page 220

Quality of Service3-2473CLI – This example configures VoIP traffic settings for port 2 and displays the current Voice VLAN status.Configuring Telephon

Page 221

Configuring the Switch3-2483Web – Click QoS, VoIP Traffic Setting, OUI Configuration. Enter a MAC address that specifies the OUI for VoIP devices in t

Page 222 - Displaying Interface Settings

Multicast Filtering3-2493Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A mu

Page 223

Management GuideFast Ethernet SwitchLayer 2 Workgroup Switchwith Power over Ethernet, 26 10/100BASE-T (RJ-45) Ports, and 2 Combination Gigabit (RJ-45/

Page 224

xxxFiguresFigure 3-42 AAA Accounting Summary 3-74Figure 3-43 AAA Authorization Settings 3-75Figure 3-44 AAA Authorization Exec Settings 3-76Figure

Page 225

Configuring the Switch3-2503Layer 2 IGMP (Snooping and Query)IGMP Snooping and Query – If multicast routing is not supported on other switches in your

Page 226

Multicast Filtering3-2513Static IGMP Host Interface – For multicast applications that you need to control more carefully, you can manually assign a mu

Page 227

Configuring the Switch3-2523• IGMP Report Delay — Sets the time between receiving an IGMP Report for an IP multicast address on a port before the swit

Page 228

Multicast Filtering3-2533CLI – This example modifies the settings for multicast filtering, and then displays the current status.Enabling IGMP Immediat

Page 229

Configuring the Switch3-2543Command Attributes• VLAN ID – VLAN Identifier. (Range: 1-4094).• Immediate Leave – Sets the status for immediate leave on

Page 230

Multicast Filtering3-2553Web – Click IGMP Snooping, Multicast Router Port Information. Select the required VLAN ID from the scroll-down list to displa

Page 231

Configuring the Switch3-2563Web – Click IGMP Snooping, Static Multicast Router Port Configuration. Specify the interfaces attached to a multicast rout

Page 232

Multicast Filtering3-2573Web – Click IGMP Snooping, IP Multicast Registration Table. Select a VLAN ID and the IP address for a multicast service from

Page 233

Configuring the Switch3-2583• Multicast IP – The IP address for a specific multicast service• Port or Trunk – Specifies the interface attached to a mu

Page 234 - VLAN Configuration

Multicast Filtering3-2593IGMP throttling sets a maximum number of multicast groups that a port can join at the same time. When the maximum number of g

Page 235 - Assigning Ports to VLANs

xxxiFiguresFigure 3-87 Mirror Port Configuration 3-148Figure 3-88 Input Rate Limit Port Configuration 3-149Figure 3-89 Port Statistics 3-153Figure

Page 236

Configuring the Switch3-2603Configuring IGMP Filter ProfilesWhen you have created an IGMP profile number, you can then configure the multicast groups

Page 237

Multicast Filtering3-2613CLI – This example configures profile number 19 by setting the access mode to “permit” and then specifying a range of multica

Page 238

Configuring the Switch3-2623Web – Click IGMP Snooping, IGMP Filter/Throttling Port Configuration or IGMP Filter/Throttling Trunk Configuration. Select

Page 239 - Displaying Current VLANs

Multicast VLAN Registration3-2633Multicast VLAN Registration Multicast VLAN Registration (MVR) is a protocol that controls access to a single network-

Page 240 - Creating VLANs

Configuring the Switch3-2643Configuring Global MVR Settings The global settings for Multicast VLAN Registration (MVR) include enabling or disabling MV

Page 241

Multicast VLAN Registration3-2653Web – Click MVR, Configuration. Enable MVR globally on the switch, select the MVR VLAN, add the multicast groups that

Page 242

Configuring the Switch3-2663Displaying MVR Interface Status You can display information about the interfaces attached to the MVR VLAN.Field Attributes

Page 243

Multicast VLAN Registration3-2673Displaying Port Members of Multicast GroupsYou can display the multicast groups assigned to the MVR VLAN either throu

Page 244

Configuring the Switch3-2683Configuring MVR Interface Status Each interface that participates in the MVR VLAN must be configured as an MVR source port

Page 245

Multicast VLAN Registration3-2693- Non-MVR – An interface that does not participate in the MVR VLAN. (This is the default type.)• Immediate Leave – Co

Page 246

xxxiiFiguresFigure 3-132 Queue Mode 3-232Figure 3-133 Configuring Queue Scheduling 3-233Figure 3-134 IP DSCP Priority Status 3-234Figure 3-135 Mapp

Page 247

Configuring the Switch3-2703Assigning Static Multicast Groups to InterfacesFor multicast streams that will run for a long term and be associated with

Page 248

Switch Clustering3-2713Switch ClusteringSwitch Clustering is a method of grouping switches together to enable centralized management through a single

Page 249

Configuring the Switch3-2723• Cluster IP Pool – An “internal” IP address pool that is used to assign IP addresses to Member switches in the cluster. I

Page 250

Switch Clustering3-2733Web – Click Cluster, Member Configuration. Figure 3-158 Cluster Member ConfigurationCLI – This example creates a new cluster M

Page 251

Configuring the Switch3-2743Web – Click Cluster, Member Information. Figure 3-159 Cluster Member InformationCLI – This example shows information abou

Page 252

UPnP3-2753CLI – This example shows information about cluster Candidate switches.UPnPUniversal Plug and Play (UPnP) is a set of protocols that allows d

Page 253 - Traffic Segmentation

Configuring the Switch3-2763Using UPnP under Windows Vista – To access or manage the switch with the aid of UPnP under Windows Vista, open the Network

Page 254

UPnP3-2773CLI – This example enables UPnP, sets the device advertise duration to 200 seconds, the device TTL to 6, and displays information about basi

Page 255

Configuring the Switch3-2783

Page 256 - Private VLANs

4-1Chapter 4: Command Line InterfaceThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceAccessing the C

Page 257 - Configuring Private VLANs

1-1Chapter 1: IntroductionThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to conf

Page 258 - Associating VLANs

Command Line Interface4-24Telnet ConnectionTelnet operates over the IP transport protocol. In this environment, your management station and any networ

Page 259

Entering Commands4-34Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords and

Page 260

Command Line Interface4-44Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords for the curren

Page 261 - Protocol VLANs

Entering Commands4-54The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword w

Page 262

Command Line Interface4-64current mode. The command classes and associated modes are displayed in the following table:Exec CommandsWhen you open a new

Page 263

Entering Commands4-74Configuration CommandsConfiguration commands are privileged level commands used to modify switch settings. These commands modify

Page 264 - 65536

Command Line Interface4-84For example, you can use the following commands to enter interface configuration mode, and then return to Privileged Exec mo

Page 265 - Transmission Interval

Command Groups4-94Command GroupsThe system commands can be broken down into the functional groups shown below.Table 4-4 Command GroupsCommand Group D

Page 266

Command Line Interface4-104The access mode shown in the following tables is indicated by these abbreviations: ACL (Access Control List Configuration)

Page 267 - Link Layer Discovery Protocol

General Commands4-114enableThis command activates Privileged Exec mode. In privileged mode, additional commands are available, and certain commands di

Page 268

Introduction1-21Description of Software FeaturesThis switch provides a wide range of advanced performance enhancing features. Flow control eliminates

Page 269

Command Line Interface4-124Example Related Commands enable (4-11)configureThis command activates Global Configuration mode. You must enter this mode t

Page 270

General Commands4-134Example In this example, the show history command lists the contents of the command history buffer:The ! command repeats commands

Page 271

Command Line Interface4-144Command Usage This command resets the entire system. The switch will wait the designated amount of time before resetting. I

Page 272

General Commands4-154Command Mode Global ConfigurationExample endThis command returns to Privileged Exec mode.Default Setting NoneCommand Mode Global

Page 273

Command Line Interface4-164quitThis command exits the configuration program.Default Setting NoneCommand Mode Normal Exec, Privileged ExecCommand Usage

Page 274

System Management Commands4-174Device Designation CommandshostnameThis command specifies or modifies the host name for this device. Use the no form to

Page 275 - Displaying Device Statistics

Command Line Interface4-184Banner Information CommandsThese commands are used to configure and manage administrative information about the switch, its

Page 276

System Management Commands4-194Command Usage The administrator can batch-input all details for the switch with one command. When the administrator fin

Page 277

Command Line Interface4-204Default Setting NoneCommand ModeGlobal ConfigurationCommand Usage Input strings cannot contain spaces. The banner configure

Page 278 - Layer 2 Queue Settings

System Management Commands4-214banner configure departmentThis command is used to configure the department information displayed in the banner. Use th

Page 279

Description of Software Features1-31Other authentication options include HTTPS for secure management access via the web, SSH for secure management acc

Page 280

Command Line Interface4-224Command ModeGlobal ConfigurationCommand Usage Input strings cannot contain spaces. The banner configure equipment-info comm

Page 281 - Figure 3-131 Traffic Classes

System Management Commands4-234banner configure ip-lanThis command is used to configure the device IP address and subnet mask information displayed in

Page 282 - Selecting the Queue Mode

Command Line Interface4-244Example banner configure manager-infoThis command is used to configure the manager contact information displayed in the ban

Page 283

System Management Commands4-254banner configure muxThis command is used to configure the mux information displayed in the banner. Use the no form to r

Page 284 - Layer 3/4 Priority Settings

Command Line Interface4-264Command Usage Input strings cannot contain spaces. The banner configure note command interprets spaces as data input bounda

Page 285 - Mapping DSCP Priority

System Management Commands4-274System Status CommandsThis section describes commands used to display system information.show startup-configThis comman

Page 286

Command Line Interface4-284- Spanning tree settings- Interface settings- Any configured settings for the console port and TelnetExample Related Comma

Page 287 - Quality of Service

System Management Commands4-294show running-configThis command displays the configuration information currently in use.Default Setting NoneCommand Mod

Page 288 - Configuring a Class Map

Command Line Interface4-304Example Related Commandsshow startup-config (4-27)Console#show startup-configbuilding startup-config, please wait...!<st

Page 289

System Management Commands4-314show systemThis command displays system information.Command Mode Normal Exec, Privileged ExecCommand Usage • For a desc

Page 290 - Creating QoS Policies

Introduction1-41Store-and-Forward Switching – This switch copies each frame into its memory before forwarding them to another port. This ensures that

Page 291

Command Line Interface4-324Example show versionThis command displays hardware and software version information for the system.Command Mode Normal Exec

Page 292

System Management Commands4-334show memoryThis command shows the location and size of free system memory.Command Mode Privileged ExecExample Frame Siz

Page 293

Command Line Interface4-344ports. Compared to standard Ethernet frames that run only up to 1.5 KB, using jumbo frames significantly reduces the per-pa

Page 294 - VoIP Traffic Configuration

System Management Commands4-354copyThis command moves (upload/download) a code image or configuration file between the switch’s flash memory and a TFT

Page 295

Command Line Interface4-364• The Boot ROM and Loader cannot be uploaded or downloaded from the TFTP server. You must follow the instructions in the re

Page 296

System Management Commands4-374The following example shows how to download a configuration file: This example shows how to copy a secure-site certific

Page 297 - Configuring Telephony OUI

Command Line Interface4-384Command Usage • If the file type is used for system startup, then this file cannot be deleted. • “Factory_Default_Config.cf

Page 298

System Management Commands4-394Example The following example shows how to display all file information:whichbootThis command displays which files were

Page 299 - Multicast

Command Line Interface4-404Command Mode Global ConfigurationCommand Usage • A colon (:) is required after the specified unit number and file type. • I

Page 300

System Management Commands4-414lineThis command identifies a specific line for configuration, and to process subsequent line configuration commands.Sy

Page 301 - Multicast Filtering

Description of Software Features1-51Note: This switch allows 255 user-manageable VLANs. One other VLAN (VLAN ID 4093) is reserved for switch clusterin

Page 302

Command Line Interface4-424Command Usage • There are three authentication modes provided by the switch itself at login:- login selects authentication

Page 303 - Enabling IGMP Immediate Leave

System Management Commands4-434number of times a user can enter an incorrect password before the system terminates the line connection and returns the

Page 304

Command Line Interface4-444Related Commandssilent-time (4-45)exec-timeout (4-14)exec-timeoutThis command sets the interval that the system waits until

Page 305

System Management Commands4-454Default Setting The default value is three attempts.Command Mode Line Configuration Command Usage • When the logon atte

Page 306

Command Line Interface4-464databitsThis command sets the number of data bits per character that are interpreted and generated by the console port. Use

Page 307

System Management Commands4-474Command Usage Communication protocols provided by devices such as terminals and modems often require a specific parity

Page 308 - IGMP Filtering and Throttling

Command Line Interface4-484Default Setting 1 stop bitCommand Mode Line Configuration Example To specify 2 stop bits, enter this command:disconnectThis

Page 309 - Enabling IGMP Filtering

System Management Commands4-494Command Mode Normal Exec, Privileged ExecExample To show all lines, enter this command:Event Logging CommandsThis secti

Page 310

Command Line Interface4-504Command Mode Global ConfigurationCommand Usage The logging process controls error messages saved to switch memory or sent t

Page 311

System Management Commands4-514Default Setting Flash: errors (level 3 - 0)RAM: warnings (level 7 - 0)Command Mode Global ConfigurationCommand Usage Th

Page 312

Introduction1-61Advertised information is represented in Type Length Value (TLV) format according to the IEEE 802.1ab standard, and can include detail

Page 313 - Multicast VLAN Registration

Command Line Interface4-524Default Setting 23Command Mode Global ConfigurationCommand Usage The command specifies the facility type tag sent in syslog

Page 314

System Management Commands4-534Example clear logThis command clears messages from the log buffer.Syntax clear log [flash | ram]• flash - Event history

Page 315

Command Line Interface4-544ExampleThe following example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., de

Page 316

System Management Commands4-554show logThis command displays the system and event messages stored in memory.Syntax show log {flash | ram} [login]• fla

Page 317

Command Line Interface4-564SMTP Alert CommandsThese commands configure SMTP event handling, and forwarding of alert messages to the specified SMTP ser

Page 318

System Management Commands4-574logging sendmail levelThis command sets the severity threshold used to trigger alert messages.Syntaxlogging sendmail le

Page 319

Command Line Interface4-584logging sendmail destination-emailThis command specifies the email recipients of alert messages. Use the no form to remove

Page 320

System Management Commands4-594ExampleTime CommandsThe system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). M

Page 321 - Switch Clustering

Command Line Interface4-604sntp clientThis command enables SNTP client requests for time synchronization from NTP or SNTP time servers specified with

Page 322 - Configuring Cluster Members

System Management Commands4-614sntp serverThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command

Page 323

System Defaults1-71Web Management HTTP Server EnabledHTTP Port Number 80HTTP Secure Server EnabledHTTP Secure Port Number 443SNMP SNMP Agent EnabledCo

Page 324

Command Line Interface4-624Example Related Commandssntp client (4-60)show sntpThis command displays the current time and configuration settings for th

Page 325

System Management Commands4-634• This command enables client time requests to time servers specified via the ntp servers command. It issues time synch

Page 326 - UPnP Configuration

Command Line Interface4-644Example Related Commandsntp client (4-62)ntp poll (4-64)show ntp (4-66)ntp pollThis command sets the interval between sendi

Page 327

System Management Commands4-654Command Usage You can enable NTP authentication to ensure that reliable updates are received from only authorized NTP s

Page 328

Command Line Interface4-664Example Related Commandsntp authenticate (4-64)show ntpThis command displays the current time and configuration settings fo

Page 329 - Console Connection

System Management Commands4-674clock timezone-predefinedThis command uses predefined time zone configurations to set the time zone for the switch’s in

Page 330 - Telnet Connection

Command Line Interface4-684Default Setting NoneCommand Mode Global ConfigurationCommand Usage This command sets the local time zone relative to the Co

Page 331 - Entering Commands

System Management Commands4-694• e-minute - The minute summer-time will end. (Range: 0-59 minutes)• offset - Summer-time offset from the regular time

Page 332 - Showing Commands

Command Line Interface4-704Command Usage• In some countries or regions, clocks are adjusted through the summer months so that afternoons have more day

Page 333 - Understanding Command Modes

System Management Commands4-714• b-hour - The hour when summer-time will begin. (Range: 0-23 hours)• b-minute - The minute when summer-time will begin

Page 334 - Exec Commands

ES3528M-PoEE112008/ST-R01 F1.1.0.11 149100041600A

Page 335 - Configuration Commands

Introduction1-81Traffic Prioritization Ingress Port Priority 0Weighted Round Robin Queue: 0 1 2 3 Weight: 1 2 4 8 IP DSCP Priority DisabledIP

Page 336 - Command Line Processing

Command Line Interface4-724calendar setThis command sets the system clock. It may be used if there is no time server on your network, or if you have n

Page 337 - Command Groups

System Management Commands4-734Switch Cluster CommandsSwitch Clustering is a method of grouping switches together to enable centralized management thr

Page 338 - General Commands

Command Line Interface4-744Command Usage • To create a switch cluster, first be sure that clustering is enabled on the switch (the default is enabled)

Page 339

System Management Commands4-754cluster ip-poolThis command sets the cluster IP address pool. Use the no form to reset to the default address.Syntax cl

Page 340 - Command Line Interface

Command Line Interface4-764Command Usage • The maximum number of cluster Members is 36.• The maximum number of switch Candidates is 100.Examplercomman

Page 341

System Management Commands4-774show cluster membersThis command shows the current switch cluster members.Command Mode Privileged ExecExampleshow clust

Page 342

Command Line Interface4-784upnp device This command enables UPnP on the device. Use the no form to disable UPnP.Syntax [no] upnp device Default Settin

Page 343

System Management Commands4-794ExampleIn the following example, the TTL is set to 6.upnp device advertise duration This command sets the duration for

Page 344 - System Management Commands

Command Line Interface4-804Debug Commandsdebug spanning-treeThis command configures debug settings for spanning tree processes. Use the no form to dis

Page 345 - Device Designation Commands

SNMP Commands4-814SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as

Page 346 - Banner Information Commands

2-1Chapter 2: Initial ConfigurationConnecting to the SwitchConfiguration OptionsThis switch includes a built-in network management agent. The agent of

Page 347

Command Line Interface4-824Exampleshow snmpThis command can be used to check the status of SNMP communications.Default Setting NoneCommand Mode Normal

Page 348

SNMP Commands4-834snmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the specified commu

Page 349

Command Line Interface4-844Related Commandssnmp-server location (4-84)snmp-server locationThis command sets the system location string. Use the no for

Page 350

SNMP Commands4-854snmp-server host This command specifies the recipient of a Simple Network Management Protocol notification operation. Use the no for

Page 351

Command Line Interface4-864command to enable the sending of traps or informs and to specify which SNMP notifications are sent globally. For a host to

Page 352

SNMP Commands4-874Related Commandssnmp-server enable traps (4-87)snmp-server enable trapsThis command enables this device to send Simple Network Manag

Page 353

Command Line Interface4-884snmp-server engine-idThis command configures an identification string for the SNMPv3 engine. Use the no form to restore the

Page 354

SNMP Commands4-894Related Commandssnmp-server host (4-85)show snmp engine-idThis command shows the SNMP engine ID.Command Mode Privileged ExecExampleT

Page 355 - System Status Commands

Command Line Interface4-904Command Usage • Views are used in the snmp-server group command to restrict user access to specified portions of the MIB tr

Page 356

SNMP Commands4-914snmp-server groupThis command adds an SNMP group, mapping SNMP users to SNMP views. Use the no form to remove an SNMP group.Syntax s

Page 357

Initial Configuration2-22• Configure up to 8 static or LACP trunks• Enable port mirroring• Set broadcast storm control on any port• Display system inf

Page 358

Command Line Interface4-924show snmp groupFour default groups are provided – SNMPv1 read-only access and read/write access, and SNMPv2c read-only acce

Page 359

SNMP Commands4-934snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read, Write, or Notify View. Use

Page 360

Command Line Interface4-944Command Usage • The SNMP engine ID is used to compute the authentication/privacy digests from the password. You should ther

Page 361 - Frame Size Commands

Authentication Commands4-954Authentication Commands You can configure this switch to authenticate users logging into the system for management access

Page 362 - File Management Commands

Command Line Interface4-964usernameThis command adds named users, requires authentication at login, specifies or changes a user's password (or sp

Page 363

Authentication Commands4-974Example This example shows how to set the access level and password for a user.enable passwordAfter initially logging onto

Page 364

Command Line Interface4-984Authentication SequenceThree authentication methods can be specified to authenticate users logging into the system for mana

Page 365

Authentication Commands4-994Related Commandsusername - for setting the local user names and passwords (4-96)authentication enableThis command defines

Page 366

Command Line Interface4-1004RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software run

Page 367

Authentication Commands4-1014Command Mode Global ConfigurationExample radius-server auth-portThis command sets the RADIUS server network port for auth

Page 368 - Line Commands

Basic Configuration2-32Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a va

Page 369

Command Line Interface4-1024radius-server keyThis command sets the RADIUS encryption key. Use the no form to restore the default.Syntax radius-server

Page 370

Authentication Commands4-1034radius-server timeoutThis command sets the interval between transmitting authentication requests to the RADIUS server. Us

Page 371

Command Line Interface4-1044Example TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that u

Page 372

Authentication Commands4-1054tacacs-server hostThis command specifies a TACACS+ server. Use the no form to restore the default.Syntax [no] tacacs-serv

Page 373

Command Line Interface4-1064Example tacacs-server keyThis command sets the TACACS+ encryption key. Use the no form to restore the default.Syntax tacac

Page 374

Authentication Commands4-1074tacacs-server timeoutThis command sets the interval between transmitting authentication requests to the TACACS+ server. U

Page 375

Command Line Interface4-1084show tacacs-serverThis command displays the current settings for the TACACS+ server.Default Setting NoneCommand Mode Privi

Page 376

Authentication Commands4-1094AAA CommandsThe Authentication, authorization, and accounting (AAA) feature provides the main framework for configuring a

Page 377 - Event Logging Commands

Command Line Interface4-1104Example serverThis command adds a security server to an AAA server group. Use the no form to remove the associated server

Page 378

Authentication Commands4-1114aaa accounting dot1xThis command enables the accounting of requested 802.1X services for network access. Use the no form

Page 379

Initial Configuration2-42Setting PasswordsNote: If this is your first time to log into the CLI program, you should define new passwords for both defau

Page 380

Command Line Interface4-1124aaa accounting execThis command enables the accounting of requested Exec services for network access. Use the no form to d

Page 381

Authentication Commands4-1134aaa accounting commandsThis command enables the accounting of Exec mode commands. Use the no form to disable the accounti

Page 382

Command Line Interface4-1144aaa accounting updateThis command enables the sending of periodic updates to the accounting server. Use the no form to dis

Page 383

Authentication Commands4-1154Example accounting execThis command applies an accounting method to local console or Telnet connections. Use the no form

Page 384 - SMTP Alert Commands

Command Line Interface4-1164Command Mode Line ConfigurationExample aaa authorization execThis command enables the authorization for Exec access. Use t

Page 385

Authentication Commands4-1174authorization execThis command applies an authorization method to local console or Telnet connections. Use the no form to

Page 386

Command Line Interface4-1184Command ModePrivileged ExecExample Web Server CommandsThis section describes commands used to configure web browser manage

Page 387 - Time Commands

Authentication Commands4-1194ExampleRelated Commandsip http server (4-119)ip http serverThis command allows this device to be monitored or configured

Page 388

Command Line Interface4-1204• When you start HTTPS, the connection is established in this way:- The client authenticates the server using the server’s

Page 389

Authentication Commands4-1214Command Usage • You cannot configure the HTTP and HTTPS servers to use the same port. • If you change the HTTPS port numb

Page 390

Basic Configuration2-52Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Page 391

Command Line Interface4-1224Secure Shell CommandsThis section describes the commands used to configure the SSH server. However, note that you also nee

Page 392

Authentication Commands4-1234Otherwise, you need to manually create a known hosts file on the management station and place the host public key in it.

Page 393

Command Line Interface4-1244d. The client uses its private key to decrypt the challenge string, computes the MD5 checksum, and sends the checksum back

Page 394

Authentication Commands4-1254Related Commandsip ssh crypto host-key generate (4-127)show ssh (4-129)ip ssh timeoutThis command configures the timeout

Page 395

Command Line Interface4-1264Command Mode Global ConfigurationExample Related Commandsshow ip ssh (4-128)ip ssh server-key sizeThis command sets the SS

Page 396

Authentication Commands4-1274Example ip ssh crypto host-key generateThis command generates the host key pair (i.e., public and private). Syntax ip ssh

Page 397

Command Line Interface4-1284Command Mode Privileged ExecCommand Usage • This command clears the host key from volatile memory (RAM). Use the no ip ssh

Page 398

Authentication Commands4-1294Example show sshThis command displays the current SSH server connections.Command Mode Privileged ExecExample Console#show

Page 399

Command Line Interface4-1304show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [user

Page 400

Authentication Commands4-1314802.1X Port AuthenticationThe switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorized ac

Page 401 - Switch Cluster Commands

Initial Configuration2-623. Type “end” to return to the Privileged Exec mode. Press <Enter>.4. Wait a few minutes, and then check the IP configu

Page 402

Command Line Interface4-1324dot1x defaultThis command sets all configurable dot1x global and port settings to their default values.Command ModeGlobal

Page 403

Authentication Commands4-1334Defaultforce-authorizedCommand ModeInterface ConfigurationExampledot1x operation-modeThis command allows single or multip

Page 404

Command Line Interface4-1344dot1x re-authenticateThis command forces re-authentication on all ports or a specific interface.Syntaxdot1x re-authenticat

Page 405 - UPnP Commands

Authentication Commands4-1354ExampleRelated Commandsdot1x timeout re-authperiod (4-135)dot1x timeout quiet-periodThis command sets the time that a swi

Page 406

Command Line Interface4-1364Exampledot1x timeout tx-periodThis command sets the time that an interface on the switch waits during an authentication se

Page 407

Authentication Commands4-1374Exampleshow dot1xThis command shows general port authentication related settings on the switch or a specific interface.Sy

Page 408 - Debug Commands

Command Line Interface4-1384- max-req – Maximum number of times a port will retransmit an EAP request/identity packet to the client before it times ou

Page 409 - SNMP Commands

Authentication Commands4-1394ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status

Page 410

Command Line Interface4-1404Management IP Filter CommandsThis section describes commands used to configure IP management access to the switch.manageme

Page 411

Authentication Commands4-1414ExampleThis example restricts management access to the indicated addresses.show managementThis command displays the clien

Page 412

Basic Configuration2-72The default strings are:• public - with read-only access. Authorized management stations are only able to retrieve MIB objects.

Page 413

Command Line Interface4-1424General Security MeasuresThis switch supports many methods of segregating traffic for clients attached to each of the data

Page 414

General Security Measures4-1434Port Security CommandsThese commands can be used to enable port security on a port. When using port security, the switc

Page 415

Command Line Interface4-1444Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has

Page 416

General Security Measures4-1454network-access agingUse this command to enable aging for authenticated MAC addresses stored in the secure MAC address t

Page 417

Command Line Interface4-1464network-access modeUse this command to enable network access authentication on a port. Use the no form of this command to

Page 418

General Security Measures4-1474network-access max-mac-countUse this command to set the maximum number of MAC addresses that can be authenticated on a

Page 419

Command Line Interface4-1484have same VLAN configuration, or they are treated as an authentication failure.• If dynamic VLAN assignment is enabled on

Page 420

General Security Measures4-1494mac-authentication reauth-timeUse this command to set the time period after which a connected MAC address must be re-au

Page 421

Command Line Interface4-1504mac-authentication max-mac-countUse this command to set the maximum number of MAC addresses that can be authenticated on a

Page 422

General Security Measures4-1514show network-accessUse this command to display the MAC authentication settings for port interfaces.Syntaxshow network-a

Page 423 - Authentication Commands

Initial Configuration2-82Configuring Access for SNMP Version 3 ClientsTo configure management access for SNMPv3 clients, you need to first create a vi

Page 424

Command Line Interface4-1524Default Setting Displays all filters.Command Mode Privileged ExecCommand Usage When using a bit mask to filter displayed M

Page 425

General Security Measures4-1534web-auth login-attemptsThis command defines the limit for failed web authentication login attempts. After the limit is

Page 426 - Authentication Sequence

Command Line Interface4-1544Default Setting60 secondsCommand ModeGlobal ConfigurationExample web-auth session-timeoutThis command defines the amount o

Page 427

General Security Measures4-1554Exampleweb-authThis command enables web authentication for a port. Use the no form to restore the default.Syntax[no] we

Page 428 - RADIUS Client

Command Line Interface4-1564web-auth re-authenticate (IP)This command ends the web authentication session associated with the designated IP address an

Page 429

General Security Measures4-1574show web-auth interfaceThis command displays interface-specific web authentication parameters and statistics.Syntaxshow

Page 430

Command Line Interface4-1584show web-auth summaryThis command displays a summary of web authentication port parameters and statistics.Command ModePriv

Page 431

General Security Measures4-1594ip dhcp snoopingThis command enables DHCP snooping globally. Use the no form to restore the default setting.Syntax [no]

Page 432 - TACACS+ Client

Command Line Interface4-1604MAC address verification is enabled, then the packet will only be forwarded if the client’s hardware address stored in the

Page 433

General Security Measures4-1614packet filtering will be performed on any untrusted ports within the VLAN as specified by the ip dhcp snooping trust co

Page 434

Managing System Files2-92Due to the size limit of the flash memory, the switch supports only one operation code file. However, you can have as many di

Page 435

Command Line Interface4-1624• Additional considerations when the switch itself is a DHCP client – The port(s) through which it submits a client reques

Page 436

General Security Measures4-1634ip dhcp snooping information optionThis command enables the DHCP Option 82 information relay for the switch. Use the no

Page 437 - AAA Commands

Command Line Interface4-1644ip dhcp snooping information policyThis command sets the DHCP snooping information option policy for DHCP client packets t

Page 438

General Security Measures4-1654clear ip dhcp snooping database flashThis command removes all dynamically learned snooping entries from flash memory.Co

Page 439

Command Line Interface4-1664IP Source Guard CommandsIP Source Guard is a security feature that filters IP traffic on network interfaces based on manua

Page 440

General Security Measures4-1674• When enabled, traffic is filtered based upon dynamic entries learned via DHCP snooping, or static addresses configure

Page 441

Command Line Interface4-1684ip source-guard bindingThis command adds a static address to the source-guard binding table. Use the no form to remove a s

Page 442

General Security Measures4-1694Related Commands ip source-guard (4-166)ip dhcp snooping (4-159)ip dhcp snooping vlan (4-160)show ip source-guardThis c

Page 443

Command Line Interface4-1704Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol,

Page 444

Access Control List Commands4-1714access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. U

Page 445

vAbout This GuidePurposeThis guide gives specific information on how to operate and use the management functions of the switch.AudienceThe guide is in

Page 446 - Web Server Commands

Initial Configuration2-102Configuring Power over EthernetThis switch supports the IEEE 802.3af Power-over-Ethernet (PoE) standard that enables DC powe

Page 447

Command Line Interface4-1724permit, deny (Standard ACL) This command adds a rule to a Standard IP ACL. The rule sets a filter condition for packets em

Page 448

Access Control List Commands4-1734permit, deny (Extended ACL) This command adds a rule to an Extended IP ACL. The rule sets a filter condition for pac

Page 449 - Telnet Server Commands

Command Line Interface4-1744Command Usage• All new rules are appended to the end of the list.• Address bitmasks are similar to a subnet mask, containi

Page 450 - Secure Shell Commands

Access Control List Commands4-1754Related Commandsaccess-list ip (4-171)show ip access-list This command displays the rules for configured IP ACLs.Syn

Page 451

Command Line Interface4-1764• If a port is already bound to an ACL and you bind it to a different ACL, the switch will replace the old binding with th

Page 452

Access Control List Commands4-1774access-list mac This command adds a MAC access list and enters MAC ACL configuration mode. Use the no form to remove

Page 453

Command Line Interface4-1784permit, deny (MAC ACL)This command adds a rule to a MAC ACL. The rule filters packets matching a specified MAC source or d

Page 454

Access Control List Commands4-1794• protocol – A specific Ethernet protocol number. (Range: 600-fff hex.)• protocol-bitmask – Protocol bitmask. (Range

Page 455

Command Line Interface4-1804mac access-groupThis command binds a port to a MAC ACL. Use the no form to remove the port.Syntaxmac access-group acl_name

Page 456

Access Control List Commands4-1814ACL Informationshow access-listThis command shows all ACLs and associated rules, as well as all the user-defined mas

Page 457

3-1Chapter 3: Configuring the SwitchUsing the Web InterfaceThis switch provides an embedded HTTP web agent. Using a web browser you can configure the

Page 458

Command Line Interface4-1824Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link

Page 459 - 802.1X Port Authentication

Interface Commands4-1834Default Setting NoneCommand Mode Global Configuration Example To specify port 24, enter the following command:descriptionThis

Page 460

Command Line Interface4-1844Default Setting • Auto-negotiation is enabled by default.• When auto-negotiation is disabled, the default speed-duplex set

Page 461

Interface Commands4-1854Command Usage • When auto-negotiation is enabled the switch will negotiate the best settings for a link based on the capabilit

Page 462

Command Line Interface4-1864Command Usage When auto-negotiation is enabled with the negotiation command, the switch will negotiate the best settings f

Page 463

Interface Commands4-1874• Avoid using flow control on a port connected to a hub unless it is actually required to solve a problem. Otherwise back pres

Page 464

Command Line Interface4-1884giga-phy-modeThis command forces two connected ports in to a master/slave configuration to enable 1000BASE-T full duplex.

Page 465

Interface Commands4-1894shutdown This command disables an interface. To restart a disabled interface, use the no form.Syntax [no] shutdownDefault Sett

Page 466

Command Line Interface4-1904Command Usage • When traffic exceeds the threshold specified for broadcast and multicast or unknown unicast traffic, packe

Page 467

Interface Commands4-1914Example The following example clears statistics on port 5.show interfaces statusThis command displays the status for an interf

Page 468 - Management IP Filter Commands

Configuring the Switch3-23Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and password. The a

Page 469

Command Line Interface4-1924Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]int

Page 470

Interface Commands4-1934Command Usage If no interface is specified, information on all interfaces is displayed. For a description of the items display

Page 471 - Port Security Commands

Command Line Interface4-1944Command Mode Normal Exec, Privileged ExecCommand Usage If no interface is specified, information on all interfaces is disp

Page 472

Interface Commands4-1954Priority for Untagged TrafficIndicates the default priority for untagged frames (page 4-277).GVRP Status Shows if GARP VLAN Re

Page 473

Command Line Interface4-1964Link Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of

Page 474

Link Aggregation Commands4-1974Dynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following criteria:• Ports m

Page 475

Command Line Interface4-1984Default Setting DisabledCommand Mode Interface Configuration (Ethernet)Command Usage • The ports on both ends of an LACP t

Page 476

Link Aggregation Commands4-1994lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default

Page 477

Command Line Interface4-2004Default Setting 0Command Mode Interface Configuration (Ethernet)Command Usage • Ports are only allowed to join the same LA

Page 478

Link Aggregation Commands4-2014• If the port channel admin key (lacp admin key - Port Channel) is not set when a channel group is formed (i.e., it has

Page 479

Panel Display3-33Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a pa

Page 480

Command Line Interface4-2024show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sysid}•

Page 481

Link Aggregation Commands4-2034 Console#show lacp 1 internalPort Channel : 1---------------------------------------------------------------------

Page 482

Command Line Interface4-2044Console#show lacp 1 neighborsPort channel 1 neighbors---------------------------------------------------------------------

Page 483

Power over Ethernet Commands4-2054Power over Ethernet CommandsThe commands in this group control the power that can be delivered to attached PoE devic

Page 484

Command Line Interface4-2064power mainpower maximum allocationThis command defines a power budget for the switch (i.e., the power available to all swi

Page 485

Power over Ethernet Commands4-2074this switch can detect 802.3af compliant devices and the more recent 802.3af non-compliant devices that also reflect

Page 486 - DHCP Snooping Commands

Command Line Interface4-2084power inline maximum allocationThis command limits the power allocated to specific ports. Use the no form to restore the d

Page 487

Power over Ethernet Commands4-2094- If a device is connected to a critical or high-priority port and causes the switch to exceed its budget, port powe

Page 488

Command Line Interface4-2104show power mainpowerUse this command to display the current power status for the switch.Command Mode Privileged ExecExampl

Page 489

Mirror Port Commands4-2114Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis comma

Page 490

Configuring the Switch3-43Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, o

Page 491

Command Line Interface4-2124ExampleThe following example configures the switch to mirror received packets from port 6 to 11:show port monitorThis comm

Page 492

Rate Limit Commands4-2134Rate Limit CommandsThis function allows the network manager to control the maximum rate for traffic received on an interface.

Page 493

Command Line Interface4-2144Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying

Page 494 - IP Source Guard Commands

Address Table Commands4-2154Command Usage The static address for a host device can be assigned to a specific port within a specific VLAN. Use this com

Page 495

Command Line Interface4-2164show mac-address-tableThis command shows classes of entries in the bridge-forwarding database.Syntax show mac-address-tabl

Page 496

Address Table Commands4-2174mac-address-table aging-timeThis command sets the aging time for entries in the address table. Use the no form to restore

Page 497

Command Line Interface4-2184Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the swi

Page 498 - Access Control List Commands

Spanning Tree Commands4-2194spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Synta

Page 499

Command Line Interface4-2204spanning-tree modeThis command selects the spanning tree mode for this switch. Use the no form to restore the default.Synt

Page 500

Spanning Tree Commands4-2214Example The following example configures the switch to use Rapid Spanning Tree:spanning-tree forward-timeThis command conf

Page 501

Main Menu3-53SNMPv3 3-46Engine ID Sets the SNMP v3 engine ID on this switch 3-46Remote Engine ID Sets the SNMP v3 engine ID for a remote device 3-47Us

Page 502

Command Line Interface4-2224Command Mode Global ConfigurationCommand Usage This command sets the time interval (in seconds) at which the root device t

Page 503

Spanning Tree Commands4-2234Related Commandsspanning-tree forward-time (4-221)spanning-tree hello-time (4-221)spanning-tree priorityThis command confi

Page 504 - MAC ACLs

Command Line Interface4-2244Command Mode Global ConfigurationCommand Usage The spanning-tree system-bpdu-flooding command has no effect if BPDU floodi

Page 505

Spanning Tree Commands4-2254Default Setting 3Command Mode Global ConfigurationCommand Usage This command limits the maximum transmission rate for BPDU

Page 506

Command Line Interface4-2264Command Mode MST ConfigurationCommand Usage • Use this command to group VLANs into spanning tree instances. MSTP generates

Page 507

Spanning Tree Commands4-2274• You can set this switch to act as the MSTI root device by specifying a priority of 0, or as the MSTI alternate device by

Page 508

Command Line Interface4-2284Command Usage The MST region name (page 4-227) and revision number are used to designate a unique MST region. A bridge (i.

Page 509 - ACL Information

Spanning Tree Commands4-2294Default Setting EnabledCommand Mode Interface Configuration (Ethernet, Port Channel)Example This example disables the span

Page 510 - Interface Commands

Command Line Interface4-2304Default Setting By default, the system automatically detects the speed and duplex mode used on each port, and configures t

Page 511

Spanning Tree Commands4-2314Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • This command defines the priority for the use

Page 512

Configuring the Switch3-63Port Security Configures per port security, including status, response for security breach, and maximum allowed MAC addresse

Page 513

Command Line Interface4-2324Related Commandsspanning-tree portfast (4-232)spanning-tree portfastThis command sets an interface to fast forwarding. Use

Page 514

Spanning Tree Commands4-2334Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • When enabled, BPDUs are flooded to all other

Page 515

Command Line Interface4-2344spanning-tree loopback-detectionThis command enables the detection and response to Spanning Tree loopback BPDU packets on

Page 516

Spanning Tree Commands4-2354Command Usage• If the port is configured for automatic loopback release, then the port will only be returned to the forwar

Page 517

Command Line Interface4-2364spanning-tree mst costThis command configures the path cost on a spanning instance in the Multiple Spanning Tree. Use the

Page 518

Spanning Tree Commands4-2374spanning-tree mst port-priorityThis command configures the interface priority on a spanning instance in the Multiple Spann

Page 519

Command Line Interface4-2384Command Usage If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notification BPDUs,

Page 520

Spanning Tree Commands4-2394ExampleConsole#show spanning-treeSpanning-tree information---------------------------------------------------------------

Page 521

Command Line Interface4-2404show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Command Mode Privil

Page 522

VLAN Commands4-2414GVRP and Bridge Extension CommandsGARP VLAN Registration Protocol defines a way for switches to exchange VLAN information in order

Page 523

Main Menu3-73Port Neighbors Information Displays settings and operational state for the remote side 3-144Port Broadcast Control Sets the broadcast sto

Page 524 - Link Aggregation Commands

Command Line Interface4-2424show bridge-extThis command shows the configuration for bridge extension commands.Default Setting NoneCommand Mode Privile

Page 525

VLAN Commands4-2434show gvrp configurationThis command shows if GVRP is enabled.Syntax show gvrp configuration [interface]interface • ethernet unit/po

Page 526

Command Line Interface4-2444Command Usage • Group Address Registration Protocol is used by GVRP and GMRP to register or deregister client attributes f

Page 527

VLAN Commands4-2454Related Commandsgarp timer (4-243)Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in this mode

Page 528

Command Line Interface4-2464vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [

Page 529

VLAN Commands4-2474Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLA

Page 530

Command Line Interface4-2484switchport modeThis command configures the VLAN membership mode for a port. Use the no form to restore the default.Syntax

Page 531

VLAN Commands4-2494Default Setting All frame typesCommand Mode Interface Configuration (Ethernet, Port Channel)Command Usage When set to receive all f

Page 532

Command Line Interface4-2504Example The following example shows how to select port 1 and then enable ingress filtering:switchport native vlanThis comm

Page 533 - Power over Ethernet Commands

VLAN Commands4-2514switchport allowed vlanThis command configures VLAN groups on the selected interface. Use the no form to restore the default.Syntax

Page 534

Configuring the Switch3-83MSTP 3-178VLAN Configuration Configures priority and VLANs for a spanning tree instance 3-178Port Information Displays port

Page 535

Command Line Interface4-2524switchport forbidden vlanThis command configures forbidden VLANs. Use the no form to remove the list of forbidden VLANs.Sy

Page 536

VLAN Commands4-2534Displaying VLAN Informationshow vlanThis command shows VLAN information.Syntax show vlan [id vlan-id | name vlan-name | private-vla

Page 537

Command Line Interface4-2544Configuring IEEE 802.1Q TunnelingIEEE 802.1Q tunneling (QinQ tunneling) uses a single Service Provider VLAN (SPVLAN) for c

Page 538

VLAN Commands4-2554reconfigured to overcome a break in the tree. It is therefore advisable to disable spanning tree on these ports.dot1q-tunnel system

Page 539 - Mirror Port Commands

Command Line Interface4-2564• When a tunnel uplink port receives a packet from a customer, the customer tag (regardless of whether there are one or mo

Page 540

VLAN Commands4-2574ExampleRelated Commandsshow interfaces switchport (4-193)show dot1q-tunnelThis command displays information about QinQ tunnel ports

Page 541 - Rate Limit Commands

Command Line Interface4-2584Configuring Port-based Traffic SegmentationIf tighter security is required for passing traffic from different clients thro

Page 542 - Address Table Commands

VLAN Commands4-2594Command Usage • When traffic segmentation is enabled, the forwarding state for the uplink and downlink ports assigned to different

Page 543

Command Line Interface4-2604Command Usage • A port cannot be configured in both an uplink and downlink list.• A port can only be assigned to one traff

Page 544

VLAN Commands4-2614pvlan up-to-upThis command specifies whether or not traffic can be forwarded between uplink ports assigned to different client sess

Page 545

Main Menu3-93Port Configuration Sets the private VLAN interface type, and associates the interfaces with a private VLAN3-210Trunk Information Shows VL

Page 546 - Spanning Tree Commands

Command Line Interface4-2624Configuring Private VLANsPrivate VLANs provide port-based security and isolation between ports within the assigned VLAN. T

Page 547

VLAN Commands4-26344. Use the switchport private-vlan host-association command to assign a port to a secondary VLAN.5. Use the switchport private-vlan

Page 548 -

Command Line Interface4-2644private vlan associationUse this command to associate a primary VLAN with a secondary (i.e., community) VLAN. Use the no f

Page 549

VLAN Commands4-2654Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage• To assign a promiscuous port to a primary VLAN, use th

Page 550

Command Line Interface4-2664switchport private-vlan mappingUse this command to map an interface to a primary VLAN. Use the no form to remove this mapp

Page 551

VLAN Commands4-2674ExampleConfiguring Protocol-based VLANsThe network devices required to support multiple protocols cannot be easily grouped into a c

Page 552

Command Line Interface4-2684protocol-vlan protocol-group (Configuring Groups)This command creates a protocol group, or adds specific protocols to a gr

Page 553

VLAN Commands4-2694Command Usage • When creating a protocol-based VLAN, do not assign interfaces to the protocol VLAN via any of the standard VLAN com

Page 554

Command Line Interface4-2704show protocol-vlan protocol-group-vidThis command shows the mapping from protocol groups to VLANs.Syntaxshow protocol-vlan

Page 555

VLAN Commands4-2714voice vlanThis command enables VoIP traffic detection and defines the Voice VLAN ID. Use the no form to disable the Voice VLAN.Synt

Page 557

Configuring the Switch3-103QoS 3-237DiffServ 3-237Class Map Sets Class Maps 3-238Policy Map Sets Policy Maps 3-240Service Policy Defines service polic

Page 558

Command Line Interface4-2724Default Setting1440 minutesCommand ModeGlobal ConfigurationCommand UsageThe Voice VLAN aging time is the time after which

Page 559

VLAN Commands4-2734• Selecting a mask of FF-FF-FF-00-00-00 identifies all devices with the same OUI (the first three octets). Other masks restrict the

Page 560

Command Line Interface4-2744switchport voice vlan ruleThis command selects a method for detecting VoIP traffic on a port. Use the no form to disable t

Page 561

VLAN Commands4-2754Command Usage• Security filtering discards any non-VoIP packets received on the port that are tagged with the voice VLAN ID. VoIP t

Page 562

Command Line Interface4-2764show voice vlanThis command displays the Voice VLAN settings on the switch and the OUI Telephony list.Syntaxshow voice vla

Page 563

LLDP Commands4-2774LLDP CommandsLink Layer Discovery Protocol (LLDP) is used to discover basic information about neighboring devices on the local broa

Page 564

Command Line Interface4-2784* Vendor-specific options may or may not be advertised by neighboring devices.lldp basic-tlv system-nameConfigures an LLDP

Page 565

LLDP Commands4-2794lldpThis command enables LLDP globally on the switch. Use the no form to disable LLDP.Syntax[no] lldpDefault SettingEnabledCommand

Page 566

Command Line Interface4-2804lldp med-fast-start-countThis command specifies the amount of MED Fast Start LLDPDUs to transmit during the activation pro

Page 567

LLDP Commands4-2814notification are included in the transmission. An SNMP agent should therefore periodically check the value of lldpStatsRemTableLast

Page 568 - VLAN Commands

Main Menu3-113Trunk Configuration Configures MVR interface type and immediate leave status 3-268Group Member Configuration Statically assigns MVR mult

Page 569

Command Line Interface4-2824Command ModeGlobal ConfigurationCommand UsageWhen LLDP is re-initialized on a port, all information in the remote systems

Page 570

LLDP Commands4-2834lldp admin-statusThis command enables LLDP transmit, receive, or transmit and receive mode on the specified port. Use the no form t

Page 571

Command Line Interface4-2844therefore periodically check the value of lldpStatsRemTableLastChangeTime to detect any lldpRemTablesChange notification-e

Page 572

LLDP Commands4-2854lldp basic-tlv management-ip-addressThis command configures an LLDP-enabled port to advertise the management address for this devic

Page 573 - Editing VLAN Groups

Command Line Interface4-2864Command ModeInterface Configuration (Ethernet, Port Channel)Command UsageThe port description is taken from the ifDescr ob

Page 574

LLDP Commands4-2874Command ModeInterface Configuration (Ethernet, Port Channel)Command UsageThe system description is taken from the sysDescr object i

Page 575 - Configuring VLAN Interfaces

Command Line Interface4-2884Command ModeInterface Configuration (Ethernet, Port Channel)Command UsageThis option advertises the protocols that are acc

Page 576

LLDP Commands4-2894Command UsageThe port’s default VLAN identifier (PVID) indicates the VLAN with which untagged or priority-tagged frames are associa

Page 577

Command Line Interface4-2904Command UsageThis option advertises link aggregation capabilities, aggregation status of the link, and the 802.3 aggregate

Page 578

LLDP Commands4-2914Command UsageRefer to “Frame Size Commands” on page 4-33 for information on configuring the maximum frame size for this switch.Exam

Page 579

Configuring the Switch3-123Basic ConfigurationThis section describes the basic functions required to set up management access to the switch, display o

Page 580

Command Line Interface4-2924Command UsageThis option advertises extended Power-over-Ethernet capability details, such as power availability from the s

Page 581 - Displaying VLAN Information

LLDP Commands4-2934Command UsageThis option advertises location identification details.Examplelldp medtlv med-capThis command configures an LLDP-MED-e

Page 582

Command Line Interface4-2944Command UsageThis option advertises network policy configuration information, aiding in the discovery and diagnosis of VLA

Page 583

LLDP Commands4-2954ExampleConsole#show lldp configLLDP Global Configuation LLDP Enable : Yes LLDP Transmit interval : 30 LLDP Hold

Page 584

Command Line Interface4-2964show lldp info local-deviceThis command shows LLDP global and interface-specific configuration settings for this device.Sy

Page 585

LLDP Commands4-2974show lldp info remote-deviceThis command shows LLDP global and interface-specific configuration settings for remote devices attache

Page 586

Command Line Interface4-2984show lldp info statisticsThis command shows statistics based on traffic received through all attached LLDP-enabled interfa

Page 587

Class of Service Commands4-2994Class of Service CommandsThe commands described in this section allow you to specify which data packets have greater pr

Page 588

Command Line Interface4-3004Command Mode Global ConfigurationCommand Usage • Strict priority requires all traffic in a higher priority queue to be pro

Page 589

Class of Service Commands4-3014• This switch provides eight priority queues for each port. It is configured to use Weighted Round Robin, which can be

Page 590

Basic Configuration3-133Web – Click System, System Information. Specify the system name, location, and contact information for the system administrato

Page 591

Command Line Interface4-3024Command Usage • CoS values assigned at the ingress port are also used at the egress port.• This command sets the CoS prior

Page 592

Class of Service Commands4-3034Example show queue cos-mapThis command shows the class of service priority map.Syntax show queue cos-map [interface]int

Page 593

Command Line Interface4-3044Priority Commands (Layer 3 and 4)This section describes commands used to configure Layer 3 and Layer 4 traffic priority on

Page 594

Class of Service Commands4-3054Default Setting The DSCP default values are defined in the following table. Note that all the DSCP values that are not

Page 595

Command Line Interface4-3064Default Setting NoneCommand Mode Privileged ExecExample Related Commands map ip dscp (Global Configuration) (4-304)map ip

Page 596

Quality of Service Commands4-3074To create a service policy for a specific category of ingress traffic, follow these steps:1. Use the class-map comman

Page 597

Command Line Interface4-3084Command Usage • First enter this command to designate a class map and enter the Class Map configuration mode. Then use the

Page 598 - Configuring Voice VLANs

Quality of Service Commands4-3094Example This example creates a class map called “rd_class#1,” and sets it to match packets marked for DSCP service va

Page 599

Command Line Interface4-3104Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “rd_cla

Page 600

Quality of Service Commands4-3114Example This example creates a policy called “rd_policy,” uses the class command to specify the previously defined “r

Page 601

Configuring the Switch3-143Displaying Switch Hardware/Software Versions Use the Switch Information page to display hardware/firmware version numbers f

Page 602

Command Line Interface4-3124policeThis command defines an policer for classified traffic. Use the no form to remove a policer.Syntax [no] police rate-

Page 603

Quality of Service Commands4-3134service-policyThis command applies a policy map defined by the policy-map command to the ingress queue of a particula

Page 604

Command Line Interface4-3144Exampleshow policy-map This command displays the QoS policy maps which define classification criteria for incoming traffic

Page 605 - LLDP Commands

Multicast Filtering Commands4-3154Example Multicast Filtering CommandsThis switch uses IGMP (Internet Group Management Protocol) to query for any atta

Page 606

Command Line Interface4-3164ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp snoop

Page 607

Multicast Filtering Commands4-3174ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Sy

Page 608

Command Line Interface4-3184Command Usage • The IGMP snooping leave-proxy feature suppresses all unnecessary IGMP leave messages so that the non-queri

Page 609

Multicast Filtering Commands4-3194show ip igmp snoopingThis command shows the IGMP snooping configuration.Default Setting NoneCommand Mode Privileged

Page 610 - refresh-interval

Command Line Interface4-3204Example The following shows the multicast entries learned through IGMP snooping for VLAN 1:IGMP Query Commands (Layer 2)Th

Page 611

Multicast Filtering Commands4-3214Exampleip igmp snooping query-countThis command configures the query count. Use the no form to restore the default.S

Page 612

Basic Configuration3-153CLI – Use the following command to display version information.Console#show version 4-32Unit 1 Serial Number: A62201

Page 613

Command Line Interface4-3224Default Setting 125 secondsCommand Mode Global ConfigurationExample The following shows how to configure the query interva

Page 614

Multicast Filtering Commands4-3234ip igmp snooping router-port-expire-timeThis command configures the query timeout. Use the no form to restore the de

Page 615

Command Line Interface4-3244ip igmp snooping vlan mrouterThis command statically configures a multicast router port. Use the no form to remove the con

Page 616

Multicast Filtering Commands4-3254Command Usage Multicast router port types displayed include Static.Example The following shows that port 11 in VLAN

Page 617

Command Line Interface4-3264ip igmp filter (Global Configuration)This command globally enables IGMP filtering and throttling on the switch. Use the no

Page 618

Multicast Filtering Commands4-3274Command Usage A profile defines the multicast groups that a subscriber is permitted or denied to join. The same prof

Page 619

Command Line Interface4-3284Command Mode IGMP Profile ConfigurationCommand Usage Enter this command multiple times to specify more than one multicast

Page 620

Multicast Filtering Commands4-3294ip igmp max-groupsThis command sets the IGMP throttling number for an interface on the switch. Use the no form to re

Page 621

Command Line Interface4-3304Command Usage When the maximum number of groups is reached on a port, the switch can take one of two actions; either “deny

Page 622

Multicast Filtering Commands4-3314show ip igmp profileThis command displays IGMP filtering profiles created on the switch.Syntax show ip igmp profile

Page 623

Configuring the Switch3-163Displaying Bridge Extension CapabilitiesThe Bridge MIB includes extensions for managed devices that support Multicast Filte

Page 624

Command Line Interface4-3324Example Multicast VLAN Registration CommandsThis section describes commands used to configure Multicast VLAN Registration

Page 625

Multicast Filtering Commands4-3334Default Setting • MVR is disabled.• No MVR group address is defined.• The default number of contiguous addresses is

Page 626

Command Line Interface4-3344mvr (Interface Configuration)This command configures an interface as an MVR receiver or source port using the type keyword

Page 627 - Class of Service Commands

Multicast Filtering Commands4-3354• Immediate leave applies only to receiver ports. When enabled, the receiver port is immediately removed from the mu

Page 628

Command Line Interface4-3364Default Setting Displays global configuration settings for MVR when no keywords are used.Command Mode Privileged ExecComma

Page 629

Multicast Filtering Commands4-3374The following shows information about the interfaces associated with multicast groups assigned to the MVR VLAN:Statu

Page 630

Command Line Interface4-3384IP Interface CommandsAn IP addresses may be used for management access to the switch over your network. The IP address for

Page 631

IP Interface Commands4-3394• If you select the bootp or dhcp option, IP is enabled but will not function until a BOOTP or DHCP reply has been received

Page 632

Command Line Interface4-3404Related Commands show ip redirects (4-341)ip dhcp restart This command submits a BOOTP or DHCP client request.Default Sett

Page 633

IP Interface Commands4-3414Related Commands show ip redirects (4-341)show ip redirectsThis command shows the default gateway configured for this devic

Page 634 - Quality of Service Commands

Basic Configuration3-173CLI – Enter the following command. Setting the Switch’s IP Address This section describes how to configure an IP interface for

Page 635

Command Line Interface4-3424- Network or host unreachable - The gateway found no corresponding entry in the route table. • Press <Esc> to stop p

Page 636

A-1Appendix A: Software SpecificationsSoftware FeaturesManagement AuthenticationLocal, RADIUS, TACACS, Port Authentication (802.1X), MAC Authenticatio

Page 637

Software SpecificationsA-2ACoS configured by port or VLAN tagLayer 3/4 priority mapping: IP DSCPMulticast Filtering IGMP Snooping (Layer 2)Multicast V

Page 638

Management Information BasesA-3ALink Aggregation Control Protocol (LACP)Full-duplex flow control (ISO/IEC 8802-3)IEEE 802.3ac VLAN taggingIEEE 802.3af

Page 639

Software SpecificationsA-4ASNMP Framework MIB (RFC 3411)SNMP-MPD MIB (RFC 3412)SNMP Target MIB, SNMP Notification MIB (RFC 3413)SNMP User-Based SM MIB

Page 640

B-1Appendix B: Troubleshooting Problems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet,

Page 641

TroubleshootingB-2BUsing System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caus

Page 642

Glossary-1GlossaryAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Page 643 - Multicast Filtering Commands

GlossaryGlossary-2DHCP SnoopingA technique used to enhance network security by snooping on DHCP server messages to track the physical location of host

Page 644

Glossary-3GlossaryIEEE 802.1QVLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to differ

Page 645

Configuring the Switch3-183Manual ConfigurationWeb – Click System, IP Configuration. Select the VLAN through which the management station is attached,

Page 646

GlossaryGlossary-4one of the devices is made the “querier” and assumes responsibility for keeping track of group membership. In-Band ManagementManagem

Page 647

Glossary-5GlossaryMulticast SwitchingA process whereby the switch filters incoming multicast frames for services for which no attached host has regist

Page 648 - IGMP Query Commands (Layer 2)

GlossaryGlossary-6Power over EthernetThe IEEE 802.3af standard for providing Power over Ethernet (PoE) capabilities. When Ethernet is passed over copp

Page 649

Glossary-7GlossarySimple Network Management Protocol (SNMP)The application protocol in the Internet suite of protocols which offers network management

Page 650

GlossaryGlossary-8Virtual LAN (VLAN)A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical l

Page 651

Index-1Numerics802.1Q tunnel 3-197, 4-254configuration, guidelines 3-200, 4-254configuration, limitations 3-200description 3-197ethernet type 3-201, 4

Page 652

Index-2Indexqueue mapping 3-230, 4-301queue mode 3-232, 4-299traffic class weights 3-233Ddefault gateway, configuration 3-17, 4-339default priority, i

Page 653

Index-3Indexfiltering/throttling, interface settings 3-261, 4-328–4-329groups, displaying 3-256, 4-319immediate leave, status 3-253, 4-318Layer 2 3-25

Page 654

Index-4IndexTLV, PoE 3-217, 4-291TLV, port capabilities 3-217, 4-293loggingsyslog traps 3-30, 4-52to syslog servers 3-30, 4-51log-in, Web interface 3-

Page 655

Index-5Indexpriority 3-158, 4-208showing mainpower 3-156, 4-210port priorityconfiguring 3-228, 4-299default ingress 3-228, 4-300STA 3-174, 4-230port s

Page 656

Basic Configuration3-193Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by th

Page 657

Index-6Indexgroup configuration 3-52, 4-91remote user configuration 3-50, 4-93user configuration 3-48, 3-50, 4-93views 3-55, 4-89softwaredisplaying ve

Page 658

Index-7Indexadding static members 3-192, 3-194, 4-251creating 3-190, 4-246description 3-184, 3-213displaying basic information 3-188, 4-242displaying

Page 659

Index-8Index

Page 661

ES3528M-PoEE112008/ST-R01149100041600A

Page 662

viiContents Chapter 1: Introduction 1-1Key Features 1-1Description of Software Features 1-2System Defaults 1-6Chapter 2: Initial Configuration

Page 663

Configuring the Switch3-203Web – If the address assigned by DHCP is no longer functioning, you will not be able to renew the IP settings via the web i

Page 664

Basic Configuration3-213Managing FirmwareYou can upload/download firmware to or from a TFTP server. Just specify the method of file transfer, along wi

Page 665

Configuring the Switch3-223Downloading System Software from a ServerWhen downloading runtime code, the new operation code file will overwrite the exis

Page 666 - IP Interface Commands

Basic Configuration3-233CLI – To download new firmware from a TFTP server, enter the IP address of the TFTP server, select “opcode” as the file type,

Page 667

Configuring the Switch3-243Downloading Configuration Settings from a ServerYou can download the configuration file under a new file name and then set

Page 668

Basic Configuration3-253CLI – Enter the IP address of the TFTP server, specify the source file on the server, set the startup file name on the switch,

Page 669

Configuring the Switch3-263• Speed – Sets the terminal line’s baud rate for transmit (to terminal) and receive (from terminal). Set the speed to match

Page 670

Basic Configuration3-273CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the curren

Page 671 - Software Features

Configuring the Switch3-283• Password2 – Specifies a password for the line connection. When a connection is started on a line with password protection

Page 672 - Standards

Basic Configuration3-293Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events that are

Page 673 - Management Information Bases

ContentsviiiManaging Firmware 3-21Downloading System Software from a Server 3-22Saving or Restoring Configuration Settings 3-23Downloading Configur

Page 674 - Software Specifications

Configuring the Switch3-303Web – Click System, Log, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM and fl

Page 675 - Appendix B: Troubleshooting

Basic Configuration3-313Web – Click System, Log, Remote Logs. To add an IP address to the Host IP List, type the new IP address in the Host IP Address

Page 676 - Using System Logs

Configuring the Switch3-323Displaying Log MessagesThe Logs page allows you to scroll through the logged system and event messages. The switch can stor

Page 677 - Glossary

Basic Configuration3-333configured email recipients. For example, using Level 7 will report all events from level 7 to level 0. (Default: Level 7)• SM

Page 678

Configuring the Switch3-343CLI – Enter the host ip address, followed by the mail severity level, source and destination email addresses and enter the

Page 679

Basic Configuration3-353Web – Click System, Reset. Enter the amount of time the switch should wait before rebooting. Click the Reset button to reboot

Page 680

Configuring the Switch3-363Setting the Time ManuallyYou can set the system time on the switch manually without using SNTP.CLI – This example sets the

Page 681

Basic Configuration3-373CLI – This example configures the switch to operate as an SNTP unicast client and then displays the current time and settings.

Page 682

Configuring the Switch3-383Web – Select SNTP, Configuration. Modify any of the required NTP parameters, and click Apply.Figure 3-21 NTP Client Config

Page 683

Basic Configuration3-393Setting the Time ZoneSNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time at

Page 684 - Virtual LAN (VLAN)

ContentsixConfiguring HTTPS 3-78Replacing the Default Secure-site Certificate 3-79Configuring the Secure Shell 3-80Generating the Host Key Pair 3

Page 685 - Numerics

Configuring the Switch3-403Simple Network Management Protocol SNMP is a communication protocol designed specifically for managing devices on a network

Page 686

Simple Network Management Protocol3-413Note: The predefined default groups and view can be deleted from the system. You can then define customized gro

Page 687

Configuring the Switch3-423Setting Community Access Strings You may configure up to five community strings authorized for management access by clients

Page 688

Simple Network Management Protocol3-433Specifying Trap Managers and Trap TypesTraps indicating status changes are issued by the switch to specified tr

Page 689

Configuring the Switch3-443top of the SNMP Configuration page (for Version 1 or 2c clients), or define a corresponding “User Name” in the SNMPv3 Users

Page 690

Simple Network Management Protocol3-453Web – Click SNMP, Configuration. Enter the IP address and community string for each management station that wil

Page 691

Configuring the Switch3-463Configuring SNMPv3 Management AccessTo configure SNMPv3 management access to the switch, follow these steps:1. If you want

Page 692

Simple Network Management Protocol3-473Specifying a Remote Engine IDTo send inform messages to an SNMPv3 user on a remote device, you must first speci

Page 693

Configuring the Switch3-483Configuring SNMPv3 Users Each SNMPv3 user is defined by a unique name. Users must be configured with a specific security le

Page 694 - E112008/ST-R01

Simple Network Management Protocol3-493Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and as

Comments to this Manuals

No comments