Edge-products ES3528-WDM Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Accessoires pour ordinateurs Edge-products ES3528-WDM. Edge Products ES3528-WDM User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 556
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Powered by Accton
Management Guide
ES3528
ES3528-WDM
Layer 2 Metro Access Switch
www.edge-core.com
Vue de la page 0
1 2 3 4 5 6 ... 555 556

Résumé du contenu

Page 1 - Powered by Accton

Powered by AcctonManagement GuideES3528ES3528-WDMLayer 2 Metro Access Switchwww.edge-core.com

Page 2

Contentsxshow system 19-6show users 19-7show version 19-7System Mode Commands 19-8system mode 19-8show system mode 19-9System MTU Commands 19-

Page 3 - ES3528 Fast Ethernet Switch

Simple Network Management Protocol5-165CLI – Use the snmp-server group command to configure a new group, specifying the security model and level, and

Page 4 - 149100033100A

Configuring SNMPv3 Management Access5-175Web – Click SNMP, SNMPv3, Views. Click New to configure a new view. In the New View page, define a name and s

Page 5

Simple Network Management Protocol5-185CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces

Page 6

6-1Chapter 6: User AuthenticationYou can configure this switch to authenticate users logging into the system for management access using local or remo

Page 7

User Authentication6-26Web – Click Security, User Accounts. To configure a new user account, enter the user name, access level, and password, then cli

Page 8

Configuring Local/Remote Logon Authentication6-36the network. An authentication server contains a database of multiple user name/password pairs with a

Page 9

User Authentication6-46- Number of Server Transmits – Number of times the switch tries to authenticate logon access via the authentication server. (Ra

Page 10

Configuring HTTPS6-56Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket Lay

Page 11

User Authentication6-66• The following web browsers and operating systems currently support HTTPS:• To specify a secure-site certificate, see “Replaci

Page 12

Configuring the Secure Shell6-76When you have obtained these, place them on your TFTP server, and use the following command at the switch's comma

Page 13

Contentsxishow logging sendmail 19-37Time Commands 19-37sntp client 19-38sntp server 19-39sntp poll 19-39show sntp 19-40clock timezone 19-40cal

Page 14

User Authentication6-86To use the SSH server, complete these steps:1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a host publ

Page 15

Configuring the Secure Shell6-96stored on the switch can access it. The following exchanges take place during this process:Authenticating SSH v1.5 Cli

Page 16

User Authentication6-106Note: The switch uses only RSA Version 1 for SSHv1.5 clients and DSA Version 2 for SSHv2 clients.• Save Host-Key from Memory t

Page 17

Configuring the Secure Shell6-116CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory,

Page 18 - Contents

User Authentication6-126Web – Click Security, SSH, Settings. Enable SSH and adjust the authentication parameters as required, then click Apply. Note t

Page 19

Configuring 802.1X Port Authentication6-136Configuring 802.1X Port Authentication Network switches can provide open and easy access to network resourc

Page 20

User Authentication6-146• The RADIUS server and 802.1X client support EAP. (The switch only supports EAPOL in order to pass the EAP packets from the s

Page 21

Configuring 802.1X Port Authentication6-156Configuring 802.1X Global SettingsThe 802.1X protocol provides port authentication. The 802.1X protocol mus

Page 22

User Authentication6-166• Max Request – Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it

Page 23

Configuring 802.1X Port Authentication6-176CLI – This example sets the 802.1X parameters on port 2. For a description of the additional fields display

Page 24

ContentsxiiWeb Server Commands 21-11ip http port 21-11ip http server 21-12ip http secure-server 21-12ip http secure-port 21-13Telnet Server Comma

Page 25

User Authentication6-186Displaying 802.1X StatisticsThis switch can display statistics for dot1x protocol exchanges for any port. Table 6-2 802.1X S

Page 26

Configuring 802.1X Port Authentication6-196Web – Select Security, 802.1X, Statistics. Select the required port and then click Query. Click Refresh to

Page 27 - Section I: Getting Started

User Authentication6-206Filtering IP Addresses for Management AccessYou can create a list of up to 16 IP addresses or IP address groups that are allow

Page 28 - Getting Started

Filtering IP Addresses for Management Access6-216Web – Click Security, IP Filter. Enter the IP addresses or range of addresses that are allowed manage

Page 29 - Chapter 1: Introduction

User Authentication6-226

Page 30 - Introduction

7-1Chapter 7: Client Security This switch supports many methods of segregating traffic for clients attached to each of the data ports, and for ensurin

Page 31

Client Security7-27MAC addresses already in the address table will be retained and will not age out. Any other device that attempts to use the port wi

Page 32

Configuring Port Security7-37Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the check

Page 33

Client Security7-47

Page 34 - System Defaults

8-1Chapter 8: Access Control ListsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port

Page 35

Contentsxiiiip dhcp snooping vlan 22-9ip dhcp snooping binding 22-10ip dhcp snooping verify mac-address 22-11ip dhcp snooping database flash 22-12

Page 36

Access Control Lists8-28• Each ACL can have up to 32 rules. However, due to resource restrictions, the average number of rules bound to the ports shou

Page 37 - Connecting to the Switch

Configuring Access Control Lists8-38Web – Click Security, ACL, Configuration. Enter an ACL name in the Name field, select the list type (IP Standard,

Page 38 - Required Connections

Access Control Lists8-48Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,” enter a spe

Page 39 - Basic Configuration

Configuring Access Control Lists8-58• Source/Destination Port – Source/destination port number for the specified protocol type. (Range: 0-65535)• Sour

Page 40 - Setting an IP Address

Access Control Lists8-68Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (Any

Page 41 - Dynamic Configuration

Configuring Access Control Lists8-78Configuring a MAC ACLCommand Attributes• Action – An ACL can contain any combination of permit or deny rules.• Sou

Page 42 - Initial Configuration

Access Control Lists8-88Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (Any

Page 43 - Trap Receivers

Configuring Access Control Lists8-98Configuring ACL MasksYou must specify masks that control the order in which ACL rules are checked. ACL rules match

Page 44 - Managing System Files

Access Control Lists8-108CLI – This example creates an IP ingress mask, and then adds two rules. Each rule is checked in order of precedence to look f

Page 45 - Saving Configuration Settings

Configuring Access Control Lists8-118Web – Configure the mask to match the required rules in the IP ingress or egress ACLs. Set the mask to check for

Page 46

Contentsxivshow interfaces switchport 24-11Chapter 25: Link Aggregation Commands 25-1channel-group 25-2lacp 25-2lacp system-priority 25-4lacp adm

Page 47 - Section II: Switch Management

Access Control Lists8-128Configuring a MAC ACL MaskThis mask defines the fields to check in the packet header. Command UsageYou must configure a mask

Page 48 - Switch Management

Binding a Port to an Access Control List8-138CLI – This example shows how to create an Ingress MAC ACL and bind it to a port. You can then see that th

Page 49 - Using the Web Interface

Access Control Lists8-148Web – Click Security, ACL, Port Binding. Mark the Enable field for the port you want to bind to an ACL for ingress traffic, s

Page 50 - Home Page

9-1Chapter 9: Port ConfigurationDisplaying Connection StatusYou can use the Port Information or Trunk Information pages to display the current connect

Page 51 - Panel Display

Port Configuration9-29Field Attributes (CLI)Basic information:• Port type – Indicates port type. (100BASE-TX10, 100BASE-BX11, 1000BASE-T, or SFP)• MAC

Page 52 - Main Menu

Configuring Interface Connections9-39CLI – This example shows the connection status for Port 5.Configuring Interface Connections You can use the Port

Page 53

Port Configuration9-49- 100full - Supports 100 Mbps full-duplex operation - 1000full - Supports 1 Gbps full-duplex operation - Sym (Gigabit only) - Ch

Page 54 - Configuring the Switch

Configuring Interface Connections9-59Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click Ap

Page 55

Port Configuration9-69Creating Trunk GroupsYou can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers

Page 56

Creating Trunk Groups9-79Statically Configuring a TrunkCommand Usage• When configuring static trunks, you may not be able to link switches of differen

Page 57 - Displaying System Information

Contentsxvspanning-tree link-type 29-15spanning-tree mst cost 29-16spanning-tree mst port-priority 29-17spanning-tree protocol-migration 29-18show

Page 58 - Basic Management Tasks

Port Configuration9-89CLI – This example creates trunk 1 with ports 9 and 10. Just connect these ports to two static trunk ports on another switch to

Page 59 - Configuring the Switch for

Creating Trunk Groups9-99Command Attributes• Member List (Current) – Shows configured trunks (Port).• New – Includes entry fields for creating new tru

Page 60

Port Configuration9-109Configuring LACP ParametersDynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following

Page 61

Creating Trunk Groups9-119Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can

Page 62

Port Configuration9-129CLI – The following example configures LACP parameters for ports 1-10. Ports 1-8 are used as active members of the LAG, ports 9

Page 63

Creating Trunk Groups9-139Displaying LACP Port CountersYou can display statistics for LACP protocol messages. Web – Click Port, LACP, Port Counters In

Page 64

Port Configuration9-149Displaying LACP Settings and Status for the Local SideYou can display configuration settings and the operational state for the

Page 65 - Manual Configuration

Creating Trunk Groups9-159Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information.Figure 9-7

Page 66 - Using DHCP/BOOTP

Port Configuration9-169Displaying LACP Settings and Status for the Remote SideYou can display configuration settings and the operational state for the

Page 67 - Managing Firmware

Setting Broadcast Storm Thresholds9-179CLI – The following example displays the LACP configuration settings and operational state for the remote side

Page 68

Contentsxviqueue bandwidth 31-4queue cos-map 31-4show queue bandwidth 31-5show queue cos-map 31-6vlan priority 31-6show vlan based priority 31-

Page 69

Port Configuration9-189• Threshold – Threshold as percentage of port bandwidth. (Options: 500-262143 packets per second; Default: 500 pps) • Trunk12 –

Page 70

Configuring Port Mirroring9-199Configuring Port MirroringYou can mirror traffic from any source port to a target port for real-time analysis. You can

Page 71

Port Configuration9-209Configuring Rate LimitsThis function allows the network manager to control the maximum rate for traffic transmitted or received

Page 72 - Console Port Settings

Showing Port Statistics9-219CLI - This example sets the rate limit for input and output traffic passing through port 1 to 60 Mbps.Showing Port Statist

Page 73

Port Configuration9-229Transmit Multicast Packets The total number of packets that higher-level protocols requested be transmitted, and which were add

Page 74 - Telnet Settings

Showing Port Statistics9-239RMON StatisticsDrop Events The total number of events in which packets were dropped due to lack of resources.Jabbers The t

Page 75

Port Configuration9-249Web – Click Port, Port Statistics. Select the required interface, and click Query. You can also use the Refresh button at the b

Page 76 - Configuring Event Logging

Showing Port Statistics9-259CLI – This example shows statistics for port 12.Console#show interfaces counters ethernet 1/12 24-10Ethernet 1/12 Iftable

Page 77 - Remote Log Configuration

Port Configuration9-269

Page 78

10-1Chapter 10: Address Table SettingsSwitches store the addresses for all known devices. This information is used to pass traffic directly between th

Page 79 - Displaying Log Messages

Contentsxviishow ip igmp snooping mrouter 33-11Multicast VLAN Registration Commands 33-11mvr (Global Configuration) 33-12mvr (Interface Configurati

Page 80

Address Table Settings10-210CLI – This example adds an address to the static address table, but sets it to be deleted when the switch is reset.Display

Page 81 - Resetting the System

Displaying the Address Table10-310Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLA

Page 82 - Setting the System Clock

Address Table Settings10-410Changing the Aging TimeYou can set the aging time for entries in the dynamic address table. Command Attributes• Aging Stat

Page 83 - Setting the Time Zone

11-1Chapter 11: Spanning Tree Algorithm The Spanning Tree Algorithm (STA) can be used to detect and disable network loops, and to provide backup links

Page 84

Spanning Tree Algorithm11-211MSTP – When using STP or RSTP, it may be difficult to maintain a stable path between all VLAN members. Frequent changes i

Page 85 - Chapter 5:

Displaying Global Settings11-311Displaying Global SettingsYou can display a summary of the current bridge STA information that applies to the entire s

Page 86 - Enabling the SNMP Agent

Spanning Tree Algorithm11-411• Instance – Instance identifier of this spanning tree. (This is always 0 for the CIST.)• VLANs configuration – VLANs ass

Page 87

Displaying Global Settings11-511CLI – This command displays global STA settings, followed by settings for each port. Note:The current root port and cu

Page 88

Spanning Tree Algorithm11-611Configuring Global SettingsGlobal settings apply to the entire switch.Command Usage• Spanning Tree Protocol17Uses RSTP fo

Page 89

Configuring Global Settings11-711address will then become the root device. (Note that lower numeric values indicate higher priority.)• Default: 32768•

Page 90

Contentsxviii

Page 91 - Setting a Local Engine ID

Spanning Tree Algorithm11-811Configuration Settings for MSTP • Max Instance Numbers – The maximum number of MSTP instances to which this switch can be

Page 92 - Specifying a Remote Engine ID

Configuring Global Settings11-911Web – Click Spanning Tree, STA, Configuration. Modify the required attributes, and click Apply.Figure 11-2 STA Glob

Page 93 - Configuring SNMPv3 Users

Spanning Tree Algorithm11-1011CLI – This example enables Spanning Tree Protocol, sets the mode to MST, and then configures the STA and MSTP parameters

Page 94

Displaying Interface Settings11-1111• Designated Port – The port priority and number of the port on the designated bridging device through which this

Page 95

Spanning Tree Algorithm11-1211These additional parameters are only displayed for the CLI:• Admin status – Shows if this interface is enabled.• Externa

Page 96

Configuring Interface Settings11-1311CLI – This example shows the STA attributes for port 5. Configuring Interface SettingsYou can configure RSTP and

Page 97 - Configuring SNMPv3 Groups

Spanning Tree Algorithm11-1411The following interface attributes can be configured:• Spanning Tree – Enables/disables STA on this interface. (Default:

Page 98

Configuring Interface Settings11-1511• Admin Link Type – The link type attached to this interface.• Point-to-Point – A connection to exactly one other

Page 99

Spanning Tree Algorithm11-1611Configuring Multiple Spanning Trees MSTP generates a unique spanning tree for each instance. This provides multiple path

Page 100 - Setting SNMPv3 Views

Configuring Multiple Spanning Trees11-1711Web – Click Spanning Tree, MSTP, VLAN Configuration. Select an instance identifier from the list, set the in

Page 101

xixTablesTable 1-1 Key Features 1-1Table 1-2 System Defaults 1-6Table 3-1 Web Page Configuration Buttons 3-3Table 3-2 Switch Main Menu 3-4Table 4-

Page 102

Spanning Tree Algorithm11-1811CLI – This example sets the priority for MSTI 1, and adds VLANs 1-5 to this MSTI. --------------------------------------

Page 103 - Configuring User Accounts

Displaying Interface Settings for MSTP11-1911Displaying Interface Settings for MSTPThe MSTP Port Information and MSTP Trunk Information pages display

Page 104 - User Authentication

Spanning Tree Algorithm11-2011Configuring Interface Settings for MSTPYou can configure the STA interface settings for an MST Instance using the MSTP P

Page 105

Configuring Interface Settings for MSTP11-2111Protocol is detecting network loops. Where more than one port is assigned the highest priority, the port

Page 106

Spanning Tree Algorithm11-2211

Page 107 - Configuring HTTPS

12-1Chapter 12: VLAN ConfigurationIEEE 802.1Q VLANsIn large networks, routers are used to isolate broadcast traffic for each subnet into separate doma

Page 108

VLAN Configuration12-212Note: VLAN-tagged frames can pass through VLAN-aware or VLAN-unaware network interconnection devices, but the VLAN tags should

Page 109 - Configuring the Secure Shell

IEEE 802.1Q VLANs12-312these hosts, and core switches in the network, enable GVRP on the links between these devices. You should also determine securi

Page 110

VLAN Configuration12-412Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN

Page 111 - Generating the Host Key Pair

IEEE 802.1Q VLANs12-512CLI – Enter the following command.Displaying Current VLANsThe VLAN Current Table shows the current port members of each VLAN an

Page 113 - Configuring the SSH Server

xxTablesTable 20-4 show snmp group - display description 20-13Table 20-5 show snmp user - display description 20-15Table 21-1 Authentication Command

Page 114

VLAN Configuration12-612Command Attributes (CLI)• VLAN – ID of configured VLAN (1-4093, no leading zeroes).• Type – Shows how this VLAN was added to t

Page 115

IEEE 802.1Q VLANs12-712Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbox to

Page 116

VLAN Configuration12-812Command Attributes • VLAN – ID of configured VLAN (1-4093).• Name – Name of the VLAN (1 to 32 characters).• Status – Enables o

Page 117 - Console(config)#

IEEE 802.1Q VLANs12-912CLI – The following example adds tagged and untagged ports to VLAN 2.Adding Static Members to VLANs (Port Index)Use the VLAN St

Page 118

VLAN Configuration12-1012Configuring VLAN Behavior for InterfacesYou can configure VLAN behavior for specific interfaces, including the default VLAN i

Page 119

IEEE 802.1Q VLANs12-1112Leave or LeaveAll message has been issued, the applicants can rejoin before the port actually leaves the group. (Range: 60-300

Page 120 - Displaying 802.1X Statistics

VLAN Configuration12-1212CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GAR

Page 121

Configuring IEEE 802.1Q Tunneling12-1312processing. When the packet exits another trunk port on the same core switch, the same SPVLAN tag is again add

Page 122

VLAN Configuration12-14125. If the egress port is an untagged member of the SPVLAN, the outer tag will be stripped. If it is a tagged member, the outg

Page 123 - Figure 6-10 IP Filter

Configuring IEEE 802.1Q Tunneling12-1512Configuration Limitations for QinQ• The native VLAN of uplink ports should not be used as the SPVLAN. If the S

Page 124

xxiTablesTable 30-8 IEEE 802.1Q Tunneling Commands 30-20Table 31-1 Priority Commands 31-1Table 31-2 Priority Commands (Layer 2) 31-1Table 31-3 Defa

Page 125 - Chapter 7: Client Security

VLAN Configuration12-1612Adding an Interface to a QinQ TunnelFollow the guidelines in the preceding section to set up a QinQ tunnel on the switch. Use

Page 126 - Client Security

Configuring Private VLANs12-1712CLI – This example sets port 2 to tunnel mode, indicates that the TPID used for 802.1Q tagged frames will be 9100 hexa

Page 127 - Configuring Port Security

VLAN Configuration12-1812Configuring Uplink and Downlink PortsUse the Private VLAN Link Status page to set ports as downlink or uplink ports. Ports de

Page 128

Configuring Protocol-Based VLANs12-1912Command UsageTo configure protocol-based VLANs, follow these steps:1. First configure VLAN groups for the proto

Page 129

VLAN Configuration12-2012Mapping Protocols to VLANsMap a protocol group to a VLAN for each interface that will participate in the group.Command Usage•

Page 130 - Setting the ACL Name and Type

Configuring Protocol-Based VLANs12-2112CLI – The following maps the traffic entering Port 1 which matches the protocol type specified in protocol grou

Page 131 - Configuring a Standard ACL

VLAN Configuration12-2212

Page 132 - Configuring an Extended ACL

13-1Chapter 13: Class of ServiceClass of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in th

Page 133

Class of Service13-213Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interface, then click

Page 134 - Access Control Lists

Layer 2 Queue Settings13-313Mapping CoS Values to Egress QueuesThis switch processes Class of Service (CoS) priority tagged traffic by using eight pri

Page 136

Class of Service13-413Web – Click Priority, Traffic Classes. Assign priorities to the traffic classes (i.e., output queues), then click Apply.Figure 1

Page 137 - Configuring ACL Masks

Layer 2 Queue Settings13-513Selecting the Queue ModeYou can set the switch to service the queues based on a strict rule that requires all traffic in a

Page 138 - Configuring an IP ACL Mask

Class of Service13-613Setting the Service Weight for Traffic ClassesThis switch uses the Weighted Round Robin (WRR) algorithm to determine the frequen

Page 139

Layer 3/4 Priority Settings13-713CLI – The following example shows how to assign WRR weights to each of the priority queues.Layer 3/4 Priority Setting

Page 140 - Configuring a MAC ACL Mask

Class of Service13-813Web – Click Priority, IP Precedence/DSCP Priority Status. Select Disabled, IP Precedence or IP DSCP from the scroll-down menu, t

Page 141

Layer 3/4 Priority Settings13-913Web – Click Priority, IP Precedence Priority. Select an entry from the IP Precedence Priority Table, enter a value in

Page 142

Class of Service13-1013Mapping DSCP PriorityThe DSCP is six bits wide, allowing coding for up to 64 different forwarding behaviors. The DSCP replaces

Page 143 - Chapter 9: Port Configuration

Layer 3/4 Priority Settings13-1113CLI – The following example globally enables DSCP Priority service on the switch, maps DSCP value 0 to CoS value 1 (

Page 144 - Port Configuration

Class of Service13-1213Click Priority, IP Port Priority. Enter the port number for a network application in the IP Port Number box and the new CoS val

Page 145

14-1Chapter 14: Quality of Service The commands described in this section are used to configure Quality of Service (QoS) classification criteria and s

Page 146

xxiiiFiguresFigure 3-1 Home Page 3-2Figure 3-2 Front Panel Indicators 3-3Figure 4-1 System Information 4-2Figure 4-2 System Mode 4-3Figure 4-3 Sys

Page 147

Quality of Service14-2146. Use the “Service Policy” to assign a policy map to a specific interface.Configuring a Class MapA class map is used for matc

Page 148 - Creating Trunk Groups

Configuring Quality of Service Parameters14-314Match Class Settings• Class Name – List of class maps. • ACL List – Name of an access control list. Any

Page 149

Quality of Service14-414Web – Click QoS, DiffServ, then click Add Class to create a new class, or Edit Rules to change the rules of an existing class.

Page 150

Configuring Quality of Service Parameters14-514Creating QoS PoliciesThis function creates a policy map that can be attached to multiple interfaces.Com

Page 151

Quality of Service14-614Policy Rule Settings- Class Settings -• Class Name – Name of class map.• Action – Shows the service provided to ingress traffi

Page 152 - Configuring LACP Parameters

Configuring Quality of Service Parameters14-714Web – Click QoS, DiffServ, Policy Map to display the list of existing policy maps. To add a new policy

Page 153

Quality of Service14-814CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps,

Page 154

15-1Chapter 15: Multicast Filtering Multicasting is used to support real-time applications such as videoconferencing or streaming audio. A multicast s

Page 155 - Displaying LACP Port Counters

Multicast Filtering15-215Layer 2 IGMP (Snooping and Query)IGMP Snooping and Query – If multicast routing is not supported on other switches in your ne

Page 156

Layer 2 IGMP (Snooping and Query)15-315Static IGMP Host Interface – For multicast applications that you need to control more carefully, you can manual

Page 157

xxivFiguresFigure 7-1 Port Security 7-3Figure 8-1 Selecting ACL Type 8-3Figure 8-2 ACL Configuration - Standard IPv4 8-4Figure 8-3 ACL Configuratio

Page 158

Multicast Filtering15-415• IGMP Query Timeout — The time the switch waits after the previous querier stops before it considers the router port (i.e.,

Page 159

Layer 2 IGMP (Snooping and Query)15-515Displaying Interfaces Attached to a Multicast RouterMulticast routers that are attached to ports on the switch

Page 160

Multicast Filtering15-615Specifying Static Interfaces for a Multicast RouterDepending on your network connections, IGMP snooping may not always be abl

Page 161 - Configuring Port Mirroring

Layer 2 IGMP (Snooping and Query)15-715Displaying Port Members of Multicast Services You can display the port members associated with a specified VLAN

Page 162 - Configuring Rate Limits

Multicast Filtering15-815Assigning Ports to Multicast Services Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query me

Page 163 - Showing Port Statistics

Multicast VLAN Registration15-915Multicast VLAN RegistrationMulticast VLAN Registration (MVR) is a protocol that controls access to a single network-w

Page 164

Multicast Filtering15-1015Configuring Global MVR SettingsThe global settings for Multicast VLAN Registration (MVR) include enabling or disabling MVR f

Page 165

Multicast VLAN Registration15-1115CLI – This example first enables IGMP snooping, enables MVR globally, and then configures a range of MVR group addre

Page 166

Multicast Filtering15-1215Configuring MVR Interface StatusEach interface that participates in the MVR VLAN must be configured as an MVR source port or

Page 167

Multicast VLAN Registration15-1315Web – Click MVR, Port Configuration or Trunk Configuration.Figure 15-8 MVR Port ConfigurationCLI – This example co

Page 168

xxvFiguresFigure 13-3 Queue Mode 13-5Figure 13-4 Queue Scheduling 13-6Figure 13-5 IP Precedence/DSCP Priority Status 13-8Figure 13-6 IP Precedence

Page 169 - Setting Static Addresses

Multicast Filtering15-1415Displaying Port Members of Multicast GroupsYou can display the multicast groups assigned to the MVR VLAN either through IGMP

Page 170 - Displaying the Address Table

Multicast VLAN Registration15-1515Assigning Static Multicast Groups to InterfacesFor multicast streams that will run for a long term and be associated

Page 171

Multicast Filtering15-1615

Page 172 - Changing the Aging Time

16-1Chapter 16: Domain Name ServiceThe Domain Naming System (DNS) service on this switch allows host names to be mapped to IP addresses using static t

Page 173

Domain Name Service16-216Web – Select DNS, General Configuration. Set the default domain name or list of domain names, specify one or more name server

Page 174 - Region R

Configuring Static DNS Host to Address Entries16-316Configuring Static DNS Host to Address EntriesYou can manually configure static entries in the DNS

Page 175 - Displaying Global Settings

Domain Name Service16-416Web – Select DNS, Static Host Table. Enter a host name and one or more corresponding addresses, then click Apply.Figure 16-2

Page 176 - Spanning Tree Algorithm

Displaying the DNS Cache16-516Displaying the DNS CacheYou can display entries in the DNS cache that have been learned via the designated name servers.

Page 177

Domain Name Service16-616CLI - This example displays all the resource records learned from the designated name servers.Console#show dns cache 34-7NO

Page 178 - Configuring Global Settings

Section III:Command Line InterfaceThis section provides a detailed description of the Command Line Interface, along with examples for all of the comma

Page 179

xxviFigures

Page 180

Command Line Interface

Page 181

17-1Chapter 17: Overview of Command Line InterfaceThis chapter describes how to use the Command Line Interface (CLI).Using the Command Line InterfaceA

Page 182 - Displaying Interface Settings

Overview of Command Line Interface17-217Note: The IP address for this switch is obtained via DHCP by default. To access the switch through a Telnet se

Page 183

Entering Commands17-317Entering CommandsThis section describes how to enter CLI commands.Keywords and ArgumentsA CLI command is a series of keywords a

Page 184

Overview of Command Line Interface17-417Showing CommandsIf you enter a “?” at the command prompt, the system will display the first level of keywords

Page 185

Entering Commands17-517The command “show interfaces ?” will display the following information:Partial Keyword LookupIf you terminate a partial keyword

Page 186

Overview of Command Line Interface17-617Understanding Command ModesThe command set is divided into Exec and Configuration classes. Exec commands gener

Page 187

Entering Commands17-717Configuration CommandsConfiguration commands are privileged level commands used to modify switch settings. These commands modif

Page 188

Overview of Command Line Interface17-817To enter the other modes, at the configuration prompt type one of the following commands. Use the exit or end

Page 189

Entering Commands17-917Command Line ProcessingCommands are not case sensitive. You can abbreviate commands and parameters as long as they contain enou

Page 190

Section I: Getting StartedThis section provides an overview of the switch, and introduces some basic concepts about network switches. It also describe

Page 191

Overview of Command Line Interface17-1017Command GroupsThe system commands can be broken down into the functional groups shown below.Table 17-4 Comm

Page 192

Command Groups17-1117The access mode shown in the following tables is indicated by these abbreviations: ACL (Access Control List Configuration) LC (Li

Page 193 - Console(config-if)

Overview of Command Line Interface17-1217

Page 194

18-1Chapter 18: General CommandsThese commands are used to control the command access mode, configuration mode, and other basic functions.enableThis c

Page 195 - IEEE 802.1Q VLANs

General Commands18-218• The “#” character is appended to the end of the prompt to indicate that the system is in privileged access mode. Example Relat

Page 196 - VU: VLAN Unaware

show history18-318Example Related Commands end (18-4)show historyThis command shows the contents of the command history buffer.Default Setting NoneCom

Page 197

General Commands18-418reloadThis command restarts the system.Note:When the system is restarted, it will always run the Power-On Self-Test. It will als

Page 198 - VLAN Configuration

exit18-518Command Mode Global Configuration, Interface Configuration, Line Configuration, VLAN Database Configuration, and Multiple Spanning Tree Conf

Page 199 - Displaying Current VLANs

General Commands18-618Example This example shows how to quit a CLI session:Console#quitPress ENTER to start sessionUser Access VerificationUsername:

Page 200 - Creating VLANs

19-1Chapter 19: System Management CommandsThese commands are used to control system logs, passwords, user names, management options, and display or co

Page 201

Getting Started

Page 202

System Management Commands19-219Example System Status CommandsThis section describes commands used to display system information.show startup-configTh

Page 203

System Status Commands19-319- IP address - Layer 4 precedence settings- Spanning tree settings- Any configured settings for the console port and Telne

Page 204

System Management Commands19-419show running-configThis command displays the configuration information currently in use.Default Setting NoneCommand Mo

Page 205

System Status Commands19-519Example Related Commandsshow startup-config (19-2)Console#show running-configbuilding running-config, please wait...!<

Page 206

System Management Commands19-619show systemThis command displays system information.Default Setting NoneCommand Mode Normal Exec, Privileged ExecComma

Page 207

System Status Commands19-719show usersShows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client.De

Page 208

System Management Commands19-819Example System Mode CommandsThis section describes command used to configure the switch to operate in normal mode or Q

Page 209

System MTU Commands19-919ExampleRelated Commandsshow system mode (19-9)show system mode This command displays the switch system mode.Command Mode Priv

Page 210

System Management Commands19-1019jumbo frameThis command enables support for extended frame sizes on Fast Ethernet and Gigabit Ethernet ports. Use the

Page 211 - Configuring Private VLANs

System MTU Commands19-1119system mtuThis command sets the maximum transfer unit for traffic crossing the switch. Use the no form to restore the defaul

Page 212

1-1Chapter 1: IntroductionThis switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to conf

Page 213 - Configuring Protocol Groups

System Management Commands19-1219Example File Management CommandsManaging FirmwareFirmware can be uploaded and downloaded to or from a TFTP server. By

Page 214 - Mapping Protocols to VLANs

File Management Commands19-1319copy This command moves (upload/download) a code image or configuration file between the switch’s flash memory and a

Page 215 - Console(config-if)#

System Management Commands19-1419• The Boot ROM and Loader cannot be uploaded or downloaded from the TFTP server. You must follow the instructions in

Page 216

File Management Commands19-1519The following example shows how to download a configuration file: This example shows how to copy a secure-site certific

Page 217 - Chapter 13: Class of Service

System Management Commands19-1619Command Usage • If the file type is used for system startup, then this file cannot be deleted. • “Factory_Default_Con

Page 218 - Class of Service

File Management Commands19-1719Example The following example shows how to display all file information:whichbootThis command displays which files were

Page 219 - Layer 2 Queue Settings

System Management Commands19-1819Default Setting NoneCommand Mode Global ConfigurationCommand Usage • If the file contains an error, it cannot be set

Page 220

Line Commands19-1919Line CommandsYou can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial port.

Page 221 - Selecting the Queue Mode

System Management Commands19-2019Command Usage Telnet is considered a virtual terminal connection and will be shown as “VTY” in screen displays such a

Page 222

Line Commands19-2119Example Related Commandsusername (21-2)password (19-21)passwordThis command specifies the password for a line. Use the no form to

Page 223 - Layer 3/4 Priority Settings

Management GuideES3528 Fast Ethernet SwitchLayer 2 Ethernet Metro Access Switchwith 24 Fast Ethernet Ports (RJ-45), 2 Gigabit Combination Ports (RJ-45

Page 224 - Mapping IP Precedence

Introduction1-21Description of Software FeaturesThe switch provides a wide range of advanced performance enhancing features. Flow control eliminates t

Page 225

System Management Commands19-2219timeout login responseThis command sets the interval that the system waits for a user to log into the CLI. Use the no

Page 226 - Mapping DSCP Priority

Line Commands19-2319Command Usage • If user input is detected within the timeout interval, the session is kept open; otherwise the session is terminat

Page 227 - Mapping IP Port Priority

System Management Commands19-2419silent-timeThis command sets the amount of time the management console is inaccessible after the number of unsuccessf

Page 228

Line Commands19-2519Example To specify 7 data bits, enter this command:Related Commands parity (19-25)parityThis command defines the generation of a p

Page 229 - (see page 14-7)

System Management Commands19-2619Default Setting autoCommand Mode Line Configuration Command Usage Set the speed to match the baud rate of the device

Page 230 - Configuring a Class Map

Line Commands19-2719Command Mode Privileged ExecCommand Usage Specifying session identifier “0” will disconnect the console connection. Specifying any

Page 231

System Management Commands19-2819Event Logging CommandsThis section describes commands used to configure event logging on the switch.logging onThis co

Page 232 - Quality of Service

Event Logging Commands19-2919logging historyThis command limits syslog messages saved to switch memory based on severity. The no form returns the logg

Page 233 - Creating QoS Policies

System Management Commands19-3019logging hostThis command adds a syslog server host IP address that will receive logging messages. Use the no form to

Page 234

Event Logging Commands19-3119logging trapThis command enables the logging of system messages to a remote server, or limits the syslog messages saved t

Page 235 - Classes

Description of Software Features1-31Access Control Lists – ACLs provide packet filtering for IP frames (based on address, protocol, TCP/UDP port numbe

Page 236

System Management Commands19-3219Related Commandsshow log (19-33)show loggingThis command displays the configuration settings for logging messages to

Page 237 - Multicast

Event Logging Commands19-3319The following example displays settings for the trap function. Related Commandsshow logging sendmail (19-37)show logThis

Page 238 - Multicast Filtering

System Management Commands19-3419ExampleThe following example shows the event message stored in RAM. SMTP Alert CommandsThese commands configure SMTP

Page 239

SMTP Alert Commands19-3519• To send email alerts, the switch first opens a connection, sends all the email alerts waiting in the queue one by one, and

Page 240

System Management Commands19-3619Default Setting None Command Mode Global ConfigurationCommand Usage You may use an symbolic email address that identi

Page 241 - Console#

Time Commands19-3719Command Mode Global ConfigurationExampleshow logging sendmailThis command displays the settings for the SMTP event handler.Command

Page 242

System Management Commands19-3819sntp clientThis command enables SNTP client requests for time synchronization from NTP or SNTP time servers specified

Page 243

Time Commands19-3919sntp serverThis command sets the IP address of the servers to which SNTP time requests are issued. Use the this command with no ar

Page 244

System Management Commands19-4019Example Related Commandssntp client (19-38)show sntpThis command displays the current time and configuration settings

Page 245 - Multicast VLAN Registration

Time Commands19-4119Command Usage This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich Mean Time

Page 246

Introduction1-41Store-and-Forward Switching – The switch copies each frame into its memory before forwarding them to another port. This ensures that a

Page 247

System Management Commands19-4219show calendarThis command displays the system clock.Default Setting NoneCommand Mode Normal Exec, Privileged ExecExam

Page 248

20-1Chapter 20: SNMP CommandsControls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as t

Page 249

SNMP Commands20-220snmp-serverThis command enables the SNMPv3 engine and services for all management clients (i.e., versions 1, 2c, 3). Use the no for

Page 250

snmp-server community20-320Examplesnmp-server communityThis command defines the SNMP v1 and v2c community access string. Use the no form to remove the

Page 251

SNMP Commands20-420• private - Read/write access. Authorized management stations are able to both retrieve and modify MIB objects.Command Mode Global

Page 252

snmp-server host20-520Command Mode Global ConfigurationExample Related Commandssnmp-server contact (20-4)snmp-server host This command specifies the r

Page 253

SNMP Commands20-620• SNMP Version: 1• UDP Port: 162Command Mode Global ConfigurationCommand Usage • If you do not enter an snmp-server host command, n

Page 254 - Domain Name Service

snmp-server enable traps20-720supports. If the snmp-server host command does not specify the SNMP version, the default is to send SNMP version 1 notif

Page 255

SNMP Commands20-820conjunction with the corresponding entries in the Notify View assigned by the snmp-server group command (page 20-11).Example Relate

Page 256

show snmp engine-id20-920• A local engine ID is automatically generated that is unique to the switch. This is referred to as the default engine ID. If

Page 257 - Displaying the DNS Cache

Description of Software Features1-51Queuing. It uses IEEE 802.1p and 802.1Q tags to prioritize incoming traffic based on input from the end-station ap

Page 258

SNMP Commands20-1020snmp-server viewThis command adds an SNMP view which controls user access to the MIB. Use the no form to remove an SNMP view.Synta

Page 259

show snmp view20-1120show snmp viewThis command shows information on the SNMP views.Command Mode Privileged ExecExample snmp-server groupThis command

Page 260 - Command Line Interface

SNMP Commands20-1220Default Setting • Default groups: public30 (read only), private31 (read/write)• readview - Every object belonging to the Internet

Page 261 - Chapter 17:

show snmp group20-1320Group Name: publicSecurity Model: v2cRead View: defaultviewWrite View: noneNotify View: noneStorage Type: volatileRow Status: ac

Page 262

SNMP Commands20-1420snmp-server userThis command adds a user to an SNMP group, restricting the user to a specific SNMP Read, Write, or Notify View. Us

Page 263 - Entering Commands

show snmp user20-1520need to configure the remote agent’s SNMP engine ID before you can send proxy requests or informs to it.Exampleshow snmp userThis

Page 264 - Showing Commands

SNMP Commands20-1620

Page 265 - Using Command History

21-1Chapter 21: User Authentication Commands You can configure this switch to authenticate users logging into the system for management access using l

Page 266 - Exec Commands

User Authentication Commands21-221usernameThis command adds named users, requires authentication at login, specifies or changes a user's password

Page 267 - Configuration Commands

User Account Commands21-321enable passwordAfter initially logging onto the system, you should set the Privileged Exec password. Remember to record it

Page 268

Introduction1-61System DefaultsThe switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch d

Page 269 - Command Line Processing

User Authentication Commands21-421Authentication SequenceThree authentication methods can be specified to authenticate users logging into the system f

Page 270 - Command Groups

Authentication Sequence21-521Example Related Commandsusername - for setting the local user names and passwords (21-2)authentication enableThis command

Page 271

User Authentication Commands21-621RADIUS ClientRemote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses softwa

Page 272

RADIUS Client21-721Example radius-server portThis command sets the RADIUS server network port. Use the no form to restore the default.Syntax radius-se

Page 273 - Chapter 18: General Commands

User Authentication Commands21-821radius-server retransmitThis command sets the number of retries. Use the no form to restore the default.Syntax radiu

Page 274 - General Commands

TACACS+ Client21-921Example TACACS+ ClientTerminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses soft

Page 275

User Authentication Commands21-1021Command Mode Global ConfigurationExample tacacs-server portThis command specifies the TACACS+ server network port.

Page 276

Web Server Commands21-1121show tacacs-serverThis command displays the current settings for the TACACS+ server.Default Setting NoneCommand Mode Privile

Page 277

User Authentication Commands21-1221ExampleRelated Commandsip http server (21-12)ip http serverThis command allows this device to be monitored or confi

Page 278

Web Server Commands21-1321• When you start HTTPS, the connection is established in this way:- The client authenticates the server using the server’s d

Page 279 - Device Designation Commands

System Defaults1-71SNMP SNMP Agent EnabledCommunity Strings “public” (read only) “private” (read/write) Traps Authentication traps: enabledLink-up-dow

Page 280 - System Status Commands

User Authentication Commands21-1421• If you change the HTTPS port number, clients attempting to connect to the HTTPS server must specify the port numb

Page 281

Secure Shell Commands21-1521Secure Shell CommandsThis section describes the commands used to configure the SSH server. Note that you also need to inst

Page 282 - System Management Commands

User Authentication Commands21-1621To use the SSH server, complete these steps:1. Generate a Host Key Pair – Use the ip ssh crypto host-key generate c

Page 283

Secure Shell Commands21-1721stored on the switch can access it. The following exchanges take place during this process:Authenticating SSH v1.5 Clients

Page 284

User Authentication Commands21-1821Example Related Commandsip ssh crypto host-key generate (21-20)show ssh (21-22)ip ssh timeoutThis command configure

Page 285

Secure Shell Commands21-1921ip ssh authentication-retriesThis command configures the number of times the SSH server attempts to reauthenticate a user.

Page 286 - System Mode Commands

User Authentication Commands21-2021delete public-keyThis command deletes the specified user’s public key.Syntax delete public-key username [dsa | rsa]

Page 287 - System MTU Commands

Secure Shell Commands21-2121Related Commandsip ssh crypto zeroize (21-21)ip ssh save host-key (21-21)ip ssh crypto zeroizeThis command clears the host

Page 288

User Authentication Commands21-2221Example Related Commandsip ssh crypto host-key generate (21-20)show ip sshThis command displays the connection sett

Page 289

Secure Shell Commands21-2321show public-keyThis command shows the public key for the specified user or for the host.Syntax show public-key [user [user

Page 290 - File Management Commands

Introduction1-81Traffic Prioritization Ingress Port Priority 0Queue Mode WRRWeighted Round Robin Queue: 0 1 2 3 4 5 6 7Weight: 1 2 4

Page 291

User Authentication Commands21-2421Example 802.1X Port AuthenticationThe switch supports IEEE 802.1X (dot1x) port-based access control that prevents u

Page 292

802.1X Port Authentication21-2521dot1x system-auth-controlThis command enables IEEE 802.1X port authentication globally on the switch. Use the no form

Page 293

User Authentication Commands21-2621dot1x port-controlThis command sets the dot1x mode on a port interface. Use the no form to restore the default.Synt

Page 294

802.1X Port Authentication21-2721Command Usage • The “max-count” parameter specified by this command is only effective if the dot1x mode is set to “au

Page 295

User Authentication Commands21-2821Command Usage• The re-authentication process verifies the connected client’s user ID and password on the RADIUS ser

Page 296

802.1X Port Authentication21-2921Default3600 secondsCommand ModeInterface ConfigurationExampledot1x timeout tx-periodThis command sets the time that a

Page 297 - Line Commands

User Authentication Commands21-3021Command UsageThis command displays the following information:• Global 802.1X Parameters – Shows whether or not 802.

Page 298

802.1X Port Authentication21-3121• Backend State Machine - State – Current state (including request, response, success, fail, timeout, idle, initializ

Page 299

User Authentication Commands21-3221ExampleConsole#show dot1xGlobal 802.1X Parameters system-auth-control: enable802.1X Port SummaryPort Name Status

Page 300

Management IP Filter Commands21-3321Management IP Filter CommandsThis section describes commands used to configure IP management access to the switch.

Page 301

2-1Chapter 2: Initial ConfigurationConnecting to the SwitchConfiguration OptionsThe switch includes a built-in network management agent. The agent off

Page 302

User Authentication Commands21-3421ExampleThis example restricts management access to the indicated addresses.show managementThis command displays the

Page 303

22-1Chapter 22: Client Security Commands This switch supports many methods of segregating traffic for clients attached to each of the data ports, and

Page 304

Client Security Commands22-222port securityThis command enables or configures port security. Use the no form without any keywords to disable port secu

Page 305

IP Source Guard Commands22-322Example The following example enables port security for port 5, and sets the response to a security violation to issue a

Page 306 - Event Logging Commands

Client Security Commands22-422Command ModeInterface Configuration (Ethernet)Command Usage • Source guard is used to filter traffic on an unsecure port

Page 307

IP Source Guard Commands22-522ExampleThis example enables IP source guard on port 5.Related Commands ip source-guard binding (22-5)ip dhcp snooping (2

Page 308

Client Security Commands22-622- If there is an entry with same VLAN ID and MAC address, and the type of entry is static IP source guard binding, then

Page 309

DHCP Snooping Commands22-722DHCP Snooping CommandsDHCP snooping allows a switch to protect a network from rogue DHCP servers or other devices which se

Page 310

Client Security Commands22-822• When enabled, DHCP messages entering an untrusted interface are filtered based upon dynamic entries learned via DHCP s

Page 311

DHCP Snooping Commands22-922ExampleThis example enables DHCP snooping globally for the switch.Related Commands ip dhcp snooping vlan (22-9)ip dhcp sno

Page 312 - SMTP Alert Commands

Initial Configuration2-22• Configure up to 12 static or LACP trunks• Enable port mirroring• Set broadcast storm control on any port• Display system in

Page 313

Client Security Commands22-1022Related Commands ip dhcp snooping (22-7)ip dhcp snooping trust (22-12)ip dhcp snooping binding (22-10)ip dhcp snooping

Page 314

DHCP Snooping Commands22-1122- If there is a binding with same VLAN ID and MAC address, and the entry type is static IP source guard binding, static D

Page 315 - Time Commands

Client Security Commands22-1222ip dhcp snooping database flashThis command writes all dynamically learned snooping entries to flash memory.Command Mod

Page 316

DHCP Snooping Commands22-1322ExampleThis example sets port 5 to untrusted.Related Commands ip dhcp snooping (22-7)ip dhcp snooping vlan (22-9)ip dhcp

Page 317

Client Security Commands22-1422

Page 318

23-1Chapter 23: Access Control List CommandsAccess Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 pro

Page 319

Access Control List Commands23-223access-list ip This command adds an IP access list and enters configuration mode for standard or extended IP ACLs. U

Page 320

IP ACLs23-323Default SettingNoneCommand ModeStandard IP ACLCommand Usage• New rules are appended to the end of the list.• Address bitmasks are similar

Page 321 - Chapter 20: SNMP Commands

Access Control List Commands23-423• precedence – IP precedence level. (Range: 0-7)• tos – Type of Service level. (Range: 0-15)• dscp – DSCP priority l

Page 322 - SNMP Commands

IP ACLs23-523ExampleThis example accepts any incoming packets if the source address is within subnet 10.7.1.x. For example, if the rule is matched; i.

Page 323

Basic Configuration2-32Remote ConnectionsPrior to accessing the switch’s onboard agent via a network connection, you must first configure it with a va

Page 324

Access Control List Commands23-623access-list ip mask-precedence This command changes to the IP Mask mode used to configure access control masks. Use

Page 325

IP ACLs23-723• destination-bitmask – Destination address of rule must match this bitmask.• precedence – Check the IP precedence field.• tos – Check th

Page 326

Access Control List Commands23-823This shows that the entries in the mask override the precedence in which the rules are entered into the ACL. In the

Page 327

IP ACLs23-923This shows how to create an extended ACL with an egress mask to drop packets leaving network 171.69.198.0 when the Layer 4 source port is

Page 328

Access Control List Commands23-1023This is a more comprehensive example. It denies any TCP packets in which the SYN bit is ON, and permits all other p

Page 329

IP ACLs23-1123Related Commandsmask (IP ACL) (23-6)ip access-group This command binds a port to an IP ACL. Use the no form to remove the port.Syntax[no

Page 330

Access Control List Commands23-1223MAC ACLsThe commands in this section configure ACLs based on hardware addresses, packet format, and Ethernet type.

Page 331

MAC ACLs23-1323Example Related Commandspermit, deny (23-13)mac access-group (23-18)show mac access-list (23-14)permit, deny (MAC ACL)This command adds

Page 332

Access Control List Commands23-1423• address-bitmask34 – Bitmask for MAC address (in hexidecimal format).• vid – VLAN ID. (Range: 1-4093)•vid-bitmask3

Page 333

MAC ACLs23-1523Related Commandspermit, deny 23-13mac access-group (23-18)access-list mac mask-precedence This command changes to MAC Mask mode used to

Page 334

ES3528ES3528-WDMF1.0.1.7 E122006/ST-R01149100033100A

Page 335

Initial Configuration2-42Setting PasswordsNote: If this is your first time to log into the CLI program, you should define new passwords for both defau

Page 336

Access Control List Commands23-1623• host – The address must be for a single node.• source-bitmask – Source address of rule must match this bitmask.•

Page 337 - User Account Commands

MAC ACLs23-1723This example creates an Egress MAC ACL.show access-list mac mask-precedence This command shows the ingress or egress rule masks for MAC

Page 338 - User Authentication Commands

Access Control List Commands23-1823mac access-groupThis command binds a port to a MAC ACL. Use the no form to remove the port.Syntaxmac access-group a

Page 339

ACL Information23-1923ACL InformationThis section describes commands used to display ACL information.show access-listThis command shows all IP ACLs an

Page 340 - Authentication Sequence

Access Control List Commands23-2023

Page 341

24-1Chapter 24: Interface CommandsThese commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN. i

Page 342 - RADIUS Client

Interface Commands24-224Command Mode Global Configuration Example To specify port 4, enter the following command:descriptionThis command adds a descri

Page 343

negotiation24-324Default Setting • Auto-negotiation is enabled by default. • When auto-negotiation is disabled, the default speed-duplex setting is: -

Page 344

Interface Commands24-424Command Usage • When auto-negotiation is enabled the switch will negotiate the best settings for a link based on the capabilit

Page 345 - TACACS+ Client

flowcontrol24-524Command Usage When auto-negotiation is enabled with the negotiation command, the switch will negotiate the best settings for a link b

Page 346

Basic Configuration2-52Before you can assign an IP address to the switch, you must obtain the following information from your network administrator:•

Page 347 - Web Server Commands

Interface Commands24-624ExampleThe following example enables flow control on port 5.Related Commands negotiation (24-3)capabilities (flowcontrol, symm

Page 348

switchport packet-rate24-724Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage This command allows you to disable a port due t

Page 349

Interface Commands24-824switchport block This command prevents flooding of unknown unicast or multicast packets to an interface. Use the no form to re

Page 350 - Telnet Server Commands

show interfaces status24-924Command Usage Statistics are only initialized for a power reset. This command sets the base value for displayed statistics

Page 351 - Secure Shell Commands

Interface Commands24-1024Example show interfaces countersThis command displays interface statistics. Syntax show interfaces counters [interface]interf

Page 352

show interfaces switchport24-1124Example show interfaces switchportThis command displays the administrative and operational status of the specified in

Page 353

Interface Commands24-1224Example This example shows the configuration setting for port 4. Console#show interfaces switchport ethernet 1/4 Broadcast Th

Page 354

25-1Chapter 25: Link Aggregation CommandsPorts can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network c

Page 355

Link Aggregation Commands25-225Dynamically Creating a Port Channel –Ports assigned to a common port channel must meet the following criteria:• Ports m

Page 356

lacp25-325Default Setting DisabledCommand Mode Interface Configuration (Ethernet)Command Usage • The ports on both ends of an LACP trunk must be confi

Page 357

Initial Configuration2-625. Wait a few minutes, and then check the IP configuration settings by typing the “show ip interface” command. Press <Ente

Page 358

Link Aggregation Commands25-425lacp system-priorityThis command configures a port's LACP system priority. Use the no form to restore the default

Page 359

lacp admin-key (Port Channel)25-525Default Setting 0Command Mode Interface Configuration (Ethernet)Command Usage • Ports are only allowed to join the

Page 360 - 802.1X Port Authentication

Link Aggregation Commands25-625• If the port channel admin key (lacp admin key - Port Channel) is not set when a channel group is formed (i.e., it has

Page 361

show lacp25-725show lacpThis command displays LACP information.Syntax show lacp [port-channel] {counters | internal | neighbors | sys-id}• port-channe

Page 362

Link Aggregation Commands25-825Console#show lacp 1 internalPort channel: 1-------------------------------------------------------------------------Ope

Page 363

show lacp25-925Console#show lacp 1 neighborsPort channel 1 neighbors-------------------------------------------------------------------------Eth 1/1--

Page 364

Link Aggregation Commands25-1025Console#show lacp sysidPort Channel System Priority System MAC Address-----------------------------------------

Page 365

26-1Chapter 26: Mirror Port CommandsThis section describes how to mirror traffic from a source port to a target port. port monitorThis command configu

Page 366

Mirror Port Commands26-226Example The following example configures the switch to mirror all packets from port 6 to 11:show port monitorThis command di

Page 367

27-1Chapter 27: Rate Limit CommandsThis function allows the network manager to control the maximum rate for traffic transmitted or received on an inte

Page 368

Basic Configuration2-72The default strings are:• public - with read-only access. Authorized management stations are only able to retrieve MIB objects.

Page 369 - Management IP Filter Commands

Rate Limit Commands27-227Related Command show interfaces switchport (24-11)rate-limit cosThis command defines the output rate limit for an interface b

Page 370

show rate-limit cos27-327ExampleThis example sets the maximum output rate for CoS traffic of priority level 0 to 50 Mbps on Port 1. show rate-limit co

Page 371 - Port Security Commands

Rate Limit Commands27-427

Page 372 - Client Security Commands

28-1Chapter 28: Address Table CommandsThese commands are used to configure the address table for filtering specified addresses, displaying current ent

Page 373 - IP Source Guard Commands

Address Table Commands28-228Command Usage The static address for a host device can be assigned to a specific port within a specific VLAN. Use this com

Page 374

show mac-address-table28-328show mac-address-tableThis command shows classes of entries in the bridge-forwarding database.Syntax show mac-address-tabl

Page 375

Address Table Commands28-428mac-address-table aging-timeThis command sets the aging time for entries in the address table. Use the no form to restore

Page 376

29-1Chapter 29: Spanning Tree CommandsThis section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and com

Page 377 - DHCP Snooping Commands

Spanning Tree Commands29-229spanning-treeThis command enables the Spanning Tree Algorithm globally for the switch. Use the no form to disable it.Synta

Page 378

spanning-tree mode29-329Default Setting rstpCommand Mode Global ConfigurationCommand Usage • Spanning Tree ProtocolUses RSTP for the internal state ma

Page 379

Initial Configuration2-82Configuring Access for SNMP Version 3 ClientsTo configure management access for SNMPv3 clients, you need to first create a vi

Page 380

Spanning Tree Commands29-429spanning-tree forward-timeThis command configures the spanning tree bridge forward time globally for this switch. Use the

Page 381

spanning-tree max-age29-529Example Related Commandsspanning-tree forward-time (29-4)spanning-tree max-age (29-5)spanning-tree max-ageThis command conf

Page 382

Spanning Tree Commands29-629spanning-tree priorityThis command configures the spanning tree priority globally for this switch. Use the no form to rest

Page 383

spanning-tree transmission-limit29-729Command Usage The path cost method is used to determine the best path between devices. Therefore, lower values s

Page 384

Spanning Tree Commands29-829Related Commands mst vlan (29-8)mst priority (29-9)name (29-9)revision (29-10)max-hops (29-11)mst vlanThis command adds VL

Page 385

mst priority29-929mst priorityThis command configures the priority of a spanning tree instance. Use the no form to restore the default.Syntax mst inst

Page 386 - Access Control List Commands

Spanning Tree Commands29-1029Command Usage The MST region name and revision number (page 29-10) are used to designate a unique MST region. A bridge (i

Page 387 - Console(config-std-acl)#

max-hops29-1129max-hopsThis command configures the maximum number of hops in the region before a BPDU is discarded. Use the no form to restore the def

Page 388

Spanning Tree Commands29-1229spanning-tree costThis command configures the spanning tree path cost for the specified interface. Use the no form to res

Page 389

spanning-tree port-priority29-1329Command Usage • This command is used by the Spanning Tree Algorithm to determine the best path between devices. Ther

Page 390

Managing System Files2-92Due to the size limit of the flash memory, the switch supports only two operation code files. However, you can have as many d

Page 391 - Console(config-ip-mask-acl)#

Spanning Tree Commands29-1429spanning-tree edge-portThis command specifies an interface as an edge port. Use the no form to restore the default.Syntax

Page 392

spanning-tree link-type29-1529Command Usage • This command is used to enable/disable the fast spanning-tree mode for the selected port. In this mode,

Page 393

Spanning Tree Commands29-1629• RSTP only works on point-to-point links between two bridges. If you designate a port as a shared link, RSTP is forbidde

Page 394

spanning-tree mst port-priority29-1729Example Related Commandsspanning-tree mst port-priority (29-17)spanning-tree mst port-priorityThis command confi

Page 395

Spanning Tree Commands29-1829spanning-tree protocol-migrationThis command re-checks the appropriate BPDU format to send on the selected interface. Syn

Page 396 - MAC ACLs

show spanning-tree29-1929Command Mode Privileged ExecCommand Usage •Use the show spanning-tree command with no parameters to display the spanning tree

Page 397

Spanning Tree Commands29-2029show spanning-tree mst configurationThis command shows the configuration of the multiple spanning tree.Command Mode Privi

Page 398

30-1Chapter 30: VLAN CommandsA VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same

Page 399

VLAN Commands30-230bridge-ext gvrpThis command enables GVRP globally for the switch. Use the no form to disable it.Syntax [no] bridge-ext gvrpDefault

Page 400

GVRP and Bridge Extension Commands30-330switchport gvrpThis command enables GVRP for a port. Use the no form to disable it.Syntax [no] switchport gvrp

Page 401

Initial Configuration2-102

Page 402

VLAN Commands30-430garp timerThis command sets the values for the join, leave and leaveall timers. Use the no form to restore the timers’ default valu

Page 403 - ACL Information

GVRP and Bridge Extension Commands30-530show garp timerThis command shows the GARP timers for the selected interface.Syntax show garp timer [interface

Page 404

VLAN Commands30-630Editing VLAN Groupsvlan databaseThis command enters VLAN database mode. All commands in this mode will take effect immediately.Defa

Page 405

Editing VLAN Groups30-730vlanThis command configures a VLAN. Use the no form to restore the default settings or delete a VLAN.Syntax vlan vlan-id [nam

Page 406 - Interface Commands

VLAN Commands30-830Configuring VLAN Interfacesinterface vlanThis command enters interface configuration mode for VLANs, which is used to configure VLA

Page 407

Configuring VLAN Interfaces30-930switchport modeThis command configures the VLAN membership mode for a port. Use the no form to restore the default.Sy

Page 408

VLAN Commands30-1030Command Usage When set to receive all frame types, any received frames that are untagged are assigned to the default VLAN. Example

Page 409

Configuring VLAN Interfaces30-1130switchport native vlanThis command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restor

Page 410

VLAN Commands30-1230Command Mode Interface Configuration (Ethernet, Port Channel)Command Usage • A port, or a trunk with switchport mode set to hybrid

Page 411

Displaying VLAN Information30-1330Command Usage • This command prevents a VLAN from being automatically added to the specified interface via GVRP.• If

Page 412

Section II: Switch ManagementThis section describes the basic switch features, along with a detailed description of how to configure each feature via

Page 413

VLAN Commands30-1430Example The following example shows how to display information for VLAN 1:Configuring Private VLANsPrivate VLANs provide port-base

Page 414

Configuring Private VLANs30-1530• Entering the pvlan command without any parameters enables the private VLAN. Entering no pvlan disables the private V

Page 415

VLAN Commands30-1630Configuring Protocol-based VLANsThe network devices required to support multiple protocols cannot be easily grouped into a common

Page 416

Configuring Protocol-based VLANs30-1730protocol-vlan protocol-group (Configuring Groups)This command creates a protocol group, or to add specific prot

Page 417

VLAN Commands30-1830Command Usage • When creating a protocol-based VLAN, only assign interfaces via this command. If you assign interfaces using any o

Page 418 - Link Aggregation Commands

Configuring Protocol-based VLANs30-1930show interfaces protocol-vlan protocol-groupThis command shows the mapping from protocol groups to VLANs for th

Page 419

VLAN Commands30-2030Configuring IEEE 802.1Q TunnelingQinQ tunneling uses a single Service Provider VLAN (SPVLAN) for customers who have multiple VLANs

Page 420

Configuring IEEE 802.1Q Tunneling30-2130switchport mode dot1q-tunnelThis command configures an interface as a QinQ tunnel port. Use the no form to res

Page 421

VLAN Commands30-2230Related Commandsswitchport mode dot1q-tunnel (page 30-21)switchport dot1q-ethertypeThis command sets the Tag Protocol Identifier (

Page 422

31-1Chapter 31: Class of Service CommandsThe commands described in this section allow you to specify which data packets have greater precedence when t

Page 423

Switch Management

Page 424

Class of Service Commands31-231queue modeThis command sets the queue mode to strict priority or Weighted Round-Robin (WRR) for the class of service (C

Page 425

Priority Commands (Layer 2)31-331Example switchport priority defaultThis command sets a priority for incoming untagged frames. Use the no form to rest

Page 426

Class of Service Commands31-431Related Commandsshow interfaces switchport (24-11)queue bandwidth This command assigns weighted round-robin (WRR) weigh

Page 427 - Command Function Mode Page

Priority Commands (Layer 2)31-531Default Setting This switch supports Class of Service by using eight priority queues, with Weighted Round Robin queui

Page 428 - Mirror Port Commands

Class of Service Commands31-631Example show queue cos-mapThis command shows the class of service priority map.Syntax show queue cos-map [interface]int

Page 429

Priority Commands (Layer 2)31-731Default Setting The original priority value in the VLAN tag of a tagged packet, or a VLAN priority tag inserted by an

Page 430 - Rate Limit Commands

Class of Service Commands31-831Priority Commands (Layer 3 and 4)This section describes commands used to configure Layer 3 and Layer 4 traffic priority

Page 431

Priority Commands (Layer 3 and 4)31-931map ip port (Interface Configuration)This command sets IP port priority (i.e., TCP/UDP port priority). Use the

Page 432

Class of Service Commands31-1031Example The following example shows how to enable IP precedence mapping globally:map ip precedence (Interface Configur

Page 433

Priority Commands (Layer 3 and 4)31-1131map ip dscp (Global Configuration)This command enables IP DSCP mapping (i.e., Differentiated Services Code Poi

Page 434 - Address Table Commands

3-1Chapter 3: Configuring the SwitchUsing the Web InterfaceThis switch provides an embedded HTTP web agent. Using a web browser you can configure the

Page 435

Class of Service Commands31-1231Default Setting The DSCP default values are defined in the following table. Note that all the DSCP values that are not

Page 436

Priority Commands (Layer 3 and 4)31-1331Default SettingNoneCommand Mode Privileged ExecExample The following shows that HTTP traffic has been mapped t

Page 437

Class of Service Commands31-1431Example Related Commands map ip precedence (Global Configuration) (31-9)map ip precedence (Interface Configuration) (3

Page 438 -

Priority Commands (Layer 3 and 4)31-1531Example Related Commands map ip dscp (Global Configuration) (31-11)map ip dscp (Interface Configuration) (31-1

Page 439

Class of Service Commands31-1631

Page 440 - Spanning Tree Commands

32-1Chapter 32: Quality of Service CommandsThe commands described in this section are used to configure Differentiated Services (DiffServ) classificat

Page 441

Quality of Service Commands32-232Notes: 1. You can configure up to 16 rules per Class Map. You can also include multiple classes in a Policy Map.2. Yo

Page 442

match32-332matchThis command defines the criteria used to classify traffic. Use the no form to delete the matching criteria.Syntax [no] match {access-

Page 443

Quality of Service Commands32-432This example creates a class map call “rd_class#3,” and sets it to match packets marked for VLAN 1:policy-mapThis com

Page 444

class32-532classThis command defines a traffic classification upon which a policy can act, and enters Policy Map Class configuration mode. Use the no

Page 445 - Console(config-mstp)#

vContents Section I: Getting StartedChapter 1: Introduction 1-1Key Features 1-1Description of Software Features 1-2System Defaults 1-6Chapter 2

Page 446

Configuring the Switch3-23Navigating the Web Browser InterfaceTo access the web-browser interface you must first enter a user name and password. The a

Page 447

Quality of Service Commands32-632setThis command services IP traffic by setting a CoS, DSCP, or IP Precedence value in a matching packet (as specified

Page 448

service-policy32-732Command Usage • You can configure up to 63 policers (i.e., class maps) for Fast Ethernet and Gigabit Ethernet ingress ports.• Poli

Page 449

Quality of Service Commands32-832show class-mapThis command displays the QoS class maps which define matching criteria used for classifying traffic.Sy

Page 450

show policy-map interface32-932Exampleshow policy-map interfaceThis command displays the service policy assigned to the specified interface.Syntax sho

Page 451

Quality of Service Commands32-1032

Page 452

33-1Chapter 33: Multicast Filtering CommandsThis switch uses IGMP (Internet Group Management Protocol) to query for any attached hosts that want to re

Page 453

Multicast Filtering Commands33-233ip igmp snoopingThis command enables IGMP snooping on this switch. Use the no form to disable it.Syntax [no] ip igmp

Page 454

IGMP Snooping Commands33-333ip igmp snooping versionThis command configures the IGMP snooping version. Use the no form to restore the default.Syntax i

Page 455

Multicast Filtering Commands33-433Command Usage • This command setting is only effective if IGMP snooping is enabled.• Any port can be designated as a

Page 456

IGMP Snooping Commands33-533Command Mode Interface Configuration (VLAN)Command Usage • If immediate-leave is not used, a multicast router (or querier)

Page 457 - Chapter 30: VLAN Commands

Navigating the Web Browser Interface3-33Configuration OptionsConfigurable parameters have a dialog box or a drop-down list. Once a configuration chang

Page 458 - VLAN Commands

Multicast Filtering Commands33-633show mac-address-table multicast This command shows known multicast addresses.Syntax show mac-address-table multicas

Page 459

IGMP Query Commands33-733ip igmp snooping querierThis command enables the switch as an IGMP querier. Use the no form to disable it.Syntax [no] ip igmp

Page 460

Multicast Filtering Commands33-833Example The following shows how to configure the query count to 10:Related Commands ip igmp snooping query-max-respo

Page 461

IGMP Query Commands33-933• This command defines the time after a query, during which a response is expected from a multicast client. If a querier has

Page 462 - Editing VLAN Groups

Multicast Filtering Commands33-1033Static Multicast Routing CommandsThis section describes commands used to configure static multicast routing on the

Page 463

Multicast VLAN Registration Commands33-1133show ip igmp snooping mrouter This command displays information on statically configured and dynamically le

Page 464 - Configuring VLAN Interfaces

Multicast Filtering Commands33-1233mvr (Global Configuration)This command enables Multicast VLAN Registration (MVR) globally on the switch, statically

Page 465

Multicast VLAN Registration Commands33-1333mvr (Interface Configuration)This command configures an interface as an MVR receiver or source port using t

Page 466

Multicast Filtering Commands33-1433response to determine if there are any remaining subscribers for that multicast group before removing the port from

Page 467

Multicast VLAN Registration Commands33-1533Command Usage Enter this command without any keywords to display the global settings for MVR. Use the inter

Page 468

Configuring the Switch3-43Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, o

Page 469 - Displaying VLAN Information

Multicast Filtering Commands33-1633The following shows information about the interfaces associated with multicast groups assigned to the MVR VLAN:Cons

Page 470

34-1Chapter 34: Domain Name Service CommandsThese commands are used to configure Domain Naming System (DNS) services. You can manually configure entri

Page 471

Domain Name Service Commands34-234Command Usage Servers or other network devices may support one or more connections via multiple IP addresses. If mor

Page 472

ip domain-name34-334ip domain-nameThis command defines the default domain name appended to incomplete host names (i.e., host names passed from a clien

Page 473

Domain Name Service Commands34-434Command Usage • Domain names are added to the end of the list one at a time. • When an incomplete host name is recei

Page 474

ip domain-lookup34-534ExampleThis example adds two domain-name servers to the list and then displays the list.Related Commands ip domain-name (34-3)ip

Page 475

Domain Name Service Commands34-634ExampleThis example enables DNS and then displays the configuration.Related Commands ip domain-name (34-3)ip name-se

Page 476

show dns34-734show dnsThis command displays the configuration of the DNS service.Command Mode Privileged ExecExampleshow dns cacheThis command display

Page 477

Domain Name Service Commands34-834clear dns cacheThis command clears all entries in the DNS cache.Command Mode Privileged ExecExampleConsole#clear dns

Page 478

35-1Chapter 35: IP Interface CommandsAn IP address may be used for management access to the switch over your network. An IP address is obtained via DH

Page 479 - Priority Commands (Layer 2)

Navigating the Web Browser Interface3-53SNMPv3 5-7Engine ID Sets the SNMP v3 engine ID 5-7Remote Engine ID Sets the SNMP v3 engine ID on a remote devi

Page 480 - Class of Service Commands

IP Interface Commands35-235Command Usage • You must assign an IP address to this device to gain management access over the network or to connect the s

Page 481

Basic IP Configuration35-335Command Usage • A gateway must be defined if the management station is located in a different IP segment.• An default gate

Page 482

IP Interface Commands35-435show ip interfaceThis command displays the settings of an IP interface.Command Mode Normal Exec, Privileged ExecExample Rel

Page 483

Basic IP Configuration35-535Example This example displays all entries in the ARP cache.pingThis command sends ICMP echo request packets to another nod

Page 484

IP Interface Commands35-635Example Related Commands interface (24-1)Console#ping 10.1.0.9Type ESC to abort.PING to 10.1.0.9, by 5 32-byte payload ICMP

Page 485

Section IV:AppendicesThis section provides additional information on the following topics. Software Specifications . . . . . . . . . . . . . . . . .

Page 486

Appendices

Page 487

A-1Appendix A: Software SpecificationsSoftware FeaturesAuthenticationLocal, RADIUS, TACACS+, Port (802.1X), HTTPS, SSH, Port SecurityAccess Control Li

Page 488

Software SpecificationsA-2AQuality of ServiceDiffServ supports class maps, policy maps, and service policiesMulticast Filtering IGMP SnoopingAdditiona

Page 489 - Console(config)#map ip dscp

Management Information BasesA-3AIPv4 IGMP (RFC 3228)RADIUS+ (RFC 2618)RMON (RFC 2819 groups 1,2,3,9)SNMP (RFC 1157)SNMPv2c (RFC 2571)SNMPv3 (RFC DRAFT

Page 490

Configuring the Switch3-63LACP 9-8Configuration Allows ports to dynamically join trunks 9-8Aggregation Port Configures parameters for link aggregati

Page 491

Software SpecificationsA-4AUDP MIB (RFC 2013)

Page 492

B-1Appendix B: TroubleshootingProblems Accessing the Management Interface Table B-1 Troubleshooting ChartSymptom ActionCannot connect using Telnet,

Page 493 - Related Commands

TroubleshootingB-2BUsing System LogsIf a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caus

Page 494

Glossary-1GlossaryAccess Control List (ACL)ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for

Page 495

GlossaryGlossary-2Extensible Authentication Protocol over LAN (EAPOL) EAPOL is a client authentication protocol used by this switch to verify the netw

Page 496 - Quality of Service Commands

Glossary-3GlossaryIEEE 802.1XPort Authentication controls access to the switch ports by requiring users to first enter a user ID and password for auth

Page 497

GlossaryGlossary-4Link AggregationSee Port Trunk. Link Aggregation Control Protocol (LACP)Allows ports to automatically negotiate a trunked link with

Page 498

Glossary-5GlossaryPort AuthenticationSee IEEE 802.1X.Port MirroringA method whereby data on a target port is mirrored to a monitor port for troublesho

Page 499 - Console(config-pmap-c)#

GlossaryGlossary-6Simple Network Management Protocol (SNMP)The application protocol in the Internet suite of protocols which offers network management

Page 500

Glossary-7GlossaryVirtual LAN (VLAN)A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical l

Page 501

Navigating the Web Browser Interface3-73Trunk Configuration Configures trunk settings for a specified MST instance 11-20VLAN 12-1802.1Q VLAN 12-1GVRP

Page 502

GlossaryGlossary-8

Page 503

Index-1Numerics802.1Q tunnel 12-12, 30-20description 12-12interface configuration 12-16, 30-21–30-22mode selection 12-16TPID 12-11, 12-16, 30-22802.1X

Page 504

Index-2IndexFfirmwaredisplaying version 4-6, 19-7upgrading 4-12, 19-13GGARP VLAN Registration Protocol See GVRPgateway, default 4-9, 35-2GVRPglobal

Page 505 - IGMP Snooping Commands

Index-3Indexsetting multicast groups 15-10, 33-12specifying a VLAN 15-10, 33-12using immediate leave 15-12, 33-13Ppassword, line 19-21passwords 2-4adm

Page 506 - Multicast Filtering Commands

Index-4IndexSTP Also see STAswitch settings, saving or restoring 19-12switchport dot1q-ethertype 30-22switchport mode dot1q-tunnel 30-21system clock

Page 508

ES3528ES3528-WDME122006/ST-R01149100033100A

Page 509

Configuring the Switch3-83QoS 14-1DiffServ Configure QoS classification criteria and service policies 14-1Class Map Creates a class map for a type of

Page 510 - IGMP Query Commands

4-1Chapter 4: Basic Management TasksThis chapter describes the basic functions required to set up management access to the switch, display or upgrade

Page 511

Basic Management Tasks4-24Web – Click System, System Information. Specify the system name, location, and contact information for the system administra

Page 512

Configuring the Switch for Normal Operation or Tunneling Mode4-34Configuring the Switch for Normal Operation or Tunneling ModeThe system can be config

Page 513

ContentsviManual Configuration 4-9Using DHCP/BOOTP 4-10Managing Firmware 4-11Downloading System Software from a Server 4-12Saving or Restoring Co

Page 514

Basic Management Tasks4-44Configuring the Maximum Frame SizeThe maximum transfer unit (or frame size) for traffic crossing the switch should be set to

Page 515

Configuring Support for Jumbo Frames4-54CLI – This example sets the MTU for Fast Ethernet ports to 1528 bytes.Configuring Support for Jumbo FramesThe

Page 516

Basic Management Tasks4-64Displaying Switch Hardware/Software Versions Use the Switch Information page to display hardware/firmware version numbers fo

Page 517

Displaying Bridge Extension Capabilities4-74CLI – Use the following command to display version information.Displaying Bridge Extension CapabilitiesThe

Page 518

Basic Management Tasks4-84Web – Click System, Bridge Extension.Figure 4-6 Displaying Bridge Extension ConfigurationCLI – Enter the following command

Page 519

Setting the Switch’s IP Address4-94Command Attributes• Management VLAN – ID of the configured VLAN (1-4093). By default, all ports on the stack are me

Page 520

Basic Management Tasks4-104CLI – Specify the management interface, IP address and default gateway.Using DHCP/BOOTP If your network provides DHCP/BOOTP

Page 521

Managing Firmware4-114Renewing DCHP – DHCP may lease addresses to clients indefinitely or for a specific period of time. If the address expires or the

Page 522 - Domain Name Service Commands

Basic Management Tasks4-124Downloading System Software from a Server When downloading runtime code, you can specify the destination file name to repla

Page 523

Managing Firmware4-134To delete a file select System, File Management, Delete. Select the file name from the given list by checking the tick box and c

Page 524

ContentsviiChapter 7: Client Security 7-1Configuring Port Security 7-1Chapter 8: Access Control Lists 8-1Configuring Access Control Lists 8-1Sett

Page 525

Basic Management Tasks4-144Saving or Restoring Configuration SettingsYou can upload/download configuration settings to/from a TFTP server, or copy fil

Page 526

Saving or Restoring Configuration Settings4-154Downloading Configuration Settings from a ServerYou can download the configuration file under a new fil

Page 527

Basic Management Tasks4-164CLI – Enter the IP address of the TFTP server, specify the source file on the server, set the startup file name on the swit

Page 528

Console Port Settings4-174• Parity – Defines the generation of a parity bit. Communication protocols provided by some terminals can require a specific

Page 529 - Basic IP Configuration

Basic Management Tasks4-184CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the cur

Page 530 - IP Interface Commands

Telnet Settings4-194• Password2 – Specifies a password for the line connection. When a connection is started on a line with password protection, the s

Page 531

Basic Management Tasks4-204Configuring Event LoggingThe switch allows you to control the logging of error messages, including the type of events that

Page 532

Configuring Event Logging4-214Web – Click System, Logs, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM an

Page 533

Basic Management Tasks4-224Web – Click System, Logs, Remote Logs. To add an IP address to the Host IP List, type the new IP address in the Host IP Add

Page 534

Configuring Event Logging4-234Displaying Log MessagesUse the Logs page to scroll through the logged system and event messages. The switch can store up

Page 535 - Section IV:Appendices

ContentsviiiDisplaying Basic VLAN Information 12-4Displaying Current VLANs 12-5Creating VLANs 12-6Adding Static Members to VLANs (VLAN Index) 12-7

Page 536 - Appendices

Basic Management Tasks4-244• SMTP Server List – Specifies a list of up to three recipient SMTP servers. The switch attempts to connect to the other li

Page 537 - Software Features

Resetting the System4-254CLI – Enter the IP address of at least one SMTP server, set the syslog severity level to trigger an email message, and specif

Page 538 - Standards

Basic Management Tasks4-264Setting the System ClockSimple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic u

Page 539 - Management Information Bases

Setting the System Clock4-274CLI – This example configures the switch to operate as an SNTP client and then displays the current time and settings.Set

Page 540 - Software Specifications

Basic Management Tasks4-284

Page 541 - Appendix B: Troubleshooting

5-1Chapter 5: Simple Network Management Protocol Simple Network Management Protocol (SNMP) is a communication protocol designed specifically for manag

Page 542 - Using System Logs

Simple Network Management Protocol5-25Note: The predefined default groups and view can be deleted from the system. You can then define customized grou

Page 543 - Glossary

Setting Community Access Strings5-35Setting Community Access Strings You may configure up to five community strings authorized for management access b

Page 544

Simple Network Management Protocol5-45Specifying Trap Managers and Trap TypesTraps indicating status changes are issued by the switch to specified tra

Page 545

Specifying Trap Managers and Trap Types5-55Version 1 or 2c clients), or define a corresponding “User Name” in the SNMPv3 Users page (for Version 3 cli

Page 546

ContentsixAssigning Static Multicast Groups to Interfaces 15-15Chapter 16: Domain Name Service 16-1Configuring General DNS Service Parameters 16-1

Page 547

Simple Network Management Protocol5-65Web – Click SNMP, Configuration. Enter the IP address and community string for each management station that will

Page 548

Configuring SNMPv3 Management Access5-75Configuring SNMPv3 Management AccessTo configure SNMPv3 management access to the switch, follow these steps:1.

Page 549 - Virtual LAN (VLAN)

Simple Network Management Protocol5-85Specifying a Remote Engine IDTo send inform messages to an SNMPv3 user on a remote device, you must first specif

Page 550 - Glossary-8

Configuring SNMPv3 Management Access5-95Configuring SNMPv3 UsersEach SNMPv3 user is defined by a unique name. Users must be configured with a specific

Page 551

Simple Network Management Protocol5-105Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and as

Page 552

Configuring SNMPv3 Management Access5-115Configuring Remote SNMPv3 UsersEach SNMPv3 user is defined by a unique name. Users must be configured with a

Page 553

Simple Network Management Protocol5-125Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a name

Page 554

Configuring SNMPv3 Management Access5-135Configuring SNMPv3 GroupsAn SNMPv3 group sets the access policy for its assigned users, restricting them to s

Page 555

Simple Network Management Protocol5-145linkUp*1.3.6.1.6.3.1.1.5.4 A linkUp trap signifies that the SNMP entity, acting in an agent role, has detected

Page 556 - E122006/ST-R01

Configuring SNMPv3 Management Access5-155Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, a

Modèles reliés ES3528

Commentaires sur ces manuels

Pas de commentaire