10/100 16/24-port unmanaged fast ethernet switch (22 pages)
Summary of Contents for LG-Ericsson iPECS ES-4550G
Page 1
UIDE User Manual ES-4550G / ES-4526G Managed Layer 3 Stackable GE Switch...
Page 2
ANUAL ES-4500G Series ES-4550G M 48-P L3 S GE S ANAGED TACKABLE WITCH Layer 3 Stackable Gigabit Ethernet Switch with 44 10/100/1000BASE-T (RJ-45) Ports, 4 Gigabit Combination Ports (RJ-45/SFP), 2 10-Gigabit Extender Module Slots, and 2 Stacking Ports ES-4526G M 24-P L3 S GE S...
AUTION damage the system or equipment. Alerts you to a potential hazard that could cause personal injury. ARNING LG-Ericsson reserves the right to change specifications at any time without OTICE OF HANGES notice. The following publication details the hardware features of the switch,...
Page 4
BOUT UIDE ES-4500G Series This section summarizes the changes in each revision of this guide. EVISION ISTORY 2011 R PRIL EVISION This is the first version of this guide. This guide is valid for software release v1.2.2.0. – 4 –...
ONTENTS ES-4500G Series BOUT UIDE ONTENTS IGURES ABLES ECTION ETTING TARTED NTRODUCTION Key Features Description of Software Features System Defaults NITIAL WITCH ONFIGURATION Connecting to the Switch Configuration Options Required Connections Remote Connections Basic Configuration Console Connection Setting Passwords Setting an IP Address Enabling SNMP Management Access Managing System Files Saving or Restoring Configuration Settings...
Page 6
ONTENTS ES-4500G Series Configuration Options Panel Display Main Menu ASIC ANAGEMENT ASKS Displaying System Information Displaying Switch Hardware/Software Versions Configuring Support for Jumbo Frames Displaying Bridge Extension Capabilities Managing System Files Copying Files via FTP/TFTP or HTTP Saving the Running Configuration to a Local File Setting The Start-Up File Showing System Files Setting the System Clock...
Page 7
ONTENTS ES-4500G Series Displaying LACP Settings and Status for the Local Side Displaying LACP Settings and Status for the Remote Side Sampling Traffic Flows Configuring sFlow Parameters Traffic Segmentation Enabling Traffic Segmentation Configuring Uplink and Downlink Ports VLAN Trunking 6 VLAN C ONFIGURATION IEEE 802.1Q VLANs Configuring VLAN Groups...
Page 8
ONTENTS ES-4500G Series Configuring Interface Settings for STA Displaying Interface Settings for STA Configuring Multiple Spanning Trees Configuring Interface Settings for MSTP IMIT ONFIGURATION 10 S TORM ONTROL ONFIGURATION 11 C LASS OF ERVICE Layer 2 Queue Settings Setting the Default Priority for Interfaces Selecting the Queue Mode Mapping CoS Values to Egress Queues Layer 3/4 Priority Settings...
Page 9
ONTENTS ES-4500G Series Network Access (MAC Address Authentication) Configuring Global Settings for Network Access Configuring Network Access for Ports Configuring Port Link Detection Configuring a MAC Address Filter Displaying Secure MAC Address Information Configuring HTTPS Configuring Global Settings for HTTPS Replacing the Default Secure-site Certificate Configuring the Secure Shell Configuring the SSH Server...
Page 10
ONTENTS ES-4500G Series IP Source Guard Configuring Ports for IP Source Guard Configuring Static Bindings for IP Source Guard Displaying Information for Dynamic IP Source Guard Bindings DHCP Snooping DHCP Snooping Configuration DHCP Snooping VLAN Configuration Configuring Ports for DHCP Snooping Displaying DHCP Snooping Binding Information 15 B ASIC...
Page 11
ONTENTS ES-4500G Series 16 M ULTICAST ILTERING Overview IGMP Protocol Layer 2 IGMP (Snooping and Query) Configuring IGMP Snooping and Query Parameters Specifying Static Interfaces for a Multicast Router Assigning Interfaces to Multicast Services Setting IGMP Snooping Status per Interface Filtering IGMP Query Packets and Multicast Data Displaying Multicast Groups Discovered by IGMP Snooping Filtering and Throttling IGMP Groups...
Page 12
ONTENTS ES-4500G Series 18 G IP R ENERAL OUTING Overview Initial Configuration IP Routing and Switching Routing Path Management Routing Protocols Configuring IP Routing Interfaces Configuring Local and Remote Interfaces Using the Ping Function Using the Trace Route Function Address Resolution Protocol Basic ARP Configuration Configuring Static ARP Addresses Displaying Dynamic or Local ARP Entries...
Page 13
ONTENTS ES-4500G Series Specifying The Target Server or Subnet 21 U NICAST OUTING Overview Configuring the Routing Information Protocol Configuring General Protocol Settings Clearing Entries from the Routing Table Specifying Network Interfaces Specifying Passive Interfaces Specifying Static Neighbors Configuring Route Redistribution Specifying an Administrative Distance Configuring Network Interfaces for RIP Displaying RIP Interface Settings...
Page 14
ONTENTS ES-4500G Series Configuring PIM for IPv4 Enabling PIM Globally Configuring PIM Interface Settings Displaying Neighbor Information Configuring Global PIM-SM Settings Configuring a BSR Candidate Configuring a Static Rendezvous Point Configuring an RP Candidate Displaying the BSR Router Displaying RP Mapping Configuring PIMv6 for IPv6 Enabling PIM Globally Configuring PIM Interface Settings...
Page 15
ONTENTS ES-4500G Series reload (Global Configuration) enable quit show history configure disable reload (Privileged Exec) show reload exit 25 S YSTEM ANAGEMENT OMMANDS Device Designation hostname switch all renumber System Status show access-list tcam-utilization show memory show process cpu show running-config show startup-config show system show tech-support...
Page 16
ONTENTS ES-4500G Series databits exec-timeout login parity password password-thresh silent-time speed stopbits timeout login response disconnect show line Event Logging logging facility logging history logging host logging on logging trap clear log show log show logging SMTP Alerts logging sendmail logging sendmail host logging sendmail level logging sendmail destination-email...
Page 17
ONTENTS ES-4500G Series Time Range time-range absolute periodic show time-range 26 SNMP C OMMANDS snmp-server snmp-server community snmp-server contact snmp-server location show snmp snmp-server enable traps snmp-server host snmp-server engine-id snmp-server group snmp-server user snmp-server view show snmp engine-id show snmp group show snmp user show snmp view snmp-server notify-filter...
Page 19
ONTENTS ES-4500G Series accounting dot1x accounting exec authorization exec show accounting Web Server ip http port ip http server ip http secure-server ip http secure-port Telnet Server ip telnet max-sessions ip telnet port ip telnet server show ip telnet Secure Shell ip ssh authentication-retries ip ssh server ip ssh server-key size...
Page 20
ONTENTS ES-4500G Series dot1x timeout re-authperiod dot1x timeout supp-timeout dot1x timeout tx-period dot1x re-authenticate show dot1x Management IP Filter management show management 30 G ENERAL ECURITY EASURES Port Security mac-learning port security Network Access (MAC Address Authentication) network-access aging network-access mac-filter mac-authentication reauth-time network-access dynamic-qos network-access dynamic-vlan...
Page 21
ONTENTS ES-4500G Series web-auth web-auth re-authenticate (Port) web-auth re-authenticate (IP) show web-auth show web-auth interface show web-auth summary DHCP Snooping ip dhcp snooping ip dhcp snooping database flash ip dhcp snooping information option ip dhcp snooping information policy ip dhcp snooping verify mac-address ip dhcp snooping vlan ip dhcp snooping trust clear ip dhcp snooping database flash...
Page 22
ONTENTS ES-4500G Series 31 A CCESS ONTROL ISTS IPv4 ACLs access-list ip permit, deny (Standard IP ACL) permit, deny (Extended IPv4 ACL) ip access-group show ip access-group show ip access-list IPv6 ACLs access-list ipv6 permit, deny (Standard IPv6 ACL) permit, deny (Extended IPv6 ACL) show ipv6 access-list ipv6 access-group show ipv6 access-group...
Page 23
ONTENTS ES-4500G Series shutdown speed-duplex switchport mtu switchport packet-rate clear counters show interfaces counters show interfaces status show interfaces switchport show interfaces transceiver test cable-diagnostics dsp test loop internal show cable-diagnostics dsp show loop internal 33 L GGREGATION OMMANDS channel-group lacp lacp admin-key (Ethernet Interface) lacp port-priority...
Page 26
ONTENTS ES-4500G Series Displaying VLAN Information show vlan Configuring IEEE 802.1Q Tunneling dot1q-tunnel system-tunnel-control switchport dot1q-tunnel mode switchport dot1q-tunnel service match cvid switchport dot1q-tunnel tpid show dot1q-tunnel Configuring Port-based Traffic Segmentation traffic-segmentation show traffic-segmentation Configuring Private VLANs private-vlan private vlan association switchport mode private-vlan switchport private-vlan host-association switchport private-vlan mapping...
Page 27
ONTENTS ES-4500G Series switchport voice vlan security show voice vlan 40 C LASS OF ERVICE OMMANDS Priority Commands (Layer 2) queue cos-map queue mode queue weight switchport priority default show queue cos-map show queue mode show queue weight Priority Commands (Layer 3 and 4) map ip dscp (Global Configuration) map ip port (Global Configuration) map ip precedence (Global Configuration)
Page 28
ONTENTS ES-4500G Series 42 M ULTICAST ILTERING OMMANDS IGMP Snooping ip igmp snooping ip igmp snooping proxy-reporting ip igmp snooping querier ip igmp snooping router-alert-option-check ip igmp snooping router-port-expire-time ip igmp snooping tcn-flood ip igmp snooping tcn-query-solicit ip igmp snooping unregistered-data-flood ip igmp snooping unsolicited-report-interval ip igmp snooping version ip igmp snooping version-exclusive...
Page 29
ONTENTS ES-4500G Series ip igmp query-drop 1014 ip multicast-data-drop 1015 show ip igmp filter 1015 show ip igmp profile 1016 show ip igmp query-drop 1016 show ip igmp throttle interface 1017 show ip multicast-data-drop 1018 Multicast VLAN Registration 1019 1019 mvr upstream-source-ip 1020 mvr immediate-leave...
Page 30
ONTENTS ES-4500G Series clear ipv6 mld group 1044 show ipv6 mld groups 1044 show ipv6 mld interface 1046 MLD Proxy Routing 1046 ipv6 mld proxy 1047 ipv6 mld proxy unsolicited-report-interval 1048 43 LLDP C 1049 OMMANDS lldp 1050 lldp holdtime-multiplier 1050 lldp notification-interval 1051...
Page 31
ONTENTS ES-4500G Series ip name-server 1071 ipv6 host 1072 clear dns cache 1072 clear host 1073 show dns 1073 show dns cache 1074 show hosts 1074 45 DHCP C 1077 OMMANDS DHCP Client 1077 ip dhcp client class-id 1078 ip dhcp restart client 1078 ipv6 dhcp client rapid-commit vlan 1079...
Page 32
ONTENTS ES-4500G Series vrrp ip 1096 vrrp preempt 1097 vrrp priority 1098 vrrp timers advertise 1099 clear vrrp interface counters 1100 clear vrrp router counters 1100 show vrrp 1100 show vrrp interface 1102 show vrrp interface counters 1103 show vrrp router counters 1104 47 IP I 1105...
Page 33
ONTENTS ES-4500G Series show ipv6 interface 1127 show ipv6 mtu 1129 show ipv6 traffic 1130 clear ipv6 traffic 1134 ping6 1135 ipv6 neighbor 1136 ipv6 hop-limit 1137 ipv6 nd dad attempts 1138 ipv6 nd ns-interval 1139 ipv6 nd reachable-time 1140 clear ipv6 neighbors 1141 show ipv6 neighbors...
Page 34
ONTENTS ES-4500G Series passive-interface 1165 redistribute 1166 timers basic 1167 version 1168 ip rip authentication mode 1169 ip rip authentication string 1170 ip rip receive version 1170 ip rip receive-packet 1171 ip rip send version 1172 ip rip send-packet 1173 ip rip split-horizon 1173 clear ip rip route...
Page 35
ONTENTS ES-4500G Series ip ospf message-digest-key 1200 ip ospf priority 1201 ip ospf retransmit-interval 1202 ip ospf transmit-delay 1203 passive-interface 1204 show ip ospf 1204 show ip ospf border-routers 1206 show ip ospf database 1207 show ip ospf interface 1213 show ip ospf neighbor 1215 show ip ospf route...
Page 36
ONTENTS ES-4500G Series show ipv6 ospf interface 1241 show ipv6 ospf neighbor 1242 show ipv6 ospf route 1243 show ipv6 ospf virtual-links 1244 49 M 1245 ULTICAST OUTING OMMANDS General Multicast Routing 1245 ip multicast-routing 1245 show ip mroute 1246 ipv6 multicast-routing 1248 show ipv6 mroute...
Page 37
ONTENTS ES-4500G Series ip pim join-prune-interval 1272 clear ip pim bsr rp-set 1273 show ip pim bsr-router 1273 show ip pim rp mapping 1274 show ip pim rp-hash 1275 IPv6 PIM Commands 1276 router pim6 1276 ipv6 pim dense-mode 1277 ipv6 pim graft-retry-interval 1278 ipv6 pim hello-holdtime...
IGURES ES-4500G Series Figure 1: Home Page Figure 2: Front Panel Indicators Figure 3: System Information Figure 4: General Switch Information Figure 5: Configuring Support for Jumbo Frames Figure 6: Displaying Bridge Extension Configuration Figure 7: Copy Firmware Figure 8: Saving the Running Configuration Figure 9: Setting Start-Up Files Figure 10: Displaying System Files Figure 11: Manually Setting the System Clock...
Page 40
IGURES ES-4500G Series Figure 32: Performing Cable Tests Figure 33: Configuring Static Trunks Figure 34: Creating Static Trunks Figure 35: Adding Static Trunks Members Figure 36: Configuring Connection Parameters for a Static Trunk Figure 37: Displaying Connection Parameters for Static Trunks Figure 38: Configuring Dynamic Trunks Figure 39: Configuring the LACP Aggregator Admin Key Figure 40: Enabling LACP on a Port...
Page 41
IGURES ES-4500G Series Figure 68: Showing Associated VLANs Figure 69: Configuring Interfaces for Private VLANs Figure 70: QinQ Operational Concept Figure 71: Enabling QinQ Tunneling Figure 72: Adding an Interface to a QinQ Tunnel Figure 73: Configuring Protocol VLANs Figure 74: Displaying Protocol VLANs Figure 75: Assigning Interfaces to Protocol VLANs Figure 76: Showing the Interface to Protocol Group Mapping Figure 77: Configuring IP Subnet VLANs...
Page 42
IGURES ES-4500G Series Figure 104: Configuring MSTP Interface Settings Figure 105: Displaying MSTP Interface Settings Figure 106: Configuring Rate Limits Figure 107: Configuring Storm Control Figure 108: Setting the Default Port Priority Figure 109: Setting the Queue Mode (Strict) Figure 110: Setting the Queue Mode (WRR) Figure 111: Setting the Queue Mode (Strict and WRR) Figure 112: Mapping CoS Values to Egress Queues Figure 113: Mapping IP DSCP Priority Values...
Page 43
IGURES ES-4500G Series Figure 140: Configuring AAA Accounting Service for Exec Service Figure 141: Displaying a Summary of Applied AAA Accounting Methods Figure 142: Displaying Statistics for AAA Accounting Sessions Figure 143: Configuring AAA Authorization Methods Figure 144: Showing AAA Authorization Methods Figure 145: Configuring AAA Authorization Methods for Exec Service Figure 146: Displaying the Applied AAA Authorization Method Figure 147: Configuring User Accounts...
Page 44
IGURES ES-4500G Series Figure 176: Configuring a ARP ACL Figure 177: Binding a Port to an ACL Figure 178: Configuring Global Settings for ARP Inspection Figure 179: Configuring VLAN Settings for ARP Inspection Figure 180: Configuring Interface Settings for ARP Inspection Figure 181: Displaying Statistics for ARP Inspection Figure 182: Displaying the ARP Inspection Log Figure 183: Creating an IP Address Filter for Management Access...
Page 45
IGURES ES-4500G Series Figure 212: Configuring a Remote Engine ID for SNMP Figure 213: Showing Remote Engine IDs for SNMP Figure 214: Creating an SNMP View Figure 215: Showing SNMP Views Figure 216: Adding an OID Subtree to an SNMP View Figure 217: Showing the OID Subtree Configured for SNMP Views Figure 218: Creating an SNMP Group Figure 219: Showing SNMP Groups...
Page 46
IGURES ES-4500G Series Figure 248: Showing Current Interfaces Assigned to a Multicast Service Figure 249: Configuring IGMP Snooping on an Interface Figure 250: Showing Interface Settings for IGMP Snooping Figure 251: Dropping IGMP Query or Multicast Data Packets Figure 252: Showing Multicast Groups Learned by IGMP Snooping Figure 253: Enabling IGMP Filtering and Throttling Figure 254: Creating an IGMP Filtering Profile Figure 255: Showing the IGMP Filtering Profiles Created...
Page 47
IGURES ES-4500G Series Figure 284: Showing IPv6 Statistics (UDP) Figure 285: Showing Reported MTU Values Figure 286: Virtual Interfaces and Layer 3 Routing Figure 287: Pinging a Network Device Figure 288: Tracing the Route to a Network Device Figure 289: Proxy ARP Figure 290: Configuring General Settings for ARP Figure 291: Configuring Static ARP Entries Figure 292: Displaying Static ARP Entries...
Page 48
IGURES ES-4500G Series Figure 320: Configuring DHCP Relay Service Figure 321: DHCP Server Figure 322: Enabling the DHCP Server Figure 323: Configuring Excluded Addresses on the DHCP Server Figure 324: Showing Excluded Addresses on the DHCP Server Figure 325: Configuring DHCP Server Address Pools (Network) Figure 326: Configuring DHCP Server Address Pools (Host) Figure 327: Showing Configured DHCP Server Address Pools Figure 328: Shows Addresses Assigned by the DHCP Server...
Page 49
IGURES ES-4500G Series Figure 356: Showing OSPF Process Identifiers Figure 357: AS Boundary Router Figure 358: Configure General Settings for OSPF Figure 359: Showing General Settings for OSPF Figure 360: Adding an NSSA or Stub Figure 361: Showing NSSAs or Stubs Figure 362: OSPF NSSA Figure 363: Configuring Protocol Settings for an NSSA...
Page 50
IGURES ES-4500G Series Figure 392: Showing PIM Neighbors Figure 393: Configuring Global Settings for PIM-SM Figure 394: Configuring a BSR Candidate Figure 395: Configuring a Static Rendezvous Point Figure 396: Showing Static Rendezvous Points Figure 397: Configuring an RP Candidate Figure 398: Showing Settings for an RP Candidate Figure 399: Showing Information About the BSR Figure 400: Showing RP Mapping...
ABLES ES-4500G Series Table 1: Key Features Table 2: System Defaults Table 3: Web Page Configuration Buttons Table 4: Switch Main Menu Table 5: Port Statistics Table 6: LACP Port Counters Table 7: LACP Internal Configuration Information Table 8: LACP Internal Configuration Information Table 9: Recommended STA Path Cost Range Table 10: Default STA Path Costs Table 11: IEEE 802.1p Egress Queue Priority Mapping...
Page 52
ABLES ES-4500G Series Table 32: VRRP Group Statistics Table 33: OSPF System Information Table 34: General Command Modes Table 35: Configuration Command Modes Table 36: Keystroke Commands Table 37: Command Group Index Table 38: General Commands Table 39: System Management Commands Table 40: Device Designation Commands Table 41: System Status Commands Table 42: Frame Size Commands...
Page 53
ABLES ES-4500G Series Table 68: Web Server Commands Table 69: HTTPS System Support Table 70: Telnet Server Commands Table 71: Secure Shell Commands Table 72: show ssh - display description Table 73: 802.1X Port Authentication Commands Table 74: Management IP Filter Commands Table 75: General Security Commands Table 76: Management IP Filter Commands Table 77: Network Access Commands...
Page 54
ABLES ES-4500G Series Table 104: VLAN Commands Table 105: GVRP and Bridge Extension Commands Table 106: Commands for Editing VLAN Groups Table 107: Commands for Configuring VLAN Interfaces Table 108: Commands for Displaying VLAN Information Table 109: 802.1Q Tunneling Commands Table 110: Commands for Configuring Traffic Segmentation Table 111: Private VLAN Commands Table 112: Protocol-based VLAN Commands...
Page 55
ABLES ES-4500G Series Table 140: show dns cache - display description 1074 Table 141: show hosts - display description 1075 Table 142: DHCP Commands 1077 Table 143: DHCP Client Commands 1077 Table 144: DHCP Relay Commands 1080 Table 145: DHCP Server Commands 1082 Table 146: VRRP Commands 1095...
Page 56
ABLES ES-4500G Series Table 176: show ip ospf - display description 1239 Table 177: show ip ospf database - display description 1240 Table 178: show ip ospf interface - display description 1241 Table 179: show ipv6 ospf neighbor - display description 1243 Table 180: show ip ospf neighbor - display description 1244...
ECTION ES-4500G Series ETTING TARTED This section provides an overview of the switch, and introduces some basic concepts about network switches. It also describes the basic settings required to access the management interface. This section includes these chapters: "Introduction" on page 59 ◆...
Page 58
| Getting Started ECTION ES-4500G Series – 58 –...
NTRODUCTION ES-4500G Series This switch provides a broad range of features for Layer 2 switching and Layer 3 routing. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch. However, there are many options that you should configure to maximize the switch’s performance for your particular network environment.
Page 60
| Introduction HAPTER Key Features ES-4500G Series Table 1: Key Features (Continued) Feature Description Address Table Up to 16K MAC addresses in the forwarding table, 1024 static MAC addresses; Up to 8K IPv4 and 4K IPv6 entries in the host table; 8K entries in the ARP cache, 256 static ARP entries;...
| Introduction HAPTER Description of Software Features ES-4500G Series ESCRIPTION OF OFTWARE EATURES The switch provides a wide range of advanced performance enhancing features. Flow control eliminates the loss of packets due to bottlenecks caused by port saturation. Broadcast storm suppression prevents broadcast traffic storms from engulfing the network.
Page 62
| Introduction HAPTER Description of Software Features ES-4500G Series dynamic configuration of local clients from a DHCP server located in a different network. You can manually configure the speed, duplex mode, and flow control used ONFIGURATION on specific ports, or use auto-negotiation to detect the connection settings used by the attached device.
Page 63
| Introduction HAPTER Description of Software Features ES-4500G Series addresses or source IP/MAC address pairs based on static entries or entries stored in the DHCP Snooping table. The switch supports IEEE 802.1D transparent bridging. The address table IEEE 802.1D B RIDGE facilitates data switching by learning addresses, and then filtering or forwarding traffic based on this information.
Page 64
| Introduction HAPTER Description of Software Features ES-4500G Series The switch supports up to 4093 VLANs. A Virtual LAN is a collection of IRTUAL network nodes that share the same collision domain regardless of their physical location or connection point in the network. The switch supports tagged VLANs based on the IEEE 802.1Q standard.
Page 65
| Introduction HAPTER Description of Software Features ES-4500G Series Differentiated Services (DiffServ) provides policy-based management UALITY OF ERVICE mechanisms used for prioritizing network resources to meet the requirements of specific traffic types on a per-hop basis. Each packet is classified upon entry into the network based on access lists, IP Precedence or DSCP values, or VLAN lists.
Page 66
| Introduction HAPTER Description of Software Features ES-4500G Series The Virtual Router Redundancy Protocol (VRRP) uses a virtual IP address to OUTER EDUNDANCY support a primary router and multiple backup routers. The backups can be configured to take over the workload if the master fails or to load share the traffic.
| Introduction HAPTER System Defaults ES-4500G Series YSTEM EFAULTS The switch’s system defaults are provided in the configuration file “Factory_Default_Config.cfg.” To reset the switch defaults, this file should be set as the startup configuration file. The following table lists some of the basic system defaults. Table 2: System Defaults Function Parameter...
Page 68
| Introduction HAPTER System Defaults ES-4500G Series Table 2: System Defaults (Continued) Function Parameter Default Port Configuration Admin Status Enabled Auto-negotiation Enabled Flow Control Disabled Port Trunking Static Trunks None LACP (all ports) Disabled Congestion Control Rate Limiting Disabled Storm Control Broadcast: Enabled (500 packets/sec) Address Table...
Page 69
| Introduction HAPTER System Defaults ES-4500G Series Table 2: System Defaults (Continued) Function Parameter Default IP Settings Management. VLAN Any VLAN configured with an IP address IP Address DHCP assigned Default Gateway 0.0.0.0 DHCP Client: Enabled Relay: Disabled Server: Disabled Client/Proxy service: Disabled BOOTP Disabled...
Page 70
| Introduction HAPTER System Defaults ES-4500G Series – 70 –...
NITIAL WITCH ONFIGURATION ES-4500G Series This chapter includes information on connecting to the switch and basic configuration procedures. ONNECTING TO THE WITCH The switch includes a built-in network management agent. The agent offers a variety of management options, including SNMP, RMON and a web- based interface.
| Initial Switch Configuration HAPTER Connecting to the Switch ES-4500G Series Control port access through IEEE 802.1X security or static address ◆ filtering Filter packets using Access Control Lists (ACLs) ◆ Configure up to 4093 IEEE 802.1Q VLANs ◆ Enable GVRP automatic VLAN registration ◆...
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series Set flow control to none. ■ Set the emulation mode to VT100. ■ When using HyperTerminal, select Terminal keys, not Windows ■ keys. Once you have set up the terminal correctly, the console login screen will be displayed.
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series information and use basic utilities. To fully configure the switch parameters, you must access the CLI at the Privileged Exec level. Access to both CLI levels are controlled by user names and passwords. The switch has a default user name and password for each level.
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series You must establish IP address information for the stack to obtain ETTING AN management access through the network. This can be done in either of the DDRESS following ways: Manual — You have to input the information, including IP address and ◆...
Page 76
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series To set the IP address of the default gateway for the network to which the switch belongs, type “ip default-gateway gateway,” where “gateway” is the IP address of the default gateway. Press <Enter>. Console(config)#interface vlan 1 Console(config-if)#ip address 192.168.1.5 255.255.255.0 Console(config-if)#exit...
Page 77
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series ND DAD is enabled, number of DAD attempts: 1. ND retransmit interval is 1000 milliseconds Console# Address for Multi-segment Network — Before you can assign an IPv6 address to the switch that will be used to connect to a multi-segment network, you must obtain the following information from your network administrator: ◆...
Page 78
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series Global unicast address(es): 2001:DB8:2222:7272::/64, subnet is 2001:DB8:2222:7272::/64 2005::212:CFFF:FE0B:4600, subnet is :: Joined group address(es): FF02::1:2 FF02::1:FF00:0 FF02::1:FF93:82A0 FF02::1 IPv6 link MTU is 1280 bytes ND DAD is enabled, number of DAD attempts: 2. ND retransmit interval is 1000 milliseconds Console# YNAMIC...
Page 79
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series Then save your configuration changes by typing “copy running-config startup-config.” Enter the startup file name and press <Enter>. Console(config)#interface vlan 1 Console(config-if)#ip address dhcp Console(config-if)#end Console#show ip interface IP address and netmask: 192.168.1.54 255.255.255.0 on VLAN 1, and address mode: DHCP Console#copy running-config startup-config Startup configuration file name []: startup...
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series The switch can be configured to accept management commands from SNMP NABLING Simple Network Management Protocol (SNMP) applications. You can ANAGEMENT CCESS configure the switch to respond to SNMP requests or generate SNMP traps. When SNMP management stations send requests to the switch (either to return information or to set a parameter), the switch provides the requested data or sets the specified parameter.
Page 81
| Initial Switch Configuration HAPTER Basic Configuration ES-4500G Series If you do not intend to support access to SNMP version 1 and 2c clients, we recommend that you delete both of the default community strings. If there are no community strings, then SNMP management access from SNMP v1 and v2c clients is disabled.
| Initial Switch Configuration HAPTER Managing System Files ES-4500G Series For a more detailed explanation on how to configure the switch for access from SNMP v3 clients, refer to "Simple Network Management Protocol" on page 378, or refer to the specific CLI commands for SNMP starting on page 683 ANAGING YSTEM...
| Initial Switch Configuration HAPTER Managing System Files ES-4500G Series Configuration commands only modify the running configuration file and are AVING OR not saved when the switch is rebooted. To save all your configuration ESTORING changes in nonvolatile storage, you must copy the running configuration ONFIGURATION file to the start-up configuration file using the “copy”...
Page 84
| Initial Switch Configuration HAPTER Managing System Files ES-4500G Series Success. Console# – 84 –...
ECTION ES-4500G Series ONFIGURATION This section describes the basic switch features, along with a detailed description of how to configure each feature via a web browser. This section includes these chapters: "Using the Web Interface" on page 87 ◆ "Basic Management Tasks" on page 107 ◆...
Page 86
| Web Configuration ECTION ES-4500G Series "Multicast Filtering" on page 413 ◆ – 86 –...
SING THE NTERFACE ES-4500G Series This switch provides an embedded HTTP web agent. Using a web browser you can configure the switch and view statistics to monitor network activity. The web agent can be accessed by any computer on the network using a standard web browser (Internet Explorer 5.0 or above, Netscape 6.2 or above, or Mozilla Firefox 2.0.0.0 or above).
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series forwarding (i.e., enable Admin Edge Port) to improve the switch’s response time to management commands issued through the web interface. See "Configuring Interface Settings for STA" on page 215.
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Configurable parameters have a dialog box or a drop-down list. Once a ONFIGURATION configuration change has been made on a page, be sure to click on the PTIONS Apply button to confirm the new setting.
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, or monitor network conditions. The following table briefly describes the selections available from this program. Table 4: Switch Main Menu Menu Description...
Page 91
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Cable Test Performs cable diagnostics for selected port to diagnose any cable faults (short, open etc.) and report the cable length Trunk Static Configure Trunk...
Page 92
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page VLAN Virtual LAN Static Creates VLAN groups Show Displays configured VLAN groups Modify Configures group name and administrative status Edit Member by VLAN Specifies VLAN attributes per VLAN Edit Member by Interface...
Page 93
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Show Shows source MAC address to VLAN mapping MAC Address Learning Status Enables MAC address learning on selected interfaces Static Configures static entries in the address table Show...
Page 94
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Queue Sets queue mode for the switch; sets the service weight for each queue that will use a weighted or hybrid mode CoS to Queue Specifies the hardware output queues to use for CoS priority tagged traffic...
Page 95
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Configure Group Specifies a group of authentication servers and sets the priority sequence Show Shows the authentication server groups and priority sequence Accounting Enables accounting of requested services for billing or security purposes...
Page 96
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Link Detection Configures detection of changes in link status, and the response (i.e., send trap or shut down port) Configure MAC Filter Specifies MAC addresses exempt from authentication Show...
Page 97
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Configure Interface Sets the trust mode for ports, and sets the rate limit for packet inspection Show Information Show Statistics Displays statistics on the inspection process Show Log...
Page 98
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Port/Trunk Details Displays detailed information about a remote device connected to this switch Show Device Statistics General Displays statistics for all connected remote devices Port/Trunk Displays statistics for remote devices on a selected port or trunk SNMP...
Page 99
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Alarm Shows all configured alarms Event Shows all configured events Configure Interface History Periodically samples statistics on a physical interface Statistics Enables collection of statistics on a physical interface Show...
Page 100
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Configure ECMP Number Sets the maximum number of equal-cost paths to the same destination that can be installed in the routing table VRRP Virtual Router Redundancy Protocol Configure Group ID...
Page 101
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Static Host Table Configures static entries for domain name to address mapping Show Shows the list of static mapping entries Modify Modifies the static address mapped to the selected host name Cache...
Page 102
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Multicast IGMP Snooping General Enables multicast filtering; configures parameters for multicast snooping Multicast Router Add Static Multicast Router Assigns ports that are attached to a neighboring multicast router Show Static Multicast Router Displays ports statically configured as attached to a neighboring...
Page 103
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Show Information Shows the current multicast groups learned through IGMP for each VLAN Show Detail Shows detailed information on each multicast group associated with a VLAN interface Multicast Routing General...
Page 104
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Redistribute Imports external routing information from other routing domains (that is, protocols) into the autonomous system Show Shows the external routing information to be imported from other routing domains Distance Defines an administrative distance for external routes learned from...
Page 105
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page Show Shows route summaries advertised at an area boundary Modify Modifies route summaries advertised at an area boundary Redistribute Redistributes routes from one routing domain to another Show...
Page 106
| Using the Web Interface HAPTER Navigating the Web Browser Interface ES-4500G Series Table 4: Switch Main Menu (Continued) Menu Description Page RP Candidate Advertises the switch as an RP candidate to the BSR for the specified multicast groups Show Shows the multicast groups for which this switch is advertising itself as an RP candidate to the BSR Show Information...
ASIC ANAGEMENT ASKS ES-4500G Series This chapter describes the following topics: Displaying System Information – Provides basic system description, ◆ including contact information. Displaying Switch Hardware/Software Versions – Shows the hardware ◆ version, power status, and firmware versions Configuring Support for Jumbo Frames –...
Page 108
| Basic Management Tasks HAPTER Displaying System Information ES-4500G Series ARAMETERS These parameters are displayed in the web interface: System Description – Brief description of device type. ◆ System Object ID – MIB II object ID for switch’s network ◆ management subsystem.
| Basic Management Tasks HAPTER Displaying Switch Hardware/Software Versions ES-4500G Series ISPLAYING WITCH ARDWARE OFTWARE ERSIONS Use the System > Switch page to display hardware/firmware version numbers for the main board and management software, as well as the power status of the system. CLI R EFERENCES ◆...
| Basic Management Tasks HAPTER Configuring Support for Jumbo Frames ES-4500G Series Figure 4: General Switch Information ONFIGURING UPPORT FOR UMBO RAMES Use the System > Capability page to configure support for layer 2 jumbo frames. The switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames of up to 9216 bytes for Gigabit and 10 Gigabit Ethernet ports or trunks.
| Basic Management Tasks HAPTER Displaying Bridge Extension Capabilities ES-4500G Series ARAMETERS The following parameters are displayed in the web interface: Jumbo Frame – Configures support for jumbo frames. ◆ (Default: Disabled) NTERFACE To configure support for jumbo frames: Click System, then Capability. Enable or disable support for jumbo frames.
Page 112
| Basic Management Tasks HAPTER Displaying Bridge Extension Capabilities ES-4500G Series VLAN Learning – This switch uses Independent VLAN Learning (IVL), ◆ where each port maintains its own filtering database. Local VLAN Capable – This switch does not support multiple local ◆...
| Basic Management Tasks HAPTER Managing System Files ES-4500G Series ANAGING YSTEM ILES This section describes how to upgrade the switch operating software or configuration files, and set the system start-up files. Use the System > File (Copy) page to upload/download firmware or OPYING ILES VIA configuration settings using FTP, TFTP or HTTP.
Page 114
| Basic Management Tasks HAPTER Managing System Files ES-4500G Series Up to two copies of the system software (i.e., the runtime firmware) can be stored in the file directory on the switch. The maximum number of user-defined configuration files is limited only by available flash memory space.
| Basic Management Tasks HAPTER Managing System Files ES-4500G Series Use the System > File (Copy) page to save the current configuration AVING THE UNNING settings to a local file on the switch. The configuration settings are not ONFIGURATION TO A automatically saved by the system for subsequent use when the switch is OCAL rebooted.
| Basic Management Tasks HAPTER Managing System Files ES-4500G Series If you replaced a file currently used for startup and want to start using the new file, reboot the system via the System > Reset menu. Use the System > File (Set Start-Up) page to specify the firmware or ETTING TART configuration file to use for system initialization.
| Basic Management Tasks HAPTER Setting the System Clock ES-4500G Series Use the System > File (Show) page to show the files in the system HOWING YSTEM directory, or to delete a file. ILES Files designated for start-up, and the Factory_Default_Config.cfg file, cannot be deleted.
| Basic Management Tasks HAPTER Setting the System Clock ES-4500G Series Use the System > Time (Configure General - Manual) page to set the ETTING THE system time on the switch manually without using SNTP. ANUALLY CLI R EFERENCES "calendar set" on page 678 ◆...
| Basic Management Tasks HAPTER Setting the System Clock ES-4500G Series Use the System > Time (Configure General - SNTP) page to set the polling SNTP ETTING interval at which the switch will query the time servers. OLLING NTERVAL CLI R EFERENCES "Time"...
| Basic Management Tasks HAPTER Setting the System Clock ES-4500G Series Use the System > Time (Configure Time Server) page to specify the IP SNTP PECIFYING address for up to three SNTP time servers. ERVERS CLI R EFERENCES "sntp server" on page 676 ◆...
| Basic Management Tasks HAPTER Setting the System Clock ES-4500G Series Use the System > Time (Configure Time Server) page to set the time zone. ETTING THE SNTP uses Coordinated Universal Time (or UTC, formerly Greenwich Mean Time, or GMT) based on the time at the Earth’s prime meridian, zero degrees longitude, which passes through Greenwich, England.
| Basic Management Tasks HAPTER Console Port Settings ES-4500G Series ONSOLE ETTINGS Use the System > Console menu to configure connection parameters for the switch’s console port. You can access the onboard configuration program by attaching a VT100 compatible device to the switch’s serial console port.
Page 123
| Basic Management Tasks HAPTER Console Port Settings ES-4500G Series The password for the console connection can only be configured through the CLI (see "password" on page 659). Password checking can be enabled or disabled for logging in to the console connection (see "login"...
| Basic Management Tasks HAPTER Telnet Settings ES-4500G Series ELNET ETTINGS Use the System > Telnet menu to configure parameters for accessing the CLI over a Telnet connection. You can access the onboard configuration program over the network using Telnet (i.e., a virtual terminal). Management access via Telnet can be enabled/disabled and other parameters set, including the TCP port number, time outs, and a password.
| Basic Management Tasks HAPTER Displaying CPU Utilization ES-4500G Series Password checking can be enabled or disabled for login to the console connection (see "login" on page 657). You can select authentication by a single global password as configured for the password command, or by passwords set up for specific user-name accounts.
| Basic Management Tasks HAPTER Displaying Memory Utilization ES-4500G Series Change the update interval if required. Note that the interval is changed as soon as a new setting is selected. Figure 17: Displaying CPU Utilization ISPLAYING EMORY TILIZATION Use the System > Memory Status page to display memory utilization parameters.
| Basic Management Tasks HAPTER Renumbering the Stack ES-4500G Series Figure 18: Displaying Memory Utilization ENUMBERING THE TACK If the units are no longer numbered sequentially after several topology changes or failures, use the System > Renumbering page to reset the unit numbers.
| Basic Management Tasks HAPTER Resetting the System ES-4500G Series ESETTING THE YSTEM Use the System > Reset menu to restart the switch immediately, at a specified time, after a specified delay, or at a periodic interval. CLI R EFERENCES "reload (Privileged Exec)"...
| Basic Management Tasks HAPTER Resetting the System ES-4500G Series Regularly – Specifies a periodic interval at which to reload the ■ switch. Time HH - The hour at which to reload. (Range: 0-23) ■ MM - The minute at which to reload. (Range: 0-59) ■...
Page 130
| Basic Management Tasks HAPTER Resetting the System ES-4500G Series Figure 21: Restarting the Switch (In) Figure 22: Restarting the Switch (At) Figure 23: Restarting the Switch (Regularly) – 130 –...
NTERFACE ONFIGURATION ES-4500G Series This chapter describes the following topics: Port Configuration – Configures connection settings, including auto- ◆ negotiation, or manual setting of speed, duplex mode, and flow control. Port Mirroring – Sets the source and target ports for mirroring on the ◆...
Page 132
| Interface Configuration HAPTER Port Configuration ES-4500G Series When using auto-negotiation, the optimal settings will be negotiated ◆ between the link partners based on their advertised capabilities. To set the speed, duplex mode, or flow control under auto-negotiation, the required operation modes must be specified in the capabilities list for an interface.
| Interface Configuration HAPTER Port Configuration ES-4500G Series Figure 24: Configuring Connections by Port List Use the Interface > Port > General (Configure by Port Range) page to ONFIGURING BY enable/disable an interface, set auto-negotiation and the interface ANGE capabilities to advertise, or manually fix the speed, duplex mode, and flow control.
| Interface Configuration HAPTER Port Configuration ES-4500G Series Figure 25: Configuring Connections by Port Range Use the Interface > Port > General (Show Information) page to display the ISPLAYING current connection status, including link state, speed/duplex mode, flow ONNECTION TATUS control, and auto-negotiation.
| Interface Configuration HAPTER Port Configuration ES-4500G Series NTERFACE To display port connection parameters: Click Interface, Port, General. Select Show Information from the Action List. Figure 26: Displaying Port Information Use the Interface > Port > Mirror page to mirror traffic from any source ONFIGURING port to a target port for real-time analysis.
Page 137
| Interface Configuration HAPTER Port Configuration ES-4500G Series ARAMETERS These parameters are displayed in the web interface: Source Port – The port whose traffic will be monitored. ◆ (Range: 1-26/50) ◆ Target Port – The port that will mirror the traffic on the source port. (Range: 1-26/50) ◆...
| Interface Configuration HAPTER Port Configuration ES-4500G Series Figure 29: Displaying Local Port Mirror Sessions Use the Interface > Port/Trunk > Statistics or Chart page to display HOWING ORT OR standard statistics on network traffic from the Interfaces Group and RUNK TATISTICS Ethernet-like MIBs, as well as a detailed breakdown of traffic based on the...
Page 139
| Interface Configuration HAPTER Port Configuration ES-4500G Series Table 5: Port Statistics (Continued) Parameter Description Received Discarded The number of inbound packets which were chosen to be Packets discarded even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. One possible reason for discarding such a packet could be to free up buffer space.
Page 140
| Interface Configuration HAPTER Port Configuration ES-4500G Series Table 5: Port Statistics (Continued) Parameter Description Drop Events The total number of events in which packets were dropped due to lack of resources. Jabbers The total number of frames received that were longer than 1518 octets (excluding framing bits, but including FCS octets), and had either an FCS or alignment error.
Page 141
| Interface Configuration HAPTER Port Configuration ES-4500G Series NTERFACE To show a list of port statistics: Click Interface, Port, Statistics. Select the statistics mode to display (Interface, Etherlike or RMON). Select a port from the drop-down list. Use the Refresh button at the bottom of the page if you need to update the screen.
| Interface Configuration HAPTER Port Configuration ES-4500G Series Figure 31: Showing Port Statistics (Chart) Use the Interface > Port > Cable Test page to test the cable attached to a ERFORMING ABLE port. The cable test will check for any cable faults (short, open, etc.). If a IAGNOSTICS fault is found, the switch reports the length to the fault.
Page 143
| Interface Configuration HAPTER Port Configuration ES-4500G Series Not Supported: This message is displayed for any Gigabit Ethernet ■ ports linked up at a speed lower than 1000 Mbps, or for any 10G Ethernet ports. Impedance mismatch: Terminating impedance is not in the ■...
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series RUNK ONFIGURATION This section describes how to configure static and dynamic trunks. You can create multiple links between devices that work as one virtual, aggregate link. A port trunk offers a dramatic increase in bandwidth for network segments where bottlenecks exist, as well as providing a fault- tolerant link between two devices.
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series Use the Interface > Trunk > Static page to create a trunk, assign member ONFIGURING A ports, and configure the connection parameters. TATIC RUNK Figure 33: Configuring Static Trunks statically configured active links CLI R EFERENCES...
Page 146
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series Set the unit and port for the initial trunk member. Click Apply. Figure 34: Creating Static Trunks To add member ports to a static trunk: Click Interface, Trunk, Static. Select Configure Trunk from the Step list. Select Add Member from the Action list.
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series Figure 36: Configuring Connection Parameters for a Static Trunk To display trunk connection parameters: Click Interface, Trunk, Static. Select Configure General from the Step list. Select Show Information from the Action list. Figure 37: Displaying Connection Parameters for Static Trunks Use the Interface >...
Page 148
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series OMMAND SAGE ◆ To avoid creating a loop in the network, be sure you enable LACP before connecting the ports, and also disconnect the ports before disabling LACP. If the target switch has also enabled LACP on the connected ports, the ◆...
Page 149
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series By default, the Actor Admin Key is determined by port's link speed, and copied to Oper Key. The Partner Admin Key is assigned to zero, and the Oper Key is set based upon LACP PDUs received from the Partner. System Priority –...
Page 150
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series To enable LACP for a port: Click Interface, Trunk, Dynamic. Select Configure Aggregation Port from the Step list. Select Configure from the Action list. Click General. Enable LACP on the required ports. Click Apply.
Page 151
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series Figure 41: Configuring LACP Parameters on a Port To configure connection parameters for a dynamic trunk: Click Interface, Trunk, Dynamic. Select Configure Trunk from the Step List. Select Configure from the Action List. Modify the required interface settings.
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series Figure 43: Displaying Connection Parameters for Dynamic Trunks To show the active members of a dynamic trunk: Click Interface, Trunk, Dynamic. Select Configure Trunk from the Step List. Select Show Member from the Action List. Select a Trunk.
Page 153
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series Table 6: LACP Port Counters (Continued) Parameter Description Marker Unknown Pkts Number of frames received that either (1) Carry the Slow Protocols Ethernet Type value, but contain an unknown PDU, or (2) are addressed to the Slow Protocols group MAC Address, but do not carry the Slow Protocols Ethernet Type.
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series Use the Interface > Trunk > Dynamic (Configure Aggregation Port - Show LACP ISPLAYING Information - Internal) page to display the configuration settings and ETTINGS AND TATUS operational state for the local side of a link aggregation. FOR THE OCAL CLI R...
| Interface Configuration HAPTER Trunk Configuration ES-4500G Series Figure 46: Displaying LACP Port Internal Information Use the Interface > Trunk > Dynamic (Configure Aggregation Port - Show LACP ISPLAYING Information - Neighbors) page to display the configuration settings and ETTINGS AND TATUS operational state for the remote side of a link aggregation.
| Interface Configuration HAPTER Sampling Traffic Flows ES-4500G Series NTERFACE To display LACP settings and status for the remote side: Click Interface, Trunk, Dynamic. Select Configure Aggregation Port from the Step list. Select Show Information from the Action list. Click Neighbors. Select a group member from the Port list.
| Interface Configuration HAPTER Sampling Traffic Flows ES-4500G Series As the Collector receives streams from the various sFlow agents (other switches or routers) throughout the network, a timely, network-wide picture of utilization and traffic flows is created. Analysis of the sFlow stream(s) can reveal trends and information that can be leveraged in the following ways: Detecting, diagnosing, and fixing network problems...
Page 158
| Interface Configuration HAPTER Sampling Traffic Flows ES-4500G Series Max Datagram Size – Maximum size of the sFlow datagram payload. ◆ (Range: 200-1500 bytes; Default: 1400 bytes) Sample Rate – The number of packets out of which one sample will be ◆...
| Interface Configuration HAPTER Traffic Segmentation ES-4500G Series RAFFIC EGMENTATION If tighter security is required for passing traffic from different clients through downlink ports on the local network and over uplink ports to the service provider, port-based traffic segmentation can be used to isolate traffic between clients on different downlink ports.
| Interface Configuration HAPTER Traffic Segmentation ES-4500G Series Use the Interface > Traffic Segmentation (Configure Session) page to ONFIGURING PLINK assign the downlink and uplink ports to use in the segmented group. Ports OWNLINK ORTS designated as downlink ports can not communicate with any other ports on the switch except for the uplink ports.
| Interface Configuration HAPTER VLAN Trunking ES-4500G Series VLAN T RUNKING Use the Interface > VLAN Trunking page to allow unknown VLAN groups to pass through the specified interface. CLI R EFERENCES "vlan-trunking" on page 929 ◆ OMMAND SAGE Use this feature to configure a tunnel across one or more intermediate ◆...
Page 162
| Interface Configuration HAPTER VLAN Trunking ES-4500G Series Trunk – Trunk Identifier. (Range: 1-32) ◆ VLAN Trunking Status – Enables VLAN trunking on the selected ◆ interface. NTERFACE To enable VLAN trunking on a port or trunk: Click Interface, VLAN Trunking. Click Port or Trunk to specify the interface type.
VLAN C ONFIGURATION ES-4500G Series This chapter includes the following topics: IEEE 802.1Q VLANs – Configures static and dynamic VLANs. ◆ Private VLANs – Configures private VLANs, using primary for ◆ unrestricted upstream access and community groups which are restricted to other local group members or to the ports in the associated primary group.
Page 164
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series or IP subnets. VLANs inherently provide a high level of network security since traffic must pass through a configured Layer 3 link to reach a different VLAN. This switch supports the following VLAN features: Up to 4093 VLANs based on the IEEE 802.1Q standard ◆...
Page 165
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series VLAN Classification – When the switch receives a frame, it classifies the frame in one of two ways. If the frame is untagged, the switch assigns the frame to an associated VLAN (based on the default VLAN ID of the receiving port).
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series Figure 54: Using GVRP Port-based VLAN 10 11 15 16 Forwarding Tagged/Untagged Frames If you want to create a small port-based VLAN for devices attached directly to a single switch, you can assign ports to the same untagged VLAN. However, to participate in a VLAN group that crosses several switches, you should create a VLAN for that group and enable tagging on all ports.
Page 167
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series Status – Enables or disables the specified VLAN. ◆ Show VLAN ID – ID of configured VLAN. ◆ VLAN Name – Name of the VLAN. ◆ Status – Operational status of configured VLAN. ◆...
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series To modify the configuration settings for VLAN groups: Click VLAN, Static. Select Modify from the Action list. Select the identifier of a configured VLAN. Modify the VLAN name or operational status as required. Click Apply.
Page 169
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series untagged they are not connected to any VLAN-aware devices. Or configure a port as forbidden to prevent the switch from automatically adding it to a VLAN via the GVRP protocol. CLI R EFERENCES "Configuring VLAN Interfaces"...
Page 170
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series If ingress filtering is disabled and a port receives frames tagged for ■ VLANs for which it is not a member, these frames will be flooded to all other ports (except for those VLANs explicitly forbidden on this port).
Page 171
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series The PVID, acceptable frame type, and ingress filtering parameters for each interface within the specified range must be configured on either the Edit Member by VLAN or Edit Member by Interface page. NTERFACE To configure static members by the VLAN index: Click VLAN, Static.
Page 172
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series Figure 59: Configuring Static VLAN Members by Interface To configure static members by interface range: Click VLAN, Static. Select Edit Member by Interface Range from the Step list. Set the Interface type to display as Port or Trunk. Enter an interface range.
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series Use the VLAN > Dynamic page to enable GVRP globally on the switch, or to ONFIGURING enable GVRP and adjust the protocol timers per interface. VLAN YNAMIC EGISTRATION CLI R EFERENCES "GVRP and Bridge Extension Commands"...
Page 174
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series Show Dynamic VLAN – Show VLAN VLAN ID – Identifier of a VLAN this switch has joined through GVRP. VLAN Name – Name of a VLAN this switch has joined through GVRP. Status –...
Page 175
| VLAN Configuration HAPTER IEEE 802.1Q VLANs ES-4500G Series Figure 62: Configuring GVRP for an Interface To show the dynamic VLAN joined by this switch: Click VLAN, Dynamic. Select Show Dynamic VLAN from the Step list. Select Show VLAN from the Action list. Figure 63: Showing Dynamic VLANs Registered on the Switch To show the members of a dynamic VLAN: Click VLAN, Dynamic.
| VLAN Configuration HAPTER Private VLANs ES-4500G Series VLAN RIVATE Private VLANs provide port-based security and isolation of local ports contained within different private VLAN groups. This switch supports two types of private VLANs – primary and community groups. A primary VLAN contains promiscuous ports that can communicate with all other ports in the associated private VLAN groups, while a community (or secondary) VLAN contains community ports that can only communicate with other...
Page 177
| VLAN Configuration HAPTER Private VLANs ES-4500G Series Community - Conveys traffic between community ports, and to ■ their promiscuous ports in the associated primary VLAN. NTERFACE To configure private VLANs: Click VLAN, Private. Select Configure VLAN from the Step list. Select Add from the Action list.
| VLAN Configuration HAPTER Private VLANs ES-4500G Series Use the VLAN > Private (Configure VLAN - Add Community VLAN) page to SSOCIATING RIVATE associate each community VLAN with a primary VLAN. VLAN CLI R EFERENCES "private vlan association" on page 942 ◆...
| VLAN Configuration HAPTER Private VLANs ES-4500G Series Figure 68: Showing Associated VLANs Use the VLAN > Private (Configure Interface) page to set the private VLAN ONFIGURING RIVATE interface type, and assign the interfaces to a private VLAN. VLAN I NTERFACES CLI R EFERENCES...
Page 180
| VLAN Configuration HAPTER Private VLANs ES-4500G Series NTERFACE To configure a private VLAN port or trunk: Click VLAN, Private. Select Configure Interface from the Step list. Set the Interface type to display as Port or Trunk. Set the Port Mode to Promiscuous. For an interface set the Promiscuous mode, select an entry from the Primary VLAN list.
| VLAN Configuration HAPTER IEEE 802.1Q Tunneling ES-4500G Series IEEE 802.1Q T UNNELING IEEE 802.1Q Tunneling (QinQ) is designed for service providers carrying traffic for multiple customers across their networks. QinQ tunneling is used to maintain customer-specific VLAN and Layer 2 protocol configurations even when different customers use the same internal VLAN IDs.
Page 182
| VLAN Configuration HAPTER IEEE 802.1Q Tunneling ES-4500G Series Figure 70: QinQ Operational Concept Customer A Customer A (VLANs 1-10) (VLANs 1-10) QinQ Tunneling Service Provider Service Provider VLAN 10 VLAN 10 (edge switch B) (edge switch A) Tunnel Access Port Tunnel Access...
Page 183
| VLAN Configuration HAPTER IEEE 802.1Q Tunneling ES-4500G Series Layer 2 Flow for Packets Coming into a Tunnel Uplink Port An uplink port receives one of the following packets: Untagged ◆ One tag (CVLAN or SPVLAN) ◆ Double tag (CVLAN + SPVLAN) ◆...
Page 184
| VLAN Configuration HAPTER IEEE 802.1Q Tunneling ES-4500G Series Configuration Limitations for QinQ The native VLAN of uplink ports should not be used as the SPVLAN. If ◆ the SPVLAN is the uplink port's native VLAN, the uplink port must be an untagged member of the SPVLAN.
| VLAN Configuration HAPTER IEEE 802.1Q Tunneling ES-4500G Series Use the VLAN > Tunnel (Configure Global) page to configure the switch to NABLING operate in IEEE 802.1Q (QinQ) tunneling mode, which is used for passing UNNELING ON THE Layer 2 traffic across a service provider’s metropolitan area network. You WITCH can also globally set the Tag Protocol Identifier (TPID) value of the tunnel port if the attached client is using a nonstandard 2-byte ethertype to...
| VLAN Configuration HAPTER IEEE 802.1Q Tunneling ES-4500G Series Figure 71: Enabling QinQ Tunneling Follow the guidelines in the preceding section to set up a QinQ tunnel on DDING AN NTERFACE the switch. Then use the VLAN > Tunnel (Configure Interface) page to set TO A UNNEL the tunnel mode for any participating interface.
| VLAN Configuration HAPTER Protocol VLANs ES-4500G Series NTERFACE To add an interface to a QinQ tunnel: Click VLAN, Tunnel. Select Configure Interface from the Step list. Set the mode for any tunnel access port to Tunnel and the tunnel uplink port to Tunnel Uplink.
| VLAN Configuration HAPTER Protocol VLANs ES-4500G Series Create a protocol group for each of the protocols you want to assign to a VLAN using the Configure Protocol (Add) page. Then map the protocol for each interface to the appropriate VLAN using the Configure Interface (Add) page.
| VLAN Configuration HAPTER Protocol VLANs ES-4500G Series Enter an identifier for the protocol group. Click Apply. Figure 73: Configuring Protocol VLANs To configure a protocol group: Click VLAN, Protocol. Select Configure Protocol from the Step list. Select Show from the Action list. Figure 74: Displaying Protocol VLANs Use the VLAN >...
Page 190
| VLAN Configuration HAPTER Protocol VLANs ES-4500G Series When a frame enters a port that has been assigned to a protocol VLAN, ◆ it is processed in the following manner: If the frame is tagged, it will be processed according to the standard ■...
Page 191
| VLAN Configuration HAPTER Protocol VLANs ES-4500G Series Figure 75: Assigning Interfaces to Protocol VLANs To show the protocol groups mapped to a port or trunk: Click VLAN, Protocol. Select Configure Interface from the Step list. Select Show from the Action list. Figure 76: Showing the Interface to Protocol Group Mapping –...
| VLAN Configuration HAPTER Configuring IP Subnet VLANs ES-4500G Series IP S VLAN ONFIGURING UBNET Use the VLAN > IP Subnet page to configure IP subnet-based VLANs. When using port-based classification, all untagged frames received by a port are classified as belonging to the VLAN whose VID (PVID) is associated with that port.
Page 193
| VLAN Configuration HAPTER Configuring IP Subnet VLANs ES-4500G Series NTERFACE To map an IP subnet to a VLAN: Click VLAN, IP Subnet. Select Add from the Action list. Enter an address in the IP Address field. Enter a mask in the Subnet Mask field. Enter the identifier in the VLAN field.
| VLAN Configuration HAPTER Configuring MAC-based VLANs ES-4500G Series MAC- VLAN ONFIGURING BASED Use the VLAN > MAC-Based page to configure VLAN based on MAC addresses. The MAC-based VLAN feature assigns VLAN IDs to ingress untagged frames according to source MAC addresses. When MAC-based VLAN classification is enabled, untagged frames received by a port are assigned to the VLAN which is mapped to the frame’s source MAC address.
Page 195
| VLAN Configuration HAPTER Configuring MAC-based VLANs ES-4500G Series Click Apply. Figure 79: Configuring MAC-Based VLANs To show the MAC addresses mapped to a VLAN: Click VLAN, MAC-Based. Select Show from the Action list. Figure 80: Showing MAC-Based VLANs – 195 –...
DDRESS ABLE ETTINGS ES-4500G Series Switches store the addresses for all known devices. This information is used to pass traffic directly between the inbound and outbound ports. All the addresses learned by monitoring traffic are stored in the dynamic address table. You can also manually configure static addresses that are bound to a specific port.
Page 198
| Address Table Settings HAPTER Configuring MAC Address Learning ES-4500G Series Also note that MAC address learning cannot be disabled if any of the ◆ following conditions exist: 802.1X Port Authentication has been globally enabled on the switch ■ (see "Configuring 802.1X Global Settings"...
| Address Table Settings HAPTER Setting Static Addresses ES-4500G Series ETTING TATIC DDRESSES Use the MAC Address > Static page to configure static MAC addresses. A static address can be assigned to a specific interface on this switch. Static addresses are bound to the assigned interface and will not be moved. When a static address is seen on another interface, the address will be ignored and will not be written to the address table.
| Address Table Settings HAPTER Changing the Aging Time ES-4500G Series Click Apply. Figure 82: Configuring Static MAC Addresses To show the static addresses in MAC address table: Click MAC Address, Static. Select Show from the Action list. Figure 83: Displaying Static MAC Addresses HANGING THE GING Use the MAC Address >...
| Address Table Settings HAPTER Displaying the Dynamic Address Table ES-4500G Series NTERFACE To set the aging time for entries in the dynamic address table: Click MAC Address, Dynamic. Select Configure Aging from the Action list. Modify the aging status if required. Specify a new aging time.
| Address Table Settings HAPTER Clearing the Dynamic Address Table ES-4500G Series NTERFACE To show the dynamic address table: Click MAC Address, Dynamic. Select Show Dynamic MAC from the Action list. Select the Sort Key (MAC Address, VLAN, or Interface). Enter the search parameters (MAC Address, VLAN, or Interface).
Page 203
| Address Table Settings HAPTER Clearing the Dynamic Address Table ES-4500G Series Select the method by which to clear the entries (i.e., All, MAC Address, VLAN, or Interface). Enter information in the additional fields required for clearing entries by MAC Address, VLAN, or Interface. Click Clear.
Page 204
| Address Table Settings HAPTER Clearing the Dynamic Address Table ES-4500G Series – 204 –...
PANNING LGORITHM ES-4500G Series This chapter describes the following basic topics: Loopback Detection – Configures detection and response to loopback ◆ BPDUs. Global Settings for STA – Configures global bridge settings for STP, ◆ RSTP and MSTP. Interface Settings for STA –...
Page 206
| Spanning Tree Algorithm HAPTER Overview ES-4500G Series lowest cost spanning tree, it enables all root ports and designated ports, and disables all other ports. Network packets are therefore only forwarded between root ports and designated ports, eliminating any possible network loops.
Page 207
| Spanning Tree Algorithm HAPTER Overview ES-4500G Series Figure 88: MSTP Region, Internal Spanning Tree, Multiple Spanning Tree An MST Region consists of a group of interconnected bridges that have the same MST Configuration Identifiers (including the Region Name, Revision Level and Configuration Digest –...
| Spanning Tree Algorithm HAPTER Configuring Loopback Detection ES-4500G Series ONFIGURING OOPBACK ETECTION Use the Spanning Tree > Loopback Detection page to configure loopback detection on an interface. When loopback detection is enabled and a port or trunk receives it’s own BPDU, the detection agent drops the loopback BPDU, sends an SNMP trap, and places the interface in discarding mode.
| Spanning Tree Algorithm HAPTER Configuring Global Settings for STA ES-4500G Series NTERFACE To configure loopback detection: Click Spanning Tree, Loopback Detection. Click Port or Trunk to display the required interface type. Modify the required loopback detection attributes. Click Apply Figure 90: Configuring Port Loopback Detection ONFIGURING LOBAL...
Page 210
| Spanning Tree Algorithm HAPTER Configuring Global Settings for STA ES-4500G Series connected to an 802.1D bridge and starts using only 802.1D BPDUs. RSTP Mode – If RSTP is using 802.1D BPDUs on a port and receives ■ an RSTP BPDU after the migration delay expires, RSTP restarts the migration delay timer and begins using RSTP BPDUs on that port.
Page 211
| Spanning Tree Algorithm HAPTER Configuring Global Settings for STA ES-4500G Series device with the lowest MAC address will then become the root device. (Note that lower numeric values indicate higher priority.) Default: 32768 ■ Range: 0-61440, in steps of 4096 ■...
Page 212
| Spanning Tree Algorithm HAPTER Configuring Global Settings for STA ES-4500G Series becomes the designated port for the attached LAN. If it is a root port, a new root port is selected from among the device ports attached to the network.
Page 213
| Spanning Tree Algorithm HAPTER Configuring Global Settings for STA ES-4500G Series Click Apply Figure 91: Configuring Global Settings for STA (STP) Figure 92: Configuring Global Settings for STA (RSTP) – 213 –...
| Spanning Tree Algorithm HAPTER Displaying Global Settings for STA ES-4500G Series Figure 93: Configuring Global Settings for STA (MSTP) ISPLAYING LOBAL ETTINGS FOR Use the Spanning Tree > STA (Configure Global - Show Information) page to display a summary of the current bridge STA information that applies to the entire switch.
| Spanning Tree Algorithm HAPTER Configuring Interface Settings for STA ES-4500G Series Root Port – The number of the port on this switch that is closest to the ◆ root. This switch communicates with the root device through this port. If there is no root port, then this switch has been accepted as the root device of the Spanning Tree network.
| Spanning Tree Algorithm HAPTER Configuring Interface Settings for STA ES-4500G Series CLI R EFERENCES ◆ "Spanning Tree Commands" on page 891 ARAMETERS These parameters are displayed in the web interface: Interface – Displays a list of ports or trunks. ◆...
| Spanning Tree Algorithm HAPTER Configuring Interface Settings for STA ES-4500G Series Table 10: Default STA Path Costs Port Type Short Path Cost (IEEE Long Path Cost 802.1D-1998) (802.1D-2004) Gigabit Ethernet 10,000 10,000 10G Ethernet 1,000 1,000 Admin Link Type – The link type attached to this interface. ◆...
Page 218
| Spanning Tree Algorithm HAPTER Configuring Interface Settings for STA ES-4500G Series An interface cannot function as an edge port under the following conditions: If spanning tree mode is set to STP (page 209), edge-port mode ■ cannot automatically transition to operational edge-port state using the automatic setting.
| Spanning Tree Algorithm HAPTER Displaying Interface Settings for STA ES-4500G Series Click Apply. Figure 95: Configuring Interface Settings for STA ISPLAYING NTERFACE ETTINGS FOR Use the Spanning Tree > STA (Configure Interface - Show Information) page to display the current status of ports or trunks in the Spanning Tree. CLI R EFERENCES "show spanning-tree"...
Page 220
| Spanning Tree Algorithm HAPTER Displaying Interface Settings for STA ES-4500G Series The rules defining port status are: A port on a network segment with no other STA compliant bridging ■ device is always forwarding. If two ports of a switch are connected to the same segment and ■...
Page 221
| Spanning Tree Algorithm HAPTER Displaying Interface Settings for STA ES-4500G Series Figure 96: STA Port Roles R: Root Port Alternate port receives more A: Alternate Port useful BPDUs from another D: Designated Port bridge and is therefore not B: Backup Port selected as the designated port.
| Spanning Tree Algorithm HAPTER Configuring Multiple Spanning Trees ES-4500G Series ONFIGURING ULTIPLE PANNING REES Use the Spanning Tree > MSTP (Configure Global) page to create an MSTP instance, or to add VLAN groups to an MSTP instance. CLI R EFERENCES "Spanning Tree Commands"...
Page 223
| Spanning Tree Algorithm HAPTER Configuring Multiple Spanning Trees ES-4500G Series NTERFACE To create instances for MSTP: Click Spanning Tree, MSTP. Select Configure Global from the Step list. Select Add from the Action list. Specify the MST instance identifier and the initial VLAN member. Additional member can be added using the Spanning Tree >...
Page 224
| Spanning Tree Algorithm HAPTER Configuring Multiple Spanning Trees ES-4500G Series To modify the priority for an MST instance: Click Spanning Tree, MSTP. Select Configure Global from the Step list. Select Modify from the Action list. Modify the priority for an MSTP Instance. Click Apply.
Page 225
| Spanning Tree Algorithm HAPTER Configuring Multiple Spanning Trees ES-4500G Series To add additional VLAN groups to an MSTP instance: Click Spanning Tree, MSTP. Select Configure Global from the Step list. Select Add Member from the Action list. Select an MST instance from the MST ID list. Enter the VLAN group to add to the instance in the VLAN ID field.
| Spanning Tree Algorithm HAPTER Configuring Interface Settings for MSTP ES-4500G Series MSTP ONFIGURING NTERFACE ETTINGS FOR Use the Spanning Tree > MSTP (Configure Interface - Configure) page to configure the STA interface settings for an MST instance. CLI R EFERENCES "Spanning Tree Commands"...
Page 227
| Spanning Tree Algorithm HAPTER Configuring Interface Settings for MSTP ES-4500G Series The recommended range is listed in Table 9 on page 216. The default path costs are listed in Table 10 on page 217. NTERFACE To configure MSTP parameters for a port or trunk: Click Spanning Tree, MSTP.
Page 228
| Spanning Tree Algorithm HAPTER Configuring Interface Settings for MSTP ES-4500G Series – 228 –...
IMIT ONFIGURATION ES-4500G Series Use the Traffic > Rate Limit page to apply rate limiting to ingress or egress ports. This function allows the network manager to control the maximum rate for traffic received or transmitted on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the network.
TORM ONTROL ONFIGURATION ES-4500G Series Use the Traffic > Storm Control page to configure broadcast, multicast, and unknown unicast storm control thresholds. Traffic storms may occur when a device on your network is malfunctioning, or if application programs are not well designed or properly configured. If there is too much traffic on your network, performance can be severely degraded or everything can come to complete halt.
Page 232
| Storm Control Configuration HAPTER ES-4500G Series Multicast – Specifies storm control for multicast traffic. ◆ Broadcast – Specifies storm control for broadcast traffic. ◆ Status – Enables or disables storm control. (Default: Enabled for ◆ broadcast storm control, disabled for multicast and unknown unicast storm control) ◆...
LASS OF ERVICE ES-4500G Series Class of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch supports CoS with eight priority queues for each port. Data packets in a port’s high-priority queue will be transmitted before those in the lower-priority queues.
| Class of Service HAPTER Layer 2 Queue Settings ES-4500G Series If the output port is an untagged member of the associated VLAN, ◆ these frames are stripped of all VLAN tags prior to transmission. ARAMETERS These parameters are displayed in the web interface: Interface –...
Page 235
| Class of Service HAPTER Layer 2 Queue Settings ES-4500G Series WRR queuing specifies a relative weight for each queue. WRR uses a ◆ predefined relative weight for each queue that determines the percentage of service time the switch services each queue before moving on to the next queue.
Page 236
| Class of Service HAPTER Layer 2 Queue Settings ES-4500G Series NTERFACE To configure the queue mode: Click Traffic, Priority, Queue. Select the interface type to display (Port or Trunk). Set the queue mode. If any of the weighted queue modes is selected, the queue weight can be modified if required.
| Class of Service HAPTER Layer 2 Queue Settings ES-4500G Series Figure 111: Setting the Queue Mode (Strict and WRR) Use the Traffic > Priority > CoS to Queue page to specify the hardware APPING ALUES output queues to use for Class of Service (CoS) priority tagged traffic. GRESS UEUES The switch processes Class of Service (CoS) priority tagged traffic by using...
| Class of Service HAPTER Layer 2 Queue Settings ES-4500G Series Table 12: CoS Priority Levels Priority Level Traffic Type Background (Spare) 0 (default) Best Effort Excellent Effort Controlled Load Video, less than 100 milliseconds latency and jitter Voice, less than 10 milliseconds latency and jitter Network Control CLI R EFERENCES...
| Class of Service HAPTER Layer 3/4 Priority Settings ES-4500G Series Figure 112: Mapping CoS Values to Egress Queues 3/4 P AYER RIORITY ETTINGS Mapping Layer 3/4 Priorities to CoS Values The switch supports several common methods of prioritizing layer 3/4 traffic to meet application requirements.
| Class of Service HAPTER Layer 3/4 Priority Settings ES-4500G Series the three precedence bits so that non-DSCP compliant devices will not conflict with the DSCP mapping. Based on network policies, different kinds of traffic can be marked for different kinds of forwarding. DSCP priority values are mapped to default Class of Service values ◆...
| Class of Service HAPTER Layer 3/4 Priority Settings ES-4500G Series Figure 113: Mapping IP DSCP Priority Values Use the Traffic > Priority > IP Precedence to CoS page to map IP APPING Precedence priorities found in ingress packets to CoS values for internal RECEDENCE priority processing.
| Class of Service HAPTER Layer 3/4 Priority Settings ES-4500G Series IP Precedence settings apply to all interfaces. ARAMETERS These parameters are displayed: IP Precedence Mapping Status – Enables or disables the use of IP ◆ Precedence priorities and the mapping of these priority values to CoS values.
Page 243
| Class of Service HAPTER Layer 3/4 Priority Settings ES-4500G Series OMMAND SAGE ◆ This mapping table is only used if the protocol type of the arriving packet is TCP or UDP. Some of the more common TCP service ports include: HTTP: 80, FTP: 21, Telnet: 23 and POP3: 110.
Page 244
| Class of Service HAPTER Layer 3/4 Priority Settings ES-4500G Series To show the TCP/UDP port number to CoS priority map: Click Traffic, Priority, IP Port to DSCP. Select Show from the Action list. Figure 116: Showing IP Port Number Priority Map –...
UALITY OF ERVICE ES-4500G Series This chapter describes the following tasks required to apply QoS policies: Class Map – Creates a map which identifies a specific class of traffic. Policy Map – Sets the boundary parameters used for monitoring inbound traffic, and the action to take for conforming and non-conforming traffic.
| Quality of Service HAPTER Configuring a Class Map ES-4500G Series OMMAND SAGE To create a service policy for a specific category or ingress traffic, follow these steps: Use the Configure Class (Add) page to designate a class name for a specific category of traffic.
Page 247
| Quality of Service HAPTER Configuring a Class Map ES-4500G Series Description – A brief description of a class map. (Range: 1-64 ◆ characters) Add Rule Class Name – Name of the class map. ◆ Type – Only one match command is permitted per class map, so the ◆...
Page 248
| Quality of Service HAPTER Configuring a Class Map ES-4500G Series To show the configured class maps: Click Traffic, DiffServ. Select Configure Class from the Step list. Select Show from the Action list. Figure 118: Showing Class Maps To edit the rules for a class map: Click Traffic, DiffServ.
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series To show the rules for a class map: Click Traffic, DiffServ. Select Configure Class from the Step list. Select Show Rule from the Action list. Figure 120: Showing the Rules for a Class Map REATING OLICIES Use the Traffic >...
Page 250
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series Policing is based on a token bucket, where bucket depth (that is, the maximum burst before the bucket overflows) is specified by the “burst” field (BC), and the average rate tokens are removed from the bucket is specified by the “rate”...
Page 251
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series if Te(t)-B ≥ 0, the packets is yellow and Te is decremented by B ■ down to the minimum value of 0, else the packet is red and neither Tc nor Te is decremented. ■...
Page 252
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series respectively. The maximum size of the token bucket P is BP and the maximum size of the token bucket C is BC. The token buckets P and C are initially (at time 0) full, that is, the token count Tp(0) = BP and the token count Tc(0) = BC.
Page 253
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series Add Rule Policy Name – Name of policy map. ◆ Class Name – Name of a class map that defines a traffic classification ◆ upon which a policy can act. Action –...
Page 254
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series Violate – Specifies whether the traffic that exceeds the ■ maximum rate (CIR) will be dropped or the DSCP service level will be reduced. Set IP DSCP – Decreases DSCP priority for out of ■...
Page 255
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series Drop – Drops out of conformance traffic. ■ Violate – Specifies whether the traffic that exceeds the excess ■ burst size (BE) will be dropped or the DSCP service level will be reduced.
Page 256
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series Transmit – Transmits in-conformance traffic without any ■ change to the DSCP service level. Exceed – Specifies whether traffic that exceeds the maximum ■ rate (CIR) but is within the peak information rate (PIR) will be dropped or the DSCP service level will be reduced.
Page 257
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series To show the configured policy maps: Click Traffic, DiffServ. Select Configure Policy from the Step list. Select Show from the Action list. Figure 122: Showing Policy Maps To edit the rules for a policy map: Click Traffic, DiffServ.
Page 258
| Quality of Service HAPTER Creating QoS Policies ES-4500G Series Figure 123: Adding Rules to a Policy Map To show the rules for a policy map: Click Traffic, DiffServ. Select Configure Policy from the Step list. Select Show Rule from the Action list. Figure 124: Showing the Rules for a Policy Map –...
| Quality of Service HAPTER Attaching a Policy Map to a Port ES-4500G Series TTACHING A OLICY AP TO A Use the Traffic > DiffServ (Configure Interface) page to bind a policy map to an ingress port. CLI R EFERENCES "Quality of Service Commands"...
Page 260
| Quality of Service HAPTER Attaching a Policy Map to a Port ES-4500G Series – 260 –...
IP T RAFFIC ONFIGURATION ES-4500G Series This chapter covers the following topics: Global Settings – Enables VOIP globally, sets the Voice VLAN, and the ◆ aging time for attached ports. Telephony OUI List – Configures the list of phones to be treated as VOIP ◆...
Page 262
| VoIP Traffic Configuration HAPTER Configuring VoIP Traffic ES-4500G Series CLI R EFERENCES ◆ "Configuring Voice VLANs" on page 952 ARAMETERS These parameters are displayed in the web interface: Auto Detection Status – Enables the automatic detection of VoIP ◆ traffic on switch ports.
| VoIP Traffic Configuration HAPTER Configuring Telephony OUI ES-4500G Series ONFIGURING ELEPHONY VoIP devices attached to the switch can be identified by the manufacturer’s Organizational Unique Identifier (OUI) in the source MAC address of received packets. OUI numbers are assigned to manufacturers and form the first three octets of device MAC addresses.
| VoIP Traffic Configuration HAPTER Configuring VoIP Traffic Ports ES-4500G Series Figure 127: Configuring an OUI Telephony List To show the MAC OUI numbers used for VoIP equipment: Click Traffic, VoIP. Select Configure OUI from the Step list. Select Show from the Action list. Figure 128: Showing an OUI Telephony List IP T ONFIGURING...
Page 265
| VoIP Traffic Configuration HAPTER Configuring VoIP Traffic Ports ES-4500G Series Auto – The port will be added as a tagged member to the Voice ■ VLAN when VoIP traffic is detected on the port. You must select a method for detecting VoIP traffic, either OUI or 802.1ab (LLDP). When OUI is selected, be sure to configure the MAC address ranges in the Telephony OUI list.
Page 266
| VoIP Traffic Configuration HAPTER Configuring VoIP Traffic Ports ES-4500G Series Figure 129: Configuring Port Settings for a Voice VLAN – 266 –...
ECURITY EASURES ES-4500G Series You can configure this switch to authenticate users logging into the system for management access using local or remote authentication methods. Port-based authentication using IEEE 802.1X can also be configured to control either management access to the uplink ports or client access to the data ports.
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series DHCP Snooping – Filter IP traffic on insecure ports for which the source ◆ address cannot be identified via DHCP snooping. The priority of execution for the filtering commands is Port Security, Port Authentication, Network Access, Web Authentication, Access Control Lists, IP Source Guard, and then DHCP Snooping.
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Define a method name for each service to which you want to apply accounting or authorization and specify the RADIUS or TACACS+ server groups to use. Apply the method names to port or line interfaces. This guide assumes that RADIUS and TACACS+ servers have already been configured to support AAA.
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series [authentication sequence] – User authentication is performed by up ■ to three authentication methods in the indicated sequence. NTERFACE To configure the method(s) of controlling management access: Click Security, AAA, System Authentication. Specify the authentication sequence (i.e., one to three methods).
Page 271
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series CLI R EFERENCES ◆ "RADIUS Client" on page 722 "TACACS+ Client" on page 726 ◆ "AAA" on page 729 ◆ OMMAND SAGE If a remote authentication server is used, you must specify the ◆...
Page 272
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Set Key – Mark this box to set or modify the encryption key. ■ Authentication Key – Encryption key used to authenticate logon ■ access for client. Do not use blank spaces in the string. (Maximum length: 48 characters) Confirm Authentication Key –...
Page 273
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series When specifying the priority sequence for a sever, the server index must already be defined (see "Configuring Local/Remote Logon Authentication" on page 269). NTERFACE To configure the parameters for RADIUS or TACACS+ authentication: Click Security, AAA, Server.
Page 274
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Figure 133: Configuring Remote Authentication Server (TACACS+) To configure the RADIUS or TACACS+ server groups to use for accounting and authorization: Click Security, AAA, Server. Select Configure Group from the Step list. Select Add from the Action list.
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series To show the RADIUS or TACACS+ server groups used for accounting and authorization: Click Security, AAA, Server. Select Configure Group from the Step list. Select Show from the Action list. Figure 135: Showing AAA Server Groups Use the Security >...
Page 276
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Exec – Administrative accounting for local console, Telnet, or SSH ■ connections. Method Name – Specifies an accounting method for service requests. ◆ The “default” methods are used for a requested service if no other methods have been defined.
Page 277
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Show Information – Statistics User Name - Displays a registered user name. ◆ Accounting Type - Displays the accounting service. ◆ Interface - Displays the receive port number through which this user ◆...
Page 278
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Figure 137: Configuring AAA Accounting Methods To show the accounting method applied to various service types and the assigned server group: Click Security, AAA, Accounting. Select Configure Method from the Step list. Select Show from the Action list.
Page 279
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Figure 139: Configuring AAA Accounting Service for 802.1X Service Figure 140: Configuring AAA Accounting Service for Exec Service To display a summary of the configured accounting methods and assigned server groups for specified service types: Click Security, AAA, Accounting.
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Click Statistics. Figure 142: Displaying Statistics for AAA Accounting Sessions Use the Security > AAA > Authorization page to enable authorization of ONFIGURING requested services, and also to display the configured authorization UTHORIZATION methods, and the methods applied to specific interfaces.
Page 281
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Configure Service Console Method Name – Specifies a user defined method name to ◆ apply to console connections. Telnet Method Name – Specifies a user defined method name to ◆ apply to Telnet connections.
Page 282
| Security Measures HAPTER AAA Authorization and Accounting ES-4500G Series Select Show from the Action list. Figure 144: Showing AAA Authorization Methods To configure the authorization method applied to local console, Telnet, or SSH connections: Click Security, AAA, Authorization. Select Configure Service from the Step list. Enter the required authorization method.
| Security Measures HAPTER Configuring User Accounts ES-4500G Series ONFIGURING CCOUNTS Use the Security > User Accounts page to control management access to the switch based on manually configured user names and passwords. CLI R EFERENCES "User Accounts" on page 717 ◆...
| Security Measures HAPTER Web Authentication ES-4500G Series Figure 147: Configuring User Accounts To show user accounts: Click Security, User Accounts. Select Show from the Action list. Figure 148: Showing User Accounts UTHENTICATION Web authentication allows stations to authenticate and access the network in situations where 802.1X or Network Access authentication are infeasible or impractical.
| Security Measures HAPTER Web Authentication ES-4500G Series RADIUS authentication must be activated and configured properly for the web authentication feature to work properly. (See "Configuring Local/Remote Logon Authentication" on page 269.) Web authentication cannot be configured on trunk ports. Use the Security >...
| Security Measures HAPTER Web Authentication ES-4500G Series Figure 149: Configuring Global Settings for Web Authentication Use the Security > Web Authentication (Configure Interface) page to ONFIGURING enable web authentication on a port, and display information for any NTERFACE ETTINGS connected hosts.
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Click Apply. Figure 150: Configuring Interface Settings for Web Authentication (MAC A ETWORK CCESS DDRESS UTHENTICATION Some devices connected to switch ports may not be able to support 802.1X authentication due to hardware or software limitations.
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series must be configured in the MAC address format XX-XX-XX-XX-XX-XX (all in upper case). Authenticated MAC addresses are stored as dynamic entries in the ◆ switch secure MAC address table and are removed when the aging time expires.
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series If duplicate profiles are passed in the Filter-ID attribute, then only the ◆ first profile is used. For example, if the attribute is “service-policy-in=p1;service-policy- in=p2”, then the switch applies only the DiffServ profile “p1.” Any unsupported profiles in the Filter-ID attribute are ignored.
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series This parameter applies to authenticated MAC addresses configured by the MAC Address Authentication process described in this section, as well as to any secure MAC addresses authenticated by 802.1X, regardless of the 802.1X Operation Mode (Single-Host, Multi-Host, or MAC-Based authentication as described on page...
Page 291
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series ARAMETERS These parameters are displayed in the web interface: MAC Authentication ◆ Status – Enables MAC authentication on a port. (Default: Disabled) ■ Intrusion – Sets the port response to a host MAC authentication ■...
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series exempt from authentication on the specified port (as described under "Configuring a MAC Address Filter"). (Range: 1-64; Default: None) NTERFACE To configure MAC authentication on switch ports: Click Security, Network Access. Select Configure Interface from the Step list.
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Link down – Only link down events will trigger the port action. ■ Link up and down – All link up and link down events will trigger ■ the port action. Action –...
Page 294
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series OMMAND SAGE ◆ Specified MAC addresses are exempt from authentication. Up to 65 filter tables can be defined. ◆ There is no limitation on the number of entries used in a filter table. ◆...
| Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Figure 155: Showing the MAC Address Filter Table for Network Access Use the Security > Network Access (Show Information) page to display the ISPLAYING ECURE authenticated MAC addresses stored in the secure MAC address table. MAC A DDRESS Information on the secure MAC entries can be displayed and selected...
| Security Measures HAPTER Configuring HTTPS ES-4500G Series Select Show Information from the Step list. Use the sort key to display addresses based MAC address, interface, or attribute. Restrict the displayed addresses by entering a specific address in the MAC Address field, specifying a port in the Interface field, or setting the address type to static or dynamic in the Attribute field.
| Security Measures HAPTER Configuring HTTPS ES-4500G Series If you enable HTTPS, you must indicate this in the URL that you specify ◆ in your browser: https://device[:port_number] When you start HTTPS, the connection is established in this way: ◆ The client authenticates the server using the server’s digital ■...
| Security Measures HAPTER Configuring HTTPS ES-4500G Series Figure 157: Configuring HTTPS Use the Security > HTTPS (Copy Certificate) page to replace the default EPLACING THE secure-site certificate. EFAULT ECURE SITE ERTIFICATE When you log onto the web interface using HTTPS (for secure access), a Secure Sockets Layer (SSL) certificate appears for the switch.
Page 299
| Security Measures HAPTER Configuring HTTPS ES-4500G Series Private Key Source File Name – Name of private key file stored on ◆ the TFTP server. Private Password – Password stored in the private key file. This ◆ password is used to verify authorization for certificate use, and is verified when downloading the certificate to the switch.
| Security Measures HAPTER Configuring the Secure Shell ES-4500G Series ONFIGURING THE ECURE HELL The Berkeley-standard includes remote access tools originally designed for Unix systems. Some of these tools have also been implemented for Microsoft Windows and other environments. These tools, including commands such as rlogin (remote login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.
Page 301
| Security Measures HAPTER Configuring the Secure Shell ES-4500G Series 79355942303577413098022737087794545240839717526463580581767167 09574804776117 Import Client’s Public Key to the Switch – See "Importing User Public Keys" on page 305, or use the copy tftp public-key command (page 649) to copy a file containing the public key for all the SSH client’s granted management access to the switch.
| Security Measures HAPTER Configuring the Secure Shell ES-4500G Series If a match is found, the switch uses its secret key to generate a random 256-bit string as a challenge, encrypts this string with the user’s public key, and sends it to the client. The client uses its private key to decrypt the challenge string, computes the MD5 checksum, and sends the checksum back to the switch.
Page 303
| Security Measures HAPTER Configuring the Secure Shell ES-4500G Series Version – The Secure Shell version number. Version 2.0 is displayed, ◆ but the switch supports management access via either SSH Version 1.5 or 2.0 clients. Authentication Timeout – Specifies the time interval in seconds that ◆...
| Security Measures HAPTER Configuring the Secure Shell ES-4500G Series Use the Security > SSH (Configure Host Key - Generate) page to generate ENERATING THE a host public/private key pair used to provide secure communications between an SSH client and the switch. After generating this key pair, you must provide the host public key to SSH clients and import the client’s public key to the switch as described in the section "Importing User Public...
| Security Measures HAPTER Configuring the Secure Shell ES-4500G Series Figure 160: Generating the SSH Host Key Pair To display or clear the SSH host key pair: Click Security, SSH. Select Configure Host Key from the Step list. Select Show from the Action list. Select the host-key type to clear.
Page 306
| Security Measures HAPTER Configuring the Secure Shell ES-4500G Series ARAMETERS These parameters are displayed in the web interface: User Name – This drop-down box selects the user who’s public key ◆ you wish to manage. Note that you must first create users on the User Accounts page (see "Configuring User Accounts"...
| Security Measures HAPTER Access Control Lists ES-4500G Series To display or clear the SSH user’s public key: Click Security, SSH. Select Configure User Key from the Step list. Select Show from the Action list. Select a user from the User Name list. Select the host-key type to clear.
| Security Measures HAPTER Access Control Lists ES-4500G Series OMMAND SAGE The following restrictions apply to ACLs: The maximum number of ACLs is 32. ◆ The maximum number of rules per ACL is 96. ◆ The maximum number of rules that can be bound to the ports is 96 for ◆...
Page 309
| Security Measures HAPTER Access Control Lists ES-4500G Series Periodic – Specifies a periodic interval. ■ Start/To – Specifies the days of the week, hours, and minutes ■ at which to start or end. NTERFACE To configure a time range: Click Security, ACL.
Page 310
| Security Measures HAPTER Access Control Lists ES-4500G Series Select Add Rule from the Action list. Select the name of time range from the drop-down list. Select a mode option of Absolute or Periodic. Fill in the required parameters for the selected mode. Click Apply.
| Security Measures HAPTER Access Control Lists ES-4500G Series Use the Security > ACL (Configure ACL - Show TCAM) page to show TCAM HOWING utilization parameters for TCAM (Ternary Content Addressable Memory), TILIZATION including the number policy control entries in use, the number of free entries, and the overall percentage of TCAM in use.
| Security Measures HAPTER Access Control Lists ES-4500G Series Use the Security > ACL (Configure ACL - Add) page to create an ACL. ETTING THE AME AND CLI R EFERENCES "access-list ip" on page 814 ◆ "show ip access-list" on page 819 ◆...
| Security Measures HAPTER Access Control Lists ES-4500G Series Figure 169: Creating an ACL To show a list of ACLs: Click Security, ACL. Select Configure ACL from the Step list. Select Show from the Action list. Figure 170: Showing a List of ACLs Use the Security >...
Page 314
| Security Measures HAPTER Access Control Lists ES-4500G Series Source IP Address – Source IP address. ◆ Source Subnet Mask – A subnet mask containing four integers from 0 ◆ to 255, each separated by a period. The mask uses 1 bits to indicate “match”...
| Security Measures HAPTER Access Control Lists ES-4500G Series Use the Security > ACL (Configure ACL - Add Rule - IP Extended) page to ONFIGURING AN configure an Extended IPv4 ACL. 4 ACL XTENDED CLI R EFERENCES "permit, deny (Extended IPv4 ACL)" on page 816 ◆...
Page 316
| Security Measures HAPTER Access Control Lists ES-4500G Series where the equivalent binary bit “1” means to match a bit and “0” means to ignore a bit. The following bits may be specified: 1 (fin) – Finish ■ 2 (syn) – Synchronize ■...
| Security Measures HAPTER Access Control Lists ES-4500G Series Figure 172: Configuring an Extended IPv4 ACL Use the Security > ACL (Configure ACL - Add Rule - IPv6 Standard) page to ONFIGURING A configure a Standard IPv6ACL. 6 ACL TANDARD CLI R EFERENCES "permit, deny (Standard IPv6 ACL)"...
Page 318
| Security Measures HAPTER Access Control Lists ES-4500G Series Time Range – Name of a time range. ◆ NTERFACE To add rules to a Standard IPv6 ACL: Click Security, ACL. Select Configure ACL from the Step list. Select Add Rule from the Action list. Select IPv6 Standard from the Type list.
| Security Measures HAPTER Access Control Lists ES-4500G Series Use the Security > ACL (Configure ACL - Add Rule - IPv6 Extended) page ONFIGURING AN to configure an Extended IPv6 ACL. 6 ACL XTENDED CLI R EFERENCES "permit, deny (Extended IPv6 ACL)" on page 822 ◆...
Page 320
| Security Measures HAPTER Access Control Lists ES-4500G Series Flow Label – A label for packets belonging to a particular traffic “flow” ◆ for which the sender requests special handling by IPv6 routers, such as non-default quality of service or “real-time” service (see RFC 2460). (Range: 0-1048575) A flow label is assigned to a flow by the flow's source node.
| Security Measures HAPTER Access Control Lists ES-4500G Series Figure 174: Configuring an Extended IPv6 ACL Use the Security > ACL (Configure ACL - Add Rule - MAC) page to ONFIGURING A configure a MAC ACL based on hardware addresses, packet format, and Ethernet type.
Page 322
| Security Measures HAPTER Access Control Lists ES-4500G Series Packet Format – This attribute includes the following packet types: ◆ Any – Any Ethernet packet type. ■ Untagged-eth2 – Untagged Ethernet II packets. ■ Untagged-802.3 – Untagged Ethernet 802.3 packets. ■...
| Security Measures HAPTER Access Control Lists ES-4500G Series Figure 175: Configuring a MAC ACL Use the Security > ACL (Configure ACL - Add Rule - ARP) page to configure ONFIGURING AN ACLs based on ARP message addresses. ARP Inspection can then use these ACLs to filter suspicious traffic (see "Configuring Global Settings for ARP Inspection"...
Page 324
| Security Measures HAPTER Access Control Lists ES-4500G Series Source/Destination IP Subnet Mask – Subnet mask for source or ◆ destination address. (See the description for Subnet Mask on page 313.) Source/Destination MAC Address Type – Use “Any” to include all ◆...
| Security Measures HAPTER Access Control Lists ES-4500G Series Figure 176: Configuring a ARP ACL After configuring ACLs, use the Security > ACL (Configure Interface) page INDING A ORT TO AN to bind the ports that need to filter traffic to the appropriate ACLs. You can CCESS ONTROL assign one IP access list and one MAC access list to any port.
| Security Measures HAPTER ARP Inspection ES-4500G Series NTERFACE To bind an ACL to a port: Click Security, ACL. Select Configure Interface from the Step list. Select IP or MAC from the Type list. Select the name of an ACL from the ACL list. Click Apply.
| Security Measures HAPTER ARP Inspection ES-4500G Series OMMAND SAGE Enabling & Disabling ARP Inspection ARP Inspection is controlled on a global and VLAN basis. ◆ By default, ARP Inspection is disabled both globally and on all VLANs. ◆ If ARP Inspection is globally enabled, then it becomes active only on ■...
Page 328
| Security Measures HAPTER ARP Inspection ES-4500G Series with different MAC addresses are classified as invalid and are dropped. IP – Checks the ARP body for invalid and unexpected IP addresses. ■ These addresses include 0.0.0.0, 255.255.255.255, and all IP multicast addresses.
| Security Measures HAPTER ARP Inspection ES-4500G Series Src-MAC – Validates the source MAC address in the Ethernet ■ header against the sender MAC address in the ARP body. This check is performed on both ARP requests and responses. Log Message Number – The maximum number of entries saved in a ◆...
Page 330
| Security Measures HAPTER ARP Inspection ES-4500G Series ARP Inspection ACLs can be applied to any configured VLAN. ◆ ARP Inspection uses the DHCP snooping bindings database for the list ◆ of valid IP-to-MAC address bindings. ARP ACLs take precedence over entries in the DHCP snooping bindings database.
| Security Measures HAPTER ARP Inspection ES-4500G Series Figure 179: Configuring VLAN Settings for ARP Inspection Use the Security > ARP Inspection (Configure Interface) page to specify ONFIGURING the ports that require ARP inspection, and to adjust the packet inspection NTERFACE ETTINGS rate.
| Security Measures HAPTER ARP Inspection ES-4500G Series Specify any untrusted ports which require ARP inspection, and adjust the packet inspection rate. Click Apply. Figure 180: Configuring Interface Settings for ARP Inspection Use the Security > ARP Inspection (Show Information - Show Statistics) ISPLAYING page to display statistics about the number of ARP packets processed, or NSPECTION...
| Security Measures HAPTER ARP Inspection ES-4500G Series NTERFACE To display statistics for ARP Inspection: Click Security, ARP Inspection. Select Show Information from the Step list. Select Show Statistics from the Step list. Figure 181: Displaying Statistics for ARP Inspection Use the Security >...
| Security Measures HAPTER Filtering IP Addresses for Management Access ES-4500G Series NTERFACE To display the ARP Inspection log: Click Security, ARP Inspection. Select Show Information from the Step list. Select Show Log from the Step list. Figure 182: Displaying the ARP Inspection Log IP A ILTERING DDRESSES FOR...
Page 335
| Security Measures HAPTER Filtering IP Addresses for Management Access ES-4500G Series You can delete an address range just by specifying the start address, or ◆ by specifying both the start address and end address. ARAMETERS These parameters are displayed in the web interface: Mode ◆...
| Security Measures HAPTER Configuring Port Security ES-4500G Series To show a list of IP addresses authorized for management access: Click Security, IP Filter. Select Show from the Action list. Figure 184: Showing IP Addresses Authorized for Management Access ONFIGURING ECURITY Use the Security >...
Page 337
| Security Measures HAPTER Configuring Port Security ES-4500G Series OMMAND SAGE ◆ A secure port has the following restrictions: It cannot be used as a member of a static or dynamic trunk. ■ It should not be connected to a network interconnection device. ■...
| Security Measures HAPTER Configuring 802.1X Port Authentication ES-4500G Series Figure 185: Configuring Port Security 802.1X P ONFIGURING UTHENTICATION Network switches can provide open and easy access to network resources by simply attaching a client PC. Although this automatic configuration and access is a desirable feature, it also allows unauthorized personnel to easily intrude and possibly gain access to sensitive network data.
| Security Measures HAPTER Configuring 802.1X Port Authentication ES-4500G Series Figure 186: Configuring Port Security 802.1x client 1. Client attempts to access a switch port. 2. Switch sends client an identity request. RADIUS 3. Client sends back identity information. 4. Switch forwards this to authentication server. server 5.
| Security Measures HAPTER Configuring 802.1X Port Authentication ES-4500G Series EAPOL Pass Through – Passes EAPOL frames through to all ports in ◆ STP forwarding state when dot1x is globally disabled. (Default: Disabled) When this device is functioning as intermediate node in the network and does not need to perform dot1x authentication, EAPOL Pass Through can be enabled to allow the switch to forward EAPOL frames from other switches on to the authentication servers, thereby allowing...
Page 341
| Security Measures HAPTER Configuring 802.1X Port Authentication ES-4500G Series parameters for the exchange of EAP messages between the authenticator and clients. ARAMETERS These parameters are displayed in the web interface: Port – Port number. ◆ ◆ Status – Indicates if authentication is enabled or disabled on the port. The status is disabled if the control mode is set to Force-Authorized.
Page 342
| Security Measures HAPTER Configuring 802.1X Port Authentication ES-4500G Series Max MAC Count – The maximum number of hosts that can connect to ◆ a port when the Multi-Host operation mode is selected. (Range: 1-1024; Default: 5) Max Request – Sets the maximum number of times the switch port ◆...
Page 343
| Security Measures HAPTER Configuring 802.1X Port Authentication ES-4500G Series State – Current state (including initialize, disconnected, connecting, ◆ authenticating, authenticated, aborting, held, force_authorized, force_unauthorized). Reauth Count – Number of times connecting state is re-entered. ◆ Current Identifier – Identifier sent in each EAP Success, Failure or ◆...
Page 344
| Security Measures HAPTER Configuring 802.1X Port Authentication ES-4500G Series Figure 188: Configuring Interface Settings for 802.1X Port Authenticator – 344 –...
| Security Measures HAPTER Configuring 802.1X Port Authentication ES-4500G Series Use the Security > Port Authentication (Show Statistics) page to display 802.1X ISPLAYING statistics for dot1x protocol exchanges for any port. TATISTICS CLI R EFERENCES "show dot1x" on page 762 ◆...
| Security Measures HAPTER IP Source Guard ES-4500G Series NTERFACE To display port authenticator statistics for 802.1X: Click Security, Port Authentication. Select Show Statistics from the Step list. Click Authenticator. Figure 189: Showing Statistics for 802.1X Port Authenticator IP S OURCE UARD IP Source Guard is a security feature that filters IP traffic on network...
Page 347
| Security Measures HAPTER IP Source Guard ES-4500G Series OMMAND SAGE ◆ Setting source guard mode to SIP (Source IP) or SIP-MAC (Source IP and MAC) enables this function on the selected port. Use the SIP option to check the VLAN ID, source IP address, and port number against all entries in the binding table.
| Security Measures HAPTER IP Source Guard ES-4500G Series SIP-MAC – Enables traffic filtering based on IP addresses and ■ corresponding MAC addresses stored in the binding table. Max Binding Entry – The maximum number of entries that can be ◆...
Page 349
| Security Measures HAPTER IP Source Guard ES-4500G Series If there is an entry with the same VLAN ID and MAC address, and ■ the type of entry is static IP source guard binding, then the new entry will replace the old one. If there is an entry with the same VLAN ID and MAC address, and ■...
| Security Measures HAPTER IP Source Guard ES-4500G Series To display static bindings for IP Source Guard: Click Security, IP Source Guard, Static Configuration. Select Show from the Action list. Figure 192: Displaying Static Bindings for IP Source Guard Use the Security > IP Source Guard > Dynamic Binding page to display the ISPLAYING source-guard binding table for a selected interface.
| Security Measures HAPTER DHCP Snooping ES-4500G Series NTERFACE To display the binding table for IP Source Guard: Click Security, IP Source Guard, Dynamic Binding. Mark the search criteria, and enter the required values. Click Query Figure 193: Showing the IP Source Guard Binding Table DHCP S NOOPING The addresses assigned to DHCP clients on insecure ports can be carefully...
Page 352
| Security Measures HAPTER DHCP Snooping ES-4500G Series The rate limit for the number of DHCP messages that can be processed ◆ by the switch is 100 packets per second. Any DHCP packets in excess of this limit are dropped. When DHCP snooping is enabled, DHCP messages entering an ◆...
Page 353
| Security Measures HAPTER DHCP Snooping ES-4500G Series DHCP server, any packets received from untrusted ports are dropped. DHCP Snooping Option 82 DHCP provides a relay mechanism for sending information about its ◆ DHCP clients or the relay agent itself to the DHCP server. Also known as DHCP Option 82, it allows compatible DHCP servers to use the information when assigning IP addresses, or to set other services or policies for clients.
| Security Measures HAPTER DHCP Snooping ES-4500G Series Use the IP Service > DHCP > Snooping (Configure Global) page to enable DHCP S NOOPING DHCP Snooping globally on the switch, or to configure MAC Address ONFIGURATION Verification. CLI R EFERENCES "DHCP Snooping"...
| Security Measures HAPTER DHCP Snooping ES-4500G Series Figure 194: Configuring Global Settings for DHCP Snooping Use the IP Service > DHCP > Snooping (Configure VLAN) page to enable or DHCP S NOOPING disable DHCP snooping on specific VLANs. VLAN ONFIGURATION CLI R EFERENCES...
| Security Measures HAPTER DHCP Snooping ES-4500G Series Enable DHCP Snooping on any existing VLAN. Click Apply Figure 195: Configuring DHCP Snooping on a VLAN Use the IP Service > DHCP > Snooping (Configure Interface) page to ONFIGURING ORTS configure switch ports as trusted or untrusted. DHCP S NOOPING CLI R...
| Security Measures HAPTER DHCP Snooping ES-4500G Series Set any ports within the local network or firewall to trusted. Click Apply Figure 196: Configuring the Port Mode for DHCP Snooping Use the IP Service > DHCP > Snooping (Show Information) page to display DHCP ISPLAYING entries in the binding table.
Page 358
| Security Measures HAPTER DHCP Snooping ES-4500G Series NTERFACE To display the binding table for DHCP Snooping: Click Security, IP Source Guard, DHCP Snooping. Select Show Information from the Step list. Use the Store or Clear function if required. Figure 197: Displaying the Binding Table for DHCP Snooping –...
ASIC DMINISTRATION ROTOCOLS ES-4500G Series This chapter describes basic administration tasks including: Event Logging – Sets conditions for logging event messages to system ◆ memory or flash memory, configures conditions for sending trap messages to remote log servers, and configures trap reporting to remote hosts using Simple Mail Transfer Protocol (SMTP).
| Basic Administration Protocols HAPTER Configuring Event Logging ES-4500G Series ARAMETERS These parameters are displayed in the web interface: System Log Status – Enables/disables the logging of debug or error ◆ messages to the logging process. (Default: Enabled) ◆ Flash Level – Limits log messages saved to the switch’s permanent flash memory for all levels up to the specified level.
Page 361
| Basic Administration Protocols HAPTER Configuring Event Logging ES-4500G Series Figure 198: Configuring Settings for System Memory Logs To show the error messages logged to system memory: Click Administration, Log, System. Select Show System Logs from the Step list. Click RAM or Flash. This page allows you to scroll through the logged system and event messages.
| Basic Administration Protocols HAPTER Configuring Event Logging ES-4500G Series Use the Administration > Log > Remote page to send log messages to EMOTE syslog servers or other management stations. You can also limit the event ONFIGURATION messages sent to only those messages below a specified level. CLI R EFERENCES "Event Logging"...
| Basic Administration Protocols HAPTER Configuring Event Logging ES-4500G Series Figure 200: Configuring Settings for Remote Logging of Error Messages Use the Administration > Log > SMTP page to alert system administrators ENDING IMPLE of problems by sending SMTP (Simple Mail Transfer Protocol) email RANSFER ROTOCOL messages when triggered by logging events of a specified level.
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series NTERFACE To configure SMTP alert messages: Click Administration, Log, SMTP. Enable SMTP, specify a source email address, and select the minimum severity level. Specify the source and destination email addresses, and one or more SMTP servers.
Page 365
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series ARAMETERS These parameters are displayed in the web interface: LLDP – Enables LLDP globally on the switch. (Default: Enabled) ◆ Transmission Interval – Configures the periodic transmit interval for ◆...
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series NTERFACE To configure LLDP timing attributes: Click Administration, LLDP. Select Configure Global from the Step list. Enable LLDP, and modify any of the timing parameters as required. Click Apply. Figure 202: Configuring LLDP Timing Attributes Use the Administration >...
Page 367
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series For information on defining SNMP trap destinations, see "Specifying Trap Managers" on page 397. Information about additional changes in LLDP neighbors that occur between SNMP notifications is not transmitted. Only state changes that exist at the time of a trap notification are included in the transmission.
Page 368
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series 802.1 Organizationally Specific TLVs – Configures IEEE 802.1 ◆ information included in the TLV field of advertised messages. Protocol Identity – The protocols that are accessible through this ■ interface (see "Protocol VLANs"...
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series Figure 203: Configuring LLDP Interface Attributes Use the Administration > LLDP (Show Local Device Information) page to LLDP ISPLAYING display information about the switch, such as its MAC address, chassis ID, OCAL EVICE management IP address, and port information.
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series Chassis ID – An octet string indicating the specific identifier for the ◆ particular chassis in this system. System Name – A string that indicates the system’s administratively ◆ assigned name (see "Displaying System Information"...
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series Figure 204: Displaying Local Device Information for LLDP (General) Figure 205: Displaying Local Device Information for LLDP (Port) Use the Administration > LLDP (Show Remote Device Information) page to LLDP ISPLAYING display information about devices connected directly to the switch’s ports...
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series Port ID – A string that contains the specific identifier for the port from ◆ which this LLDPDU was transmitted. System Name – A string that indicates the system’s administratively ◆...
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series System Capabilities Supported – The capabilities that define the ◆ primary function(s) of the system. (See Table 22, "System Capabilities," on page 370.) System Capabilities Enabled – The primary function(s) of the ◆...
Page 374
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series Table 24: Remote Port Auto-Negotiation Advertised Capability Capability Asymmetric and Symmetric PAUSE for full-duplex links 1000BASE-X, -LX, -SX, -CX half duplex mode 1000BASE-X, -LX, -SX, -CX full duplex mode 1000BASE-T half duplex mode 1000BASE-T full duplex mode ◆...
Page 375
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series Remote Link Aggregation Port ID – This object contains the IEEE ◆ 802.3 aggregated port identifier, aAggPortID (IEEE 802.3-2002, 30.7.2.1.1), derived from the ifNumber of the ifIndex for the port component associated with the remote system.
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series Figure 207: Displaying Remote Device Information for LLDP (Port Details) Use the Administration > LLDP (Show Device Statistics) page to display ISPLAYING EVICE statistics for LLDP-capable devices attached to the switch, and for LLDP TATISTICS protocol messages transmitted or received on all local interfaces.
Page 377
| Basic Administration Protocols HAPTER Link Layer Discovery Protocol ES-4500G Series Neighbor Entries Deleted Count – The number of LLDP neighbors ◆ which have been removed from the LLDP remote systems MIB for any reason. Neighbor Entries Dropped Count – The number of times which the ◆...
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series The switch includes an onboard agent that supports SNMP versions 1, 2c, and 3. This agent continuously monitors the status of the switch hardware, as well as the traffic passing through its ports. A network management station can access this information using network management software.
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series OMMAND SAGE Configuring SNMPv1/2c Management Access To configure SNMPv1 or v2c management access to the switch, follow these steps: Use the Administration > SNMP (Configure Global) page to enable SNMP on the switch, and to enable trap messages.
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series ARAMETERS These parameters are displayed in the web interface: Agent Status – Enables SNMP on the switch. (Default: Enabled) ◆ Authentication Traps – Issues a notification message to specified IP ◆...
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series ID is deleted or changed, all SNMP users will be cleared. You will need to reconfigure all existing users. ARAMETERS These parameters are displayed in the web interface: Engine ID – A new engine ID can be specified by entering 9 to 64 ◆...
Page 383
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series ARAMETERS These parameters are displayed in the web interface: Remote Engine ID – The engine ID can be specified by entering 9 to ◆ 64 hexadecimal characters (5 to 32 octets in hexadecimal format). If an odd number of characters are specified, a trailing zero is added to the value to fill in the last octet.
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Figure 213: Showing Remote Engine IDs for SNMP Use the Administration > SNMP (Configure View) page to configure SNMP ETTING SNMPv3 views which are used to restrict user access to specified portions IEWS of the MIB tree.
Page 385
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Select Add View from the Action list. Enter a view name and specify the initial OID subtree in the switch’s MIB database to be included or excluded in the view. Use the Add OID Subtree page to add additional object identifier branches to the view.
Page 386
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Click Apply Figure 216: Adding an OID Subtree to an SNMP View To show the OID branches configured for the SNMP views of the switch’s MIB database: Click Administration, SNMP. Select Configure View from the Step list.
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Use the Administration > SNMP (Configure Group) page to add an SNMPv3 ONFIGURING group which can be used to set the access policy for its assigned users, SNMP ROUPS restricting them to specific read, write, and notify views.
Page 388
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Table 26: Supported Notification Messages (Continued) Model Level Group SNMPv2 Traps coldStart 1.3.6.1.6.3.1.1.5.1 A coldStart trap signifies that the SNMPv2 entity, acting in an agent role, is reinitializing itself and that its configuration may have been altered.
Page 389
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Table 26: Supported Notification Messages (Continued) Model Level Group swAtcBcastStormAlarmFireTrap 1.3.6.1.4.1.572.17389.302.1.2.1.0.70 When broadcast traffic is detected as a storm, this trap is fired. swAtcBcastStormAlarmClearTrap 1.3.6.1.4.1.572.17389.302.1.2.1.0.71 When a broadcast storm is detected as normal traffic, this trap is fired.
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Figure 218: Creating an SNMP Group To show SNMP groups: Click Administration, SNMP. Select Configure Group from the Step list. Select Show from the Action list. Figure 219: Showing SNMP Groups Use the Administration >...
Page 391
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series ARAMETERS These parameters are displayed in the web interface: Community String – A community string that acts like a password ◆ and permits access to the SNMP protocol. Range: 1-32 characters, case sensitive Default strings: “public”...
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Figure 221: Showing Community Access Strings Use the Administration > SNMP (Configure User - Add SNMPv3 Local User) ONFIGURING OCAL page to authorize management access for SNMPv3 clients, or to identify SNMP SERS the source of SNMPv3 trap messages sent from the local switch.
Page 393
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Privacy Protocol – The encryption algorithm use for data privacy; ◆ only 56-bit DES is currently available. Privacy Password – A minimum of eight plain text characters is ◆ required.
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Figure 223: Showing Local SNMPv3 Users Use the Administration > SNMP (Configure User - Add SNMPv3 Remote ONFIGURING EMOTE User) page to identify the source of SNMPv3 inform messages sent from SNMP SERS the local switch.
Page 395
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series AuthPriv – SNMP communications use both authentication and ■ encryption. Authentication Protocol – The method used for user authentication. ◆ (Options: MD5, SHA; Default: MD5) Authentication Password – A minimum of eight plain text characters ◆...
Page 396
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Figure 224: Configuring Remote SNMPv3 Users To show remote SNMPv3 users: Click Administration, SNMP. Select Configure User from the Step list. Select Show SNMPv3 Remote User from the Action list. Figure 225: Showing Remote SNMPv3 Users –...
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series Use the Administration > SNMP (Configure Trap) page to specify the host PECIFYING devices to be sent traps and the types of traps to send. Traps indicating ANAGERS status changes are issued by the switch to the specified trap managers. You must specify trap managers so that key events are reported by this switch to your management station (using network management software).
Page 398
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series ARAMETERS These parameters are displayed in the web interface: SNMP Version 1 IP Address – IP address of a new management station to receive ◆ notification message (i.e., the targeted recipient). Version –...
Page 399
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series SNMP Version 3 IP Address – IP address of a new management station to receive ◆ notification message (i.e., the targeted recipient). Version – Specifies whether to send notifications as SNMP v1, v2c, or ◆...
Page 400
| Basic Administration Protocols HAPTER Simple Network Management Protocol ES-4500G Series NTERFACE To configure trap managers: Click Administration, SNMP. Select Configure Trap from the Step list. Select Add from the Action list. Fill in the required parameters based on the selected SNMP version. Click Apply Figure 226: Configuring Trap Managers (SNMPv1) Figure 227: Configuring Trap Managers (SNMPv2c)
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Figure 228: Configuring Trap Managers (SNMPv3) To show configured trap managers: Click Administration, SNMP. Select Configure Trap from the Step list. Select Show from the Action list. Figure 229: Showing Trap Managers EMOTE ONITORING Remote Monitoring allows a remote device to collect information or...
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series The switch supports mini-RMON, which consists of the Statistics, History, Event and Alarm groups. When RMON is enabled, the system gradually builds up information about its physical interfaces, storing this information in the relevant RMON database group.
Page 403
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Rising Threshold – If the current value is greater than or equal to the ◆ rising threshold, and the last sample value was less than this threshold, then an alarm will be generated. After a rising event has been generated, another such event will not be generated until the sampled value has fallen below the rising threshold, reaches the falling threshold, and again moves back up to the rising threshold.
Page 404
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Figure 230: Configuring an RMON Alarm To show configured RMON alarms: Click Administration, RMON. Select Configure Global from the Step list. Select Show from the Action list. Click Alarm. Figure 231: Showing Configured RMON Alarms –...
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Use the Administration > RMON (Configure Global - Add - Event) page to RMON ONFIGURING set the action to take when an alarm is triggered. The response can include VENTS logging the alarm or sending a message to a trap manager. Alarms and corresponding events provide a way of immediately responding to critical network problems.
Page 406
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series NTERFACE To configure an RMON event: Click Administration, RMON. Select Configure Global from the Step list. Select Add from the Action list. Click Event. Enter an index number, the type of event to initiate, the community string to send with trap messages, the name of the person who created this event, and a brief description of the event.
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Figure 233: Showing Configured RMON Events Use the Administration > RMON (Configure Interface - Add - History) page RMON ONFIGURING to collect statistics on a physical interface to monitor network utilization, ISTORY AMPLES packet types, and errors.
Page 408
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Buckets - The number of buckets requested for this entry. ◆ (Range: 1-65536; Default: 50) The number of buckets granted are displayed on the Show page. Owner - Name of the person who created this entry. (Range: 1-127 ◆...
Page 409
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Figure 235: Showing Configured RMON History Samples To show collected RMON history samples: Click Administration, RMON. Select Configure Interface from the Step list. Select Show Details from the Action list. Select a port from the list. Click History.
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Use the Administration > RMON (Configure Interface - Add - Statistics) RMON ONFIGURING page to collect statistics on a port, which can subsequently be used to TATISTICAL AMPLES monitor the network for common errors and overall traffic rates. CLI R EFERENCES "Remote Monitoring Commands"...
Page 411
| Basic Administration Protocols HAPTER Remote Monitoring ES-4500G Series Figure 237: Configuring an RMON Statistical Sample To show configured RMON statistical samples: Click Administration, RMON. Select Configure Interface from the Step list. Select Show from the Action list. Select a port from the list. Click Statistics.
ULTICAST ILTERING ES-4500G Series This chapter describes how to configure the following multicast services: Layer 2 IGMP – Configures snooping and query parameters. ◆ Filtering and Throttling – Filters specified multicast service, or throttling ◆ the maximum of multicast groups allowed on an interface. Layer 3 IGMP –...
| Multicast Filtering HAPTER IGMP Protocol ES-4500G Series This switch can use Internet Group Management Protocol (IGMP) to filter multicast traffic. IGMP Snooping can be used to passively monitor or “snoop” on exchanges between attached hosts and an IGMP-enabled device, most commonly a multicast router. In this way, the switch can discover the ports that want to join a multicast group, and set its filters accordingly.
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series across different subnetworks. Therefore, when PIM routing is enabled for a subnet on the switch, IGMP is automatically enabled. Figure 241: IGMP Protocol Network core (multicast routing) Edge switches (snooping and query) Switch to end nodes (snooping on IGMP clients)
Page 416
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series When the switch is configured to use IGMPv3 snooping, the snooping version may be downgraded to version 2 or version 1, depending on the version of the IGMP query packets detected on each VLAN. IGMP snooping will not function unless a multicast router port is enabled on the switch.
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Use the Multicast > IGMP Snooping > General page to configure the switch IGMP ONFIGURING to forward multicast traffic intelligently. Based on the IGMP query and NOOPING AND UERY report messages, the switch forwards multicast traffic only to the ports ARAMETERS...
Page 418
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Proxy Reporting Status – Enables IGMP Snooping with Proxy ◆ Reporting. (Default: Disabled) When proxy reporting is enabled with this command, the switch performs “IGMP Snooping with Proxy Reporting” (as defined in DSL Forum TR-101, April 2006), including last leave, and query suppression.
Page 419
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series (or query solicitation). When a switch receives this solicitation, it floods it to all ports in the VLAN where the spanning tree change occurred. When an upstream multicast router receives this solicitation, it immediately issues an IGMP general query.
Page 420
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series This attribute configures the IGMP report/query version used by IGMP snooping. Versions 1 - 3 are all supported, and versions 2 and 3 are backward compatible, so the switch can operate with other devices, regardless of the snooping version employed.
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Use the Multicast > IGMP Snooping > Multicast Router (Add Static PECIFYING TATIC Multicast Router) page to statically attach an interface to a multicast NTERFACES FOR A router/switch. ULTICAST OUTER Depending on network connections, IGMP snooping may not always be able...
Page 422
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Select Show Static Multicast Router from the Action list. Select the VLAN for which to display this information. Figure 244: Showing Static Interfaces Attached a Multicast Router Multicast routers that are attached to ports on the switch use information obtained from IGMP, along with a multicast routing protocol (such as PIM) to support IP multicasting across the Internet.
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Use the Multicast > IGMP Snooping > IGMP Member (Add Static Member) SSIGNING page to statically assign a multicast service to an interface. NTERFACES TO ULTICAST ERVICES Multicast filtering can be dynamically configured using IGMP Snooping and IGMP Query messages (see "Configuring IGMP Snooping and Query Parameters"...
Page 424
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Figure 246: Assigning an Interface to a Multicast Service To show the static interfaces assigned to a multicast service: Click Multicast, IGMP Snooping, IGMP Member. Select Show Static Member from the Action list. Select the VLAN for which to display this information.
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Figure 248: Showing Current Interfaces Assigned to a Multicast Service Use the Multicast > IGMP Snooping > Interface (Configure VLAN) page to IGMP ETTING configure IGMP snooping attributes for a VLAN interface. To configure NOOPING TATUS snooping globally, refer to...
Page 426
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series forwarding is enabled. They are sent upon the occurrence of these events: Upon the expiration of a periodic (randomized) timer. ■ As a part of a router's start up procedure. ■...
Page 427
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series When IGMP snooping is disabled globally, snooping can still be configured per VLAN interface, but the interface settings will not take effect until snooping is re-enabled globally. Version Exclusive – Discards any received IGMP messages (except for ◆...
Page 428
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series If proxy reporting is disabled, report suppression can still be configured by a separate attribute as described above. ◆ Interface Version – Sets the protocol version for compatibility with other devices on the network.
Page 429
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Proxy Query Address – A static source address for locally generated ◆ query and report messages used by IGMP Proxy Reporting. (Range: Any valid IP unicast address; Default: 0.0.0.0) IGMP Snooping uses a null IP address of 0.0.0.0 for the source of IGMP query messages which are proxied to downstream hosts to indicate that it is not the elected querier, but is only proxying these messages as...
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series To show the interface settings for IGMP snooping: Click Multicast, IGMP Snooping, Interface. Select Show VLAN Information from the Action list. Figure 250: Showing Interface Settings for IGMP Snooping Use the Multicast >...
| Multicast Filtering HAPTER Layer 2 IGMP (Snooping and Query) ES-4500G Series Figure 251: Dropping IGMP Query or Multicast Data Packets Use the Multicast > IGMP Snooping > Forwarding Entry page to display the ISPLAYING forwarding entries learned through IGMP Snooping. ULTICAST ROUPS IGMP...
| Multicast Filtering HAPTER Filtering and Throttling IGMP Groups ES-4500G Series Figure 252: Showing Multicast Groups Learned by IGMP Snooping IGMP G ILTERING AND HROTTLING ROUPS In certain switch applications, the administrator may want to control the multicast services that are available to end users. For example, an IP/TV service based on a specific subscription plan.
| Multicast Filtering HAPTER Filtering and Throttling IGMP Groups ES-4500G Series ARAMETERS These parameters are displayed in the web interface: IGMP Filter Status – Enables IGMP filtering and throttling globally for ◆ the switch. (Default: Disabled) NTERFACE To enables IGMP filtering and throttling on the switch: Click Multicast, IGMP Snooping, Filtering.
Page 434
| Multicast Filtering HAPTER Filtering and Throttling IGMP Groups ES-4500G Series When the access mode is set to deny, IGMP join reports are only processed when the multicast group is not in the controlled range. Add Multicast Group Range Profile ID – Selects an IGMP profile to configure. ◆...
Page 435
| Multicast Filtering HAPTER Filtering and Throttling IGMP Groups ES-4500G Series To add a range of multicast groups to an IGMP filter profile: Click Multicast, IGMP Snooping, Filtering. Select Add Multicast Group Range from the Action list. Select the profile to configure, and add a multicast group address or range of addresses.
| Multicast Filtering HAPTER Filtering and Throttling IGMP Groups ES-4500G Series Use the Multicast > IGMP Snooping > Configure Interface page to assign IGMP ONFIGURING and IGMP filter profile to interfaces on the switch, or to throttle multicast ILTERING AND traffic by limiting the maximum number of multicast groups an interface HROTTLING FOR can join at the same time.
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series Select a profile to assign to an interface, then set the maximum number of allowed multicast groups and the throttling response. Click Apply. Figure 258: Configuring IGMP Filtering and Throttling Interface Settings 3 IGMP (Q AYER UERY USED WITH...
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series Use the Multicast > IGMP > Proxy page to configure IGMP Proxy Routing. IGMP ONFIGURING ROXY OUTING In simple network topologies, it is sufficient for a device to learn multicast requirements from its downstream interfaces and proxy this group membership information to the upstream router.
Page 439
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series The IGMP proxy routing tree must be manually configured by designating one upstream interface and multiple downstream interfaces on each proxy device. No other multicast routers except for the proxy devices can exist within the tree, and the root of the tree must be connected to a wider multicast infrastructure.
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series Multicast routing protocols are not supported when IGMP proxy service ◆ is enabled. Only one upstream interface is supported on the system. ◆ A maximum of 1024 multicast entries are supported. ◆...
Page 441
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series that interface from the multicast tree. A host can also submit a join message at any time without waiting for a query from the router. Hosts can also signal when they no longer want to receive traffic for a specific group by sending a leave-group message.
Page 442
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series Multicast routers send host query messages to determine the interfaces that are connected to downstream hosts requesting a specific multicast service. Only the designated multicast router for a subnet sends host query messages, which are addressed to the multicast address 224.0.0.1, and use a time-to-live (TTL) value of 1.
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series Figure 261: Configuring IGMP Interface Settings Use the Multicast > IGMP > Static Group page to manually propagate ONFIGURING TATIC traffic from specific multicast groups onto the specified VLAN interface. IGMP G ROUP EMBERSHIP...
Page 444
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series Static Group Address – An IP multicast group address. (The group ◆ addresses specified cannot be in the range of 224.0.0.1 - 239.255.255.255.) Source Address – The source address of a multicast server ◆...
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series When IGMP (Layer 3) is enabled on the switch, use the Multicast > IGMP > ISPLAYING Group Information pages to display the current multicast groups learned ULTICAST ROUP through IGMP.
Page 446
| Multicast Filtering HAPTER Layer 3 IGMP (Query used with Multicast Routing) ES-4500G Series Show Detail The following additional information is displayed on this page: VLAN – VLAN identifier. The selected entry must be a configured IP ◆ interface. (Range: 1-4093) Group Address –...
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series Figure 264: Displaying Multicast Groups Learned from IGMP (Information) To display detailed information about the current multicast groups learned through IGMP: Click Multicast, IGMP, Group Information. Select Show Detail from the Action list. Select a VLAN.
Page 448
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series Figure 266: MVR Concept Multicast Router Satellite Services Service Network Multicast Server Layer 2 Switch Source Port Receiver Ports Set-top Box Set-top Box OMMAND SAGE General Configuration Guidelines for MVR: ◆ Enable MVR globally on the switch, select the MVR VLAN, and add the multicast groups that will stream traffic to attached hosts (see "Configuring Global MVR Settings"...
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series Use the Multicast > MVR (Configure General) page to enable MVR globally ONFIGURING LOBAL on the switch, and select the VLAN that will serve as the sole channel for MVR S ETTINGS common multicast streams supported by the service provider.
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series Figure 267: Configuring Global Settings for MVR Use the Multicast > MVR (Configure Group Range) page to assign the ONFIGURING THE multicast group address for each service to the MVR VLAN. MVR G ROUP ANGE...
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series NTERFACE To configure multicast groups for the MVR VLAN: Click Multicast, MVR. Select Configure Group Range from the Step list. Select Add from the Action list. Add the multicast groups that will stream traffic to participating hosts. Click Apply.
Page 452
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series OMMAND SAGE ◆ A port configured as an MVR receiver or source port can join or leave multicast groups configured under MVR. However, note that these ports can also use IGMP snooping to join or leave any other multicast groups using the standard rules for multicast filtering.
Page 453
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series designated multicast services supported by the MVR VLAN. Just remember that only IGMP version 2 or 3 hosts can issue multicast join or leave messages. If MVR must be configured for an IGMP version 1 host, the multicast groups must be statically assigned (see "Assigning Static Multicast Groups to Interfaces"...
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series Use the Multicast > MVR (Configure Static Group Member) page to SSIGNING TATIC statically bind multicast groups to a port which will receive long-term ULTICAST ROUPS multicast streams associated with a stable set of hosts. NTERFACES CLI R EFERENCES...
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series Select the port for which to display this information. Figure 272: Showing the Static MVR Groups Assigned to a Port Use the Multicast > MVR (Show Member) page to show the multicast HOWING ULTICAST groups either statically or dynamically assigned to the MVR VLAN on each...
Page 456
| Multicast Filtering HAPTER Multicast VLAN Registration ES-4500G Series Figure 273: Showing All MVR Groups Assigned to a Port – 456 –...
IP C ONFIGURATION ES-4500G Series This chapter describes how to configure an initial IP interface for management access to the switch over the network. This switch supports both IP Version 4 and Version 6, and can be managed simultaneously through either of these address types. You can manually configure a specific IPv4 or IPv6 address or direct the switch to obtain an IPv4 address from a BOOTP or DHCP server when it is powered on.
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 4) ES-4500G Series To enable routing between interfaces defined on this switch and ◆ external network interfaces, you must configure static routes (page 491) or use dynamic routing; i.e., RIP, OSPFv2 or OSPFv3 (page 530, 1218...
Page 459
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 4) ES-4500G Series NTERFACE To set a static address for the switch: Click IP, General, Routing Interface. Select Add from the Action list. Select any configured VLAN, set IP Address Mode to “Static,” set IP Address Type to “Primary”...
Page 460
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 4) ES-4500G Series Figure 275: Configuring a Dynamic IPv4 Address The switch will also broadcast a request for IP configuration settings on each power reset. If you lose the management connection, make a console connection to the switch and enter “show ip interface”...
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Figure 276: Showing the Configured IP Address for an Interface ’ IP A (IP V ETTING THE WITCH DDRESS ERSION This section describes how to configure an initial IPv6 interface for management access over the network, or for creating an interface to multiple subnets.
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series If a routing protocol is enabled (page 529), you can still define a ■ static route (page 491) to ensure that traffic to the designated address or subnet passes through a preferred gateway. An IPv6 default gateway can only be successfully set when a ■...
Page 463
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series network segment, and the interval between neighbor solicitations used to verify reachability information. ARAMETERS These parameters are displayed in the web interface: VLAN – ID of a configured VLAN which is to be used for management ◆...
Page 464
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series While an interface is suspended, all unicast IPv6 addresses assigned to that interface are placed in a “pending” state. Duplicate address detection is automatically restarted when the interface is administratively re-activated.
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series the MTU size, the maximum number of duplicate address detection messages, and the neighbor solicitation message interval. Click Apply. Figure 278: Configuring General Settings for an IPv6 Interface Use the IP >...
Page 466
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series identifier to automatically create the low-order 64 bits in the host portion of the address. You can also manually configure the global unicast address by ■ entering the full address and prefix length.
Page 467
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series 6-byte MAC address (also known as EUI-48 format), it must be converted into EUI-64 format by inverting the universal/local bit in the address and inserting the hexadecimal number FFFE between the upper and lower three bytes of the MAC address.
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Use the IP > IPv6 Configuration (Show IPv6 Address) page to display the HOWING IPv6 addresses assigned to an interface. DDRESSES CLI R EFERENCES "show ipv6 interface" on page 1127 ◆...
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series NTERFACE To show the configured IPv6 addresses: Click IP, IPv6 Configuration. Select Show IPv6 Address from the Action list. Select a VLAN from the list. Figure 280: Showing Configured IPv6 Addresses Use the IP >...
Page 470
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Table 27: ShowIPv6 Neighbors - display description (Continued) Field Description State The following states are used for dynamic entries: Incomplete - Address resolution is being carried out on the entry. ◆...
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Use the IP > IPv6 Configuration (Show Statistics) page to display statistics HOWING about IPv6 traffic passing through this switch. TATISTICS CLI R EFERENCES "show ipv6 traffic" on page 1130 ◆...
Page 472
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Table 28: Show IPv6 Statistics - display description (Continued) Field Description Address Errors The number of input datagrams discarded because the IPv6 address in their IPv6 header's destination field was not a valid address to be received at this entity.
Page 473
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Table 28: Show IPv6 Statistics - display description (Continued) Field Description Generated Fragments The number of output datagram fragments that have been generated as a result of fragmentation at this output interface. Fragment Succeeded The number of IPv6 datagrams that have been successfully fragmented at this output interface.
Page 474
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Table 28: Show IPv6 Statistics - display description (Continued) Field Description Destination Unreachable The number of ICMP Destination Unreachable messages sent Messages by the interface. Packet Too Big Messages The number of ICMP Packet Too Big messages sent by the interface.
Page 475
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Figure 282: Showing IPv6 Statistics (IPv6) Figure 283: Showing IPv6 Statistics (ICMPv6) – 475 –...
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Figure 284: Showing IPv6 Statistics (UDP) Use the IP > IPv6 Configuration (Show MTU) page to display the maximum HOWING THE transmission unit (MTU) cache for destinations that have returned an ICMP ESPONDING packet-too-big message along with an acceptable MTU to this switch.
Page 477
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series Figure 285: Showing Reported MTU Values – 477 –...
Page 478
| IP Configuration HAPTER Setting the Switch’s IP Address (IP Version 6) ES-4500G Series – 478 –...
IP R ENERAL OUTING ES-4500G Series This chapter provides information on network functions including: Ping – Sends ping message to another node on the network. ◆ Trace – Sends ICMP echo request packets to another node on the ◆ network. Address Resolution Protocol –...
| General IP Routing HAPTER IP Routing and Switching ES-4500G Series Figure 286: Virtual Interfaces and Layer 3 Routing Inter-subnet traffic (Layer 3 switching) Routing Untagged Untagged VLAN 1 VLAN 2 Tagged or Untagged Tagged or Untagged Tagged or Untagged Tagged or Untagged Intra-subnet traffic (Layer 2 switching) IP R...
| General IP Routing HAPTER IP Routing and Switching ES-4500G Series broadcast to get the destination MAC address from the destination node. The IP packet can then be sent directly with the destination MAC address. If the destination belongs to a different subnet on this switch, the packet can be routed directly to the destination node.
| General IP Routing HAPTER Configuring IP Routing Interfaces ES-4500G Series The switch supports both static and dynamic routing. OUTING ROTOCOLS Static routing requires routing information to be stored in the switch ◆ either manually or when a connection is set up by an application outside the switch.
| General IP Routing HAPTER Configuring IP Routing Interfaces ES-4500G Series unknown destinations, i.e., packets that do not match any routing table entry. If another router is designated as the default gateway, then the switch will pass packets to this router for any unknown hosts or subnets. To configure a default gateway for IPv4, use the static routing table as described on page...
| General IP Routing HAPTER Configuring IP Routing Interfaces ES-4500G Series Click Apply. Figure 287: Pinging a Network Device Use the IP > General > Trace Route page to show the route packets take to SING THE RACE the specified destination. OUTE UNCTION CLI R...
| General IP Routing HAPTER Address Resolution Protocol ES-4500G Series NTERFACE To trace the route to another device on the network: Click IP, General, Trace Route. Specify the target device. Click Apply. Figure 288: Tracing the Route to a Network Device DDRESS ESOLUTION ROTOCOL...
| General IP Routing HAPTER Address Resolution Protocol ES-4500G Series If there is no entry for an IP address in the ARP cache, the router will broadcast an ARP request packet to all devices on the network. The ARP request contains the following fields similar to that shown in this example: Table 30: Address Resolution Protocol destination IP address 10.1.0.19...
Page 487
| General IP Routing HAPTER Address Resolution Protocol ES-4500G Series ARAMETERS These parameters are displayed in the web interface: Timeout – Sets the aging time for dynamic entries in the ARP cache. ◆ (Range: 300 - 86400 seconds; Default: 1200 seconds or 20 minutes) The ARP aging timeout can be set for any configured VLAN.
| General IP Routing HAPTER Address Resolution Protocol ES-4500G Series For devices that do not respond to ARP requests or do not respond in a ONFIGURING TATIC timely manner, traffic will be dropped because the IP address cannot be ARP A DDRESSES mapped to a physical address.
| General IP Routing HAPTER Address Resolution Protocol ES-4500G Series Figure 291: Configuring Static ARP Entries To display static entries in the ARP cache: Click IP, ARP. Select Configure Static Address from the Step List. Select Show from the Action List. Figure 292: Displaying Static ARP Entries The ARP cache contains static entries, and entries for local interfaces, ISPLAYING...
| General IP Routing HAPTER Address Resolution Protocol ES-4500G Series Figure 293: Displaying Dynamic ARP Entries To display all local entries in the ARP cache: Click IP, ARP. Select Show Information from the Step List. Click Other Address. Figure 294: Displaying Local ARP Entries Use the IP >...
| General IP Routing HAPTER Configuring Static Routes ES-4500G Series NTERFACE To display ARP statistics: Click IP, ARP. Select Show Information from the Step List. Click Statistics. Figure 295: Displaying ARP Statistics ONFIGURING TATIC OUTES This router can dynamically configure routes to other network segments using dynamic routing protocols (i.e., RIP or OSPF).
Page 492
| General IP Routing HAPTER Configuring Static Routes ES-4500G Series Static routes are included in RIP and OSPF updates periodically sent by ◆ the router if this feature is enabled by RIP or OSPF (see page 567, respectively). ARAMETERS These parameters are displayed in the web interface: Destination IP Address –...
| General IP Routing HAPTER Displaying the Routing Table ES-4500G Series Figure 297: Displaying Static Routes ISPLAYING THE OUTING ABLE Use the IP > Routing > Routing Table page to display all routes that can be accessed via local network interfaces, through static routes, or through a dynamically learned route.
| General IP Routing HAPTER Equal-cost Multipath Routing ES-4500G Series ARAMETERS These parameters are displayed in the web interface: VLAN – VLAN identifier (i.e., configure as a valid IP subnet). ◆ Destination IP Address – IP address of the destination network, ◆...
Page 495
| General IP Routing HAPTER Equal-cost Multipath Routing ES-4500G Series dynamically generated by the Open Shortest Path Algorithm (OSPF). In other words, it uses either static or OSPF entries, not both. Normal unicast routing simply selects the path to the destination that has the lowest cost. Multipath routing still selects the path with the lowest cost, but can forward traffic over multiple paths if they all have the same lowest cost.
Page 496
| General IP Routing HAPTER Equal-cost Multipath Routing ES-4500G Series Select Configure ECMP Number from the Action List. Enter the maximum number of equal-cost paths used to route traffic to the same destination that are permitted on the switch. Click Apply Figure 299: Setting the Maximum ECMP Number –...
ONFIGURING OUTER EDUNDANCY ES-4500G Series Router redundancy protocols use a virtual IP address to support a primary router and multiple backup routers. The backup routers can be configured to take over the workload if the master router fails, or can also be configured to share the traffic load.
Page 499
| Configuring Router Redundancy HAPTER Configuring VRRP Groups ES-4500G Series priority. In cases where the configured priority is the same on several group members, then the master router with the highest IP address is selected from this group. If you have multiple secondary addresses configured on the current ◆...
Page 500
| Configuring Router Redundancy HAPTER Configuring VRRP Groups ES-4500G Series VLAN – ID of a VLAN configured with an IP interface. (Range: 1-4093; ◆ Default: 1) Adding a Virtual IP Address VLAN ID – ID of a VLAN configured with an IP interface. ◆...
Page 501
| Configuring Router Redundancy HAPTER Configuring VRRP Groups ES-4500G Series Authentication Mode – Authentication mode used to verify VRRP ◆ packets received from other routers. (Options: None, Simple Text; Default: None) If simple text authentication is selected, then you must also enter an authentication string.
Page 502
| Configuring Router Redundancy HAPTER Configuring VRRP Groups ES-4500G Series Figure 303: Configuring the VRRP Group ID To show the configured VRRP groups: Click IP, VRRP. Select Configure Group ID from the Step List. Select Show from the Action List. Figure 304: Showing Configured VRRP Groups To configure the virtual router address for a VRRP group: Click IP, VRRP.
Page 503
| Configuring Router Redundancy HAPTER Configuring VRRP Groups ES-4500G Series Figure 305: Setting the Virtual Router Address for a VRRP Group To show the virtual IP address assigned to a VRRP group: Click IP, VRRP. Select Configure Group ID from the Step List. Select Show IP Addresses from the Action List.
| Configuring Router Redundancy HAPTER Displaying VRRP Global Statistics ES-4500G Series Figure 307: Configuring Detailed Settings for a VRRP Group VRRP G ISPLAYING LOBAL TATISTICS Use the IP > VRRP (Show Statistics – Global Statistics) page to display counters for errors found in VRRP protocol packets. CLI R EFERENCES "show vrrp router counters"...
| Configuring Router Redundancy HAPTER Displaying VRRP Group Statistics ES-4500G Series Figure 308: Showing Counters for Errors Found in VRRP Packets VRRP G ISPLAYING ROUP TATISTICS Use the IP > VRRP (Show Statistics – Group Statistics) page to display counters for VRRP protocol events and errors that have occurred on a specific VRRP interface.
Page 506
| Configuring Router Redundancy HAPTER Displaying VRRP Group Statistics ES-4500G Series Table 32: VRRP Group Statistics (Continued) Parameter Description Received Invalid Type Number of VRRP packets received by the virtual router with an VRRP Packets invalid value in the “type” field. Received Error Address Number of packets received for which the address list does not List VRRP Packets...
IP S ERVICES ES-4500G Series This chapter describes the following IP services: – Configures default domain names, identifies servers to use for ◆ dynamic lookup, and shows how to configure static entries. DHCP Client – Specifies the DHCP client identifier for an interface. ◆...
| IP Services HAPTER Domain Name Service ES-4500G Series ARAMETERS These parameters are displayed in the web interface: Domain Lookup – Enables DNS host name-to-address translation. ◆ (Default: Disabled) ◆ Default Domain Name – Defines the default domain name appended to incomplete host names.
Page 509
| IP Services HAPTER Domain Name Service ES-4500G Series When an incomplete host name is received by the DNS service on this ◆ switch and a domain name list has been specified, the switch will work through the domain list, appending each domain name in the list to the host name, and checking with the specified name servers for a match (see "Configuring a List of Name Servers"...
| IP Services HAPTER Domain Name Service ES-4500G Series Use the IP Service > DNS - General (Add Name Server) page to configure a ONFIGURING A list of name servers to be tried in sequential order. ERVERS CLI R EFERENCES "ip name-server"...
| IP Services HAPTER Domain Name Service ES-4500G Series Figure 314: Showing the List of Name Servers for DNS Use the IP Service > DNS - Static Host Table (Add) page to manually ONFIGURING TATIC configure static entries in the DNS table that are used to map domain DNS H OST TO names to IP addresses.
| IP Services HAPTER Domain Name Service ES-4500G Series Figure 315: Configuring Static Entries in the DNS Table To show static entries in the DNS table: Click IP Service, DNS, Static Host Table. Select Show from the Action list. Figure 316: Showing Static Entries in the DNS Table Use the IP Service >...
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series Type – This field includes CNAME which specifies the host address for ◆ the owner, and ALIAS which specifies an alias. IP – The IP address associated with this record. ◆...
Page 514
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series OMMAND SAGE ◆ The class identifier is used identify the vendor class and configuration of the switch to the DHCP server, which then uses this information to decide on how to service the client or the type of information to return. The general framework for this DHCP option is set out in RFC 2132 ◆...
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series Use the IP Service > DHCP > Relay page to configure DHCP relay service DHCP ONFIGURING for attached host devices. If DHCP relay is enabled, and this switch sees a ELAY ERVICE DHCP request broadcast, it inserts its own IP address into the request so...
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series Figure 320: Configuring DHCP Relay Service This switch includes a Dynamic Host Configuration Protocol (DHCP) server ONFIGURING THE that can assign temporary IP addresses to any attached host requesting DHCP S ERVER service.
Page 517
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series CLI R EFERENCES ◆ "service dhcp" on page 1084 ARAMETERS These parameters are displayed in the web interface: DHCP Server – Enables or disables the DHCP server on this switch. ◆...
Page 518
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series NTERFACE To configure IP addresses excluded for DHCP clients: Click IP Service, DHCP, Server. Select Configure Excluded Addresses from the Step list. Select Add from the Action list. Enter a single address or an address range. Click Apply.
Page 519
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series OMMAND SAGE ◆ First configure address pools for the network interfaces. Then you can manually bind an address to a specific client if required. However, note that any static host address must fall within the range of an existing network address pool.
Page 520
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series Client-Identifier – A unique designation for the client device, either a ◆ text string (1-15 characters) or hexadecimal value. The information included in the identifier is based on RFC 2132 Option 60, and must be unique for all clients in the same administrative domain.
Page 521
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series Click Apply. Figure 325: Configuring DHCP Server Address Pools (Network) Figure 326: Configuring DHCP Server Address Pools (Host) To show the configured DHCP address pools: Click IP Service, DHCP, Server. Select Configure Pool from the Step list.
Page 522
| IP Services HAPTER Dynamic Host Configuration Protocol ES-4500G Series Select Show from the Action list. Figure 327: Showing Configured DHCP Server Address Pools ISPLAYING DDRESS INDINGS Use the IP Service > DHCP > Server (Show IP Binding) page display the host devices which have acquired an IP address from this switch’s DHCP server.
| IP Services HAPTER Forwarding UDP Service Requests ES-4500G Series UDP S ORWARDING ERVICE EQUESTS This section describes how this switch can forward UDP broadcast packets originating from host applications to another part of the network when an local application server is not available. OMMAND SAGE ◆...
| IP Services HAPTER Forwarding UDP Service Requests ES-4500G Series Figure 329: Enabling the UDP Helper Use the IP Service > UDP Helper > Forwarding page to specify the UDP PECIFYING destination ports for which broadcast traffic will be forwarded when the ESTINATION ORTS UDP helper is enabled.
| IP Services HAPTER Forwarding UDP Service Requests ES-4500G Series Figure 330: Specifying UDP Destination Ports To show the configured UDP destination ports: Click IP Service, UDP Helper, Forwarding. Select Show from the Action list. Figure 331: Showing the UDP Destination Ports Use the IP Service >...
Page 526
| IP Services HAPTER Forwarding UDP Service Requests ES-4500G Series The IP time-to-live (TTL) value must be at least 2. ■ The IP protocol must be UDP (17). ■ The UDP destination port must be TFTP, Domain Name System ■ (DNS), Time, NetBIOS, BOOTP or DHCP packet, or a UDP port specified on the IP Service >...
Page 527
| IP Services HAPTER Forwarding UDP Service Requests ES-4500G Series Figure 333: Showing the Target Server or Subnet for UDP Requests – 527 –...
Page 528
| IP Services HAPTER Forwarding UDP Service Requests ES-4500G Series – 528 –...
NICAST OUTING ES-4500G Series This chapter describes how to configure the following unicast routing protocols: – Configures Routing Information Protocol. OSPFv2 – Configures Open Shortest Path First (Version 2) for IPv4. VERVIEW This switch can route unicast traffic to different subnetworks using the Routing Information Protocol (RIP) or Open Shortest Path First (OSPF) protocol.
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series To coexist with a network built on multilayer switches, the subnetworks for non-IP protocols must follow the same logical boundary as that of the IP subnetworks. A separate multi-protocol router can then be used to link the subnetworks by connecting to one port from each available VLAN on the network.
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series versions can take a long time to converge on a new route after the failure of a link or router during which time routing loops may occur, and its small hop count limitation of 15 restricts its use to smaller networks.
Page 532
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series RIP send/receive versions set on the RIP Interface settings screen (page 542) always take precedence over the settings for the Global RIP Version. However, when the Global RIP Version is set to “By Interface,” any VLAN interface not previously set to a specific receive or send version is set to the following default values: Receive: Accepts RIPv1 or RIPv2 packets.
Page 533
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series access list that filters networks according to the IP address of the router supplying the routing information. Number of Route Changes – The number of route changes made to ◆...
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Figure 335: Configuring General Settings for RIP Use the Routing Protocol > RIP > General (Clear Route) page to clear LEARING NTRIES entries from the routing table based on route type or a specific network FROM THE OUTING address.
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Clear Route By Network – Clears a specific route based on its IP ◆ address and prefix length. Network IP Address – Deletes all related entries for the specified ■...
Page 536
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series ARAMETERS These parameters are displayed in the web interface: By Address – Adds a network to the RIP routing process. ◆ Subnet Address – IP address of a network directly connected to ■...
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Figure 338: Showing Network Interfaces Using RIP Use the Routing Protocol > RIP > Passive Interface (Add) page to stop RIP PECIFYING ASSIVE from sending routing updates on the specified interface. NTERFACES CLI R EFERENCES...
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Figure 339: Specifying a Passive RIP Interface To show the passive RIP interfaces: Click Routing Protocol, RIP, Passive Interface. Select Show from the Action list. Figure 340: Showing Passive RIP Interfaces Use the Routing Protocol >...
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Click Apply. Figure 341: Specifying a Static RIP Neighbor To show static RIP neighbors: Click Routing Protocol, RIP, Neighbor Address. Select Show from the Action list. Figure 342: Showing Static RIP Neighbors Use the Routing Protocol >...
Page 540
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series A route metric must be used to resolve the problem of redistributing external routes with incompatible metrics. When a metric value has not been configured on this page, the default- metric determines the metric value to be used for all imported external routes.
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Figure 344: Showing External Routes Redistributed into RIP Use the Routing Protocol > RIP > Distance (Add) page to define an PECIFYING AN administrative distance for external routes learned from other routing DMINISTRATIVE protocols.
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series NTERFACE To define an administrative distance for external routes learned from other routing protocols: Click Routing Protocol, RIP, Distance. Select Add from the Action list. Enter the distance, the external route, and optionally enter the name of an ACL to filter networks according to the IP address of the router supplying the routing information.
Page 543
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series "ip rip authentication mode" on page 1169 ◆ ◆ "ip rip authentication string" on page 1170 "ip rip split-horizon" on page 1173 ◆ OMMAND SAGE Specifying Receive and Send Protocol Types ◆...
Page 544
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series password. If any incoming protocol messages do not contain the correct password, they are simply dropped. For authentication to function properly, both the sending and receiving interface must be configured with the same password or authentication key.
Page 545
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Authentication Type – Specifies the type of authentication required ◆ for exchanging RIPv2 protocol messages. (Default: No Authentication) No Authentication: No authentication is required. ■ Simple Password: Requires the interface to exchange routing ■...
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Figure 347: Configuring a Network Interface for RIP To show the network interface settings configured for RIP: Click Routing Protocol, RIP, Interface. Select Show from the Action list. Figure 348: Showing RIP Network Interface Settings Use the Routing Protocol >...
| Unicast Routing HAPTER Configuring the Routing Information Protocol ES-4500G Series Rcv Bad Routes – Number of bad routes received. ◆ Send Updates – Number of route changes. ◆ NTERFACE To display RIP interface configuration settings: Click Routing Protocol, RIP, Statistics. Select Show Interface Information from the Action list.
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 350: Showing RIP Peer Information Use the Routing Protocol > RIP > Statistics (Reset Statistics) page to reset ESETTING all statistics for RIP protocol messages. TATISTICS CLI R EFERENCES...
Page 549
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 352: Configuring OSPF isolated stub area virtual link backbone normal area ASBR NSSA Autonomous System A ASBR ASBR Router external network Autonomous System B OMMAND SAGE OSPF looks at more than just the simple hop count.
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series You can further optimize the exchange of OSPF traffic by specifying ■ an area range that covers a large number of subnetwork addresses. This is an important technique for limiting the amount of traffic exchanged between Area Border Routers (ABRs).
Page 551
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series CLI R EFERENCES ◆ "router ospf" on page 1178 "network area" on page 1194 ◆ OMMAND SAGE Specify an Area ID and the corresponding network address range for ◆...
Page 552
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series NTERFACE To define an OSPF area and the interfaces that operate within this area: Click Routing Protocol, OSPF, Network Area. Select Add from the Action list. Configure a backbone area that is contiguous with all the other areas in the network, and configure an area for all of the other OSPF interfaces.
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 356: Showing OSPF Process Identifiers To implement dynamic OSPF routing, first assign VLAN groups to each IP ONFIGURING subnet to which this router will be attached (as described in the preceding ENERAL ROTOCOL section), then use the Routing Protocol >...
Page 554
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Auto Cost – Calculates the cost for an interface by dividing the ◆ reference bandwidth by the interface bandwidth. The reference bandwidth is defined in Mbits per second. (Range: 1-4294967) By default, the cost is 0.1 for Gigabit ports, and 0.01 for 10 Gigabit ports.
Page 555
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 357: AS Boundary Router AS 1 AS 2 ASBR ASBR Advertise Default Route – The router can advertise a default ◆ external route into the autonomous system (AS). (Options: Not Always, Always;...
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 358: Configure General Settings for OSPF Use the Routing Protocol > OSPF > System (Show) page to display general ISPLAYING administrative settings and statistics for OSPF. DMINISTRATIVE ETTINGS AND CLI R...
Page 557
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Table 33: OSPF System Information (Continued) Parameter Description ABR Status Indicates if this router connects directly to networks in two or (Area Border Router) more areas. An area border router runs a separate copy of the Shortest Path First algorithm, maintaining a separate routing database for each area.
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Use the Routing Protocol > OSPF > Area (Configure Area – Add Area) page NSSA DDING AN to add a not-so-stubby area (NSSA) or a stubby area (Stub). CLI R EFERENCES "router ospf"...
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series To show the NSSA or stubs added to the specified OSPF domain: Click Routing Protocol, OSPF, Area. Select Configure Area from the Step list. Select Show Area from the Action list. Select a Process ID.
Page 560
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series CLI R EFERENCES ◆ "router ospf" on page 1178 "area default-cost" on page 1183 ◆ "area nssa" on page 1189 ◆ OMMAND SAGE Before creating an NSSA, first specify the address range for the area ◆...
Page 561
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Redistribute – Disable this option when the router is an NSSA Area ◆ Border Router (ABR) and routes only need to be imported into normal areas (see "Redistributing External Routes"...
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Click Apply Figure 363: Configuring Protocol Settings for an NSSA Use the Routing Protocol > OSPF > Area (Configure Area – Configure Stub ONFIGURING Area) page to configure protocol settings for a stub. ETTINGS A stub does not accept external routing information.
Page 563
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series A stub can have multiple ABRs or exit points. However, all of the exit ◆ points and local routers must contain the same external routing data so that the exit point does not need to be determined for each external destination.
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 365: Configuring Protocol Settings for a Stub Use the Routing Protocol > OSPF > Area (Show Information) page to ISPLAYING protocol information on NSSA and Stub areas. NFORMATION ON NSSA CLI R...
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 366: Displaying Information on NSSA and Stub Areas An OSPF area can include a large number of nodes. If the Area Border ONFIGURING Router (ABR) has to advertise route information for each of these nodes, ANGES OUTE this wastes a lot of bandwidth and processor time.
Page 566
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series ARAMETERS These parameters are displayed in the web interface: Process ID – Process ID as configured in the Network Area ◆ configuration screen (see page 550).
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Select the process ID. Figure 369: Showing Configured Route Summaries Use the Routing Protocol > OSPF > Redistribute (Add) page to import EDISTRIBUTING external routing information from other routing protocols, static routes, or XTERNAL OUTES directly connected routes into the autonomous system, and to generate...
Page 568
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Protocol Type – Specifies the external routing protocol type for which ◆ routing information is to be redistributed into the local routing domain. (Options: RIP, Static; Default: RIP) Metric Type –...
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 371: Importing External Routes To show the imported external route types: Click Routing Protocol, OSPF, Redistribute. Select Show from the Action list. Select the process ID. Figure 372: Showing Imported External Route Types Redistributing routes from other protocols into OSPF normally requires the ONFIGURING...
Page 570
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series CLI R EFERENCES ◆ "router ospf" on page 1178 "summary-address" on page 1188 ◆ OMMAND SAGE If you are not sure what address ranges to consolidate, first enable ◆...
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series To show the summary addresses for external routes: Click Routing Protocol, OSPF, Summary Address. Select Show from the Action list. Select the process ID. Figure 374: Showing Summary Addresses for External Routes You should specify a routing interface for any local subnet that needs to OSPF ONFIGURING...
Page 572
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series IP Address – Address of the interfaces assigned to a VLAN on the ◆ Network Area (Add) page. This parameter only applies to the Configure by Address page. Cost –...
Page 573
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Transmit Delay – Sets the estimated time to send a link-state update ◆ packet over an interface. (Range: 1-65535 seconds; Default: 1 second) LSAs have their age incremented by this delay before transmission. You should consider both the transmission and propagation delays for an interface when estimating this delay.
Page 574
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series the OSPF header when routing protocol packets are originated by this device. A different password can be assigned to each network interface, but the password must be used consistently on all neighboring routers throughout a network (that is, autonomous system).
Page 575
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 375: Configuring Settings for All Interfaces Assigned to a VLAN To configure interface settings for a specific area assigned to a VLAN: Click Routing Protocol, OSPF, Interface. Select Configure by Address from the Action list.
Page 576
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 376: Configuring Settings for a Specific Area Assigned to a VLAN To show the configuration settings for OSPF interfaces: Click Routing Protocol, OSPF, Interface. Select Show from the Action list.
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 378: Showing MD5 Authentication Keys Use the Routing Protocol > OSPF > Virtual Link (Add) and (Configure ONFIGURING IRTUAL Detailed Settings) pages to configure a virtual link from an area that does INKS not have a direct physical connection to the OSPF backbone.
Page 578
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series CLI R EFERENCES ◆ "router ospf" on page 1178 "area virtual-link" on page 1192 ◆ OMMAND SAGE Use the Add page to create a virtual link, and then use the Configure ◆...
Page 579
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series To show virtual links: Click Routing Protocol, OSPF, Virtual Link. Select Show from the Action list. Select the process ID. Figure 381: Showing Virtual Links To configure detailed settings for a virtual link: Click Routing Protocol, OSPF, Virtual Link.
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 383: Showing MD5 Authentication Keys Use the Routing Protocol > OSPF > Information (LSDB) page to show the ISPLAYING Link State Advertisements (LSAs) sent by OSPF routers advertising routes. TATE ATABASE The full collection of LSAs collected by a router interface from the attached...
Page 581
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series ARAMETERS These parameters are displayed in the web interface: Process ID – Process ID as configured in the Network Area ◆ configuration screen (see page 550).
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series Figure 384: Displaying Information in the Link State Database Use the Routing Protocol > OSPF > Information (Neighbor) page to display ISPLAYING information about neighboring routers on each interface. NFORMATION ON EIGHBORING CLI R...
Page 583
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series States include: Down – Connection down ■ Attempt – Connection down, but attempting contact (non-broadcast ■ networks) Init – Have received Hello packet, but communications not yet ■...
Page 584
| Unicast Routing HAPTER Configuring the Open Shortest Path First Protocol (Version 2) ES-4500G Series – 584 –...
ULTICAST OUTING ES-4500G Series This chapter describes the following multicast routing topics: Enabling Multicast Routing Globally – Describes how to globally enable ◆ multicast routing. Displaying the Multicast Routing Table – Describes how to display the ◆ multicast routing table. Configuring PIM for IPv4 –...
Page 586
| Multicast Routing HAPTER Overview ES-4500G Series PIM-DM is a simple multicast routing protocol that uses flood and prune to build a source-routed multicast delivery tree for each multicast source- group pair. As mentioned above, it does not maintain it’s own routing table, but instead, uses the routing table provided by whatever unicast routing protocol is enabled on the router interface.
Page 587
| Multicast Routing HAPTER Overview ES-4500G Series group addresses. The BSR places information about all of the candidate RPs in subsequent bootstrap messages. The BSR and all the routers receiving these messages use the same hash algorithm to elect an RP for each multicast group.
| Multicast Routing HAPTER Configuring Global Settings for Multicast Routing ES-4500G Series data transmission delays. The switch can also be configured to use SPT only for specific multicast groups, or to disable the change over to SPT for specific groups. ONFIGURING LOBAL ETTINGS FOR...
| Multicast Routing HAPTER Configuring Global Settings for Multicast Routing ES-4500G Series Use the Multicast > Multicast Routing > Information page to display ISPLAYING THE information on each multicast route it has learned through PIM. The router ULTICAST OUTING learns multicast routes from neighboring routers, and also advertises these ABLE routes to its neighbors.
Page 590
| Multicast Routing HAPTER Configuring Global Settings for Multicast Routing ES-4500G Series Show Details Group Address – IP group address for a multicast service. ◆ Source Address – Subnetwork containing the IP multicast source. ◆ Source Mask – Network mask for the IP multicast source. ◆...
Page 591
| Multicast Routing HAPTER Configuring Global Settings for Multicast Routing ES-4500G Series Pruned – This route has been terminated. ■ Registering - A downstream device is registering for a multicast ■ source. NTERFACE To display the multicast routing table: Click Multicast, Multicast Routing, Information. Select Show Summary from the Action List.
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series ONFIGURING This section describes how to configure PIM-DM and PIM-SM for IPv4. Use the Routing Protocol > PIM > General page to enable IPv4 PIM routing NABLING globally on the router. LOBALLY CLI R EFERENCES...
Page 593
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series PIM and IGMP proxy cannot be used at the same time. When an ◆ interface is set to use PIM Dense mode or Sparse mode, IGMP proxy cannot be enabled on any interface of the device (see "Configuring IGMP Snooping and Query Parameters"...
Page 594
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series Hello messages are sent to neighboring PIM routers from which this device has received probes, and are used to verify whether or not these neighbors are still active members of the multicast tree. PIM-SM routers use these messages not only to inform neighboring routers of their presence, but also to determine which router for each LAN segment will serve as the Designated Router (DR).
Page 595
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series The override interval and the propagation delay are used to calculate the LAN prune delay. If a downstream router has group members which want to continue receiving the flow referenced in a LAN prune delay message, then the override interval represents the time required for the downstream router to process the message and then respond by sending a Join message back to the upstream router to ensure that the...
Page 596
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series of each router in the tree. This also enables PIM routers to recognize topology changes (sources joining or leaving a multicast group) before the default three-minute state timeout expires. This command is only effectively for interfaces of first hop, PIM-DM routers that are directly connected to the sources of multicast groups.
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series Use the Routing Protocol > PIM > Neighbor page to display all neighboring ISPLAYING EIGHBOR PIM routers. NFORMATION CLI R EFERENCES "show ip pim neighbor" on page 1262 ◆ ARAMETERS These parameters are displayed in the web interface: ◆...
Page 599
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series DR that leads back toward the RP. (Range: VLAN 1-4094; Default: The IP address of the DR’s outgoing interface that leads back to the RP) When the source address of a register message is filtered by intermediate network devices, or is not a uniquely routed address to which the RP can send packets, the replies sent from the RP to the source address will fail to reach the DR, resulting in PIM-SM protocol...
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series Figure 393: Configuring Global Settings for PIM-SM Use the Routing Protocol > PIM > SM (BSR Candidate) page to configure ONFIGURING A the switch as a Bootstrap Router (BSR) candidate. ANDIDATE CLI R EFERENCES...
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series length is less than 32, then only the first portion of the hash is used, and a single RP will be defined for multiple groups. (Range: 0-32; Default: 10) Priority – Priority used by the candidate bootstrap router in the ◆...
Page 602
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series If an IP address is specified that was previously used for an RP, then ◆ the older entry is replaced. Multiple RPs can be defined for different groups or group ranges. If a ◆...
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series Figure 395: Configuring a Static Rendezvous Point To display static rendezvous points: Click Multicast, Multicast Routing, SM. Select RP Address from the Step list. Select Show from the Action list. Figure 396: Showing Static Rendezvous Points Use the Routing Protocol >...
Page 604
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series The election process for each group is based on the following criteria: ◆ Find all RPs with the most specific group range. ■ Select those with the highest priority (lowest priority value). ■...
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series Figure 397: Configuring an RP Candidate To display settings for an RP candidate: Click Multicast, Multicast Routing, PIM-SM. Select RP Candidate from the Step list. Select Show from the Action list. Select an interface from the VLAN list.
Page 606
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series Priority – Priority value used by this BSR candidate. ◆ Hash Mask Length – The number of significant bits used in the ◆ multicast group comparison mask by this BSR candidate. Expire –...
| Multicast Routing HAPTER Configuring PIM for IPv4 ES-4500G Series Figure 399: Showing Information About the BSR Use the Routing Protocol > PIM > SM (Show Information – Show RP ISPLAYING Mapping) page to display active RPs and associated multicast routing APPING entries.
| Multicast Routing HAPTER Configuring PIMv6 for IPv6 ES-4500G Series Figure 400: Showing RP Mapping ONFIGURING This section describes how to configure PIM-DM for IPv6. Use the Routing Protocol > PIM6 > General page to enable IPv6 PIM NABLING routing globally on the router. LOBALLY CLI R EFERENCES...
| Multicast Routing HAPTER Configuring PIMv6 for IPv6 ES-4500G Series Use the Routing Protocol > PIM6 > Interface page configure the routing ONFIGURING protocol’s functional attributes for each interface. NTERFACE ETTINGS CLI R EFERENCES "IPv6 PIM Commands" on page 1276 ◆...
Page 610
| Multicast Routing HAPTER Configuring PIMv6 for IPv6 ES-4500G Series a router does not hear from a neighbor for the period specified by the Hello Holdtime, that neighbor is dropped. This hold time is included in each hello message received from a neighbor. Also note that hello messages also contain the DR priority of the router sending the message.
Page 611
| Multicast Routing HAPTER Configuring PIMv6 for IPv6 ES-4500G Series Propagation Delay – The time required for a LAN prune delay ◆ message to reach downstream routers. (Range: 100-5000 milliseconds; Default: 500 milliseconds) The override interval and pro po gat ion delay are used to calculate the LAN prune delay.
ECTION ES-4500G Series OMMAND NTERFACE This section provides a detailed description of the Command Line Interface, along with examples for all of the commands. This section includes these chapters: "General Commands" on page 629 ◆ "System Management Commands" on page 637 ◆...
Page 616
| Command Line Interface ECTION ES-4500G Series "VLAN Commands" on page 917 ◆ "Class of Service Commands" on page 959 ◆ "Quality of Service Commands" on page 973 ◆ "Multicast Filtering Commands" on page 989 ◆ "LLDP Commands" on page 1049 ◆...
SING THE OMMAND NTERFACE ES-4500G Series This chapter describes how to use the Command Line Interface (CLI). You can only access the console interface through the Master unit in the stack. CCESSING THE When accessing the management interface for the switch over a direct connection to the server’s console port, or via a Telnet or Secure Shell connection (SSH), the switch can be managed by entering command keywords and parameters at the prompt.
| Using the Command Line Interface HAPTER Accessing the CLI ES-4500G Series Telnet operates over the IP transport protocol. In this environment, your ELNET ONNECTION management station and any network device you want to manage over the network must have a valid IP address. Valid IP addresses consist of four numbers, 0 to 255, separated by periods.
| Using the Command Line Interface HAPTER Entering Commands ES-4500G Series You can open up to four sessions to the device via Telnet or SSH. NTERING OMMANDS This section describes how to enter CLI commands. A CLI command is a series of keywords and arguments. Keywords identify EYWORDS AND a command, and arguments specify configuration parameters.
| Using the Command Line Interface HAPTER Entering Commands ES-4500G Series You can display a brief description of the help system by entering the help ETTING ELP ON command. You can also display command syntax by using the “?” character OMMANDS to list keywords or parameters.
| Using the Command Line Interface HAPTER Entering Commands ES-4500G Series Secure shell server connections startup-config Startup system configuration subnet-vlan IP subnet-based VLAN information system System information tacacs-server TACACS server information tech-support Technical information time-range Time range traffic-segmentation Traffic segmentation information users Information about users logged in version...
| Using the Command Line Interface HAPTER Entering Commands ES-4500G Series The CLI maintains a history of commands that have been entered. You can SING OMMAND scroll back through the history of commands by pressing the up arrow key. ISTORY Any command displayed in the history list can be executed again, or first modified and then executed.
| Using the Command Line Interface HAPTER Entering Commands ES-4500G Series To enter Privileged Exec mode, enter the following user names and passwords: Username: admin Password: [admin login password] CLI session with the ES-4526G is opened. To end the CLI session, enter [Exit]. Console# Username: guest Password: [guest login password]...
| Using the Command Line Interface HAPTER Entering Commands ES-4500G Series Multiple Spanning Tree Configuration - These commands configure ◆ settings for the selected multiple spanning tree instance. Policy Map Configuration - Creates a DiffServ policy map for multiple ◆ interfaces.
| Using the Command Line Interface HAPTER Entering Commands ES-4500G Series For example, you can use the following commands to enter interface configuration mode, and then return to Privileged Exec mode Console(config)#interface ethernet 1/5 Console(config-if)#exit Console(config)# Commands are not case sensitive. You can abbreviate commands and OMMAND parameters as long as they contain enough letters to differentiate them ROCESSING...
| Using the Command Line Interface HAPTER CLI Command Groups ES-4500G Series CLI C OMMAND ROUPS The system commands can be broken down into the functional groups shown below Table 37: Command Group Index Command Group Description Page General Basic commands for entering privileged access mode, restarting the system, or quitting the CLI System Management Display and setting of system information, basic modes...
Page 627
| Using the Command Line Interface HAPTER CLI Command Groups ES-4500G Series Table 37: Command Group Index (Continued) Command Group Description Page Class of Service Sets port priority for untagged frames, selects strict priority or weighted round robin, relative weight for each priority queue, also sets priority for TCP/UDP traffic types, IP precedence, and DSCP Quality of Service...
Page 628
| Using the Command Line Interface HAPTER CLI Command Groups ES-4500G Series – 628 –...
ENERAL OMMANDS ES-4500G Series These commands are used to control the command access mode, configuration mode, and other basic functions. Table 38: General Commands Command Function Mode prompt Customizes the CLI prompt reload Restarts the system at a specified time, after a specified delay, or at a periodic interval enable Activates privileged mode...
| General Commands HAPTER ES-4500G Series XAMPLE Console(config)#prompt RD2 RD2(config)# This command restarts the system at a specified time, after a specified reload (Global delay, or at a periodic interval. You can reboot the system immediately, or Configuration) you can configure the switch to reset after a specified amount of time. Use the cancel option to remove a configured setting.
| General Commands HAPTER ES-4500G Series OMMAND SAGE ◆ This command resets the entire system. Any combination of reload options may be specified. If the same option ◆ is re-specified, the previous setting will be overwritten. ◆ When the system is restarted, it will always run the Power-On Self-Test. It will also retain all configuration information stored in non-volatile memory by the copy running-config startup-config...
| General Commands HAPTER ES-4500G Series XAMPLE Console>enable Password: [privileged level password] Console# ELATED OMMANDS disable (634) enable password (718) This command exits the configuration program. quit EFAULT ETTING None OMMAND Normal Exec, Privileged Exec OMMAND SAGE The quit and exit commands can both exit the configuration program. XAMPLE This example shows how to quit a CLI session: Console#quit...
| General Commands HAPTER ES-4500G Series XAMPLE In this example, the show history command lists the contents of the command history buffer: Console#show history Execution command history: 2 config 1 show history Configuration command history: 4 interface vlan 1 3 exit 2 interface vlan 1 1 end Console#...
| General Commands HAPTER ES-4500G Series This command returns to Normal Exec mode from privileged mode. In disable normal access mode, you can only display basic information on the switch's configuration or Ethernet statistics. To gain access to all commands, you must use the privileged mode.
| General Commands HAPTER ES-4500G Series This command displays the current reload settings, and the time at which show reload next scheduled reload will take place. OMMAND Privileged Exec XAMPLE Console#show reload Reloading switch in time: 0 hours 29 minutes. The switch will be rebooted at January 1 02:11:50 2001.
Page 636
| General Commands HAPTER ES-4500G Series XAMPLE This example shows how to return to the Privileged Exec mode from the Global Configuration mode, and then quit the CLI session: Console(config)#exit Console#exit Press ENTER to start session User Access Verification Username: –...
YSTEM ANAGEMENT OMMANDS ES-4500G Series These commands are used to control system logs, passwords, user names, management options, and display or configure a variety of other system information. Table 39: System Management Commands Command Group Function Device Designation Configures information that uniquely identifies this switch System Status Displays system configuration, active managers, and version information...
| System Management Commands HAPTER Device Designation ES-4500G Series This command specifies or modifies the host name for this device. Use the hostname no form to restore the default host name. YNTAX hostname name no hostname name - The name of this host. (Maximum length: 255 characters) EFAULT ETTING None...
| System Management Commands HAPTER System Status ES-4500G Series YSTEM TATUS This section describes commands used to display system information. Table 41: System Status Commands Command Function Mode show access-list tcam- Shows utilization parameters for TCAM utilization show memory Shows memory utilization parameters NE, PE show process cpu Shows CPU utilization parameters...
| System Management Commands HAPTER System Status ES-4500G Series This command shows memory utilization parameters. show memory OMMAND Normal Exec, Privileged Exec OMMAND SAGE This command shows the amount of memory currently free for use, the amount of memory allocated to active processes, and the total amount of system memory.
Page 641
| System Management Commands HAPTER System Status ES-4500G Series OMMAND SAGE ◆ Use the interface keyword to display configuration data for the specified interface. Use this command in conjunction with the show startup-config ◆ command to compare the information in running memory to the information stored in non-volatile memory.
| System Management Commands HAPTER System Status ES-4500G Series XAMPLE Refer to the example for the running configuration file. ELATED OMMANDS show running-config (640) This command displays system information. show system EFAULT ETTING None OMMAND Normal Exec, Privileged Exec OMMAND SAGE For a description of the items shown by this command, refer to ◆...
| System Management Commands HAPTER System Status ES-4500G Series Unit 1 Temperature 1: 28 degrees Temperature 2: 44 degrees Console# This command displays a detailed list of system settings designed to help show tech-support technical support resolve configuration or functional problems. OMMAND Normal Exec, Privileged Exec OMMAND...
| System Management Commands HAPTER System Status ES-4500G Series XAMPLE Console#show users User Name Accounts: User Name Privilege Public-Key --------- --------- ---------- admin 15 None guest 0 None steve Online Users: Line User Name Idle time (h:m:s) Remote IP addr ------- -------------------------------- ----------------- --------------- * Console admin 0:00:00...
| System Management Commands HAPTER Frame Size ES-4500G Series RAME This section describes commands used to configure the Ethernet frame size on the switch. Table 42: Frame Size Commands Command Function Mode jumbo frame Enables support for jumbo frames This command enables support for layer 2 jumbo frames for Gigabit and jumbo frame 10 Gigabit Ethernet ports.
| System Management Commands HAPTER Fan Control ES-4500G Series ELATED OMMANDS switchport mtu (843) show system (643) ONTROL This section describes the command used to force fan speed. Table 43: Fan Control Commands Command Function Mode fan-speed force-full Forces fans to full speed show system Shows if full fan speed is enabled NE, PE...
| System Management Commands HAPTER File Management ES-4500G Series Saving or Restoring Configuration Settings Configuration settings can be uploaded and downloaded to and from an FTP/TFTP server. The configuration file can be later downloaded to restore switch settings. The configuration file can be downloaded under a new file name and then set as the startup file, or the current startup configuration file can be specified as the destination file to directly replace it.
| System Management Commands HAPTER File Management ES-4500G Series ELATED OMMANDS dir (653) whichboot (654) This command moves (upload/download) a code image or configuration file copy between the switch’s flash memory and an FTP/TFTP server. When you save the system code or configuration settings to a file on an FTP/TFTP server, that file can later be downloaded to the switch to restore system operation.
Page 650
| System Management Commands HAPTER File Management ES-4500G Series You can use “Factory_Default_Config.cfg” as the source to copy from ◆ the factory default configuration file, but you cannot use it as the destination. To replace the startup configuration, you must use startup-config as ◆...
Page 651
| System Management Commands HAPTER File Management ES-4500G Series The following example shows how to copy the running configuration to a startup file. Console#copy running-config file destination file name: startup Write to FLASH Programming. \Write to FLASH finish. Success. Console# The following example shows how to download a configuration file: Console#copy tftp startup-config TFTP server ip address: 10.1.0.99...
| System Management Commands HAPTER File Management ES-4500G Series This example shows how to copy a file to an FTP server. Console#copy ftp file FTP server IP address: 169.254.1.11 User[anonymous]: admin Password[]: ***** Choose file type: 1. config: 2. opcode: 2 Source file name: BLANC.BIX Destination file name: BLANC.BIX Console#...
| System Management Commands HAPTER File Management ES-4500G Series This command displays a list of files in flash memory. YNTAX dir [unit:] {boot-rom: | config: | opcode:} [filename]} unit - Stack unit. (Range: 1-8) boot-rom - Boot ROM (or diagnostic) image file. config - Switch configuration file.
| System Management Commands HAPTER Line ES-4500G Series This command displays which files were booted when the system powered whichboot YNTAX whichboot [unit] unit - Stack unit. (Range: 1-8) EFAULT ETTING None OMMAND Privileged Exec XAMPLE This example shows the information displayed by the whichboot command.
| System Management Commands HAPTER Line ES-4500G Series Table 46: Line Commands (Continued) Command Function Mode password-thresh Sets the password intrusion threshold, which limits the number of failed logon attempts Sets the amount of time the management console is silent-time inaccessible after the number of unsuccessful logon attempts exceeds the threshold set by the password-...
| System Management Commands HAPTER Line ES-4500G Series This command sets the number of data bits per character that are databits interpreted and generated by the console port. Use the no form to restore the default value. YNTAX databits {7 | 8} no databits 7 - Seven data bits per character.
| System Management Commands HAPTER Line ES-4500G Series OMMAND SAGE ◆ If user input is detected within the timeout interval, the session is kept open; otherwise the session is terminated. This command applies to both the local console and Telnet connections. ◆...
| System Management Commands HAPTER Line ES-4500G Series This command controls login authentication via the switch itself. To ◆ configure user names and passwords for remote authentication servers, you must use the RADIUS or TACACS software installed on those servers. XAMPLE Console(config-line)#login local Console(config-line)#...
| System Management Commands HAPTER Line ES-4500G Series This command specifies the password for a line. Use the no form to password remove the password. YNTAX password {0 | 7} password no password {0 | 7} - 0 means plain password, 7 means encrypted password password - Character string that specifies the line password.
| System Management Commands HAPTER Line ES-4500G Series This command sets the password intrusion threshold which limits the password-thresh number of failed logon attempts. Use the no form to remove the threshold value. YNTAX password-thresh [threshold] no password-thresh threshold - The number of allowed password attempts. (Range: 1-120;...
| System Management Commands HAPTER Line ES-4500G Series OMMAND Line Configuration (console only) XAMPLE To set the silent time to 60 seconds, enter this command: Console(config-line)#silent-time 60 Console(config-line)# ELATED OMMANDS password-thresh (660) This command sets the terminal line’s baud rate. This command sets both speed the transmit (to terminal) and receive (from terminal) speeds.
| System Management Commands HAPTER Line ES-4500G Series This command sets the number of the stop bits transmitted per byte. Use stopbits the no form to restore the default setting. YNTAX stopbits {1 | 2} no stopbits 1 - One stop bit 2 - Two stop bits EFAULT ETTING...
| System Management Commands HAPTER Line ES-4500G Series Using the command without specifying a timeout restores the default ◆ setting. XAMPLE To set the timeout to two minutes, enter this command: Console(config-line)#timeout login response 120 Console(config-line)# This command terminates an SSH, Telnet, or console connection. disconnect YNTAX disconnect session-id...
| System Management Commands HAPTER Event Logging ES-4500G Series XAMPLE To show all lines, enter this command: Console#show line Console Configuration: Password Threshold : 3 times Inactive Timeout : Disabled Login Timeout : Disabled Silent Time : Disabled Baud Rate : 115200 Data Bits Parity...
| System Management Commands HAPTER Event Logging ES-4500G Series This command sets the facility type for remote logging of syslog messages. logging facility Use the no form to return the type to the default. YNTAX logging facility type no logging facility type - A number that indicates the facility used by the syslog server to dispatch log messages to an appropriate service.
| System Management Commands HAPTER Event Logging ES-4500G Series XAMPLE Console(config)#logging host 10.1.0.3 Console(config)# This command controls logging of error messages, sending debug or error logging on messages to a logging process. The no form disables the logging process. YNTAX [no] logging on EFAULT ETTING...
| System Management Commands HAPTER Event Logging ES-4500G Series EFAULT ETTING Disabled Level 7 OMMAND Global Configuration OMMAND SAGE Using this command with a specified level enables remote logging and ◆ sets the minimum severity level to be saved. ◆ Using this command without a specified level also enables remote logging, but restores the minimum severity level to the default.
| System Management Commands HAPTER Event Logging ES-4500G Series This command displays the log messages stored in local memory. show log YNTAX show log {flash | ram} flash - Event history stored in flash memory (i.e., permanent memory). ram - Event history stored in temporary RAM (i.e., memory flushed on power reset).
| System Management Commands HAPTER Event Logging ES-4500G Series XAMPLE The following example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., default level 3 - 0), and the message level for RAM is “debugging” (i.e., default level 7 - 0). Console#show logging flash Syslog logging: Enabled...
| System Management Commands HAPTER SMTP Alerts ES-4500G Series SMTP A LERTS These commands configure SMTP event handling, and forwarding of alert messages to the specified SMTP servers and email recipients. Table 51: Event Logging Commands Command Function Mode logging sendmail Enables SMTP event handling logging sendmail host SMTP servers to receive alert messages...
| System Management Commands HAPTER SMTP Alerts ES-4500G Series OMMAND Global Configuration OMMAND SAGE You can specify up to three SMTP servers for event handing. However, ◆ you must enter a separate command to specify each server. To send email alerts, the switch first opens a connection, sends all the ◆...
| System Management Commands HAPTER SMTP Alerts ES-4500G Series XAMPLE This example will send email alerts for system errors from level 3 through Console(config)#logging sendmail level 3 Console(config)# This command specifies the email recipients of alert messages. Use the no logging sendmail form to remove a recipient.
| System Management Commands HAPTER Time ES-4500G Series OMMAND SAGE You may use an symbolic email address that identifies the switch, or the address of an administrator responsible for the switch. XAMPLE Console(config)#logging sendmail source-email bill@this-company.com Console(config)# This command displays the settings for the SMTP event handler. show logging sendmail OMMAND...
| System Management Commands HAPTER Time ES-4500G Series Table 52: Time Commands (Continued) Command Function Mode Manual Configuration Commands clock timezone Sets the time zone for the switch’s internal clock calendar set Sets the system date and time show calendar Displays the current date and time setting NE, PE This command enables SNTP client requests for time synchronization from...
| System Management Commands HAPTER Time ES-4500G Series This command sets the interval between sending time requests when the sntp poll switch is set to SNTP client mode. Use the no form to restore to the default. YNTAX sntp poll seconds no sntp poll seconds - Interval between time requests.
| System Management Commands HAPTER Time ES-4500G Series XAMPLE Console(config)#sntp server 10.1.0.19 Console# ELATED OMMANDS sntp client (675) sntp poll (676) show sntp (677) This command displays the current time and configuration settings for the show sntp SNTP client, and indicates whether or not the local time has been properly updated.
| System Management Commands HAPTER Time ES-4500G Series EFAULT ETTING None OMMAND Global Configuration OMMAND SAGE This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich Mean Time or GMT), based on the earth’s prime meridian, zero degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is east (before) or west (after) of UTC.
| System Management Commands HAPTER Time Range ES-4500G Series XAMPLE This example shows how to set the system clock to 15:12:34, February 1st, 2002. Console#calendar set 15:12:34 1 February 2002 Console# This command displays the system clock. show calendar EFAULT ETTING None OMMAND...
| System Management Commands HAPTER Time Range ES-4500G Series EFAULT ETTING None OMMAND Global Configuration OMMAND SAGE This command sets a time range for use by other functions, such as Access Control Lists. XAMPLE Console(config)#time-range r&d Console(config-time-range)# ELATED OMMANDS Access Control Lists (813) This command sets the time range for the execution of a command.
| System Management Commands HAPTER Time Range ES-4500G Series XAMPLE This example configures the time for the single occur ran ce of an event. Console(config)#time-range r&d Console(config-time-range)#absolute start 1 1 1 april 2009 end 2 1 1 april 2009 Console(config-time-range)# This command sets the time range for the periodic execution of a periodic command.
| System Management Commands HAPTER Time Range ES-4500G Series This command shows configured time ranges. show time-range YNTAX show time-range [name] name - Name of the time range. (Range: 1-30 characters) EFAULT ETTING None OMMAND Privileged Exec XAMPLE Console#show time-range r&d Time-range r&d: absolute start 01:01 01 April 2009 periodic...
SNMP C OMMANDS ES-4500G Series Controls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the error types sent to trap managers. SNMP Version 3 also provides security features that cover message integrity, authentication, and encryption;...
| SNMP Commands HAPTER ES-4500G Series Table 54: SNMP Commands (Continued) Command Function Mode Notification Log Commands Enables the specified notification log snmp-server notify-filter Creates a notification log and specifies the target host show nlm oper-status Shows operation status of configured notification logs show snmp notify-filter Displays the configured notification logs...
| SNMP Commands HAPTER ES-4500G Series XAMPLE Console(config)#snmp-server Console(config)# This command defines community access strings used to authorize snmp-server management access by clients using SNMP v1 or v2c. Use the no form to community remove the specified community string. YNTAX snmp-server community string [ro | rw] no snmp-server community string string - Community string that acts like a password and permits...
| SNMP Commands HAPTER ES-4500G Series OMMAND Global Configuration XAMPLE Console(config)#snmp-server contact Paul Console(config)# ELATED OMMANDS snmp-server location (686) This command sets the system location string. Use the no form to remove snmp-server the location string. location YNTAX snmp-server location text no snmp-server location text - String that describes the system location.
| SNMP Commands HAPTER ES-4500G Series snmp-server enable traps command. If you enter the command with no keywords, both authentication and link-up-down notifications are enabled. If you enter the command with a keyword, only the notification type related to that keyword is enabled. The snmp-server enable traps command is used in conjunction with ◆...
Page 689
| SNMP Commands HAPTER ES-4500G Series prior to using the snmp-server host command. (Maximum length: 32 characters) version - Specifies whether to send notifications as SNMP Version 1, 2c or 3 traps. (Range: 1, 2c, 3; Default: 1) auth | noauth | priv - This group uses SNMPv3 with authentication, no authentication, or with authentication and privacy.
Page 690
| SNMP Commands HAPTER ES-4500G Series To send an inform to a SNMPv2c host, complete these steps: Enable the SNMP agent (page 684). Create a view with the required notification messages (page 694). Create a group that includes the required notify view (page 692).
| SNMP Commands HAPTER ES-4500G Series This command configures an identification string for the SNMPv3 engine. snmp-server Use the no form to restore the default. engine-id YNTAX snmp-server engine-id {local | remote {ip-address}} engineid-string no snmp-server engine-id {local | remote {ip-address}} local - Specifies the SNMP engine on this switch.
| SNMP Commands HAPTER ES-4500G Series ELATED OMMANDS snmp-server host (688) This command adds an SNMP group, mapping SNMP users to SNMP views. snmp-server group Use the no form to remove an SNMP group. YNTAX snmp-server group groupname {v1 | v2c | v3 {auth | noauth | priv}} [read readview] [write writeview] [notify notifyview] no snmp-server group groupname groupname - Name of an SNMP group.
| SNMP Commands HAPTER ES-4500G Series XAMPLE Console(config)#snmp-server group r&d v3 auth write daily Console(config)# This command adds a user to an SNMP group, restricting the user to a snmp-server user specific SNMP Read, Write, or Notify View. Use the no form to remove a user from an SNMP group.
| SNMP Commands HAPTER ES-4500G Series Remote users (i.e., the command specifies a remote engine identifier) ◆ must be configured to identify the source of SNMPv3 inform messages sent from the local switch. The SNMP engine ID is used to compute the authentication/privacy ◆...
| SNMP Commands HAPTER ES-4500G Series OMMAND SAGE ◆ Views are used in the snmp-server group command to restrict user access to specified portions of the MIB tree. The predefined view “defaultview” includes access to the entire MIB ◆ tree. XAMPLES This view includes MIB-2.
| SNMP Commands HAPTER ES-4500G Series Table 55: show snmp engine-id - display description (Continued) Field Description Remote SNMP engineID String identifying an engine ID on a remote device. IP address IP address of the device containing the corresponding remote SNMP engine.
| SNMP Commands HAPTER ES-4500G Series Table 56: show snmp group - display description Field Description Group Name Name of an SNMP group. Security Model The SNMP version. Read View The associated read view. Write View The associated write view. Notify View The associated notify view.
| SNMP Commands HAPTER ES-4500G Series This command shows information on the SNMP views. show snmp view OMMAND Privileged Exec XAMPLE Console#show snmp view View Name : mib-2 Subtree OID : 1.2.2.3.6.2.1 View Type : included Storage Type : nonvolatile Row Status : active View Name...
| SNMP Commands HAPTER ES-4500G Series Disabling logging with this command does not delete the entries stored ◆ in the notification log. XAMPLE This example enables the notification log A1. Console(config)#nlm A1 Console(config)# This command creates an SNMP notification log. Use the no form to snmp-server notify- remove this log.
| SNMP Commands HAPTER ES-4500G Series To avoid this problem, notification logging should be configured and ◆ enabled using the snmp-server notify-filter command and command, and these commands stored in the startup configuration file. Then when the switch reboots, SNMP traps (such as warm start) can now be logged.
| SNMP Commands HAPTER ES-4500G Series This command displays the configured notification logs. show snmp notify- filter OMMAND Privileged Exec XAMPLE This example displays the configured notification logs and associated target hosts. Console#show snmp notify-filter Filter profile name IP address ---------------------------- ---------------- 10.1.19.23...
EMOTE ONITORING OMMANDS ES-4500G Series Remote Monitoring allows a remote device to collect information or respond to specified events on an independent basis. This switch is an RMON-capable device which can independently perform a wide range of tasks, significantly reducing network management traffic. It can continuously run diagnostics and log information on network performance.
| Remote Monitoring Commands HAPTER ES-4500G Series This command sets threshold bounds for a monitored variable. Use the no rmon alarm form to remove an alarm. YNTAX rmon alarm index variable interval {absolute | delta} rising-threshold threshold [event-index] falling-threshold threshold [event-index] [owner name] no rmon alarm index index –...
| Remote Monitoring Commands HAPTER ES-4500G Series If the current value is less than or equal to the falling threshold, and ◆ the last sample value was greater than this threshold, then an alarm will be generated. After a falling event has been generated, another such event will not be generated until the sampled value has risen above the falling threshold, reaches the rising threshold, and again moves back down to the failing threshold.
| Remote Monitoring Commands HAPTER ES-4500G Series The specified events determine the action to take when an alarm ◆ triggers this event. The response to an alarm can include logging the alarm or sending a message to a trap manager. XAMPLE Console(config)#rmon event 2 log description urgent owner mike Console(config)#...
| Remote Monitoring Commands HAPTER ES-4500G Series XAMPLE Console(config)#interface ethernet 1/1 Console(config-if)#rmon collection history 21 buckets 24 interval 60 owner mike Console(config-if)# This command enables the collection of statistics on a physical interface. rmon collection Use the no form to disable statistics collection. rmon1 YNTAX rmon collection rmon1 controlEntry index [owner name]...
| Remote Monitoring Commands HAPTER ES-4500G Series This command shows the settings for all configured alarms. show rmon alarms OMMAND Privileged Exec XAMPLE Console#show rmon alarms Alarm 1 is valid, owned by Monitors 1.3.6.1.2.1.16.1.1.1.6.1 every 30 seconds Taking delta samples, last value was 0 Rising threshold is 892800, assigned to event 0 Falling threshold is 446400, assigned to event 0 This command shows the settings for all configured events.
| Remote Monitoring Commands HAPTER ES-4500G Series This command shows the information collected for all configured entries in show rmon the statistics group. statistics OMMAND Privileged Exec XAMPLE Console#show rmon statistics Interface 1 is valid, and owned by Monitors 1.3.6.1.2.1.2.2.1.1.1 which has Received 164289 octets, 2372 packets, 120 broadcast and 2211 multicast packets, 0 undersized and 0 oversized packets,...
AMPLING OMMANDS ES-4500G Series Flow sampling (sFlow) can be used with a remote sFlow Collector to provide an accurate, detailed and real-time overview of the types and levels of traffic present on the network. The sFlow Agent samples 1 out of n packets from all data traversing the switch, re-encapsulates the samples as sFlow datagrams and transmits them to the sFlow Collector.
| Flow Sampling Commands HAPTER ES-4500G Series One double colon may be used to indicate the appropriate number of zeros required to fill the undefined fields. destination-udp-port - The UDP port on which the Collector is listening for sFlow streams. (Range: 0-65534) EFAULT ETTING IP Address: null...
| Flow Sampling Commands HAPTER ES-4500G Series This command configures the maximum size of the sFlow datagram header. sflow max-header- Use the no form to restore the default setting. size YNTAX sflow max-header-size max-header-size no max-header-size max-header-size - The maximum size of the sFlow datagram header.
| Flow Sampling Commands HAPTER ES-4500G Series This command configures the packet sampling rate. Use the no form to sflow sample restore the default rate. YNTAX sflow sample rate no sflow sample rate - The packet sampling rate, or the number of packets out of which one sample will be taken.
| Flow Sampling Commands HAPTER ES-4500G Series This command configures the length of time samples are sent to the sflow timeout Collector before resetting all sFlow port parameters. Use the no form to restore the default time out. YNTAX sflow timeout seconds no sflow timeout seconds - The length of time the sFlow process continuously sends samples to the Collector before resetting all sFlow port parameters.
Page 716
| Flow Sampling Commands HAPTER ES-4500G Series OMMAND Privileged Exec XAMPLE Console#show sflow interface ethernet 1/9 Interface of Ethernet Interface status : Enabled Owner name : Lamar Owner destination : 192.168.0.4 Owner socket port : 6343 Time out : 9994 Maximum header size : 256 Maximum datagram size : 1500...
UTHENTICATION OMMANDS ES-4500G Series You can configure this switch to authenticate users logging into the system for management access using local or remote authentication methods. Port-based authentication using IEEE 802.1X can also be configured to control either management access to the uplink ports or client access the data ports.
| Authentication Commands HAPTER User Accounts ES-4500G Series After initially logging onto the system, you should set the Privileged Exec enable password password. Remember to record it in a safe place. This command controls access to the Privileged Exec level from the Normal Exec level. Use the no form to reset the default password.
| Authentication Commands HAPTER User Accounts ES-4500G Series This command adds named users, requires authentication at login, username specifies or changes a user's password (or specify that no password is required), or specifies or changes a user's access level. Use the no form to remove a user name.
| Authentication Commands HAPTER Authentication Sequence ES-4500G Series UTHENTICATION EQUENCE Three authentication methods can be specified to authenticate users logging into the system for management access. The commands in this section can be used to define the authentication method and sequence. Table 64: Authentication Sequence Commands Command Function...
| Authentication Commands HAPTER Authentication Sequence ES-4500G Series If the TACACS+ server is not available, the local user name and password is checked. XAMPLE Console(config)#authentication enable radius Console(config)# ELATED OMMANDS enable password - sets the password for changing command modes (718) This command defines the login authentication method and precedence.
| Authentication Commands HAPTER RADIUS Client ES-4500G Series XAMPLE Console(config)#authentication login radius Console(config)# ELATED OMMANDS username - for setting the local user names and passwords (719) RADIUS C LIENT Remote Authentication Dial-in User Service (RADIUS) is a logon authentication protocol that uses software running on a central server to control access to RADIUS-aware devices on the network.
| Authentication Commands HAPTER RADIUS Client ES-4500G Series XAMPLE Console(config)#radius-server acct-port 181 Console(config)# This command sets the RADIUS server network port. Use the no form to radius-server auth- restore the default. port YNTAX radius-server auth-port port-number no radius-server auth-port port-number - RADIUS server UDP port used for authentication messages.
| Authentication Commands HAPTER RADIUS Client ES-4500G Series retransmit - Number of times the switch will try to authenticate logon access via the RADIUS server. (Range: 1-30) timeout - Number of seconds the switch waits for a reply before resending a request. (Range: 1-65535) EFAULT ETTING auth-port - 1812...
| Authentication Commands HAPTER RADIUS Client ES-4500G Series This command sets the number of retries. Use the no form to restore the radius-server default. retransmit YNTAX radius-server retransmit number-of-retries no radius-server retransmit number-of-retries - Number of times the switch will try to authenticate logon access via the RADIUS server.
| Authentication Commands HAPTER TACACS+ Client ES-4500G Series This command displays the current settings for the RADIUS server. show radius-server EFAULT ETTING None OMMAND Privileged Exec XAMPLE Console#show radius-server Remote RADIUS Server Configuration: Global Settings: Authentication Port Number : 1812 Accounting Port Number : 1813 Retransmit Times...
| Authentication Commands HAPTER TACACS+ Client ES-4500G Series This command specifies the TACACS+ server and other optional tacacs-server parameters. Use the no form to remove the server, or to restore the default values. YNTAX tacacs-server index host host-ip-address [key key] [port port-number] no tacacs-server index index - The index for this server.
| Authentication Commands HAPTER TACACS+ Client ES-4500G Series This command sets the TACACS+ encryption key. Use the no form to tacacs-server key restore the default. YNTAX tacacs-server key key-string no tacacs-server key key-string - Encryption key used to authenticate logon access for the client.
| Authentication Commands HAPTER ES-4500G Series This command displays the current settings for the TACACS+ server. show tacacs-server EFAULT ETTING None OMMAND Privileged Exec XAMPLE Console#show tacacs-server Remote TACACS+ Server Configuration: Global Settings: Server Port Number: 49 Server 1: Server IP Address : 10.11.12.13 Server Port Number : 49 Tacacs Server Group:...
| Authentication Commands HAPTER ES-4500G Series Table 67: AAA Commands (Continued) Command Function Mode authorization exec Applies an authorization method to local console, Line Telnet or SSH connections show accounting Displays all accounting information This command enables the accounting of Exec mode commands. Use the aaa accounting no form to disable the accounting service.
| Authentication Commands HAPTER ES-4500G Series XAMPLE Console(config)#aaa accounting commands 15 default start-stop group tacacs+ Console(config)# This command enables the accounting of requested 802.1X services for aaa accounting network access. Use the no form to disable the accounting service. dot1x YNTAX aaa accounting dot1x {default | method-name} start-stop group {radius | tacacs+ |server-group}...
| Authentication Commands HAPTER ES-4500G Series This command enables the accounting of requested Exec services for aaa accounting exec network access. Use the no form to disable the accounting service. YNTAX aaa accounting exec {default | method-name} start-stop group {radius | tacacs+ |server-group} no aaa accounting exec {default | method-name} default - Specifies the default accounting method for service requests.
| Authentication Commands HAPTER ES-4500G Series This command enables the sending of periodic updates to the accounting aaa accounting server. Use the no form to disable accounting updates. update YNTAX aaa accounting update [periodic interval] no aaa accounting update interval - Sends an interim accounting record to the server at this interval.
| Authentication Commands HAPTER ES-4500G Series EFAULT ETTING Authorization is not enabled No servers are specified OMMAND Global Configuration OMMAND SAGE This command performs authorization to determine if a user is allowed ◆ to run an Exec shell. ◆ AAA authentication must be enabled before authorization is enabled. If this command is issued without a specified named method, the ◆...
| Authentication Commands HAPTER ES-4500G Series This command adds a security server to an AAA server group. Use the no server form to remove the associated server from the group. YNTAX [no] server {index | ip-address} index - Specifies the server index. (Range: RADIUS 1-5, TACACS+ 1) ip-address - Specifies the host IP address of a server.
| Authentication Commands HAPTER ES-4500G Series XAMPLE Console(config)#interface ethernet 1/2 Console(config-if)#accounting dot1x tps Console(config-if)# This command applies an accounting method to local console, Telnet or accounting exec SSH connections. Use the no form to disable accounting on the line. YNTAX accounting exec {default | list-name} no accounting exec default - Specifies the default method list created with the...
| Authentication Commands HAPTER Web Server ES-4500G Series Method List : tps Group List : radius Interface : Eth 1/2 Accounting Type : EXEC Method List : default Group List : tacacs+ Interface : vty Console# ERVER This section describes commands used to configure web browser management access to the switch.
| Authentication Commands HAPTER Web Server ES-4500G Series ELATED OMMANDS ip http server (739) show system (643) This command allows this device to be monitored or configured from a ip http server browser. Use the no form to disable this function. YNTAX [no] ip http server EFAULT...
| Authentication Commands HAPTER Web Server ES-4500G Series When you start HTTPS, the connection is established in this way: ◆ The client authenticates the server using the server’s digital ■ certificate. The client and server negotiate a set of security protocols to use for ■...
| Authentication Commands HAPTER Telnet Server ES-4500G Series This command specifies the UDP port number used for HTTPS connection to ip http secure-port the switch’s web interface. Use the no form to restore the default port. YNTAX ip http secure-port port_number no ip http secure-port port_number –...
| Authentication Commands HAPTER Telnet Server ES-4500G Series This switch also supports a Telnet client function. A Telnet connection can be made from this switch to another device by entering the telnet command at the Privileged Exec configuration level. This command specifies the maximum number of Telnet sessions that can ip telnet max- simultaneously connect to this system.
| Authentication Commands HAPTER Telnet Server ES-4500G Series OMMAND Global Configuration XAMPLE Console(config)#ip telnet port 123 Console(config)# This command allows this device to be monitored or configured from ip telnet server Telnet. Use the no form to disable this function. YNTAX [no] ip telnet server EFAULT...
| Authentication Commands HAPTER Secure Shell ES-4500G Series ECURE HELL This section describes the commands used to configure the SSH server. Note that you also need to install a SSH client on the management station when using this protocol to configure the switch. The switch supports both SSH Version 1.5 and 2.0 clients.
Page 745
| Authentication Commands HAPTER Secure Shell ES-4500G Series To use the SSH server, complete these steps: Generate a Host Key Pair – Use the ip ssh crypto host-key generate command to create a host public/private key pair. Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the initial connection setup with the switch.
Page 746
| Authentication Commands HAPTER Secure Shell ES-4500G Series To use SSH with only password authentication, the host public key must still be given to the client, either during initial connection or manually entered into the known host file. However, you do not need to configure the client's keys.
| Authentication Commands HAPTER Secure Shell ES-4500G Series This command configures the number of times the SSH server attempts to ip ssh reauthenticate a user. Use the no form to restore the default setting. authentication- retries YNTAX ip ssh authentication-retries count no ip ssh authentication-retries count –...
| Authentication Commands HAPTER Secure Shell ES-4500G Series XAMPLE Console#ip ssh crypto host-key generate dsa Console#configure Console(config)#ip ssh server Console(config)# ELATED OMMANDS ip ssh crypto host-key generate (749) show ssh (753) This command sets the SSH server key size. Use the no form to restore the ip ssh server-key default setting.
| Authentication Commands HAPTER Secure Shell ES-4500G Series OMMAND Global Configuration OMMAND SAGE The timeout specifies the interval the switch will wait for a response from the client during the SSH negotiation phase. Once an SSH session has been established, the timeout for user input is controlled by the exec-timeout command for vty sessions.
| Authentication Commands HAPTER Secure Shell ES-4500G Series EFAULT ETTING Generates both the DSA and RSA key pairs. OMMAND Privileged Exec OMMAND SAGE The switch uses only RSA Version 1 for SSHv1.5 clients and DSA ◆ Version 2 for SSHv2 clients. This command stores the host key pair in memory (i.e., RAM).
| Authentication Commands HAPTER Secure Shell ES-4500G Series The SSH server must be disabled before you can execute this ◆ command. XAMPLE Console#ip ssh crypto zeroize dsa Console# ELATED OMMANDS ip ssh crypto host-key generate (749) ip ssh save host-key (751) no ip ssh server (747) This command saves the host key from RAM to flash memory.
| Authentication Commands HAPTER Secure Shell ES-4500G Series This command shows the public key for the specified user or for the host. show public-key YNTAX show public-key [user [username]| host] username – Name of an SSH user. (Range: 1-8 characters) EFAULT ETTING Shows all public keys.
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series This command displays the current SSH server connections. show ssh OMMAND Privileged Exec XAMPLE Console#show ssh Connection Version State Username Encryption Session-Started admin ctos aes128-cbc-hmac-md5 stoc aes128-cbc-hmac-md5 Console# Table 72: show ssh - display description Field Description Session...
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series Table 73: 802.1X Port Authentication Commands (Continued) Command Function Mode dot1x timeout quiet-period Sets the time that a switch port waits after the Max Request Count has been exceeded before attempting to acquire a new client dot1x timeout re- Sets the time period after which a connected client...
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series When this device is functioning as an edge switch but does not require ◆ any attached clients to be authenticated, the no dot1x eapol-pass- through command can be used to discard unnecessary EAPOL traffic. XAMPLE This example instructs the switch to pass all EAPOL frame through to any ports in STP forwarding state.
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series OMMAND SAGE For guest VLAN assignment to be successful, the VLAN must be configured and set as active (see the vlan database command) and assigned as the guest VLAN for the port (see the network-access guest-vlan command).
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series This command allows hosts (clients) to connect to an 802.1X-authorized dot1x operation- port. Use the no form with no keywords to restore the default to single mode host. Use the no form with the multi-host max-count keywords to restore the default maximum count.
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series This command sets the dot1x mode on a port interface. Use the no form to dot1x port-control restore the default. YNTAX dot1x port-control {auto | force-authorized | force-unauthorized} no dot1x port-control auto –...
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series XAMPLE Console(config)#interface eth 1/2 Console(config-if)#dot1x re-authentication Console(config-if)# ELATED OMMANDS dot1x timeout re-authperiod (759) This command sets the time that a switch port waits after the maximum dot1x timeout quiet- request count (see page 756) has been exceeded before attempting to period...
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series XAMPLE Console(config)#interface eth 1/2 Console(config-if)#dot1x timeout re-authperiod 300 Console(config-if)# This command sets the time that an interface on the switch waits for a dot1x timeout supp- response to an EAP request from a client before re-transmitting an EAP timeout packet.
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series EFAULT 30 seconds OMMAND Interface Configuration XAMPLE Console(config)#interface eth 1/2 Console(config-if)#dot1x timeout tx-period 300 Console(config-if)# This command forces re-authentication on all ports or a specific interface. dot1x re- authenticate YNTAX dot1x re-authenticate [interface] interface ethernet unit/port unit - Stack unit.
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series This command shows general port authentication related settings on the show dot1x switch or a specific interface. YNTAX show dot1x [statistics] [interface interface] statistics - Displays dot1x status for each port. interface ethernet unit/port unit - Stack unit.
Page 763
| Authentication Commands HAPTER 802.1X Port Authentication ES-4500G Series Operation Mode– Shows if single or multiple hosts (clients) can ■ connect to an 802.1X-authorized port. Port Control–Shows the dot1x mode on a port as auto, force- ■ authorized, or force-unauthorized (page 758).
| Authentication Commands HAPTER Management IP Filter ES-4500G Series Quiet Period : 60 TX Period : 30 Supplicant Timeout : 30 Server Timeout : 10 Reauth Max Retries Max Request Operation Mode : Multi-host Port Control : Auto Intrusion Action : Block traffic Supplicant : 00-e0-29-94-34-65...
| Authentication Commands HAPTER Management IP Filter ES-4500G Series This command specifies the client IP addresses that are allowed management management access to the switch through various protocols. Use the no form to restore the default setting. YNTAX [no] management {all-client | http-client | snmp-client | telnet-client} start-address [end-address] all-client - Adds IP address(es) to all groups.
| Authentication Commands HAPTER Management IP Filter ES-4500G Series This command displays the client IP addresses that are allowed show management management access to the switch through various protocols. YNTAX show management {all-client | http-client | snmp-client | telnet-client} all-client - Displays IP addresses for all groups. http-client - Displays IP addresses for the web group.
ENERAL ECURITY EASURES ES-4500G Series This switch supports many methods of segregating traffic for clients attached to each of the data ports, and for ensuring that only authorized clients gain access to the network. Private VLANs and Port-based authentication using IEEE 802.1X are commonly used for these purposes. In addition to these method, several other options of providing client security are described in this chapter.
| General Security Measures HAPTER Port Security ES-4500G Series ECURITY These commands can be used to enable port security on a port. When MAC address learning is disabled on an interface, only incoming traffic with source addresses already stored in the dynamic or static address table for this port will be authorized to access the network.
| General Security Measures HAPTER Port Security ES-4500G Series The mac-learning commands cannot be used if 802.1X Port ◆ Authentication has been globally enabled on the switch with the dot1x system-auth-control command, or if MAC Address Security has been enabled by the port security command on the same interface.
Page 770
| General Security Measures HAPTER Port Security ES-4500G Series addresses when it reaches a configured maximum number. Only incoming traffic with source addresses already stored in the dynamic or static address table will be accepted. First use the port security max-mac-count command to set the ◆...
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series (MAC A ETWORK CCESS DDRESS UTHENTICATION Network Access authentication controls access to the network by authenticating the MAC address of each host that attempts to connect to a switch port.
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Use this command to enable aging for authenticated MAC addresses stored network-access in the secure MAC address table. Use the no form of this command to aging disable address aging. YNTAX [no] network-access aging EFAULT...
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series OMMAND Global Configuration OMMAND SAGE Specified addresses are exempt from network access authentication. ◆ This command is different from configuring static addresses with the ◆ mac-address-table static command in that it allows you configure a range of addresses when using a mask, and then to assign these addresses to one or more ports with the network-access port-mac-filter...
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Use this command to enable the dynamic QoS feature for an authenticated network-access port. Use the no form to restore the default. dynamic-qos YNTAX [no] network-access dynamic-qos EFAULT ETTING Disabled OMMAND...
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series XAMPLE The following example enables the dynamic QoS feature on port 1. Console(config)#interface ethernet 1/1 Console(config-if)#network-access dynamic-qos Console(config-if)# Use this command to enable dynamic VLAN assignment for an network-access authenticated port.
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Use this command to assign all traffic on a port to a guest VLAN when network-access 802.1x authentication is rejected. Use the no form of this command to guest-vlan disable guest VLAN assignment.
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Use this command to detect link-down events. When detected, the switch network-access can shut down the port, send an SNMP trap, or both. Use the no form of link-detection link- this command to disable this feature.
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series XAMPLE Console(config)#interface ethernet 1/1 Console(config-if)#network-access link-detection link-up action trap Console(config-if)# Use this command to detect link-up and link-down events. When either network-access event is detected, the switch can shut down the port, send an SNMP trap, link-detection link- or both.
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series OMMAND Interface Configuration OMMAND SAGE The maximum number of MAC addresses per port is 1024, and the maximum number of secure MAC addresses supported for the switch system is 1024. When the limit is reached, all new MAC addresses are treated as authentication failures.
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series When port status changes to down, all MAC addresses are cleared from ◆ the secure MAC address table. Static VLAN assignments are not restored. The RADIUS server may optionally return a VLAN identifier list. VLAN ◆...
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Use this command to configure the port response to a host MAC mac-authentication authentication failure. Use the no form of this command to restore the intrusion-action default. YNTAX mac-authentication intrusion-action {block traffic | pass traffic} no mac-authentication intrusion-action EFAULT...
| General Security Measures HAPTER Network Access (MAC Address Authentication) ES-4500G Series Use this command to display the MAC authentication settings for port show network- interfaces. access YNTAX show network-access [interface interface] interface - Specifies a port interface. ethernet unit/port unit - Stack unit.
| General Security Measures HAPTER Web Authentication ES-4500G Series Use this command to display information for entries in the MAC filter show network- tables. access mac-filter YNTAX show network-access mac-filter [filter-id] filter-id - Specifies a MAC address filter table. (Range: 1-64) EFAULT ETTING Displays all filters.
| General Security Measures HAPTER Web Authentication ES-4500G Series Table 79: Web Authentication (Continued) Command Function Mode web-auth system-auth- Enables web authentication globally for the switch control web-auth Enables web authentication for an interface web-auth re-authenticate Ends all web authentication sessions on the port (Port) and forces the users to re-authenticate web-auth re-authenticate (IP)
| General Security Measures HAPTER Web Authentication ES-4500G Series This command defines the amount of time a host must wait after exceeding web-auth quiet- the limit for failed login attempts, before it may attempt web period authentication again. Use the no form to restore the default. YNTAX web-auth quiet-period time no web-auth quiet period...
| General Security Measures HAPTER Web Authentication ES-4500G Series This command globally enables web authentication for the switch. Use the web-auth system- no form to restore the default. auth-control YNTAX [no] web-auth system-auth-control EFAULT ETTING Disabled OMMAND Global Configuration OMMAND SAGE Both web-auth system-auth-control for the switch and web-auth...
| General Security Measures HAPTER Web Authentication ES-4500G Series This command ends all web authentication sessions connected to the port web-auth re- and forces the users to re-authenticate. authenticate (Port) YNTAX web-auth re-authenticate interface interface interface - Specifies a port interface. ethernet unit/port unit - Stack unit.
| General Security Measures HAPTER Web Authentication ES-4500G Series This command displays global web authentication parameters. show web-auth OMMAND Privileged Exec XAMPLE Console#show web-auth Global Web-Auth Parameters System Auth Control : Enabled Session Timeout : 3600 Quiet Period : 60 Max Login Attempts Console# This command displays interface-specific web authentication parameters...
| General Security Measures HAPTER DHCP Snooping ES-4500G Series This command displays a summary of web authentication port parameters show web-auth and statistics. summary OMMAND Privileged Exec XAMPLE Console#show web-auth summary Global Web-Auth Parameters System Auth Control : Enabled Port Status Authenticated Host Count ----...
| General Security Measures HAPTER DHCP Snooping ES-4500G Series This command enables DHCP snooping globally. Use the no form to restore ip dhcp snooping the default setting. YNTAX [no] ip dhcp snooping EFAULT ETTING Disabled OMMAND Global Configuration OMMAND SAGE Network traffic may be disrupted when malicious DHCP messages are ◆...
Page 792
| General Security Measures HAPTER DHCP Snooping ES-4500G Series If the DHCP packet is from a client, such as a DECLINE or ■ RELEASE message, the switch forwards the packet only if the corresponding entry is found in the binding table. If the DHCP packet is from client, such as a DISCOVER, ■...
| General Security Measures HAPTER DHCP Snooping ES-4500G Series This command writes all dynamically learned snooping entries to flash ip dhcp snooping memory. database flash OMMAND Privileged Exec OMMAND SAGE This command can be used to store the currently learned dynamic DHCP snooping entries to flash memory.
| General Security Measures HAPTER DHCP Snooping ES-4500G Series Use the ip dhcp snooping information option command to specify ◆ how to handle DHCP client request packets which already contain Option 82 information. XAMPLE This example enables the DHCP Snooping Information Option. Console(config)#ip dhcp snooping information option Console(config)# This command sets the DHCP snooping information option policy for DHCP...
| General Security Measures HAPTER DHCP Snooping ES-4500G Series This command verifies the client’s hardware address stored in the DHCP ip dhcp snooping packet against the source MAC address in the Ethernet header. Use the no verify mac-address form to disable this function. YNTAX [no] ip dhcp binding verify mac-address EFAULT...
| General Security Measures HAPTER DHCP Snooping ES-4500G Series When the DHCP snooping is globally disabled, DHCP snooping can still ◆ be configured for specific VLANs, but the changes will not take effect until DHCP snooping is globally re-enabled. When DHCP snooping is globally enabled, configuration changes for ◆...
| General Security Measures HAPTER DHCP Snooping ES-4500G Series When an untrusted port is changed to a trusted port, all the dynamic ◆ DHCP snooping bindings associated with this port are removed. Additional considerations when the switch itself is a DHCP client – The ◆...
| General Security Measures HAPTER DHCP Snooping ES-4500G Series This command shows the DHCP snooping configuration settings. show ip dhcp snooping OMMAND Privileged Exec XAMPLE Console#show ip dhcp snooping Global DHCP Snooping status: disable DHCP Snooping Information Option Status: disable DHCP Snooping Information Policy: replace DHCP Snooping is configured on the following VLANs: Verify Source Mac-Address: enable...
| General Security Measures HAPTER IP Source Guard ES-4500G Series IP S OURCE UARD IP Source Guard is a security feature that filters IP traffic on network interfaces based on manually configured entries in the IP Source Guard table, or dynamic entries in the DHCP Snooping table when enabled (see "DHCP Snooping"...
Page 800
| General Security Measures HAPTER IP Source Guard ES-4500G Series OMMAND Global Configuration OMMAND SAGE Table entries include a MAC address, IP address, lease time, entry type ◆ (Static-IP-SG-Binding, Dynamic-DHCP-Binding), VLAN identifier, and port identifier. All static entries are configured with an infinite lease time, which is ◆...
| General Security Measures HAPTER IP Source Guard ES-4500G Series This command configures the switch to filter inbound traffic based source ip source-guard IP address, or source IP address and corresponding MAC address. Use the no form to disable this function. YNTAX ip source-guard {sip | sip-mac} no ip source-guard...
| General Security Measures HAPTER IP Source Guard ES-4500G Series Filtering rules are implemented as follows: ◆ If DHCP snooping is disabled (see page 791), IP source guard will ■ check the VLAN ID, source IP address, port number, and source MAC address (for the sip-mac option).
| General Security Measures HAPTER IP Source Guard ES-4500G Series OMMAND SAGE ◆ This command sets the maximum number of address entries that can be mapped to an interface in the binding table, including both dynamic entries discovered by DHCP snooping and static entries set by the source-guard command.
| General Security Measures HAPTER ARP Inspection ES-4500G Series Table 82: ARP Inspection Commands (Continued) Command Function Mode show ip arp inspection Shows statistics about the number of ARP packets statistics processed, or dropped for various reasons show ip arp inspection vlan Shows configuration setting for VLANs, including ARP Inspection status, the ARP ACL name, and if the DHCP Snooping database is used after ACL...
| General Security Measures HAPTER ARP Inspection ES-4500G Series This command specifies an ARP ACL to apply to one or more VLANs. Use ip arp inspection the no form to remove an ACL binding. filter YNTAX ip arp inspection filter arp-acl-name vlan {vlan-id | vlan-range} [static] arp-acl-name - Name of an ARP ACL.
| General Security Measures HAPTER ARP Inspection ES-4500G Series This command sets the maximum number of entries saved in a log ip arp inspection message, and the rate at which these messages are sent. Use the no form log-buffer logs to restore the default settings.
| General Security Measures HAPTER ARP Inspection ES-4500G Series This command specifies additional validation of address components in an ip arp inspection ARP packet. Use the no form to restore the default setting. validate YNTAX ip arp inspection validate {dst-mac [ip] [src-mac] | ip [src-mac] | src-mac} no ip arp inspection validate dst-mac - Checks the destination MAC address in the Ethernet...
| General Security Measures HAPTER ARP Inspection ES-4500G Series EFAULT ETTING Disabled on all VLANs OMMAND Global Configuration OMMAND SAGE When ARP Inspection is enabled globally with the ip arp inspection ◆ command, it becomes active only on those VLANs where it has been enabled with this command.
| General Security Measures HAPTER ARP Inspection ES-4500G Series OMMAND Interface Configuration (Port) OMMAND SAGE This command only applies to untrusted ports. ◆ When the rate of incoming ARP packets exceeds the configured limit, ◆ the switch drops all ARP packets in excess of the limit. XAMPLE Console(config)#interface ethernet 1/1 Console(config-if)#ip arp inspection limit 150...
| General Security Measures HAPTER ARP Inspection ES-4500G Series XAMPLE Console#show ip arp inspection configuration ARP inspection global information: Global IP ARP Inspection status : disabled Log Message Interval : 10 s Log Message Number Need Additional Validation(s) : Yes Additional Validation Type : Destination MAC address Console#...
| General Security Measures HAPTER ARP Inspection ES-4500G Series This command shows statistics about the number of ARP packets show ip arp processed, or dropped for various reasons. inspection statistics OMMAND Privileged Exec XAMPLE Console#show ip arp inspection log Total log entries number is 1 Num VLAN Port Src IP Address Dst IP Address Src MAC Address...
CCESS ONTROL ISTS ES-4500G Series Access Control Lists (ACL) provide packet filtering for IPv4 frames (based on address, protocol, Layer 4 protocol port number or TCP control code), IPv6 frames (based on address, DSCP traffic class, next header type, or flow label), or any frames (based on MAC address or Ethernet type).
| Access Control Lists HAPTER IPv4 ACLs ES-4500G Series This command adds an IP access list and enters configuration mode for access-list ip standard or extended IPv4 ACLs. Use the no form to remove the specified ACL. YNTAX [no] access-list ip {standard | extended} acl-name standard –...
| Access Control Lists HAPTER IPv4 ACLs ES-4500G Series This command adds a rule to a Standard IPv4 ACL. The rule sets a filter permit, deny condition for packets emanating from the specified source. Use the no (Standard IP ACL) form to remove a rule.
| Access Control Lists HAPTER IPv4 ACLs ES-4500G Series This command adds a rule to an Extended IPv4 ACL. The rule sets a filter permit, deny condition for packets with specific source or destination IP addresses, (Extended IPv4 ACL) protocol types, source or destination protocol ports, or TCP control codes. Use the no form to remove a rule.
Page 817
| Access Control Lists HAPTER IPv4 ACLs ES-4500G Series port-bitmask – Decimal number representing the port bits to match. (Range: 0-65535) control-flags – Decimal number (representing a bit string) that specifies flag bits in byte 14 of the TCP header. (Range: 0-63) flag-bitmask –...
| Access Control Lists HAPTER IPv4 ACLs ES-4500G Series XAMPLE This example accepts any incoming packets if the source address is within subnet 10.7.1.x. For example, if the rule is matched; i.e., the rule (10.7.1.0 & 255.255.255.0) equals the masked address (10.7.1.2 & 255.255.255.0), the packet passes through.
| Access Control Lists HAPTER IPv4 ACLs ES-4500G Series OMMAND SAGE ◆ Only one ACL can be bound to a port. If an ACL is already bound to a port and you bind a different ACL to it, ◆ the switch will replace the old binding with the new one. XAMPLE Console(config)#int eth 1/2 Console(config-if)#ip access-group david in...
| Access Control Lists HAPTER IPv6 ACLs ES-4500G Series XAMPLE Console#show ip access-list standard IP standard access-list david: permit host 10.1.1.21 permit 168.92.0.0 255.255.15.0 Console# ELATED OMMANDS permit, deny (815) ip access-group (818) 6 ACL The commands in this section configure ACLs based on IPv6 address, DSCP traffic class, next header type, or flow label.
| Access Control Lists HAPTER IPv6 ACLs ES-4500G Series OMMAND Global Configuration OMMAND SAGE When you create a new ACL or enter configuration mode for an existing ◆ ACL, use the permit or deny command to add new rules to the bottom of the list.
| Access Control Lists HAPTER IPv6 ACLs ES-4500G Series EFAULT ETTING None OMMAND Standard IPv6 ACL OMMAND SAGE New rules are appended to the end of the list. XAMPLE This example configures one permit rule for the specific address 2009:DB9:2229::79 and another rule for the addresses with the network prefix 2009:DB9:2229:5::/64.
Page 823
| Access Control Lists HAPTER IPv6 ACLs ES-4500G Series routers, such as non-default quality of service or “real-time” service (see RFC 2460). (Range: 0-16777215) next-header – Identifies the type of header immediately following the IPv6 header. (Range: 0-255) time-range-name - Name of the time range. (Range: 1-30 characters) EFAULT ETTING...
| Access Control Lists HAPTER IPv6 ACLs ES-4500G Series XAMPLE This example accepts any incoming packets if the destination address is 2009:DB9:2229::79/8. Console(config-ext-ipv6-acl)#permit 2009:DB9:2229::79/8 Console(config-ext-ipv6-acl)# This allows packets to any destination address when the DSCP value is 5. Console(config-ext-ipv6-acl)#permit any dscp 5 Console(config-ext-ipv6-acl)# This allows any packets sent to the destination 2009:DB9:2229::79/48 when the flow label is 43.”...
| Access Control Lists HAPTER IPv6 ACLs ES-4500G Series This command binds a port to an IPv6 ACL. Use the no form to remove the ipv6 access-group port. YNTAX ipv6 access-group acl-name in [time-range time-range-name] no ipv6 access-group acl-name in acl-name –...
| Access Control Lists HAPTER MAC ACLs ES-4500G Series ELATED OMMANDS ipv6 access-group (825) MAC ACL The commands in this section configure ACLs based on hardware addresses, packet format, and Ethernet type. To configure MAC ACLs, first create an access list containing the required permit or deny rules, and then bind the access list to one or more ports.
| Access Control Lists HAPTER MAC ACLs ES-4500G Series XAMPLE Console(config)#access-list mac jerry Console(config-mac-acl)# ELATED OMMANDS permit, deny (827) mac access-group (829) show mac access-list (830) This command adds a rule to a MAC ACL. The rule filters packets matching permit, deny a specified MAC source or destination address (i.e., physical layer address), (MAC ACL)
Page 828
| Access Control Lists HAPTER MAC ACLs ES-4500G Series {permit | deny} tagged-802.3 {any | host source | source address-bitmask} {any | host destination | destination address-bitmask} [vid vid vid-bitmask] [time-range time-range-name] no {permit | deny} tagged-802.3 {any | host source | source address-bitmask} {any | host destination | destination address-bitmask} [vid vid vid-bitmask] {permit | deny} untagged-802.3...
| Access Control Lists HAPTER MAC ACLs ES-4500G Series OMMAND SAGE ◆ New rules are added to the end of the list. The ethertype option can only be used to filter Ethernet II formatted ◆ packets. ◆ A detailed listing of Ethernet protocol types can be found in RFC 1060. A few of the more common types include the following: 0800 - IP ■...
| Access Control Lists HAPTER MAC ACLs ES-4500G Series XAMPLE Console(config)#interface ethernet 1/2 Console(config-if)#mac access-group jerry in Console(config-if)# ELATED OMMANDS show mac access-list (830) Time Range (679) This command shows the ports assigned to MAC ACLs. show mac access- group OMMAND Privileged Exec XAMPLE...
| Access Control Lists HAPTER ARP ACLs ES-4500G Series ARP ACL The commands in this section configure ACLs based on the IP or MAC address contained in ARP request and reply messages. To configure ARP ACLs, first create an access list containing the required permit or deny rules, and then bind the access list to one or more VLANs using the ip arp inspection vlan...
| Access Control Lists HAPTER ARP ACLs ES-4500G Series This command adds a rule to an ARP ACL. The rule filters packets matching permit, deny (ARP a specified source or destination address in ARP messages. Use the no ACL) form to remove a rule. YNTAX [no] {permit | deny} ip {any | host source-ip | source-ip ip-address-bitmask}...
| Access Control Lists HAPTER ARP ACLs ES-4500G Series XAMPLE This rule permits packets from any source IP and MAC address to the destination subnet address 192.168.0.0. Console(config-arp-acl)#$permit response ip any 192.168.0.0 255.255.0.0 mac any any Console(config-mac-acl)# ELATED OMMANDS access-list arp (831) This command displays the rules for configured ARP ACLs.
| Access Control Lists HAPTER ACL Information ES-4500G Series ACL I NFORMATION This section describes commands used to display ACL information. Table 88: ACL Information Commands Command Function Mode show access-group Shows the ACLs assigned to each port show access-list Show all ACLs and associated rules This command shows the port assignments of ACLs.
NTERFACE OMMANDS ES-4500G Series These commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN; or perform cable diagnostics on the specified interface. Table 89: Interface Commands Command Function Mode Interface Configuration interface Configures an interface type and enters interface configuration mode alias...
| Interface Commands HAPTER ES-4500G Series This command configures an interface type and enters interface interface configuration mode. Use the no form with a trunk to remove an inactive interface. Use the no form with a Layer 3 VLAN (normal type) to change it back to a Layer 2 interface.
| Interface Commands HAPTER ES-4500G Series OMMAND SAGE The alias is displayed in the running-configuration file. An example of the value which a network manager might store in this object for a WAN interface is the (Telco's) circuit number/identifier of the interface. XAMPLE The following example adds an alias to port 4.
| Interface Commands HAPTER ES-4500G Series The 1000BASE-T and 10GBASE-T standard does not support forced ◆ mode. Auto-negotiation should always be used to establish a connection over any 1000BASE-T and 10GBASE-T port or trunk. When auto-negotiation is enabled with the negotiation command, the ◆...
| Interface Commands HAPTER ES-4500G Series XAMPLE The following example adds a description to port 4. Console(config)#interface ethernet 1/4 Console(config-if)#description RD-SW#3 Console(config-if)# This command enables flow control. Use the no form to disable flow flowcontrol control. YNTAX [no] flowcontrol EFAULT ETTING Disabled OMMAND...
| Interface Commands HAPTER ES-4500G Series Console(config-if)#no negotiation Console(config-if)# ELATED OMMANDS negotiation (840) capabilities (flowcontrol, symmetric) (837) This command forces the port type selected for combination ports 25-26. media-type Use the no form to restore the default mode. YNTAX media-type mode no media-type mode copper-forced - Always uses the built-in RJ-45 port.
| Interface Commands HAPTER ES-4500G Series OMMAND Interface Configuration (Ethernet, Port Channel) OMMAND SAGE 1000BASE-T and 10GBASE-T do not support forced mode. Auto- ◆ negotiation should always be used to establish a connection over any 1000BASE-T and 10GBASE-T port or trunk. When auto-negotiation is enabled the switch will negotiate the best ◆...
| Interface Commands HAPTER ES-4500G Series XAMPLE The following example disables port 5. Console(config)#interface ethernet 1/5 Console(config-if)#shutdown Console(config-if)# This command configures the speed and duplex mode of a given interface speed-duplex when auto-negotiation is disabled. Use the no form to restore the default. YNTAX speed-duplex {1000full | 100full | 100half | 10full | 10half} no speed-duplex...
| Interface Commands HAPTER ES-4500G Series XAMPLE The following example configures port 5 to 100 Mbps, half-duplex operation. Console(config)#interface ethernet 1/5 Console(config-if)#speed-duplex 100half Console(config-if)#no negotiation Console(config-if)# ELATED OMMANDS negotiation (840) capabilities (837) This command configures the maximum transfer unit (MTU) allowed for switchport mtu layer 2 packets crossing a Gigabit or 10 Gigabit Ethernet port or trunk.
| Interface Commands HAPTER ES-4500G Series For other traffic types, calculation of overall frame size is basically the ◆ same, including the additional header fields SA(6) + DA(6) + Type(2) + VLAN-Tag(4) (for tagged packets, for untaqged packets, the 4-byte field will not be added by switch), and the payload.
| Interface Commands HAPTER ES-4500G Series Traffic storms can be controlled at the hardware level using this ◆ command or at the software level using the auto-traffic-control command. However, only one of these control types can be applied to a port.
| Interface Commands HAPTER ES-4500G Series statistics displayed will show the absolute value accumulated since the last power reset. XAMPLE The following example clears statistics on port 5. Console#clear counters ethernet 1/5 Console# This command displays interface statistics. show interfaces counters YNTAX show interfaces counters [interface]...
| Interface Commands HAPTER ES-4500G Series OMMAND Normal Exec, Privileged Exec OMMAND SAGE If no interface is specified, information on all interfaces is displayed. For a description of the items displayed by this command, see "Displaying Connection Status" on page 135.
| Interface Commands HAPTER ES-4500G Series OMMAND Normal Exec, Privileged Exec OMMAND SAGE If no interface is specified, information on all interfaces is displayed. XAMPLE This example shows the configuration setting for port 21. Console#show interfaces switchport ethernet 1/21 Information of Eth 1/1 Broadcast Threshold : Enabled, 500 packets/second LACP Status...
| Interface Commands HAPTER ES-4500G Series Table 90: show interfaces switchport - display description (Continued) Field Description Private-VLAN Shows the private VLAN mode as host, promiscuous, or none (942). Mode Private VLAN host- Shows the secondary (or community) VLAN with which this port is association associated (943).
| Interface Commands HAPTER ES-4500G Series Vendor Rev : 000 Vendor SN : 0000070904100004 Date Code : 07-03-02 Temperature : 56 degrees C : 3.33 V Bias Current : 25.34 mA TX Power : 270 uW RX Power : 0 uW Console#sh interfaces transceiver e 1/26 Information of Eth 1/26 Connector Type...
| Interface Commands HAPTER ES-4500G Series Potential conditions which may be listed by the diagnostics include: ◆ OK: Correctly terminated pair ■ Open: Open pair, no link partner ■ Short: Shorted pair ■ Not Supported: This message is displayed for any Gigabit Ethernet ■...
| Interface Commands HAPTER ES-4500G Series XAMPLE Console#test loop internal interface ethernet 1/1 Internal loopback test: succeeded Console# This command shows the results of a cable diagnostics test. show cable- diagnostics dsp YNTAX show cable-diagnostics dsp interface [interface] interface ethernet unit/port unit - Stack unit.
Page 854
| Interface Commands HAPTER ES-4500G Series XAMPLE Console#show loop internal interface ethernet 1/1 Port Test Result Last Update -------- -------------- -------------------- Eth 1/1 Succeeded 2024-07-15 15:26:56 Console# – 854 –...
GGREGATION OMMANDS ES-4500G Series Ports can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network connection or to ensure fault recovery. Or you can use the Link Aggregation Control Protocol (LACP) to automatically negotiate a trunk link between this switch and another network device.
| Link Aggregation Commands HAPTER ES-4500G Series Any of the Gigabit ports on the front panel can be trunked together, ◆ including ports of different media types. ◆ All the ports in a trunk have to be treated as a whole when moved from/to, added or deleted from a VLAN via the specified port-channel.
| Link Aggregation Commands HAPTER ES-4500G Series XAMPLE The following example creates trunk 1 and then adds port 11: Console(config)#interface port-channel 1 Console(config-if)#exit Console(config)#interface ethernet 1/11 Console(config-if)#channel-group 1 Console(config-if)# This command enables 802.3ad Link Aggregation Control Protocol (LACP) lacp for the current interface. Use the no form to disable it. YNTAX [no] lacp EFAULT...
| Link Aggregation Commands HAPTER ES-4500G Series Once the remote side of a link has been established, LACP operational ◆ settings are already in use on that side. Configuring LACP settings for the partner only applies to its administrative state, not its operational state.
| Link Aggregation Commands HAPTER ES-4500G Series This command configures a port's LACP system priority. Use the no form to lacp system-priority restore the default setting. YNTAX lacp {actor | partner} system-priority priority no lacp {actor | partner} system-priority actor - The local side an aggregate link. partner - The remote side of an aggregate link.
| Link Aggregation Commands HAPTER ES-4500G Series EFAULT ETTING OMMAND Interface Configuration (Port Channel) OMMAND SAGE Ports are only allowed to join the same LAG if (1) the LACP system ◆ priority matches, (2) the LACP port admin key matches, and (3) the LACP port channel key matches (if configured).
| Link Aggregation Commands HAPTER ES-4500G Series XAMPLE Console#show lacp 1 counters Port Channel: 1 ------------------------------------------------------------------------- Eth 1/ 2 ------------------------------------------------------------------------- LACPDUs Sent : 12 LACPDUs Received Marker Sent Marker Received LACPDUs Unknown Pkts : 0 LACPDUs Illegal Pkts : 0 Table 92: show lacp counters - display description Field Description...
| Link Aggregation Commands HAPTER ES-4500G Series Table 93: show lacp internal - display description (Continued) Field Description LACP Port Priority LACP port priority assigned to this interface within the channel group. Admin State, Administrative or operational values of the actor’s state parameters: Oper State Expired –...
| Link Aggregation Commands HAPTER ES-4500G Series Table 94: show lacp neighbors - display description (Continued) Field Description Port Oper Priority Priority value assigned to this aggregation port by the partner. Admin Key Current administrative value of the Key for the protocol partner. Oper Key Current operational value of the Key for the protocol partner.
IRRORING OMMANDS ES-4500G Series Data can be mirrored from a local port on the same switch or from a remote port on another switch for analysis at the target port using software monitoring tools or a hardware probe. This switch supports the following mirroring modes.
| Port Mirroring Commands HAPTER Local Port Mirroring Commands ES-4500G Series When enabled for an interface, default mirroring is for both received ◆ and transmitted packets. OMMAND Interface Configuration (Ethernet, destination port) OMMAND SAGE You can mirror traffic from any source port to a destination port for ◆...
Page 867
| Port Mirroring Commands HAPTER Local Port Mirroring Commands ES-4500G Series OMMAND SAGE This command displays the currently configured source port, destination port, and mirror mode (i.e., RX, TX, RX/TX). XAMPLE The following shows mirroring configured from port 6 to port 11: Console(config)#interface ethernet 1/11 Console(config-if)#port monitor ethernet 1/6 Console(config-if)#end...
Page 868
| Port Mirroring Commands HAPTER Local Port Mirroring Commands ES-4500G Series – 868 –...
IMIT OMMANDS ES-4500G Series This function allows the network manager to control the maximum rate for traffic transmitted or received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into or out of the network.
Page 870
| Rate Limit Commands HAPTER ES-4500G Series command. It is therefore not advisable to use both of these commands on the same interface. XAMPLE Console(config)#interface ethernet 1/1 Console(config-if)#rate-limit input 64 Console(config-if)# ELATED OMMAND show interfaces switchport (848) – 870 –...
UTOMATIC RAFFIC ONTROL OMMANDS ES-4500G Series Automatic Traffic Control (ATC) configures bounding thresholds for broadcast and multicast storms which can be used to trigger configured rate limits or to shut down a port. Table 99: ATC Commands Command Function Mode Threshold Commands auto-traffic-control Sets the time at which to apply the control...
Page 872
| Automatic Traffic Control Commands HAPTER ES-4500G Series Table 99: ATC Commands (Continued) Command Function Mode snmp-server enable Sends a trap when multicast traffic exceeds the IC (Port) port-traps atc upper threshold for automatic storm control and multicast-control- the apply timer expires apply snmp-server enable Sends a trap when multicast traffic falls beneath...
| Automatic Traffic Control Commands HAPTER ES-4500G Series expires. When ingress traffic falls below this threshold, ATC sends a Storm Alarm Clear Trap and logs it. When traffic falls below the alarm clear threshold after the release ◆ timer expires, traffic control will be stopped and a Traffic Control Release Trap sent and logged.
| Automatic Traffic Control Commands HAPTER ES-4500G Series EFAULT ETTING 300 seconds OMMAND Global Configuration OMMAND SAGE After the apply timer expires, a control action may be triggered as specified by the auto-traffic-control action command and a trap message sent as specified by the snmp-server enable port-traps atc broadcast-control-apply command or...
| Automatic Traffic Control Commands HAPTER ES-4500G Series XAMPLE This example sets the release timer to 800 seconds for all ports. Console(config)#auto-traffic-control broadcast release-timer 800 Console(config)# This command enables automatic traffic control for broadcast or multicast auto-traffic-control storms. Use the no form to disable this feature. YNTAX [no] auto-traffic-control {broadcast | multicast} broadcast - Specifies automatic storm control for broadcast traffic.
| Automatic Traffic Control Commands HAPTER ES-4500G Series This command sets the control action to limit ingress traffic or shut down auto-traffic-control the offending port. Use the no form to restore the default setting. action YNTAX auto-traffic-control {broadcast | multicast} action {rate-control | shutdown} no auto-traffic-control {broadcast | multicast} action broadcast - Specifies automatic storm control for broadcast traffic.
| Automatic Traffic Control Commands HAPTER ES-4500G Series This command sets the lower threshold for ingress traffic beneath which a auto-traffic-control cleared storm control trap is sent. Use the no form to restore the default alarm-clear- setting. threshold YNTAX auto-traffic-control {broadcast | multicast} alarm-clear-threshold threshold no auto-traffic-control {broadcast | multicast} alarm-clear-threshold...
| Automatic Traffic Control Commands HAPTER ES-4500G Series This command sets the upper threshold for ingress traffic beyond which a auto-traffic-control storm control response is triggered after the apply timer expires. Use the alarm-fire-threshold no form to restore the default setting. YNTAX auto-traffic-control {broadcast | multicast} alarm-fire-threshold threshold...
| Automatic Traffic Control Commands HAPTER ES-4500G Series This command automatically releases a control response after the time auto-traffic-control specified in the auto-traffic-control release-timer command has expired. auto-control-release YNTAX auto-traffic-control {broadcast | multicast} auto-control-release broadcast - Specifies automatic storm control for broadcast traffic. multicast - Specifies automatic storm control for multicast traffic.
| Automatic Traffic Control Commands HAPTER ES-4500G Series This command sends a trap when broadcast traffic falls beneath the lower snmp-server enable threshold after a storm control response has been triggered. Use the no port-traps atc form to disable this trap. broadcast-alarm- clear YNTAX...
| Automatic Traffic Control Commands HAPTER ES-4500G Series This command sends a trap when broadcast traffic exceeds the upper snmp-server enable threshold for automatic storm control and the apply timer expires. Use the port-traps atc no form to disable this trap. broadcast-control- apply YNTAX...
| Automatic Traffic Control Commands HAPTER ES-4500G Series This command sends a trap when multicast traffic falls beneath the lower snmp-server enable threshold after a storm control response has been triggered. Use the no port-traps atc form to disable this trap. multicast-alarm- clear YNTAX...
| Automatic Traffic Control Commands HAPTER ES-4500G Series This command sends a trap when multicast traffic exceeds the upper snmp-server enable threshold for automatic storm control and the apply timer expires. Use the port-traps atc no form to disable this trap. multicast-control- apply YNTAX...
DDRESS ABLE OMMANDS ES-4500G Series These commands are used to configure the address table for filtering specified addresses, displaying current entries, clearing the table, or setting the aging time. Table 100: Address Table Commands Command Function Mode mac-address-table Sets the aging time of the address table aging-time mac-address-table Maps a static address to a port in a VLAN...
| Address Table Commands HAPTER ES-4500G Series XAMPLE Console(config)#mac-address-table aging-time 100 Console(config)# This command maps a static address to a destination port in a VLAN. Use mac-address-table the no form to remove an address. static YNTAX mac-address-table static mac-address interface interface vlan vlan-id [action] no mac-address-table static mac-address vlan vlan-id mac-address - MAC address.
| Address Table Commands HAPTER ES-4500G Series OMMAND SAGE ◆ The MAC Address Table contains the MAC addresses associated with each interface. Note that the Type field may include the following types: Learn - Dynamic address entries ■ Config - Static entry ■...
| Address Table Commands HAPTER ES-4500G Series This command shows the number of MAC addresses used and the number show mac-address- of available MAC addresses for the overall system or for an interface. table count YNTAX show mac-address-table count [interface interface] interface ethernet unit/port unit - Stack unit.
PANNING OMMANDS ES-4500G Series This section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and commands that configure STA for the selected interface. Table 101: Spanning Tree Commands Command Function Mode spanning-tree Enables the spanning tree protocol spanning-tree forward-time Configures the spanning tree bridge forward time spanning-tree hello-time...
| Spanning Tree Commands HAPTER ES-4500G Series Table 101: Spanning Tree Commands (Continued) Command Function Mode spanning-tree mst cost Configures the path cost of an instance in the MST spanning-tree mst port- Configures the priority of an instance in the MST priority spanning-tree port-bpdu- Floods BPDUs to other ports when global spanning tree...
| Spanning Tree Commands HAPTER ES-4500G Series XAMPLE This example shows how to enable the Spanning Tree Algorithm for the switch: Console(config)#spanning-tree Console(config)# This command configures the spanning tree bridge forward time globally spanning-tree for this switch. Use the no form to restore the default. forward-time YNTAX spanning-tree forward-time seconds...
| Spanning Tree Commands HAPTER ES-4500G Series EFAULT ETTING 2 seconds OMMAND Global Configuration OMMAND SAGE This command sets the time interval (in seconds) at which the root device transmits a configuration message. XAMPLE Console(config)#spanning-tree hello-time 5 Console(config)# ELATED OMMANDS spanning-tree forward-time (893) spanning-tree max-age (894) This command configures the spanning tree bridge maximum age globally...
| Spanning Tree Commands HAPTER ES-4500G Series ELATED OMMANDS spanning-tree forward-time (893) spanning-tree hello-time (893) This command selects the spanning tree mode for this switch. Use the no spanning-tree mode form to restore the default. YNTAX spanning-tree mode {stp | rstp | mstp} no spanning-tree mode stp - Spanning Tree Protocol (IEEE 802.1D) rstp - Rapid Spanning Tree Protocol (IEEE 802.1w)
| Spanning Tree Commands HAPTER ES-4500G Series A spanning tree instance can exist only on bridges that have ■ compatible VLAN instance assignments. Be careful when switching between spanning tree modes. Changing ■ modes stops all spanning-tree instances for the previous mode and restarts the system in the new mode, temporarily disrupting user traffic.
| Spanning Tree Commands HAPTER ES-4500G Series This command configures the spanning tree priority globally for this switch. spanning-tree Use the no form to restore the default. priority YNTAX spanning-tree priority priority no spanning-tree priority priority - Priority of the bridge. (Range – 0-61440, in steps of 4096; Options: 0, 4096, 8192, 12288, 16384, 20480, 24576, 28672, 32768, 36864, 40960, 45056, 49152, 53248, 57344, 61440) EFAULT...
| Spanning Tree Commands HAPTER ES-4500G Series revision (902) max-hops (899) This command configures the system to flood BPDUs to all other ports on spanning-tree the switch or just to all other ports in the same VLAN when spanning tree is system-bpdu- disabled globally on the switch or disabled on a specific port.
| Spanning Tree Commands HAPTER ES-4500G Series OMMAND SAGE This command limits the maximum transmission rate for BPDUs. XAMPLE Console(config)#spanning-tree transmission-limit 4 Console(config)# This command configures the maximum number of hops in the region max-hops before a BPDU is discarded. Use the no form to restore the default. YNTAX max-hops hop-number hop-number - Maximum hop number for multiple spanning tree.
| Spanning Tree Commands HAPTER ES-4500G Series This command configures the priority of a spanning tree instance. Use the mst priority no form to restore the default. YNTAX mst instance-id priority priority no mst instance-id priority instance-id - Instance identifier of the spanning tree. (Range: 0-4094) priority - Priority of the a spanning tree instance.
| Spanning Tree Commands HAPTER ES-4500G Series OMMAND MST Configuration OMMAND SAGE Use this command to group VLANs into spanning tree instances. MSTP ◆ generates a unique spanning tree for each instance. This provides multiple pathways across the network, thereby balancing the traffic load, preventing wide-scale disruption when a bridge node in a single instance fails, and allowing for faster convergence of a new topology for the failed instance.
| Spanning Tree Commands HAPTER ES-4500G Series XAMPLE Console(config-mstp)#name R&D Console(config-mstp)# ELATED OMMANDS revision (902) This command configures the revision number for this multiple spanning revision tree configuration of this switch. Use the no form to restore the default. YNTAX revision number number - Revision number of the spanning tree.
| Spanning Tree Commands HAPTER ES-4500G Series OMMAND SAGE ◆ This command filters all Bridge Protocol Data Units (BPDUs) received on an interface to save CPU processing time. This function is designed to work in conjunction with edge ports which should only connect end stations to the switch, and therefore do not need to process BPDUs.
| Spanning Tree Commands HAPTER ES-4500G Series XAMPLE Console(config)#interface ethernet 1/5 Console(config-if)#spanning-tree edge-port Console(config-if)#spanning-tree bpdu-guard Console(config-if)# ELATED OMMANDS spanning-tree edge-port (905) spanning-tree spanning-disabled (912) This command configures the spanning tree path cost for the specified spanning-tree cost interface. Use the no form to restore the default auto-configuration mode. YNTAX spanning-tree cost cost no spanning-tree cost...
| Spanning Tree Commands HAPTER ES-4500G Series OMMAND SAGE ◆ This command is used by the Spanning Tree Algorithm to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media.
| Spanning Tree Commands HAPTER ES-4500G Series This command configures the link type for Rapid Spanning Tree and spanning-tree link- Multiple Spanning Tree. Use the no form to restore the default. type YNTAX spanning-tree link-type {auto | point-to-point | shared} no spanning-tree link-type auto - Automatically derived from the duplex mode setting.
| Spanning Tree Commands HAPTER ES-4500G Series OMMAND SAGE ◆ If Port Loopback Detection is not enabled and a port receives it’s own BPDU, then the port will drop the loopback BPDU according to IEEE Standard 802.1W-2001 9.3.4 (Note 1). Port Loopback Detection will not be active if Spanning Tree is disabled ◆...
| Spanning Tree Commands HAPTER ES-4500G Series When configured for manual release mode, then a link down / up event ◆ will not release the port from the discarding state. It can only be released using the spanning-tree loopback-detection release command.
| Spanning Tree Commands HAPTER ES-4500G Series shown below. Path cost “0” is used to indicate auto-configuration mode. When the short path cost method is selected and the default path cost recommended by the IEEE 8021w standard exceeds 65,535, the default is set to 65,535.
| Spanning Tree Commands HAPTER ES-4500G Series OMMAND SAGE ◆ This command defines the priority for the use of an interface in the multiple spanning-tree. If the path cost for all interfaces on a switch are the same, the interface with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree.
| Spanning Tree Commands HAPTER ES-4500G Series This command configures the priority for the specified interface. Use the spanning-tree port- no form to restore the default. priority YNTAX spanning-tree port-priority priority no spanning-tree port-priority priority - The priority for a port. (Range: 0-240, in steps of 16) EFAULT ETTING OMMAND...
| Spanning Tree Commands HAPTER ES-4500G Series OMMAND SAGE ◆ A bridge with a lower bridge identifier (or same identifier and lower MAC address) can take over as the root bridge at any time. When Root Guard is enabled, and the switch receives a superior BPDU ◆...
| Spanning Tree Commands HAPTER ES-4500G Series This command manually releases a port placed in discarding state by spanning-tree loopback-detection. loopback-detection release YNTAX spanning-tree loopback-detection release interface interface ethernet unit/port unit - Stack unit. (Range: 1-8) port - Port number. (Range: 1-26/50) port-channel channel-id (Range: 1-32) OMMAND Privileged Exec...
| Spanning Tree Commands HAPTER ES-4500G Series XAMPLE Console#spanning-tree protocol-migration eth 1/5 Console# This command shows the configuration for the common spanning tree show spanning-tree (CST) or for an instance within the multiple spanning tree (MST). YNTAX show spanning-tree [interface | mst instance-id] interface ethernet unit/port unit - Stack unit.
Page 915
| Spanning Tree Commands HAPTER ES-4500G Series Instance VLANs Configuration : 1-4093 Priority : 32768 Bridge Hello Time (sec.) Bridge Max. Age (sec.) : 20 Bridge Forward Delay (sec.) : 15 Root Hello Time (sec.) Root Max. Age (sec.) : 20 Root Forward Delay (sec.) : 15 Max.
| Spanning Tree Commands HAPTER ES-4500G Series This command shows the configuration of the multiple spanning tree. show spanning-tree mst configuration OMMAND Privileged Exec XAMPLE Console#show spanning-tree mst configuration Mstp Configuration Information -------------------------------------------------------------- Configuration Name : R&D Revision Level Instance VLANs -------------------------------------------------------------- 1-4093 Console#...
VLAN C OMMANDS ES-4500G Series A VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same physical segment. This section describes commands used to create VLAN groups, add port members, specify how VLAN tagging is used, and enable automatic VLAN registration for the selected interface.
| VLAN Commands HAPTER GVRP and Bridge Extension Commands ES-4500G Series GVRP RIDGE XTENSION OMMANDS GARP VLAN Registration Protocol defines a way for switches to exchange VLAN information in order to automatically register VLAN members on interfaces across the network. This section describes how to enable GVRP for individual interfaces and globally for the switch, as well as how to display default configuration settings for the Bridge Extension MIB.
| VLAN Commands HAPTER GVRP and Bridge Extension Commands ES-4500G Series This command sets the values for the join, leave and leaveall timers. Use garp timer the no form to restore the timers’ default values. YNTAX garp timer {join | leave | leaveall} timer-value no garp timer {join | leave | leaveall} {join | leave | leaveall} - Timer to set.
| VLAN Commands HAPTER GVRP and Bridge Extension Commands ES-4500G Series This command configures forbidden VLANs. Use the no form to remove the switchport list of forbidden VLANs. forbidden vlan YNTAX switchport forbidden vlan {add vlan-list | remove vlan-list} no switchport forbidden vlan add vlan-list - List of VLAN identifiers to add.
| VLAN Commands HAPTER GVRP and Bridge Extension Commands ES-4500G Series XAMPLE Console(config)#interface ethernet 1/1 Console(config-if)#switchport gvrp Console(config-if)# This command shows the configuration for bridge extension commands. show bridge-ext EFAULT ETTING None OMMAND Privileged Exec OMMAND SAGE "Displaying Bridge Extension Capabilities" on page 111 for a description of the displayed items.
| VLAN Commands HAPTER Editing VLAN Groups ES-4500G Series This command enters VLAN database mode. All commands in this mode vlan database will take effect immediately. EFAULT ETTING None OMMAND Global Configuration OMMAND SAGE Use the VLAN database command mode to add, change, and delete ◆...
| VLAN Commands HAPTER Configuring VLAN Interfaces ES-4500G Series EFAULT ETTING By default only VLAN 1 exists and is active. OMMAND VLAN Database Configuration OMMAND SAGE no vlan vlan-id deletes the VLAN. ◆ no vlan vlan-id name removes the VLAN name. ◆...
| VLAN Commands HAPTER Configuring VLAN Interfaces ES-4500G Series This command enters interface configuration mode for VLANs, which is interface vlan used to configure VLAN parameters for a physical interface. Use the no form to change a Layer 3 normal VLAN back to a Layer 2 interface. YNTAX [no] interface vlan vlan-id vlan-id - ID of the configured VLAN.
| VLAN Commands HAPTER Configuring VLAN Interfaces ES-4500G Series EFAULT ETTING All frame types OMMAND Interface Configuration (Ethernet, Port Channel) OMMAND SAGE When set to receive all frame types, any received frames that are untagged are assigned to the default VLAN. XAMPLE The following example shows how to restrict the traffic received on port 1 to tagged frames:...
| VLAN Commands HAPTER Configuring VLAN Interfaces ES-4500G Series Frames are always tagged within the switch. The tagged/untagged ◆ parameter used when adding a VLAN to an interface tells the switch whether to keep or remove the tag from a frame on egress. If none of the intermediate network devices nor the host at the other ◆...
| VLAN Commands HAPTER Configuring VLAN Interfaces ES-4500G Series XAMPLE The following example shows how to set the interface to port 1 and then enable ingress filtering: Console(config)#interface ethernet 1/1 Console(config-if)#switchport ingress-filtering Console(config-if)# This command configures the VLAN membership mode for a port. Use the switchport mode no form to restore the default.
| VLAN Commands HAPTER Configuring VLAN Interfaces ES-4500G Series This command configures the PVID (i.e., default VLAN ID) for a port. Use switchport native the no form to restore the default. vlan YNTAX switchport native vlan vlan-id no switchport native vlan vlan-id - Default VLAN ID for a port.
Page 930
| VLAN Commands HAPTER Configuring VLAN Interfaces ES-4500G Series OMMAND SAGE ◆ Use this command to configure a tunnel across one or more intermediate switches which pass traffic for VLAN groups to which they do not belong. The following figure shows VLANs 1 and 2 configured on switches A and B, with VLAN trunking being used to pass traffic for these VLAN groups across switches C, D and E.
| VLAN Commands HAPTER Displaying VLAN Information ES-4500G Series VLAN I ISPLAYING NFORMATION This section describes commands used to display VLAN information. Table 108: Commands for Displaying VLAN Information Command Function Mode show interfaces status Displays status for the specified VLAN interface NE, PE vlan show interfaces...
| VLAN Commands HAPTER Configuring IEEE 802.1Q Tunneling ES-4500G Series Eth1/26(S) Console# IEEE 802.1Q T ONFIGURING UNNELING IEEE 802.1Q tunneling (QinQ tunneling) uses a single Service Provider VLAN (SPVLAN) for customers who have multiple VLANs. Customer VLAN IDs are preserved and traffic from different customers is segregated within the service provider’s network even when they use the same customer- specific VLAN IDs.
| VLAN Commands HAPTER Configuring IEEE 802.1Q Tunneling ES-4500G Series Configure the QinQ tunnel uplink port to dot1Q-tunnel uplink mode (switchport dot1q-tunnel mode). Configure the QinQ tunnel uplink port to join the SPVLAN as a tagged member (switchport allowed vlan). Limitations for QinQ The native VLAN for the tunnel uplink ports and tunnel access ports ◆...
| VLAN Commands HAPTER Configuring IEEE 802.1Q Tunneling ES-4500G Series This command configures an interface as a QinQ tunnel port. Use the no switchport dot1q- form to disable QinQ on the interface. tunnel mode YNTAX switchport dot1q-tunnel mode {access | uplink} no switchport dot1q-tunnel mode access –...
| VLAN Commands HAPTER Configuring IEEE 802.1Q Tunneling ES-4500G Series This command creates a CVLAN to SPVLAN mapping entry. Use the no switchport dot1q- form to delete a VLAN mapping entry. tunnel service match cvid YNTAX switchport dot1q-tunnel service svid match cvid cvid [remove-ctag] svid - VLAN ID for the outer VLAN tag (Service Provider VID).
| VLAN Commands HAPTER Configuring IEEE 802.1Q Tunneling ES-4500G Series XAMPLE This example sets the SVID to 99 in the outer tag for egress packets exiting port 1 when the packet’s CVID is 2. Console(config)#interface ethernet 1/1 Console(config-if)#switchport dot1q-tunnel service 99 match cvid 2 Console(config-if)# In the following examples, ports 1 and 2 are configured as follows: Port 1 = Access, PVID = 100, VLAN = 100(u), 101(u)
| VLAN Commands HAPTER Configuring IEEE 802.1Q Tunneling ES-4500G Series OMMAND Interface Configuration (Ethernet, Port Channel) OMMAND SAGE Use the switchport dot1q-tunnel tpid command to set a custom ◆ 802.1Q ethertype value on the selected interface. This feature allows the switch to interoperate with third-party switches that do not use the standard 0x8100 ethertype to identify 802.1Q-tagged frames.
| VLAN Commands HAPTER Configuring Port-based Traffic Segmentation ES-4500G Series Console(config-if)#end Console#show dot1q-tunnel Current double-tagged status of the system is Enabled The dot1q-tunnel mode of the set interface 1/1 is Access mode, TPID is 0x8100. The dot1q-tunnel mode of the set interface 1/2 is Uplink mode, TPID is 0x8100. The dot1q-tunnel mode of the set interface 1/3 is Normal mode, TPID is 0x8100.
| VLAN Commands HAPTER Configuring Port-based Traffic Segmentation ES-4500G Series EFAULT ETTING Disabled globally No segmented port groups are defined. OMMAND Global Configuration OMMAND SAGE Traffic segmentation provides port-based security and isolation ◆ between ports within the VLAN. Data traffic on the downlink ports can only be forwarded to, and from, the designated uplink port(s).
| VLAN Commands HAPTER Configuring Private VLANs ES-4500G Series Ethernet 1/8 Console# VLAN ONFIGURING RIVATE Private VLANs provide port-based security and isolation of local ports contained within different private VLAN groups. This switch supports two types of private VLANs – primary and community groups. A primary VLAN contains promiscuous ports that can communicate with all other ports in the associated private VLAN groups, while a community (or secondary) VLAN contains community ports that can only communicate with other...
| VLAN Commands HAPTER Configuring Private VLANs ES-4500G Series Use the switchport mode private-vlan command to configure ports as promiscuous (i.e., having access to all ports in the primary VLAN) or host (i.e., community port). Use the switchport private-vlan host-association command to assign a port to a community VLAN.
| VLAN Commands HAPTER Configuring Private VLANs ES-4500G Series XAMPLE Console(config)#vlan database Console(config-vlan)#private-vlan 2 primary Console(config-vlan)#private-vlan 3 community Console(config)# Use this command to associate a primary VLAN with a secondary (i.e., private vlan community) VLAN. Use the no form to remove all associations for the association specified primary VLAN.
| VLAN Commands HAPTER Configuring Private VLANs ES-4500G Series promiscuous – This port type can communicate with all other promiscuous ports in the same primary VLAN, as well as with all the ports in the associated secondary VLANs. EFAULT ETTING Normal VLAN OMMAND Interface Configuration (Ethernet, Port Channel)
| VLAN Commands HAPTER Configuring Private VLANs ES-4500G Series Use this command to map an interface to a primary VLAN. Use the no form switchport private- to remove this mapping. vlan mapping YNTAX switchport private-vlan mapping primary-vlan-id no switchport private-vlan mapping primary-vlan-id –...
| VLAN Commands HAPTER Configuring Protocol-based VLANs ES-4500G Series XAMPLE Console#show vlan private-vlan Primary Secondary Type Interfaces -------- ----------- ---------- ------------------------------ primary Eth1/ 3 community Eth1/ 4 Eth1/ 5 Console# VLAN ONFIGURING ROTOCOL BASED The network devices required to support multiple protocols cannot be easily grouped into a common VLAN.
| VLAN Commands HAPTER Configuring Protocol-based VLANs ES-4500G Series This command creates a protocol group, or to add specific protocols to a protocol-vlan group. Use the no form to remove a protocol group. protocol-group (Configuring Groups) YNTAX protocol-vlan protocol-group group-id [{add | remove} frame-type frame protocol-type protocol] no protocol-vlan protocol-group group-id group-id - Group identifier of this protocol group.
| VLAN Commands HAPTER Configuring Protocol-based VLANs ES-4500G Series OMMAND Interface Configuration (Ethernet, Port Channel) OMMAND SAGE When creating a protocol-based VLAN, only assign interfaces via this ◆ command. If you assign interfaces using any of the other VLAN commands (such as the vlan command), these interfaces will admit traffic of any protocol type into the associated VLAN.
| VLAN Commands HAPTER Configuring Protocol-based VLANs ES-4500G Series XAMPLE This shows protocol group 1 configured for IP over Ethernet: Console#show protocol-vlan protocol-group Protocol Group ID Frame Type Protocol Type ------------------ ------------- --------------- ethernet 08 00 Console# This command shows the mapping from protocol groups to VLANs for the show interfaces selected interfaces.
| VLAN Commands HAPTER Configuring IP Subnet VLANs ES-4500G Series IP S VLAN ONFIGURING UBNET When using IEEE 802.1Q port-based VLAN classification, all untagged frames received by a port are classified as belonging to the VLAN whose VID (PVID) is associated with that port. When IP subnet-based VLAN classification is enabled, the source address of untagged ingress frames are checked against the IP subnet-to-VLAN mapping table.
| VLAN Commands HAPTER Configuring IP Subnet VLANs ES-4500G Series mapping is found, the PVID of the receiving port is assigned to the frame. The IP subnet cannot be a broadcast or multicast IP address. ◆ When MAC-based, IP subnet-based, and protocol-based VLANs are ◆...
| VLAN Commands HAPTER Configuring MAC Based VLANs ES-4500G Series MAC B VLAN ONFIGURING ASED When using IEEE 802.1Q port-based VLAN classification, all untagged frames received by a port are classified as belonging to the VLAN whose VID (PVID) is associated with that port. When MAC-based VLAN classification is enabled, the source address of untagged ingress frames are checked against the MAC address-to-VLAN mapping table.
| VLAN Commands HAPTER Configuring Voice VLANs ES-4500G Series When MAC-based, IP subnet-based, and protocol-based VLANs are ◆ supported concurrently, priority is applied in this sequence, and then port-based VLANs last. XAMPLE The following example assigns traffic from source MAC address 00-00-00- 11-22-33 to VLAN 10.
| VLAN Commands HAPTER Configuring Voice VLANs ES-4500G Series This command sets the Voice VLAN ID time out. Use the no form to restore voice vlan aging the default. YNTAX voice vlan aging minutes no voice vlan minutes - Specifies the port Voice VLAN membership time out. (Range: 5-43200 minutes) EFAULT ETTING...
| VLAN Commands HAPTER Configuring Voice VLANs ES-4500G Series OMMAND SAGE ◆ VoIP devices attached to the switch can be identified by the manufacturer’s Organizational Unique Identifier (OUI) in the source MAC address of received packets. OUI numbers are assigned to manufacturers and form the first three octets of device MAC addresses.
| VLAN Commands HAPTER Configuring Voice VLANs ES-4500G Series XAMPLE The following example sets port 1 to Voice VLAN auto mode. Console(config)#interface ethernet 1/1 Console(config-if)#switchport voice vlan auto Console(config-if)# This command specifies a CoS priority for VoIP traffic on a port. Use the no switchport voice form to restore the default priority on a port.
| VLAN Commands HAPTER Configuring Voice VLANs ES-4500G Series EFAULT ETTING OUI: Enabled LLDP: Disabled OMMAND Interface Configuration OMMAND SAGE When OUI is selected, be sure to configure the MAC address ranges in ◆ the Telephony OUI list (see the voice vlan mac-address command.
| VLAN Commands HAPTER Configuring Voice VLANs ES-4500G Series XAMPLE The following example enables security filtering on port 1. Console(config)#interface ethernet 1/1 Console(config-if)#switchport voice vlan security Console(config-if)# This command displays the Voice VLAN settings on the switch and the OUI show voice vlan Telephony list.
LASS OF ERVICE OMMANDS ES-4500G Series The commands described in this section allow you to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch supports CoS with eight priority queues for each port.
| Class of Service Commands HAPTER Priority Commands (Layer 2) ES-4500G Series This command assigns class of service (CoS) values to the priority queues queue cos-map (i.e., hardware output queues 0 - 7). Use the no form set the CoS map to the default values.
| Class of Service Commands HAPTER Priority Commands (Layer 2) ES-4500G Series ELATED OMMANDS show queue cos-map (964) This command sets the scheduling mode used for processing each of the queue mode class of service (CoS) priority queues. The options include strict priority, Weighted Round-Robin (WRR), or a combination of strict and weighted queuing.
| Class of Service Commands HAPTER Priority Commands (Layer 2) ES-4500G Series A weight can be assigned to each of the weighted queues (and thereby ◆ to the corresponding traffic priorities). This weight sets the frequency at which each queue is polled for service, and subsequently affects the response time for software applications assigned a specific priority value.
| Class of Service Commands HAPTER Priority Commands (Layer 2) ES-4500G Series XAMPLE The following example shows how to assign round-robin weights of 1 - 8 to the CoS priority queues 0 - 7. Console(config)#interface ge1/1 Console(config-if)#queue weight 1 2 3 4 5 6 7 8 Console(config-if)# ELATED OMMANDS...
| Class of Service Commands HAPTER Priority Commands (Layer 2) ES-4500G Series XAMPLE The following example shows how to set a default priority on port 3 to 5: Console(config)#interface ethernet 1/3 Console(config-if)#switchport priority default 5 Console(config-if)# ELATED OMMANDS show interfaces switchport (848) This command shows the class of service priority map.
| Class of Service Commands HAPTER Priority Commands (Layer 2) ES-4500G Series OMMAND Privileged Exec XAMPLE Console#show queue mode ethernet 1/1 Unit Port queue mode ---- ---- --------------- Weighted Round Robin Console# This command displays the weights used for the weighted queues. show queue weight YNTAX show queue mode interface...
| Class of Service Commands HAPTER Priority Commands (Layer 3 and 4) ES-4500G Series RIORITY OMMANDS AYER This section describes commands used to configure Layer 3 and 4 traffic priority mapping on the switch. Table 119: Priority Commands (Layer 3 and 4) Command Function Mode...
| Class of Service Commands HAPTER Priority Commands (Layer 3 and 4) ES-4500G Series This command enables IP port mapping (i.e., class of service mapping for map ip port (Global TCP/UDP sockets). Use the no form to disable IP port mapping. Configuration) YNTAX [no] map ip port...
| Class of Service Commands HAPTER Priority Commands (Layer 3 and 4) ES-4500G Series XAMPLE The following example shows how to enable IP precedence mapping globally: Console(config)#map ip precedence Console(config)# This command sets IP DSCP priority (i.e., Differentiated Services Code map ip dscp Point priority).
| Class of Service Commands HAPTER Priority Commands (Layer 3 and 4) ES-4500G Series XAMPLE The following example shows how to map IP DSCP value 1 to CoS value 0: Console(config)#interface ethernet 1/5 Console(config-if)#map ip dscp 1 cos 0 Console(config-if)# This command sets IP port priority (i.e., TCP/UDP port priority).
| Class of Service Commands HAPTER Priority Commands (Layer 3 and 4) ES-4500G Series This command sets IP precedence priority (i.e., IP Type of Service priority). map ip precedence Use the no form to restore the default table. (Interface Configuration) YNTAX map ip precedence ip-precedence-value cos cos-value no map ip precedence...
| Class of Service Commands HAPTER Priority Commands (Layer 3 and 4) ES-4500G Series This command shows the IP DSCP priority map. show map ip dscp YNTAX show map ip dscp [interface] interface ethernet unit/port unit - Stack unit. (Range: 1-8) port - Port number.
| Class of Service Commands HAPTER Priority Commands (Layer 3 and 4) ES-4500G Series XAMPLE The following shows that HTTP traffic has been mapped to CoS value 0: Console#show map ip port TCP port mapping status: disabled Port IP Port --------- -------- --- Eth 1/ 5 Console#...
UALITY OF ERVICE OMMANDS ES-4500G Series The commands described in this section are used to configure Differentiated Services (DiffServ) classification criteria and service policies. You can classify traffic based on access lists, IP Precedence or DSCP values, or VLANs. Using access lists allows you select traffic based on Layer 2, Layer 3, or Layer 4 information contained in each packet.
| Quality of Service Commands HAPTER ES-4500G Series To create a service policy for a specific category of ingress traffic, follow these steps: Use the class-map command to designate a class name for a specific category of traffic, and enter the Class Map configuration mode. Use the match command to select a specific type of traffic based on an...
| Quality of Service Commands HAPTER ES-4500G Series One or more class maps can be assigned to a policy map (page 977). ◆ The policy map is then bound by a service policy to an interface (page 986). A service policy defines packet classification, service tagging, and bandwidth policing.
| Quality of Service Commands HAPTER ES-4500G Series This command defines the criteria used to classify traffic. Use the no form match to delete the matching criteria. YNTAX [no] match {access-list acl-name | ip dscp dscp | ip precedence ip-precedence | ipv6 dscp dscp | vlan vlan} acl-name - Name of the access control list.
| Quality of Service Commands HAPTER ES-4500G Series This example creates a class map call “rd-class#2,” and sets it to match packets marked for IP Precedence service value 5. Console(config)#class-map rd-class#2 match-any Console(config-cmap)#match ip precedence 5 Console(config-cmap)# This example creates a class map call “rd-class#3,” and sets it to match packets marked for VLAN 1.
| Quality of Service Commands HAPTER ES-4500G Series OMMAND SAGE ◆ Use the policy-map command to specify the name of the policy map, and then use the class command to configure policies for traffic that matches the criteria defined in a class map. A policy map can contain multiple class statements that can be applied ◆...
| Quality of Service Commands HAPTER ES-4500G Series Up to 16 classes can be included in a policy map. ◆ XAMPLE This example creates a policy called “rd-policy,” uses the class command to specify the previously defined “rd-class,” uses the command to classify the service that incoming packets will receive, and then uses the police flow...
| Quality of Service Commands HAPTER ES-4500G Series Policing is based on a token bucket, where bucket depth (i.e., the ◆ maximum burst before the bucket overflows) is by specified the committed-burst field, and the average rate tokens are added to the bucket is by specified by the committed-rate option.
Page 981
| Quality of Service Commands HAPTER ES-4500G Series committed-rate - Committed information rate (CIR) in kilobits per second. (Range: 64-1000000 kbps at a granularity of 64 kbps or maximum port speed, whichever is lower) committed-burst - Committed burst size (BC) in bytes. (Range: 4000-16000000 at a granularity of 4k bytes) excess-burst - Excess burst size (BE) in bytes.
Page 982
| Quality of Service Commands HAPTER ES-4500G Series maximum size of the token bucket C is BC and the maximum size of the token bucket E is BE. The token buckets C and E are initially full, that is, the token count Tc(0) = BC and the token count Te(0) = BE.
| Quality of Service Commands HAPTER ES-4500G Series This command defines an enforcer for classified traffic based on a two rate police trtcm-color three color meter (trTCM). Use the no form to remove a policer. YNTAX [no] police {trtcm-color-blind | trtcm-color-aware} committed-rate committed-burst peak-rate peak-burst exceed-action {drop | new-dscp} violate action {drop | new-dscp}...
Page 984
| Quality of Service Commands HAPTER ES-4500G Series The trTCM as defined in RFC 2698 meters a traffic stream and ◆ processes its packets based on two rates – Committed Information Rate (CIR) and Peak Information Rate (PIR), and their associated burst sizes - Committed Burst Size (BC) and Peak Burst Size (BP).
| Quality of Service Commands HAPTER ES-4500G Series the service that incoming packets will receive, and then uses the police trtcm-color-blind command to limit the average bandwidth to 100,000 Kbps, the committed burst rate to 4000 bytes, the peak information rate to 1,000,000 kbps, the peak burst size to 6000, to remark any packets exceeding the committed burst size, and to drop any packets exceeding the peak information rate.
| Quality of Service Commands HAPTER ES-4500G Series XAMPLE This example creates a policy called “rd-policy,” uses the class command to specify the previously defined “rd-class,” uses the set cos command to classify the service that incoming packets will receive, and then uses the police flow command to limit the average bandwidth to 100,000 Kbps, the burst rate to 4000 bytes, and configure the response to drop any violating...
| Quality of Service Commands HAPTER ES-4500G Series This command displays the QoS class maps which define matching criteria show class-map used for classifying traffic. YNTAX show class-map [class-map-name] class-map-name - Name of the class map. (Range: 1-32 characters) EFAULT ETTING Displays all class maps.
| Quality of Service Commands HAPTER ES-4500G Series Description: class rd-class set cos 3 Console#show policy-map rd-policy class rd-class Policy Map rd-policy class rd-class set cos 3 Console# This command displays the service policy assigned to the specified show policy-map interface.
ULTICAST ILTERING OMMANDS ES-4500G Series This switch uses IGMP (Internet Group Management Protocol) to check for any attached hosts that want to receive a specific multicast service. It identifies the ports containing hosts requesting a service and sends data out to those ports only. It then propagates the service request up to any neighboring multicast switch/router to ensure that it will continue to receive the multicast service.
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series IGMP S NOOPING This section describes commands used to configure IGMP snooping on the switch. Table 124: IGMP Snooping Commands Command Function Mode ip igmp snooping Enables IGMP snooping ip igmp snooping proxy- Enables IGMP Snooping with Proxy Reporting reporting ip igmp snooping querier...
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series Table 124: IGMP Snooping Commands (Continued) Command Function Mode ip igmp snooping Configures the IGMP version for snooping vlan version ip igmp snooping Discards received IGMP messages which use a version different to that currently configured vlan version-exclusive show ip igmp snooping...
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series This command enables IGMP Snooping with Proxy Reporting. Use the no ip igmp snooping form to restore the default setting. proxy-reporting YNTAX [no] ip igmp snooping proxy-reporting ip igmp snooping vlan vlan-id proxy-reporting {enable | disable} no ip igmp snooping vlan vlan-id proxy-reporting vlan-id - VLAN ID (Range: 1-4093) enable - Enable on the specified VLAN.
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series OMMAND Global Configuration OMMAND SAGE IGMP snooping querier is not supported for IGMPv3 snooping (see ◆ igmp snooping version). If enabled, the switch will serve as querier if elected. The querier is ◆...
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series This command configures the querier timeout. Use the no form to restore ip igmp snooping the default. router-port-expire- time YNTAX ip igmp snooping router-port-expire-time seconds no ip igmp snooping router-port-expire-time seconds - The time the switch waits after the previous querier stops before it considers it to have expired.
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series If a topology change notification (TCN) is received, and all the uplink ◆ ports are subsequently deleted, a timeout mechanism is used to delete all of the currently learned multicast channels. When a new uplink port starts up, the switch sends unsolicited reports ◆...
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series tree change occurred. When an upstream multicast router receives this solicitation, it will also immediately issues an IGMP general query. The ip igmp snooping tcn query-solicit command can be used to ◆...
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series This command specifies how often the upstream interface should transmit ip igmp snooping unsolicited IGMP reports when report suppression/proxy reporting is unsolicited-report- enabled. Use the no form to restore the default value. interval YNTAX ip igmp snooping unsolicited-report-interval seconds...
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series OMMAND SAGE ◆ This command configures the IGMP report/query version used by IGMP snooping. Versions 1 - 3 are all supported, and versions 2 and 3 are backward compatible, so the switch can operate with other devices, regardless of the snooping version employed.
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series This command suppresses general queries except for ports attached to ip igmp snooping downstream multicast hosts. Use the no form to flood general queries to vlan general-query- all ports except for the multicast router port. suppression YNTAX [no] ip igmp snooping vlan vlan-id general-query-suppression...
| Multicast Filtering Commands HAPTER IGMP Snooping ES-4500G Series If immediate-leave is enabled, the switch assumes that only one host is ◆ connected to the interface. Therefore, immediate leave should only be enabled on an interface if it is connected to only one IGMP-enabled device, either a service host or a neighbor running IGMP snooping.
Need help?
Do you have a question about the iPECS ES-4550G and is the answer not in the manual?
Questions and answers