SMC Networks 6152L2 - annexe 1 Management Manual

Tigerswitch 10/100 48-port 10/100 mbps fast ethernet managed switch
Hide thumbs Also See for 6152L2 - annexe 1:
Table of Contents

Advertisement

TigerSwitch 10/100
48-Port 10/100 Mbps
Fast Ethernet Managed Switch
◆ 48 auto-MDI/MDI-X 10/100BASE-TX ports
◆ 4 Gigabit RJ-45 ports shared with 4SFP transceiver slots
◆ Non-blocking switching architecture
◆ Spanning Tree Protocol, and Rapid STP
◆ Up to 6 LACP or static trunks
◆ CoS support through four priority queues
◆ Full support for VLANs with GVRP
◆ IGMP multicast filtering and snooping
◆ Support for jumbo frames up to 9 KB
◆ Manageable via console, Web, SNMP, RMON

Management Guide

SMC6152L2

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the 6152L2 - annexe 1 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for SMC Networks 6152L2 - annexe 1

  • Page 1: Management Guide

    TigerSwitch 10/100 48-Port 10/100 Mbps Fast Ethernet Managed Switch ◆ 48 auto-MDI/MDI-X 10/100BASE-TX ports ◆ 4 Gigabit RJ-45 ports shared with 4SFP transceiver slots ◆ Non-blocking switching architecture ◆ Spanning Tree Protocol, and Rapid STP ◆ Up to 6 LACP or static trunks ◆...
  • Page 3 TigerSwitch 10/100 Management Guide From SMC’s Tiger line of feature-rich workgroup LAN solutions 20 Mason Irvine, CA 92618 February 2007 Phone: (949) 679-8000 Pub. # 149100032900A...
  • Page 4 Irvine, CA 92618 All rights reserved. Printed in Taiwan Trademarks: SMC is a registered trademark; and EZ Switch, TigerStack and TigerSwitch are trademarks of SMC Networks, Inc. Other product and company names are trademarks or registered trademarks of their respective holders.
  • Page 5 All SMC products carry a standard 90-day limited warranty from the date of purchase from SMC or its Authorized Reseller. SMC may, at its own discretion, repair or replace any product not operating as warranted with a similar or functionally equivalent product, during the applicable warranty term.
  • Page 6 RIGHTS, WHICH MAY VARY FROM STATE TO STATE. NOTHING IN THIS WARRANTY SHALL BE TAKEN TO AFFECT YOUR STATUTORY RIGHTS. * SMC will provide warranty service for one year following discontinuance from the active SMC price list. Under the limited lifetime warranty, internal and external power supplies, fans, and cables are covered by a standard one-year warranty from date of purchase.
  • Page 7: Table Of Contents

    ONTENTS Introduction ........1-1 Key Features ..........1-1 Description of Software Features .
  • Page 8 ONTENTS Configuring Event Logging ......3-34 Resetting the System ........3-41 Setting the System Clock .
  • Page 9 ONTENTS Overview ......... . 3-161 Displaying Basic VLAN Information .
  • Page 10 ONTENTS IP Source Guard ......... . 3-234 IP Source Guard Port Configuration .
  • Page 11 ONTENTS parity ..........4-22 speed .
  • Page 12 ONTENTS 802.1X Port Authentication ......4-104 Access Control List Commands ......4-113 IP ACLs .
  • Page 13 ONTENTS mac-address-table aging-time ......4-181 show mac-address-table aging-time ..... 4-182 Spanning Tree Commands .
  • Page 14 ONTENTS Static Multicast Routing Commands ....4-242 IP Interface Commands ........4-244 Basic IP Configuration .
  • Page 15 ABLES Table 1-1. Key Features ........1-1 Table 1-2.
  • Page 16 ABLES Table 4-21 SMTP Alert Commands ......4-65 Table 4-22 Time Commands ....... . . 4-70 Table 4-23 System Status Commands .
  • Page 17 ABLES Table 4-58 Private VLAN Commands ......4-210 Table 4-59 GVRP and Bridge Extension Commands ... . 4-216 Table 4-61 Priority Commands (Layer 2) .
  • Page 18 ABLES...
  • Page 19 IGURES Figure 3-1. Homepage ........3-3 Figure 3-2.
  • Page 20 IGURES Figure 3-37. SSH User Public-Key Settings ....3-85 Figure 3-38. Configuring Port Security ......3-88 Figure 3-39.
  • Page 21 IGURES Figure 3-74. Configuring VLAN Ports ..... . . 3-175 Figure 3-75. Private VLAN Information ..... 3-178 Figure 3-76.
  • Page 22 IGURES Figure 3-111. IP Source Guard Port Configuration ....3-235 Figure 3-112. Static IP Source Guard Binding Configuration ..3-237 Figure 3-113. Dynamic IP Source Guard Binding Information ..3-238 Figure 3-114.
  • Page 23: Introduction

    HAPTER NTRODUCTION This switch provides a broad range of features for Layer 2 switching. It includes a management agent that allows you to configure the features listed in this manual. The default configuration can be used for most of the features provided by this switch.
  • Page 24: Description Of Software Features

    NTRODUCTION Table 1-1. Key Features (Continued) Feature Description Port Trunking Supports up to 6 trunks using either static or dynamic trunking (LACP) Broadcast Storm Supported Control Static Address Up to 8K MAC addresses in the forwarding table IEEE 802.1D Supports dynamic data switching and addresses learning Bridge Store-and-Forward Supported to ensure wire-speed switching while eliminating...
  • Page 25 ESCRIPTION OF OFTWARE EATURES Configuration Backup and Restore – You can save the current configuration settings to a file on a TFTP server, and later download this file to restore the switch configuration settings. Authentication – This switch authenticates management access via the console port, Telnet or web browser.
  • Page 26 NTRODUCTION Rate Limiting – This feature controls the maximum rate for traffic received on an interface. Rate limiting is configured on interfaces at the edge of a network to limit traffic into the network. Packets that exceed the acceptable amount of traffic are dropped. Port Mirroring –...
  • Page 27 ESCRIPTION OF OFTWARE EATURES Store-and-Forward Switching – The switch copies each frame into its memory before forwarding them to another port. This ensures that all frames are a standard Ethernet size and have been verified for accuracy with the cyclic redundancy check (CRC). This prevents bad frames from entering the network and wasting bandwidth.
  • Page 28 NTRODUCTION Virtual LANs – The switch supports up to 255 VLANs. A Virtual LAN is a collection of network nodes that share the same collision domain regardless of their physical location or connection point in the network. The switch supports tagged VLANs based on the IEEE 802.1Q standard. Members of VLAN groups can be dynamically learned via GVRP, or ports can be manually assigned to a specific set of VLANs.
  • Page 29: System Defaults

    YSTEM EFAULTS Multicast Filtering – Multicast filtering is a system where network devices forward multicast traffic only to the ports that are registered with the multicast group. Without mulicast filtering the data packet will be broadcast to all endstations within a LAN or VLAN. The purpose is to keep the non-multicast group members from receiving unsolicited packets and to prevent a possible reduction in network performance.
  • Page 30 NTRODUCTION Table 1-2. System Defaults (Continued) Function Parameter Default IP Filtering Disabled Web Management HTTP Server Enabled HTTP Port Number HTTP Secure Server Enabled HTTP Secure Port Number SNMP Community Strings “public” (read only) “private” (read/write) Traps Authentication traps: enabled Link-up-down events: enabled SNMP V3 View: defaultview...
  • Page 31: Table 1-2. System Defaults

    YSTEM EFAULTS Table 1-2. System Defaults (Continued) Function Parameter Default Traffic Ingress Port Priority Prioritization Weighted Round Robin Queue: 0 1 2 3 4 5 6 7 Weight: 1 2 4 6 8 10 12 14 IP DSCP Priority Disabled IP Settings IP Address 0.0.0.0...
  • Page 32 NTRODUCTION 1-10...
  • Page 33: Initial Configuration

    Telnet connection over the network. The switch’s management agent also supports SNMP (Simple Network Management Protocol). This SNMP agent permits the switch to be managed from any system in the network using network management software such as SMC EliteView.
  • Page 34: Required Connections

    NITIAL ONFIGURATION The switch’s Web interface, CLI configuration program, and SNMP agent allow you to perform the following management functions: • Set user names and passwords • Set an IP interface for a management VLAN • Configure SNMP parameters • Enable/disable any port •...
  • Page 35 ONNECTING TO THE WITCH To connect a terminal to the console port, complete the following steps: 1. Connect the console cable to the serial port on a terminal, or a PC running terminal emulation software, and tighten the captive retaining screws on the DB-9 connector.
  • Page 36: Remote Connections

    NITIAL ONFIGURATION Remote Connections Prior to accessing the switch’s onboard agent via a network connection, you must first configure it with a valid IP address, subnet mask, and default gateway using a console connection, DHCP or BOOTP protocol. The IP address for this switch is obtained via DHCP by default. To manually configure this address or enable dynamic address assignment via DHCP or BOOTP, see “Setting an IP Address”...
  • Page 37: Setting Passwords

    ASIC ONFIGURATION Access to both CLI levels are controlled by user names and passwords. The switch has a default user name and password for each level. To log into the CLI at the Privileged Exec level using the default user name and password, perform these steps: 1.
  • Page 38: Setting An Ip Address

    NITIAL ONFIGURATION Username: admin Password: CLI session with the SMC6152L2 is opened. To end the CLI session, enter [Exit]. Console#configure Console(config)#username guest password 0 [password] Console(config)#username admin password 0 [password] Console(config)# Setting an IP Address You must establish IP address information for the switch to obtain management access through the network.
  • Page 39: Dynamic Configuration

    ASIC ONFIGURATION To assign an IP address to the switch, complete the following steps: 1. From the Privileged Exec level global configuration mode prompt, type “interface vlan 1” to access the interface-configuration mode. Press <Enter>. 2. Type “ip address ip-address netmask,” where “ip-address” is the switch IP address and “netmask”...
  • Page 40 NITIAL ONFIGURATION 1. From the Global Configuration mode prompt, type “interface vlan 1” to access the interface-configuration mode. Press <Enter>. 2. At the interface-configuration mode prompt, use one of the following commands: • To obtain IP settings via DHCP, type “ip address dhcp” and press <Enter>.
  • Page 41: Enabling Snmp Management Access

    Enabling SNMP Management Access The switch can be configured to accept management commands from Simple Network Management Protocol (SNMP) applications such as SMC EliteView. You can configure the switch to (1) respond to SNMP requests or (2) generate SNMP traps.
  • Page 42 NITIAL ONFIGURATION To prevent unauthorized access to the switch from SNMP version 1 or 2c clients, it is recommended that you change the default community strings. To configure a community string, complete the following steps: 1. From the Privileged Exec level global configuration mode prompt, type “snmp-server community string mode,”...
  • Page 43: Saving Configuration Settings

    ASIC ONFIGURATION see “snmp-server host” on page 4-130. The following example creates a trap host for each type of SNMP client. Console(config)#snmp-server host 10.1.19.23 batman Console(config)#snmp-server host 10.1.19.98 robin version 2c Console(config)#snmp-server host 10.1.19.34 barbie version 3 auth Console(config)# Configuring Access for SNMP Version 3 Clients To configure management access for SNMPv3 clients, you need to first create a view that defines the portions of MIB that the client can read or write, assign the view to a group, and then assign the user to a group.
  • Page 44: Managing System Files

    NITIAL ONFIGURATION To save the current configuration settings, enter the following command: 1. From the Privileged Exec mode prompt, type “copy running-config startup-config” and press <Enter>. 2. Enter the name of the start-up file. Press <Enter>. Console#copy running-config startup-config Startup configuration file name []: startup \Write to FLASH Programming.
  • Page 45 ANAGING YSTEM ILES Due to the size limit of the flash memory, the switch supports only two operation code files. However, you can have as many diagnostic code files and configuration files as available flash memory space allows. In the system flash memory, one file of each type must be set as the start-up file.
  • Page 46 NITIAL ONFIGURATION 2-14...
  • Page 47: Configuring The Switch

    HAPTER ONFIGURING THE WITCH Using the Web Interface This switch provides an embedded HTTP Web agent. Using a Web browser you can configure the switch and view statistics to monitor network activity. The Web agent can be accessed by any computer on the network using a standard Web browser (Internet Explorer 5.0 or above, or Netscape Navigator 6.2 or above).
  • Page 48 ONFIGURING THE WITCH Notes: 1. You are allowed three attempts to enter the correct password; on the third failed attempt the current connection is terminated. 2. If you log into the Web interface as guest (Normal Exec level), you can view the configuration settings or change the guest password.
  • Page 49: Navigating The Web Browser Interface

    AVIGATING THE ROWSER NTERFACE Navigating the Web Browser Interface To access the web-browser interface you must first enter a user name and password. The administrator has Read/Write access to all configuration parameters and statistics. The default user name and password for the administrator is “admin.”...
  • Page 50: Configuration Options

    ONFIGURING THE WITCH Configuration Options Configurable parameters have a dialog box or a drop-down list. Once a configuration change has been made on a page, be sure to click on the “Apply” button to confirm the new setting. The following table summarizes the web page configuration buttons.
  • Page 51: Main Menu

    AVIGATING THE ROWSER NTERFACE Main Menu Using the onboard web agent, you can define system parameters, manage and control the switch, and all its ports, or monitor network conditions. The following table briefly describes the selections available from this program. Table 3-2.
  • Page 52 ONFIGURING THE WITCH Table 3-2. Main Menu (Continued) Menu Description Page SMTP Sends an SMTP client message to a 3-39 participating server. Reset Restarts the switch 3-41 SNTP 3-42 Configuration Configures SNTP client settings, including 3-42 broadcast mode or a specified list of servers Clock Time Zone Sets the local time zone for the system clock 3-43...
  • Page 53 AVIGATING THE ROWSER NTERFACE Table 3-2. Main Menu (Continued) Menu Description Page Port Security Configures per port security, including 3-86 status, response for security breach, and maximum allowed MAC addresses 802.1x 3-88 Information Displays global configuration settings 3-90 Configuration Configures protocol parameters 3-91 Port Configuration Sets the authentication mode for individual...
  • Page 54 ONFIGURING THE WITCH Table 3-2. Main Menu (Continued) Menu Description Page Port Neighbors Displays settings and operational state for 3-127 Information remote side Port Broadcast Control Sets the broadcast storm threshold for each 3-129 port Trunk Broadcast Sets the broadcast storm threshold for each 3-129 Control trunk...
  • Page 55 AVIGATING THE ROWSER NTERFACE Table 3-2. Main Menu (Continued) Menu Description Page Port Configuration Configures individual port settings for STA 3-157 Trunk Configuration Configures individual trunk settings for 3-157 VLAN 3-161 802.1Q VLAN 3-161 Basic Information Displays information on the VLAN type 3-165 supported by this switch Current Table...
  • Page 56 ONFIGURING THE WITCH Table 3-2. Main Menu (Continued) Menu Description Page Trunk Configuration Sets the private VLAN interface type, and 3-182 associates the interfaces with a private VLAN Protocol VLAN 3-184 Configuration Configures protocol VLANs. 3-184 Port Configuration Configures protocol VLAN port type, and 3-185 associated protocol VLANs.
  • Page 57 AVIGATING THE ROWSER NTERFACE Table 3-2. Main Menu (Continued) Menu Description Page IGMP Filter Enables multicast filtering; sets IGMP 3-210 Configuration profiles IGMP Immediate Leave Enables the immediate leave function 3-210 Multicast Router Displays the ports that are attached to a 3-212 Port Information neighboring multicast router for each...
  • Page 58 ONFIGURING THE WITCH Table 3-2. Main Menu (Continued) Menu Description Page Trunk Configuration Configures MVR interface type and 3-224 immediate leave status Group Member Statically assigns MVR multicast streams to 3-226 Configuration an interface DHCP Snooping 3-227 Configuration Enables DHCP Snooping and DHCP 3-229 Snooping MAC-Address Verification VLAN Configuration...
  • Page 59: Basic Configuration

    ASIC ONFIGURATION Basic Configuration Displaying System Information You can easily identify the system by displaying the device name, location and contact information. Field Attributes • System Name – Name assigned to the switch system. • Object ID – MIB II object ID for switch’s network management subsystem.
  • Page 60: Figure 3-3. System Information

    ONFIGURING THE WITCH Web – Click System, System Information. Specify the system name, location, and contact information for the system administrator, then click Apply. (This page also includes a Telnet button that allows access to the Command Line Interface via Telnet.) Figure 3-3.
  • Page 61: Displaying Switch Hardware/Software Versions

    4-34 Console(config)#snmp-server location WC 9 4-129 Console(config)#snmp-server contact Geoff 4-128 Console(config)#exit Console#show system 4-80 System Description: SMC Networks SMC6152L2 System OID String: 1.3.6.1.4.1.202.20.66 System Information System Up Time: 0 days, 0 hours, 7 minutes, and 22.65 seconds System Name: R&D...
  • Page 62: Figure 3-4. Switch Information

    ONFIGURING THE WITCH • Internal Power Status – Displays the status of the internal power supply. Management Software • EPLD Version – Version number of the Electronically Programmable Logic Device code. • Loader Version – Version number of loader code. •...
  • Page 63: Displaying Bridge Extension Capabilities

    ASIC ONFIGURATION CLI – Use the following command to display version information. Console#show version 4-81 Unit 1 Serial Number: Hardware Version: EPLD Version: 4.02 Number of Ports: Main Power Status: Redundant Power Status: Not present Agent (Master) Unit ID: Loader Version: 1.0.0.0 Boot ROM Version: 1.0.0.8...
  • Page 64: Figure 3-5. Bridge Extension Configuration

    ONFIGURING THE WITCH • Configurable PVID Tagging – This switch allows you to override the default Port VLAN ID (PVID used in frame tags) and egress status (VLAN-Tagged or Untagged) on each port. (Refer to “VLAN Configuration” on page 3-161.) •...
  • Page 65: Setting The Switch's Ip Address

    ASIC ONFIGURATION CLI – Enter the following command. Console#show bridge-ext 4-217 Max Support VLAN Numbers: Max Support VLAN ID: 4094 Extended Multicast Filtering Services: No Static Entry Individual Port: VLAN Learning: Configurable PVID Tagging: Local VLAN Capable: Traffic Classes: Enabled GMRP: Disabled Console#...
  • Page 66 ONFIGURING THE WITCH • IP Address Mode – Specifies whether IP functionality is enabled via manual configuration (Static), Dynamic Host Configuration Protocol (DHCP), or Boot Protocol (BOOTP). If DHCP/BOOTP is enabled, IP will not function until a reply has been received from the server. Requests will be broadcast periodically by the switch for an IP address.
  • Page 67: Figure 3-6. Manual Ip Configuration

    ASIC ONFIGURATION Manual Configuration Web – Click System, IP Configuration. Select the VLAN through which the management station is attached, set the IP Address Mode to “Static,” enter the IP address, subnet mask and gateway, then click Apply. Figure 3-6. Manual IP Configuration CLI –...
  • Page 68: Figure 3-7. Dhcp Ip Configuration

    ONFIGURING THE WITCH Using DHCP/BOOTP If your network provides DHCP/BOOTP services, you can configure the switch to be dynamically configured by these services. Web – Click System, IP Configuration. Specify the VLAN to which the management station is attached, set the IP Address Mode to DHCP or BOOTP.
  • Page 69: Enabling Jumbo Frames

    ASIC ONFIGURATION CLI – Specify the management interface, and set the IP address mode to DHCP or BOOTP, and then enter the “ip dhcp restart” command. Console#config Console(config)#interface vlan 1 4-146 Console(config-if)#ip address dhcp 4-245 Console(config-if)#end Console#ip dhcp restart 4-246 Console#show ip interface 4-248 IP address and netmask: 192.168.1.54 255.255.255.0 on VLAN 1,...
  • Page 70: Managing Firmware

    ONFIGURING THE WITCH Web – Click System, Jumbo Frames. Figure 3-8. Enabling Jumbo Frames CLI – Specify the jumbo frame status. Console#config Console(config)#jumbo frame Console(config)# Managing Firmware You can upload/download firmware to or from a TFTP server. By saving runtime code to a file on a TFTP server, that file can later be downloaded to the switch to restore operation.
  • Page 71: Figure 3-9. Copy Firmware

    ASIC ONFIGURATION • TFTP Server IP Address – The IP address of a TFTP server. • File Type – Specify opcode (operational code) to copy firmware. • File Name – The file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names on the TFTP server is 127 characters or 31 characters for files on the switch.
  • Page 72: Figure 3-10. Setting The Startup Code

    ONFIGURING THE WITCH If you download to a new destination file, go to the System, File Management, Set Start-Up menu, mark the operation code file used at startup, and click Apply. To start the new firmware, reboot the system via the System/Reset menu.
  • Page 73: Saving Or Restoring Configuration Settings

    ASIC ONFIGURATION Saving or Restoring Configuration Settings You can upload/download configuration settings to/from a TFTP server. The configuration file can be later downloaded to restore the switch’s settings. Command Attributes • File Transfer Method – The firmware copy operation includes these options.
  • Page 74: Figure 3-12. Downloading Configuration Settings For Startup

    ONFIGURING THE WITCH • File Type – Specify config (configuration) to copy configuration file. • File Name — The configuration file name should not contain slashes (\ or /), the leading letter of the file name should not be a period (.), and the maximum length for file names on the TFTP server is 127 characters or 31 characters for files on the switch.
  • Page 75: Console Port Settings

    ASIC ONFIGURATION Note: You can also select any configuration file as the start-up configuration by using the System/File Management/Set Start-Up page. Figure 3-13. Setting the Startup Configuration Settings CLI – Enter the IP address of the TFTP server, specify the source file on the server, set the startup file name on the switch, and then restart the switch.
  • Page 76 ONFIGURING THE WITCH Command Attributes • Login Timeout – Sets the interval that the system waits for a user to log into the CLI. If a login attempt is not detected within the timeout interval, the connection is terminated for the session. (Range: 0-300 seconds;...
  • Page 77: Figure 3-14. Console Port Setting

    ASIC ONFIGURATION Available in CLI only: • Password – Specifies a password for the line connection. When a connection is started on a line with password protection, the system prompts for the password. If you enter the correct password, the system shows a prompt.
  • Page 78: Telnet Settings

    ONFIGURING THE WITCH CLI – Enter Line Configuration mode for the console, then specify the connection parameters as required. To display the current console port settings, use the show line command from the Normal Exec level. 4-15 Console(config)#line console 4-16 Console(config-line)#login local 4-17 Console(config-line)#password 0 secret...
  • Page 79: Figure 3-15. Enabling Telnet

    ASIC ONFIGURATION • Login Timeout – Sets the interval that the system waits for a user to log into the CLI. If a login attempt is not detected within the timeout interval, the connection is terminated for the session. (Range: 0-300 seconds;...
  • Page 80: Configuring Event Logging

    ONFIGURING THE WITCH CLI – Enter Line Configuration mode for a virtual terminal, then specify the connection parameters as required. To display the current virtual terminal settings, use the show line command from the Normal Exec level. 4-15 Console(config)#line vty 4-16 Console(config-line)#login local 4-17...
  • Page 81: System Log Configuration

    ASIC ONFIGURATION Web – Click System, Log, Logs. Figure 3-16. Displaying Logs CLI – This example shows the event message stored in RAM. 4-64 Console#show log ram [1] 00:01:37 2001-01-01 "DHCP request failed - will retry later." level: 4, module: 9, function: 0, and event no.: 10 [0] 00:00:35 2001-01-01 "System coldStart notification."...
  • Page 82: Table 3-3. Logging Levels

    ONFIGURING THE WITCH Command Attributes • System Log Status – Enables/disables the logging of debug or error messages to the logging process. (Default: Enabled) • Flash Level – Limits log messages saved to the switch’s permanent flash memory for all levels up to the specified level. For example, if level 3 is specified, all messages from level 0 to level 3 will be logged to flash.
  • Page 83: Remote Log Configuration

    ASIC ONFIGURATION Web – Click System, Log, System Logs. Specify System Log Status, set the level of event messages to be logged to RAM and flash memory, then click Apply. Figure 3-17. System Logs CLI – Enable system logging and then specify the level of messages to be logged to RAM and flash memory.
  • Page 84: Figure 3-18. Remote Logs

    ONFIGURING THE WITCH to an appropriate service. The attribute specifies the facility type tag sent in syslog messages. (See RFC 3164.) This type has no effect on the kind of messages reported by the switch. However, it may be used by the syslog server to process messages, such as sorting or storing messages in the corresponding database.
  • Page 85: Simple Mail Transfer Protocol

    ASIC ONFIGURATION CLI – Enter the syslog server host IP address, choose the facility type and set the logging trap. 4-59 Console(config)#logging host 192.168.1.15 4-60 Console(config)#logging facility 23 4-61 Console(config)#logging trap 4 Console(config)#end 4-62 Console#show logging trap Syslog logging: Enabled REMOTELOG status: Enabled REMOTELOG facility type:...
  • Page 86: Figure 3-19. Enabling And Configuring Smtp

    ONFIGURING THE WITCH - Critical – Sends notification that a critical condition has occurred, such as memory allocation, or free memory error - resource exhausted. (Level 2) - Alert – Sends urgent notification that immediate action must be taken. (Level 1) - Emergency –...
  • Page 87: Resetting The System

    ASIC ONFIGURATION CLI – Enter the host ip address, followed by the mail severity level, source and destination email addresses and enter the sendmail command to complete the action. Use the show logging command to display SMTP information. Console(config)#logging sendmail host 192.168.1.19 Console(config)#logging sendmail level 3 Console(config)#logging sendmail source-email bill@this-company.com...
  • Page 88: Setting The System Clock

    ONFIGURING THE WITCH Setting the System Clock Simple Network Time Protocol (SNTP) allows the switch to set its internal clock based on periodic updates from a time server (SNTP or NTP). Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries.
  • Page 89: Setting The Time Zone

    ASIC ONFIGURATION Web – Select SNTP, Configuration. Modify any of the required parameters, and click Apply. Figure 3-21. SNTP Configuration CLI – This example configures the switch to operate as an SNTP unicast client and then displays the current time and settings. Console(config)#sntp client 4-71 Console(config)#sntp poll 604-72...
  • Page 90: Simple Network Management Protocol

    ONFIGURING THE WITCH • Hours (0-13) – The number of hours before/after UTC. • Minutes (0-59) – The number of minutes before/after UTC. • Direction – Configures the time zone to be before (east) or after (west) UTC. Web – Select SNTP, Clock Time Zone. Set the offset for your time zone relative to the UTC, and click Apply.
  • Page 91 A network management station can access this information using software such as SMC EliteView. Access to the onboard agent from clients using SNMP v1 and v2c is controlled by community strings. To communicate with the switch, the management station must first submit a valid community string for authentication.
  • Page 92: Table 3-4 Snmpv3 Security Models And Levels

    ONFIGURING THE WITCH Table 3-4 SNMPv3 Security Models and Levels Model Level Group Read Write Notify Security View View View noAuth public defaultview none none Community string NoPriv (read only only) noAuth private defaultview defaultview none Community string NoPriv (read/ only write) noAuth...
  • Page 93: Enabling The Snmp Agent

    IMPLE ETWORK ANAGEMENT ROTOCOL Enabling the SNMP Agent Enables SNMPv3 service for all management clients (i.e., versions 1, 2c, 3). Command Attributes SNMP Agent Status – Enables SNMP on the switch. Web – Click SNMP, Agent Status. Enable the SNMP Agent by marking the Enabled checkbox, and click Apply.
  • Page 94: Figure 3-24 Configuring Snmp Community Strings

    ONFIGURING THE WITCH • Access Mode – Specifies the access rights for the community string: - Read-Only – Authorized management stations are only able to retrieve MIB objects. - Read/Write – Authorized management stations are able to both retrieve and modify MIB objects. Web –...
  • Page 95: Specifying Trap Managers And Trap Types

    You must specify trap managers so that key events are reported by this switch to your management station (using network management platforms such as SMC EliteView). You can specify up to five management stations that will receive authentication failure messages and other notification messages from the switch.
  • Page 96 ONFIGURING THE WITCH 3. Create a view with the required notification messages (page 3-65). 4. Create a group that includes the required notify view (page 3-60). 5. Specify a remote engine ID where the user resides (page 3-53). 6. Then configure a remote user (page 3-57). Command Attributes •...
  • Page 97: Figure 3-25 Configuring Snmp Trap Managers

    IMPLE ETWORK ANAGEMENT ROTOCOL - Retry times – The maximum number of times to resend an inform message if the recipient does not acknowledge receipt. (Range: 0-255; Default: 3) • Enable Authentication Traps – Issues a notification message to specified IP trap managers whenever authentication of an SNMP request fails.
  • Page 98: Configuring Snmpv3 Management Access

    ONFIGURING THE WITCH Configuring SNMPv3 Management Access To configure SNMPv3 management access to the switch, follow these steps: 1. If you want to change the default engine ID, it must be changed first before configuring other parameters. 2. Specify read and write access views for the switch MIB tree. 3.
  • Page 99: Specifying A Remote Engine Id

    IMPLE ETWORK ANAGEMENT ROTOCOL Web – Click SNMP, SNMPv3, Engine ID. Enter an ID of up to 26 hexadecimal characters and then click Save. Figure 3-26 Setting an Engine ID CLI – This example sets an SNMPv3 engine ID. Console(config)#snmp-server engine-id local 12345abcdef 4-134 Console(config)#exit Console#show snmp engine-id...
  • Page 100: Configuring Snmpv3 Users

    ONFIGURING THE WITCH Web – Click SNMP, SNMPv3, Remote Engine ID. Enter an ID of up to 26 hexadecimal characters and then click Save. Figure 3-27 Setting an Engine ID CLI – This example specifies a remote SNMPv3 engine ID. 4-134 Console(config)#snmp-server engineID remote 54321 192.168.1.19 Console(config)#exit...
  • Page 101 IMPLE ETWORK ANAGEMENT ROTOCOL - AuthPriv – SNMP communications use both authentication and encryption (only available for the SNMPv3 security model). • Authentication Protocol – The method used for user authentication. (Options: MD5, SHA; Default: MD5) • Authentication Password – A minimum of eight plain text characters is required.
  • Page 102: Figure 3-28 Configuring Snmpv3 Users

    ONFIGURING THE WITCH Web – Click SNMP, SNMPv3, Users. Click New to configure a user name. In the New User page, define a name and assign it to a group, then click Add to save the configuration and return to the User Name list. To delete a user, check the box next to the user name, then click Delete.
  • Page 103: Configuring Remote Snmpv3 Users

    IMPLE ETWORK ANAGEMENT ROTOCOL CLI – Use the snmp-server user command to configure a new user name and assign it to a group. Console(config)#snmp-server user chris group r&d v3 auth md5 greenpeace priv des56 einstien 4-141 Console(config)#exit Console#show snmp user 4-143 EngineId: 80000034030001f488f5200000 User Name: chris...
  • Page 104 ONFIGURING THE WITCH Command Attributes • User Name – The name of user connecting to the SNMP agent. (Range: 1-32 characters) • Group Name – The name of the SNMP group to which the user is assigned. (Range: 1-32 characters) •...
  • Page 105: Figure 3-29 Configuring Remote Snmpv3 Users

    IMPLE ETWORK ANAGEMENT ROTOCOL Web – Click SNMP, SNMPv3, Remote Users. Click New to configure a user name. In the New User page, define a name and assign it to a group, then click Add to save the configuration and return to the User Name list. To delete a user, check the box next to the user name, then click Delete.
  • Page 106: Configuring Snmpv3 Groups

    ONFIGURING THE WITCH CLI – Use the snmp-server user command to configure a new user name and assign it to a group. Console(config)#snmp-server user mark group r&d remote 192.168.1.19 v3 auth md5 greenpeace priv des56 einstien 4-141 Console(config)#exit Console#show snmp user 4-143 No user exist.
  • Page 107: Table 3-5 Supported Notification Messages

    IMPLE ETWORK ANAGEMENT ROTOCOL • Notify View – The configured view for notifications. (Range: 1-64 characters) Table 3-5 Supported Notification Messages Object Label Object ID Description RFC 1493 Traps newRoot 1.3.6.1.2.1.17.0.1 The newRoot trap indicates that the sending agent has become the new root of the Spanning Tree;...
  • Page 108 ONFIGURING THE WITCH Table 3-5 Supported Notification Messages (Continued) Object Label Object ID Description warmStart 1.3.6.1.6.3.1.1.5.2 A warmStart trap signifies that the SNMPv2 entity, acting in an agent role, is reinitializing itself such that its configuration is unaltered. 1.3.6.1.6.3.1.1.5.3 A linkDown trap signifies linkDown that the SNMP entity, acting in an agent role, has...
  • Page 109 IMPLE ETWORK ANAGEMENT ROTOCOL Table 3-5 Supported Notification Messages (Continued) Object Label Object ID Description 1.3.6.1.6.3.1.1.5.5 An authenticationFailure authenticationFailure trap signifies that the SNMPv2 entity, acting in an agent role, has received a protocol message that is not properly authenticated. While all implementations of the SNMPv2 must be capable of generating this...
  • Page 110: Figure 3-30 Configuring Snmpv3 Groups

    ONFIGURING THE WITCH Web – Click SNMP, SNMPv3, Groups. Click New to configure a new group. In the New Group page, define a name, assign a security model and level, and then select read and write views. Click Add to save the new group and return to the Groups list.
  • Page 111: Setting Snmpv3 Views

    IMPLE ETWORK ANAGEMENT ROTOCOL CLI – Use the snmp-server group command to configure a new group, specifying the security model and level, and restricting MIB access to defined read and write views. Console(config)#snmp-server group secure-users v3 priv read defaultview write defaultview notify defaultview 4-138 Console(config)#exit Console#show snmp group...
  • Page 112: Figure 3-31 Configuring Snmpv3 Views

    ONFIGURING THE WITCH Web – Click SNMP, SNMPv3, Views. Click New to configure a new view. In the New View page, define a name and specify OID subtrees in the switch MIB to be included or excluded in the view. Click Back to save the new view and return to the SNMPv3 Views list.
  • Page 113: User Authentication

    UTHENTICATION CLI – Use the snmp-server view command to configure a new view. This example view includes the MIB-2 interfaces table, and the wildcard mask selects all index entries. Console(config)#snmp-server view ifEntry.a 1.3.6.1.2.1.2.2.1.1.* included 4-136 Console(config)#exit Console#show snmp view 4-137 View Name: ifEntry.a Subtree OID: 1.3.6.1.2.1.2.2.1.1.* View Type: included...
  • Page 114: Configuring User Accounts

    ONFIGURING THE WITCH • ACL - Access Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port number or TCP control code) or any frames (based on MAC address or Ethernet type). • IP Filter –...
  • Page 115: Configuring Local/Remote Logon Authentication

    UTHENTICATION Web – Click Security, User Accounts. To configure a new user account, specify a user name, select the user’s access level, then enter a password and confirm it. Click Add to save the new user account and add it to the Account List.
  • Page 116 ONFIGURING THE WITCH console Telnet 1. Client attempts management access. 2. Switch contacts authentication server. RADIUS/ 3. Authentication server challenges client. 4. Client responds with proper password or key. TACACS+ 5. Authentication server approves access. server 6. Switch grants management access. Remote Authentication Dial-in User Service (RADIUS) and Terminal Access Controller Access Control System Plus (TACACS+) are logon authentication protocols that use software running on a central server to...
  • Page 117 UTHENTICATION • RADIUS and TACACS+ logon authentication assign a specific privilege level for each user name/password pair. The user name, password, and privilege level must be configured on the authentication server. • You can specify up to three authentication methods for any user to indicate the authentication sequence.
  • Page 118 ONFIGURING THE WITCH • RADIUS Settings - Global – Provides globally applicable RADIUS settings. - ServerIndex – Specifies one of five RADIUS servers that may be configured. The switch attempts authentication using the listed sequence of servers. The process ends when a server either approves or denies access to a user.
  • Page 119: Figure 3-33. Authentication Settings

    UTHENTICATION Web – Click Security, Authentication Settings. To configure local or remote authentication preferences, specify the authentication sequence (i.e., one to three methods), fill in the parameters for RADIUS or TACACS+ authentication if selected, and click Apply. Figure 3-33. Authentication Settings CLI –...
  • Page 120: Configuring Https

    ONFIGURING THE WITCH Configuring HTTPS You can configure the switch to enable the Secure Hypertext Transfer Protocol (HTTPS) over the Secure Socket Layer (SSL), providing secure access (i.e., an encrypted connection) to the switch’s web interface. Command Usage • Both the HTTP and HTTPS service can be enabled independently on the switch.
  • Page 121: Figure 3-34. Https Settings

    UTHENTICATION Command Attributes • HTTPS Status – Allows you to enable/disable the HTTPS server feature on the switch. (Default: Enabled) • Change HTTPS Port Number – Specifies the UDP port number used for HTTPS/SSL connection to the switch’s web interface. (Default: Port 443) •...
  • Page 122 ONFIGURING THE WITCH CLI – This example enables the HTTP secure server and modifies the port number. Console(config)#ip http secure-server 4-41 Console(config)#ip http secure-port 441 4-42 Console(config)# Replacing the Default Secure-site Certificate When you log onto the web interface using HTTPS (for secure access), a Secure Sockets Layer (SSL) certificate appears for the switch.
  • Page 123: Configuring The Secure Shell

    UTHENTICATION Configuring the Secure Shell The Berkley-standard includes remote access tools originally designed for Unix systems. Some of these tools have also been implemented for Microsoft Windows and other environments. These tools, including commands such as rlogin (remote login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.
  • Page 124 ONFIGURING THE WITCH To use the SSH server, complete these steps: 1. Generate a Host Key Pair – On the SSH Host Key Settings page, create a host public/private key pair. 2. Provide Host Public Key to Clients – Many SSH client programs automatically import the host public key during the initial connection setup with the switch.
  • Page 125: Configuring The Ssh Settings

    UTHENTICATION 6. Challenge-Response Authentication – When an SSH client attempts to contact the switch, the SSH server uses the host key pair to negotiate a session key and encryption method. Only clients that have a private key corresponding to the public keys stored on the switch can access. The following exchanges take place during this process: a.
  • Page 126: Figure 3-35. Ssh Server Settings

    ONFIGURING THE WITCH • Version – The Secure Shell version number. Version 2.0 is displayed, but the switch supports management access via either SSH Version 1.5 or 2.0 clients. • SSH Authentication Timeout – Specifies the time interval in seconds that the SSH server waits for a response from a client during an authentication attempt.
  • Page 127: Generating The Host Key Pair

    UTHENTICATION CLI – This example enables SSH, sets the authentication parameters, and displays the current configuration. It shows that the administrator has made a connection via SHH, and then disables this connection. Console(config)#ip ssh server 4-48 Console(config)#ip ssh timeout 100 4-49 Console(config)#ip ssh authentication-retries 5 4-50...
  • Page 128: Figure 3-36. Ssh Host-Key Settings

    ONFIGURING THE WITCH • Host-Key Type – The key type used to generate the host key pair (i.e., public and private keys). (Range: RSA, DSA, Both: Default: RSA) The SSH server uses RSA or DSA for key exchange when the client first establishes a connection with the switch, and then negotiates with the client to select either DES (56-bit) or 3DES (168-bit) for data encryption.
  • Page 129: Generating The User Public Key Pair

    UTHENTICATION CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and then displays the host’s public keys. Console#ip ssh crypto host-key generate 4-48 Console#ip ssh save host-key 4-48 Console#show public-key host 4-48 Host:...
  • Page 130 ONFIGURING THE WITCH - DSA: The first field indicates that the encryption method used by SSH is based on the Digital Signature Standard (DSS). The last string is the encoded modulus. • User Name – The user type used for the public key pair. •...
  • Page 131: Figure 3-37. Ssh User Public-Key Settings

    UTHENTICATION Web – Click Security, SSH, SSH User-Key Settings. Select the user type and public-key type from the drop-down box, enter the TFTP server IP address, input the source file name, and then click Copy Public Key. Figure 3-37. SSH User Public-Key Settings 3-85...
  • Page 132: Configuring Port Security

    ONFIGURING THE WITCH CLI – This example generates a host-key pair using both the RSA and DSA algorithms, stores the keys to flash memory, and then displays the host’s public keys. Console#ip ssh crypto host-key generate 4-48 Console#ip ssh save host-key 4-48 Console#show public-key host 4-48...
  • Page 133 UTHENTICATION learning. Be sure you enable the learning function long enough to ensure that all valid VLAN members have been registered on the selected port. Note that you can also restrict the maximum number of addresses that can be learned by a port. To add new VLAN members at a later time, you can manually add secure addresses with the Static Address Table (page 3-140), or turn off port security to reenable the learning function long enough for new VLAN...
  • Page 134: Configuring 802.1X Port Authentication

    ONFIGURING THE WITCH Web – Click Security, Port Security. Set the action to take when an invalid address is detected on a port, set the maximum number of MAC addresses allowed on a port, and click Apply. Figure 3-38. Configuring Port Security CLI –...
  • Page 135 UTHENTICATION Access to all switch ports in a network can be centrally controlled from a server, which means that authorized users can use the same credentials for authentication from any point within the network. This switch uses the Extensible Authentication Protocol over LANs (EAPOL) to exchange authentication protocol messages with the client, and a remote RADIUS authentication server to verify user identity and access rights.
  • Page 136: Figure 3-39. 802.1X Global Information

    ONFIGURING THE WITCH The operation of 802.1x on the switch requires the following: • The switch must have an IP address assigned. • RADIUS authentication must be enabled on the switch and the IP address of the RADIUS server specified. •...
  • Page 137: Figure 3-40. 802.1X Global Configuration

    UTHENTICATION CLI – This example shows the default global setting for 802.1x. Console#show dot1x 4-110 Global 802.1X Parameters system-auth-control: enable 802.1X Port Summary Port Name Status Operation Mode Mode Authorized disabled Single-Host ForceAuthorized disabled Single-Host ForceAuthorized 802.1X Port Details 802.1X is disabled on port 1/1 802.1X is disabled on port 1/52 Console# Configuring 802.1x Global Settings...
  • Page 138 ONFIGURING THE WITCH Configuring Port Settings for 802.1x When 802.1X is enabled, you need to configure the parameters for the authentication process that runs between the client and the switch (i.e., authenticator), as well as the client identity lookup process that runs between the switch and authentication server.
  • Page 139: Figure 3-41. 802.1X Port Configuration

    UTHENTICATION • Max-Req – Sets the maximum number of times the switch port will retransmit an EAP request packet to the client before it times out the authentication session. (Range: 1-10; Default 2) • Quiet Period – Sets the time that a switch port waits after the Max Request Count has been exceeded before attempting to acquire a new client.
  • Page 140 ONFIGURING THE WITCH Console(config)#interface ethernet 1/2 4-146 Console(config-if)#dot1x port-control auto 4-106 4-108 Console(config-if)#dot1x re-authentication 4-106 Console(config-if)#dot1x max-req 5 4-109 Console(config-if)#dot1x timeout quiet-period 30 4-109 Console(config-if)#dot1x timeout re-authperiod 1800 4-110 Console(config-if)#dot1x timeout tx-period 40 Console(config-if)#exit Console(config)#exit Console#show dot1x 4-110 Global 802.1X Parameters system-auth-control: enable 802.1X Port Summary Port Name Status...
  • Page 141: Table 3-7. 802.1X Statistics

    UTHENTICATION Displaying 802.1x Statistics This switch can display statistics for dot1x protocol exchanges for any port. Statistical Values Table 3-7. 802.1x Statistics Parameter Descripton Rx EXPOL Start The number of EAPOL Start frames that have been received by this Authenticator. Rx EAPOL Logoff The number of EAPOL Logoff frames that have been received by this Authenticator.
  • Page 142: Figure 3-42. Displaying 802.1X Port Statistics

    ONFIGURING THE WITCH Table 3-7. 802.1x Statistics (Continued) Parameter Descripton Tx EAP Req/Id The number of EAP Req/Id frames that have been transmitted by this Authenticator. Tx EAP Req/Oth The number of EAP Request frames (other than Rq/Id frames) that have been transmitted by this Authenticator.
  • Page 143: Access Control Lists

    CCESS ONTROL ISTS CLI – This example displays the 802.1x statistics for port 4. Console#show dot1x statistics interface ethernet 1/4 4-110 Eth 1/4 Rx: EXPOL EAPOL EAPOL EAPOL Start Logoff Invalid Total Resp/Id Resp/Oth LenError 1007 Last Last EAPOLVer EAPOLSrc 00-00-E8-98-73-21 Tx: EAPOL Total...
  • Page 144: Setting The Acl Name And Type

    ONFIGURING THE WITCH Command Usage The following restrictions apply to ACLs: • Each ACL can have up to 60 rules. • This switch supports ACLs for ingress filtering only. However, you can only bind one IP ACL to any port for ingress filtering. In other words, only one ACL can be bound to an interface - Ingress IP ACL.
  • Page 145: Configuring A Standard Ip Acl

    CCESS ONTROL ISTS Web – Click Security, ACL, Configuration. Enter an ACL name in the Name field, select the list type (IP Standard, IP Extended, or MAC), and click Add to open the configuration page for the new list. Figure 3-43. Naming and Choosing ACLs CLI –...
  • Page 146: Configuring An Extended Ip Acl

    ONFIGURING THE WITCH Web – Specify the action (i.e., Permit or Deny). Select the address type (Any, Host, or IP). If you select “Host,” enter a specific address. If you select “IP,” enter a subnet address and the mask for an address range. Then click Add.
  • Page 147 CCESS ONTROL ISTS of addresses with the Address and SubMask fields. (Options: Any, Host, IP; Default: Any) • Src/Dst IP Address – Source or destination IP address. • Src/Dst Subnet Mask – Subnet mask for source or destination address. (See the description for SubMask on page 3-99.) •...
  • Page 148: Figure 3-45. Configuring Extended Ip Acls

    ONFIGURING THE WITCH For example, use the code value and mask below to catch packets with the following flags set: - SYN flag valid, use control-code 2, control bitmask 2 - Both SYN and ACK valid, use control-code 18, control bitmask 18 - SYN valid and ACK invalid, use control-code 2, control bitmask 18 Web –...
  • Page 149: Configuring A Mac Acl

    CCESS ONTROL ISTS 3. Permit all TCP packets from class C addresses 192.168.1.0 with the TCP control code set to “SYN.” Console(config-ext-acl)#permit 10.7.1.1 255.255.255.0 any 4-117 Console(config-ext-acl)#permit 192.168.1.0 255.255.255.0 any dport 80 Console(config-ext-acl)#permit 192.168.1.0 255.255.255.0 any tcp control-code 2 2 Console(config-std-acl)# Configuring a MAC ACL Command Attributes...
  • Page 150: Figure 3-46. Configuring Mac Acls

    ONFIGURING THE WITCH - Tagged-eth2 – Tagged Ethernet II packets. - Tagged-802.3 – Tagged Ethernet 802.3 packets. Web – Specify the action (i.e., Permit or Deny). Specify the source and/or destination addresses. Select the address type (Any, Host, or MAC). If you select "Host,"...
  • Page 151: Binding A Port To An Access Control List

    CCESS ONTROL ISTS Binding a Port to an Access Control List After configuring the Access Control Lists (ACL), you can bind the ports that need to filter traffic to the appropriate ACLs. You can assign one IP access list to any port. Command Usage •...
  • Page 152: Filtering Management Access

    ONFIGURING THE WITCH CLI – This examples assigns an IP access list to port 1, and an IP access list to port 2. Console(config)#interface ethernet 1/1 4-146 Console(config-if)#ip access-group david in 4-119 Console(config-if)#exit Console(config)#interface ethernet 1/2 Console(config-if)#ip access-group david in Console(config-if)# Filtering Management Access You can specify the client IP addresses that are allowed management...
  • Page 153: Figure 3-48. Filtering Management Access

    ILTERING ANAGEMENT CCESS Command Attributes • Web IP Filter – Configures IP address(es) for the web group. • SNMP IP Filter – Configures IP address(es) for the SNMP group. • Telnet IP Filter – Configures IP address(es) for the Telnet group. •...
  • Page 154: Port Configuration

    ONFIGURING THE WITCH Port Configuration Displaying Connection Status You can use the Port Information or Trunk Information pages to display the current connection status, including link state, speed/duplex mode, flow control, and auto-negotiation. Field Attributes (Web) • Name – Interface label. •...
  • Page 155: Figure 3-49. Port Status Information

    ONFIGURATION Web – Click Port, Port Information or Trunk Information. Figure 3-49. Port Status Information Field Attributes (CLI) Basic information: • Port type – Indicates the port type. (1000BASE-T, 1000BASE-SX, 1000BASE-LX or 100BASE-FX) • MAC address – The physical layer address for this port. (To access this item on the web, see “Setting the Switch’s IP Address”...
  • Page 156 ONFIGURING THE WITCH • Capabilities – Specifies the capabilities to be advertised for a port during auto-negotiation. (To access this item on the web, see “Configuring Interface Connections” on page 3-48.) The following capabilities are supported. - 10half - Supports 10 Mbps half-duplex operation - 10full - Supports 10 Mbps full-duplex operation - 100half - Supports 100 Mbps half-duplex operation - 100full - Supports 100 Mbps full-duplex operation...
  • Page 157: Configuring Interface Connections

    ONFIGURATION CLI – This example shows the connection status for Port 5. Console#show interfaces status ethernet 1/5 4-153 Information of Eth 1/5 Basic information: Port type: 100TX Mac address: 00-30-f1-47-58-46 Configuration: Name: Port admin: Up Speed-duplex: Auto Capabilities: 10half, 10full, 100half, 100full Broadcast storm: Enabled Broadcast storm limit: 500 packets/second Flow control: Disabled...
  • Page 158 ONFIGURING THE WITCH specify the capabilities to be advertised. When auto-negotiation is disabled, you can force the settings for speed, mode, and flow control. The following capabilities are supported. - 10half - Supports 10 Mbps half-duplex operation - 10full - Supports 10 Mbps full-duplex operation - 100half - Supports 100 Mbps half-duplex operation - 100full - Supports 100 Mbps full-duplex operation - 1000full - Supports 1000 Mbps full-duplex operation...
  • Page 159: Creating Trunk Groups

    ONFIGURATION Web – Click Port, Port Configuration or Trunk Configuration. Modify the required interface settings, and click Apply. Figure 3-50. Configuring Port Attributes CLI – Select the interface, and then enter the required settings. Console(config)#interface ethernet 1/13 4-146 Console(config-if)#description RD SW#13 4-146 Console(config-if)#shutdown 4-151...
  • Page 160 ONFIGURING THE WITCH The switch supports both static trunking and dynamic Link Aggregation Control Protocol (LACP). Static trunks have to be manually configured at both ends of the link, and the switches must comply with the Cisco EtherChannel standard. On the other hand, LACP configured ports can automatically negotiate a trunked link with LACP-configured ports on another device.
  • Page 161: Statically Configuring A Trunk

    ONFIGURATION Statically Configuring a Trunk Command Usage • When configuring static trunks, you statically may not be able to link switches of configured different types, depending on the manufacturer’s implementation. However, note that the static trunks active on this switch are Cisco links EtherChannel compatible.
  • Page 162: Figure 3-51. Static Trunk Configuration

    ONFIGURING THE WITCH Web – Click Port, Trunk Membership. Enter a trunk ID in the Trunk field, select any of the switch ports from the scroll-down port list, and click Add. After you have completed adding ports to the member list, click Apply. Figure 3-51.
  • Page 163: Enabling Lacp On Selected Ports

    ONFIGURATION CLI – This example creates trunk 2 with ports 1 and 2. Just connect these ports to two static trunk ports on another switch to form a trunk. Console(config)#interface port-channel 2 4-146 Console(config-if)#exit Console(config)#interface ethernet 1/1 4-146 Console(config-if)#channel-group 1 4-166 Console(config-if)#exit Console(config)#interface ethernet 1/2...
  • Page 164: Figure 3-52. Lacp Port Configuration

    ONFIGURING THE WITCH • A trunk formed with another switch using LACP will automatically be assigned the next available trunk ID. • If more than eight ports attached to the same target switch have LACP enabled, the additional ports will be placed in standby mode, and will only be enabled if one of the active links fails.
  • Page 165: Configuring Lacp Parameters

    ONFIGURATION CLI – The following example enables LACP for ports 1 to 6. Just connect these ports to LACP-enabled trunk ports on another switch to form a trunk. Console(config)#interface ethernet 1/1 4-146 Console(config-if)#lacp 4-166 Console(config-if)#exit Console(config)#interface ethernet 1/6 Console(config-if)#lacp Console(config-if)#end Console#show interfaces status port-channel 1 4-153 Information of Trunk 1...
  • Page 166 ONFIGURING THE WITCH not set (through the CLI) when a channel group is formed (i.e., it has a null value of 0), this key is set to the same value as the port admin key used by the interfaces that joined the group (lacp admin key, as described in this section and on page 4-170).
  • Page 167: Figure 3-53. Lacp Aggregation Port Configuration

    ONFIGURATION Web – Click Port, LACP, Aggregation Port. Set the System Priority, Admin Key, and Port Priority for the Port Actor. You can optionally configure these settings for the Port Partner. (Be aware that these settings only affect the administrative state of the partner, and will not take effect until the next time an aggregate link is formed with this device.) After you have completed setting the port LACP parameters, click Apply.
  • Page 168: Table 3-8. Lacp Port Counter Information

    ONFIGURING THE WITCH CLI – The following example configures LACP parameters for ports 1-6. Ports 1-4 are used as active members of the LAG; ports 5 and 6 are set to backup mode. Console(config)#interface ethernet 1/1 4-146 Console(config-if)#lacp actor system-priority 3 4-169 Console(config-if)#lacp actor admin-key 120 4-170...
  • Page 169: Figure 3-54. Displaying Lacp Port Counters Information

    ONFIGURATION Table 3-8. LACP Port Counter Information (Continued) Field Description Marker Receive Number of valid Marker PDUs received by this channel group. Marker Unknown Pkts Number of frames received that either (1) Carry the Slow Protocols Ethernet Type value, but contain an unknown PDU, or (2) are addressed to the Slow Protocols group MAC Address, but do not carry the Slow Protocols Ethernet Type.
  • Page 170: Table 3-9. Lacp Settings

    ONFIGURING THE WITCH CLI – The following example displays LACP counters for port channel 1. Console#show 1 lacp counters 4-173 Channel group : 1 ------------------------------------------------------------------- Eth 1/ 1 ------------------------------------------------------------------- LACPDUs Sent : 21 LACPDUs Received : 21 Marker Sent : 0 Marker Received : 0 LACPDUs Unknown Pkts : 0 LACPDUs Illegal Pkts : 0...
  • Page 171 ONFIGURATION Table 3-9. LACP Settings Field Description Admin State, Administrative or operational values of the actor’s state Oper State parameters: • Expired – The actor’s receive machine is in the expired state; • Defaulted – The actor’s receive machine is using defaulted operational partner information, administratively configured for the partner.
  • Page 172: Figure 3-55. Displaying Lacp Port Information

    ONFIGURING THE WITCH Web – Click Port, LACP, Port Internal Information. Select a port channel to display the corresponding information. Figure 3-55. Displaying LACP Port Information CLI – The following example displays the LACP configuration settings and operational state for the local side of port channel 1. Console#show 1 lacp internal 4-173 Channel group : 1...
  • Page 173: Table 3-10. Lacp Remote Side Settings

    ONFIGURATION Displaying LACP Settings and Status for the Remote Side You can display configuration settings and the operational state for the remote side of an link aggregation. Neighbor Configuration Information Table 3-10. LACP Remote Side Settings Field Description Partner Admin System LAG partner’s system ID assigned by the user.
  • Page 174: Figure 3-56. Displaying Remote Lacp Port Information

    ONFIGURING THE WITCH Web – Click Port, LACP, Port Neighbors Information. Select a port channel to display the corresponding information. Figure 3-56. Displaying Remote LACP Port Information CLI – The following example displays the LACP configuration settings and operational state for the remote side of port channel 1. Console#show 1 lacp neighbors 4-173 Channel group 1 neighbors...
  • Page 175: Setting Broadcast Storm Thresholds

    ONFIGURATION Setting Broadcast Storm Thresholds Broadcast storms may occur when a device on your network is malfunctioning, or if application programs are not well designed or properly configured. If there is too much broadcast traffic on your network, performance can be severely degraded or everything can come to complete halt.
  • Page 176: Figure 3-57. Enabling Port Broadcast Control

    ONFIGURING THE WITCH Web – Click Port, Port Broadcast Control or Trunk Broadcast Control. Set the threshold for each port, click Apply. Figure 3-57. Enabling Port Broadcast Control CLI – Specify any interface, and then enter the threshold. The following disables broadcast storm control for port 1, and then sets broadcast suppression at 500 packets per second for port 2.
  • Page 177: Configuring Port Mirroring

    ONFIGURATION Configuring Port Mirroring You can mirror traffic from any source port to a target port for real-time analysis. You can then attach a logic Source Single analyzer or RMON probe to the target port(s) target port and study the traffic crossing the port source port in a completely unobtrusive manner.
  • Page 178: Configuring Rate Limits

    ONFIGURING THE WITCH Web – Click Port, Mirror Port Configuration. Specify the source port, the traffic type to be mirrored, and the monitor port, then click Add. Figure 3-58. Configuring a Mirror Port CLI – Use the interface command to select the monitor port, then use the port monitor command to specify the source port.
  • Page 179: Figure 3-59. Configuring Input Port Rate Limiting

    ONFIGURATION Command Usage • Input and output rate limits can be enabled or disabled for individual interfaces. Command Attribute • Port/Trunk – Display the port number. • Input/Output Rate Limit Status– Enables or disables the rate limit (Default: Enabled) • Input/Output Rate Limit Level - Sets the rate limit level.
  • Page 180: Showing Port Statistics

    Statistics are refreshed every 60 seconds by default. Note: RMON groups 2, 3 and 9 can only be accessed using SNMP management software such as SMC EliteView or HP OpenView. Statistical Values Table 3-11. Port Statistics...
  • Page 181 ONFIGURATION Table 3-11. Port Statistics (Continued) Parameter Description Received Discarded The number of inbound packets which were chosen Packets to be discarded even though no errors had been detected to prevent their being deliverable to a higher-layer protocol. One possible reason for discarding such a packet could be to free up buffer space.
  • Page 182 ONFIGURING THE WITCH Table 3-11. Port Statistics (Continued) Parameter Description Alignment Errors The number of alignment errors (missynchronized data packets). Late Collisions The number of times that a collision is detected later than 512 bit-times into the transmission of a packet. FCS Errors A count of frames received on a particular interface that are an integral number of octets in length but do...
  • Page 183 ONFIGURATION Table 3-11. Port Statistics (Continued) Parameter Description Internal MAC Receive A count of frames for which reception on a particular Errors interface fails due to an internal MAC sublayer receive error. RMON Statistics Drop Events The total number of events in which packets were dropped due to lack of resources.
  • Page 184: Figure 3-60. Displaying Port Statistics

    ONFIGURING THE WITCH Table 3-11. Port Statistics (Continued) Parameter Description Fragments The total number of frames received that were less than 64 octets in length (excluding framing bits, but including FCS octets) and had either an FCS or alignment error. 64 Bytes Frames The total number of frames (including bad packets) received and transmitted that were 64 octets in length...
  • Page 185: Figure 3-61. Displaying Etherlike And Rmon Statistics

    ONFIGURATION Figure 3-61. Displaying Etherlike and RMON Statistics 3-139...
  • Page 186: Address Table Settings

    ONFIGURING THE WITCH CLI – This example shows statistics for port 13. 4-154 Console#show interfaces counters ethernet 1/13 Ethernet 1/13 Iftable stats: Octets input: 868453, Octets output: 3492122 Unicast input: 7315, Unitcast output: 6658 Discard input: 0, Discard output: 0 Error input: 0, Error output: 0 Unknown protos input: 0, QLen output: 0 Extended iftable stats:...
  • Page 187: Figure 3-62. Mapping Ports To Static Addresses

    DDRESS ABLE ETTINGS Command Attributes • Static Address Counts* – The number of manually configured addresses. • Current Static Address Table – Lists all the static addresses. • Interface – Port or trunk associated with the device assigned a static address.
  • Page 188: Displaying The Address Table

    ONFIGURING THE WITCH Displaying the Address Table The Dynamic Address Table contains the MAC addresses learned by monitoring the source address for traffic entering the switch. When the destination address for inbound traffic is found in the database, the packets intended for that address are forwarded directly to the associated port.
  • Page 189: Figure 3-63. Displaying The Mac Dynamic Address Table

    DDRESS ABLE ETTINGS Web – Click Address Table, Dynamic Addresses. Specify the search type (i.e., mark the Interface, MAC Address, or VLAN checkbox), select the method of sorting the displayed addresses, and then click Query. Figure 3-63. Displaying the MAC Dynamic Address Table CLI –...
  • Page 190: Changing The Aging Time

    ONFIGURING THE WITCH Changing the Aging Time You can set the aging time for entries in the dynamic address table. Command Attributes • Aging Status – Enables/disables the function. • Aging Time – The time after which a learned entry is discarded. (Range: 10-630 seconds;...
  • Page 191 PANNING LGORITHM ONFIGURATION The spanning tree algorithms supported by this switch include these versions: • STP – Spanning Tree Protocol (IEEE 802.1D) • RSTP – Rapid Spanning Tree Protocol (IEEE 802.1w) STA uses a distributed algorithm to select a bridging device (STA-compliant switch, bridge or router) that serves as the root of the spanning tree network.
  • Page 192: Displaying Global Settings

    ONFIGURING THE WITCH RSTP is designed as a general replacement for the slower, legacy STP. RSTP achieves must faster reconfiguration (i.e., around one tenth of the time required by STP) by reducing the number of state changes before active ports start learning, predefining an alternate route that can be used when a node or port fails, and retaining the forwarding database for ports insensitive to changes in the tree structure when reconfiguration occurs.
  • Page 193 PANNING LGORITHM ONFIGURATION • Forward Delay – The maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to a discarding state;...
  • Page 194: Figure 3-65. Displaying The Spanning Tree Algorithm

    ONFIGURING THE WITCH receive configuration messages at regular intervals. If the root port ages out STA information (provided in the last configuration message), a new root port is selected from among the device ports attached to the network. (References to “ports” in this section means “interfaces,” which includes both ports and trunks.) •...
  • Page 195: Configuring Global Settings

    PANNING LGORITHM ONFIGURATION CLI – This command displays global STA settings, followed by settings for each port. Console#show spanning-tree 4-196 Spanning-tree information --------------------------------------------------------------- Spanning tree mode: RSTP Spanning tree enabled/disabled: enabled Priority: 32768 Bridge Hello Time (sec.): Bridge Max Age (sec.): Bridge Forward Delay (sec.): Root Hello Time (sec.): Root Max Age (sec.):...
  • Page 196 ONFIGURING THE WITCH the type of protocol messages the RSTP node transmits, as described below: - STP Mode – If the switch receives an 802.1D BPDU (i.e., STP BPDU) after a port’s migration delay timer expires, the switch assumes it is connected to an 802.1D bridge and starts using only 802.1D BPDUs.
  • Page 197 PANNING LGORITHM ONFIGURATION Root Device Configuration • Hello Time – Interval (in seconds) at which the root device transmits a configuration message. - Default: 2 - Minimum: 1 - Maximum: The lower of 10 or [(Max. Message Age / 2) -1] •...
  • Page 198 ONFIGURING THE WITCH Configuration Settings for RSTP The following attributes apply to RSTP: • Path Cost Method – The path cost is used to determine the best path between devices. The path cost method is used to determine the range of values that can be assigned to each interface.
  • Page 199: Displaying Interface Settings

    PANNING LGORITHM ONFIGURATION Figure 3-66. Configuring the Spanning Tree Algorithm CLI – This example enables Spanning Tree Protocol and then configures the STA parameters. Console(config)#spanning-tree 4-183 Console(config)#spanning-tree mode 4-184 Console(config)#spanning-tree priority 40000 4-188 Console(config)#spanning-tree hello-time 5 4-186 Console(config)#spanning-tree max-age 38 4-187 Console(config)#spanning-tree forward-time 20 4-185...
  • Page 200 ONFIGURING THE WITCH - All ports are discarding when the switch is booted, then some of them change state to learning, and then to forwarding. • Forward Transitions – The number of times this port has transitioned from the Learning state to the Forwarding state. •...
  • Page 201 PANNING LGORITHM ONFIGURATION R: Root Port Alternate port receives more A: Alternate Port useful BPDUs from another D: Designated Port bridge and is therefore not B: Backup Port selected as the designated port. Backup port receives more useful BPDUs from the same bridge and is therefore not selected as the designated port.
  • Page 202: Figure 3-67. Displaying Sta - Port Status Information

    ONFIGURING THE WITCH • Designated root – The priority and MAC address of the device in the Spanning Tree that this switch has accepted as the root device. • Fast forwarding – This field provides the same information as Admin Edge port, and is only included for backward compatibility with earlier products.
  • Page 203: Configuring Interface Settings

    PANNING LGORITHM ONFIGURATION CLI – This example shows the STA attributes for port 5. Console#show spanning-tree ethernet 1/5 4-196 1/ 5 information -------------------------------------------------------------- Admin status : enable Role : disable State : discarding External path cost : 10000 Internal path cost : 10000 Priority : 128...
  • Page 204 ONFIGURING THE WITCH Command Attributes The following attributes are read-only and cannot be changed: • STA State – Displays current state of this port within the Spanning Tree. (See Displaying Interface Settings on page 3-153 for additional information.) - Discarding - Port receives STA configuration messages, but does not forward packets.
  • Page 205 PANNING LGORITHM ONFIGURATION • Admin Path Cost – This parameter is used by the STP to determine the best path between devices. Therefore, lower values should be assigned to ports attached to faster media, and higher values assigned to ports with slower media. (Path cost takes precedence over port priority.) Note that when the Path Cost Method is set to short, the maximum path cost is 65,535.
  • Page 206: Figure 3-68. Configuring Spanning Tree Algorithm Per Port

    ONFIGURING THE WITCH • Migration – If at any time the switch detects STP BPDUs, including Configuration or Topology Change Notification BPDUs, it will automatically set the selected interface to forced STP-compatible mode. However, you can also use the Protocol Migration button to manually re-check the appropriate BPDU format (RSTP or STP-compatible) to send on the selected interfaces.
  • Page 207: Vlan Configuration

    VLAN C ONFIGURATION VLAN Configuration Overview In large networks, routers are used to isolate broadcast traffic for each subnet into separate domains. This switch provides a similar service at Layer 2 by using VLANs to organize any group of network nodes into separate broadcast domains.
  • Page 208: Assigning Ports To Vlans

    ONFIGURING THE WITCH • Priority tagging Assigning Ports to VLANs Before enabling VLANs for the switch, you must first assign each port to the VLAN group(s) in which it will participate. By default all ports are assigned to VLAN 1 as untagged ports. Add a port as a tagged port if you want it to carry traffic for one or more VLANs, and any intermediate network devices or the host at the other end of the connection supports VLANs.
  • Page 209 VLAN C ONFIGURATION Port Overlapping – Port overlapping can be used to allow access to commonly shared network resources among different VLAN groups, such as file servers or printers. Note that if you implement VLANs which do not overlap, but still need to communicate, you can connect them by enabled routing on this switch.
  • Page 210 ONFIGURING THE WITCH should also determine security boundaries in the network and disable GVRP on the boundary ports to prevent advertisements from being propagated, or forbid those ports from joining restricted VLANs. Note: If you have host devices that do not support GVRP, you should configure static or untagged VLANs for the switch ports connected to these devices (as described in “Adding Static Members to VLANs (VLAN Index)”...
  • Page 211: Displaying Basic Vlan Information

    VLAN C ONFIGURATION VLAN(s) indicated by the frame tag. However, when this switch receives an untagged frame from a VLAN-unaware device, it first decides where to forward the frame, and then inserts a VLAN tag reflecting the ingress port’s default VID. Displaying Basic VLAN Information The VLAN Basic Information page displays basic information on the VLAN type supported by the switch.
  • Page 212: Displaying Current Vlans

    ONFIGURING THE WITCH CLI – Enter the following command. Console#show bridge-ext 4-217 Max support VLAN numbers: Max support VLAN ID: 4093 Extended multicast filtering services: No Static entry individual port: VLAN learning: Configurable PVID tagging: Local VLAN capable: Traffic classes: Enabled Global GVRP status: Disabled...
  • Page 213: Figure 3-70. Displaying Vlan Information By Port Membership

    VLAN C ONFIGURATION Web – Click VLAN, 802.1Q VLAN, Current Table. Select any ID from the scroll-down list. Figure 3-70. Displaying VLAN Information by Port Membership Command Attributes (CLI) • VLAN – ID of configured VLAN (1-4093, no leading zeroes). •...
  • Page 214: Creating Vlans

    ONFIGURING THE WITCH CLI – Current VLAN information can be displayed with the following command. Console#show vlan id 1 4-208 VLAN Type Name Status Ports/Channel groups ---- ------- ----------- ------ ------------------------------------ Static DefaultVlan Active Eth1/1 Eth1/2 Eth1/3 Eth1/4 Eth1/5 Eth1/6 Eth1/7 Eth1/8 Eth1/9...
  • Page 215: Vlan C Onfiguration

    VLAN C ONFIGURATION • Remove – Removes a VLAN group from the current list. If any port is assigned to this group as untagged, it will be reassigned to VLAN group 1 as untagged. Web – Click VLAN, 802.1Q VLAN, Static List. To create a new VLAN, enter the VLAN ID and VLAN name, mark the Enable checkbox to activate the VLAN, and then click Add.
  • Page 216: Adding Static Members To Vlans (Vlan Index)

    ONFIGURING THE WITCH Adding Static Members to VLANs (VLAN Index) Use the VLAN Static Table to configure port members for the selected VLAN index. Assign ports as tagged if they are connected to 802.1Q VLAN compliant devices, or untagged they are not connected to any VLAN-aware devices.
  • Page 217: Figure 3-72. Configuring Vlan Port Attributes

    VLAN C ONFIGURATION - Untagged: Interface is a member of the VLAN. All packets transmitted by the port will be untagged, that is, not carry a tag and therefore not carry VLAN or CoS information. Note that an interface can only have one untagged VLAN, which must be the same as the Port VID.
  • Page 218: Adding Static Members To Vlans (Port Index)

    ONFIGURING THE WITCH CLI – The following example adds tagged and untagged ports to VLAN 2. Console(config)#interface ethernet 1/1 4-146 Console(config-if)#switchport allowed vlan add 2 tagged 4-206 Console(config-if)#exit Console(config)#interface ethernet 1/2 Console(config-if)#switchport allowed vlan add 2 untagged Console(config-if)#exit Console(config)#interface ethernet 1/13 Console(config-if)#switchport allowed vlan add 2 tagged Adding Static Members to VLANs (Port Index) Use the VLAN Static Membership by Port menu to assign VLAN groups...
  • Page 219: Configuring Vlan Behavior For Interfaces

    VLAN C ONFIGURATION Figure 3-73. Assigning VLAN Port and Trunk Groups CLI – This example adds Port 3 to VLAN 1 as a tagged port, and removes Port 3 from VLAN 2. Console(config)#interface ethernet 1/3 4-146 Console(config-if)#switchport allowed vlan add 1 tagged 4-206 Console(config-if)#switchport allowed vlan remove 2 Configuring VLAN Behavior for Interfaces...
  • Page 220 ONFIGURING THE WITCH • Acceptable Frame Type – Sets the interface to accept all frame types, including tagged or untagged frames, or only tagged frames. When set to receive all frame types, any received frames that are untagged are assigned to the default VLAN. (Option: All, Tagged; Default: All) •...
  • Page 221: Figure 3-74. Configuring Vlan Ports

    VLAN C ONFIGURATION Web – Click VLAN, 802.1Q VLAN, Port Configuration or Trunk Configuration. Fill in the required settings for each interface, click Apply. Figure 3-74. Configuring VLAN Ports CLI – This example sets port 3 to accept only tagged frames, assigns PVID 3 as the native VLAN ID, and then sets the switchport mode to hybrid.
  • Page 222: Configuring Private Vlans

    ONFIGURING THE WITCH Configuring Private VLANs Private VLANs provide port-based security between ports within the assigned VLAN. This switch supports primary/secondary associated groups of private VLAN. A primary VLAN contains promiscuous ports that can communicate with all other ports in the private VLAN group, while a secondary (or community) VLAN contains community ports that can only communicate with other hosts within the secondary VLAN and with any of the promiscuous ports in the associated primary VLAN.
  • Page 223: Displaying Current Private Vlans

    VLAN C ONFIGURATION Displaying Current Private VLANs The Private VLAN Information page displays information on the private VLANs configured on the switch, including primary and community VLANs, and their assigned interfaces. Command Attributes • VLAN ID – ID of configured VLAN (1-4093), and VLAN type. •...
  • Page 224: Figure 3-75. Private Vlan Information

    ONFIGURING THE WITCH Web – Click VLAN, Private VLAN, Information. Select the desired port from the VLAN ID drop-down menu. Figure 3-75. Private VLAN Information CLI – This example shows the switch configured with primary VLAN 5 and secondary VLAN 6. Port 3 has been configured as a promiscuous port and mapped to VLAN 5, while ports 4 and 5 have been configured as a host ports and are associated with VLAN 6.
  • Page 225: Figure 3-76. Private Vlan Configuration

    VLAN C ONFIGURATION Configuring Private VLANs The Private VLAN Configuration page is used to create/remove primary, or community VLANs. Command Attributes • VLAN ID – ID of configured VLAN (2-4094). • Type – There are three types of private VLANs: - Primary –...
  • Page 226: Associating Vlans

    ONFIGURING THE WITCH Associating VLANs Each community VLAN must be associated with a primary VLAN. Command Attributes • Primary VLAN ID - ID of primary VLAN (1-4093). • Association - Community VLANs associated with the selected primary VLAN. • Non-Association - Community VLANs not associated with the selected VLAN.
  • Page 227: Displaying Private Vlan Interface Information

    VLAN C ONFIGURATION Displaying Private VLAN Interface Information Use the Private VLAN Port Information and Private VLAN Trunk Information menus to display the interface associated with private VLANs. Command Attributes • Port/Trunk - The switch interface. • PVLAN Port Type - Displays private VLAN port types. - Normal –...
  • Page 228: Configuring Private Vlan Interfaces

    ONFIGURING THE WITCH Web – Click VLAN, Private VLAN, Port Information or Trunk Information. Figure 3-78. Private VLAN Port Information CLI – This example shows the switch configured with primary VLAN 5 and community VLAN 6. Port 3 has been configured as a promiscuous port and mapped to VLAN 5, while ports 4 and 5 have been configured as host ports and associated with VLAN 6.
  • Page 229: Figure 3-79. Private Vlan Port Configuration

    VLAN C ONFIGURATION - Host – The port is a community port. A community port can communicate with other ports in its own community VLAN and with designated promiscuous port(s). - Promiscuous – A promiscuous port can communicate with all the interfaces within a private VLAN.
  • Page 230: Configuring Protocol Vlans

    ONFIGURING THE WITCH CLI – This example shows the switch configured with primary VLAN 5 and secondary VLAN 6. Port 3 has been configured as a promiscuous port and mapped to VLAN 5, while ports 4 and 5 have been configured as a host ports and associated with VLAN 6.
  • Page 231: Figure 3-80. Protocol Vlan Configuration

    VLAN C ONFIGURATION Web – Click VLAN, Protocol VLAN, Configuration. Figure 3-80. Protocol VLAN Configuration Configuring Protocol VLAN System Use the Protocol VLAN System Configuration menu to set the protocol VLAN settings for the switch. Command Attributes • Protocol Group ID - Protocol Group ID assigned to the Protocol VLAN Group.
  • Page 232: Class Of Service Configuration

    ONFIGURING THE WITCH Class of Service Configuration Class of Service (CoS) allows you to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch supports CoS with eight priority queues for each port.
  • Page 233: Mapping Cos Values To Egress Queues

    LASS OF ERVICE ONFIGURATION Web – Click Priority, Default Port Priority or Default Trunk Priority. Modify the default priority for any interface, then click Apply. Figure 3-82. Port Priority Configuration CLI – This example assigns a default priority of 5 to port 3. Console(config)#interface ethernet 1/3 4-146 4-222...
  • Page 234: Table 3-12. Egress Queue Priority Mapping

    ONFIGURING THE WITCH priorities are defined in IEEE 802.1p. The default priority levels are assigned according to recommendations in the IEEE 802.1p standard as shown in the following table. Table 3-12. Egress Queue Priority Mapping Queue Priority The priority levels recommended in the IEEE 802.1p standard for various network applications are shown in the following table.
  • Page 235: Figure 3-83. Configuring Class Of Service

    LASS OF ERVICE ONFIGURATION Web – Click Priority, Traffic Classes. Assign priorities to the traffic classes (i.e., output queues), then click Apply. Figure 3-83. Configuring Class of Service CLI – The following example shows how to change the CoS assignments to a one-to-one mapping.
  • Page 236: Enabling Cos

    ONFIGURING THE WITCH Enabling CoS Enable or disable Class of Service (CoS). Command Attributes. Command Attributes • Traffic Classes - Click to enable Class of Service. (Default: Enabled) Web – Click Priority, Traffic Classes Status. Figure 3-84. Enable Traffic Classes Selecting the Queue Mode You can set the switch to service the queues based on a strict rule that requires all traffic in a higher priority queue to be processed before lower...
  • Page 237: Setting The Service Weight For Traffic Classes

    LASS OF ERVICE ONFIGURATION Web – Click Priority, Queue Mode. Select Strict or WRR, then click Apply. Figure 3-85. Setting the Queue Mode CLI – The following sets the queue mode to strict priority service mode. Console(config)#queue mode strict 4-227 Console(config)#exit Console#show queue mode 4-227...
  • Page 238: Mapping Layer 3/4 Priorities To Cos Values

    ONFIGURING THE WITCH Web – Click Priority, Queue Scheduling. Highlight a traffic class (i.e., output queue), then click Apply. Figure 3-86. Configuring Queue Scheduling CLI – The following example shows how to assign WRR weights to each of the priority queues. Console(config)#queue bandwidth 1 2 4 8 4-225 Console(config)#exit...
  • Page 239: Selecting Ip Dscp Priority

    LASS OF ERVICE ONFIGURATION • The precedence for priority mapping is IP DSCP Priority, and then Default Port Priority. Selecting IP DSCP Priority The switch allows you to enable or disable IP DSCP priority. Command Attributes • IP DSCP Priority Status – Enables the priority services. Maps layer 3/4 priorities using Differentiated Services Code Point Mapping.
  • Page 240: Table 3-14. Mapping Dscp Priority

    ONFIGURING THE WITCH Table 3-14. Mapping DSCP Priority IP DSCP Value CoS Value 10, 12, 14, 16 18, 20, 22, 24 26, 28, 30, 32, 34, 36 38, 40, 42 46, 56 Command Attributes • DSCP Priority Table – Shows the DSCP Priority to CoS map. •...
  • Page 241: Quality Of Service

    UALITY OF ERVICE CLI – The following example globally enables DSCP Priority service on the switch, maps DSCP value 0 to CoS value 1 (on port 1), and then displays the DSCP Priority settings. Console(config)#map ip dscp 4-229 Console(config)#interface ethernet 1/1 4-146 Console(config-if)#map ip dscp 1 cos 0 4-230...
  • Page 242: Configuring Quality Of Service Parameters

    ONFIGURING THE WITCH All switches or routers that access the Internet rely on class information to provide the same forwarding treatment to packets in the same class. Class information can be assigned by end hosts, or switches or routers along the path.
  • Page 243: Configuring A Class Map

    UALITY OF ERVICE or just reduce the DSCP service level for traffic exceeding the specified rate. 5. Use the “Service Policy” to assign a policy map to a specific interface. Configuring a Class Map A class map is used for matching packets to a specified class. Command Usage •...
  • Page 244 ONFIGURING THE WITCH • Remove Class – Removes the selected class. Class Configuration • Class Name – Name of the class map. (Range: 1-16 characters) • Type – Only one match command is permitted per class map, so the match-any field refers to the criteria specified by the lone match command.
  • Page 245: Figure 3-89. Configuring Class Maps

    UALITY OF ERVICE Figure 3-89. Configuring Class Maps CLI – This example creates a class map call “rd-class,” and sets it to match packets marked for DSCP service value 3. Console(config)#class-map rd_class match-any Console(config-cmap)#match ip dscp 3 Console(config-cmap)# 3-199...
  • Page 246: Creating Qos Policies

    ONFIGURING THE WITCH Creating QoS Policies This function creates a policy map that can be attached to multiple interfaces. Command Usage • To configure a Policy Map, follow these steps: - Create a Class Map as described on 3-197. - Open the Policy Map page, and click Add Policy. - When the Policy Configuration page opens, fill in the “Policy Name”...
  • Page 247 UALITY OF ERVICE Command Attributes Policy Map • Modify Name and Description – Configures the name and a brief description of a policy map. (Range: 1-16 characters for the name; 1-64 characters for the description) • Edit Classes – Opens the “Policy Rule Settings” page for the selected class entry.
  • Page 248 ONFIGURING THE WITCH • Remove Class – Deletes a class. - Policy Settings - • Class Name – Name of class map. • Action – Configures the service provided to ingress traffic by setting a CoS, DSCP, or IP Precedence value in a matching packet (as specified in Match Class Settings on page 3-147).
  • Page 249: Figure 3-90. Configuring Policy Maps

    UALITY OF ERVICE Figure 3-90. Configuring Policy Maps 3-203...
  • Page 250: Attaching A Policy Map To Ingress Queues

    ONFIGURING THE WITCH CLI – This example creates a policy map called “rd-policy,” sets the average bandwidth the 1 Mbps, the burst rate to 1522 bps, and the response to reduce the DSCP value for violating packets to 0. Console(config)#policy-map rd_policy#3 Console(config-pmap)#class rd_class#3 Console(config-pmap-c)#set ip dscp 4 Console(config-pmap-c)#police 100000 1522 exceed-action...
  • Page 251: Figure 3-91. Service Policy Settings

    UALITY OF ERVICE Figure 3-91. Service Policy Settings CLI – This example applies a service policy to an ingress interface. Console(config)#interface ethernet 1/5 Console(config-if)#service-policy input rd_policy#3 Console(config-if)# 3-205...
  • Page 252: Multicast Filtering

    ONFIGURING THE WITCH Multicast Filtering Multicasting is used to support real-time Unicast Flow applications such as videoconferencing or streaming audio. A multicast server does not have to establish a separate connection with each client. It merely broadcasts its service to the network, and any hosts that want to receive the multicast register with their local Multicast...
  • Page 253: Layer 2 Igmp (Snooping And Query)

    ULTICAST ILTERING Layer 2 IGMP (Snooping and Query) IGMP Snooping and Query — If multicast routing is not supported on other switches in your network, you can use IGMP Snooping and Query (page 3-207) to monitor IGMP service requests passing between multicast clients and servers, and dynamically configure the switch ports which need to forward multicast traffic.
  • Page 254 ONFIGURING THE WITCH • IGMP Querier — A router, or multicast-enabled switch, can periodically ask their hosts if they want to receive multicast traffic. If there is more than one router/switch on the LAN performing IP multicasting, one of these devices is elected “querier” and assumes the role of querying the LAN for group members.
  • Page 255: Figure 3-92. Configuring Internet Group Management Protocol

    ULTICAST ILTERING • IGMP Version — Sets the protocol version for compatibility with other devices on the network. (Range: 1-2; Default: 2) Notes: 1. All systems on the subnet must support the same version. 2. Some attributes are only enabled for IGMPv2, including IGMP Report Delay and IGMP Query Timeout.
  • Page 256: Figure 3-93. Enabling Igmp Filter

    ONFIGURING THE WITCH Enabling IGMP Filter Status You can enable the IGMP filter status and set the IGMP profile configuration. Command Attributes • IGMP Filter — When enabled, the switch will filter network traffic/ (Default: Disabled) • Current — Displays the list of current IGMP profiles. •...
  • Page 257: Figure 3-94. Igmp Immediate Leave

    ULTICAST ILTERING IGMP immediate leave improves bandwidth management for all hosts in a switched network. Command Attributes • VLAN ID — ID of configured VLAN (1-4093) • Immediate Leave — Enable or disable IGMP immediate leave for the selected VLAN. Web –...
  • Page 258: Displaying Interfaces Attached To A Multicast Router

    ONFIGURING THE WITCH Displaying Interfaces Attached to a Multicast Router Multicast routers that are attached to ports on the switch use information obtained from IGMP, along with a multicast routing protocol such as DVMRP or PIM, to support IP multicasting across the Internet. These routers may be dynamically discovered by the switch or statically assigned to an interface on the switch.
  • Page 259: Specifying Static Interfaces For A Multicast Router

    ULTICAST ILTERING CLI – This example shows that Port 11 has been statically configured as a port attached to a multicast router. Console#show ip igmp snooping mrouter vlan 1 4-243 VLAN M'cast Router Port Type ---- ------------------ ------- Eth 1/11 Static Specifying Static Interfaces for a Multicast Router Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier.
  • Page 260: Figure 3-97. Displaying Port Members Of Multicast Services

    ONFIGURING THE WITCH CLI – This example configures port 11 as a multicast router port within VLAN 1. Console(config)#ip igmp snooping vlan 1 mrouter ethernet 1/11 4-242 Console(config)#exit Console#show ip igmp snooping mrouter vlan 1 4-243 VLAN M'cast Router Port Type ---- ------------------ ------- Eth 1/11 Static Displaying Port Members of Multicast Services...
  • Page 261: Assigning Ports To Multicast Services

    ULTICAST ILTERING CLI – This example displays all the known multicast services supported on VLAN 1, along with the ports propagating the corresponding services. The Type field shows if this entry was learned dynamically or was statically configured. 4-237 Console#show bridge 1 multicast vlan 1 VLAN M'cast IP addr.
  • Page 262: Configuring Igmp Profile Group

    ONFIGURING THE WITCH Web – Click IGMP Snooping, IGMP Member Port Table. Specify the interface attached to a multicast service (via an IGMP-enabled switch or multicast router), indicate the VLAN that will propagate the multicast service, specify the multicast IP address, and click Add. After you have completed adding ports to the member list, click Apply.
  • Page 263: Figure 3-99. Igmp Profile Group Configuration

    ULTICAST ILTERING • New Multicast Address Range List – Enter a Start Multicast Address and an End Multicast Address for the new address range. Web – Click IGMP Snooping, IGMP Filter Profile Configuration. Figure 3-99. IGMP Profile Group Configuration Configuring IGMP Filter and Throttling Configure the IGMP filter and throttling settings for each port or trunk.
  • Page 264: Multicast Vlan Registration

    ONFIGURING THE WITCH Web – Click IGMP Snooping, IGMP Filter/Throttling Port/Trunk Configuration. Figure 3-100. IGMP Filter and Throttling Port Configuration Multicast VLAN Registration Multicast VLAN Registration (MVR) is a protocol that controls access to a single network-wide VLAN most commonly used for transmitting multicast traffic (such as television channels or video-on-demand) across a service provider’s network.
  • Page 265 VLAN R ULTICAST EGISTRATION Multicast Router Satellite Services Service Network Multicast Server Layer 2 Switch Source Port Receiver Ports Set-top Box Set-top Box General Configuration Guidelines for MVR 1. Enable MVR globally on the switch, select the MVR VLAN, and add the multicast groups that will stream traffic to attached hosts (see “Configuring Global MVR Settings”...
  • Page 266: Configuring Global Mvr Settings

    ONFIGURING THE WITCH Configuring Global MVR Settings The global settings for Multicast VLAN Registration (MVR) include enabling or disabling MVR for the switch, selecting the VLAN that will serve as the sole channel for common multicast streams supported by the service provider, and assigning the multicast group address for each of these services to the MVR VLAN.
  • Page 267: Displaying Mvr Interface Status

    VLAN R ULTICAST EGISTRATION Web – Click MVR, Configuration. Enable MVR globally on the switch, select the MVR VLAN, add the multicast groups that will stream traffic to attached hosts, and then click Apply. Figure 3-101. MVR Global Configuration CLI – This example first enables IGMP snooping, enables MVR globally, and then configures a range of MVR group addresses.
  • Page 268: Displaying Port Members Of Multicast Groups

    ONFIGURING THE WITCH multicast traffic from one of the MVR groups, or a multicast group has been statically assigned to an interface. • Immediate Leave – Shows if immediate leave is enabled or disabled. • Trunk Member – Shows if port is a trunk member (Port Information only).
  • Page 269: Figure 3-103. Mvr Group Ip Information

    VLAN R ULTICAST EGISTRATION • Group Port List – Shows the interfaces with subscribers for multicast services provided through the MVR VLAN. Web – Click MVR, Group IP Information. Figure 3-103. MVR Group IP Information CLI – This example following shows information about the interfaces associated with multicast groups assigned to the MVR VLAN.
  • Page 270: Configuring Mvr Interface Status

    ONFIGURING THE WITCH Configuring MVR Interface Status Each interface that participates in the MVR VLAN must be configured as an MVR source port or receiver port. If only one subscriber attached to an interface is receiving multicast services, you can enable the immediate leave function.
  • Page 271: Figure 3-104. Mvr Port Configuration

    VLAN R ULTICAST EGISTRATION - Receiver – A subscriber port that can receive multicast data sent through the MVR VLAN. - Non-MVR – An interface that does not participate in the MVR VLAN. (This is the default type.) • Immediate Leave – Configures the switch to immediately remove an interface from a multicast stream as soon as it receives a leave message for that group.
  • Page 272: Assigning Static Multicast Groups To Interfaces

    ONFIGURING THE WITCH CLI – This example configures an MVR source port and receiver port, and then enables immediate leave on the receiver port. Console(config)#interface ethernet 1/1 Console(config-if)#mvr type source 4-211 Console(config-if)#exit Console(config)#interface ethernet 1/2 Console(config-if)#mvr type receiver 4-211 Console(config-if)#mvr immediate 4-211 Console(config-if)# Assigning Static Multicast Groups to Interfaces...
  • Page 273: Dhcp Snooping

    DHCP S NOOPING Web – Click MVR, Group Member Configuration. Select a port or trunk from the “Interface” field, and click Query to display the assigned multicast groups. Select a multicast address from the displayed lists, and click the Add or Remove button to modify the Member list. Figure 3-105.
  • Page 274 ONFIGURING THE WITCH When enabled, DHCP messages entering an untrusted interface are filtered based upon dynamic entries learned via DHCP snooping. Filtering rules are implemented as follows: • If the global DHCP snooping is disabled, all DHCP packets are forwarded. •...
  • Page 275: Dhcp Snooping Configuration

    DHCP S NOOPING Additional considerations when the switch itself is a DHCP client – The port(s) through which the switch submits a client request to the DHCP server must be configured as trusted. Note that the switch will not add a dynamic entry for itself to the binding table when it receives an ACK message from a DHCP server.
  • Page 276: Dhcp Snooping Vlan Configuration

    ONFIGURING THE WITCH DHCP Snooping VLAN Configuration Enables DHCP snooping on the specified VLAN. Command Attributes • VLAN ID – ID of a configured VLAN. (Range: 1-4093) • DHCP Snooping Status – Enables or disables DHCP snooping for the selected VLAN. When DHCP snooping is enabled globally on the switch, and enabled on the specified VLAN, DHCP packet filtering will be performed on any untrusted ports within the VLAN.
  • Page 277 DHCP S NOOPING When the DHCP Snooping Information Option is enabled, clients can be identified by the switch port to which they are connected rather than just their MAC address. DHCP client-server exchange messages are then forwarded directly between the server and client without having to flood them to the entire VLAN.
  • Page 278: Dhcp Snooping Port Configuration

    ONFIGURING THE WITCH Web – Click DHCP Snooping, Information Option Configuration. Figure 3-108. DHCP Snooping Information Option Configuration CLI – This example enables DHCP Snooping Information Option, and sets the policy as replace Console(config)#ip dhcp snooping information option 4-227 Console(config)#ip dhcp snooping information policy replace 4-228 Console(config)# DHCP Snooping Port Configuration...
  • Page 279: Dhcp Snooping Binding Information

    DHCP S NOOPING Web – Click DHCP Snooping, Information Option Configuration. Figure 3-109. DHCP Snooping Port Configuration CLI – This example shows how to enable the DHCP Snooping Trust Status for ports Console(config)#interface ethernet 1/5 Console(config-if)#ip dhcp snooping trust 4-226 Console(config-if)# DHCP Snooping Binding Information Displays the DHCP snooping binding information.
  • Page 280: Ip Source Guard

    ONFIGURING THE WITCH Web – Click DHCP Snooping, DHCP Snooping Binding Information. Figure 3-110. DHCP Snooping Binding Information CLI – This example shows how to display the DHCP Snooping binding table entries Console#show ip dhcp snooping binding 4-230 MacAddress IpAddress Lease(sec) Type VLAN Interface...
  • Page 281: Figure 3-111. Ip Source Guard Port Configuration

    IP S OURCE UARD When enabled, traffic is filtered based upon dynamic entries learned via DHCP snooping or static addresses configured in the source guard binding table. An inbound packet’s IP address (sip option) or both its IP address and corresponding MAC address (sip-mac option) are checked against the binding table.
  • Page 282: Static Ip Source Guard Binding Configuration

    ONFIGURING THE WITCH CLI – This example shows how to enable IP source guard on port 5 Console(config)#interface ethernet 1/5 Console(config-if)#ip source-guard sip 4-219 Console(config-if)#end Console#show ip source-guard 4-222 Interface Filter-type --------- ----------- Eth 1/1 DISABLED Eth 1/2 DISABLED Eth 1/3 DISABLED Eth 1/4 DISABLED...
  • Page 283: Dynamic Ip Source Guard Binding Information

    IP S OURCE UARD Web – Click IP Source Guard, Static Configuration. Figure 3-112. Static IP Source Guard Binding Configuration CLI – This example shows how to configure a static source-guard binding on port 5 Console(config)#ip source-guard binding 11-22-33-44-55-66 vlan 1 192.168.0.99 interface ethernet 1/5 4-221 Console(config)#...
  • Page 284: Figure 3-113. Dynamic Ip Source Guard Binding Information

    ONFIGURING THE WITCH Web – Click IP Source Guard, Dynamic Information. Figure 3-113. Dynamic IP Source Guard Binding Information CLI – This example shows how to configure a static source-guard binding on port 5 Console#show ip source-guard binding 4-222 MacAddress IpAddress Lease(sec) Type VLAN...
  • Page 285: Switch Clustering

    WITCH LUSTERING Switch Clustering Switch Clustering is a method of grouping switches together to enable centralized management through a single unit. Switches that support clustering can be grouped together regardless of physical location or switch type, as long as they are connected to the same local network. A switch cluster has a “Commander”...
  • Page 286: Figure 3-114. Cluster Configuration

    ONFIGURING THE WITCH • Cluster Commander – Enables or disables the switch as a cluster Commander. • Role – Indicates the current role of the switch in the cluster; either Commander, Member, or Candidate. • Cluster IP Pool – An “internal” IP address pool that is used to assign IP addresses to Member switches in the cluster.
  • Page 287: Cluster Member Configuration

    WITCH LUSTERING Cluster Member Configuration Adds Candidate switches to the cluster as Members. Command Attributes • Member ID – Specify a Member ID number for the selected Candidate switch. (Range: 1-36) • MAC Address – Select a discoverd switch MAC address from the Candidate Table, or enter a specific MAC address of a known switch.
  • Page 288: Cluster Member Information

    ONFIGURING THE WITCH Cluster Member Information Displays current cluster Member switch information. Command Attributes • Member ID – The ID number of the Member switch. (Range: 1-36) • Role – Indicates the current status of the switch in the cluster. •...
  • Page 289: Cluster Candidate Information

    WITCH LUSTERING Cluster Candidate Information Displays information about discovered switches in the network that are already cluster Members or are available to become cluster Members. Command Attributes • Clear – Click the Clear button to clear the cluster candidate table. •...
  • Page 290 ONFIGURING THE WITCH 3-244...
  • Page 291: Command Line Interface

    HAPTER OMMAND NTERFACE This chapter describes how to use the Command Line Interface (CLI). Using the Command Line Interface Accessing the CLI When accessing the management interface for the switch over a direct connection to the server’s console port, or via a Telnet connection, the switch can be managed by entering command keywords and parameters at the prompt.
  • Page 292: Telnet Connection

    OMMAND NTERFACE After connecting to the system through the console port, the login screen displays: User Access Verification Username: admin Password: CLI session with the SMC6152L2 is opened. To end the CLI session, enter [Exit]. Console# Telnet Connection Telnet operates over the IP transport protocol. In this environment, your management station and any network device you want to manage over the network must have a valid IP address.
  • Page 293: Entering Commands

    NTERING OMMANDS 2. At the prompt, enter the user name and system password. The CLI will display the “Vty-n#” prompt for the administrator to show that you are using privileged access mode (i.e., Privileged Exec), or “Vty-n>” for the guest to show that you are using normal access mode (i.e., Normal Exec), where n indicates the number of the current Telnet session.
  • Page 294: Minimum Abbreviation

    OMMAND NTERFACE • To enter multiple commands, enter each command in the required order. For example, to enable Privileged Exec command mode, and display the startup configuration, enter: Console>enable Console#show startup-config • To enter commands that require parameters, enter the required parameters after the command keyword.
  • Page 295: Showing Commands

    NTERING OMMANDS Showing Commands If you enter a “?” at the command prompt, the system will display the first level of keywords for the current command class (Normal Exec or Privileged Exec) or configuration class (Global, ACL, Interface, Line, or VLAN Database).
  • Page 296: Partial Keyword Lookup

    OMMAND NTERFACE The command “show interfaces ?” will display the following information: Console#show interfaces ? counters Information of interfaces counters status Information of interfaces status switchport Information of interfaces switchport Console# Partial Keyword Lookup If you terminate a partial keyword with a question mark, alternatives that match the initial letters are provided.
  • Page 297: Understanding Command Modes

    NTERING OMMANDS Understanding Command Modes The command set is divided into Exec and Configuration classes. Exec commands generally display information on system status or clear statistical counters. Configuration commands, on the other hand, modify interface parameters or enable certain switching functions. These classes are further divided into different modes.
  • Page 298: Configuration Commands

    OMMAND NTERFACE Privileged Exec mode from within Normal Exec mode, by entering the enable command, followed by the privileged level password “super” (page 4-36). To enter Privileged Exec mode, enter the following user names and passwords: Username: admin Password: [admin login password] CLI session with the SMC6152L2 is opened.
  • Page 299: Table 4-2 Configuration Commands

    NTERING OMMANDS • Line Configuration - These commands modify the console port and Telnet configuration, and include command such as parity and databits. • VLAN Configuration - Includes the command to create VLAN groups. To enter the Global Configuration mode, enter the command configure in Privileged Exec mode.
  • Page 300: Command Line Processing

    OMMAND NTERFACE Command Line Processing Commands are not case sensitive. You can abbreviate commands and parameters as long as they contain enough letters to differentiate them from any other currently available commands or parameters. You can use the Tab key to complete partial commands, or enter a partial command followed by the “?”...
  • Page 301: Command Groups

    OMMAND ROUPS Command Groups The system commands can be broken down into the functional groups shown below Table 4-4 Command Group Index Command Group Description Page Line Sets communication parameters for the serial port 4-14 and Telnet, including baud rate and console time-out General Basic commands for entering privileged access...
  • Page 302 OMMAND NTERFACE Table 4-4 Command Group Index (Continued) Command Group Description Page Link Aggregation Statically groups multiple ports into a single logical 4-164 trunk; configures Link Aggregation Control Protocol for port trunks Address Table Configures the address table for filtering specified 4-177 addresses, displays current entries, clears the table, or sets the aging time...
  • Page 303 OMMAND ROUPS VC (VLAN Database Configuration) 4-13...
  • Page 304: Line Commands

    OMMAND NTERFACE Line Commands You can access the onboard configuration program by attaching a VT100 compatible device to the server’s serial port. These commands are used to set communication parameters for the serial port or Telnet (i.e., a virtual terminal). Table 4-5 Line Command Syntax Command Function...
  • Page 305: Line

    OMMANDS line This command identifies a specific line for configuration, and to process subsequent line configuration commands. Syntax line {console | vty} • console - Console terminal line. • vty - Virtual terminal for remote console access (i.e., Telnet). Default Setting There is no default line.
  • Page 306: Login

    OMMAND NTERFACE login This command enables password checking at login. Use the no form to disable password checking and allow connections without a password. Syntax login [local] no login local - Selects local password checking. Authentication is based on the user name specified with the username command. Default Setting login local Command Mode...
  • Page 307: Password

    OMMANDS Example Console(config-line)#login local Console(config-line)# Related Commands username (4-35) password (4-17) password This command specifies the password for a line. Use the no form to remove the password. Syntax password {0 | 7} password no password • {0 | 7} - 0 means plain password, 7 means encrypted password •...
  • Page 308: Timeout Login Response

    OMMAND NTERFACE Example Console(config-line)#password 0 secret Console(config-line)# Related Commands login (4-16) password-thresh (4-20) timeout login response This command sets the interval that the system waits for a user to log into the CLI. Use the no form to restore the default setting. Syntax timeout login response [seconds] no timeout login response...
  • Page 309: Exec-Timeout

    OMMANDS exec-timeout This command sets the interval that the system waits until user input is detected. Use the no form to restore the default. Syntax exec-timeout [seconds] no exec-timeout seconds - Integer that specifies the number of seconds. (Range: 0 - 65535 seconds; 0: no timeout) Default Setting CLI: No timeout Telnet: 10 minutes...
  • Page 310: Password-Thresh

    OMMAND NTERFACE password-thresh This command sets the password intrusion threshold which limits the number of failed logon attempts. Use the no form to remove the threshold value. Syntax password-thresh [threshold] no password-thresh threshold - The number of allowed password attempts. (Range: 1-120;...
  • Page 311: Silent-Time

    OMMANDS silent-time This command sets the amount of time the management console is inaccessible after the number of unsuccessful logon attempts exceeds the threshold set by the password-thresh command. Use the no form to remove the silent time value. Syntax silent-time [seconds] no silent-time seconds - The number of seconds to disable console response.
  • Page 312: Parity

    OMMAND NTERFACE Default Setting 8 data bits per character Command Mode Line Configuration Command Usage The databits command can be used to mask the high bit on input from devices that generate 7 data bits with parity. If parity is being generated, specify 7 data bits per character.
  • Page 313: Speed

    OMMANDS Command Usage Communication protocols provided by devices such as terminals and modems often require a specific parity bit setting. Example To specify no parity, enter this command: Console(config-line)#parity none Console(config-line)# speed This command sets the terminal line’s baud rate. This command sets both the transmit (to terminal) and receive (from terminal) speeds.
  • Page 314: Stopbits

    OMMAND NTERFACE Example To specify 57600 bps, enter this command: Console(config-line)#speed 57600 Console(config-line)# stopbits This command sets the number of the stop bits transmitted per byte. Use the no form to restore the default setting. Syntax stopbits {1 | 2} •...
  • Page 315: Show Line

    OMMANDS Command Usage Specifying session identifier “0” will disconnect the console connection. Specifying any other identifiers for an active session will disconnect an SSH or Telnet connection. Example Console#disconnect 1 Console# Related Commands show ssh (4-54) show users (4-81) show line This command displays the terminal line’s parameters.
  • Page 316: General Commands

    OMMAND NTERFACE Example To show all lines, enter this command: Console#show line Console configuration: Password threshold: 3 times Interactive timeout: Disabled Login timeout: Disabled Silent time: Disabled Baudrate: auto Databits: Parity: none Stopbits: VTY configuration: Password threshold: 3 times Interactive timeout: 600 sec Login timeout: 300 sec Console# General Commands...
  • Page 317: Enable

    ENERAL OMMANDS enable This command activates Privileged Exec mode. In privileged mode, additional commands are available, and certain commands display additional information. (See “Understanding Command Modes” on page 4-7.) Syntax enable [level] level - Privilege level to log into the device. The device has two predefined privilege levels: 0: Normal Exec, 15: Privileged Exec.
  • Page 318: Disable

    OMMAND NTERFACE disable This command returns to Normal Exec mode from privileged mode. In normal access mode, you can only display basic information on the switch's configuration or Ethernet statistics. To gain access to all commands, you must use the privileged mode. (See “Understanding Command Modes”...
  • Page 319: Show History

    ENERAL OMMANDS Example Console#configure Console(config)# Related Commands end (4-30) show history This command shows the contents of the command history buffer. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage The history buffer size is fixed at 10 Execution commands and 10 Configuration commands.
  • Page 320: Reload

    OMMAND NTERFACE The ! command repeats commands from the Execution command history buffer when you are in Normal Exec or Privileged Exec Mode, and commands from the Configuration command history buffer when you are in any of the configuration modes. In this example, the !2 command repeats the second command in the Execution history buffer (config).
  • Page 321: Exit

    ENERAL OMMANDS Command Mode Global Configuration, Interface Configuration, Line Configuration, and VLAN Database Configuration. Example This example shows how to return to the Privileged Exec mode from the Interface Configuration mode: Console(config-if)#end Console# exit This command returns to the previous configuration mode or exit the configuration program.
  • Page 322: System Management Commands

    OMMAND NTERFACE Command Mode Normal Exec, Privileged Exec Command Usage The quit and exit commands can both exit the configuration program. Example This example shows how to quit a CLI session: Console#quit Press ENTER to start session User Access Verification Username: System Management Commands These commands are used to control system logs, passwords, user names,...
  • Page 323: Device Designation Commands

    YSTEM ANAGEMENT OMMANDS Table 4-7 System Management Commands (Continued) Command Group Function Page System Status Displays system configuration, active managers, and 4-76 version information Frame Size Enables support for jumbo frames 4-82 Device Designation Commands Table 4-8 Device Designation Commands Command Function Mode Page...
  • Page 324: User Access Commands

    OMMAND NTERFACE Example Console(config)#prompt RD2 RD2(config)# hostname This command specifies or modifies the host name for this device. Use the no form to restore the default host name. Syntax hostname name no hostname name - The name of this host. (Maximum length: 255 characters) Default Setting None Command Mode...
  • Page 325: Table 4-10 Default Login Settings

    YSTEM ANAGEMENT OMMANDS username This command adds named users, requires authentication at login, specifies or changes a user's password (or specify that no password is required), or specifies or changes a user's access level. Use the no form to remove a user name. Syntax username name {access-level level | no password | password {0 | 7} password}...
  • Page 326: Enable Password

    OMMAND NTERFACE The encrypted password is required for compatibility with legacy password settings (i.e., plain text or encrypted) when reading the configuration file during system bootup or when downloading the configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.
  • Page 327: Ip Filter Commands

    YSTEM ANAGEMENT OMMANDS • The encrypted password is required for compatibility with legacy password settings (i.e., plain text or encrypted) when reading the configuration file during system bootup or when downloading the configuration file from a TFTP server. There is no need for you to manually configure encrypted passwords.
  • Page 328: Show Management

    OMMAND NTERFACE • end-address - The end address of a range. Default Setting All addresses Command Mode Global Configuration Command Usage • If anyone tries to access a management interface on the switch from an invalid address, the switch will reject the connection, enter an event message in the system log, and send a trap message to the trap manager.
  • Page 329: Web Server Commands

    YSTEM ANAGEMENT OMMANDS show management {all-client | http-client | snmp-client | telnet-client} • all-client - Adds IP address(es) to the SNMP, web and Telnet groups. • http-client - Adds IP address(es) to the web group. • snmp-client - Adds IP address(es) to the SNMP group. •...
  • Page 330: Ip Http Port

    OMMAND NTERFACE Table 4-12 Web Server Command Command Function Mode Page ip http Enables HTTPS/SSL for encrypted 4-41 secure-server communications ip http secure-port Specifies the UDP port number for HTTPS/ 4-42 ip http port This command specifies the TCP port number used by the web browser interface.
  • Page 331 YSTEM ANAGEMENT OMMANDS Default Setting Enabled Command Mode Global Configuration Example Console(config)#ip http server Console(config)# Related Commands ip http port (4-40) ip http secure-server This command enables the secure hypertext transfer protocol (HTTPS) over the Secure Socket Layer (SSL), providing secure access (i.e., an encrypted connection) to the switch’s web interface.
  • Page 332: Table 4-13 Https System Support

    OMMAND NTERFACE • When you start HTTPS, the connection is established in this way: - The client authenticates the server using the server’s digital certificate. - The client and server negotiate a set of security protocols to use for the connection. - The client and server generate session keys for encrypting and decrypting data.
  • Page 333 YSTEM ANAGEMENT OMMANDS Syntax ip http secure-port port_number no ip http secure-port port_number – The UDP port used for HTTPS/SSL. (Range: 1-65535) Default Setting Command Mode Global Configuration Command Usage • You cannot configure the HTTP and HTTPS servers to use the same port.
  • Page 334: Telnet Server Commands

    OMMAND NTERFACE Telnet Server Commands Table 4-14 Telnet Server Commands Command Function Mode Page ip telnet server Allows the switch to be monitored or 4-44 configured from Telnet ip telnet port Specifies the port to be used by the Telnet 4-44 interface ip telnet server...
  • Page 335: Secure Shell Commands

    YSTEM ANAGEMENT OMMANDS Default Setting Command Mode Global Configuration Example Console(config)#ip telnet port 123 Console(config)# Secure Shell Commands The Berkley-standard includes remote access tools originally designed for Unix systems. Some of these tools have also been implemented for Microsoft Windows and other environments. These tools, including commands such as rlogin (remote login), rsh (remote shell), and rcp (remote copy), are not secure from hostile attacks.
  • Page 336: Table 4-15 Secure Shell Commands

    OMMAND NTERFACE Note: The switch supports both SSH Version 1.5 and 2.0. Table 4-15 Secure Shell Commands Command Function Mode Page ip ssh server Enables the SSH server on the switch 4-48 ip ssh timeout Specifies the authentication timeout for the 4-49 SSH server ip ssh...
  • Page 337 YSTEM ANAGEMENT OMMANDS following section. Note that regardless of whether you use public key or password authentication, you still have to generate authentication keys on the switch and enable the SSH server. To use the SSH server, complete these steps: 1.
  • Page 338: Ip Ssh Server

    OMMAND NTERFACE 5. Enable SSH Service – Use the ip ssh server command to enable the SSH server on the switch. 6. Configure Challenge-Response Authentication – When an SSH client attempts to contact the switch, the SSH server uses the host key pair to negotiate a session key and encryption method.
  • Page 339: Ip Ssh Timeout

    YSTEM ANAGEMENT OMMANDS Command Mode Global Configuration Command Usage • The SSH server supports up to four client sessions. The maximum number of client sessions includes both current Telnet sessions and SSH sessions. • The SSH server uses DSA or RSA for key exchange when the client first establishes a connection with the switch, and then negotiates with the client to select either DES (56-bit) or 3DES (168-bit) for data encryption.
  • Page 340 OMMAND NTERFACE Command Usage The timeout specifies the interval the switch will wait for a response from the client during the SSH negotiation phase. Once an SSH session has been established, the timeout for user input is controlled by the exec-timeout command for vty sessions.
  • Page 341 YSTEM ANAGEMENT OMMANDS ip ssh server-key size This command sets the SSH server key size. Use the no form to restore the default setting. Syntax ip ssh server-key size key-size no ip ssh server-key size key-size – The size of server key. (Range: 512-896 bits) Default Setting 768 bits Command Mode...
  • Page 342: Default Setting

    OMMAND NTERFACE Example Console#delete public-key admin dsa Console# ip ssh crypto host-key generate This command generates the host key pair (i.e., public and private). Syntax ip ssh crypto host-key generate [dsa | rsa] • dsa – DSA (Version 2) key type. •...
  • Page 343: Ip Ssh Crypto Zeroize

    YSTEM ANAGEMENT OMMANDS ip ssh crypto zeroize This command clears the host key from memory (i.e. RAM). Syntax ip ssh crypto zeroize [dsa | rsa] • dsa – DSA key type. • rsa – RSA key type. Default Setting Clears both the DSA and RSA key. Command Mode Privileged Exec Command Usage...
  • Page 344: Show Ip Ssh

    OMMAND NTERFACE Default Setting Saves both the DSA and RSA key. Command Mode Privileged Exec Example Console#ip ssh save host-key dsa Console# Related Commands ip ssh crypto host-key generate (4-52) show ip ssh This command displays the connection settings used when authenticating client access to the SSH server.
  • Page 345: Table 4-7 System Management Commands

    YSTEM ANAGEMENT OMMANDS Table 4-16 show ssh - display description Field Description Session The session number. (Range: 0-3) Version The Secure Shell version number. State The authentication negotiation state. (Values: Negotiation-Started, Authentication-Started, Session-Started) Username The user name of the client. Encryption The encryption method is automatically negotiated between the client and server.
  • Page 346: L Ine I Nterface

    OMMAND NTERFACE show public-key This command shows the public key for the specified user or for the host. Syntax show public-key [user [username]| host] username – Name of an SSH user. (Range: 1-8 characters) Default Setting Shows all public keys. Command Mode Privileged Exec Command Usage...
  • Page 347: Event Logging Commands

    YSTEM ANAGEMENT OMMANDS Event Logging Commands Table 4-17 Event Logging Commands Command Function Mode Page logging on Controls logging of error messages 4-57 logging history Limits syslog messages saved to switch 4-58 memory based on severity logging host Adds a syslog server host IP address that will 4-59 receive logging messages logging facility...
  • Page 348: Table 4-18 Logging Levels

    OMMAND NTERFACE Example Console(config)#logging on Console(config)# Related Commands logging history (4-58) clear logging (4-62) logging history This command limits syslog messages saved to switch memory based on severity. The no form returns the logging of syslog messages to the default level.
  • Page 349: Logging Host

    YSTEM ANAGEMENT OMMANDS Table 4-18 Logging Levels (Continued) Level Severity Name Description alerts Immediate action needed emergencies System unusable * There are only Level 2, 5 and 6 error messages for the current firmware release. Default Setting Flash: errors (level 3 - 0) RAM: warnings (level 7 - 0) Command Mode Global Configuration...
  • Page 350: Logging Facility

    OMMAND NTERFACE Command Usage • By using this command more than once you can build up a list of host IP addresses. • The maximum number of host IP addresses allowed is five. Example Console(config)#logging host 10.1.0.3 Console(config)# logging facility This command sets the facility type for remote logging of syslog messages.
  • Page 351: Logging Trap

    YSTEM ANAGEMENT OMMANDS logging trap This command enables the logging of system messages to a remote server, or limits the syslog messages saved to a remote server based on severity. Use this command without a specified level to enable remote logging. Use the no form to disable remote logging.
  • Page 352: Clear Logging

    OMMAND NTERFACE clear logging This command clears messages from the log buffer. Syntax clear logging [flash | ram] • flash - Event history stored in flash memory (i.e., permanent memory). • ram - Event history stored in temporary RAM (i.e., memory flushed on power reset).
  • Page 353: Table 4-19 Show Logging Flash/Ram - Display Description

    YSTEM ANAGEMENT OMMANDS Default Setting None Command Mode Privileged Exec Example The following example shows that system logging is enabled, the message level for flash memory is “errors” (i.e., default level 3 - 0), and the message level for RAM is “debugging” (i.e., default level 7 - 0). Console#show logging flash Syslog logging: Enabled...
  • Page 354: Table 4-20 Show Logging Trap - Display Description

    OMMAND NTERFACE Table 4-20 show logging trap - display description Field Description Syslog logging Shows if system logging has been enabled via the logging on command. REMOTELOG Shows if remote logging has been enabled via the logging status trap command. REMOTELOG The facility type for remote logging of syslog messages as facility type...
  • Page 355: Smtp Alert Commands

    YSTEM ANAGEMENT OMMANDS Example The following example shows the event message stored in RAM. Console#show log ram [1] 00:01:30 2001-01-01 "VLAN 1 link-up notification." level: 6, module: 5, function: 1, and event no.: 1 [0] 00:01:30 2001-01-01 "Unit 1, Port 1 link-up notification."...
  • Page 356: Logging Sendmail Host

    OMMAND NTERFACE logging sendmail host This command specifies SMTP servers that will be sent alert messages. Use the no form to remove an SMTP server. Syntax [no] logging sendmail host ip_address ip_address - IP address of an SMTP server that will be sent alert messages for event handling.
  • Page 357: Logging Sendmail Level

    YSTEM ANAGEMENT OMMANDS logging sendmail level This command sets the severity threshold used to trigger alert messages. Syntax logging sendmail level level level - One of the system message levels (page 4-58). Messages sent include the selected level down to level 0. (Range: 0-7; Default: 7) Default Setting Level 7 Command Mode...
  • Page 358 OMMAND NTERFACE Command Mode Global Configuration Command Usage You may use an symbolic email address that identifies the switch, or the address of an administrator responsible for the switch. Example This example will send email alerts for system errors from level 3 through 0. Console(config)#logging sendmail source-email bill@this-company.com Console(config)# logging sendmail destination-email...
  • Page 359: Logging Sendmail

    YSTEM ANAGEMENT OMMANDS logging sendmail This command enables SMTP event handling. Use the no form to disable this function. Syntax [no] logging sendmail Default Setting Enabled Command Mode Global Configuration Example Console(config)#logging sendmail Console(config)# show logging sendmail This command displays the settings for the SMTP event handler. Command Mode Normal Exec, Privileged Exec Example...
  • Page 360: Time Commands

    OMMAND NTERFACE Time Commands The system clock can be dynamically set by polling a set of specified time servers (NTP or SNTP). Maintaining an accurate time on the switch enables the system log to record meaningful dates and times for event entries.
  • Page 361: Sntp Server

    YSTEM ANAGEMENT OMMANDS Command Usage • The time acquired from time servers is used to record accurate dates and times for log events. Without SNTP, the switch only records the time starting from the factory default set at the last bootup (e.g., 00:00:00, Jan.
  • Page 362: Sntp Poll

    OMMAND NTERFACE Command Mode Global Configuration Command Usage This command specifies time servers from which the switch will poll for time updates when set to SNTP client mode. The client will poll the time servers in the order specified until a response is received. It issues time synchronization requests based on the interval set via the sntp poll command.
  • Page 363: Show Sntp

    YSTEM ANAGEMENT OMMANDS Related Commands Related Commands (4-71) show sntp This command displays the current time and configuration settings for the SNTP client, and indicates whether or not the local time has been properly updated. Command Mode Normal Exec, Privileged Exec Command Usage This command displays the current time, the poll interval used for sending time synchronization requests, and the current SNTP mode...
  • Page 364: Calendar Set

    OMMAND NTERFACE Default Setting None Command Mode Global Configuration Command Usage This command sets the local time zone relative to the Coordinated Universal Time (UTC, formerly Greenwich Mean Time or GMT), based on the earth’s prime meridian, zero degrees longitude. To display a time corresponding to your local time, you must indicate the number of hours and minutes your time zone is east (before) or west (after) of UTC.
  • Page 365: Show Calendar

    YSTEM ANAGEMENT OMMANDS Default Setting None Command Mode Privileged Exec Example This example shows how to set the system clock to 15:12:34, February 1st, 2002. Console#calendar set 15 12 34 1 February 2002 Console# show calendar This command displays the system clock. Default Setting None Command Mode...
  • Page 366: System Status Commands

    OMMAND NTERFACE System Status Commands Table 4-23 System Status Commands Command Function Mode Page show Displays the configuration data currently in 4-77 running-config show system Displays system information 4-80 show users Shows all active console and Telnet sessions, 4-81 including user name, idle time, and IP address of Telnet clients show version Displays version information for the system...
  • Page 367 YSTEM ANAGEMENT OMMANDS - IP address configured for the switch - Spanning tree settings - Any configured settings for the console port and Telnet Example Console#show startup-config building startup-config, please wait..username admin access-level 15 username admin password 0 admin username guest access-level 0 username guest password 0 guest enable password level 15 0 super...
  • Page 368 OMMAND NTERFACE • Use this command in conjunction with the show startup-config command to compare the information in running memory to the information stored in non-volatile memory. • This command displays settings for key command modes. Each mode group is separated by “!” symbols, and includes the configuration mode command, and corresponding commands.
  • Page 369 YSTEM ANAGEMENT OMMANDS Example Console#show running-config building running-config, please wait..phymap 00-30-f1-df-9c-a0 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 00-00-00-00-00-00 SNTP server 0.0.0.0 0.0.0.0 0.0.0.0 snmp-server community public ro snmp-server community private rw username admin access-level 15 username admin password 7 21232f297a57a5a743894a0e4a801fc3 username guest access-level 0 username guest password 7 084e0343a0486ff05530df6c705c8bb4 enable password level 15 7 1b3231655cebb7a1f783eddf27d254ca...
  • Page 370: Show System

    • The POST results should all display “PASS.” If any POST test indicates “FAIL,” contact your distributor for assistance. Example Console#show system System description: SMC Networks SMC6152L2 System OID string: 1.3.6.1.4.1.202.20.66 System Information System Up Time: 0 days, 0 hours, 7 minutes, and 22.65...
  • Page 371: Show Users

    YSTEM ANAGEMENT OMMANDS show users Shows all active console and Telnet sessions, including user name, idle time, and IP address of Telnet client. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage The session used to execute this command is indicated by a “*” symbol next to the Line (i.e., session) index number.
  • Page 372: Frame Size Commands

    OMMAND NTERFACE Command Mode Normal Exec, Privileged Exec Command Usage See “Displaying Switch Hardware/Software Versions” on page 3-15 for detailed information on the items displayed by this command. Example Console#show version Unit 1 Serial number: A429048179 Hardware version: EPLD version: 15.15 Number of ports: Main power status:...
  • Page 373 YSTEM ANAGEMENT OMMANDS Command Usage • This switch provides more efficient throughput for large sequential data transfers by supporting jumbo frames up to 9216 bytes. Compared to standard Ethernet frames that run only up to 1.5 KB, using jumbo frames significantly reduces the per-packet overhead required to process protocol encapsulation fields.
  • Page 374: Flash/File Commands

    OMMAND NTERFACE Flash/File Commands These commands are used to manage the system code or configuration files. Table 4-25 Flash/File Commands Command Function Mode Page copy Copies a code image or a switch configuration 4-84 to or from flash memory or a TFTP server delete Deletes a file or code image 4-87...
  • Page 375 LASH OMMANDS • https-certificate - Keyword that allows you to copy the HTTPS secure site certificate. • public-key - Keyword that allows you to copy a SSH key from a TFTP server. (See “Secure Shell Commands” on page 4-45.) • unit - Keyword that allows you to copy to/from a specific unit in the stack.
  • Page 376 OMMAND NTERFACE Example The following example shows how to upload the configuration settings to a file on the TFTP server: Console#copy file tftp Choose file type: 1. config: 2. opcode: <1-2>: 1 Source file name: startup TFTP server ip address: 10.1.0.99 Destination file name: startup.01 TFTP completed.
  • Page 377: Delete

    LASH OMMANDS This example shows how to copy a public-key used by SSH from an TFTP server. Note that public key authentication via SSH is only supported for users configured locally on the switch. Console#copy tftp public-key TFTP server IP address: 192.168.1.19 Choose public key type: 1.
  • Page 378: Dir

    OMMAND NTERFACE Example This example shows how to delete the test2.cfg configuration file from flash memory. Console#delete test2.cfg Console# Related Commands dir (4-88) delete public-key (4-51) This command displays a list of files in flash memory. Syntax dir [unit:] [boot-rom | config | opcode [:filename]] The type of file or image to display includes: •...
  • Page 379: Whichboot

    LASH OMMANDS Command Usage • If you enter the command dir without any parameters, the system displays all files. • A colon (:) is required after the specified unit number. • File information is shown below: Table 4-26 File Directory Information Column Heading Description file name...
  • Page 380: Boot System

    OMMAND NTERFACE Command Mode Privileged Exec Example This example shows the information displayed by the whichboot command. See the table under the dir command for a description of the file information displayed by this command. Console#whichboot file name file type startup size (byte) -------------------------------- ----------------------- ------- ----------- Unit1: diag_0060...
  • Page 381: Authentication Commands

    UTHENTICATION OMMANDS Example Console(config)#boot system config: startup Console(config)# Related Commands dir (4-88) whichboot (4-89) Authentication Commands You can configure this switch to authenticate users logging into the system for management access using local or remote authentication methods. You can also enable port-based authentication for network client access using IEEE 802.1X.
  • Page 382: Authentication Login

    OMMAND NTERFACE authentication login This command defines the login authentication method and precedence. Use the no form to restore the default. Syntax authentication login {[local] [radius] [tacacs]} no authentication login • local - Use local password. • radius - Use RADIUS server password. •...
  • Page 383: Authentication Enable

    UTHENTICATION OMMANDS Example Console(config)#authentication login radius Console(config)# Related Commands username - for setting the local user names and passwords (4-35) authentication enable This command defines the authentication method and precedence to use when changing from Exec command mode to Privileged Exec command mode with the enable command (see page 4-27).
  • Page 384: Radius Client

    OMMAND NTERFACE • You can specify three authentication methods in a single command to indicate the authentication sequence. For example, if you enter “authentication enable radius tacacs local,” the user name and password on the RADIUS server is verified first. If the RADIUS server is not available, then authentication is attempted on the TACACS+ server.
  • Page 385 UTHENTICATION OMMANDS radius-server host This command specifies primary and backup RADIUS servers and authentication parameters that apply to each server. Use the no form to restore the default values. Syntax radius-server host host_ip_address no radius-server host [no] radius-server index host {host_ip_address | host_alias} [auth-port auth_port] [timeout timeout] [retransmit retransmit] [key key] •...
  • Page 386 OMMAND NTERFACE Example Console(config)#radius-server 1 host 192.168.1.20 port 181 timeout 10 retransmit 5 key green Console(config)# radius-server port This command sets the RADIUS server network port. Use the no form to restore the default. Syntax radius-server port port_number no radius-server port port_number - RADIUS server UDP port used for authentication messages.
  • Page 387 UTHENTICATION OMMANDS Default Setting None Command Mode Global Configuration Example Console(config)#radius-server key green Console(config)# radius-server retransmit This command sets the number of retries. Use the no form to restore the default. Syntax radius-server retransmit number_of_retries no radius-server retransmit number_of_retries - Number of times the switch will try to authenticate logon access via the RADIUS server.
  • Page 388: Global Configuration

    OMMAND NTERFACE radius-server timeout This command sets the interval between transmitting authentication requests to the RADIUS server. Use the no form to restore the default. Syntax radius-server timeout number_of_seconds no radius-server timeout number_of_seconds - Number of seconds the switch waits for a reply before resending a request.
  • Page 389: Tacacs+ Client

    UTHENTICATION OMMANDS TACACS+ Client Terminal Access Controller Access Control System (TACACS+) is a logon authentication protocol that uses software running on a central server to control access to TACACS-aware devices on the network. An authentication server contains a database of multiple user name/password pairs with associated privilege levels for each user or group that require management access to a switch.
  • Page 390 OMMAND NTERFACE tacacs-server port This command specifies the TACACS+ server network port. Use the no form to restore the default. Syntax tacacs-server port port_number no tacacs-server port port_number - TACACS+ server TCP port used for authentication messages. (Range: 1-65535) Default Setting Command Mode Global Configuration Example...
  • Page 391: Port Security Commands

    UTHENTICATION OMMANDS Example Console(config)#tacacs-server key green Console(config)# show tacacs-server This command displays the current settings for the TACACS+ server. Default Setting None Command Mode Privileged Exec Example Console#show tacacs-server Remote TACACS server configuration: Server IP address: 10.11.12.13 Communication key with TACACS server: ***** Server port number: Console# Port Security Commands...
  • Page 392: Table 4-31 Port Security Commands

    OMMAND NTERFACE Table 4-31 Port Security Commands Command Function Mode Page port security Configures a secure port 4-102 mac-address-table static Maps a static address to a port in a 4-178 VLAN show mac-address-table Displays entries in the 4-180 bridge-forwarding database port security This command enables or configures port security.
  • Page 393 UTHENTICATION OMMANDS Command Usage • If you enable port security, the switch stops learning new MAC addresses on the specified port when it has reached a configured maximum number. Only incoming traffic with source addresses already stored in the dynamic or static address table will be accepted. •...
  • Page 394: 802.1X Port Authentication

    OMMAND NTERFACE 802.1X Port Authentication The switch supports IEEE 802.1X (dot1x) port-based access control that prevents unauthorized access to the network by requiring users to first submit credentials for authentication. Client authentication is controlled centrally by a RADIUS server using EAP (Extensible Authentication Protocol).
  • Page 395: Dot1X Default

    UTHENTICATION OMMANDS dot1x system-auth-control This command enables IEEE 802.1X port authentication globally on the switch. Use the no form to restore the default. Syntax [no] dot1x system-auth-control Default Setting Disabled Command Mode Global Configuration Example Console(config)#dot1x system-auth-control Console(config)# dot1x default This command sets all configurable dot1x global and port settings to their default values.
  • Page 396 OMMAND NTERFACE dot1x max-req This command sets the maximum number of times the switch port will retransmit an EAP request/identity packet to the client before it times out the authentication session. Use the no form to restore the default. Syntax dot1x max-req count no dot1x max-req count –...
  • Page 397 UTHENTICATION OMMANDS Default force-authorized Command Mode Interface Configuration Example Console(config)#interface eth 1/2 Console(config-if)#dot1x port-control auto Console(config-if)# dot1x operation-mode This command allows single or multiple hosts (clients) to connect to an 802.1X-authorized port. Use the no form with no keywords to restore the default to single host.
  • Page 398: Interface Configuration

    OMMAND NTERFACE Similarly, a port can become unauthorized for all hosts if one attached host fails re-authentication or sends an EAPOL logoff message. Example Console(config)#interface eth 1/2 Console(config-if)#dot1x operation-mode multi-host max-count 10 Console(config-if)# dot1x re-authenticate This command forces re-authentication on all ports or a specific interface. Syntax dot1x re-authenticate [interface] interface...
  • Page 399 UTHENTICATION OMMANDS dot1x timeout quiet-period This command sets the time that a switch port waits after the Max Request Count has been exceeded before attempting to acquire a new client. Use the no form to reset the default. Syntax dot1x timeout quiet-period seconds no dot1x timeout quiet-period seconds - The number of seconds.
  • Page 400: Show Dot1X

    OMMAND NTERFACE Example Console(config)#interface eth 1/2 Console(config-if)#dot1x timeout re-authperiod 300 Console(config-if)# dot1x timeout tx-period This command sets the time that the switch waits during an authentication session before re-transmitting an EAP packet. Use the no form to reset to the default value. Syntax dot1x timeout tx-period seconds no dot1x timeout tx-period...
  • Page 401 UTHENTICATION OMMANDS Command Mode Privileged Exec Command Usage This command displays the following information: • Global 802.1X Parameters – Shows whether or not 802.1X port authentication is globally enabled on the switch. • 802.1X Port Summary – Displays the port access control parameters for each interface that has enabled 802.1X, including the following items: - Status–...
  • Page 402: Authentication Server

    OMMAND NTERFACE • Authenticator State Machine - State – Current state (including initialize, disconnected, connecting, authenticating, authenticated, aborting, held, force_authorized, force_unauthorized). - Reauth Count – Number of times connecting state is re-entered. • Backend State Machine - State – Current state (including request, response, success, fail, timeout, idle, initialize).
  • Page 403: Access Control List Commands

    CCESS ONTROL OMMANDS Authenticator State Machine State Authenticated Reauth Count Backend State Machine State Idle Request Count Identifier(Server) Reauthentication State Machine State Initialize Console# Access Control List Commands Access Control Lists (ACL) provide packet filtering for IP frames (based on address, protocol, Layer 4 protocol port number or TCP control code) or any frames (based on MAC address or Ethernet type).
  • Page 404: Ip Acls

    OMMAND NTERFACE The following restrictions apply to ACLs: • Each ACL can have up to 60 rules. • This switch supports ACLs for ingress filtering only. However, you can only bind one IP ACL to any port for ingress filtering. In other words, only one ACL can be bound to an interface - Ingress IP ACL.
  • Page 405 CCESS ONTROL OMMANDS Table 4-34 IP ACL Commands (Continued) Command Function Mode Page show ip access-list Displays the rules for configured IP 4-118 ACLs ip access-group Adds a port to an IP ACL 4-119 show ip Shows port assignments for IP ACLs 4-119 access-group map access-list ip...
  • Page 406 OMMAND NTERFACE the bottom of the list. To create an ACL, you must add at least one rule to the list. • To remove a rule, use the no permit or no deny command followed by the exact text of a previously configured rule. •...
  • Page 407 CCESS ONTROL OMMANDS uses 1 bits to indicate “match” and 0 bits to indicate “ignore.” The bitmask is bitwise ANDed with the specified source IP address, and then compared with the address for each IP packet entering the port(s) to which this ACL has been assigned. Example This example configures one permit rule for the specific address 10.1.1.21 and another rule for the address range 168.92.16.x –...
  • Page 408 OMMAND NTERFACE • sport – Protocol source port number. (Range: 0-65535) • dport – Protocol destination port number. (Range: 0-65535) • end – Upper bound of the protocol port range. (Range: 0-65535) Default Setting None Command Mode Extended ACL Command Usage •...
  • Page 409 CCESS ONTROL OMMANDS Syntax show ip access-list {standard | extended} [acl_name] • standard – Specifies a standard IP ACL. • extended – Specifies an extended IP ACL. • acl_name – Name of the ACL. (Maximum length: 16 characters) Command Mode Privileged Exec Example Console#show ip access-list standard...
  • Page 410 OMMAND NTERFACE • If a port is already bound to an ACL and you bind it to a different ACL, the switch will replace the old binding with the new one. • You must configure a mask for an ACL rule before you can bind it to a port.
  • Page 411: Table 4-35 Egress Queue Priority Mapping

    CCESS ONTROL OMMANDS Default Setting None Command Mode Interface Configuration (Ethernet) Command Usage • You must configure an ACL mask before you can map CoS values to the rule. • A packet matching a rule within the specified ACL is mapped to one of the output queues as shown in the following table.
  • Page 412 OMMAND NTERFACE • port - Port number. (Range: 1-30) Command Mode Privileged Exec Example Console#show map access-list ip Access-list to COS of Eth 1/24 Access-list ALS1 cos 0 Console# Related Commands map access-list ip (4-120) 4-122...
  • Page 413: Acl Information

    CCESS ONTROL OMMANDS ACL Information Table 4-36 ACL Information Command Function Mode Page show access-list Shows all ACLs and associated rules 4-123 show access-group Shows the ACLs assigned to each port 4-124 show access-list This command shows all ACLs and associated rules, as well as all the user-defined masks.
  • Page 414: Snmp Commands

    OMMAND NTERFACE show access-group This command shows the port assignments of ACLs. Command Mode Privileged Executive Example Console#show access-group Interface ethernet 1/25 IP standard access-list david IP access-list jerry Console# SNMP Commands Controls access to this switch from management stations using the Simple Network Management Protocol (SNMP), as well as the error types sent to trap managers.
  • Page 415 SNMP C OMMANDS Table 4-37 SNMP Commands (Continued) Command Function Mode Page snmp-server Sets the system location string 4-129 location snmp-server host Specifies the recipient of an SNMP 4-130 notification operation snmp-server enable Enables the device to send SNMP traps (i.e., 4-133 traps SNMP notifications)
  • Page 416: Show Snmp

    OMMAND NTERFACE Example Console(config)#snmp-server Console(config)# show snmp This command can be used to check the status of SNMP communications. Default Setting None Command Mode Normal Exec, Privileged Exec Command Usage This command provides information on the community access strings, counter information for SNMP input and output protocol data units, and whether or not SNMP logging has been enabled with the snmp-server enable traps command.
  • Page 417: Snmp C Ommands

    SNMP C OMMANDS Example Console#show snmp SNMP Agent: enabled SNMP traps: Authentication: enable Link-up-down: enable SNMP communities: 1. private, and the privilege is read-write 2. public, and the privilege is read-only 0 SNMP packets input 0 Bad SNMP version errors 0 Unknown community name 0 Illegal operation for community name supplied 0 Encoding errors...
  • Page 418 OMMAND NTERFACE snmp-server community This command defines the SNMP v1 and v2c community access string. Use the no form to remove the specified community string. Syntax snmp-server community string [ro|rw] no snmp-server community string • string - Community string that acts like a password and permits access to the SNMP protocol.
  • Page 419 SNMP C OMMANDS string - String that describes the system contact information. (Maximum length: 255 characters) Default Setting None Command Mode Global Configuration Example Console(config)#snmp-server contact Paul Console(config)# Related Commands snmp-server location (4-129) snmp-server location This command sets the system location string. Use the no form to remove the location string.
  • Page 420 OMMAND NTERFACE snmp-server host This command specifies the recipient of a Simple Network Management Protocol notification operation. Use the no form to remove the specified host. Syntax snmp-server host host-addr [inform [retry retries | timeout seconds]] community-string [version {1 | 2c | 3 {auth | noauth | priv} [udp-port port]} no snmp-server host host-addr •...
  • Page 421 SNMP C OMMANDS Default Setting • Host Address: None • Notification Type: Traps • SNMP Version: 1 • UDP Port: 162 Command Mode Global Configuration Command Usage • If you do not enter an snmp-server host command, no notifications are sent. In order to configure the switch to send SNMP notifications, you must enter at least one snmp-server host command.
  • Page 422 OMMAND NTERFACE 2. Allow the switch to send SNMP traps; i.e., notifications (page 4-133). 3. Specify the target host that will receive inform messages with the snmp-server host command as described in this section. 4. Create a view with the required notification messages (page 4-136). 5.
  • Page 423 SNMP C OMMANDS Example Console(config)#snmp-server host 10.1.19.23 inform retries 10 timeout 30 batman version 2c udp-port 162 Console(config)# Related Commands snmp-server enable traps (4-133) snmp-server enable traps This command enables this device to send Simple Network Management Protocol traps or informs (i.e., SNMP notifications). Use the no form to disable SNMP notifications.
  • Page 424 OMMAND NTERFACE In order to send notifications, you must configure at least one snmp-server host command. • The authentication, link-up, and link-down traps are legacy notifications, and therefore when used for SNMP Version 3 hosts, they must be enabled in conjunction with the corresponding entries in the Notify View assigned by the snmp-server group command (page 4-138).
  • Page 425 SNMP C OMMANDS message replay, delay, and redirection. The engine ID is also used in combination with user passwords to generate the security keys for authenticating and encrypting SNMPv3 packets. • A remote engine ID is required when using SNMPv3 informs. (See snmp-server host on page 4-130.) The remote engine ID is used to compute the security digest for authenticating and encrypting packets sent to a user on the remote host.
  • Page 426: Table 4-38 Show Snmp Engine-Id - Display Description

    OMMAND NTERFACE Example This example shows the default engine ID. Console#show snmp engine-id Local SNMP engineID: 8000002a8000000000e8666672 Local SNMP engineBoots: 1 Remote SNMP engineID IP address 80000000030004e2b316c54321 192.168.1.19 Console# Table 4-38 show snmp engine-id - display description Field Description Local SNMP String identifying the local engine ID.
  • Page 427: Show Snmp View

    SNMP C OMMANDS Command Mode Global Configuration Command Usage • Views are used in the snmp-server group command to restrict user access to specified portions of the MIB tree. • The predefined view “defaultview” includes access to the entire MIB tree.
  • Page 428: Table 4-39 Show Snmp View - Display Description

    OMMAND NTERFACE Example Console#show snmp view View Name: mib-2 Subtree OID: 1.2.2.3.6.2.1 View Type: included Storage Type: nonvolatile Row Status: active View Name: defaultview Subtree OID: 1 View Type: included Storage Type: nonvolatile Row Status: active Console# Table 4-39 show snmp view - display description Field Description View Name...
  • Page 429: Show Snmp Group

    SNMP C OMMANDS • readview - Defines the view for read access. (1-64 characters) • writeview - Defines the view for write access. (1-64 characters) • notifyview - Defines the view for notifications. (1-64 characters) Default Setting • Default groups: public (read only), private (read/write) •...
  • Page 430: Table 4-40 Show Snmp Group - Display Description

    OMMAND NTERFACE Example Console#show snmp group Group Name: r&d Security Model: v3 Read View: defaultview Write View: daily Notify View: none Storage Type: nonvolatile Row Status: active Group Name: public Security Model: v1 Read View: defaultview Write View: none Notify View: none Storage Type: volatile Row Status: active Group Name: public...
  • Page 431 SNMP C OMMANDS Table 4-40 show snmp group - display description (Continued) Field Description notifyview The associated notify view. storage-type The storage type for this entry. Row Status The row status of this entry. snmp-server user This command adds a user to an SNMP group, restricting the user to a specific SNMP Read and a Write View.
  • Page 432 OMMAND NTERFACE Command Mode Global Configuration Command Usage • The SNMP engine ID is used to compute the authentication/privacy digests from the password. You should therefore configure the engine ID with the snmp-server engine-id command before using this configuration command. •...
  • Page 433: Table 4-41 Show Snmp User - Display Description

    SNMP C OMMANDS show snmp user This command shows information on SNMP users. Command Mode Privileged Exec Example Console#show snmp user EngineId: 01000000000000000000000000 User Name: steve Authentication Protocol: md5 Privacy Protocol: des56 Storage Type: nonvolatile Row Status: active SNMP remote user EngineId: 80000000030004e2b316c54321 User Name: mark Authentication Protocol: mdt...
  • Page 434 OMMAND NTERFACE 4-144...
  • Page 435: Interface Commands

    NTERFACE OMMANDS Interface Commands These commands are used to display or set communication parameters for an Ethernet port, aggregated link, or VLAN. Table 4-42 Interface Commands Command Function Mode Page interface Configures an interface type and 4-146 enters interface configuration mode description Adds a description to an interface 4-146...
  • Page 436: Interface

    OMMAND NTERFACE interface This command configures an interface type and enter interface configuration mode. Use the no form to remove a trunk. Syntax interface interface no interface port-channel channel-id • interface • ethernet unit/port - unit - Stack unit. (Always unit 1) - port - Port number.
  • Page 437: Speed-Duplex

    NTERFACE OMMANDS Command Mode Interface Configuration (Ethernet, Port Channel) Example The following example adds a description to port 24. Console(config)#interface ethernet 1/24 Console(config-if)#description RD-SW#3 Console(config-if)# speed-duplex This command configures the speed and duplex mode of a given interface when autonegotiation is disabled. Use the no form to restore the default. Syntax speed-duplex {1000full | 100full | 100half | 10full | 10half} no speed-duplex...
  • Page 438: Negotiation

    OMMAND NTERFACE • When using the negotiation command to enable auto-negotiation, the optimal settings will be determined by the capabilities command. To set the speed/duplex mode under auto-negotiation, the required mode must be specified in the capabilities list for an interface. Example The following example configures port 5 to 100 Mbps, half-duplex operation.
  • Page 439: Capabilities

    NTERFACE OMMANDS Example The following example configures port 11 to use autonegotiation. Console(config)#interface ethernet 1/11 Console(config-if)#negotiation Console(config-if)# Related Commands capabilities (4 -149) speed-duplex (4 -147) capabilities This command advertises the port capabilities of a given interface during autonegotiation. Use the no form with parameters to remove an advertised capability, or the no form without parameters to restore the default values.
  • Page 440: Flowcontrol

    OMMAND NTERFACE Command Usage When auto-negotiation is enabled with the negotiation command, the switch will negotiate the best settings for a link based on the capabilites command. When auto-negotiation is disabled, you must manually specify the link attributes with the speed-duplex and flowcontrol commands.
  • Page 441: Shutdown

    NTERFACE OMMANDS • To force flow control on or off (with the flowcontrol or no flowcontrol command), use the no negotiation command to disable auto-negotiation on the selected interface. • When using the negotiation command to enable auto-negotiation, the optimal settings will be determined by the capabilities command. To enable flow control under auto-negotiation, “flowcontrol”...
  • Page 442: Clear Counters

    OMMAND NTERFACE Command Usage This command allows you to disable a port due to abnormal behavior (e.g., excessive collisions), and then reenable it after the problem has been resolved. You may also want to disable a port for security reasons. Example The following example disables port 5.
  • Page 443: Show Interfaces Status

    NTERFACE OMMANDS Example The following example clears statistics on port 5. Console#clear counters ethernet 1/5 Console# show interfaces status This command displays the status for an interface. Syntax show interfaces status [interface] interface • ethernet unit/port - unit - Stack unit. (Always unit 1) - port - Port number.
  • Page 444: Show Interfaces Counters

    OMMAND NTERFACE Example Console#show interfaces status ethernet 1/5 Information of Eth 1/5 Basic information: Port type: 1000T Mac address: 00-30-F1-D4-73-A5 Configuration: Name: Port admin: Speed-duplex: Auto Capabilities: 10half, 10full, 100half, 100full, 1000full Broadcast storm: Enabled Broadcast storm limit: 500 packets/second Flow control: Disabled LACP:...
  • Page 445: Table 4-42 Interface Commands

    NTERFACE OMMANDS Command Usage If no interface is specified, information on all interfaces is displayed. For a description of the items displayed by this command, see “Showing Port Statistics” on page 3-134. Example Console#show interfaces counters ethernet 1/7 Ethernet 1/7 Iftable stats: Octets input: 30658, Octets output: 196550 Unicast input: 6, Unicast output: 5...
  • Page 446: Show Interfaces Switchport

    OMMAND NTERFACE show interfaces switchport This command displays the administrative and operational status of the specified interfaces. Syntax show interfaces switchport [interface] interface • ethernet unit/port - unit - Stack unit. (Always unit 1) - port - Port number. (Range: 1-30) •...
  • Page 447: Table 4-43 Show Interfaces Switchport - Display Description

    NTERFACE OMMANDS Table 4-43 show interfaces switchport - display description Field Description Broadcast threshold Shows if broadcast storm suppression is enabled or disabled; if enabled it also shows the threshold level (page 4-158). LACP status Shows if Link Aggregation Control Protocol has been enabled or disabled (page 4-166).
  • Page 448: Broadcast Commands

    OMMAND NTERFACE Broadcast Commands This section describes how to configure broadcast storm control for the switch. Table 4-44 Broadcast Commands Command Function Mode Page broadcast Configures the global threshold level 4-158 packet-rate switchport Enables broadcast storm control for an 4-159 broadcast interface show interfaces...
  • Page 449: Switchport Broadcast

    ROADCAST OMMANDS Example The following shows how to configure broadcast storm control at 600 packets per second: Console(config)#broadcast packet-rate 600 switchport broadcast This command enables broadcast storm control on an interface. Use the no form to disable broadcast storm control on an interface. Syntax [no] switchport broadcast Default Setting...
  • Page 450: Mirror Port Commands

    OMMAND NTERFACE Mirror Port Commands This section describes how to mirror traffic from a source port to a target port. Table 4-45 Mirror Port Commands Command Function Mode Page port monitor Configures a mirror session 4-160 show port monitor Shows the configuration for a mirror port 4-161 port monitor This command configures a mirror session.
  • Page 451: Show Port Monitor

    IRROR OMMANDS Command Usage • You can mirror traffic from any source port to a destination port for real-time analysis. You can then attach a logic analyzer or RMON probe to the destination port and study the traffic crossing the source port in a completely unobtrusive manner.
  • Page 452: Rate Limit Commands

    OMMAND NTERFACE Example The following shows mirroring configured from port 6 to port 11. Console(config)#interface ethernet 1/11 Console(config-if)#port monitor ethernet 1/6 Console(config-if)#end Console#show port monitor Port Mirroring ------------------------------------- Destination port(listen port):Eth1/1 Source port(monitored port) :Eth1/6 Mode :RX/TX Console# Rate Limit Commands This function allows the network manager to control the maximum rate for traffic received on an interface.
  • Page 453 IMIT OMMANDS • input – Input rate • rate – Percentage Default Setting 100 percent Command Mode Interface Configuration (Ethernet, Port Channel) Example Console(config)#interface ethernet 1/1 Console(config-if)#rate-limit input 600 Console(config-if)# 4-163...
  • Page 454: Link Aggregation Commands

    OMMAND NTERFACE Link Aggregation Commands Ports can be statically grouped into an aggregate link (i.e., trunk) to increase the bandwidth of a network connection or to ensure fault recovery. Or you can use the Link Aggregation Control Protocol (LACP) to automatically negotiate a trunk link between this switch and another network device.
  • Page 455: Guidelines For Creating Trunks

    GGREGATION OMMANDS Guidelines for Creating Trunks General Guidelines – • Finish configuring port trunks before you connect the corresponding network cables between switches to avoid creating a loop. • A trunk can have up to 8 ports. • The ports at both ends of a connection must be configured as trunk ports.
  • Page 456: Channel-Group

    OMMAND NTERFACE channel-group This command adds a port to a trunk. Use the no form to remove a port from a trunk. Syntax channel-group channel-id no channel-group channel-id - Trunk index (Range: 1-6) Default Setting The current port will be added to this trunk. Command Mode Interface Configuration (Ethernet) Command Usage...
  • Page 457 GGREGATION OMMANDS Command Mode Interface Configuration (Ethernet) Command Usage • The ports on both ends of an LACP trunk must be configured for full duplex, and auto-negotiation. • A trunk formed with another switch using LACP will automatically be assigned the next available port-channel ID. •...
  • Page 458 OMMAND NTERFACE Example The following shows LACP enabled on ports 10-12. Because LACP has also been enabled on the ports at the other end of the links, the show interfaces status port-channel 1 command shows that Trunk1 has been established. Console(config)#interface ethernet 1/10 Console(config-if)#lacp Console(config-if)#exit...
  • Page 459: Lacp System-Priority

    GGREGATION OMMANDS lacp system-priority This command configures a port's LACP system priority. Use the no form to restore the default setting. Syntax lacp {actor | partner} system-priority priority no lacp {actor | partner} system-priority • actor - The local side an aggregate link. •...
  • Page 460: Lacp Admin-Key (Ethernet Interface)

    OMMAND NTERFACE lacp admin-key (Ethernet Interface) This command configures a port's LACP administration key. Use the no form to restore the default setting. Syntax lacp {actor | partner} admin-key key [no] lacp {actor | partner} admin-key • actor - The local side an aggregate link. •...
  • Page 461: Lacp Admin-Key (Port Channel)

    GGREGATION OMMANDS lacp admin-key (Port Channel) This command configures a port channel's LACP administration key string. Use the no form to restore the default setting. Syntax lacp admin-key key [no] lacp admin-key key - The port channel admin key is used to identify a specific link aggregation group (LAG) during local LACP setup on this switch.
  • Page 462: Lacp Port-Priority

    OMMAND NTERFACE lacp port-priority This command configures LACP port priority. Use the no form to restore the default setting. Syntax lacp {actor | partner} port-priority priority no lacp {actor | partner} port-priority • actor - The local side an aggregate link. •...
  • Page 463: Show Lacp

    GGREGATION OMMANDS show lacp This command displays LACP information. Syntax show lacp [port-channel] {counters | internal | neighbors | sys-id} • port-channel - Local identifier for a link aggregation group. (Range: 1-6) • counters - Statistics for LACP protocol messages. •...
  • Page 464: Table 4-48 Show Lacp Counters - Display Description

    OMMAND NTERFACE Table 4-48 show lacp counters - display description Field Description LACPDUs Sent Number of valid LACPDUs transmitted from this channel group. LACPDUs Received Number of valid LACPDUs received on this channel group. Marker Sent Number of valid Marker PDUs transmitted from this channel group.
  • Page 465 GGREGATION OMMANDS Table 4-49 show lacp internal - display description (Continued) Field Description LACPDUs Number of seconds before invalidating received LACPDU Internal information. LACP System LACP system priority assigned to this port channel. Priority LACP Port LACP port priority assigned to this interface within the Priority channel group.
  • Page 466: Table 4-50 Show Lacp Neighbors - Display Description

    OMMAND NTERFACE Console#show lacp 1 neighbors Channel group 1 neighbors ------------------------------------------------------------------- Eth 1/1 ------------------------------------------------------------------- Partner Admin System ID: 32768, 00-00-00-00-00-00 Partner Oper System ID: 32768, 00-01-F4-78-AE-C0 Partner Admin Port Number: 2 Partner Oper Port Number: Port Admin Priority: 32768 Port Oper Priority: 32768 Admin Key: Oper Key:...
  • Page 467: Address Table Commands

    DDRESS ABLE OMMANDS Console#show lacp 1 sysid Channel group System Priority System MAC Address ------------------------------------------------------------------- 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-8F-2C-A7 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 32768 00-30-F1-D4-73-A0 Table 4-51 show lacp sysid - display description Field Description Channel group...
  • Page 468: Mac-Address-Table Static

    OMMAND NTERFACE Table 4-52 Address Table Commands (Continued) Command Function Mode Page mac-address-table aging-time Sets the aging time of the address 4-181 table show mac-address-table Shows the aging time for the 4-182 aging-time address table mac-address-table static This command maps a static address to a destination port in a VLAN. Use the no form to remove an address.
  • Page 469: Clear Mac-Address-Table Dynamic

    DDRESS ABLE OMMANDS Command Usage The static address for a host device can be assigned to a specific port within a specific VLAN. Use this command to add static addresses to the MAC Address Table. Static addresses have the following characteristics: •...
  • Page 470: Show Mac-Address-Table

    OMMAND NTERFACE show mac-address-table This command shows classes of entries in the bridge-forwarding database. Syntax show mac-address-table [address mac-address [mask]] [interface interface] [vlan vlan-id] [sort {address | vlan | interface}] • mac-address - MAC address. • mask - Bits to match in the address. •...
  • Page 471: Mac-Address-Table Aging-Time

    DDRESS ABLE OMMANDS Example Console#show mac-address-table Interface Mac Address Vlan Type --------- ----------------- ---- ----------------- Eth 1/ 1 00-00-00-00-00-17 1 Learned Eth 1/ 1 00-E0-29-94-34-DE 1 Delete-on-reset Console# mac-address-table aging-time This command sets the aging time for entries in the address table. Use the no form to restore the default aging time.
  • Page 472: Show Mac-Address-Table Aging-Time

    OMMAND NTERFACE show mac-address-table aging-time This command shows the aging time for entries in the address table. Default Setting None Command Mode Privileged Exec Example Console#show mac-address-table aging-time Aging time: 300 sec. Console# Spanning Tree Commands This section includes commands that configure the Spanning Tree Algorithm (STA) globally for the switch, and commands that configure STA for the selected interface.
  • Page 473: Spanning-Tree

    PANNING OMMANDS Table 4-53 Spanning Tree Commands (Continued) Command Function Mode Page spanning-tree Disables spanning tree for an interface IC 4-190 spanning-disabled spanning-tree cost Configures the spanning tree path cost 4-190 of an interface spanning-tree Configures the spanning tree priority of 4-191 port-priority an interface...
  • Page 474: Spanning-Tree Mode

    OMMAND NTERFACE network to ensure that only one route exists between any two stations on the network, and provide backup links which automatically take over when a primary link goes down. Example This example shows how to enable the Spanning Tree Algorithm for the switch.
  • Page 475: Spanning-Tree Forward-Time

    PANNING OMMANDS adjusting the type of protocol messages the RSTP node transmits, as described below: - STP Mode – If the switch receives an 802.1D BPDU after a port’s migration delay timer expires, the switch assumes that it is connected to an 802.1D bridge and starts using only 802.1D BPDUs.
  • Page 476: Spanning-Tree Hello-Time

    OMMAND NTERFACE Command Usage This command sets the maximum time (in seconds) the root device will wait before changing states (i.e., discarding to learning to forwarding). This delay is required because every device must receive information about topology changes before it starts to forward frames. In addition, each port needs time to listen for conflicting information that would make it return to the discarding state;...
  • Page 477: Spanning-Tree Max-Age

    PANNING OMMANDS Related Commands spanning-tree forward-time (4 -185) spanning-tree max-age (4 -187) spanning-tree max-age This command configures the spanning tree bridge maximum age globally for this switch. Use the no form to restore the default. Syntax spanning-tree max-age seconds no spanning-tree max-age seconds - Time in seconds.
  • Page 478: Spanning-Tree Priority

    OMMAND NTERFACE spanning-tree priority This command configures the spanning tree priority globally for this switch. Use the no form to restore the default. Syntax spanning-tree priority priority no spanning-tree priority priority - Priority of the bridge. (Range: 0 - 65535) (Range –...
  • Page 479: Spanning-Tree Transmission-Limit

    PANNING OMMANDS Protocol. • short - Specifies 16-bit based values that range from 1-65535. This method is based on the IEEE 802.1 Spanning Tree Protocol. Default Setting Long method Command Mode Global Configuration Command Usage The path cost method is used to determine the best path between devices.
  • Page 480: Spanning-Tree Spanning-Disabled

    OMMAND NTERFACE Example Console(config)#spanning-tree transmission-limit 4 Console(config)# spanning-tree spanning-disabled This command disables the spanning tree algorithm for the specified interface. Use the no form to reenable the spanning tree algorithm for the specified interface. Syntax [no] spanning-tree spanning-disabled Default Setting Enabled Command Mode Interface Configuration (Ethernet, Port Channel)
  • Page 481: Spanning-Tree Port-Priority

    PANNING OMMANDS Default Setting • Ethernet – half duplex: 2,000,000; full duplex: 1,000,000; trunk: 500,000 • Fast Ethernet – half duplex: 200,000; full duplex: 100,000; trunk: 50,000 • Gigabit Ethernet – full duplex: 10,000; trunk: 5,000 Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage •...
  • Page 482: Spanning-Tree Edge-Port

    OMMAND NTERFACE Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage • This command defines the priority for the use of a port in the Spanning Tree Algorithm. If the path cost for all ports on a switch are the same, the port with the highest priority (that is, lowest value) will be configured as an active link in the spanning tree.
  • Page 483: Spanning-Tree Portfast

    PANNING OMMANDS of frame flooding required to rebuild address tables during reconfiguration events, does not cause the spanning tree to initiate reconfiguration when the interface changes state, and also overcomes other STA-related timeout problems. However, remember that Edge Port should only be enabled for ports connected to an end-node device.
  • Page 484: Spanning-Tree Link-Type

    OMMAND NTERFACE forwarding should only be enabled for ports connected to a LAN segment that is at the end of a bridged LAN or for an end-node device.) • This command is the same as spanning-tree edge-port, and is only included for backward compatibility with earlier products.
  • Page 485: Spanning-Tree Protocol-Migration

    PANNING OMMANDS point-to-point link, while a half-duplex interface is assumed to be on a shared link. • RSTP only works on point-to-point links between two bridges. If you designate a port as a shared link, RSTP is forbidden. Example Console(config)#interface ethernet 1/5 Console(config-if)#spanning-tree link-type point-to-point spanning-tree protocol-migration This command re-checks the appropriate BPDU format to send on the...
  • Page 486: Show Spanning-Tree

    OMMAND NTERFACE show spanning-tree This command shows the configuration for the common spanning tree (CST). Syntax show spanning-tree [interface] • interface - ethernet unit/port - unit - Stack unit. (Always unit 1) - port - Port number. (Range: 1-30) - port-channel channel-id (Range: 1-6) Default Setting None Command Mode...
  • Page 487 PANNING OMMANDS Example Console#show spanning-tree Spanning-tree information --------------------------------------------------------------- Spanning tree mode: RSTP Spanning tree enabled/disabled: enabled Instance: VLANs configuration: 1-4093 Priority: 32768 Bridge Hello Time (sec.): Bridge Max Age (sec.): Bridge Forward Delay (sec.): Root Hello Time (sec.): Root Max Age (sec.): Root Forward Delay (sec.): Max hops: Remaining hops:...
  • Page 488: Vlan Commands

    OMMAND NTERFACE VLAN Commands A VLAN is a group of ports that can be located anywhere in the network, but communicate as though they belong to the same physical segment. This section describes commands used to create VLAN groups, add port members, specify how VLAN tagging is used, and enable automatic VLAN registration for the selected interface.
  • Page 489 VLAN C OMMANDS Command Mode Global Configuration Command Usage • Use the VLAN database command mode to add, change, and delete VLANs. After finishing configuration changes, you can display the VLAN settings by entering the show vlan command. • Use the interface vlan command mode to define the port membership mode and add or remove ports from a VLAN.
  • Page 490: Configuring Vlan Interfaces

    OMMAND NTERFACE Default Setting By default only VLAN 1 exists and is active. Command Mode VLAN Database Configuration Command Usage • no vlan vlan-id deletes the VLAN. • no vlan vlan-id name removes the VLAN name. • no vlan vlan-id state returns the VLAN to the default state (i.e., active).
  • Page 491: Interface Vlan

    VLAN C OMMANDS Table 4-56 Configuring VLAN Interfaces Command Function Mode Page switchport native vlan Configures the PVID (native VLAN) of 4-205 an interface switchport allowed Configures the VLANs associated with 4-206 vlan an interface switchport gvrp Enables GVRP for an interface 4-218 switchport forbidden Configures forbidden VLANs for an...
  • Page 492: Switchport Mode

    OMMAND NTERFACE switchport mode This command configures the VLAN membership mode for a port. Use the no form to restore the default. Syntax switchport mode {hybrid | access} no switchport mode • hybrid - Specifies a hybrid VLAN interface. The port may transmit tagged or untagged frames.
  • Page 493 VLAN C OMMANDS • tagged - The port only receives tagged frames. Default Setting All frame types Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage When set to receive all frame types, any received frames that are untagged are assigned to the default VLAN. Example The following example shows how to restrict the traffic received on port 1 to tagged frames:...
  • Page 494 OMMAND NTERFACE switchport ingress-filtering This command enables ingress filtering for an interface. Note: Although the ingress filtering command is available, the switch has ingress filtering permanently set to enable. Therefore, trying to disable the filtering with the "no switchport ingress-filtering” command will produce this error message: “Note: Failed to ingress-filtering on ethernet interface !”...
  • Page 495: Switchport Native Vlan

    VLAN C OMMANDS switchport native vlan This command configures the PVID (i.e., default VLAN ID) for a port. Use the no form to restore the default. Syntax switchport native vlan vlan-id no switchport native vlan vlan-id - Default VLAN ID for a port. (Range: 1-4093, no leading zeroes) Default Setting VLAN 1...
  • Page 496: Switchport Allowed Vlan

    OMMAND NTERFACE switchport allowed vlan This command configures VLAN groups on the selected interface. Use the no form to restore the default. Note: Each port can only have one untagged VLAN. If a second VLAN is defined for a port as untagged, the other VLAN that had untagged status will automatically be changed to tagged.
  • Page 497: Switchport Forbidden Vlan

    VLAN C OMMANDS • The interface can be added to a VLAN as an untagged member regardless of connected devices to this interface. The default setting is untagged VLAN 1. Note that each port can only have one untagged VLAN. If a second VLAN is defined for a port as untagged, the other VLAN that had untagged status will automatically be changed to tagged.
  • Page 498: Displaying Vlan Information

    OMMAND NTERFACE Command Usage • This command prevents a VLAN from being automatically added to the specified interface via GVRP. • If a VLAN has been added to the set of allowed VLANs for an interface, then you cannot add it to the set of forbidden VLANs for that same interface.
  • Page 499: Configuring Private Vlans

    VLAN C OMMANDS Default Setting Shows all VLANs. Command Mode Normal Exec, Privileged Exec Example The following example shows how to display information for VLAN 1. Console#show vlan id 1 VLAN ID: Type: Static Name: DefaultVlan Status: Active Ports/Port Channels: Eth1/ 1(S) Eth1/ 2(S) Eth1/ 3(S) Eth1/ 4(S) Eth1/ 5(S) Eth1/ 6(S) Eth1/ 7(S) Eth1/ 8(S) Eth1/ 9(S) Eth1/10(S) Eth1/11(S) Eth1/12(S) Eth1/13(S) Eth1/14(S) Eth1/15(S)
  • Page 500: Table 4-58 Private Vlan Commands

    OMMAND NTERFACE Table 4-58 Private VLAN Commands Command Function Mode Page Edit Private VLAN Groups private-vlan Adds or deletes primary or community 4-211 VLANs private-vlan association Associates a community VLAN with a 4-212 primary VLAN Configure Private VLAN Interfaces switchport mode Sets an interface to host mode or private-vlan promiscuous mode...
  • Page 501 VLAN C OMMANDS private-vlan Use this command to create a primary or community VLAN. Use the no form to remove the specified private VLAN. Syntax private-vlan vlan-id {community | primary} no private-vlan vlan-id • vlan-id - ID of private VLAN. (Range: 1-4093, no leading zeroes). •...
  • Page 502: Private Vlan Association

    OMMAND NTERFACE Example Console(config)#vlan database Console(config-vlan)#private-vlan 2 primary Console(config-vlan)#private-vlan 3 community Console(config)# private vlan association Use this command to associate a primary VLAN with a secondary (i.e., community) VLAN. Use the no form to remove all associations for the specified primary VLAN. Syntax private-vlan primary-vlan-id association {primary-vlan-id | add secondary-vlan-id | remove secondary-vlan-id}...
  • Page 503 VLAN C OMMANDS switchport mode private-vlan Use this command to set the private VLAN mode for an interface. Use the no form to restore the default setting. Syntax switchport mode private-vlan{host | promiscuous} no switchport mode private-vlan • host – This port type can subsequently be assigned to a community VLAN.
  • Page 504 OMMAND NTERFACE switchport private-vlan host-association secondary-vlan-id no switchport private-vlan host-association secondary-vlan-id - ID of secondary (i.e., community) VLAN. (Range: 1-4093, no leading zeroes). Default Setting None Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage All ports assigned to a secondary (i.e., community) VLAN can pass traffic between group members, but must communicate with resources outside of the group via promiscuous ports in the associated primary VLAN.
  • Page 505 VLAN C OMMANDS Command Usage Promiscuous ports assigned to a primary VLAN can communicate with any other promiscuous ports in the same VLAN, and with the group members within any associated secondary VLANs. Example Console(config)#interface ethernet 1/2 Console(config-if)#switchport private-vlan mapping 2 Console(config-if)# show vlan private-vlan Use this command to show the private VLAN configuration settings on...
  • Page 506: Gvrp And Bridge Extension Commands

    OMMAND NTERFACE GVRP and Bridge Extension Commands GARP VLAN Registration Protocol defines a way for switches to exchange VLAN information in order to automatically register VLAN members on interfaces across the network. This section describes how to enable GVRP for individual interfaces and globally for the switch, as well as how to display default configuration settings for the Bridge Extension MIB.
  • Page 507: Show Bridge-Ext

    GVRP RIDGE XTENSION OMMANDS Command Mode Global Configuration Command Usage GVRP defines a way for switches to exchange VLAN information in order to register VLAN members on ports across the network. This function should be enabled to permit automatic VLAN registration, and to support VLANs which extend beyond the local switch.
  • Page 508: Switchport Gvrp

    OMMAND NTERFACE switchport gvrp This command enables GVRP for a port. Use the no form to disable it. Syntax [no] switchport gvrp Default Setting Disabled Command Mode Interface Configuration (Ethernet, Port Channel) Example Console(config)#interface ethernet 1/1 Console(config-if)#switchport gvrp Console(config-if)# show gvrp configuration This command shows if GVRP is enabled.
  • Page 509: Garp Timer

    GVRP RIDGE XTENSION OMMANDS garp timer This command sets the values for the join, leave and leaveall timers. Use the no form to restore the timers’ default values. Syntax garp timer {join | leave | leaveall} timer_value no garp timer {join | leave | leaveall} •...
  • Page 510: Show Garp Timer

    OMMAND NTERFACE Example Console(config)#interface ethernet 1/1 Console(config-if)#garp timer join 100 Console(config-if)# Related Commands show garp timer (4 -220) show garp timer This command shows the GARP timers for the selected interface. Syntax show garp timer [interface] interface • ethernet unit/port - unit - Stack unit.
  • Page 511: Priority Commands

    RIORITY OMMANDS Priority Commands The commands described in this section allow you to specify which data packets have greater precedence when traffic is buffered in the switch due to congestion. This switch supports CoS with eight priority queues for each port. Data packets in a port’s high-priority queue will be transmitted before those in the lower-priority queues.
  • Page 512: Table 4-61 Priority Commands (Layer 2)

    OMMAND NTERFACE Table 4-60 Priority Commands Command Groups Function Page Priority (Layer 2) Configures default priority for untagged frames, 4-222 sets queue weights, and maps class of service tags to hardware queues Priority (Layer 3 and 4) Maps IP DSCP tags to class of service values 4-229 Priority Commands (Layer 2) Table 4-61 Priority Commands (Layer 2)
  • Page 513: Switchport Priority Default

    RIORITY OMMANDS • strict - Services the egress queues in sequential order, transmitting all traffic in the higher priority queues before servicing lower priority queues. • wrr - Weighted Round-Robin shares bandwidth at the egress ports by using scheduling weights 1, 2, 4, 6, 8, 10, 12, 14 for queues 0 - 7 respectively.
  • Page 514 OMMAND NTERFACE Default Setting The priority is not set, and the default value for untagged frames received on the interface is zero. Command Mode Interface Configuration (Ethernet, Port Channel) Command Usage • The precedence for priority mapping is IP DSCP, and default switchport priority.
  • Page 515: Queue Bandwidth

    RIORITY OMMANDS queue bandwidth This command assigns weighted round-robin (WRR) weights to the eight class of service (CoS) priority queues. Use the no form to restore the default weights. Syntax queue bandwidth weight1...weight4 no queue bandwidth weight1...weight4 - The ratio of weights for queues 0 - 3 determines the weights used by the WRR scheduler.
  • Page 516: Table 4-62 Default Cos Priority Levels

    OMMAND NTERFACE queue cos-map This command assigns class of service (CoS) values to the priority queues (i.e., hardware output queues 0 - 7). Use the no form set the CoS map to the default values. Syntax queue cos-map queue_id [cos1 ... cosn] no queue cos-map •...
  • Page 517: Table 4-60 Priority Commands

    RIORITY OMMANDS Example The following example shows how to change the CoS assignments to a one-to-one mapping. Console(config)#interface ethernet 1/1 Console(config-if)#queue cos-map 0 0 Console(config-if)#queue cos-map 1 1 Console(config-if)#queue cos-map 2 2 Console(config-if)#exit Console#show queue cos-map ethernet 1/1 Information of Eth 1/1 Traffic Class : 0 1 2 3 4 5 6 7 Priority Queue: 0 1 2 3 4 5 6 7 Console#...
  • Page 518 OMMAND NTERFACE Command Mode Privileged Exec Example Console#show queue bandwidth Information of Eth 1/1 Queue ID Weight -------- ------ show queue cos-map This command shows the class of service priority map. Syntax show queue cos-map [interface] interface • ethernet unit/port - unit - Stack unit.
  • Page 519: Priority Commands (Layer 3 And 4)

    RIORITY OMMANDS Priority Commands (Layer 3 and 4) Table 4-63 Priority Commands (Layer 3 and 4) Command Function Mode Page map ip dscp Enables IP DSCP class of service 4-229 mapping map ip dscp Maps IP DSCP value to a class of service IC 4-230 map access-list ip Sets the CoS value and corresponding...
  • Page 520: Table 4-64 Mapping Ip Dscp To Cos Values

    OMMAND NTERFACE map ip dscp (Interface Configuration) This command sets IP DSCP priority (i.e., Differentiated Services Code Point priority). Use the no form to restore the default table. Syntax map ip dscp dscp-value cos cos-value no map ip dscp • dscp-value - 8-bit DSCP value. (Range: 0-255) •...
  • Page 521: Show Map Ip Dscp

    RIORITY OMMANDS Example The following example shows how to map IP DSCP value 1 to CoS value 0. Console(config)#interface ethernet 1/5 Console(config-if)#map ip dscp 1 cos 0 Console(config-if)# show map ip dscp This command shows the IP DSCP priority map. Syntax show map ip dscp [interface] interface...
  • Page 522: Table 4-65 Multicast Filtering Commands

    OMMAND NTERFACE Example Console#show map ip dscp ethernet 1/1 DSCP mapping status: disabled Port DSCP COS --------- ---- --- Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Eth 1/ 1 Console# Related Commands map ip dscp (Global Configuration) (4 -229)
  • Page 523: Multicast Filtering Commands

    ULTICAST ILTERING OMMANDS IGMP Snooping Commands Table 4-66 IGMP Snooping Commands Command Function Mode Page ip igmp snooping Enables IGMP snooping 4-233 ip igmp snooping vlan Adds an interface as a member of a 4-234 static multicast group ip igmp snooping Configures the IGMP version for 4-235 version...
  • Page 524: Ip Igmp Snooping Vlan Static

    OMMAND NTERFACE ip igmp snooping vlan static This command adds a port to a multicast group. Use the no form to remove the port. Syntax [no] ip igmp snooping vlan vlan-id static ip-address interface • vlan-id - VLAN ID (Range: 1-4093) •...
  • Page 525: Ip Igmp Snooping Version

    ULTICAST ILTERING OMMANDS ip igmp snooping version This command configures the IGMP snooping version. Use the no form to restore the default. Syntax ip igmp snooping version {1 | 2} no ip igmp snooping version • 1 - IGMP Version 1 •...
  • Page 526: Show Ip Igmp Snooping

    OMMAND NTERFACE ip igmp snooping immediate-leave This command enables IGMP immediate leave for specific VLAN. Use the no form to disable the feature for a VLAN. Syntax [no] ip igmp snooping immediate-leave Default Setting Disabled Command Mode Interface Configuration (VLAN) Command Usage The IGMP snooping immediate-leave feature enables a Layer 2 LAN interface to be removed from the multicast forwarding table without...
  • Page 527 ULTICAST ILTERING OMMANDS Command Usage See “Configuring IGMP Snooping and Query Parameters” on page 3-207 for a description of the displayed items. Example The following shows the current IGMP snooping configuration: Console#show ip igmp snooping Service status: Enabled Querier status: Disabled Query count: Query interval:...
  • Page 528: Igmp Query Commands (Layer 2)

    OMMAND NTERFACE Example The following shows the multicast entries learned through IGMP snooping for VLAN 1: Console#show mac-address-table multicast vlan 1 igmp-snooping VLAN M'cast IP addr. Member ports Type ---- --------------- ------------ ------- 224.1.2.3 Eth1/11 IGMP Console# IGMP Query Commands (Layer 2) Table 4-67 IGMP Query Commands (Layer 2) Command Function...
  • Page 529 ULTICAST ILTERING OMMANDS If enabled, the switch will serve as querier if elected. The querier is responsible for asking hosts if they want to receive multicast traffic. Example Console(config)#ip igmp snooping querier Console(config)# ip igmp snooping query-count This command configures the query count. Use the no form to restore the default.
  • Page 530 OMMAND NTERFACE Related Commands ip igmp snooping query-max-response-time (4 -240) ip igmp snooping query-interval This command configures the query interval. Use the no form to restore the default. Syntax ip igmp snooping query-interval seconds no ip igmp snooping query-interval seconds - The frequency at which the switch sends IGMP host-query messages.
  • Page 531 ULTICAST ILTERING OMMANDS Command Mode Global Configuration Command Usage • The switch must be using IGMPv2 for this command to take effect. • This command defines the time after a query, during which a response is expected from a multicast client. If a querier has sent a number of queries defined by the ip igmp snooping query-count, but a client has not responded, a countdown timer is started using an initial value set by this command.
  • Page 532: Static Multicast Routing Commands

    OMMAND NTERFACE Default Setting 300 seconds Command Mode Global Configuration Command Usage The switch must use IGMPv2 for this command to take effect. Example The following shows how to configure the default timeout to 300 seconds. Console(config)#ip igmp snooping router-port-expire-time 300 Console(config)# Related Commands ip igmp snooping version (4 -235)
  • Page 533: Show Ip Igmp Snooping Mrouter

    ULTICAST ILTERING OMMANDS - port - Port number. (Range: 1-30) - port-channel channel-id (Range: 1-6) Default Setting No static multicast router ports are configured. Command Mode Global Configuration Command Usage Depending on your network connections, IGMP snooping may not always be able to locate the IGMP querier. Therefore, if the IGMP querier is a known multicast router/switch connected over the network to an interface (port or trunk) on your router, you can manually configure that interface to join all the current multicast groups.
  • Page 534: Ip Interface Commands

    OMMAND NTERFACE Example The following shows that port 11 in VLAN 1 is attached to a multicast router. Console#show ip igmp snooping mrouter vlan 1 VLAN M'cast Router Ports Type ---- ------------------- ------- Eth 1/11 Static Eth 1/12 Dynamic Console# IP Interface Commands An IP addresses may be used for management access to the switch over your network.
  • Page 535 IP I NTERFACE OMMANDS ip address This command sets the IP address for the currently selected VLAN interface. Use the no form to restore the default IP address. Syntax ip address {ip-address netmask | bootp | dhcp} no ip address •...
  • Page 536: Ip Dhcp Restart

    OMMAND NTERFACE access to the switch. If you assign an IP address to any other VLAN, the new IP address overrides the original IP address and this becomes the new management VLAN. Example In the following example, the device is assigned an address in VLAN 1. Console(config)#interface vlan 1 Console(config-if)#ip address 192.168.1.5 255.255.255.0 Console(config-if)#...
  • Page 537 IP I NTERFACE OMMANDS Example In the following example, the device is reassigned the same address. Console(config)#interface vlan 1 Console(config-if)#ip address dhcp Console(config-if)#exit Console#ip dhcp restart Console#show ip interface IP address and netmask: 192.168.1.54 255.255.255.0 on VLAN 1, and address mode: Dhcp. Console# Related Commands ip address (4 -245)
  • Page 538: Show Ip Interface

    OMMAND NTERFACE Related Commands show ip redirects (4 -248) show ip interface This command displays the settings of an IP interface. Default Setting All interfaces Command Mode Privileged Exec Example Console#show ip interface IP address and netmask: 192.168.1.54 255.255.255.0 on VLAN 1, and address mode: User specified.
  • Page 539 IP I NTERFACE OMMANDS ping This command sends ICMP echo request packets to another node on the network. Syntax ping host [size size] [count count] • host - IP address or IP alias of the host. • size - Number of bytes in a packet. (Range: 32-512, default: 32) The actual packet size will be eight bytes larger than the size specified because the switch adds header information.
  • Page 540: Table 4-70 Ip Source Guard Commands

    OMMAND NTERFACE Example Console#ping 10.1.0.9 Type ESC to abort. PING to 10.1.0.9, by 5 32-byte payload ICMP packets, timeout is 5 seconds response time: 10 ms response time: 10 ms response time: 10 ms response time: 10 ms response time: 0 ms Ping statistics for 10.1.0.9: 5 packets transmitted, 5 packets received (100%), 0 packets lost (0%) Approximate round trip times:...
  • Page 541: Ip Source Guard Commands

    IP S OURCE UARD OMMANDS ip source-guard This command configures the switch to filter inbound traffic based source IP address, or source IP address and corresponding MAC address. Use the no form to disable this function. Syntax [no] ip source-guard {sip | sip-mac} •...
  • Page 542 OMMAND NTERFACE • Static addresses entered in the source guard binding table with the ip source-guard binding command (page 4-253) are automatically configured with an infinite lease time. Dynamic entries learned via DHCP snooping are configured by the DHCP server itself; static entries include a manually configured lease time.
  • Page 543 IP S OURCE UARD OMMANDS ip source-guard binding This command adds a static address to the source-guard binding table. Use the no form to remove a static entry. Syntax ip source-guard mac-address vlan vlan-id ip-address interface ethernet unit/port no ip source-guard mac-address vlan vlan-id •...
  • Page 544 OMMAND NTERFACE - If there is an entry with same VLAN ID and MAC address, and the type of entry is static IP source guard binding, then the new entry will replace the old one. - If there is an entry with same VLAN ID and MAC address, and the type of the entry is dynamic DHCP snooping binding, then the new entry will replace the old one and the entry type will be changed to static IP source guard binding.
  • Page 545: Dhcp Snooping Commands

    DHCP S NOOPING OMMANDS show ip source-guard binding This command shows the source guard binding table. Command Mode Privileged Exec Example Console#show ip source-guard binding MacAddress IpAddress Lease(sec) Type VLAN Interface ----------------- ------------- ---------- --------- ---- --------- 11-22-33-44-55-66 192.168.0.99 0 Static 1 Eth 1/5 Console# DHCP Snooping Commands...
  • Page 546: Ip Dhcp Snooping

    OMMAND NTERFACE Table 4-71 DHCP Snooping Commands Command Function Mode Page ip dhcp snooping Displays the static host name-to-address 4-263 database flash mapping table show ip dhcp Displays the configuration for DNS 4-263 snooping services show ip dhcp Displays entries in the DNS cache 4-264 snooping binding ip dhcp snooping...
  • Page 547 DHCP S NOOPING OMMANDS (Dynamic-DHCP-Binding, Static-DHCP-Binding), VLAN identifier, and port identifier. • When DHCP snooping is enabled, the rate limit for the number of DHCP messages that can be processed by the switch is 100 packets per second. Any DHCP packets in excess of this limit are dropped. •...
  • Page 548: Ip Dhcp Snooping Vlan

    OMMAND NTERFACE • If the DHCP snooping is globally disabled, all dynamic bindings are removed from the binding table. • Additional considerations when the switch itself is a DHCP client – The port(s) through which the switch submits a client request to the DHCP server must be configured as trusted (ip dhcp snooping trust, page 4-259).
  • Page 549: Ip Dhcp Snooping Trust

    DHCP S NOOPING OMMANDS Command Usage • When DHCP snooping enabled globally using the ip dhcp snooping command (page 4-256), and enabled on a VLAN with this command, DHCP packet filtering will be performed on any untrusted ports within the VLAN as specified by the ip dhcp snooping trust command (page 4-259).
  • Page 550 OMMAND NTERFACE Command Usage • An untrusted interface is an interface that is configured to receive messages from outside the network or firewall. A trusted interface is an interface that is configured to receive only messages from within the network. •...
  • Page 551: Ip Dhcp Snooping Information Option

    DHCP S NOOPING OMMANDS Command Mode Global Configuration Command Usage If MAC address verification is enabled, and the source MAC address in the Ethernet header of the packet is not same as the client’s hardware address in the DHCP packet, the packet is dropped. Example This example enables MAC address verification.
  • Page 552: Ip Dhcp Snooping Information Policy

    OMMAND NTERFACE • When the DHCP Snooping Information Option is enabled, clients can be identified by the switch port to which they are connected rather than just their MAC address. DHCP client-server exchange messages are then forwarded directly between the server and client without having to flood them to the entire VLAN.
  • Page 553: Ip Dhcp Snooping Database Flash

    DHCP S NOOPING OMMANDS Example Console(config)#ip dhcp snooping information policy drop Console(config)# ip dhcp snooping database flash This command writes all dynamically learned snooping entries to flash memory. Command Mode Global Configuration Command Usage This command can be used to store the currently learned dynamic DHCP snooping entries to flash memory.
  • Page 554: Switch Cluster Commands

    OMMAND NTERFACE Example Console#show ip dhcp snooping Global DHCP Snooping status: disable DHCP Snooping is configured on the following VLANs: Verify Source Mac-Address: enable Interface Trusted ---------- ---------- Eth 1/1 Eth 1/2 Eth 1/3 Eth 1/4 Eth 1/5 show ip dhcp snooping binding This command shows the DHCP snooping binding table entries.
  • Page 555: Table 4-72 Switch Cluster Commands

    WITCH LUSTER OMMANDS Table 4-72 Switch Cluster Commands Command Function Mode Page cluster Configures clustering on the switch 4-256 cluster Configures the switch as a cluster 4-258 commander Commander cluster ip-pool Sets the cluster IP address pool for 4-259 Members cluster member Sets Candidate switches as cluster members GC 4-260...
  • Page 556: Cluster Commander

    OMMAND NTERFACE • Switch clusters are limited to a single IP subnet (Layer 2 domain). • A switch can only be a Member of one cluster. • Configured switch clusters are maintained across power resets and network changes. Example Console(config)#cluster Console(config)# cluster commander This command enables the switch as a cluster Commander.
  • Page 557 WITCH LUSTER OMMANDS cluster ip-pool This command sets the cluster IP address pool. Use the no form to reset to the default address. Syntax cluster ip-pool <ip-address> no cluster ip-pool - ip-address - The base IP address for IP addresses assigned to cluster Members.
  • Page 558 OMMAND NTERFACE cluster member This command configures a Candidate switch as a cluster Member. Use the no form to remove a Member switch from the cluster. Syntax cluster member mac-address <mac-address> id <member-id> no cluster member mac-address <member-id> - mac-address - The MAC address of the Candidate switch. - member-id - The ID number to assign to the Member switch.
  • Page 559: Show Cluster

    WITCH LUSTER OMMANDS Command Usage • This command only operates through a Telnet connection to the Commander switch. Managing cluster Members using the local console CLI on the Commander is not supported. • There is no need to enter the username and password for access to the Member switch CLI.
  • Page 560: Show Cluster Candidates

    OMMAND NTERFACE Example Console#show cluster members Cluster Members: ID: 1 Role: Active member IP Address: 10.254.254.2 MAC Address: 00-12-cf-23-49-c0 Description: SMC6152L2 Console# show cluster candidates This command shows the discovered Candidate switches in the network. Command Mode Privileged Exec Example Console#show cluster candidates Cluster Candidates: Role...
  • Page 561: Software Specifications

    PPENDIX OFTWARE PECIFICATIONS Software Features Authentication Local, RADIUS, TACACS, Port (802.1X), HTTPS, SSH, Port Security Access Control Lists DHCP Client Port Configuration 1000BASE-T: 10/100 Mbps at half/full duplex, 1000 Mbps at full duplex 1000BASE-SX/LX/LH - 1000 Mbps at full duplex (SFP), Flow Control Full Duplex: IEEE 802.3x Half Duplex: Back pressure...
  • Page 562: Management Features

    OFTWARE PECIFICATIONS Spanning Tree Protocol (STP, IEEE 802.1D) Rapid Spanning Tree Protocol (RSTP, IEEE 802.1w) VLAN Support Up to 255 groups; port-based, protocol-based, or tagged (802.1Q), GVRP for automatic VLAN learning, private VLANs Class of Service Supports eight levels of priority and Weighted Round Robin Queueing (which can be configured by VLAN tag or port), Layer 3/4 priority mapping: IP DSCP Multicast Filtering...
  • Page 563: Standards

    OFTWARE PECIFICATIONS Groups 1, 2, 3, 9 (Statistics, History, Alarm, Event) Standards IEEE 802.1D Spanning Tree Protocol and traffic priorities IEEE 802.1p Priority tags IEEE 802.1Q VLAN IEEE 802.1v Protocol-based VLANs IEEE 802.1w Rapid Spanning Tree Protocol IEEE 802.1X Port Authentication IEEE 802.3-2005 Ethernet, Fast Ethernet, Gigabit Ethernet Link Aggregation Control Protocol (LACP)
  • Page 564 OFTWARE PECIFICATIONS Extensible SNMP Agents MIB (RFC 2742) Forwarding Table MIB (RFC 2096) IGMP MIB (RFC 2933) Interface Group MIB (RFC 2233) Interfaces Evolution MIB (RFC 2863) IP Multicasting related MIBs MAU MIB (RFC 2668) MIB II (RFC 1213) Port Access Entity MIB (IEEE 802.1X) Port Access Entity Equipment MIB Private MIB RADIUS Authentication Client MIB (RFC 2621)
  • Page 565: Troubleshooting

    PPENDIX ROUBLESHOOTING Problems Accessing the Management Interface Table B-1 Troubleshooting Chart Symptom Action Cannot connect using • Be sure the switch is powered up. Telnet, web browser, • Check network cabling between the management station or SNMP software and the switch. •...
  • Page 566 (9600, 19200, 38400, program via a serial 57600, 115200 bps). port connection • Check that the null-modem serial cable conforms to the pin-out connections provided in the Installation Guide. Forgot or lost the • Contact SMC Technical Support for help. password...
  • Page 567: Using System Logs

    SING YSTEM Using System Logs If a fault does occur, refer to the Installation Guide to ensure that the problem you encountered is actually caused by the switch. If the problem appears to be caused by the switch, follow these steps: 1.
  • Page 568 ROUBLESHOOTING...
  • Page 569: Glossary

    LOSSARY Access Control List (ACL) ACLs can limit network traffic and restrict access to certain users or devices by checking each packet for certain IP or MAC (i.e., Layer 2) information. Boot Protocol (BOOTP) BOOTP used to provide bootup information for network devices, including IP address information, the address of the TFTP server that contains the devices system files, and the name of the boot file.
  • Page 570 LOSSARY Dynamic Host Control Protocol (DHCP) Provides a framework for passing configuration information to hosts on a TCP/IP network. DHCP is based on the Bootstrap Protocol (BOOTP), adding the capability of automatic allocation of reusable network addresses and additional configuration options. Extensible Authentication Protocol over LAN (EAPOL) EAPOL is a client authentication protocol used by this switch to verify the network access rights for any device that is plugged into the switch.
  • Page 571 LOSSARY IEEE 802.1D Specifies a general method for the operation of MAC bridges, including the Spanning Tree Protocol. IEEE 802.1Q VLAN Tagging—Defines Ethernet frame tags which carry VLAN information. It allows switches to assign endstations to different virtual LANs, and defines a standard way for VLANs to communicate across switched networks.
  • Page 572: Igmp Query

    LOSSARY IGMP Snooping Listening to IGMP Query and IGMP Report packets transferred between IP Multicast Routers and IP Multicast host groups to identify IP Multicast group members. IGMP Query On each subnetwork, one IGMP-capable device will act as the querier — that is, the device that asks all hosts to report on the IP multicast groups they wish to join or to which they already belong.
  • Page 573: Multicast Switching

    LOSSARY Link Aggregation Control Protocol (LACP) Allows ports to automatically negotiate a trunked link with LACP-configured ports on another device. Management Information Base (MIB) An acronym for Management Information Base. It is a set of database objects that contains information about a specific device. MD5 Message-Digest Algorithm An algorithm that is used to create digital signatures.
  • Page 574: Port Mirroring

    LOSSARY Port Mirroring A method whereby data on a target port is mirrored to a monitor port for troubleshooting with a logic analyzer or RMON probe. This allows data on the target port to be studied unobstructively. Port Trunk Defines a network link aggregation and trunking method which specifies how to create a single high-speed logical link that combines several lower-speed physical links.
  • Page 575 LOSSARY Simple Mail Transfer Protocol (SMTP) A standard host-to-host mail transport protocol that operates over TCP, port 25. Simple Network Management Protocol (SNMP) The application protocol in the Internet suite of protocols which offers network management services. Simple Network Time Protocol (SNTP) allows a device to set its internal clock based on periodic updates SNTP from a Network Time Protocol (NTP) server.
  • Page 576 LOSSARY Trivial File Transfer Protocol (TFTP) A TCP/IP protocol commonly used for software downloads. User Datagram Protocol (UDP) provides a datagram mode for packet-switched communications. It uses IP as the underlying transport mechanism to provide access to IP-like services. UDP packets are delivered just like IP packets – connection-less datagrams that may be discarded before reaching their targets.
  • Page 577: Index

    NDEX Numerics 802.1x, port authentication 4-104 default gateway, configuration 3-20 4-247 default priority, ingress port 3-186 4-223 default settings, system 1-7 DHCP 3-22 4-245 acceptable frame type 3-174 4-202 client 3-20 Access Control List See ACL dynamic configuration 2-7 Differentiated Code Point Service See Extended IP 3-98 4-113 4-114...
  • Page 578 NDEX HTTPS 3-74 4-41 4-92 4-93 HTTPS, secure server 3-74 4-41 main menu 3-5 IEEE 802.1D 3-145 4-184 Management Information Bases IEEE 802.1w 3-145 4-184 (MIBs) A-3 IEEE 802.1x 4-104 mirror port, configuring 3-131 4-160 IGMP multicast filtering 3-206 3-218 3-239 groups, displaying 3-214 4-237...
  • Page 579 NDEX 4-158 software capabilities 3-111 4-149 displaying version 3-15 4-81 duplex mode 3-111 4-147 downloading 3-25 4-84 flow control 3-111 4-150 Spanning Tree Protocol See STA speed 3-111 4-147 specifications, software A-1 ports, configuring 3-108 4-145 SSH, configuring 3-77 4-49 4-50 ports, mirroring 3-131 4-160...
  • Page 580 NDEX trunk configuration 3-113 4-164 LACP 3-117 4-166 static 3-115 4-166 upgrading software 3-25 4-84 user password 3-68 4-35 4-36 –??, – VLANs 3-161 4-198 4-212 adding static members 3-170 3-172 4-206 creating 3-168 4-199 description 3-161 displaying basic information 3-165 4-217 displaying port members 3-166 4-208...
  • Page 582 Fax 82-2-553-7202 Japan: 81-45-224-2332 Fax 81-45-224-2331 Australia: 61-2-8875-7887 Fax 61-2-8875-7777 India: 91-22-8204437 Fax 91-22-8204443 If you are looking for further contact information, please visit www.smc.com. 20 Mason Model Number: SMC6152L2 Irvine, CA 92618 Publication Number: 149100032900A E022007-MT-R01 Phone: (949) 679-8000...

This manual is also suitable for:

Tigerswitch smc6152l2

Table of Contents