NetApp assumes no responsibility or liability arising from the use of products described herein, except as expressly agreed to in writing by NetApp. The use or purchase of this product does not convey a license under any patent rights, trademark rights, or any other intellectual property rights of NetApp.
Page 3
SureStream are trademarks of RealNetworks, Inc. in the U.S.A. and/or other countries. All other brands or products are trademarks or registered trademarks of their respective holders and should be treated as such. NetApp, Inc. is a licensee of the CompactFlash and CF Logo trademarks. NetApp, Inc. NetCache is certified RealSystem compatible.
About This Document Purpose ® This guide provides examples of how to use the NetApp CN1610 cluster network switch in a typical network. This document describes the switch features and includes information about using the command-line interface (CLI) to configure them.
Switch Administration About this chapter This chapter provides information about administering the switch, including using the command-line interface (CLI), configuring basic switch settings, and managing the system configuration files. Topics in this This chapter includes the following topics: chapter ◆ “CLI quick start”...
CLI quick start About this section This section provides a brief introduction to using the CLI. Note For detailed information about CLI commands, see the CN1610 Network Switch CLI Command Reference. Connecting to the To begin using the CLI, follow these steps: 1.
In Interface Config mode, you can enter commands to configure the specified interface. Note See the CN1610 Network Switch CLI Command Reference for a list of all command modes and instructions on entering them. Using the no form keyword is a specific form of an existing command and does not represent of a command a new or distinct command.
Switch management interfaces Overview The switch can be managed by using a command-line interface (CLI) or SNMP. You can use any of the following methods to access the CLI: ◆ A serial connection through the console port using a terminal emulator. ◆...
Page 15
Displays IP and other configuration information for show serviceport the service port. For more information on the BOOTP/DHCP commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following commands change the protocol for the network interface from the...
Page 16
The following commands change the network protocol for the service port to and configures static IP information for the port: none (CN1610) # serviceport protocol none (CN1610) # serviceport ip 10.17.21.4 255.255.255.0 10.17.21.1 Switch management interfaces...
For SNMP, the switch supports the IPv6 MIB, the ICMPv6 MIB, and private MIB extensions. The CN1610 switch supports router advertisement as an integral part of IPv6. Numerous options are available, including stateless/stateful address configuration, router and address lifetimes, and neighbor discovery timer control.
Page 18
Displays NDP cache information for the network show network ndp port. For more information on the IPv6 management commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following example enables IPv6 management and configures the network...
Command line logging is disabled by default. Configuration The following example enables command logging: example (CN1610) # config (CN1610) (Config)# logging cli-command The following is an example CLI log message for the user admin <5> JAN 01 00:01:35 0.0.0.0-1 UNKN[54373024]: cmd_logger_api.c(93) 20 % CLI:<connectionID>:<userID>:show vlan-assist-mac-learn all If this feature is enabled, commands are logged immediately after the user is authenticated.
File management Overview The switch FASTPATH software has a user-accessible file system to manage the various files needed for its operation. The file system contains the application software files and a configuration file that is restored each time the switch boots. This section includes the following topics: ◆...
File management Configuration files and scripts Overview Switch operation is controlled by a configuration file, which stores the value of the parameters and settings to be applied to the device as a whole, and to each port in particular. The configuration file, which is loaded from flash into RAM when the switch boots, directs and controls the function of various features.
Page 22
◆ Backup configuration file: The system supports an additional backup file in flash memory, which enables keeping a copy of the startup or running configuration file either for fault-protection purposes or as a way to maintain a previous version of the file. ◆...
Page 23
Displays the contents of a specified script file. script show For more information on configuration file commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following examples show how to copy configuration files among the various examples file types, upload files to a server, and download and apply scripts.
Page 24
File copy: The following command copies the startup configuration file in NVRAM to the backup configuration file: (CN1610) #copy nvram:startup-config nvram:backup-config File uploads: The following command copies the startup configuration file in NVRAM to a location on a TFTP server: (CN1610) #copy nvram:startup-config tftp://10.27.24.49/configs/oct-2010/abc.scr...
Page 25
(CN1610) #show running-config running-config.scr Config script created successfully. The following command uploads a configuration script to a TFTP server: (CN1610) #copy nvram:script abc.scr tftp://10.27.64.141/abc.scr Mode........... TFTP Set TFTP Server IP......10.27.64.141 TFTP Path......../ TFTP Filename........abc.scr Data Type........Config Script Source Filename........
Page 26
(CN1610) #script validate abc.scr ip address dhcp username "admin" password 16d7a4fca7442dda3ad93c9a726597e4 level 15 encrypted exit Configuration script 'abc.scr' validated. (CN1610) #script apply abc.scr Are you sure you want to apply the configuration script? (y/n)y ip address dhcp username "admin" password 16d7a4fca7442dda3ad93c9a726597e4 level 15 encrypted exit Configuration script 'abc.scr' applied.
File management File uploads and downloads Feature overview The CN1610 switch supports uploading and downloading the following file types to the switch: ◆ Code ◆ Configuration ◆ Text configuration ◆ SSH keys and certificates ◆ CLI banner file The following protocols can be used for uploads or downloads: ◆...
Page 28
SCP and SFTP The CN1610 switch supports Secure Copy (SCP) and Secure FTP (SFTP) as secure methods of file transfer. XMODEM The CN1610 switch supports using the XMODEM protocol to transfer operational code, configuration files, and logs over the serial port. The switch supports both the XMODEM standard mode and the XMODEM-1K mode.
Dual image support Feature overview Up to two software images and two configuration files can be saved on the flash file system. This allows the user to upgrade the system, while leaving the possibility of reverting to a previous software version or configuration file. Images: One image is designated to be the active image, and the other image is designated to be the backup image.
Page 31
For more information on the commands to configure the dual image feature, see the CN1610 Network Switch CLI Command Reference. Configuration The following commands add a description to the backup image, and configure it example to be the active image the next time the switch boots:...
SNMP Feature overview You can use SNMP to configure the switch, view settings and statistics, and upload or download code or configuration images. The SNMP agent on the switch supports an incoming get-bulk operation to reduce network management traffic when retrieving a sequence of Management Information Base (MIB) variables and an elaborate set of error codes for improved reporting to the network control station.
Page 33
Command Description Displays the supported MIBs. show sysinfo For more information on SNMP commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following example configures an SNMP community named . It admingroup1 example specifies the IP address and masks of the community, the read/write access level,...
User management Feature overview You can control access to the switch management interface by creating user login names and configuring authentication methods. Users can be configured locally or on a remote authentication server (RAS), and can be assigned read-only and read-write access privileges. This enables you to configure some users to be able to monitor switch status without being able to modify the configuration.
Page 35
Displays the local user status with respect to user show users accounts account lockout and password aging. For more information on the user management commands, see the CN1610 Network Switch CLI Command Reference. Configuration Authentication: The following example configures the default types of...
Logs and Syslog Feature overview The CN1610 switch FASTPATH software components generate messages that you can use to understand the state of the system, and to diagnose issues that arise during operation. Messages are generated in response to events, faults, or errors occurring on the platform, and by configuration changes or other occurrences.
By default, only messages that are of severity ALERT or EMERGENCY are stored in the persistent log. Because these messages are of high value, persistent messages are logged immediately into the persistent log. The administrator has the option of configuring the persistent log to store lower severity messages as well.
Page 38
Emergency (0): system is unusable. Alert (1): action must be taken immediately. Critical (2): critical conditions. Error (3): error conditions. Warning (4): warning conditions. Notice(5): normal but significant conditions. Informational(6): informational messages. Debug(7): debug-level messages. ◆ Timestamp—Each message is time-stamped with the local time or, if the platform is not synchronized, the elapsed time since last reboot.
Syslog The CN1610 switch supports using the syslog protocol to forward messages over configuration UDP to one or more collectors or relays. Messages can be forwarded to one or more collectors or relays based on configuration of severity, component ID, or both.
NTP or SNTP server, NTP and SNTP clients are indistinguishable; to an NTP or SNTP client, NTP and SNTP servers are indistinguishable. Furthermore, any version of NTP is compatible with any other version of NTP1. The CN1610 switch software implements only the client side of SNTP.
Page 42
Displays SNTP client settings. show sntp client Displays SNTP server settings. show sntp server For more information on the SNTP commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following commands configure two SNTP unicast servers, with one having a...
DNS server returns the response to the client rather than referring the client to another server for name resolution. Configuration The CN1610 switch supports IPv4 DNS servers. The server address can be options configured statically (by you) or learned dynamically by the DHCP client.
Page 44
For more information on the DNS commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following commands configure a default domain name to complete lookup example requests with unspecified domain names.
Environmental status Feature overview You can monitor the physical status of the switch by observing the status of the fans, power supply status, and temperature. The following status information can be obtained on a unit, or on all units in a stack: Name Description...
Page 46
CLI show You can use the following command in Privileged EXEC mode to view show commands information about the environmental status feature: Command Description Displays environmental status information. show environment Environmental status...
Network Virtual Terminal (NVT). Configuration The following example connects from this switch to a remote switch and the example remote switch’s CLI to view data: (CN1610) #telnet 192.168.77.151 Trying 192.168.77.151... (CN1610) # User:admin Password: (switch) >enable...
Ports and LAGs About this chapter This chapter describes how to configure and view status information about system ports and link aggregation groups (LAGs). Topics in this This chapter includes the following topics: chapter ◆ “Port configuration” on page 42 ◆...
Port configuration Feature overview Each physical port can be independently configured. This configuration affects how the port operates at the physical level (for example, its speed and duplex operation), and at higher levels (for example, VLAN membership or IP address). You can associate a description to each port to more easily identify how the port is used.
Page 51
The factory default is enabled. LACP Mode LACP is enabled or disabled on this port. For more information on the port configuration commands, see the CN1610 Network Switch CLI Command Reference. CLI show You can use the following...
SFP ports Feature overview The CN1610 switch supports 16 SFP and SFP+ ports. If an SFP+ module is plugged in, then the default speed is 10 Gbps and autonegotiation is disabled. Supported SFP The only SFP module supported for the CN1610 cluster network switch is the modules NetApp 10Gb SFP+ optical module (X6589-R6/part number 332-00279R6).
LAG. Similarly, when links are added to a LAG, the conversations may be shifted to the new link. Static and dynamic The CN1610 switch also supports static LAGs. When a port is added to a LAG as LAGs a static member, it neither transmits nor receives LACPDUs. Configured members are added to the LAG (active participation) immediately if the LAG is configured to be static.
Page 55
particular TCP session. The resolution of this problem is to select the correct physical port within the port channel for transmitting the packet to keep original packets order. The hashing algorithm is configurable for each LAG. The administrator can choose from hash algorithms utilizing the following attributes of a packet to determine the outgoing port: ◆...
Page 56
LACP exchanges. Displays configuration information for ports with show lacp partner respect to their role as partners in LACP exchanges. For more information on the LAG commands, see the CN1610 Network Switch CLI Command Reference. Link aggregation...
Switching About this chapter This chapter describes how to configure and view status information for Layer 2 switching protocols. Topics in this This chapter includes the following topics: chapter ◆ “Layer 2 forwarding database” on page 52 ◆ “Layer 2 multicast forwarding database”...
This association can occur from several different mechanisms, but generally is based on the VLAN tag in the packet or the PVID of the port. The CN1610 switch uses the VLAN and the source MAC address to look up the L2FDB. If the address is not known, and the address can be learned, then an entry is added to the database that indicates which port is associated with this MAC address.
Page 61
Command Description Displays all entries in the Layer 2 forwarding show mac-addr-table interface database for a specified interface. Displays the number of entries in the Layer 2 show mac-addr-table count forwarding database. Displays the time, in seconds, after which a Layer 2 show forwardingdb agetime forwarding database entry ages out.
(CN1610) (Config)#macfilter 5C:26:0A:57:20:64 2 (CN1610) (Config)#interface 0/5 (CN1610) (Interface 0/5)#macfilter addsrc 5C-26-0A-57-20-64 2 The following example creates an MFDB entry that associates a multicast MAC address to VLAN 3. Then, it adds this filter to interface 0/5 as a destination filter, so that a multicast packet destined to this multicast address on VLAN 100 is allowed only if it is received on interface 0/5.
Page 63
For more information on the Layer 2 MFDB commands, see the CN1610 Network Switch CLI Command Reference. Chapter 4: Switching...
The CN1610 switch supports both the transmit and receive functions to support device discovery. Devices are not required to implement both functions; you can enable or disable each function separately on a per-port basis.
Page 65
Unit). Inclusion of the optional TLVs in the management set is configurable by the administrator; by default they are not included. The transmit function will extract the local system information and build the LLDPDU based on the specified configuration for the port. In addition, the administrator has control over timing parameters affecting the TTL of LLDPDUs and the interval in which they are transmitted.
Page 66
Enables/disables transmission of Enabled/Disabled Disabled Transmit Enable management address instance. For more information on the LLDP configuration commands, see the CN1610 Network Switch CLI Command Reference. CLI show You can use the following commands in Privileged EXEC mode to view...
Page 67
It also configures the interface to send LLDP notifications when there are changes in topology. (CN1610) #configure (CN1610) (Config)#lldp notification-interval 600 (CN1610) (Config)#lldp timers interval 300 hold 5 reinit 10 (CN1610) (Configure)#interface 0/5 (CN1610) (Interface 0/5)#lldp transmit (CN1610) (Interface 0/5)#lldp transmit-tlv...
Industry Standard Discovery Protocol Feature overview Industry Standard Discovery Protocol (ISDP) is a proprietary Layer 2 network protocol which interoperates with Cisco network equipment and is used to share information between neighboring devices (routers, bridges, access servers, and switches). Through the operation of ISDP, the switch can discover information about its neighbors, such as: ◆...
Page 69
The IP address associated with the routing interface, if configured and if routing is supported in the package ◆ Any loopback addresses, if configured and if routing is supported in the package. The CN1610 switch interprets IPv4 addresses only. Other types of addresses are ignored. Chapter 4: Switching...
Page 70
This field typically contains either the host name or the serial number of the device. On the CN1610 switch, this field is populated with either the device's serial number or host name. The host name is always used as the device ID if the host name is configured to a nondefault value.
Page 71
(CN1610) #configure (CN1610) (Config)#isdp timer 120 (CN1610) (Config)#isdp holdtime 60 (CN1610) (Config)#isdp advertise-v2 (CN1610) (Config)#isdp run (CN1610) (Config)#interface 0/5 (CN1610) (Interface 0/5)#isdp enable For more information on the ISDP commands, see the CN1610 Network Switch CLI Command Reference. Chapter 4: Switching...
Enabling switches to snoop IGMP packets is a creative way to solve this problem. The CN1610 switch uses the information in the IGMP packets as they are being forwarded throughout the network to determine which segments should receive packets directed to the group address.
Page 73
IP address among the routers. Defaults IGMP is disabled by default. For more information on the IGMP snooping default values and commands, see the CN1610 Network Switch CLI Command Reference. CLI show You can use the following commands in Privileged EXEC mode to view...
The following example sets the MTU for interface 0/5 to the largest supported examples size: (CN1610) #configure (CN1610) (Configure)#interface 0/5 (CN1610) (Interface 0/5)#mtu 9216 For more information on the command, see the CN1610 Network Switch CLI Command Reference. Chapter 4: Switching...
Type Determines what traffic is mirrored. RX, TX, or Both Both Information on these parameters and other port mirroring commands can be found in the Port Mirroring section of the CN1610 Network Switch CLI Command Reference. Port mirroring...
Flow-based mirroring Feature overview Flow-based mirroring enables you to copy certain types of traffic to a single destination port. This provides flexibility in mirroring traffic, because instead of mirroring all ingress or egress traffic on a port, the switch can mirror a subset of that traffic.
Page 79
(CN1610) (Config-policy-map)#class class_igmp (CN1610) (Config-policy-classmap)#mirror 0/7 (CN1610) (Config-policy-classmap)#exit (CN1610) (config)# (CN1610) (config)#interface 0/4 (CN1610) (Interface 0/4)#service-policy in class_igmp (CN1610) (Interface 0/4)#exit (CN1610) (config)# For more information on the DiffServ commands, see the CN1610 Network Switch CLI Command Reference. Chapter 4: Switching...
Storm control Feature overview The storm control feature provides the ability to detect a traffic storm (broadcast, multicast, or unknown unicast traffic received at a very high rate) and prevent these packets from flooding other parts of the network. When storm control is enabled, broadcast, multicast, or unknown unicast traffic begins to drop when that type of traffic exceeds the configured rate threshold for a particular port.
Page 81
Maximum percent of traffic. 0%–100% 5 percent For more information on the parameters and defaults for the storm control commands, see the CN1610 Network Switch CLI Command Reference. CLI show You can use the following command in Privileged EXEC mode to view...
Flow control Feature overview IEEE 802.3x flow control is specified in IEEE 802.3x. Flow control allows traffic from one device to be throttled for a specified period of time. It is defined for devices that are directly connected. To inhibit transmission of data frames from another device on the LAN, a device transmits a PAUSE frame, as defined in the specification.
Multiple Spanning Tree Protocol About this chapter This chapter describes the switch software support for IEEE 802.1s, Multiple Spanning Tree Protocol (MSTP). Topics in this This chapter discusses the following topics: chapter ◆ “MSTP overview” on page 78 ◆ “MSTP functional description”...
STP functionality is enabled on all ports by default. ◆ The common and internal spanning tree (CIST) instance (MSTID = 0) is the only default MSTP instance. For additional default values, see the CN1610 Network Switch CLI Command Reference. MSTP overview...
MSTP functional description Overview The MSTP algorithm and protocol provides simple and full connectivity for frames assigned to any given VLAN throughout a bridged LAN that comprises arbitrarily interconnected networking devices, each operating MSTP, STP, or RSTP. MSTP allows frames assigned to different VLANs to follow separate paths, each based on an independent multiple spanning tree instance (MSTI), within MST regions composed of LANs and MSTP bridges.
Page 88
The forwarding of BPDUs can be administratively controlled using the following features: ◆ BPDU Guard—When BPDU guard is enabled globally on the switch and a BPDU packet arrives on a port that has been enabled as an edge port, the port is disabled;...
Page 89
VIDs to spanning trees. This is achieved by: 1. Ensuring that the allocation of VIDs to FIDs is unambiguous. The CN1610 switch implements this with a fixed VID-to-FID assignment. Every VID is assigned to one and only one FID, as illustrated in the...
Page 90
2. Ensuring that each FID supported by the bridge is allocated to exactly one spanning tree instance. The CN1610 switch implements this by means of the FID-to-MSTI Allocation Table. The following figure shows an example configuration: Example FID to MSTI Allocation...
Page 91
Example VID to MSTI Allocation VID 1 CIST 0 VID 3 VID 2 MSTI 1 VID 4 VID .. MSTI 2 VID n This allocation ensures that every VLAN is assigned to one and only one MSTI. The CIST is also an instance of spanning tree with a MSTID of 0. An instance can have no VIDs allocated to it, but every VLAN must be allocated to one of the other instances of spanning tree.
Page 92
Control packet The following list defines how MST control packets are transmitted: behavior ◆ BPDU—Always transmitted as untagged. The port receives and transmits BPDUs in all the three MSTP states (discarding, learning, and forwarding). If MSTP is disabled for the device (manual forwarding on all ports), BPDUs received are switched.
MSTP operation in the network Example small In the following figure of a small, 802.1d bridged network, STP is necessary to 802.1d bridged create an environment with full connectivity and without loops: network Single STP instance Assume that bridge BrA is elected to be the root bridge, and ports Pt1 on bridge topology BrB and BrC are calculated to be the root ports for those bridges, Port Pt2 on bridge BrB and BrC would be placed into blocking state.
Page 94
For VLAN 10, this single STP topology presents no limitations or inefficiencies. On the other hand, VLAN 20's traffic pattern is inefficient. All frames from bridge BrB will have to traverse a path through bridge BrA before arriving at bridge BrC. If the ports Pt2 on bridge BrB and BrC could be used, these inefficiencies could be eliminated.
Page 95
In order for MSTP to correctly establish the different MSTIs as shown in the preceding figure, some additional changes are required. For example, the configuration would have to be the same on each bridge. That means that bridge BrB would have to add VLAN 10 to its list of supported VLANs (shown in the figure with an asterisk).
Page 96
Multiple MSTP To further illustrate the full connectivity in an MSTP active topology, assume that regions the following rules apply: 1. Each bridge or LAN is in only one region. 2. Every frame is associated with only one VID. 3. Frames are allocated either to the IST or MSTI within any given region. 4.
Page 97
Interactions In the following figure, a third region has been added. Even though this new between multiple region consists of only one bridge, and the MST configuration identifier matches regions the bridges in region 1, it will still be isolated into a region by itself. This is because the only connection between region 1 and region 3 is through a different region.
Page 98
The path of a frame for VLAN 20 can be traced through the MST active topology. A frame originating on an end station on bridge BrA in region 1 will traverse the MSTI2 active topology, since its VID has been allocated to that instance.
MST instance and interface configuration parameters. Displays spanning tree settings and parameters for show spanning-tree summary the switch. For more information on the MSTP commands, see the CN1610 Network Switch CLI Command Reference. Chapter 5: Multiple Spanning Tree Protocol...
(CN1610) (Config)#spanning-tree mst instance 20 (CN1610) (Config)#spanning-tree mst vlan 10 10 (CN1610) (Config)#spanning tree mst vlan 20 20 The following commands change the name so that all the bridges that want to be part of the same region can form the region, and make the MST ID 10 bridge the root bridge by lowering the priority.
VLANs About this chapter This chapter describes how to create and manage VLANs on the switch. Topics in this This chapter includes the following topics: chapter ◆ “Basic VLAN configuration” on page 94 ◆ “Protocol-based VLANs” on page 98 ◆ “MAC-based VLANs”...
Basic VLAN configuration Feature overview In a VLAN, untagged traffic is bridged through specified ports based on the receiving port’s port VLAN ID (PVID). VLANs can help to optimize network traffic patterns because broadcast, multicast, and unknown unicast packets are sent only to ports that are members of the VLAN.
Page 103
Next, the destination MAC address is paired with the VLAN ID and searched for in the L2FDB. If it is not found, or if it is the broadcast address, then it is forwarded to all ports that are members of the VLAN. Known unicast packets are switched only to the destination port.
Page 104
Displays port information with respect to VLAN show vlan port associations for a specified port or all ports. For more information on the VLAN commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following figure shows a switch with four ports configured to handle the example traffic for two VLANs.
Page 105
(CN1610) (Vlan)#exit Assign ports to VLANs: The following sequence shows how to configure VLAN settings on ports: (CN1610) (Config)#interface 0/10 (CN1610) (Interface 0/10)#vlan participation include 20 (CN1610) (Interface 0/10)#vlan tagging 20 (CN1610) (Interface 0/10)#vlan acceptframe vlanonly (CN1610) (Interface 0/10)#exit (CN1610) (Config)#interface 0/11...
Protocol-based VLANs Feature overview In a protocol-based VLAN, traffic is bridged through specified ports based on the protocol. This feature enables the administrator to define a packet filter that specifies criteria for determining if a packet belongs to a particular VLAN. Protocol-based VLANs are most often used in situations where network segments contain hosts that run multiple protocols.
Page 107
IP VLAN ID Assigns a default VLAN for IP 1–4093 packets. For more information on the protocol-based VLAN commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following figure shows how you can use protocol-based VLANs to keep...
Page 108
On this switch, the administrator configures all IPX traffic to be bound to VLAN 10. All IP and ARP traffic is bound to VLAN 20. By adding ports 1 and 2 to VLAN 10, and adding ports 3 and 4 to VLAN 20, the administrator ensures that no IPX traffic will be admitted to the IP network.
Page 109
(CN1610) #config (CN1610) (Config)#vlan protocol group 100 (CN1610) (Config)#vlan protocol group add protocol 100 ethertype ipx (CN1610) (Config)#vlan protocol group 120 (CN1610) (Config)#vlan protocol group add protocol 120 ethertype arp,ip (CN1610) (Config)#exit (CN1610) #vlan database (CN1610) (Vlan)#protocol group 100 10...
There is no restriction on the VLAN used in the mapping table. You can specify a static VLAN, dynamic VLAN, or even a nonexistent VLAN. Note The CN1610 switch assigns a VLAN based on the following order of precedence: 1. MAC-based 2.
Page 111
None VLAN ID VLAN to assign Existing VLAN (1-4094) None For more information on the MAC-based VLAN commands, see the CN1610 Network Switch CLI Command Reference. CLI show You can use the following command in Privileged EXEC mode to view...
IP subnet-based VLANs Feature overview This feature allows for incoming untagged packets to be assigned to a VLAN and a traffic class based on the source IP address of the packet. An IP-subnet-to-VLAN mapping is defined by configuring an entry in the IP subnet-to-VLAN table that specifies a source IP address, network mask, and the desired VLAN ID.
Page 113
Note The CN1610 switch assigns a VLAN based on the following order of precedence: 1. MAC-based 2. IP subnet-based 3. Protocol-based 4. Port-based (default) Source MAC-based mappings are evaluated and assigned first. Supported You can use the command to view and configure the...
Page 114
Configuration This example configures the switch so that all hosts with IP addresses in the example 192.168.25.0/24 network are members of VLAN 10: (CN1610) #vlan database (CN1610) (Vlan)#vlan association subnet 192.168.25.0 255.255.255.0 10 IP subnet-based VLANs...
Double VLAN tagging Feature overview The use of virtual metropolitan area networks (MANs) enables passing VLAN traffic from one customer domain to another through a metro core in a simple and cost-effective manner. An additional VLAN tag is used to differentiate customers in the MAN while preserving individual customers’...
Page 117
The administrator must ensure that tagging is disabled for all service provider VLANs. The following tables show the tagging operation for the various scenarios on ingress and egress: Uplink (service Output at Output at Ingress logic provider) uplink access Untagged Single-tagged Untagged CV-tagged...
Page 118
Displays detailed information about DVLAN show dvlan-tunnel interface tunneling for that interface. For more information on the double VLAN tagging commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following commands configure port 0/5 as an uplink port:...
Quality of Service About this chapter The CN1610 FASTPATH software provides the following quality of service (QoS) features that help to ensure optimal handling of traffic: ◆ Class of Service (CoS) Queue Mapping—This feature allows traffic to be classified into streams and given certain QoS treatment in accordance with defined per-hop behaviors.
Class of service (CoS) queue mapping CoS overview In a typical switch or router, each physical port consists of one or more queues for transmitting packets on the attached network. Multiple queues per port are often provided to give preference to certain packets over others based on user- defined criteria.
CoS mapping configurations can apply system-wide—meaning a change affects all interfaces simultaneously—and on a per-interface basis. Operational Packets traveling through a network device can receive different treatment based overview on a well-defined marking scheme. For a Layer 2 header, the 802.1p user priority contained in the VLAN tag denotes one of eight priority levels.
Page 124
Displays the current global trust mode setting, or show classofservice trust the setting for a specific interface. For more information on the CoS queue mapping commands, see the CN1610 Network Switch CLI Command Reference. Class of service (CoS) queue mapping...
Defining these on a per-queue basis allows the user to create the desired service characteristics for different types of traffic. Defaults See the CN1610 Network Switch CLI Command Reference for the configurable queue parameters and their default values, CLI show...
QoS map and queue configuration example Description This example illustrates the network operation as it relates to CoS mapping and queue configuration. Four packets are presented to the ingress port 0/10 in the order A, B, C, then D. Port 10 is designated to trust the 802.1p field of the packet, which serves to direct packets A, B, and D to their respective queues on the egress port.
Page 127
Ingress packet A Port 10 UserPri=3 mode='trust dot1p' 802.1p->COS Q Map packet B UserPri=7 packet C (untagged) packet D UserPri=6 port default priority->traffic class Egress Port x Forward via strict switch fabric to some egress weighted 40% Port x weighted 20% weighted 10% weighted 5% weighted 5%...
Page 128
(CN1610) (Interface 0/10)#classofservice dot1p-mapping 6 3 (CN1610) (Interface 0/10)#vlan priority 2 (CN1610) (Interface 0/10)#exit (CN1610) (Config)#interface 0/8 (CN1610) (Interface 0/8)#cos-queue min-bandwidth 0 0 5 5 10 20 40 (CN1610) (Interface 0/8)#cos-queue strict 6 (CN1610) (Interface 0/8)#exit (CN1610) (Config)#exit To configure the egress interface for a sustained maximum data rate of 80 Kbps (assuming a 100 Mbps link speed), the following command could be used.
The CN1610 switch supports the ability to assign traffic classes to output CoS queues, and to mirror incoming packets in a traffic stream to a specific egress interface (physical port or LAG).
Page 130
◆ The packet’s source or destination MAC or IP address. ◆ The packet’s source or destination Layer 4 (TCP or UDP) port number. ◆ The packet’s EtherType value. ◆ The packet’s IP precedence, IP DSCP, or ToS value. ◆ The packet’s protocol number (that is, the IANA logical port number). ◆...
Page 131
❖ Mark CoS—The packets are marked by DiffServ with the specified CoS value before being presented to the system forwarding element. This selection requires that the Mark CoS value field be set. ❖ Mark CoS as Secondary CoS—For double-tagged packets, the 802.1p tag is marked by DiffServ with the (original) 802.1p value of the inner tag before the packet is presented to the system forwarding element.
Page 132
For more information on the DiffServ commands, see the CN1610 Network Switch CLI Command Reference. Configuration Example 1—Providing equal access to a linked network: This example examples shows how a company network administrator can provide different departments in the company equal access to the human resources network to different departments within the a company.
Page 134
(CN1610) (Config-policy-map)#exit (CN1610) (config)# Next, the policy is added to interfaces 0/1 through 0/4 in the inbound direction: (CN1610) (config)#interface 0/1 (CN1610) (Interface 0/1)#service-policy in hr_access (CN1610) (Interface 0/1)#exit (CN1610) (config)#interface 0/2 (CN1610) (Interface 0/2)#service-policy in hr_access (CN1610) (Interface 0/2)#exit...
Page 135
0/5 based on a normal destination address lookup for internet traffic. (CN1610) #interface 0/5 (CN1610) (Interface 0/5)#cos-queue min-bandwidth 0 25 25 25 25 0 0 (CN1610) (Interface 0/5)#exit (CN1610) (Config)#exit (CN1610) # Example 2—VoIP Configuration: One of the most valuable uses of DiffServ...
Page 136
(CN1610) (config)#class-map match-all class_voip (CN1610) (Config-classmap)#match protocol udp (CN1610) (Config-classmap)#exit (CN1610) (config)#class-map match-all class_ef (CN1610) (Config-classmap)#match ip dscp ef (CN1610) (Config-classmap)#exit (CN1610) (config)# Next, a DiffServ policy for inbound traffic named is created and the pol_voip previously created classes are created as instances...
Security Features About this chapter This chapter describes how to configure device security features. Topics in this This chapter includes the following topics: chapter ◆ “Denial of service and other protections” on page 130 ◆ “Access control lists” on page 132 ◆...
The DoS protection feature is always active and does not need or allow any user configuration. Supported The CN1610 switch supports the following DoS and other protections: protections ◆ Protection of the switch under packet load: Packet throttling ensures that the switch is manageable under heavy load.
Page 139
Rate-limiting traffic: A rate-limiting mechanism is often used to limit traffic. For instance, limitations on ICMP and TCP SYN packets can be implemented as part of the denial of service strategy. On the CN1610 switch, rate limiting can be accomplished using the QoS feature.
Access control lists Feature overview Access control lists (ACLs) ensure that only authorized users have access to specific resources while blocking off any unwarranted attempts to reach network resources. ACLs are used to provide traffic flow control, restrict contents of routing updates, decide which types of traffic are forwarded or blocked, and above all provide security for the network.
Page 141
Creating an access Access lists are a sequential collection of permit and deny conditions. This list definition collection of conditions, known as the filtering criteria, is applied to each packet that is processed by the switch or the router. Packets are forwarded or dropped based on whether or not the packet matches the specified criteria.
Page 142
VLAN. Note ACLs on the CN1610 switch apply only to inbound traffic. Supported Access control lists can only be applied on ingress. Up to 100 access lists can be parameters and defined in the system, with each list having up to 100 rules.
Displays summary information about all IP ACLs show ip access- lists configured on the switch. For more information on the access list commands, see the CN1610 Network Switch CLI Command Reference. ACL configuration To configure ACLs, follow these steps: overview 1.
Page 144
(CN1610) (Config)#access-list 100 permit udp 192.168.77.0 0.0.0.255 192.168.7 7.3 0.0.0.255 The following commands apply the rule to outbound (egress) traffic on port 0/2. Only traffic matching the criteria will be accepted: (CN1610) (Config)#interface 0/2 (CN1610) (Interface 0/2)#ip access-group 100 out...
Supported security methods for communication with remote servers include MD5, PEAP, EAP-TTL, EAP-TTLS, and EAP-TLS. Local 802.1X The CN1610 switch supports a dedicated database for local authentication of authentication users for network access through the 802.1X feature. This functionality is distinct server from management access for the switch.
MAC-based 802.1X The MAC-Based Authentication is an extension to IEEE 802.1X. This feature focuses on supporting authentication of multiple clients per port; that is, though a port is authorized by one of the clients connected to the port, the other clients that are connected to the same port of the switch do not have access to the port.
Page 148
Authentication Bypass (MAB) is a supplemental authentication mechanism to allow 802.1X unaware clients to authenticate to the network. It uses the 802.1X infrastructure and MAB cannot be supported independent of the 802.1X component. MAC Authentication Bypass (MAB) provides 802.1X-unaware clients controlled access to the network by using the devices' MAC address as an identifier.
Page 149
As stated in section C.2.2 in IEEE 802.1X-2001, an Authenticator-enabled supported switch could reset port counters after authentication succeeds to allow the switch to maintain session statistics. The CN1610 switch does not support this action; therefore, the Authenticator Session Statistics that are defined in IEEE-802.1X-2001 are not supported.
Page 150
Displays the dot1x statistics for a specified port. show dot1x statistics For more information on the 802.1X commands, see the CN1610 Network Switch CLI Command Reference. Configuration This example configures a single RADIUS server used for authentication at example 1: RADIUS 10.10.10.10.
Page 152
RADIUS- VLAN assignment by the RADIUS server: assigned VLANs (CN1610) #config (CN1610) (Config)#aaa authorization network default radius Configuration This example shows how to set the guest VLAN on interface 0/16 to VLAN 100. example 4: guest These commands automatically enable the guest VLAN supplicant mode on the VLANs interface.
Feature overview The CN1610 switch includes secure shell (SSH) functionality to help ensure the security of network transactions. The following table details the SSH support: SSH feature Component type Connection Type Interactive Login Authentication Method Password Ciphers SSH Version 1 SSH Version 2 ◆...
Page 155
SSH feature: Command Description Displays global ssh settings. show ip ssh For more information on the access list commands, see the CN1610 Network Switch CLI Command Reference. Configuration The following commands configure SSH server version 2 with DSA and RSA example...
Note Silently discarded packets are abandoned without any further processing; however, the CN1610 switch RADIUS client generates logs and increments status counters to record these occurrences. RADIUS conforms to a client/server model with secure communications that use UDP as a transport protocol.
Page 157
Although the underlying RADIUS code supports challenge messages, the switch user interface does not integrate support for RADIUS challenge messages. ◆ The RADIUS implementation on the CN1610 switch does not support IPv6. Defaults RADIUS authentication and accounting is disabled and no servers are configured by default.
Displays a summary of statistics for the configured show radius statistics RADIUS accounting servers. For more information on the RADIUS commands, see the CN1610 Network Switch CLI Command Reference. Configuration This example configures two RADIUS servers at 10.10.10.10 and 11.11.11.11.
Page 159
The following command sets the NAS-IP address. If you do not specify an IP address in the command, the NAS-IP address uses the interface IP address that connects the switch to the RADIUS server. (CN1610) #config (CN1610) (Config)#radius-server attribute 4 192.168.20.12 Chapter 8: Security Features...
TACACS+ Feature overview TACACS+ provides access control for networked devices by using one or more centralized servers, similar to RADIUS. This protocol simplifies authentication by making use of a single database that can be shared by many clients on a large network.
Page 161
Encryption key shared between host and 0 character– None server 128 characters For more information on the TACACS+ commands, see the CN1610 Network Switch CLI Command Reference. Configuration This example configures two TACACS+ servers at 10.10.10.10 and 11.11.11.11. example Each server has a unique shared secret key. The server at 10.10.10.10 has a default priority of 0, the highest priority, while the other server has a priority of 2.
Glossary Authentication, Authorization, and Accounting Access Control List Address Resolution Protocol CIST Common and Internal Spanning Tree Command-Line Interface DHCP Dynamic Host Configuration Protocol DSCP Differentiated Services Code Point Extensible Authentication Protocol EAPOL EAP over LAN GARP Generic Attribution Registration Protocol GVRP GARP VLAN Registration Protocol IGMP...
Page 164
Independent VLAN LACP Link Aggregation Control Protocol Media Access Control MDIX Management Dependent Interface Crossover Mirror port Source Mirror Port (the port that mirrors to probe) Mirroring port Destination Mirror Port Monitor port Destination Mirror Port (the port with probe attached) MSTP Multiple Spanning Tree Protocol Network Interface Manager...
Page 165
RSTP Rapid Spanning Tree Protocol SNTP Simple Network Time Protocol Secure Shell Spanning Tree Protocol TACACS Terminal Access Controller Access Control System VLAN Virtual LAN Glossary...
Index Numerics CoS mapping behaviors CoS queue 802.1X configuration 802.1x mapping MAC-based monitor mode 802.1X authentication server, local denial of service DHCP/BOOTP client DNS client access control lists double VLAN tag access ports downloading files ACLs dynamic LAGs binding to a VLAN dynamic VLAN assignment, RADIUS-based rules additional documentation...
Page 168
MAC-based VLANs management IGMP snooping interfaces Industry Standard Discovery Protocol IPv6 in-memory log users interface notation, LAGs management interfaces interfaces, switch management mapping, CoS queue IP-subnet-based VLANs MIBs, supported IPv6 management mirroring flow-based port MSTP jumbo frames active topology enforcement states multiple spanning tree regiions multiuser VLAN assignment...
Page 169
rules, ACL TLVs, supported by LLDP traps conditions that generate trusted ports scripting, CLI scripts, using to enter commands service provider port, uplink untrusted ports SFP modules, supported uplink ports SFTP uploading files SNMP example overview overview session limits, Telnet and user management SNMP server configuration SNTP...
Need help?
Do you have a question about the CN1610 and is the answer not in the manual?
Questions and answers