Page 1
MAGNUM 6K FAMILY OF SWITCHES Managed Network Software (MNS) MNS-6K-SECURE 14.1.4 and MNS-6K 4.1.4 CLI User Guide...
Page 2
If you need information on a specific feature in Web Management Interface, use the online help provided in the interface. If you need further information or data sheets on GarrettCom Magnum 6K family of switches, refer to the GarrettCom web links at: http://www.garrettcom.com/managed_switches.htm...
T able of Contents 1 – Conventions Followed ... 19 Flow of the User Guide ... 21 2 – Getting Started ... 23 Before starting ... 23 MNS-6K Software Updates ... 24 Console connection ... 24 Console setup ... 25 Console screen ...
Page 5
Upgrading to MNS-6K-SECURE ... 36 List of commands in this chapter ... 37 3 – IP Address and System Information ... 39 IP Addressing ... 39 Importance of an IP address ... 39 DHCP and bootp ... 40 Bootp Database ... 40 Configuring Auto/DHCP/Bootp/Manual ...
Page 6
Configuring IPv6 ... 74 List of commands in this chapter ... 75 5 – DHCP Server ... 77 Modes of Operation ... 78 Technical Details ... 79 DHCP Discovery ... 79 DHCP Offers ... 80 DHCP Request ... 80 DHCP Acknowledgement ... 80 DHCP Information ...
Page 7
8 – Access Using RADIUS ... 106 RADIUS ... 106 802.1x ... 106 Configuring 802.1x ... 109 List of commands in this chapter ... 114 9 – Access Using TACACS+ ... 116 TACACS – flavors and history ... 116 TACACS+ Flow ... 117 TACACS+ Packet ...
Page 8
Using STP ... 148 List of commands in this chapter ... 158 13 – Rapid Spanning Tree Protocol (RSTP) ... 159 RSTP concepts ... 159 Transition from STP to RSTP ... 160 Configuring RSTP ... 161 List of commands in this chapter ... 172 14 –...
Page 9
Configuring QoS ... 208 List of commands in this chapter ... 213 18 – IGMP ... 214 IGMP concepts ... 214 IGMP-L2 ... 218 Configuring IGMP ... 221 List of commands in this chapter ... 228 19 – GVRP ... 230 GVRP concepts ...
Page 10
System Events ... 272 MAC Address Table ... 277 List of commands in this chapter ... 278 APPENDIX 1 - Command listing by Chapter ... 281 Chapter 2 – Getting Started ... 281 Chapter 3 – IP Address and System Information ... 282 Chapter 4 –...
Page 11
Selecting the proper version ... 337 Downloading the MNS-6K software ... 337 Next steps ... 341 2. Preparing to load the software ... 342 Accessing the switch ... 342 Serial Connection ... 342 Network Access ... 343 Saving the Configuration ... 343 Serial Connection ...
IGURE commands to switch between the levels is not shown here..26 3 – As the switch tries to determine its mode of operation and its IP address, it may IGURE assign and release the IP address a number of times. A continuous ping to the switch will show an intermittent response ...
Page 13
28 – setting up ssh – since telnet sends the information in clear text, make sure that IGURE telnet is disabled to secure the switch. Do not telnet to the switch to disable telnet. Preferred method is to do that via the console or using SWM. The client access is not shown here.
Page 14
59 – Enabling and disabling port security ... 92 IGURE 60 – Viewing port security settings on a switch. On port 9, learning is enabled. This port IGURE has 6 stations connected to it with the MAC addresses as shown. Other ports have learning disabled and the MAC addresses are not configured on those ports ...
Page 15
93 – A fault in the ring interrupts traffic. The blocking port now becomes forwarding so IGURE that traffic can reach all switches in the network Note – the mP62 as well as the ESD42 switches support LLL and can participate in S-Ring as an access switch ... 179...
Page 16
94 – More than one S-Ring pair can be selected and more than one S-Ring can be IGURE defined per switch. Note – the mP62 as well as the ES42 switches support LLL and can participate in S-Ring as an access switch ... 180 95 –...
Page 17
Each switch has the IGMPL2 turned on. Each switch can exchange the IGMP query message and respond properly. R4 wants to view surveillance traffic from T1. As shown by (1), a join request is sent by R4. Once the join report information is exchanged, only R4 receives the video surveillance traffic, as shown by (2).
Page 18
152 – Here, you can view the certificate, permanently make an exception and confirm the IGURE exception. The locations to do those are identified in this figure ... 332 153 – Self signed certificate from GarrettCom Inc for MNS-6K... 333 IGURE 154 – Using IE 7 ... 334 IGURE 155 –...
Page 19
170 – Dialog for upgrading the image using tftp ... 351 IGURE 171 – Updating the boot code over the network using the upgrade command. Make sure IGURE to reboot the switch after the boot loader upgrade is completed ... 353 xviii...
Commands typed by a user will be shown in a different color and this font Switch prompt – shown in Bold font, with a “# or >” at the end. For the document we will use Magnum6K25#...
Page 21
Windows-XP based machine when in doubt. Supported MNS-6K Version – The documentation reflects features of MNS-6K version 3.4 or later. If your switch is not at the current version, GarrettCom Inc. recommends upgrade to the latest version. Please refer to the GarrettCom Web site for information on upgrading the MNS-6K software on Magnum 6K family of switches.
VLANs can be setup and managed. At this stage the network and the switch are secured. It is now critical to make the network more reliable. The User Guide switches gears and talks about STP, RSTP and S- Ring technologies which can be used for making the network reliable.
Page 23
Chapter 18 focuses on IGMP. Chapter 19 focuses on GVRP. Chapter 20 shows how the SNMP parameters can be setup for managing the switch with network management software such as Castle Rock SNMPc™ Chapter 21 includes miscellaneous commands to improve the overall ease of use and...
2 – Getting Started First few simple steps … his section explains how the GarrettCom Magnum 6K family of switches can be setup using the console port on the switch. Some of the functionality includes setting up the IP address of the switch, securing the switch with a user name and password, setting up VLAN’s and more.
MNS-6K software. The documentation on how to update the MNS-6K is included as an Appendix in this manual. The Login prompt is shown when the connection to the GarrettCom Magnum 6K Switch is successful and the switch is ready for the configuration commands. Should you get a boot prompt, please contact GarrettCom technical support.
Console setup Connect the console port on the switch to the serial port on the computer using the serial cable listed above. The settings for the HyperTerminal software emulating a VT100 are shown in Figure 1 below. Make sure the serial parameters are set as shown (or bps = 38400, data bits=8, parity=none, stop bits=1, flow control=none).
To setup the switch, the IP address and other relevant TCP/IP parameters have to be specified. A new GarrettCom Magnum switch looks for a DHCP or a BootP server. If a DHCP or a BootP server is present, the switch will be assigned an IP address from those servers.
Once the switch assigns itself an IP address the intermittent ping issue is no longer prevalent. 3 – As the switch tries to determine its mode of operation and its IP address, it may assign and IGURE release the IP address a number of times.
Page 29
• Power off the switch (or a software reboot as discussed below) • Power on the switch – login with the new login name and password • From the PC (or from the switch) ping the IP address specified for the switch to ensure connectivity •...
Some of the parameters in the Magnum 6K family of switches are shown above. The list of parameters below indicates some of the key parameters on the switch and the recommendations for changing them (or optionally keeping them the same).
Manager prompt. User management A maximum of five users can be added per switch for MNS-6K and a maximum of twenty users can be added for MNS-6K-SECURE. Users can be added, deleted or changed from a manager level account. There can be more than one manager account, subject to the maximum number of users on the switch.
M A G N U M S W I T C H E S , user Magnum6K25# add user=peter level=2 Magnum6K25(user)## Enter User Password:****** Confirm New Password:****** Magnum6K25(user)## 8 - Adding a user with Manager level privilege IGURE In this example, user ‘peter’ was added with Manager privilege. Delete User Syntax delete user=<name>...
M A G N U M S W I T C H E S , Magnum6K25(user)## 11 - Changing the privilege levels for a user IGURE In this example, user ‘peter’ was modified to Operator privileges. Modifying Access Privileges User access allows the network administrators to control as to who has read and write access and for which set of command groups.
Page 34
After this command, user Peter will not have read access to the VLAN, system and user groups. In another example, if the user Peter is not allowed to access the switch using telnet, the access can be blocked using the steps shown below:...
M A G N U M S W I T C H E S , Help Typing the ‘help’ command lists the commands you can execute at the current privilege level. For example, typing ‘help’ at the Operator level shows help Magnum6K25>...
M A G N U M S W I T C H E S , show active-vlan show address-table show age show alarm show arp show auth <config|ports> show backpressure show bootmode --more-- 16 - Options for the ‘show’ command IGURE Context help Other ways to display help, specifically, with reference to a command or a set of...
Upgrading to MNS-6K-SECURE MNS-6K-SECURE license can be purchased with the purchase of the switch. In that case a license key will be issues to you with the delivery of the switch. This license key will be needed to upgrade the version.
[add|del] – to set IP address on the switch Syntax save – save changes made to the configuration Syntax reboot – restart the switch – same effect as physically turning off the power Syntax show setup – show setup parameters Syntax show config –...
Page 39
M A G N U M S W I T C H E S , Syntax <TAB> - listing all commands available at the privilege level Syntax <command string> <TAB> - options for a command Syntax <first character of the command> <TAB> - listing commands starting with the character Syntax logout –...
(e.g. class A, Class B and Class C addressing). Importance of an IP address Without an IP address, the switch will operate as a standalone Layer 2 switch. Without an IP address, you cannot • Use the web interface to manage the switch •...
A sample entry by which the bootp software will look up the database and update the IP address and subnet mask of the switch would be as follows M6k25switch:\...
By default, the switch is configured for ‘auto’. As describer earlier in Chapter 2, in the auto mode, the switch will first look for a DHCP server. If a DHCP server is not found, it will then look for a BootP server. If that server is not found, the switch will first inspect to see if the IP address 192.168.1.2 with a netmask of 255.255.255.0 is free.
IGURE Using Telnet By default, the telnet client is enabled on the GarrettCom Magnum 6K family of switches. MNS-6K supports five simultaneous sessions on a switch – four telnet sessions and one console session. This allows many users to view, discuss or edit changes to the MNS-6K.
While MNS-6K times out an idle telnet session, it may be useful to see who is currently connected to the switch. It may also be useful for a person to remotely terminate a telnet session. To facilitate this, MNS-6K supports two commands Syntax show session Syntax kill session id=<session>...
In the above example, the user with user-id peter is given telnet access (which was disabled earlier in Chapter 2). Then multiple users telnet into the switch. This is shown using the “show session” command. The user operator session is then terminated using the “kill session” command.
Page 46
M A G N U M S W I T C H E S , strong algorithms such as blowfish, 3DES, IDEA etc.). Encryption provides confidentiality and integrity of data. . The goal of SSH was to replace the earlier rlogin, Telnet and rsh protocols, which did not provide strong authentication or guarantee confidentiality.
Page 47
M A G N U M S W I T C H E S , • The user authentication layer (RFC 4252). This layer handles client authentication and provides a number of authentication methods. Authentication is client-driven, a fact commonly misunderstood by users; when one is prompted for a password, it may be the SSH client prompting, not the server.
Page 48
Session Inactivity Time (min) show sysconfig ML2400# System Name System Contact System Location : Yes : Yes : Yes : Yes : Yes : Yes : VT100 : 38400 : None : 10 : Magnum 6K25 : support@garrettcom.com : Fremont, CA...
IGURE the switch. Do not telnet to the switch to disable telnet. Preferred method is to do that via the console or using SWM. The client access is not shown here. Commonly an application like PUTTY is used to access the switch via ssh. Use the show console command to verify telnet is turned off SSH sessions cannot originate from the switch to another device.
M A G N U M S W I T C H E S , show dns Magnum6K25# DNS Server Address : 0.0.0.0 Domain Name : Not Set DNS Status : Disabled. set dns server=192.168.5.254 domain=customer-domain.com Magnum6K25# Domain Name Server Set. show dns Magnum6K25# DNS Server Address : 192.168.5.254...
To be compliant with IT or other policies the console parameters can be changed from the CLI interface. This is best done by setting the IP address and then telnet over to the switch. Once connected using telnet, the serial parameters can be changed. If you are using the serial port, remember to set the VT-100 emulation software properties to match the new settings.
32 - System parameters using the show sysconfig command. Most parameters here can be IGURE changed. System variables can be changed. Below is a list of system variables which GarrettCom recommends changing. System Name: Using a unique name helps you to identify individual devices in a network.
34 - Setting the system date, time and time zone IGURE Rebooting the switch resets the time to the default. Synchronizing with the time server resets the time. Other relevant date and time commands are: M N S - 6 K...
Simple Network Time Protocol (SNTP). To specify the SNTP server, one has to 1) Set the IP parameters on the switch 2) Define the SNTP parameters To set the SNTP parameter, enter the SNTP configuration mode from the manager. The ‘setsntp, sync, sntp’...
M A G N U M S W I T C H E S , Syntax sntp [enable|disable] For example, to set the SNTP server to be 204.65.129.201 and a number of retries set to 3 times); allowing the synchronization to be ever 5 hours, the following commands are used sntp Magnum6K25#...
“passive ftp” in which the client initiating the connection initiates both the data and command connection request. Most companies prefer passive ftp and GarrettCom MNS-6K provides means to operate in those environments. M N S - 6 K...
Page 57
This can also perform the task of exporting a configuration file or uploading a new image to the switch [host=<hostname>] [ip=<ipaddress>] [file=<filename>] [user=<user>] [pass=<password>] – parameters associated with ftp server for proper communications with the server The “sftp”...
The details are conceptually explained in the figure below. 38 – Based on the sftp, ftp, tftp or xmodem commands – the MNS-6K based switch can IGURE upload or download different types of files and images .Other files such as log files, hosts file can also be saved or loaded onto a switch Prior to Release 3.2, the configuration was saved only as a binary object (file).
S W I T C H E S , object or in a newer format as an ASCII (readable) file. The new format is preferred by GarrettCom and GarrettCom recommends all configuration files be saved in the new format. GarrettCom recommends saving the configuration in the old format only if there are multiple Magnum 6K family of switches on the network and they all run different versions of MNS-6K.
# test environment prior to use in a "live" production network. # All modifications are made at the User's own risk and are # subject to the limitations of the GarrettCom software End User # License Agreement (EULA). Incorrect usage may result in # network shutdown.
M A G N U M S W I T C H E S , System portion of the file only. GarrettCom recommends editing the “script” file (see below) Note 2 – File names cannot have special characters such as *#!@$^&* space and control characters.
41 – Example of Script file. Note all the commands are CLI commands. This script provides IGURE insights into the configuration of Magnum MNS-6K settings. GarrettCom recommends that modifications of this file and the commands should be verified by the User in a test environment prior to use in a "live"...
M A G N U M S W I T C H E S , ==================================================================== server Magnum6K25(access)## 42 – Creating host entries on MNS-6K IGURE Syntax more <enable|disable|show> - enable or disable the scrolling of lines one page at a time Example more show Magnum6K25#...
M A G N U M S W I T C H E S , gvrp GVRP settings snmp SNMP settings Web and SSL/TLS settings tacacs TACACS+ settings auth 802.1x Settings igmp IGMP Settings smtp SMTP settings If the module name is not specified the whole configuration is displayed. show config Magnum6K25# [HARDWARE]...
M A G N U M S W I T C H E S , deftrapcomm=public authtrap=disable com2sec_count=0 group_count=0 view_count=1 view1_name=all view1_type=included view1_subtree=.1 view1_mask=ff --more— <additional lines deleted for succinct viewing> 45 – displaying specific modules using the IGURE show config module=snmp,system Magnum6K25# [HARDWARE] type=Magnum6K25...
‘kill config’. This command is a “hidden command” i.e. the on-line help and other help functions normally do not display this command. The ‘kill config’ command resets everything to the factory default. The reset does not take place till the switch reboots. It is recommended to save the configuration (using ‘saveconf’ command discussed above) before using the ‘kill config’...
48 – Erasing configuration without erasing the IP address IGURE Once the configuration is erased, please reboot the switch for the changes to take effect. Displaying Serial Number To display the serial number of the unit, use the command “show setup” as shown below. The command also displays other information related to the switch.
– do not set the IP address automatically auto - the switch will first look for a DHCP server. If a DHCP server is not found, it will then look for a BootP server. If that server is not found, the switch will check to see if the switch had a pre-configured IP address.
Page 69
The modules are system, event, port, bridge, stp, ps, mirror, sntp, vlan, gvrp and snmp Syntax show session – display telnet sessions active on the switch Syntax kill session id=<session> - kill a specific telnet session Syntax set ftp mode=<normal|passive>...
Page 70
This can also perform the task of exporting a configuration file or uploading a new image to the switch [host=<hostname>] [pass=<password>] – parameters associated with ftp server for proper communications with the server Syntax stftp<get|put| list|del >...
This can also perform the task of exporting a configuration file or uploading a new image to the switch Syntax host <add|edit|del> name=<host-name> [ip=<ipaddress>] [user=<user>] [pass=<password>] – create a host entry for accessing host. This is equivalent to creating a host table on many systems.
Page 72
M N S - 6 K U S E R G U I D E Syntax show timezone – shows the system timezone Syntax show date – shows the system date Syntax show uptime – shows the amount of time the switch has been operational...
4 – IPv6 Next generation IP addressing his section explains how the access to the GarrettCom Magnum MNS-6K can setup using IPv6 instead of IPv4 addressing described earlier. IPv6 provides a much larger address space and is required today by many. IPv6 is available in MNS-6K-SECURE version only.
M A G N U M S W I T C H E S , incremental, with few or no critical interdependencies. Most of today's internet uses IPv4, which is now nearly twenty years old. IPv4 has been remarkably resilient in spite of its age, but it is beginning to have problems.
used as an identifier for the node. A single interface may be assigned multiple IPv6 addresses of any type. There are three types of IPv6 addresses. These are unicast, anycast, and multicast. Unicast addresses identify a single interface. Anycast addresses identify a set of interfaces such that a packet sent to an anycast address will be delivered to one member of the set.
– Besides, if the end station supports IPv6 addressing (as most Linux and Windows systems do), one can access the switch using the IPv6 addressing as shown in the example below http://fe80::220:6ff:fe25:ed80 List of commands in this chapter Syntax ipconfig [ip=<ip-address>] [mask=<subnet-mask>] [dgw=<gateway>]...
Page 77
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E...
5 – DHCP Server Access to other devices on the network…. his feature is available in MNS-6K-SECURE only. This section explains how DHCP services can be provided for devices on the network. MNS-6K can provide DHCP services. Network administrators use Dynamic Host Configuration Protocol (DHCP) servers to administer IP addresses and other configuration information to IP devices on the network.
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E As described earlier, the Dynamic Host Configuration Protocol (DHCP) automates the assignment of IP addresses, subnet masks, default gateway, DNS servers and other IP parameters.
M A G N U M S W I T C H E S , intervention. Most administrators prefer to use static IP addresses (which are allocated out for such purposes) instead of using the manual mode. Allocating specific IP address for specific networks or VLANs also aids in securing the network. Firewall rules or access rules can be written and designed for specific address ranges, which are allocated out by the DHCP server.
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E The client broadcasts on the physical subnet to find available servers. Network administrators can configure a local router to forward DHCP packets to a DHCP server on a different subnet.
M A G N U M S W I T C H E S , acknowledgement to the client. The system as a whole expects the client to configure its network interface with the supplied options. DHCP Information The client sends a request to the DHCP server: either to request more information than the server sent with the original DHCP ACK;...
Page 83
M A G N U M S W I T C H E S , Syntax - reserve-ip ip=<ip> [mac=<mac>] - reserve a specific IP address for a device Syntax - clear-reserveip ip=<ip> - clear the reverse IP assigned Syntax - show dhcpsrv <config|status|leases> - display the DHCP server configuration, leases as well as status DHCP Services are available for the default VLAN only.
M A G N U M S W I T C H E S , Gateway : 192.168.10.1 Lease time : 8 Hours dhcpsrv stop Magnum6K25(dhcpserver)## The Server takes few seconds to Stop... exit Magnum6K25(dhcpserver)## Magnum6K25# 51 – Setting up DHCP Server on MNS-6K-SECURE IGURE List of commands in this chapter Syntax - dhcpsrv <start|stop>...
Internet on this topic. SNTP Server is available only on MNS-6K-SECURE Not all models of the GarrettCom 6K family of switches support SNTP server as this functionality requires a clock that needs to be accurate. While all devices can be SNTP clients, a select set of devices can be SNTP servers.
M A G N U M S W I T C H E S , Time or Temps Atomique International (TAI) by inserting leap seconds at intervals of about 18 months. UTC time is disseminated by various means, including radio and satellite navigation systems, telephone modems and portable clocks.
Page 87
M A G N U M S W I T C H E S , Stratum 2 devices will peer with other Stratum 2 devices to provide more stable and robust time for all devices in the peer group. Stratum 2 devices normally act as servers for Stratum 3 NTP requests.
Magnum6K25# 53 – Using the SNTP commands IGURE A Tech Brief on the GarrettCom web site describes how this capability can be used to create time servers in a network. To review this tech brief, please go to www.garrettcom.com Tech Briefs.
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E List of commands in this chapter Syntax sntpserver – enter the SNTP Server configuration mode Syntax sntpsrv <start|stop>...
7 – Access Considerations Securing the switch access…. his section explains how the access to the GarrettCom Magnum MNS-6K can be secured. Further security considerations are also covered such as securing access by IP address or MAC address. Securing access is assumed here that the user is familiar with issues concerning security well as securing access for users and computers on a network.
M A G N U M S W I T C H E S , Port Security The port security feature can be used to block computers from accessing the network by requiring the port to validate the MAC address against a known list of MAC addresses. This port security feature is provided on an Ethernet, Fast Ethernet, or Gigabit Ethernet port.
Page 92
Syntax remove mac=<all|address|list|range> port=<num|list|range> Syntax signal port=<num|list|range> <none|log|trap|logandtrap> Where allow mac – configures the switch to setup allowed MAC addresses on specific ports learn port – configures the switch to learn the MAC addresses associated with specific port or a group of ports show port-security –...
58 – Port security - the port learns the MAC addresses. Note – a maximum of 200 MAC IGURE addresses can be learnt per port and a maximum of 500 per switch. Also, the ‘action’ on the port must be set to none before the port ‘learns’ the MAC address information.
ENABLE NONE Magnum6K25(port-security)## 60 – Viewing port security settings on a switch. On port 9, learning is enabled. This port has 6 IGURE stations connected to it with the MAC addresses as shown. Other ports have learning disabled and the...
Page 95
M A G N U M S W I T C H E S , ENABLE NONE ENABLE NONE 62 – Allowing specific MAC address on specific ports. After the MAC address is specified, the IGURE port or specific ports or a range of ports can be queried as shown Magnum6K25(port-security)## Specified MAC address(es) removed from selected port(s) Magnum6K25(port-security)##...
Page 96
M A G N U M S W I T C H E S , 9) (Optional step) Set the notification to notify the management station on security breach attempts (Use command ‘signal port’ to make a log entry or send a trap) port-security Magnum6K25# Magnum6K25(port-security)##...
M A G N U M S W I T C H E S , Once port security is setup, it is important to manage the log and review the log often. If the signals are sent to the trap receiver, the traps should also be reviewed for intrusion and other infractions.
Page 98
M A G N U M S W I T C H E S , Code Description The above categories are defined for MNS as fatal (or Emergency) alert (same as Alert) crit (or Critical) error (same as Error) warn (or Warning) note (or Notice) info (or Informational) debug (same as Debug)
Page 99
M A G N U M S W I T C H E S , The ‘show log’ command displays the log information and the ‘clear log’ command clears the log entries. Syntax show log [fatal|alert|crit|error|warn|note|info|debug] – display the log Syntax clear log [fatal|alert|crit|error|warn|note|info|debug]–...
Page 100
M A G N U M S W I T C H E S , Note 06-23-2007 05:59:02 P.M SNTP:SNTP Client Started Note 06-23-2007 05:59:09 P.M SNTP:SNTP Time Synchronized Note 06-23-2007 05:59:10 P.M SNTP:SNTP Time Synchronized Note 06-23-2007 05:59:36 P.M CLI:Session Started from Telnet: 192.168.5.2 Note 06-23-2007 05:59:39 P.M SNTP:SNTP Time Synchronized Note 06-23-2007 05:59:40 P.M SNTP:SNTP Time Synchronized Note 06-23-2007 05:59:49 P.M CLI:User manager Login From Telnet: 192.168.5.2...
Page 101
M A G N U M S W I T C H E S , Server Added Magnum6K25 (syslog)## SysLog Status: Disabled Server ID: 1 SysLog Server Host : 192.168.5.2 Server Logging : Disabled Log Events : Default Server ID: 2 SysLog Server Host : 192.168.5.98 Server Logging : Disabled Log Events...
IGURE commands are also displayed The log shows the most recent event at the top of the listing. If the log is filled when the switch detects a new event, the oldest entry is dropped off the listing. As discussed in the prior section, any port can be set to monitor security as well as make a log of the events that take place.
Time – time the event occurred on. See Chapter 3 on setting the switch Log Description – description of event as detected by the switch Severity is one of 8 severities described at the beginning of this section. Authorized managers This feature is available in MNS-6K-SECURE.
M A G N U M S W I T C H E S , deny – deny specified services for specified IP addresses – IP addresses can be individual stations, a group of stations or subnets. The range is determined by the IP address and netmask settings remove –...
Page 105
Syntax allow mac=<address|list|range> port=<num|list|range> - specify a specific MAC address or MAC address list Syntax learn port=<number-list> <enable|disable> - learn MAC addresses connected to the Magnum 6K switch Syntax show port-security – display port security settings Syntax action port=<num|list|range> <none|disable|drop> - action to perform in case of breach of port security Syntax signal port=<num|list|range>...
Page 106
M A G N U M S W I T C H E S , Syntax deny ip=<ipaddress> mask=<netmask> service=<name|list> - deny specific IP address or range of IP addresses Syntax remove ip=<ipaddress> mask=<netmask> - delete a specific IP address from the access or trusted host list Syntax removeall –...
Authentication Server (RADIUS Server). In the figure below, the PC acts as the supplicant. The supplicant is an entity being authenticated and desiring access to the services. The switch is the authenticator. The authenticator enforces authentication before allowing access to services that are accessible via that port. The authenticator is...
Page 108
EAP over RADIUS encapsulates EAP packets onto RADIUS packets for relaying to RADIUS authentication servers. The details of the 802.1x authentication are shown below M N S - 6 K U S E R G U I D E 802.1x 802.1x Switch Switch Authentication Authentication Server (RADIUS) Server (RADIUS)
Page 109
3. The supplicant then sends back its own identification using an EAP-Response/Identity frame to the authenticator (Magnum 6K switch.) The authenticator then relays this to the authentication server by encapsulating the EAP frame on a RADIUS-Access-Request packet 4.
Syntax authserver [ip=<ip-addr>] [udp=<num>] [secret=<string>] - define the RADIUS server – use UDP socket number if the RADIUS authentication is on port other than 1812 Syntax auth <enable|disable> - enables or disables the 802.1x authenticator function on MNS-6K switch Syntax setport port=<num|list|range> [status=<enable|disable>] [control=<auto|forceauth|forceunauth>] [initialize=<assert|deassert>] - setting the...
Page 111
Default value is 30. Values can be from 1 to 65535 seconds Syntax reauth port=<num|list|range> [status=<enable|disable>] [period=<10-86400>] - set values on how the authenticator (Magnum 6K switch) does the re-authentication with the supplicant or port – [mandatory] – ports to be configured status –...
Page 112
auth disable Magnum6K25(auth)## 802.1X Authenticator is disabled. authserver ip=192.168.1.239 secret=secret Magnum6K25(auth)## Successfully set RADIUS Authentication Server parameter(s) Magnum6K25(auth)##auth enable 802.1X Authenticator is enabled. show auth ports Magnum6K25(auth)## Port Status Control ================================================================ Enabled Auto Enabled ForcedAuth Enabled Auto Enabled Auto Enabled Auto Enabled Auto Enabled Auto Enabled Auto...
Page 113
show-port backend Magnum6K25(auth)## Port Supp Timeout Server Timeout (sec) ================================================= portaccess port=2 quiet=120 maxreauth=7 transmit=120 Magnum6K25(auth)## Successfully set port access parameter(s) show-port access Magnum6K25(auth)## Port Quiet Period Max Reauth (sec) ================================================= reauth port=1 status=enable period=300 Magnum6K25(auth)## Successfully set re-authentication parameter(s) Max Request (sec) Tx Period...
M A G N U M S W I T C H E S , show-port reauth Magnum6K25(auth)## Port Reauth Status ================================================= Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled Enabled show-stats port=3 Magnum6K25(auth)## Port 3 Authentication Counters authEntersConnecting...
Syntax authserver [ip=<ip-addr>] [udp=<num>] [secret=<string>] - define the RADIUS server – use UDP socket number if the RADIUS authentication is on port other than 1812 Syntax auth <enable|disable> - enables or disables the 802.1x authenticator function on MNS-6K switch Syntax setport port=<num|list|range> [status=<enable|disable>] [control=<auto|forceauth|forceunauth>] [initialize=<assert|deassert>] - setting the...
Page 116
S W I T C H E S , Syntax reauth port=<num|list|range> [status=<enable|disable>] [period=<10-86400>] - set values on how the authenticator (Magnum 6K switch) does the re-authentication with the supplicant or port – [mandatory] – ports to be configured status – [optional] This enables/disables re-authentication period –...
9 – Access Using TACACS+ Using a TACACS+ server to authenticate access…. his feature is available in MNS-6K-SECURE. TACACS+, short for Terminal Access Controller Access Control System, protocol provides access control for routers, network access servers and other networked computing devices via one or more centralized servers. TACACS+ provides separate authentication, authorization and accounting services.
TACACS+ Flow TACACS works in conjunction with the local user list on the MNS-6K software (operating system.) Please refer to User Management process of authentication as well as authorization is shown in the flow chart below. Login as Operator Login as Operator Is User Manager? Is User Manager? Login as Manager...
M A G N U M S W I T C H E S , is authentication where the user is verified against the network user database. The second stage is authorization, where it is determined whether the user has operator access or manager privileges. TACACS+ Packet Packet encryption is a supported and is a configurable option for the Magnum MNS-6K software.
Page 120
M A G N U M S W I T C H E S , Syntax tacplus <enable|disable> [ order=<tac,local | local,tac>] - enable or disable TACACS authentication, specifying the order in which the server or local database is looked up where “tac,local” implies, first the TACAS+ server, then local logins on the device.
M A G N U M S W I T C H E S , ================================================ 10.21.1.170 10.21.1.123 tacserver delete id=2 Magnum6K25(user)## TACACS+ server is deleted. show tacplus servers Magnum6K25(user)## TACACS+ Server ================================================ 10.21.1.170 tacplus enable Magnum6K25(user)## TACACS+ is enabled. Magnum6K25(user)## 73 –...
Page 122
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E [key=<string>] – [optional for add, mandatory with encrypt] when encryption is enabled, the secret shared key string must be supplied [mgrlevel=<level>] and [oprlevel=<level>] –...
Setup the ports for network speeds, performance as well as for monitoring…. his section explains how individual characteristics of a port on the GarrettCom Magnum 6K family of switches are setup. For monitoring a specific port, the traffic on a port can be mirrored on another port and viewed by protocol analyzers.
Port setup Each port on the GarrettCom Magnum 6K family of switches can be setup specific port characteristics. The command for setting the port characteristics are: Syntax device – enter the device configuration mode Syntax setport port=<port#|list|range>...
speed – specifically sets the speed to be 10 or 100Mbps. Note – this works only with 10/100 ports – with 10Mbps ports, the option is ignored. No error is shown. See speed settings section below. flow – sets up flow control on the port. See Flow Control section below bp –...
M A G N U M S W I T C H E S , with the 802.3u standard, then the port configuration on the switch must be manually set to match the port configuration on the other device. Possible port setting combinations for copper ports are: •...
M A G N U M S W I T C H E S , where xonlimit can be from 3 to 30, default value is 4 xofflimit from 3 to 127, default value is 6 Syntax show flowcontrol Back Pressure Back Pressure is for half duplex operations and the controls provided indicates the number of buffers allowed for incoming traffic before a xon/xoff message is sent.
Page 128
device Magnum6K25# show flowcontrol Magnum6K25(device)## XOnLimit : 4 XOffLimit : 6 flowcontrol xonlimit=10 xofflimit=15 Magnum6K25(device)## XOn Limit set successfully XOff Limit set successfully show flowcontrol Magnum6K25(device)## XOnLimit : 10 XOffLimit : 15 show backpressure Magnum6K25(device)## Rx Buffer Threshold : 28 backpressure rxthreshold=45 Magnum6K25(device)## Rx Buffer Threshold set successfully...
M A G N U M S W I T C H E S , Port Back Pressure Port Events Notify Magnum6K25(device)## Magnum6K25(device)## Keys: E = Enable H = Half Duplex M = Multiple VLAN's LI = Listening F = Forwarding Port Name Status Dplx Media Link -------------------------------------------------------------------------------------------------------------...
M A G N U M S W I T C H E S , programs (including some network games) are used. Storms can reduce network performance and cause bridges, routers, workstations, servers and PC's to slow down or even crash. Preventing broadcast storms The Magnum 6K family of switches is capable of detecting and limiting storms on each port.
M A G N U M S W I T C H E S , Enabled 19531 Enabled 19531 Enabled 19531 Enabled 19531 Magnum 25(device) # Broadcast Rate Threshold set Magnum6K25(device)## ====================================================================== PORT | STATUS | THRESHOLD (frms/sec) | CURR RATE (frms/sec) | ACTIVE ====================================================================== Enabled 19531...
Magnum 6K family of switches. A VLAN is a group of ports designated by the switch as belonging to the same broadcast domain. The IEEE 802.1Q specification establishes a standard method for inserting VLAN membership information into Ethernet frames.
Page 134
L3-switch). The routing function can be done internally to a L3-switch. One advantage of an L3 switch is that the switch can also support multiple VLANs. The L3 switch can thus route traffic across multiple VLANs easily and provides a cost effective solution if there are mnay VLANs defined.
80 – routing between different VLANs is performed using a router such as a Magnum DX IGURE device or a Layer 3 switch (L3-switch) MNS-6K supports up to 32 VLANs per switch. MNS-6K-SECURE supports up to 256 VLANs per switch. Creating VLANs Creating VLAN and to configure VLAN related commands Syntax set vlan type=<tag|none>...
Port VLAN for additional information. The reasons Private VLANs are constructed are for security. For example, if some confidential data were residing on VLAN 5, then only the people connected to that switch on VLAN 5 can M N S - 6 K...
VLAN basis. For example the command status=tagged will instruct the switch to tag all packets going out of port 1 to belong to VLAN Syntax set-port port=<number|list|range> join id=<number> adds the specified port(s) to the specified VLAN id.
Page 138
3. There can only be one default VLAN for the switch. The default is set to VLAN 1 and can be changed to another VLAN. A word of caution on changing the default VLAN as well –...
Page 139
M A G N U M S W I T C H E S , VLAN ID: 30 Name : marketing Status : Active ======================== PORT | STATUS ======================== DOWN stop vlan=all Magnum6K25(port-vlan)## All active VLAN's stopped. exit Magnum6K25(port-vlan)## show active-vlan Magnum6K25# Tag VLAN is currently active.
Page 140
M A G N U M S W I T C H E S , Tag based vlan Added Successfully. Vlan id Vlan name : sales Ports :14-16 add id=20 name=marketing port=14-16 Magnum6K25(tag-vlan)## ERROR: Duplicate Vlan Id add id=30 name=marketing port=14-16 Magnum6K25(tag-vlan)## Tag based vlan Added Successfully.
Page 141
M A G N U M S W I T C H E S , UNTAGGED | DOWN UNTAGGED | DOWN UNTAGGED | DOWN VLAN ID: 30 Name : marketing Status : Pending ---------------------------------------------------- PORT MODE STATUS ---------------------------------------------------- UNTAGGED | DOWN UNTAGGED | DOWN UNTAGGED | DOWN start vlan=all...
Page 142
----------------------------------------------- PORT | MODE STATUS ----------------------------------------------- 14 | UNTAGGED | DOWN 15 | UNTAGGED | DOWN 16 | UNTAGGED | DOWN VLAN ID: 20 Name : sales Status : Active ----------------------------------------------- PORT | MODE STATUS ----------------------------------------------- 14 | UNTAGGED | DOWN 15 | UNTAGGED |...
Page 143
UNTAGGED | DOWN UNTAGGED | DOWN UNTAGGED | DOWN UNTAGGED | DOWN UNTAGGED | DOWN UNTAGGED | DOWN UNTAGGED | DOWN UNTAGGED | DOWN 10 | UNTAGGED | DOWN 11 | UNTAGGED | DOWN 12 | UNTAGGED | DOWN 13 | UNTAGGED | DOWN 14 |...
Page 144
M A G N U M S W I T C H E S , Port 1 Default ID Filter Status : DISABLED. VLAN Memberships: Vlan: 1 Status: Active UNTAGGED Port 2 Default ID Filter Status : DISABLED. VLAN Memberships: Vlan: 1 Status: Active UNTAGGED <Deleting repeated information for ports 3 through 12>...
Page 145
show-port Magnum6K25(tag-vlan)## VLAN Port Status. Port 1 Default ID Filter Status : DISABLED. VLAN Memberships: Vlan: 1 Status: Active UNTAGGED Port 2 Default ID Filter Status : DISABLED. VLAN Memberships: Vlan: 1 Status: Active UNTAGGED <Deleting repeated information for ports 3 through 12> Port 13 Default ID Filter Status...
VLAN on MNS-6K using Cisco Catalyst® switches or Magnum DX routers. These tech briefs are available on the GarrettCom Inc. web site Support Software Support.
Page 147
M A G N U M S W I T C H E S , Syntax set-port port=<number|list|range> tagging id=<number> status=<tagged| untagged> defines whether the outgoing packets from a port will be tagged or untagged. Syntax set-port port=<number|list|range> join id=<number> adds the specified port(s) to the specified VLAN id Syntax set-port port=<number|list|range>...
The MNS-6K software allows a manager to adjust the cost, priority, the mode for each port as well as the global STP parameter values for the switch. While allowing only one active path through a network at any time, STP retains any redundant physical path to serve as a backup (blocked) path in case the existing active path fails.
The commands used for configuring STP are listed below. Syntax show stp <config|ports > - regardless of whether STP is enabled or disabled (default) this command lists the switch’s full STP configuration, including general settings and port settings show stp config...
Value ranges from 6 to 40 seconds with default value of 20 seconds oot Port: indicates the port number, which is elected as the root port of the switch. A root port of “0” indicates STP is disabled oot Path Cost: A path cost is assigned to individual ports for the switch to determine which ports are the forwarding points.
Root B ridge Forward Delay: indicates the designated root bridge’s forward delay. This the time the switch waits before it switches from the listening to the forwarding state. The default is 15 seconds. This value can be set between 4-30 seconds Root Bridge Hello Time: indicates the designated root bridge’s...
Page 152
Priority: STP uses this to determine which ports are used for forwarding. Lower the umber means higher priority. Value ranges from 0 to 255. Default is 128 Path Cost: This is the assigned port cost value used for the switch to deter rwarding points. Values range from 1 to 65535 State: indicates the STP state of individual ports.
Syntax priority [port=<num port or switch level priority. When a port(s) are specified the priority is associated with ports and their value is 0-255. If no ports are specified, then the switch (bridge) priority is specified and its value is 0-65535 Syntax c ost port=<number|list|range>...
Page 154
Priority : specifies the switch (bridge) priority value. witch MAC address to determine which switch in the network is the root device. Lower values mean higher priority. Value ranges from 0 to 65535. Default value is 32768 Cost: A path cost is assigned to individual ports for the switch to determine whic re the forwarding points.
Page 155
M A G N U M S W I T C H E S , STP Port Configuration ------------------------------------------------------------------------------------------------------------------------ Port# Type Priority ------------------------------------------------------------------------------------------------------------------------ TP(10/ 0) 128 TP(10/100) 128 TP(10/100) 128 TP(10/100) 128 TP(10/100) 128 TP(10/100) 128 TP(10/100) 128 TP(10/100) 128 stp enable Magnum6K25(stp)## Successfully set the STP status...
Page 156
M A G N U M S W I T C H E S , TP(10/100) 128 TP(10/100) 128 TP(10/100) 128 priority value=15535 Magnum6K25(stp)## Successfully set the bridge priority show stp config Magnum6K25(stp)## STP CONFIGURATION ----------------- Spanning Tree Enabled(Global) Spanning Tree Enabled(Ports) Protocol Bridge ID Bridge Priority...
Page 157
M A G N U M S W I T C H E S , Setting cost for STP...Successfully set the path cost for port 13 show stp ports Magnum6K25(stp)## STP Port Configuration ------------------------------------------------------------------------------------------------------------------------ Port# Type Priority ------------------------------------------------------------------------------------------------------------------------ TP(10/ 0) 128 TP(10/100) 128 TP(10/100) 128 TP(10/100) 128...
Page 158
M A G N U M S W I T C H E S , show stp config Magnum6K25(stp)## STP CONFIGURATION ----------------- Spanning Tree Enabled(Global) Spanning Tree Enabled(Ports) Protocol Bridge ID Bridge Priority Bridge Forward Delay Bridge Hello Time Bridge Max Age Root Port Root Path Cost Designated Root...
Syntax priority [port=<number|list|range>] value=<0-255 | 0 switch level priority. When a port(s) are specified the priority is associated with ports a 255. If no ports are specified, then the switch (bridge) priority is specified and its value is 0-65535 Syntax c ost port=<number|list|range>...
IEEE 802.1D-2004 proposes a new standard for faster recovery for up to 16 switches. GarrettCom implements the IEEE 802.1D-2004 and enhancements to cover more than 16 switches for larger networks. RSTP converges in less than one second to six seconds.
Proper implementations of RSTP (by switch vendors) is designed to be compatible with IEEE 802.1d STP. GarrettCom recommends that you employ RSTP or STP in your network. Transition from STP to RSTP IEEE 802.1w RSTP is designed to be compatible with IEEE 802.1D STP.
Configuring RSTP The commands to setup and configure RSTP on MNS-6K are Syntax set stp type=<stp|rstp> - Set the switch to support RSTP or change it back to STP. Need to save and reboot the switch after this command Syntax rstp – enter the RSTP configuration mode...
Page 163
STP services, but cannot support RSTP services p2p - This parameter is used to tell the port if it is connected to another switch or a hub or a bridge device. This parameter should be set to off for all ports that are connected to a shared device such as a hub.
Value ranges from 6 to 160 seconds with default value of 20 seconds. Root Port: indicates the port number, which is elected as the root port of the switch. A root port of “0” indicates STP is disabled...
S W I T C H E S , Root Path Cost: a path cost is assigned to individual ports for the switch to determine which ports are the forwarding points. A higher cost means more loops; a lower cost means fewer loops.
M A G N U M S W I T C H E S , Port#: indicates the port number. Value ranges from 01 to max number of ports in the switch Type: indicates the type of port – TP indicates Twisted Pair Priority: STP uses this to determine which ports are used for forwarding.
Page 167
Syntax priority [port=<number|list|range>] value=<0-255 | 0-65535> - specifies the port or switch level priority. When a port(s) are specified the priority is associated with ports and their value is 0- 255. If no ports are specified, then the switch (bridge) priority is specified and its value is 0-65535 Syntax cost port=<number|list|range>...
Page 168
The value is from 1 to 10 seconds. Default value is 2 seconds Age: This is the maximum time a message with STP information is allowed by the switch before the switch discards the information and updates the address table again. Value ranges from 6 to 160 seconds with default value of 20 seconds.
Page 169
Disabled Forwarding 00:00:00:20:06:25:ed:89 00:0d Disabled Disabled Disabled “forceversion” can be used for compatibility with STP devices. In this example, the switch is forced to STP mode. : YES : 9,10,11,12,13,14,15,16 : Force to STP only : 00:00:00:20:06:25:ed:89 : 15 : 02...
Page 170
U S E R G U I D E : 20 : 100 Using forceversion the switch is now operating using RSTP. Note the “show stp config” command also indicates the switch protocol is RSTP. : YES : 9,10,11,12,13,14,15,16 : Normal RSTP...
Page 171
M A G N U M S W I T C H E S , priority port=13 value=100 Magnum6K25(rstp)## show rstp ports Magnum6K25(rstp)## RSTP Port Configuration ----------------------------------------------------------------------------------------------------------------- Port# Type Priority Path Cost ---------------------------------------------------------------------------------------------------------------- TP(10/100) 128 2000000 TP(10/100) 128 2000000 TP(10/100) 128 2000000 TP(10/100) 128 2000000 TP(10/100) 100 200000 TP(10/100) 128 2000000...
List of commands in this chapter Syntax set stp type=<stp|rstp> - Set the switch to support RSTP or change it back to STP. Need to save and reboot the switch after this command Syntax rstp – enter the RSTP configuration mode Syntax rstp <enable|disable>...
Page 174
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E Syntax timers forward-delay=<4-30> hello=<1-10> age=<6-160> - change the STP Forward delay, Hello timer and Aging timer values...
STP where it does the necessary actions for fault recovery (such as re-learn addresses) in case of a link failure. S-Ring is a ring technology using the GarrettCom MNS-6K software. In a S-Ring, a switch is designated as a “Ring Manager”. Devices in a S-Ring can be managed...
STP, S-Ring offers an additional topology option to network architects. The two ends of a ring must be connected to two ports in a Magnum 6K Switch that is enabled with the S-Ring software. The end points of the ring provide an alternate path to reach the switch that has failed.
M A G N U M S W I T C H E S , There can be multiple S-Rings on a given Magnum 6K switch. There can be multiple ring topologies in a network. Each ring has to be a separate ring. Ring of rings or overlapping rings are not supported at this time S-Ring topologies support one failure in the network.
S-Ring supports non managed switches as long as LLL capability is supported on that switch. A ring is a special form of mesh network topology. The two top-of-the-ring ports form an otherwise-illegal redundant path, and standard RSTP/STP causes one of these two ports to block incoming packets in order to enable normal Ethernet traffic flow.
Page 179
M A G N U M S W I T C H E S , Forwarding Forwarding Port Port 92 – Normal RSTP/STP operations in a series of switches. Note – this normal status is IGURE designated RING_CLOSED This normal status is designated as RING_CLOSED. Operations will continue this way indefinitely until a fault occurs.
S-Ring when RSTP or STP is configured and in use. For the S-Ring, the user must select two ports of one 6K switch to operate as a pair in support of each Ethernet ring, and attach to the two “ends” of each ring as it comes together at the ring control switch.
94 – More than one S-Ring pair can be selected and more than one S-Ring can be defined per IGURE switch. Note – the mP62 as well as the ES42 switches support LLL and can participate in S-Ring as an access switch More than one S-Ring port-pair may be selected per ring control switch.
S- Ring port-pair list for that 6K Switch. The user can enable or disable ports pairs that are on the S-Ring list by CLI commands in order to exercise final control if needed.
Page 183
1) On the switch which is the root node, authorize the use of S-Ring software 2) On the switch which is the root node or where the top of the ring ports are configured, enable STP 3) On the root node enable S-Ring and add the necessary ports as S-Ring ports...
Page 184
Syntax s-ring add port=<port1,port2> - define ports which make up the S-Ring ports. Note as discussed earlier, you can create multiple S-Rings on a switch Syntax s-ring del port=<port1,port2> - remove the switch from S-Ring topology by eliminating the end ports on the switch...
Page 185
LLL has to be setup on other switches in the ring for the in-out ports on the switch. Syntax lll <enable|disable> - enable or disable LLL on the switch If STP is enabled, Link Loss Learn will not work even though it was enabled.
Syntax s-ring add port=<port1,port2> - define ports which make up the S-ring ports. Note as discussed earlier, you can create multiple S-Rings on a switch Syntax s-ring del port=<port1,port2> - remove the switch from S-Ring topology by eliminating the end ports on the switch Syntax lll <enable|disable>...
Page 187
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E Syntax lll add port=<port|list|range> - enable LLL on the list of specified ports Syntax lll del port=<port|list|range>...
A dual- homing switch (such as EDS42) offers two attachments into the network or two independent media paths and two upstream switch connections. In the case of the Magnum 6K family of switches, any two ports can be defined as dual-home ports to provide this level of redundancy.
M A G N U M S W I T C H E S , 98 – Dual-homing using ESD42 switch and Magnum 6K family of switches. In case of a IGURE connectivity break – the connection switches to the standby path or standby link...
Page 190
• Dual-homing ports can span different modules in a switch If dual homing is not configured there is a potential a loop can be created and either STP or RSTP will setup the port in the active stand-by mode.
There are two modes in which the dual-homing works. The first one is where the ports are “equivalent” i.e. if one port fails, the other one take over, however, if the first (failed) port recovers, the active port does not switch back. The second mode of operation is primary-secondary mode. In this mode of operation, the primary port is explicitly defined and the secondary port is explicitly defined.
Page 192
M A G N U M S W I T C H E S , dualhome ? Magnum6K25# dualhome : Configures Dual homing Usage dualhome <enter> show dualhome Magnum6K25# Dual Homing Status : DISABLED dualhome Magnum6K25# dualhome add port1=10 port2=11 Magnum6K25(dualhome)## Dual Homing Ports configured dualhome enable...
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E List of commands in this chapter Syntax dualhome – enter the dual-homing configuration sub-system Syntax dualhome <enable|disable>...
M A G N U M S W I T C H E S , 16 – Link Aggregation Control Protocol (LACP) Increase Network throughput and reliability ink aggregation Link Aggregation Control Protocol (LACP) is part of an IEEE specification (IEEE 802.3ad) that allows several physical ports to be grouped or bundled together to form a single logical channel.
LACP Configuration For LACP to work on the Magnum 6K family of switches, only one trunk per module can be created. Some valid connections are shown in the picture below. Switch 1 Switch 2 M N S - 6 K...
(for LACP using 4 ports) as the trunk group belongs to two different VLANs. However – on each switch, the set of ports can belong to same VLANs as shown in the figure below. While the ports belong to the same VLANs, there is no common VLAN...
Page 197
VLAN to another cannot be forwarded. There should be at least one VLAN common between the two switches and the LACP port groups. VLAN 1,10 VLAN 1,20 M N S - 6 K U S E R G U I D E Switch 1 Switch 2 Switch 1 Switch 2...
LACP ports. Then finally connect the ports together to form the meshed redundant link topology as shown above. Using the Magnum edge switch with dual-homing allows the edge devices to have link level redundancy as well – bringing the fault tolerance from the network to the edge.
Page 199
108 – LACP, along with RSTP/STP brings redundancy to the network core or backbone. IGURE Using this reliable core with a dual-homed edge switch brings reliability and redundancy to the edge of the network It is recommended not to use LACP with S-Ring at this time.
Page 200
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E S-Ring 1 S-Ring 2 109 – This architecture is not recommended IGURE LACP can be used for creating a reliable network between two facilities connected via a wireless bridge.
Page 201
Before enabling, please ensure that the correct ports are configured. If network connectivity is lost due to a port being configured as a LACP port, you will need to physically access the switch via the console to correct this error.
Page 202
M A G N U M S W I T C H E S , the lowest priority value has the highest priority and is designated as the primary port. If traffic analysis is required, it is recommended to mirror the primary port (and physically disconnect the other ports if all traffic needs to be captured).
Page 203
Trunk Mismatch The other switch sent a BPDU which did not match the trunk information associated with this port. This happens when the port is connected to a different switch, or a different module in the Magnum...
In the figure shown above, Switch 1 has ports 11 and 15 forming the first trunk, connecting to Switch 3. Switch 1 also has ports 17 and 23 forming the second trunk on Switch 2. The ‘show lacp’ command was executed on Switch 1.
M A G N U M S W I T C H E S , ===================== 32768 Primary Port 32768 Member Port 113 – LACP information over a network IGURE List of commands in this chapter Syntax lacp - enable the LACP configuration module within CLI Syntax lacp <enable | disable>...
To make the preemptive queuing possible, most switches implement at least two queue buffers. The Magnum 6K family of switches has two priority queues, 1 (low) and 0 (high).When tagged packets enter a switch port, the switch responds by placing Chapter...
DiffServ is a layer-3 protocol and requires no specific layer-2 capability, allowing it to be used in the LAN, MAN, and WAN. DiffServ works by tagging each packet (at the originating device or an intermediate switch) for the requested level of service it requires across the network.
M A G N U M S W I T C H E S , IP Precedence IP Precedence utilizes the three precedence bits in the IPv4 header's Type of Service (ToS) field to specify class of service for each packet. You can partition traffic in up to eight classes of service using IP precedence.
Magnum 6K family of switches support three types of QoS - Port based, Tag based and ToS based. QoS is disabled by default on the switch. QoS needs to be enabled and configured. Syntax qos – enter the QoS configuration mode Syntax setqos type=<port|tag|tos|none>...
Syntax set-weight weight=<0-7> - sets the port priority weight for All the ports. Once the weight is set, all the ports will be the same weight across the switch. The valid value for weight is 0-7. A weight is a number calculated from the IP precedence setting for a packet.
Page 211
Syntax show qos [type=<port|tag|tos>] [port=<port|list|range>] – displays the QoS settings Sometimes it is necessary to change the priority of the packets going out of a switch. For example, when a packet is received untagged and has to be transmitted with an addition of the 802.1p priority tag, the tag can be assigned depending on the untag value set.
Page 212
Port | DOWN None | DOWN None | DOWN None | DOWN None | DOWN show qos type=port Magnum6K25(qos)## ================================ PORT | PRIORITY | STATUS ================================ None None | DOWN None | DOWN None | DOWN HIGH | DOWN None | DOWN None | DOWN...
Page 213
show qos type=tag Magnum6K25(qos)## ======================================== PORT | Pri for VPT | STATUS | 76543210 ==== ==== ============ ==================== | -------- | UP | -------- | DOWN | -------- | DOWN | -------- | DOWN | -------- | DOWN | -------- | DOWN | -------- | DOWN...
- sets the port priority weight for All the ports. Once the weight is set, all the ports will be the same weight across the switch. The valid value for weight is 0-7 yntax show-portweight - display the weight settings on a port yntax show qos [type=<port|tag|tos>] [port=<port|list|range>] –...
18 – IGMP Multicast traffic on a network nternet Group Management Protocol (IGMP) is defined in RFC 1112 as the standard for IP multicasting in the Internet. It is used to establish host memberships in particular multicast groups on a single network. The mechanisms of the protocol allows a host to inform its local router, using Host Membership Reports that it wants to receive messages addressed to a specific multicast group.
Page 216
The multicast group running version 2 of IGMP uses three fundamental types of messages to communicate: • Query: A message sent from the querier (multicast router or switch) asking for a response from each host belonging to the multicast group. If a multicast router supporting IGMP is not present, then the switch must assume this function in order to elicit group membership information from the hosts on the network.
118 – IGMP concepts – advantages of using IGMP IGURE • PCs 1 and 4, switch 2, and all of the routers are members of an IP multicast group. (The routers operate as queriers.) • Switch 1 ignores IGMP traffic and does not distinguish between IP multicast group members and non-members.
The next figure (below) shows a network running IP multicasting using IGMP without a multicast router. In this case, the IGMP-configured switch runs as a querier. PCs 2, 5, and 6 are members of the same IP multicast group. IGMP is configured on switches 3 and 4. Either of these switches can operate as querier because a multicast router is not present on the network.
The benefits of IGMP are clear. The traditional ways of building an IGMP network calls for the IGMP querier to reside on a Layer 3 network device - typically a router or a Layer 3 switch. The end devices (encoders or transmitters) reside on a Layer 2 device and the encoder sends a query/join request to join the specific multicast group.
M A G N U M S W I T C H E S , traffic only goes to the ports requesting the traffic. The Magnum 6K family of switches, using IGMP-L2, can perform the similar tasks a Layer 3 device performs for IGMP. For a Layer 2 IGMP environment, all Magnum 6K family of switches have to be enabled in the IGMP-L2.
121 - Using IGMP-L2 on Magnum 6K family of switches, a Layer 2 network can minimize multicast IGURE traffic as shown above. Each switch has the IGMPL2 turned on. Each switch can exchange the IGMP query message and respond properly. R4 wants to view surveillance traffic from T1. As shown by (1), a join request is sent by R4.
(IGMP) device reissues a join request again. A few additional facts about IGMP L2 • GarrettCom Magnum 6K family of switches configured for IGMP-L2 can perform the Join aggregation required by IGMP • Multicast forwarding is done based on MAC addresses – so datagram to IP addresses 224.1.2.3 and 239.129.2.3 can be forwarded on the same port groups.
group del ip=<group ip> - delete ports from a specific IGMP broadcast group igmp Magnum6K25# igmp enable Magnum6K25(igmp)## IGMP is enabled show igmp Magnum6K25(igmp)## IGMP State ImmediateLeave Querier Querier Interval Querier Response Interval Multicasting unknown streams mcast disable Magnum6K25(igmp)## MCAST is disabled show igmp Magnum6K25(igmp)## IGMP State...
It disables the port (where the leave message is received) ability to transmit multicast traffic. Querier shows where the switch is acting a querier or a non-querier. In the example above the switch is the querier. Querier Interval shows the time period in seconds on which the switch sends general host- query messages.
Page 225
Syntax show-port – display the port characteristics for IGMP Syntax show-router – displays detected IGMP-enabled router ports Syntax set-leave <enable|disable> - enables or disables the switch to immediately process a host sending a leave message rather that wait for the timer to expire Syntax set-querier <enable|disable>...
Page 226
M A G N U M S W I T C H E S , Forwarding Forwarding Forwarding Auto Blocking Blocking Blocking igmp enable Magnum6K25(igmp)## IGMP is enabled show-router Magnum6K25(igmp)## RouterIp PortNo Timer -------------------------------------- 10.21.1.250 set-leave enable Magnum6K25(igmp)## IGMP immediate leave status is enabled show igmp Magnum6K25(igmp)## IGMP State...
M A G N U M S W I T C H E S , Querier Response Interval set-querier disable Magnum6K25(igmp)## IGMP querier status is disabled show igmp Magnum6K25(igmp)## IGMP State ImmediateLeave Querier Querier Interval Querier Response Interval set-qi interval=127 Magnum6K25(igmp)## Query interval successfully set show igmp...
Syntax set-leave <enable|disable> - en leave message rather that wait for the timer to expire yntax set-querier <enable|disable> - enables or disables a switch as IGMP querier yntax set-qi interval=<value> - The IGMP querier router periodically sends general host-query messages.
Page 230
M A G N U M S W I T C H E S , group address, 224.0.0.1. The default value is 125 seconds. The valid range can be from 60 to 127 seconds. Syntax set-qri interval=<value> - elapse between when the querier router sends a host-query message and when it receives a response from a host.
GVRP. GVRP is defined in the IEEE 802.1q and GARP in the IEEE 802.1p standards. In order to utilize the capabilities of GVRP, GarrettCom Inc. strongly recommends that the user is familiar with the concepts and capabilities of IEEE 802.1q.
127 – GVRP operation – see description below IGURE Switch 1 with static VLANs (VID= 1, 2, & 3). Port 2 is a member of VIDs 1, 2, & 3. 1. Port 2 advertises VIDs 1, 2, & 3 2. On Switch 2 - Port 1 receives advertisement of VIDs 1, 2, & 3 AND becomes a member of VIDs 1, 2, &...
Page 233
An “unknown VLAN” is a VLAN that the switch learns of by GVRP. For example, suppose that port 1 on switch “A” is connected to port 5 on switch “C”. Because switch “A” has VLAN 22 statically configured, while switch “C” does not have this VLAN statically configured, VLAN 22 is handled as an “Unknown VLAN”...
VLAN with the same VID as in the advertisement, and allow that VLAN’s traffic • If the switch already has a static VLAN with the same VID as in the advertisement, and the port is configured to learn for that VLAN, then the port will dynamically join the VLAN and allow that VLAN’s traffic.
M A G N U M S W I T C H E S , ============================================ VLAN ID | NAME ============================================ | Default VLAN | | Blue | dyn10 Magnum6K25(gvrp)## 130 – Command to check for dynamically assigned VLANs IGURE Note that port 10 must be enabled and configured to learn for it to be assigned to the dynamic VLAN.
Since dynamic VLANs operate as tagged VLANs, and it is possible that a tagged port on one device may not communicate with an untagged port on another device, GarrettCom Inc. recommends that you use Tagged VLANs for the static VLANs.
Page 237
VLANs and the current Primary VLAN Syntax gvrp <enable|disable> - enable or disable GVRP Syntax show-vlan – list all the VLANs (including dynamic VLANs) on the switch Syntax set-ports port=<port|list|range> state=<learn|block|disable> - set the state of the port to learn, block or disable for GVRP.
– on a reboot the changes can be lost without the save command. ithin the same broadcast domain, a dynamic VLAN can pass through a device that is not GVRP-aware. This is because a hub or a switch that is not GVRP-aware will flood the GVRP (multicast) advertisement packets out all ports.
VLANs and the current Primary VLAN Syntax gvrp <enable|disable> - enable or disable GVRP Syntax show-vlan – list all the VLANs (including dynamic VLANs) on the switch Syntax set-ports port=<port|list|range> state=<learn|block|disable> - set the state of the port to learn, block or disable for GVRP.
20 – SNMP Managing your network using SNMP imple Network Management Protocol (SNMP) enables management of the network. There are many software packages which provide a graphical interface and a graphical view of the network and its devices. The graphical interface and view would not be possible without SNMP.
Page 241
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E Simple Network Management Protocol Version 3 (SNMPv3) – The third version of SNMP, the enhancements made to secure access, different levels of access and security.
M A G N U M S W I T C H E S , RMON MIB (RFC 1757) • RMON: groups 1, 2, 3, and 9 (Statistics, Events, Alarms, and History) • • Version 1 traps (Warm Start, Cold Start, Link Up, Link Down, Authentication Failure, Rising Alarm, Falling Alarm) RFC 1901-1908 –...
Page 244
Syntax mgrip <add|delete> ip=<IPaddress> - adds or deletes a management station, specified by the IP address, which can query SNMP variables from the switch. This is done to protect the switch from being polled by unauthorized managers. Valid for SNMP v1. Maximum of 5 stations allowed Syntax setvar [sysname|syscontact|syslocation]=<string>...
Page 245
Syntax com2sec <add|delete> id=<id> [secname=<name>] [source=<source>] [community=<community>] - a part of the View based Access control model (VACM) as defined in RFC 2275. This specifies the mapping from a source/community pair to a security name. On MNS- 6K, up to 10 entries can be specified Syntax group <add|delete>...
Page 246
M A G N U M S W I T C H E S , SNMP MANAGERS INFO ------------------ SNMP TRAP STATIONS INFO ----------------------- snmp Magnum6K25# community write=private read=public Magnum6K25(snmp)## SNMP Read community name successfully set SNMP Write community name successfully set show snmp Magnum6K25(snmp)## SNMP CONFIGURATION INFORMATION...
Page 247
M A G N U M S W I T C H E S , SNMP TRAP STATIONS INFO ----------------------- traps add type=Snmp,Rmon ip=192.168.1.2 Magnum6K25(snmp)## Successfully Added. show snmp Magnum6K25(snmp)## SNMP CONFIGURATION INFORMATION ------------------------------ SNMP Get Community Name : public SNMP Set Community Name : private SNMP Trap Community Name : public AuthenTrapsEnableFlag...
Page 248
Default Trap Community : public trap add id=1 type=v1 host=10.21.1.100 Magnum6K25(snmpv3)## Entry is added successfully : Magnum6K25 : Fremont, CA : support@garrettcom.com : Disabled : public : 6K_v3Engine Switch over to SNMPv3 from this point forward Max limit of system variables is 15 characters...
Page 249
M A G N U M S W I T C H E S , show-trap Magnum6K25(snmpv3)## Trap Type Host IP ================================================================ 10.21.1.100 -- show-trap id=1 Magnum6K25(snmpv3)## Trap ID Trap Type : v1 Host IP : 10.21.1.100 Community : -- Auth.
Page 250
M A G N U M S W I T C H E S , group add id=1 groupname=v1 model=v1 com2secid=1 Magnum6K25(snmpv3)## Entry is added successfully show-group Magnum6K25(snmpv3)## Group Name Sec. Model ================================================== public public show-group id=1 Magnum6K25(snmpv3)## Group ID Group Name : v1 Model : v1...
Page 251
M A G N U M S W I T C H E S , access add id=1 accessname=v1 model=v1 level=noauth read=1 writ Magnum6K25(snmpv3)## e=none notify=none Entry is added successfully show-access Magnum6K25(snmpv3)## ID View Name Model Level ============================================================== noauth show-access id=1 Magnum6K25(snmpv3)## Access ID Access Name...
RMON MIB definition. The following RMON groups are supported: • Ethernet Statistics Group - maintains utilization and error statistics for the switch port being monitored. • History Group – gathers and stores periodic statistical samples from previous Statistics Group.
M A G N U M S W I T C H E S , The following RMON communities, when defined, enable the specific RMON group as show above. Syntax rmon – enter the RMON configuration mode to setup RMON groups and communities Syntax history def-owner=<string>...
Page 254
Syntax mgrip <add|delete> ip=<IPaddress> - adds or deletes a management station, specified by the IP address, which can query SNMP variables from the switch. This is done to protect the switch from being polled by unauthorized managers. Valid for SNMP v. Maximum of five stations allowed.
Page 255
M A G N U M S W I T C H E S , Syntax trap <add|delete> id=<id> [type=<v1|v2|inform>] [host=<host-ip>] [community=<string>] [port=<1-65534>] station can receive v1, v2 traps and/or inform notifications. An inform notification is an acknowledgments that a trap has been received. A user can add up to 5 stations. Syntax show-trap [id=<id#>]- shows the configured trap stations in tabular format - id is optional and is the number corresponding to the trap entry number in the table Syntax com2sec <add|delete>...
Page 256
M A G N U M S W I T C H E S , Syntax statistics def-owner=<string> def-comm=<string>- define the RMON statistics group and the community string associated with the group Syntax alarm def-owner=<string> def-comm=<string> - define the RMON alarm group and the community string associated with the group Syntax event def-owner=<string>...
21 – Miscellaneous Commands Improving productivity and manageability here are several features built into the Magnum 6K family of switches which help with the overall productivity and manageability of the switch. These items are examined individually in this chapter. Alarm Relays In a wiring closet, it would be helpful if there was a visual indication for faults on components on the network.
Page 258
M A G N U M S W I T C H E S , Event ID Event Description S-RING OPEN Cold Start Warm Start Link Up Link Down Authentication Failure RMON Rising Alarm RMON Falling Alarm Intruder Alarm Link Loss Learn Triggered Broadcast Storm Detected STP/RSTP Reconfigured 136 –...
Page 259
M A G N U M S W I T C H E S , Syntax period time=<1..10> - sets the duration of relay action for the momentary type signal. This may be needed to adjust to the behavior of the circuit or relay. Default is 3 seconds. Time is in seconds Syntax del event=<event-id|list|range|all>...
Page 260
M A G N U M S W I T C H E S , 6 Authentication Failure 7 RMON Raising Alarm 8 RMON Falling Alarm 9 Intruder Alarm 10 Link Loss Learn Triggered 11 Broadcast Storm Detected 12 STP/RSTP Reconfigured add event=2 Magnum6K25(alarm)## Alarm Event(s) Added: 2...
M A G N U M S W I T C H E S , 9 Intruder Alarm 10 Link Loss Learn Triggered 11 Broadcast Storm Detected 12 STP/RSTP Reconfigured alarm disable Magnum6K25(alarm)## Alarm system Disabled del event=1,3,5,7 Magnum6K25(alarm)## Alarm Event(s) Deleted: 1, 3, 5, 7 show alarm Magnum6K25(alarm)## Alarm Events Configuration...
Page 262
If this capability is used, please ensure that SPAM filters and other filters are not set to delete these emails. GarrettCom Inc. recommends that a rule be setup on the mail server so that all emails indicating SNMP faults are automatically stored in a folder or redirected to the necessary administrators.
Page 263
M A G N U M S W I T C H E S , traps – [optional] this is the trap filter. If value is “all”, all traps of any type will be sent to this recipient. If value is none, no traps are sent to this recipient. Value can also be a combination of ‘S’...
Page 264
SMTP Server IP : 67.109.247.195 SMTP Server Port : 25 Retry Count show smtp recipients Magnum6K25(smtp)## E-mail Address =========================================================== rk@gci,sys@gci.com 67.109.247.195 add id=2 email=jsmith@garrettcom.com traps=S events=CF Magnum6K25(smtp)## Recipient successfully added show smtp recipients Magnum6K25(smtp)## E-mail Address =========================================================== rk@gci,sys@gci.com 67.109.247.195 jsmith@gci.com delete id=2...
Page 265
M A G N U M S W I T C H E S , add id=2 email=jsmith@garrettcom.com traps=S events=CF Magnum6K25(smtp)## ip=192.168.10.13 Recipient successfully added show smtp recipients Magnum6K25(smtp)## E-mail Address =========================================================== rk@gci,sys@gci.com 67.109.247.195 jsmith@gci.com sendmail server=10.21.1.2 to=jack@garrettcom.com Magnum6K25(smtp)## from=support@garrettcom.com subject=test body=hello...
When using the serial connectivity with applications such as Hyper terminal etc. it may be necessary to optimize the character delays so that the FIFO buffer used in the GarrettCom Magnum 6K family of switches is not overrun. The important parameters to set for any serial connectivity software is to set the line delay to be 500 milliseconds and the character delay to be 50 milliseconds.
Some users may inadvertently connect to the switch. It would be fair top warn them that they have accessed a secure device and it is only appropriate to terminate the connection. Responsible users will follow the directive, much like a “No Trespassing”...
<After the session is terminated, a new session is opened up using telnet to display the effects of changing the MOTD on the switch> telnet switch C:> Copyright (c) 2001-2005 GarrettCom, Inc All rights reserved. This is a secure device. Unauthorized access is prohibited. Please disconnect if you are an unauthorized user. Thanks. Magnum-6K Version 14.0 Login 140 –...
Page 269
Syntax show history – show the last 25 commands executed – if less than 25 commands are executed, only those commands executed are s If the user logs out or if the switch times out – the history is erased. The history count restarts when the user logs in again Syntax <Up-ar...
M A G N U M S W I T C H E S , t history ? Magnum 6K 5# set history : Set Histo ry Size Usage set history size=<1-100> Groups: All. set history size=100 Magnum 6K25# History Size is Set show history Magnum6K25# 1 : show version...
M A G N U M S W I T C H E S , $$ : $ Character $r : New Line $b : Space ew examples on h ow the system prompt can be setup is shown below. snmp Magnum 6K25#...
M A G N U M S W I T C H E S , 143 – Using the ping command IGURE Many devices do not respond to ping or block ping commands. Make sure that the target device does respond or the network does allow the ping packets to ropagate through.
M A G N U M S W I T C H E S , System Events All events occurring on the Magnum 6K family of switches are logged. The events can be as shown below Code escription Emergency (or Fatal) system is unusable – called “fatal” in show log command Alert: action must be taken immediately Critical: critical conditions...
Page 274
M A G N U M S W I T C H E S , The system events can be sent to a Syslog server using the Syslog capabilities in MNS-6K-SECURE. G centralize the logs. show log Magnum6K2 # DATE TIME -------- --------...
Page 275
Do you wish to export the event logs? [ 'Y' or 'N'] Successfully uploaded the event log file. Magnum6K25# 146 – Using exportlog to export the event log information IGURE In the table below, the following acronyms are used for Severity: Emergency;...
Page 276
Network Stack not yet configured DEVICE IP address a.b.c.d configured DEVICE subnetmask a.b.c.d configured DEVICE Default gateway a.b.c.d configured DEVICE Switch rebooted by user DEVICE No saved system logs DEVICE Timezone set to x DEVICE Country set to x (no DST) DEVICE...
Page 277
M A G N U M S W I T C H E S , Subsystem RMON Alarm : internal error , unable to get memory RMON Alarm : internal error, unable to get memory for alarm entry RMON History : internal error, unable to get memory for history control entry RMON History : internal error, unable to get memory for history data...
M A G N U M S W I T C H E S , Subsystem TCP/IP Duplicate IP a.b.c.d sent from MAC address XXXXXX TCP/IP Unable to allocate memory for an ICMP packet TCP/IP IP packet from a.b.c.d , with checksum error dropped TCP/IP Bad IP fragments from a.b.c.d dropped TCP/IP...
MAC address 00:0c:F1:B9:D1:DC (#2 above) appears with this MAC address in the DST field, the packet will be sent to port number 3. Also notice that there are other MAC addresses associated with port #3, indicating that the port has a hub or a switch connected to it.
Page 280
M A G N U M S W I T C H E S , Syntax show smtp <config|recipients> - recipients displays the currently configured recipients of email alerts Syntax add id=<1-5> email=<email-addr> [traps=<all|none|S|R|E>] [events=<all|none|I|A|C|F|D>] [ip=<ip-addr>] [port=<1-65535>] id – [mandatory] the recipient ID - range from 1 to 5. MNS-6K allows a maximum of 5 recipients email –...
Page 281
Syntax ping <ipaddress> [count=<1-999>] [timeout=<1-256>] – use the ping command to test connectivity Syntax set prompt <prompt string> - set the prompt for switch. The prompt has predefined variables. These are $n : System Name; $c : System Contact; $l : System Location; $i : System IP;...
Syntax save – save changes made to the configuration Syntax reboot – restart the switch – same effect as physically turning off the power Syntax show setup – show setup parameters Syntax show config – show setup parameters configured Syntax enable <user-name>...
– do not set the IP address automatically auto - the switch will first look for a DHCP server. If a DHCP server is not found, it will then look for a BootP server. If that server is not found, the switch will check to see if the switch had a pre-configured IP address.
Page 284
- valid with type=bootp only. This option allows the switch to load the configuration file from the BootP server. This is useful when a new switch is put on a network and the specific configurations are loaded from a centralized BootP server Syntax telnet <enable|disable>...
Page 285
The modules are system, event, port, bridge, stp, ps, mirror, sntp, vlan, gvrp and snmp Syntax show session – display telnet sessions active on the switch Syntax kill session id=<session> - kill a specific telnet session Syntax set ftp mode=<normal|passive>...
Page 286
This can also perform the task of exporting a configuration file or uploading a new image to the switch [host=<hostname>] [ip=<ipaddress>] [file=<filename>] – parameters associated with tftp server for proper communications with the server Syntax xmodem <get|put>...
Syntax show timezone – shows the system timezone Syntax show date – shows the system date Syntax show uptime – shows the amount of time the switch has been operational Syntax show config [module=<module-name>] – displays the configuration Syntax set secrets <hide|show> - sets the system parameter to display or hide the passwords Syntax kill config [save=module-name] –...
Syntax allow mac=<address|list|range> port=<num|list|range> - specify a specific MAC address or MAC address list Syntax learn port=<number-list> <enable|disable> - learn MAC addresses connected to the Magnum 6K switch Syntax show port-security – display port security settings Syntax action port=<num|list|range> <none|disable|drop> - action to perform in case of breach...
Page 289
M A G N U M S W I T C H E S , Syntax signal port=<num|list|range> <none|log|trap|logandtrap> - port to monitor and signal to send in case of breach of port security Syntax ps <enable|disable> - enable or disable port security Syntax remove mac=<all|address|list|range>...
Syntax authserver [ip=<ip-addr>] [udp=<num>] [secret=<string>] define the RADIUS server – use UDP socket number if the RADIUS authentication is on port other than 1812 Syntax auth <enable|disable> enables or disables the 802.1x authenticator function on MNS-6K switch Syntax setport port=<num|list|range> [status=<enable|disable>] [control=<auto|forceauth|forceunauth>] [initialize=<assert|deassert>] setting the...
Default value is 30. Values can be from 1 to 65535 seconds Syntax reauth port=<num|list|range> [status=<enable|disable>] [period=<10-86400>] set values on how the authenticator (Magnum 6K switch) does the re-authentication with the supplicant or port – [mandatory] – ports to be configured status –...
Syntax priority [port=<number|list|range>] value=<0-255 | 0-65535> - specifies the port or switch level priority. When a port(s) are specified the priority is associated with ports and their value is 0- 255. If no ports are specified, then the switch (bridge) priority is specified and its value is 0-65535 Syntax cost port=<number|list|range>...
Chapter 13 – Rapid Spanning Tree Protocol Syntax set stp type=<stp|rstp> - Set the switch to support RSTP or change it back to STP. Need to save and reboot the switch after this command Syntax rstp – enter the RSTP configuration mode Syntax rstp <enable|disable>...
Syntax priority [port=<number|list|range>] value=<0-255 | 0-65535> - specifies the port or switch level priority. When a port(s) are specified the priority is associated with ports and their value is 0- 255. If no ports are specified, then the switch (bridge) priority is specified and its value is 0-65535 Syntax cost port=<number|list|range>...
M A G N U M S W I T C H E S , Syntax lll del port=<port|list|range> - disable LLL on the list of specified ports Syntax show lll – display the status of LLL Syntax rstp – STP Configuration mode Syntax rstp <enable|disable>...
Syntax set-weight weight=<0-7> - sets the port priority weight for All the ports. Once the weight is set, all the ports will be the same weight across the switch. The valid value for weight is 0-7 Syntax show-portweight - display the weight settings on a port Syntax show qos [type=<port|tag|tos>] [port=<port|list|range>] –...
Syntax show-port – display the port characteristics for IGMP Syntax show-router – displays detected IGMP-enabled router ports Syntax set-leave <enable|disable> - enables or disables the switch to immediately process a host sending a leave message rather that wait for the timer to expire Syntax set-querier <enable|disable>...
Syntax mgrip <add|delete> ip=<IPaddress> - adds or deletes a management station, specified by the IP address, which can query SNMP variables from the switch. This is done to protect the switch from being polled by unauthorized managers. Maximum of five stations allowed.
Page 300
M A G N U M S W I T C H E S , Syntax authtrap <enable|disable> - enables or disables authentication traps generation Syntax show-authtrap - displays the current value of authentication trap status. Syntax deftrap community=<string> - defines the default community string to be used when sending traps. When user does not specify the trap community name when setting a trap station using the “trap”...
M A G N U M S W I T C H E S , to 5 users to be added. Right now, the MNS-6K agent only support noauth and auth-md5 for v3 authentication and auth-des for priv authentication Syntax show-user [id=<id>] - display all or specific view entries - id is optional and is the number corresponding to the view entry number in the table Syntax rmon –...
Page 302
M A G N U M S W I T C H E S , Syntax smtp – configure the SNMP alerts to be sent via email Syntax show smtp <config|recipients> - recipients displays the currently configured recipients of email alerts Syntax add id=<1-5>...
Page 303
Syntax ping <ipaddress> [count=<1-999>] [timeout=<1-256>] – use the ping command to test connectivity Syntax set prompt <prompt string> - set the prompt for switch. The prompt has predefined variables. These are $n : System Name; $c : System Contact; $l : System Location; $i : System IP;...
Page 305
Don’t forget to use the “save” command to save the key define the RADIUS server enables or disables authentication traps generation configure parameters for EAP over RADIUS configure backpressure buffers protect switch from broadcast storms changing the user privilege level...
Page 306
M A G N U M S W I T C H E S , Command clear <history|log [1..5 |informational |activity |critical |fatal |debug] |terminal |arp|portstats|addr] clear log [fatal |alert| crit|error| warn| note|info|debug] clear-reserveip ip=<ip> climode <script|console|show> com2sec <add|delete> id=<id> [secname=<name>] [source=<source>] [community=<community>] <Enter>...
Page 307
M A G N U M S W I T C H E S , Command del event=<event-id|list|range|all> del port=<number|list|range> delete id=<1-5> delete user=<name> deny ip=<ipaddress> mask=<netmask> service=<name|list> device dhcpsrv <start|stop> dualhome dualhome <enable|disable> dualhome add port1=<port#> port2=<port#> dualhome add primary=<port#> secondary=<port#>...
Page 308
– optional type field. This is useful to specify whether a log file or host file is uploaded or downloaded. This can also perform the task of exporting a configuration file or uploading a new image to the switch [host=<hostname>] [ip=<ipaddress>] [file=<filename>] [user=<user>] [pass=<password>] –...
Page 309
RMON history group and the community string associated with the group IGMP configuration mode enable or disable IGMP on the switch to set IP address on the switch resets the system configuration. The module_name option does not reset the specific module parameters.
Page 310
The default is enabled adds or deletes a management station, specified by the IP address, which can query SNMP variables from the switch. This is done to protect the switch from being polled by unauthorized managers. Applicable for SNM v1 only.
Page 311
Description configure port mirror settings configure port security settings specifies the port or switch level priority. When a port(s) are specified the priority is associated with ports and their value is 0-255. If no ports are specified, then the switch (bridge) priority is specified and its value is 0-65535 specifies the port or switch level priority.
Page 312
Syslog server. Note use the “syslog” command to use this command > enable or disable the log messages being sent to a syslog server. Note use the “syslog” command to use this command assign the boot mode for the switch...
Page 313
MNS allows you to enter the Banner message set or change password set the prompt for switch. The prompt has predefined variables. These are $n : System Name; $c : System Contact; $l : System Location; $i : System IP; $m : System MAC;...
Page 314
G U I D E Description Set the switch to support RSTP or change it back to STP. Need to save and reboot the switch after this command sets the time set the display time in the 12/24 hour mode...
Page 315
M A G N U M S W I T C H E S , Command setport port=<num|list|range> [status=<enable|disable>] [control=<auto|forceauth|forceunauth> ] [initialize=<assert|deassert>] setport port=<port#|list|range> [name=<name>] [speed=<10|100>] [duplex=<half|full>] [auto=<enable|disable>] [flow=<enable|disable>] [bp=<enable|disable>] [status=<enable|disable>] set-ports port=<port|list|range> state=<learn|block|disable> set prompt <prompt string> The length of the prompt is limited to 60 characters.
Page 316
Default value is 10 seconds. The Range can be from 2 to 270 seconds. Restrictions apply to the maximum value because of an internal calculation that is dependent on the value of the Query Interval. enables or disables a switch as IGMP querier setup the SNTP server...
Page 317
All the ports. Once the weight is set, all the ports will be the same weight across the switch. The valid value for weight is 0-7 upload and download information using sftp...
Page 318
M A G N U M S W I T C H E S , Command show address-table show active-stp Show active-snmp show alarm show auth <config|ports> show backpressure show config show console show date show dhcpsrv <config|status|leases> show dns show dualhome show flowcontrol show ftp...
Page 319
Description display the hosts table entries IGMP operation status display all trusted hosts shows the IP parameters set in the switch displays the status and other relevant LACP information display the status of LLL display logs and specific types of logs...
Page 320
For displaying the telnet setting use show console show the status of S-Ring regardless of whether STP is enabled or disabled (default) this command lists the switch’s full STP configuration, including general settings and port settings display the RSTP or STP parameters...
Page 321
VLANs (including dynamic VLANs) on the switch port to monitor and signal to send in case of breach of port security configure the SNMP alerts to be sent via email...
Page 322
Note as discussed earlier, you can create multiple s-rings on a switch remove the switch from S-ring topology by eliminating the end ports on the switch start the learning process to discover the ring and the ports which make up the s-ring “set snmp”...
Page 323
M A G N U M S W I T C H E S , Command start vlan=<name|number|list|range> static vlan=<VID> statistics def-owner=<string> comm=<string> stp <enable|disable> sync [hour=<0-24>] [min=<0-59>] syslog syslog <enable|enable> tacplus <enable|disable> [ order=<tac,local | local,tac>] tacserver <add|delete> id=<num> [ip=<ip-addr>] [port=<tcp- port>] [encrypt=<enable|disable>]...
Page 324
M N S - 6 K U S E R G U I D E Description telnet from the switch. The IP address can be an IPv4 address or an IPv6 address change the STP Forward Delay, Hello timer and Aging timer values...
Page 325
M A G N U M S W I T C H E S , Command user <add|delete> id=<id> [username=<name>] [usertype=<readonly|readwrite>] [authpass=<pass-phrase>] [privpass=<pass-phrase>] [level=<noauth|auth|priv>] [subtree=<oid>] useraccess user=<name> service=<telnet|web> <enable|disable> useraccess user=<name> group=<list> type=<read|write> <enable|disable> useraccess groups view <add|delete> id=<id> [viewname=<name>] [type=<included|excluded>] [subtree=<oid>] [mask=<hex-string>] vlan <enable | disable>...
Page 326
M A G N U M S W I T C H E S , M N S - 6 K U S E R G U I D E Intentionally left blank...
APPENDIX 3 - Daylight Savings No time like the present... Daylight Savings Time Magnum6K Switches provide a way to automatically adjust the system clock for Daylight Savings Time (DST) changes. In addition to the value "none" (no time changes), there are fifteen pre- defined settings, a few examples are: •...
Page 328
D A Y L I G H T S A V I N G S T I M E Australia, Belgium, Canada, Chile, Cuba, Egypt, France, Finland, Germany, Greece, Iraq, Italy, London, Namibia, Portugal, Russia, Spain, Sweden, Switzerland, Syria, USA Note –...
The browser will typically catch that and will warn a user about accessing the site. The rest of the sections below will describe how to use the browsers with GarrettCom self signed certificates.
B R O W S E R C E R T I F I C A T E S Using Mozilla Firefox (ver. 3.x) Mozilla Firefox version 3.x ensures that the user validate the certificate before it allows the user to proceed to the site when the address (URL) does not match the information in the self signed certificate.
Page 331
B R O W S E R C E R T I F I C A T E S 150 – Mozilla Firefox tries to warn the user again about the dangers of sites with improper IGURE certificates Once the “Add Exception” button is displayed, make sure you click on it.
Page 332
Notice that the browser points out that valid sites such as banks, online web stores, government sites, secure sites etc. will not ask you to do that. Since the GarrettCom MNS- 6K is a self signed authenticated “site”, it is a good idea to proceed with this step and click...
C E R T I F I C A T E S 152 – Here, you can view the certificate, permanently make an exception and confirm the IGURE exception. The locations to do those are identified in this figure The self signed certificate from GarrettCom is shown in the next figure.
B R O W S E R C E R T I F I C A T E S 153 – Self signed certificate from GarrettCom Inc for MNS-6K IGURE Once accepted, the user does not need to go through these steps again.
B R O W S E R C E R T I F I C A T E S 154 – Using IE 7 IGURE Using Other Browsers There are many other browsers such as Opera, Safari which are also widely used. There are similar mechanisms built into these browsers to inspect the certificate and create an exception.
APPENDIX 5 – Updating MNS-6K Software Keep up to date... The steps required to update the MNS-6K software on your Magnum switch are listed. Intentionally left blank APPENDIX...
8) Serial port – if your PC does not have a serial port, you may want to invest in a USB to serial converter. This is again available from LANstore or from GarrettCom. Alternately a USB to serial cable can also be used. This cable is available also available from LAN store or GarrettCom Inc.
The first step is to ensure that you have the proper version of the MNS-6K software. To access the proper software, you will require access to the GarrettCom web site (and ftp site) through a network which does not block ftp file transfers. If your site blocks ftp file transfer traffic, please contact your system administrator to figure out how to access the GarrettCom site to download the necessary software.
Page 339
2) Once the connection is established, use the user login as m6kuser and the password as m6kuser – see Figure 1. If you have previously established a different login/password for the GarrettCom site, that login name and password can be used as well. Intentionally left blank for image continuity – image shown on next page ftp://www.garrettcom.com...
Page 340
M N S - 6 K – S T E P 155 – Accessing the GarrettCom site for download. IGURE Note – if the browser does not support the login prompt, you can type in the user name and password on the URL as follows: ftp://m6kuser:m6kuser@ftp.garrettcom.com...
U P D A T I N G M N S - 6 K – S T E P 156 – Select the proper version to use after successful login IGURE 4) Navigate to the folder MNS-6K. See Figure 3. (There are other folders with additional software, MIBs as well as additional useful information for the Magnum-6K switches which you may want to use later.) From the MNS-6K folder download the latest ‘Release Notes’...
6) Make sure you remember where the files are stored as these files will be needed for the next step. Next steps 1) Access the GarrettCom Magnum 6K switch. The access can be over the console port using the null modem cable or through the network using telnet. This is described in step 2.
2. Preparing to load the software Backup your existing configuration….. nce the MNS-6K software is downloaded from the GarrettCom site, it is strongly recommended that the existing configuration of the switch is preserved before the MNS-6K software upgrade is performed. This section will show you how to save the existing configuration and prepare you for loading the configuration.
Magnum 6K switch (or DNS name associated with the switch) to be upgraded. Access the Magnum 6K switch by using the telnet command. For example, if the switch has the IP address 192.168.10.11 the command is as shown in Figure 6 below.
2) TFTP server 3) FTP server As a good practice, GarrettCom recommends that you should have all these capabilities available on your local computer if you plan to upgrade additional switches as well as switches in the future. The command used for saving the existing configuration of the Magnum 6K switch is ‘saveconf’...
U P D A T I N G S O F T W A R E 162 – Invoke the “Receive File” to start the Xmodem transfer program. In the figure above IGURE the Windows XP based HyperTerminal screen is shown Once the “Receive File”...
To save using TFTP or FTP first ensure that you have the FTP or TFTP server set up and the switch can ‘ping’ the TFTP or the FTP server. For ftp services, make sure the server can support anonymous login or make sure the login password information is available.
Next steps 1) Upload the updated MNS-6K software and reboot the switch. This is described in step 3. 2) (Optional step) Reload the saved configuration. This is described in step 4.
Load the new version of the MNS-6K image….. T this stage, the Magnum MNS-6K software has been downloaded from the GarrettCom site, and the configuration saved. The Magnum-6K switch is now ready to upload the new MNS-6K software image. Before loading the MNS-6K software It will be necessary for the Magnum 6K switch to be reset or re-booted after the new MNS-6K software is loaded.
U P D A T I N G S O F T W A R E Serial Connection Prerequisites - make sure the directory and the file name of the MNS-6K software image downloaded in steps 1 and 2 is known. To use the serial connection to update the MNS-6K image, the command dialog is shown below: show version Magnum6K25#...
1 and 2 is known. To upgrade using TFTP or FTP, ensure that the FTP or TFTP server is set up and the switch can ‘ping’ the TFTP or the FTP server and vice-versa. Ensure that the server has access to the MNS-6K software image downloaded in step 2.
(The switch will now reboot. Reconnect and login. Verify the MNS-6K software was upgraded. Note – as discussed in step 1, the switch may need a boot code update. After a reboot, the switch awaits a “Y” or “N” on whether the boot code should be updated. If no answer is given, the default is not to update the boot code (or a “N”).
Magnum 6K switch and finally, if required, the configuration can be restored using the instructions in this step. If the Magnum 6K switch is updated over the network, it maybe necessary to update the boot code.
1 – selecting the proper Version 3.0), the boot code will be updated. At boot up time, the Magnum 6K switch identifies that there is a new version of the boot code and asks if the new boot code should be loaded...
Page 355
U P D A T I N G S O F T W A R E – S T E P Intentionally left blank...
Page 361
I N D E X set serial, 50, 68, 283 set snmp, 242, 244, 253, 298 set stp, 151, 161, 172, 183, 185, 186, 293, 294, 295 set time, 52, 68, 283 set timeformat, 53, 68, 283 set timezone, 52, 68, 283 set vlan, 134, 145, 291 set-forbid, 236, 237, 298 set-leave, 225, 228, 297...
Page 362
I N D E X show active-snmp, 242, 244, 246, 253, 298 show active-stp, 151, 162, 167, 172, 183, 185, 186, 293, 294, 295 show active-vlan, 138 show address-table, 277, 278 show alarm, 258, 259, 260, 300 show auth config, 110 show auth ports, 111 show backpressure, 126, 127, 131, show broadcast-protect, 129, 130...
Need help?
Do you have a question about the MNS-6K 4.1.4 and is the answer not in the manual?
Questions and answers