Page 1
EX78000 Series Hardened Managed Ethernet Switch FastFind Links Unpacking and Installation Computer Setup User’s Guide Setting the initial IP address EX78000 Managed Switch Users Guide...
Page 2
Disclaimer of Liability The information contained in this document is subject to change without notice. EtherWAN is not liable for any errors or omissions contained herein or for resulting damage in connection with the information provided in this manual.
Preface Table of Contents Preface ........................xiii Changes in this Revision ..................xiii Document Conventions ..................xiv Safety and Warnings ....................xiv Typographic Conventions ..................xiv Unpacking and Installation ................... 15 Unpacking ....................... 15 Required Equipment and Software ................15 Select a Location .....................
Page 4
Preface Show Switch Model using the CLI ................28 IP Address ....................... 29 Static IP ......................29 DHCP Client ...................... 29 Default Gateway ....................29 DNS Server ......................29 IP Address - Configuration using the CLI ..............31 IP Address ......................31 Default Gateway ....................
Page 5
Preface User Privilege Configuration ..................50 User Account Settings using the CLI................ 52 Multi-User Mode....................52 Single User Mode ....................52 Radius User Mode ..................... 53 Tacacs User Mode ..................... 53 Creating a New User ..................54 Permissions ....................... 54 Diagnostics ......................
Page 11
Preface AAA/802.1x (Authentication, authorization, and accounting) ......221 Configuring Radius from the GUI ................221 Enabling Radius ....................221 Adding a Radius Server ................... 222 Enabling 802.1X on a Port ................223 Configuring TACACS+ from the GUI ..............224 Enabling TACACS+ ..................225 Adding a TACACS+ Server ................
Page 12
Preface IGMP Snooping ..................... 246 General Overview .................... 246 Enabling the IGMP Snooping Modes ............... 247 Configuring IGMP Snooping General properties ..........247 Configuring IGMP Passive Mode Specific properties ........248 Configuring IGMP Querier Mode Specific properties ........249 Configuring IGMP Unknown Multicast Forwarding ........... 250 Monitoring Registered Multicast Groups ............
Preface PREFACE Audience This guide is designed for the person who installs, configures, deploys, and maintains the Ethernet network. This document assumes the reader has moderate hardware, computer, and Internet skills. Document Revision Level This section provides a history of the revision changes to this document. Revision Document Version Date...
Preface Document Conventions This guide uses the following conventions to draw your attention to certain information. Safety and Warnings This guide uses the following symbols to draw your attention to certain information. Symbol Meaning Description Note Notes emphasize or supplement important points of the main text. Tips provide helpful information, guidelines, or suggestions for performing tasks more effectively.
UNPACKING AND INSTALLATION Unpacking When you unpack the product package, you will find the items listed below. Please inspect the contents, and report any apparent damage or missing items immediately to your authorized reseller. This Managed Switch Product CD ...
sake of brevity, all web configurations in this manual will be shown using Windows 7 as the underlying operating system. Cat 5+ Ethernet Cables An Ethernet cable of at least Category 5 rating is required to connect your computer to the switch. The cable can be configured as “straight-through” or crossover.
Apply Power The switch has a 52-57VDC terminal block for power input. Only one power input is required to operate the switch. However, redundant power supply functionality is supported. IEEE802.3at: up to 30W/port, 52-57VDC 60 Watts/port, 52-57VDC 52VDC: 4.85A 57VDC: 4.45A Note: Only use qualified power supply, either SELV or double insulated per UL 60950 or UL 61010-1 or UL 61010-2-201 standards.
Relay Output Alarm The switch provides relay output contacts for signaling of a user-defined power or port failure. The relay output can be connected to an alarm signaling device. Current is 0.6A at 30VDC. 3 Normal Open 2 Ground 1 Normal close EX78000 Managed Switch Users Guide...
RS-232 – The EtherWAN Managed Switch is equipped with a RS-232 serial port that can be used to access the switch’s CLI. The Serial port is DCE DB9F. A straight through serial cable is used to connect to a typical computer serial port (Also requires terminal emulation application).
Default I The switch’s default IP address is 192.168.1.10. The management computer must be set up so that it is on the same network as the switch. For example, the IP address of the management computer can be set to 192.168.1.100 with a subnet mask of 255.255.255.0.
SETTING THE INITIAL IP ADDRESS Once logged in the user can now configure the switch per the network requirements. The two major addressing options are: Simple IP addressing Multiple VLAN addressing (See Add an IP to the Management VLAN on page 171).
CLI COMMAND USAGE This chapter describes accessing the EtherWAN Managed Switch by using Telnet, SSH, or serial ports to configure the switch, navigating the Command Line Interface (CLI), typing keyboard shortcuts, and moving between the levels. This chapter assumes the user has a working understanding of Telnet, SSH and Terminal emulation applications.
Example: switch_a>enable switch_a#configure terminal switch_a(config)# MSTP Configuration Mode To set the EtherWAN Managed Switch to General MSTP configuration mode, run the following commands from the CLI: 1. enable 2. configure terminal 3. spanning-tree mst configuration EX78000 Managed Switch Users Guide...
Interface Configuration Mode Interface mode on the EtherWAN Managed Switch is used to configure the Ethernet ports and VLAN information. Valid interfaces are: fe<port #> - 100mb ports use fe followed by the port number. Example: fe1 ...
Saving a Configuration from the CLI Example: switch_a>enable switch_a#write memory Building configuration..[OK] switch_a#> SYSTEM MENU (WEB INTERFACE) System Information The System information link on the Left menu of the Web Configuration page takes you to a page that shows the following (see Figure ...
o One or more listings depending on the number of VLANs defined on the switch o Lists VLAN ID, IP address, and subnet mask of the VLAN Interface(s) Current User Information o Lists the current the currently logged in user and their user privileges Figure 3: System Information System Name/Password The System name is typically used by network administrators to make it easier to document...
By default there is no password assigned to the switch. To add or change a password: 1. Click on the + next to System. 2. Click on System Name/Password (see Figure 3. Use your mouse to place the cursor in the Password text box. 4.
To see the model number of a switch, use the following CLI command: CLI Command Mode: User Exec Mode or Privileged Exec Mode CLI Command Syntax: show integrate product series Usage Example 1: switch_a>enable switch_a# show integrate product series EX78000 series EX78000 Managed Switch Users Guide...
IP Address To navigate to the IP Address page: 1. Click on the + next to System 2. Click on IP Address (see Figure There are 4 settings on this page: Static IP (see Simple IP Addressing) DHCP Client Use this to enable or disable DHCP on a VLAN. To enable the DHCP Client: 1.
IP Address - Configuration using the CLI For more information on CLI command usage see CLI Command Usage. IP Address To set the IP address, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ip address <A.B.C.D/M> (IP Address/Mask e.g. 10.0.0.1/8) no ip address Note: The Subnet Mask is defined as a Network Prefix instead of the common dotted decimal (ex.
Default Gateway To set the Default Gateway, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ip default-gateway <A.B.C.D> no ip default gateway Usage Example 1: Setting the Gateway switch_a>enable switch_a#configure terminal switch_a(config)#ip default-gateway 192.168.1.254 switch_a(config)#q switch_a#write memory Building configuration..
Building configuration..[OK] switch_a#q switch_a# Usage Example 2: Remove a DNS IP Address switch_a>enable switch_a#configure terminal switch_a(config)#no ip dns switch_a(config)#q switch_a#write memory Building configuration..[OK] switch_a#q switch_a# Enable/Disable DHCP Client on a VLAN To enable the DHCP client on a VLAN, use the following CLI commands: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: get ip dhcp enable...
1. Click on the + next to System 2. Click on Management Interface The Management Interface configuration page has three settings that allow the user to configure the methods available to manage the EtherWAN Managed Switch. EX78000 Managed Switch Users Guide...
Configuration) Telnet. Telnet is a network protocol that allows a remote computer to log into the EtherWAN Managed Switch to access its CLI (Command Line Interface). The CLI can be access using Telnet, SSH and the serial port on the EtherWAN Managed Switch. The secure method of accessing the CLI over a network is SSH.
2. Click on the Update Setting button 3. Save the Configuration (see Save Configuration) Figure 6: Management Interface Management Interface Configuration using the CLI For more information on CLI command usage see CLI Command Usage. Enabling/Disabling Telnet To enable or disable telnet, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ip telnet...
switch_a(config)#ip telnet switch_a(config)#q switch_a#write memory Building configuration..[OK] switch_a#q switch_a# Usage Example 2: Disabling Telnet: switch_a>enable switch_a#configure terminal switch_a(config)#no ip telnet switch_a(config)#q switch_a#write memory Building configuration..[OK] switch_a#q Note: If using Telnet to run the CLI Commands that disable telnet you will lose your connection.
Usage Example 2: Disabling SSH: switch_a>enable switch_a#configure terminal switch_a(config)#no ip ssh switch_a(config)#q switch_a#write memory Building configuration..[OK] switch_a#q Note: If using SSH to run the CLI Commands that disable SSH you will lose your connection. To Disable SSH using the CLI, use Telnet or the RS232 Console port on the switch.
4. If the file is successfully loaded the following message will be shown: Success! System reboot is required! Backup Configuration This function is used to back up the current configuration of the EtherWAN Managed Switch. Backing up the configuration is achieved using a TFTP server such as TFTPD32.
Figure 7: Save Configuration Page Saving and Loading Configurations Using EB-232 The EB-232 dongle (sold separately) can save and load configuration files for EtherWAN managed switches. This improves maintenance efficiency, and allows for a failed switch to be quickly replaced with a new one running the same configuration. To use, simply plug the EB-232 into the switch’s RS-232 serial interface.
Page 42
Power LED will flash momentarily, and then both LEDs will light up for a few seconds. When only the green Power LED is lit, the EB-232 can be operated further on the same switch or removed. Load switch configuration from EB-232 This operation will load configuration settings from the EB-232 to the switch.
Figure 8: EB-232 Dongle Functions Save Configuration Page using the CLI For more information on CLI command usage see CLI Command Usage. Saving a Configuration To save a running configuration, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: write memory Usage Example 1: Saving a Configuration...
Restore Default Settings To restore the switch to its default settings, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: restore default Usage Example 1: Restoring Defaults switch_a>enable switch_a#restore default switch_a#q switch_a# Load Configuration from a TFTP Server To Load a Configuration from a TFTP server, use the following CLI commands: CLI Command Mode: Privileged Exec Mode CLI Command Syntax:...
1. Click on the + next to System 2. Click on Firmware Upgrade To upgrade the firmware on the EtherWAN Managed Switch, a TFTP server is required. The firmware file is in a .TGZ or .IMG format. This is a compressed file; however, it should not be decompressed before updating the switch.
5. During the firmware upgrade you will see the following messages. Do not reboot or unplug the switch until the final message is received. a. Downloading now, please wait... b. tftp <filename>.img from ip <ip address> success!! Install now. This may take several minutes, please wait...
To navigate to the Reboot page: 1. Click on the + next to System 2. Click on Reboot To reboot the EtherWAN Managed Switch: 1. Click on the Reboot button. 2. Click OK on the popup message. Reboot using the CLI...
User Account Page To navigate to the User Account page: 1. Click on the + next to System 2. Click on User Account From the User Account page, multiple users can be setup with different access privileges to the switch. There are two modes that can be used, Single-User or Multi-User. Changing the User Mode To set the user mode (see Figure...
2. Enter a User Name (case sensitive) for the new user in the User Name text box. 3. Enter a Password for the new user in the Password text box. 4. Re-enter the Password in the Confirm Password text box. 5.
To navigate to the User Privilege page: 1. Click on the + next to System. 2. Click on User Privilege. There are 3 different Privilege levels on the EtherWAN Managed Switch. Admin – Has access to all configuration and administration of the switch.
Page 51
The User Privilege Configuration page allows specific configuration and/or administration levels to be assigned or removed from the Technician and Operator user roles. Note: For each function, an operator’s privilege cannot be higher than a technician's To configure the privileges for each user access level, follow the below steps: 1.
User Account Settings using the CLI For more information on CLI command usage see CLI Command Usage. Multi-User Mode To enable the multi-user feature, use the following CLI commands: CLI Command Mode: Line Configuration Mode CLI Command Syntax: login local Usage Example: switch_a>enable switch_a#configure terminal...
Radius User Mode To enable the radius-user feature, use the following CLI commands: CLI Command Mode: Line Configuration Mode CLI Command Syntax: login radius Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#line console 0 switch_a(config-line)#login radius % Switching Single/Multi/Radius-User mode need to reboot the switch to take effect! switch_a(config-line)#q switch_a(config)#q...
Creating a New User To create a new user, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: username <user name-4 to 16 characters> privilege <admin|operator|technician> password < 8|blank> <password-1 to 35 characters> Note: The optional <8> CLI command after the CLI command password is used to specify that the password should be displayed in encrypted form in the configuration file.
DIAGNOSTICS Utilization To navigate to the Utilization page: 1. Click on the + next to Diagnostics. 2. Click on Utilization. The Utilization page shows (see Figure 15): CPU Utilization – Current and Max Utilization Memory Utilization – Total, Used and Free Memory Figure 15: Utilization Page System Log To navigate to the System Log page:...
The Remote Logging configuration page allows reporting to a Syslog server to be enabled or disabled as well as management of a list of Syslog servers to report to (see Figure 17). To configure the Remote Logging on the EtherWAN Managed Switch: EX78000 Managed Switch Users Guide...
Page 57
1. Click on the Enable or Disable radio button under Remote Logging. 2. Click on the Update Setting button. To add a Syslog server: 1. Enter the IP Address of the Syslog Server in the Syslog Server IP text box. 2.
Remote Logging using CLI commands For more information on CLI command usage see CLI Command Usage. Enable/Disable Remote Logging CLI Command Mode: Global Configuration Mode CLI Command Syntax: remote-log enable no remote-log enable Usage Example 1: Enable Remote Logging switch_a>enable switch_a#remote-log enable switch_a#q switch_a#...
ARP Table To navigate to the ARP Table page: 1. Click on the + next to Diagnostics. 2. Click on ARP Table. The ARP Table page shows ARP (Address Resolution Protocol) entries that are stored in the Switches ARP Table. This is useful for System Administrators for troubleshooting purposes.
ARP Table using CLI Commands For more information on CLI command usage see CLI Command Usage. CLI Command Mode: Global Configuration Mode CLI Command Syntax: show arp-table Usage Example: switch_a>enable switch_a#show arp-table IP address HW type Flags HW address Mask VLAN 10.58.7.130 00:50:B6:65:2A:22...
3. Select YES or NO from the dropdown box next to Trigger Enabled (see Figure 21). 4. Click Update Setting to save any changes made. Figure 21: Trigger Enable To configure the normal state for the alarm relay, check the corresponding radio button for either closed or open, and click Update Setting.
Enable alarm on input power 2 switch_a>enable switch_a#conf t switch_a(config)alarm-trigger power 2 switch_a(config)#q switch_a# Set Normal State for Alarm Relay This command is only available in models with Power over Ethernet (PoE) functionality. For more information on CLI command usage see CLI Command Usage.
Page 64
Down. 2. Click on the Submit button. To set the Port Speed and/or Port Duplex Settings on the EtherWAN Managed Switch: 1. Click on the drop-down box under Speed and select the desired port speed / duplex settings for that port. Please note, not all port types will have the same options. For...
2. Click on the Submit button. Figure 23: Port Configuration Port Status To navigate to the Port Status page: 1. Click on the + next to Port. 2. Click on Port Status. This page is a read-only page that lists the settings described in the previous section. It is useful if all the user intends to do is read the values of the port settings, not modify the port settings.
The Rate Control page is shown below (see Figure 25): To provide either an ingress or egress rate control for a port on the EtherWAN Managed Switch: 1. Click in the Ingress or Egress Text Box for the appropriate port.
Figure 26). To view the RMON statistics for a particular port on the EtherWAN Managed Switch: 1. Click on the link to the port at the top of the RMON Statistics page. To clear the RMON statistics for a particular port on the EtherWAN Managed Switch: 1.
This is a read-only page that will allow the user to see what devices are connected to a particular port and the vlan associated with that device and port. To clear the MAC addresses for a particular port on the EtherWAN Managed Switch (see Figure 27): 1.
3. The statistics for the port will update every ten seconds. Figure 27: Port VLAN Activities Port Configuration Examples Using CLI Commands For more information on CLI command usage see CLI Command Usage. Setting the Port Description To provide a description of a port use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: description <description text>...
Enable or Disable a Port To administratively enable or disable a port use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: shutdown no shutdown Usage Example 1: Disabling a port: switch_a>enable switch_a#configure terminal switch_a(config)#int fe1 switch_a(config-if)#shutdown switch_a(config-if)#q switch_a(config)#...
Setting Port Duplex To set the duplex for a port use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: duplex <full | half | auto> Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#int fe1 switch_a(config-if)#duplex full switch_a(config-if)#q switch_a(config)# Enable or Disable Port Flow Control To enable or disable flow control for a port use the CLI commands below:...
Setting a Port’s Rate Control To set a ports rate control use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: rate-control <ingress | egress> value <value in kbps> Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#int fe1 switch_a(config-if)#rate-control ingress value 100000 switch_a(config-if)#q switch_a(config)#...
SWITCHING Bridging To learn MAC addresses, a switch reads all packets that it detects on the LAN or on the local VLAN, looking for MAC addresses of sending nodes. It places these addresses into its Ethernet Switching table, along with the interface on which the traffic was received and the time when the address was learned.
300s (5 minutes) (see Figure 28). To update the Aging Time value on the EtherWAN Managed Switch: 1. Click in the Error Disable Recovery text box at the top of the Port Security Dynamic- MAC page. 2. Type in the desired value. Values can be from 0 to 65535 seconds. A value of 0 indicates that the port is not to return to normal operating condition until an administrator resets the port or the switch is restarted.
To update the Port Isolation value for a port on the EtherWAN Managed Switch: 1. Click on the Port Isolation drop-down box for the port to be isolated. 2. Select the value enable on the Port Isolation drop-down box. 3. Click on the Update Setting button.
To navigate to the Loopback Detect page: 1. Click on the + next to Switching. 2. Click on Loopback Detect. Loopback Detection (Global) To globally enable the Loopback Detect feature of the EtherWAN Managed Switch (see Figure 29): 1. Click on the Loopback Detect drop-down box.
2. Click on the Update Setting button. Figure 29: Loopback Detection Loopback Detection (Per Port) To enable Loopback Detection for a particular port or ports on the EtherWAN Managed Switch (see Figure 30): 1. Select the value Enable from the Mode drop down list for a port on the Loopback Detect page.
Figure 30: Loopback Detection (port) Storm Detect The Storm Detect feature allows the switch to be configured to disable a port that is receiving a large number of Broadcast and/or Multicast packets. The switch can monitor for packets and take action based on percentage of bandwidth utilization or number of packets per second.
Page 79
Figure 31: Storm Detect – Global 4. Set the By Utilization(%) for each port in the Storm-Detect Per Port Configuration box (see Figure 32). The default is 0 (not limited). Setting this to a value between 1 and 100 will cause the port to be disabled when the defined percentage of bandwidth is reached.
Figure 32: Storm Detect – Per Port Static MAC Entry Occasionally, it may be useful to specify a MAC address on a particular port and VLAN rather than adjusting the ageing time for the entire switch. Alternatively, it is also possible and even desirable to prevent a MAC address from ever being registered with a switch.
Adding a Static MAC Address to a Port To add a static MAC entry for a particular port (see Figure 33): 1. Enter the MAC address for end the corresponding port’s text box. The format of the MAC address should be in the form aaaa:bbbb:cccc). 2.
Adding a MAC to the Static-MAC-Entry Discard Table To add a MAC address to the Static-MAC-Entry Discard table (see Figure 35): 1. Enter a MAC address in the form “0000.1234.abdc” in the Add MAC Address text box of the Static-MAC-Entry-Discard section. 2.
To navigate to the Port Mirroring menu: 1. Click on the + next to Switching. 2. Click on Port Mirroring. To configure port mirroring for a port or ports on the EtherWAN Managed Switch (see Figure 37): 1. Select the port or ports that traffic is to be mirrored from under the Mirror From column.
Page 84
Figure 37: Port Mirroring To disable port mirroring for a port or ports on the EtherWAN Managed Switch (see Figure 38): 1. Under the Current Settings section, the current port mirroring configuration should be displayed. 2. Click on the Delete button.
1. Click on the + next to Switching. 2. Click on Link State Tracking. Enable/Disable Link State Tracking To enable Link State Tracking for a particular group on the EtherWAN Managed Switch (see Figure 39): 1. Under Group Setting, click the check box of the Link State groups that are to be enabled (or disabled).
Figure 40: Link State Tracking – Port Settings PoE (Power over Ethernet) - System and Port Settings This section only applies to Managed EtherWAN Switches with support for PoE. To navigate to the PoE page: 1. Click on the + next to Switching.
4. Power Priority – Use the Drop-Down box in the Power Priority column to set the priority to High, Medium or Low. 5. Power Down Alarm – This setting only applies to EtherWAN Switches that have a relay. If this box is checked, losing PoE power on a port triggers the relay on the switch.
Page 88
7. PD Class - Informational only. Provides the PoE Classification of the PoE (PD) device attached to the PoE port 8. Current (mA) – Informational only. Shows the current draw from the attached PoE (PD) device. 9. Consumption (W) - Informational only. Shows the power consumption of the attached PoE (PD) device.
PoE Scheduling PoE Scheduling allows PoE ports to have their power up time scheduled by hour of the day and day of the week. In order for a port to follow a schedule defined here, the port must be set to Scheduling on the PoE settings page (see PoE Port Setting) To navigate to the PoE Scheduling page:...
1 ageing time 300 switch_a(config)#q switch_a# Enabling Port Isolation To enable Port Isolation for a port on the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: port-isolation enable port-isolation disable Usage Example: switch_a>enable...
Setting the Loopback Detect Action To set the action for Loopback Detect on the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: bridge 1 loopback-detect action <err-disable | none>...
1 loopback-detect interval 5 switch_a(config)#q switch_a# Enabling Loopback Detect (Port) To enable Loopback Detection on a port on the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: loopback-detect enable Usage Example: switch_a>enable...
Page 95
Usage Example – Disabling storm detect: switch_a>enable switch_a#configure terminal switch_a(config)# no bridge 1 storm-detect errdisable switch_a(config)#q switch_a# To set the storm-detect interval use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: bridge 1 storm-detect interval <2-65535> Default: 10 Usage Example: switch_a>enable...
Page 96
Storm Detect Packet Type Enable this port’s storm detect by detect number of broadcast or broadcast plus multicast packets per second. Unit is packets per second. Set to 0 to disable this feature. To set the storm-detect packet type use the following CLI commands: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: storm-detect (bc | mc-bc) pps <0-100000>...
Page 97
Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)# interface fe1 switch_a(config-if)#storm-detect utilization 80 switch_a(config-if)#q switch_a(config)#q switch_a# To disable storm-detect on a port use the following CLI commands: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: no storm-detect port enable Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)# interface fe1...
Configuring Port Mirroring To configure a port for Port Mirroring on the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: mirror interface <interface> direction <both | tx | rx>...
Assigning a Port to a Link State Tracking Group To assign a port to a Link State Tracking group on the EtherWAN Managed Switch, use the following CLI commands: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: link state group <group #> <upstream | downstream>...
Setting PoE Power Budget To set the PoE Power Budget use the following CLI commands CLI Command Mode: Global Configuration Mode CLI Command Syntax: poe system-power-budget <value> Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)# poe system-power-budget 144.14 switch_a(config)#q switch_a# PoE Port Settings The following commands are used to set PoE functions related directly to individual PoE ports: CLI Command (click link for syntax)
Page 101
Usage Example 1 – Enabling PoE on a port: switch_a>enable switch_a#configure terminal switch_a(config)# interface fe1 switch_a(config-if)# poe enable switch_a(config-if)#q switch_a(config)#q Usage Example 2 – Disabling PoE on a port: switch_a>enable switch_a#configure terminal switch_a(config)# interface fe1 switch_a(config-if)# no poe enable switch_a(config-if)#q switch_a(config)#q fixed-power-limit The fixed-power-limit CLI command sets the maximum wattage that a switch port will...
Page 102
Power-down-alarm This setting only applies to EtherWAN Switches that have a relay. If this setting is enabled, losing PoE power on a port triggers the relay on the switch. To enable or disable the power down alarm, use the following CLI commands:...
switch_a(config-if)# poe power-down-alarm enable switch_a(config-if)#q switch_a(config)#q switch_a# Usage Example 2 – Disabling PoE power down alarm on a port: switch_a>enable switch_a#configure terminal switch_a(config)# interface fe1 switch_a(config-if)# no poe power-down-alarm enable switch_a(config-if)#q switch_a(config)#q switch_a# Power-priority Use this setting to set the priority to High, Medium or Low. To set the PoE power priority, use the following CLI command: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: poe power-priority <high | medium | low>...
Page 104
Scheduling To enable PoE Power Scheduling on a port, use the following CLI command: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: poe scheduling enable To disable PoE scheduling on a port use the no poe Enable command Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)# interface fe1...
These aggregated links may be used to interconnect switches or to connect high-capacity servers to a network. The EtherWAN Managed Switch supports up to six trunks for 100Mbps ports and up to two gigabit trunks. Each 100Mbps trunk can be composed of up to eight 100Mbps ports while each gigabit trunk can support up to four gigabit ports.
There are two popular types of port trunking, static and link aggregation control protocol (LACP). We will take a minute to discuss both types of trunking and why one would want to use them. Static Channel Trunking Originally specified in the IEEE802.3AD specification and now in the IEEE 802.1AX2008 specification, this type of trunking is the most basic and easiest to understand.
To navigate to the Port Trunking menu: 1. Click on the + next to Trunking. 2. Click on Port Trunking. There are 2 interfaces for Port Trunking supported, depending on the model of EtherWAN Managed switch. Interface 1 (see Figure To create a trunk consisting of 100Mbps ports: 1.
Page 108
Figure 45: Port Trunking – Interface 1 Version 2 (see Figure To create a static trunk consisting of 100Mbps ports: 1. Click on the checkbox for each desired port in a particular trunk. 2. Click on the Submit button. To create a static trunk consisting of 1000Mbps ports (see Figure 46): 1.
To navigate to the LACP Trunking menu: 1. Click on the + next to Trunking. 2. Click on LACP Trunking. There are 2 interfaces for Port Trunking supported, depending on the model of EtherWAN Managed switch. Version 1 (see Figure To create a LACP trunk: 1.
Page 110
5. Enter a value in the Port Priority textbox. 6. Select a Timeout value of Short or Long. 7. Click on the Submit button. 8. Repeat steps 1-7 for each additional port that is to be used in the trunk. To set the LACP System Priority 1.
Page 111
Version 2 (see Figure To create a LACP trunk: 1. In the Trunk Configuration section, select a port in the LACP trunk. 2. Select LACP from the Trunk Type dropdown box for this port. 3. Enter an admin key for this port in the Admin Key textbox. 100Mbps ports admin keys must be between 1-6 and 1Gbps ports must be between 7-8.
For more information on CLI command usage see CLI Command Usage. Adding an Interface to a Static Trunk To add an interface to a static trunk on the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: static-channel-group <static channel>...
Setting the LACP Port Priority To set the port priority for an interface attached to a LACP trunk on the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: lacp port-priority <1 - 65535>...
Within each Region, the MSTP protocol can accommodate a network diameter of up to 40 switches. There can be a maximum of 40 Regions in a single MSTP network. Note: If a faster recovery time is required, EtherWAN’s proprietary Alpha-Ring provides a recovery time of <15MS with up to 250 switches. See...
STP/RING PAGE - CONFIGURING RSTP Global Configuration Page To navigate to the STP/Ring Global Configuration page: 1. Click on the + next to STP/Ring. 2. Click on Global Configuration. Enabling the RSTP Protocol RSTP is enabled by Default. If RSTP has been disabled and you wish to enable it (see Figure 49): 1.
The Root Bridge & Backup Root Bridge To configure the Spanning Tree protocol on your network, you will need to setup a Root Bridge and Backup Root Bridge. In order to configure a switch to be the Root Bridge of a Spanning Tree network, you have to make sure that the Bridge Priority (which is the most significant 4 bits of the Bridge ID) of the switch is the lowest among any of the switches on the network.
Figure 51: Bridge ID Display Setting the MAX Age, Forward Delay and Hello Timer To navigate to the STP/Ring Global Configuration page: 1. Click on the + next to STP/Ring. 2. Click on Global Configuration. The Network Diameter The Diameter of a network depends on the type of topology your network uses. In a ring topology, the Network Diameter is the total number of switches in a network minus the Root Bridge.
2. Enter the Hello Time in the text box to the right of the Hello Time (1..10 sec) label. 3. Enter the Forward Delay in the text box to the right of the Forward Delay (4..30 sec) label. 4. Click on the Update Setting button. 5.
Figure 53: Spanning Tree Port Roles Path Cost & Port Priority By default, each port on a Spanning Tree switch will be assigned a Path Cost based on the port’s transmission speed according to the IEEE standard below: Link speed Recommended value Less than or equal 100Kb/s 200,000,000...
Page 122
Port Priority is part of the Port ID, which is a concatenation of 2 values: Port Priority (4 bits) + Interface ID (12 bits). The default values will work fine in most scenarios; however, there are times when you may need to adjust these values manually in order to influence the location of the Alternate Port, the Root Port or the Backup Port.
Point to Point Link By default, RSTP will assume any full-duplex link as a Point to Point Link, but if the switch detects that the neighbor switch is not running the RSTP protocol, it will assume the port to be a Shared Port. You can force a port to be a Shared Port, if you know in advance that there will be more than one switch connecting to this link (through an unmanaged switch, for example), or if you know in advance that the other switch on this link will be running the older STP protocol.
Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#no bridge shutdown 1 switch_a(config)#bridge 1 protocol rstp vlan-bridge switch_a(config)#q switch_a# Bridge Priority, Max Age, Forward Delay, and Hello Time To configure the Bridge Priority, Max Age, Forward Delay, and Hello Time of a Spanning Tree Bridge, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax:...
switch_a(config-if)#bridge-group 1 path-cost 200000 switch_a(config-if)#bridge-group 1 priority 128 switch_a(config-if)#q switch_a(config)#q switch_a# Manually Setting a Port to be a Shared or Point to Point Link To manually force a port to be a shared link or Point-to-point link, use the below CLI commands: CLI Command Mode: Interface Configuration Mode CLI Command Syntax:...
switch_a(config)#interface fe1 switch_a(config-if)#spanning-tree edgeport switch_a(config-if)#q switch_a(config)#q switch_a# Usage Example 2: Disabling edge port on port 1: switch_a>enable switch_a#configure terminal switch_a(config)#interface fe1 switch_a(config-if)#no spanning-tree edgeport switch_a(config-if)#q switch_a(config)#q switch_a# STP/RING PAGE - CONFIGURING MSTP The MSTP protocol adds a new concept called a Region to the Spanning Tree algorithm. Unlike RSTP and STP, inside each MSTP Region, there can be more than one instance of Spanning Tree Protocol running simultaneously.
Figure 56: Enabling MSTP The CIST Root Bridge & Backup CIST Root Bridge In order to configure a switch to be the CIST Root Bridge of a Spanning Tree network, you just have to make sure that the Bridge Priority (which is the most significant 4 bits of the Bridge ID) of the switch is the lowest among any of the switches on the network.
Setting Bridge Priority To set the Bridge Priority: 1. Enter the Bridge Priority ID in the text box to the right of Bridge Priority (0..61440) 2. Click on the Update Setting button. Note: The valid values for this parameter are from 0 to 61440, in increments of 4096;...
Configuring the CST Network Diameter When using MSTP, the Max Age parameter is used for the CST (Common Spanning Tree) topology simply as a hop count limit on how far the Spanning Tree protocol packet can propagate throughout the CST topology, therefore, the Max Age must be configured with a value that is greater than the network diameter of the CST topology.
Figure 59: Max Age, Hello Timer & Forward Delay MSTP Properties Page Configuring an MSTP Region In order to form a MSTP Region, the switches that will be connected together to form the MSTP Region must have the same values for the configuration parameters listed below. Two of the parameters can be configured directly, the third parameter (Configuration Digest) will be automatically calculated by the switch based on the VLAN to MSTI (Multiple Spanning Tree Instance) mapping.
To configure both the MSTP Regional Configuration Name and the Revision Level for each of the switches located in the same MSTP Region (see below): 1. Enter the Region Name of the Region that the switch will belong to in the Region Name entry field, 2.
1. Enter the desired hop count in the entry field next to Max Hops 2. Click on the Update Setting button (see below). 3. Save the configuration (see the Save Configuration Page) Figure 61: MSTP Properties – Max Hops MSTP Instance Setting Page Setting an MSTP Instance Navigate to the STP/Ring MSTP Instance Setting page: 1.
4. Click on the Update Settings button. 5. Save the configuration (see the Save Configuration Page) Note: You can enter a new instance number here, which is how a new MSTI instance is created. You can use an existing MSTI instance if it has already been created on another switch.
Page 134
To load balance switches within a MSTP Region, set different switches within the MSTP Region to be the Root Bridge for different MSTI instances. A Root Bridge in a particular MSTI instance is called a MSTI Regional Root Bridge. To designate a specific switch in a MSTP Region to be the Root Bridge in a specific MSTI instance, the bridge priority must be set to be the lowest number of all the switches in a particular MSTI instance.
MSTP Port Setting page Adjusting the blocking port in a MSTP network To navigate to the STP/Ring MSTP Port Setting page: 1. Click on the + next to STP/Ring. 2. Click on MSTP Port Setting. You can adjust the location of the blocking port in a MSTP network by modifying the Port Priority and the Path Cost of the ports on the switch.
Figure 65: Port Cost & Priority MSTI Instance Port Membership To navigate to the STP/Ring MSTP Port Settings page: 1. Click on the + next to STP/Ring. 2. Click on MSTP Port Setting. If changes have been made to the port membership of a VLAN, you must also reconfigure the MSTI port membership for the MSTI instance that the VLAN maps to.
Figure 66: Port Instance Configuration Figure 67: Port Instance - Adding Ports MSTP Configuration Examples Using CLI Commands For more information on CLI command usage see CLI Command Usage. Enabling Spanning Tree for MSTP To enable the Spanning Tree function on a switch use the below CLI commands.: CLI Command Mode: Global Configuration Mode EX78000 Managed Switch Users Guide...
CLI Command Syntax: no bridge shutdown 1 bridge 1 protocol mstp Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#no bridge shutdown 1 switch_a(config)#bridge 1 protocol mstp switch_a(config)#q switch_a# Bridge Priority, Max Age, Forward Delay, and Hello Time To configure the CIST Bridge Priority, Max Age, Forward Delay, and Hello Time of a Spanning Tree Bridge, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax:...
Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#bridge 1 max-hops 20 switch_a(config)#q switch_a# MSTP Regional Configuration Name and the Revision Level To configure both the MSTP Regional Configuration Name and the Revision Level on a switch, use the following CLI commands: CLI Command Mode: MSTP Configuration Mode CLI Command Syntax: bridge 1 region <region_name>...
switch_a(config-mst)#q switch_a(config)#q switch_a# Setting MSTI Priority To set the MSTI priority of a switch in a MSTP Region, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: bridge 1 instance <1-15> priority <0-61440> Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#bridge 1 instance 1 priority 0...
To modify the MSTI Port Priority and MSTI Port Path Cost for an Instance on a switch, use the below CLI commands: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: bridge-group 1 instance <1-15> path-cost <1-200000000> bridge-group 1 instance <1-15> priority <0-240> Usage Example: switch_a>enable switch_a#configure terminal...
2. Click on Alpha-Ring Setting. EtherWAN Alpha-Ring Technology The Alpha-Ring protocol was designed and developed by EtherWAN to overcome traditional STP and RSTP’s inability to provide fast network recovery and minimize packet loss caused by link failure. Among the advantages of Alpha-Ring are: ...
Figure 68: Alpha-Ring Settings Alpha-Ring V2 The Alpha-ring protocol will automatically set the last connected link to BLOCK status. However, sometimes you may need to keep a specific link in a FOWARD state. An example would be where a port was connected to a high capacity fiber link – overall network performance would benefit by keeping that link running.
Figure 69: Pre-defining a Block Port with Alpha-Ring V2 Settings Connecting two Alpha-Ring Networks together (Ring Coupling) To navigate to the STP/Ring Alpha-Ring Settings page: 1. Click on the + next to STP/Ring. 2. Click on Alpha-Ring Setting. As additional switches are added to a network, it may become necessary to connect multiple Alpha-Ring networks together.
Figure 70: Ring Coupling Example Figure 71: Ring Coupling Connecting Additional Rings (Redundancy Pairs) Only two rings can be connected through Ring Coupling. To connect additional rings, you will need to use Redundant Port Pairs. Below are some topology examples for using redundancy pairs to connect two or more rings.
Page 146
Figure 72: Redundant Pair Example 1 Figure 73: Redundant Pair Example 2 EX78000 Managed Switch Users Guide...
Page 147
Figure 74 Redundant Pair Example 3 To setup Redundant Pairs: 1. Change the Redundancy State to Enable. 2. Click on the Update Setting button next to the Redundancy State 3. Select the port that will act as a Redundant Port, and choose “Normal” or “Slave” with the radio buttons.
Figure 75: Redundancy Pairs Configuration Configuring Alpha Ring using CLI commands For more information on CLI command usage see CLI Command Usage. Enable Alpha Ring and Alpha Ring V2 Protocols To enable the Alpha Ring and Alpha Ring V2 protocols, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: bridge 1 ring enable/disable (no) ring v2 enable...
Set the Ring Ports To configure the ports used in the ring, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ring set-port <interface1> <interface2> (interface1 and interface2 will be set as ring-port 1 and ring-port 2) Usage Example 1: switch_a>enable switch_a#configure terminal...
Define a Ring’s Blocked Port To define a specific port to be set to BLOCK state, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ring set-defined-block <1-2> Usage Example 1: switch_a>enable switch_a#configure terminal switch_a(config)# ring set-defined-block 1 switch_a(config)#q switch_a# Set Delay Time for Restoration of a Failed Port...
Usage Example 1: Set ports fe7 and fe8 as coupling ports for connection to another ring switch_a>enable switch_a#configure terminal switch_a(config)# ring set-coupling-port fe7 fe8 switch_a(config)#q switch_a# Enable Redundancy Pairs To enable the ring to be coupled to another ring using redundant port pairs, use the following CLI commands: CLI Command Mode: Privileged Exec Mode CLI Command Syntax: (no) redundancy pair enable...
The EtherWAN Alpha Ring protocols can be used in mission critical applications to recover from a link failure in 15 milliseconds or less. However, with the Alpha Ring protocols (Alpha Ring, Alpha Ring-Coupling), the redundant topologies that these protocols can be applied to will be limited to at the most two Rings per switch.
General Overview To insure that the Alpha Chain protocol will function properly on your network, please follow the minimum configuration guidelines listed below for the two types of Alpha Chain switches (Chain Port switch, Chain-pass-through switch). There are two types of port configurations used in the Alpha Chain setup. The flexibility of Alpha Chain allows for many different types of topologies to be created.
a. The Alpha Chain protocol works by sending PDUs between two Chain Ports to determine the forwarding and blocking status of each the two Chain Ports at the end points of an Alpha Chain Segment. One PDU is sent every 200 milliseconds.
Figure 77: Chain Ports – Master and Slave on One Switch Figure 78: Chain Ports – Master Chain Port Alpha Chain Pass-Through Ports To navigate to the Chain Pass-Through Setting page: 1. Click on the + next to STP/Ring. EX78000 Managed Switch Users Guide...
2. Click on Chain Pass-Through Setting. To configure the Alpha Chain Pass-Through ports: 1. From the drop-down list below the Chain Pass-Through Port 1 heading, choose one of the daisy chained ports on the switch to be the Chain Pass-Through Port #1 for the switch.
Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)# no bridge 1 chain-storm switch_a(config)#q switch_a# Configuring Chain Ports To configure the Chain Ports on a Chain Port Switch, use the following CLI commands: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: chain port enable no chain port Usage Example 1: Enabling a chain port switch_a>enable...
Figure 79: Advanced Bridge Configuration Advanced Per Port Configuration Portfast Configuration / status – Enabling this for Edge ports (ports connecting to an end device as opposed to another switch) protect the BPDU-Guard Configuration – When set to Default the port will default to the Advanced Bridge Configuration settings.
Page 160
Figure 80: Advanced Per Port Configuration EX78000 Managed Switch Users Guide...
Configuring Spanning Tree Advanced Settings using CLI commands For more information on CLI command usage see CLI Command Usage. Enabling BPDU Guard Globally To enable the BPDU Guard feature globally on the switch use the below CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: bridge 1 spanning-tree portfast bpdu-guard Usage Example: switch_a>enable...
Enabling BPDU Guard Error Disable-timeout To enable the BPDU Guard Error Disable-timeout feature on a switch port, and set the timeout interval, use the CLI commands below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: bridge 1 spanning-tree errdisable-timeout enable bridge 1 spanning-tree errdisable-timeout interval 300 Usage Example: switch_a>enable...
VLAN Port Based VLAN vs. Tagged Based VLAN The EtherWAN Managed Switch can be configured to operate in one of two VLAN modes: Port based VLAN mode or Tagged based VLAN mode. In Port based VLAN mode, packets from different VLANs can only be segregated from one another while within a single switch, but not when the packets travel to other switches in the network.
Port Based VLAN Configuration Examples To navigate to the Port Based VLAN page: 1. Click on the + next to VLAN. 2. Click on Port Based VLAN. In Port Based VLAN mode, you can configure a port to be a member for a single VLAN or multiple VLANs.
Figure 83: Port Based VLAN – Example 2 To add or remove ports from a specific VLAN: 1. Select or deselect the checkbox to the right of the Port and below the VLAN ID for the port you want to add or remove from a VLAN. 2.
VLAN number that the packet belongs to. All ports on the EtherWAN Managed Switch can be configured with different Port Types that have different tagging restrictions as defined below.
exception of the PVID VLAN on that port. The PVID VLAN on a Trunk Port will not be automatically modified to contain a VLAN tag of the PVID VLAN. Hybrid Port - A Hybrid Port has no restriction on it. If a port is configured to be a Hybrid Port, then this port can be a member of multiple VLANs, and this port’s outgoing packets can be configured to be either with or without a VLAN tag of the VLAN that the packet belongs to, including the PVID VLAN of the Hybrid Port.
Figure 85: Add VLAN 2. Enter the VLAN ID. 3. Enter the VLAN Name. 4. Select Attach or Detach for the CPU Port. a. Attaching the CPU to a VLAN is typically done on the Management VLAN. 5. Select the ports to be a member of the VLAN (see Configuring the VLAN Egress (outgoing) Member Ports)
Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#interface fe7 switch_a(config-if)#switchport mode trunk switch_a(config-if)#switchport trunk allowed vlan add 100,200,300 switch_a(config-if)#switchport trunk native vlan 1 switch_a(config-if)#q switch_a(config)#q switch_a# Add an IP to the Management VLAN To navigate to the System/IP Address page: 1. Click on the + next to System. 2.
To delete an IP from a VLAN (the default VLAN, for an example): 1. Delete the IP and the subnet mask of the default VLAN and leave it as blank 2. Click on the Submit button. Warning: Before completing the steps above, make sure that you have already set up another management IP on another VLAN, and have set up a port properly for accessing that VLAN.
Figure 88: VLAN Port Setting Configuring the VLAN Egress (outgoing) Member Ports To navigate to the 802.1Q VLAN Setting page: 1. Click on the + next to VLAN. 2. Click on 802.1Q VLAN Setting. To configure the egress member ports for each VLAN: 1.
Page 174
Note: If an egress member port for a VLAN has the PVID set on that port to be the same as the VLAN, then that port will automatically be configured as an egress member port for the VLAN by the switch. If a check box is not checked and is grayed out, it is because that port is an Access Port with the PVID set to be a different VLAN than the current VLAN.
QoS. QoS as it pertains to the EtherWAN Managed Switch can be broken down into two types, CoS and DCSP. CoS or Class of Service operates at Layer 2 and was developed by an IEEE working group in the 1990s.
Priority Acronym Traffic Types 0 (lowest) Background Best Effort Excellent Effort Critical Applications Video, < 100 ms latency and jitter Voice, < 10 ms latency and jitter Internetwork Control 7 (highest) Network Control The above recommendations are implemented in the 802.1p Priority submenu. DSPC or Diffserv Code Point uses the first 6 bits in the ToS field of the IP(v4) packet header.
Page 177
To Enable the QoS settings: 1. Enable QoS, by selecting the drop-down box to the right of the QoS option. 2. Choose CoS and/or DSCP next to the Trust option. 3. Select the desired option next to Policy: a. Strict Priority (Queue0-3) – Note: Not all switches support this mode. Packets must be emptied from the queues in order.
QoS Global Configuration using the CLI Interface This section gives information on Command line commands related to QoS and assumes the user has a working knowledge of connecting to the switch using Telnet, SSH or the Serial port.. Telnet is enabled by default. To enable or disable Telnet or SSH see the Management Interface section.
Usage Example – Disable QoS Strict Priority: switch_a>enable switch_a#configure terminal switch_a(config)# no priority-queue out switch_a(config)#q switch_a# Usage Example – The following example specifies the bandwidth ratios of the four transmit queues, starting with queue 0, on the switch. WRR_WTS Weighted Round Robin (WRR) weights for the 4 queues (4 values separated by spaces).
Figure 93: 802.1p Priority By default, the higher priority queue 3 are assigned to VLAN priorities 6 and 7, queue 2 assigned to VLAN priorities 4 and 5; queue 1 assigned to VLAN priorities 2 and 3; and finally, queue 0 assigned to VLAN priorities 0 and 1. After making any changes on the page, click on the Submit button to ensure that the changes are stored.
DSCP Page – HTTP Interface The DSCP submenu is much like the 802.1p submenu except there are many more DSCP priorities to choose from and they are all assigned to the lowest-priority queue, 0. For each DSCP priority, the user can change the value of the queue to between 0 and 3.
DSCP Submenu – CLI Interface For more information on CLI command usage see CLI Command Usage. CLI Command Mode: Global Configuration Mode CLI Command Syntax: mls qos map dscp-queue <dscp_value> to <queue_ID> dscp_value: Up to 8 values (separated by spaces). Range is 0-63. queue_ID: Range is 0-3.
This section applies only to specific models of EtherWAN Switches. The settings in the ACL feature of the EtherWAN switch can be used to control which packets are allowed to enter the switch (Packet Filtering), as well as to control the amount of bandwidth that can be allocated for those packets (Bandwidth Policing).
1. Click on the + next to ACL. 2. Click on ACL Configuration. In order to enable the ACL feature on the EtherWAN switch, the QoS feature must be enabled on the switch as well. In order to apply the ACL packet filtering features on a port, you must: 1.
Figure 95: Enabling QoS ACL Policy Map To create a new ACL Policy Map, follow the instructions below. 1. Make sure that the Create option is selected from the drop-down list next to Policy Map (see below) 2. Next, make sure that the Create option is selected from the drop-down list under Class Name (see below).
IP Access List Figure 97: IP Access List To configure an IP Access List (See Figure 97 above): 1. Select the IP Access List option from the drop-down list below Access List Type. 2. If you have already created an IP Access List previously and would like to apply it to the new ACL Class, then select the Access List number from the drop-down list next to Access List.
9. You can enter a source IP address in order to deny an IP packet with that source IP to gain entry into the switch. To do so, you must choose the deny option from the drop-down list under the Action column. Next, enter the IP address and mask as described in step 6 and 7.
Page 189
4. To give this particular Extended IP access list an ID, enter a number in the range from 100 – 199, or from 2000 – 2699, into the entry field next to the Create option drop-down list. 5. You can enter a source and a destination IP address to allow an IP packet with these pair of IP addresses to gain entry into the switch.
Mac Access List Figure 99: MAC Access list 1. To configure a MAC access list, select the MAC Access List option from the drop- down list below Access List Type (see Figure 99). 2. If a MAC Access List was previously created and you would like to apply it to the new ACL Class, then select the Access List number for the previously configured MAC Access List from the drop-down list next to Access List.
Page 191
6. Next, enter the Comparison Mask for the source Ethernet address in reverse logic (Ex. 255.255.255.0 is 0.0.0.255 in reverse logic) into the entry field from the Mask column following the Source MAC column. 7. Next, enter the destination Ethernet address of the Ethernet packet into the entry field under the Destination MAC column.
Layer 4 Figure 100: Layer 4 1. To use the Layer 4 access list feature and apply it to the new ACL Class, select the Layer 4 option from the drop-down list below Access List Type (see Figure 100). 2. You can enter a source or destination Transport Layer protocol port number to allow any IP packet with this port number to gain entry into the switch.
Figure 101: IP Access List Name Bandwidth Limiting 1. The amount of bandwidth that is being allocated for the traffic that is being allowed under this new ACL Class can also be limited. To do this, enter the bandwidth amount that you want to allocate for the traffic in the entry field under Police Rate (1- 1000000Kbps) (see Figure 102).
Page 194
Figure 102: Police Rate 3. Next, enter a name in the entry field next to “Policy Map Name” for the new ACL “Policy Map” that you are currently creating, and click on the submit button (see Figure 103). Figure 103: Policy Map Name EX78000 Managed Switch Users Guide...
Applying a Policy Map to a Port To apply an ACL Policy Map to a port, just follow the instructions below. 1. Select the correct ACL Policy Map from the drop-down list next to Policy Map (see Figure 104). 2. Next, check the boxes below Attach Class Map to Policy Map next to all the ports that you would like to apply this Policy Map to.
Figure 105: Modifying a Policy Map Adding a New ACL Class to an Existing Policy Map If you would like to create a new ACL Class and add it to this ACL Policy Map follow the steps below 1. Make sure that the Create option is selected from the drop-down list under Class Name (see Figure 106)
Figure 106: Adding a New ACL Class to an Existing Policy Map Adding an Existing ACL Class to an Existing Policy Map If you would like to add an existing ACL Class to this ACL Policy Map (see Figure 107): 1.
Page 198
Figure 107: Policy Map Setting – Class Name 3. You can confirm that the ACL Class has been added correctly to this Policy Map by checking the dropdown list under “Class Name”. If you see the newly added ACL Class in the list above the dash line, then it has been added properly (see below). Figure 108: Policy Map Setting EX78000 Managed Switch Users Guide...
Removing an ACL Class If you would like to remove an ACL Class from this ACL Policy Map: 1. Make sure to select the correct ACL Class that is above the dash line from the drop- down list under Class Name (see Figure 109).
Page 200
Figure 110: Verifying ACL Class Removal To remove an existing ACL Policy Map entirely, follow the instructions below: 1. Select the correct ACL Policy Map that you want to remove entirely, from the drop- down list next to Policy Map (see Figure 111) 2.
Page 201
Figure 111: Removing a Policy Map To remove an existing ACL Class entirely, follow the instructions below. 1. Make sure that the ACL Class is not associated with any ACL Policy Map. If it is, you must remove it from that Policy Map first (see Modifying/Adding an Existing Policy Map).
Page 202
Figure 112: Policy Map 2 5. You can confirm that this ACL Class has been removed completely by checking the drop-down list under “Class Name”. If you do not see the ACL Class in the list then it means it has been completely removed (see below). Figure 113: Policy Map 3 EX78000 Managed Switch Users Guide...
For more information on CLI command usage see CLI Command Usage. Enabling QoS To enable the ACL feature on the EtherWAN switch by enabling the QoS feature on the switch, just follow the steps below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: mls qos enable Usage Example: switch_a>enable...
Creating an Extended IP Access List To create a new Extended IP Access List to allow or deny an source IP address/range and destination IP address/range pair access to the switch, use the following CLI commands with the Access list ID in the range from 100 – 199, or from 2000 – 2699: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ip-access-list <100-199, 2000-2699>...
Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#mac-access-list 2000 permit 00e0.b321.03de 0000.0000.0000 00e0.b321.03df 0000.0000.0000 1 ether-type 800 0000 switch_a(config)#mac-access-list 2000 deny 00e0.b321.03de 0000.0000.0000 00e0.b321.03df 0000.0000.0000 1 ether-type 800 0000 switch_a(config)#mac-access-list 2000 deny any any 1 ether-type 800 0000 switch_a(config)#q switch_a# Creating an ACL Class Map with Layer 4 Access List In order to create a Layer 4 Access List you must create it within an ACL Class Map.
Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#class-map FTP switch_a(config-cmap)#match layer4 destination-port 21 switch_a(config-cmap)#q switch_a(config)# switch_a(config)#class-map FTP_Download switch_a(config-cmap)#match layer4 source-port 20 switch_a(config-cmap)#q switch_a(config)#q switch_a# Creating a ACL Class Map with an IP or MAC Access List To create a new ACL Class Map with a Standard/Extended IP Access List or a MAC Access List, you must have first created a Standard/Extended IP Access List or MAC Access List already.
Creating an ACL Policy Map To create a new ACL Policy Map you must have first created the ACL Class Maps that you want to assign to the ACL Policy Map. You can then use the CLI commands below to create the new ACL Policy Map and assign one or multiple existing ACL Class Maps to the ACL Policy Map by referencing its ACL Class Map name.
Appling an Existing ACL Policy to a Port To apply the ACL packet filtering features on a port, you must have first created an ACL Policy already. You can then use the CLI commands below to apply the existing ACL Policy to a port.
SNMP SNMP is a TCP/IP application layer network management protocol that allows any TCP/IP device to be managed across a TCP/IP network. It is based on the client-server paradigm. The server (called a SNMP Agent) runs a process on the managed device that listens for a client’s (a network management software running on a computer, usually called a NMS, short for Network Management Station) polling requests to fetch or to set a data item on the managed device.
Page 211
7. Enable or disable the link down trap by selecting the appropriate choice from the drop-down list next to Link Down Trap. This will allow or stop the switch from sending a trap to the identified trap community groups when any port on the switch moves from the link up state to the link down state.
Configuring SNMP v1 & v2 Community Groups To navigate to the SNMP v1/v2 page: 1. Click on the + next to SNMP. 2. Click on SNMP v1/v2. To configure the SNMP v1 & v2 community groups (see Figure 115): 1. Enter the SNMP community name into the entry field next to Get Community Name (the default value is “Public”).
Configuring SNMP v3 Users To navigate to the SNMP v3 page: 1. Click on the + next to SNMP. 2. Click on SNMP v3. Adding SNMP v3 Users to the switch 1. Click on the Add User button. See below. Figure 116: Add User 2.
Page 215
Figure 117: SNMP v3 Settings 3. Next, enter the desired username in the entry field next to User Name. 4. Next, select the desired access authorization for the user from the drop-down list next to Access Mode. See Figure 118. Figure 118: User name &...
Page 216
5. Next, if authentication is required for this user, and you have chosen an authentication protocol, then the entry field next to Auth. Password will have been enabled. Enter a password for this user inside this entry field. See Figure 119.
Deleting SNMP v3 Users from the switch 1. Go to SNMP SNMP v3, you should see a list of previously configured users. Next, click on the Delete User button. See below. Figure 121: Delete User 2. Next, select the user that you wish to delete from the drop-down list next to Select User Name.
SNMP Configuration Examples Using CLI Commands For more information on CLI command usage see CLI Command Usage. Enabling SNMP and configuring general settings To enable the SNMP feature of the switch, and configure its general settings (Description, Location, and Contact information), use these CLI commands.: CLI Command Mode: Global Configuration Mode CLI Command Syntax: snmp-server enable...
Configuring SNMP v1 & v2 Community Groups To configure the SNMP v1 & v2 community groups to make the SNMP feature more secure, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: snmp-server enable snmp-server community get <1 -256 characters> snmp-server community set <1 -256 characters>...
When an end device is initially connected to a port on the EtherWAN switch where the 802.1X protocol is enabled on the port, the switch will only pass 802.1X authentication traffic (known as EAPOL traffic) on that port between the Supplicant on the end device and the server, and will not allow any other traffic to pass.
Figure 123: Enable Radius Adding a Radius Server Next, you will need to configure the settings that the switch will need in order to connect to a RADIUS server. 1. Click on the Add Radius button (see above). 2. Next, enter the IP address of the RADIUS server that the switch will use in order to authenticate in the entry field next to Radius Server IP (see Figure 124).
Figure 124: Radius Setup Figure 125: Resulting Radius Server Setup Enabling 802.1X on a Port After the 802.1X port based security is enabled globally, you must enable it locally on the port. To navigate to the 802.1X / Port Authentication page: 1.
3. Next, make sure that the choice Auto is selected in the drop-down list next to Port Control; this will allow the port to use 802.1X to authenticate the end station. a. If you choose to have the port to be always unauthorized or to be always authorized, you can choose the appropriate choice in the drop-down list.
Enabling TACACS+ To enable TACACS+, set the Authorization State to Enable, and click Update Setting. Figure 127: Enabling TACACS+ Adding a TACACS+ Server Next, you will need to configure the switch to connect to a TACACS+ server. Setting a TACACS+ server to “primary” means that it will be the first server contacted when the switch tries to create a TACACS+ session.
Figure 128: TACACS+ Setup AAA/802.1x Configuration Using the CLI For more information on CLI command usage see CLI Command Usage. View RADIUS Status Use the CLI commands below to view RADIUS statuses: CLI Command Mode: User Exec Mode CLI Command Syntax: show dot1x show dot1x all show dot1x diagnostics interface <ifname>...
CLI Command Syntax: (no) tacplus-server host hostname | IP address <key string> <timeout 1-1000> <port portnumber> <primary | inactive> Usage Example – Setting up a primary TACACS+ server with IP address 192.168.200.1 and secret key of “password1234” and a timeout of 3 minutes (180 seconds): switch_a>enable switch_a#configure terminal switch_a(config)#aaa authentication login tacplus...
3. Save the configuration (see the Save Configuration Page) Global TLV Setting The global TLV (Time – Length – Value) settings are advertised by the switch to other LLDP devices. The TLVs supported by the EtherWAN Managed Switch are (see Figure 129): Port Description ...
Page 230
Maximum Frame Size To enable specific TLVs for the EtherWAN Managed Switch: 1. Select the check box for each TLV that is to be enabled or select the checkbox for the All option which will enable all TLVs for the switch.
LLDP Ports Settings LLDP Ports Settings allows the individual ports on the switch to be configured for LLDP independently of one another. Each port can be configured to transmit LLDP information, receive LLDP information, and notify (via SNMP or Syslog) if there are changes in the LLDP information received from neighboring devices.
LLDP Neighbors LLDP Neighbors is a read-only page (see Figure 131) that will display all the LLDP capable devices detected by the switch. The following information about connected LLDP-enabled devices is displayed in a tabular format. The columns displayed are: ...
LLDP Statistics This is a read-only page (see Figure 132) that displays LLDP device statistics and LLDP statistics on a per-port basis. The information collected on this page includes: Port – switch port number. TX Total – Total LLDP packets sent. ...
LLDP Configuration Examples Using CLI Commands For more information on CLI command usage see CLI Command Usage. Enable/Disable LLDP To enable or disable LLDP on the EtherWAN Managed Switch use the CLI commands below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: lldp enable no lldp enable Usage Example –...
port-and-protocol Port And Protocol VLAN ID vlan-name VLAN Name protocol-identity Protocol Identity link-aggregation (Link Aggregation max-frame Maximum Frame Size Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)# lldp tlv-global mgmt-addrs switch_a(config)#q switch_a# Enabling LLDP Transmit on a Port To enable LLDP Transmit for a port use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: lldp tx-pkt Usage Example:...
switch_a(config)#q switch_a# Enabling Specific TLV’s on a Port To enable specific TLVs on a port use the CLI commands below: CLI Command Mode: Interface Configuration Mode CLI Command Syntax: lldp tlv-select <TLV ID> (see TLV Parameters on page 236) Usage Example: switch_a>enable switch_a#configure terminal switch_a#interface fe1...
OTHER PROTOCOLS GVRP Defined in IEEE 802.1Q, GVRP is a protocol used to dynamically create VLANs on a switch. Any IEEE 802.1Q compliant switch must implement this protocol. To navigate to the Other Protocols / GVRP page (see Figure 133): 1.
All the member Trunk ports for all the user VLANs have been configured. The GVRP protocol has been globally enabled, and GVRP is locally enabled on the Trunk Ports as well. For the Distribution Switches in the core of the network, below are the minimum requirements: ...
To enable the GVRP protocol globally on an Access Switch (see Figure 135): 1. Under GVRP Global Setting, choose the Enable option from the drop-down list next to GVRP. 2. Click on the Update Setting button. Figure 135: GVRP Configuration Access Switch Enabling the GVRP Protocol at the Port Level To navigate to the Other Protocols / GVRP page (see Figure...
GVRP Configuration Examples Using CLI Commands For more information on CLI command usage see CLI Command Usage. To enable or disable GVRP globally on the EtherWAN switch, use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax:...
Page 244
1 switch_a(config)#q switch_a# To enable or disable GVRP locally on a port on the EtherWAN switch, you must use the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: set port gvrp enable <port id>...
Page 245
CLI Command Syntax: set gvrp applicant state normal <port id> set gvrp applicant state active <port id> Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)# set gvrp applicant state normal fe1 switch_a(config)# set gvrp applicant state active fe1 switch_a(config)#q switch_a# When you enable GVRP on a port, the Registrar is enabled on the port by default. You can enable or disable the GVRP Registrar on a port by issuing the following CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax:...
IGMP Snooping The settings in the IGMP Snooping feature of the EtherWAN switch controls how the switch forwards multicast packets. General Overview The EtherWAN Managed Switch has been outfitted with the IGMP Snooping function in three modes: Disabled: o The switch will forward all multicast packets according to the Forced Forwarding Port setting based on the following rule: ...
Enabling the IGMP Snooping Modes To navigate to the IGMP Snooping page: 1. Click on the + next to Other Protocols. 2. Click on IGMP Snooping. To put the IGMP Snooping feature in the correct Mode, follow the steps below: ...
2. From the dropdown list next to IGMP Version, choose the correct IGMP version to be run on this VLAN. This setting must match the IGMP version being used by the IGMP querier and the IGMP client on the network. 3.
Figure 139: IGMP Passive Mode 1. From the dropdown list next to VLAN ID, choose the VLAN for which you wish to configure the Report Suppression feature. 2. Choose Enable or Disable in the dropdown list next to Report Suppression. (Note: if the switch is not in Passive mode, then this feature will have no effect.) Note: If you are using IGMP version 1 or 2, the Query Interval, and the Max Response Time setting must be configured even if you are not configuring IGMP Querier...
1. Click on the + next to Other Protocols. 2. Click on IGMP Snooping. With IGMP enabled, the EtherWAN switch will transmit all multicast packets to their only multicast receiver ports. However, some multicast packets will not have any known multicast receiver ports either due to IGMP Snooping being disabled on the switch, or because no multicast receiver has sent IGMP requests for these multicast packets.
Page 251
Passive Mode Forwarding Port section of the IGMP Snooping configuration page to control how the switch will forward these unknown multicast packets under different IGMP Snooping modes of the switch (see Figure 141). Disabled Mode Forwarding Port Configuration When IGMP is in Disabled Mode, all multicast packets are unknown multicast packets, and by default all unknown multicast packets are forwarded to all the ports of the switch.
Page 252
1. Under the Passive Mode Forwarding Port section, select the PassiveForwardMode radio button. 2. Select the checkbox under the ports that you would like to have the unknown multicast packets forwarded to. 3. Click on the “Update Setting” button. Note: The presence of an IGMP Querier port will make the settings provided by the PassiveForwardMode to have no effect, and all unknown multicast packets will be forwarded to the IGMP Querier port only.
Page 253
Figure 143: ForceForwardMode IGMP Querier Mode Forwarding Port Configuration To configure how the switch forwards unknown multicast packets when the switch is in IGMP Querier mode, follow the below instructions: 1. Under the Passive Mode Forwarding Port section, select the ForceForwardMode radio button 2.
Figure 144: IGMP Querier Mode Forwarding Monitoring Registered Multicast Groups To navigate to the Multicast Current Table page: 1. Click on the + next to Other Protocols. 2. Click on IGMP Snooping. 3. Click on the Multicast Current Table link at the top of the page. When the switch is in IGMP Passive or IGMP Querier mode, registered Multicast Groups can be monitored on each port, as well as the location of the IGMP Querier port (see Figure...
Figure 145: Current Multicast Groups IGMP Configuration Examples Using CLI Commands For more information on CLI command usage see CLI Command Usage. To put the IGMP Snooping feature in Disabled Mode use the CLI commands below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: no ip igmp snooping Usage Example: switch_a>enable...
Page 256
To put the IGMP Snooping feature in Passive Mode use the CLI commands below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ip igmp snooping enable no ip igmp snooping querier Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#ip igmp snooping enable switch_a(config)#no ip igmp snooping querier switch_a(config)#q switch_a#...
Page 257
Usage Example: switch_a>enable switch_a#configure terminal switch_a(config)#interface vlan1.1 switch_a(config-if)#ip igmp version 2 switch_a(config-if)#q switch_a(config)# To enable or disable the IGMP fast-leave feature on a VLAN, use the CLI commands below: CLI Command Mode: VLAN Interface Configuration Mode CLI Command Syntax: ip igmp snooping fast-leave no ip igmp snooping fast-leave Usage Example - Enabling the IGMP fast-leave feature: switch_a>enable...
Page 258
Usage Example - Enabling the IGMP Report Suppression feature: switch_a>enable switch_a#configure terminal switch_a(config)#interface vlan1.1 switch_a(config-if)# ip igmp snooping report-suppression switch_a(config-if)#q switch_a(config)# Usage Example - Disabling the IGMP Report Suppression feature: switch_a>enable switch_a#configure terminal switch_a(config)#interface vlan1.1 switch_a(config-if)#no ip igmp snooping report-suppression switch_a(config-if)#q switch_a(config)# To configure the IGMP query-interval, and the max-response-time settings per VLAN, use...
Page 259
switch_a(config-if)#q switch_a(config)# To control how the switch forwards unknown multicast packets when the switch is in IGMP Disabled mode, follow the instructions below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ip igmp snooping passive-forward all ip igmp snooping passive-forward none ip igmp snooping passive-forward <ifname>,<ifname>,<ifname>...
Page 260
Usage Example - Flood all unknown multicast packets: switch_a>enable switch_a#configure terminal switch_a(config)# ip igmp snooping passive-forward all switch_a(config)#q switch_a# Usage Example - Drop all unknown multicast packets: switch_a>enable switch_a#configure terminal switch_a(config)# ip igmp snooping passive-forward none switch_a(config)#q switch_a# Usage Example - Forward unknown multicast packets to the specified ports only: switch_a>enable switch_a#configure terminal switch_a(config)# ip igmp snooping passive-forward fe1,fe2,fe3...
Page 261
Usage Example - Drop all unknown multicast packets: switch_a>enable switch_a#configure terminal switch_a(config)# ip igmp snooping force-forward none switch_a(config)#q switch_a# Usage Example - Forward unknown multicast packets to the specified ports only: switch_a>enable switch_a#configure terminal switch_a(config)# ip igmp snooping force-forward fe1,fe2,fe3 switch_a(config)#q switch_a# To control how the switch will forward unknown multicast packets when the switch is in...
Usage Example - Forward unknown multicast packets to the specified ports only: switch_a>enable switch_a#configure terminal switch_a(config)# ip igmp snooping force-forward fe1,fe2,fe3 switch_a(config)#q switch_a# Network Time Protocol (NTP) NTP or Network Time Protocol is a useful tool designed to update your switch with the most accurate time available from a user specified time source.
2. Click on the Update Setting button Setting the NTP Server IP Address To provide a time source for the NTP client, follow the steps below: 1. Enter an IP address or host name in the NTP Server text box. 2.
Figure 146: NTP Settings Daylight Savings Time - Weekday Mode To adjust the switch’s clock for Daylight Savings Time using the weekday mode, follow the steps below: 1. Select the option Weekday from the Daylight Saving Mode dropdown box. 2. Enter the value for the time offset in the Time Set Offset textbox. 3.
Figure 147: Daylight Savings – Weekday Mode Daylight Savings Time – Date Mode To adjust the switch’s clock for Daylight Savings Time using the date mode, follow the steps below: 1. Select the option Date from the Daylight Saving Mode dropdown box. 2.
To set the NTP server on the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ntp server <IP Address or Host Name of NTP Server> EX78000 Managed Switch Users Guide...
Page 267
192.168.1.126 switch_a(config)#q switch_a# To set the NTP polling interval on the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: ntp polling-interval <time in minutes, 1-10080> Usage Example: switch_a>enable...
Page 268
CDT -6:00 switch_a(config)#q switch_a# To set the Daylight Savings Time settings using weekday mode for the EtherWAN Managed Switch, use the CLI commands below: CLI Command Mode: Global Configuration Mode CLI Command Syntax: clock summer-time <Name of Time Zone> weekday <start week number> <start day>...
To navigate to the Other Protocols / GMRP page: 1. Click on the + next to Other Protocols. 2. Click on GMRP. General Overview The ports on the EtherWAN switch can be configured with the GMRP feature in five modes: Disabled ...
GMRP Forbidden mode When a port is put in GMRP Forbidden mode, all multicast groups will be deregistered on that port and that port will not be accepting any further multicast group registrations. However, the switch will still be propagating all the registered multicast groups on the switch to the neighbor switch residing on that port.
Figure 149: GMRP Global Setting Configuring the GMRP Feature Per Port To navigate to the Other Protocols / GMRP page: 1. Click on the + next to Other Protocols. 2. Click on GMRP. GMRP should be enabled on all the ports that could be a potential source of multicast traffic, and on the ports that are connected to multicast clients.
Page 272
Click on the Update Setting button. To allow a port to dynamically receive GMRP multicast group registrations and then make the multicast packets that belong to these multicast groups constantly available on this port, configure the items listed below: ...
1 switch_a(config)# set gmrp disable bridge 1 switch_a(config)#q switch_a# To enable GMRP locally on a port on the EtherWAN switch, you must use the below CLI commands: CLI Command Mode: Global Configuration Mode CLI Command Syntax: set port gmrp enable <port id>...
Page 274
switch_a(config)# set port gmrp enable fe1 switch_a(config)# set port gmrp disable fe1 switch_a(config)#q switch_a# When you enable GMRP on a port, the Registrar is in Normal mode by default. The GMRP Registrar on a port can be configured in 3 different modes by issuing the following CLI commands CLI Command Mode: Global Configuration Mode CLI Command Syntax:...
DNS servers. General Overview The EtherWAN switch can function as a DHCP server for a single VLAN (it can be any VLAN) on the switch. When functioning as a DHCP server, the EtherWAN switch can be configured with a range of IP addresses, default gateway and DNS servers, which will allow...
Page 276
To set the DHCP server parameters: 1. From the drop-down list next to DHCP Server Status, select the VLAN that will get the DHCP provided TCP/IP Parameters. 2. Enter the starting and ending IP addresses for the DHCP Client IP address range, in the text boxes next to Start IP and End IP.
Page 277
To check what IP addresses has been allocated to which DHCP clients: 1. Click on the DHCP Binding Table link (see Figure 151) 2. Click on the DHCP General Setting link to get back to the previous DHCP configuration Web GUI page (see Figure 152).
DHCP Configuration Examples Using CLI Commands For more information on CLI command usage see CLI Command Usage. To set the DHCP server parameters: CLI Command Mode: Global Configuration Mode CLI Command Syntax: dhcp-server range <start IP> <end IP> dhcp-server subnet-mask <subnet mask in doted decimal notation> dhcp-server gateway <IP address>...
DHCP Relay General Overview The DHCP relay function on an EtherWAN Switch forwards DHCP packets between clients and servers. This function is used to forward requests and replies between clients and servers when they are not on the same physical subnet.
To set the DHCP Relay parameters: 1. Set the DHCP Relay Status to Enable or Disable 2. Set the Remote ID TYPE to IP-ADDRESS or MAC-ADDRESS 3. Set the Server IP Address to the IP address of your DHCP Server 4.
Page 281
Usage Example: switch_a> enable switch_a#configure terminal switch_a(config)#dhcprelay enable switch_a(config)#write memory switch_a(config)#q switch_a# To set the DHCP Relay Remote ID TYPE: CLI Command Mode: Global Configuration Mode CLI Command Syntax: dhcprelay remote-id <ip-address|mac-address> Usage Example 1: switch_a> enable switch_a#configure terminal switch_a(config)#dhcprelay remote-id ip-address switch_a(config)#write memory switch_a(config)#q switch_a#...
Page 284
• Link Aggregation ◦ Static Trunk (2 groups, support MAC base) ◦ IEEE802.3ad Link Aggregation Control Protocol • IGMP Snooping ◦ IGMP snooping v1/v2/v3 Technology Standards • IEEE802.3 10BASE-T • IEEE802.3u 100BASE-TX/100BASE-FX • IEEE802.3ab 1000BASE-T • IEEE802.3z 1000BASE-SX/1000BASE-LX • IEEE802.3x Full duplex and flow control •...
Page 285
Protection • Reverse polarity protection Mechanical Casing • Metal Case • IP30 Dimensions • 71.4 x 140 x 170mm (W x D x H) (2.85" x 5.6" x 6.8") Weight • 1.7Kg (3.74lbs.) Installation • Din-Rail Interface Ethernet Port • 10/100BASE-TX (PoE): 8 or 4 ports •...
Page 286
EN 61000-6-2 • EN 61000-4-2 (ESD Standards) • EN 61000-4-3 (Radiated RFI Standards) • EN 61000-4-4 (Burst Standards) • EN 61000-4-5 (Surge Standards) Lines to ground: 2KV • EN 61000-4-6 (Induced RFI Standards) • EN 61000-4-8 (Magnetic Field Standards) Environmental Test Compliance IEC 60068-2-6 Fc (Vibration) IEC 60068-2-27 Ea (Shock) FED STD 101C Method 5007.1 (Free fall w/package)
Tel: +886 -2- 6629-8986 Email: info@etherwan.com.tw EtherWAN has made a good faith effort to ensure the accuracy of the information in this document and disclaims the implied warranties of merchantability and fitness for a particular purpose, and makes no express warranties, except as may be stated in its written agreement with and for its customers.
Need help?
Do you have a question about the EX78000 Series and is the answer not in the manual?
Questions and answers