SMC Networks 8748L2 Management Manual

L2 gigabit standalone switch
Hide thumbs Also See for 8748L2:
Table of Contents

Advertisement

TigerSwitch 1000
L2 Gigabit Standalone Switch
◆ 48 auto-MDI/MDI-X 10/100/1000BASE-T ports
◆ 4 ports shared with 4 SFP transceiver slots
◆ Non-blocking switching architecture
◆ Support for a redundant power unit
◆ Spanning Tree Protocol, and Rapid STP
◆ Up to six LACP or static 8-port trunks
◆ CoS support for four-level priority
◆ Full support for VLANs with GVRP
◆ IGMP multicast filtering and snooping
◆ Support for jumbo frames up to 9 KB
◆ Manageable via console, Web, and SNMP/RMON

Management Guide

SMC8748L2

Advertisement

Table of Contents
loading

Summary of Contents for SMC Networks 8748L2

  • Page 1: Management Guide

    TigerSwitch 1000 L2 Gigabit Standalone Switch ◆ 48 auto-MDI/MDI-X 10/100/1000BASE-T ports ◆ 4 ports shared with 4 SFP transceiver slots ◆ Non-blocking switching architecture ◆ Support for a redundant power unit ◆ Spanning Tree Protocol, and Rapid STP ◆ Up to six LACP or static 8-port trunks ◆...
  • Page 3: Tigerswitch 1000

    TigerSwitch 1000 Management Guide From SMC’s Tiger line of feature-rich workgroup LAN solutions 38 Tesla Irvine, CA 92618 November 2005 Phone: (949) 679-8000...
  • Page 4 Irvine, CA 92618 All rights reserved. Printed in Taiwan Trademarks: SMC is a registered trademark; and EZ Switch, TigerStack and TigerSwitch are trademarks of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders.
  • Page 5 All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller. SMC may, at its own discretion, repair or replace any product not operating as warranted with a similar or functionally equivalent product, during the applicable warranty term.
  • Page 6 RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL BE TAKEN TO AFFECT YOUR STATUTORY RIGHTS. * SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase.
  • Page 7: Table Of Contents

    ONTENTS Introduction ........1-1 Key Features ..........1-1 Description of Software Features .
  • Page 8 ONTENTS Using DHCP/BOOTP ......3-19 Managing Firmware ........3-21 Downloading System Software from a Server .
  • Page 9 ONTENTS Binding a Port to an Access Control List ....3-73 Filtering Management Access ....... . 3-74 Port Configuration .
  • Page 10 ONTENTS Configuring VLAN Behavior for Interfaces ....3-141 Configuring Private VLANs ......3-145 Displaying Current Private VLANs .
  • Page 11 ONTENTS Using Command History ....... 4-6 Understanding Command Modes ......4-7 Exec Commands .
  • Page 12 ONTENTS management ........4-36 show management ....... 4-37 Web Server Commands .
  • Page 13 ONTENTS show logging sendmail ......4-68 Time Commands ........4-69 sntp client .
  • Page 14 ONTENTS tacacs-server key ....... . . 4-99 show tacacs-server ......4-100 Port Security Commands .
  • Page 15 ONTENTS interface ......... . . 4-132 description .
  • Page 16 ONTENTS spanning-tree priority ....... . 4-173 spanning-tree pathcost method ......4-173 spanning-tree transmission-limit .
  • Page 17 ONTENTS show gvrp configuration ......4-206 garp timer ......... 4-206 show garp timer .
  • Page 18 ONTENTS show ip interface ....... . 4-234 show ip redirects ....... . 4-234 ping .
  • Page 19 ONTENTS...
  • Page 20 ABLES Table 1-1. Key Features ........1-1 Table 1-2.
  • Page 21 ABLES Table 4-19 show logging flash/ram - display description ..4-62 Table 4-20 show logging trap - display description ....4-63 Table 4-21 SMTP Alert Commands .
  • Page 22 ABLES Table 4-55 Priority Commands ......4-209 Table 4-57 Default CoS Priority Levels ..... . . 4-213 Table 4-58 Priority Commands (Layer 3 and 4) .
  • Page 23 ABLES...
  • Page 24 IGURES Figure 3-1. Homepage ........3-3 Figure 3-2.
  • Page 25 IGURES Figure 3-34. Configuring Standard IP ACLs ....3-71 Figure 3-35. Configuring Extended IP ACLs ....3-72 Figure 3-36.
  • Page 26 IGURES Figure 3-71. Configuring Ports and Trunks for Class of Service . . . 3-156 Figure 3-72. Setting the Queue Mode ......3-158 Figure 3-73.
  • Page 27: Introduction

    HAPTER NTRODUCTION This switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch.
  • Page 28: Description Of Software Features

    NTRODUCTION Table 1-1. Key Features (Continued) Feature Description Port Trunking Supports up to 25 trunks using either static or dynamic trunking (LACP) Broadcast Storm Supported Control Static Address Up to 8K MAC addresses in the forwarding table IEEE 802.1D Supports dynamic data switching and addresses learning Bridge Store-and-Forward Supported to ensure wire-speed switching while eliminating...
  • Page 29 ESCRIPTION OF OFTWARE EATURES Configuration Backup and Restore – You can save the current configuration settings to a file on a TFTP server, and later download this file to restore the switch configuration settings. Authentication – This switch authenticates management access via the console port, Telnet or web browser.
  • Page 30 NTRODUCTION Rate Limiting – This feature controls the maximum rate for traffic received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into the network. Packets that exceed the acceptable amount of traffic are dropped. Port Mirroring –...
  • Page 31 ESCRIPTION OF OFTWARE EATURES Store-and-Forward Switching – The switch copies each frame into its memory before forwarding them to another port. This ensures that all frames are a standard Ethernet size and have been verified for accuracy with the cyclic redundancy check (CRC). This prevents bad frames from entering the network and wasting bandwidth.
  • Page 32 NTRODUCTION Virtual LANs – The switch supports up to 255 VLANs. A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. The switch supports tagged VLANs based on the IEEE 802.1Q standard. Members of VLAN groups can be dynamically learned via GVRP, or ports can be manually assigned to a specific set of VLANs.
  • Page 33: System Defaults

    YSTEM EFAULTS Multicast Filtering – Multicast filtering is a system where network devices forward multicast traffic only to the ports that are registered with the multicast group. Without mulicast filtering the data packet will be broadcast to all endstations within a LAN or VLAN. The purpose is to keep the non-multicast group members from receiving unsolicited packets and to prevent a possible reduction in network performance.
  • Page 34 NTRODUCTION Table 1-2. System Defaults (Continued) Function Parameter Default IP Filtering Disabled Web Management HTTP Server Enabled HTTP Port Number HTTP Secure Server Enabled HTTP Secure Port Number SNMP Community Strings “public” (read only) “private” (read/write) Traps Authentication traps: enabled Link-up-down events: enabled Port Admin Status...
  • Page 35: Table 1-2. System Defaults

    YSTEM EFAULTS Table 1-2. System Defaults (Continued) Function Parameter Default Traffic Ingress Port Priority Prioritization Weighted Round Robin Queue: 0 1 2 3 4 5 6 7 Weight: 1 2 4 6 8 10 12 14 IP DSCP Priority Disabled IP Settings IP Address 0.0.0.0...
  • Page 36 NTRODUCTION 1-10...
  • Page 37: Initial Configuration

    Telnet connection over the network. The switch’s management agent also supports SNMP (Simple Network Management Protocol). This SNMP agent permits the switch to be managed from any system in the network using network management software such as SMC EliteView and HP OpenView.
  • Page 38: Required Connections

    NITIAL ONFIGURATION The switch’s Web interface, CLI configuration program, and SNMP agent allow you to perform the following management functions: • Set user names and passwords • Set an IP interface for a management VLAN • Configure SNMP parameters • Enable/disable any port •...
  • Page 39 ONNECTING TO THE WITCH To connect a terminal to the console port, complete the following steps: 1. Connect the console cable to the serial port on a terminal, or a PC running terminal emulation software, and tighten the captive retaining screws on the DB-9 connector.
  • Page 40: Remote Connections

    NITIAL ONFIGURATION Remote Connections Prior to accessing the switch’s onboard agent via a network connection, you must first configure it with a valid IP address, subnet mask, and default gateway using a console connection, DHCP or BOOTP protocol. The IP address for this switch is obtained via DHCP by default. To manually configure this address or enable dynamic address assignment via DHCP or BOOTP, see “Setting an IP Address”...
  • Page 41: Setting Passwords

    ASIC ONFIGURATION Access to both CLI levels are controlled by user names and passwords. The switch has a default user name and password for each level. To log into the CLI at the Privileged Exec level using the default user name and password, perform these steps: 1.
  • Page 42: Setting An Ip Address

    NITIAL ONFIGURATION Username: admin Password: CLI session with the SMC8748L2 is opened. To end the CLI session, enter [Exit]. Console#configure Console(config)#username guest password 0 [password] Console(config)#username admin password 0 [password] Console(config)# Setting an IP Address You must establish IP address information for the switch to obtain management access through the network.
  • Page 43: Dynamic Configuration

    ASIC ONFIGURATION To assign an IP address to the switch, complete the following steps: 1. From the Privileged Exec level global configuration mode prompt, type “interface vlan 1” to access the interface-configuration mode. Press <Enter>. 2. Type “ip address ip-address netmask,” where “ip-address” is the switch IP address and “netmask”...
  • Page 44: Enabling Snmp Management Access

    Enabling SNMP Management Access The switch can be configured to accept management commands from Simple Network Management Protocol (SNMP) applications such as SMC EliteView or HP OpenView. You can configure the switch to (1) respond to SNMP requests or (2) generate SNMP traps.
  • Page 45: Community Strings

    ASIC ONFIGURATION When SNMP management stations send requests to the switch (either to return information or to set a parameter), the switch provides the requested data or sets the specified parameter. The switch can also be configured to send information to SNMP managers (without being requested by the managers) through trap messages, which inform the manager that certain events have occurred.
  • Page 46: Trap Receivers

    NITIAL ONFIGURATION 2. To remove an existing string, simply type “no snmp-server community string,” where “string” is the community access string to remove. Press <Enter>. Console(config)#snmp-server community admin rw Console(config)#snmp-server community private Console(config)# Trap Receivers You can also specify SNMP stations that are to receive traps from the switch.
  • Page 47: Managing System Files

    ANAGING YSTEM ILES 1. From the Privileged Exec mode prompt, type “copy running-config startup-config” and press <Enter>. 2. Enter the name of the start-up file. Press <Enter>. Console#copy running-config startup-config Startup configuration file name []: startup \Write to FLASH Programming. \Write to FLASH finish.
  • Page 48 NITIAL ONFIGURATION Due to the size limit of the flash memory, the switch supports only two operation code files. However, you can have as many diagnostic code files and configuration files as available flash memory space allows. In the system flash memory, one file of each type must be set as the start-up file.
  • Page 49: Configuring The Switch

    HAPTER ONFIGURING THE WITCH Using the Web Interface This switch provides an embedded HTTP Web agent. Using a Web browser you can configure the switch and view statistics to monitor network activity. The Web agent can be accessed by any computer on the network using a standard Web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above).
  • Page 50 ONFIGURING THE WITCH Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is terminated. 2. If you log into the Web interface as guest (Normal Exec level), you can view the configuration settings or change the guest password.
  • Page 51: Navigating The Web Browser Interface

    AVIGATING THE ROWSER NTERFACE Navigating the Web Browser Interface To access the web-browser interface you must first enter a user name and password. The administrator has Read/Write access to all configuration parameters and statistics. The default user name and password for the administrator is “admin.”...
  • Page 52: Configuration Options

    ONFIGURING THE WITCH Configuration Options Configurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a page, be sure to click on the “Apply” button to confirm the new setting. The following table summarizes the web page configuration buttons.
  • Page 53: Main Menu

    AVIGATING THE ROWSER NTERFACE Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, or monitor network conditions. The following table briefly describes the selections available from this program. Table 3-2.
  • Page 54 ONFIGURING THE WITCH Table 3-2. Main Menu (Continued) Menu Description Page SNTP 3-36 Configuration Configures SNTP client settings, including 3-36 broadcast mode or a specified list of servers Clock Time Zone Sets the local time zone for the system clock 3-38 SNMP 3-39...
  • Page 55 AVIGATING THE ROWSER NTERFACE Table 3-2. Main Menu (Continued) Menu Description Page IP Filter Sets IP addresses of clients allowed 3-74 management access Port 3-74 Port Information Displays port connection status 3-76 Trunk Information Displays trunk connection status 3-76 Port Configuration Configures port connection settings 3-80 Trunk Configuration...
  • Page 56 ONFIGURING THE WITCH Table 3-2. Main Menu (Continued) Menu Description Page Address Table 3-108 Static Addresses Displays entries for interface, address or 3-108 VLAN Dynamic Addresses Displays or edits static entries in the 3-110 Address Table Address Aging Sets timeout for dynamically learned entries 3-111 Spanning Tree 3-112...
  • Page 57 AVIGATING THE ROWSER NTERFACE Table 3-2. Main Menu (Continued) Menu Description Page Port Configuration Specifies default PVID and VLAN 3-141 attributes Trunk Configuration Specifies default trunk VID and VLAN 3-141 attributes Private VLAN 3-145 Information Displays Private VLAN feature information 3-146 Configuration This page is used to create/remove primary...
  • Page 58 ONFIGURING THE WITCH Table 3-2. Main Menu (Continued) Menu Description Page DSCP Priority Status Globally selects DSCP Priority, or disables 3-160 IP DSCP Priority Sets IP Differentiated Services Code Point 3-152 priority, mapping a DSCP tag to a class-of-service value ACL CoS Priority Sets the CoS value and corresponding 3-162...
  • Page 59: Basic Configuration

    ASIC ONFIGURATION Basic Configuration Displaying System Information You can easily identify the system by displaying the device name, location and contact information. Field Attributes • System Name – Name assigned to the switch system. • Object ID – MIB II object ID for switch’s network management subsystem.
  • Page 60: Figure 3-3. System Information

    ONFIGURING THE WITCH Web – Click System, System Information. Specify the system name, location, and contact information for the system administrator, then click Apply. (This page also includes a Telnet button that allows access to the Command Line Interface via Telnet.) Figure 3-3.
  • Page 61: Displaying Switch Hardware/Software Versions

    ASIC ONFIGURATION CLI – Specify the hostname, location and contact information. Console(config)#hostname R&D 5 4-33 Console(config)#snmp-server location WC 9 4-126 Console(config)#snmp-server contact Geoff 4-126 Console(config)#exit Console#show system 4-79 System description SMC8748L2; Layer 2 Gigabit Ethernet Intelligent Switch System OID string : 1.3.6.1.4.1.202.20.56 System information System Up time...
  • Page 62: Figure 3-4. Switch Information

    ONFIGURING THE WITCH • Hardware Version – Hardware version of the main board. • Internal Power Status – Displays the status of the internal power supply. • Redundant Power Status – Displays the status of the redundant power supply. Management Software •...
  • Page 63: Displaying Bridge Extension Capabilities

    ASIC ONFIGURATION CLI – Use the following command to display version information. Console#show version 4-80 Serial number: 0012CF0B0D00 Service tag: Hardware version: Module A type: XGBase Module B type: not present Number of ports: Main power status: not present Redundant power status: down Loader version: 1.0.0.5...
  • Page 64: Figure 3-5. Bridge Extension Configuration

    ONFIGURING THE WITCH • Local VLAN Capable – This switch supports multiple local bridges; i.e., multiple spanning trees. (Refer to “VLAN Configuration” on page 3-129.) • GMRP – GARP Multicast Registration Protocol (GMRP) allows network devices to register endstations with multicast groups. This switch does not support GMRP;...
  • Page 65: Setting The Switch's Ip Address

    ASIC ONFIGURATION Setting the Switch’s IP Address This section describes how to configure an IP interface for management access over the network. The IP address for this switch is unassigned by default. To manually configure an address, you need to change the switch’s default settings (IP address 0.0.0.0 and netmask 255.0.0.0) to values that are compatible with your network.
  • Page 66: Manual Configuration

    ONFIGURING THE WITCH • Gateway IP Address – IP address of the gateway router between this device and management stations that exist on other network segments. (Default: 0.0.0.0) • MAC Address – The physical layer address for this switch. • Restart DHCP –...
  • Page 67: Using Dhcp/Bootp

    ASIC ONFIGURATION Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by these services. Web – Click System, IP Configuration. Specify the VLAN to which the management station is attached, set the IP Address Mode to DHCP or BOOTP.
  • Page 68 ONFIGURING THE WITCH CLI – Specify the management interface, and set the IP address mode to DHCP or BOOTP, and then enter the “ip dhcp restart” command. Console#config Console(config)#interface vlan 1 4-132 Console(config-if)#ip address dhcp 4-231 Console(config-if)#end Console#ip dhcp restart 4-232 Console#show ip interface 4-234...
  • Page 69: Managing Firmware

    ASIC ONFIGURATION Managing Firmware You can upload/download firmware to or from a TFTP server. By saving runtime code to a file on a TFTP server, that file can later be downloaded to the switch to restore operation. You can also set the switch to use new firmware without overwriting the previous version.
  • Page 70: Downloading System Software From A Server

    ONFIGURING THE WITCH Downloading System Software from a Server When downloading runtime code, you can specify the destination file name to replace the current image, or first download the file using a different name from the current runtime code file, and then set the new file as the startup file.
  • Page 71: Saving Or Restoring Configuration Settings

    ASIC ONFIGURATION To delete a file select System, File, Delete. Select the file name from the given list by checking the tick box and click Apply. Note that the file currently designated as the startup code cannot be deleted. Figure 3-10. Deleting Files CLI –...
  • Page 72 ONFIGURING THE WITCH - file to running-config – Copies a file in the switch to the running configuration. - file to startup-config – Copies a file in the switch to the startup configuration. - file to tftp – Copies a file from the switch to a TFTP server. - running-config to file –...
  • Page 73: Downloading Configuration Settings From A Server

    ASIC ONFIGURATION Downloading Configuration Settings from a Server You can download the configuration file under a new file name and then set it as the startup file, or you can specify the current startup configuration file as the destination file to directly replace it. Note that the file “Factory_Default_Config.cfg”...
  • Page 74: Console Port Settings

    ONFIGURING THE WITCH CLI – Enter the IP address of the TFTP server, specify the source file on the server, set the startup file name on the switch, and then restart the switch. Console#copy tftp startup-config 4-83 TFTP server ip address: 192.168.1.19 Source configuration file name: config-1 Startup configuration file name [] : startup \Write to FLASH Programming.
  • Page 75 ASIC ONFIGURATION • Password Threshold – Sets the password intrusion threshold, which limits the number of failed logon attempts. When the logon attempt threshold is reached, the system interface becomes silent for a specified amount of time (set by the Silent Time parameter) before allowing the next logon attempt.
  • Page 76: Figure 3-13. Console Port Setting

    ONFIGURING THE WITCH Web – Click System, Line, Console. Specify the console port connection parameters as required, then click Apply. Figure 3-13. Console Port Setting CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the current console port settings, use the show line command from the Normal Exec level.
  • Page 77: Telnet Settings

    ASIC ONFIGURATION Telnet Settings You can access the onboard configuration program over the network using Telnet (i.e., a virtual terminal). Management access via Telnet can be enabled/disabled and other various parameters set, including the TCP port number, timeouts, and a password. These parameters can be configured via the web or CLI interface.
  • Page 78: Figure 3-14. Enabling Telnet

    ONFIGURING THE WITCH • Login – Enables password checking at login. You can select authentication by a single global password as configured for the Password parameter, or by passwords set up for specific user-name accounts. (Default: Local) Web – Click System, Line, Telnet. Specify the connection parameters for Telnet access, then click Apply..
  • Page 79: Configuring Event Logging

    ASIC ONFIGURATION Configuring Event Logging The switch allows you to control the logging of error messages, including the type of events that are recorded in switch memory, logging to a remote System Log (syslog) server, and displays a list of recent event messages. System Log Configuration The system allows you to enable or disable event logging, and specify which levels are logged to RAM or flash memory.
  • Page 80: Table 3-3. Logging Levels

    ONFIGURING THE WITCH Table 3-3. Logging Levels Level Severity Name Description Debug Debugging messages Informational Informational messages only Notice Normal but significant condition, such as cold start Warning Warning conditions (e.g., return false, unexpected return) Error Error conditions (e.g., invalid input, default used) Critical Critical conditions (e.g., memory allocation, or free memory error - resource exhausted)
  • Page 81: Remote Log Configuration

    ASIC ONFIGURATION CLI – Enable system logging and then specify the level of messages to be logged to RAM and flash memory. Use the show logging command to display the current settings. Console(config)#logging on 4-43 Console(config)#logging history ram 0 4-44 Console(config)#end Console#show logging flash 4-47...
  • Page 82: Figure 3-16. Remote Logs

    ONFIGURING THE WITCH • Host IP Address – Specifies a new server IP address to add to the Host IP List. Web – Click System, Log, Remote Logs. To add an IP address to the Host IP List, type the new IP address in the Host IP Address box, and then click Add.
  • Page 83: Displaying Log Messages

    ASIC ONFIGURATION Displaying Log Messages The Logs page allows you to scroll through the logged system and event messages. The switch can store up to 2048 log entries in temporary random access memory (RAM; i.e., memory flushed on power reset) and up to 4096 entries in permanent flash memory.
  • Page 84: Setting The System Clock

    ONFIGURING THE WITCH CLI – Use the reload command to restart the switch. When prompted, confirm that you want to reset the switch. Console#reload 4-29 System will be restarted, continue <y/n>? Note: When restarting the system, it will always run the Power-On Self-Test.
  • Page 85: Figure 3-19. Sntp Configuration

    ASIC ONFIGURATION • SNTP Server – Sets the IP address for up to three time servers. The switch attempts to update the time from the first server, if this fails it attempts an update from the next server in the sequence. Web –...
  • Page 86: Setting The Time Zone

    ONFIGURING THE WITCH Setting the Time Zone SNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time at the Earth’s prime meridian, zero degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is east (before) or west (after) of UTC.
  • Page 87: Simple Network Management Protocol

    A network management station can access this information using software such as SMC EliteView or HP OpenView. Access rights to the onboard agent are controlled by community strings. To communicate with the switch, the management station must first submit a valid community string for authentication.
  • Page 88: Specifying Trap Managers And Trap Types

    You must specify trap managers so that key events are reported by this switch to your management station (using network management platforms such as SMC EliteView or HP OpenView). You can specify up to five management stations that will receive authentication failure messages and other trap messages from the switch.
  • Page 89: Figure 3-22. Configuring Ip Trap Managers

    IMPLE ETWORK ANAGEMENT ROTOCOL Command Attributes • Trap Manager Capability – This switch supports up to five trap managers. • Current – Displays a list of the trap managers currently configured. • Trap Manager IP Address – Internet address of the host (the targeted recipient).
  • Page 90: User Authentication

    ONFIGURING THE WITCH User Authentication You can restrict management access to this switch using the following options: • User Accounts – Manually configure access rights on the switch for specified users. • Authentication Settings – Use remote authentication to configure access rights.
  • Page 91: Figure 3-23. Access Levels

    UTHENTICATION - Password – Specifies the user password. (Range: 0-8 characters plain text, case sensitive) • Change Password – Sets a new password for the specified user name. • Add/Remove – Adds or removes an account from the list. Web – Click Security, User Accounts. To configure a new user account, specify a user name, select the user’s access level, then enter a password and confirm it.
  • Page 92: Configuring Local/Remote Logon Authentication

    ONFIGURING THE WITCH Configuring Local/Remote Logon Authentication Use the Authentication Settings menu to restrict management access based on specified user names and passwords. You can manually configure access rights on the switch, or you can use a remote access authentication server based on RADIUS or TACACS+ protocols.
  • Page 93 UTHENTICATION Command Usage • By default, management access is always checked against the authentication database stored on the local switch. If a remote authentication server is used, you must specify the authentication sequence and the corresponding parameters for the remote authentication protocol.
  • Page 94 ONFIGURING THE WITCH • RADIUS Settings - Global – Provides globally applicable RADIUS settings. - ServerIndex – Specifies one of five RADIUS servers that may be configured. The switch attempts authentication using the listed sequence of servers. The process ends when a server either approves or denies access to a user.
  • Page 95: Figure 3-24. Authentication Settings

    UTHENTICATION Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authentication sequence (i.e., one to three methods), fill in the parameters for RADIUS or TACACS+ authentication if selected, and click Apply. Figure 3-24. Authentication Settings CLI –...
  • Page 96: Configuring Https

    ONFIGURING THE WITCH Configuring HTTPS You can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket Layer (SSL), providing secure access (i.e., an encrypted connection) to the switch’s web interface. Command Usage • Both the HTTP and HTTPS service can be enabled independently on the switch.
  • Page 97: Replacing The Default Secure-Site Certificate

    UTHENTICATION Command Attributes • HTTPS Status – Allows you to enable/disable the HTTPS server feature on the switch. (Default: Enabled) • Change HTTPS Port Number – Specifies the UDP port number used for HTTPS/SSL connection to the switch’s web interface. (Default: Port 443) Web –...
  • Page 98: Configuring The Secure Shell

    ONFIGURING THE WITCH Caution: For maximum security, we recommend you obtain a unique Secure Sockets Layer certificate at the earliest opportunity. This is because the default certificate for the switch is not unique to the hardware you have purchased. When you have obtained these, place them on your TFTP server, and use the following command at the switch's command-line interface to replace the default (unrecognized) certificate with an authorized one: Console#copy tftp https-certificate...
  • Page 99 UTHENTICATION 2. The switch supports both SSH Version 1.5 and 2.0. Command Usage The SSH server on this switch supports both password and public key authentication. If password authentication is specified by the SSH client, then the password can be authenticated either locally or via a RADIUS or TACACS+ remote authentication server, as specified on the Authentication Settings page (page 3-44).
  • Page 100 ONFIGURING THE WITCH authenticated using these keys. The current firmware only accepts public key files based on standard UNIX format as shown in the following example: 1024 35 1341081685609893921040944920155425347631641921872958921143173880 05553616163105177594083868631109291232226828519254374603100937187721199696317 81366277414168985132049117204830339254324101637997592371449011938006090253948 40848271781943722884025331159521348610229029789827213532671316294325328189150 45306393916643 steve@192.168.1.19 4. Set the Optional Parameters – On the SSH Settings page, configure the optional parameters, including the authentication timeout, the number of retries, and the server key size.
  • Page 101: Generating The Host Key Pair

    UTHENTICATION 2. The SSH server supports up to four client sessions. The maximum number of client sessions includes both current Telnet sessions and SSH sessions. Generating the Host Key Pair A host public/private key pair is used to provide secure communications between an SSH client and the switch.
  • Page 102: Figure 3-26. Ssh Host-Key Settings

    ONFIGURING THE WITCH • Clear – This button clears the host key from both volatile memory (RAM) and non-volatile memory (Flash). Web – Click Security, SSH, Host-Key Settings. Select the host-key type from the drop-down box, select the option to save the host key from memory to flash (if required) prior to generating the key, and then click Generate.
  • Page 103: Configuring The Ssh Server

    UTHENTICATION CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and then displays the host’s public keys. Console#ip ssh crypto host-key generate 4-47 Console#ip ssh save host-key 4-47 Console#show public-key host 4-47 Host:...
  • Page 104: Figure 3-27. Ssh Server Settings

    ONFIGURING THE WITCH • SSH Authentication Retries – Specifies the number of authentication attempts that a client is allowed before authentication fails and the client has to restart the authentication process. (Range: 1-5 times; Default: 3) • SSH Server-Key Size – Specifies the SSH server key size. (Range: 512-896 bits;...
  • Page 105: Configuring Port Security

    UTHENTICATION CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that the administrator has made a connection via SHH, and then disables this connection. Console(config)#ip ssh server 4-47 Console(config)#ip ssh timeout 100 4-48 Console(config)#ip ssh authentication-retries 5 4-49...
  • Page 106 ONFIGURING THE WITCH To add new VLAN members at a later time, you can manually add secure addresses with the Static Address Table (page 3-108), or turn off port security to reenable the learning function long enough for new VLAN members to be registered.
  • Page 107: Configuring 802.1X Port Authentication

    UTHENTICATION Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, mark the checkbox in the Status column to enable security for a port, set the maximum number of MAC addresses allowed on a port, and click Apply.
  • Page 108 ONFIGURING THE WITCH This switch uses the Extensible Authentication Protocol over LANs (EAPOL) to exchange authentication protocol messages with the client, and a remote RADIUS authentication server to verify user identity and access rights. When a client (i.e., Supplicant) connects to a switch port, the switch (i.e., Authenticator) responds with an EAPOL identity request.
  • Page 109: Displaying 802.1X Global Settings

    UTHENTICATION • Each client that needs to be authenticated must have dot1x client software installed and properly configured. • The RADIUS server and 802.1x client support EAP. (The switch only supports EAPOL in order to pass the EAP packets from the server to the client.) •...
  • Page 110: Configuring 802.1X Global Settings

    ONFIGURING THE WITCH CLI – This example shows the default global setting for 802.1x. Console#show dot1x 4-109 Global 802.1X Parameters system-auth-control: enable 802.1X Port Summary Port Name Status Operation Mode Mode Authorized disabled Single-Host ForceAuthorized disabled Single-Host ForceAuthorized 802.1X Port Details 802.1X is disabled on port 1/1 802.1X is disabled on port 1/52 Console#...
  • Page 111: Configuring Port Settings For 802.1X

    UTHENTICATION Configuring Port Settings for 802.1x When 802.1X is enabled, you need to configure the parameters for the authentication process that runs between the client and the switch (i.e., authenticator), as well as the client identity lookup process that runs between the switch and authentication server.
  • Page 112: Figure 3-31. 802.1X Port Configuration

    ONFIGURING THE WITCH • Max-Req – Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it times out the authentication session. (Range: 1-10; Default 2) • Quiet Period – Sets the time that a switch port waits after the Max Request Count has been exceeded before attempting to acquire a new client.
  • Page 113 UTHENTICATION Console(config)#interface ethernet 1/2 4-132 Console(config-if)#dot1x port-control auto 4-105 Console(config-if)#dot1x re-authentication 4-84 Console(config-if)#dot1x max-req 5 4-82 Console(config-if)#dot1x timeout quiet-period 30 4-84 Console(config-if)#dot1x timeout re-authperiod 1800 4-85 Console(config-if)#dot1x timeout tx-period 40 4-85 Console(config-if)#exit Console(config)#exit Console#show dot1x 4-86 Global 802.1X Parameters system-auth-control: enable 802.1X Port Summary Port Name Status Operation Mode...
  • Page 114: Displaying 802.1X Statistics

    ONFIGURING THE WITCH Displaying 802.1x Statistics This switch can display statistics for dot1x protocol exchanges for any port. Statistical Values Table 3-5. 802.1x Statistics Parameter Descripton Rx EXPOL Start The number of EAPOL Start frames that have been received by this Authenticator. Rx EAPOL Logoff The number of EAPOL Logoff frames that have been received by this Authenticator.
  • Page 115: Figure 3-32. Displaying 802.1X Port Statistics

    UTHENTICATION Table 3-5. 802.1x Statistics (Continued) Parameter Descripton Tx EAP Req/Id The number of EAP Req/Id frames that have been transmitted by this Authenticator. Tx EAP Req/Oth The number of EAP Request frames (other than Rq/Id frames) that have been transmitted by this Authenticator.
  • Page 116: Access Control Lists

    ONFIGURING THE WITCH CLI – This example displays the 802.1x statistics for port 4. Console#show dot1x statistics interface ethernet 1/4 4-109 Eth 1/4 Rx: EXPOL EAPOL EAPOL EAPOL Start Logoff Invalid Total Resp/Id Resp/Oth LenError 1007 Last Last EAPOLVer EAPOLSrc 00-00-E8-98-73-21 Tx: EAPOL Total...
  • Page 117: Setting The Acl Name And Type

    CCESS ONTROL ISTS Command Usage The following restrictions apply to ACLs: • Each ACL can have up to 60 rules. • This switch supports ACLs for ingress filtering only. However, you can only bind one IP ACL to any port for ingress filtering. In other words, only one ACL can be bound to an interface - Ingress IP ACL.
  • Page 118: Configuring A Standard Ip Acl

    ONFIGURING THE WITCH Web – Click Security, ACL, Configuration. Enter an ACL name in the Name field, select the list type (IP Standard, or IP Extended), and click Add to open the configuration page for the new list. Figure 3-33. Naming and Choosing ACLs CLI –...
  • Page 119: Configuring An Extended Ip Acl

    CCESS ONTROL ISTS Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,” enter a specific address. If you select “IP,” enter a subnet address and the mask for an address range. Then click Add.
  • Page 120: Figure 3-35. Configuring Extended Ip Acls

    ONFIGURING THE WITCH • Src/Dst Address – Source or destination IP address. • Src/Dst SubMask – Subnet mask for source or destination address. (See the description for SubMask on page 3-70.) • Protocol – Specifies the protocol type to match as TCP, UDP or Others, where others indicates a specific protocol number (0-255).
  • Page 121: Binding A Port To An Access Control List

    CCESS ONTROL ISTS 2. Allow TCP packets from class C addresses 192.168.1.0 to any destination address when set for destination TCP port 80 (i.e., HTTP). 3. Permit all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.” Console(config-ext-acl)#permit 10.7.1.1 255.255.255.0 any 4-116 Console(config-ext-acl)#permit 192.168.1.0 255.255.255.0 any dport 80...
  • Page 122: Filtering Management Access

    ONFIGURING THE WITCH Web – Click Security, ACL, Port Binding. Mark the Enable field for the port you want to bind to an ACL for ingress traffic, select the required ACL from the drop-down list, then click Apply. Figure 3-36. Mapping ACLs to Port Ingress Queues CLI –...
  • Page 123 ILTERING ANAGEMENT CCESS • If anyone tries to access a management interface on the switch from an invalid address, the switch will reject the connection, enter an event message in the system log, and send a trap message to the trap manager.
  • Page 124: Port Configuration

    ONFIGURING THE WITCH Web – Click Security, IP Filter. Enter the addresses that are allowed management access to an interface, and click Add IP Filtering Entry. Figure 3-37. Filtering Management Access CLI – This example restricts management access for Telnet clients. Console(config)#management telnet-client 192.168.1.19 4-36 Console(config)#management telnet-client 192.168.1.25 192.168.1.30...
  • Page 125: Figure 3-38. Port Status Information

    ONFIGURATION • Speed Duplex Status – Shows the current speed and duplex mode. (Auto, or fixed choice) • Flow Control Status – Indicates the type of flow control currently in use. (IEEE 802.3x, Back-Pressure or None) • Autonegotiation – Shows if auto-negotiation is enabled or disabled. •...
  • Page 126 ONFIGURING THE WITCH Configuration: • Name – Interface label. • Port admin – Shows if the interface is enabled or disabled (i.e., up or down). • Speed-duplex – Shows the current speed and duplex mode. (Auto, or fixed choice) • Capabilities –...
  • Page 127: Current Status

    ONFIGURATION Current status: • Link Status – Indicates if the link is up or down. • Port Operation Status – Provides detailed information on port state. (Displayed only when the link is up.) • Operation speed-duplex – Shows the current speed and duplex mode.
  • Page 128: Configuring Interface Connections

    ONFIGURING THE WITCH Configuring Interface Connections You can use the Port Configuration or Trunk Configuration page to enable/disable an interface, set auto-negotiation and the interface capabilities to advertise, or manually fix the speed, duplex mode, and flow control. Command Attributes •...
  • Page 129: Figure 3-39. Configuring Port Attributes

    ONFIGURATION - Flow control can eliminate frame loss by “blocking” traffic from end stations or segments connected directly to the switch when its buffers fill. When enabled, back pressure is used for half-duplex operation and IEEE 802.3x for full-duplex operation. (Avoid using flow control on a port connected to a hub unless it is actually required to solve a problem.
  • Page 130: Creating Trunk Groups

    ONFIGURING THE WITCH CLI – Select the interface, and then enter the required settings. Console(config)#interface ethernet 1/13 4-132 Console(config-if)#description RD SW#13 4-132 Console(config-if)#shutdown 4-137 Console(config-if)#no shutdown Console(config-if)#no negotiation 4-134 Console(config-if)#speed-duplex 100half 4-133 Console(config-if)#flowcontrol 4-136 Console(config-if)#negotiation Console(config-if)#capabilities 100half 4-135 Console(config-if)#capabilities 100full Console(config-if)#capabilities flowcontrol Creating Trunk Groups You can create multiple links between devices that work as one virtual,...
  • Page 131: Statically Configuring A Trunk

    ONFIGURATION Command Usage Besides balancing the load across each port in the trunk, the other ports provide redundancy by taking over the load if a port in the trunk fails. However, before making any physical connections between devices, use the web interface or CLI to specify the trunk on the devices at both ends. When using a port trunk, take note of the following points: •...
  • Page 132: Figure 3-40. Static Trunk Configuration

    ONFIGURING THE WITCH before connecting the ports, and also disconnect the ports before removing a static trunk via the configuration interface. Command Attributes • Member List (Current) – Shows configured trunks (Trunk ID, Unit, Port). • New – Includes entry fields for creating new trunks. - Trunk –...
  • Page 133: Enabling Lacp On Selected Ports

    ONFIGURATION CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch to form a trunk. Console(config)#interface port-channel 2 4-132 Console(config-if)#exit Console(config)#interface ethernet 1/1 4-132 Console(config-if)#channel-group 1 4-151 Console(config-if)#exit Console(config)#interface ethernet 1/2...
  • Page 134: Figure 3-41. Lacp Port Configuratio

    ONFIGURING THE WITCH • A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID. • If more than eight ports attached to the same target switch have LACP enabled, the additional ports will be placed in standby mode, and will only be enabled if one of the active links fails.
  • Page 135: Configuring Lacp Parameters

    ONFIGURATION CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another switch to form a trunk. Console(config)#interface ethernet 1/1 4-132 Console(config-if)#lacp 4-151 Console(config-if)#exit Console(config)#interface ethernet 1/6 Console(config-if)#lacp Console(config-if)#end Console#show interfaces status port-channel 1 4-140 Information of Trunk 1...
  • Page 136 ONFIGURING THE WITCH not set (through the CLI) when a channel group is formed (i.e., it has a null value of 0), this key is set to the same value as the port admin key used by the interfaces that joined the group (lacp admin key, as described in this section and on page 4-155).
  • Page 137: Figure 3-42. Lacp Aggregation Port Configuration

    ONFIGURATION Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can optionally configure these settings for the Port Partner. (Be aware that these settings only affect the administrative state of the partner, and will not take effect until the next time an aggregate link is formed with this device.) After you have completed setting the port LACP parameters, click Apply.
  • Page 138: Displaying Lacp Port Counters

    ONFIGURING THE WITCH CLI – The following example configures LACP parameters for ports 1-6. Ports 1-4 are used as active members of the LAG; ports 5 and 6 are set to backup mode. Console(config)#interface ethernet 1/1 4-132 Console(config-if)#lacp actor system-priority 3 4-154 Console(config-if)#lacp actor admin-key 120 4-155...
  • Page 139: Figure 3-43. Displaying Lacp Port Counters Information

    ONFIGURATION Table 3-6. LACP Port Counter Information (Continued) Field Description Marker Received Number of valid Marker PDUs received by this channel group. LACPDUs Unknown Number of frames received that either (1) Carry the Slow Pkts Protocols Ethernet Type value, but contain an unknown PDU, or (2) are addressed to the Slow Protocols group MAC Address, but do not carry the Slow Protocols Ethernet Type.
  • Page 140: Displaying Lacp Settings And Status For The Local Side

    ONFIGURING THE WITCH CLI – The following example displays LACP counters for port channel 1. Console#show 1 lacp counters 4-158 Channel group : 1 ------------------------------------------------------------------- Eth 1/ 1 ------------------------------------------------------------------- LACPDUs Sent : 21 LACPDUs Received : 21 Marker Sent : 0 Marker Received : 0 LACPDUs Unknown Pkts : 0 LACPDUs Illegal Pkts : 0...
  • Page 141 ONFIGURATION Table 3-7. LACP Settings Field Description Admin State, Administrative or operational values of the actor’s state Oper State parameters: • Expired – The actor’s receive machine is in the expired state; • Defaulted – The actor’s receive machine is using defaulted operational partner information, administratively configured for the partner.
  • Page 142: Figure 3-44. Displaying Lacp Port Information

    ONFIGURING THE WITCH Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information. Figure 3-44. Displaying LACP Port Information CLI – The following example displays the LACP configuration settings and operational state for the local side of port channel 1. Console#show 1 lacp internal 4-158 Channel group : 1...
  • Page 143: Displaying Lacp Settings And Status For The Remote Side

    ONFIGURATION Displaying LACP Settings and Status for the Remote Side You can display configuration settings and the operational state for the remote side of an link aggregation. Neighbor Configuration Information Table 3-8. LACP Remote Side Settings Field Description Partner Admin System LAG partner’s system ID assigned by the user.
  • Page 144: Figure 3-45. Displaying Remote Lacp Port Information

    ONFIGURING THE WITCH Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information. Figure 3-45. Displaying Remote LACP Port Information CLI – The following example displays the LACP configuration settings and operational state for the remote side of port channel 1. Console#show 1 lacp neighbors 4-158 Channel group 1 neighbors...
  • Page 145: Setting Broadcast Storm Thresholds

    ONFIGURATION Setting Broadcast Storm Thresholds Broadcast storms may occur when a device on your network is malfunctioning, or if application programs are not well designed or properly configured. If there is too much broadcast traffic on your network, performance can be severely degraded or everything can come to complete halt.
  • Page 146: Figure 3-46. Enabling Port Broadcast Control

    ONFIGURING THE WITCH Web – Click Port, Port Broadcast Control. Set the threshold any port, click Apply. Figure 3-46. Enabling Port Broadcast Control CLI – Specify any interface, and then enter the threshold. The following disables broadcast storm control for port 1, and then sets broadcast suppression at 500 packets per second for port 2.
  • Page 147: Configuring Port Mirroring

    ONFIGURATION Configuring Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic Source Single analyzer or RMON probe to the target port(s) target port and study the traffic crossing the port source port in a completely unobtrusive manner.
  • Page 148: Configuring Rate Limits

    ONFIGURING THE WITCH Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port, then click Add. Figure 3-47. Configuring a Mirror Port CLI – Use the interface command to select the monitor port, then use the port monitor command to specify the source port.
  • Page 149: Showing Port Statistics

    ONFIGURATION Command Usage • Input rate limit can be enabled or disabled for individual interfaces. Command Attribute • Port/Trunk – Display the port number. • Rate Limit Status– Enables or disables the rate limit (Default: Enabled) • Rate Limit Level - Sets the rate limit level. Web - Click Port, Rate Limit, Input Port/Trunk Configuration.
  • Page 150: Table 3-9. Port Statistics

    Statistics are refreshed every 60 seconds by default. Note: RMON groups 2, 3 and 9 can only be accessed using SNMP management software such as SMC EliteView or HP OpenView. Statistical Values Table 3-9. Port Statistics...
  • Page 151 ONFIGURATION Table 3-9. Port Statistics Parameter Description Received Errors The number of inbound packets that contained errors preventing them from being deliverable to a higher-layer protocol. Transmit Octets The total number of octets transmitted out of the interface, including framing characters. Transmit Unicast Packets The total number of packets that higher-level protocols requested be transmitted to a...
  • Page 152 ONFIGURING THE WITCH Table 3-9. Port Statistics Parameter Description FCS Errors A count of frames received on a particular interface that are an integral number of octets in length but do not pass the FCS check. This count does not include frames received with frame-too-long or frame-too-short error.
  • Page 153 ONFIGURATION Table 3-9. Port Statistics Parameter Description RMON Statistics Drop Events The total number of events in which packets were dropped due to lack of resources. Jabbers The total number of frames received that were longer than 1518 octets (excluding framing bits, but including FCS octets), and had either an FCS or alignment error.
  • Page 154: Figure 3-49. Displaying Port Statistics

    ONFIGURING THE WITCH Table 3-9. Port Statistics Parameter Description 64 Bytes Frames The total number of frames (including bad packets) received and transmitted that were 64 octets in length (excluding framing bits but including FCS octets). 65-127 Byte Frames The total number of frames (including bad packets) received and transmitted where the number of octets 128-255 Byte Frames fall within the specified range (excluding framing bits...
  • Page 155: Figure 3-50. Displaying Etherlike And Rmon Statistics

    ONFIGURATION Figure 3-50. Displaying Etherlike and RMON Statistics 3-107...
  • Page 156: Address Table Settings

    ONFIGURING THE WITCH CLI – This example shows statistics for port 13. 4-141 Console#show interfaces counters ethernet 1/13 Ethernet 1/13 Iftable stats: Octets input: 868453, Octets output: 3492122 Unicast input: 7315, Unitcast output: 6658 Discard input: 0, Discard output: 0 Error input: 0, Error output: 0 Unknown protos input: 0, QLen output: 0 Extended iftable stats:...
  • Page 157: Figure 3-51. Mapping Ports To Static Addresses

    DDRESS ABLE ETTINGS Command Attributes • Static Address Counts* – The number of manually configured addresses. • Current Static Address Table – Lists all the static addresses. • Interface – Port or trunk associated with the device assigned a static address.
  • Page 158: Displaying The Address Table

    ONFIGURING THE WITCH Displaying the Address Table The Dynamic Address Table contains the MAC addresses learned by monitoring the source address for traffic entering the switch. When the destination address for inbound traffic is found in the database, the packets intended for that address are forwarded directly to the associated port.
  • Page 159: Changing The Aging Time

    DDRESS ABLE ETTINGS Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN checkbox), select the method of sorting the displayed addresses, and then click Query. Figure 3-52. Displaying the MAC Dynamic Address Table CLI –...
  • Page 160: Spanning Tree Algorithm Configuration

    ONFIGURING THE WITCH • Aging Time – The time after which a learned entry is discarded. (Range: 10-30000 seconds; Default: 300 seconds) Web – Click Address Table, Address Aging. Specify the new aging time, click Apply. Figure 3-53. Setting the Aging Time CLI –...
  • Page 161 PANNING LGORITHM ONFIGURATION STA uses a distributed algorithm to select a bridging device (STA-compliant switch, bridge or router) that serves as the root of the spanning tree network. It selects a root port on each bridging device (except for the root device) which incurs the lowest path cost when forwarding a packet from that device to the root device.
  • Page 162: Displaying Global Settings

    ONFIGURING THE WITCH When using STP or RSTP, it may be difficult to maintain a stable path between all VLAN members. Frequent changes in the tree structure can easily isolate some of the group members. Displaying Global Settings You can display a summary of the current bridge STA information that applies to the entire switch using the STA Information screen.
  • Page 163 PANNING LGORITHM ONFIGURATION • Designated Root – The priority and MAC address of the device in the Spanning Tree that this switch has accepted as the root device. - Root Port – The number of the port on this switch that is closest to the root.
  • Page 164: Figure 3-54. Displaying The Spanning Tree Algorithm

    ONFIGURING THE WITCH • Root Forward Delay – The maximum time (in seconds) this device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a discarding state;...
  • Page 165: Configuring Global Settings

    PANNING LGORITHM ONFIGURATION CLI – This command displays global STA settings, followed by settings for each port. Console#show spanning-tree 4-181 Spanning-tree information --------------------------------------------------------------- Spanning tree mode: RSTP Spanning tree enabled/disabled: enabled Priority: 32768 Bridge Hello Time (sec.): Bridge Max Age (sec.): Bridge Forward Delay (sec.): Root Hello Time (sec.): Root Max Age (sec.):...
  • Page 166 ONFIGURING THE WITCH - STP Mode – If the switch receives an 802.1D BPDU (i.e., STP BPDU) after a port’s migration delay timer expires, the switch assumes it is connected to an 802.1D bridge and starts using only 802.1D BPDUs. - RSTP Mode –...
  • Page 167 PANNING LGORITHM ONFIGURATION • Maximum Age – The maximum time (in seconds) a device can wait without receiving a configuration message before attempting to reconfigure. All device ports (except for designated ports) should receive configuration messages at regular intervals. Any port that ages out STA information (provided in the last configuration message) becomes the designated port for the attached LAN.
  • Page 168: Figure 3-55. Configuring The Spanning Tree Algorithm

    ONFIGURING THE WITCH Configuration Settings for RSTP The following attributes apply to RSTP: • Path Cost Method – The path cost is used to determine the best path between devices. The path cost method is used to determine the range of values that can be assigned to each interface.
  • Page 169: Displaying Interface Settings

    PANNING LGORITHM ONFIGURATION CLI – This example enables Spanning Tree Protocol and then configures the STA parameters. Console(config)#spanning-tree 4-168 Console(config)#spanning-tree mode 4-169 Console(config)#spanning-tree priority 40000 4-173 Console(config)#spanning-tree hello-time 5 4-171 Console(config)#spanning-tree max-age 38 4-172 Console(config)#spanning-tree forward-time 20 4-170 Console(config)#spanning-tree pathcost method long 4-173 Console(config)#spanning-tree transmission-limit 4 4-174...
  • Page 170 ONFIGURING THE WITCH • Forward Transitions – The number of times this port has transitioned from the Learning state to the Forwarding state. • Designated Cost – The cost for a packet to travel from this port to the root in the current Spanning Tree configuration. The slower the media, the higher the cost.
  • Page 171 PANNING LGORITHM ONFIGURATION R: Root Port Alternate port receives more A: Alternate Port useful BPDUs from another D: Designated Port bridge and is therefore not B: Backup Port selected as the designated port. Backup port receives more useful BPDUs from the same bridge and is therefore not selected as the designated port.
  • Page 172: Figure 3-56. Displaying Sta - Port Status Information

    ONFIGURING THE WITCH • Designated root – The priority and MAC address of the device in the Spanning Tree that this switch has accepted as the root device. • Fast forwarding – This field provides the same information as Admin Edge port, and is only included for backward compatibility with earlier products.
  • Page 173: Configuring Interface Settings

    PANNING LGORITHM ONFIGURATION CLI – This example shows the STA attributes for port 5. Console#show spanning-tree ethernet 1/5 4-181 1/ 5 information -------------------------------------------------------------- Admin status : enable Role : disable State : discarding External path cost : 10000 Internal path cost : 10000 Priority : 128...
  • Page 174 ONFIGURING THE WITCH Command Attributes The following attributes are read-only and cannot be changed: • STA State – Displays current state of this port within the Spanning Tree. (See Displaying Interface Settings on page 3-121 for additional information.) - Discarding - Port receives STA configuration messages, but does not forward packets.
  • Page 175 PANNING LGORITHM ONFIGURATION • Path Cost – This parameter is used by the STP to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media.
  • Page 176: Figure 3-57. Configuring Spanning Tree Algorithm Per Port

    ONFIGURING THE WITCH • Migration – If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notification BPDUs, it will automatically set the selected interface to forced STP-compatible mode. However, you can also use the Protocol Migration button to manually re-check the appropriate BPDU format (RSTP or STP-compatible) to send on the selected interfaces.
  • Page 177: Vlan Configuration

    VLAN C ONFIGURATION VLAN Configuration Overview In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains.
  • Page 178: Assigning Ports To Vlans

    ONFIGURING THE WITCH • Priority tagging Assigning Ports to VLANs Before enabling VLANs for the switch, you must first assign each port to the VLAN group(s) in which it will participate. By default all ports are assigned to VLAN 1 as untagged ports. Add a port as a tagged port if you want it to carry traffic for one or more VLANs, and any intermediate network devices or the host at the other end of the connection supports VLANs.
  • Page 179 VLAN C ONFIGURATION Port Overlapping – Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such as file servers or printers. Note that if you implement VLANs which do not overlap, but still need to communicate, you can connect them by enabled routing on this switch.
  • Page 180: Forwarding Tagged/Untagged Frames

    ONFIGURING THE WITCH should also determine security boundaries in the network and disable GVRP on the boundary ports to prevent advertisements from being propagated, or forbid those ports from joining restricted VLANs. Note: If you have host devices that do not support GVRP, you should configure static or untagged VLANs for the switch ports connected to these devices (as described in “Adding Static Members to VLANs (VLAN Index)”...
  • Page 181: Enabling Or Disabling Gvrp (Global Setting)

    VLAN C ONFIGURATION VLAN(s) indicated by the frame tag. However, when this switch receives an untagged frame from a VLAN-unaware device, it first decides where to forward the frame, and then inserts a VLAN tag reflecting the ingress port’s default VID. Enabling or Disabling GVRP (Global Setting) GARP VLAN Registration Protocol (GVRP) defines a way for switches to exchange VLAN information in order to register VLAN members on...
  • Page 182: Displaying Current Vlans

    ONFIGURING THE WITCH • Maximum VLAN ID – Maximum VLAN ID recognized by this switch. • Maximum Number of Supported VLANs – Maximum number of VLANs that can be configured on this switch. *Web Only Web – Click VLAN, 802.1Q VLAN, Basic Information. Figure 3-59.
  • Page 183: Figure 3-60. Displaying Vlan Information By Port Membership

    VLAN C ONFIGURATION • Up Time at Creation – Time this VLAN was created (i.e., System Up Time). • Status – Shows how this VLAN was added to the switch. - Dynamic GVRP: Automatically learned via GVRP. - Permanent: Added as a static entry. •...
  • Page 184: Creating Vlans

    ONFIGURING THE WITCH CLI – Current VLAN information can be displayed with the following command. Console#show vlan id 1 4-193 VLAN Type Name Status Ports/Channel groups ---- ------- ----------- ------ ------------------------------------ Static DefaultVlan Active Eth1/1 Eth1/2 Eth1/3 Eth1/4 Eth1/5 Eth1/6 Eth1/7 Eth1/8 Eth1/9...
  • Page 185: Vlan C Onfiguration

    VLAN C ONFIGURATION • Remove – Removes a VLAN group from the current list. If any port is assigned to this group as untagged, it will be reassigned to VLAN group 1 as untagged. Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbox to activate the VLAN, and then click Add.
  • Page 186: Adding Static Members To Vlans (Vlan Index)

    ONFIGURING THE WITCH Adding Static Members to VLANs (VLAN Index) Use the VLAN Static Table to configure port members for the selected VLAN index. Assign ports as tagged if they are connected to 802.1Q VLAN compliant devices, or untagged they are not connected to any VLAN-aware devices.
  • Page 187: Figure 3-62. Configuring Vlan Port Attributes

    VLAN C ONFIGURATION - Untagged: Interface is a member of the VLAN. All packets transmitted by the port will be untagged, that is, not carry a tag and therefore not carry VLAN or CoS information. Note that an interface can only have one untagged VLAN, which must be the same as the Port VID.
  • Page 188: Adding Static Members To Vlans (Port Index)

    ONFIGURING THE WITCH CLI – The following example adds tagged and untagged ports to VLAN 2. Console(config)#interface ethernet 1/1 4-132 Console(config-if)#switchport allowed vlan add 2 tagged 4-191 Console(config-if)#exit Console(config)#interface ethernet 1/2 Console(config-if)#switchport allowed vlan add 2 untagged Console(config-if)#exit Console(config)#interface ethernet 1/13 Console(config-if)#switchport allowed vlan add 2 tagged Adding Static Members to VLANs (Port Index) Use the VLAN Static Membership by Port menu to assign VLAN groups...
  • Page 189: Configuring Vlan Behavior For Interfaces

    VLAN C ONFIGURATION Figure 3-63. Assigning VLAN Port and Trunk Groups CLI – This example adds Port 3 to VLAN 1 as a tagged port, and removes Port 3 from VLAN 2. Console(config)#interface ethernet 1/3 4-132 Console(config-if)#switchport allowed vlan add 1 tagged 4-191 Console(config-if)#switchport allowed vlan remove 2 Configuring VLAN Behavior for Interfaces...
  • Page 190 ONFIGURING THE WITCH Command Attributes • PVID – VLAN ID assigned to untagged frames received on the interface. (Default: 1) If an interface is not a member of VLAN 1 and you assign its PVID to this VLAN, the interface will automatically be added to VLAN 1 as an untagged member.
  • Page 191 VLAN C ONFIGURATION the applicants can rejoin before the port actually leaves the group. (Range: 60-3000 centiseconds; Default: 60) • GARP LeaveAll Timer* – The interval between sending out a LeaveAll query message for VLAN group participants and the port leaving the group.
  • Page 192: Figure 3-64. Configuring Vlan Ports

    ONFIGURING THE WITCH Web – Click VLAN, 802.1Q VLAN, Port Configuration or VLAN Trunk Configuration. Fill in the required settings for each interface, click Apply. Figure 3-64. Configuring VLAN Ports CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, enables GVRP, sets the GARP timers, and then sets the switchport mode to hybrid.
  • Page 193: Configuring Private Vlans

    VLAN C ONFIGURATION Configuring Private VLANs Private VLANs provide port-based security and isolation between ports within the assigned VLAN. This switch supports two types of private VLANs: primary/secondary associated groups, and stand-alone isolated VLANs. A primary VLAN contains promiscuous ports that can communicate with all other ports in the private VLAN group, while a secondary (or community) VLAN contains community ports that can only communicate with other hosts within the secondary VLAN and with...
  • Page 194: Displaying Current Private Vlans

    ONFIGURING THE WITCH To configure an isolated VLAN, follow these steps: 1. Use the Private VLAN Configuration menu to designate an isolated VLAN that will channel all traffic through a single promiscuous port. 2. Use the Private VLAN Port Configuration menu to set the port type to promiscuous (i.e., the single channel to the external network), or isolated (i.e., having access only to the promiscuous port in its own VLAN).
  • Page 195: Configuring Private Vlans

    VLAN C ONFIGURATION Figure 3-65. Private VLAN Information CLI – This example shows the switch configured with primary VLAN 5 and secondary VLAN 6. Port 3 has been configured as a promiscuous port and mapped to VLAN 5, while ports 4 and 5 have been configured as a host ports and are associated with VLAN 6.
  • Page 196: Associating Vlans

    ONFIGURING THE WITCH - Primary VLANs – Conveys traffic between promiscuous ports, and to their community ports within secondary (or community) VLANs. - Community VLANs – Conveys traffic between community ports, and to their promiscuous ports in the associated primary VLAN. - Isolated VLANs –...
  • Page 197: Displaying Private Vlan Interface Information

    VLAN C ONFIGURATION Command Attributes • Primary VLAN ID - ID of primary VLAN (1-4094). • Association - Community VLANs associated with the selected primary VLAN. • Non-Association - Community VLANs not associated with the selected VLAN. Web – Click VLAN, Private VLAN, Association. Select the required primary VLAN from the scroll-down box, highlight one or more community VLANs in the Non-Association list box, and click Add to associate these entries with the selected primary VLAN.
  • Page 198: Figure 3-68. Private Vlan Port Information

    ONFIGURING THE WITCH Command Attributes • Port/Trunk - The switch interface. • PVLAN Port Type - Displays private VLAN port types. - Normal – The port is not configured in a private VLAN. - Host – The port is a community port and can only communicate with other ports in its own community VLAN, and with the designated promiscuous port(s).
  • Page 199: Configuring Private Vlan Interfaces

    VLAN C ONFIGURATION CLI – This example shows the switch configured with primary VLAN 5 and community VLAN 6. Port 3 has been configured as a promiscuous port and mapped to VLAN 5, while ports 4 and 5 have been configured as host ports and associated with VLAN 6.
  • Page 200: Figure 3-69. Private Vlan Port Configuration

    ONFIGURING THE WITCH promiscuous ports. Set PVLAN Port Type to “Host,” and then specify the associated Community VLAN. • Isolated VLAN – Conveys traffic only between the VLAN’s isolated ports and the promiscuous port. Traffic between isolated ports within the VLAN is blocked. Set the PVLAN Port Type to “Host,” then specify an isolated VLAN by marking the check box for an “Isolated VLAN,”...
  • Page 201: Class Of Service Configuration

    LASS OF ERVICE ONFIGURATION CLI – This example shows the switch configured with primary VLAN 5 and secondary VLAN 6. Port 3 has been configured as a promiscuous port and mapped to VLAN 5, while ports 4 and 5 have been configured as a host ports and associated with VLAN 6.
  • Page 202: Figure 3-70. Port Priority Configuration

    ONFIGURING THE WITCH • The default priority applies for an untagged frame received on a port set to accept all frame types (i.e, receives both untagged and tagged frames). This priority does not apply to IEEE 802.1Q VLAN tagged frames. If the incoming frame is an IEEE 802.1Q VLAN tagged frame, the IEEE 802.1p User Priority bits will be used.
  • Page 203: Mapping Cos Values To Egress Queues

    LASS OF ERVICE ONFIGURATION CLI – This example assigns a default priority of 5 to port 3. Console(config)#interface ethernet 1/3 4-132 Console(config-if)#switchport priority default 5 4-209 Console(config-if)#end Console#show interfaces switchport ethernet 1/3 4-143 Information of Eth 1/3 Broadcast threshold: Enabled, 500 packets/second LACP status: Disabled Ingress rate limit: enable, K bits per second: 25...
  • Page 204: Table 3-11. Cos Priority Levels

    ONFIGURING THE WITCH Table 3-11. CoS Priority Levels Priority Level Traffic Type Background (Spare) 0 (default) Best Effort Excellent Effort Controlled Load Video, less than 100 milliseconds latency and jitter Voice, less than 10 milliseconds latency and jitter Network Control Command Attributes •...
  • Page 205: Selecting The Queue Mode

    LASS OF ERVICE ONFIGURATION CLI – The following example shows how to change the CoS assignments to a one-to-one mapping. Console(config)#interface ethernet 1/1 4-132 Console(config)#queue cos-map 0 0 4-213 Console(config)#queue cos-map 1 1 Console(config)#queue cos-map 2 2 Console(config)#exit Console#show queue cos-map ethernet 1/1 4-215 Information of Eth 1/1 Traffic Class : 0 1 2 3 4 5 6 7...
  • Page 206: Setting The Service Weight For Traffic Classes

    ONFIGURING THE WITCH Web – Click Priority, Queue Mode. Select Strict or WRR, then click Apply. Figure 3-72. Setting the Queue Mode CLI – The following sets the queue mode to strict priority service mode. Console(config)#queue mode strict 4-214 Console(config)#exit Console#show queue mode 4-214 Queue mode: strict...
  • Page 207: Mapping Layer 3/4 Priorities To Cos Values

    LASS OF ERVICE ONFIGURATION Figure 3-73. Configuring Queue Scheduling CLI – The following example shows how to assign WRR weights to each of the priority queues. Console(config)#queue bandwidth 1 3 5 7 9 11 13 15 4-212 Console(config)#exit Console#show queue bandwidth 4-214 Information of Eth 1/1 Queue ID...
  • Page 208: Selecting Ip Dscp Priority

    ONFIGURING THE WITCH • The precedence for priority mapping is IP DSCP Priority, and then Default Port Priority. Selecting IP DSCP Priority The switch allows you to enable or disable IP DSCP priority. Command Attributes • Enabled – Enables the priority services. (Default Setting: Disabled) •...
  • Page 209: Table 3-12. Mapping Dscp Priority

    LASS OF ERVICE ONFIGURATION Table 3-12. Mapping DSCP Priority IP DSCP Value CoS Value 10, 12, 14, 16 18, 20, 22, 24 26, 28, 30, 32, 34, 36 38, 40, 42 46, 56 Command Attributes • DSCP Priority Table – Shows the DSCP Priority to CoS map. •...
  • Page 210: Mapping Cos Values To Acls

    ONFIGURING THE WITCH CLI – The following example globally enables DSCP Priority service on the switch, maps DSCP value 0 to CoS value 1 (on port 1), and then displays the DSCP Priority settings. Console(config)#map ip dscp 4-216 Console(config)#interface ethernet 1/1 4-132 Console(config-if)#map ip dscp 1 cos 0 4-217...
  • Page 211 LASS OF ERVICE ONFIGURATION Command Attributes • Port – Port identifier. • Name* – Name of ACL. • Type – Type of ACL (IP or MAC). • CoS Priority – CoS value used for packets matching an IP ACL rule. (Range: 0-7) •...
  • Page 212: Multicast Filtering

    ONFIGURING THE WITCH Multicast Filtering Multicasting is used to support real-time Unicast Flow applications such as videoconferencing or streaming audio. A multicast server does not have to establish a separate connection with each client. It merely broadcasts its service to the network, and any hosts that want to receive the multicast register with their local Multicast...
  • Page 213: Layer 2 Igmp (Snooping And Query)

    ULTICAST ILTERING Layer 2 IGMP (Snooping and Query) IGMP Snooping and Query — If multicast routing is not supported on other switches in your network, you can use IGMP Snooping and Query (page 3-165) to monitor IGMP service requests passing between multicast clients and servers, and dynamically configure the switch ports which need to forward multicast traffic.
  • Page 214 ONFIGURING THE WITCH • IGMP Querier — A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members.
  • Page 215: Figure 3-76. Configuring Internet Group Management Protocol

    ULTICAST ILTERING • IGMP Version — Sets the protocol version for compatibility with other devices on the network. (Range: 1-2; Default: 2) Notes: 1. All systems on the subnet must support the same version. 2. Some attributes are only enabled for IGMPv2, including IGMP Report Delay and IGMP Query Timeout.
  • Page 216: Displaying Interfaces Attached To A Multicast Router

    ONFIGURING THE WITCH Displaying Interfaces Attached to a Multicast Router Multicast routers that are attached to ports on the switch use information obtained from IGMP, along with a multicast routing protocol such as DVMRP or PIM, to support IP multicasting across the Internet. These routers may be dynamically discovered by the switch or statically assigned to an interface on the switch.
  • Page 217: Specifying Static Interfaces For A Multicast Router

    ULTICAST ILTERING CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router. Console#show ip igmp snooping mrouter vlan 1 4-229 VLAN M'cast Router Port Type ---- ------------------ ------- Eth 1/11 Static Specifying Static Interfaces for a Multicast Router Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier.
  • Page 218: Displaying Port Members Of Multicast Services

    ONFIGURING THE WITCH CLI – This example configures port 11 as a multicast router port within VLAN 1. Console(config)#ip igmp snooping vlan 1 mrouter ethernet 1/11 4-228 Console(config)#exit Console#show ip igmp snooping mrouter vlan 1 4-229 VLAN M'cast Router Port Type ---- ------------------ ------- Eth 1/11 Static Displaying Port Members of Multicast Services...
  • Page 219: Assigning Ports To Multicast Services

    ULTICAST ILTERING Web – Click IGMP Snooping, IP Multicast Registration Table. Select a VLAN ID and the IP address for a multicast service from the scroll-down lists. The switch will display all the interfaces that are propagating this multicast service. Figure 3-79.
  • Page 220: Figure 3-80. Specifying Multicast Port Membership

    ONFIGURING THE WITCH Command Usage • Static multicast addresses are never aged out. • When a multicast address is assigned to an interface in a specific VLAN, the corresponding traffic can only be forwarded to ports within that VLAN. Command Attribute •...
  • Page 221 ULTICAST ILTERING CLI – This example assigns a multicast address to VLAN 1, and then displays all the known multicast services supported on VLAN 1. Console(config)#ip igmp snooping vlan 1 static 224.1.1.12 ethernet 1/12 4-221 Console(config)#exit Console#show mac-address-table multicast vlan 1 4-223 VLAN M'cast IP addr.
  • Page 222 ONFIGURING THE WITCH 3-174...
  • Page 223: Command Line Interface

    HAPTER OMMAND NTERFACE This chapter describes how to use the Command Line Interface (CLI). Using the Command Line Interface Accessing the CLI When accessing the management interface for the switch over a direct connection to the server’s console port, or via a Telnet connection, the switch can be managed by entering command keywords and parameters at the prompt.
  • Page 224: Telnet Connection

    OMMAND NTERFACE After connecting to the system through the console port, the login screen displays: User Access Verification Username: admin Password: CLI session with the SMC8748L2 is opened. To end the CLI session, enter [Exit]. Console# Telnet Connection Telnet operates over the IP transport protocol. In this environment, your management station and any network device you want to manage over the network must have a valid IP address.
  • Page 225: Entering Commands

    NTERING OMMANDS 2. At the prompt, enter the user name and system password. The CLI will display the “Vty-n#” prompt for the administrator to show that you are using privileged access mode (i.e., Privileged Exec), or “Vty-n>” for the guest to show that you are using normal access mode (i.e., Normal Exec), where n indicates the number of the current Telnet session.
  • Page 226: Minimum Abbreviation

    OMMAND NTERFACE • To enter multiple commands, enter each command in the required order. For example, to enable Privileged Exec command mode, and display the startup configuration, enter: Console>enable Console#show startup-config • To enter commands that require parameters, enter the required parameters after the command keyword.
  • Page 227: Showing Commands

    NTERING OMMANDS Showing Commands If you enter a “?” at the command prompt, the system will display the first level of keywords for the current command class (Normal Exec or Privileged Exec) or configuration class (Global, ACL, Interface, Line, or VLAN Database).
  • Page 228: Partial Keyword Lookup

    OMMAND NTERFACE The command “show interfaces ?” will display the following information: Console#show interfaces ? counters Information of interfaces counters status Information of interfaces status switchport Information of interfaces switchport Console# Partial Keyword Lookup If you terminate a partial keyword with a question mark, alternatives that match the initial letters are provided.
  • Page 229: Understanding Command Modes

    NTERING OMMANDS Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain switching functions. These classes are further divided into different modes.
  • Page 230: Configuration Commands

    OMMAND NTERFACE Privileged Exec mode from within Normal Exec mode, by entering the enable command, followed by the privileged level password “super” (page 4-35). To enter Privileged Exec mode, enter the following user names and passwords: Username: admin Password: [admin login password] CLI session with the SMC8748L2 is opened.
  • Page 231: Table 4-2 Configuration Commands

    NTERING OMMANDS • Line Configuration - These commands modify the console port and Telnet configuration, and include command such as parity and databits. • VLAN Configuration - Includes the command to create VLAN groups. • Multiple Spanning Tree Configuration - These commands configure settings for the selected multiple spanning tree instance.
  • Page 232: Command Line Processing

    OMMAND NTERFACE Command Line Processing Commands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters. You can use the Tab key to complete partial commands, or enter a partial command followed by the “?”...
  • Page 233: Command Groups

    OMMAND ROUPS Command Groups The system commands can be broken down into the functional groups shown below Table 4-4 Command Group Index Command Group Description Page Line Sets communication parameters for the serial port 4-13 and Telnet, including baud rate and console time-out General Basic commands for entering privileged access...
  • Page 234 OMMAND NTERFACE Table 4-4 Command Group Index (Continued) Command Group Description Page Address Table Configures the address table for filtering specified 4-162 addresses, displays current entries, clears the table, or sets the aging time Spanning Tree Configures Spanning Tree settings for the switch 4-167 VLANs Configures VLAN settings, and defines port...
  • Page 235: Line Commands

    OMMANDS Line Commands You can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial port. These commands are used to set communication parameters for the serial port or Telnet (i.e., a virtual terminal). Table 4-5 Line Command Syntax Command Function Mode Page...
  • Page 236: Line

    OMMAND NTERFACE line This command identifies a specific line for configuration, and to process subsequent line configuration commands. Syntax line {console | vty} • console - Console terminal line. • vty - Virtual terminal for remote console access (i.e., Telnet). Default Setting There is no default line.
  • Page 237: Login

    OMMANDS login This command enables password checking at login. Use the no form to disable password checking and allow connections without a password. Syntax login [local] no login local - Selects local password checking. Authentication is based on the user name specified with the username command. Default Setting login local Command Mode...
  • Page 238: Password

    OMMAND NTERFACE Example Console(config-line)#login local Console(config-line)# Related Commands username (4-34) password (4-16) password This command specifies the password for a line. Use the no form to remove the password. Syntax password {0 | 7} password no password • {0 | 7} - 0 means plain password, 7 means encrypted password •...
  • Page 239: Timeout Login Response

    OMMANDS Example Console(config-line)#password 0 secret Console(config-line)# Related Commands login (4-15) password-thresh (4-19) timeout login response This command sets the interval that the system waits for a user to log into the CLI. Use the no form to restore the default setting. Syntax timeout login response [seconds] no timeout login response...
  • Page 240: Exec-Timeout

    OMMAND NTERFACE exec-timeout This command sets the interval that the system waits until user input is detected. Use the no form to restore the default. Syntax exec-timeout [seconds] no exec-timeout seconds - Integer that specifies the number of seconds. (Range: 0 - 65535 seconds; 0: no timeout) Default Setting CLI: No timeout Telnet: 10 minutes...
  • Page 241: Password-Thresh

    OMMANDS password-thresh This command sets the password intrusion threshold which limits the number of failed logon attempts. Use the no form to remove the threshold value. Syntax password-thresh [threshold] no password-thresh threshold - The number of allowed password attempts. (Range: 1-120; 0: no threshold) Default Setting The default value is three attempts.
  • Page 242: Silent-Time

    OMMAND NTERFACE silent-time This command sets the amount of time the management console is inaccessible after the number of unsuccessful logon attempts exceeds the threshold set by the password-thresh command. Use the no form to remove the silent time value. Syntax silent-time [seconds] no silent-time...
  • Page 243: Parity

    OMMANDS Default Setting 8 data bits per character Command Mode Line Configuration Command Usage The databits command can be used to mask the high bit on input from devices that generate 7 data bits with parity. If parity is being generated, specify 7 data bits per character.
  • Page 244: Speed

    OMMAND NTERFACE Command Usage Communication protocols provided by devices such as terminals and modems often require a specific parity bit setting. Example To specify no parity, enter this command: Console(config-line)#parity none Console(config-line)# speed This command sets the terminal line’s baud rate. This command sets both the transmit (to terminal) and receive (from terminal) speeds.
  • Page 245: Stopbits

    OMMANDS Example To specify 57600 bps, enter this command: Console(config-line)#speed 57600 Console(config-line)# stopbits This command sets the number of the stop bits transmitted per byte. Use the no form to restore the default setting. Syntax stopbits {1 | 2} • 1 - One stop bit •...
  • Page 246: Show Line

    OMMAND NTERFACE Command Usage Specifying session identifier “0” will disconnect the console connection. Specifying any other identifiers for an active session will disconnect an SSH or Telnet connection. Example Console#disconnect 1 Console# Related Commands show ssh (4-53) show users (4-80) show line This command displays the terminal line’s parameters.
  • Page 247: General Commands

    ENERAL OMMANDS Example To show all lines, enter this command: Console#show line Console configuration: Password threshold: 3 times Interactive timeout: Disabled Login timeout: Disabled Silent time: Disabled Baudrate: auto Databits: Parity: none Stopbits: VTY configuration: Password threshold: 3 times Interactive timeout: 600 sec Login timeout: 300 sec Console# General Commands...
  • Page 248: Enable

    OMMAND NTERFACE enable This command activates Privileged Exec mode. In privileged mode, additional commands are available, and certain commands display additional information. (See “Understanding Command Modes” on page 4-7.) Syntax enable [level] level - Privilege level to log into the device. The device has two predefined privilege levels: 0: Normal Exec, 15: Privileged Exec.
  • Page 249: Disable

    ENERAL OMMANDS disable This command returns to Normal Exec mode from privileged mode. In normal access mode, you can only display basic information on the switch's configuration or Ethernet statistics. To gain access to all commands, you must use the privileged mode. (See “Understanding Command Modes”...
  • Page 250: Show History

    OMMAND NTERFACE Example Console#configure Console(config)# Related Commands end (4-29) show history This command shows the contents of the command history buffer. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage The history buffer size is fixed at 10 Execution commands and 10 Configuration commands.
  • Page 251: Reload

    ENERAL OMMANDS The ! command repeats commands from the Execution command history buffer when you are in Normal Exec or Privileged Exec Mode, and commands from the Configuration command history buffer when you are in any of the configuration modes. In this example, the !2 command repeats the second command in the Execution history buffer (config).
  • Page 252: Exit

    OMMAND NTERFACE Command Mode Global Configuration, Interface Configuration, Line Configuration, VLAN Database Configuration, and Multiple Spanning Tree Configuration. Example This example shows how to return to the Privileged Exec mode from the Interface Configuration mode: Console(config-if)#end Console# exit This command returns to the previous configuration mode or exit the configuration program.
  • Page 253: System Management Commands

    YSTEM ANAGEMENT OMMANDS Command Mode Normal Exec, Privileged Exec Command Usage The quit and exit commands can both exit the configuration program. Example This example shows how to quit a CLI session: Console#quit Press ENTER to start session User Access Verification Username: System Management Commands These commands are used to control system logs, passwords, user names,...
  • Page 254: Device Designation Commands

    OMMAND NTERFACE Table 4-7 System Management Commands (Continued) Command Group Function Page System Status Displays system configuration, active managers, and 4-75 version information Frame Size Enables support for jumbo frames 4-81 Device Designation Commands Table 4-8 Device Designation Commands Command Function Mode Page prompt...
  • Page 255: Hostname

    YSTEM ANAGEMENT OMMANDS Example Console(config)#prompt RD2 RD2(config)# hostname This command specifies or modifies the host name for this device. Use the no form to restore the default host name. Syntax hostname name no hostname name - The name of this host. (Maximum length: 255 characters) Default Setting None Command Mode...
  • Page 256: Username

    OMMAND NTERFACE username This command adds named users, requires authentication at login, specifies or changes a user's password (or specify that no password is required), or specifies or changes a user's access level. Use the no form to remove a user name. Syntax username name {access-level level | no password | password {0 | 7} password}...
  • Page 257: Enable Password

    YSTEM ANAGEMENT OMMANDS The encrypted password is required for compatibility with legacy password settings (i.e., plain text or encrypted) when reading the configuration file during system bootup or when downloading the configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.
  • Page 258: Ip Filter Commands

    OMMAND NTERFACE • The encrypted password is required for compatibility with legacy password settings (i.e., plain text or encrypted) when reading the configuration file during system bootup or when downloading the configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.
  • Page 259: Show Management

    YSTEM ANAGEMENT OMMANDS • end-address - The end address of a range. Default Setting All addresses Command Mode Global Configuration Command Usage • If anyone tries to access a management interface on the switch from an invalid address, the switch will reject the connection, enter an event message in the system log, and send a trap message to the trap manager.
  • Page 260: Web Server Commands

    OMMAND NTERFACE show management {all-client | http-client | snmp-client | telnet-client} • all-client - Adds IP address(es) to the SNMP, web and Telnet groups. • http-client - Adds IP address(es) to the web group. • snmp-client - Adds IP address(es) to the SNMP group. •...
  • Page 261: Ip Http Port

    YSTEM ANAGEMENT OMMANDS Table 4-12 Web Server Command Command Function Mode Page ip http Enables HTTPS/SSL for encrypted 4-40 secure-server communications ip http secure-port Specifies the UDP port number for HTTPS/ 4-41 ip http port This command specifies the TCP port number used by the web browser interface.
  • Page 262: Ip Http Secure-Server

    OMMAND NTERFACE Default Setting Enabled Command Mode Global Configuration Example Console(config)#ip http server Console(config)# Related Commands ip http port (4-39) ip http secure-server This command enables the secure hypertext transfer protocol (HTTPS) over the Secure Socket Layer (SSL), providing secure access (i.e., an encrypted connection) to the switch’s web interface.
  • Page 263: Ip Http Secure-Port

    YSTEM ANAGEMENT OMMANDS • When you start HTTPS, the connection is established in this way: - The client authenticates the server using the server’s digital certificate. - The client and server negotiate a set of security protocols to use for the connection.
  • Page 264 OMMAND NTERFACE Syntax ip http secure-port port_number no ip http secure-port port_number – The UDP port used for HTTPS/SSL. (Range: 1-65535) Default Setting Command Mode Global Configuration Command Usage • You cannot configure the HTTP and HTTPS servers to use the same port.
  • Page 265: Telnet Server Commands

    YSTEM ANAGEMENT OMMANDS Telnet Server Commands Table 4-14 Telnet Server Commands Command Function Mode Page ip telnet server Allows the switch to be monitored or 4-43 configured from Telnet ip telnet port Specifies the port to be used by the Telnet 4-43 interface ip telnet server...
  • Page 266: Secure Shell Commands

    OMMAND NTERFACE Default Setting Command Mode Global Configuration Example Console(config)#ip telnet port 123 Console(config)# Secure Shell Commands The Berkley-standard includes remote access tools originally designed for Unix systems. Some of these tools have also been implemented for Microsoft Windows and other environments. These tools, including commands such as rlogin (remote login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.
  • Page 267: Table 4-15 Secure Shell Commands

    YSTEM ANAGEMENT OMMANDS Note: The switch supports both SSH Version 1.5 and 2.0. Table 4-15 Secure Shell Commands Command Function Mode Page ip ssh server Enables the SSH server on the switch 4-47 ip ssh timeout Specifies the authentication timeout for the 4-48 SSH server ip ssh...
  • Page 268 OMMAND NTERFACE following section. Note that regardless of whether you use public key or password authentication, you still have to generate authentication keys on the switch and enable the SSH server. To use the SSH server, complete these steps: 1. Generate a Host Key Pair – Use the ip ssh crypto host-key generate command to create a host public/private key pair.
  • Page 269: Ip Ssh Server

    YSTEM ANAGEMENT OMMANDS 5. Enable SSH Service – Use the ip ssh server command to enable the SSH server on the switch. 6. Configure Challenge-Response Authentication – When an SSH client attempts to contact the switch, the SSH server uses the host key pair to negotiate a session key and encryption method.
  • Page 270: Ip Ssh Timeout

    OMMAND NTERFACE Command Mode Global Configuration Command Usage • The SSH server supports up to four client sessions. The maximum number of client sessions includes both current Telnet sessions and SSH sessions. • The SSH server uses DSA or RSA for key exchange when the client first establishes a connection with the switch, and then negotiates with the client to select either DES (56-bit) or 3DES (168-bit) for data encryption.
  • Page 271: Ip Ssh Authentication-Retries

    YSTEM ANAGEMENT OMMANDS Command Usage The timeout specifies the interval the switch will wait for a response from the client during the SSH negotiation phase. Once an SSH session has been established, the timeout for user input is controlled by the exec-timeout command for vty sessions.
  • Page 272: Ip Ssh Server-Key Size

    OMMAND NTERFACE ip ssh server-key size This command sets the SSH server key size. Use the no form to restore the default setting. Syntax ip ssh server-key size key-size no ip ssh server-key size key-size – The size of server key. (Range: 512-896 bits) Default Setting 768 bits Command Mode...
  • Page 273: Ip Ssh Crypto Host-Key Generate

    YSTEM ANAGEMENT OMMANDS Example Console#delete public-key admin dsa Console# ip ssh crypto host-key generate This command generates the host key pair (i.e., public and private). Syntax ip ssh crypto host-key generate [dsa | rsa] • dsa – DSA (Version 2) key type. •...
  • Page 274: Ip Ssh Crypto Zeroize

    OMMAND NTERFACE ip ssh crypto zeroize This command clears the host key from memory (i.e. RAM). Syntax ip ssh crypto zeroize [dsa | rsa] • dsa – DSA key type. • rsa – RSA key type. Default Setting Clears both the DSA and RSA key. Command Mode Privileged Exec Command Usage...
  • Page 275: Show Ip Ssh

    YSTEM ANAGEMENT OMMANDS Default Setting Saves both the DSA and RSA key. Command Mode Privileged Exec Example Console#ip ssh save host-key dsa Console# Related Commands ip ssh crypto host-key generate (4-51) show ip ssh This command displays the connection settings used when authenticating client access to the SSH server.
  • Page 276: Table 4-16 Show Ssh - Display Description

    OMMAND NTERFACE Table 4-16 show ssh - display description Field Description Session The session number. (Range: 0-3) Version The Secure Shell version number. State The authentication negotiation state. (Values: Negotiation-Started, Authentication-Started, Session-Started) Username The user name of the client. Encryption The encryption method is automatically negotiated between the client and server.
  • Page 277: Show Public-Key

    YSTEM ANAGEMENT OMMANDS show public-key This command shows the public key for the specified user or for the host. Syntax show public-key [user [username]| host] username – Name of an SSH user. (Range: 1-8 characters) Default Setting Shows all public keys. Command Mode Privileged Exec Command Usage...
  • Page 278: Event Logging Commands

    OMMAND NTERFACE Event Logging Commands Table 4-17 Event Logging Commands Command Function Mode Page logging on Controls logging of error messages 4-56 logging history Limits syslog messages saved to switch 4-57 memory based on severity logging host Adds a syslog server host IP address that will 4-58 receive logging messages logging facility...
  • Page 279: Logging History

    YSTEM ANAGEMENT OMMANDS Example Console(config)#logging on Console(config)# Related Commands logging history (4-57) clear logging (4-61) logging history This command limits syslog messages saved to switch memory based on severity. The no form returns the logging of syslog messages to the default level.
  • Page 280: Logging Host

    OMMAND NTERFACE Table 4-18 Logging Levels (Continued) Level Severity Name Description alerts Immediate action needed emergencies System unusable * There are only Level 2, 5 and 6 error messages for the current firmware release. Default Setting Flash: errors (level 3 - 0) RAM: warnings (level 7 - 0) Command Mode Global Configuration...
  • Page 281: Logging Facility

    YSTEM ANAGEMENT OMMANDS Command Usage • By using this command more than once you can build up a list of host IP addresses. • The maximum number of host IP addresses allowed is five. Example Console(config)#logging host 10.1.0.3 Console(config)# logging facility This command sets the facility type for remote logging of syslog messages.
  • Page 282: Logging Trap

    OMMAND NTERFACE logging trap This command enables the logging of system messages to a remote server, or limits the syslog messages saved to a remote server based on severity. Use this command without a specified level to enable remote logging. Use the no form to disable remote logging.
  • Page 283: Clear Logging

    YSTEM ANAGEMENT OMMANDS clear logging This command clears messages from the log buffer. Syntax clear logging [flash | ram] • flash - Event history stored in flash memory (i.e., permanent memory). • ram - Event history stored in temporary RAM (i.e., memory flushed on power reset).
  • Page 284: Table 4-19 Show Logging Flash/Ram - Display Description

    OMMAND NTERFACE Default Setting None Command Mode Privileged Exec Example The following example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., default level 3 - 0), and the message level for RAM is “debugging” (i.e., default level 7 - 0). Console#show logging flash Syslog logging: Enabled...
  • Page 285: Show Log

    YSTEM ANAGEMENT OMMANDS Table 4-20 show logging trap - display description Field Description Syslog logging Shows if system logging has been enabled via the logging on command. REMOTELOG Shows if remote logging has been enabled via the logging status trap command. REMOTELOG The facility type for remote logging of syslog messages as facility type...
  • Page 286: Smtp Alert Commands

    OMMAND NTERFACE Example The following example shows the event message stored in RAM. Console#show log ram [1] 00:01:30 2001-01-01 "VLAN 1 link-up notification." level: 6, module: 5, function: 1, and event no.: 1 [0] 00:01:30 2001-01-01 "Unit 1, Port 1 link-up notification." level: 6, module: 5, function: 1, and event no.: 1 Console# SMTP Alert Commands...
  • Page 287: Logging Sendmail Host

    YSTEM ANAGEMENT OMMANDS logging sendmail host This command specifies SMTP servers that will be sent alert messages. Use the no form to remove an SMTP server. Syntax [no] logging sendmail host ip_address ip_address - IP address of an SMTP server that will be sent alert messages for event handling.
  • Page 288: Logging Sendmail Level

    OMMAND NTERFACE logging sendmail level This command sets the severity threshold used to trigger alert messages. Syntax logging sendmail level level level - One of the system message levels (page 4-57). Messages sent include the selected level down to level 0. (Range: 0-7; Default: 7) Default Setting Level 7 Command Mode...
  • Page 289: Logging Sendmail Destination-Email

    YSTEM ANAGEMENT OMMANDS Command Mode Global Configuration Command Usage You may use an symbolic email address that identifies the switch, or the address of an administrator responsible for the switch. Example This example will send email alerts for system errors from level 3 through 0. Console(config)#logging sendmail source-email bill@this-company.com Console(config)# logging sendmail destination-email...
  • Page 290: Logging Sendmail

    OMMAND NTERFACE logging sendmail This command enables SMTP event handling. Use the no form to disable this function. Syntax [no] logging sendmail Default Setting Enabled Command Mode Global Configuration Example Console(config)#logging sendmail Console(config)# show logging sendmail This command displays the settings for the SMTP event handler. Command Mode Normal Exec, Privileged Exec Example...
  • Page 291: Time Commands

    YSTEM ANAGEMENT OMMANDS Time Commands The system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries.
  • Page 292: Sntp Server

    OMMAND NTERFACE Command Usage • The time acquired from time servers is used to record accurate dates and times for log events. Without SNTP, the switch only records the time starting from the factory default set at the last bootup (e.g., 00:00:00, Jan.
  • Page 293: Sntp Poll

    YSTEM ANAGEMENT OMMANDS Command Mode Global Configuration Command Usage This command specifies time servers from which the switch will poll for time updates when set to SNTP client mode. The client will poll the time servers in the order specified until a response is received. It issues time synchronization requests based on the interval set via the sntp poll command.
  • Page 294: Show Sntp

    OMMAND NTERFACE Related Commands Related Commands (4-70) show sntp This command displays the current time and configuration settings for the SNTP client, and indicates whether or not the local time has been properly updated. Command Mode Normal Exec, Privileged Exec Command Usage This command displays the current time, the poll interval used for sending time synchronization requests, and the current SNTP mode...
  • Page 295: Calendar Set

    YSTEM ANAGEMENT OMMANDS Default Setting None Command Mode Global Configuration Command Usage This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich Mean Time or GMT), based on the earth’s prime meridian, zero degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is east (before) or west (after) of UTC.
  • Page 296: Show Calendar

    OMMAND NTERFACE Default Setting None Command Mode Privileged Exec Example This example shows how to set the system clock to 15:12:34, February 1st, 2002. Console#calendar set 15 12 34 1 February 2002 Console# show calendar This command displays the system clock. Default Setting None Command Mode...
  • Page 297: System Status Commands

    YSTEM ANAGEMENT OMMANDS System Status Commands Table 4-23 System Status Commands Command Function Mode Page show Displays the contents of the configuration file 4-76 startup-config (stored in flash memory) that is used to start up the system show Displays the configuration data currently in 4-76 running-config show system...
  • Page 298: Show Running-Config

    OMMAND NTERFACE - Users (names and access levels) - VLAN database (VLAN ID, name and state) - VLAN configuration settings for each interface - Multiple spanning tree instances (name and interfaces) - IP address configured for the switch - Spanning tree settings - Any configured settings for the console port and Telnet Example Console#show startup-config...
  • Page 299 YSTEM ANAGEMENT OMMANDS Command Mode Privileged Exec Command Usage • Use this command in conjunction with the show startup-config command to compare the information in running memory to the information stored in non-volatile memory. • This command displays settings for key command modes. Each mode group is separated by “!”...
  • Page 300: L Ine I Nterface

    OMMAND NTERFACE Example Console#show running-config building running-config, please wait..phymap 00-30-f1-df-9c-a0 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 SNTP server 0.0.0.0 0.0.0.0 0.0.0.0 snmp-server community public ro snmp-server community private rw username admin access-level 15 username admin password 7 21232f297a57a5a743894a0e4a801fc3 username guest access-level 0 username guest password 7 084e0343a0486ff05530df6c705c8bb4 enable password level 15 7 1b3231655cebb7a1f783eddf27d254ca...
  • Page 301: Show System

    YSTEM ANAGEMENT OMMANDS show system This command displays system information. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage • For a description of the items shown by this command, refer to “Displaying System Information” on page 3-11. •...
  • Page 302: Show Users

    OMMAND NTERFACE show users Shows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage The session used to execute this command is indicated by a “*” symbol next to the Line (i.e., session) index number.
  • Page 303: Frame Size Commands

    YSTEM ANAGEMENT OMMANDS Command Mode Normal Exec, Privileged Exec Command Usage See “Displaying Switch Hardware/Software Versions” on page 3-13 for detailed information on the items displayed by this command. Example Console#show version Unit 1 Serial number: A429048179 Hardware version: EPLD version: 15.15 Number of ports: Main power status:...
  • Page 304: Command Mode

    OMMAND NTERFACE Command Mode Global Configuration Command Usage • This switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames up to 9216 bytes. Compared to standard Ethernet frames that run only up to 1.5 KB, using jumbo frames significantly reduces the per-packet overhead required to process protocol encapsulation fields.
  • Page 305: Flash/File Commands

    LASH OMMANDS Flash/File Commands These commands are used to manage the system code or configuration files. Table 4-25 Flash/File Commands Command Function Mode Page copy Copies a code image or a switch configuration 4-83 to or from flash memory or a TFTP server delete Deletes a file or code image 4-86...
  • Page 306 OMMAND NTERFACE • https-certificate - Keyword that allows you to copy the HTTPS secure site certificate. • public-key - Keyword that allows you to copy a SSH key from a TFTP server. (See “Secure Shell Commands” on page 4-44.) • unit - Keyword that allows you to copy to/from a specific unit in the stack.
  • Page 307 LASH OMMANDS Example The following example shows how to upload the configuration settings to a file on the TFTP server: Console#copy file tftp Choose file type: 1. config: 2. opcode: <1-2>: 1 Source file name: startup TFTP server ip address: 10.1.0.99 Destination file name: startup.01 TFTP completed.
  • Page 308: Delete

    OMMAND NTERFACE This example shows how to copy a public-key used by SSH from an TFTP server. Note that public key authentication via SSH is only supported for users configured locally on the switch. Console#copy tftp public-key TFTP server IP address: 192.168.1.19 Choose public key type: 1.
  • Page 309: Dir

    LASH OMMANDS Example This example shows how to delete the test2.cfg configuration file from flash memory. Console#delete test2.cfg Console# Related Commands dir (4-87) delete public-key (4-50) This command displays a list of files in flash memory. Syntax dir [unit:] [boot-rom | config | opcode [:filename]] The type of file or image to display includes: •...
  • Page 310: Whichboot

    OMMAND NTERFACE Command Usage • If you enter the command dir without any parameters, the system displays all files. • A colon (:) is required after the specified unit number. • File information is shown below: Table 4-26 File Directory Information Column Heading Description file name...
  • Page 311: Boot System

    LASH OMMANDS Command Mode Privileged Exec Example This example shows the information displayed by the whichboot command. See the table under the dir command for a description of the file information displayed by this command. Console#whichboot file name file type startup size (byte) -------------------------------- ----------------------- ------- ----------- Unit1: diag_0060...
  • Page 312: Authentication Commands

    OMMAND NTERFACE Example Console(config)#boot system config: startup Console(config)# Related Commands dir (4-87) whichboot (4-88) Authentication Commands You can configure this switch to authenticate users logging into the system for management access using local or remote authentication methods. You can also enable port-based authentication for network client access using IEEE 802.1X.
  • Page 313: Authentication Login

    UTHENTICATION OMMANDS authentication login This command defines the login authentication method and precedence. Use the no form to restore the default. Syntax authentication login {[local] [radius] [tacacs]} no authentication login • local - Use local password. • radius - Use RADIUS server password. •...
  • Page 314: Authentication Enable

    OMMAND NTERFACE Example Console(config)#authentication login radius Console(config)# Related Commands username - for setting the local user names and passwords (4-34) authentication enable This command defines the authentication method and precedence to use when changing from Exec command mode to Privileged Exec command mode with the enable command (see page 4-26).
  • Page 315: Radius Client

    UTHENTICATION OMMANDS • You can specify three authentication methods in a single command to indicate the authentication sequence. For example, if you enter “authentication enable radius tacacs local,” the user name and password on the RADIUS server is verified first. If the RADIUS server is not available, then authentication is attempted on the TACACS+ server.
  • Page 316: Radius-Server Host

    OMMAND NTERFACE radius-server host This command specifies primary and backup RADIUS servers and authentication parameters that apply to each server. Use the no form to restore the default values. Syntax radius-server host host_ip_address no radius-server host [no] radius-server index host {host_ip_address | host_alias} [auth-port auth_port] [timeout timeout] [retransmit retransmit] [key key] •...
  • Page 317: Radius-Server Port

    UTHENTICATION OMMANDS Example Console(config)#radius-server 1 host 192.168.1.20 port 181 timeout 10 retransmit 5 key green Console(config)# radius-server port This command sets the RADIUS server network port. Use the no form to restore the default. Syntax radius-server port port_number no radius-server port port_number - RADIUS server UDP port used for authentication messages.
  • Page 318: Radius-Server Retransmit

    OMMAND NTERFACE Default Setting None Command Mode Global Configuration Example Console(config)#radius-server key green Console(config)# radius-server retransmit This command sets the number of retries. Use the no form to restore the default. Syntax radius-server retransmit number_of_retries no radius-server retransmit number_of_retries - Number of times the switch will try to authenticate logon access via the RADIUS server.
  • Page 319: Radius-Server Timeout

    UTHENTICATION OMMANDS radius-server timeout This command sets the interval between transmitting authentication requests to the RADIUS server. Use the no form to restore the default. Syntax radius-server timeout number_of_seconds no radius-server timeout number_of_seconds - Number of seconds the switch waits for a reply before resending a request.
  • Page 320: Tacacs+ Client

    OMMAND NTERFACE TACACS+ Client Terminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses software running on a central server to control access to TACACS-aware devices on the network. An authentication server contains a database of multiple user name/password pairs with associated privilege levels for each user or group that require management access to a switch.
  • Page 321: Tacacs-Server Port

    UTHENTICATION OMMANDS tacacs-server port This command specifies the TACACS+ server network port. Use the no form to restore the default. Syntax tacacs-server port port_number no tacacs-server port port_number - TACACS+ server TCP port used for authentication messages. (Range: 1-65535) Default Setting Command Mode Global Configuration Example...
  • Page 322: Show Tacacs-Server

    OMMAND NTERFACE Example Console(config)#tacacs-server key green Console(config)# show tacacs-server This command displays the current settings for the TACACS+ server. Default Setting None Command Mode Privileged Exec Example Console#show tacacs-server Remote TACACS server configuration: Server IP address: 10.11.12.13 Communication key with TACACS server: ***** Server port number: Console# Port Security Commands...
  • Page 323: Port Security

    UTHENTICATION OMMANDS Table 4-31 Port Security Commands Command Function Mode Page port security Configures a secure port 4-101 mac-address-table static Maps a static address to a port in a 4-163 VLAN show mac-address-table Displays entries in the 4-165 bridge-forwarding database port security This command enables or configures port security.
  • Page 324 OMMAND NTERFACE Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number. Only incoming traffic with source addresses already stored in the dynamic or static address table will be accepted. •...
  • Page 325: 802.1X Port Authentication

    UTHENTICATION OMMANDS 802.1X Port Authentication The switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorized access to the network by requiring users to first submit credentials for authentication. Client authentication is controlled centrally by a RADIUS server using EAP (Extensible Authentication Protocol).
  • Page 326: Dot1X System-Auth-Control

    OMMAND NTERFACE dot1x system-auth-control This command enables IEEE 802.1X port authentication globally on the switch. Use the no form to restore the default. Syntax [no] dot1x system-auth-control Default Setting Disabled Command Mode Global Configuration Example Console(config)#dot1x system-auth-control Console(config)# dot1x default This command sets all configurable dot1x global and port settings to their default values.
  • Page 327: Dot1X Max-Req

    UTHENTICATION OMMANDS dot1x max-req This command sets the maximum number of times the switch port will retransmit an EAP request/identity packet to the client before it times out the authentication session. Use the no form to restore the default. Syntax dot1x max-req count no dot1x max-req count –...
  • Page 328: Dot1X Operation-Mode

    OMMAND NTERFACE Default force-authorized Command Mode Interface Configuration Example Console(config)#interface eth 1/2 Console(config-if)#dot1x port-control auto Console(config-if)# dot1x operation-mode This command allows single or multiple hosts (clients) to connect to an 802.1X-authorized port. Use the no form with no keywords to restore the default to single host.
  • Page 329: Dot1X Re-Authenticate

    UTHENTICATION OMMANDS Similarly, a port can become unauthorized for all hosts if one attached host fails re-authentication or sends an EAPOL logoff message. Example Console(config)#interface eth 1/2 Console(config-if)#dot1x operation-mode multi-host max-count 10 Console(config-if)# dot1x re-authenticate This command forces re-authentication on all ports or a specific interface. Syntax dot1x re-authenticate [interface] interface...
  • Page 330: Dot1X Timeout Quiet-Period

    OMMAND NTERFACE dot1x timeout quiet-period This command sets the time that a switch port waits after the Max Request Count has been exceeded before attempting to acquire a new client. Use the no form to reset the default. Syntax dot1x timeout quiet-period seconds no dot1x timeout quiet-period seconds - The number of seconds.
  • Page 331: Dot1X Timeout Tx-Period

    UTHENTICATION OMMANDS Example Console(config)#interface eth 1/2 Console(config-if)#dot1x timeout re-authperiod 300 Console(config-if)# dot1x timeout tx-period This command sets the time that the switch waits during an authentication session before re-transmitting an EAP packet. Use the no form to reset to the default value. Syntax dot1x timeout tx-period seconds no dot1x timeout tx-period...
  • Page 332 OMMAND NTERFACE Command Mode Privileged Exec Command Usage This command displays the following information: • Global 802.1X Parameters – Shows whether or not 802.1X port authentication is globally enabled on the switch. • 802.1X Port Summary – Displays the port access control parameters for each interface that has enabled 802.1X, including the following items: - Status–...
  • Page 333: Table 4-27 Authentication Commands

    UTHENTICATION OMMANDS • Authenticator State Machine - State – Current state (including initialize, disconnected, connecting, authenticating, authenticated, aborting, held, force_authorized, force_unauthorized). - Reauth Count – Number of times connecting state is re-entered. • Backend State Machine - State – Current state (including request, response, success, fail, timeout, idle, initialize).
  • Page 334: Access Control List Commands

    OMMAND NTERFACE Authenticator State Machine State Authenticated Reauth Count Backend State Machine State Idle Request Count Identifier(Server) Reauthentication State Machine State Initialize Console# Access Control List Commands Access Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port number or TCP control code) or any frames (based on MAC address or Ethernet type).
  • Page 335 CCESS ONTROL OMMANDS number. If the TCP protocol is specified, then you can also filter packets based on the TCP control code. The following restrictions apply to ACLs: • Each ACL can have up to 32 rules. • The maximum number of ACLs is also 88. •...
  • Page 336: Ip Acls

    OMMAND NTERFACE IP ACLs Table 4-34 IP ACL Commands Command Function Mode Page access-list ip Creates an IP ACL and enters 4-114 configuration mode for standard or extended IP ACLs permit, deny Filters packets matching a specified STD-ACL 4-115 source IP address permit, deny Filters packets meeting the specified EXT-ACL...
  • Page 337: Permit, Deny (Standard Acl)

    CCESS ONTROL OMMANDS • acl_name – Name of the ACL. (Maximum length: 16 characters) Default Setting None Command Mode Global Configuration Command Usage • An egress ACL must contain all deny rules. • When you create a new ACL or enter configuration mode for an existing ACL, use the permit or deny command to add new rules to the bottom of the list.
  • Page 338: Permit, Deny (Extended Acl)

    OMMAND NTERFACE • host – Keyword followed by a specific IP address. Default Setting None Command Mode Standard ACL Command Usage • New rules are appended to the end of the list. • Address bitmasks are similar to a subnet mask, containing four integers from 0 to 255, each separated by a period.
  • Page 339: Default Setting

    CCESS ONTROL OMMANDS Syntax [no] {permit | deny} [protocol-number | udp] {any | source address-bitmask | host source} {any | destination address-bitmask | host destination} [source-port sport [end]] [destination-port dport [end]] [no] {permit | deny} tcp {any | source address-bitmask | host source} {any | destination address-bitmask | host destination} [source-port sport [end]] [destination-port dport [end]] •...
  • Page 340: Show Ip Access-List

    OMMAND NTERFACE Example This example accepts any incoming packets if the source address is within subnet 10.7.1.x. For example, if the rule is matched; i.e., the rule (10.7.1.0 & 255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0), the packet passes through. Console(config-ext-acl)#permit 10.7.1.1 255.255.255.0 any Console(config-ext-acl)# This allows TCP packets from class C addresses 192.168.1.0 to any...
  • Page 341: Ip Access-Group

    CCESS ONTROL OMMANDS ip access-group This command binds a port to an IP ACL. Use the no form to remove the port. Syntax [no] ip access-group acl_name {in | out} • acl_name – Name of the ACL. (Maximum length: 16 characters) •...
  • Page 342: Map Access-List Ip

    OMMAND NTERFACE Example Console#show ip access-group Interface ethernet 1/25 IP standard access-list david Console# Related Commands ip access-group (4-119) map access-list ip This command sets the output queue for packets matching an ACL rule. The specified CoS value is only used to map the matching packet to an output queue;...
  • Page 343: Show Map Access-List Ip

    CCESS ONTROL OMMANDS Example Console(config)#interface ethernet 1/25 Console(config-if)#map access-list ip bill cos 0 Console(config-if)# Related Commands queue cos-map (4-213) show map access-list ip (4-121) show map access-list ip This command shows the CoS value mapped to an IP ACL for the current interface.
  • Page 344: Acl Information

    OMMAND NTERFACE ACL Information Table 4-36 ACL Information Command Function Mode Page show access-list Shows all ACLs and associated rules 4-122 show access-group Shows the ACLs assigned to each port 4-123 show access-list This command shows all ACLs and associated rules, as well as all the user-defined masks.
  • Page 345: Show Access-Group

    SNMP C OMMANDS show access-group This command shows the port assignments of ACLs. Command Mode Privileged Executive Example Console#show access-group Interface ethernet 1/25 IP standard access-list david IP access-list jerry Console# SNMP Commands Controls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the error types sent to trap managers.
  • Page 346: Show Snmp

    OMMAND NTERFACE show snmp This command can be used to check the status of SNMP communications. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage This command provides information on the community access strings, counter information for SNMP input and output protocol data units, and whether or not SNMP logging has been enabled with the snmp-server enable traps command.
  • Page 347: Snmp-Server Community

    SNMP C OMMANDS snmp-server community This command defines the SNMP v1 and v2c community access string. Use the no form to remove the specified community string. Syntax snmp-server community string [ro|rw] no snmp-server community string • string - Community string that acts like a password and permits access to the SNMP protocol.
  • Page 348: Snmp-Server Contact

    OMMAND NTERFACE snmp-server contact This command sets the system contact string. Use the no form to remove the system contact information. Syntax snmp-server contact string no snmp-server contact string - String that describes the system contact information. (Maximum length: 255 characters) Default Setting None Command Mode...
  • Page 349: Snmp-Server Host

    SNMP C OMMANDS Command Mode Global Configuration Example Console(config)#snmp-server location WC-19 Console(config)# Related Commands snmp-server contact (4-126) snmp-server host This command specifies the recipient of a Simple Network Management Protocol notification operation. Use the no form to remove the specified host.
  • Page 350 OMMAND NTERFACE Default Setting • Host Address: None • SNMP Version: 1 • UDP Port: 162 Command Mode Global Configuration Command Usage • If you do not enter an snmp-server host command, no notifications are sent. In order to configure the switch to send SNMP notifications, you must enter at least one snmp-server host command.
  • Page 351: Snmp-Server Enable Traps

    SNMP C OMMANDS Example Console(config)#snmp-server host 10.1.19.23 batman Console(config)# Related Commands snmp-server enable traps (4-129) snmp-server enable traps This command enables this device to send Simple Network Management Protocol traps (SNMP notifications). Use the no form to disable SNMP notifications. Syntax [no] snmp-server enable traps [authentication | link-up-down] •...
  • Page 352 OMMAND NTERFACE Example Console(config)#snmp-server enable traps link-up-down Console(config)# Related Commands • snmp-server host (4-127) 4-130...
  • Page 353: Interface Commands

    NTERFACE OMMANDS Interface Commands These commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN. Table 4-38 Interface Commands Command Function Mode Page interface Configures an interface type and 4-132 enters interface configuration mode description Adds a description to an interface 4-132...
  • Page 354: Interface

    OMMAND NTERFACE interface This command configures an interface type and enter interface configuration mode. Use the no form to remove a trunk. Syntax interface interface no interface port-channel channel-id • interface • ethernet unit/port - unit - Stack unit. (Range: 1-8) - port - Port number.
  • Page 355: Speed-Duplex

    NTERFACE OMMANDS Command Mode Interface Configuration (Ethernet, Port Channel) Example The following example adds a description to port 24. Console(config)#interface ethernet 1/24 Console(config-if)#description RD-SW#3 Console(config-if)# speed-duplex This command configures the speed and duplex mode of a given interface when autonegotiation is disabled. Use the no form to restore the default. Syntax speed-duplex {1000full | 100full | 100half | 10full | 10half} no speed-duplex...
  • Page 356: Negotiation

    OMMAND NTERFACE • When using the negotiation command to enable auto-negotiation, the optimal settings will be determined by the capabilities command. To set the speed/duplex mode under auto-negotiation, the required mode must be specified in the capabilities list for an interface. Example The following example configures port 5 to 100 Mbps, half-duplex operation.
  • Page 357: Capabilities

    NTERFACE OMMANDS Example The following example configures port 11 to use autonegotiation. Console(config)#interface ethernet 1/11 Console(config-if)#negotiation Console(config-if)# Related Commands capabilities (4 -135) speed-duplex (4 -133) capabilities This command advertises the port capabilities of a given interface during autonegotiation. Use the no form with parameters to remove an advertised capability, or the no form without parameters to restore the default values.
  • Page 358: Flowcontrol

    OMMAND NTERFACE Command Usage When auto-negotiation is enabled with the negotiation command, the switch will negotiate the best settings for a link based on the capabilites command. When auto-negotiation is disabled, you must manually specify the link attributes with the speed-duplex and flowcontrol commands.
  • Page 359: Shutdown

    NTERFACE OMMANDS • To force flow control on or off (with the flowcontrol or no flowcontrol command), use the no negotiation command to disable auto-negotiation on the selected interface. • When using the negotiation command to enable auto-negotiation, the optimal settings will be determined by the capabilities command. To enable flow control under auto-negotiation, “flowcontrol”...
  • Page 360: Switchport Broadcast Packet-Rate

    OMMAND NTERFACE Command Usage This command allows you to disable a port due to abnormal behavior (e.g., excessive collisions), and then reenable it after the problem has been resolved. You may also want to disable a port for security reasons. Example The following example disables port 5.
  • Page 361: Clear Counters

    NTERFACE OMMANDS Example The following shows how to configure broadcast storm control at 600 packets per second: Console(config)#interface ethernet 1/5 Console(config-if)#switchport broadcast packet-rate 600 Console(config-if)# clear counters This command clears statistics on an interface. Syntax clear counters interface interface • ethernet unit/port - unit - Stack unit.
  • Page 362: Show Interfaces Status

    OMMAND NTERFACE show interfaces status This command displays the status for an interface. Syntax show interfaces status [interface] interface • ethernet unit/port - unit - Stack unit. (Range: 1-8) - port - Port number. (Range: 1-24/48) • port-channel channel-id (Range: 1-32) •...
  • Page 363: Show Interfaces Counters

    NTERFACE OMMANDS Example Console#show interfaces status ethernet 1/5 Information of Eth 1/5 Basic information: Port type: 1000T Mac address: 00-30-F1-D4-73-A5 Configuration: Name: Port admin: Speed-duplex: Auto Capabilities: 10half, 10full, 100half, 100full, 1000full Broadcast storm: Enabled Broadcast storm limit: 500 packets/second Flow control: Disabled LACP:...
  • Page 364 OMMAND NTERFACE Command Usage If no interface is specified, information on all interfaces is displayed. For a description of the items displayed by this command, see “Showing Port Statistics” on page 3-101. Example Console#show interfaces counters ethernet 1/7 Ethernet 1/7 Iftable stats: Octets input: 30658, Octets output: 196550 Unicast input: 6, Unicast output: 5...
  • Page 365: Show Interfaces Switchport

    NTERFACE OMMANDS show interfaces switchport This command displays the administrative and operational status of the specified interfaces. Syntax show interfaces switchport [interface] interface • ethernet unit/port - unit - Stack unit. (Range: 1-8) - port - Port number. (Range: 1-24/48) •...
  • Page 366: Table 4-39 Show Interfaces Switchport - Display Description

    OMMAND NTERFACE Table 4-39 show interfaces switchport - display description Field Description Broadcast threshold Shows if broadcast storm suppression is enabled or disabled; if enabled it also shows the threshold level (page 4-138). LACP status Shows if Link Aggregation Control Protocol has been enabled or disabled (page 4-151).
  • Page 367: Mirror Port Commands

    IRROR OMMANDS Mirror Port Commands This section describes how to mirror traffic from a source port to a target port. Table 4-40 Mirror Port Commands Command Function Mode Page port monitor Configures a mirror session 4-145 show port monitor Shows the configuration for a mirror port 4-146 port monitor This command configures a mirror session.
  • Page 368: Show Port Monitor

    OMMAND NTERFACE Command Usage • You can mirror traffic from any source port to a destination port for real-time analysis. You can then attach a logic analyzer or RMON probe to the destination port and study the traffic crossing the source port in a completely unobtrusive manner.
  • Page 369: Rate Limit Commands

    IMIT OMMANDS Example The following shows mirroring configured from port 6 to port 11. Console(config)#interface ethernet 1/11 Console(config-if)#port monitor ethernet 1/6 Console(config-if)#end Console#show port monitor Port Mirroring ------------------------------------- Destination port(listen port):Eth1/1 Source port(monitored port) :Eth1/6 Mode :RX/TX Console# Rate Limit Commands This function allows the network manager to control the maximum rate for traffic received on an interface.
  • Page 370 OMMAND NTERFACE • input – Input rate • rate – Percentage Default Setting 100 percent Command Mode Interface Configuration (Ethernet, Port Channel) Example Console(config)#interface ethernet 1/1 Console(config-if)#rate-limit input 600 Console(config-if)# 4-148...
  • Page 371: Link Aggregation Commands

    GGREGATION OMMANDS Link Aggregation Commands Ports can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network connection or to ensure fault recovery. Or you can use the Link Aggregation Control Protocol (LACP) to automatically negotiate a trunk link between this switch and another network device.
  • Page 372: Guidelines For Creating Trunks

    OMMAND NTERFACE Guidelines for Creating Trunks General Guidelines – • Finish configuring port trunks before you connect the corresponding network cables between switches to avoid creating a loop. • A trunk can have up to 32 ports. • The ports at both ends of a connection must be configured as trunk ports.
  • Page 373: Channel-Group

    GGREGATION OMMANDS channel-group This command adds a port to a trunk. Use the no form to remove a port from a trunk. Syntax channel-group channel-id no channel-group channel-id - Trunk index (Range: 1-32) Default Setting The current port will be added to this trunk. Command Mode Interface Configuration (Ethernet) Command Usage...
  • Page 374 OMMAND NTERFACE Command Mode Interface Configuration (Ethernet) Command Usage • The ports on both ends of an LACP trunk must be configured for full duplex, and auto-negotiation. • A trunk formed with another switch using LACP will automatically be assigned the next available port-channel ID. •...
  • Page 375: L Ink A Ggregation C Ommands

    GGREGATION OMMANDS Example The following shows LACP enabled on ports 10-12. Because LACP has also been enabled on the ports at the other end of the links, the show interfaces status port-channel 1 command shows that Trunk1 has been established. Console(config)#interface ethernet 1/10 Console(config-if)#lacp Console(config-if)#exit...
  • Page 376: Lacp System-Priority

    OMMAND NTERFACE lacp system-priority This command configures a port's LACP system priority. Use the no form to restore the default setting. Syntax lacp {actor | partner} system-priority priority no lacp {actor | partner} system-priority • actor - The local side an aggregate link. •...
  • Page 377: Lacp Admin-Key (Ethernet Interface)

    GGREGATION OMMANDS lacp admin-key (Ethernet Interface) This command configures a port's LACP administration key. Use the no form to restore the default setting. Syntax lacp {actor | partner} admin-key key [no] lacp {actor | partner} admin-key • actor - The local side an aggregate link. •...
  • Page 378: Lacp Admin-Key (Port Channel)

    OMMAND NTERFACE lacp admin-key (Port Channel) This command configures a port channel's LACP administration key string. Use the no form to restore the default setting. Syntax lacp admin-key key [no] lacp admin-key key - The port channel admin key is used to identify a specific link aggregation group (LAG) during local LACP setup on this switch.
  • Page 379: Lacp Port-Priority

    GGREGATION OMMANDS lacp port-priority This command configures LACP port priority. Use the no form to restore the default setting. Syntax lacp {actor | partner} port-priority priority no lacp {actor | partner} port-priority • actor - The local side an aggregate link. •...
  • Page 380: Show Lacp

    OMMAND NTERFACE show lacp This command displays LACP information. Syntax show lacp [port-channel] {counters | internal | neighbors | sys-id} • port-channel - Local identifier for a link aggregation group. (Range: 1-6) • counters - Statistics for LACP protocol messages. •...
  • Page 381: Table 4-43 Show Lacp Counters - Display Description

    GGREGATION OMMANDS Table 4-43 show lacp counters - display description Field Description LACPDUs Sent Number of valid LACPDUs transmitted from this channel group. LACPDUs Received Number of valid LACPDUs received on this channel group. Marker Sent Number of valid Marker PDUs transmitted from this channel group.
  • Page 382 OMMAND NTERFACE Table 4-44 show lacp internal - display description (Continued) Field Description LACPDUs Number of seconds before invalidating received LACPDU Internal information. LACP System LACP system priority assigned to this port channel. Priority LACP Port LACP port priority assigned to this interface within the Priority channel group.
  • Page 383: Table 4-45 Show Lacp Neighbors - Display Description

    GGREGATION OMMANDS Console#show lacp 1 neighbors Channel group 1 neighbors ------------------------------------------------------------------- Eth 1/1 ------------------------------------------------------------------- Partner Admin System ID: 32768, 00-00-00-00-00-00 Partner Oper System ID: 32768, 00-01-F4-78-AE-C0 Partner Admin Port Number: 2 Partner Oper Port Number: Port Admin Priority: 32768 Port Oper Priority: 32768 Admin Key: Oper Key:...
  • Page 384: Address Table Commands

    OMMAND NTERFACE Console#show lacp 1 sysid Channel group System Priority System MAC Address ------------------------------------------------------------------- 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 Table 4-46 show lacp sysid - display description Field Description Channel group...
  • Page 385: Mac-Address-Table Static

    DDRESS ABLE OMMANDS Table 4-47 Address Table Commands (Continued) Command Function Mode Page mac-address-table aging-time Sets the aging time of the address 4-166 table show mac-address-table Shows the aging time for the 4-167 aging-time address table mac-address-table static This command maps a static address to a destination port in a VLAN. Use the no form to remove an address.
  • Page 386: Clear Mac-Address-Table Dynamic

    OMMAND NTERFACE Command Usage The static address for a host device can be assigned to a specific port within a specific VLAN. Use this command to add static addresses to the MAC Address Table. Static addresses have the following characteristics: •...
  • Page 387: Show Mac-Address-Table

    DDRESS ABLE OMMANDS show mac-address-table This command shows classes of entries in the bridge-forwarding database. Syntax show mac-address-table [address mac-address [mask]] [interface interface] [vlan vlan-id] [sort {address | vlan | interface}] • mac-address - MAC address. • mask - Bits to match in the address. •...
  • Page 388: Mac-Address-Table Aging-Time

    OMMAND NTERFACE Example Console#show mac-address-table Interface Mac Address Vlan Type --------- ----------------- ---- ----------------- Eth 1/ 1 00-00-00-00-00-17 1 Learned Eth 1/ 1 00-E0-29-94-34-DE 1 Delete-on-reset Console# mac-address-table aging-time This command sets the aging time for entries in the address table. Use the no form to restore the default aging time.
  • Page 389: Show Mac-Address-Table Aging-Time

    PANNING OMMANDS show mac-address-table aging-time This command shows the aging time for entries in the address table. Default Setting None Command Mode Privileged Exec Example Console#show mac-address-table aging-time Aging time: 300 sec. Console# Spanning Tree Commands This section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and commands that configure STA for the selected interface.
  • Page 390: Spanning-Tree

    OMMAND NTERFACE Table 4-48 Spanning Tree Commands (Continued) Command Function Mode Page spanning-tree Disables spanning tree for an interface IC 4-175 spanning-disabled spanning-tree cost Configures the spanning tree path cost 4-175 of an interface spanning-tree Configures the spanning tree priority of 4-176 port-priority an interface...
  • Page 391: Spanning-Tree Mode

    PANNING OMMANDS network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down. Example This example shows how to enable the Spanning Tree Algorithm for the switch.
  • Page 392: Spanning-Tree Forward-Time

    OMMAND NTERFACE adjusting the type of protocol messages the RSTP node transmits, as described below: - STP Mode – If the switch receives an 802.1D BPDU after a port’s migration delay timer expires, the switch assumes that it is connected to an 802.1D bridge and starts using only 802.1D BPDUs.
  • Page 393: Spanning-Tree Hello-Time

    PANNING OMMANDS Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to the discarding state;...
  • Page 394: Spanning-Tree Max-Age

    OMMAND NTERFACE spanning-tree max-age This command configures the spanning tree bridge maximum age globally for this switch. Use the no form to restore the default. Syntax spanning-tree max-age seconds no spanning-tree max-age seconds - Time in seconds. (Range: 6-40 seconds) The minimum value is the higher of 6 or [2 x (hello-time + 1)].
  • Page 395: Spanning-Tree Priority

    PANNING OMMANDS spanning-tree priority This command configures the spanning tree priority globally for this switch. Use the no form to restore the default. Syntax spanning-tree priority priority no spanning-tree priority priority - Priority of the bridge. (Range: 0 - 65535) (Range –...
  • Page 396: Spanning-Tree Transmission-Limit

    OMMAND NTERFACE Default Setting Long method Command Mode Global Configuration Command Usage The path cost method is used to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media. Note that path cost (page 4-175) takes precedence over port priority (page 4-176).
  • Page 397: Spanning-Tree Spanning-Disabled

    PANNING OMMANDS spanning-tree spanning-disabled This command disables the spanning tree algorithm for the specified interface. Use the no form to reenable the spanning tree algorithm for the specified interface. Syntax [no] spanning-tree spanning-disabled Default Setting Enabled Command Mode Interface Configuration (Ethernet, Port Channel) Example This example disables the spanning tree algorithm for port 5.
  • Page 398: Spanning-Tree Port-Priority

    OMMAND NTERFACE Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000 • Fast Ethernet – half duplex: 200,000; full duplex: 100,000; trunk: 50,000 • Gigabit Ethernet – full duplex: 10,000; trunk: 5,000 Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage •...
  • Page 399: Spanning-Tree Edge-Port

    PANNING OMMANDS Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage • This command defines the priority for the use of a port in the Spanning Tree Algorithm. If the path cost for all ports on a switch are the same, the port with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree.
  • Page 400: Spanning-Tree Portfast

    OMMAND NTERFACE of frame flooding required to rebuild address tables during reconfiguration events, does not cause the spanning tree to initiate reconfiguration when the interface changes state, and also overcomes other STA-related timeout problems. However, remember that Edge Port should only be enabled for ports connected to an end-node device.
  • Page 401: Spanning-Tree Link-Type

    PANNING OMMANDS forwarding should only be enabled for ports connected to a LAN segment that is at the end of a bridged LAN or for an end-node device.) • This command is the same as spanning-tree edge-port, and is only included for backward compatibility with earlier products.
  • Page 402: Spanning-Tree Protocol-Migration

    OMMAND NTERFACE • When automatic detection is selected, the switch derives the link type from the duplex mode. A full-duplex interface is considered a point-to-point link, while a half-duplex interface is assumed to be on a shared link. • RSTP only works on point-to-point links between two bridges. If you designate a port as a shared link, RSTP is forbidden.
  • Page 403: Show Spanning-Tree

    PANNING OMMANDS show spanning-tree This command shows the configuration for the common spanning tree (CST). Syntax show spanning-tree [interface] • interface - ethernet unit/port - unit - Stack unit. (Range: 1-8) - port - Port number. (Range: 1-24/48) - port-channel channel-id (Range: 1-32) •...
  • Page 404 OMMAND NTERFACE Example Console#show spanning-tree Spanning-tree information --------------------------------------------------------------- Spanning tree mode: RSTP Spanning tree enabled/disabled: enabled Instance: VLANs configuration: 1-4093 Priority: 32768 Bridge Hello Time (sec.): Bridge Max Age (sec.): Bridge Forward Delay (sec.): Root Hello Time (sec.): Root Max Age (sec.): Root Forward Delay (sec.): Max hops: Remaining hops:...
  • Page 405: Vlan Commands

    VLAN C OMMANDS VLAN Commands A VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same physical segment. This section describes commands used to create VLAN groups, add port members, specify how VLAN tagging is used, and enable automatic VLAN registration for the selected interface.
  • Page 406: Vlan

    OMMAND NTERFACE Command Mode Global Configuration Command Usage • Use the VLAN database command mode to add, change, and delete VLANs. After finishing configuration changes, you can display the VLAN settings by entering the show vlan command. • Use the interface vlan command mode to define the port membership mode and add or remove ports from a VLAN.
  • Page 407: Configuring Vlan Interfaces

    VLAN C OMMANDS Default Setting By default only VLAN 1 exists and is active. Command Mode VLAN Database Configuration Command Usage • no vlan vlan-id deletes the VLAN. • no vlan vlan-id name removes the VLAN name. • no vlan vlan-id state returns the VLAN to the default state (i.e., active).
  • Page 408: Interface Vlan

    OMMAND NTERFACE Table 4-51 Configuring VLAN Interfaces Command Function Mode Page switchport native vlan Configures the PVID (native VLAN) of 4-190 an interface switchport allowed Configures the VLANs associated with 4-191 vlan an interface switchport gvrp Enables GVRP for an interface 4-205 switchport forbidden Configures forbidden VLANs for an...
  • Page 409: Switchport Mode

    VLAN C OMMANDS switchport mode This command configures the VLAN membership mode for a port. Use the no form to restore the default. Syntax switchport mode {trunk | hybrid} no switchport mode • trunk - Specifies a port as an end-point for a VLAN trunk. A trunk is a direct link between two switches, so the port transmits tagged frames that identify the source VLAN.
  • Page 410: Switchport Acceptable-Frame-Types

    OMMAND NTERFACE switchport acceptable-frame-types This command configures the acceptable frame types for a port. Use the no form to restore the default. Syntax switchport acceptable-frame-types {all | tagged} no switchport acceptable-frame-types • all - The port accepts all frames, tagged or untagged. •...
  • Page 411: Switchport Ingress-Filtering

    VLAN C OMMANDS switchport ingress-filtering This command enables ingress filtering for an interface. Note: Although the ingress filtering command is available, the switch has ingress filtering permanently set to enable. Therefore, trying to disable the filtering with the "no switchport ingress-filtering” command will produce this error message: “Note: Failed to ingress-filtering on ethernet interface !”...
  • Page 412: Switchport Native Vlan

    OMMAND NTERFACE switchport native vlan This command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore the default. Syntax switchport native vlan vlan-id no switchport native vlan vlan-id - Default VLAN ID for a port. (Range: 1-4094, no leading zeroes) Default Setting VLAN 1...
  • Page 413: Switchport Allowed Vlan

    VLAN C OMMANDS switchport allowed vlan This command configures VLAN groups on the selected interface. Use the no form to restore the default. Note: Each port can only have one untagged VLAN. If a second VLAN is defined for a port as untagged, the other VLAN that had untagged status will automatically be changed to tagged.
  • Page 414: Switchport Forbidden Vlan

    OMMAND NTERFACE • The interface can be added to a VLAN as an untagged member regardless of connected devices to this interface. The default setting is untagged VLAN 1. Note that each port can only have one untagged VLAN. If a second VLAN is defined for a port as untagged, the other VLAN that had untagged status will automatically be changed to tagged.
  • Page 415: Displaying Vlan Information

    VLAN C OMMANDS Command Usage • This command prevents a VLAN from being automatically added to the specified interface via GVRP. • If a VLAN has been added to the set of allowed VLANs for an interface, then you cannot add it to the set of forbidden VLANs for that same interface.
  • Page 416: Configuring Private Vlans

    OMMAND NTERFACE Default Setting Shows all VLANs. Command Mode Normal Exec, Privileged Exec Example The following example shows how to display information for VLAN 1. Console#show vlan id 1 VLAN ID: Type: Static Name: DefaultVlan Status: Active Ports/Port Channels: Eth1/ 1(S) Eth1/ 2(S) Eth1/ 3(S) Eth1/ 4(S) Eth1/ 5(S) Eth1/ 6(S) Eth1/ 7(S) Eth1/ 8(S) Eth1/ 9(S) Eth1/10(S) Eth1/11(S) Eth1/12(S) Eth1/13(S) Eth1/14(S) Eth1/15(S) Eth1/16(S) Eth1/17(S) Eth1/18(S) Eth1/19(S) Eth1/20(S)
  • Page 417 VLAN C OMMANDS This section describes commands used to configure private VLANs. 4-195...
  • Page 418: Table 4-53 Private Vlan Commands

    OMMAND NTERFACE Table 4-53 Private VLAN Commands Command Function Mode Page Edit Private VLAN Groups private-vlan Adds or deletes primary, community, 4-197 or isolated VLANs private-vlan association Associates a community VLAN with a 4-198 primary VLAN Configure Private VLAN Interfaces switchport mode Sets an interface to host mode or private-vlan...
  • Page 419: Private-Vlan

    VLAN C OMMANDS 6. Use the show vlan private-vlan command to verify your configuration settings. To configure isolated VLANs, follow these steps: 1. Use the private-vlan command to designate an isolated VLAN that will contain a single promiscuous port and one or more isolated ports.
  • Page 420: Private Vlan Association

    OMMAND NTERFACE Default Setting None Command Mode VLAN Configuration Command Usage • Private VLANs are used to restrict traffic to ports within the same community or isolated VLAN, and channel traffic passing outside the community through promiscuous ports. When using community VLANs, they must be mapped to an associated “primary”...
  • Page 421: Switchport Mode Private-Vlan

    VLAN C OMMANDS • secondary-vlan-id - ID of secondary (i.e, community) VLAN. (Range: 1-4094, no leading zeroes). Default Setting None Command Mode VLAN Configuration Command Usage Secondary VLANs provide security for group members. The associated primary VLAN provides a common interface for access to other network resources within the primary VLAN (e.g., servers configured with promiscuous ports) and to resources outside of the primary VLAN (via promiscuous...
  • Page 422: Switchport Private-Vlan Host-Association

    OMMAND NTERFACE Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage • To assign a promiscuous port to a primary VLAN, use the switchport private-vlan mapping command. To assign a host port to a community VLAN, use the private-vlan host association command.
  • Page 423: Switchport Private-Vlan Isolated

    VLAN C OMMANDS Command Usage All ports assigned to a secondary (i.e., community) VLAN can pass traffic between group members, but must communicate with resources outside of the group via promiscuous ports in the associated primary VLAN. Example Console(config)#interface ethernet 1/3 Console(config-if)#switchport private-vlan host-association 3 Console(config-if)# switchport private-vlan isolated...
  • Page 424: Switchport Private-Vlan Mapping

    OMMAND NTERFACE switchport private-vlan mapping Use this command to map an interface to a primary VLAN. Use the no form to remove this mapping. Syntax switchport private-vlan mapping primary-vlan-id no switchport private-vlan mapping primary-vlan-id - ID of primary VLAN. (Range: 1-4094, no leading zeroes).
  • Page 425: Gvrp And Bridge Extension Commands

    GVRP RIDGE XTENSION OMMANDS Secondary fields both display the isolated VLAN ID. • primary – Displays all primary VLANs, along with any assigned promiscuous interfaces. Default Setting None Command Mode Privileged Executive Example Console#show vlan private-vlan Primary Secondary Type Interfaces -------- ----------- ----------...
  • Page 426: Bridge-Ext Gvrp

    OMMAND NTERFACE Table 4-54 GVRP and Bridge Extension Commands Command Function Mode Page show gvrp configuration Displays GVRP configuration for 4-206 the selected interface garp timer Sets the GARP timer for the 4-206 selected function show garp timer Shows the GARP timer for the 4-208 selected function bridge-ext gvrp...
  • Page 427: Switchport Gvrp

    GVRP RIDGE XTENSION OMMANDS Command Mode Privileged Exec Command Usage See “Displaying Basic VLAN Information” on page 4 -133 and “Displaying Bridge Extension Capabilities” on page 4 -15 for a description of the displayed items. Example Console#show bridge-ext Max support VLAN numbers: Max support VLAN ID: 4093 Extended multicast filtering services: No...
  • Page 428: Show Gvrp Configuration

    OMMAND NTERFACE Example Console(config)#interface ethernet 1/1 Console(config-if)#switchport gvrp Console(config-if)# show gvrp configuration This command shows if GVRP is enabled. Syntax show gvrp configuration [interface] interface • ethernet unit/port - unit - Stack unit. (Range: 1-8) - port - Port number. (Range: 1-24/48) •...
  • Page 429 GVRP RIDGE XTENSION OMMANDS Ranges: join: 20-1000 centiseconds leave: 60-3000 centiseconds leaveall: 500-18000 centiseconds Default Setting • join: 20 centiseconds • leave: 60 centiseconds • leaveall: 1000 centiseconds Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage • Group Address Registration Protocol is used by GVRP and GMRP to register or deregister client attributes for client services within a bridged LAN.
  • Page 430: Show Garp Timer

    OMMAND NTERFACE show garp timer This command shows the GARP timers for the selected interface. Syntax show garp timer [interface] interface • ethernet unit/port - unit - Stack unit. (Range: 1-8) - port - Port number. (Range: 1-24/48) • port-channel channel-id (Range: 1-32) Default Setting Shows all GARP timers.
  • Page 431: Priority Commands (Layer 2)

    RIORITY OMMANDS Table 4-55 Priority Commands Command Groups Function Page Priority (Layer 2) Configures default priority for untagged frames, 4-209 sets queue weights, and maps class of service tags to hardware queues Priority (Layer 3 and 4) Maps IP DSCP tags to class of service values 4-216 Priority Commands (Layer 2) Table 4-56 Priority Commands (Layer 2)
  • Page 432: Switchport Priority Default

    OMMAND NTERFACE • strict - Services the egress queues in sequential order, transmitting all traffic in the higher priority queues before servicing lower priority queues. • wrr - Weighted Round-Robin shares bandwidth at the egress ports by using scheduling weights 1, 2, 4, 6, 8, 10, 12, 14 for queues 0 - 7 respectively.
  • Page 433 RIORITY OMMANDS Default Setting The priority is not set, and the default value for untagged frames received on the interface is zero. Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage • The precedence for priority mapping is IP DSCP, and default switchport priority.
  • Page 434: Queue Bandwidth

    OMMAND NTERFACE queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queues. Use the no form to restore the default weights. Syntax queue bandwidth weight1...weight4 no queue bandwidth weight1...weight4 - The ratio of weights for queues 0 - 3 determines the weights used by the WRR scheduler.
  • Page 435: Queue Cos-Map

    RIORITY OMMANDS queue cos-map This command assigns class of service (CoS) values to the priority queues (i.e., hardware output queues 0 - 7). Use the no form set the CoS map to the default values. Syntax queue cos-map queue_id [cos1 ... cosn] no queue cos-map •...
  • Page 436: Show Queue Mode

    OMMAND NTERFACE Example The following example shows how to change the CoS assignments to a one-to-one mapping. Console(config)#interface ethernet 1/1 Console(config-if)#queue cos-map 0 0 Console(config-if)#queue cos-map 1 1 Console(config-if)#queue cos-map 2 2 Console(config-if)#exit Console#show queue cos-map ethernet 1/1 Information of Eth 1/1 Traffic Class : 0 1 2 3 4 5 6 7 Priority Queue: 0 1 2 3 4 5 6 7 Console#...
  • Page 437: Show Queue Cos-Map

    RIORITY OMMANDS Command Mode Privileged Exec Example Console#show queue bandwidth Information of Eth 1/1 Queue ID Weight -------- ------ show queue cos-map This command shows the class of service priority map. Syntax show queue cos-map [interface] interface • ethernet unit/port - unit - Stack unit.
  • Page 438: Priority Commands (Layer 3 And 4)

    OMMAND NTERFACE Priority Commands (Layer 3 and 4) Table 4-58 Priority Commands (Layer 3 and 4) Command Function Mode Page map ip dscp Enables IP DSCP class of service 4-216 mapping map ip dscp Maps IP DSCP value to a class of service IC 4-217 map access-list ip Sets the CoS value and corresponding...
  • Page 439: Map Ip Dscp (Interface Configuration)

    RIORITY OMMANDS Example The following example shows how to enable IP DSCP mapping globally. Console(config)#map ip dscp Console(config)# map ip dscp (Interface Configuration) This command sets IP DSCP priority (i.e., Differentiated Services Code Point priority). Use the no form to restore the default table. Syntax map ip dscp dscp-value cos cos-value no map ip dscp...
  • Page 440: Show Map Ip Dscp

    OMMAND NTERFACE Command Usage • The precedence for priority mapping is IP DSCP, and default switchport priority. • DSCP priority values are mapped to default Class of Service values according to recommendations in the IEEE 802.1p standard, and then subsequently mapped to the eight hardware priority queues. •...
  • Page 441: Table 4-60 Multicast Filtering Commands

    ULTICAST ILTERING OMMANDS Example Console#show map ip dscp ethernet 1/1 DSCP mapping status: disabled Port DSCP COS --------- ---- --- Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Console# Related Commands map ip dscp (Global Configuration) (4 -216)
  • Page 442: Igmp Snooping Commands

    OMMAND NTERFACE IGMP Snooping Commands Table 4-61 IGMP Snooping Commands Command Function Mode Page ip igmp snooping Enables IGMP snooping 4-220 ip igmp snooping vlan Adds an interface as a member of a 4-221 static multicast group ip igmp snooping Configures the IGMP version for 4-222 version...
  • Page 443: Ip Igmp Snooping Vlan Static

    ULTICAST ILTERING OMMANDS ip igmp snooping vlan static This command adds a port to a multicast group. Use the no form to remove the port. Syntax [no] ip igmp snooping vlan vlan-id static ip-address interface • vlan-id - VLAN ID (Range: 1-4093) •...
  • Page 444: Ip Igmp Snooping Version

    OMMAND NTERFACE ip igmp snooping version This command configures the IGMP snooping version. Use the no form to restore the default. Syntax ip igmp snooping version {1 | 2} no ip igmp snooping version • 1 - IGMP Version 1 •...
  • Page 445: Show Mac-Address-Table Multicast

    ULTICAST ILTERING OMMANDS Command Usage See “Configuring IGMP Snooping and Query Parameters” on page 3-165 for a description of the displayed items. Example The following shows the current IGMP snooping configuration: Console#show ip igmp snooping Service status: Enabled Querier status: Disabled Query count: Query interval:...
  • Page 446: Igmp Query Commands (Layer 2)

    OMMAND NTERFACE Example The following shows the multicast entries learned through IGMP snooping for VLAN 1: Console#show mac-address-table multicast vlan 1 igmp-snooping VLAN M'cast IP addr. Member ports Type ---- --------------- ------------ ------- 224.1.2.3 Eth1/11 IGMP Console# IGMP Query Commands (Layer 2) Table 4-62 IGMP Query Commands (Layer 2) Command Function...
  • Page 447: Ip Igmp Snooping Query-Count

    ULTICAST ILTERING OMMANDS If enabled, the switch will serve as querier if elected. The querier is responsible for asking hosts if they want to receive multicast traffic. Example Console(config)#ip igmp snooping querier Console(config)# ip igmp snooping query-count This command configures the query count. Use the no form to restore the default.
  • Page 448: Ip Igmp Snooping Query-Interval

    OMMAND NTERFACE Related Commands ip igmp snooping query-max-response-time (4 -226) ip igmp snooping query-interval This command configures the query interval. Use the no form to restore the default. Syntax ip igmp snooping query-interval seconds no ip igmp snooping query-interval seconds - The frequency at which the switch sends IGMP host-query messages.
  • Page 449: Ip Igmp Snooping Router-Port-Expire-Time

    ULTICAST ILTERING OMMANDS Command Mode Global Configuration Command Usage • The switch must be using IGMPv2 for this command to take effect. • This command defines the time after a query, during which a response is expected from a multicast client. If a querier has sent a number of queries defined by the ip igmp snooping query-count, but a client has not responded, a countdown timer is started using an initial value set by this command.
  • Page 450: Static Multicast Routing Commands

    OMMAND NTERFACE Default Setting 300 seconds Command Mode Global Configuration Command Usage The switch must use IGMPv2 for this command to take effect. Example The following shows how to configure the default timeout to 300 seconds. Console(config)#ip igmp snooping router-port-expire-time 300 Console(config)# Related Commands ip igmp snooping version (4 -222)
  • Page 451: Show Ip Igmp Snooping Mrouter

    ULTICAST ILTERING OMMANDS - port - Port number. (Range: 1-24/48) - port-channel channel-id (Range: 1-32) Default Setting No static multicast router ports are configured. Command Mode Global Configuration Command Usage Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier. Therefore, if the IGMP querier is a known multicast router/switch connected over the network to an interface (port or trunk) on your router, you can manually configure that interface to join all the current multicast groups.
  • Page 452: Ip Interface Commands

    OMMAND NTERFACE Example The following shows that port 11 in VLAN 1 is attached to a multicast router. Console#show ip igmp snooping mrouter vlan 1 VLAN M'cast Router Ports Type ---- ------------------- ------- Eth 1/11 Static Eth 1/12 Dynamic Console# IP Interface Commands An IP addresses may be used for management access to the switch over your network.
  • Page 453: Ip Address

    IP I NTERFACE OMMANDS ip address This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the default IP address. Syntax ip address {ip-address netmask | bootp | dhcp} no ip address •...
  • Page 454: Ip Dhcp Restart

    OMMAND NTERFACE access to the switch. If you assign an IP address to any other VLAN, the new IP address overrides the original IP address and this becomes the new management VLAN. Example In the following example, the device is assigned an address in VLAN 1. Console(config)#interface vlan 1 Console(config-if)#ip address 192.168.1.5 255.255.255.0 Console(config-if)#...
  • Page 455: Ip Default-Gateway

    IP I NTERFACE OMMANDS Example In the following example, the device is reassigned the same address. Console(config)#interface vlan 1 Console(config-if)#ip address dhcp Console(config-if)#exit Console#ip dhcp restart Console#show ip interface IP address and netmask: 192.168.1.54 255.255.255.0 on VLAN 1, and address mode: Dhcp. Console# Related Commands ip address (4 -231)
  • Page 456: Show Ip Interface

    OMMAND NTERFACE Related Commands show ip redirects (4 -234) show ip interface This command displays the settings of an IP interface. Default Setting All interfaces Command Mode Privileged Exec Example Console#show ip interface IP address and netmask: 192.168.1.54 255.255.255.0 on VLAN 1, and address mode: User specified.
  • Page 457: Ping

    IP I NTERFACE OMMANDS ping This command sends ICMP echo request packets to another node on the network. Syntax ping host [size size] [count count] • host - IP address or IP alias of the host. • size - Number of bytes in a packet. (Range: 32-512, default: 32) The actual packet size will be eight bytes larger than the size specified because the switch adds header information.
  • Page 458 OMMAND NTERFACE Example Console#ping 10.1.0.9 Type ESC to abort. PING to 10.1.0.9, by 5 32-byte payload ICMP packets, timeout is 5 seconds response time: 10 ms response time: 10 ms response time: 10 ms response time: 10 ms response time: 0 ms Ping statistics for 10.1.0.9: 5 packets transmitted, 5 packets received (100%), 0 packets lost (0%) Approximate round trip times:...
  • Page 459 PPENDIX OFTWARE PECIFICATIONS Software Features Authentication Local, RADIUS, TACACS, Port (802.1X), HTTPS, SSH, Port Security Access Control Lists DHCP Client Port Configuration 100BASE-TX: 10/100 Mbps, half/full duplex 1000BASE-T: 10/100 Mbps at half/full duplex, 1000 Mbps at full duplex Flow Control Full Duplex: IEEE 802.3x Half Duplex: Back pressure Broadcast Storm Control...
  • Page 460: Software Specifications

    OFTWARE PECIFICATIONS Spanning Tree Algorithm Spanning Tree Protocol (STP, IEEE 802.1D) Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) VLAN Support Up to 255 groups; port-based, protocol-based, or tagged (802.1Q), GVRP for automatic VLAN learning, private VLANs Class of Service Supports eight levels of priority and Weighted Round Robin Queueing (which can be configured by VLAN tag or port), Layer 3/4 priority mapping: IP DSCP Multicast Filtering...
  • Page 461: Standards

    OFTWARE PECIFICATIONS RMON Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event) Standards IEEE 802.1D Spanning Tree Protocol and traffic priorities IEEE 802.1p Priority tags IEEE 802.1Q VLAN IEEE 802.1w Rapid Spanning Tree Protocol IEEE 802.1X Port Authentication IEEE 802.3 Ethernet, IEEE 802.3u Fast Ethernet IEEE 802.3x Full-duplex flow control (ISO/IEC 8802-3) IEEE 802.3z Gigabit Ethernet,...
  • Page 462 OFTWARE PECIFICATIONS Extended Bridge MIB (RFC 2674) Extensible SNMP Agents MIB (RFC 2742) Forwarding Table MIB (RFC 2096) IGMP MIB (RFC 2933) Interface Group MIB (RFC 2233) Interfaces Evolution MIB (RFC 2863) IP Multicasting related MIBs MAU MIB (RFC 2668) MIB II (RFC 1213) Port Access Entity MIB (IEEE 802.1X) Port Access Entity Equipment MIB...
  • Page 463: Troubleshooting

    PPENDIX ROUBLESHOOTING Problems Accessing the Management Interface Table B-1 Troubleshooting Chart Symptom Action Cannot connect using • Be sure the switch is powered up. Telnet, web browser, • Check network cabling between the management station or SNMP software and the switch. •...
  • Page 464 (9600, 19200, 38400, program via a serial 57600, 115200 bps). port connection • Check that the null-modem serial cable conforms to the pin-out connections provided in the Installation Guide. Forgot or lost the • Contact SMC Technical Support for help. password...
  • Page 465: Using System Logs

    SING YSTEM Using System Logs If a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caused by the switch. If the problem appears to be caused by the switch, follow these steps: 1.
  • Page 466 ROUBLESHOOTING...
  • Page 467: Glossary

    LOSSARY Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for certain IP or MAC (i.e., Layer 2) information. Boot Protocol (BOOTP) BOOTP used to provide bootup information for network devices, including IP address information, the address of the TFTP server that contains the devices system files, and the name of the boot file.
  • Page 468 LOSSARY Dynamic Host Control Protocol (DHCP) Provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional configuration options. Extensible Authentication Protocol over LAN (EAPOL) EAPOL is a client authentication protocol used by this switch to verify the network access rights for any device that is plugged into the switch.
  • Page 469 LOSSARY IEEE 802.1D Specifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol. IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to different virtual LANs, and defines a standard way for VLANs to communicate across switched networks.
  • Page 470: Ip Multicast Filtering

    LOSSARY IGMP Snooping Listening to IGMP Query and IGMP Report packets transferred between IP Multicast Routers and IP Multicast host groups to identify IP Multicast group members. IGMP Query On each subnetwork, one IGMP-capable device will act as the querier — that is, the device that asks all hosts to report on the IP multicast groups they wish to join or to which they already belong.
  • Page 471: Multicast Switching

    LOSSARY Link Aggregation Control Protocol (LACP) Allows ports to automatically negotiate a trunked link with LACP-configured ports on another device. Management Information Base (MIB) An acronym for Management Information Base. It is a set of database objects that contains information about a specific device. MD5 Message-Digest Algorithm An algorithm that is used to create digital signatures.
  • Page 472: Port Mirroring

    LOSSARY Port Mirroring A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe. This allows data on the target port to be studied unobstructively. Port Trunk Defines a network link aggregation and trunking method which specifies how to create a single high-speed logical link that combines several lower-speed physical links.
  • Page 473 LOSSARY Simple Mail Transfer Protocol (SMTP) A standard host-to-host mail transport protocol that operates over TCP, port 25. Simple Network Management Protocol (SNMP) The application protocol in the Internet suite of protocols which offers network management services. Simple Network Time Protocol (SNTP) allows a device to set its internal clock based on periodic updates SNTP from a Network Time Protocol (NTP) server.
  • Page 474 LOSSARY Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads. User Datagram Protocol (UDP) provides a datagram mode for packet-switched communications. It uses IP as the underlying transport mechanism to provide access to IP-like services. UDP packets are delivered just like IP packets – connection-less datagrams that may be discarded before reaching their targets.
  • Page 475: Index

    NDEX Numerics 802.1x, port authentication 4-103 default gateway, configuration 3-18 4-233 default priority, ingress port 3-153 4-210 default settings, system 1-7 DHCP 3-19 4-231 acceptable frame type 3-142 4-188 client 3-17 Access Control List See ACL dynamic configuration 2-7 Differentiated Code Point Service See Extended IP 3-69 4-112 4-114...
  • Page 476 NDEX logon authentication 3-42 4-90 RADIUS client 3-44 4-93 hardware version, displaying 3-13 4-80 RADIUS server 3-44 4-93 HTTPS 3-48 4-40 TACACS+ client 3-44 4-98 HTTPS, secure server 3-48 4-40 TACACS+ server 3-44 4-98 logon authentication, sequence 3-45 4-91 4-92 IEEE 802.1D 3-112 4-169 IEEE 802.1w 3-112...
  • Page 477 NDEX ports software autonegotiation 3-80 4-134 displaying version 3-13 4-80 broadcast storm threshold 3-97 4-138 downloading 3-22 4-83 capabilities 3-80 4-135 Spanning Tree Protocol See STA duplex mode 3-80 4-133 specifications, software A-1 flow control 3-80 4-136 SSH, configuring 3-50 4-48 4-49 speed 3-80...
  • Page 478 NDEX trunk configuration 3-82 4-149 LACP 3-85 4-151 static 3-83 4-151 upgrading software 3-22 4-83 user password 3-42 4-34 4-35 –??, – VLANs 3-129 4-183 4-198 adding static members 3-138 3-140 4-191 creating 3-136 4-184 description 3-129 displaying basic information 3-133 4-204 displaying port members 3-134 4-193...
  • Page 480 Fax (65) 238 6466 Korea: 82-2-553-0860 Fax 82-2-553-7202 Japan: 81-45-224-2332 Fax 81-45-224-2331 Australia: 61-2-8875-7887 Fax 61-2-8875-7777 India: 91-22-8204437 Fax 91-22-8204443 If you are looking for further contact information, please visit www.smc.com. 38 Tesla Model Numbers: SMC8748L2 Irvine, CA 92618 E112005-R01 Phone: (949) 679-8000...

This manual is also suitable for:

Tigerswitch 1000Smc8748l2

Table of Contents